Open Access   Article Go Back

Person Re-Identification Using MTMCML and Graph Based Method

T.Thangaponnu 1 , V.Geetha 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-8 , Page no. 160-167, Aug-2015

Online published on Aug 31, 2015

Copyright © T.Thangaponnu , V.Geetha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T.Thangaponnu , V.Geetha, “Person Re-Identification Using MTMCML and Graph Based Method,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.160-167, 2015.

MLA Style Citation: T.Thangaponnu , V.Geetha "Person Re-Identification Using MTMCML and Graph Based Method." International Journal of Computer Sciences and Engineering 3.8 (2015): 160-167.

APA Style Citation: T.Thangaponnu , V.Geetha, (2015). Person Re-Identification Using MTMCML and Graph Based Method. International Journal of Computer Sciences and Engineering, 3(8), 160-167.

BibTex Style Citation:
@article{_2015,
author = {T.Thangaponnu , V.Geetha},
title = {Person Re-Identification Using MTMCML and Graph Based Method},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {160-167},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=628},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=628
TI - Person Re-Identification Using MTMCML and Graph Based Method
T2 - International Journal of Computer Sciences and Engineering
AU - T.Thangaponnu , V.Geetha
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 160-167
IS - 8
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2514 2291 downloads 2397 downloads
  
  
           

Abstract

Human eyes can recognize person ID substances based on some little not capable regions. However, such value capable not capable data is regularly covered up at the point when registering similarities of pictures with existing approaches. Moreover, numerous existing approaches learn discriminative highlights and handle drastic perspective change in an administered way and require labeling new preparing data fat that point again a diverse pair of camera views. In this paper, we proposture a novel perspective fat that point again per-child re-distinguishing proof based on administered striking nature learning. Distinctive highlights are separated without needing element names in the preparing procedure. First, we apply nearness obliged patch coordinating to assemble thick correspondence between picture pairs, which shows effective-ness in taking care of misalignment caused by huge perspective and posture variations. Second, we learn human striking nature in an administered manner. To make strides the execution of person re-identification, human striking nature is incorporated in patch coordinating to find re capable and discriminative coordinated patches. The adequacy of our approach is validated on the generally used Snake dataset and ETHZ dataset.

Key-Words / Index Term

Area Privacy, Area Based Administrations (LBSs), Security

References

[1] I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.
[2] I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[3] M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.
[4] N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[5] S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[6] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[7] Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265.