Introduction to Operations Research
Introduction to Operations Research
ISSN 2229-5518
1027
IJSER
identifier, which consists of a Deep Convolutional Neural by the little exploration AI/ML people group empower
Network (DCNN) to combine significant level semantic data engineers around the planet to have the option to utilize and
with different element/feature maps. Other than this, we
convey the equivalent to construct systems that would be fit
additionally investigate the chance of actualizing DeepFace-
Mask with a light-weighted neural organization MobileNet for for withstanding the requests of a real-time, real-world use
cell phones. MTCNN, utilizes the inalienable connection case. Specifically, it would assist manufacturing plants with
among's recognition and alignment to help boost their guaranteeing mask consistence is followed, help guarantee
performance. Specifically, our frame work uses a cascaded security for guests in control zones or public spots where it
architecture with three phases of diligently planned DCNN to is vital for such measures to be taken, etc. The applications
predict the face and its key points or landmarks in a coarse-to- are endless and are of earnest need in this crucial time.[2]
fine way. [1]
IV. DATASETS
I. INTRODUCTION (HEADING 1) COVID-19 pandemic. Furthermore, masks should be worn
effectively on the face with the end goal that it masks the
To viably stop the spread of COVID-19 pandemic,
everyone is required to wear a mask in public places.This The dataset we will be using primarily is the
nearly makes regular facial recognition techniques MaskPascalVOC zip file taken from the website:
ineffective, for example, public access control, face access nose and mouth totally, which is frequently not being
control, facial recognition, facial security checks at train followed. Consequently, it is dire to improve the
stations, and so forth.. The science around the utilization of recognition capabilities of the current face/mask
masks by the overall population to prevent COVID-19 recognition technology. Face mask identification alludes to
transmission is progressing quickly. Policymakers need distinguish if an individual is using mask and amount of
guidance on how masks should be utilized by everybody to area covered, which [3]
battle the https://makeml.app/datasets/mask The dataset contains 853
recognition is to recognize a specific class of objects, for images of the following classes: With mask, Without mask,
example face. Uses of object and face recognition can be and Mask weared incorrect. It is labeled with bounding box
found in numerous territories, for example, self driving annotations for object detection. But the number of images
vehicles,education,surveillance, etc. Customary object
locators are based on handmade feature extractors.[4] we identify by including the facial keypoints too. The issue
is firmly identified with general object identification to
II. PROBLEM STATEMENT distinguish the classes of items (here we manage primarily
belonging to the class of mask worn incorrectly are too less
in quantity compared to the other two classes in the dataset,
The objective of this project is to prepare 'Object which was creating class imbalance so, we collected data
Detection Models' fit for distinguishing facial keypoints
IJSER © 2021
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 12, Issue 5, May-2021
ISSN 2229-5518
1028
IJSER
The face detection technique used here is MTCNN (Multi-
and MSE (Mean Squared Error) loss metrics resulted in the task Cascaded Convolutional Networks). Humanface
best accuracy outputs, we choose Smooth L1 classification and arrangement in unconstrained climate
loss metric for our final model as it performed better in Ongoing investigations show that profound learning
real-time comparatively. [5] approaches can accomplish great execution on these two
errands. In this paper, we have utilized a Deep Cascaded
perform various tasks system which abuses the inalienable
relationship among discovery and arrangement to help up
their exhibition. Specifically, this casing work uses a fell
engineering with three phases of painstakingly planned
Deep Convolutional Neural Networks to anticipate face and
milestone area in a coarse-to-fine way. What's more, it
proposes another online hard example mining technique
that further improves the presentation practically speaking..
IJSER © 2021
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 12, Issue 5, May-2021
ISSN 2229-5518
1029
IJSER
N-face and keypoints detection: MTCNN is a technique comprising of three stages,
which can predict basic facial keypoints and perform basic face
alignment . To avoid detection errors , it uses a technique
called Non Max Suppression . [6][7]
● “P” – Network
● “R” – Network
● “O” – Network
• Structure of P-Net:
P-Net predicts bounding box using sliding a 12*12 size
kernel/filter across the image.
