Person Identification by Mobile Robots in Indoor Environments

合集下载

支持人脸识别的英语作文

支持人脸识别的英语作文

支持人脸识别的英语作文英文回答:In our modern, tech-savvy world, face recognition technology has emerged as a transformative tool with immense potential. With its ability to accurately identify individuals, it promises to revolutionize various aspects of our lives. As someone who firmly believes in its benefits, I enthusiastically endorse the adoption of face recognition technology.From enhancing security measures to streamlining daily tasks, face recognition offers a plethora of advantages. In a world marred by threats and vulnerabilities, it plays a crucial role in safeguarding our physical and digital spaces. The technology enables swift and accurate identification of individuals, ensuring only authorized personnel gain access to sensitive areas or online platforms.Beyond security applications, face recognition also enhances convenience. Imagine walking into a store and having the system identify you, providing personalized recommendations based on your preferences. It eliminates the need for tedious password inputs or remembering multiple identification cards. In the healthcare sector, face recognition can expedite patient registration and improve treatment accuracy by accessing medical records instantly.Moreover, face recognition has the potential to foster inclusivity and bridge societal divides. By eliminating language barriers and accommodating individuals with disabilities, it ensures everyone has equal access to essential services. It empowers the visually impaired to navigate public spaces confidently and enables non-native speakers to communicate seamlessly.Additionally, face recognition technology can contribute to scientific research and innovation. It aids in identifying patterns and correlations within large datasets,leading to groundbreaking discoveries in fields such as medicine and genetics. By recognizing facial expressions and emotions, it can assist in understanding human behavior and developing therapies for mental health disorders.Of course, concerns regarding privacy and potential misuse must be addressed. However, with robust ethical frameworks and stringent regulations, we can harness the benefits of face recognition technology while safeguarding individual rights. It is essential to ensure responsible implementation and prevent unauthorized access to sensitive information.In conclusion, face recognition technology holds immense promise for transforming our lives. Its ability to enhance security, streamline tasks, foster inclusivity, and contribute to research makes it a valuable tool in our technological arsenal. By embracing its potential while addressing ethical considerations, we can unlock the transformative power of face recognition and shape a brighter future for all.中文回答:在我们这个科技发达的现代社会,人脸识别技术已经成为一种极具潜力的变革性工具。

2022年辽宁省部分中学高二下学期期末英语试题

2022年辽宁省部分中学高二下学期期末英语试题

省部分中学2023届新高三摸底考试暨高二年级期末质量检测英语试题考生注意:考试时间120分钟,试卷满分150分第二部分阅读(共两节,满分50分)第一节(共15小题;每小题2.5分,满分37.5分)阅读下列短文,从每题所给的A、B、C、D四个选项中选出最佳选项。

ABelow is a list of the most worthwhile writing competitions available.TALF Flash Fiction CompetitionThe theme of this contest from Theme Arts and Literature Festival is "The Prime of Lile" in recognition of the l5th anniversary of the death of Muriel Spark. You can deal with this theme in any genre (体裁) and in any way you choose, although you are limited to 500 words.Prizes : £200, £100, £50.Entry Fee : £8.Wild Nature Poetry Award 2022Here we have a new contest from Indigo Dreams Publishing. It is for poems of up to 48 lines on the subject of cruel sports, wildlife in general, the natural world, or the environment.Prizes: £200, £100, £75.Entry Fee: £5.SPM Poetry Book CompetitionThis international contest from Sentinel Poetry Movement is for full-length poetry collections on any theme and in any style. To enter, you submit up to 20 pages initially. If shortlisted (入围), you have to submit the full collection before December 31 .Prizes: £500, £250, £100.Entry Fee: £25.Poetry Space Competition 2022Here's a new contest from Poetry Space, an online platform for modern poetry from around the world, which requires poems of up to 40 lines on any subject. You have to be over 16 to enter. The judge is Rosie Jackson, a poet and creative writing tutor.Prizes: £300, £200, £100.Entry Fee: £5.1. What is special about TALF Flash Fiction Competition?A. It requires no entry fee.B. It is about a certain theme.C. It has the longest history.D. It was started by a famous person.2. Which contest requests part of the entry first?A. SPM Poetry Book Competition.B. Poetry Space Competition 2022.C. Wild Nature Poetry Award 2022.D. TALF Flash Fiction Competition.3. What can we know about the contest from Poetry Space?A. It is a yearly contest.B. Anyone can take part.C. It has more than one limit.D. In offers the most prize money.【答案】1. B 2. A 3. C【解析】【详解】这是一篇应用文,主要介绍了几个值得参加的写作竞赛。

关于我对考试的看法的英语作文(精选21篇)

关于我对考试的看法的英语作文(精选21篇)

我对考试的看法的英语作文关于我对考试的看法的英语作文(精选21篇)在平平淡淡的日常中,大家对作文都再熟悉不过了吧,作文是经过人的思想考虑和语言组织,通过文字来表达一个主题意义的记叙方法。

你写作文时总是无从下笔?下面是小编精心整理的关于我对考试的看法的英语作文,欢迎阅读与收藏。

我对考试的看法的英语作文篇1Since school comes into being, the test standard has been used to appraise performance of students. So far it is still being used, which may suggest that actually there are some advantages in it. However, it is also highly possible that the test standard is a not ideal way to find out what students have learned and what they haven't. Most school is still using it just because there is no better method to replace it.In my opinion, the following three points are the critical flaws in the test standard.One of the most harmful effects on the test method is that it will force us to study just for passing tests, not for acquiring knowledge especially in China. Obviously the final object of education is XXX us intellective by learning more knowledge. While the test is only a way to examine the level of students' studies, it has been deteriorated to a sifter deciding the fate of students. Why can it be called a terrible sifter? Now in the tests, which decide who can enter a higher school, thousands of poor students, who want a splendid future, must prepare for the tests by finishing a great deal of practices. Those practice tests are heavy-laden to them. So in this case, how can they be expected to study to obtain knowledge? To them that are enough if they can reach the level which tests need. In the end what our nationwill get, genuine persons with ability or just test robots?Secondly, tests will bring the examinees great pressure, which can affect their lives. A typical example of this is that most young students have worn glasses even though some of them are still children. For preparing for tests, they must spend a lot of time on doing their homework so that their eyesight becomes worse and worse. And the more time they spend on those, the less time they have for playing and relaxing. Consequently, there is a bad influence on their health.Thirdly, in fact, test system itself can not veraciously estimate who is better than others because there are many factors impacting the results of test. For instance, someone cheated in test so that his score would be higher than others. Or someone who was too nervous to perform well fell in the test.Only in spare time and no pressure of tests existent, students can study simply for the fun, for obtaining knowledge and for the things that they are really interested in. But now the test system is the only way to select which one is better, who can reach better school and who can get good job. Then what we can do is to improve the test system or hope that something better will be invented and replace the test system.我对考试的看法的英语作文篇2In my opinion, examinations are one of the important activities in school life. I have gone through all sorts of examinations since my primary school. I have tasted the flavor of happiness and sadness.Before examinations I always have a hard time and don't know what to do.During examinations I feel nervous and sometimes my mind bees blank Only after examinations does the world seem to be bright again and am I brimming with vigor. Weoften plain that our teachers make trouble for us on purpose. But it is not true.The fact is that examinations are just a way to-help us do better in our study.我对考试的看法的英语作文篇3for going on with my further studies,i took the entrance examination in a senior middle school last week.i still remember there were more than three hundred candidates taking part in this examination. for the first day,in the morning,chinese was easy. we were required to write a composition of 250 words on "my home life",and give definitions and illustrations to twenty phrases. in the afterno on,we took an english examination. there were dictation,sentence formation,and analysis for oral english. in the oral examination,i was questioned about my home life,my experience in the junior middle school and my future prospects.on the second day,we were examined on history and geography in the morning and physics and chemistry in the afternoon.为了进一步学习,我上周在一所高中参加了入学考试。

