Professional Documents
Culture Documents
Intake : APT3F1706CYB
Lecturer : MD BAHARUL ISLAM
Email: baharulislam.md@apu.edu.my
Date assigned : Week 2
Due date : Week 14 (Strictly follow this deadline)
Due to the security issue, an automatic hand signature verification system is very
important, especially for financial institutes like Bank. The traditional verification
system is laborious and time consuming. To prevent the fraud case, the automatic
signature verification system can play a significant role. You have to develop an
application/system that can automatically verify your/any hand signature.
Option 1
Option 2-HDC: Provide a solution to automatically detect the human motion and counting total
number of human in certain time. In this application, you will enable to count all the people who
visited TPM/APU.
A set of signatures is given that can be used as training dataset. Your goal is to
verify the given signature automatically as approved/reject status.
Option 1:
Minimum 5 signatures have to verify in the document;
Requirements
The signature alphabets/numbers can be in English, not any other
languages;
The signature can be offline
HDC: Human Detection and Counting
Option 2: A set of sample videos is given. The goal of your application is to detect the
Requirements human in the given video and then, count all of them.
Your system may work also on live video (e.g. Surveillance video)
No need to track any other objects like car/bus
6.0 DELIVERABLES:
The implemented application can be delivered in the form of a CD-ROM and the documentation
(project report in printed form).
List of references at the end of your document must be specified in the following format:
1. Santella, A., Agrawala, M., DeCarlo, D., Salesin, D. and Cohen, M., 2006, April. Gaze-based
interaction for semi-automatic photo cropping. In Proceedings of the SIGCHI conference on Human
Factors in computing systems (pp. 771-780). ACM.
2. Liu, L., Chen, R., Wolf, L. and Cohen‐Or, D., 2010, May. Optimizing photo composition.
In Computer Graphics Forum (Vol. 29, No. 2, pp. 469-478). Blackwell Publishing Ltd.
3. Gonzalez, R.C. and Wintz, P., 1977. Digital image processing. McGraw-Hill, London.
4. Larsen, M.K. 1983, British Medical Journal (Online), Available World Wide Web: URL:
http://libinfor.ume.maine.edu/acquatic.htm (Accessed 19 November 2015)
* Each group member should have minimum 30% individual contribution in their group
assignment. You will be asked during your presentation. The midpoint presentation (progress
observation) will be held at WEEK 8/9. The group in-course final presentation will be held at
WEEK 15/16.
All reports must be prepared with a front cover. A protective transparent plastic sheet can be
placed in front of the report to protect the front cover. The front cover should be presented with
the following details:
a) Names.
b) Intake code.
c) Subject.
d) Project Title.
e) Date Completed (the report is due to be handed in).
The program must contain all the relevant source code. The usage of predefined
imaging functions in the image processing library is allowed. However, you must
understand fully how the codes are used because this will be tested in the
presentation. You must also identify through comments in your code which code
has been reused, citing and referencing it appropriately.
The writing of code and the work behind it must belong substantially to you. If any
person besides you contributes in any significant way to the assignment, you must
credit their work in your description. Similarly, if you include information/source
code that you have used from other published sources or web pages, you must cite
them as references. Otherwise, the content will be counted as plagiarism.
DISTINCTION
Demonstrate a critical approach in proposing the solution.
Demonstrate innovative and creative approach in creating the final application
prototype.
Excellent/relevant research into application area.
Excellent report with substantial content, clearly distinguishing individual contribution
from group ones.
Application prototype demonstrates considerable flare, works well and was
demonstrated successfully.
CREDIT
Demonstrate a critical approach in proposing the solution.
Demonstrate sound good ability in creating the final application prototype.
Good research into application area.
Report well-structured and content good. Application prototype works well and was
demonstrated successfully.
PASS
Solution proposed not always appropriate and lacks a critical approach.
Demonstrate poor workable final application prototype.
Poor research on the application.
Report somewhat confused, lacking in examples and several areas not fully explained.
Application prototype not fully working and demonstration not very successful.
MARGINAL FAIL
Solution proposed not appropriate and lacks a critical approach.
Research into application area insufficient.
Report (if present) confused, lacking in examples and several areas not fully explained.
Application prototype not working and did not contribute much to the demonstration.
FAIL
Fails to justify the solution.
Very poor on report writing.
Report (if present) far too brief.
No evidence of any application prototype produced