An intelligent surveillance system for detecting abnormal behaviors on campus using YOLO and CNN-LSTM networks

A Khayrat, P Malak, M Victor, S Ahmed… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Like many other surveillance systems, security and safety are mainly what concern people
these days. It can be used in two methods, watching threats in real-time or searching for an …

Object detection and segmentation for scene understanding via random forest

BR Chughtai, A Jalal - 2023 4th International Conference on …, 2023 - ieeexplore.ieee.org
In recent days, object detection become a vast topic in computer vision. Accurate object
detection and scene understanding is not an easy task due to illumination, viewpoints, and …

Aplikasi Presensi Kehadiran Guru Di Smkn Pakisjaya Berbasis Face Recognition Menggunakan Opencv

D Ceme, NM Faizah, L Koryanto - Jurnal Indonesia: Manajemen …, 2023 - journal.stmiki.ac.id
Tujuan penelitian untuk merancang aplikasi absensi guru yang memiliki fitur penggunaan
kamera untuk mengambil gambar pada saat absensi guru sehingga dapat mempermudah …

An image-based digital forensic investigation framework for crime analysis

MT Ahmed, R Islam, MA Rahman… - … Conference on Next …, 2023 - ieeexplore.ieee.org
Digital Forensic Investigation (DFI) is a big field in the technological era. Technology is
constantly improving and being advanced. As technology advances, criminals are also …

[PDF][PDF] Post-processing of video surveillance systems alarm signals using the YOLOv8 neural network.

O Pavlova, I Rudyk, H El Bouhissi - IntelITSIS, 2024 - ceur-ws.org
The method of solving the security problem of a warehouse equipped with external
surveillance cameras by processing the video stream using artificial neural networks is …

Analysis of CPU Utilization of a Cross-Platform Web Application for Facial Recognition based Remote User Tracking System

V Pabanaas, S Singhal, A Saxena… - 2023 3rd …, 2023 - ieeexplore.ieee.org
One of the most common and integral tasks in any institution is to track and maintain
attendance records of its employees. Whilst there are multiple options available at present to …

Identifying Multiple Faces in Newspapers Using Textual Analysis

PS Bharath - … Conference on Computing and Data Science …, 2024 - ieeexplore.ieee.org
The effectiveness, speed, wealth of documentation, community support, integration
possibilities, platform freedom, integrated face detection models, and ongoing development …

Vision-Based Detection of Water Hyacinth

J Madake, P Zope, I Wargad… - … and Networks (CINE …, 2022 - ieeexplore.ieee.org
This research proposes a vision-based method for detecting the invasive aquatic weed
water hyacinth, commonly known as Eichhornia crassipes. They flourish in moving water …

Multiple Object Recognition from Smart Document Images using YOLOv5s

BN BJ, M Jose - 2023 7th International Conference on …, 2023 - ieeexplore.ieee.org
Multiple object recognition from various ID proofs will give more security as well as
authentication of the data. In general, various ID proofs showcase objects in various ways …

Supervisory framework for threat detection withmultilayer processing in CNN

O Mule, A Pandit, S Karmakar, A Kavale… - ITM Web of …, 2022 - itm-conferences.org
Face recognition has received huge acknowledgement due to its various uses in Internet
communication, security, access control, surveillance, PC entertainment and law …