Flame and smoke detection method for early real-time detection of a tunnel fire Adviser: Yu-Chiang Li Speaker: Wei-Cheng Wu Date: 2009/09/23 Fire Safety.

Slides:



Advertisements
Similar presentations
1 A robust detection algorithm for copy- move forgery in digital images Source: Forensic Science International, Volume 214, Issues 1–3, 10 January 2012.
Advertisements

Department of Electrical and Electronic Engineering, The University of Hong Kong, Pokfulam Road, Hong Kong Three-dimensional curve reconstruction from.
A Robust Pedestrian Detection Approach Based on Shapelet Feature and Haar Detector Ensembles Wentao Yao, Zhidong Deng TSINGHUA SCIENCE AND TECHNOLOGY ISSNl.
HYBRID SIMULATED ANNEALING AND DIRECT SEARCH METHOD FOR NONLINEAR UNCONSTRAINED GLOBAL OPTIMIZATION Abdel-Rahman Hedar and Masao Fukushima Speaker : UFO.
A Survey of Real-time Soft Shadows Algorithms Speaker: Alvin Date: 2003/7/23 EUROGRAPHICS 2003 J.-M. Hasenfratz, M. Lapierre, N. Holzschuch and F.X. Sillion.
Binary Image Compression Using Efficient Partitioning into Rectangular Regions IEEE Transactions on Communications Sherif A.Mohamed and Moustafa M. Fahmy.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Tracking a moving object with real-time obstacle avoidance Chung-Hao Chen, Chang Cheng, David Page, Andreas Koschan and Mongi Abidi Imaging, Robotics and.
Guidelines for Term Paper Cultural Geography Spring 2011.
Region-Level Motion- Based Background Modeling and Subtraction Using MRFs Shih-Shinh Huang Li-Chen Fu Pei-Yung Hsiao 2007 IEEE.
Fast vector quantization image coding by mean value predictive algorithm Authors: Yung-Gi Wu, Kuo-Lun Fan Source: Journal of Electronic Imaging 13(2),
南台科技大學 資訊工程系 Posture Monitoring System for Context Awareness in Mobile Computing Authors: Jonghun Baek and Byoung-Ju Yun Adviser: Yu-Chiang Li Speaker:
A Personalized Recommender System Based on Users’ Information In Folksonomies Date: 2013/12/18 Author: Mohamed Nader Jelassi, Sadok Ben Yahia, Engelbert.
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
Colored Watermarking Technology Based on Visual Cryptography Author: Hsien-Chu Wu, Chwei-Shyong Tsai, Shu-Chuan Huang Speaker: Shu-Chuan Huang Date: May.
南台科技大學 資訊工程系 A web page usage prediction scheme using sequence indexing and clustering techniques Adviser: Yu-Chiang Li Speaker: Gung-Shian Lin Date:2010/10/15.
Title Line Subtitle Line Date / Student Example photos.
Technical paper writing for journal and conference submission III Zhen Jiang Department of Computer Science Information Security Center West Chester University.
A Collaborative Cloud-Based Multimedia Sharing Platform for Social Networking Environments Speaker : Chang,Kun-Hsiang /11/$26.00 ©2011.
Author : Williams, T.G. Taylor, C.J. Waterton, J.C. Holmes, A Source : Macro to Nano, 2004.IEEE International Symposium on Macro to Nano, 2004.IEEE International.
A New Approach to Image Authentication Using Chaotic Map and Sudoku Puzzle 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia.
1 An Efficient VQ-based Data Hiding Scheme Using Voronoi Clustering Authors:Ming-Ni Wu, Puu-An Juang, and Yu-Chiang Li.
Bo QIN, Zongshun MA, Zhenghua FANG, Shengke WANG Computer-Aided Design and Computer Graphics, th IEEE International Conference on, p Presenter.
3D Digital Cleansing Using Segmentation Rays Authors: Sarang Lakare, Ming Wan, Mie Sato and Arie Kaufman Source: In Proceedings of the IEEE Visualization.
Interactive Sand Art Drawing Using RGB-D Sensor
Application of neural network to analyses of CCD colour TV-camera image for the detection of car fires in expressway tunnels Speaker: Wu Wei-Cheng Date:
Fingertip Detection with Morphology and Geometric Calculation Dung Duc Nguyen ; Thien Cong Pham ; Jae Wook Jeon Intelligent Robots and Systems, IEEE/RSJ.
Palette Partition Based Data Hiding for Color Images Yu-Chiang Li, Piyu Tsai, Chih-Hung Lin, Hsiu-Lien Yeh, and Chien-Ting Huang Speaker : Yu-Chiang Li.
1 Developing a 2.5-D video avatar Tamagawa, K.; Yamada, T.; Ogi, T.; Hirose, M.; Signal Processing Magazine, IEEE Volume 18, Issue 3, May 2001 Page(s):35.
Design Issues of Prefetching Strategies for Heterogeneous Software DSM Author :Ssu-Hsuan Lu, Chien-Lung Chou, Kuang-Jui Wang, Hsiao-Hsi Wang, and Kuan-Ching.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
