Face Detection
Face Detection
Hamid Tabatabaee Yazdi1, Amin Milani Fard2, Mohammad –R. Akbarzadeh –T.3
1
Department of Computer Engineering, Islamic Azad University, Quchan Branch, Iran, IEEE Student Member
2
Department of Computer Engineering, Ferdowsi University, Mashhad, Iran, IEEE Student Member
3
Department of Electrical Engineering, Ferdowsi University, Mashhad, Iran, IEEE Senior Member
1
FaceIt® produced by IDENTIX® has recently merged with L-
1 dentity Solutions. www.l1id.com
525
User Query specifies the fitness of each server with respect to this
query type. Formally, the properties useful to
characterize the subject matters of queries are
S1 S2 S3 ... Sm denoted as Uj (j=1..s); the fitness scores are the values
IRS1 IRS2 IRS3 IRSm associated with variables Vi (i=1..m), one for each
server Si. The fuzzy rules [8] identifying query types
D1,Score11 D1,Score21 D1,Score31 D1,Scorem1 are formalized as:
D2,Score12 D2,Score22 D2,Score32 D2,Scorem2
D3,Score13 D3,Score23 D3,Score33 D3,Scorem3
… … if U1 is Ak1 and … and Us is Aks then V is Bk
… …
526
5. Proposed System Architecture A Web service can be published as a JADE agent
service and an agent service can be symmetrically
Multi-agent systems (MASs) as an emerging sub- published as a Web service endpoint. Invoking a Web
field of artificial intelligence concern with interaction service is just like invoking a normal agent service.
of agents to solve a common problem [15]. This Web services’ clients can also search for and invoke
paradigm has become more and more important in agent services hosted within JADE containers.
many aspects of computer science by introducing the Considering large-scale applications over separated
issues of distributed intelligence and interaction. They networks, agent communications has to be handled
represent a new way of analyzing, designing, and behind firewalls and Network Address Translators
implementing complex software systems. In multi- (NATs), however, the current JADE MTP do not
agent systems, communication is the basis for allow agent communication through firewalls and
interactions and social organizations which enables NATs. Fortunately, the firewall/NAT issue can be
the agents to cooperate and coordinate their actions. solved by using the current JXTA implementation for
Our proposed multi-agent system architecture is agent communication [19].
based on Java Agent DEelopment (JADE) framework JXTA is a set of open protocols for P2P
[16]. JADE is a software development framework networking. These protocols enable developers to
aimed at developing multi-agent systems and build and deploy P2P applications through a unified
applications in which agents communicate using medium [20]. Obviously, JXTA is a suitable
FIPA2 Agent Communication Language (ACL) architecture for implementing MTP-s for JADE and
messages and live in containers which may be consequently JADE agent communication within
distributed to several different machines. The Agent different networks can be facilitated by incorporating
Management System (AMS) is the agent who exerts JXTA technology into JADE [19].
supervisory control over access to and use of the In this work, the police officer after constructing a
Agent Platform. Only one AMS will exist in a single sketch from the aimed criminal, submits a query
platform. containing face image features (nodal points
Each agent must register with an AMS in order to information) to the broker agent. The broker agent
get a valid AID. The Directory Facilitator (DF) is the then sends query information to the search agents
agent who provides the default yellow page service in asking them to look for the answer in the available
the platform. The Message Transport System, also ontologies. Agents may also communicate with other
called Agent Communication Channel (ACC), is the agents and exchange information to broaden the
software component controlling all the exchange of search results. Our proposed architecture uses
messages within the platform, including messages different types of agents, each having its own
to/from remote platforms. The standard model of an characteristics.
agent platform, as defined by FIPA, is represented in 1. Broker Agent: After receiving the user query,
the Figure 3. the BA does a simple task sharing process for search
agents. The BA can also create search agents if
needed.
2. Search Agents: These agents will return an
ordered list of search results to the response agent.
3. Response Agent: This agent has the
responsibility to show the result of retrieved
information. To do so, RA collects SAs results, ranks
them and then shows them on the screen ordered by
relation percentage.
