SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
AWASS 2013 Case Study
Computational Self-awareness
in Smart-Camera Networks
Lukas Esterle | LakesideLabs, Klagenfurt University
Lukas.Esterle@aau.at
Peter R. Lewis | CERCIA, University of Birmingham
• Overview of the EPiCS Project
• Surveillance and Camera Networks
• Smart-Cameras
• Multi-Camera Tracking of Objects
• Challenges in Smart-Camera Networks for the week
• Self-Awareness in Smart-Camera Networks
• Prerequisites
2
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
Outline of this talk
The EPiCS Project: Motivation
3
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• What are the characteristics of future complex systems?
Large Heterogeneous
Uncertain
Dynamic Decentralised
The EPiCS Project: Motivation
4
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• We are increasingly faced with systems that are …
… and often have conflicting requirements!
Large Heterogeneous
Uncertain
Dynamic
Decentralised
• Requirements of the application domain can conflict in
functionality, performance, resource usage, costs,
reliability, safety and security.
• Design systems as collections of self-aware and
self-expressive nodes.
– Use online learning and adapt to specific scenario
– Algorithm selection during runtime focused on goals of node
– Interaction between nodes to drive global behaviour.
The EPiCS Project: Motivation
5
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
6
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• High performance computing
cluster for financial applications
• Multi-camera networks for multi-
object tracking
• Hypermusic
Surveillance and Camera Networks
7
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
Image: http://commons.wikimedia.org/wiki/File:Three_Surveillance_cameras.jpg
up to
4.2 million
CCTV cameras in the UK
McCahill, Michael, and Clive Norris. "CCTV
in Britain." Center for Criminology and
Criminal Justice-University of Hull-United
Kingdom (2002): 1-70.
• Use of Camera Systems
– Traffic monitoring
– Crime prevention
– Crowd control
– Surveillance production lines
– Building monitoring
– Person & Object tracking
Surveillance Cameras
9
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
Image: http://www.fh-wien.ac.at/uploads/pics/080611_Asfinag.JPG
• Tracking is the process of identifying and locating a (moving)
predefined ‘model’ within consecutive frames of a video.
Person & Object Tracking
10
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• Tracking is the process of identifying and locating a (moving)
predefined ‘model’ within consecutive frames of a video.
• Drawbacks of using ‘dumb’ cameras
– Raw video data
– Data has to be transmitted & stored
– Data has to be processed
– Privacy issues
Person & Object Tracking
11
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• Smart cameras combine processing unit with image sensor
– General purpose smart-cameras from off-the-shelf components
– Special purpose smart-cameras for specific applications
• Allows to process images on the camera
– Raw image data does not need to leave the camera
– Operator only gets relevant and/or aggregated data
– Operator only gets information about certain events
Smart-Cameras
12
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• Flexible high-performance platform running Linux
– PandaBoardes as main board with USB / CSI / GPMC connected
components
– TI OMAP 4460 processor, 2x ARM Cortex A9 @ 1.2 GHz, 2x Cortex M3
– 1GB DDR2 SDRAM
– SD-Card, USB, DVI, HDMI, audio
– 802.11 b/g/n
– Bluetooth 2.1 + Bluetooth 4 Low Energy
– Ubuntu 12.04 Linux
• Camera modules
– USB
– Camera Serial Interface (CSI)
– External module connected via GPMC using FPGA
Smart-Cameras
13
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
Multi-Camera Tracking of Objects
15
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
Camera 1 Camera 2 Camera 3
?
Camera 4
• Which camera to continue tracking?
• Identify next camera a priori
or use a server or operator.
• What about dynamics / uncertainties?
Distributed Tracking
16
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• Use auctions for exchanging tracking responsibilities
– Cameras act as self-interested agents, i.e., maximize their own utility
– Selling camera (currently tracking object) opens the auction
– Other cameras return bids with price corresponding to “tracking” confidence
– Camera with highest bid continues tracking;
trading based on Vickrey auction Bid C4
Camera 1 Camera 2
Camera 3
Camera 4
Init
auction
Bid C3
Fully distributed approach
no a-priori topology knowledge required
• On the node level
– How maximise utility while minimise communication
– When and how to advertise objects to other cameras
– How to value objects within the field of view of a camera
• On the network level
– How to define good camera strategies to optimise the network-wide
outcome
Challenges in Multi-Camera Tracking
17
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• Cameras build models/knowledge about the behaviour of the
objects to be tracked
• Cameras derive models/knowledge from the objects
behaviour about themselves
• Cameras create models/knowledge about their immediate
environment
• Cameras derive models/knowledge about their neighbouring
cameras
Self-awareness in Multi-Camera Systems
18
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• You will be provided:
– The open-source simulation environment CamSim
allowing you to simulate object tracking in multi-camera networks
– Various scenarios for the simulation tool
– Matlab scripts for evaluation of your simulation results
Main objective for the week:
Come up with a distributed way to assign tracking
responsibilities in a smart camera network; preserving
resources and keeping high tracking utility alike.
Self-awareness in Multi-Camera Systems
19
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• During the week, you can expect to do the following:
– Learn about the difficulties in camera coordination for distributed tracking
– Work with provided strategies for distributed coordination of tracking
responsibilities
– Build your own scenarios with the provided simulation tool
– Come up with your own strategy or modify one of the existing strategies
to assign tracking responsibilities in a distributed camera network
– Optionally, you may want to relax one of the assumptions made in the
simulation tool or come up with your own project for self-awareness in
distributed smart-camera networks
Self-awareness in Multi-Camera Systems
20
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• Proficiency in Java
• At least one member in the team with some experience with
machine learning tools and techniques (the more the better).
• Knowledge of Matlab is a plus
Prerequisites
21
AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
• HOW?
Compose a self-contained,
short video explaining self-
awareness accessible to a
broad audience
• WHEN?
Submission Deadline:
July 31, 2013
• DETAILS
www.epics-project.eu/contest

Contenu connexe

Similaire à Computational Self-awareness in Smart-Camera Networks - Lukas Esterle

Cassandra presentation
Cassandra presentationCassandra presentation
Cassandra presentationvilabs
 
AmI 2015 - Design Process
AmI 2015 - Design ProcessAmI 2015 - Design Process
AmI 2015 - Design ProcessFulvio Corno
 
Project COLA - Cloud Orchestration at the Level of Application - Introductio...
Project COLA - Cloud Orchestration at the Level of Application -  Introductio...Project COLA - Cloud Orchestration at the Level of Application -  Introductio...
Project COLA - Cloud Orchestration at the Level of Application - Introductio...Project COLA
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementIoannis Krontiris
 
[Gp][final seminar][presentation]
[Gp][final seminar][presentation][Gp][final seminar][presentation]
[Gp][final seminar][presentation]anas_awad
 
Event-Handling Based Smart Video Surveillance System
Event-Handling Based Smart Video Surveillance SystemEvent-Handling Based Smart Video Surveillance System
Event-Handling Based Smart Video Surveillance SystemCSCJournals
 
An optimized framework for detection and tracking of video objects in challen...
An optimized framework for detection and tracking of video objects in challen...An optimized framework for detection and tracking of video objects in challen...
An optimized framework for detection and tracking of video objects in challen...ijma
 
An Open and Improved VISIR System Through PILAR Federation for Electrical/Ele...
An Open and Improved VISIR System Through PILAR Federation for Electrical/Ele...An Open and Improved VISIR System Through PILAR Federation for Electrical/Ele...
An Open and Improved VISIR System Through PILAR Federation for Electrical/Ele...Manuel Castro
 
First CASSANDRA Webinar Presentation
First CASSANDRA Webinar PresentationFirst CASSANDRA Webinar Presentation
First CASSANDRA Webinar PresentationCassandra Project
 
First Cassandra Webinar Presentation
First Cassandra Webinar PresentationFirst Cassandra Webinar Presentation
First Cassandra Webinar PresentationSteve Baynes
 
