Thursday, October 25, 2012

Face Recognition


Face, the foremost distinguishing feature of human body, making you the ‘unique you’, not only gives you an individual identity, but can also save you from security breaches and fraud transactions, can take care of your personal data, and prevent your PC, wireless network from plausible security threats!! Unlike the world of facebook, where you can wear different face every day, here it is the uniqueness of your face that makes all the difference.

What is Face Recognition, Facial RecognitionThe fast track technology has brought the world at your finger tips, be it anything, it is not more than a click away. The easier life is getting day by day, the more complex it is becoming to escape from the traps intended to crack and get access to your private data. The growth of e-commerce wholly depends on the integrity of transaction. The reason why a big percentage of people are still hesitant to employ e-commerce is the increasing cases of fraudulent fund transfer, loss of privacy and misuse of identity. End-to-end trust is must for its success. The ubiquitous methods of user id and password combinations, access cards are no longer free from security threats.
 
Such scenario demands an infallible solution, the one that cannot be hacked, shared or stolen and that solution is present with us, as an innate gift of nature, the human biological characteristics.
 
Biometrics is the study of measurable biological characteristics. It consists of several authentication techniques based on unique physical characteristics such as face, fingerprints, iris, hand geometry, retina, veins, and voice. Face recognition is a computer based security system capable of automatically verifying or identifying a person. It is one of the various techniques under Biometrics. Biometrics identifies or verifies a person based on individual’s physical characteristics by matching the real time patterns against the enrolled ones.

The quest of human minds to excel and explore the breathtaking possibilities that technology can meet, encouraged scientists in mid 1960s to teach computers to distinguish between faces. In its initial stage, the technique was semi automated. It required an administrator to calculate the distance and ratios of various features of face (eyes, nose, ears and mouth) from a reference point and compare it with the images in database. Later in 1970s, Goldstein, Harmon and Lesk tried to automate the process by using various specific subjective markers such as lip thickness, hair colour. Early approaches were cumbersome, as they required manual computations. However, it was in 1988, when Kirby and Sirovich used a standard linear algebra technique, ‘Principle Component analysis’ that reduced the computation to less than a hundred values to code a normalized face image and in 1991, scientists finally succeeded in developing real time automated face recognition system.

Facing the FACE: How it works?  
When you face a security check based on face recognition, a computer takes your picture and after a few moments, it declares you either verified or a suspect. Let us look into the inside story, which is a sequence of complex computations.
The process of recognition starts with Face detection, followed by normalization and extraction which leads to the final recognition.
 
Face Detection:
Detecting a face, an effortless task for humans, requires vigilant efforts on part of a computer.   It has to decide whether aFace Detectionpixel in an image is part of a face or not. It needs to detect faces in an image which may have a non uniform background, variations in lightning conditions and facial expressions, thus making the task a complex one. The task is comparatively easy in images with a uniform background, frontal photographs and identical poses, as in any typical mug shot or a passport photograph.
Traditionally, methods that focus on facial landmarks (such as eyes), that detect face-like colours in circular regions, or that use standard feature templates, were used to detect faces.
 
Normalization:
The detected facial images can be cropped to obtain normalized images called canonical images. In a canonical face image, the size and position of the face are normalized approximately to the predefined values and the background region is minimized. Also, the image must be standardized in terms of size, pose, illumination, etc., relative to the images in the gallery or reference database. For this purpose, it is necessary to locate the facial landmarks accurately and failing to do so can make the whole recognition task unsuccessful. Recognition can only succeed if the probe image and the gallery images are the same in terms of pose orientation, rotation, scale, size, etc and normalization is meant to achieve this goal.
 
Extraction & Recognition:
A normalized image can be processed further for feature extraction and recognition. Here, the images are converted to a mathematical representation, called biometric template or biometric reference, to store them into the database. These image database, then serves for verification and identification of probe images. This transformation of image data to mathematical representation is achieved through algorithms. Many Facial recognition algorithms have been developed to get simplified mathematical form, to carry out the task of recognition. The way the algorithms transform or translate the image data which is in form of gray scale pixels to the mathematical representation of features, differentiate them from one another. To retain maximum information in the transformation process and thus create a distinct biometric template is crucial for successful recognition. Failing to which, may cause problems like generation of biometric doubles i.e. the biometric templates from different individuals become insufficiently distinctive.

