Event Sensing on Distributed Video Sensor Networks

Size: px
Start display at page:

Download "Event Sensing on Distributed Video Sensor Networks"

Transcription

1 Event Sensing on Distributed Video Sensor Networks Edward Chang Associate Professor Department of Electrical and Computer Engineering University of California

2 Collaborator Prof. Yuan-Fang Wang Industry Partners Proximex ArgusSenses Intel Students Acknowledgement Ankur Jain (lead), Diana Han, Dan Koppel, Kyle Kakligian, Arun Qamra, David Trainor, Tomy Tsai

3 Berkeley smart dust project Stanford multi-camera array

4

5 Desired Features [refs #1,7,8,12] Independent Cameras Multiple Cameras Static, Wired Cameras Mobile, Wireless, PTZ cameras Manual Event Recognition Automatic or Semi-automatic Event Recognition Tape-based Storage RAID-based Storage No Protocol Issues Smart Semantic-based Protocols

6 Potential Applications and Needs Applications Emergency search and rescue in natural disaster Deterrence of cross-border illegal activities Reconnaissance and intelligence gathering in digital battlefields Needs Rapid deployment, dynamic configuration, and continuous operations Robust and real-time data fusion and analysis Intelligent event modeling and recognition

7 advertisement of objectvideo.com Wide-area Surveillance

8 Surveillance Scenarios (1) (1) Intrusion Detection (2) (2) Passenger Screening Monitor and alert on tailgating, loitering, exit/closed entry, other unauthorized access (3) (3) Perimeter Monitoring Use biometric facial recognition to identify individuals of interest through existing closed circuit TV surveillance (4) (4) Unattended Baggage Z Z Object tracking and biometric facial recognition to determine vehicles and humans exhibiting suspicious behavior Copyright 2004 Proximex Corp. Identify unattended baggage (or other objects) left for long periods of time

9 Intrusion Detection Loitering, Tailgating 2 Raise low severity alert!! 0 Secure entrance 1 Suspect loiters X seconds, Loitering pattern recognized 8 Correlate alerts and raise critical severity alert if if it s it s the same person! 3 Capture high resolution facial image & soft biometric data 6 Suspect tailgates authorized person in in to to secure area. System captures suspect s high resolution facial image & soft biometric data 7 Raise medium severity alert!! 4 Match watch-list 5 Raise critical severity alert if if there s a match!! Copyright 2004 Proximex Corp.

10 Problem Statement Video Surveillance with Multiple cameras Mobile, wireless networks Intelligent content analysis Real-time query processing Focus of Our Current Work Event sensing including Motion detection Data representation, and Event recognition Sensor network management for Bandwidth and power resource conservation Dynamic routing

11 Research and Development Framework Event detection Far-field coordination and update Near-field sensor data fusion Event representation Hierarchical multiple levels of detail Invariant insensitive to incidental changes Event recognition Temporally correlated event signature Imbalanced training set

12 System Architecture s 1 s 2 Multi-camera Data Fusion s Multi-level level Sequence Descriptor Event Recognition..... s n! Security Alert

13 Validation Scenario p 1 t ) = ( x ( t ), y ( t )) ( 1 1 T z 1 x 1 y 1 Slave station y m Internet x m z m P ( t ) = ( X ( t ), Y ( t ), Z ( t )) T Z Master station z 2 y 2 Y X x 2

14 Event Detection: Coordination and Update [Refs #5, 6] Dual Kalman filters Minimizing Bandwidth and power consumption under pre-specified accuracy constraints Update necessary only when predications diverge Cache dynamic algorithms instead of static data

15 Event Detection: Sensor Data Fusion [Refs #2, 9] Sensing coordination and intelligent data fusion Two-level hierarchy of Kalman filter Top level (feed backward) Fill in missing or occluded trajectory pieces Camera pose & frame rate control z x (0) (0) () t = T (0) x (0) real world p = p & p&& (0) (0) (0) X Internet Bottom level (feed forward) Summarize trajectories in local state vectors X = T Merge state vectors from multiple cameras through registration parameters Slave station world real z ( i) () t Master fusion station ( 0) x P X= P& P&& (0) X= T Slave station x ( i) p = p & p&& ( i) ( i) ( i) z ( m 1) x () t ( m 1) world real x ( m 1) = T ( m 1 ) real ( m 1) x ( p ( = p & ( p&& world ( m 1) X Slave station m 1) m 1) m 1)

16 Sequence Data Learning [Ref #3] Sequence Sequence Representation Numeric-valued Representation Symbolic-valued Representation Discrete Fourier Transform Wavelet Piece-wise Linear Singular Value Decomposition Natural Language Strings

