Human Step Detection and Counting with a Microphone (June 2015)

In: Computers and Technology

Submitted By juba0008
Words 1833
Pages 8
1

Human Step Detection and Counting with a
Microphone (June 2015)
Juan Carlos Batista Sundström*, Hossam Salman** and Hossein Yazbek***

Abstract—nowadays it is common with the alternative use of sensors for detecting human movements such as footsteps and that is done for various reasons such as security or just for lightning a lamp automatically. We developed a Simulink model in Matlab to simulate a system that analyses the footsteps of three 25 years old men. Those men had different heights and weights. The data were recorded and analyzed using filtering and conditioning blocks of
Matlab. The System collected 3 sets of steps. The first set had 5 steps with 5 detections. The second set had 8 steps with 3 detection and the third set had 4 steps with 1 detections. In total, there were
17 steps where 9 steps were detected.
I.

C. Procedure
During the first part of the experiment, the footsteps were recorded on the main corridor of the first floor of the house 21, located in the University of Kristianstad. We also recorded the steps at our respective houses. The experiment was carried on a floor without carpet to allow a better collection of the data. This procedure was repeated several times, until satisfactory data without much noisy could be acquired.

INTRODUCTION

T

HE objective of this work was to detect the steps of a person using a microphone array embedded in our computer together with the Simulink library of Matlab.
We have some background of the idea after reading a few articles regarding this type of experiments.

Fig. 1. Simulink models used to record the steps

In the articles we read, the experiment was connected to fall detection. Whereas we experimented footsteps detection, a bit similar but not exactly the same.
An example is in the article “A microphone array system1”, where they used a…...

Similar Documents

Human Face Detection and Recognition Using Web-Cam

...Journal of Computer Science 8 (9): 1585-1593, 2012 ISSN 1549-3636 © 2012 Science Publications Human Face Detection and Recognition using Web-Cam Petcharat Pattanasethanon and Charuay Savithi Depatment of Business Computer, Faculty of Accountancy and Management, Mahasarakham UniversityKamreang, Kantharawichai, Mahasarakham 44150, Thailand Abstract: Problem statement: The illuminance insensitivity that reflects the angle of human facial aspects occurs once the distance between the object and the camera is too different such as animated images. This has been a problem for facial recognition system for decades. Approach: For this reason, our study represents a novel technique for facial recognition through the implementation of Successes Mean Quantization Transform and Spare Network of Winnow with the assistance of Eigenface computation. After having limited the frame of the input image or images from Web-Cam, the image is cropped into an oval or eclipse shape. Then the image is transformed into greyscale color and is normalized in order to reduce color complexities. We also focus on the special characteristics of human facial aspects such as nostril areas and oral areas. After every essential aspectsarescrutinized, the input image goes through the recognition system for facial identification. In some cases where the input image from the Web-Cam does not exist in the database, the user will be notified for the error handled. However, in cases where the image......

Words: 1996 - Pages: 8

Real-Time Fraud Detection

...severely affected by fraud over the past few years. Indeed, despite all the research and systems available, fraudsters have been able to outsmart and deceive the banks and their customers. With this in mind, we intend to introduce a novel and multi-purpose technology known as Stream Computing, as the basis for a Fraud Detection solution. Indeed, we believe that this architecture will stimulate research, and more importantly organizations, to invest in Analytics and Statistical Fraud-Scoring to be used in conjunction with the already in-place preventive techniques. Therefore, in this research we explore different strategies to build a Streambased Fraud Detection solution, using advanced Data Mining Algorithms and Statistical Analysis, and show how they lead to increased accuracy in the detection of fraud by at least 78% in our reference dataset. We also discuss how a combination of these strategies can be embedded in a Stream-based application to detect fraud in real-time. From this perspective, our experiments lead to an average processing time of 111,702ms per transaction, while strategies to further improve the performance are discussed. Keywords: Fraud Detection, Stream Computing, Real-Time Analysis, Fraud, Data Mining, Retail Banking Industry, Data Preprocessing, Data Classification, Behavior-based Models, Supervised Analysis, Semi-supervised Analysis Sammanfattning Privatbankerna har drabbats hårt av bedrägerier de senaste åren. Bedragare har lyckats kringgå......