RoHS

RoHS is the acronym for Restriction of Hazardous Substances and is also known as “Lead free” (though incorrectly). RoHS directive is a European Union Directive 2002/95/EC and is applicable in all EU countries. The prime purpose of this directive is to restrict the use of hazardous substances in electric and electronic equipments with an objective of promoting environment friendly mechanism of recovery and disposal of wastes from electrical and electronic equipments. This directive restricts the use of six hazardous substances found in electrical and electronic products. Under RoHS, all electrical and electronic products destined for sale in the EU market after July 1, 2006 must pass RoHS compliance, i.e., they must be free of six hazardous substances identified by the directive. RoHS directive does not apply to spare parts for the repair or reuse of EEE put on the market before 1st Jul 2006.

Need For RoHS

5.jpg

Advancement in the electronics and associated segments since the invention of the first transistor in 1947 has been phenomenal. Today, we are surrounded by electronic gadgets which have become more or less the necessities of today’s lifestyle. Computers, TVs, embedded systems, etc. can be seen everywhere. In this phenomenal growth, one thing which has been neglected is the management of the wastes generated due to electrical and electronic equipments; the waste containing substances hazardous to human life.
E-waste is the term used for the electronic/electrical products which have completed their useful life. Management of these e-wastes has been a cause of concern around the world. The e-wastes contain lot of constituents harmful to human health. Lead used for soldering in printed circuit boards, glass panels and gaskets in computer monitors can cause damage to central and peripheral nervous systems, blood system and kidney. Chip resistors and semiconductor devices contain Cadmium which accumulates in kidney and liver and has toxic irreversible effects on human health. Relays and switches contain mercury which can contain chronic damage to the brain, respiratory and skin disorders. Cabling and computer housing contain plastics including PVC, the burning of which releases dioxin that can cause immune system damage and interfere with regulatory hormones. Plastic housing of electronic equipments and circuit boards contain Brominated flame retardants which disrupts endocrine system functions. Hexavalent chromium used for plating cause Asthmatic bronchitis and DNA damage. Improper disposal of these wastes can allow these hazardous substances to seep into air, soil and ground water causing acute problems to human life.
With an objective to counter the ill-effects of the e-wastes, several countries pressed upon the need to address the problems and challenges posed by hazardous electronic wastes. European Union issued a directive, known as RoHS – Restriction of Hazardous Substances to restrict the use of the substances in the electrical and electronic equipments. Following EU RoHS, other countries have also issued directives to handle management of the e-wastes.

Sunday, August 5, 2012

Gesture Recognition Technology


“Have you seen the remote?” “I left it on the table after watching my matinee show”. “It is not here, I will miss the news again because of you!!!” In the near future, such heated discussions over remote control won’t disturb the harmony of the house. Not because they will place it correctly but because soon remote controls will be the objects of the past. Technology has finally reached that dimension when our hands will take over the job and replace them by directly communicating with the computer or television. For instance, in order to delete a folder or file from the computer, place your palm on it, and throw it like a paper in a dustbin. Even while using the microwave oven to bake a cake, waving our hands in the air like a magician would serve as a command for the oven. Gesture RecognitionWhile some of us might be thinking of it being a futuristic vision, some of us have already experienced it through what we call “Gesture Recognition Technology
 
Since the time that the computer revolution started, human computer interaction has always been attempted to improve. Computers have now become an integral part of our lives and hence their usage should be as trouble-free as talking to someone is. Earlier the way humans interacted with this smart machine was either through keyboard or a mouse. But now attempts are being made to make the man-machine interaction as natural as possible. Fulfilling this requirement is the popular touch screen technology which is soon expected to be replaced by the gesture recognition technology.
APPLICATION
Applications of Gesture Recognition Technology
While the initial need of gesture recognition technology was only to improve the human computer interaction, it found plenty of applications as usage of computer went widespread. Currently, the following applications of gesture recognition technology are there:
·         In Video Game Controllers:  With the arrival of 6th generation video game consoles such as Microsoft X-Box with Kinect sensor, Sony PS3 with motion sensor controller, gesture recognition was widely implemented. In X-Box, often the user is the controller and has to perform all the physical movements that they desire the character in the game to do. For instance, one has to imitate kicking a football if he is playing football on any of the above listed gaming console. The Kinect sensor has a camera that catches the motions and processes it so that the character exactly does it.
 
In Sony PS3, users have to move the controller in such a way so that it imitates the action the user wants the character in the game to perform.
 
