International Journal of Mobile Computing Technology

[{“box”:0,”content”:”

n

Year : July 20, 2023 | Volume : 01 | Issue : 01 | Page : 08-18

n

n

n

n

n

n

By

n

[foreach 286]

Muhammad Nadeem, Ayesha, Jahanzaib Ali Khan, Waqas Ahmad, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz, Usman Shahid
  • [/foreach]

    n

    n

      [foreach 286] [if 1175 not_equal=””]n

    1. Lecturer, Lecturer, Lecturer, Lecturer, Lecturer, Lecturer, Lecturer, Lecturer,Department of Computer Science, Alhamd Islamic University, Department of Computer Science, University of Engineering and Technology, Department of Computer Science and Software Engineering, International Islamic University, Department of Computer Science, Alhamd Islamic University, Department of Computer Science, Abasyn University, Department of Computer Science, National University of Technology, Department of Computer Science, National University of Technology, Department of Computer Science, Iqra University,Islamabad, Taxila, Islamabad, Islamabad, Islamabad, Islamabad, Islamabad, Islamabad,Pakistan, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan, Pakistan
    2. n [/if 1175][/foreach]

    n

    n

    Abstract

    n Nowadays, pattern-based image retrieval algorithms are gaining popularity just because of their uniqueness. There are several issues in the previously proposed systems. The proposed system resolves issues highlighted in the literature. Our proposed system is tested on two image datasets ILIDS and PETS 2006. LTDP provides good results as compared to LBP in baggage detection on two classes that either bag is present or not in an image because LTDP works on finding the difference between adjacent neighbors and magnitude pattern which is either 0 or 1 which means either bag is present or not. In addition to LTDP patterns, HOG transformation has also been used for better feature extraction results. The results obtained through ANN are 90% whereas SVM depicts 50% accuracy and through classification learner, 75% accuracy is obtained.n

    n

    n

    n

    Keywords: LTDP, LBP, baggage detection, pattern-based image retrieval algorithms, baggage detection

    n [if 424 equals=”Regular Issue”][This article belongs to International Journal of Mobile Computing Technology(ijmct)]n

    n

    [/if 424][if 424 equals=”Special Issue”][This article belongs to Special Issue under section in International Journal of Mobile Computing Technology(ijmct)][/if 424][if 424 equals=”Conference”]This article belongs to Conference [/if 424]

    n

    n

    n

    How to cite this article:n Muhammad Nadeem, Ayesha, Jahanzaib Ali Khan, Waqas Ahmad, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz, Usman Shahid International Journal of Mobile Computing Technology ijmct July 20, 2023; 01:08-18

    n

    How to cite this URL: Muhammad Nadeem, Ayesha, Jahanzaib Ali Khan, Waqas Ahmad, Syeda Wajiha Zahra, Ali Arshad, Saman Riaz, Usman Shahid International Journal of Mobile Computing Technology ijmct July 20, 2023n {cited July 20, 2023};01:08-18. Available from: https://journals.stmjournals.com/ijmct/article=July 20, 2023/view=0/

    n


    n

    Full Text

    n [if 992 equals=”Open Access”] n [else]n n var fieldValue = “[user_role]”;n if (fieldValue == ‘indexingbodies’&’administrator’) {n document.write(‘