Words: 56858 - Pages: 228

Change Detection

...Different Change Detection Techniques Table of Contents Introduction...................................................3 Digital Change Detection Process...............................4 Description of the most commonly used change detection methods.5 I. Post-Classification Comparison..........................5 II. Direct Classification...................................6 III. Principal Component Analysis (PCA)......................6 IV. Image Differencing......................................8 V. Change Vector Analysis (CVA)............................9 Relative accuracy of the most commonly used change detection methods........................................................9 I. Post-Classification Comparison.........................10 II. Direct Classification..................................11 III. Principal Component Analysis (PCA).....................11 IV. Image Differencing.....................................12 V. Change Vector Analysis (CVA) Conclusion....................................................14 References....................................................15 Introduction Remote sensing change detection has been defined as the process of identifying change in the state of an object or phenomena through the detection of differences between two or more sets of images taken of the same area on different dates (Wang, 1993). The underlying assumption is that changes on the ground cause significant......

Words: 3616 - Pages: 15

Knowledge Is the First Step: Let’s Work Together to Stop Human Trafficking

...English 1302 (TTH2:30-4:00) April 18, 2011 Knowledge is the First Step: Let’s Work Together to Stop Human Trafficking Human trafficking and sexual exploitation has become a huge issue in recent years. It has commonly been misconceived that it only occurs in poor countries. In fact the United States makes the top ten lists of common destinations for victims of human trafficking. This is a very discouraging statistic, and I must admit it has left me with a sour taste in my mouth. It’s impossible to determine the exact extent and growth of this industry because smugglers use different methods, and it’s illegal. Some people believe that the legalization of prostitution might actually reduce sex trafficking. Also the current human trafficking laws may not be as effective as they should be in trying to eliminate the problem, perhaps a change in legislature is needed. Another consideration to help alleviate human trafficking would be a special tax set up in accordance with trade laws, which could help fund different aspects of awareness, recovery shelters, etc. These three fundamental issues are related because traffickers find ways around the laws and use devious methods to force the victims into prostitution, in order to fully understand the correlation we must first put ourselves in these person’s shoes. Also all three proposals are hot button topics that very well could be key elements in the elimination of human trafficking. Most of us take our “natural born”......

Words: 1967 - Pages: 8

Gk June

...• Deepika Kumari wins bronze at Antalya Archery World Cup. She was the only Indian who made it to the last four in individual women’s recurve competition as veteran Dola Banerjee, Satbir Kaur and Snehal Divakar all lost in the first round. In the Antalya 2015 recurve women’s event Misun Choi and Bo Bae Ki from South Korea won gold and silver medal respectively. • Punjab to observe 2015-16 as Year of Development. It was announced by Chief Minister Parkash Singh Badal, in Dhuri Assembly segment of the state. • Dilawar Singh of Haryana has won ‘Pedal for Kashmir’ cycling competition, held along the banks of picturesque Dal Lake in Srinagar. Mohammad Akbar Khan came runner up, followed by another local cyclist Mohammad Adil Teli. While in the under-19 category of the competition for Boys, Mohit Kumar won the first prize. Wahid Ahmad Ganie was placed second, while Amir Sadiq Gojriin finished third. In the girls under-19 category, Komal Deshmuk from Maharashtra, beat local girl Bushra Ali to the first position. State Minister for Public Works Altaf Bukhari gave away the prizes to the winners. • Ace Indian shooter Gurpreet Singh has secured India a fifth quota place in shooting for the 2016 Rio Olympics. He achieved this feat by finishing fourth in the Men’s 10 metre Air Pistol final at the International Shooting Sport Federation (ISSF) Shooting World Cup held in Munich, Germany. Earlier, in same world cup Abhinav Bindra, India’s only individual Olympic gold-medallist, had won a......

