SlideShare a Scribd company logo
1 of 8
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 49
DESIGN OF SELF POWERED EMBEDDED WIRELESS SMART
CAMERA USING MULTIMODAL VIDEO ANALYSIS
K.Abinaya1
, M. Nargeesh Banu2
1
B.E, Department of Electronics and Communication, Vivekanandha College of Engineering for Women, Tamilnadu,
India
2
B.E, Department of Electronics and Communication, Vivekanandha College of Engineering for Women, Tamilnadu,
India
Abstract
Surveillance is a key aspect in security scenario in existing world. The existing systems consist of continuous monitoring and
recording of the scenario or area under surveillance. This causes considerable amount of power expense and unnecessary data
recording. To counteract these two problems we propose here a system which has an energy harvester and intelligent power saving
technique. The proposed system consists of an PIR and a proximity sensor placed in the line of sight of the camera. When any kind of
anomaly is detected in the foreground of the camera, the camera is powered on by the energy harvester unit to turn on the camera.
Once the foreground is cleared of the anomaly the energy harvester unit stops the power to the camera and shut down the camera.
This helps in significant improvement in power saving and longer battery life in wireless sensor network. The image process
techniques use the background subtraction to detect the geometry of anomaly. The proposed method also has renewable energy
production system with a solar panel and a energy management unit for charging and discharging unit. The total system will have
codes written in MATLAB for the blob analysis of image acquired. The frames will be analyzed by MATLAB for same. The proposed
system offers significant improvement in power saving in image acquisition.
Keywords: surveillance, infrared sensor, anomaly, wireless sensor network, energy harvester, power saving technique
-----------------------------------------------------------------------***-------------------------------------------------------------------
1. INTRODUCTION
The focus of surveillance missions is to acquire and verify in-
formation about enemy capabilities and positions of hostile
targets. Such missions often involve a high element of risk for
human personnel and require a high degree of stealthiest.
Hence, the ability to deploy unmanned surveillance missions,
by using wireless sensor networks, is of great practical
importance for the military. Because of the energy constraints
of sensor devices, such systems necessitate energy aware
design to ensure the longevity of surveillance emissions.
Solutions proposed recently for this type of system show
promising result. However, the simplified assumptions they
make about the system in the simulator often do not hold well
in practice and energy consumption is narrowly accounted for
within a single protocol. One of the key advantages of
wireless
Sensor networks (WSN) is their ability to bridge the gap
between the physical and logical worlds, by gathering certain
useful information from the physical world and
communicating that Information to more powerful logical
devices. If the ability of the WSN is suitably harnessed, it is
envisioned that WSNs can reduce or eliminate the need for
human involvement in information gathering in certain
civilian and military applications. In the near future, sensor
devices will be produced in large quantities at a very low cost
and densely deployed to improve robustness and reliability.
They can be miniaturized into a cubic millimeter package in
order to be stealthy in a hostile environment. Cost and size
considerations imply that the resources available to individual
nodes are severely limited that limited processor band width
hand memory are temporary constraints in sensor networks.
They will disappear with fast developing fabrication
techniques. The energy constraints on the other hand are more
fundamental. According to R.A. Powers battery capacity only
doubles in 35 years. Energy constraints are unlikely to be
solved in the near future with the slow progress in battery
capacity and energy scavenging. Moreover, the untended
nature of sensor nodes and the hazardous sensing
environment preclude manual battery replacement. For these
reasons, energy awareness becomes the key research
challenge for sensor network protocol design.
2. RELATED WORK
A video sensor node in a wide area sensor network is a node
capable of performing on-board video processing, and com-
municating the information over a self-organizing and fault-
tolerant wireless network. Commercial CCTV and PC-based
surveillance systems are not suitable for wireless sensor net-
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 50
work surveillance application, and are orthogonal to our
approach. In fact, the CCTV are not processing the data on
line and are wired for power consumption, while PC-based
and com mercial cameras rely on high power consumption,
which is not suitable for the WSN. For this reason, this
section does not re- view these kinds of solutions.
Recently, several platforms and commercial cameras with
similar goals have been developed within a sensor.
We can classify these approaches in three categories:
• Lowcost nodes with wired interface (e.g., commercial
USB/LAN camera, or the node designed by
Corely[12];
• Wireless nodes with significant power consumption
• Application-specific single ultra-low power single chip
solution
Being wired, the nodes in the first category obviously do not
satisfy the basic requirement of being wireless, thus usually
these cameras send the data to a remote host to be processed,
although novel commercial cameras have the possibility to do
it on-board they still send the results by means of a wire.
Instead, nodes in the second category consume roughly more
power than a typical first generation wireless sensor node and
for this reason they are not suitable for wireless sensor
network which should work for several months. Finally,
single-chip solutions have extremely low-power consumption,
but they are neither programmable nor configurable in field.
One important common point among current video wireless
nodes belonging to the first and second category is that the
digital signal processing sub- system is the main power
bottleneck. This is due to the fact that the high data rate of
CMOS image sensor imposes the selection of fast processors
and memories with high power consumption. Hence, the main
open challenge in this area is to synergistically develop
algorithms and architectures for energy-efficient image
processing without giving up the flexibility of in-field
configuration.
The academic literature provides more similar approaches in
terms of low-power cameras and wireless sensor application.
In sensor nodes equipped with PIR, acoustic and magnetic
sensors have been deployed in order to achieve adjustable
sensitivity, stealthiness and effectiveness in a distributed
military surveillance applications. To balance privacy and
security in surveillance applications, networks of infrared
sensors (IR) and cameras are employed also in. Cameras are
used in public areas while networks of IR detectors [14]are
deployed in private areas. The system processes the data from
IR sensors in order to detect an event of interest in the private
area to identify the author by correlation with the images
grabbed in the public area. Energy conservation through
limiting the sensing to a small part of the network was also
considered in. In, the activation pattern is swept across the
network. Both schemes assume a simple topology and do not
handle sensing holes due to the sleeping time of the sensors.
In fact in this previous work the sleeping time is fixed and the
sensor could sleep also when it is need have data acquisition.
In, the activation pattern follows a user-defined path through
the sensor network as a sentry. In, a sleep/wakeup strategy in
solar-powered wireless sensor is presented. Our work
incorporates many similar ideas to the ones mentioned above
however in contrast to the other works we present a
combination of video sensor with other low-cost and low-
level sensors, which are used mainly for triggering the camera
at the right time and not to promote a reduction of the system
energy requirements. In fact the PIR sensor can be used as an
ultra low power wake-up trigger to re- duce the power
consumption when the video processing is not needed.
Moreover, data from PIR sensors can be used from the
application to understand when the best moment for starting
an image acquisition occurs. This will bring both a reduction
of false positives and a reduction of the number of frame
being processed, thus also a reduction of power consumption.
Finally, we equipped the node with a solar panel to recharge
the batteries and achieve perpetual work.
3. SYSTEM ARCHITECTURE
Fig 1 Camera sensor with PIR sensor, processing unit
ATMEGA 328 microcontroller with SRAM
Fig. 1 shows the smart camera structure. A smart camera is a
camera that can do on-board processing instead of
transmitting all video data to a central controller. The choice
of a smart camera is motivated by the notably reduced power
consumption required by processing on-board compared to a
solution relying on transmitting raw data through a wireless
interface. The wire- less smart camera consists of a camera
sensor, an embedded processor (Atmega328 from STM), a
CMOS video sensor (VS6624 from STM), a pyroelectric
infrared sensor used as trigger and a wireless communication
module, being supported through a suitable interface which
can host either a ZigBee or Bluetooth compliant transceiver.
The whole system is designed to achieve low power
consumption. Each device provides a power saving mode to
reduce consumption when not in use. The smart camera is
connected to a host (central PC) to send alarms or relevant
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 51
image content; moreover it can receive wireless messages
from the host so as to modify its settings was very easy to
implement .the transformation is made by using Zigbee or
other latest technology.
3.1. Processing Core
Choosing the suitable target hardware for a smart camera
processor is an important issue. Due to the very large amount
of data involved in image processing and computer vision
tasks and the aforementioned constraints on power
consumption, we have chosen The high-performance Atmel
8-bitAVRRISC-based micro controller combines 32 KB ISP
flash memory with read-while-write capabilities, 1 KB
EEPROM, 2 KB SRAM, 23 general purpose I/O lines, 32
general purpose working registers, three flexible
timer/counters with compare modes, internal and external
