DRONET: Multi-tasking framework for real-time industrial facility aerial surveillance and safety

SO Ajakwe, VU Ihekoronye, DS Kim, JM Lee - Drones, 2022 - mdpi.com
The security of key and critical infrastructures is crucial for uninterrupted industrial process
flow needed in strategic management as these facilities are major targets of invaders. The …

Investigating the efficiency of deep learning based security system in a real-time environment using YOLOv5

F Majeed, FZ Khan, M Nazir, Z Iqbal, M Alhaisoni… - Sustainable Energy …, 2022 - Elsevier
Abstract Surveillance Systems Application based on deep learning algorithms is speedily
growing in a broad range of fields such as Facial Recognition, Real Time Attendance …

Pavement raveling inspection using a new image texture-based feature set and artificial intelligence

A Nasertork, S Ranjbar, M Rahai, FM Nejad - Advanced Engineering …, 2024 - Elsevier
Enhancing pavement distress inspection is crucial within a pavement management system.
Recognizing the advantages of automated pavement condition inspection, considerable …

A novel technique for automated concealed face detection in surveillance videos

HA Hosni Mahmoud, HA Mengash - Personal and Ubiquitous Computing, 2021 - Springer
Face detection perceives great importance in surveillance paradigm and security paradigm
areas. Face recognition is the technique to identify a person identity after face detection …

Study of image sensors for enhanced face recognition at a distance in the Smart City context

JM Llauradó, FA Pujol, D Tomás, A Visvizi, M Pujol - Scientific Reports, 2023 - nature.com
Smart monitoring and surveillance systems have become one of the fundamental areas in
the context of security applications in Smart Cities. In particular, video surveillance for …

Robust hand gesture recognition using HOG-9ULBP features and SVM model

J Li, C Li, J Han, Y Shi, G Bian, S Zhou - Electronics, 2022 - mdpi.com
Hand gesture recognition is an area of study that attempts to identify human gestures
through mathematical algorithms, and can be used in several fields, such as communication …

Analysis and comparison of FPGA-based histogram of oriented gradients implementations

S Ghaffari, P Soleimani, KF Li, DW Capson - Ieee Access, 2020 - ieeexplore.ieee.org
One of the commonly-used feature extraction algorithms in computer vision is the histogram
of oriented gradients. Extracting the features from an image using this algorithm requires a …

Vision-based moving UAV tracking by another UAV on low-cost hardware and a new ground control station

E Çintaş, B Özyer, E Şimşek - IEEE Access, 2020 - ieeexplore.ieee.org
Automatic flying target detection and tracking in video sequences acquired from a camera
mounted on another Unmanned Aerial Vehicle (UAV) is a challenging task due to the …

A novel face recognition model for fighting against human trafficking in surveillance videos and rescuing victims

M Karpagam, RB Jeyavathana, SK Chinnappan… - Soft Computing, 2023 - Springer
The trade of humans aimed at the intention of forced labor, sexual slavery, commercial
sexual slavery, or else others is termed human trafficking (HT). It happens inside a nation or …

Rapid detection of pilgrims whereabouts during Hajj and Umrah by wireless communication framework: an application AI and deep learning

M Alhameed, MA Hossain - 2023 international conference on …, 2023 - ieeexplore.ieee.org
Human injuries and deaths occur often during public events like concerts, religious services,
and political rallies because of a lack of proper crowd safety oversight. A small disaster can …