IJSER © 2021
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 12, Issue 5, May-2021
ISSN 2229-5518
1030
• Structure of R-Net:
R-Net has similar structure, but uses more layer, thus
predicting more accurate bounding box coordinates.
IJSER
B. IMAGE CLASSIFICATION
IJSER © 2021
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 12, Issue 5, May-2021
ISSN 2229-5518
1031
IJSER
face, you could pick the corners of the
won't adapt successfully. Thus, profound organization
preparing won't combine and precision will either begin to eyes, the tip of the nose, corners of the
corrupt or immerse at a specific worth. In spite of the fact that mouth and so on .
the disappearing angle issue tended to utilizing the
standardized instatement of loads, further organization 2. 3D locations of the same points : We need
exactness was as yet not expanding. Profound Residual the 3D coordinates of the 2D feature
Network is practically like the organizations which have points. Primary 3d coordinates refer to :
convolution, pool-ing, activation and completely associated
layers stacked one over the other. Skip connections used by Nose tip , Chin , right corner of mouth , left
ResNet-50. [14][15] corner of mouth , left eye , right eye.
OpenCV solvePnP
IJSER © 2021
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 12, Issue 5, May-2021
ISSN 2229-5518
1032
IJSER
Trainable params: 16,014,850
Non-trainable params: 8,543,296
VII. RESULTS
The best model saved during training resulted in a
validation loss of 0.9591 and validation accuracy of
0.9689 which was
IJSER © 2021
http://www.ijser.org
International Journal of Scientific & Engineering Research Volume 12, Issue 5, May-2021
ISSN 2229-5518
1033
IJSER
2487–2494, 2013.
recognition",CoRR, 2014.
[3] T.-Y. Lin, P. Goyal, R. Girshick, K. He, and P. Dollár,
[18] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed,
“Focal loss for dense object detection,” 2017.
D.
[4] A. Shrivastava, A. Gupta, and R. Girshick, “Training
Anguelov, et al., "Going deeper with convolutions",
region-based object detectors with online hard example
2015.
mining,” in Proceedings of the IEEE conference on
computer vision and pattern recognition, 2016, pp. 761– [19] K. He, X. Zhang, S. Ren and J. Sun, "Deep residual
769. learning for image recognition", 2016 IEEE Conference
[5] S. Ge, J. Li, Q. Ye, and Z. Luo, “Detecting masked on Computer Vision and Pattern Recognition (CVPR),
faces in the wild with lle-cnns,” in Proceedings of the pp. 770-778, 2016.
IEEE. [20] P. Viola and M. J. Jones, "Robust real-time face
detection", Int. J. Comput. Vision, vol. 57, no. 2, pp.
[6] A. Paszke, S. Gross, F. Massa, A. Lerer, J. Bradbury, 137-154, May 2004
G.Chanan, T. Killeen, Z. Lin, N. Gimelshein, L. Antiga et
al.,“Pytorch: An imperative style, high-performance deep
learning library,” in Advances in Neural Information
Processing Systems, 2019, pp. 8024–8035.
[7] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual
learning for image recognition,” in Proceedings of the
IEEE conference on computer vision and pattern
recognition, 2016, pp. 770–778
[8] A. G. Howard, M. Zhu, B. Chen, D. Kalenichenko,
W.Wang, T. Weyand, M. Andreetto, and H. Adam,
“Mobilenets: Efficient convolutional neural networks
for mobile vision applications,” arXiv preprint
arXiv:1704.04861, 2017.
[9] J. Deng, J. Guo, Y. Zhou, J. Yu, I. Kotsia, and
S.Zafeiriou, “Retinaface: Single-stage dense face
localization in the wild,” arXiv preprint
arXiv:1905.00641, 2019.
[10] R. Girshick, J. Donahue, T. Darrell, and J. Malik,
“Rich feature hierarchies for accurate object detection
and semantic segmentation,” in Proceedings of the IEEE
conference on computer vision and pattern recognition,
IJSER © 2021
http://www.ijser.org