2017
DOI: 10.1109/mmul.2017.265092027
|View full text |Cite
|
Sign up to set email alerts
|

Object-Detection-Based Video Compression for Wireless Surveillance Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 0 publications
0
15
0
Order By: Relevance
“…If a link (m, n) is on the selected path p from nodes u to v, the link is marked with the decision variable y u (m, n), which can be used to assess the number of paths passing through the link, to calculate aggregated traffic load and transmission delay. Constraint (4) states that if a link (m, n) is on a path p, the link is used by a node u.…”
Section: ) Offloading Assignment Constraintsmentioning
confidence: 99%
See 2 more Smart Citations
“…If a link (m, n) is on the selected path p from nodes u to v, the link is marked with the decision variable y u (m, n), which can be used to assess the number of paths passing through the link, to calculate aggregated traffic load and transmission delay. Constraint (4) states that if a link (m, n) is on a path p, the link is used by a node u.…”
Section: ) Offloading Assignment Constraintsmentioning
confidence: 99%
“…Previously, sensors could only complete tasks with simple data processing or return raw data to the sink node [1], whereas they are now capable of performing highly complex tasks, such as handling complex and massive data processes, because of novel artificial intelligence (AI) chips [2], [3]. Despite assistance from AI chips, IoT devices remain reliant on machines with high-power computing capacities, such as cloudlet or core cloud capability, for the processing of high quality multimedia data [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Motion detection algorithm is used with some alarming features in for monitoring system. According to in [24], the surveillance system incorporates five phases that is object tracking, object detection, understanding and description of behaviours, object classification and human identification. However, the main challenge is to send the commands from software to turn ON/OFF [11]…”
Section: Image Processing For Human Detectionmentioning
confidence: 99%
“…In [ 29 ], a saliency-based rate control scheme was proposed for human detection with a single camera. A standard-compliant video encoding scheme was proposed to obtain better object detection performance on compressed video [ 30 ]. In [ 31 , 32 ], the effect of quantization parameter (QP) and transmission conditions on human detection were considered to optimize the performance of human detection in server.…”
Section: Introductionmentioning
confidence: 99%