A Survey on Various Techniques of Semantic Object Extraction in Videos
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2
Abstract
Video-based applications are largely being used these days. These applications include video surveillance, criminal detection and sports video analysis etc. In particular, Object –based representation consists of decomposing the video content into a collection of meaningful objects. There are many literatures present on developing technique for efficiently querying videos on their content. The content of the video can be basically defined as the objects and the iteration of the objects. So the Object identification and classification has become challenge these days. Object Extraction strategies can be broadly categorized in three parts: Manual, Semi-automatic and Automatic. In order to make object extraction technique Automatic, Algorithms are applied on extracted features of images for classification. Genetic Algorithm is used to automatically classify the objects. To find the optimal solution from genetic algorithm, it is required to maintain the larger population size which is not cost effective. There is another approach to classify the candidate object which is Fuzzy C-means based GA. In this paper, object extractions strategies are reviewed followed by discussion on Fully Automatic approaches of Object classification.
Countering Phishing Threats using Visual Cryptography
Countering Phishing Threats using Visual Cryptography
Parallelization of Symmetric and Asymmetric security Algorithms for MultiCore Architectures
Symmetric and Asymmetric algorithms are complex that requires large number of mathematical computations to be done. The sequential execution of the algorithms would require a considerable amount of execution time. This m...
A Review on Auto-Configuration Protocols in Mobile Ad Hoc Networks
Ad-Hoc networks are the wireless network without infrastructure. MANET’s are special kind of wireless networks with no centralized control. They consist of mobile platforms which are free to move arbitrarily. The existin...
From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic
"In emerging network systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to...
Structural and Physical Properties of Cu¬¬0.12Mn¬¬¬¬0.88Fe2O4 Prepared by Combustion Technique
Structural and Physical Properties of Cu¬¬0.12Mn¬¬¬¬0.88Fe2O4 Prepared by Combustion Technique