关于人脸识别的英语阅读理解

关于人脸识别的英语阅读理解

关于人脸识别的英语阅读理解以下是一篇关于人脸识别的英语阅读理解文章,以及相应的答案解析。

阅读材料:Face recognition technology is a biometric met hod that analyzes and compares facial features to i dentify individuals. It has gained significant attentio n in recent years due to its accuracy and convenie nce. This technology is widely used in security syst ems, mobile phones, and even some social media platforms.One of the most well-known applications of fa ce recognition is in law enforcement. Police depart ments use this technology to identify suspects fro m surveillance footage and to solve crimes. For ins tance, a city in China recently implemented a face recognition system at train stations to catch fugitiv es. The system has successfully apprehended over a hundred suspects in just one month.In addition to law enforcement, face recognitio n technology is also used in everyday life. Many smartphones now come with facial recognition soft ware, allowing users to unlock their phones simply by looking at them. This feature adds an extra lay er of security to the device.However, face recognition technology is not wi thout its challenges. Privacy concerns have been ra ised, as people worry about their personal informa tion being stored and used without their consent. There are also concerns about the accuracy of the technology, as it can sometimes mistake one perso n for another.Despite these challenges, face recognition tech nology continues to improve and expand its applic ations. It is now being used in airports, hotels, and even some retail stores. As the technology becom es more advanced, it is likely to play an even grea ter role in our lives.问题与答案解析:1. What is face recognition technology?Answer: Face recognition technology is a biom etric method that analyzes and compares facial fea tures to identify individuals.2. How is face recognition technology used in law enforcement?Answer: Police departments use face recognitio n technology to identify suspects from surveillance footage and to solve crimes.3. What are some everyday applications of face recognition technology?Answer: Everyday applications of face recogniti on technology include using it to unlock smartpho nes and improve security.4. What are some concerns about face recogni tion technology?Answer: Privacy concerns and accuracy issues a re two main concerns about face recognition techn ology.5. Despite the challenges, what is the future of face recognition technology likely to be?Answer: The future of face recognition technol ogy is expected to see continued improvement an d expansion of its applications.通过阅读这篇文章,读者可以了解到人脸识别技术的定义、应用领域、面临的挑战以及未来的发展趋势。

人脸识别的便捷性与安全性的英语作文

人脸识别的便捷性与安全性的英语作文

人脸识别的便捷性与安全性的英语作文全文共3篇示例,供读者参考篇1Title: The Convenience and Security of Facial Recognition TechnologyIn recent years, facial recognition technology has gained popularity in various industries due to its convenience and security features. This technology uses biometric measurements to analyze and identify a person's facial features for authentication purposes. While some may argue that facial recognition raises privacy concerns, the benefits it offers in terms of convenience and security cannot be ignored.One of the main advantages of facial recognition technology is its convenience. With the use of facial recognition, people can unlock their smartphones, access buildings, make payments, and even board flights with just a glance. This eliminates the need for remembering and typing in passwords, codes, or carrying physical keys or identification cards. This makes everyday tasks faster, easier, and more seamless for individuals.Moreover, facial recognition technology enhances security measures in various sectors. For example, in airports and public spaces, facial recognition can help identify potential threats by matching faces against a database of known criminals or suspects. This can help law enforcement agencies prevent crimes and ensure public safety. In addition, facial recognition can be used to verify the identity of individuals during online transactions, reducing the risk of identity theft and fraud.Furthermore, facial recognition technology can improve the efficiency of customer service and personalization. By analyzing facial expressions and emotions, businesses can tailor their products and services to meet customer needs and preferences. This can lead to a more personalized and engaging customer experience, ultimately increasing customer satisfaction and loyalty.However, despite its numerous benefits, facial recognition technology also raises concerns about privacy and data security. Some worry that the technology could be misused to track individuals without their consent or create a surveillance state. Additionally, there are concerns about the accuracy and bias of facial recognition algorithms, which may lead to false identifications and discrimination.To address these concerns, regulations and guidelines should be put in place to govern the use of facial recognition technology. Companies and organizations that utilize facial recognition should be transparent about how data is collected, stored, and used. Individuals should have the right to opt-out of facial recognition systems if they choose to do so. Furthermore, efforts should be made to improve the accuracy and fairness of facial recognition algorithms to prevent misidentifications and biases.In conclusion, facial recognition technology offers a wide range of benefits in terms of convenience and security. By balancing these benefits with privacy concerns and data security issues, we can harness the full potential of facial recognition technology while safeguarding individual rights and freedoms. With proper regulations and guidelines in place, facial recognition can continue to revolutionize various industries and enhance our daily lives.篇2Title: The Convenience and Security of Facial RecognitionIntroductionFacial recognition technology has become increasingly popular in recent years, with its applications ranging from unlocking smartphones to monitoring public spaces. This technology offers both convenience and security benefits, but also raises concerns about privacy and data protection. In this essay, we will explore the various ways in which facial recognition enhances our daily lives while also discussing the potential risks and challenges it poses.Convenience of Facial RecognitionOne of the most significant advantages of facial recognition technology is its convenience. It allows for seamless and secure authentication, eliminating the need for passwords or PINs. For example, many smartphones now offer facial recognition as a secure way to unlock the device and access apps and services. This eliminates the hassle of remembering complex passwords and the risk of unauthorized access.Facial recognition also offers convenience in other areas, such as banking and retail. Some banks and financial institutions use facial recognition to verify a customer's identity when conducting transactions or accessing accounts online. This provides an added layer of security and streamlines theauthentication process, making it faster and more efficient for users.In the retail sector, facial recognition technology is being used to personalize shopping experiences for customers. By analyzing facial features and expressions, retailers can tailor their offerings to match the preferences and needs of individual customers. This not only enhances customer satisfaction but also boosts sales and loyalty.Security of Facial RecognitionIn addition to its convenience, facial recognition technology offers enhanced security features. It can detect and prevent unauthorized access to secure areas or sensitive information by confirming the identity of individuals through facial scans. This is especially useful in high-security environments, such as government facilities, airports, and border crossings.Facial recognition technology also helps law enforcement agencies in identifying and apprehending criminals. By comparing facial images captured from surveillance cameras or social media against a database of known offenders, police can quickly track down suspects and prevent crimes. This has proven to be an effective tool in solving cases and ensuring public safety.Furthermore, facial recognition technology can be used to enhance cybersecurity measures by detecting and preventing fraudulent activities. For example, financial institutions can use facial recognition to verify a customer's identity when making online transactions, reducing the risk of identity theft or account hacking.Challenges and ConcernsDespite its many benefits, facial recognition technology also raises concerns about privacy and data security. Critics argue that the widespread use of facial recognition poses a threat to individual privacy, as it can be used to track and monitor people without their consent. There are also concerns about the accuracy and reliability of facial recognition algorithms, as they may produce false matches or misidentify individuals.Another challenge is the potential for misuse of facial recognition technology by governments and corporations. Some fear that facial recognition could be used for mass surveillance or social control, infringing on civil liberties and human rights. There are also concerns about the collection and storage of facial data, as it raises questions about data protection and cybersecurity.ConclusionIn conclusion, facial recognition technology offers a range of benefits in terms of convenience and security, making our daily lives easier and more secure. However, it also raises important ethical and social issues that need to be addressed to ensure the responsible and ethical use of this technology. As we continue to innovate and develop facial recognition technology, it is essential to strike a balance between convenience, security, and privacy to create a safe and trustworthy environment for all.篇3Title: The Convenience and Security of Facial Recognition TechnologyIntroductionFacial recognition technology has become increasingly prevalent in our daily lives, offering both convenience and security in a variety of applications. This essay will discuss the benefits and implications of facial recognition technology, focusing on its convenience and security features.ConvenienceOne of the primary advantages of facial recognition technology is its convenience. By using facial recognition software, individuals can unlock their smartphones, access bankaccounts, and even enter buildings without the need for traditional forms of identification. This streamlined process saves time and eliminates the need to carry around multiple forms of identification, making everyday tasks more efficient and seamless.In addition, facial recognition technology can enhance customer experiences by personalizing interactions. Retailers can use facial recognition software to identify loyal customers and offer them personalized recommendations and promotions. This not only improves customer satisfaction but also increases sales and customer loyalty.SecurityBeyond convenience, facial recognition technology also offers enhanced security features. By analyzing unique facial features such as the shape of the eyes, nose, and mouth, facial recognition software can accurately verify an individual's identity. This biometric authentication process is difficult to replicate or deceive, making it a highly secure form of identification.Facial recognition technology is also being used in security applications to enhance public safety. Law enforcement agencies can use facial recognition software to identify suspects in criminal investigations and track individuals in real-time. Thistechnology has proven to be an effective tool in preventing and solving crimes, making communities safer for residents.Privacy ConcernsWhile facial recognition technology offers many benefits, it also raises concerns about privacy and surveillance. Critics argue that widespread use of facial recognition software could infringe on individuals' privacy rights and lead to potential misuse of personal data. Additionally, there are concerns about the accuracy of facial recognition algorithms, particularly when it comes to identifying individuals of different racial or ethnic backgrounds.To address these concerns, policymakers and technology companies must work together to establish clear guidelines for the ethical use of facial recognition technology. This may include implementing strict regulations on data collection and storage, ensuring transparency in how facial recognition software is used, and providing individuals with the option to opt-out of facial recognition technology if they choose.ConclusionFacial recognition technology offers a range of benefits in terms of convenience and security. While there are validconcerns about privacy and surveillance, these issues can be addressed through thoughtful regulation and oversight. By striking a balance between convenience, security, and privacy, facial recognition technology can continue to enhance our lives in a variety of applications.。

