The area of video analytics in the context of collaborative networking has gained a lot of attention from the research community owing to its potential applicability in the real life aspects. However, although image a...
详细信息
ISBN:
(纸本)9783030198077;9783030198060
The area of video analytics in the context of collaborative networking has gained a lot of attention from the research community owing to its potential applicability in the real life aspects. However, although image and video content which mostly get exchanged in the networking pipelines consist of several significant textual information from the application view-point which often display various confidential textual credentials of a corresponding individual. The realization of this fact that this textual attributes has to be removed for various image forensic requirements, has led to image impainting. The study has addressed this problem and come up with a novel analytical solution which imposes two different methods and further combines this two. In the 1st stage it applies a robust mechanism to detect the region of an image and video frame sequence where textual data representation can be localized and perform extraction of those data it introduces artifact and visual anomalies. On the completion of this stage in the 2nd phase, to eliminate the artifacts from the respective locations, it introduces a novel impainting technique which is computationally efficient and attain higher degree of textual data eliminated recovered image or video sequence which is almost similar like the original image or video sequence, can be visually perceived. The comparative performance analysis show that the proposed technique attain better outcome in terms of textual attributes detection accuracy (%) from specific region of interest (ROI) and also consume very less processing time (Sec) in contrast with the existing system.
Night pedestrian detection has attracted attention of researchers from academic institutions and industry companies for many years especially on surveillance systems and assistive night vision systems for intelligent ...
详细信息
ISBN:
(纸本)9781450371483
Night pedestrian detection has attracted attention of researchers from academic institutions and industry companies for many years especially on surveillance systems and assistive night vision systems for intelligent vehicles. However, most detection approaches rely on complicated algorithms to provide excellent detection performance. This paper aims to develop a computationally efficient and effective detection method for night pedestrian detection with an infrared camera. Because of unclear human body features, the upper body of humans is chosen for the basis for pedestrian detection during the night. Two feature parameters including the angle between the head and the body and the width ratio of the head with respect to the body are applied to distinguish non-human and human as well as single person and multiple persons based on fuzzy reasoning technique. Experimental results on forty-four images from four different scenes for night pedestrian detection demonstrate promising performance using the proposed detection algorithm.
Combining SAR imaging technique with a UWB radar sensor can realize high resolution imaging of targets. It has important research value in environment investigation and inter surveillance. In this paper, three dimensi...
详细信息
ISBN:
(纸本)9789811065712;9789811065705
Combining SAR imaging technique with a UWB radar sensor can realize high resolution imaging of targets. It has important research value in environment investigation and inter surveillance. In this paper, three dimensional SAR imaging is investigated based on the one dimensional echo signal of UWB at different locations and time. The UWB SAR image reconstruction is realized by Hamming window function optimization, image registration and interpolation. The reconstruction imaging of the metal ball with centimeter resolution is realized, which verifies the feasibility of the imaging system in this research for 3D SAR imaging.
Telecommunication, and computing technologies are the key technologies that can be used to derive solutions for many real-world problems. The developing countries still facing many issues in railway level crossings. T...
详细信息
ISBN:
(数字)9781728165417
ISBN:
(纸本)9781728165424
Telecommunication, and computing technologies are the key technologies that can be used to derive solutions for many real-world problems. The developing countries still facing many issues in railway level crossings. The level crossing accidents may cause many serious hazards such as deaths, injuries, and vehicle damages, which altogether lead to a fall on a country's economy. This problem can be solved by adopting IoT technologies in the railway sector. There are many automated systems suggested by different researchers with different IoT approaches in the past. However, as we analyzed the literature thoroughly, there are shortcomings in each study performed. This paper proposes a novel system to overcome the shortcomings of the automated railway gates using IoT and machine learning concepts in an excellent and efficient way to reduce the fatal accidents of the level crossing into almost null. A comprehensive embedded system is proposed with two subsystems, which are Train Detection Subsystem (TDS) and Level Crossing Subsystem (LCS). The TDS is done using a vibration sensor and inductive proximity sensors, and a camera module accomplishes the vehicle detection process of LCS with imageprocessing and a machine learning algorithm. The wireless communication process uses the AES algorithm for secure data transmission between LCS and TDS through Radio Frequency (RF) communication module. This model will be an efficient model to avoid many fatal accidents in the railway crossings and also will be an excellent solution to contribute to a country's economy indirectly.
