Handbook on soft computing for video surveillance / edited by Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena.
"Preface Video surveillance is the area of computer science devoted to real-time acquisition, processing, and management of videos coming from cameras installed in public and private areas, in order to automatically understand events happening at the monitored sites, eventually setting up an al...
Saved in:
Superior document: | Chapman & Hall/CRC cryptography and network security series |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2012 |
Language: | English |
Series: | Chapman & Hall/CRC cryptography and network security.
|
Online Access: | |
Physical Description: | xv, 315 p., [8] p. of plates :; ill. (some col.). |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500870695 |
---|---|
ctrlnum |
(MiAaPQ)500870695 (Au-PeEL)EBL870695 (CaPaEBR)ebr10535473 (CaONFJC)MIL390918 (OCoLC)778448505 |
collection |
bib_alma |
record_format |
marc |
spelling |
Handbook on soft computing for video surveillance [electronic resource] / edited by Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena. Boca Raton : CRC Press, 2012. xv, 315 p., [8] p. of plates : ill. (some col.). Chapman & Hall/CRC cryptography and network security series Includes bibliographical references. "Preface Video surveillance is the area of computer science devoted to real-time acquisition, processing, and management of videos coming from cameras installed in public and private areas, in order to automatically understand events happening at the monitored sites, eventually setting up an alarm. Because of the rapidly increasing number of surveillance cameras, it has become a key technology for security and safety, with applications ranging from fight against terrorism and crime, to private and public safety (e.g., in private buildings, transport networks, town centres, schools, and hospitals), and to the efficient management of transport networks and public facilities (e.g., traffic lights and railroad crossings). Video surveillance is an extremely interdisciplinary area, embracing the study of methods and algorithms for computer vision and pattern recognition, but also hardware for sensors and acquisition tools, computer architectures, wired and wireless communication infrastructures, and middleware. From an algorithmical standpoint, the general problem can be broken down into several steps, including motion detection, object classification, tracking, activity understanding, and semantic description, each of which poses its own challenges and hurdles for the system designers. Moreover, the scope of video surveillance is being extended to off-line multimedia analysis systems related to security and safety, thus entailing disciplines such as content-based video retrieval for visual data similarity retrieval and video mining for knowledge extraction; typical applications are in forensic video analysis and human behaviour analysis"-- Provided by publisher. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Soft computing. Video surveillance. Image processing. Pattern recognition systems. Electronic books. Pal, Sankar K. Petrosino, Alfredo. Maddalena, Lucia. ProQuest (Firm) Chapman & Hall/CRC cryptography and network security. https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=870695 Click to View |
language |
English |
format |
Electronic eBook |
author2 |
Pal, Sankar K. Petrosino, Alfredo. Maddalena, Lucia. ProQuest (Firm) |
author_facet |
Pal, Sankar K. Petrosino, Alfredo. Maddalena, Lucia. ProQuest (Firm) ProQuest (Firm) |
author2_variant |
s k p sk skp a p ap l m lm |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Pal, Sankar K. |
title |
Handbook on soft computing for video surveillance |
spellingShingle |
Handbook on soft computing for video surveillance Chapman & Hall/CRC cryptography and network security series |
title_full |
Handbook on soft computing for video surveillance [electronic resource] / edited by Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena. |
title_fullStr |
Handbook on soft computing for video surveillance [electronic resource] / edited by Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena. |
title_full_unstemmed |
Handbook on soft computing for video surveillance [electronic resource] / edited by Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena. |
title_auth |
Handbook on soft computing for video surveillance |
title_new |
Handbook on soft computing for video surveillance |
title_sort |
handbook on soft computing for video surveillance |
series |
Chapman & Hall/CRC cryptography and network security series |
series2 |
Chapman & Hall/CRC cryptography and network security series |
publisher |
CRC Press, |
publishDate |
2012 |
physical |
xv, 315 p., [8] p. of plates : ill. (some col.). |
isbn |
9781439856857 (electronic bk.) |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 S63 H36 42012 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=870695 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
006 - Special computer methods |
dewey-full |
006.3 |
dewey-sort |
16.3 |
dewey-raw |
006.3 |
dewey-search |
006.3 |
oclc_num |
778448505 |
work_keys_str_mv |
AT palsankark handbookonsoftcomputingforvideosurveillance AT petrosinoalfredo handbookonsoftcomputingforvideosurveillance AT maddalenalucia handbookonsoftcomputingforvideosurveillance AT proquestfirm handbookonsoftcomputingforvideosurveillance |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500870695 (Au-PeEL)EBL870695 (CaPaEBR)ebr10535473 (CaONFJC)MIL390918 (OCoLC)778448505 |
hierarchy_parent_title |
Chapman & Hall/CRC cryptography and network security series |
is_hierarchy_title |
Handbook on soft computing for video surveillance |
container_title |
Chapman & Hall/CRC cryptography and network security series |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1792330728380301313 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03334nam a2200445 a 4500</leader><controlfield tag="001">500870695</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">111230s2012 fluaf sb 000 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2011046676</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781439856840</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439856857 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500870695</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL870695</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10535473</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL390918</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)778448505</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.S63</subfield><subfield code="b">H36 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Handbook on soft computing for video surveillance</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">edited by Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boca Raton :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 315 p., [8] p. of plates :</subfield><subfield code="b">ill. (some col.).</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Chapman & Hall/CRC cryptography and network security series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Preface Video surveillance is the area of computer science devoted to real-time acquisition, processing, and management of videos coming from cameras installed in public and private areas, in order to automatically understand events happening at the monitored sites, eventually setting up an alarm. Because of the rapidly increasing number of surveillance cameras, it has become a key technology for security and safety, with applications ranging from fight against terrorism and crime, to private and public safety (e.g., in private buildings, transport networks, town centres, schools, and hospitals), and to the efficient management of transport networks and public facilities (e.g., traffic lights and railroad crossings). Video surveillance is an extremely interdisciplinary area, embracing the study of methods and algorithms for computer vision and pattern recognition, but also hardware for sensors and acquisition tools, computer architectures, wired and wireless communication infrastructures, and middleware. From an algorithmical standpoint, the general problem can be broken down into several steps, including motion detection, object classification, tracking, activity understanding, and semantic description, each of which poses its own challenges and hurdles for the system designers. Moreover, the scope of video surveillance is being extended to off-line multimedia analysis systems related to security and safety, thus entailing disciplines such as content-based video retrieval for visual data similarity retrieval and video mining for knowledge extraction; typical applications are in forensic video analysis and human behaviour analysis"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Soft computing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Video surveillance.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Image processing.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Pattern recognition systems.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pal, Sankar K.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Petrosino, Alfredo.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maddalena, Lucia.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Chapman & Hall/CRC cryptography and network security.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=870695</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |