Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "7c1f32e1-4a59-41a6-8c48-4d0c13555189"}, "_deposit": {"created_by": 45, "id": "3046", "owner": "45", "owners": [45], "owners_ext": {"displayname": "", "username": ""}, "pid": {"revision_id": 0, "type": "recid", "value": "3046"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3046", "sets": ["1596102355557", "user-uit"]}, "communities": ["uit"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "A Study on Abandoned Object Detection Methods in Video Surveillance System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Now a day, there is a need to do research in abandoned object detection due\nto increase in attack by terrorists or anti social elements at public places. The\ntraditional way to observe the places or to track the places is the CCTV cameras\nwhich require a human operator to monitor the digital camera images. Although\npublic areas are observed by many surveillance cameras, humans can monitor a\nfew cameras at a time. In real world monitoring applications, abandoned object\ndetection remains to be a challenging task due to factors such as background\ncomplexity, illumination variations, noise, and occlusions and “ghost” effect\nwhich is left by the removed object. As a fundamental first step in many\ncomputer vision applications such as object tracking, behavior understanding,\nobject or event recognition, and automated video surveillance, various\nalgorithms have been developed ranging from simple approaches to more\nsophisticated ones. In this paper, the study on the different methods proposed so\nfar for detecting the abandoned object in the surveillance area is provided."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Object Detection"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-08-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "A Study on Abandoned Object Detection Methods in Video Surveillance System.pdf", "filesize": [{"value": "357 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "mimetype": "application/pdf", "size": 357000.0, "url": {"url": "https://meral.edu.mm/record/3046/files/A Study on Abandoned Object Detection Methods in Video Surveillance System.pdf"}, "version_id": "367f39d1-e2df-4056-beb9-ef93cef12813"}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "ICGEC-2015", "subitem_c_date": "26-28 August, 2015", "subitem_conference_title": "4th International Conference on Genetic and Evolutionary Computing", "subitem_place": "Yangon, Myanmar", "subitem_website": "http://bit.kuas.edu.tw/~icgec15/"}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Su Su Aung"}, {"subitem_authors_fullname": "Nay Chi Lynn"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Conference paper"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-08-28"}, "item_title": "A Study on Abandoned Object Detection Methods in Video Surveillance System", "item_type_id": "21", "owner": "45", "path": ["1596102355557"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003046", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-08-25"}, "publish_date": "2020-08-25", "publish_status": "0", "recid": "3046", "relation": {}, "relation_version_is_last": true, "title": ["A Study on Abandoned Object Detection Methods in Video Surveillance System"], "weko_shared_id": -1}
  1. University of Information Technology
  2. Faculty of Computer Science

A Study on Abandoned Object Detection Methods in Video Surveillance System

http://hdl.handle.net/20.500.12678/0000003046
http://hdl.handle.net/20.500.12678/0000003046
6e9d7887-94e0-4dd8-9573-71cf5560a0bb
7c1f32e1-4a59-41a6-8c48-4d0c13555189
None
Preview
Name / File License Actions
A A Study on Abandoned Object Detection Methods in Video Surveillance System.pdf (357 Kb)
Publication type
Conference paper
Upload type
Publication
Title
Title A Study on Abandoned Object Detection Methods in Video Surveillance System
Language en
Publication date 2015-08-28
Authors
Su Su Aung
Nay Chi Lynn
Description
Now a day, there is a need to do research in abandoned object detection due
to increase in attack by terrorists or anti social elements at public places. The
traditional way to observe the places or to track the places is the CCTV cameras
which require a human operator to monitor the digital camera images. Although
public areas are observed by many surveillance cameras, humans can monitor a
few cameras at a time. In real world monitoring applications, abandoned object
detection remains to be a challenging task due to factors such as background
complexity, illumination variations, noise, and occlusions and “ghost” effect
which is left by the removed object. As a fundamental first step in many
computer vision applications such as object tracking, behavior understanding,
object or event recognition, and automated video surveillance, various
algorithms have been developed ranging from simple approaches to more
sophisticated ones. In this paper, the study on the different methods proposed so
far for detecting the abandoned object in the surveillance area is provided.
Keywords
Object Detection
Conference papers
ICGEC-2015
26-28 August, 2015
4th International Conference on Genetic and Evolutionary Computing
Yangon, Myanmar
http://bit.kuas.edu.tw/~icgec15/
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-08-25 17:26:57.603851
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL