MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "7c1f32e1-4a59-41a6-8c48-4d0c13555189"}, "_deposit": {"created_by": 45, "id": "3046", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "3046"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3046", "sets": ["1596102355557", "user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Study on Abandoned Object Detection Methods in Video Surveillance System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Now a day, there is a need to do research in abandoned object detection due\nto increase in attack by terrorists or anti social elements at public places. The\ntraditional way to observe the places or to track the places is the CCTV cameras\nwhich require a human operator to monitor the digital camera images. Although\npublic areas are observed by many surveillance cameras, humans can monitor a\nfew cameras at a time. In real world monitoring applications, abandoned object\ndetection remains to be a challenging task due to factors such as background\ncomplexity, illumination variations, noise, and occlusions and “ghost” effect\nwhich is left by the removed object. As a fundamental first step in many\ncomputer vision applications such as object tracking, behavior understanding,\nobject or event recognition, and automated video surveillance, various\nalgorithms have been developed ranging from simple approaches to more\nsophisticated ones. In this paper, the study on the different methods proposed so\nfar for detecting the abandoned object in the surveillance area is provided."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Object Detection"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-08-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "A Study on Abandoned Object Detection Methods in Video Surveillance System.pdf", "filesize": [{"value": "357 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 357000.0, "url": {"url": "https://meral.edu.mm/record/3046/files/A Study on Abandoned Object Detection Methods in Video Surveillance System.pdf"}, "version_id": "367f39d1-e2df-4056-beb9-ef93cef12813"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICGEC-2015", "subitem_c_date": "26-28 August, 2015", "subitem_conference_title": "4th International Conference on Genetic and Evolutionary Computing", "subitem_place": "Yangon, Myanmar", "subitem_website": "http://bit.kuas.edu.tw/~icgec15/"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su Su Aung"}, {"subitem_authors_fullname": "Nay Chi Lynn"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-08-28"}, "item_title": "A Study on Abandoned Object Detection Methods in Video Surveillance System", "item_type_id": "21", "owner": "45", "path": ["1596102355557"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003046", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-08-25"}, "publish_date": "2020-08-25", "publish_status": "0", "recid": "3046", "relation": {}, "relation_version_is_last": true, "title": ["A Study on Abandoned Object Detection Methods in Video Surveillance System"], "weko_shared_id": -1}
A Study on Abandoned Object Detection Methods in Video Surveillance System
http://hdl.handle.net/20.500.12678/0000003046
http://hdl.handle.net/20.500.12678/00000030466e9d7887-94e0-4dd8-9573-71cf5560a0bb
7c1f32e1-4a59-41a6-8c48-4d0c13555189
Name / File | License | Actions |
---|---|---|
A Study on Abandoned Object Detection Methods in Video Surveillance System.pdf (357 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Conference paper | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | A Study on Abandoned Object Detection Methods in Video Surveillance System | |||||
Language | en | |||||
Publication date | 2015-08-28 | |||||
Authors | ||||||
Su Su Aung | ||||||
Nay Chi Lynn | ||||||
Description | ||||||
Now a day, there is a need to do research in abandoned object detection due to increase in attack by terrorists or anti social elements at public places. The traditional way to observe the places or to track the places is the CCTV cameras which require a human operator to monitor the digital camera images. Although public areas are observed by many surveillance cameras, humans can monitor a few cameras at a time. In real world monitoring applications, abandoned object detection remains to be a challenging task due to factors such as background complexity, illumination variations, noise, and occlusions and “ghost” effect which is left by the removed object. As a fundamental first step in many computer vision applications such as object tracking, behavior understanding, object or event recognition, and automated video surveillance, various algorithms have been developed ranging from simple approaches to more sophisticated ones. In this paper, the study on the different methods proposed so far for detecting the abandoned object in the surveillance area is provided. |
||||||
Keywords | ||||||
Object Detection | ||||||
Conference papers | ||||||
ICGEC-2015 | ||||||
26-28 August, 2015 | ||||||
4th International Conference on Genetic and Evolutionary Computing | ||||||
Yangon, Myanmar | ||||||
http://bit.kuas.edu.tw/~icgec15/ |