High Accuracy Detection and Tracking of Objects
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 8, Issue 4
Abstract
One of the critical tasks in Computer Vision is Detection and Tracking of objects. But still now, the issues related to this are developing. For the automatic detection of moving objects, some of the monitoring systems cannot able to find the difference, when the difference of brightness between the background and the moving objects is small. The costs are very high in these systems. Most of the previous methods, only concentrated on detecting rough area of targets. The accurate moving target detection cannot be achieved. It makes the result to be shown with noise and heals and the computation time is also increased. Many systems are unable to solve critical solutions such as Partial Occlusions and Cross Targets. In my proposed system the Soft Computing techniques can handle objectives and arbitrary constraints with a high degree of simplicity, we use one of the Evolutionary Approach of Soft Computing Technique in this paper. We demonstrate the object detection and tracking methods separately. Initially, a visual object detection approach is presented for minimizing the computation time, in order to achieve high detection accuracy. In this approach, three key contributions are described.
Authors and Affiliations
Mr. V. M Vijay Kannan
Hiding Negative of an Image using Steganography Even Odd Algorithm for Security Purposes
with the advancement of technology, the threats dealt by user have increased exponentially. Hence security of data is required during storage and transmission of data. Image Steganography is best popular techni...
Fault Discovery Probability Analysis for Software Reliability Estimation
Abstract: Software reliability approximation and testing gauge how efficiently software works and meet up the end-user necessities. Software reliability assurance that users can enter the correct information on a day-to-...
Enhanced Message Digest Version 5 Architecture for Secure Hashing
Abstract: The message digest algorithm is a widely used cryptographic hash function. It produces a 128-bit hash value. It has been used in a variety of security applications and is also commonly used to check data...
Matching Sketches with Digital Face Images using MCWLD and Image Moment Invariant
Abstract : Face recognition is an important problem in many application domains. Matching sketches with digital face image is important in solving crimes and capturing criminals. It is a computer application for automati...
W-LEACH Decentralized: Weighted LEACH with a Decentralized way
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each no...