17 Requirements Different Event Queries of Different Granularities Coarse: temporal pattern query Fine: exact match Same Events under Different Representations Circling behavior in daytime (normal) Circling behavior with abrupt turn (suspicious) Circling behavior during midnight (suspicious) Multi-level Representation Select proper resolutions in a concept and context dependent way

18 Kernel Design Steps 1. Design primary kernel based on symbolic description 2. Design secondary kernels based on multi-attribute vector description 3. Fuse kernels

19 Kernel Fusion Definition x: input vector; y: event label {K 1,,K D } be a set of D kernels for D representations K d is a (dis)similarity matrix of the training instances K d should be positive semi-definite! Kernel Fusion K fusion (x,y)= F(K 1,,K D ) F: Tensor product F: Weighted sum F: Non-linear super kernel

20 Event Recognition: Imbalanced Data Set [Refs #4, 10] Negative samples significantly outnumber positive samples Bayesian risk associated with false negative significantly outweighs false positive Adaptive conformal mapping at decision boundary

21 Sensor Network Management [Ref #8] Bit-per-joule metric Multi-hop routing Enclosure algorithm for dynamic neighbor discovery

22

23 Experimental Results: Semantic Indexing [Refs #9, 11]

24 Experimental Results: Statistical Learning

25 Concluding Remarks Multi-sensor registration and fusion Hierarchical and invariant event representation Sequence data learning using imbalanced data set Mobile camera network bandwidth and power consumption management

26 References 1. A collaborative Camera System for Surveillance, A. Jain, Yuan-Fang Wang, E. Y. Chang, et al., UCSB Technical Report, November The Anatomy of a Multi-camera Security Surveillance System, L. Jiao, Y. Wu, G. Wu, E. Y. Chang, Y.-F. Wang, ACM Multimedia System Journal Special Issue, Volume 10, Number 2, October Distance Function Design and Fusion for Sequence Data, Y. Wu and E. Y. Chang, ACM International Conference on Information and Knowledge Management (CIKM), DC, November 2004 (19% accepted). 4. Aligning Boundary in Kernel Space for Learning Imbalanced Dataset, G. Wu and E. Y. Chang, IEEE International Conference on Data Mining (ICDM), United Kingdom, November 2004 (39/452 or 9% accepted). 5. Adaptive Sampling for Sensor Networks, A. Jain and E. Y. Chang, International Workshop on Data Management for Sensor Networks in conjunction with VLDB, Toronto, August Adaptive Stream Resource Management Using Kalman Filters, A. Jain, E. Y. Chang, and Y.-F. Wang, ACM International Conference on Management of Data (SIGMOD), pp.11-22, Paris, June 2004 (16% accepted). 7. Toward Building a Robust and Intelligent Video Surveillance System: A Case Study (invited paper), E. Y. Chang, Y.-F. Wang, and I-J. Wang, IEEE International Conference on Multimedia, Taipei, June Distributed Video Data Fusion and Mining, E.Y. Chang, Y.-F. Wang, and Volkan Rodoplu, SPIE Conf. on Defense and Security --- Sensors, and Command, Control, Communications, and Intelligence Technologies for Homeland Security and Homeland Defense (co-chaired by DARPA, Dod/Doj), Orlando, April Multi-camera Spatio-temporal Fusion and Biased Sequence-data Learning for Security Surveillance, G. Wu, Y. Wu, L. Jiao, Y.-F. Wang, and E. Y. Chang, ACM International Conference on Multimedia, pp , Berkeley, November 2003 (17% accepted). 10. Adaptive Feature-Space Conformal Transformation for Imbalanced-Data Learning, G. Wu and E.Y. Chang, The Twentieth International Conference on Machine Learning (ICML), pp , Washington DC, August Invariant Feature Extraction and Biased Statistical Inference for Video Surveillance, Y. Wu, L. Jiao, G. Wu, E. Y. Chang, and Y.-F. Wang, IEEE International Conference on Advanced Video and Signal Based Surveillance, pp , Miami, July A Framework for Detecting Hazardous Events, Y. Wu, G. Wu, and E.Y. Chang, IS&T/SPIE International Conference on Storage and Retrieval for Media Databases, San Jose, January More on

Toward Building a Robust and Intelligent Video Surveillance System: A Case Study Edward Chang and Yuan-Fang Wang

Toward Building a Robust and Intelligent Video Surveillance System: A Case Study Edward Chang and Yuan-Fang Wang Toward Building a Robust and Intelligent Video Surveillance System: A Case Study Edward Chang and Yuan-Fang Wang Douglas R. Lanman CS 295-1: Sensor Data Management 28 Sept. 2005 1 Outline Introduction