Considering People with Disabilities as Überusers for Eliciting Generalisable...
Considering People with Disabilities as Überusers for Eliciting Generalisable...Considering People with Disabilities as Überusers for Eliciting Generalisable...
Considering People with Disabilities as Überusers for Eliciting Generalisable...Markel Vigo
 
What's with All This Talk About Coverage?
What's with All This Talk About Coverage?What's with All This Talk About Coverage?
What's with All This Talk About Coverage?DVClub
 
Autonomous driving publications
Autonomous driving publicationsAutonomous driving publications
Autonomous driving publicationsTal Genkin
 
BUTLER project presentation
BUTLER project presentationBUTLER project presentation
BUTLER project presentationbutler-iot
 
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"Satnam Singh
 
Cloud-Computing-Course-Description-and-Syllabus-Spring2020.pdf
Cloud-Computing-Course-Description-and-Syllabus-Spring2020.pdfCloud-Computing-Course-Description-and-Syllabus-Spring2020.pdf
Cloud-Computing-Course-Description-and-Syllabus-Spring2020.pdfKanagarajSubramani1
 
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETIRJET Journal
 
Distinguished Speakers - Professor Marta Kwiatkowska
Distinguished Speakers -  Professor Marta KwiatkowskaDistinguished Speakers -  Professor Marta Kwiatkowska
Distinguished Speakers - Professor Marta Kwiatkowskaoxwocs
 

Similaire à Computational Self-awareness in Smart-Camera Networks - Lukas Esterle (20)

Cassandra presentation
Cassandra presentationCassandra presentation
Cassandra presentation
 
AmI 2015 - Design Process
AmI 2015 - Design ProcessAmI 2015 - Design Process
AmI 2015 - Design Process
 
Project COLA - Cloud Orchestration at the Level of Application - Introductio...
Project COLA - Cloud Orchestration at the Level of Application -  Introductio...Project COLA - Cloud Orchestration at the Level of Application -  Introductio...
Project COLA - Cloud Orchestration at the Level of Application - Introductio...
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
[Gp][final seminar][presentation]
[Gp][final seminar][presentation][Gp][final seminar][presentation]
[Gp][final seminar][presentation]
 
Event-Handling Based Smart Video Surveillance System
Event-Handling Based Smart Video Surveillance SystemEvent-Handling Based Smart Video Surveillance System
Event-Handling Based Smart Video Surveillance System
 
PROSPECT - PROactive Safety for PEdestrians and CyclisTs
PROSPECT - PROactive Safety for PEdestrians and CyclisTsPROSPECT - PROactive Safety for PEdestrians and CyclisTs
PROSPECT - PROactive Safety for PEdestrians and CyclisTs
 
An optimized framework for detection and tracking of video objects in challen...
An optimized framework for detection and tracking of video objects in challen...An optimized framework for detection and tracking of video objects in challen...
An optimized framework for detection and tracking of video objects in challen...
 
An Open and Improved VISIR System Through PILAR Federation for Electrical/Ele...
An Open and Improved VISIR System Through PILAR Federation for Electrical/Ele...An Open and Improved VISIR System Through PILAR Federation for Electrical/Ele...
An Open and Improved VISIR System Through PILAR Federation for Electrical/Ele...
 
FINAL PPT ALL.pptx
FINAL PPT ALL.pptxFINAL PPT ALL.pptx
FINAL PPT ALL.pptx
 
First CASSANDRA Webinar Presentation
First CASSANDRA Webinar PresentationFirst CASSANDRA Webinar Presentation
First CASSANDRA Webinar Presentation
 
First Cassandra Webinar Presentation
First Cassandra Webinar PresentationFirst Cassandra Webinar Presentation
First Cassandra Webinar Presentation
 
Considering People with Disabilities as Überusers for Eliciting Generalisable...
Considering People with Disabilities as Überusers for Eliciting Generalisable...Considering People with Disabilities as Überusers for Eliciting Generalisable...
Considering People with Disabilities as Überusers for Eliciting Generalisable...
 
What's with All This Talk About Coverage?
What's with All This Talk About Coverage?What's with All This Talk About Coverage?
What's with All This Talk About Coverage?
 