interrupts, serial programmable [21]USART, a byte-oriented
2-wire serial interface, SPI serial port, 6-channel 10-bit A/D
converter (8-channels in TQFP and QFN/MLF packages),
programmable watchdog timer with internal oscillator, and
five software selectable power saving modes. The device
operates between 1.8-5.5 volts. By executing powerful
instructions in a single clock cycle, the device achieves
throughputs approaching 1 MIPS per MHz, balancing power
consumption.
3.2. CMOS Image Sensor
To achieve low power consumption we chose the VS6624
CMOS imager from STMicroelectronics as the video device.
The image sensor provides full SXGA (1280 1024)
resolution at 15 frames per second, or VGA (640 480)
resolution at 30 frames per second. A very important feature
is the power consumption, which is just 120 mW when active
(2.8 V and 12 MHz frequency), while it goes down to 23 mW
when it switches to standby. The CMOS camera can be
programmed and controlled via internal registers using I C
serial interface. It supports several output formats, however
most video processing algorithms use grayscale image, thus
we adopt 8-bit grayscale images with YCbCr 4:0:0 formats.
Although it supports SXGA resolution, due to limited size of
the internal SRAM only little parts of the images can be
processed, typically 160 120 pixels, but the node can use
external RAM extending the memory capability. This
resolution is enough to perform our image processing
algorithm, and to save time and energy for storing and
processing data.
3.3. Pyroelectric Infrared Senor
Pyroelectric devices, such as the PIR sensor, have +ve
elements made of a crystalline material that generates an
electric charge when exposed to infrared radiation. The
changes in the amount of infrared striking the element change
the voltages generated, which are measured by an on-board
amplifier. The device contains a special filter called a Fresnel
lens, which focuses the infrared signals onto the element. As
the ambient infrared signals change rapidly, the on-board
amplifier trips the output to indicate motion.[17]
Fig 2 A SN PIR Infrared sensor (Passive Infrared Sensor)
Table -1: Recommended operating condition
Parameter Symbol Rating Unit
Operating
Power supply
Vcc +4.5V - 5.5
V
V
Operating
Temperature
T -15
degCelcius
̊C
3.4. Wireless Transceiver
Analog wireless is the transmission of audio and video signals
using radio frequencies. Typically, analog wireless has a
transmission range of around 300 feet (91 meters) in open
space; walls, doors, and furniture will reduce this range.
Analog wireless is found in three frequencies: 900 MHz, 2.4
GHz, and 5.8 GHz. Currently, the majority of wireless
security cameras operate on the 2.4 GHz frequency.
Most household routers, cordless phones, video game
controllers, and microwaves operate on the 2.4 GHz
frequency and may cause interference with your wireless
security camera. 900 MHz is known as Wi-Fi Friendly
because it will not interfere with the Internet signal of your
wireless network. The advantage of transceiver is multiple
receivers per camera: the signal from one camera can be
picked up by any receiver; you can have multiple receivers in
various locations to create your wireless surveillance
network.
3.5. Energy Harvesting Unit
Solar power is the conversion of sunlight into electricity,
either directly using photo voltaics (PV), or indirectly using
concentrated solar power (CSP). Concentrated solar power
systems use lenses or mirrors and tracking systems to focus a
large area of sunlight into a small beam. Photo voltaics
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 52
convert light into electric current using the photoelectric
effect. Photo voltaics were initially, and still are, used to
power small and medium-sized applications, from the
calculator powered by a single solar cell to off-grid homes
powered by a photovoltaic array. They are an important and
relatively inexpensive source of electrical energy where grid
power is inconvenient, unreasonably expensive to connect, or
simply unavailable.
A charge controller, charge regulator or battery regulator
limits the rate at which electric current is added to or drawn
from electric batteries. It prevents overcharging and may
prevent against overvoltage, which can reduce battery
performance or lifespan, and may pose a safety risk. It may
also prevent completely draining ("deep discharging") a
battery, or perform controlled discharges, depending on the
battery technology, to protect battery life. The terms "charge
controller" or "charge regulator" may refer to either a stand-
alone device, or to control circuitry integrated within a battery
pack, battery-powered device, or battery recharger. Charge
controllers are sold to consumers as separate devices, often in
conjunction with solar or wind power generators, for uses
such as RV, boat, and off-the-grid home battery storage
systems In solar applications, charge controllers may also be
called solar regulators. Some charge controllers/solar
regulators have additional features, such as a low voltage
disconnects, a separate circuit which powers down the load
when the batteries become overly discharged.
Lithium-ion batteries are common in consumer electronics.
They are one of the most popular types of rechargeable
battery for portable electronics, with one of the best energy
densities, no memory effect and only a slow loss of charge
when not in use. Beyond consumer electronics, LIBs are also
growing in popularity for military, electric vehicle and
aerospace applications. Handheld electronics mostly use LIBs
based on lithium cobalt oxide (LiCoO2), which offers high
energy density, but presents safety risks, especially when
damaged.
Fig 3 Characteristic of the photovoltaic module
Table -2: Characteristics of solar cell
4. VIDEO ANALYSIS ALGORITHM
In the field of computer vision, blob detection refers to
mathematical methods that are aimed at detecting regions in a
digital image that differ in properties, such as brightness or
color, compared to areas surrounding those regions. There are
two main classes of blob detectors: (i) differential methods
are based on derivatives of the function with respect to
position, and (ii) methods based on local extreme are based
on finding the local maxima and minima of the function.
Another common use of blob descriptors is as main primitives
for texture analysis and texture recognition.[23]
The contours of an object in an image are determined by
calculating the gradient magnitude of each pixel in the image.
The stronger the intensity transition, the greater the
magnitude will be. The gradient magnitude is calculated at
each pixel position from the image's first derivatives. It is
defined as:
Gradiant magnitude =
Where: ‫׀‬x and ‫׀‬y = the X and Y derivative values, respectively
They define the components of the gradient vector as:
Gradiant vector =
An edge element (edge) is located at the maximum value of
the gradient magnitude over adjacent pixels in the direction
defined by the gradient vector. The gradient direction is the
direction of the steepest ascent at an edge in the image while
the gradient magnitude is the steepness of that ascent.[6][7].
The gradient direction also is perpendicular to the object
contour. Well-defined contours are extracted from strong and
sharp intensity transitions. A strong contrast between the
objects and their background improves the edge detector's
robustness and location accuracy.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 53
Fig 4 Flow diagram of the proposed video analysis algorithm
5. EXPERIMENTAL RESULT
5.1. Video Analysis Evaluation
Experiment concerns an indoor setup aimed at monitoring a
sector of a hallway in a building. The camera was placed a
few meters away from the wall and switched on. In order to
achieve the best performance, the camera has to be firmly
attached to the wall or placed over a vibration-free surface
[24]. In fact, although the camera is mounted on a mobile
device, the image processing algorithm assumes the presence
of a static camera. Meanwhile several real
abandoned/removed object instances were generated. The
processed images were sent directly to a host PC via
Bluetooth. We have analyzed three continuous footages
where, each time the camera was switched on by the PIR
sensor, the cur- rent frame was processed by the proposed
algorithm. We have collected a total of 64 frames, with each
frame containing at times even multiple abandoned/removed
objects, for a total of 78 abandoned/removed objects. Also, a
subset of frames does not contain any case of object
removal/abandon. As for the background subtraction
algorithm, out of 78 ROIs, 77 ROIs have been correctly
detected by the algorithm, yielding only one false negative
and four false positives, for a correct segmentation rate of
98.7%. These 77 ROIs, fed to the classification stage, were
then correctly classified in 73 cases as abandoned/removed
object, yielding to a correct classification rate of 94.8%.
Fig.5 reports some qualitative examples of correct
segmentation and classification yielded by the proposed
algorithm on the dataset of Experiment 1. In the figure, seven
examples are reported (indicated by letters a–f), where for
each example the two frames and the final output of the
algorithm are shown. As for the output, each detected ROI is
indicated by a white bounding box, while the classification
result is encoded as a symbol shown inside each detected
bounding box: the ― ‖ symbol stands for abandoned object
(as if it is added to the scene) while the ― ‖ symbol stands for
removed object (as if it is subtracted from the scene). As it
can be seen from the figure, the proposed algorithm is able to
achieve correct segmentation and classification also in
presence of very small, partially trans- parent objects (cases e
and f) and with multiple ROIs (cases a-f).
In Experiment 2, we present a qualitative evaluation of the
proposed algorithm in an outdoor environment under sunny
conditions, which concerns specifically the case of
monitoring a wall from undesired events such as graffiti,
stealing or unauthorized poststicking. In this case the distance
from the wall was around 5 m in the case (a–c) Figs.6 m in
(d) our system has been tested against events such as graffiti
(case a), wall affixtures (case b), object removal [case c and
Fig. 10(d)]. Finally a situation where only illumination
changes occur in the scene is shown in Fig. 9(d) In this test
the camera was left at 1000 in morning and the video
processing were performed 2 h later with different light. As it
can be seen, our algorithm is capable of robustly handling all
the aforementioned cases, yielding correct classification also