Words: 6213 - Pages: 25

Fuzzy and Cla Based Edge Detection Method

...Edge detection using Fuzzy Logic and Automata Theory Title Page By Takkar Mohit Supervisor A Thesis Submitted to In Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Electronics & Communication December 2014 . Table of Contents Title Page i CERTIFICATE ii COMPLIANCE CERTIFICATE iii THESIS APPROVAL CERTIFICATE iv DECLARATION OF ORIGINALITY v Acknowledgment vi Table of Contents vii List of Figures x Abstract xiii Chapter 1 Introduction 1 1.1 Edge Detection: Analysis 3 1.1.1 Fuzzy Logic in Image Processing 4 1.1.2 Fuzzy Logic for Edge Detection 5 1.1.3 Cellular Learning Automata 6 Chapter 2 Literature Review 7 2.1 Edge Detection: Methodology 7 2.1.1 First Order Derivative Edge Detection 7 2.1.1.1 Prewitts Operator 7 2.1.1.2 [pic] Sobel Operator 8 2.1.1.3 Roberts Cross Operator 11 2.1.1.4 Threshold Selection 11 2.1.2 Second Order Derivative Edge Detection 11 2.1.2.1 Marr-Hildreth Edge Detector 11 2.1.2.2 Canny Edge Detector 12 2.1.3 Soft Computing Approaches to Edge Detection 13 2.1.3.1 Fuzzy Based Approach 14 2.1.3.2 Genetic Algorithm Approach 14 2.1.4 Cellular Learning Automata 15 Chapter 3 Fuzzy Image Processing 18 3.1 Need for Fuzzy Image Processing 19 3.2 Introduction to Fuzzy sets and Crisp sets 20 3.2.1 Classical sets (Crisp sets) 20 3.2.2 Fuzzy sets 21 3.3 Fuzzification 22 3.4 Membership Value Assignment 22 3.5...

Words: 9151 - Pages: 37

Sona 2015 Pnoy

...THE 2015 STATE OF THE NATION ADDRESS TECHNICAL REPORT Prepared by: The Office of the President of the Philippines TABLE OF CONTENTS TRANSPARENT, ACCOUNTABLE, AND PARTICIPATORY GOVERNANCE 1. Institutionalized Public Accountability .............................................................. 1 2. Upheld Transparency and Citizen Engagement in Government .................... 11 RAPID, INCLUSIVE, AND SUSTAINED ECONOMIC GROWTH 1. Sustained Strong and Broad-Based Economic Growth ................................. 14 2. Increased Opportunities for Employment and Economic Activity .................. 24 POVERTY REDUCTION AND EMPOWERMENT OF THE POOR AND VULNERABLE 1. Invested in the Filipino Workforce for Decent and Productive Work .............. 44 2. Sustained Equitable Access to Affordable and Quality Health Care .............. 50 3. Empowered the Poor and Marginalized towards Self-Reliance ..................... 56 JUST AND LASTING PEACE AND THE RULE OF LAW 1. Protected our National Territory and Boundaries........................................... 61 2. Ensured Public Order and Safety .................................................................. 64 3. Pursued Efforts for Peace and Development in Mindanao ............................ 68 4. Advanced and Protected Human Rights ........................................................ 71 5. Reformed the Justice Sector ...............................................................................

Words: 48288 - Pages: 194

Intrusion Detection

...RESEARCH REPORT – CP5603 INTRUSION DETECTION ASHWIN DHANVANTRI JAMES COOK UNIVERSITY AUSTRILIA SINGAPORE CAMPUS STUDENT ID 12878531 Table Of Contents Title Page No Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Types of Intrusion Detection System . . . . . . . . . . . . . . . . . . . . . . . 2 Working Of Intrusion Detection System. . . . . . . . . . . . . . . . . . . . . 3 System Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Outline Technical Needs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Module Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Use case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Technology Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .......

