Learn More
The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter(More)
In this paper, we describe our experiments in high-level features extraction and interactive topic search tasks of TRECVID 2006. We designed a unified high-level features extraction framework for the 39 high-level features. Various low-level visual features were extracted from the key-frames of the shots. Then the SVM classifiers were trained fore. The(More)
This paper presents a novel approach to object recognition involving a sparse 2D model and matching using video. The model is generated on the basis of geometry and image measurables only. We first identify the underlying topological structure of an image dataset containing different views of the objects and represent it as a neighborhood graph. The graph(More)
A Fuzzy Rule Based Control System is presented in this paper. This control system controls Traffic Signals for regulating traffic on oversaturated intersections with the integration of left and right turns. Based on the Fuzzy Rules, the system decides, whether to extend the current green signal or terminate it. The control system also controls the(More)
Recognizing objects of interest in an environment is one of the most important aspects of security applications. Many techniques exist focusing on object categorization; however, most of them consider just a single viewpoint. This leads to increased false alarms as multiple objects look alike from one viewpoint and are totally different from other view.(More)
In this paper we investigate the performance and error resilience of scalable and multiple description video coding techniques for transmission over 4G Broadband Wireless Network where packet loss and bit error is significant issue. In this regard recently proposed schemes are reviewed highlighting their pros and cons. Future directions of research and(More)
  • 1