基于人体图像生成的姿态无关人物识别

基于人体图像生成的姿态无关人物识别

收稿日期:2024-01-10基金项目:国家重点研发计划(2022YFC2405600);国家自然科学基金(62276139,U2001211)引用格式:刘云,夏贵羽,孙玉宝,等.基于人体图像生成的姿态无关人物识别[J].测控技术,2024,43(4):61-67.LIUY,XIAGY,SUNYB,etal.Pose IndependentPersonIdentificationBasedonHumanBodyImageGeneration[J].Measure ment&ControlTechnology,2024,43(4):61-67.基于人体图像生成的姿态无关人物识别刘 云1,2,夏贵羽1,2,孙玉宝3,刘 佳1,2(1.南京信息工程大学自动化学院,江苏南京 210044;2.江苏省大气环境与装备技术协同创新中心,江苏南京 210044;3.南京信息工程大学计算机学院,江苏南京 210044)摘要:人物识别技术能够使机器人具备对用户身份识别的能力,从而有效提高机器人的智能交互水平。

人物识别面临的主要挑战之一是姿态的变化对人物身份特征提取的影响。

针对该问题,提出基于人体图像生成的姿态无关人物识别方法,通过生成与库中目标人物相同姿态的人体图像,消除姿态变化对人物外观特征造成的影响。

该方法首先利用人体分割图将人体区域与背景分离,尽量降低复杂多变的背景对人物外观特征的干扰;然后在目标姿态的引导下生成与目标图像姿态一致的人物图像;最后设计了一个特征融合模块将源图像和生成图像的身份特征进行融合,提取姿态无关的鲁棒身份特征用于人物识别。

此外,为更好地区分不同的人物,在训练中生成相同姿态的负样本,对约束模型学习更为细粒的可鉴别性身份特征。

人物识别和人体图像生成的实验结果验证了该方法的有效性。

关键词:人物识别;人体图像生成;特征融合;姿态无关中图分类号:TP391 文献标志码:A 文章编号:1000-8829(2024)04-0061-07doi:10.19708/j.ckjs.2024.04.009Pose IndependentPersonIdentificationBasedonHumanBodyImageGenerationLIUYun1牞2牞XIAGuiyu1牞2 牞SUNYubao3牞LIUJia1牞2牗1.SchoolofAutomation牞NanjingUniversityofInformationScience&Technology牞Nanjing210044牞China牷2.JiangsuProvinceCollaborativeInnovationCenterofAtmosphericEnvironmentandEquipmentTechnology牞Nanjing210044牞China牷3.SchoolofComputerScience牞NanjingUniversityofInformationScienceandTechnology牞Nanjing210044牞China牘Abstract牶Personidentificationtechnologyenablestherobotstohavetheabilitytorecognizetheidentitiesofusers牞whicheffectivelyimprovestheintelligentinteractionlevelofrobots.Oneofthemainchallengesofpersonidentificationistheinfluenceoftheposechangesonpersonfeatureextraction.Inordertosolvethisproblem牞apose independentpersonidentificationmethodbasedonhumonbodyimagegenerationisproposed牞whichaimstoeliminatetheinfluenceofposechangeonthepersonappearancefeaturesbygeneratingthehumanbodyimageswiththesameposesasthetargetpersonsinthedataset.Firstly牞themethodusesthehumanbodyseg mentationmaptoseparatethehumanbodyregionsfromthebackgroundtominimizetheinterferenceofthecomplexandchangeablebackgroundonthehumanbodyappearancefeatures.Then牞ahumanbodyimagewiththesameposeasthetargetimageisgeneratedundertheguidanceofthetargetpose.Finally牞afeaturefusionmoduleisdesignedtofusetheidentityfeaturesofthesourceandgeneratedimagetoextractpose independentrobustidentityfeaturesforpersonidentification.Inaddition牞tobetterdistinguishdifferentpersons牞negativesampleswiththesameposearegeneratedinthetrainingprocesstoconstrainthemodeltolearnmorefinegraineddiscriminativeidentityfeatures.Experimentalresultsonpersonidentificationandhumanbodyimagegenerationdemonstratetheeffectivenessofthemethod.Keywords牶personidentification牷humanbodyimagegeneration牷featurefusion牷pose independent对场景中的用户身份进行识别和确认,能够有效提高机器人交互的智能水平,场景识别如图1所示。