Words: 3561 - Pages: 15

Devry Mgmt 340 Final Exam-Latest June 2015

...DEVRY MGMT 340 FINAL EXAM-LATEST JUNE 2015 IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load http://www.hwspeed.com/DEVRY-MGMT-340-FINAL-EXAM-LATEST-JUNE-2015-04040444760.htm?categoryId=-1 IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM Question Week 8 : Exams Grading Summary These are the automatically computed results of your exam. Grades for essay questions, and comments from your instructor, are in the "Details" section below. Date Taken: 2/24/2014 Time Spent: 2 h , 58 min , 08 secs Points Received: 200 / 200 (100%) Question Type: # Of Questions: # Correct: Multiple Choice 20 20 Essay 10 N/A Grade Details - All Questions Page: 1 2 Question 1. Question : (TCO 1) When developing information systems, an organization could use: Student Answer: an information technology services firm. open-source software. cloud computing. in-house development. all of the above. Instructor Explanation: Ref: chapter 2 page 29 Points Received: 5 of 5 Comments: Question 2. Question : (TCO 1) The practice of turning over responsibility of some or all of an organization's information systems applications and operations to an outside firm is referred to as: Student Answer: realignment. downsizing. outsourcing. time sharing. system reassignment and deployment. Instructor Explanation: Ref: chapter 2 page 28 Points Received: 5 of 5 Comments: ......

Words: 1542 - Pages: 7

Devry Mgmt 520 Final Exam-June 2015

...Devry MGMT 520 Final Exam-June 2015 IF You Want To Purchase A+ Work then Click The Link Below For Instant Down Load http://www.hwspeed.com/Devry-MGMT-520-Final-Exam-June-2015-04040444252.htm?categoryId=-1 IF You Face Any Problem Then E Mail Us At JOHNMATE1122@GMAIL.COM Question 1. (TCO A & F) Ownership of property has long been a major benefit of businesses in the U.S. and on the World Stage. Such property varies from Real Property, Tangible Property, and Intangible/Intellectual Property. Define these three types of property in daily business terminology, and give examples of each such property. (Points : 30) Question 2. 2. (TCO I) A group of Oil Traders from Switzerland who partnered with their American counterparts, sought to gain control of Russian Oil Exports from the highly productive areas in West Siberia. Rather than having to bid on a dollar per barrel of oil basis every day for the 2 million barrels per day of oil that was exported from this highly productive area, the traders invited the regional executives of the Russian oil production districts to meet with them in Davos, Switzerland. The oil traders sent a chartered airliner to Moscow to transport the Russian oil executives to Geneva, and then provided rail transport to Davos, for a five-day series of business meetings. Each day involved a skiing trip on the slopes of Davos for the oil executives accompanied by a trained skiing instructor. The business meetings were limited to about 1 hour per night,......

Words: 1598 - Pages: 7

Analyzing Anti-Pattern Detection

...Analyzing Anti-pattern Detection Southern Methodist University Abstract A design pattern is a well-understood, reusable design fragment used to solve a commonly occurring problem in software development. Whereas, antipatterns are common design pitfalls that provide poor solutions to recurring design problems. Developers may unwillingly introduce anti-patterns in their software systems due to time pressure, lack of skills, communication or understanding. Anti-patterns have a negative effect on the comprehension and maintainability of a software system, and thus, understanding and detecting Anti-patterns provides the knowledge to prevent or recover from them. This paper discusses the anti-patterns of object oriented design, their symptoms, and consequences and issues related to their detection. This study also discusses some of the tools and approaches that are currently being developed and used in the software industry to detect anti-pattern. Towards the end, this paper also highlights some of the problems that are still open, to drive future research direction in this field. 1. Introduction Now-a-days, most of the software projects deal with large number of components that make the software more complicated and hard for novice designers to design. A design pattern is one of the most simple and powerful techniques used to improve the software design. Unfortunately, due to a number of market/customers constraints, anti-patterns may......

