A driver drowsiness and distraction warning system based on raspberry Pi 3 Kit

2019 ◽  
Vol 70 (3) ◽  
pp. 184-192
Author(s):  
Toan Dao Thanh ◽  
Vo Thien Linh

In this article, a system to detect driver drowsiness and distraction based on image sensing technique is created. With a camera used to observe the face of driver, the image processing system embedded in the Raspberry Pi 3 Kit will generate a warning sound when the driver shows drowsiness based on the eye-closed state or a yawn. To detect the closed eye state, we use the ratio of the distance between the eyelids and the ratio of the distance between the upper lip and the lower lip when yawning. A trained data set to extract 68 facial features and “frontal face detectors” in Dlib are utilized to determine the eyes and mouth positions needed to carry out identification. Experimental data from the tests of the system on Vietnamese volunteers in our University laboratory show that the system can detect at realtime the common driver states of “Normal”, “Close eyes”, “Yawn” or “Distraction”

2019 ◽  
Vol 70 (3) ◽  
pp. 184-192
Author(s):  
Toan Dao Thanh ◽  
Vo Thien Linh

In this article, a system to detect driver drowsiness and distraction based on image sensing technique is created. With a camera used to observe the face of driver, the image processing system embedded in the Raspberry Pi 3 Kit will generate a warning sound when the driver shows drowsiness based on the eye-closed state or a yawn. To detect the closed eye state, we use the ratio of the distance between the eyelids and the ratio of the distance between the upper lip and the lower lip when yawning. A trained data set to extract 68 facial features and “frontal face detectors” in Dlib are utilized to determine the eyes and mouth positions needed to carry out identification. Experimental data from the tests of the system on Vietnamese volunteers in our University laboratory show that the system can detect at realtime the common driver states of “Normal”, “Close eyes”, “Yawn” or “Distraction”


Road crashes are the most common forms of accidents and deaths worldwide, and the significant reasons for these accidents are usually drunken, drowsiness and reckless behaviour of the driver. According to the World Health Organization, road traffic injuries have risen to 1.25 billion worldwide, which makes driver drowsiness detection a major potential area to avert numerous sleep-induced road accidents. This project proposes an idea to detect drowsiness using machine learning algorithms, hence alarming the driver in real-time to prevent a collision. The model uses the Haar Cascade algorithm, along with the OpenCV library to monitor the real-time video of the driver and to detect the eyes of the driver. The system uses the Eye Aspect Ratio (EAR) concept to determine if the eyes are open or closed. We also feed a data-set file consisting of the facial features data-points to train the machine learning algorithm. The model inspects each frame of the video, which helps to recognize the state of the driver. Furthermore, a Raspberry Pi single-board computer, combined with a camera module and an alarm system, facilitates the project to emulate a compact drowsiness detection system suitable for different automobiles.


Author(s):  
Weiping Liu ◽  
John W. Sedat ◽  
David A. Agard

Any real world object is three-dimensional. The principle of tomography, which reconstructs the 3-D structure of an object from its 2-D projections of different view angles has found application in many disciplines. Electron Microscopic (EM) tomography on non-ordered structures (e.g., subcellular structures in biology and non-crystalline structures in material science) has been exercised sporadically in the last twenty years or so. As vital as is the 3-D structural information and with no existing alternative 3-D imaging technique to compete in its high resolution range, the technique to date remains the kingdom of a brave few. Its tedious tasks have been preventing it from being a routine tool. One keyword in promoting its popularity is automation: The data collection has been automated in our lab, which can routinely yield a data set of over 100 projections in the matter of a few hours. Now the image processing part is also automated. Such automations finish the job easier, faster and better.


