FINAL YEAR PROJECT THESIS Project Members Project Supervisors
Transcription
FINAL YEAR PROJECT THESIS Project Members Project Supervisors
FINAL YEAR PROJECT THESIS Project Members Syed Waqas Burney 2004185 [[email protected]] Mutahira Ikram Khan 2004136 [[email protected]] Project Supervisors Mr. Badre Munir FCSE [[email protected]] Mr. Umar Shafique FES [[email protected]] Faculty of Computer Science & Engineering GIK Institute, Pakistan [May, 2008] Smart Control of Domestic Appliances using a Computer Vision-based Approach Codename: imaGInation KIeve 1 CERTIFICATE OF APPROVAL It is certified that the work contained in this thesis, entitled “vSmart - Smart Control of Domestic Appliances using a Computer Vision-based Approach”, was carried out by Syed Waqas Ali Burney and Mutahira Ikram Khan under the supervision of Mr. Badre Munir, FCSE and Mr. Umar Shafique, FES for the partial fulfillment of the Degree Requirement of Bachelors of Sciences in Computer System Engineering. Project Advisors [May 10, 2009] Mr. Badre Munir Mr. Umar Shafique 2 ACKNOWLEDGEMENTS First and foremost, we would like to thank Almighty Allah for Blessing us with all the energy, enthusiasm, knowledge, wisdom, courage and much more, to help us achieve our goals and complete, very successfully, our Final Year Project. We are thankful to our parents for providing us with their invaluable love and support, and instilling in us the very confidence and morale that set us out in the search for success. We would also like to express our earnest gratitude to our advisors, Mr. Badre Munir and Mr. Umar Shafique for their priceless guidance and stimulation throughout the course of the project, and for providing to us constructive support at every step. Last, but definitely not the least, we would like to thank our many student mentors and friends without whom this project would not have been possible. The deepest and most gratifying words of thanks’ for our friends Mohammad Yousuf (GIKI Class of 2007) and Hafiz Faheem Raza (GIKI, Class of 2007) for their endless support, heartfelt efforts and for making this all possible. Thank you so much. Due acknowledgements also to our mentors at Intel– Dr. Edwin Chung & Edwin Lee, and the many others- Rana Mohammad Bilal (GIKI, Class of 2009), Iqbal Talat Bhatti (GIKI, Class of 2006), Mr. Murtaza Shabbir Safri (GIKI, Class of 2006), Mr. Junaid Shahid (GIKI, Class of 2006) and Mr. Mohammad Nasrullah (GIKI, Class of 2004). Thank you all! 3 Dedicated to our parents... 4 TABLE OF CONTENTS PROJECT TITLE ...........................................................................................................1 CERTIFICATE OF APPROVAL ......................................................................................2 ACKNOWLEDGEMENTS .............................................................................................3 EXECUTIVE SUMMARY ..............................................................................................7 1. INTRODUCTION .....................................................................................................8 1.1 BACKGROUND ..............................................................................................8 1.2 OBJECTIVE ....................................................................................................8 2. PROJECT DESIGN ....................................................................................................9 2.1 ARCHITECTURE OVERVIEW ...........................................................................9 2.2 MODULARIZATION .....................................................................................10 2.3 MODEL DESIGN ...........................................................................................11 2.4 HARDWARE DESIGN....................................................................................13 2.4.1. SERIAL INTERFACING ..............................................................................13 2.4.2. MICROCONTROLLER INTERFACING .............................................................14 2.4.3. INTERFACE CIRCUITRY .............................................................................16 2.5 SOFTWARE DESIGN .....................................................................................18 2.5.1. DATABASE DESIGN ................................................................................18 3. PROJECT FUNCTIONALITY ....................................................................................21 3.1 SYSTEM DEPLOYMENT AND CONFIGURATION ...........................................21 3.2 HUMAN PRESENCE DETECTION AND ACTIVITY MONITORING ...................24 3.2.1. MOTION DETECTION FOR CONTINOUS VIDEO STREAMS ................................24 3.2.2. THE POINT-IN-POLYGON ALGORITHM .........................................................30 3.3 THE DECISION-TAKING SOFTWARE ENGINE ................................................34 3.4 THE APPLIANCE CONTROL MECHANISM .....................................................35 4. PROJECT LIMITATIONS .........................................................................................36 5. CONCLUSION .......................................................................................................37 REFERENCES.............................................................................................................38 5 TABLE OF FIGURES FIGURE 01 - THE VSMART ARCHITECTURE ............................................................... 9 FIGURE 02 - MODEL SKETCH UP .............................................................................. 11 FIGURE 03 - INITIAL MODEL-BUILD SNAPSHOTS ..................................................... 11 FIGURE 04 - POST-APPLIANCE SETUP SNAPSHOTS ................................................. 12 FIGURE 05 - A4TECH PK 5 WEB CAMERA ................................................................ 12 FIGURE 06 - THE RS232 CONNECTOR ..................................................................... 13 FIGURE 07 - THE MICROCONTROLLER SNAPSHOT .................................................. 