More information

Managing and Mining Video-Sensor Data

Managing and Mining Video-Sensor Data Managing and Mining Video-Sensor Data Edward Y. Chang, Ankur Jain, Navneet Panda, Yuan-Fang Wang, Gang Wu, and Yi Wu Department of Electrical Engineering & Computer Science University of California, Santa

More information

1. Discovering Important Nodes through Graph Entropy The Case of Enron Database

1. Discovering Important Nodes through Graph Entropy The Case of Enron  Database 1. Discovering Important Nodes through Graph Entropy The Case of Enron Email Database ACM KDD 2005 Chicago, Illinois. 2. Optimizing Video Search Reranking Via Minimum Incremental Information Loss ACM MIR

More information

Chapter 1, Introduction

Chapter 1, Introduction CSI 4352, Introduction to Data Mining Chapter 1, Introduction Young-Rae Cho Associate Professor Department of Computer Science Baylor University What is Data Mining? Definition Knowledge Discovery from

More information

Video Alignment. Literature Survey. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin

Video Alignment. Literature Survey. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Literature Survey Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Omer Shakil Abstract This literature survey compares various methods

More information

Title: An Integrated Design Environment to Evaluate Power/Performance Tradeoffs for Sensor Network Applications 1

Title: An Integrated Design Environment to Evaluate Power/Performance Tradeoffs for Sensor Network Applications 1 Title: An Integrated Design Environment to Evaluate Power/Performance Tradeoffs for Sensor Network Applications 1 Authors Mr. Amol B. Bakshi (first author, corresponding author) 3740 McClintock Ave, EEB

More information

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security

Workshops. 1. SIGMM Workshop on Social Media. 2. ACM Workshop on Multimedia and Security 1. SIGMM Workshop on Social Media SIGMM Workshop on Social Media is a workshop in conjunction with ACM Multimedia 2009. With the growing of user-centric multimedia applications in the recent years, this

More information

Multiple-Choice Questionnaire Group C

Multiple-Choice Questionnaire Group C Family name: Vision and Machine-Learning Given name: 1/28/2011 Multiple-Choice naire Group C No documents authorized. There can be several right answers to a question. Marking-scheme: 2 points if all right

More information

Video Alignment. Final Report. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin

Video Alignment. Final Report. Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Final Report Spring 2005 Prof. Brian Evans Multidimensional Digital Signal Processing Project The University of Texas at Austin Omer Shakil Abstract This report describes a method to align two videos.

More information

Outline. Project Goals

Outline. Project Goals Roque Burleson, Mayuri Shakamuri CS 589-04: Image Processing Spring 2008 Instructor: Dr. Qingzhong Liu New Mexico Tech Outline Hyperspectral Imaging Eigen Faces Face Recognition Face Tracking Other Methods

More information

An overview of infrastructures and data managers for dependable sensor networks

An overview of infrastructures and data managers for dependable sensor networks EYEWIRE An overview of infrastructures and data managers for dependable sensor networks This article describes issues and challenges for secure sensor information management. In particular, we will discuss

More information

SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK

SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK SENSOR SELECTION SCHEME IN TEMPERATURE WIRELESS SENSOR NETWORK Mohammad Alwadi 1 and Girija Chetty 2 1 Department of Information Sciences and Engineering, The University of Canberra, Canberra, Australia

More information

Sketch Based Image Retrieval Approach Using Gray Level Co-Occurrence Matrix

Sketch Based Image Retrieval Approach Using Gray Level Co-Occurrence Matrix Sketch Based Image Retrieval Approach Using Gray Level Co-Occurrence Matrix K... Nagarjuna Reddy P. Prasanna Kumari JNT University, JNT University, LIET, Himayatsagar, Hyderabad-8, LIET, Himayatsagar,

More information

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6 Data Sheet savvi Version 5.3 savvi TM is a unified video analytics software solution that offers a wide variety of analytics functionalities through a single, easy to use platform that integrates with

More information

Action recognition in videos

Action recognition in videos Action recognition in videos Cordelia Schmid INRIA Grenoble Joint work with V. Ferrari, A. Gaidon, Z. Harchaoui, A. Klaeser, A. Prest, H. Wang Action recognition - goal Short actions, i.e. drinking, sit

More information

Abstract. 1. Introduction

Abstract. 1. Introduction SOOAWSN: A complete framework for Wireless Sensor Networks Graduate Student Paper Mohammed A. Abuhelaleh and Khaled M. Elleithy School of Engineering University Of Bridgeport, Bridgeport, CT {mabuhela,

More information

Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks

Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks Wide Area Ontology Integration Scheme for Reasoning Agents in Surveillance Networks Soomi Yang 1*, Heejung Byun 2 1 Department of Information Engineering, the University of Suwon, Hwasung-si, Gyeonggido,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion

Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Approach to Increase Accuracy of Multimodal Biometric System for Feature Level Fusion Er. Munish Kumar, Er. Prabhjit Singh M-Tech(Scholar) Global Institute of Management and Emerging Technology Assistant

More information

SOLUTION BRIEF AN INTELLIGENT VIDEO ANALYTICS PLATFORM FOR SMART CITIES

SOLUTION BRIEF AN INTELLIGENT VIDEO ANALYTICS PLATFORM FOR SMART CITIES SOLUTION BRIEF AN INTELLIGENT VIDEO ANALYTICS PLATFORM FOR SMART CITIES PAGE 1 INTRODUCTION In 1950, the fishing village of Shenzhen in south-east China had 3,148 inhabitants. By 2025 it is predicted that

More information

Social Behavior Prediction Through Reality Mining

Social Behavior Prediction Through Reality Mining Social Behavior Prediction Through Reality Mining Charlie Dagli, William Campbell, Clifford Weinstein Human Language Technology Group MIT Lincoln Laboratory This work was sponsored by the DDR&E / RRTO

More information

CS229: Action Recognition in Tennis

CS229: Action Recognition in Tennis CS229: Action Recognition in Tennis Aman Sikka Stanford University Stanford, CA 94305 Rajbir Kataria Stanford University Stanford, CA 94305 asikka@stanford.edu rkataria@stanford.edu 1. Motivation As active

More information

COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE

COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE Volume 7 No. 22 207, 7-75 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu COMPARATIVE ANALYSIS OF EYE DETECTION AND TRACKING ALGORITHMS FOR SURVEILLANCE

More information

SHRP 2 Safety Research Symposium July 27, Site-Based Video System Design and Development: Research Plans and Issues

SHRP 2 Safety Research Symposium July 27, Site-Based Video System Design and Development: Research Plans and Issues SHRP 2 Safety Research Symposium July 27, 2007 Site-Based Video System Design and Development: Research Plans and Issues S09 Objectives Support SHRP2 program research questions: Establish crash surrogates

More information

Hybrid Face Recognition and Classification System for Real Time Environment

Hybrid Face Recognition and Classification System for Real Time Environment Hybrid Face Recognition and Classification System for Real Time Environment Dr.Matheel E. Abdulmunem Department of Computer Science University of Technology, Baghdad, Iraq. Fatima B. Ibrahim Department

More information

AN EFFECTIVE APPROACH FOR VIDEO COPY DETECTION USING SIFT FEATURES

AN EFFECTIVE APPROACH FOR VIDEO COPY DETECTION USING SIFT FEATURES AN EFFECTIVE APPROACH FOR VIDEO COPY DETECTION USING SIFT FEATURES Miss. S. V. Eksambekar 1 Prof. P.D.Pange 2 1, 2 Department of Electronics & Telecommunication, Ashokrao Mane Group of Intuitions, Wathar

More information

A Comparison of SIFT and SURF

A Comparison of SIFT and SURF A Comparison of SIFT and SURF P M Panchal 1, S R Panchal 2, S K Shah 3 PG Student, Department of Electronics & Communication Engineering, SVIT, Vasad-388306, India 1 Research Scholar, Department of Electronics

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

Definition, Detection, and Evaluation of Meeting Events in Airport Surveillance Videos

Definition, Detection, and Evaluation of Meeting Events in Airport Surveillance Videos Definition, Detection, and Evaluation of Meeting Events in Airport Surveillance Videos Sung Chun Lee, Chang Huang, and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA sungchun@usc.edu,

More information

Human Detection. A state-of-the-art survey. Mohammad Dorgham. University of Hamburg

Human Detection. A state-of-the-art survey. Mohammad Dorgham. University of Hamburg Human Detection A state-of-the-art survey Mohammad Dorgham University of Hamburg Presentation outline Motivation Applications Overview of approaches (categorized) Approaches details References Motivation

More information

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2

Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 Energy Conservation through Sleep Scheduling in Wireless Sensor Network 1. Sneha M. Patil, Archana B. Kanwade 2 1 Student Department of Electronics & Telecommunication, SITS, Savitribai Phule Pune University,

More information

Software Design Document

Software Design Document ÇANKAYA UNIVERSITY Software Design Document Content Based Video Segmentation Berk Can Özütemiz-201311049, Ece Nalçacı-201411040, Engin Öztürk-201311049 28/12/2017 Table of Contents 1. INTRODUCTION... 3

More information

A Study on Different Challenges in Facial Recognition Methods

A Study on Different Challenges in Facial Recognition Methods Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.521

