Certificate from Supervisor
نویسندگان
چکیده
Abandoned object detection is one of the most practically useful areas of computer vision due to its application in automated video surveillance systems for the detection of suspicious activities that might endanger public safety, especially in crowded places like airports, railway stations, shopping malls, movie theatres and the like. An abandoned object is defined as one that has been lying stationary at a certain place with no apparent human attendance for an extended period of time. Such objects are usually inconspicuous commonplace objects that people often carry around including backpacks, suitcases and boxes. Detection of abandoned objects is of prime importance in uncovering and forestalling terrorist activities since it is a reasonable supposition that an abandoned object, if left behind on purpose, may be hiding dangerous items like explosives. The present work is an attempt to create a flexible and modular framework that can be used to experiment with several different methods for each stage of the overall task of detecting abandoned and removed objects in a video stream. Several existing methods have been implemented for each of these stages and integrated into the system in a way that makes it possible to switch between them in real time. This enables the user to observe and compare the performance of different methods of solving the same problem and choose the one most suited to any given scenario. The system has also been designed to allow new methods to be added for any stage of the system with minimum programming effort.
منابع مشابه
Curriculum Vitae Et Studiorum
with valuation 110/110 cum laude Thesis: " Polymorphism and subtyping in MetaML " Supervisor: Eugenio Moggi • July 1996 High school degree at the " Istituto Tecnico Statale F.Liceti " of Rapallo (Gen-ova), with valuation 60/60 English: scholastic knowledge (PET certificate) French: scholastic knowledge Research activity Research interests Formal semantics of programming languages, functional an...
متن کاملENG. HADI HOSSEINI ARAGHI
Eng. Hadi Hosseini Araghi was born in 1943, in Arak, Iran, where he graduated from the high school of natural sciences. He received his B.Sc. degree in Agricultural Engineering from the University of Tehran. In 1969, he started his collaboration with the Range Organization in the form of preparing range management plans. He received his M.Sc. from the Arizona State University in 1976. Then, in ...
متن کاملDetermining the competency dimensions of supervisor professor from the nursing students’ viewpoints: A qualitative study
Introduction: With regard to the importance of students’ curricular guiding and its effect on their educational process and the quality of university, the prophecy of supervisor professor is very important in students’ professional growth. Thus, this study was accomplished with the purpose of assigning the competency dimensions of supervisor professors from the nursing students’ viewpoints in 2...
متن کاملScientific Certificate of Applied Ethics
Applied ethics is a major having a significant role in attracting the attention of the intellectuals and even the public readers regarding the importance of ethical discussions including discussions of the ethical philosophy. However, since only four decades have been passed from the contemporary approach of the scholars of ethics in this field, it is still considered to be a new and evolving d...
متن کاملA Better Use of Smart Cards in PKIs
Public-key cryptography faces the problem of the authentication of the public keys: How do we can be sure that a pair of public key/user’s identity are matching? A related problem is how to distribute public keys trustfully. These issues are proved to be the bottleneck of a wide deployment of public-key systems, such as the RSA cryptosystem. It is here the Public Key Infrastructures (PKIs) come...
متن کاملExtracting RSA private keys and certificates out of the process memory
This paper discusses a method to find and extract RSA private keys and certificates out of the process memory in a very reliable way. This method can be used by an attacker to steal sensitive cryptographic material. As a proof of concept an IDA Pro plugin as well as an exploit payload will be discussed. All your private keys are belong to us 2
متن کامل