Performance Comparison of Detection, Recognition and Tracking Rates of the different Algorithms
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
This article discusses the approach of human detection and tracking in a homogeneous domain using surveillance cameras. This is a vast area in which significant research has been taking place from more than a decade and the paper is about detection of a human and its face in a given video and stores Local Binary Pattern Histogram (LBPH) features of the detected faces. Once a human is detected in the video, that person will be given a label and him/her is tracked in different video taken by multiple cameras by the application of machine learning and image processing with the help of OpenCV. Many algorithms were used for detecting, recognizing and tracking till date, thus in this paper, main thing is the comparison of the proposed algorithm with some among the state-of-the-art algorithms. And also shows how the proposed algorithm is better than the other chosen algorithms.
Authors and Affiliations
Meghana Kavuri, Kolla Bhanu Prakash
Mitigating Address Spoofing Attacks in Hybrid SDN
Address spoofing attacks like ARP spoofing and DDoS attacks are mostly launched in a networking environment to degrade the performance. These attacks sometimes break down the network services before the administrator com...
Intelligent Mobility Management Model for Heterogeneous Wireless Networks
Growing consumer demands for access of communication services in a ubiquitous environment is a driving force behind the development of new technologies. The rapid development in communication technology permits the end u...
Using the Technology Acceptance Model in Understanding Academics’ Behavioural Intention to Use Learning Management Systems
Although e-learning is in its infancy in Saudi Arabia, most of the public universities in the country show a great interest in the adoption of learning and teaching tools. Determining the significance of a particular too...
Combating the Looping Behavior: A Result of Routing Layer Attack
Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them a...
Knowledge Discovery in Health Care Datasets Using Data Mining Tools
Non communicable diseases (NCDs) are the biggest global killers today. Sixty-three percent of all deaths in 2008 – 36 million people – were caused by NCDs. Nearly 80% of these deaths occurred in low- and middle-in...