This paper considers information flow redundancy reducement problem for decision-making followed by cartographic images dialogue process analysis. The specifics of the considered problem is displaying fuzzy cartograph...
详细信息
ISBN:
(数字)9783030198107
ISBN:
(纸本)9783030198107
This paper considers information flow redundancy reducement problem for decision-making followed by cartographic images dialogue process analysis. The specifics of the considered problem is displaying fuzzy cartographic objects. This includes those that have not got a preliminary cartographic processing and leads to image defects. The loss of images semantic content, however, compensated by an information about the outside world, which is carried by fuzzy objects. The paper proposes a method of managing flow based information by maximizing a workspace utility function for analysis. The authors introduced a representation of the working area by two subsets of cartographic objects: the skeleton and the environment. Representation variations with fuzzy objects that improve the quality of solving such problems as generation of decision alternatives, risk assessment of decision making and assessment of the external data sources quality are proposed. The considered case generalization can be reused by any system that provides a visual image for search and decision making to user.
Fingerprints are often claimed as the safest measurable human trait. As one can observe they are commonly used in many different solutions. Nowadays they are applied for instance in financial institutions where client...
详细信息
Given an aerial imagery showing an interesting object one often asks for the exact location of the object in the world. There are several approaches to answer the question but one of the easiest and computational chea...
详细信息
ISBN:
(纸本)9781510627024
Given an aerial imagery showing an interesting object one often asks for the exact location of the object in the world. There are several approaches to answer the question but one of the easiest and computational cheapest approach is to use geospatial metadata like from a global navigation satellite system (GNSS) and inertial navigation system (INS) together with a digital elevation model (DEM) of the observed area to estimate the target location. The quality of the result depends greatly on the precision of the metadata and the accuracy of the synchronization of the metadata to the single imagery frame. This paper discusses how to quantitatively describe the accuracy of the metadata of an aerial motion imagery system. The aim is to have this information available for information fusion that improve the object location as presumed by the metadata with information from image recognition algorithms.
image segmentation is a primary work for machine vi(1) sion and Fuzzy C -Means (FCM) clustering algorithm is one of the commonest methods. However, FCM is sensitive to the initial clustering center and easily falls in...
详细信息
ISBN:
(纸本)9781728140698
image segmentation is a primary work for machine vi(1) sion and Fuzzy C -Means (FCM) clustering algorithm is one of the commonest methods. However, FCM is sensitive to the initial clustering center and easily falls into the local optimum solution, while the Krill Herd (KH) algorithm has strong global convergence and high stability. As a result, this paper proposes an image segmentation method based on improved Krill Herd algorithm and FCM (IKH-FCM). First of all, the method uses the K-Means algorithm to initialize the initial population of the krill herd, the improved KH algorithm is used to calculate the initial clustering center of FCM, and then FCM clustering is applied to implement image segmentation. Experiments show that the approach has strong global convergence and high stability compared to the original FCM, which is a favorable image segmentation approach for practical work
Plethora of the optimized video/image cryptography algorithms with diverse structures such as chaos-based, transformed-based is proposed for disparate systems, especially embedded ones. Among them, the fully-layered l...
详细信息
ISBN:
(数字)9781728172965
ISBN:
(纸本)9781728172972
Plethora of the optimized video/image cryptography algorithms with diverse structures such as chaos-based, transformed-based is proposed for disparate systems, especially embedded ones. Among them, the fully-layered light-weights have not been considered sufficiently. Our goal is to evaluate and compare different type of state-of-the-art fully-layered light-weights algorithms performances in order to figure out what do they meet all the mandatories of resource-constrained devices and security criteria for multimedia data type or not? In this regard, we select three light-weight algorithms -GIFT128, ASCON128a, and ZUC256- with disparate structures and salient suitable features. We initially assess the security quality of their outputs by C++ programs, then each of cores which has concomitant AXI interface is implemented by Verilog language in Xilinx vivado 2016.2 on Zynq7020 FPGA. The achieved results from implementations and simulation of security analysis show that these cryptography cores can meet all the requirements of an embedded encryption system, in which the obvious ones are high-security, real-time processing, and low-power consumption.
暂无评论