A Cortical Learning Movement Classification Algorithm for Video Surveillance
نویسندگان
چکیده
منابع مشابه
Movement Classification Technique for Video Forensic Investigation
Movement classification or activity analysis is one of the most important areas in video surveillance. However, manually detecting, classifying and analyzing interesting moving objects by humans does not guarantee absolute correctness. When considering thereal environment and trying to relate the way objects interact in a surveillance covered area, it is not so easy interpreting every activity ...
متن کاملA S.O.M. Based Algorithm for Video Surveillance System Parameter
In automatic video surveillance systems, full time monitoring represents an important goal to achieve. The aim of this paper is to find out a new methodology for video surveillance adaptive parameter regulation. The method presented here is based upon Self Organizing Map (S.O.M.) which are used for parameter regulation purposes. Results shown in this paper prove how this method permit to achiev...
متن کاملA Background Model Initialization Algorithm for Video Surveillance
Many motion detection and tracking algorithms rely on the process of background subtraction, a technique which detects changes from a model of the background scene. We present a new algorithm for the purpose of background model initialization. The algorithm takes as input a video sequence in which moving objects are present, and outputs a statistical background model describing the static parts...
متن کاملVideo Surveillance Middleware for Distributed Video Surveillance
protecting major facilities from terrorism and other threats. At the hardware level, standard IP networking devices and IP video cameras enable building thousand-camera networks at a reasonable cost. However, monitoring surveillance networks through human inspection is expensive and remarkably ineffective. Trained operators lose concentration and miss a high percentage of significant events aft...
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications Technology and Research
سال: 2017
ISSN: 2319-8656
DOI: 10.7753/ijcatr0612.1007