Computer scientists develop smart, less obtrusive tracking system

Mar 04, 2011

(PhysOrg.com) -- Researchers at the University at Buffalo and Amrita University in India have developed the framework for a smart environment that can track people's whereabouts without the use of invasive technologies such as constant filming or radio frequency identification (RFID) tags. The new tracking method could improve safety and security in nursing homes, hospitals and other closed spaces while providing occupants with freedom from continuous surveillance.

"Our goal is to develop systems that could enhance quality of life at homes and hospitals; productivity at the workplace; and security of critical spaces," said Bharat Jayaraman, a professor of and engineering at UB and a principal investigator of the project. "We want technology to be natural and unobtrusive. We don't want you to carry around an tag, and we don't want cameras everywhere. We want technology to be assistive, and not become Big Brother."

A peer-reviewed paper, "Three R's of Cyber-Physical Spaces," describing the new tracking method appears online in Computer, the flagship magazine of the IEEE Computer Society and the print edition will carry the article in a future issue.

The research also will be presented next week at the "Indo-US Workshop on Developing a Research Agenda in Pervasive Communications and Computing Collaboration (PC3)," co-sponsored by the National Science Foundation.

Here's how the new system works: First, administrators place video cameras that capture a person's face, gait or height at entryways within a building, such as doors that separate one room from another. When a person passes through an access point, the camera registers his presence and feeds the information to a computer.

The computer then compares the individual's biometric characteristics against a database containing the biometrics of all building occupants. Because of variations in room lighting, camera angle, facial expression and other details, the computer can only make an initial guess about who an individual might be.

To increase the accuracy of the identification, the computer employs reasoning, making a judgment on whether it is possible for a person to be at a certain location based on his trajectory and the building's spacial layout.

For instance, because it would be impossible for a person identified in a hospital lobby to immediately move into a room in a distant wing of the building, the computer would deduce that no person in the lobby could also be moving around the far wing. This "spatio-temporal" reasoning helps to eliminate "false positives," as the system only identifies individuals with valid trajectories.

When researchers ran computer simulations of the , they were able to identify and trace the whereabouts of individuals with a high degree of accuracy, even when employing images from low-quality cameras as the means of identification.

The tracking solution that the three collaborators devised is elegant, combining recognition, reasoning and information retrieval--three areas of computer science that are studied heavily but usually separately—within a unified framework known as a state-transition system.

In computer science, a state-transition system is a way of modeling dynamic environments by monitoring how specific changes alter the state of a given environment. In the case of the new tracking system, the "state" of a building is defined by the location of its occupants. (Specifically, a "state" consists of the set of probabilities describing where every occupant in a building might be at a given time.) A change in state, called a "state transition," takes place each time a person moves from one room to another.

Besides Jayaraman, the team that developed the tracking system included Vivek Menon, an assistant professor of information systems at Amrita University in India, and Venu Govindaraju, a SUNY Distinguished Professor of computer science and engineering at UB. Menon was a visiting research scientist at UB's Center for Unified Biometrics and Sensors from 2007 to 2009. Govindaraju is director of that center, and Jayaraman is a member of the advisory board.

Explore further: Computerized emotion detector

Related Stories

Technology would help detect terrorists before they strike

Oct 05, 2007

Are you a terrorist? Airport screeners, customs agents, police officers and members of the military who silently pose that question to people every day, may soon have much more than intuition to depend on to determine the ...

Tell me by the way I walk

Jun 09, 2008

Biometrics is commonly associated retinal scans, iris recognition and DNA databases, but researchers in India are working on another form of biometrics that could allow law enforcement agencies and airport security to recognize ...

Study: RFID tags are virus vulnerable

Mar 15, 2006

Computer experts at an international conference in Italy say they've determined radio frequency identification technology is virus vulnerable.

Recommended for you

Computerized emotion detector

3 hours ago

Face recognition software measures various parameters in a mug shot, such as the distance between the person's eyes, the height from lip to top of their nose and various other metrics and then compares it with photos of people ...

Cutting the cloud computing carbon cost

Sep 12, 2014

Cloud computing involves displacing data storage and processing from the user's computer on to remote servers. It can provide users with more storage space and computing power that they can then access from anywhere in the ...

Teaching computers the nuances of human conversation

Sep 12, 2014

Computer scientists have successfully developed programs to recognize spoken language, as in automated phone systems that respond to voice prompts and voice-activated assistants like Apple's Siri.

Mapping the connections between diverse sets of data

Sep 12, 2014

What is a map? Most often, it's a visual tool used to demonstrate the relationship between multiple places in geographic space. They're useful because you can look at one and very quickly pick up on the general ...

User comments : 6

Adjust slider to filter visible comments by rank

Display comments: newest first

NotAsleep
2 / 5 (1) Mar 04, 2011
"To increase the accuracy of the identification, the computer employs reasoning, making a judgment on whether it is possible for a person to be at a certain location based on his trajectory and the building's spacial layout.

For instance, because it would be impossible for a person identified in a hospital lobby to immediately move into a room in a distant wing of the building, the computer would deduce that no person in the lobby could also be moving around the far wing."

Defeating this system should be a level on "Ninja Warrior"
stealthc
5 / 5 (1) Mar 04, 2011
no thanks, you all can keep your systems. Not for me. Put me under this level of systemmic control and I will do whatever it takes to defeat it.

How about you guys? I say we tell this sick company where to shove their nazi technology.
Caliban
not rated yet Mar 05, 2011
"We want technology to be natural and unobtrusive. We don't want you to carry around an RFID tag, and we don't want cameras everywhere. We want technology to be assistive, and not become Big Brother."


They really spelled it out -merely asserting the opposite- using the principle of reverse psychology to eliminate fears of Big Brother. Ideally, this the groundwork for BB 2.0, and individuals won't need to be bar-coded or RFID'd. in other words, lulled into a sense of false "security".

Just remember to smile for the camera!

I'm with stealh -I want no part of rhis. The opportunity for abuse is only too apparent. Security organizations of any stripe should have to earn their bread the same way as everyone else -by WORKING for it.

semmsterr
not rated yet Mar 05, 2011
Bases on the comments I've seen so far... I want this on my building!!
Beard
not rated yet Mar 08, 2011
So...you bend over a bit and cover your face when you walk through a door and thus defeat the entire system?
kaasinees
1 / 5 (1) Mar 08, 2011
sickenin article.
Also wondering how they watch a persons biometrics without a camera which they claim they dont need, what a hoax.