2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS) 2015
DOI: 10.1109/intelcis.2015.7397272
|View full text |Cite
|
Sign up to set email alerts
|

Online multi-person tracking-by-detection method using ACF and particle filter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Machine learning algorithms focus on feature extraction and classifiers [92]. For feature extraction, techniques such as Histogram of Oriented Gradients [93][94][95][96][97][98][99][100], Local Binary Pattern [101][102][103][104][105][106][107], Deformable Part Model [108][109][110][111][112][113], and Aggregate Channel Feature (ACF) [114][115][116][117][118] are included. On the other hand, methods such as Support Vector Machine (SVM) [94,105,[119][120][121][122], Decision Tree [123][124][125][126], Random Forest (RF) [127][128][129][130][131][132] and Ada-Boost [81,119,133,134] are used for ...…”
Section: Object Detection and Classificationmentioning
confidence: 99%
“…Machine learning algorithms focus on feature extraction and classifiers [92]. For feature extraction, techniques such as Histogram of Oriented Gradients [93][94][95][96][97][98][99][100], Local Binary Pattern [101][102][103][104][105][106][107], Deformable Part Model [108][109][110][111][112][113], and Aggregate Channel Feature (ACF) [114][115][116][117][118] are included. On the other hand, methods such as Support Vector Machine (SVM) [94,105,[119][120][121][122], Decision Tree [123][124][125][126], Random Forest (RF) [127][128][129][130][131][132] and Ada-Boost [81,119,133,134] are used for ...…”
Section: Object Detection and Classificationmentioning
confidence: 99%
“…RNNs was used to predict the object position and manage the trajectory, while LSTMs was used to achieve data association. T. Kokul et al [15] proposed an online pedestrian tracking algorithm based on aggregate channel features (ACF) and particle filter. Each object was detected by the ACF detector, and then the Adaboost classifier was used to train the object and background.…”
Section: Related Workmentioning
confidence: 99%
“…The contour coefficient method is used to analyze the objective function to select the optimal clustering number K. When K is 12, the objective function is optimal. The obtained anchor boxes are (183, 142), (71, 188), (101, 70), (29, 23), (24, 53), (54, 38), (12, 10), (9,21), (20,15), (6, 10), (9, 6) and (5,5).…”
Section: Figure 4: the Detection Networkmentioning
confidence: 99%
“…Based on the features used in a tracking model, VOT approaches can be categorized as hand-crafted and deep feature-based trackers. Hand-crafted feature-based tracking approaches [11,12,13,14,15] extract the features from images according to a certain manually predefined algorithm based on expert knowledge. On the other hand, deep feature-based trackers [16,17,18,19] capture the semantic cues from raw images by using the Convolutional neural networks (CNNs) [20].…”
Section: Introductionmentioning
confidence: 99%