Traffic Event Detection using Computer Vision
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: To make sure that the vehicles on road follow traffic rules, lane disciplines and traffic signals, it takes a lot of human effort and precious time. An automated system which is coupled with traffic cameras can help in this monitoring process. Haar-like features is one of the best techniques that can be used for detecting the objects within images/video feed from the traffic cameras. This process includes the subtasks of data collection, negative positive separation, creating training samples, creating description files, haar training and a strong action program which can detect vehicles and the traffic events. Hence alerting the monitoring authority to take care of the situation and make sure that the traffic events handled carefully. For experimental purpose one can train their database for few vehicles but a more robust database and a robust detection program can produce a great performance results.
Authors and Affiliations
Ramesh Navi , Aruna M. G.
A Study on Relational Semantic Video Content Extraction Using Bayesian Network Classifier
Abstract: Multimedia data mining is an emergent field, which consists of image mining, video data mining etc. The content based extraction in videos is an important application due to the rapid growth in the video...
A Review on Face Recognition and Video Databases
Abstract: Each And Every Face Databases Have Its Own Limitations And Description To Test The Performance Of Face Recognition Technique. Even Though, Current Machine Recognition Systems Have Approached To Certain Level Of...
An Efficient Hybrid Multilevel Intrusion Detection System in Cloud Environment
Abstract: Cloud Computing offers latest computing paradigm where application, data and IT services are provided online over the Internet. One of the significant concerns in Cloud Computing is security. Since data is expo...
A New Approach to Compressed Image Steganography Using Wavelet Transform
Abstract : This paper proposes a novel steganographic technique that embeds compressed payload image within cover image. The pixel adjustment of the cover image is done optimally using Fourier Transform, so that visual c...
Computational Method for Forensic Verification of offline Signatures
Signature verification models based on personal model have been reported by many researchers in past but the method proposed here is a forensic document examination approach using computational methods, unlike ot...