{"created":"2020-08-25T17:20:36.948656+00:00","id":3046,"links":{},"metadata":{"_buckets":{"deposit":"7c1f32e1-4a59-41a6-8c48-4d0c13555189"},"_deposit":{"created_by":45,"id":"3046","owner":"45","owners":[45],"owners_ext":{"displayname":"","email":"dimennyaung@uit.edu.mm","username":""},"pid":{"revision_id":0,"type":"recid","value":"3046"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3046","sets":["1582963342780:1596102355557"]},"communities":["uit"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"A Study on Abandoned Object Detection Methods in Video Surveillance System","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Now a day, there is a need to do research in abandoned object detection due\nto increase in attack by terrorists or anti social elements at public places. The\ntraditional way to observe the places or to track the places is the CCTV cameras\nwhich require a human operator to monitor the digital camera images. Although\npublic areas are observed by many surveillance cameras, humans can monitor a\nfew cameras at a time. In real world monitoring applications, abandoned object\ndetection remains to be a challenging task due to factors such as background\ncomplexity, illumination variations, noise, and occlusions and “ghost” effect\nwhich is left by the removed object. As a fundamental first step in many\ncomputer vision applications such as object tracking, behavior understanding,\nobject or event recognition, and automated video surveillance, various\nalgorithms have been developed ranging from simple approaches to more\nsophisticated ones. In this paper, the study on the different methods proposed so\nfar for detecting the abandoned object in the surveillance area is provided."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Object Detection"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2020-08-25"}],"displaytype":"preview","filename":"A Study on Abandoned Object Detection Methods in Video Surveillance System.pdf","filesize":[{"value":"357 Kb"}],"format":"application/pdf","url":{"url":"https://meral.edu.mm/record/3046/files/A Study on Abandoned Object Detection Methods in Video Surveillance System.pdf"},"version_id":"367f39d1-e2df-4056-beb9-ef93cef12813"}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"ICGEC-2015","subitem_c_date":"26-28 August, 2015","subitem_conference_title":"4th International Conference on Genetic and Evolutionary Computing","subitem_place":"Yangon, Myanmar","subitem_website":"http://bit.kuas.edu.tw/~icgec15/"}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Su Su Aung"},{"subitem_authors_fullname":"Nay Chi Lynn"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Conference paper"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2015-08-28"},"item_title":"A Study on Abandoned Object Detection Methods in Video Surveillance System","item_type_id":"21","owner":"45","path":["1596102355557"],"publish_date":"2020-08-25","publish_status":"0","recid":"3046","relation_version_is_last":true,"title":["A Study on Abandoned Object Detection Methods in Video Surveillance System"],"weko_creator_id":"45","weko_shared_id":-1},"updated":"2022-03-24T23:12:55.400039+00:00"}