scholarly journals Shadow Detection and Removal Technique using CNN

Author(s):  
Akanksha Bankhele

Abstract: The Shadow detection and removal Technique is used in many real-world applications, such as surveillance systems, computer vision applications and indoor outdoor system. The shape and orientation of an object, as well as the light source, can be revealed by shadows in an image. In a traffic surveillance system, the shadow can misclassify the actual target, lowering the system’s accuracy. Numerous algorithms and techniques have been developed by researchers to aid in the detection and removal of shadows in images. This paper aims to provide an overview of different shadow detection and removal techniques, their advantages and drawbacks. Also implementation of Convolutional Neural Network for shadow detection and OpenCV features to remove shadows by re-designing the output and analysing different loss functions to train the network. Keywords: Shadow Detection and Removal Techniques, Shadow Image Processing.

2020 ◽  
Vol 32 ◽  
pp. 03011
Author(s):  
Divya Kapil ◽  
Aishwarya Kamtam ◽  
Akhil Kedare ◽  
Smita Bharne

Surveillance systems are used for the monitoring the activities directly or indirectly. Most of the surveillance system uses the face recognition techniques to monitor the activities. This system builds the automated contemporary biometric surveillance system based on deep learning. The application of the system can be used in various ways. The face prints of the persons will be stored inside the database with relevant statistics and does the face recognition. When any unknown face is recognized then alarm will ring so one can alert the security systems and in addition actions will be taken. The system learns changes while detecting faces automatically using deep learning and gain correct accuracy in face recognition. A deep learning method including Convolutional Neural Network (CNN) is having great significance in the area of image processing. This system can be applicable to monitor the activities for the housing society premises.


2020 ◽  
Author(s):  
HeeKyung Choi ◽  
Won Suk Choi ◽  
Euna Han

BACKGROUND Influenza is an important public health concern. A national surveillance system that easily and rapidly detects influenza epidemics is lacking. OBJECTIVE We assumed that the rate of influenza-like illness (ILI) related-claims is similar to the current ILI surveillance system. METHODS We used the Health Insurance Review and Assessment Service-National Patient Samples (HIRA-NPS), 2014-2018. We defined ILI-related claims as outpatient claims that contain both antipyretic and antitussive agents and calculated the weekly rate of ILI-related claims. We compared ILI-related claims and weekly ILI rates from clinical sentinel surveillance data. RESULTS We observed a strong correlation between the two surveillance systems each season. The absolute thresholds for the four-years were 84.64 and 86.19 cases claims per 1,000 claims for claims data and 12.27 and 16.82 per 1,000 patients for sentinel data (Figure 5). Both the claims and sentinel data surpassed the epidemic thresholds each season. The peak epidemic in the claims data was reached one to two weeks later than in the sentinel data. The epidemic patterns were more similar in the 2016-2017 and 2017-2018 seasons than the 2014-2015 and 2015-2016 seasons. CONCLUSIONS Based on hospital reports, ILI-related claims rates were similar to the ILI surveillance system. ILI claims data can be loaded to a drug utilization review system in Korea to make an influenza surveillance system.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4419
Author(s):  
Hao Li ◽  
Tianhao Xiezhang ◽  
Cheng Yang ◽  
Lianbing Deng ◽  
Peng Yi

In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention. At present, many researchers focus on how to select the region of interest (RoI) accurately and then realize privacy protection in videos by selective encryption. However, relatively few researchers focus on building a security framework by analyzing the security of a video surveillance system from the system and data life cycle. By analyzing the surveillance video protection and the attack surface of a video surveillance system in a smart city, we constructed a secure surveillance framework in this manuscript. In the secure framework, a secure video surveillance model is proposed, and a secure authentication protocol that can resist man-in-the-middle attacks (MITM) and replay attacks is implemented. For the management of the video encryption key, we introduced the Chinese remainder theorem (CRT) on the basis of group key management to provide an efficient and secure key update. In addition, we built a decryption suite based on transparent encryption to ensure the security of the decryption environment. The security analysis proved that our system can guarantee the forward and backward security of the key update. In the experiment environment, the average decryption speed of our system can reach 91.47 Mb/s, which can meet the real-time requirement of practical applications.


Sign in / Sign up

Export Citation Format

Share Document