Author(s):  
Oren Izenberg

This book offers a new way to understand the divisions that organize twentieth-century poetry. It argues that the most important conflict is not between styles or aesthetic politics, but between poets who seek to preserve or produce the incommensurable particularity of experience by making powerful objects, and poets whose radical commitment to abstract personhood seems altogether incompatible with experience—and with poems. Reading across the apparent gulf that separates traditional and avant-garde poets, the book reveals the common philosophical urgency that lies behind diverse forms of poetic difficulty—from William Butler Yeats's esoteric symbolism and George Oppen's minimalism and silence to Frank O'Hara's joyful slightness and the Language poets' rejection of traditional aesthetic satisfactions. For these poets, what begins as a practical question about the conduct of literary life—what distinguishes a poet or group of poets?—ends up as an ontological inquiry about social life: What is a person and how is a community possible? In the face of the violence and dislocation of the twentieth century, these poets resist their will to mastery, shy away from the sensual richness of their strongest work, and undermine the particularity of their imaginative and moral visions—all in an effort to allow personhood itself to emerge as an undeniable fact making an unrefusable claim.


2020 ◽  
Vol 11 (SPL1) ◽  
pp. 1240-1243
Author(s):  
Pradyuman Singh Rajput ◽  
Asish Kumar Saha ◽  
Insiya Gangardiwala ◽  
Anand Vijayakumar Palur Ramakrishnan

The COVID-19 pandemic initially started from the Wuhan capital city of Hubei Province in the People's Republic of China had now led to a severe public health hazard across the globe, the recorded death is approximately 958 thousand globally and counting. With the enormous amount of spread of the disease, a severe crisis for Personal Protective Equipment (PPE) is being noticed across the globe. Face masks being the first line of defence for all the healthcare workers as well for the common public. It became mandatory to wear face masks before entering the patient care area. The countries who are not manufacturing it locally had to depend on other countries for the procurement. As there is a severe supply chain disruption due to the lockdown measures taken by all the countries to contain the disease, so it had become difficult to procure the face masks from the manufacturing countries. The price for these PPEs is also rising at an alarming rate with the increase in the COVID-19 cases and the huge rate of consumption by the healthcare and other sectors. Therefore, with limited resources, the hospital has to run its services. The CDC, WHO and ICMR have released several guidelines from time to time for sterilization and reuse of face masks. This article will discuss the various methods that can be utilized to sterilize the face masks and reuse of it.


2018 ◽  
Vol 8 (4) ◽  
pp. 65-69
Author(s):  
Mao Nguyen Van ◽  
Dong Tran Nam

Background: Pigmented tumour of the skin is one of the common tumour in human including the benign pigmented tumours (more common) called Nevi tumours and the malignant one called melanoma which was less frequent but the most poor in prognosis. In addition, the others not belonging to these group had the same clinical appearance, so the application of histopathology and immunohistochemistry for the definitive diagnosis was indespensible. Objectives: 1. To describe the macroscopic features of the pigmented tumoral-like lesions; 2. To classify the histopathologic types of the pigmented cell tumours and the other pigmented tumours of the skin. Materials and Method: Cross-sectional research on 55 patients diagnosed as pigmented tumoral lesions by clinician, then all definitively diagnosed by histopathology combining the immunohistochemistry in difficult cases. Results: There was no difference in gender, the disease was discovered most common in adult, especially with the age over 51 years old (58.1%). the most region located was in the face accounting for 60%, following the trunk and limbs (14.6%, 12.8% respectively). All 3 malignant melanomas happened in foot. The most common color of the lesions was black (65.4%), the other ones were rose, grey and blue. Histopathology and immunohisthochemistry showed that the true pigmented cell tumours were 52.6% encompassing benign ones (Nevi tumour) (41.8%), melanoma (5.4%) and lentigo (5.4%). 47.4% was not the true pigmented cell tumour including pigmented basocellular carcinoma (36.4%) and the others less common as histiofibromas, acanthoma and papilloma. Conclusion: the pigmented tumoral-like lesions of the skin could be the true pigmented cell tumours and the others, so the application of the histopathology and the immunohistochemistry after the clinical discovery helps to determine and classify the disease definitely and for the best orientation of treatment as well. Key words: skin tumour, benign pigmented tumour (Nevi), malignant pigmented tumour (melanoma), pigmented basocellular carcinoma


