Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    REVIEW

    Social Media-Based Surveillance Systems for Health Informatics Using Machine and Deep Learning Techniques: A Comprehensive Review and Open Challenges

    Samina Amin1, Muhammad Ali Zeb1, Hani Alshahrani2,*, Mohammed Hamdi2, Mohammad Alsulami2, Asadullah Shaikh3

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1167-1202, 2024, DOI:10.32604/cmes.2023.043921

    Abstract Social media (SM) based surveillance systems, combined with machine learning (ML) and deep learning (DL) techniques, have shown potential for early detection of epidemic outbreaks. This review discusses the current state of SM-based surveillance methods for early epidemic outbreaks and the role of ML and DL in enhancing their performance. Since, every year, a large amount of data related to epidemic outbreaks, particularly Twitter data is generated by SM. This paper outlines the theme of SM analysis for tracking health-related issues and detecting epidemic outbreaks in SM, along with the ML and DL techniques that have been configured for the… More >

  • Open Access

    ARTICLE

    Convolutional Neural Network Model for Fire Detection in Real-Time Environment

    Abdul Rehman, Dongsun Kim*, Anand Paul

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2289-2307, 2023, DOI:10.32604/cmc.2023.036435

    Abstract Disasters such as conflagration, toxic smoke, harmful gas or chemical leakage, and many other catastrophes in the industrial environment caused by hazardous distance from the peril are frequent. The calamities are causing massive fiscal and human life casualties. However, Wireless Sensors Network-based adroit monitoring and early warning of these dangerous incidents will hamper fiscal and social fiasco. The authors have proposed an early fire detection system uses machine and/or deep learning algorithms. The article presents an Intelligent Industrial Monitoring System (IIMS) and introduces an Industrial Smart Social Agent (ISSA) in the Industrial SIoT (ISIoT) paradigm. The proffered ISSA empowers smart… More >

  • Open Access

    ARTICLE

    A Triplet-Branch Convolutional Neural Network for Part-Based Gait Recognition

    Sang-Soo Yeo1, Seungmin Rho2,*, Hyungjoon Kim3, Jibran Safdar4, Umar Zia5, Mehr Yahya Durrani5

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2027-2047, 2023, DOI:10.32604/csse.2023.040327

    Abstract Intelligent vision-based surveillance systems are designed to deal with the gigantic volume of videos captured in a particular environment to perform the interpretation of scenes in form of detection, tracking, monitoring, behavioral analysis, and retrievals. In addition to that, another evolving way of surveillance systems in a particular environment is human gait-based surveillance. In the existing research, several methodological frameworks are designed to use deep learning and traditional methods, nevertheless, the accuracies of these methods drop substantially when they are subjected to covariate conditions. These covariate variables disrupt the gait features and hence the recognition of subjects becomes difficult. To… More >

  • Open Access

    ARTICLE

    Fuzzy Rule-Based Model to Train Videos in Video Surveillance System

    A. Manju1, A. Revathi2, M. Arivukarasi1, S. Hariharan3, V. Umarani4, Shih-Yu Chen5,*, Jin Wang6

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 905-920, 2023, DOI:10.32604/iasc.2023.038444

    Abstract With the proliferation of the internet, big data continues to grow exponentially, and video has become the largest source. Video big data introduces many technological challenges, including compression, storage, transmission, analysis, and recognition. The increase in the number of multimedia resources has brought an urgent need to develop intelligent methods to organize and process them. The integration between Semantic link Networks and multimedia resources provides a new prospect for organizing them with their semantics. The tags and surrounding texts of multimedia resources are used to measure their semantic association. Two evaluation methods including clustering and retrieval are performed to measure… More >

  • Open Access

    ARTICLE

    An Efficient Attention-Based Strategy for Anomaly Detection in Surveillance Video

    Sareer Ul Amin1, Yongjun Kim2, Irfan Sami3, Sangoh Park1,*, Sanghyun Seo4,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3939-3958, 2023, DOI:10.32604/csse.2023.034805

    Abstract In the present technological world, surveillance cameras generate an immense amount of video data from various sources, making its scrutiny tough for computer vision specialists. It is difficult to search for anomalous events manually in these massive video records since they happen infrequently and with a low probability in real-world monitoring systems. Therefore, intelligent surveillance is a requirement of the modern day, as it enables the automatic identification of normal and aberrant behavior using artificial intelligence and computer vision technologies. In this article, we introduce an efficient Attention-based deep-learning approach for anomaly detection in surveillance video (ADSV). At the input… More >