More information

Object Detection in Video Streams

Object Detection in Video Streams Object Detection in Video Streams Sandhya S Deore* *Assistant Professor Dept. of Computer Engg., SRES COE Kopargaon *sandhya.deore@gmail.com ABSTRACT Object Detection is the most challenging area in video

More information

On Demand secure routing protocol resilient to Byzantine failures

On Demand secure routing protocol resilient to Byzantine failures On Demand secure routing protocol resilient to Byzantine failures Primary Reference: B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An on-demand secure routing protocol resilient to Byzantine failures,

More information

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6 Data Sheet savvi Version 5.3 savvi TM is a unified video analytics software solution that offers a wide variety of analytics functionalities through a single, easy to use platform that integrates with

More information

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method

Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.5, May 2017 265 Link Lifetime Prediction in Mobile Ad-Hoc Network Using Curve Fitting Method Mohammad Pashaei, Hossein Ghiasy

More information

Datasheet Intrusion Detection

Datasheet Intrusion Detection Datasheet Intrusion Detection Version 3.6 This Specification Sheet gives the details of system requirements, feature details and other salient points of AllGoVision s Intrusion Detection applications.

More information

Recall precision graph

Recall precision graph VIDEO SHOT BOUNDARY DETECTION USING SINGULAR VALUE DECOMPOSITION Λ Z.»CERNEKOVÁ, C. KOTROPOULOS AND I. PITAS Aristotle University of Thessaloniki Box 451, Thessaloniki 541 24, GREECE E-mail: (zuzana, costas,

More information

Cisco Kinetic for Cities Safety and Security Video Analytics (Kiwi Security)

Cisco Kinetic for Cities Safety and Security Video Analytics (Kiwi Security) Data Sheet Cisco Kinetic for Cities Safety and Security Video Analytics (Kiwi Security) Cisco Kinetic for Cities Safety and Security Video Analytics from Kiwi Security transforms existing and new video

More information

Research Faculty Summit Systems Fueling future disruptions

Research Faculty Summit Systems Fueling future disruptions Research Faculty Summit 2018 Systems Fueling future disruptions Elevating the Edge to be a Peer of the Cloud Kishore Ramachandran Embedded Pervasive Lab, Georgia Tech August 2, 2018 Acknowledgements Enrique

More information

USC Real-time Pattern Isolation and Recognition Over Immersive Sensor Data Streams

USC Real-time Pattern Isolation and Recognition Over Immersive Sensor Data Streams Real-time Pattern Isolation and Recognition Over Immersive Sensor Data Streams Cyrus Shahabi and Donghui Yan Integrated Media Systems Center and Computer Science Department, University of Southern California

More information

CV of Qixiang Ye. University of Chinese Academy of Sciences

CV of Qixiang Ye. University of Chinese Academy of Sciences 2012-12-12 University of Chinese Academy of Sciences Qixiang Ye received B.S. and M.S. degrees in mechanical & electronic engineering from Harbin Institute of Technology (HIT) in 1999 and 2001 respectively,

More information

NOVEL APPROACH TO CONTENT-BASED VIDEO INDEXING AND RETRIEVAL BY USING A MEASURE OF STRUCTURAL SIMILARITY OF FRAMES. David Asatryan, Manuk Zakaryan

NOVEL APPROACH TO CONTENT-BASED VIDEO INDEXING AND RETRIEVAL BY USING A MEASURE OF STRUCTURAL SIMILARITY OF FRAMES. David Asatryan, Manuk Zakaryan International Journal "Information Content and Processing", Volume 2, Number 1, 2015 71 NOVEL APPROACH TO CONTENT-BASED VIDEO INDEXING AND RETRIEVAL BY USING A MEASURE OF STRUCTURAL SIMILARITY OF FRAMES

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

Improving 3D Shape Retrieval Methods based on Bag-of Feature Approach by using Local Codebooks

Improving 3D Shape Retrieval Methods based on Bag-of Feature Approach by using Local Codebooks Improving 3D Shape Retrieval Methods based on Bag-of Feature Approach by using Local Codebooks El Wardani Dadi 1,*, El Mostafa Daoudi 1 and Claude Tadonki 2 1 University Mohammed First, Faculty of Sciences,

More information

Multi-Camera Occlusion and Sudden-Appearance-Change Detection Using Hidden Markovian Chains

Multi-Camera Occlusion and Sudden-Appearance-Change Detection Using Hidden Markovian Chains 1 Multi-Camera Occlusion and Sudden-Appearance-Change Detection Using Hidden Markovian Chains Xudong Ma Pattern Technology Lab LLC, U.S.A. Email: xma@ieee.org arxiv:1610.09520v1 [cs.cv] 29 Oct 2016 Abstract

