Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
number of algorithms have been recently proposed for automatic intruder detection from CCTV images. Past researchers have typically tested these algorithms on centralized networks where all images are transmitted to a central control room. This paper demonstrates the applicability of a selection of...
| Main Authors: | Ahmed, Tarem, Ahmed, Supriyo, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SERSC (Science & Engineering Research Support Society)
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/36243/ http://irep.iium.edu.my/36243/1/37.pdf |
Similar Items
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
Security management in heterogeneous distributed sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
Intruder detection in camera networks using the one-class neighbor machine
by: Ahmed, Tarem Ozair, et al.
Published: (2011)
by: Ahmed, Tarem Ozair, et al.
Published: (2011)
Heterogeneous Distributed Sensor Networks (HDSN)
by: Pathan, Al-Sakib Khan
Published: (2007)
by: Pathan, Al-Sakib Khan
Published: (2007)
Recent advances in simulation and mathematical modeling of wireless networks
by: Misra, Sudip, et al.
Published: (2011)
by: Misra, Sudip, et al.
Published: (2011)
Multi-dimensional networking and distributed computing services
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
A new efficient checkpointing algorithm for distributed mobile computing
by: Mansouri, Houssem, et al.
Published: (2015)
by: Mansouri, Houssem, et al.
Published: (2015)
Network and traffic engineering in emerging distributed computing applications
by: Abawajy, Jemal H., et al.
Published: (2013)
by: Abawajy, Jemal H., et al.
Published: (2013)
Secure Group Association Management in Heterogeneous Distributed Sensor Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Special issue on recent advances in next-generation and resource-constrained converged networks
by: Amin, Syed Obaid, et al.
Published: (2011)
by: Amin, Syed Obaid, et al.
Published: (2011)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Moving object detection for visual surveillance application
by: Ong, Kelvin Chun Yauw
Published: (2018)
by: Ong, Kelvin Chun Yauw
Published: (2018)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Wireless network security: 3G, 4G, wireless PAN/LAN/MAN
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Human tracking algorithm for video surveillance
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
Denial of service in wireless sensor networks: issues and challenges
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Weakly connected dominating set-based secure clustering and operation in distributed sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks
by: Karuppiah, A. Babu, et al.
Published: (2014)
by: Karuppiah, A. Babu, et al.
Published: (2014)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
On the issues and challenges of Fiber-Wireless (Fi-Wi) networks
by: Win, Harry Tin, et al.
Published: (2013)
by: Win, Harry Tin, et al.
Published: (2013)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Security wireless sensor networks: prospects, challenges, and future
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Critical applications in vehicular ad hoc/sensor networks
by: Kumar, Neeraj, et al.
Published: (2014)
by: Kumar, Neeraj, et al.
Published: (2014)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
An automated signature generation method for zero-day polymorphic worms based on multilayer perceptron model
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013)
by: Mohammed, Mohssen M. Z. E., et al.
Published: (2013)
A new visual simulation tool for performance evaluation of MANET routing protocols
by: Sakib, Md. Sabbir Rahman, et al.
Published: (2010)
by: Sakib, Md. Sabbir Rahman, et al.
Published: (2010)
A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks
by: Dai, Tran Thanh, et al.
Published: (2006)
by: Dai, Tran Thanh, et al.
Published: (2006)
Similar Items
-
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013) -
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014) -
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013) -
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012) -
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)