scholarly journals Trends and Future Prospects of the Drowsiness Detection and Estimation Technology

Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7921
Author(s):  
Toshiya Arakawa

Drowsiness is among the important factors that cause traffic accidents; therefore, a monitoring system is necessary to detect the state of a driver’s drowsiness. Driver monitoring systems usually detect three types of information: biometric information, vehicle behavior, and driver’s graphic information. This review summarizes the research and development trends of drowsiness detection systems based on various methods. Drowsiness detection methods based on the three types of information are discussed. A prospect for arousal level detection and estimation technology for autonomous driving is also presented. In the case of autonomous driving levels 4 and 5, where the driver is not the primary driving agent, the technology will not be used to detect and estimate wakefulness for accident prevention; rather, it can be used to ensure that the driver has enough sleep to arrive comfortably at the destination.

Author(s):  
Swapnil Titare ◽  
Shubham Chinchghare ◽  
K. N. Hande

Nowadays, accidents occur during drowsy road trips and increase day by day; It is a known fact that many accidents occur due to driver fatigue and sometimes inattention, this research is primarily devoted to maximizing efforts to identify drowsiness. State of the driver under real driving conditions. The aim of driver drowsiness detection systems is to try to reduce these traffic accidents. The secondary data collected focuses on previous research on systems for detecting drowsiness and several methods have been used to detect drowsiness or inattentive driving.Our goal is to provide an interface where the program can automatically detect the driver's drowsiness and detect it in the event of an accident by using the image of a person captured by the webcam and examining how this information can be used to improve driving safety can be used. . a vehicle safety project that helps prevent accidents caused by the driver's sleep. Basically, you're collecting a human image from the webcam and exploring how that information could be used to improve driving safety. Collect images from the live webcam stream and apply machine learning algorithm to the image and recognize the drowsy driver or not.When the driver is sleepy, it plays the buzzer alarm and increases the buzzer sound. If the driver doesn't wake up, they'll send a text message and email to their family members about their situation. Hence, this utility goes beyond the problem of detecting drowsiness while driving. Eye extraction, face extraction with dlib.


Information ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 3
Author(s):  
Shuang Chen ◽  
Zengcai Wang ◽  
Wenxin Chen

The effective detection of driver drowsiness is an important measure to prevent traffic accidents. Most existing drowsiness detection methods only use a single facial feature to identify fatigue status, ignoring the complex correlation between fatigue features and the time information of fatigue features, and this reduces the recognition accuracy. To solve these problems, we propose a driver sleepiness estimation model based on factorized bilinear feature fusion and a long- short-term recurrent convolutional network to detect driver drowsiness efficiently and accurately. The proposed framework includes three models: fatigue feature extraction, fatigue feature fusion, and driver drowsiness detection. First, we used a convolutional neural network (CNN) to effectively extract the deep representation of eye and mouth-related fatigue features from the face area detected in each video frame. Then, based on the factorized bilinear feature fusion model, we performed a nonlinear fusion of the deep feature representations of the eyes and mouth. Finally, we input a series of fused frame-level features into a long-short-term memory (LSTM) unit to obtain the time information of the features and used the softmax classifier to detect sleepiness. The proposed framework was evaluated with the National Tsing Hua University drowsy driver detection (NTHU-DDD) video dataset. The experimental results showed that this method had better stability and robustness compared with other methods.


2021 ◽  
Vol 11 (12) ◽  
pp. 5685
Author(s):  
Hosam Aljihani ◽  
Fathy Eassa ◽  
Khalid Almarhabi ◽  
Abdullah Algarni ◽  
Abdulaziz Attaallah

With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, developing and improving attack detection techniques are prominent methods to defend against cyberattacks. One of the promising attack detection methods is behaviour-based attack detection methods. Practically, attack detection techniques are widely applied in distributed software systems that utilise network environments. However, there are some other challenges facing attack detection techniques, such as the immutability and reliability of the detection systems. These challenges can be overcome with promising technologies such as blockchain. Blockchain offers a concrete solution for ensuring data integrity against unauthorised modification. Hence, it improves the immutability for detection systems’ data and thus the reliability for the target systems. In this paper, we propose a design for standalone behaviour-based attack detection techniques that utilise blockchain’s functionalities to overcome the above-mentioned challenges. Additionally, we provide a validation experiment to prove our proposal in term of achieving its objectives. We argue that our proposal introduces a novel approach to develop and improve behaviour-based attack detection techniques to become more reliable for distributed software systems.