1988 ◽  
Vol 5 (2) ◽  
pp. 239-246
Author(s):  
Mohammad A. Siddiqui

IntroductionCommunication today is increasingly seen as a process through whichthe exchange and sharing of meaning is made possible. Commtinication asa subject of scientific inquiry is not unique to the field of mass communication.Mathematicians, engineers, sociologists, psychologists, political scientists,anthropologists, and speech communicators have been taking an interest inthe study of communication. This is not surprising because communicationis the basic social process of human beings. Although communication hasgrown into a well developed field of study, Muslim scholars have rdrely hcusedon the study of communication. Thus, a brief introduction to the widely usedcommunication concepts and a framework for the study of communicationwithin the context of this paper is provided.In 1909, Charles Cooley defined communication from a sociologicalperspective as:The mechanism through which human relations exist and develop -all the symbols of mind, together with the means of conveyingthem through space and preserving them in time. It includes theexpression of the face, attitude and gesture, the tones of the voice,words, writing, printing, railways, telegraph, and whatever elsemay be the latest achievement in the conquest of space and time.In 1949, two engineers, Claude Shannon and Warren Weaver, definedcommunication in a broader sense to include all procedures:By which one mind may affect another. This, of course, involvesnot only written and oral speeches, but also music, the pictorialarts, the theater, the ballet, and, in kct, all human behavior.Harold Lasswell, a political scientist, defines communication simply as:A convenient way to describe the act of communication is to answerthe following question: Who, says what, in which channel, towhom, with what effect?S.S. Stevens, a behavioral psychologist, defines the act of communication as:Communication occurs when some environmental disturbance (thestimulus) impinges on an organism and the organism doessomething about it (makes a discriminatory response) . . . Themessage that gets no response is not a commnication.Social psychologist Theodore Newcomb assumes that:In any communication situation, at least two persons will becommunicating about a common object or topic. A major functionof communication is to enable them to maintain simultaneousorientation toward one another and toward the common object ofcommunication.Wilbur Schramm, a pioneer in American mass communication research,provides this definition:When we communicate we are trying to share information, anidea, or an attitude. Communication always requires threeelements-the source, the message, and the destination (thereceiver).


Author(s):  
Nooreddine Iskandar ◽  
Tatiana Rahbany ◽  
Ali Shokor

Abstract Background: Due to the common instability caused by political and security issues, Lebanese hospitals have experienced acts of terrorism multiple times. The most recent Beirut Explosion even forced several hospitals to cease operations for the first time in decades—but studies show the preparedness levels for such attacks in similar countries are low. Objective: The aim of this study is to explore the experience of Lebanese hospitals with terrorist attacks. Methods: This qualitative study used semi-structured interviews with various stakeholders to assess their experience with terrorist bombings. Data was analyzed using the thematic analysis method. Results: The researchers found that Lebanese hospitals vary greatly in their structures and procedures. Those differences are a function of 3 contextual factors: location, culture, and accreditation status. Hospitals found near ‘dangerous zones’ were more likely to be aware and to have better response to such events. A severe lack of communication, unity of command, and collaboration between stakeholders has made the process fragmented. Conclusion: The researchers recommend a larger role for the Ministry of Public Health (MOPH) in this process, and the creation of a platform where Lebanese organizations can share their experiences to improve preparedness and resilience of the Lebanese healthcare system in the face of terrorism.


2021 ◽  
pp. 1-11
Author(s):  
Suphawimon Phawinee ◽  
Jing-Fang Cai ◽  
Zhe-Yu Guo ◽  
Hao-Ze Zheng ◽  
Guan-Chen Chen

Internet of Things is considerably increasing the levels of convenience at homes. The smart door lock is an entry product for smart homes. This work used Raspberry Pi, because of its low cost, as the main control board to apply face recognition technology to a door lock. The installation of the control sensing module with the GPIO expansion function of Raspberry Pi also improved the antitheft mechanism of the door lock. For ease of use, a mobile application (hereafter, app) was developed for users to upload their face images for processing. The app sends the images to Firebase and then the program downloads the images and captures the face as a training set. The face detection system was designed on the basis of machine learning and equipped with a Haar built-in OpenCV graphics recognition program. The system used four training methods: convolutional neural network, VGG-16, VGG-19, and ResNet50. After the training process, the program could recognize the user’s face to open the door lock. A prototype was constructed that could control the door lock and the antitheft system and stream real-time images from the camera to the app.


Sign in / Sign up

Export Citation Format

Share Document