when the object ROI is particularly small (e.g., case c of both
figures and d Fig. 10, and with each single writings appearing
in the graffiti situation concerning case a) and despite the
nonoptimal illumination conditions.
Fig 5 segmentation and classification examples yielded by the
pro- posed algorithm
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 54
Fig 6 Performance of the proposed video analysis algorithm
in different out- door circumstances: (a), object abandon (b),
object removal (c), illumination change (d).
5.2. Power Consumption Analysis
Table IV shows the power consumption of our prototype. The
table shows how the power consumption of the whole system
in sleep mode is more than 10 times less than that in normal
mode. We estimated that the average time to elaborate one
abandoned/ removed object event is about 3 s from the
moment when the detection starts. Moreover, the amount of
time required for blob analysis depends on the number and
size of the detected ROIs. Hence, it will be zero if the system
does not detect any blob and about 100 ms for three ROIs
sized 16 pixels. To evaluate the benefits provided by our
approach in terms of improvement of battery life we consider
the same system without PIR sensor. More specifically, we
com- pare the two approaches assuming different amounts of
random events (i.e., 50, 100, 300 events per hour) and by
estimating the lifetime of the three scenarios using a full 2000
mAh bat- tery. In the first simulation the PIR sensor is
disconnected and the system does not know when to switch
off/on the camera or when to turn into sleep mode, so it will
work continuously and the power consumption will be
independent from the number of events. Then, in our
approach, and as previously mentioned, the PIR sensor
detects events and wakes up the microcontroller which waits
until the FOV is empty to start the video analysis. When the
video analysis is over the microcontroller turns the camera off
to reduce power consumption.
Table -3: Power consumption of the video sensor node
Using the solar panel to harvest the energy, we can obtain an
additional improvement of battery life, achieving perpetual
working in an application scenario with 50 events per hour. A
simulation verifying the performance of the proposed system
is depicted in Fig. 7, where the energy harnessed from the
solar cell powers the sensor node and recharges the battery
with the exceeding events. In our simulations we assume a
rate of 50 events per hour representing people walking within
the field of view of the video node. Furthermore we measured
the energy intake from the energy harvester and the solar light
intensity during five days (Fig.8). All the information was
stored in files used as input to our simulations. Finally the
energy level of the battery at the beginning of the simulation
is half its full capacity (2000 mAh, expressed in Joules). This
simulation shows how the system can work perpetually with a
small PV panel. The node without the energy harvester stops
working after approximately 40 h, as it can be seen from Fig.
7. Instead, the node with the harvester can recharge its battery
during the day, the energy accumulated in the battery being
sufficient to keep the node on during the night.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 55
Fig 7 Simulation of our system with and without PV
harvester (50 events/h)
Fig 8 energy harvested during five consecutive days from our
PV panel
6. COCLUSIONS
Proposed method utilizes the efficient energy harvesting
methodology for increasing the charged battery life. The
Codes written in the Arduino board helps in significant
controlled discharge of battery during the surveillance and
efficient charging from environment. The use of MATLAB
subsequently gives a better environment for image processing
and blob analysis. The present algorithm can be enhanced by
smart optimization techniques. In this work, a self-powered
wireless smart camera for run time video processing has been
presented. The proposed approach have shown that combing
advanced hardware/software solutions makes possible high
accuracy and perpetual work in video processing on wireless
sensor network where smart cam- eras find the most critical
constrain in the power consumption.
In fact, energy harvesters provide energy to replenish the
batteries, while the combined use of different sensors with
heterogeneous features allows for a remarkable reduction of
the overall power consumption. We designed the camera for
real time video processing algorithm and an ad-hoc
abandoned/re- moved object using PIR features. Data were
presented to evaluate the performance of our approach in term
of energy consumption, video processing application and
accuracy. The experimental results showed the versatility of
the application in indoor and outdoor scenario and the
simulation showed the perpetual work was achieved in
simulation outdoor scenario. Future work will include a
complete campaign of new experiments in order to analyze
better the issue of background changes and more challenging
condition (i.e., direct sun light, shadows). Moreover they will
be directed towards improving the hardware of the smart
camera node, video processing algorithm, and distributed
intelligence.
REFERENCES
[1]. W. Chan, J. Chang, T. Chen, Y. Tseng, and S. Chien,
―Efficient content analysis engine for visual surveillance
network,‖ Trans. Circuits Syst. Video Technol., vol. 19, no. 5,
pp. 693–703, 2009.
[2]. M. Magno, D. Brunelli, P. Zappi, and L. Benini, ―A
solar-powered video sensor node for energy efficient
multimodal surveillance,‖ in Eu- romicro Conf. Digital
System Design, 2008, pp. 512–519.
[3]. A. S. Weddell, M. Magno, G. V. Merrett, D. Brunelli, B.
M.Al-Hashimi, and L. Benini, ―A survey of multi-source
energy har- vesting systems,‖ in Design, Automat. Test Eur.
Conf. Exhibit., Mar.18–22, 2013, pp. 905–910.
[4]. S. Lu, J. Zhang, and D. Feng, ―A knowledge-based
approach for de- tecting unattended packages in surveillance
video,‖ in Proc. IEEE Int. Conf. Adv. Video Signal Based
Surveill. (AVSS 06), Nov. 2006, p. 110.
[5]. T. Semertzidis, K. Dimitropoulos, A. Koutsia, and N.
Grammalidis, [17] M. Magno, F. Tombari, D. Brunelli, L. Di
Stefano, and L. Benini, ―Multi-modal video surveillance
aided by pyroelectric infrared sensors,‖ in Proc. ECCV
Workshop Multi-Camera Multi-Modal Sensor Fusion, Algor.
Appl., 2008, pp. 1–12.
[6]. S. Lim and L. Davis, A one-threshold algorithm for
detecting abandoned packages under severe occlusions using
a single camera CS Dept., Univ. Maryland, Tech. Rep. CS-
TR-4784, 2006.
[7]. S. Ferrando, G. Gera, and C. Regazzoni, ―Classification
of unattended and stolen objects in video-surveillance
system,‖ in Proc. IEEE Int. Conf. Adv. Video Signal Based
Surveill., Nov. 2006, p. 21.
[8]. J. San Miguel and J. Martnez, ―Robust unattended and
stolen object detection by fusing simple algorithms,‖ in Proc.
IEEE Int. Conf. Adv. Video Signal Based Surveill., Sep.
2008, pp. 18–25.
[9]. M. Bhargava, C. Chen, M. Ryoo, and J. Aggarwal,
―Detection of abandoned objects in crowded environments,‖
in Proc. IEEE Conf. Adv. Video Signal Based Surveill., Sep.
2007, pp. 271–276.
[10]. F. Porikli, Y. Ivanov, and T. Haga, ―Robust abandoned
object detection using dual foregrounds,‖ EURASIP J. Adv.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 56
Signal Process., vol. 2008, no. 1, Jan. 2008.
[11]. M. Spengler and B. Schiele, ―Automatic detection and
tracking of abandoned objects,‖ in Proc. IEEE Int. Workshop
Vis. Surveill. Performance Eval. Track. Surveill. 2003.
[12]. Y. E. A. Tian, ―Robust and efficient foreground analysis
for real-time video surveillance,‖ in Proc. IEEE Conf.
Comput. Vis. Pattern Recognit., 2005, pp. 1182–1187.
[13]. P. Spagnolo, A. Caroppo, M. Leo, T. Martifiggiano, and
T. D’orazio, ―An abandoned/removed objects detection
algorithm and its evaluation on PETs datasets,‖ in Proc. IEEE
Conf. Adv. Video Signal Based Surveill., Nov. 2006, p. 17.
[14]. M. Beynon, D. Van Hook, M. Seibert, A. Peacock, and
D. Dudgeon, ―Detecting abandoned packages in a multi-
camera video surveillance system,‖ in Proc. IEEE Conf. Adv.
Video Signal Based Surveill., Jul.2003, pp. 221–228.
[15]. C. Sacchi and C. Regazzoni, ―A distributed surveillance
system for detection of abandoned objects in unmanned
railway environments,‖ IEEE Trans. Veh. Technol., vol. 49,
no. 5, pp. 2013–2026, 2000
[16]. N. Bird, S. Atev, N. Caramelli, R. Martin, O. Masoud,
and N. Pa- panikolopoulos, ―Real time, online detection of
abandoned objects in public areas,‖ in Proc. IEEE Conf.
Robot. Automat. 2006, pp.3775–3780
[17]. ―Video sensor network for real-time traffic monitoring
and surveillance,‖ IET Intell. Transport Syst., vol. 4, no. 2,
pp. 103–112, Jun.2010.
[18]. D. Carli, D. Brunelli, D. D. Bertozzi, and L. Benini, ―A
high-efficiency wind-flow energy harvester using micro
turbine,‖ in SPEEDA2010—Int. Symp. Power Electron.
Electr Drives, Automat Motion, 2010, pp. 778–783
[19]. C. Moser, D. Brunelli, L. Thiele, and L. Benini, ―Real-
time scheduling with regenerative energy,‖ in Euromicro
Conf. Real-Time Syst., 2006, pp. 261–270.
[20]. C. Moser, L. Thiele, D. Brunelli, and L. Benini, ―Robust
and low com- plexity rate control for solar powered sensors,‖
in Proceedings -Design, Automation and Test in Europe,
DATE, 2008, pp. 230–235.
[21]. P. de la Hamette et al., ―Architecture and applications of
the finger- mouse: A smart stereo camera for wearable
computing HCI,‖ Personal Ubiquitous Comput., vol. 12, no.
2, pp. 97–110, 2008.
[22] D. Corley and E. Jovanov, ―A low power intelligent
video-processing sensor,‖ in Proc. 34th Southeastern Symp.
System Theory, 2002, pp.176–178
[23] D. Li, Y. Jiang, and G. Chen, ―A low cost embedded
color vision system based on SX52,‖ in Proc. IEEE Int. Conf.
Inf. Acquisit., Aug.2006, pp. 883–887.
[24]. G. Zhang, T. Yang, S. Gregori, J. Liu, and F. Maloberti,
―Ultra-low power motion-triggered image sensor for
distributed wireless sensor network,‖ in Proc. IEEE Sensors,
Oct. 2003, vol. 2, pp. 1141–1146.
[25]. W.-C. Feng, B. Code, E. Kaiser, M. Shea, W.-C. Feng,
and L. Bavoil, ―Panoptes: Scalable low-power video sensor
networking technologies,‖ in MULTIMEDIA’03: Proc. 11th
ACM Int. Conf. Multimedia, New York, 2003, pp. 562–571.
[26]. L. Ferrigno and A. Pietrosanto, ―A low cost visual
sensor node for bluetooth based measurement networks,‖ in
Proc. 21st IEEE Instrum. Meas. Technol. Conf., 2004, vol. 2,
pp. 895–900.
[27]. P. Garda, O. Romain, B. Granado, A. Pinna, D. Faura,
and K. Hachicha, ―Architecture of an intelligent beacon for
wireless sensor networks,‖ in Proc. IEEE 13th Workshop
Neural Netw. Signal Process. 2003, pp. 151–158.

