Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/1921
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rasanayagam, K | - |
dc.contributor.author | Kumarasiri, S. D. D. C | - |
dc.contributor.author | Tharuka, W. A. D. D | - |
dc.contributor.author | Samaranayake, N. T | - |
dc.contributor.author | Samarasinghe, P | - |
dc.contributor.author | Siriwardana, S. E. R | - |
dc.date.accessioned | 2022-04-06T09:03:07Z | - |
dc.date.available | 2022-04-06T09:03:07Z | - |
dc.date.issued | 2018-12-21 | - |
dc.identifier.citation | K. Rasanayagam, S. D. D. C. Kumarasiri, W. A. D. D. Tharuka, N. T. Samaranayake, P. Samarasinghe and S. E. R. Siriwardana, "CIS: An Automated Criminal Identification System," 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS), 2018, pp. 1-6, doi: 10.1109/ICIAFS.2018.8913367. | en_US |
dc.identifier.issn | 2151-1810 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/1921 | - |
dc.description.abstract | The identification of criminals and terrorists is a primary task for police, military and security forces. The terrorist activities and crime rate had increased abnormally. Combating them is a challenging task for all security departments. Presently, these departments are using latest technologies. But they have not enough efficient and accuracy as they expected This research study is based on the analysis of faces, emotions, Ages and genders to identify the suspects. Face recognition, emotion, age and gender identifications are implemented using deep learning based CNN approaches. Suits identification is based on LeNet architecture. In the implementation phase for the classification purpose, Keras deep learning library is used, which is implemented on top of Tensorflow. IMDb is the dataset used for the whole training purpose. Training is performed using in AWS cloud which is more powerful and capable way of training instead of using local machines. Real-time Video and images are taken for the experiment. Results of the training and predictions are discussed below in brief. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2018 IEEE International Conference on Information and Automation for Sustainability (ICIAfS);Pages 1-6 | - |
dc.subject | CIS | en_US |
dc.subject | Automated | en_US |
dc.subject | Criminal Identification System | en_US |
dc.title | CIS: an automated criminal identification system | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICIAFS.2018.8913367 | en_US |
Appears in Collections: | Department of Information Technology-Scopes Research Papers - IEEE Research Papers - SLIIT Staff Publications Research Publications -Dept of Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
CIS_An_Automated_Criminal_Identification_System.pdf Until 2050-12-31 | 1.41 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.