Digital Forensics and Internet of Things. Группа авторов

Читать онлайн.
Название Digital Forensics and Internet of Things
Автор произведения Группа авторов
Жанр Программы
Серия
Издательство Программы
Год выпуска 0
isbn 9781119769033



Скачать книгу

target="_blank" rel="nofollow" href="#ulink_0266cf1b-4a29-5e97-82a5-85eb1bd048e1">Figure 1.2 Layers of the model.

      A neural network is an instrument that is designed to model in the similar way in which the brain responds or executes a task or function; it is usually simulated in digital computer-based software or carried out by using electronic components. It can resemble the brain in the following aspects:

       • The knowledge is obtained by the network from its surrounding with the help of a learning procedure.

       • Interneuron link strength, known as synaptic weight, is used to accumulate the obtained knowledge.

       • The process that is operated to execute the learning procedure is known as the learning algorithm; the purpose of which is to reform the synaptic weights of the network in a well-organized mode to accomplish the desired layout objective.

       • It is also possible to improve its own topology.

       • Neural network is also mentioned in literature as neurocomputers, connectionist network, and parallel distributed processor.

       • Neural network attains its computing power at the beginning from its power of computer at first from the massively side-by-side distributed arrangement and next from its potential to learn and then generalize.

       • Generalization leads to the neural network constructing logical outputs for inputs not encountered throughout training (learning).

      An ANN is specified by the following:

       • Neuron model: Data processing component of the neural network.

       • An architecture: A group of neurons along with connections connecting neurons.

       • A training algorithm: It is used for instructing the Neural network by changing the weights to model a selected training task correctly on the instructing examples.

      1.3.2 Application of Neural Network in Face Recognition

      Face recognition implies comparing a face with the saved database of faces to recognize one in the given image. The associated process of face detecting is directly relevant to recognizing the face as the images of the face captured must be at first analyzed and then identified, before they get recognized. Face detection through an illustration assists to focus on the database of the system, improving the systems speed and performance.

      Artificial Neural Network is used in face recognition because these models can imitate the neurons of the human brain work. This is one of the foremost reasons for its role in face recognition.

      1.4.1 Face Recognition

Schematic illustration of the structure of face recognition system.

      1.4.2 Open CV

      OpenCV (Open-Source Computer Vision) is a famous library developed by Intel in 1999. This platform has various libraries. It helps in real-time image processing and includes various algorithms. It is equipped with programming interface to various languages like C++, C, and Python.

      OpenCV 2.4 has a very useful new face recognizer class for face recognition.

      The currently available algorithms are as follows:

       • Eigenfaces (createEigenFaceRecognizer())

       • Local Binary Patterns Histogram (createLBPHFaceRecog-nizer())

       • Fisher faces (createFisherFaceRecognizer() )

      1.4.3 Block Diagram

Schematic illustration of the block diagram of face recognition system.

      1.4.4 Essentials Needed

      SD card with 16GB capacity preinstalled with NOOBS.

      For display and connectivity:

      Any HDMI/DVI monitor or TV can be used for pi Display. HDMI cables will also be needed.

      Keyboard and mouse: wireless will also work if already paired.

      Power supply: USB cables can be used for this. Approximately, 2 A at 5 V will be needed to power the Raspberry Pi.

      Make an account on iotgecko.com for authentication check.

      1.4.5 Website

      If a person is unidentified, then a picture of is captured and sent to the website. All the monitoring data is sent over the website iotgecko.com so that the user can see the system status from anywhere and help boost the security.

      1.4.6 Hardware

       • Raspberry Pi 3 Model B+

       • Camera

       • Multimedia Mobile AUX System

       • PCB

       • 16X2 LCD Display

       • DC Motor