More Related Content

What's hot

Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areasAmulya Anu
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnYen Kheng Tan (PhD, SrMIEEE)
 
Desing on wireless intelligent seneor network on cloud computing system for s...
Desing on wireless intelligent seneor network on cloud computing system for s...Desing on wireless intelligent seneor network on cloud computing system for s...
Desing on wireless intelligent seneor network on cloud computing system for s...csandit
 
Wireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionWireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionIJMERJOURNAL
 
IJSRED-V1I1P3
IJSRED-V1I1P3IJSRED-V1I1P3
IJSRED-V1I1P3IJSRED
 
Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processorIaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processorIaetsd Iaetsd
 
IRJET- Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET-   	  Survey of Improving Congestion Control in WSN using Grid based Al...IRJET-   	  Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET- Survey of Improving Congestion Control in WSN using Grid based Al...IRJET Journal
 
Designing of an automated power meter reading
Designing of an automated power meter readingDesigning of an automated power meter reading
Designing of an automated power meter readingManoj Kollam
 
Wireless meter reading system
Wireless meter reading systemWireless meter reading system
Wireless meter reading systemmangal das
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unitIAEME Publication
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET Journal
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsnDeepaDasarathan
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...eSAT Journals
 
A review on wireless sensor networks
A review on wireless sensor networksA review on wireless sensor networks
A review on wireless sensor networksAlexander Decker
 
A personalized Wireless Sensor Network Communication Model for computerizatio...
A personalized Wireless Sensor Network Communication Model for computerizatio...A personalized Wireless Sensor Network Communication Model for computerizatio...
A personalized Wireless Sensor Network Communication Model for computerizatio...IOSR Journals
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 

What's hot (20)

9345.pdf
9345.pdf9345.pdf
9345.pdf
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wireless applications in various areas
Wireless applications in various areasWireless applications in various areas
Wireless applications in various areas
 
E010424043
E010424043E010424043
E010424043
 
Review Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable WsnReview Of Energy Harvesting Technologies For Sustainable Wsn
Review Of Energy Harvesting Technologies For Sustainable Wsn
 
Desing on wireless intelligent seneor network on cloud computing system for s...
Desing on wireless intelligent seneor network on cloud computing system for s...Desing on wireless intelligent seneor network on cloud computing system for s...
Desing on wireless intelligent seneor network on cloud computing system for s...
 
Wireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive DetectionWireless Data Transmission and Acquisition for Alive Detection
Wireless Data Transmission and Acquisition for Alive Detection
 
IJSRED-V1I1P3
IJSRED-V1I1P3IJSRED-V1I1P3
IJSRED-V1I1P3
 
Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processorIaetsd flexible and reconfigurable soc for sensor network under zynq processor
Iaetsd flexible and reconfigurable soc for sensor network under zynq processor
 
IRJET- Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET-   	  Survey of Improving Congestion Control in WSN using Grid based Al...IRJET-   	  Survey of Improving Congestion Control in WSN using Grid based Al...
IRJET- Survey of Improving Congestion Control in WSN using Grid based Al...
 
Designing of an automated power meter reading
Designing of an automated power meter readingDesigning of an automated power meter reading
Designing of an automated power meter reading
 
Wireless meter reading system
Wireless meter reading systemWireless meter reading system
Wireless meter reading system
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unit
 
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...Scheduling for interference mitigation using enhanced intercell interference ...
Scheduling for interference mitigation using enhanced intercell interference ...
 
A review on wireless sensor networks
A review on wireless sensor networksA review on wireless sensor networks
A review on wireless sensor networks
 
A personalized Wireless Sensor Network Communication Model for computerizatio...
A personalized Wireless Sensor Network Communication Model for computerizatio...A personalized Wireless Sensor Network Communication Model for computerizatio...
A personalized Wireless Sensor Network Communication Model for computerizatio...
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 

Viewers also liked

CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...JOLLUSUDARSHANREDDY
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
 
Innovative strategies for energy optimization
Innovative strategies for energy optimizationInnovative strategies for energy optimization
Innovative strategies for energy optimizationeSAT Publishing House
 
Active vibration control of smart piezo cantilever beam using pid controller
Active vibration control of smart piezo cantilever beam using pid controllerActive vibration control of smart piezo cantilever beam using pid controller
Active vibration control of smart piezo cantilever beam using pid controllereSAT Publishing House
 
A review on glitch reduction techniques
A review on glitch reduction techniquesA review on glitch reduction techniques
A review on glitch reduction techniqueseSAT Publishing House
 
A low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter controlA low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter controleSAT Publishing House
 
Performance analysis of new proposed window for
Performance analysis of new proposed window forPerformance analysis of new proposed window for
Performance analysis of new proposed window foreSAT Publishing House
 
Biochemical and molecular characterization of antagonistic bacteria against y...
Biochemical and molecular characterization of antagonistic bacteria against y...Biochemical and molecular characterization of antagonistic bacteria against y...
Biochemical and molecular characterization of antagonistic bacteria against y...eSAT Publishing House
 
Mesoscopic simulation of incompressible fluid flow in
Mesoscopic simulation of incompressible fluid flow inMesoscopic simulation of incompressible fluid flow in
Mesoscopic simulation of incompressible fluid flow ineSAT Publishing House
 
Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...eSAT Publishing House
 
A novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateA novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateeSAT Publishing House
 
Design of thin wall structures for energy absorption
Design of thin wall structures for energy absorptionDesign of thin wall structures for energy absorption
Design of thin wall structures for energy absorptioneSAT Publishing House
 
Interactive irrigation system through mobile with ivr response
Interactive irrigation system through mobile with ivr responseInteractive irrigation system through mobile with ivr response
Interactive irrigation system through mobile with ivr responseeSAT Publishing House
 
Power efficient and high throughput of fir filter using block least mean squa...
Power efficient and high throughput of fir filter using block least mean squa...Power efficient and high throughput of fir filter using block least mean squa...
Power efficient and high throughput of fir filter using block least mean squa...eSAT Publishing House
 
Cast metal flow analysis of intermediate flange
Cast metal flow analysis of intermediate flangeCast metal flow analysis of intermediate flange
Cast metal flow analysis of intermediate flangeeSAT Publishing House
 
Face detection for video summary using enhancement based fusion strategy
Face detection for video summary using enhancement based fusion strategyFace detection for video summary using enhancement based fusion strategy
Face detection for video summary using enhancement based fusion strategyeSAT Publishing House
 
Whiteboard image reconstruction using matlab
Whiteboard image reconstruction using matlabWhiteboard image reconstruction using matlab
Whiteboard image reconstruction using matlabeSAT Publishing House
 