More information

Facial Expression Recognition using Principal Component Analysis with Singular Value Decomposition

Facial Expression Recognition using Principal Component Analysis with Singular Value Decomposition ISSN: 2321-7782 (Online) Volume 1, Issue 6, November 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Facial

More information

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION

CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION CROSS LAYER PROTOCOL (APTEEN) USING WSN FOR REAL TIME APPLICATION V. A. Dahifale 1, N. Y. Siddiqui 2 PG Student, College of Engineering Kopargaon, Maharashtra, India 1 Assistant Professor, College of Engineering

More information

Video Privacy in the Age of Automated Surveillance

Video Privacy in the Age of Automated Surveillance Video Privacy in the Age of Automated Surveillance Lisa M. Brown, Senem Velipasalar, Andrew W. Senior, Sharath Pankanti, Arun Hampapur, Chiao-fe Shu, Ying-li Tian IBM T.J Watson Research Center Yorktown

More information

Searching Video Collections:Part I

Searching Video Collections:Part I Searching Video Collections:Part I Introduction to Multimedia Information Retrieval Multimedia Representation Visual Features (Still Images and Image Sequences) Color Texture Shape Edges Objects, Motion

More information

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe

NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe NeoFace Watch real-time face recognition How does it work? May 2018 Global Face Recognition Centre of Excellence NEC Europe Executive Summary There is much misunderstanding about the operation of real-time

More information

Class 3: Advanced Moving Object Detection and Alert Detection Feb. 18, 2008

Class 3: Advanced Moving Object Detection and Alert Detection Feb. 18, 2008 Class 3: Advanced Moving Object Detection and Alert Detection Feb. 18, 2008 Instructor: YingLi Tian Video Surveillance E6998-007 Senior/Feris/Tian 1 Outlines Moving Object Detection with Distraction Motions

More information

Using Geometric Blur for Point Correspondence

Using Geometric Blur for Point Correspondence 1 Using Geometric Blur for Point Correspondence Nisarg Vyas Electrical and Computer Engineering Department, Carnegie Mellon University, Pittsburgh, PA Abstract In computer vision applications, point correspondence

More information

Clustering Methods for Video Browsing and Annotation

Clustering Methods for Video Browsing and Annotation Clustering Methods for Video Browsing and Annotation Di Zhong, HongJiang Zhang 2 and Shih-Fu Chang* Institute of System Science, National University of Singapore Kent Ridge, Singapore 05 *Center for Telecommunication

More information

Event Detection through Differential Pattern Mining in Internet of Things

Event Detection through Differential Pattern Mining in Internet of Things Event Detection through Differential Pattern Mining in Internet of Things Authors: Md Zakirul Alam Bhuiyan and Jie Wu IEEE MASS 2016 The 13th IEEE International Conference on Mobile Ad hoc and Sensor Systems

More information

Feature Subset Selection Utilizing BioMechanical Characteristics for Hand Gesture Recognition

Feature Subset Selection Utilizing BioMechanical Characteristics for Hand Gesture Recognition Feature Subset Selection Utilizing BioMechanical Characteristics for Hand Gesture Recognition Farid Parvini Computer Science Department University of Southern California Los Angeles, USA Dennis McLeod

More information

Research on outlier intrusion detection technologybased on data mining

Research on outlier intrusion detection technologybased on data mining Acta Technica 62 (2017), No. 4A, 635640 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on outlier intrusion detection technologybased on data mining Liang zhu 1, 2 Abstract. With the rapid development

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

Chapter 9 Object Tracking an Overview

Chapter 9 Object Tracking an Overview Chapter 9 Object Tracking an Overview The output of the background subtraction algorithm, described in the previous chapter, is a classification (segmentation) of pixels into foreground pixels (those belonging

More information

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network

Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network Energy Efficient Routing Using Sleep Scheduling and Clustering Approach for Wireless Sensor Network G.Premalatha 1, T.K.P.Rajagopal 2 Computer Science and Engineering Department, Kathir College of Engineering

More information

Subject-Oriented Image Classification based on Face Detection and Recognition

Subject-Oriented Image Classification based on Face Detection and Recognition 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Standard CIP-006-4c Cyber Security Physical Security

Standard CIP-006-4c Cyber Security Physical Security A. Introduction 1. Title: Cyber Security Physical Security of Critical Cyber Assets 2. Number: CIP-006-4c 3. Purpose: Standard CIP-006-4c is intended to ensure the implementation of a physical security

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Parallel Architecture & Programing Models for Face Recognition