Autonomous driving publications
Autonomous driving publicationsAutonomous driving publications
Autonomous driving publications
 
BUTLER project presentation
BUTLER project presentationBUTLER project presentation
BUTLER project presentation
 
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
The Fifth Elephant - 2013 Talk - "Smart Analytics in Smartphones"
 
Cloud-Computing-Course-Description-and-Syllabus-Spring2020.pdf
Cloud-Computing-Course-Description-and-Syllabus-Spring2020.pdfCloud-Computing-Course-Description-and-Syllabus-Spring2020.pdf
Cloud-Computing-Course-Description-and-Syllabus-Spring2020.pdf
 
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNETROAD POTHOLE DETECTION USING YOLOV4 DARKNET
ROAD POTHOLE DETECTION USING YOLOV4 DARKNET
 
Distinguished Speakers - Professor Marta Kwiatkowska
Distinguished Speakers -  Professor Marta KwiatkowskaDistinguished Speakers -  Professor Marta Kwiatkowska
Distinguished Speakers - Professor Marta Kwiatkowska
 

Plus de FET AWARE project - Self Awareness in Autonomic Systems

Plus de FET AWARE project - Self Awareness in Autonomic Systems (20)

Academic Course: 13 Applications of and Challenges in Self-Awareness
Academic Course: 13 Applications of and Challenges in Self-AwarenessAcademic Course: 13 Applications of and Challenges in Self-Awareness
Academic Course: 13 Applications of and Challenges in Self-Awareness
 
Academic Course: 12 Safety and Ethics
Academic Course: 12 Safety and EthicsAcademic Course: 12 Safety and Ethics
Academic Course: 12 Safety and Ethics
 
Academic Course: 08 Pattern-based design of autonomic systems
Academic Course: 08 Pattern-based design of autonomic systemsAcademic Course: 08 Pattern-based design of autonomic systems
Academic Course: 08 Pattern-based design of autonomic systems
 
Academic Course: 07 Introduction to the Formal Engineering of Autonomic Systems
Academic Course: 07 Introduction to the Formal Engineering of Autonomic SystemsAcademic Course: 07 Introduction to the Formal Engineering of Autonomic Systems
Academic Course: 07 Introduction to the Formal Engineering of Autonomic Systems
 
Academic Course: 06 Morphogenetic Engineering
Academic Course: 06 Morphogenetic EngineeringAcademic Course: 06 Morphogenetic Engineering
Academic Course: 06 Morphogenetic Engineering
 
Academic Course: 04 Introduction to complex systems and agent based modeling
Academic Course: 04 Introduction to complex systems and agent based modelingAcademic Course: 04 Introduction to complex systems and agent based modeling
Academic Course: 04 Introduction to complex systems and agent based modeling
 
Academic Course: 03 Autonomic Multi-Agent Systems
Academic Course: 03 Autonomic Multi-Agent SystemsAcademic Course: 03 Autonomic Multi-Agent Systems
Academic Course: 03 Autonomic Multi-Agent Systems
 
Academic Course: 02 Self-organization and emergence in networked systems
Academic Course: 02 Self-organization and emergence in networked systemsAcademic Course: 02 Self-organization and emergence in networked systems
Academic Course: 02 Self-organization and emergence in networked systems
 
Academic Course: 01 Self-awarenesss and Computational Self-awareness
Academic Course: 01 Self-awarenesss and Computational Self-awarenessAcademic Course: 01 Self-awarenesss and Computational Self-awareness
Academic Course: 01 Self-awarenesss and Computational Self-awareness
 
Awareness: Layman Seminar Slides
Awareness: Layman Seminar SlidesAwareness: Layman Seminar Slides
Awareness: Layman Seminar Slides
 
Industry Training: 03 Awareness Simulation
Industry Training: 03 Awareness SimulationIndustry Training: 03 Awareness Simulation
Industry Training: 03 Awareness Simulation
 
Industry Training: 02 Awareness Properties
Industry Training: 02 Awareness PropertiesIndustry Training: 02 Awareness Properties
Industry Training: 02 Awareness Properties
 