14 FIGURE 08 - MICROCONTROLLER CONNECTIVITY TO THE SERIAL PORT ................ 15 FIGURE 09 - THE INTERFACE CIRCUITRY .................................................................. 16 FIGURE 10 - THE CIRCUIT DIAGRAM ....................................................................... 17 FIGURE 11 - THE DATABASE DIAGRAM .................................................................. 18 FIGURE 12 - CAMERA REGISTRATION .................................................................... 21 FIGURE 13 - DEPLOYED CAMERA-VIEW SNAPSHOTS ............................................. 21 FIGURE 14 - DEFINING HOTSPOTS FOR THE SYSTEM .............................................. 22 FIGURE 15 - INITIAL SYSTEM CONFIGURATIONS .................................................... 23 FIGURE 16 - MOTION DETECTION ALGORITHMS .................................................... 29 FIGURE 17 - MER FORMATION ON A MOVING OCCUPANT .................................... 30 FIGURE 18 - THE POINT-IN-POLYGON FIGURES ....................................................... 31 FIGURE 19 - THE SYSTEM APPLICATION ................................................................. 33 FIGURE 20 - THE APPLIANCE CONTROL MECHANISM ............................................. 35 6 EXECUTIVE SUMMARY vSmart (codenamed: ImaGInation KIeve) achieves at a basic, yet a truly foundational level, a flexible and user-customizable system which using low-cost cameras intelligently controls basic domestic appliances, such as room lights, fans and lamps in local environments, such as homes and offices. However, yet evolving from its ideation phase, as its first prototype, it merely serves to mark a niche as an innovative approach taken into the concept of homeautomation using the much-evolving scientific discipline of Computer Vision. We much firmly believe that research and further experimentation using this lateral approach and its fusion thereon with common technological gadgetries such as RFID and Infra-Red sensors can certainly much evolve these basic, yet solid and foundational, results to new epoch heights; taking the vision of Smart Houses from the realm of imagination to actual practice, and thereby achieving multidimensional user-convenience and using modern technology to endow a sustainable environment in our everyday lives. 7 1. INTRODUCTION 1.1 Background The dream of an intelligent home that automatically controls the living environment and responds to individual preferences has been around, amidst much research, for more than three decades. However, high costs, limited capability, difficulty-in-use factors and reliability issues have imposed major constraints on the market, keeping home automation more in the realm of imagination than practice. Domotics is the field of study of specific automation requirements for homes, and the application of innovative techniques for more comfort and convenience in and around the home. At our time initial literature reading and survey, what was surprising to us as a group, was that a much of the work in this growing field has actually been on-going using various electronic devices, microcontrollers and many sensor-based approaches. Reasons for this would primarily perhaps attribute to cost control, however, thereby compromising with flexibility and general practical use. 1.2 Objective As computer science and engineering majors’, the team upon much brain-storming and ideation, decided to take up a unique challenge to experiment a fusion of Domotics with the much-evolving scientific discipline of Computer Vision. Computer Vision is a branch of Applied computing concerned with computer processing of images from the real world for the extraction of useful information. The aim of the project was to prototype, at a very foundational level, a flexible and user-customizable system which would use low-cost cameras to intelligently control basic domestic appliances, such as room lights, fans and lamps in local environments, such as homes and offices. 8 2. PROJECT DESIGN 2.1 Architecture Overview vSmart, once configured as per the needs of a user for a given environment, maintains a knowledge base for the 'smart' behavior of various electronic appliances. The prototype upon deployment, using the low cost and low resolution (web) cameras, detects for optimized motion activity within these local environments, and thereby feeds the detected activity to the software engine. The motion detected signifies user(s) presence and movements within the environment. The expertsystem here-on, makes the decisions and by spawning multiple threads, concurrently controls the various, serially interfaced, domestic hardware appliances set upon the prototype model house Figure 1 - The vSmart architecture 9 2.2 Modularization The vSmart architecture, as show in Figure 1, can be modularized as the following: System Deployment and Configuration Camera Deployments Camera Registration Defining Hotspots System Configuration Detecting Human Presence and Activity Monitoring Motion Detection MER formation Threading The Decision-taking Software Engine Action Triggering HotSpot overlap calculations Season Time Reaction Generation Trigger Times Wait Trigger Firing The Appliance-control Mechanism Serial Transmission Microcontroller Appliance Control 10 2.3 Model Design vSmart was prototyped upon a realistic scaled-down model house. The model, 3.5’x3.5’x1.5’ in dimensions, was a double-walled structure for internal wiring, and depicted a furnished two-bedroom house of dimensions 1.5’x1.5’x 1.5’ each. Moreover, the elevated model had a thin cardboard base for usage of magnets on magnetic toy-men, 1.5”x1”x2” in dimensions, to depict natural human movements within the house. All furniture thereby also had cuts drawn on its sides for the toymen to “move in” into the furniture-space. Model sketch Up Outer Slide-Up-and-Removable Walls ROOM Normal Walls Wiring concealed in between by the removable Outer Wall Figure 2 Initial model-build snapshots Figure 3 11 Post-appliance setup snapshots