2020 ◽  
Vol 13 (1) ◽  
pp. 89
Author(s):  
Manuel Carranza-García ◽  
Jesús Torres-Mateo ◽  
Pedro Lara-Benítez ◽  
Jorge García-Gutiérrez

Object detection using remote sensing data is a key task of the perception systems of self-driving vehicles. While many generic deep learning architectures have been proposed for this problem, there is little guidance on their suitability when using them in a particular scenario such as autonomous driving. In this work, we aim to assess the performance of existing 2D detection systems on a multi-class problem (vehicles, pedestrians, and cyclists) with images obtained from the on-board camera sensors of a car. We evaluate several one-stage (RetinaNet, FCOS, and YOLOv3) and two-stage (Faster R-CNN) deep learning meta-architectures under different image resolutions and feature extractors (ResNet, ResNeXt, Res2Net, DarkNet, and MobileNet). These models are trained using transfer learning and compared in terms of both precision and efficiency, with special attention to the real-time requirements of this context. For the experimental study, we use the Waymo Open Dataset, which is the largest existing benchmark. Despite the rising popularity of one-stage detectors, our findings show that two-stage detectors still provide the most robust performance. Faster R-CNN models outperform one-stage detectors in accuracy, being also more reliable in the detection of minority classes. Faster R-CNN Res2Net-101 achieves the best speed/accuracy tradeoff but needs lower resolution images to reach real-time speed. Furthermore, the anchor-free FCOS detector is a slightly faster alternative to RetinaNet, with similar precision and lower memory usage.


2018 ◽  
Vol 7 (2.4) ◽  
pp. 10
Author(s):  
V Mala ◽  
K Meena

Traditional signature based approach fails in detecting advanced malwares like stuxnet, flame, duqu etc. Signature based comparison and correlation are not up to the mark in detecting such attacks. Hence, there is crucial to detect these kinds of attacks as early as possible. In this research, a novel data mining based approach were applied to detect such attacks. The main innovation lies on Misuse signature detection systems based on supervised learning algorithm. In learning phase, labeled examples of network packets systems calls are (gave) provided, on or after which algorithm can learn about the attack which is fast and reliable to known. In order to detect advanced attacks, unsupervised learning methodologies were employed to detect the presence of zero day/ new attacks. The main objective is to review, different intruder detection methods. To study the role of Data Mining techniques used in intruder detection system. Hybrid –classification model is utilized to detect advanced attacks.


2017 ◽  
Vol 2017 (3) ◽  
pp. 63-83
Author(s):  
Mateusz Paszko

Abstract Helicopters play an important role in air-to-ground fire covering and the short-distance air-to-air fights, as well as the anti-tank missions and battlefield force transferring. The detection and survivability of helicopters on a battlefield significantly depends on their infrared emissions level, as well as the methods, equipment and systems used by potential enemy. The automatic detection systems, recognition and identification of flying objects use among other the thermo-detection methods, which rely on detecting the infrared radiation emitted by the tracked object. Furthermore, due to low-altitude and relatively low flight speed, today’s combat assets like missile weapons equipped with infrared guidance systems are one of the most important threats to the helicopters performing combat missions. Especially meaningful in a helicopter aviation is infrared emission by exhaust gases, egressed to the surroundings. Due to high temperature, exhaust gases are a major factor in detectability of a helicopter performing air combat operations. In order to increase the combat effectiveness and survivability of military helicopters, several different types of the infrared suppressor (IRS) have been developed. This paper reviews contemporary developments in this discipline, with particular examples of the infrared signature suppression systems.


