Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
-
Upload
rachel-wheeler -
Category
Documents
-
view
217 -
download
0
Transcript of Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
-
7/29/2019 Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
1/8
International Journal of Computational Intelligence and Information Security, J an-Feb 2013 Vol. 4, No. 1-2ISSN: 1837-7823
13
An Intelligent Gate Controller Using a Personal Computer and PatternRecognition Protocols
Philip A. ADEWUYI1, Muniru O. OKELOLA2, Adewale O. J EMILEHIN2
1 Mechatronics Engineering Department, Bells University of Technology, Ota, Nigeria
2Electronic and Electrical Engineering Department, Ladoke Akintola University of Technology, Ogbomoso,Nigeria
Abstract
The issue of security of lives and properties has become the number one concern of everybody aroundthe world. Governments as well as individuals invest heavily in security concerns. In the past years, it isobserved that many suicide attacks were carried out using vehicular tools. So, an intelligent gate controller
using a personal computer and pattern recognition is developed to prevent unwanted person(s) or elements(s)from gaining vehicular access into protected areas. Combination of software and hardware engineering is thebedrock of this work. Four Surveillance cameras are used to capture and recapture face of the driver as well asthe character recognition of the plate numbers of vehicles which serve as the input to the data bank system foronward comparison and processing by the computer system. The output of the computer system triggers theelectronic switch which controls the operations of the DC motor responsible for the opening and closing of thegate. At the centre of this work is the PIC16F84A which is programmed using mikroC Pro for PIC softwareto serve as the interface between the software elements and the hardware elements. This choice is made to makethe electronic switching operations very fast to prevent odd manipulations.
Keywords: Intelligent, Controller, Pattern recognition, Surveillance, DC motor, PIC
1. Introduction
Security consciousness at the entry points of any establishment is important. More so, employing theright security system at sensitive places is highly desirable [1]. In order to have the desired secured area, the useof a computer system and pattern recognition protocols are employed to set up a novel controller which operatesthe gate depending on the signals received from the processed input parameters such as the face recognition andthe plate numbers identification to give or deny entry access to a particular vehicle. The interrelationshipbetween the software and the hardware components are greatly utilized in this work. Looking critically at thiswork, it could be seen that the work combined two separate systems. That is, automatic gate control system anda surveillance system. It is rare to find a system in which the two systems are combined to form a single unit.Previous works were aimed at the control of a gate using either a remote control or a sensor at the entrance ofthe gate to detect the presence of any object that is trying to make a passage [2].
The hardware components involved in the physical control of the gate are; relays as electronicswitches, dc motor, microcontroller, power supply unit and a sensor. The feature that makes this work differfrom the conventional automatic gate control system is the software which utilizes the technology of patternrecognition in order to grant entry access. The face of the driver and the plate numbers of the vehicle beingdriven are captured using surveillance cameras. These parameters serve as the input data to the designedcontroller. There are various other projects that utilize surveillance cameras system. These existing systems areusually applied in traffic safety & monitoring, school & workplace security, crime fighting & prevention [3].
The rest of this work is divided into sections such as; automatic face recognition, principal componentanalysis, PCA algorithms, methodology, design and construction, results and discussion, and conclusion.
-
7/29/2019 Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
2/8
International Journal of Computational Intelligence and Information Security, J an-Feb 2013 Vol. 4, No. 1-2ISSN: 1837-7823
14
2. Automatic Face RecognitionAccording to the free dictionary, automatic face recognition is a biometric identification by scanning a
person's face and matching it against a library of known faces [4]. Developed in the 1960s, the first semi-automated system for face recognition required the administrator to locate features (such as eyes, ears, nose, andmouth) on the photographs before it calculated distances and ratios to a common reference point, which werethen compared to reference data.
In the 1970s, 21 specific subjective markers such as hair color and lip thickness were used to automaterecognition [5]. The problem with both of these early solutions was that the measurements and locations weremanually computed.
In 1987, the principle component analysis which is a standard linear algebra technique is also appliedto solving face recognition problem [6]. This is an improvement over the work carried out by Goldstein,Harmon, and Lesk in the 70s.
In 1991, Turk and Pentland discovered that while using the eigenfaces techniques, the residual errorcould be used to detect faces in images
a discovery that enabled reliable real-time automated face recognitionsystems [7]. This approach was affected by environmental factors. Nonetheless, it created significant interest infurthering development of automated face recognition technologies.
The technology first captured the publics
attention from the media reaction to a trial implementation at the January 2001 Super Bowl, which capturedsurveillance images and compared them to a database of digital mug shots. This demonstration initiated much-needed analysis on how to use the technology to support national needs while being considerate of the publicssocial and privacy concerns. Today, face recognition technology is being used to combat passport fraud, supportlaw enforcement, identify missing children, and minimize benefit/identity fraud.