Cameras Figure 4 Low-cost A4tech Pk-5 web cameras were used for the vision-based system on boththe actual model itself, and also during demo-testing in an actual student hostelroom. These 1/4"CMOS cameras, having a frame rate of 30fps at a 320x240 picture resolution, had a view angle of 54°, and were thereby aligned for maximum required coverage within the given environment. The system used was a regular home computer- a Pentium 4 (2.4Ghz), with 512MB DDR2 Ram and an in-build VGA card. Camera Specifications Image Sensor:1/4"CMOS, 640×480pixels Frame Rate:30fps@640x480, @600x800, @320x240, @160x120 Lens: F=2.4,f=4.9mm View Angle:54 degree Focus Range: Automatic focus, 30cm to infinity Exposure Control: Automatic White Balance: Automatic Still Image Capture Res.:1280X960,600x800, 640X480, 352x288, 320x240 Figure 5 12 2.4 Hardware Design The electronic interfacing circuitry is divided into three parts, which are as follows: Serial interfacing Microcontroller interfacing Main circuitry 2.4.1 Serial interfacing: The RS232 serial port is used to transmit data between the PC and the microcontroller. One of the major functions of the serial port is to put data into a serial format so that it can be transmitted via modem. The one good feature is that the RS232 needs three wires between the PC and the microcontroller. One line is data transmit; one line is data receive, and the last line is a common ground between the two devices. The draw backs to using RS232 are that it uses negative logic where a ‘1’ is -3V to 12V and a ‘0’ is +3V to +12V and the region from -3V to 3V is undefined. The microcontroller uses standard TTL logic so the RS232 signal has to be sent through another device to convert the negative logic back to TTL. This adds hardware to the system which adds difficulty to production. MAX233 chip can be used which converts the negative logic to TTL and keeps the data in a serial format. Figure 6 – The RS232 Connector 13 IBM PC/Compatible computers based on x86 microprocessors normally have two COM ports. Both COM ports have RS-232 type connectors. Many PCs use one each of the DB-25 and DB-9 RS232 connectors. The COM ports are designated as COM 1 and COM 2. At the present time COM 1 is used for the mouse and COM 2 is available for devices such as a modem. 89C51 serial port can be connected to the COM 2 port of a PC for serial communications experiments. 2.4.2 Microcontroller Interfacing ATMEL AT89C51 microcontroller is used in the project. The AT89C51 is a low-power, highperformance CMOS 8-bit microcomputer with 4K bytes of Flash programmable and erasable read only memory (PEROM). The device is manufactured using Atmel’s high-density Figure 7 – The microcontroller snapshot nonvolatile memory technology. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with Flash on a monolithic chip, the Atmel AT89C51 is a powerful microcomputer which provides. A highly-flexible and costeffective solution to many embedded control applications. There are advanced generations of microcontroller available these days but as this prototype doesn’t require real time data, 89c51 fulfills the project requirement. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TxD and RxD and are of the part of the port 3 group. (P3.0 and P3.1). Pin 11 of the 89C51 is assigned to TxD and pin 10 is designated as RxD. These pins are TTL compatible. One such line driver is the MAX233 chip. Since the RS232 is not compatible with today’s microcontrollers we need a line driver to convert RS232 signal to TTL’s voltage levels that will be acceptable to the TxD and RxD pins. One example of such a converter is MAX232 and MAX 233. MAX 233 converts from RS232 voltage levels to TTL voltage levels, and vice versa. One advantage of the MAX233 chip is that it uses +5 V power-source which is the same 14 source as that of the microcontroller. MAX 233 has two sets of line drivers for transferring and receiving data. The line drivers used for TxD are called T1 and T2. While the line drivers for RxD are designated as R1 and R2. In this project only one of each is used. Signal send to the microcontroller by the software has the information regarding which device is to be controlled and to which pin of the controller it is connected to. Microcontroller is programmed to interpret the signal in such a way that it identifies which electronic device, in which part of the house, it has to turn on or off. Port1 and Port2 are used to connect 16 devices. Microcontroller has 4 ports and one controller can be used to connect 30 devices. To further extend the number of devices to be controlled, latches can be connected to the controller port and then devices to the latches. Figure 8 – Microcontroller connectivity to the serial port circuit diagram 15 2.4.3 Interface Circuitry: Microcontroller is attached to the devices through the main interface circuitry. Interface circuitry consists of the following components: 2n222 Transistors Diodes Relays Capacitors Resistors Figure 9 – Interface Circuitry Transistors: Microcontroller does not provide sufficient current to drive the relays. Transistors are used to provide sufficient current to derive the relay as well as to protect the microcontroller from burning off. An electrical signal can be amplified by using a device that allows a small current or voltage to control the flow of a much larger current. Transistors are the basic devices providing control of this kind. Modern transistors are divided into two main categories: bipolar junction transistors (BJTs) and field effect transistors (FETs). Application of current in BJTs and voltage in FETs between the input and common terminals increases the conductivity between the common and output terminals, thereby controlling current flow between them. Diodes: Diodes allow electricity to flow in only one direction. The arrow of the circuit symbol shows the direction in which the current can flow. Diodes are the electrical version of a valve and early diodes were actually called valves. Relays: A relay is an electrical switch that opens and closes under the