Industry Training: 01 Awareness Overview
Industry Training: 01 Awareness OverviewIndustry Training: 01 Awareness Overview
Industry Training: 01 Awareness Overview
 
Robot Swarms as Ensembles of Cooperating Components - Matthias Holzl
Robot Swarms as Ensembles of Cooperating Components - Matthias HolzlRobot Swarms as Ensembles of Cooperating Components - Matthias Holzl
Robot Swarms as Ensembles of Cooperating Components - Matthias Holzl
 
Towards Systematically Engineering Ensembles - Martin Wirsing
Towards Systematically Engineering Ensembles - Martin WirsingTowards Systematically Engineering Ensembles - Martin Wirsing
Towards Systematically Engineering Ensembles - Martin Wirsing
 
Capturing the Immune System: From the wet-­lab to the robot, building better ...
Capturing the Immune System: From the wet-­lab to the robot, building better ...Capturing the Immune System: From the wet-­lab to the robot, building better ...
Capturing the Immune System: From the wet-­lab to the robot, building better ...
 
Underwater search and rescue in swarm robotics - Mark Read
Underwater search and rescue in swarm robotics - Mark Read Underwater search and rescue in swarm robotics - Mark Read
Underwater search and rescue in swarm robotics - Mark Read
 
Why Robots may need to be self-­‐aware, before we can really trust them - Ala...
Why Robots may need to be self-­‐aware, before we can really trust them - Ala...Why Robots may need to be self-­‐aware, before we can really trust them - Ala...
Why Robots may need to be self-­‐aware, before we can really trust them - Ala...
 
Morphogenetic Engineering: Reconciling Architecture and Self-Organization Thr...
Morphogenetic Engineering: Reconciling Architecture and Self-Organization Thr...Morphogenetic Engineering: Reconciling Architecture and Self-Organization Thr...
Morphogenetic Engineering: Reconciling Architecture and Self-Organization Thr...
 
Ensemble-oriented programming of self-adaptive systems - Michele Loreti
Ensemble-oriented programming of self-adaptive systems - Michele LoretiEnsemble-oriented programming of self-adaptive systems - Michele Loreti
Ensemble-oriented programming of self-adaptive systems - Michele Loreti
 

Dernier

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Computational Self-awareness in Smart-Camera Networks - Lukas Esterle