2.1 Principal Components Analysis (PCA)
Principal component analysis (PCA) involves a mathematical procedure that transforms a number of(possibly) correlated variables into a (smaller) number of uncorrelated variables called principal components[8]. The mathematical technique used in PCA is called eigen analysis: we solve for the eigenvalues andeigenvectors of a square symmetric matrix with sums of squares and cross products. The eigenvector associated
with the largest eigenvalue has the same direction as the first principal component. The eigenvector associatedwith the second largest eigenvalue determines the direction of the second principal component. The sum of theeigenvalues equals the trace of the square matrix and the maximum number of eigenvectors equals the numberof rows (or columns) of this matrix. With PCA, the probe and gallery images must be the same size and mustfirst be normalized to line up the eyes and mouth of the subjects within the images. The PCA approach is thenused to reduce the dimension of the data by means of data compression basics
and reveals the most effective lowdimensional structure of facial patterns.
The primary advantage of this technique is that it can reduce the data needed to identify the individual
to 1/1000th
of the data presented.
2.2 PCA Algorithms
Given a symmetric matrix such as the covariance matrix, a householder reduction technique is used tosolve for the eigenvalue and followed by the QL algorithm with implicit shifts.
On the other hand, if data matrix A is the starting point , we do not have to form explicitly the matrix with sumsof squares and cross products, AA. Instead, we proceed by a numerically more stable method, and formthe singular value decomposition ofA,UV. The matrixV then contains the eigenvectors, and the squareddiagonal elements of contain the eigenvalues [8].
3. Methodology
The block and schematic representation of this work is detailed in figure 1 and 2 below. The block diagram
shows the image capturing at the point of entry via the surveillance camera. The necessary features areextracted and processed/compared with the information stored in the data base, processed by computer and
-
7/29/2019 Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
3/8
International Journal of Computational Intelligence and Information Security, J an-Feb 2013 Vol. 4, No. 1-2ISSN: 1837-7823
15
gives out logic instructions for the control of the gate system through the switching relays that dictate the bi-directional movement of the gate.
Figure 1: Block diagram of an intelligent gate controller system
Figure 2: The full schematic of an intelligent gate controller system
Feature
PROGRAMMINGSTAGE
Database
Matching
Identification
FeatureImage
Bi-directional
Controlled
Switching
Rela
Image
Logic
Control
-
7/29/2019 Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
4/8
International Journal of Computational Intelligence and Information Security, J an-Feb 2013 Vol. 4, No. 1-2ISSN: 1837-7823
16
Three software tools were used as highlighted hereunder:
1. LUXAND SDK (Face Recognition)2. OCR Tools (Character Recognition)3. Visual Studio. Net (2008)The face and character recognition software were combined in visual studio environment. The Luxandsoftware was used to analyze the face captured from the camera for faces while the OCR tools were usedtoconvert the plate number pictures into characters. Figure 3 below shows the interface of the setup.
Figure 3: The software interface.
3.1 Electronic Lock System
The design of an electronic lock system used for the opening and closing of the gate system is shown infigure 4 below:
Figure 4: The Block diagram of an electronic lock
The electronic lock system comprise of the power supply unit, the sensing unit, the door unit, the control unit,
and the computer interface unit.
Power Supply Unit
Door UnitControl UnitSensing Unit
Computer Interface
-
7/29/2019 Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
5/8
International Journal of Computational Intelligence and Information Security, J an-Feb 2013 Vol. 4, No. 1-2ISSN: 1837-7823
17
3.2 Power Supply Unit
The power supply unit comprises of the transformer TR1, full-wave bridge rectifier DR1, a filtercapacitor C1, a regulator U1 and a smoothing capacitor C2.
Figure 5: Power supply unit schematic
The transformer is a 500mA/12V step down transformer. This 12V AC supply is converted to 12V DCsupply and is regulated by a 3-terminal regulating power transistor. Smoothing of the resulting voltage iscarried out by the capacitor C1. The output of the regulator is connected to a smoothing capacitor C2 to preventthe effect of voltage spike from having effect on the functionality of the circuit.
3.3 Sensing Unit
The sensing unit for the system is incorporated into the software which means that the sensingoperation is automatically controlled.