control of another electrical circuit. Relays are connected to the devices and switch them off/on. When a current flows through the coil, the resulting magnetic field attracts an armature that is mechanically linked to a moving contact. The movement either makes or breaks a connection with a fixed contact. When the current to the coil is switched off, the armature is returned by a force approximately half as strong as the magnetic force to its relaxed position. Most relays are manufactured to operate 16 quickly. In a low voltage application, this is to reduce noise. In a high voltage or high current application, this is to reduce arcing. The contacts in the relay are described as "normally open" (NO) or "normally closed" (NC). This simply describes what the "at rest" state is. For a relay, that means if no power is applied to the coil/trigger wire. In the typical case where something is to be turned on, "normally open" set of contacts is used so that when power applied to the relay, the contacts close, and power is sent to the desired device. In the case of wanting to turn something off, "normally closed" set of contacts are used so that when power is applied to the relay, the contacts open and the power is no longer sent to the desired device. Resistor: Resistor is connected in the circuit to provide safety. If no resistor is added in the circuit, as VCC and ground are serially connected, there will be a heavy flow of current, which can damage/burn the coil of the relay. Figure 10 – The complete circuit diagram 17 2.5 Software Design 2.5.1 Database Design The database diagram as seen in the SQL Server diagram view: Figure 11 – The database diagram The database, simple and small as it is, incorporates 5 tables: Cams Polygons Coords 18 Appliances Reactions Cams The table contains the information about all the cameras plugged in to the system and their respective configurations ATTRIBUTE DESCRIPTION id The primary key of the table; each camera is assigned an ID name The moniker name of the camera roomName The room where a particular camera is deployed autoDeploy To set if the camera should auto or manually be started MERminHeight The minimum height limit of the MER MERmaxHeight The maximum height limit of the MER MERminWidth The minimum width limit of the MER MERmaxWidth The maximum width limit of the MER MERdiffThreshold The value of the threshold filter for the camera MERframesPerUpdate The “speed” with which the bg frame catches current frame MERframeSkipOption To set if frames should be allowed to be dropped MERframeSkip The number of frames to drop everytime Polygons The table contains basic information about the HotSpots marked for every camera ATTRIBUTE DESCRIPTION camId A foriegn key representing the camera associated Id The primary key of the table; each polygon is assigned an ID name The room where a particular camera is deployed Coods The table contains the coordinate information about all HotSpots ATTRIBUTE DESCRIPTION polyid A foriegn key representing the HotSpot polygon CoodOrder (Imp) To return coordinate in the order they were saved xCood The x-coordinate marked for the various polygons yCood The y-coordinate marked for the various polygons 19 Appliances The table contains the information of the appliances attached to the system for a particular environment ATTRIBUTE DESCRIPTION pinNo The primary key of the table; also the pin of the h/w device name The name of the appliance camID A foriegn key representing the camera associated currentState The present state (on/off) of the appliance Reactions This is the table alone which forms the knowledge base of the mini-expert system! ATTRIBUTE DESCRIPTION id The primary key of the table; each reaction is assigned an ID roomID A foriegn key representing the room associated polygonID A foriegn key representing the HotSpot associated appliancePinNo A foriegn key representing the appliance associated action Has Entered, Staying, Leaving isDay The boolean differenciating between the day and night isSummer The boolean differenciating between summer and winter applianceFinalState The final state of the appliance that is to be applianceTriggerTime The time-of-wait (ms) before the reaction is fired 20 3. PROJECT FUNCTIONALITY The vSmart modules, as outlined in the system architecture above, integrate to achieve complete functionality in the following mentioned steps: 3.1 System Deployment and Configuration The system, before being put for use, is to be carefully deployed at least once. System deployment involves mounting the cameras in the rooms at best-coverage locations, registering them within the application (plugand-play detection) and then optimally configuring them for the particular environment in which they have deployed. It may be noted that, if needed, multiple cameras may be deployed and registered with the system within the given locality. Figure 12 – Camera registration Figure 13 – Deployed-camera snapshots Marking “HotSpots”: Once this done, the “HotSpots” are marked for the given environment. HotSpots are enclosed regions (sets of coordinate points) marked on a “clean” camera-instanced “base-image”, which thereby define for the system the region of a particular location, e.g. the bed, in that camera captured environment. The marking is carried out using a simple draw-able mouse-pointer. 