人形机器人中英文对照外文翻译文献

中英文对照翻译最小化传感级别不确定性联合策略的机械手控制摘要:人形机器人的应用应该要求机器人的行为和举止表现得象人。

下面的决定和控制自己在很大程度上的不确定性并存在于获取信息感觉器官的非结构化动态环境中的软件计算方法人一样能想得到。

在机器人领域,关键问题之一是在感官数据中提取有用的知识,然后对信息以及感觉的不确定性划分为各个层次。

本文提出了一种基于广义融合杂交分类(人工神经网络的力量,论坛渔业局)已制定和申请验证的生成合成数据观测模型,以及从实际硬件机器人。

选择这个融合,主要的目标是根据内部(联合传感器)和外部( Vision 摄像头)感觉信息最大限度地减少不确定性机器人操纵的任务。

目前已被广泛有效的一种方法论就是研究专门配置5个自由度的实验室机器人和模型模拟视觉控制的机械手。

在最近调查的主要不确定性的处理方法包括加权参数选择(几何融合),并指出经过训练在标准操纵机器人控制器的设计的神经网络是无法使用的。

这些方法在混合配置,大大减少了更快和更精确不同级别的机械手控制的不确定性,这中方法已经通过了严格的模拟仿真和试验。

关键词:传感器融合,频分双工,游离脂肪酸,人工神经网络,软计算,机械手,可重复性,准确性,协方差矩阵,不确定性,不确定性椭球。

1 引言各种各样的机器人的应用(工业,军事,科学,医药,社会福利,家庭和娱乐)已涌现了越来越多产品,它们操作范围大并呢那个在非结构化环境中运行 [ 3,12,15]。

在大多数情况下,如何认识环境正在发生变化且每个瞬间最优控制机器人的动作是至关重要的。

移动机器人也基本上都有定位和操作非常大的非结构化的动态环境和处理重大的不确定性的能力[ 1,9,19 ]。

每当机器人操作在随意性自然环境时,在给定的工作将做完的条件下总是存在着某种程度的不确定性。

这些条件可能,有时不同当给定的操作正在执行的时候。

导致这种不确定性的主要的原因是来自机器人的运动参数和各种确定任务信息的差异所引起的。

人脸识别简短英语作文

人脸识别简短英语作文Title: Facial Recognition Technology Revolutionizing Security and Convenience。

Introduction:Facial recognition technology has emerged as a groundbreaking innovation that has revolutionized various aspects of our lives. This cutting-edge technology utilizes biometric data to identify individuals based on theirunique facial features. With its ability to enhancesecurity measures and streamline processes, facial recognition has become increasingly popular in recent years.Body:1. Enhanced Security Measures:Facial recognition technology has significantlyimproved security measures in various sectors. For instance,it is extensively used in law enforcement agencies to identify criminals and suspects. By comparing facial images captured from surveillance cameras with a comprehensive database, authorities can quickly identify and apprehend potential threats. This has proven to be a valuable tool in preventing crime and maintaining public safety.2. Convenient Access Control:Facial recognition technology has simplified access control systems, making them more convenient and efficient. Traditional methods such as key cards or passwords can easily be lost or stolen, compromising security. However, with facial recognition, individuals can gain access to secure areas simply by having their face scanned. This eliminates the need for physical tokens and enhances security by ensuring that only authorized personnel can enter restricted areas.3. Improved User Experience:Facial recognition technology has significantlyimproved user experiences in various industries. For example, in the travel sector, airports have adopted facial recognition systems to expedite the check-in and boarding processes. Passengers can simply have their faces scanned, eliminating the need for physical documents and reducing waiting times. This not only enhances convenience but also improves overall customer satisfaction.4. Efficient Identification and Verification:Facial recognition technology has made identification and verification processes more efficient and accurate. In sectors such as banking and finance, this technology is used for identity verification during customer onboarding. By comparing a person's facial image with their official identification documents, banks can ensure that the person opening an account is indeed the rightful owner. This helps prevent identity theft and fraudulent activities, enhancing the overall security of financial transactions.5. Ethical and Privacy Concerns:While facial recognition technology offers numerous benefits, it also raises ethical and privacy concerns. The collection and storage of biometric data raise questions about the potential misuse of personal information. Additionally, there is a risk of false positives or false negatives, leading to wrongful identification or exclusion. Striking a balance between security and privacy is crucial to ensure the responsible and ethical use of facial recognition technology.Conclusion:Facial recognition technology has transformed security measures and improved convenience in various sectors. Its ability to enhance identification processes, simplify access control, and improve user experiences has made it an invaluable tool in today's world. However, it is essential to address ethical and privacy concerns to ensure the responsible and ethical use of this technology. With continued advancements and careful considerations, facial recognition technology will continue to shape the future, making our lives safer and more convenient.。