3.4 The Control Unit
The major active component in the control unit is the PIC16F84A, which is a programmable interface controllershown in figure 6 below:
Figure 6: The Control Unit Schematic
TR1
DR1
C11000u
VI1
VO3
GND
2C2100u
-
7/29/2019 Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
6/8
International Journal of Computational Intelligence and Information Security, J an-Feb 2013 Vol. 4, No. 1-2ISSN: 1837-7823
18
The IC is programmed using the MicroBasic Integrated Development Environment (IDE) and the ICprog IDEsoftware. This software is used to program the IC in the basic language and then transferred into the memory ofthe PIC. The control unit gets the input from the entry unit, decodes them and then takes the following steps:
Generate the timing signal for the system Decodes the input On receiving signal from the sensing unit will activate the computer Receive Signal from the signal Control the gate opening and closingThe rate at which the IC executes the instruction in its memory will depend on the value of the crystal
oscillator connected to the PIC.The number of instructions executed by the microcontroller per second is calculated as given below:
Value of the crystal oscillator (XT) used =8MHzNumber of instructions/second =Value of XT oscillator
4
3.5 The Gate Unit
Figure 7: The Gate Unit Schematic
The gate unit consists of the electromechanical switch and the dc motor as shown in figure 7. The doorunit is made up of the rack and the pinion which helps in moving the door mechanism. The electromechanicalswitch (relay) is responsible for control of the motor to the desired direction.
4. Results and Discussion
Having programmed the microcontroller using the mikroBasic IDE interface, the hexadecimalrepresentation of the code is transferred into the memory of the PIC through a linker as displayed below infigure 8 and 9.
-
7/29/2019 Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
7/8
International Journal of Computational Intelligence and Information Security, J an-Feb 2013 Vol. 4, No. 1-2ISSN: 1837-7823
19
Figure 8: The MicroBasic IDE interface
Figure 9: The PIC Program IDE interface
-
7/29/2019 Paper-2 an Intelligent Gate Controller Using a Personal Computer and Pattern Recognition Protocols
8/8
International Journal of Computational Intelligence and Information Security, J an-Feb 2013 Vol. 4, No. 1-2ISSN: 1837-7823
20
4.1 Discussion
Once the system is powered on, the PIC will resume continuous checking through the surveillancecamera used as sensors. Immediately the system identifies a vehicle, the control unit sends a signal to capturethe face and the plate number of the incoming or outgoing vehicles. If the vehicle is coming in, the system only
captures the face of the driver and plate number and does comparison with what is stored in the data bank. Thegate opens or remains closed as to the authenticity of the input data. For areas where visitors vehicle areallowed, at the entry point, the system only captures the face of the driver and the plate number then opens thegate. At the exit point, the system does the capturing again and compares the data with what it captured at theentry point. If the images or patterns match the exit gate opens. Otherwise, it remains closed.
5. Conclusions
The innovative power of soft computing when combined with suitable applications should be wellutilized to bring about a safe environment for all to live in. As could be seen in this work, pattern recognitionprotocols, if well applied, play a key role in security issues. Precious lives could be saved and properties
protected from destruction coming from intruders. An intelligent controller of this nature is therefore a faithfulservant that could be employed to solving many security lapses that are usually associated with the vehicularpoint of entry or exit. This could also be applied to other areas, such as auditorium protection, malls protection,schools and many other private and public infrastructures.
Future research could concentrate on the use of mobile devices to achieve the remote control andmonitoring of the entry points.
References
[1] Robles R. J. and Kim T., (2010), Applications, Systems and Methods in Smart Home Technology: AReview, International Journal of Advanced Science and Technology, Vol. 15, pp 37 47.
[2] Shoewu O. and Baruwa O. T., (2006), Design of a Microprocessor Based Automatic Gate, Pacific
Journal of Science and Technology, 7(1): 31 44.[3] Onut V., Aldridge D., Mindel M., and Perelgut S., (2010), Smart surveillance system applications,
CASCON 10 Proceedings of the 2010 Conference of the Center for Advanced studies onCollaborative Research, pp. 430 432.
[4] Free dictionary.www.thefreedictionary.com/automatic +face +recognition. Article retrieved on the15th January, 2013.
[5] Goldstein A.J , Harmon L.D, and Lesk A.B., (1971), Identification of Human Faces, Proc. IEEE,Vol. 59, No. 5, 748-760.
[6] Sirovich L. and Kirby M., (1987), A Low-Dimensional Procedure for the Characterization of HumanFaces, J. Optical Soc. Am. A, Vol. 4, No.3, 519-524.
[7] Turk M.A and Pentland A.P., (1991), Face Recognition Using Eigenfaces, Proc. IEEE, 586-591.[8] Principal component analysis. An article by djmw(May 10, 2012) retrieved from
www.fon.hum.uva.nl/praat/manual/Principal_component_analysis.html
http://www.thefreedictionary.com/automatichttp://www.thefreedictionary.com/automatichttp://www.thefreedictionary.com/automatic