21 Figure 14 – Defining HotSpots for the system 22 The system, hence, now “knows” where for e.g. in a particular room are located the bed, study table, sofa, etc. It must be noted that these deployment-settings are valid only till when the furniture settings or the camera positioning has not been changed within the environment for that particular system-deployed camera. As a final step to system deployment comes configuring, as per user requirements, the decision-taking, multi-threaded software engine– the mini expert system. The relational database-based expert system consists of a large number of standard, predefined facts within. An example of in-built fact can be the particular that if in the Summer season and in the afternoon day-time, a person enters the room, then (only) the ceiling fan should switch on by itself, whereas all the lamps and lights need not to. These rules have been put up as a standard; however, as mentioned above, they can well- easily be customized from application GUI, as per requirements of the users in the environment. Moreover, based on changing seasons, number of users and other conditions system notifications may also be generated to recommend to or inquire from the users their preferences of appliance behavior in their environment. Figure 15 – Initial system configurations 23 3.2 Human Presence Detection and Activity Monitoring vSmart, following upon a vision-based approach, uses motion detection to judge the presence of human(s) and the activity in any given environment. The motion detection application is based on the AForge.NET framework. AForge.NET is a C# framework designed for developers and researchers in the fields of Computer Vision and Artificial Intelligence - image processing, neural networks, genetic algorithms, machine learning, etc. At this point the framework is comprised of 5 main and some additional libraries: AForge.Imaging – a library for image processing routines and filers; AForge.Neuro – neural networks computation library; AForge.Genetic – evolution programming library; AForge.Vision – computer vision library; AForge.Machine Learning – machine learning library. The work on the framework's improvement is in constants progress, what means that new feature and namespaces are coming constantly. For the project, we have used the framework’s Imaging and Vision libraries 3.2.1 Motion Detection for Continuous Video Streams There are many approaches for motion detection in a continuous video stream. All of them are based on comparing of the current video frame with one from the previous frames or with something that we'll call background. In this article, we'll try to describe some of the most common approaches: One of the most common approaches is to compare the current frame with the previous one. It's useful in video compression when you need to estimate changes and to write only the changes, not the whole frame. But it is not the best one for motion detection applications. Describing the idea more closely: Assume that we have an original 24 bpp RGB image called current frame (image), a grayscale copy of it (currentFrame) and previous video frame also gray scaled (backgroundFrame). First of all, let's find the regions where these two frames are differing a bit. For the purpose we can use Difference and Threshold filters. 24 // create filters Difference differenceFilter = new Difference( ); IFilter thresholdFilter = new Threshold( 15 ); // set backgroud frame as an overlay for difference filter differenceFilter.OverlayImage = backgroundFrame; // apply the filters Bitmap tmp1 = differenceFilter.Apply( currentFrame ); Bitmap tmp2 = thresholdFilter.Apply( tmp1 ); On this step we'll get an image with white pixels on the place where the current frame is different from the previous frame on the specified threshold value. It's already possible to count the pixels, and if the amount of it will be greater than a predefined alarm level we can signal about a motion event. But most cameras produce a noisy image, so we'll get motion in such places, where there is no motion at all. To remove random noisy pixels, we can use an Erosion filter, for example. So, we'll get now mostly only the regions where the actual motion was. // create filter IFilter erosionFilter = new Erosion( ); // apply the filter Bitmap tmp3 = erosionFilter.Apply( tmp2 ); The simplest motion detector is ready! We can highlight the motion regions if needed. // extract red channel from the original image IFilter extrachChannel = new ExtractChannel( RGB.R ); Bitmap redChannel = extrachChannel.Apply( image ); // merge red channel with motion regions Merge mergeFilter = new Merge( ); mergeFilter.OverlayImage = tmp3; Bitmap tmp4 = mergeFilter.Apply( redChannel ); // replace red channel in the original image ReplaceChannel replaceChannel = new ReplaceChannel( RGB.R ); replaceChannel.ChannelImage = tmp4; Bitmap tmp5 = replaceChannel.Apply( image ); Here is the result of it: 25 From the above picture we can see the disadvantages of the approach. If the object is moving smoothly we'll receive small changes from frame to frame. So, it's impossible to get the whole moving object. Things become worse, when the object is moving so slowly, when the algorithms will not give any result at all. There is another approach. It's possible to compare the current frame not with the previous one but with the first frame in the video sequence. So, if there were no objects in the initial frame, comparison of the current frame with the first one will give us the whole moving object independently of its motion speed. But, the approach has a big disadvantage - what will happen, if there was, for example, a car on the first frame, but then it is gone? Yes, we'll always have motion detected on the place, where the car was. Of course, we can renew the initial frame sometimes, but still it will not give us good results in the cases where we cannot guarantee that the first frame will contain only static background. But, there can be an inverse situation. If we put a picture on the wall in the room? We'll get motion detected until the initial frame will be renewed. The most efficient algorithms are based on building the so called background of the scene and comparing each current frame with the background. There are many approaches to build the scene, but most of them are too complex. We'll describe the Andrew Kirillov’s approach here for building the background. It's rather simple and can be realized very quickly. As in the previous case, let's assume that we have an original 24 bpp RGB image called current frame (image), a grayscale copy of it (currentFrame) and a background frame also gray scaled (backgroundFrame). At the beginning, we get the first frame of the video sequence as the background frame. And then we'll always compare the current frame with the background one. But it will give us the result I've described above, which we obviously don't want very much. Our approach is to "move" the background frame to the current frame on the specified amount (e.g. 1 level per frame). We move the background frame slightly in the direction of the current frame- we are changing colors of pixels in the background frame by one level per frame. 