Deflection control in rcc beams by using mild steel strips (an experimental i...
Deflection control in rcc beams by using mild steel strips (an experimental i...Deflection control in rcc beams by using mild steel strips (an experimental i...
Deflection control in rcc beams by using mild steel strips (an experimental i...eSAT Publishing House
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedeSAT Publishing House
 

Viewers also liked (20)

CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...CASE STUDY OF DIGITAL CAMERAHARDWARE AND SOFT WAREARCHITECTURECASE STUDY OF...
CASE STUDY OF DIGITAL CAMERA HARDWARE AND SOFT WARE ARCHITECTURECASE STUDY OF...
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 
Innovative strategies for energy optimization
Innovative strategies for energy optimizationInnovative strategies for energy optimization
Innovative strategies for energy optimization
 
Active vibration control of smart piezo cantilever beam using pid controller
Active vibration control of smart piezo cantilever beam using pid controllerActive vibration control of smart piezo cantilever beam using pid controller
Active vibration control of smart piezo cantilever beam using pid controller
 
A review on glitch reduction techniques
A review on glitch reduction techniquesA review on glitch reduction techniques
A review on glitch reduction techniques
 
Overview of energy grid in india
Overview of energy grid in indiaOverview of energy grid in india
Overview of energy grid in india
 
A low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter controlA low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter control
 
Performance analysis of new proposed window for
Performance analysis of new proposed window forPerformance analysis of new proposed window for
Performance analysis of new proposed window for
 
Biochemical and molecular characterization of antagonistic bacteria against y...
Biochemical and molecular characterization of antagonistic bacteria against y...Biochemical and molecular characterization of antagonistic bacteria against y...
Biochemical and molecular characterization of antagonistic bacteria against y...
 
Mesoscopic simulation of incompressible fluid flow in
Mesoscopic simulation of incompressible fluid flow inMesoscopic simulation of incompressible fluid flow in
Mesoscopic simulation of incompressible fluid flow in
 
Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...
 
A novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateA novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plate
 
Design of thin wall structures for energy absorption
Design of thin wall structures for energy absorptionDesign of thin wall structures for energy absorption
Design of thin wall structures for energy absorption
 
Interactive irrigation system through mobile with ivr response
Interactive irrigation system through mobile with ivr responseInteractive irrigation system through mobile with ivr response
Interactive irrigation system through mobile with ivr response
 
Power efficient and high throughput of fir filter using block least mean squa...
Power efficient and high throughput of fir filter using block least mean squa...Power efficient and high throughput of fir filter using block least mean squa...
Power efficient and high throughput of fir filter using block least mean squa...
 
Cast metal flow analysis of intermediate flange
Cast metal flow analysis of intermediate flangeCast metal flow analysis of intermediate flange
Cast metal flow analysis of intermediate flange
 
Face detection for video summary using enhancement based fusion strategy
Face detection for video summary using enhancement based fusion strategyFace detection for video summary using enhancement based fusion strategy
Face detection for video summary using enhancement based fusion strategy
 
Whiteboard image reconstruction using matlab
Whiteboard image reconstruction using matlabWhiteboard image reconstruction using matlab
Whiteboard image reconstruction using matlab
 
Deflection control in rcc beams by using mild steel strips (an experimental i...
Deflection control in rcc beams by using mild steel strips (an experimental i...Deflection control in rcc beams by using mild steel strips (an experimental i...
Deflection control in rcc beams by using mild steel strips (an experimental i...
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascaded
 

Similar to Design of self powered embedded wireless smart camera using multimodal video analysis

Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia SensorsWireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensorsidescitation
 
Remote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor NetworkRemote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor NetworkIJMER
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksSRAVANIP22
 
IRJET- Design and Development of Low Power Sensor Node For Plant Monitori...
IRJET-  	  Design and Development of Low Power Sensor Node For Plant Monitori...IRJET-  	  Design and Development of Low Power Sensor Node For Plant Monitori...
IRJET- Design and Development of Low Power Sensor Node For Plant Monitori...IRJET Journal
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET Journal
 
Energy efficient platform designed for sdma applications in mobile wireless ...
Energy efficient platform designed for sdma applications in mobile  wireless ...Energy efficient platform designed for sdma applications in mobile  wireless ...
Energy efficient platform designed for sdma applications in mobile wireless ...marwaeng
 
Study on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTStudy on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTIRJET Journal
 
IRJET- Internet of Things (IoT) based Smart Grid
IRJET- Internet of Things (IoT) based Smart GridIRJET- Internet of Things (IoT) based Smart Grid
IRJET- Internet of Things (IoT) based Smart GridIRJET Journal
 
Process monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motorProcess monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motoreSAT Publishing House
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...IRJET Journal
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET Journal
 
Ijarcet vol-2-issue-4-1368-1373
Ijarcet vol-2-issue-4-1368-1373Ijarcet vol-2-issue-4-1368-1373
Ijarcet vol-2-issue-4-1368-1373Editor IJARCET
 
IRJET- Wearable Sensor based Fall Detection System
IRJET- Wearable Sensor based Fall Detection SystemIRJET- Wearable Sensor based Fall Detection System
IRJET- Wearable Sensor based Fall Detection SystemIRJET Journal
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasmpgarciam
 

Similar to Design of self powered embedded wireless smart camera using multimodal video analysis (20)

Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia SensorsWireless Multimedia Sensor Network: A Survey on Multimedia Sensors
Wireless Multimedia Sensor Network: A Survey on Multimedia Sensors
 
Remote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor NetworkRemote Monitoring of Crop Field Using Wireless Sensor Network
Remote Monitoring of Crop Field Using Wireless Sensor Network
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Solar tracking with mobile
Solar tracking with mobileSolar tracking with mobile
Solar tracking with mobile
 
IRJET- Design and Development of Low Power Sensor Node For Plant Monitori...
IRJET-  	  Design and Development of Low Power Sensor Node For Plant Monitori...IRJET-  	  Design and Development of Low Power Sensor Node For Plant Monitori...
IRJET- Design and Development of Low Power Sensor Node For Plant Monitori...
 
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor NetworkIRJET- A Review on Cluster-based Routing for Wireless Sensor Network
IRJET- A Review on Cluster-based Routing for Wireless Sensor Network
 
Energy efficient platform designed for sdma applications in mobile wireless ...
Energy efficient platform designed for sdma applications in mobile  wireless ...Energy efficient platform designed for sdma applications in mobile  wireless ...
Energy efficient platform designed for sdma applications in mobile wireless ...
 
Study on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOTStudy on Smart Security Technology for Women based on IOT
Study on Smart Security Technology for Women based on IOT
 
IRJET- Internet of Things (IoT) based Smart Grid
IRJET- Internet of Things (IoT) based Smart GridIRJET- Internet of Things (IoT) based Smart Grid
IRJET- Internet of Things (IoT) based Smart Grid
 
Process monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motorProcess monitoring, controlling and load management system in an induction motor
Process monitoring, controlling and load management system in an induction motor
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...IRJET-  	  Underground Cable Fault Detection and Transmission of Intimation t...
IRJET- Underground Cable Fault Detection and Transmission of Intimation t...
 
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using ClustersIRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
IRJET- A Wireless Sensor Network based Border Monitoring System using Clusters
 
Ijarcet vol-2-issue-4-1368-1373
Ijarcet vol-2-issue-4-1368-1373Ijarcet vol-2-issue-4-1368-1373
Ijarcet vol-2-issue-4-1368-1373
 
IRJET- Wearable Sensor based Fall Detection System
IRJET- Wearable Sensor based Fall Detection SystemIRJET- Wearable Sensor based Fall Detection System
IRJET- Wearable Sensor based Fall Detection System
 
Wireless sensor Networks.ppt
Wireless sensor Networks.pptWireless sensor Networks.ppt
Wireless sensor Networks.ppt
 
Presentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricasPresentacion invento redes de sensores inalambricas
Presentacion invento redes de sensores inalambricas
 
Seminar PPT-4.pptx
Seminar PPT-4.pptxSeminar PPT-4.pptx
Seminar PPT-4.pptx
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 

Recently uploaded (20)

Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 

Design of self powered embedded wireless smart camera using multimodal video analysis