Viruses ◽  
2020 ◽  
Vol 12 (9) ◽  
pp. 944 ◽  
Author(s):  
Susanne Meile ◽  
Samuel Kilcher ◽  
Martin J. Loessner ◽  
Matthew Dunne

Fast and reliable detection of bacterial pathogens in clinical samples, contaminated food products, and water supplies can drastically improve clinical outcomes and reduce the socio-economic impact of disease. As natural predators of bacteria, bacteriophages (phages) have evolved to bind their hosts with unparalleled specificity and to rapidly deliver and replicate their viral genome. Not surprisingly, phages and phage-encoded proteins have been used to develop a vast repertoire of diagnostic assays, many of which outperform conventional culture-based and molecular detection methods. While intact phages or phage-encoded affinity proteins can be used to capture bacteria, most phage-inspired detection systems harness viral genome delivery and amplification: to this end, suitable phages are genetically reprogrammed to deliver heterologous reporter genes, whose activity is typically detected through enzymatic substrate conversion to indicate the presence of a viable host cell. Infection with such engineered reporter phages typically leads to a rapid burst of reporter protein production that enables highly sensitive detection. In this review, we highlight recent advances in infection-based detection methods, present guidelines for reporter phage construction, outline technical aspects of reporter phage engineering, and discuss some of the advantages and pitfalls of phage-based pathogen detection. Recent improvements in reporter phage construction and engineering further substantiate the potential of these highly evolved nanomachines as rapid and inexpensive detection systems to replace or complement traditional diagnostic approaches.


Author(s):  
Mingtao Wu ◽  
Young B. Moon

Abstract Cyber-physical manufacturing system is the vision of future manufacturing systems where physical components are fully integrated through various networks and the Internet. The integration enables the access to computation resources that can improve efficiency, sustainability and cost-effectiveness. However, its openness and connectivity also enlarge the attack surface for cyber-attacks and cyber-physical attacks. A critical challenge in defending those attacks is that current intrusion detection methods cannot timely detect cyber-physical attacks. Studies showed that the physical detection provides a higher accuracy and a shorter respond time compared to network-based or host-based intrusion detection systems. Moreover, alert correlation and management methods help reducing the number of alerts and identifying the root cause of the attack. In this paper, the intrusion detection research relevant to cyber-physical manufacturing security is reviewed. The physical detection methods — using side-channel data, including acoustic, image, acceleration, and power consumption data to disclose attacks during the manufacturing process — are analyzed. Finally, the alert correlation methods — that manage the high volume of alerts generated from intrusion detection systems via logical relationships to reduce the data redundancy and false alarms — are reviewed. The study show that the cyber-physical attacks are existing and rising concerns in industry. Also, the increasing efforts in cyber-physical intrusion detection and correlation research can be utilized to secure the future manufacturing systems.


Atmosphere ◽  
2020 ◽  
Vol 11 (11) ◽  
pp. 1241
Author(s):  
Yakhyokhuja Valikhujaev ◽  
Akmalbek Abdusalomov ◽  
Young Im Cho

The technologies underlying fire and smoke detection systems play a crucial role in ensuring and delivering optimal performance in modern surveillance environments. In fact, fire can cause significant damage to lives and properties. Considering that the majority of cities have already installed camera-monitoring systems, this encouraged us to take advantage of the availability of these systems to develop cost-effective vision detection methods. However, this is a complex vision detection task from the perspective of deformations, unusual camera angles and viewpoints, and seasonal changes. To overcome these limitations, we propose a new method based on a deep learning approach, which uses a convolutional neural network that employs dilated convolutions. We evaluated our method by training and testing it on our custom-built dataset, which consists of images of fire and smoke that we collected from the internet and labeled manually. The performance of our method was compared with that of methods based on well-known state-of-the-art architectures. Our experimental results indicate that the classification performance and complexity of our method are superior. In addition, our method is designed to be well generalized for unseen data, which offers effective generalization and reduces the number of false alarms.


Sign in / Sign up

Export Citation Format

Share Document