1 |
Jun-Horng Chen, Teng-Hui Tseng, Chin-Lun Lai, and Sheng-Ta Hsieh, “An intelligent virtual fence security system for the detection of people invading,” Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference, pp786-791, 2012.
|
2 |
Javier Barandiaran, Berta Murguia, Fernando Boto, “Real-Time People Counting Using Multiple Lines”, Image Analysis for Multimedia Interactive Services, 2008. WIAMIS '08. Ninth International Workshop. pp159-162. 2008.
|
3 |
Zulaikha Kadim, Liang Kim Meng, Norshuhada Samudin, “Video Analytics Algorithm For Detecting Objects Crossing Lines In Specific Direction Using Blob-Based Analysis”, Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, pp306-312, 2012.
|
4 |
Donald Hearn and M. Pauline Baker, Computer Graphics, 2nd ed, Prentice-Hall Inc, 1997.
|
5 |
ttk448, cubic spline interpolation in C++ [Internet], Available: http://kluge.in-chemnitz.de/opensource/spline/
|
6 |
Young Im Ch o, Sung Soon Jang, “Implementation of Intelligent Speech Recognition System according to CCTV Emergency Information”, JIIC, Vol. 19, No. 3 pp 415-420, 2009.
|
7 |
Miwa Takai, “Measurement of complex quantity of monitoring area and detection of high active part of invading object in complex background for suveillance camera system”, Mechatronics (ICM), 2015 IEEE International Conference, pp522-528, 2015.
|