Parallel Architecture & Programing Models for Face Recognition Parallel Architecture & Programing Models for Face Recognition Submitted by Sagar Kukreja Computer Engineering Department Rochester Institute of Technology Agenda Introduction to face recognition Feature

More information

Detection of Moving Object using Continuous Background Estimation Based on Probability of Pixel Intensity Occurrences

Detection of Moving Object using Continuous Background Estimation Based on Probability of Pixel Intensity Occurrences International Journal of Computer Science and Telecommunications [Volume 3, Issue 5, May 2012] 65 ISSN 2047-3338 Detection of Moving Object using Continuous Background Estimation Based on Probability of

More information

Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks

Research on Intrusion Detection Algorithm Based on Multi-Class SVM in Wireless Sensor Networks Communications and Network, 2013, 5, 524-528 http://dx.doi.org/10.4236/cn.2013.53b2096 Published Online September 2013 (http://www.scirp.org/journal/cn) Research on Intrusion Detection Algorithm Based

More information

Datasheet Intrusion Detection

Datasheet Intrusion Detection Datasheet Intrusion Detection Version 3.7 This Specification Sheet gives the details of system requirements, feature details and other salient points of AllGoVision s Intrusion Detection applications.

More information

Dax IVMS. Introduction. Key Features:

Dax IVMS. Introduction. Key Features: Dax IVMS Introduction IVMS Professional is an ideal Video Management Software for mid-sized applications. It s capable of managing total of 64 network cameras and delivering high quality live and playback

More information

VIDEO OBJECT SEGMENTATION BY EXTENDED RECURSIVE-SHORTEST-SPANNING-TREE METHOD. Ertem Tuncel and Levent Onural

VIDEO OBJECT SEGMENTATION BY EXTENDED RECURSIVE-SHORTEST-SPANNING-TREE METHOD. Ertem Tuncel and Levent Onural VIDEO OBJECT SEGMENTATION BY EXTENDED RECURSIVE-SHORTEST-SPANNING-TREE METHOD Ertem Tuncel and Levent Onural Electrical and Electronics Engineering Department, Bilkent University, TR-06533, Ankara, Turkey

More information

Shape Descriptor using Polar Plot for Shape Recognition.

Shape Descriptor using Polar Plot for Shape Recognition. Shape Descriptor using Polar Plot for Shape Recognition. Brijesh Pillai ECE Graduate Student, Clemson University bpillai@clemson.edu Abstract : This paper presents my work on computing shape models that

More information

Energy Efficient Tracking of Land-Based Targets Using Wireless Sensor Networks

Energy Efficient Tracking of Land-Based Targets Using Wireless Sensor Networks Energy Efficient Tracking of Land-Based Targets Using Wireless Sensor Networks Ali Berrached Le Phan University of Houston-Downtown One Main Street S705, Houston, Texas 77002 (713)221-8639 Berracheda@uhd.edu

More information

About Me. Bio: Research Interests:

About Me. Bio: Research Interests: About Me Bio: Sr. Staff Researcher, Core Networks R&D, Huawei Tech USA, 2010.10~ to date Asst Prof, HK Polytechnic Univ, CTO, Mudi Tech, 2008.04~2010.09 Senior, Senior Staff, and then Principal Staff Researcher,

More information

Motion Tracking and Event Understanding in Video Sequences

Motion Tracking and Event Understanding in Video Sequences Motion Tracking and Event Understanding in Video Sequences Isaac Cohen Elaine Kang, Jinman Kang Institute for Robotics and Intelligent Systems University of Southern California Los Angeles, CA Objectives!

More information

Critique: Efficient Iris Recognition by Characterizing Key Local Variations

Critique: Efficient Iris Recognition by Characterizing Key Local Variations Critique: Efficient Iris Recognition by Characterizing Key Local Variations Authors: L. Ma, T. Tan, Y. Wang, D. Zhang Published: IEEE Transactions on Image Processing, Vol. 13, No. 6 Critique By: Christopher

More information

An Improved Genetic Algorithm based Fault tolerance Method for distributed wireless sensor networks.