A Recognition Method of Restricted Hand Shapes in Still Image and Moving Image Hand Shapes in Still Image and Moving Image as a Man-Machine Interface Speaker.
CSSE463: Image Recognition Day 25 Today: introduction to object recognition: template matching Today: introduction to object recognition: template matching.
1 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Adviser: Chih-Hung Lin Speaker : Chia-Wei Chang Date:2009/10/06.
Fire detection based on vision sensor and support vector machines Adviser: Li Yu-Chiang Speaker: Wu Wei-Cheng Date: 2009/03/10 Fire Safety Journal, Volume.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
Multi-objective evolutionary generation of mamdani fuzzy rule-based systems based on rule and condition selection International Workshop On Genetic And.
Copyright © 2011, Quality-Driven Cross-Layer Optimized Video Delivery over LTE IEEE Communications Magazine, FEB 2010 Speaker: 劉姿瑾 Date: 25,
1 A latent information function to extend domain attributes to improve the accuracy of small-data-set forecasting Reporter : Zhao-Wei Luo Che-Jung Chang,Der-Chiang.
Low False Reject Rate and False Accept Rate Multi-step Fire Detection Method Zhu, Xingjie; Xu, Yong; Chen, Huaiyou; Liu, Yan; Wen, Jiajun; Zhu, Qi Optik.
Zhaoxia Fu, Yan Han Measurement Volume 45, Issue 4, May 2012, Pages 650–655 Reporter: Jing-Siang, Chen.
Watermarking Scheme Capable of Resisting Sensitivity Attack
[Journal, Year, Volume, Pages]
Source: The Journal of Systems and Software, Volume 67, Issue 2, pp ,
A class of binary images thinning using two PCNNs
Face recognition using improved local texture pattern
Image camouflage by reversible image transformation
Source : Signal Processing, Volume 133, April 2017, Pages
Affiliation of presenter
A weight-incorporated similarity-based clustering ensemble method based on swarm intelligence Yue Ming NJIT#:
Source :Journal of visual Communication and Image Representation
Author(s). TITLE, Journal, vol. #, pp.#-#, Month, Year.
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Speaker: YI-JIA HUANG Date: 2011/12/08 Authors: C. N
Fuzzy Color Histogram and Its Use in Color Image retrieval
Research Paper Overview.
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
A new chaotic algorithm for image encryption
Efficient Huffman Decoding
Source: Pattern Recognition Letters 29 (2008)
Color image noise removal algorithm utilizing hybrid vector filtering
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Novel Multiple Spatial Watermarking Technique in Color Images
Reverse Seam Carving 2011 Sixth International conference on Image and Graphics Gang Pan, Weishu Li, Wei Bai, Jinyan Chen, and Luyuan Li Speaker: Hon-Hang.
Source: IEEE Transactions on Circuits and Systems,
Information Protection and Recovery with Reversible Data Hiding
An imperceptible spatial domain color image watermarking scheme
Morphological segmentation of yeast by image analysis
Predictive Grayscale Image Coding Scheme Using VQ and BTC
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

Flame and smoke detection method for early real-time detection of a tunnel fire Adviser: Yu-Chiang Li Speaker: Wei-Cheng Wu Date: 2009/09/23 Fire Safety Journal, Volume 44, Issue 3, April 2009, Pages Dongil Han, Byoungmoo Lee 1

Outline Introduction Flame and smoke detection algorithm Experimental results Conclusions 2

1. Introduction   This paper presents an image-processing technique for automatic real-time flame and smoke detection in a tunnel environment.   This paper describes the use of images obtained in a tunnel to produce a rapid and early fire detection algorithm.   Proposes two algorithms that complement each other to solve the problems mentioned above. 3

2. Flame and smoke detection algorithm 4  Flame Detection Algorithm (FDA)  Smoke Detection Algorithm (SDA)

2. Flame and smoke detection algorithm 5

6

7

8

9

10

11

12

13

3. Experimental results 14

15

16

17

18

19

20

4. Conclusions  The experimental results showed that the proposed method detects the flame and smoke region exactly and indicated good performance of the proposed method.  The proposed method is simple and adequate for a tunnel environment. 21