2014 IEEE Applied Imagery Pattern Recognition Workshop (AIPR) 2014
DOI: 10.1109/aipr.2014.7041896
|View full text |Cite
|
Sign up to set email alerts
|

A container-based elastic cloud architecture for real-time full-motion video (FMV) target tracking

Abstract: Full-motion video (FMV) target tracking requires the objects of interest be detected in a continuous video stream. Maintaining a stable track can be challenging as target attributes change over time, frame-rates can vary, and image alignment errors may drift. As such, optimizing FMV target tracking performance to address dynamic scenarios is critical. Many target tracking algorithms do not take advantage of parallelism due to dependencies on previous estimates which results in idle computation resources when w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 16 publications
(16 reference statements)
0
3
0
Order By: Relevance
“…As a consequence, we have investigated and experimented edge, fog, and cloud based architectures. In a cloud-based setting, virtually no privacypreserving measures are enforced because the edge-cameras' main job is creating videos and forwarding them over wide area network (WAN) to the distant analytics and storage centers [47,48]. All video frames with no regard to whether they are of interest to security personnel or not are forwarded to the cloud servers -which creates unnecessary burden over the network.…”
Section: Prise System Architecturementioning
confidence: 99%
“…As a consequence, we have investigated and experimented edge, fog, and cloud based architectures. In a cloud-based setting, virtually no privacypreserving measures are enforced because the edge-cameras' main job is creating videos and forwarding them over wide area network (WAN) to the distant analytics and storage centers [47,48]. All video frames with no regard to whether they are of interest to security personnel or not are forwarded to the cloud servers -which creates unnecessary burden over the network.…”
Section: Prise System Architecturementioning
confidence: 99%
“…These traditionally algorithms are computationally expensive and normally implemented at the powerful cloud servers of the surveillance system. An example is the Wide Area Motion Imagery (WAMI) that transforms the frames from the image sensors back to the cloud for processing [11], [30], [31], [32]. Earlier studies show that this approach puts a heavy burden on the network [9], [10].…”
Section: A Smart Public Safetymentioning
confidence: 99%
“…Statistical algorithms assess the information for data correlation, feature association, and information fusion for applications of face recognition (Metaxas, et al, 2004). Finally, software systems include the architectures for cloud-based data access, message passing, data mining, and security (Weissman, et al, 2007, Xiong, et al, 2013, Liu, B., et al, 2014Wu, et al, 2014). While each of these DDDAS constructs are important, it is the orchestration of these elements to provide timely and actionable information for user support that is required.…”
Section: Introductionmentioning
confidence: 99%