An Improved Genetic Algorithm based Fault tolerance Method for distributed wireless sensor networks. An Improved Genetic Algorithm based Fault tolerance Method for distributed wireless sensor networks. Anagha Nanoti, Prof. R. K. Krishna M.Tech student in Department of Computer Science 1, Department of

More information

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY

A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY A DWT, DCT AND SVD BASED WATERMARKING TECHNIQUE TO PROTECT THE IMAGE PIRACY Md. Maklachur Rahman 1 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology,

More information

Cross Reference Strategies for Cooperative Modalities

Cross Reference Strategies for Cooperative Modalities Cross Reference Strategies for Cooperative Modalities D.SRIKAR*1 CH.S.V.V.S.N.MURTHY*2 Department of Computer Science and Engineering, Sri Sai Aditya institute of Science and Technology Department of Information

More information

Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering

Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering Dynamic Optimization of Generalized SQL Queries with Horizontal Aggregations Using K-Means Clustering Abstract Mrs. C. Poongodi 1, Ms. R. Kalaivani 2 1 PG Student, 2 Assistant Professor, Department of

More information

FUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION

FUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION FUZZY FOREST LEARNING BASED ONLINE FACIAL BIOMETRIC VERIFICATION FOR PRIVACY PROTECTION Supritha G M 1, Shivanand R D 2 1 P.G. Student, Dept. of Computer Science and Engineering, B.I.E.T College, Karnataka,

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

Carmen Alonso Montes 23rd-27th November 2015

Carmen Alonso Montes 23rd-27th November 2015 Practical Computer Vision: Theory & Applications 23rd-27th November 2015 Wrap up Today, we are here 2 Learned concepts Hough Transform Distance mapping Watershed Active contours 3 Contents Wrap up Object

More information

Criminal Identification System Using Face Detection and Recognition

Criminal Identification System Using Face Detection and Recognition Criminal Identification System Using Face Detection and Recognition Piyush Kakkar 1, Mr. Vibhor Sharma 2 Information Technology Department, Maharaja Agrasen Institute of Technology, Delhi 1 Assistant Professor,

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Palmprint Recognition Using Transform Domain and Spatial Domain Techniques Jayshri P. Patil 1, Chhaya Nayak 2 1# P. G. Student, M. Tech. Computer Science and Engineering, 2* HOD, M. Tech. Computer Science

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

Person Detection Using Image Covariance Descriptor

Person Detection Using Image Covariance Descriptor Person Detection Using Image Covariance Descriptor Ms. Vinutha Raj B 1, Dr. M B Anandaraju 2, 1 P.G Student, Department of ECE, BGSIT-Mandya, Karnataka 2 Professor, Head of Department ECE, BGSIT-Mandya,

More information

An Efficient Approach for Color Pattern Matching Using Image Mining

An Efficient Approach for Color Pattern Matching Using Image Mining An Efficient Approach for Color Pattern Matching Using Image Mining * Manjot Kaur Navjot Kaur Master of Technology in Computer Science & Engineering, Sri Guru Granth Sahib World University, Fatehgarh Sahib,

More information

State-Based Synchronization Protocol in Sensor Networks

State-Based Synchronization Protocol in Sensor Networks State-Based Synchronization Protocol in Sensor Networks Shang-Chih Hsu Wei Yen 1 1 Department of Computer Science and Engineering, Tatung University, Taipei, Taiwan, ROC shanzihsu@yahoo.com.tw, wyen@ttu.edu.tw

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

Clustering in Big Data Using K-Means Algorithm

Clustering in Big Data Using K-Means Algorithm Clustering in Big Data Using K-Means Algorithm Ajitesh Janaswamy, B.E Dept of CSE, BITS Pilani, Dubai Campus. ABSTRACT: K-means is the most widely used clustering algorithm due to its fairly straightforward

More information

Haresh D. Chande #, Zankhana H. Shah *

Haresh D. Chande #, Zankhana H. Shah * Illumination Invariant Face Recognition System Haresh D. Chande #, Zankhana H. Shah * # Computer Engineering Department, Birla Vishvakarma Mahavidyalaya, Gujarat Technological University, India * Information

More information

THE description and representation of the shape of an object

THE description and representation of the shape of an object Enhancement of Shape Description and Representation by Slope Ali Salem Bin Samma and Rosalina Abdul Salam Abstract Representation and description of object shapes by the slopes of their contours or borders

More information

Multi-feature face liveness detection method combining motion information

Multi-feature face liveness detection method combining motion information Volume 04 - Issue 11 November 2018 PP. 36-40 Multi-feature face liveness detection method combining motion information Changlin LI (School of Computer Science and Technology, University of Science and

More information

Surveillance System with Mega-Pixel Scalable Transcoder

Surveillance System with Mega-Pixel Scalable Transcoder MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Surveillance System with Mega-Pixel Scalable Transcoder Toshihiko Hata, Naoki Kuwahara, Derek Schwenke, Anthony Vetro TR2007-008 January 2007

More information

Expanding gait identification methods from straight to curved trajectories

Expanding gait identification methods from straight to curved trajectories Expanding gait identification methods from straight to curved trajectories Yumi Iwashita, Ryo Kurazume Kyushu University 744 Motooka Nishi-ku Fukuoka, Japan yumi@ieee.org Abstract Conventional methods

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information