A Review on Finding Efficient Approach to Detect Customer Emotion Analysis using Deep Learning Analysis
Volume-3 | Issue-2
A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest
Volume-4 | Issue-3
A Review on Microstrip Patch Antenna Performance Improvement Techniques on Various Applications
Volume-3 | Issue-3
Study of Security Mechanisms to Create a Secure Cloud in a Virtual Environment with the Support of Cloud Service Providers
Volume-2 | Issue-3
Construction of Black Box to Detect the Location of Road Mishap in Remote Area in the IoT Domain
Volume-3 | Issue-2
Fault Diagnosis in Hybrid Renewable Energy Sources with Machine Learning Approach
Volume-3 | Issue-3
Secure and Optimized Cloud-Based Cyber-Physical Systems with Memory-Aware Scheduling Scheme
Volume-2 | Issue-3
Computer Vision on IOT Based Patient Preference Management System
Volume-2 | Issue-2
Stochastic Geometry and Performance Analysis of Large Scale Wireless Networks
Volume-3 | Issue-3
ENHANCED NETWORK PERFORMANCE AND MOBILITY MANAGEMENT OF IOT MULTI NETWORKS
Volume-1 | Issue-2
Fake News Detection using Data Mining Techniques
Volume-3 | Issue-4
A Comparative Analysis of Prediction of Student Results Using Decision Trees and Random Forest
Volume-4 | Issue-3
A Review on Microstrip Patch Antenna Performance Improvement Techniques on Various Applications
Volume-3 | Issue-3
Speedy Detection Module for Abandoned Belongings in Airport Using Improved Image Processing Technique
Volume-3 | Issue-4
Deployment of Artificial Intelligence with Bootstrapped Meta-Learning in Cyber Security
Volume-4 | Issue-3
Design an Early Detection and Classification for Diabetic Retinopathy by Deep Feature Extraction based Convolution Neural Network
Volume-3 | Issue-2
Design of an Intelligent Approach on Capsule Networks to Detect Forged Images
Volume-3 | Issue-3
SDN Controller and Blockchain to Secure Information Transaction in a Cluster Structure
Volume-3 | Issue-2
A Review on Finding Efficient Approach to Detect Customer Emotion Analysis using Deep Learning Analysis
Volume-3 | Issue-2
Future Challenges of the Internet of Things in the Health Care Domain - An Overview
Volume-3 | Issue-4
Volume - 3 | Issue - 4 | december 2021
Published
28 December, 2021
Recently, in computer vision and video surveillance applications, moving object recognition and tracking have become more popular and are hard research issues. When an item is left unattended in a video surveillance system for an extended period of time, it is considered abandoned. Detecting abandoned or removed things from complex surveillance recordings is challenging owing to various variables, including occlusion, rapid illumination changes, and so forth. Background subtraction used in conjunction with object tracking are often used in an automated abandoned item identification system, to check for certain pre-set patterns of activity that occur when an item is abandoned. An upgraded form of image processing is used in the preprocessing stage to remove foreground items. In subsequent frames with extended duration periods, static items are recognized by utilizing the contour characteristics of foreground objects. The edge-based object identification approach is used to classify the identified static items into human and nonhuman things. An alert is activated at a specific distance from the item, depending on the analysis of the stationary object. There is evidence that the suggested system has a fast reaction time and is useful for monitoring in real time. The aim of this study is to discover abandoned items in public settings in a timely manner.
KeywordsImage processing object detection video surveillance edge detection public safety computer vision
Full Article PDF Download Article PDF