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 49 DESIGN OF SELF POWERED EMBEDDED WIRELESS SMART CAMERA USING MULTIMODAL VIDEO ANALYSIS K.Abinaya1 , M. Nargeesh Banu2 1 B.E, Department of Electronics and Communication, Vivekanandha College of Engineering for Women, Tamilnadu, India 2 B.E, Department of Electronics and Communication, Vivekanandha College of Engineering for Women, Tamilnadu, India Abstract Surveillance is a key aspect in security scenario in existing world. The existing systems consist of continuous monitoring and recording of the scenario or area under surveillance. This causes considerable amount of power expense and unnecessary data recording. To counteract these two problems we propose here a system which has an energy harvester and intelligent power saving technique. The proposed system consists of an PIR and a proximity sensor placed in the line of sight of the camera. When any kind of anomaly is detected in the foreground of the camera, the camera is powered on by the energy harvester unit to turn on the camera. Once the foreground is cleared of the anomaly the energy harvester unit stops the power to the camera and shut down the camera. This helps in significant improvement in power saving and longer battery life in wireless sensor network. The image process techniques use the background subtraction to detect the geometry of anomaly. The proposed method also has renewable energy production system with a solar panel and a energy management unit for charging and discharging unit. The total system will have codes written in MATLAB for the blob analysis of image acquired. The frames will be analyzed by MATLAB for same. The proposed system offers significant improvement in power saving in image acquisition. Keywords: surveillance, infrared sensor, anomaly, wireless sensor network, energy harvester, power saving technique -----------------------------------------------------------------------***------------------------------------------------------------------- 1. INTRODUCTION The focus of surveillance missions is to acquire and verify in- formation about enemy capabilities and positions of hostile targets. Such missions often involve a high element of risk for human personnel and require a high degree of stealthiest. Hence, the ability to deploy unmanned surveillance missions, by using wireless sensor networks, is of great practical importance for the military. Because of the energy constraints of sensor devices, such systems necessitate energy aware design to ensure the longevity of surveillance emissions. Solutions proposed recently for this type of system show promising result. However, the simplified assumptions they make about the system in the simulator often do not hold well in practice and energy consumption is narrowly accounted for within a single protocol. One of the key advantages of wireless Sensor networks (WSN) is their ability to bridge the gap between the physical and logical worlds, by gathering certain useful information from the physical world and communicating that Information to more powerful logical devices. If the ability of the WSN is suitably harnessed, it is envisioned that WSNs can reduce or eliminate the need for human involvement in information gathering in certain civilian and military applications. In the near future, sensor devices will be produced in large quantities at a very low cost and densely deployed to improve robustness and reliability. They can be miniaturized into a cubic millimeter package in order to be stealthy in a hostile environment. Cost and size considerations imply that the resources available to individual nodes are severely limited that limited processor band width hand memory are temporary constraints in sensor networks. They will disappear with fast developing fabrication techniques. The energy constraints on the other hand are more fundamental. According to R.A. Powers battery capacity only doubles in 35 years. Energy constraints are unlikely to be solved in the near future with the slow progress in battery capacity and energy scavenging. Moreover, the untended nature of sensor nodes and the hazardous sensing environment preclude manual battery replacement. For these reasons, energy awareness becomes the key research challenge for sensor network protocol design. 2. RELATED WORK A video sensor node in a wide area sensor network is a node capable of performing on-board video processing, and com- municating the information over a self-organizing and fault- tolerant wireless network. Commercial CCTV and PC-based surveillance systems are not suitable for wireless sensor net-
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 50 work surveillance application, and are orthogonal to our approach. In fact, the CCTV are not processing the data on line and are wired for power consumption, while PC-based and com mercial cameras rely on high power consumption, which is not suitable for the WSN. For this reason, this section does not re- view these kinds of solutions. Recently, several platforms and commercial cameras with similar goals have been developed within a sensor. We can classify these approaches in three categories: • Lowcost nodes with wired interface (e.g., commercial USB/LAN camera, or the node designed by Corely[12]; • Wireless nodes with significant power consumption • Application-specific single ultra-low power single chip solution Being wired, the nodes in the first category obviously do not satisfy the basic requirement of being wireless, thus usually these cameras send the data to a remote host to be processed, although novel commercial cameras have the possibility to do it on-board they still send the results by means of a wire. Instead, nodes in the second category consume roughly more power than a typical first generation wireless sensor node and for this reason they are not suitable for wireless sensor network which should work for several months. Finally, single-chip solutions have extremely low-power consumption, but they are neither programmable nor configurable in field. One important common point among current video wireless nodes belonging to the first and second category is that the digital signal processing sub- system is the main power bottleneck. This is due to the fact that the high data rate of CMOS image sensor imposes the selection of fast processors and memories with high power consumption. Hence, the main open challenge in this area is to synergistically develop algorithms and architectures for energy-efficient image processing without giving up the flexibility of in-field configuration. The academic literature provides more similar approaches in terms of low-power cameras and wireless sensor application. In sensor nodes equipped with PIR, acoustic and magnetic sensors have been deployed in order to achieve adjustable sensitivity, stealthiness and effectiveness in a distributed military surveillance applications. To balance privacy and security in surveillance applications, networks of infrared sensors (IR) and cameras are employed also in. Cameras are used in public areas while networks of IR detectors [14]are deployed in private areas. The system processes the data from IR sensors in order to detect an event of interest in the private area to identify the author by correlation with the images grabbed in the public area. Energy conservation through limiting the sensing to a small part of the network was also considered in. In, the activation pattern is swept across the network. Both schemes assume a simple topology and do not handle sensing holes due to the sleeping time of the sensors. In fact in this previous work the sleeping time is fixed and the sensor could sleep also when it is need have data acquisition. In, the activation pattern follows a user-defined path through the sensor network as a sentry. In, a sleep/wakeup strategy in solar-powered wireless sensor is presented. Our work incorporates many similar ideas to the ones mentioned above however in contrast to the other works we present a combination of video sensor with other low-cost and low- level sensors, which are used mainly for triggering the camera at the right time and not to promote a reduction of the system energy requirements. In fact the PIR sensor can be used as an ultra low power wake-up trigger to re- duce the power consumption when the video processing is not needed. Moreover, data from PIR sensors can be used from the application to understand when the best moment for starting an image acquisition occurs. This will bring both a reduction of false positives and a reduction of the number of frame being processed, thus also a reduction of power consumption. Finally, we equipped the node with a solar panel to recharge the batteries and achieve perpetual work. 3. SYSTEM ARCHITECTURE Fig 1 Camera sensor with PIR sensor, processing unit ATMEGA 328 microcontroller with SRAM Fig. 1 shows the smart camera structure. A smart camera is a camera that can do on-board processing instead of transmitting all video data to a central controller. The choice of a smart camera is motivated by the notably reduced power consumption required by processing on-board compared to a solution relying on transmitting raw data through a wireless interface. The wire- less smart camera consists of a camera sensor, an embedded processor (Atmega328 from STM), a CMOS video sensor (VS6624 from STM), a pyroelectric infrared sensor used as trigger and a wireless communication module, being supported through a suitable interface which can host either a ZigBee or Bluetooth compliant transceiver. The whole system is designed to achieve low power consumption. Each device provides a power saving mode to reduce consumption when not in use. The smart camera is connected to a host (central PC) to send alarms or relevant