计算机专业英语单词中英文对照

application software应用软件basic application基本应用软件communication device通信设备compact disc(CD)光盘computer competency计算机能力connectivity连通性data数据database file数据库文件desktop computer台式计算机device driver磁盘驱动程序digital versatile disc(DVD)数字多用途光盘digital video disc(DVD)数字多用途光盘document file文档文件end user终端用户floppy disk软盘handheld computer手持计算机hard disk硬盘hardware硬件high definition高清information信息information system信息系统information technology信息技术input device输入设备Internet因特网keyboard键盘mainframe computer大型机memory内存microcomputer微型机microprocessor微处理器midrange computer中型机minicomputer小型计算机modem调制解调器monitor监视器mouse鼠标network网络notebook computer笔记本电脑operating system操作系统optical disk光盘output device输出设备palm computer掌上电脑peoplepersonal digital assistant(PDA)个人数字助理presentation file演示文稿primary storage主存printer打印机procedure规程program程序random access memory随机存储器secondary storage device辅助存储器software软件specialized application专门应用软件supercomputer巨型机system software系统软件system unit系统单元tablet PC平板电脑utility实用程序wireless revolution无线革命worksheet file工作表address 地址Advanced Research Project Agency Network (ARPANET) 阿帕网applets小程序attachment附件auction house site拍卖行网站browser浏览器business-to-business (B2B)企业对企业电子商务business-to-consumer (B2C) 企业对消费者电子商务cable电缆carder信用卡持有者Center for European Nuclear Research(CERN)欧洲核研究中心computer virus计算机病毒consumer-to-consumer(C2C)消费者对消费者电子商务dial-up拨号digital cash数字货币directory search目录搜索domain name域名downloading下载DSL数字用户线路e-commerce电子商务e-learning电子学习,数字化学习electronic commerce电子商务e-mail电子邮件file transfer protocol (FTP)文件传输协议electronic mail电子邮件filter过滤器friend朋友header标题hit记录hyperlink超链接Hypertext Markup Language (HTML)超文本标识语言instant messaging (IM)即时通信Internet因特网Internet security suite网络安全套件Internet service provider (ISP)网络服务提供商Javakeyword search关键词搜索link链接location定位message讯息,信息metasearch engine元搜索引擎national service provider国家级服务提供商online在线online banking网上银行online shopping网上购物online stock trading网上股票交易person-to-person auction site人与人的拍卖网站plug-in插件protocol协议search engine搜索引擎search service搜索服务器signature line签名档social networking社会网络spam垃圾邮件spam blocker垃圾邮件拦截器specialized search engine专门搜索引擎spider蜘蛛程序subject主题surf上网top-level domain (TLD)顶级域名uniform resource locator (URL)统一资源定位器universal instant messenger普遍即时通信器uploading上传Web网络Web auction网上拍卖Web-based application网络基础应用Web-based services网络基础服务Webmaster网络管理员Web page网页Web utility网络工具wireless modem无线调制解调器wireless service provider无线服务提供商analytical graph分析图表application software应用软件Autocontent Wizard内容提示向导basic applications基础应用软件bulleted list项目符号列表business suite商业套装软件button按钮cell单元格character effect字符效果chart图表column列computer trainer计算机培训员contextual tab上下文关联标签database数据库database management system (DBMS)数据库管理系统database manager数据库管理员design template设计模板dialog box对话框document文档editing编辑field字段find and replace查找和替换font字体font size字号form样式format格式formula公式function函数galleries图库grammar checker语法检查器graphical user interface (GUI)图形用户界面home software家庭软件home suite家庭套装软件icons图标integrated package集成软件包label标签master slide母版menu菜单menu bar菜单栏numbered list编号列表numeric entry数值型输入personal software个人软件personal suite个人套装软件pointer指针presentation graphic图形演示文稿productivity suite生产套装软件query查询range范围recalculation重新计算record记录relational database关系数据库report报表ribbons功能区、格式栏row行sheet工作表slide幻灯片software suite软件套装sort排序specialized applications专用应用程序specialized suite专用套装软件speech recognition语音识别spelling checker拼写检查器spreadsheet电子表格system software系统软件table表格text entry文本输入thesaurus [θisɔ:rəs]分类词汇集toolbar工具栏user interface用户界面utility suite实用套装软件what-if analysis假设分析window窗口word processor文字处理软件word wrap自动换行workbook file工作簿worksheet工作表animation动画artificial intelligence (AI)人工智能artificial reality人工现实audio editing software音频编辑软件bitmap image位图blog博客button按钮clip art剪贴画desktop publisher桌面发布desktop publishing program桌面印刷系统软件drawing program绘图程序expert systems专家系统Flash动画fuzzy logic模糊逻辑graphical map框图graphics suite集成图HTML editors HTML编辑器illustration program绘图程序image editors图像编辑器image gallery图库immersive experience沉浸式体验industrial robots工业机器人interactivity交互性knowledge bases知识库knowledge-based system知识库系统link链接mobile robot移动式遥控装置morphing渐变multimedia多媒体multimedia authoring programs多媒体编辑程序page layout program页面布局程序perception systems robot感知系统机器人photo editors图像编辑器pixel[piksəl]像素raster image光栅图像robot机器人robotics机器人学stock photographs照片库story board故事板,节目顺序单vector[vektə]矢量vector illustration矢量图vector image矢量图像video editing software视频编辑软件virtual environments虚拟环境virtual reality虚拟现实virtual reality modeling language (VRML)虚拟现实建模语言virtual reality wall虚拟现实墙VR虚拟现实Web authoring网络编程Web authoring program网络编辑程序Web log网络日志Web page editor网页编辑器Add Printer Wizard添加打印机向导antivirus program反病毒程序Backup备份backup program备份程序Boot Campbooting启动、引导cold boot冷启动computer support specialist计算机支持专家Dashboard Widgets仪表盘desktop桌面desktop operating system桌面操作系统device driver设备驱动程序diagnostic program诊断程序dialog box对话框Disk Cleanup磁盘清理Disk Defragmenter磁盘碎片整理器driver驱动器embedded operating systems嵌入式操作系统file文件file compression program文件压缩程序folder文件夹fragmented碎片化graphical user interface (GUI)图形用户界面Help帮助icon图标language translator语言编译器Leopard[lepəd]雪豹操作系统LinuxMac OS Mac操作系统Mac OS X menu菜单multitasking多任务处理network operating systems(NOS)网络操作系统network server网络服务器One Button Checkup一键修复operating system操作系统platform平台pointer 指针sectors[sektə]扇区software environment软件环境Spotlight热点stand-alone operating system独立操作系统system software系统软件Tiger老虎操作系统tracks磁道troubleshooting program故障检修程序uninstall program卸载程序UNIXuser interface用户界面utility实用程序utility suite实用套装软件virus[vaiərəs]病毒warm boot热启动window窗口Windows视窗操作系统Windows Update Windows更新Windows VistaWindows XPAC adapter交流适配器accelerated graphics port(AGP)图形加速端口analog 模拟arithmetic-logic unit(ALU)算术逻辑单元arithmetic operation算术运算SCII美国信息交换标准码binary coding scheme二进制编码制bit位bus总线bus line总线线路bus width总线线宽byte字节cable电缆cache memory高速缓存carrier package 封装物central processing unit (CPU)中央处理器chip芯片clock speed时钟速度complementary metal-oxide semiconductor互补金属氧化物半导体computer technician计算机工程师control unit控制单元coprocessor协处理器desktop system unit桌面系统单元digital数字的dual-core chips双核芯片EBCDIC扩展二进制编码的十进制交换码expansion bus扩展总线expansion card扩展卡expansion slot扩展槽FireWire port火线接口flash memory闪存graphics card图形适配卡graphics coprocessor图形协处理器handheld computer system unit 手持计算机系统单元industry standard architecture(ISA)工业标准结构Infrared Data Association(IrDA) 红外数据协会integrated circuit集成电路laptop computer膝式计算机microprocessor微处理器motherboard主板musical instrument digital interface(MIDI)乐器数字接口network adapter card网络适配卡network interface card(NIC)网络接口卡notebook system unit笔记本parallel ports并行端口parallel processing并行处理PC card个人计算机插卡PCI Express(PCIe)peripheral component interconnect (PCI)外围部件互联personal digital assistant (PDA) 个人数字助理active-matrix monitor有源矩阵显示器bar code条形码bar code reader条形码阅读器bar code scanner条形码扫描仪cathode-ray tube monitor (CRT)阴极射线管显示器clarity清晰度combination key组合键cordless mouse无线鼠标data projector数据投影仪digital camera数码照相机digital media player数字媒体播放器digital music player数码音乐播放器digital video camera数码影像摄录机display screen显示屏dot-matrix printer点阵式打印机dot pitch点距dots-per-inch (dpi)点/每英寸dual-scan monitor双向扫描显示器dumb terminal非智能终端e-book电子图书ergonomic keyboard人体工程学键盘fax machine传真机flat-panel monitor平面显示器flatbed scanner平板扫描仪flexible keyboard软键盘handwriting recognition software手写体识别软件headphones耳机high-definition television (HDTV)高清电视ink-jet printer喷墨打印机intelligent terminal智能终端internet telephone网络电话internet telephony网络电话IP telephony IP电话joystick游戏杆keyboard键盘laser printer激光打印机light pen光笔liquid crystal display (LCD)液晶显示器magnetic card reader磁卡阅读器magnetic-ink character recognition (MICR)磁性墨水字符识别mechanical mouse机械鼠标monitor显示器mouse鼠标mouse pointer鼠标指针multifunction device (MFD)多功能设备network terminal网络终端numeric keypad数字小键盘optical-character recognition (OCR)光学字符识别optical-mark recognition (OMR)光学标记识别optical mouse光电鼠标optical scanner光电扫描仪passive-matrix monitor无源矩阵显示器PDA keyboard PDA键盘personal laser printer个人激光打印机photo printer照片打印机picture elements 有效像素pixel像素pixel pitch像素间距platform scanner平板扫描仪plotter绘图仪pointing stick触控点portable printer便携式打印机portable scanner便携式扫描仪printer打印机radio frequency card reader (RFID)射频卡阅读器radio frequency identification射频识别refresh rate刷新率resolution分辨率roller ball滚动球shared laser printer共享激光打印机speakers扬声器stylus[stailəs]输入笔technical writer技术文档编写员telephony[tilefəni]电话学terminal终端thermal printer[θə:məl]热敏打印机thin client瘦客户端thin film transistor monitor薄膜晶体管显示器toggle key切换键touch pad触控板touch screen触摸屏trackball轨迹球traditional keyboard传统键盘Universal Product Code (UPC)统一产品编码voice recognition system (VoIP)语音识别系统Voice over IP IP语音wand reader条形码阅读器WebCam摄像头wheel button滚动键wireless keyboard无线键盘wireless mouse无线鼠标access speed存取速度Blu-Ray(BD)蓝光capacity容量CD (compact disc)光盘CD-R (CD-recordable)可录式CDCD-ROM (compact disc-read only memory)只读光盘CD-ROM jukebox点唱机CD-RW (compact disc rewritable)可重写CD cylinder[silində]柱面density密度direct access直接存取disk caching磁盘缓存DVD(digital versatile disc or digital video disc)DVD player DVD播放器DVD-R(DVD recordable)可录式DVD DVD+R(DVD recordable)可录式DVDDVD-RAM(DVD random-access memory) DVD随机存取器DVD-ROM(DVD random-read-only memory) DVD只读存储器DVD-ROM jukebox DVD-RW (DVD rewritable)可重写DVD DVD+RW (DVD rewritable)可重写DVDenterprise storage system企业存储系统erasable optical disk可擦光盘file compression文件压缩file decompression文件解压缩file server文件服务器flash memory card闪存卡floppy disk软盘floppy disk cartridge软盘盒floppy disk drive (FDD)软磁盘驱动器hard disk硬盘hard-disk cartridge硬盘盒hard-disk pack硬盘组HD DVD(high-definition DVD)高清DVD head crash磁头碰撞hi def(high definition)高清high-capacity disk高容量磁盘internal hard disk内置硬盘Internet hard drive网络硬盘驱动器label标签land(凸)平地magnetic tape磁带magnetic tape reel磁带盒magnetic tape streamer磁带条mass storage大容量存储器mass storage driver大容量存储器驱动media多媒体optical disk光盘optical disk driver光盘驱动器organizational Internet storage组织性网络存储PC Card hard disk PC卡硬盘pit凹primary storage主存RAID system磁盘阵列系统redundant array of inexpensive disks(RAID)廉价磁盘冗余阵列secondary storage辅存secondary storage driver辅存驱动器sector扇区sequential access顺序存取Shutter快门software engineer软件工程师solid-state storage固态存储器storage devices存储装置tape cartridge盒式磁带track轨道USB drive USB驱动器write-protection notch写入保护缺口。