Gesture Recognition Applications
 

·         Aid to physically challenged: People who are visually impaired or have some other complexity in their motor functions can take help of gesture based input devices so that there is no discomfort while they access computers. Also, these days machine wheel chairs are coming with gesture based systems. All that is required from the user in here is to lightly move hands on the panel at the arm rest of the wheel chair. The movements of the hands will act as a controller and speed as well as direction can be easily controlled.
 
Shown below is a typical example of gesture controlled wheel chair.
 
Gesture Controlled Wheel Chair
 
·         Other Applications: Gesture recognition technology is gaining popularity in almost every area that utilizes smart machines. In aircraft traffic controls, this technology can aid in detailing every part of location information about the airplanes near to the airport. In cranes, this can be used instead of remotes so that easy picking and shedding of load can be load at difficult locations.
 
Smart TVs are nowadays coming with this technology making the user carefree about the remote and allowing him to use his hands for changing the channel or volume levels. Qualcomm has recently launched smart cameras and tablet computers that are based on this technology. The camera will recognize the proximity of the object before taking the picture and will adjust itself according to the requirements. The tablet computers with this technology will ease out the task where user has to give presentations or change songs on his juke box. He can browse all the data just by waving his hands around. Various touch screen smart phones are also incorporating this technology to provide easy access. Gesture recognition technology can also be used to make the robots understand the human gestures and make them work accordingly

BootLoader


What is BootLoader?
Bootloader is the first program which executes (before the main program) whenever a system is initialized. In PC It is used to boot he OS of the system. In case of microcontrollers, a bootloader enriches the capabilities of the microcontroller and makes them self programmable device. This article will explore the significance of having bootloader in microcontroller.
 
While working with microcontroller a common problem faced is to program the controller? Different controllers follow different protocols to program their ROM and hence every controller has a different programmer, which is difficult to be made. A universal programmer on the other hand is quite costly.
 
With the upgrading era of technology, today’s microcontrollers are not only growing powerful but also incorporate technically superior functionality which makes them more flexible and quite easy to use. The bootloader is one of them. A bootloader is a small section in the ROM of the controller which executes first when it is initialized. Generally the bootloader are written to empower a controller with self burning capabilities. The bootloader program can access any of inbuilt peripherals like USB, USART, CAN, SPI, etc. to exchange the data and this capability is used to write the flash memory. In automotive industries the controllers are encapsulated in a metal case and leaves accessibility to few pins only.. In such cases the controller is programmed with the bootloader program using CAN interface at the time of manufacturing and then it is pasted in the circuits, which provides an ease to update the code with time.
 
The bootloader can be inserted into a controller by using an external or any conventional burner and then depending on the type of bootloader the controller starts responding to the interface. So whenever the controller is reinitialized the program counter jumps to the bootloader section and then it waits there for the instruction, which is fed from external device. In case there is no bootloader the program counter will go on 0000H (starting position of the flash memory) and start executing the instructions which are written in the memory of the device.  
 
BootLoader | What is BootLoader
If the program counter enters the bootloader section then after executing the bootloader, there must be an instruction in the bootloader which will force the program counter to go to 0000H.
 
Mostly the bootloader resides in the bottom most area of the ROM but there are some cases where the boot loader can be configured in the top (like in PIC18F).The starting and ending address of the bootloader in the ROM depends on the product. So it’s recommended to use the datasheet to collect the required information

Sunday, June 17, 2012

COB ICs

The quest to fabricate more and more devices in a minimum Silicon space has been ON since J. K and R. Noyce invented the first ICs. This quest has enabled scientific community to cross various technological frontiers. Sustained efforts to put more and more transistors on a wafer have led us to nanotechnologies.
 
In the commonly used electronic technology, the semiconductor chips (also known as bare-dice) are individually mounted on a package, and wire-bonded to its I/O pins. This package is then mounted on a Printed Circuit Board (PCB). However, not only does packaging of single chip ICs cost more than the cost of the chips they contain, packaging of a chip take relatively large amount of physical space. Using a conventional single chip package and circuit board interconnect strategy, the package and interconnects took up over 50% of the timing budget as well.
 
However, there is an emerging technology where several bare die chips are mounted on a single package. This technology is known as Multi-Chip Module (MCM) technology. It can be used for both standard and ASIC chips. The resulting package can then be soldered on a PCB.
 
Chip On Board, COB IC
Although different from MCM, Chip-on-Board (COB) and Flip-Chip technologies are generally considered as related technologies. In COB technology, a semiconductor chip is placed directly on a PCB, eliminating the packaging step thereby, COB comprises of bare dice on organic laminate substrates, such as FR4, along with other SMT devices, both packaged devices and discrete components.  
 