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 51 image content; moreover it can receive wireless messages from the host so as to modify its settings was very easy to implement .the transformation is made by using Zigbee or other latest technology. 3.1. Processing Core Choosing the suitable target hardware for a smart camera processor is an important issue. Due to the very large amount of data involved in image processing and computer vision tasks and the aforementioned constraints on power consumption, we have chosen The high-performance Atmel 8-bitAVRRISC-based micro controller combines 32 KB ISP flash memory with read-while-write capabilities, 1 KB EEPROM, 2 KB SRAM, 23 general purpose I/O lines, 32 general purpose working registers, three flexible timer/counters with compare modes, internal and external interrupts, serial programmable [21]USART, a byte-oriented 2-wire serial interface, SPI serial port, 6-channel 10-bit A/D converter (8-channels in TQFP and QFN/MLF packages), programmable watchdog timer with internal oscillator, and five software selectable power saving modes. The device operates between 1.8-5.5 volts. By executing powerful instructions in a single clock cycle, the device achieves throughputs approaching 1 MIPS per MHz, balancing power consumption. 3.2. CMOS Image Sensor To achieve low power consumption we chose the VS6624 CMOS imager from STMicroelectronics as the video device. The image sensor provides full SXGA (1280 1024) resolution at 15 frames per second, or VGA (640 480) resolution at 30 frames per second. A very important feature is the power consumption, which is just 120 mW when active (2.8 V and 12 MHz frequency), while it goes down to 23 mW when it switches to standby. The CMOS camera can be programmed and controlled via internal registers using I C serial interface. It supports several output formats, however most video processing algorithms use grayscale image, thus we adopt 8-bit grayscale images with YCbCr 4:0:0 formats. Although it supports SXGA resolution, due to limited size of the internal SRAM only little parts of the images can be processed, typically 160 120 pixels, but the node can use external RAM extending the memory capability. This resolution is enough to perform our image processing algorithm, and to save time and energy for storing and processing data. 3.3. Pyroelectric Infrared Senor Pyroelectric devices, such as the PIR sensor, have +ve elements made of a crystalline material that generates an electric charge when exposed to infrared radiation. The changes in the amount of infrared striking the element change the voltages generated, which are measured by an on-board amplifier. The device contains a special filter called a Fresnel lens, which focuses the infrared signals onto the element. As the ambient infrared signals change rapidly, the on-board amplifier trips the output to indicate motion.[17] Fig 2 A SN PIR Infrared sensor (Passive Infrared Sensor) Table -1: Recommended operating condition Parameter Symbol Rating Unit Operating Power supply Vcc +4.5V - 5.5 V V Operating Temperature T -15 degCelcius ̊C 3.4. Wireless Transceiver Analog wireless is the transmission of audio and video signals using radio frequencies. Typically, analog wireless has a transmission range of around 300 feet (91 meters) in open space; walls, doors, and furniture will reduce this range. Analog wireless is found in three frequencies: 900 MHz, 2.4 GHz, and 5.8 GHz. Currently, the majority of wireless security cameras operate on the 2.4 GHz frequency. Most household routers, cordless phones, video game controllers, and microwaves operate on the 2.4 GHz frequency and may cause interference with your wireless security camera. 900 MHz is known as Wi-Fi Friendly because it will not interfere with the Internet signal of your wireless network. The advantage of transceiver is multiple receivers per camera: the signal from one camera can be picked up by any receiver; you can have multiple receivers in various locations to create your wireless surveillance network. 3.5. Energy Harvesting Unit Solar power is the conversion of sunlight into electricity, either directly using photo voltaics (PV), or indirectly using concentrated solar power (CSP). Concentrated solar power systems use lenses or mirrors and tracking systems to focus a large area of sunlight into a small beam. Photo voltaics
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 52 convert light into electric current using the photoelectric effect. Photo voltaics were initially, and still are, used to power small and medium-sized applications, from the calculator powered by a single solar cell to off-grid homes powered by a photovoltaic array. They are an important and relatively inexpensive source of electrical energy where grid power is inconvenient, unreasonably expensive to connect, or simply unavailable. A charge controller, charge regulator or battery regulator limits the rate at which electric current is added to or drawn from electric batteries. It prevents overcharging and may prevent against overvoltage, which can reduce battery performance or lifespan, and may pose a safety risk. It may also prevent completely draining ("deep discharging") a battery, or perform controlled discharges, depending on the battery technology, to protect battery life. The terms "charge controller" or "charge regulator" may refer to either a stand- alone device, or to control circuitry integrated within a battery pack, battery-powered device, or battery recharger. Charge controllers are sold to consumers as separate devices, often in conjunction with solar or wind power generators, for uses such as RV, boat, and off-the-grid home battery storage systems In solar applications, charge controllers may also be called solar regulators. Some charge controllers/solar regulators have additional features, such as a low voltage disconnects, a separate circuit which powers down the load when the batteries become overly discharged. Lithium-ion batteries are common in consumer electronics. They are one of the most popular types of rechargeable battery for portable electronics, with one of the best energy densities, no memory effect and only a slow loss of charge when not in use. Beyond consumer electronics, LIBs are also growing in popularity for military, electric vehicle and aerospace applications. Handheld electronics mostly use LIBs based on lithium cobalt oxide (LiCoO2), which offers high energy density, but presents safety risks, especially when damaged. Fig 3 Characteristic of the photovoltaic module Table -2: Characteristics of solar cell 4. VIDEO ANALYSIS ALGORITHM In the field of computer vision, blob detection refers to mathematical methods that are aimed at detecting regions in a digital image that differ in properties, such as brightness or color, compared to areas surrounding those regions. There are two main classes of blob detectors: (i) differential methods are based on derivatives of the function with respect to position, and (ii) methods based on local extreme are based on finding the local maxima and minima of the function. Another common use of blob descriptors is as main primitives for texture analysis and texture recognition.[23] The contours of an object in an image are determined by calculating the gradient magnitude of each pixel in the image. The stronger the intensity transition, the greater the magnitude will be. The gradient magnitude is calculated at each pixel position from the image's first derivatives. It is defined as: Gradiant magnitude = Where: ‫׀‬x and ‫׀‬y = the X and Y derivative values, respectively They define the components of the gradient vector as: Gradiant vector = An edge element (edge) is located at the maximum value of the gradient magnitude over adjacent pixels in the direction defined by the gradient vector. The gradient direction is the direction of the steepest ascent at an edge in the image while the gradient magnitude is the steepness of that ascent.[6][7]. The gradient direction also is perpendicular to the object contour. Well-defined contours are extracted from strong and sharp intensity transitions. A strong contrast between the objects and their background improves the edge detector's robustness and location accuracy.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 53 Fig 4 Flow diagram of the proposed video analysis algorithm 5. EXPERIMENTAL RESULT 5.1. Video Analysis Evaluation Experiment concerns an indoor setup aimed at monitoring a sector of a hallway in a building. The camera was placed a few meters away from the wall and switched on. In order to achieve the best performance, the camera has to be firmly attached to the wall or placed over a vibration-free surface [24]. In fact, although the camera is mounted on a mobile device, the image processing algorithm assumes the presence of a static camera. Meanwhile several real abandoned/removed object instances were generated. The processed images were sent directly to a host PC via Bluetooth. We have analyzed three continuous footages where, each time the camera was switched on by the PIR sensor, the cur- rent frame was processed by the proposed algorithm. We have collected a total of 64 frames, with each frame containing at times even multiple abandoned/removed objects, for a total of 78 abandoned/removed objects. Also, a subset of frames does not contain any case of object removal/abandon. As for the background subtraction algorithm, out of 78 ROIs, 77 ROIs have been correctly detected by the algorithm, yielding only one false negative and four false positives, for a correct segmentation rate of 98.7%. These 77 ROIs, fed to the classification stage, were then correctly classified in 73 cases as abandoned/removed object, yielding to a correct classification rate of 94.8%. Fig.5 reports some qualitative examples of correct segmentation and classification yielded by the proposed algorithm on the dataset of Experiment 1. In the figure, seven examples are reported (indicated by letters a–f), where for each example the two frames and the final output of the algorithm are shown. As for the output, each detected ROI is indicated by a white bounding box, while the classification result is encoded as a symbol shown inside each detected bounding box: the ― ‖ symbol stands for abandoned object (as if it is added to the scene) while the ― ‖ symbol stands for removed object (as if it is subtracted from the scene). As it can be seen from the figure, the proposed algorithm is able to achieve correct segmentation and classification also in presence of very small, partially trans- parent objects (cases e and f) and with multiple ROIs (cases a-f). In Experiment 2, we present a qualitative evaluation of the proposed algorithm in an outdoor environment under sunny conditions, which concerns specifically the case of monitoring a wall from undesired events such as graffiti, stealing or unauthorized poststicking. In this case the distance from the wall was around 5 m in the case (a–c) Figs.6 m in (d) our system has been tested against events such as graffiti (case a), wall affixtures (case b), object removal [case c and Fig. 10(d)]. Finally a situation where only illumination changes occur in the scene is shown in Fig. 9(d) In this test the camera was left at 1000 in morning and the video processing were performed 2 h later with different light. As it can be seen, our algorithm is capable of robustly handling all the aforementioned cases, yielding correct classification also when the object ROI is particularly small (e.g., case c of both figures and d Fig. 10, and with each single writings appearing in the graffiti situation concerning case a) and despite the nonoptimal illumination conditions. Fig 5 segmentation and classification examples yielded by the pro- posed algorithm