人脸识别英文作文

人脸识别英文作文Face recognition technology has become increasingly popular in recent years. It is a fascinating and controversial topic that has sparked debates anddiscussions around the world. The ability to identify and verify individuals based on their facial features has numerous applications and implications, both positive and negative.The use of face recognition technology in security systems is one of its most widely known applications. It allows for quick and accurate identification of individuals, enhancing the efficiency and effectiveness of security measures. This technology has been adopted in airports, government buildings, and even smartphones, providing a convenient and secure way to access restricted areas or personal devices.Another interesting application of face recognition technology is in the field of entertainment. Many amusementparks and attractions now use this technology to create personalized experiences for visitors. By scanning their faces, the system can identify individuals and tailor the attractions accordingly, providing a unique and immersive experience.In addition to its practical applications, face recognition technology has also raised concerns about privacy and personal data protection. The ability to capture and store facial images raises questions about who has access to this information and how it can be used. People worry that their identities could be stolen or misused, leading to potential harm or discrimination.Furthermore, the accuracy and reliability of face recognition technology have been subjects of debate. Some argue that the technology is not foolproof and can beeasily tricked or manipulated. Others believe that the algorithms used in these systems are biased and may produce false positives or negatives, leading to wrongful identifications or exclusions.Despite the controversies and concerns surrounding face recognition technology, its potential for positive impact cannot be ignored. It has the ability to revolutionize various industries, from security to healthcare and beyond. However, it is crucial to strike a balance between the benefits and risks associated with its use, ensuring that proper regulations and safeguards are in place to protect individuals' rights and privacy.In conclusion, face recognition technology is apowerful tool with a wide range of applications. Itsability to identify and verify individuals based on their facial features has both positive and negative implications. While it enhances security and provides personalized experiences, it also raises concerns about privacy and accuracy. It is important to carefully consider the ethical and legal implications of its use and ensure that it is implemented in a responsible and transparent manner.。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Person Identification by Mobile Robots in Indoor EnvironmentsGrzegorz Cielniak and Tom DuckettCentre for Applied Autonomous Sensor SystemsDept.of Technology,¨Orebro UniversitySE-70182¨Orebro,Swedenhttp://www.aass.oru.seAbstractThis paper addresses the problem of identifying persons with a mobile robot.In the proposed system,people are first detected and then tracked with the robot’s laser range-finder sensor,using an independent Kalmanfilter for each person.After segmentation,the rectangular region of the image containing the person is divided into regions corre-sponding to the person’s head,torso and legs.Colour fea-tures are extracted from each region for input to a pattern recognition system.Five alternative classification methods were investigated,including experiments on a real robot and with a static camera system.The best identification per-formance was obtained with an ensemble of self-organizing maps(ESOM),where one self-organizing map is trained for each person in the robot’s database.We also discuss how to incorporate the new method into a complete application of a robotic security guard.1IntroductionRecently a variety of so-called service robots have been de-veloped.They have been designed to work in populated environments such as hospitals[11],museums[4],office buildings[1]and supermarkets[8],where they perform tasks such as cleaning,surveillance,entertainment,educa-tion and delivery.These robots must have the ability to co-operate with people.To enable this cooperation,a robot needs to know how many people there are in its surround-ings,where they are and who they are(the three fundamen-tal problems of people detection,tracking and identifica-tion).This paper concerns the problem of people identifica-tion.Modern human identification systems use a variety of features including iris,face and speech patterns.The liter-ature in thisfield is quite extensive and some special work-shops confirm the general interest in this eful ap-proaches for mobile robots are those that can be utilizedfrom a distance,and should be able to operate in real-time under the extra noise and variations due to the motion of the robot itself.The ideal system should be able to recognise the humans in their natural environment,without requir-ing any special registration or scanning procedure.Possi-ble techniques include face recognition[10],speaker iden-tification,biometrics,etc.Recent work has focussed on how to combine different recognition techniques in order to improve identification accuracy[3].However,most of the work to date has concentrated on static sensor systems.In this paper,we investigate an identification method fora mobile robot that is based on a learned colour model ofthe person’s whole appearance,including face,hair,clothes, shoes,etc.We discuss the practical issues of integrating this method into a real world application in the conclusions.An overview of our proposed system is given in Fig.1.To detect and track people in the surroundings of the robot, the built-in laser sensor is used(see Section2).To identify people,colour images are rmation from the laser-based tracker isfirst used to segment the area of the image containing a person.Then a set of colour features is ex-tracted from the segmented area(Section3).These feature values are classified using an ensemble of self-organizing maps(ESOM).Section4gives details of the various pat-tern classification algorithms investigated.An advantage of this particular method is that it can be trained incrementally, by adding a new self-organizing map for each new person as required,which is an important requirement for many applications of service robots.Section5gives experimen-tal results showing the robustness of our method,includinga comparison of ESOM with a number of other classifica-tion methods.This includes results on a real robot(with3 persons)and also with a static camera system(with9per-sons)in order to test both the feasibility and scalability of the proposed method.Finally,in the concluding section,we discuss how to integrate the method with other techniques for enabling human-robot cooperation,including details of our proposed application,the Robotic Security Guard.1Figure1:Overview of the proposed system:a)robot platform,b)information from the laser-based tracker,c)segmented image,d)colour distributions within the segmented areas,e)ensemble of SOMs,and f)classification result.2People Detection and LocalisationThis section describes the pre-processing steps required tosegment the people in the images,both on a real robot andwith a static web-camera.The output of both of these dif-ferent data collection methods is the rectangular region ofan image containing a person.2.1Implementation on a B21RobotWe used a SICK LMS200laser scanner mounted on anRWI B21robot at Freiburg University,Germany,to de-tect and track people in the robot’s immediate surroundings.The detection systemfirst extracts local minima that corre-spond to the legs of persons.To increase the reliability ofthe system,consecutive scans are taken into account.Tokeep track of each person,we apply a separate Kalmanfil-ter for each person detected.The state x r of a person at timestep r is represented by a vector[x,y,δx,δy] .Whereas xand y represent the position of the person,the termsδx andδy represent the velocity of the person in x-and y-direction.Figure2:Robot Albert(B21)tracking a person who iswalking through the environment.Accordingly,the prediction is carried out by the equationx−r+1=10t r0010t r00100001x r,where t r is the time elapsed between the measurement z r+1and z r.Since the laser range sensor does not provide the ve-locitiesδx andδy,which are also part of our state space,themeasurement matrix projects onto thefirst two componentsof the state space.Accordingly,the predicted measurementat step r+1isz−r+1=10000100x−r+1.To solve the data association problem,we apply the nearestneighbour approach.To determine the area of the image corresponding to aperson,as detected by the laser tracking system,we rely onan accurate calibration between the camera and the laser.We use a perspective projection to map the3D position ofthe person in world coordinates to2D image coordinates.2.2Experiments with a Web-cameraWe used a web-camera Philips PCVC740K(resolution160×120pixels)connected to a Pentium II PC to collect thedata.The camera was placed in the corner of the roboticslab at our institute.The position and orientation of thecamera were adjusted to cover the largest possible area ofa7×8m room.Persons taking part in the experimentswere asked to walk within a limited area of interest(seeFig.3a).During this task,images from the web-camerawere recorded with frequency2Hz.To localise and determine the area of the image cor-responding to a person we used a vision-based approach.2Figure3:Web-camera:a)an example image with a walking person b)segmentation of the person from the picture. Since the position of the camera wasfixed,we could use a background extraction method.For every frame,the differ-ence with the background was calculated.The background was recorded earlier with no moving person in the picture (taking the average offive pictures).Then a histogram of difference data in both vertical and horizontal directions was created.Data with a value higher then a certain thresh-old(learned during background acquisition)was used for detection of the person in the image(see Fig.3b).3Feature ExtractionThe determined area of the image isfirst divided into three sub-areas corresponding to three human body parts:head, torso and legs.We used similar proportions to those pro-posed by Vitruvius[16].In our approach,the proportionsused were16for the head,26for the torso and36for the legs(see Fig.1c).In the next step,we collect statistical information about the colour distribution within the segmented areas.Colour features are robust with respect to translation,rotation,scale and other kinds of geometric distortions,but very sensitive to varying lighting conditions.Therefore we used the HSV (Hue-Saturation-Value)colour space.In this colour model, the intensity factor can be easily separated and its influ-ence reduced.We collected information about thefirst two moments(mean and variance)of the colour distribution for each segment,which gives3×3×2=18features in total. 