2
Foundation for Intelligent Physical Agents (http://www.fipa.org)
527
SIM ( fi ) s
Reques
Search page
μi ( f , s) = (5)
MAXSIM ( f ) s
, where SIM(if)i is the similarity value of feature
User vector f of image i in the server s, MAXSIM(f)s is the
highest feature vectors similarity value among all
Broker Agent Response Agent images in the server s database. A query <f,w> is
represented by feature vector fi and the corresponding
weights wi. The query is evaluated for a given image,
and then aggregation operators are used. Thus the
result of a query evaluation is represented as a fuzzy
subset of the archived image, given by
∑
Search Agent Search Agent Search Agent Search Agent
#1 #2 #3 #n Ris ( f ) = μW ( s, i, f ) / i (6)
d ∈I
This brings to light that fuzzy Boolean IR models
are more flexible in representing image contents and
Database Database ... Database information needs. When a query has to be evaluated,
#1 #2 #n the process of estimate of the appropriateness of each
server as the controller of the relevant information for
Figure 4. Proposed system architecture
the query can be done on the basis of a procedure
which performs a matching between the query and the
The response agent has the responsibility of fuzzy set of archived documents
computing the fitness scores of each server using a The matching procedure of a Boolean query
combination method of approaches presented in [8]- against the fuzzy term set proceeds in a bottom up
[21]-[22] which are based on associating each server way: first, the membership of each query feature
with a fuzzy set of image feature vectors in which vector to the fuzzy set is computed. The obtained
their associated membership values are interpreted as values (including the fitness of the server for each
their importance of the server. feature vector) are then aggregated by applying the
In other words the weights represent the fitness of connectives specified in the query (the AND is
the server with respect to the features expressed by interpreted as min, the OR as max, and the NOT as a
the associated vector. The fuzzy set can be interpreted complement). Figure 5 shows an example of
as a prototypal image or image type constituting a computing bi*, regarding equation 1, of the server Si
representative of the image in the archive of the for a given query Q.
server. The features and their fitness weights can be
defined either manually or automatically computed. Q = t1 AND (t2 OR t3)
An automatic selection of the image features can be ⇓
obtained on the basis of their normalized feature Bi* = min(μw(i,d,t1), max(μw(i,d,t2), μw(i,d,t3)))
value similarity in the archive on the considered
server; the computed value can then be used as Figure 5. Sample score computation
features membership values. An image is formally
represented as a fuzzy binary relation
6. Conclusion and Future Works
∑
Ris = μ is ( f ) / f
f ∈F
(4)
A multi-agent architecture for distributed image
, where Ris is the representation of the archive of retrieval on the web was proposed and a fuzzy logic
the server s image i∈I, the set of images, f∈F the set based approach was used for result lists fusion
of feature vectors, and μis I×F→[0,1] the membership mechanism. This model in contrast with other multi-
function of Ris. μis is again a dynamic function with agent models for web is considered to be more
μi(f,s) expressing the significance of the feature practical using hybrid JADE-JXTA framework which
vector f in image i on the server s. μi(f,s) can be allows agent communication through firewalls and
computed as a function of the normalized feature NATs. Some future works can be done on
value similarity as bellow performance evaluation of the retrieval mechanism
528
and meta-search development under this architecture [13] R. R. Yager, and A. Rybalov, “On the fusion of
seems to be a challenging matter. Also Grid based documents from multiple collection information
data retrieval is a very good testbed for such an retrieval systems”, Journal for the American Society
approach. for Information Science 49, 1177-1184, 1998.
[14] R. R. Yager, V. Kreinovich, "On how to merge sorted
lists coming from different web search tools," Soft
References Computing Research Journal 3, 83-88, 1999.
