Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Yuan-Kai | en_US |
dc.contributor.author | Wang, Li-Ya | en_US |
dc.contributor.author | Hu, Yung-Hsiang | en_US |
dc.date.accessioned | 2014-12-16T06:15:54Z | - |
dc.date.available | 2014-12-16T06:15:54Z | - |
dc.date.issued | 2008-10-16 | en_US |
dc.identifier.govdoc | H04N007/18 | zh_TW |
dc.identifier.uri | http://hdl.handle.net/11536/105567 | - |
dc.description.abstract | System and method of intelligent surveillance and analysis mainly used for monitoring whether a field has an intrusion object (such as a thief), and instantly providing video or image of the suspected intruder to approved relevant individual (such as the house owner) for further confirmation of the presence of the intrusion object (such as thief); therefore, the wrongful determination by the computer is avoided. The aforementioned system includes, first the determination and extraction of the contour of the suspected intrusion object, then the continuous tracking of the suspected intrusion object according to the contour, continue capturing of images using the camera, and then storing these captured video temporarily, and finally notifying the house owner using the highest definition image of the video which occupies a lesser amount of bandwidth through various communication channels once the presence of thief is determined; the video is downloaded using higher bandwidth, and is played. | zh_TW |
dc.language.iso | zh_TW | en_US |
dc.title | System And Method Of Intelligent Surveillance And Analysis | zh_TW |
dc.type | Patents | en_US |
dc.citation.patentcountry | USA | zh_TW |
dc.citation.patentnumber | 20080252722 | zh_TW |
Appears in Collections: | Patents |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.