Words: 4918 - Pages: 20

Counting Animals

...This week I chose to write and talk about counting animals here in Alaska. How exactly are the populations estimated? How is it possible to count the different species in Alaska? What are the current populations in Alaska? What are the current populations of animals in Alaska? No one knows, exactly. No one knows exactly how many people there are here, either. It's usually easier to count humans, because people can talk to each other and ask and answer questions. Animals aren't that cooperative. The numbers of wild animals in the state are estimated using a variety of methods. Some wildlife populations group together so biologists can determine their numbers using a photo census. Caribou, for example, aggregate in the summer when mosquitoes are thick. When the caribou gather, the groupings are monitored until biologists are convinced that nearly all of the caribou in the herd are included. Assuming the weather cooperates, they fly over the herd in an aircraft fitted with a belly-mounted camera and photograph the entire herd on large-format film. After the film is processed, biologists sit in the office with magnifying glasses and count every caribou on the photos. This process takes several weeks to complete this type of census. Moose don't gather in large groups. Their population estimate surveys are performed in the fall and winter when the right combination of weather, snow depth, and day length allow biologists to fly and see the moose. It's hard to believe that...

Words: 772 - Pages: 4

Botnet Analysis and Detection

...including, but not limited to botnet attacks. A Botnet can simply be seen as a network of compromised set of systems that can be controlled by an attacker. These systems are able to take malicious actions as needed by the attacker without the consent of the device owner and can cause havoc. This paper is the first part of a two-part report and discusses on several reportedly known botnets and describes how they work and their mode of infection. Several historic attacks and the reported damage have been given to give a good picture and raise the bar on the capabilities of botnets. Several existing tools have been considered and examined which are useful for detecting and terminating botnets. You would find that each tool has its own detection strategy, which may have an advantage on some end than others. iii Table of Contents Declaration ........................................................................................................................................... i Acknowledgements .......................................................................................................................... ii Abstract ............................................................................................................................................... iii Table of Contents ............................................................................................................................ iv List of Table......

Words: 13171 - Pages: 53

Face Detection

...accuracy. Using fea- The facial landmarks (eyes, eyebrows, nose, mouth) are intutures extracted by facial landmark detection, we received on itively the most expressive features in a face, and could also average 52% classification accuracy. However, when we used serve as good features for emotion classification. a convolutional neural network, we received 65% classification accuracy. 1.3 1 Support vector machines are widely used in classification problems, and is an optimization problem that can be solved in its dual form, Introduction Detecting facial expressions is an area of research within computer vision that has been studied extensively, using many different approaches. In the past, work on facial image analysis concerned robust detection and identification of individuals [5]. More recently, work has expanded into classification of faces based on features extracted from facial data, as done in [6], and using more complex systems like convolutional neural networks, as done in [1] and [2]. In our project, we compared classification using features manually extracted from facial images against classification using a convolutional neural net, which learns the significant features of images through convolutional and pooling neural layers. The two manual feature extraction methods we explored were principal component analysis (PCA) and facial landmark detection. These extracted features were then classified using a kernel support vector machine (SVM) and a......

Words: 3596 - Pages: 15

A Fusion Approach for EffiCient Human Skin Detection

... 8, NO. 1, FEBRUARY 2012 A Fusion Approach for Efficient Human Skin Detection Wei Ren Tan, Chee Seng Chan, Member, IEEE, Pratheepan Yogarajah, and Joan Condell Abstract—A reliable human skin detection method that is adaptable to different human skin colors and illumination conditions is essential for better human skin segmentation. Even though different human skin-color detection solutions have been successfully applied, they are prone to false skin detection and are not able to cope with the variety of human skin colors across different ethnic. Moreover, existing methods require high computational cost. In this paper, we propose a novel human skin detection approach that combines a smoothed 2-D histogram and Gaussian model, for automatic human skin detection in color image(s). In our approach, an eye detector is used to refine the skin model for a specific person. The proposed approach reduces computational costs as no training is required, and it improves the accuracy of skin detection despite wide variation in ethnicity and illumination. To the best of our knowledge, this is the first method to employ fusion strategy for this purpose. Qualitative and quantitative results on three standard public datasets and a comparison with state-of-the-art methods have shown the effectiveness and robustness of the proposed approach. Index Terms—Color space, dynamic threshold, fusion strategy, skin detection. I. INTRODUCTION W ITH the progress of information...

Words: 5432 - Pages: 22