    Full Text: 1

    ‘);n document.write(‘

    1

    ‘);n }n }else if (fieldValue == ‘ijmct’) {n document.write(‘

    3

    ‘);n }else {n document.write(‘ ‘);n }n [/if 992]n


    nn [if 379 not_equal=””]n

    Browse Figures

    n

    n

    [foreach 379]n

    n [/foreach]n

    nn

    n

    n [/if 379]n

    n

    n Referencesn

    n [if 1104 equals=””]n

    1. T. Khanam and K. Deb, “Baggage Recognition in Occluded Environment using Boosting Technique,” TIIS, vol. 11, pp. 5436-5458, 2017.
    2. T. Khanam and K. Deb, “Human and carried baggage detection & classification based on RSD-HOG in video frame,” in 2016 9th International Conference on Electrical and Computer Engineering (ICECE), 2016, pp. 415-418.
    3. K. Leone and R. R. Liu, “The key design parameters of checked baggage security screening systems in airports,” Journal of Air Transport Management, vol. 11, pp. 69-78, 2005.
    4. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & Zahra, Syedawajiha & Rashid, Muhammad & S. Band, Shahab & Mosavi, Amir. (2022). Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN. 74. 2641-2659. 10.32604/cmc.2023.028796. K. Smith, P. Quelhas, and D. Gatica-Perez, “Detecting abandoned luggage items in a public space,” in IEEE Performance
    Evaluation of Tracking and Surveillance Workshop (PETS), 2006, pp. 75-82.
    5. J.-Y. Chang, H.-H. Liao, and L.-G. Chen, “Localized detection of abandoned luggage,” EURASIP Journal on Advances in Signal Processing, vol. 2010, p. 675784, 2010.
    6. G. Tzanidou, I. Zafar, and E. A. Edirisinghe, “Carried object detection in videos using color information,” IEEE Transactions on Information Forensics and Security, vol. 8, pp. 1620-1631, 2013.
    7. C. Beleznai, P. Gemeiner, and C. Zinner, “Reliable left luggage detection using stereo depth and intensity cues,” in Proceedings of the IEEE International Conference on Computer Vision Workshops, 2013, pp. 59-66.
    8. K. Lin, S.-C. Chen, C.-S. Chen, D.-T. Lin, and Y.-P. Hung, “Left-luggage detection from finite-state-machine analysis in static-camera videos,” in 2014 22nd International Conference on Pattern Recognition, 2014, pp. 4600-4605.
    9. Zahra, S.W., Arshad, A., Nadeem, M., Riaz, S., Dutta, A.K., Alzaid, Z., Alabdan, R., Almutairi, B. and Almotairi, S. (2022). Development of Security Rules and Mechanisms to Protect Data from Assaults. Applied Sciences, [online] 12(24), p.12578. doi:10.3390/app122412578.
    10. Wahyono, Jo KH. Detecting and recognizing LED dot matrix text in natural scene images. InEmerging Intelligent Computing Technology and Applications: 9th International Conference, ICIC 2013, Nanning, China, July 28-31, 2013. Proceedings 9 2013 (pp. 153-158). Springer Berlin Heidelberg.
    11. M. Johnstone, D. Creighton, and S. Nahavandi, “Simulation-based baggage handling system merge analysis,” Simulation Modelling Practice and Theory, vol. 53, pp. 45-59, 2015.
    12. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & Zahra, Syeda & Dutta, Ashit & Alaybani, Sultan. (2022). Preventing the Cloud Networks through Semi-Supervised Clustering from Both Sides Attacks. Applied Sciences. 12. 1-19. 10.3390/app12157701.
    13. K.-H. Jo, “Carried baggage detection and classification using part-based model,” in International Conference on Intelligent Computing, 2015, pp. 289-296.
    14. G. Szwoch, “Extraction of stable foreground image regions for unattended luggage detection,” Multimedia Tools and Applications, vol. 75, pp. 761-786, 2016.
    15. N. Hättenschwiler, Y. Sterchi, M. Mendes, and A. Schwaninger, “Automation in airport security X-ray screening of cabin baggage: Examining benefits and possible implementations of automated explosives detection,” Applied ergonomics, vol. 72, pp. 58-68, 2018.
    16. C. Wang, J. Liu, Y. Chen, H. Liu, and Y. Wang, “Towards In-baggage Suspicious Object Detection Using Commodity WiFi,” in 2018 IEEE Conference on Communications and Network Security (CNS), 2018, pp. 1-9.
    17. S. Smeureanu and R. T. Ionescu, “Real-time deep learning method for abandoned luggage detection in video,” in 2018 26th European Signal Processing Conference (EUSIPCO), 2018, pp. 1775-1779.
    18. Nadeem, Muhammad & Arshad, Ali & Riaz, Saman & S. Band, Shahab & Mosavi, Amir. (2021). Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System. IEEE Access. PP. 1-1. 10.1109/ACCESS.2021.3126535.