26 // create filter MoveTowards moveTowardsFilter = new MoveTowards( ); // move background towards current frame moveTowardsFilter.OverlayImage = currentFrame; Bitmap tmp = moveTowardsFilter.Apply( backgroundFrame ); // dispose old background backgroundFrame.Dispose( ); backgroundFrame = tmp; Let P1 be the value of pixel in the first image (current frame), P2 be the value in second image (background). We then move the value of P2 towards the value of P1, thereby minimizing the difference between P1 and P2. Hence, the formula is: P2 += min ( level, |P2 – P1| ) * sgn( P1 – P2 ) where level is the "speed" of moving the background frame towards the current frame and sgn(x) = 1, if x >= 0 & sgn(x) = –1, if x < 0; And now, we can use the same approach we've used above. But, let us extend it slightly to get a more interesting result // create processing filters sequence FiltersSequence processingFilter = new FiltersSequence( ); processingFilter.Add( new Difference( backgroundFrame ) ); processingFilter.Add( new Threshold( 15 ) ); processingFilter.Add( new Opening( ) ); processingFilter.Add( new Edges( ) ); // apply the filter Bitmap tmp1 = processingFilter.Apply( currentFrame ); // extract red channel from the original image IFilter extrachChannel = new ExtractChannel( RGB.R ); Bitmap redChannel = extrachChannel.Apply( image ); // merge red channel with moving object borders Merge mergeFilter = new Merge( ); mergeFilter.OverlayImage = tmp1; Bitmap tmp2 = mergeFilter.Apply( redChannel ); // replace red channel in the original image ReplaceChannel replaceChannel = new ReplaceChannel( RGB.R ); replaceChannel.ChannelImage = tmp2; Bitmap tmp3 = replaceChannel.Apply( image ); Now it looks much better! 27 There is another approach based on the idea. As in the previous cases, we have an original frame and a gray scaled version of it and of the background frame. But let's apply Pixellate filter to the current frame and to the background before further processing. // create filter IFilter pixellateFilter = new Pixellate( ); // apply the filter Bitmap newImage = pixellateFilter( image ); So, we have pixellated versions of the current and background frames. Now, we need to move the background frame towards the current frame as we were doing before. The next change is only the main processing step: // create processing filters sequence FiltersSequence processingFilter = new FiltersSequence( ); processingFilter.Add( new Difference( backgroundFrame ) ); processingFilter.Add( new Threshold( 15 ) ); processingFilter.Add( new Dilatation( ) ); processingFilter.Add( new Edges( ) ); // apply the filter Bitmap tmp1 = processingFilter.Apply( currentFrame ); After merging tmp1 image with the red channel of the original image, we'll get the following image: May be it looks not so perfect as the previous one, but the approach has a great possibility for performance optimization. Looking at the previous picture, we can see that objects are highlighted with a curve, which represents the moving object's boundary. But sometimes it's more likely to get a rectangle of the object. Not only this, what should be done if we want, not just to highlight the objects, but also get their count, position, width and height? Don't be afraid, it's easy. It can be done using the BlobCounter class from the Aforge 28 imaging library, which was developed recently. Using BlobCounter we can get the number of objects, their position and the dimension on a binary image. So, let's try to apply it. We'll apply it to the binary image containing moving objects, the result of Threshold filter BlobCounter blobCounter = new BlobCounter( ); ... // get object rectangles blobCounter.ProcessImage( thresholdedImage ); Rectangle[] rects = BlobCounter.GetObjectRectangles( ); // create graphics object from initial image Graphics g = Graphics.FromImage( image ); // draw each rectangle using ( Pen pen = new Pen( Color.Red, 1 ) ) { foreach ( Rectangle rc in rects ) { g.DrawRectangle( pen, rc ); if ( ( rc.Width > 15 ) && ( rc.Height > 15 ) ) { // here we can higligh large objects with something else } } } g.Dispose( ); Here is the result of this small piece of code: Figure 16 – Motion detection algorithm 29 This in turn gives us efficient results and thereby proves to be relatively “easy” on machine processing. The motion detected is grouped as per defined parameters (alterable) and then eventually formed is a MER – the Minimum Enclosed Rectangle. Multiple people within a room result in multiple MERs being formed. Figure 17 - MER Formation on an occupant (moving) within the room Now to eventually answer the core question- “How can we know where in the room a person is?” the MER formed is checked for “overlap” with the outlined HotSpots. At the time of the initial deployment, upon marking all the HotSpots, all the coordinates which lie in their respective HotSpots are once determined. These HotSpots, however, generally being marked irregularly on the camera-instanced perspective image, are saved as irregular closed polygons, and hence make this process not so straightforward. A rectangle is drawn upon every HotSpot, such that it completely encloses the irregular polygon, and thereafter, inside the rectangle is drawn a point grid. Every point in that grid is then checked to see if it exactly lies within the closed complex polygon using the Point-In-Polygon Algorithm. 3.2.2 The Point-In-Polygon Algorithm The Point-In-Algorithm compares each side of the polygon to the Y (vertical) coordinate of the test point, and compiles a list of nodes where each node is a point where one side crosses the Y threshold of the test point. If there are an odd number of nodes on each side of the test point, then it is inside the polygon; if there are an even number of nodes on each side of the test point, then it is outside the polygon. 