2010
DOI: 10.3233/ica-2010-0328
|View full text |Cite
|
Sign up to set email alerts
|

Bypass methods for constructing robust automatic human tracking system

Abstract: We have been proposing the automatic human tracking system to overcome limitations of existing video surveillance systems. This paper proposes two bypass methods to keep tracking a targeted person by the system constructed by using mobile agent technologies even if unexpected problems are occurred. The proposed methods are called as "Recalculation Bypass Method" and "Additional Calculation Bypass Method". These bypass methods utilize the algorithm which is elaborated in the paper, "An Algorithm to Determine Ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Pedestrian recognition in images is geared toward a variety of applications, which include driver assistance systems [1] and autonomous robotic vehicles [2]. It is also useful in security, be it for automatic surveillance [3] or people counting [4]. Those applications can be extended to low visibility conditions by using FIR images.…”
Section: Introductionmentioning
confidence: 99%
“…Pedestrian recognition in images is geared toward a variety of applications, which include driver assistance systems [1] and autonomous robotic vehicles [2]. It is also useful in security, be it for automatic surveillance [3] or people counting [4]. Those applications can be extended to low visibility conditions by using FIR images.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, agent-based solutions have ISSN 1069-2509/12/$27.50  2012 -IOS Press and the author(s). All rights reserved proved to be efficient in a wide range of dynamic environments, from human tracking video surveillance systems [15], interactive artistic installations [9], energy management [26], shipboard systems [34], oceanic monitoring [5] to establishing service-level agreements in Cloud-computing environments [27].…”
Section: Introductionmentioning
confidence: 99%