    nn [/if 1104][if 1104 not_equal=””]n

      [foreach 1102]n

    1. [if 1106 equals=””], [/if 1106][if 1106 not_equal=””],[/ifn 1106]
    2. n [/foreach]n

    n [/if 1104]n

    nn


    n [if 1114 equals=”Yes”]n

    n [/if 1114]nnn

    n

    n

    Regular Issue Subscription Review Article

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    n

    Volume 01
    Issue 01
    Received June 1, 2023
    Accepted June 2, 2023
    Published July 20, 2023

    n

    n

    n

    n

    [if 1190 not_equal=””]n

    Editor

    n

    [foreach 1188]n

    n [/foreach]n

    n [/if 1190] [if 1177 not_equal=””]n

    Reviewer

    n

    [foreach 1176]n

    n [/foreach]n

    n [/if 1177]n

    n

    n

    nnn.mq{ndisplay: flex; justify-content: space-between; width: 1280px; margin: auto; padding:4px 8px;}n .flx {display: flex;}n.jcsb {justify-content: space-between;}n.w1280 {width: 1280px; margin: auto;}n.w75p {width: 74%; padding:4px 4px 4px 8px;}n.w25p {width: 24%; border-left: 1px solid gainsboro;}n.dvct {border: 1px solid navajowhite;n padding: 4px;n margin-bottom: 4px;n background: #43ff86;}n.post-views {text-align: center;}n.ALLreveiwers img,n .ALLeditors img {n width: 50px;n height: 50px;n border-radius: 50px;n margin: 10px;n } n.ALLreveiwers,n .ALLeditors {n border-bottom: 1px solid black;}n.modaltext {n color: white;n padding: 0px 30px 0px 30px;n text-decoration: none;n }n.modaltext:hover {n color: black;n background-color: rgb(255 221 204);n color: black;n }n.modal-content {n margin-top: 50%;n }n table,n tr,n td {n padding: 10px;n border: none;n }n h2 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n line-height: 1.4em;n }n h3 {n font-size: 16px !important;n font-family: ‘Roboto’, Slab !important;n }n h4 {n font-family: ‘Roboto’, Slab !important;n }n p {n font-size: 14px !important;n font-family: ‘Roboto’, Slab !important;n }n a {n color: blue;n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n }n li,n p {n font-size: 15px !important;n font-family: ‘Roboto’, Slab !important;n text-align: justify;n }n .authdiv img {n max-width: 17px;n max-height: 17px;n }n.authdiv {n display: flex;n padding: 1px 2px;n }n@media only screen and (max-width:768px){n.mq{display:block; width:100%; padding:4px;}n.w75p{width:100%;}n.w25p{width:100%;}n}nnn function myFunction2() {n var x = document.getElementById(“browsefigure”);n if (x.style.display === “block”) {n x.style.display = “none”;n }n else { x.style.display = “Block”; }n }n document.querySelector(“.prevBtn”).addEventListener(“click”, () => {n changeSlides(-1);n });n document.querySelector(“.nextBtn”).addEventListener(“click”, () => {n changeSlides(1);n });n var slideIndex = 1;n showSlides(slideIndex);n function changeSlides(n) {n showSlides((slideIndex += n));n }n function currentSlide(n) {n showSlides((slideIndex = n));n }n function showSlides(n) {n var i;n var slides = document.getElementsByClassName(“Slide”);n var dots = document.getElementsByClassName(“Navdot”);n if (n > slides.length) { slideIndex = 1; }n if (n (item.style.display = “none”));n Array.from(dots).forEach(n item => (item.className = item.className.replace(” selected”, “”))n );n slides[slideIndex – 1].style.display = “block”;n dots[slideIndex – 1].className += ” selected”;n }nnn function myfun() {n x = document.getElementById(“editor”);n y = document.getElementById(“down”);n z = document.getElementById(“up”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n function myfun2() {n x = document.getElementById(“reviewer”);n y = document.getElementById(“down2”);n z = document.getElementById(“up2”);n if (x.style.display == “none”) {n x.style.display = “block”;n }n else {n x.style.display = “none”;n }n if (y.style.display == “none”) {n y.style.display = “block”;n }n else {n y.style.display = “none”;n }n if (z.style.display == “none”) {n z.style.display = “block”;n }n else {n z.style.display = “none”;n }n }n”}]