Laspaper
Laspaper
Laspaper
net/publication/331844217
CITATIONS READS
20 4,272
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Abdullah Alshammari on 17 April 2019.
Abstract— One of the challenges that many security systems II. MOTIVATION AND VIDEO SURVEILLANCE SYSTEMS
face is the inability to allow the system to perform certain
functions without an operator monitoring the progress of the The outline of moving object location framework is vital for
system, automatically. People cannot operate twenty-four hours a observing a range and recognizing questions or focuses of
day. Human operators have a limit to operate during the time they hobby. Fig. 1 shows overall video surveillance design and this
are awake. People will always require sleep and even when they paper shows each subsystem in this intillegent multi camera
are awake they cannot sit in one place for a long time without any video surveillance system. Multi camera video reconnaissance
distraction. That is why there are unique features in the multi- is vital for analyzing territories of daily life. Video
camera video system that can make significant impacts in the reconnaissance is relied upon to arrange, perceive, and track
security industry. The technical aspect of the technology is different objects and scenarios according. In spite of the fact
exceptional and it can assist many people to counter security that, camcorders are now introduced in numerous ranges, for
challenges they face in their daily lives. It is important to consider example, the checking of indoor and outside scenes of air
these aspects when selecting which type of security systems are terminals, train stations, interstates, parking garages, stores, and
needed to adopt. Our approach could detect and recognize a not withstanding shopping centers. Video information as of now
human target from videos taken from cameras mounted on the utilized are generally to analyze. Much of the time a human
wall to cover a target area. The proposed approach consists of
administrator needs to watch the video to distinguish anomalous
detection and tracking of any targets that might be a threat. The
conduct which is extremely tedious and monotonous. Having an
decision-making process then decides whether or not the person is
a threat or not.
ongoing robotized video reconnaissance can be the response to
a hefty portion of the issues. The outline of moving item location
Keywords—smart city, surveillance, intelligent, security, IoT, for brilliant video observation will predominantly centered
communication. around ongoing programming advancement. The branch of
knowledge of picture preparing is to a great extent used to create
I. INTRODUCTION moving target framework. The configuration of programming
Video cameras are becoming a common feature of modern based observation framework can be exceptionally financially
life where they are useful for crime prevention, terrorist savvy than equipment based framework.
detection, and forensic evidence. Today, companies deploy many
surveillance cameras to watch broader areas 24 hours a day 7
days a week. Since video data is increasing and only the
security monitor staffs are able to watch the limited amount of
video data, people can quickly lose their ability to concentrate
on the monitoring task, and suspicious behavior on the screen
maybe missed easily. In this project, our goal is to remedy these
weaknesses and develop a system which provides an automatic
interpretation of the scenes by using motion detection and
recognition, trajectory analysis, pattern matching and the
understanding the actions and interactions of the observed
objects based on the information acquired by sensors. This
system uses three algorithms. Algoritms are object detection,
template matching and decision making. Our system will
consist of multiple surveillance cameras to gather video images,
a server to store and analyze that information, and broadband
communication networks to connect with the internet.
Fig. 1. Overall video surveillance design.
978-1-7281-0554-3/19/$31.00©2019 IEEE
In fig. 3 shows our scenarios to calculate the delay time
overall implement intelligent multi-camera video surveillance
system in edge computing enabled resilient wireless network
virtualization. The advantages of edge computing include (i)
near-real- time reactions by using distributed processing of big
data which could take longer time by individual devices [1]; and
(ii) caching at the edge for popular contents for video or data
communications so that when the content is requested it can be
served from cache (which further reduces back-haul
communication cost) [2], [3].
Fig. 4. Evaluation, Analyses and Comparing the complexity view between
Camera, Edge Computing and Cloud.
Fig. 5. Frame Differences Example Fig. 7. Background and Foreground Detection Methods