2020
DOI: 10.11591/ijeecs.v19.i1.pp188-195
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent security system detects the hidden objects in the smart grid

Abstract: <p>Monitoring the general public gathered in large numbers is one of the most challenging tasks faced by the law and order enforcement team. There is swiftly demand to that have inbuilt sensors which can detect the concealed weapon, from a standoff distance the system can locate the weapon with very high accuracy. Objects that are obscure and invisible from human vision can be seen vividly from enhanced artificial vision systems. Image Fusion is a computer vision technique that fuses images from multiple… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 19 publications
(21 reference statements)
0
3
0
Order By: Relevance
“…T is a pixel average-gray value. The computation of information entropy is described by (5) to a pair of values (g, t) [28].…”
Section: Pixel Entropy Feature Extraction Using Two Dimensions' Maximum Entropy Threshold Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…T is a pixel average-gray value. The computation of information entropy is described by (5) to a pair of values (g, t) [28].…”
Section: Pixel Entropy Feature Extraction Using Two Dimensions' Maximum Entropy Threshold Methodsmentioning
confidence: 99%
“…The security of RC4 algorithm using keys generation depending on user's retina (Huda M. Salih) 453 aforementioned. The significant amount of RNG bits are delivered clearly and so a passive intruder has an easy ability to read the RNG performance and may influence any shortcomings contained there [5], [6].…”
Section: Introductionmentioning
confidence: 99%
“…Recognition algorithms rely on individual variances in physical or behavioral traits [2]. A biometric recognition technology that is used to detect, recognize, identify, or authenticate a person in a digital image or video frame [3], computer vision [4], machine learning [5], real-web services [6], computer games [7], and time video [8]. Face recognition, authentication, tracking, expression categorization approaches, and feature expression mechanics are all under investigation [9].…”
Section: Introductionmentioning
confidence: 99%