30 Figure 18.1 demonstrates a typical case of a severely concave polygon with 14 sides. The red dot is a point which needs to be tested, to determine if it lies inside Figure 18.1 Figure 18.2 shows what happens if the polygon crosses itself. In this example, a ten-sided polygon has lines which cross each other. The Figure 18.2 effect is much like “exclusive or,” or XOR as it is known to assembly- language programmers. The portions of the polygon which overlap cancel each other out. So, the test point is outside the polygon, as indicated by the even number of nodes (two and two) on either side of it. In Figure 18.3, the six-sided polygon does not overlap itself, but it does have lines that cross. This is not a problem; the algorithm still works fine Figure 18.3 Figure 18.4 demonstrates the problem that results when a vertex of the Figure 18.4 polygon falls directly on the Y threshold. Since sides a and b both touch the threshold, should they both generate a node? No, because then there would be two nodes on each side of the test point and so the test would say it was outside of the polygon, when it clearly is not! The solution to this situation is simple. Points which are exactly on the Y threshold must be considered to belong to one side of the threshold. Let’s say we arbitrarily decide that points on the Y threshold will belong to the “above” side of the threshold. Then, side a generates a node, since it has one endpoint below the threshold and its other endpoint on-or-above the threshold. Side b does not generate a node, because both of its endpoints are on-or-above the threshold, so it is not considered to be a threshold-cross Figure 18.5 shows the case of a polygon in which one of its sides lies entirely on the threshold. Side c generates a node, because it has one endpoint below the threshold and its other endpoint onFigure 18.5 or-above the threshold. Side d does not generate a node, because it has both endpoints on-or-above the threshold. And side e also does not generate a node, because it has both endpoints on-or-above the threshold. 31 All points in the grid which lie within the particular HotSpot polygon are thereby saved in a special data structure. This cumbersome one-time-process, upon completion, gives approximately all the points which make up the respective HotSpots/region of particular locations on the perspective image. To then check for the percentage overlap of the defined locations by the human user, all these coordinates are checked to see if the rectangular MER contains them. The percentage overlap of the HotSpot is first judgment of knowing human activity, i.e. for example, a person has entered the study table region, a person has entered the bed region, etc. This is the “Has Entered” type of HotSpot-based calculation. Fundamental to us is also to know if a person, who has come and sat at the study table, is that person now “Leaving” from the study-table or is the person now “Staying” there, since the behavior of all appliances may be very different in all three cases. This is more obvious in the example of the bed, where upon ‘Has Entered’ perhaps the bed-side lamp should simply switch on without disturbing any of the other appliances in the room; upon ‘Leaving’ should simply switch off the bed-side lamp, indicating that perhaps the person just sat down on the bed for a short while and has left now; and finally upon ‘Staying’ the bed-side lamp stays lit, whereas after respective due time periods the study-table lamp and then the room lights should switch off, indicating that the person was initially lying on bed and has now fallen asleep! Differentiating between the three types of HotSpot calculations in the algorithm; ‘Has Entered’ is set simply when the percentage overlap crosses the preset threshold. Once ‘Has Entered’ is set, a timer is triggered. ‘Staying’ is set if the current overlap value has decreased compared to the previous frame's overlap and thereafter also if the MER has stayed inside the HotSpot for a specified set duration of time. Once ‘Staying’ is set, the timer is then reset. To ensure that ‘Leaving’ is only triggered by a MER inside a particular HotSpot, the distance between the MER’s centre and the HotSpot’s centre is first calculated and compared to a pre-set minimum threshold. This ensures that the MER actually is within the HotSpot. Thereafter, the Overlap value being less that the earlier ‘Has Entered’ value at a lowset Overlap- threshold value (rather than plainly at 0, as motion may disappear suddenly thereby reducing the Overlap to 0 anyways then) ensures that ‘Leaving’ can now be safely set. 32 Figure 19 – The system application 33 3.3 The Decision-taking Software Engine Other than the HotSpot Overlap calculations made from the video-stream inputs, there are two other input parameters which are vital to judge appliance behavior in the system; these system-attained parameters being the Season and the Time of Day. To exemplify, for a person “Leaving” the room on a summer night, the room lights and fans should not switch off immediately, as it may well result in irritation for the person in the dark. However, had it been the summers but the daytime, it would have perhaps been alright to switch off the lights immediately, but the fans after a little while. Together, the three parameters, namely the HotSpot Overlap calculations, the Season and the Time of Day are input into the software engine. The engine, using the relational database-based expert system, checks for all defined outputs- appliance “reactions”, against the given inputs. For any given input set, there may well be all appliance-states being affected just as there may just be none. A reaction generated based on the actions triggered, is again a set comprising of three parameters- the effected appliance, its new state which is then to be set, and the triggering time. The last parameter- the triggering time is what