  • 1. AWASS 2013 Case Study Computational Self-awareness in Smart-Camera Networks Lukas Esterle | LakesideLabs, Klagenfurt University Lukas.Esterle@aau.at Peter R. Lewis | CERCIA, University of Birmingham
  • 2. • Overview of the EPiCS Project • Surveillance and Camera Networks • Smart-Cameras • Multi-Camera Tracking of Objects • Challenges in Smart-Camera Networks for the week • Self-Awareness in Smart-Camera Networks • Prerequisites 2 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013 Outline of this talk
  • 3. The EPiCS Project: Motivation 3 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013 • What are the characteristics of future complex systems? Large Heterogeneous Uncertain Dynamic Decentralised
  • 4. The EPiCS Project: Motivation 4 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013 • We are increasingly faced with systems that are … … and often have conflicting requirements! Large Heterogeneous Uncertain Dynamic Decentralised
  • 5. • Requirements of the application domain can conflict in functionality, performance, resource usage, costs, reliability, safety and security. • Design systems as collections of self-aware and self-expressive nodes. – Use online learning and adapt to specific scenario – Algorithm selection during runtime focused on goals of node – Interaction between nodes to drive global behaviour. The EPiCS Project: Motivation 5 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 6. 6 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013 • High performance computing cluster for financial applications • Multi-camera networks for multi- object tracking • Hypermusic
  • 7. Surveillance and Camera Networks 7 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013 Image: http://commons.wikimedia.org/wiki/File:Three_Surveillance_cameras.jpg up to 4.2 million CCTV cameras in the UK McCahill, Michael, and Clive Norris. "CCTV in Britain." Center for Criminology and Criminal Justice-University of Hull-United Kingdom (2002): 1-70.
  • 8. • Use of Camera Systems – Traffic monitoring – Crime prevention – Crowd control – Surveillance production lines – Building monitoring – Person & Object tracking Surveillance Cameras 9 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013 Image: http://www.fh-wien.ac.at/uploads/pics/080611_Asfinag.JPG
  • 9. • Tracking is the process of identifying and locating a (moving) predefined ‘model’ within consecutive frames of a video. Person & Object Tracking 10 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 10. • Tracking is the process of identifying and locating a (moving) predefined ‘model’ within consecutive frames of a video. • Drawbacks of using ‘dumb’ cameras – Raw video data – Data has to be transmitted & stored – Data has to be processed – Privacy issues Person & Object Tracking 11 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 11. • Smart cameras combine processing unit with image sensor – General purpose smart-cameras from off-the-shelf components – Special purpose smart-cameras for specific applications • Allows to process images on the camera – Raw image data does not need to leave the camera – Operator only gets relevant and/or aggregated data – Operator only gets information about certain events Smart-Cameras 12 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 12. • Flexible high-performance platform running Linux – PandaBoardes as main board with USB / CSI / GPMC connected components – TI OMAP 4460 processor, 2x ARM Cortex A9 @ 1.2 GHz, 2x Cortex M3 – 1GB DDR2 SDRAM – SD-Card, USB, DVI, HDMI, audio – 802.11 b/g/n – Bluetooth 2.1 + Bluetooth 4 Low Energy – Ubuntu 12.04 Linux • Camera modules – USB – Camera Serial Interface (CSI) – External module connected via GPMC using FPGA Smart-Cameras 13 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 13. Multi-Camera Tracking of Objects 15 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013 Camera 1 Camera 2 Camera 3 ? Camera 4 • Which camera to continue tracking? • Identify next camera a priori or use a server or operator. • What about dynamics / uncertainties?
  • 14. Distributed Tracking 16 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013 • Use auctions for exchanging tracking responsibilities – Cameras act as self-interested agents, i.e., maximize their own utility – Selling camera (currently tracking object) opens the auction – Other cameras return bids with price corresponding to “tracking” confidence – Camera with highest bid continues tracking; trading based on Vickrey auction Bid C4 Camera 1 Camera 2 Camera 3 Camera 4 Init auction Bid C3 Fully distributed approach no a-priori topology knowledge required
  • 15. • On the node level – How maximise utility while minimise communication – When and how to advertise objects to other cameras – How to value objects within the field of view of a camera • On the network level – How to define good camera strategies to optimise the network-wide outcome Challenges in Multi-Camera Tracking 17 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 16. • Cameras build models/knowledge about the behaviour of the objects to be tracked • Cameras derive models/knowledge from the objects behaviour about themselves • Cameras create models/knowledge about their immediate environment • Cameras derive models/knowledge about their neighbouring cameras Self-awareness in Multi-Camera Systems 18 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 17. • You will be provided: – The open-source simulation environment CamSim allowing you to simulate object tracking in multi-camera networks – Various scenarios for the simulation tool – Matlab scripts for evaluation of your simulation results Main objective for the week: Come up with a distributed way to assign tracking responsibilities in a smart camera network; preserving resources and keeping high tracking utility alike. Self-awareness in Multi-Camera Systems 19 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 18. • During the week, you can expect to do the following: – Learn about the difficulties in camera coordination for distributed tracking – Work with provided strategies for distributed coordination of tracking responsibilities – Build your own scenarios with the provided simulation tool – Come up with your own strategy or modify one of the existing strategies to assign tracking responsibilities in a distributed camera network – Optionally, you may want to relax one of the assumptions made in the simulation tool or come up with your own project for self-awareness in distributed smart-camera networks Self-awareness in Multi-Camera Systems 20 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 19. • Proficiency in Java • At least one member in the team with some experience with machine learning tools and techniques (the more the better). • Knowledge of Matlab is a plus Prerequisites 21 AWASS 2013 Case Study | Lukas Esterle | June 24, 2013
  • 20. • HOW? Compose a self-contained, short video explaining self- awareness accessible to a broad audience • WHEN? Submission Deadline: July 31, 2013 • DETAILS www.epics-project.eu/contest