The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper propose an image processing technology applied in a mentioned systems for tracking and image segmentation and extraction, which are able to capture the movement of objects when applied to security system via CCTV. The experimental and results are done on receiving “.avi” files from the surveillance installed cameras in 2 well-lit areas with 10 intrusions in different area. The intrusion...
This paper describes the use of Haartraining algorithm for visual inspection the suspicious objects based on Facebook. As a way to detect a person or group of persons who harbor any hope of guilt or incendiary. An important feature verification is the last post in the form of the public. The system can determine the position of suspicious objects that appear in those images by those object has to...
Designing of an automated parking fee calculation using license plate recognition aims to solve the problem of identifying the vehicle license plate number at the parking lot. The image processing theories and researches related to character recognition were used to design the system. The techniques used in this system are RGB Image to Grayscale Image, Grayscale Image to Binary Image, Edge Detection,...
The goal of this research is to find a suitable edge detection algorithm with 4 bands, B1, B2, B3, and B4 of different types of satellite image. In this paper, the dataset is derived from raw satellite images, namely THEOS, of the seashore in the Samut Prakan province, a fruit garden in the Chantaburi province and river line in Ayuthaya provinces. Edge detection performance algorithms are Signal-to-Noise...
This research aims to reduce the amount of contaminated grain, people's mistakes, and the cost of imported machinery. Using the principles of image processing, such as Extract Color Plane, Manual Threshold, and Morphology can sort out the grain identity, characteristics, and number of the grain.
The purpose of this study was aimed to fabricate the computer instruction package on the silkscreen print design and to evaluate the efficiency of the package on the silkscreen print design, learning effectiveness, and learners' satisfaction towards the package. The research instrument used includes 1) the Computer Instruction Package on The Silkscreen Print Design, 2) an achievement test, 3) the...
This paper proposes to presents a hand gesture recognition as an assistive tool for patients care. The system uses Haar-like feature, Adaboost algorithm and Cascade Classification for hand detection. Principal Component Analysis work together with Histogram of Oriented Gradients and hand gesture decision to achieve preferable results of hand gesture recognition. Hand detection accuracy achieves 91...
This special problem issue is intended to help in the detection and face recognition in order to arrest suspects for investigative by using techniques and tricks “Eigen Face” and pairing with “SIFT” (Scale invariant Feature Transform). If it found to be suspect, it will hit the frame surrounding the face of the suspect and the suspect's case number. Then, it will pair face to face in a database system...
This paper presents Enhancement of Palm-Leaf Manuscript as noise occurred in images. It's suitable for Segmentation. The proposed method consists of image adjustment, contrast stretching and histogram equalization technique. All these techniques improve the quality of images for human viewing. The method we proposed, it made more effective images of palm-leaf manuscripts. The color image of palm-leaf...
A main purpose of this research for the Traffic Congestion Investigating System by Image Processing from CCTV Camera is to check a traffic condition from a traffic image on the road. Then, a user can check in advance for a traffic condition in a specific time. The system brings a traffic image from a CCTV camera to process in the system as an input. After that, the system finds for traffic congestion...
The work on the production line in Industrial. Accidents at work must be vigilant at all times. Because of safety while the work is important. Helps to reduce accidents at work. This paper proposed the program of Surveillance Human Behavior on Working in Industrial on image processing the blink of eye. If the employee over 4 seconds, the system will alert by sounds. It showed that the program accuracy...
Plant leaves are very important for their respiration and photosynthesis. The two processes are significant factors for their growth. Measuring leave dimension is very important in studying and analyzing the photosynthesis of plants. Leaf dimension assessment with image evaluation is the most widely technique used for presenting. This paper proposed the algorithm of image segmentation to classify...
These days, social media has played a significant role in daily life of all people and ages in order to communicate as well as express their thoughts and feelings. In this paper, the authors have studied user data from social media (Facebook) whose shared posts are positive, and also the negative side posts that may lead to negative affect personally or can be further extended to the community and...
Forensic biology is the application of biology to law enforcement. Handwriting behavior is one of the biometrics that can be used to identify those who are ownership. This paper proposes an algorithm for Thai handwritten verification on documents. This work intended to prove the handwriting in the investigation. The main issue presented in this paper is divided into three processes including data...
In This paper, we present a novel application for the recognition of Isan Dhamma characters. Our algorithm does not require any complicated method and performs word recognition on the whole image holistically, departing from the character based recognition systems of the past. Functional trees (FTs) classifier is the models at the center of this algorithm are trained. The functional trees build univariate...
Using images in case investigation may doubt that the image are forged or not. Image forensics is an approach for image validity. In this paper, we propose a new method for detecting forgery of image that use of the truth from XOR comparison between two images, and the determinant of 3x3 pixels for more performance instead of comparing pixel by pixel. Euclidean of a pixel is computed to reduce the...
This paper presents an approach method to detect vehicle color and to classify multi vehicle from video data. The multi vehicle is classified by blob analysis and feature-based. The proposed method uses a video file recorded by traffic surveillance camera as input. This technique applied RGB (Red, Green and Blue) to detect color of vehicle image. The vehicle is separated from background by using optical...
This paper proposes an Intelligent Handwriting Thai Signature Recognition System base on Multilayer Perceptron and Radial Basis Network. The proposed system compose of three main processes, i.e. image pre-processing, feature extraction and Thai signature recognition. In the recognition processes the neural network is used into two stage. First, Multilayer Perceptron (MLP) and Radial Basis Function...
This paper presents the intruder detection system for rapid transit using CCTV surveillance based on the histogram shapes. In this paper, researchers proposed intruder detection algorithm of yellow line located on the ground next to rapid transit railway for preventing passengers from any harmful train incidents by using CCTV surveillance system based histogram shape that is incredibly convenient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.