Mohammed et al., 2020 - Google Patents
Implementation of human detection on raspberry pi for smart surveillanceMohammed et al., 2020
- Document ID
- 7206248274289765098
- Author
- Mohammed J
- Paul A
- Kumar A
- Cherukuri J
- Publication year
- Publication venue
- 2020 IEEE international conference for innovation in technology (INOCON)
External Links
Snippet
With the rapidly increasing rate of theft and insecurity, surveillance cameras have become a piece of conventional household equipment for many. Although these cameras just record the footage and make it conceivable to review these recordings after a sense of malicious …
- 241000282414 Homo sapiens 0 title abstract description 26
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19665—Details related to the storage of video surveillance data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00624—Recognising scenes, i.e. recognition of a whole field of perception; recognising scene-specific objects
- G06K9/00771—Recognising scenes under surveillance, e.g. with Markovian modelling of scene activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed circuit television systems, i.e. systems in which the signal is not broadcast
- H04N7/183—Closed circuit television systems, i.e. systems in which the signal is not broadcast for receiving images from a single remote source
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/222—Studio circuitry; Studio devices; Studio equipment; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, TV cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
- H04N5/225—Television cameras; Cameras comprising an electronic image sensor, e.g. digital cameras, video cameras, video cameras, camcorders, webcams, camera modules for embedding in other devices, e.g. mobile phones, computers or vehicles
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Franklin et al. | Anomaly detection in videos for video surveillance applications using neural networks | |
Luo et al. | Edgebox: Live edge video analytics for near real-time event detection | |
CN106791683A (en) | Intelligent image pickup method and device | |
Bushra et al. | Predicting Anomalous and Consigning Apprise During Heists | |
Giorgi et al. | Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments. | |
Qaraqe et al. | PublicVision: A Secure Smart Surveillance System for Crowd Behavior Recognition | |
Muthusenthil et al. | CCTV surveillance system, attacks and design goals | |
Mohammed et al. | Implementation of human detection on raspberry pi for smart surveillance | |
Liu et al. | Inferring behaviors via encrypted video surveillance traffic by machine learning | |
Ng et al. | Surveillance system with motion and face detection using histograms of oriented gradients | |
Arikuma et al. | Intelligent multimedia surveillance system for safer cities | |
Lim et al. | Detection of salient regions in crowded scenes | |
Archana et al. | To detect abnormal event at ATM system by using image processing based on IOT technologies | |
Damera et al. | Normalized Attention Neural Network with Adaptive Feature Recalibration for Detecting the Unusual Activities Using Video Surveillance Camera. | |
Ahmed et al. | Automated intruder detection from image sequences using minimum volume sets | |
Mahmood Ali et al. | Strategies and tools for effective suspicious event detection from video: a survey perspective (COVID-19) | |
Hunain et al. | A framework using artificial intelligence for vision-based automated firearm detection and reporting in smart cities | |
Dhiravidachelvi et al. | Advanced video surveillance system using computer vision | |
SRIVALLIDEVI et al. | Propounding First Artificial Intelligence Approach for Predicting Robbery Behavior Potential in an Indoor Security Camera | |
CHATTOPADHYAY et al. | Framework for Face Recognition in CCTV Based on Internet of Things (IoT) | |
Inbavalli et al. | Efficient Aggressive Behaviour Detection And Alert System Employing Deep Learning Techniques | |
Sharma | Abnormality detection and localization in image and video | |
Kaur et al. | Framework for FOGIoT based Smart Video Surveillance System (SVSS) | |
Priya et al. | Abnormal Events Detection in Surveillance Environments using Machine Learning | |
Wathsala et al. | Towards a Smart Home: An Intelligent Approach to Environment Monitoring and Anti-Theft Alarming |