Page 177 - Kaleidoscope Academic Conference Proceedings 2020
P. 177

Industry-driven digital transformation




           2.2.1  Primary screening                           3.1  Generation of a suspicious object database via
                                                                  simulation
           In the preliminary screening, the visible light camera can
           monitor each person in the surveillance area and record  To establish a suspicious object database composed of various
           their facial images and related information. At the same  passive sensor images by simulation, two parameters should
           time, the W-band radars can identify whether any person  be considered.  First, we should consider the simulation
           carries a suspicious object (metal, etc.) 15 meters away.  environment of the entire system, including temperature,
           During this process, the suspicious object detection system  reflection, blur, variation, and noise. Then, the parameters of
           will automatically pair the millimeter-wave image and visible  suspicious objects should be considered, including the type,
           light image for the detected same person. If a suspicious  size, rotation, transformation, etc. To this end, we generated
           person is detected, the system will automatically track it and  44 kinds of bottles, 41 kinds of forks, 37 kinds of knives and
           send the security staff the relevant information to conduct a  45 kinds of scissors through simulation, with a total of 10516,
           secondary screening.                               9799, 8843, and 10755 samples, respectively.

           2.2.2  Secondary screening                         3.2  Generation of a suspicious object database by means
                                                                  of active/passive imagers
           In the secondary screening, a hybrid imager composed of
           active and passive imagers will be employed to identify the  In addition to simulation, we also generate real experimental
           detailed suspicious objects (knife, gun, scissors, etc.) the  images for a suspicious object database through active or
           suspicious person is holding. In this process, visible light  passive millimeter-wave imaging. In this system, we built
           cameras will also be used to help security staff identify  a simple anechoic chamber using active/passive imagers
           suspicious persons, and the generated visible light images  to generate real image data.  Active or passive imagers
           will be associated with millimeter-wave images. Moreover,  generate millimeter-wave experimental images by letting the
           AI technology is used in this stage to increase the recognition  experimenter carry different numbers and types of suspicious
           probability for suspicious objects.                objects (knives, simulated bombs, guns, liquids, phones, etc.).
                                                              During the experiment, the position of the experimenter and
           2.3 AI-based suspicious object recognition technologies  the direction of suspicious object changes all the time, which
                                                              is kept as consistent as possible with the actual scene. Usually,
           In order to increase the probability of identifying suspicious  suspicious objects are hidden in clothes or bags. In addition
           objects in this system, we used AI technology to assist  to this, we will also try to wrap suspicious objects with
           this process, which is based on the developed suspicious  different kinds of items (clothes, cotton, etc.). Throughout the
           object database.  Between different AI technologies, the  experiment, 52 samples were generated by the active imager,
           convolutional neural network (CNN) [4] is a representative  and 1009 samples were generated by the passive imager.
           deep-learning technology for image recognition and image
           classification.  Two critical features of CNN, which  3.3 Generation of a suspicious object database via GAN
           make it special with other neural networks, are reducing
           the computational complexity and ensuring translational  3.3.1  Fundamental of GAN
           invariance. It mainly comprises two sections. The first
                                                              According to the description of [11], GAN was first proposed
           section is used to extract the features and includes the
                                                              in [12].  It studies a two-player minimax game between
           convolutional layer, pooling layer, batch normalization layer.
                                                              a generative network   and a discriminative network  .
           The second section is in the same way as a neural network
                                                              Taking noisy sample I ∼ ?(I) (sampled from a normal or
           works and used to make the classification, which includes
                                                              uniform distribution) as the input, the generative network
           flatten layer, fully connected layer. In this paper, we directly
                                                                outputs new data  (I), whose distribution ? 6 should be
           use CNN technology so the performance of the AI part
                                                              close to that of the data distribution ? 30C0 . At the same
           is determined by the CNN. Because the emphasis of this
                                                              time, the discriminative network   is used to distinguish the
           paper is to verify the feasibility of generating millimeter-wave
                                                              generated sample  (I) ∼ ? 6 ( (I)). and the true data sample
           images of suspicious objects for AI training through GAN and
                                                              G ∼ ? 30C0 (G). In the original GAN, this adversarial training
           evaluate the factors that will affect the AI recognition rate,
                                                              process was expressed as
           rather than the CNN itself, the technical details of CNN will
           not be described here.
                                                               <8=<0G                      [;>6(1− ( (I)))] (1)
           3.  SUSPICIOUS OBJECT DATABASE TO SUPPORT                   G∼? 30C0  [;>6 (G)]+  G∼? I
                AI-BASED RECOGNITION TECHNOLOGIES
                                                              3.3.2  Image generation via GAN
           The AI-based suspicious object detection technology can be
           employed to increase the recognition probability of suspicious  GAN consists of two neural networks. In Figure 3, one of
           objects in this system. To this end, there are three ways to  the components is Generator, which as the name implies,
           build a suspicious object database: simulation, active/passive  generates data.  The Generator inputs random noise (I)
           imager, and GAN, which will be used for AI training.  that corresponds to the characteristic seed of the generated



                                                          – 119 –
   172   173   174   175   176   177   178   179   180   181   182