4Pattern ClassificationTo identify persons,the pattern vector obtained after pre-processing(i.e.,people detection and localisation)and fea-ture extraction is presented to a pattern classification sys-tem.In this section,we describe thefive different classifi-cation methods investigated.4.1Minimum Distance ClassifierA simple and very intuitive classification method is a mini-mum distance classifier(MDC).In this method,mean vec-tors calculated from the training data for each class are as-sumed to be ideal prototypes for the persons.To classify a new input vector,the Euclidean distance to each of the pro-totypes is calculated,and the vector is assigned to the class with the shortest distance.Equivalently,the decision function for a minimum dis-tance classifier can be written asd j(x)=x T m j−12m T j m jwhere x is the pattern vector to be classified,and m j is the mean vector of each classωj.Classification is then deter-mined by the class that produces the highest decision value.4.2Bayes’ClassifierThe classification results obtained by the minimum distance classifier can be improved by modelling the distribution of the data.For normally distributed classes,it it is shown in[6]that minimum-error-rate classification is achieved by using the decision functiond j(x)=ln P(ωj)−1ln|C j|−1([x−m j]T C−1j[x−m j]) where m j is the mean vector and C j is the covariance matrix of each classωj.Again,a given input vector is assigned to the class with the highest decision value.4.3Multi-layer Feedforward NetworkAnother way to perform a classification task is to use a multi-layer feedforward(MLFF)neural network.We de-cided to use a variant with one output unit for each class ωj,which was trained with the1-of-c coding[2],where c is the number of classes.During training,an input pattern is presented to the network together with a target output vec-tor,in which the output corresponding to the correct class is set to1and all other ouputs are set to0.During classifica-tion,the class corresponding to the output with the highest value is chosen as the classification result.In our experi-ments,we used a network with18input units,one hidden layer and c output units depending on the experiment(c=7 for the B21robot,and c=9for the web-camera data).The best performance was obtained with15units in the hidden layer and a learning rate of0.3.4.4Simple Recurrent NetworkIf we use image sequences rather then a single image,the identification task can be treated as a dynamic process.In3this case,a simple recurrent neural network(SRN)can be used to improve classification performance by taking into account the“history”of the sequence of image patterns.In this type of network,the outputs of the neurons in the hid-den layer are connected to another set of input units(called the context layer)in a feedback loop.These neurons play the role of a dynamic memory.The recurrent inputs at time t are taken from the outputs of the hidden units at time t−1. We used an Elman recurrent network[7]with a similar con-figuration to the MLFF(18inputs,one hidden layer with12 neurons,and c output neurons).4.5Ensemble of SOM ClassifiersThe self-organizing map(SOM)is an unsupervised neural network that can be used for clustering sensor data[12]. The basic idea of this approach is to train one SOM for each person,and then during classification the SOM which gives the smallest distance error is chosen as the“winner”.Such a structure can be called an ensemble of SOMs[15].One self-organizing map consists of a set of neurons or cluster units that are arranged in a regular geometric pat-tern(in this paper,a hexagon was used).Each unit j has a weight vector w j that acts as a prototype.When a pattern vector x is presented to the network,the best matching clus-ter unit is determined according to the smallest euclidean distance x−w j .During training,the weight vector of the best matching unit is adapted to be more similar to the input vector.In addition,the weight vectors for the geo-metric neighbours of the winning unit are also adapted by a smaller amount,with the result that the network learns a topographic mapping from the input space onto the cluster space that preserves the underlying distribution of the train-ing data.In other words,similar input vectors are mapped onto similar regions in the map of neurons.During testing, the distance to the best matching unit is used as a measure of the similarity of the presented pattern vector to the stored “signature”for that particular person.The input to each SOM is the vector of extracted colour features(dimension18)as described in the previous sec-tion.In our experiments,we used a basic structure consist-ing of25units arranged in a2D square grid of5×5units, which provides a good compromise between classification performance and network complexity.5Experimental ResultsTo evaluate the performance of our method,we used data collected during several experiments with a mobile robot and with a web-camera.The data collected by the mobile robot consisted of7classes(3different persons wearing7 different sets of clothing),comprising207examples in to-Method Results[%]MDC80.52±2.66MLFF82.58±3.16ESOM86.39±2.44Table1:Results from the experiments with a mobile robot.Method Results[%]MDC69.06±1.64Bayes80.01±2.44MLFF81.28±3.62SRN84.50±1.86ESOM92.16±1.12Table2:Results from the experiments with a web-camera.tal.20%of these examples were used as a training set and the others for testing.There were9different persons taking part in the experiments with the web-camera,in which a to-tal of2438examples were collected.We used30%of this data for training and the remaining70%for testing.The training-testing procedure was repeated10times with a dif-ferent,randomly chosen training set for each repetition.Ta-bles1and2present the average results with standard devia-tion for the classification methods described in the previous section.The results show that the performance of the classifier based on an ensemble of SOMs is significantly better than that of the other classifiers(p=0.01using Student’s t-test[14]).The image data obtained by the robot was very noisy(mostly due to inaccuracies in the synchronization be-tween the laser and vision systems).This affected the per-formance of the classification procedure.The small amount of available data from the robot also meant that we were not able to perform classification with the Bayes’classifier(due to singularities in the calculated covariance matrices)or the simple recurrent network(because the length of the avail-able image sequences was too short).However,the results obtained with the web-camera indicate that the SRN pro-duced a small but significant improvement in performance over the MLFF network(p=0.05),using image sequences of approximately80images per person.6Conclusions and Future WorkIn this paper,we proposed a new method to identify peo-ple with mobile ser information is used to detect and track persons(segmentation),and vision information is used to identify the segmented persons.The identification 4procedure uses an ensemble of SOMs rather than a single neural network.Our experiments demonstrated the robust-ness of this method compared to the other methods investi-gated.Possible topics for future work would include more sophisticated image segmentation routines and incorpora-tion of motion patterns of persons to further improve iden-tification performance.This work represents a step towards a complete applica-tion,the Robotic Security Guard(RSG).The main goal of this application is to combine different aspects of learning, navigation,localisation,planning and interaction into one platform that is able to patrol an environment,guard valu-able equipment,recognise known persons,discriminate in-truders from known persons,and cooperate with human se-curity staff.The required functionalities will also include learning algorithms for simultaneous localisation and map-ping[9],acquisition of navigation behaviours from human demonstration[13],and learning of typical motion patterns of persons[5].The project will be developed and tested on an Activmedia Peoplebot robot equipped with an ar-ray of heterogenous sensor types,including a pan-tilt-zoom camera,omni-directional camera,thermal infrared camera, laser range-finder sensor,ultrasonic range-finder sensors, stereo microphones and odometry.There are a number of issues that must be addressed in order to integrate the proposed identification method with the intended robotic application.The learned color model has several useful properties,for example,it is recognis-able from a wide range of distances,and is fairly invariant to different orientations of the persons.However,it has a number of obvious drawbacks,e.g.,people often change their clothes on a regular basis!To overcome this prob-lem,we intend to combine different recognition techniques with orthogonal strengths and weaknesses.Accurate(but not so robust)techniques such as face or speech recogni-tion could be used at the start of each day to obtain a con-fident initial estimate of the identity of a person.Then the clothing model could be re-acquired or added to an exist-ing database of clothes for that person,and used for gen-eral identification purposes later in the day,and in situations where faces and voices cannot be easily recognised.Rather than making crisp decisions,the different sources of sen-sory evidence should be combined within a framework that allows belief revision based on new information,e.g.,by maintaining probability distributions over the location and identity of detected persons. AcknowledgmentsWe would like to thank Maren Bennewitz and Wolfram Bur-gard at Freiburg University for their help with providing the B21robot data during the Marie Curie fellowship of thefirst named author.References[1]H.Asoh,S.Hayamizu,I.Hara,Y.Motomura,S.Akaho,andT.Matsui.Socially embedded learning of office-conversantrobot Jijo-2.In Proc.of the Int.Joint Conference on ArtificialIntelligence(IJCAI),1997.[2] C.M.Bishop.Neural Networks for Pattern Recognition.Ox-ford University Press,1995.[3]R.Brunelli and D.Falavigna.Person identification usingmultiple cues.IEEE Transactions on Pattern Analysis andMachine Intelligence,17(10):955–966,1995.[4]W.Burgard,A.B.Cremers,D.Fox,D.H¨a hnel,ke-meyer,D.Schulz,W.Steiner,and S.Thrun.Experienceswith an interactive museum tour-guide robot.Artificial In-telligence,114(1-2),1999.[5]G.Cielniak,M.Bennewitz,and W.Burgard.Where is...?Learning and utilizing motion patterns of persons with mo-bile robots.In Proc.of the Int.Joint Conference on ArtificialIntelligence(IJCAI),Acapulco,Mexico,August9-15,2003.[6]R.O.Duda,P.E.Hart,and D.G.Stork.Pattern Classifica-tion.Wiley,New York,2nd edition,2000.[7]J.L.Elman.Distributed representations,simple recurrentnetworks,and grammatical structure.Machine Learning,7:195–225,1991.[8]H.Endres,W.Feiten,and witzky.Field test of a nav-igation system:Autonomous cleaning in supermarkets.InProc.of the IEEE Int.Conference on Robotics and Automa-tion(ICRA),1998.[9]U.Frese and T.Duckett.A multigrid approach for acceler-ating relaxation-based SLAM.In Proc.IJCAI Workshop onReasoning with Uncertainty in Robotics,Acapulco,Mexico,August9,2003.[10]R.Gross,J.Shi,and J.Cohn.Quo vadis face recognition?InThird Workshop on Empirical Evaluation Methods in Com-puter Vision,December2001.[11]S.King and C.Weiman.Helpmate autonomous mobile robotnavigation system.In Proc.of the SPIE Conference on Mo-bile Robots,pages190–198,Boston,MA,November1990.V olume2352.[12]T.Kohonen.Self-organizing Maps.Springer,1995.[13]J.Li and T.Duckett.Learning robot behaviours with self-organizing maps and radial basis function networks.In Pro-ceedings of the Second Swedish Workshop on AutonomousRobotics,Stockholm,Sweden,October10-11,2002.[14]W.H.Press,S.A.Teukolsky,W.T.Vetterling,and B.P.Flan-nery.Numerical Recipes in C,2nd.edition.Cambridge Uni-versity Press,1992.[15] A.J.C.Sharkey.On combining artificial neural nets.In Con-nection Science,volume8,pages299–314,1996.[16]P.Vitruvius and F.Granger(trans.).Vitruvius:On Architec-ture.Harvard University Press,1934.5。

相关文档
最新文档