Learning Algorithms for Anomaly Detection from Images

Biometrics ◽  
2017 ◽  
pp. 281-308
Author(s):  
Tarem Ahmed ◽  
Al-Sakib Khan Pathan ◽  
Supriyo Shafkat Ahmed

Visual surveillance networks are installed in many sensitive places in the present world. Human security officers are required to continuously stare at large numbers of monitors simultaneously, and for lengths of time at a stretch. Constant alert vigilance for hours on end is difficult to maintain for human beings. It is thus important to remove the onus of detecting unwanted activity from the human security officer to an automated system. While many researchers have proposed solutions to this problem in the recent past, significant gaps remain in existing knowledge. Most existing algorithms involve high complexities. No quantitative performance analysis is provided by most researchers. Most commercial systems require expensive equipment. This work proposes algorithms where the complexities are independent of time, making the algorithms naturally suited to online use. In addition, the proposed methods have been shown to work with the simplest surveillance systems that may already be publicly deployed. Furthermore, direct quantitative performance comparisons are provided.

2015 ◽  
Vol 4 (3) ◽  
pp. 43-69 ◽  
Author(s):  
Tarem Ahmed ◽  
Al-Sakib Khan Pathan ◽  
Supriyo Shafkat Ahmed

Visual surveillance networks are installed in many sensitive places in the present world. Human security officers are required to continuously stare at large numbers of monitors simultaneously, and for lengths of time at a stretch. Constant alert vigilance for hours on end is difficult to maintain for human beings. It is thus important to remove the onus of detecting unwanted activity from the human security officer to an automated system. While many researchers have proposed solutions to this problem in the recent past, significant gaps remain in existing knowledge. Most existing algorithms involve high complexities. No quantitative performance analysis is provided by most researchers. Most commercial systems require expensive equipment. This work proposes algorithms where the complexities are independent of time, making the algorithms naturally suited to online use. In addition, the proposed methods have been shown to work with the simplest surveillance systems that may already be publicly deployed. Furthermore, direct quantitative performance comparisons are provided.


2000 ◽  
Vol 10 (3) ◽  
pp. 725-733 ◽  
Author(s):  
Timothy L. Fort

Abstract:This paper is a response to a recent colloquy among Professors David Messick, Donna Wold, and Edwin Harman. I defend Messick’s naturalist methodology, which suggests that people inherently categorize others and act altruistically toward certain people in a given person’s in-group. This paper suggests that an anthropological reason for this grouping tendency is a limited human neural ability to process large numbers of relationships. But because human beings also have the ability to modify, to some extent, their nature, corporate law can organize small mediating institutions within large corporations in order to take ethical advantage of this grouping tendency. Within a corporate law taking seriously a mediating institution’s formulation of business communities, a virtue ethics approach can be integrated with a naturalist approach in a way that fosters ethical business behavior while mitigating the dangers of ingrouping tendencies.


There is a need for safety assistance visual surveillance that can be effectively used to navigate hazardous places which cannot be accessed by human beings. Several high-risk conditions like radioactive zone, toxic environment and accident-prone areas are usually approached/tackled by humans with little to no information about their conditions. Hence our aim is to reduce any human interaction with these unsafe circumstances by proposing a visual surveillance robot that is capable of moving in any terrain and can relay live information to the controller situated at a remote location. In this paper we address the implementation of Visual Surveillance bot by using a Camera that rotates at 360 degree with the help of DC motor, which illustrate the surrounding so as to provide the estimation of danger if any. We present the execution by efficiently live streaming information with the help of Raspberry pi and by using the MATLAB software to create a RADAR plot by analyzing the object detected by Ultrasonic sensor. The usage of MATLAB not only simplifies the analysis but also helps in creating an enhanced RADAR system by using an ARDUINO to support the ultrasonic system in recording the echo time and object detection angle.


2020 ◽  
Vol 11 (04) ◽  
pp. 564-569
Author(s):  
Patrick C. Burke ◽  
Rachel Benish Shirley ◽  
Jacob Raciniewski ◽  
James F. Simon ◽  
Robert Wyllie ◽  
...  

Abstract Background Performing high-quality surveillance for influenza-associated hospitalization (IAH) is challenging, time-consuming, and essential. Objectives Our objectives were to develop a fully automated surveillance system for laboratory-confirmed IAH at our multihospital health system, to evaluate the performance of the automated system during the 2018 to 2019 influenza season at eight hospitals by comparing its sensitivity and positive predictive value to that of manual surveillance, and to estimate the time and cost savings associated with reliance on the automated surveillance system. Methods Infection preventionists (IPs) perform manual surveillance for IAH by reviewing laboratory records and making a determination about each result. For automated surveillance, we programmed a query against our Enterprise Data Vault (EDV) for cases of IAH. The EDV query was established as a dynamic data source to feed our data visualization software, automatically updating every 24 hours.To establish a gold standard of cases of IAH against which to evaluate the performance of manual and automated surveillance systems, we generated a master list of possible IAH by querying four independent information systems. We reviewed medical records and adjudicated whether each possible case represented a true case of IAH. Results We found 844 true cases of IAH, 577 (68.4%) of which were detected by the manual system and 774 (91.7%) of which were detected by the automated system. The positive predictive values of the manual and automated systems were 89.3 and 88.3%, respectively.Relying on the automated surveillance system for IAH resulted in an average recoup of 82 minutes per day for each IP and an estimated system-wide payroll redirection of $32,880 over the four heaviest weeks of influenza activity. Conclusion Surveillance for IAH can be entirely automated at multihospital health systems, saving time, and money while improving case detection.


2001 ◽  
Vol 13 (6) ◽  
pp. 569-574
Author(s):  
Masanori Idesawa ◽  

Human beings obtain big amount of information from the external world through their visual system. Automated system such as robot must provide the visual functions for their flexible operations in 3-D circumstances. In order to realize the visual function artificially, we would be better to learn from the human visual mechanism. Optical illusions would be a pure reflection of the human visual mechanism; they can be used for investigating human visual mechanism. New types of optical illusion with binocular viewing are introduced and investigated.


2020 ◽  
Vol 17 (5) ◽  
pp. 2288-2295
Author(s):  
K. V. Sowmya ◽  
Harshavardhan Jamedar ◽  
Pradeep Godavarthi

Development of surveillance and monitoring systems are quite difficult and challenging task at times. The design of a system depends on the environment to be monitored. Such surveillance systems need to have dynamic features, for e.g., cameras used for monitoring may be mobiles, web cams etc. installed to the system. Such systems are used in various large buildings like shopping malls where it could incur high cost for installing cameras in each level of buildings. Even for people like security officers it could be huge task to cover an entire building. Other examples for dynamic surveillance system could be detecting poisonous gases in an area, explosives and any fire risk elements. Another case is that it can reach where the area is not accessed by humans. In view of these challenges we propose a Remote monitoring system where a Robotic Car is installed with camera, Ultrasonic sensor, DHT11, PIR sensors according to the environment involved. The instructions are given to the robotic car using a third party app called Blynk as user interface. Here the raspberry pi is used as a microcontroller which is connected to WIFI acts as the communication medium to connect the server provided by Blynk. The Blynk app which acts as a user interface is interacted with the car using Wi-Fi and its server.


Sign in / Sign up

Export Citation Format

Share Document