  • Open Access

    ARTICLE

    Multiple Pedestrian Detection and Tracking in Night Vision Surveillance Systems

    Ali Raza1, Samia Allaoua Chelloug2,*, Mohammed Hamad Alatiyyah3, Ahmad Jalal1, Jeongmin Park4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3275-3289, 2023, DOI:10.32604/cmc.2023.029719

    Abstract Pedestrian detection and tracking are vital elements of today’s surveillance systems, which make daily life safe for humans. Thus, human detection and visualization have become essential inventions in the field of computer vision. Hence, developing a surveillance system with multiple object recognition and tracking, especially in low light and night-time, is still challenging. Therefore, we propose a novel system based on machine learning and image processing to provide an efficient surveillance system for pedestrian detection and tracking at night. In particular, we propose a system that tackles a two-fold problem by detecting multiple pedestrians in infrared (IR) images using machine… More >

  • Open Access

    ARTICLE

    Realtime Object Detection Through M-ResNet in Video Surveillance System

    S. Prabu1,*, J. M. Gnanasekar2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2257-2271, 2023, DOI:10.32604/iasc.2023.029877

    Abstract Object detection plays a vital role in the video surveillance systems. To enhance security, surveillance cameras are now installed in public areas such as traffic signals, roadways, retail malls, train stations, and banks. However, monitoring the video continually at a quicker pace is a challenging job. As a consequence, security cameras are useless and need human monitoring. The primary difficulty with video surveillance is identifying abnormalities such as thefts, accidents, crimes, or other unlawful actions. The anomalous action does not occur at a higher rate than usual occurrences. To detect the object in a video, first we analyze the images… More >

  • Open Access

    ARTICLE

    Background Subtraction in Surveillance Systems Using Local Spectral Histograms and Linear Regression

    S. Hariharan1,*, R. Venkatesan2

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 407-422, 2022, DOI:10.32604/iasc.2022.025309

    Abstract Background subtraction is a fundamental and crucial task for computer vision-based automatic video analysis due to various challenging situations that occur in real-world scenarios. This paper presents a novel background subtraction method by estimating the background model using linear regression and local spectral histogram which captures combined spectral and texture features. Different linear filters are applied on the image window centered at each pixel location and the features are captured via these filter responses. Each feature has been approximated by a linear combination of two representative features, each of which corresponds to either a background or a foreground pixel. These… More >

  • Open Access

    ARTICLE

    IoT and Blockchain-Based Mask Surveillance System for COVID-19 Prevention Using Deep Learning

    Wahidur Rahman1, Naif Al Mudawi2,*, Abdulwahab Alazeb2, Muhammad Minoar Hossain1, Saima Siddique Tashfia1, Md. Tarequl Islam1, Shisir Mia1, Mohammad Motiur Rahman1

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 2033-2053, 2022, DOI:10.32604/cmc.2022.025025

    Abstract On the edge of the worldwide public health crisis, the COVID-19 disease has become a serious headache for its destructive nature on humanity worldwide. Wearing a facial mask can be an effective possible solution to mitigate the spreading of the virus and reduce the death rate. Thus, wearing a face mask in public places such as shopping malls, hotels, restaurants, homes, and offices needs to be enforced. This research work comes up with a solution of mask surveillance system utilizing the mechanism of modern computations like Deep Learning (DL), Internet of things (IoT), and Blockchain. The absence or displacement of… More >

  • Open Access

    ARTICLE

    SOINN-Based Abnormal Trajectory Detection for Efficient Video Condensation

    Chin-Shyurng Fahn1, Chang-Yi Kao2,*, Meng-Luen Wu3, Hao-En Chueh4

    Computer Systems Science and Engineering, Vol.42, No.2, pp. 451-463, 2022, DOI:10.32604/csse.2022.022368

    Abstract With the evolution of video surveillance systems, the requirement of video storage grows rapidly; in addition, safe guards and forensic officers spend a great deal of time observing surveillance videos to find abnormal events. As most of the scene in the surveillance video are redundant and contains no information needs attention, we propose a video condensation method to summarize the abnormal events in the video by rearranging the moving trajectory and sort them by the degree of anomaly. Our goal is to improve the condensation rate to reduce more storage size, and increase the accuracy in abnormal detection. As the… More >

Displaying 1-10 on page 1 of 14. Per Page