Main Article Content
For autonomous driving, moving objects like vehicles and pedestrians are of critical importance as they primarily influence the maneuvering and braking of the car. Typically, they are detected by motion segmentation of tensor optical flow augmented by a SSD based object detector for capturing semantics. In this project, our aim is to jointly model motion and appearance cues in a single short detector. We propose a novel two-stream architecture for joint learning of object detection and motion segmentation. We designed three different flavors of our network to establish systematic comparison. It is shown that the joint training of tasks significantly improves accuracy compared to training them independently. Although motion segmentation has relatively fewer data than vehicle detection. The shared fusion encoder benefits from the joint training to learn a generalized representation. We created our own publicly available dataset that contains some frame sets that is passed through the tensor flow object to algorithm model. As compare with the pervious algorithm the confidence level and prediction level increases the map score up to 20.2%. We also evaluated our algorithm on the non-automotive DAVIS or motion dataset and obtained accuracy close to the state-of-the-art performance.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Aakash Negandhi, Soham Gawas, Prem Bhatt , Priya Porwal Detect Online Spread of Terrorism Using Data Mining.IOSR Journal of Engineering Volume 13,17 April 2019. So here they propose an efficient web data mining system to detect such web properties and flag them automatically for human review. Keywords: Anti-Terrorism, Data Mining, Online, Terrorism,World
Avishag Gordon The spread of terrorism publications: A database analysis,Terrorism and Political Violence journal publishedin Dec 2007.This research note focuses on the spread of terrorism publications from 1988 to 1995 compared to their frequency of appearance from 1996 to 1998. It also identifies the core journals of this research field.
A.Sai Hanuman, G.Charles Babu , P.Vara Prasad Rao, P.S.V.Srinivasa Rao ,B.Sankara Babu A Schematic Approach on Web Data Mining In Online Spread Detection of Terrorism,International Journal of Recent Technology and Engineering Volume-8, Issue-1, May 2019.So here they have propose a compelling web data mining structure to recognize such web properties and standard them thusly for human review. Index Terms: web data mining, terrorism, web structure mining, dread monger affiliations.
Counter Terrorism on Online Social Networks Using Web Mining Techniques Fawad Ali, Farhan Hassan Khan, Saba Bashir, and Uzair Ahmad, Department of Computer Science, Federal Urdu University of Arts, Science and Technology (FUUAST), Islamabad, Pakistan.In this paper some major web mining techniques have been discussed which can be helpful to identify such people and terrorism may be countered from OSN. Each technique is discussed thoroughly, and effectiveness along with its pros and cons are also presented.
Chen, H.. "entiment Analysis in Multiple Languages: Feature Selection for Opinion Classification in Web Forums." ACM Transactions on Information Systems, forthcoming,June 2008.In this study the use of sentiment analysis methodologies is proposed for classification of Web forum opinions in multiple languages. The utility of stylistic and syntactic features is evaluated for sentiment classification of English and Arabic content.
J. Kiruba, P. Sumitha, K. Monisha, S. Vaishnavi Enhanced Content Detection Method to Detect Online Spread of Terrorism,International Journal of Engineering and Advanced Technology Volume-8, Issue-6S3, September 2019.They proposed a system delivery event notification which is used to monitor the activities and delivers notification according to the investigation knowledge. Alert reporting system is developed that takes earthquakes from websites and a message is sent the registered user.
Michael Grenieri, Anthony Estrada Down Converter Characterization in a Synthetic Instrument Context 2006 IEEE Autotestcon.This paper provides an overview of the need for a common set of specification parameters to characterize a down converter in a synthetic instrument (SI).The paper then provides an in-depth technical discussion of two of the less understood down converter related intermediate frequency (IF) output parameters: group delay and phase linearity.
Naseema Begum Detection of online spread of terrorism using web data mining A. Institute of Engineering and Technology, Coimbatore, Tamil Nadu, International Journal of Advance Research, Ideas and Innovations in Technology- Volume 5, Issue
The basic idea of this project is to reduce or stop spreading of terrorism and to remove all these accounts
T.Anand,S. Padmapriya,E. Kirubakaran Terror Tracking Using Advanced Web Mining 2009 International Conference on Intelligent Agent & Multi-Agent Systems.Web mining techniques can be used for detecting and avoiding terror threats caused by terrorists all over the world.