Person Re-Identification Using MTMCML and Graph Based Method

Authors

  • T Thangaponnu Department of Computer Science, STET Women’s College, Mannargudi
  • V Geetha Department of Computer Science, STET Women’s College, Mannargudi

Keywords:

Area Privacy, Area Based Administrations (LBSs), Security

Abstract

Human eyes can recognize person ID substances based on some little not capable regions. However, such value capable not capable data is regularly covered up at the point when registering similarities of pictures with existing approaches. Moreover, numerous existing approaches learn discriminative highlights and handle drastic perspective change in an administered way and require labeling new preparing data fat that point again a diverse pair of camera views. In this paper, we proposture a novel perspective fat that point again per-child re-distinguishing proof based on administered striking nature learning. Distinctive highlights are separated without needing element names in the preparing procedure. First, we apply nearness obliged patch coordinating to assemble thick correspondence between picture pairs, which shows effective-ness in taking care of misalignment caused by huge perspective and posture variations. Second, we learn human striking nature in an administered manner. To make strides the execution of person re-identification, human striking nature is incorporated in patch coordinating to find re capable and discriminative coordinated patches. The adequacy of our approach is validated on the generally used Snake dataset and ETHZ dataset.

References

I. F. Akyildiz, X. Wang, and W. Wang, “Wireless Mesh Networks: A Survey”, Computer Networks and ISDN Systems, Vol.47, Issue-2, 2005, pp.445-487.

I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.

M. Lee et al., “Emerging Standards for Wireless Mesh Technology”, IEEE Wireless Communications, Vol.13, Issue-4, 2006, pp.56-63.

N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.

S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.

C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.

Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265.

Downloads

Published

2025-11-10

How to Cite

[1]
T. Thangaponnu and V. Geetha, “Person Re-Identification Using MTMCML and Graph Based Method”, Int. J. Comp. Sci. Eng., vol. 3, no. 8, pp. 160–167, Nov. 2025.

Issue

Section

Research Article