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 54 Fig 6 Performance of the proposed video analysis algorithm in different out- door circumstances: (a), object abandon (b), object removal (c), illumination change (d). 5.2. Power Consumption Analysis Table IV shows the power consumption of our prototype. The table shows how the power consumption of the whole system in sleep mode is more than 10 times less than that in normal mode. We estimated that the average time to elaborate one abandoned/ removed object event is about 3 s from the moment when the detection starts. Moreover, the amount of time required for blob analysis depends on the number and size of the detected ROIs. Hence, it will be zero if the system does not detect any blob and about 100 ms for three ROIs sized 16 pixels. To evaluate the benefits provided by our approach in terms of improvement of battery life we consider the same system without PIR sensor. More specifically, we com- pare the two approaches assuming different amounts of random events (i.e., 50, 100, 300 events per hour) and by estimating the lifetime of the three scenarios using a full 2000 mAh bat- tery. In the first simulation the PIR sensor is disconnected and the system does not know when to switch off/on the camera or when to turn into sleep mode, so it will work continuously and the power consumption will be independent from the number of events. Then, in our approach, and as previously mentioned, the PIR sensor detects events and wakes up the microcontroller which waits until the FOV is empty to start the video analysis. When the video analysis is over the microcontroller turns the camera off to reduce power consumption. Table -3: Power consumption of the video sensor node Using the solar panel to harvest the energy, we can obtain an additional improvement of battery life, achieving perpetual working in an application scenario with 50 events per hour. A simulation verifying the performance of the proposed system is depicted in Fig. 7, where the energy harnessed from the solar cell powers the sensor node and recharges the battery with the exceeding events. In our simulations we assume a rate of 50 events per hour representing people walking within the field of view of the video node. Furthermore we measured the energy intake from the energy harvester and the solar light intensity during five days (Fig.8). All the information was stored in files used as input to our simulations. Finally the energy level of the battery at the beginning of the simulation is half its full capacity (2000 mAh, expressed in Joules). This simulation shows how the system can work perpetually with a small PV panel. The node without the energy harvester stops working after approximately 40 h, as it can be seen from Fig. 7. Instead, the node with the harvester can recharge its battery during the day, the energy accumulated in the battery being sufficient to keep the node on during the night.
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 55 Fig 7 Simulation of our system with and without PV harvester (50 events/h) Fig 8 energy harvested during five consecutive days from our PV panel 6. COCLUSIONS Proposed method utilizes the efficient energy harvesting methodology for increasing the charged battery life. The Codes written in the Arduino board helps in significant controlled discharge of battery during the surveillance and efficient charging from environment. The use of MATLAB subsequently gives a better environment for image processing and blob analysis. The present algorithm can be enhanced by smart optimization techniques. In this work, a self-powered wireless smart camera for run time video processing has been presented. The proposed approach have shown that combing advanced hardware/software solutions makes possible high accuracy and perpetual work in video processing on wireless sensor network where smart cam- eras find the most critical constrain in the power consumption. In fact, energy harvesters provide energy to replenish the batteries, while the combined use of different sensors with heterogeneous features allows for a remarkable reduction of the overall power consumption. We designed the camera for real time video processing algorithm and an ad-hoc abandoned/re- moved object using PIR features. Data were presented to evaluate the performance of our approach in term of energy consumption, video processing application and accuracy. The experimental results showed the versatility of the application in indoor and outdoor scenario and the simulation showed the perpetual work was achieved in simulation outdoor scenario. Future work will include a complete campaign of new experiments in order to analyze better the issue of background changes and more challenging condition (i.e., direct sun light, shadows). Moreover they will be directed towards improving the hardware of the smart camera node, video processing algorithm, and distributed intelligence. REFERENCES [1]. W. Chan, J. Chang, T. Chen, Y. Tseng, and S. Chien, ―Efficient content analysis engine for visual surveillance network,‖ Trans. Circuits Syst. Video Technol., vol. 19, no. 5, pp. 693–703, 2009. [2]. M. Magno, D. Brunelli, P. Zappi, and L. Benini, ―A solar-powered video sensor node for energy efficient multimodal surveillance,‖ in Eu- romicro Conf. Digital System Design, 2008, pp. 512–519. [3]. A. S. Weddell, M. Magno, G. V. Merrett, D. Brunelli, B. M.Al-Hashimi, and L. Benini, ―A survey of multi-source energy har- vesting systems,‖ in Design, Automat. Test Eur. Conf. Exhibit., Mar.18–22, 2013, pp. 905–910. [4]. S. Lu, J. Zhang, and D. Feng, ―A knowledge-based approach for de- tecting unattended packages in surveillance video,‖ in Proc. IEEE Int. Conf. Adv. Video Signal Based Surveill. (AVSS 06), Nov. 2006, p. 110. [5]. T. Semertzidis, K. Dimitropoulos, A. Koutsia, and N. Grammalidis, [17] M. Magno, F. Tombari, D. Brunelli, L. Di Stefano, and L. Benini, ―Multi-modal video surveillance aided by pyroelectric infrared sensors,‖ in Proc. ECCV Workshop Multi-Camera Multi-Modal Sensor Fusion, Algor. Appl., 2008, pp. 1–12. [6]. S. Lim and L. Davis, A one-threshold algorithm for detecting abandoned packages under severe occlusions using a single camera CS Dept., Univ. Maryland, Tech. Rep. CS- TR-4784, 2006. [7]. S. Ferrando, G. Gera, and C. Regazzoni, ―Classification of unattended and stolen objects in video-surveillance system,‖ in Proc. IEEE Int. Conf. Adv. Video Signal Based Surveill., Nov. 2006, p. 21. [8]. J. San Miguel and J. Martnez, ―Robust unattended and stolen object detection by fusing simple algorithms,‖ in Proc. IEEE Int. Conf. Adv. Video Signal Based Surveill., Sep. 2008, pp. 18–25. [9]. M. Bhargava, C. Chen, M. Ryoo, and J. Aggarwal, ―Detection of abandoned objects in crowded environments,‖ in Proc. IEEE Conf. Adv. Video Signal Based Surveill., Sep. 2007, pp. 271–276. [10]. F. Porikli, Y. Ivanov, and T. Haga, ―Robust abandoned object detection using dual foregrounds,‖ EURASIP J. Adv.
  • 8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 02 | Mar-2014 | ETCAN-2-14, Available @ http://www.ijret.org 56 Signal Process., vol. 2008, no. 1, Jan. 2008. [11]. M. Spengler and B. Schiele, ―Automatic detection and tracking of abandoned objects,‖ in Proc. IEEE Int. Workshop Vis. Surveill. Performance Eval. Track. Surveill. 2003. [12]. Y. E. A. Tian, ―Robust and efficient foreground analysis for real-time video surveillance,‖ in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., 2005, pp. 1182–1187. [13]. P. Spagnolo, A. Caroppo, M. Leo, T. Martifiggiano, and T. D’orazio, ―An abandoned/removed objects detection algorithm and its evaluation on PETs datasets,‖ in Proc. IEEE Conf. Adv. Video Signal Based Surveill., Nov. 2006, p. 17. [14]. M. Beynon, D. Van Hook, M. Seibert, A. Peacock, and D. Dudgeon, ―Detecting abandoned packages in a multi- camera video surveillance system,‖ in Proc. IEEE Conf. Adv. Video Signal Based Surveill., Jul.2003, pp. 221–228. [15]. C. Sacchi and C. Regazzoni, ―A distributed surveillance system for detection of abandoned objects in unmanned railway environments,‖ IEEE Trans. Veh. Technol., vol. 49, no. 5, pp. 2013–2026, 2000 [16]. N. Bird, S. Atev, N. Caramelli, R. Martin, O. Masoud, and N. Pa- panikolopoulos, ―Real time, online detection of abandoned objects in public areas,‖ in Proc. IEEE Conf. Robot. Automat. 2006, pp.3775–3780 [17]. ―Video sensor network for real-time traffic monitoring and surveillance,‖ IET Intell. Transport Syst., vol. 4, no. 2, pp. 103–112, Jun.2010. [18]. D. Carli, D. Brunelli, D. D. Bertozzi, and L. Benini, ―A high-efficiency wind-flow energy harvester using micro turbine,‖ in SPEEDA2010—Int. Symp. Power Electron. Electr Drives, Automat Motion, 2010, pp. 778–783 [19]. C. Moser, D. Brunelli, L. Thiele, and L. Benini, ―Real- time scheduling with regenerative energy,‖ in Euromicro Conf. Real-Time Syst., 2006, pp. 261–270. [20]. C. Moser, L. Thiele, D. Brunelli, and L. Benini, ―Robust and low com- plexity rate control for solar powered sensors,‖ in Proceedings -Design, Automation and Test in Europe, DATE, 2008, pp. 230–235. [21]. P. de la Hamette et al., ―Architecture and applications of the finger- mouse: A smart stereo camera for wearable computing HCI,‖ Personal Ubiquitous Comput., vol. 12, no. 2, pp. 97–110, 2008. [22] D. Corley and E. Jovanov, ―A low power intelligent video-processing sensor,‖ in Proc. 34th Southeastern Symp. System Theory, 2002, pp.176–178 [23] D. Li, Y. Jiang, and G. Chen, ―A low cost embedded color vision system based on SX52,‖ in Proc. IEEE Int. Conf. Inf. Acquisit., Aug.2006, pp. 883–887. [24]. G. Zhang, T. Yang, S. Gregori, J. Liu, and F. Maloberti, ―Ultra-low power motion-triggered image sensor for distributed wireless sensor network,‖ in Proc. IEEE Sensors, Oct. 2003, vol. 2, pp. 1141–1146. [25]. W.-C. Feng, B. Code, E. Kaiser, M. Shea, W.-C. Feng, and L. Bavoil, ―Panoptes: Scalable low-power video sensor networking technologies,‖ in MULTIMEDIA’03: Proc. 11th ACM Int. Conf. Multimedia, New York, 2003, pp. 562–571. [26]. L. Ferrigno and A. Pietrosanto, ―A low cost visual sensor node for bluetooth based measurement networks,‖ in Proc. 21st IEEE Instrum. Meas. Technol. Conf., 2004, vol. 2, pp. 895–900. [27]. P. Garda, O. Romain, B. Granado, A. Pinna, D. Faura, and K. Hachicha, ―Architecture of an intelligent beacon for wireless sensor networks,‖ in Proc. IEEE 13th Workshop Neural Netw. Signal Process. 2003, pp. 151–158.