CRISP SET IMPLEMENTATION ON VIDEO IMAGES FOR THE APPLICATION OF SURVEILLANCE SYSTEMS
Observing moving objects in far field’s video surveillance is one of the main application areas in computer vision. The strong interest in this research direction is driven by creating full automotive surveillance applications. This paper presents implementing a crisp set on video images...
| Main Author: | Asirvadam , Vijanth Sagayan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://scholars.utp.edu.my/id/eprint/1844/ http://scholars.utp.edu.my/id/eprint/1844/1/paper_5.pdf |
Similar Items
Crisp set implementation on video images for the application of surveillance systems
by: Altahir, Altahir A., et al.
Published: (2009)
by: Altahir, Altahir A., et al.
Published: (2009)
Segmentation of Retinal Vasculature in Colour Fundus Images
by: Iznita , I.L., et al.
Published: (2009)
by: Iznita , I.L., et al.
Published: (2009)
Pedestrian Detection and Tracking in Surveillance Video
by: Chong, Penny
Published: (2016)
by: Chong, Penny
Published: (2016)
Flight Connections Multi-Leg Searching by Adopting Partial Constraint Satisfaction
by: Yusof, S.Z.M, et al.
Published: (2010)
by: Yusof, S.Z.M, et al.
Published: (2010)
Abnormal Event Detection in Surveillance Videos Using Spatiotemporal Autoencoder
by: Chong, Yong Shean
Published: (2019)
by: Chong, Yong Shean
Published: (2019)
Crisp-fuzzy representation of Allen's temporal logic
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2007)
by: Nor Azlinayati Abdul Manaf,, et al.
Published: (2007)
Image classification and segmentation for efficient surveillance applications / Maryam Asadzadeh Kaljahi
by: Maryam Asadzadeh, Kaljahi
Published: (2019)
by: Maryam Asadzadeh, Kaljahi
Published: (2019)
Wireless system identification for linear network
by: Asirvadam , Vijanth Sagayan
Published: (2009)
by: Asirvadam , Vijanth Sagayan
Published: (2009)
Data mining and warehousing approaches on
school smart system : A conceptual framework
by: Ong, Janson Luke Wai Kit, et al.
Published: (2008)
by: Ong, Janson Luke Wai Kit, et al.
Published: (2008)
Adaptive regularizer for recursive neural network training algorithms
by: Asirvadam, Vijanth Sagayan
Published: (2008)
by: Asirvadam, Vijanth Sagayan
Published: (2008)
Data Mining Approach on Nationwide School Exam System
by: ONG Wai Kit, Janson Luke, et al.
Published: (2004)
by: ONG Wai Kit, Janson Luke, et al.
Published: (2004)
Introduction to intelligent video surveillance system
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Moving object detection for visual surveillance application
by: Ong, Kelvin Chun Yauw
Published: (2018)
by: Ong, Kelvin Chun Yauw
Published: (2018)
Data Mining and Warehousing Approaches on School Smart System: A Conceptual Framework
by: Janson Luke Ong Wai, Kit, et al.
Published: (2008)
by: Janson Luke Ong Wai, Kit, et al.
Published: (2008)
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
KJ Fashion Shoes E-Commerce Mobile-Based Application with Implementation of Image Recognition System
by: Soh, Kai Jie
Published: (2022)
by: Soh, Kai Jie
Published: (2022)
Health Informatics on Low Birth Rate Data
by: Ong, Janson, et al.
Published: (2008)
by: Ong, Janson, et al.
Published: (2008)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
A set of embedding rules in IWT for watermark embedding in image watermarking
by: Muhammad Afnan, Hafidz, et al.
Published: (2024)
by: Muhammad Afnan, Hafidz, et al.
Published: (2024)
Human tracking algorithm for video surveillance
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
Image enhancement: A composite image approach using contourlet transform
by: Asmare , M.H., et al.
Published: (2009)
by: Asmare , M.H., et al.
Published: (2009)
Basic operating system setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Trademark image classification approaches using neural network and rough set theory
by: Saad, Puteh
Published: (2003)
by: Saad, Puteh
Published: (2003)
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Artificial neural network implementation on firearm recognition system with respect to ring firing pin impression image
by: Ahmad Kamaruddin, Saadi, et al.
Published: (2011)
by: Ahmad Kamaruddin, Saadi, et al.
Published: (2011)
Multi-sensor image enhancement and fusion for vision clarity using contourlet transform
by: Asmare , M.H., et al.
Published: (2009)
by: Asmare , M.H., et al.
Published: (2009)
Real-time human detection for video surveillance
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
by: Kamru Zaman, Fadhlan H., et al.
Published: (2011)
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Effective marketing video application by using geotagged Twitter's status metadata
by: Limanto, Adrian Samuel *, et al.
Published: (2011)
by: Limanto, Adrian Samuel *, et al.
Published: (2011)
Model-based hybrid variational level set method applied to object detection in grey scale images
by: Wang, Jing
Published: (2024)
by: Wang, Jing
Published: (2024)
Rough Set Discretize Classification of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
by: Noor Suhana, Sulaiman, et al.
Published: (2016)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Introduction of affinity set and its application in data-mining example of delayed diagnosis
by: Chen, Yuh-Wen, et al.
Published: (2009)
by: Chen, Yuh-Wen, et al.
Published: (2009)
Peer-to-peer video-on-demand in future internet
by: Fouda, Mostafa M., et al.
Published: (2013)
by: Fouda, Mostafa M., et al.
Published: (2013)
Rough Set Significant Reduct and Rules of Intrusion Detection System
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
by: Noor Suhana, Sulaiman, et al.
Published: (2017)
Features extraction based on fuzzy clustering and segmentation onto the motion region for medium field surveillance application
by: Maliki, Mohamad Nansah, et al.
Published: (2004)
by: Maliki, Mohamad Nansah, et al.
Published: (2004)
Video steganography based on DCT psychovisual and object motion
by: Muhammad, Fuad, et al.
Published: (2020)
by: Muhammad, Fuad, et al.
Published: (2020)
Three-Dimensional Convolutional Approaches for the Verification of Deepfake Videos: The Effect of Image Depth Size on Authentication Performance
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
by: Muhammad Salihin, Saealal, et al.
Published: (2023)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Similar Items
-
Crisp set implementation on video images for the application of surveillance systems
by: Altahir, Altahir A., et al.
Published: (2009) -
Segmentation of Retinal Vasculature in Colour Fundus Images
by: Iznita , I.L., et al.
Published: (2009) -
Pedestrian Detection and Tracking in Surveillance Video
by: Chong, Penny
Published: (2016) -
Flight Connections Multi-Leg Searching by Adopting Partial Constraint Satisfaction
by: Yusof, S.Z.M, et al.
Published: (2010) -
Abnormal Event Detection in Surveillance Videos Using Spatiotemporal Autoencoder
by: Chong, Yong Shean
Published: (2019)