Results 31 to 40 of about 313,667 (223)

Surveillance video mining [PDF]

open access: yesIET International Conference on Visual Information Engineering (VIE 2006), 2006
This paper approaches the problem of surveillance event characterization at two levels. First, the information characterizable at the single camera image-plane level, where we use a set of occlusion primitives to define a set of time-varying predicates on heterogeneous objects moving in unknown environments.
null Prithwijit Guha   +4 more
openaire   +1 more source

Optimization of Wireless Video Surveillance System for Smart Campus Based on Internet of Things

open access: yesIEEE Access, 2020
In order to strengthen school security and build a wireless smart campus, this article optimizes the existing wireless video surveillance system based on the Internet of Things.
Zhiqing Zhou, Heng Yu, Hesheng Shi
doaj   +1 more source

Lost in Time: Temporal Analytics for Long-Term Video Surveillance

open access: yes, 2017
Video surveillance is a well researched area of study with substantial work done in the aspects of object detection, tracking and behavior analysis. With the abundance of video data captured over a long period of time, we can understand patterns in human
Khor, Huai-Qian, See, John
core   +1 more source

Video surveillance using distance maps [PDF]

open access: yesSPIE Proceedings, 2006
Human vigilance is limited; hence, automatic motion and distance detection is one of the central issues in video surveillance. Hereby, many aspects are of importance, this paper specially addresses: efficiency, achieving real-time performance, accuracy, and robustness against various noise factors.
Schouten, Th.E.   +2 more
openaire   +2 more sources

AVSS: Airborne Video Surveillance System [PDF]

open access: yesSensors, 2018
Most surveillance systems only contain CCTVs. CCTVs, however, provide only limited maneuverability against dynamic targets and are inefficient for short term surveillance. Such limitations do not raise much concern in some cases, but for the scenario in which traditional surveillance systems do not suffice, adopting a fleet of UAVs can help overcoming ...
Jongtack Jung   +5 more
openaire   +3 more sources

A Comparison of CNN-based Face and Head Detectors for Real-Time Video Surveillance Applications

open access: yes, 2017
Detecting faces and heads appearing in video feeds are challenging tasks in real-world video surveillance applications due to variations in appearance, occlusions and complex backgrounds. Recently, several CNN architectures have been proposed to increase
Blais-Morin, Louis-Antoine   +3 more
core   +1 more source

Application of Temporal Action Detection Technology in Abnormal Event Detection of Surveillance Video

open access: yesIEEE Access
By detecting abnormal violation event in surveillance videos, the safety management capabilities in high-risk power operations can be improved. This research constructs an intelligent abnormal event detection technology using deep learning algorithms ...
Chenxiang Lin   +5 more
doaj   +1 more source

Learning to Detect Violent Videos using Convolutional Long Short-Term Memory

open access: yes, 2017
Developing a technique for the automatic analysis of surveillance videos in order to identify the presence of violence is of broad interest. In this work, we propose a deep neural network for the purpose of recognizing violent videos.
Lanz, Oswald, Sudhakaran, Swathikiran
core   +1 more source

Moving Object Detection for Video Surveillance

open access: yesThe Scientific World Journal, 2015
The emergence of video surveillance is the most promising solution for people living independently in their home. Recently several contributions for video surveillance have been proposed.
K. Kalirajan, M. Sudha
doaj   +1 more source

TRECVID 2008 - goals, tasks, data, evaluation mechanisms and metrics [PDF]

open access: yes, 2008
The TREC Video Retrieval Evaluation (TRECVID) 2008 is a TREC-style video analysis and retrieval evaluation, the goal of which remains to promote progress in content-based exploitation of digital video via open, metrics-based evaluation.
Awad, George M.   +5 more
core   +2 more sources

Home - About - Disclaimer - Privacy