{"title":"基于视觉的模糊8051监控系统设计","authors":"Hsuan-Ming Feng, Chih-Yung Chen, Chia-Yun Wu","doi":"10.1109/ICPADS.2007.4447784","DOIUrl":null,"url":null,"abstract":"This paper proposes a vision-based fuzzy 8051 surveillance system which emphasizes on designing the image processing function to detect the invaded states and the 8051 fuzzy servomotors controller to track the invader region. The techniques include discrete wavelet transformation (DWT) image data reducing, edge detection, motion detection, and fuzzy servomotor control. In this paper, image processing techniques are used for invader detection. Using a two-axis camera mount controlled by fuzzy controller, this system could make the camera exactly keeping the invader object on the center of scene. Also, the proposed tracking system has high potential in the guard of security management, the transaction authentication, the residential monitoring.","PeriodicalId":281075,"journal":{"name":"International Conference on Parallel and Distributed Systems","volume":"123 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Vision-based fuzzy 8051 surveillance systems design\",\"authors\":\"Hsuan-Ming Feng, Chih-Yung Chen, Chia-Yun Wu\",\"doi\":\"10.1109/ICPADS.2007.4447784\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper proposes a vision-based fuzzy 8051 surveillance system which emphasizes on designing the image processing function to detect the invaded states and the 8051 fuzzy servomotors controller to track the invader region. The techniques include discrete wavelet transformation (DWT) image data reducing, edge detection, motion detection, and fuzzy servomotor control. In this paper, image processing techniques are used for invader detection. Using a two-axis camera mount controlled by fuzzy controller, this system could make the camera exactly keeping the invader object on the center of scene. Also, the proposed tracking system has high potential in the guard of security management, the transaction authentication, the residential monitoring.\",\"PeriodicalId\":281075,\"journal\":{\"name\":\"International Conference on Parallel and Distributed Systems\",\"volume\":\"123 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Parallel and Distributed Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPADS.2007.4447784\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Parallel and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPADS.2007.4447784","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Vision-based fuzzy 8051 surveillance systems design
This paper proposes a vision-based fuzzy 8051 surveillance system which emphasizes on designing the image processing function to detect the invaded states and the 8051 fuzzy servomotors controller to track the invader region. The techniques include discrete wavelet transformation (DWT) image data reducing, edge detection, motion detection, and fuzzy servomotor control. In this paper, image processing techniques are used for invader detection. Using a two-axis camera mount controlled by fuzzy controller, this system could make the camera exactly keeping the invader object on the center of scene. Also, the proposed tracking system has high potential in the guard of security management, the transaction authentication, the residential monitoring.