Human activity recognition: Review, taxonomy and open challenges

MH Arshad, M Bilal, A Gani - Sensors, 2022 - mdpi.com
Nowadays, Human Activity Recognition (HAR) is being widely used in a variety of domains,
and vision and sensor-based data enable cutting-edge technologies to detect, recognize …

Social distancing analyzer using computer vision and deep learning

GV Shalini, MK Margret, MJS Niraimathi… - Journal of Physics …, 2021 - iopscience.iop.org
In the fight against the coronavirus, social distancing has proven to be an effective measure
to hamper the spread of the disease. The system presented is for analyzing social distancing …

Traffic sign recognition using deeplearning for autonomous driverless vehicles

AS Prakash, D Vigneshwaran… - 2021 5th International …, 2021 - ieeexplore.ieee.org
Recently, the smart world, smart cars, and so on plays a major role. To ensure Traffic Safety,
the development of smart cars requires the detection and recognition of traffic signs. The …

Vehicle identification from traffic video surveillance using YOLOv4

VS Sindhu - 2021 5th international conference on intelligent …, 2021 - ieeexplore.ieee.org
Traffic Video Surveillance has emerged as an important tool in our lives. The ability to detect
& follow vehicles, both individual & public transport ones, is extremely useful in numerous …

Theft vehicle detection using image processing integrated digital signature based ECU

V Mallikalava, S Yuvaraj, K Vengatesan… - … on Smart Systems …, 2020 - ieeexplore.ieee.org
Vehicle theft detection is becoming as an increasingly important challenge in many urban
areas. Some of the factors that affect the detection of such thievery are: a change in the …

Hardware implementation of cancellable biometric systems

S Ibrahim, MG Egila, H Shawkey… - … Conference on I …, 2020 - ieeexplore.ieee.org
The use of biometrics in security applications may be vulnerable to several challenges of
hacking. Thus, the emergence of cancellable biometrics becomes a suitable solution to this …

Iot based coal mine safety monitoring and warning system

T Manasa, J Kadali, N Syed, GK Raju… - … Conference on I …, 2022 - ieeexplore.ieee.org
The technique of obtaining coal from the earth's surface is called coal mining. In different
industries like steel and cement, coal is utilized to bring out iron from iron ore and to produce …

Performance analysis of object detection algorithm for intelligent traffic surveillance system

C Kumar, R Punitha - 2020 second international conference …, 2020 - ieeexplore.ieee.org
Object detection algorithm such as convolution neural networks (CNN) is implemented for
traffic surveillance applications. A neural network consists of input minimum one hidden and …

YOLO based Efficient Vigorous Scene Detection And Blurring for Harmful Content Management to Avoid Children's Destruction

S Maheswaran, S Sathesh, A Kumar… - … on Electronics and …, 2022 - ieeexplore.ieee.org
Parental control is one of the most difficult security challenges with mobile devices. Large
multimedia items, such as high-definition photos or video streaming, may be received and …

Helmet and number plate detection of motorcyclists using deep learning and advanced machine vision techniques

FA Khan, N Nagori, A Naik - 2020 Second International …, 2020 - ieeexplore.ieee.org
In today's world, the increasing use of Motorcycles has prompted increment in road
accidents and injuries. Helmet not used by the motorcycle rider is one of the major cause …