Line Area Monitoring using Structural Similarity Index
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 9
Abstract
Real-time motion detection in specific area is considered the most important task in every video surveillance system. In this paper, a novel real time motion detection algorithm introduced to process Line zones called Line Monitoring Algorithm (LMA). This algorithm integrates Bresenham’s Algorithm and Structural Similarity Index (SSI) in order to achieve the best performance. Bresenham’s Algorithm is used to collect line pixels from two given points. Then, the SSI is used for real-time calculation of similarity for line motion detection. The most attractive side of using the LMA is that the algorithm does not need to compare all pixels of the whole images or regions for line areas monitoring. This algorithm has high capability, treatment speed and efficiency for motion detection and also demands less compilation time for the hardware performance. The main objective of this paper is to use a video surveillance system implementing LMA to supervise the Car Reverse Test (CRT) for driving license exam in Morocco. The evaluation of the experiment results in implementing the proposed algorithm is reported in this paper.
Authors and Affiliations
Abderrahman AZI, Abderrahim Salhi, Mostafa JOURHMANE
Hospital Readmission Prediction using Machine Learning Techniques
One of the most critical problems in healthcare is predicting the likelihood of hospital readmission in case of chronic diseases such as diabetes to be able to allocate necessary resources such as beds, rooms, specialist...
A Survey of Emergency Preparedness
Emergency preparedness is a discipline that harnesses technology, citizens, and government agencies to handle and potentially avoid natural disasters and emergencies. In this paper, a survey of the use of information tec...
Enhancement of Passive MAC Spoofing Detection Techniques
Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this paper we propo...
The Discovery of the Implemented Software Engineering Process Using Process Mining Techniques
Process model guidance is an important feature by which the software process is orchestrated. Without complying with this guidance, the production lifecycle deviates from producing a reliable software with high-quality s...
Literature Survey of previous research work in Models and Methodologies in Project Management
This paper provides a survey of the existing literature and research carried out in the area of project management using different models, methodologies, and frameworks. Project Management (PM) broadly means programme ma...