controls the “irritation factor” in the system. As exemplified earlier, it is not desired that lights and fans be going “on” and “off” immediately, and that too at the slightest of movements, as in may become highly irritating for people. The triggering time therefore sets time-limits upon appliances after which they may switch their states, once being generated from the knowledge base. 34 3.4 The Appliance-control Mechanism A reaction, after having waited for its respective trigger-time, is then “fired”. A signal is serially transmitted, via the RS232 port, to the electronic circuitry on the breadboard. The signal, consisting of the microcontroller port information and a “byte-of-data”, contains information of the appliance to be controlled and its new state to-be. This is then interpreted by a programmed ATMEL AT89C51 microcontroller on the electronic board, which thereby identifies the precise pin to which that particular electronic device is attached to and the bit-signal (0/1) to be sent to that pin. However, as the microcontroller does not provide sufficient current to drive the relays controlling the electronic appliances (lights, fans, etc), transistors are used in midway. Hence, upon the microcontroller firing the final bit-signal, the electronic devices are successfully switched on and off. Figure 20 – The appliance control mechanism Lastly, in a real-life practical scenario, there may be scenarios with not a single, but multiple people within a room engaged in different activities. For e.g. two people may enter a room, where one sits down at the study-table to study, and the other sits on the sofa to watch television. Clearly then, there are multiple MERS formations within the environment and owing to different activities, there will be overlapping of multiple HotSpots at the same time. This, hence means, that different appliances perhaps may have to behave differently and yet in parallel. In the above example, the study-table lamp should switch on for one of the persons, and so should the softside lamp at the same time for the other. vSmart, to cater for appliance control in parallel/simultaneously, smartly employs the concept of multi-threading. For every MER formation that takes into place, a new thread is spawned. Each child thread is then responsible for all tasks starting from the HotSpot overlap calculations to the eventual reactions being fired off. Thereafter, the thread is simply killed. 35 4. PROJECT LIMITATIONS It is worthy to mention that the projects’ Computer vision-based approach, by no means, serves to be a 100% complete solution for the home automation industry. In fact, the project yet evolving from its ideation phase, as its first prototype, indeed has its significant limitations as well. Some of them are outlined below: There is no way of identifying the different choices of different people within an environment; the system lacks user-identification & prioritization. For example, Mr. X would want the study-table lamp to be switched on when he enters the room, whereas, on the contrary, Ms. Y would find that of no sensible use, and would hence desire else wise. How should the system then behave? With whom should it comply with? The system does not take into account the common “unusual” behavioral aspects of people. For example, Mr. Z may have a habit of watching television at night, whilst lying down in bed rather than seating himself on the sofa. Upon doing so, the system would eventually detect Mr. Z to be “Staying” in bed, and assuming that he is sleeping (still as he is perhaps), turn off all the room lights and appliances! The low-cost CMOS cameras fail to function in complete darkness. For example, if at night, the system detects that a person is “Staying” on bed, it turns off the rooms lights. In case that the person wakes up later at night for a glass of water, the system would not function since the normal cameras would not function in complete darkness. The very genuine privacy concerns of the people. Having to use cameras in the system for monitoring user activity in personal environments, such as bedrooms, thereby raises genuine privacy concerns and the feeling of uneasiness with people. 36 5. CONCLUSION vSmart achieves at a basic, yet a truly foundational level, a flexible and usercustomizable system which using low-cost cameras intelligently controls basic domestic appliances, such as room lights, fans and lamps in local environments, such as homes and offices. However, yet evolving from its ideation phase, as its first prototype, it merely serves to mark a niche as an innovative approach taken into the concept of homeautomation using the much-evolving scientific discipline of Computer Vision. We much firmly believe that research and further experimentation using this lateral approach and its fusion thereon with common technological gadgetries such as RFID and Infra-Red sensors can certainly much evolve these basic, yet solid and foundational, results to new epoch heights; taking the vision of Smart Houses from the realm of imagination to actual practice, and thereby achieving multidimensional user-convenience and using modern technology to endow a sustainable environment in our everyday lives. 37 REFERENCES http://www.smarthouse.com.au/Automation/Industry/R7X7C6F8?page=1 “Where is Home Automation Going?”, Richard A Quinnell http://code.google.com/p/aforge, AForge.NET, Andrew Kirillov http://www.codeproject.com/KB/audio-video/Motion_Detection.aspx, Motion Detection Algorithms, Andrew Kirillov http://www.alienryderflex.com/polygon, Point-In-Polygon Algorithm, Darel Rex Finley http://www.atmel.com/dyn/products/product_card.asp?part_id=1930, AT89C51 Microcontroller Robert L. Boylestad and Louis Nashelsky, Electronic Devices and Circuit Theory, 9th Edition 38 THE TEAM Team Members Syed Waqas Ali Burney (2004185) + 92 300 4211047 [email protected] Mutahira Ikram Khan (2004136) + 92 300 3858722 [email protected] Team Advisors Mr. Badre Munir, FCSE + 92 345 9491428 [email protected] Mr. Umar Shafique, FES + 92 321 5374563 [email protected] 39