In the Flip-Chip technology, the chip is mounted upside-down (metal contacts down), providing a direct electrical connection to the I/O pads, eliminating the wirebonding step.

CMOS Image Sensors


Advent of CMOS technology in eighties led to the phenomenal growth in semiconductor industry. Transistors have become smaller, faster, consume less power, and are cheaper to manufacture. It is CMOS technology which has enabled very high integration on the chips leading to modern high performance, miniaturized integrated circuits.
 
Apart from the valuable contribution in miniaturization of integrated circuits, CMOS technology found applications in sensing applications.CMOS Image Sensor CMOS technology has been adopted to design sensors, especially in the field of imaging. Due to the wide usage of CMOS based image sensorsCMOS sensors are often considered to be a synonym of CMOS based image sensors and have emerged as a competitor to CCD based image sensors.
 
Until recently, Charge Coupled Devices (CCDs) dominated most of the image sensing systems, i.e., cameras, camcorders, etc. CCDs have been in use in astronomical cameras, video camcorders and scanners. However of late, CMOS Imaging have emerged as an alternative to CCD imagers and it also offers better features.
 
Subsequent sections will discuss both CCD and CMOS sensor based imagers, their pros and cons, and also their applications. Further, other applications of CMOS technology in the field of sensing will be discussed.

gesture recognition technology


“Have you seen the remote?” “I left it on the table after watching my matinee show”. “It is not here, I will miss the news again because of you!!!” In the near future, such heated discussions over remote control won’t disturb the harmony of the house. Not because they will place it correctly but because soon remote controls will be the objects of the past. Technology has finally reached that dimension when our hands will take over the job and replace them by directly communicating with the computer or television. For instance, in order to delete a folder or file from the computer, place your palm on it, and throw it like a paper in a dustbin. Even while using the microwave oven to bake a cake, waving our hands in the air like a magician would serve as a command for the oven. Gesture RecognitionWhile some of us might be thinking of it being a futuristic vision, some of us have already experienced it through what we call “Gesture Recognition Technology
 
Since the time that the computer revolution started, human computer interaction has always been attempted to improve. Computers have now become an integral part of our lives and hence their usage should be as trouble-free as talking to someone is. Earlier the way humans interacted with this smart machine was either through keyboard or a mouse. But now attempts are being made to make the man-machine interaction as natural as possible. Fulfilling this requirement is the popular touch screen technology which is soon expected to be replaced by the gesture recognition technology.

Monday, January 30, 2012

ARDUINO

I was surprised to see a twelve year old boy giving life to his electronic gadgets. He was trying his hands on building his own creative toys which involved hard electronics and software skills. My zeal was on its peak to know the magical power inside the young chap. How did he understand the concepts of electronics so early? How did he develop the software? Anxiously I went down and asked him about the magic he was doing. The answer was “ARDUINO” 
Arduino image
 
Arduino is an open source electronics platform accompanied with a hardware and software to design, develop and test complex electronics prototypes and products. The hardware consists of a microcontroller with other electronic components which can be programmed using the software to do almost any task. The simplicity of the Arduino language makes it very easy for almost everyone who has an interest in electronics to write programs without the understanding of complex algorithms or codes.
 
Arduino is intended for an artist, tinker, designer or anyone, interested in playing with electronics without the knowhow of complex electronics and programming skills. Arduino is an excellent designed open source platform. It has specially designed boards which can be programmed using the Ardunio Programming Language (APL).
The presence of Arduino is not only spreading between hobbyists, but it has also expanded its roots in industries and used by experts for making prototypes of commercial products. Arduino takes off the efforts required in complex coding and designing hardware.
 
The open source nature of Arduino has been the main reason for its rapid horizontal growth. Since it is an Open Source project, all the files related to hardware and software is available for personal or commercial use. The development cost of the hardware is very small as against the costly similar proprietary products by the industrial giants. The open source nature doesn’t require any licenses to develop, use, redistribute or even sell the product. But the Arduino name is trade mark protected (Arduino™) i.e., you are free to sell the Arduino board under any other name however in order to sell it under the name “Arduino” you need to take permission from the founders and follow their quality terms.
 
The Software files which includes all the source code library are also open sourced. A user can modify them to make the project more versatile and improve its capabilities. This provides a strong online community support.