[15] M. Wooldridge, “An Introduction to Multiagent
[1] R. Johnson, K. Bonsor “How Facial Recognition Systems” Published in February 2002 by John Wiley
Systems Work,” Retrieved on 2006-06-18 & Sons. ISBN 0 47149691X.
http://computer.howstuffworks.com/facial- [16] F. Bellifemine, G. Caire, T. Trucco, G. Rimassa,
recognition.htm. “JADE Programmer’s Guide”, 21-August-2006.
[2] "Help find Madeleine McCann", Child Exploitation [17] JADE Board, “JADE WSIG Add-On Guide JADE
and Online Protection Centre, 2007-05-21. Retrieved Web Services Integration Gateway (WSIG) Guide”,
on 2007-05-21. 03-March-2005
http://www.madeleine.ceopupload.com/
[18] E. Cortese, F. Quarta, G. Vitaglione, P. Vrba.
[3] Y. A. Aslandogan and C. T. Yu, "Diogenes: A Web “Scalability and Performance of the JADE Message
Search Agent for Content Based Indexing of Personal Transport System”. Analysis of Suitability for Holonic
Images," in Proceedings of ACM SIGIR 2000, Athens, Manufacturing Systems, exp, 2002.
Greece, July 2000.
[19] S. Liu, P. Küngas, M. Matskin, “Agent-Based Web
[4] H. Wisniewski, "Face Recognition and Intelligent Service Composition with JADE and JXTA”,
Software Agents - an Integration System," Prepared Proceedings of the 2006 International Conference on
statement for the U.S. Senate Committee on Semantic Web and Web Services, SWWS 2006, Las
Commerce, Science and Transportation, May 12 Vegas, Nevada, USA, June 26-29, 2006
1999.
[20] J. D. Gradecki, “Mastering JXTA: Building Java
[5] Y. Aoki, K. Hisatomi and S. Hashimoto, "Robust and Peer-to-Peer Applications”, JohnWiley&Sons,2002.
Active Human Face Tracking Vision Using Multiple
[21] G. Salton, C. Buckley, “Term-weighting approaches
Information," Proceedings of SCI’99 (World
in automatic text retrieval”. Information Processing &
Multiconference on Systems, Cybermetics and
Management 24(5): 513–523, 1988
Informatics), Vol.5, pp. 28-33, Aug. 1999, Orlando.
[22] G. Pasi, G. Bordonga, “Application of fuzzy set
[6] J. CALLAN, “Distributed information retrieval”. In theory to extend boolean information retrieval,” in
Advances in Information Retrieval, W. B. Croft, Ed.
Soft Computing in Information Retrieval: Techniques
Kluwer Academic Publishers, 2000, pp. 127–150.
and Applications, F. Crestani, G. Pasi, Eds.
[7] L. Si, J. Callan, “A Semisupervised Learning Method Heidelberg, Germany: Physica Verlag, 2000, vol. 50,
to Merge Search Engine Results”, ACM Transactions pp. 21–47.
on Information Systems, Vol. 21, No. 4, October
2003, Pages 457–491.
[8] G. Pasi, and R. R. Yager, “Document retrieval from
multiple sources of information”, in Uncertainty in
Intelligent and Information Systems, edited by
Bouchon-Meunier, B., Yager, R. R. and Zadeh, L. A.,
World Scientific: Singapore, 250-261, 2000.
[9] R. Baeza-Yates, B. Ribeiro-Neto, “Modern
Information Retrieval”, Addison-Wesley, 1999
[10] E. M. Voorhees, N. K. Gupta, and B. Johnson-Laird,
“The collection fusion problem”, Proceedings of the
third Text Retrieval Conference (TREC-3), 95-104,
1994
[11] E. M. Voorhees, N. K. Gupta, and B. Johnson-Laird,
“Learning collection fusion strategies”, Proceedings of
the 18th ACM SIGIR Conference on Research and
Development in Information Retrieval, Seattle, 172-
179, 1995
[12] R. R. Yager, “On Ordered Weighted Averaging
aggregation Operators in Multi Criteria Decision
Making”, IEEE Trans. on Systems, Man and
Cybernetics. 18(1), 183-190, 1998
529