A Novel Approach Automatic Detection of Suspicious Behavior

2014 ◽  
Vol 962-965 ◽  
pp. 2838-2841
Author(s):  
Shao Ping Zhu ◽  
Yu Hua Chen

We propose an efficient method for automatic detection of suspicious behavior in video surveillance data. First of all, we cluster a set of sequences labeled as normal or suspicious. Then, we assign new observation sequences to behavior clusters. We label a sequence as suspicious if it maps to an existing model of suspicious behavior or does not map to any existing model according to the corresponding HMMs. We evaluate our proposed method on a real-world video surveillance and find that the method is very effective at detecting suspicious behavior.

Author(s):  
Juan M. Jurado ◽  
J. Roberto Jiménez-Pérez ◽  
Luís Pádua ◽  
Francisco R. Feito ◽  
Joaquim J. Sousa
Keyword(s):  

2021 ◽  
Vol 11 (13) ◽  
pp. 6085
Author(s):  
Jesus Salido ◽  
Vanesa Lomas ◽  
Jesus Ruiz-Santaquiteria ◽  
Oscar Deniz

There is a great need to implement preventive mechanisms against shootings and terrorist acts in public spaces with a large influx of people. While surveillance cameras have become common, the need for monitoring 24/7 and real-time response requires automatic detection methods. This paper presents a study based on three convolutional neural network (CNN) models applied to the automatic detection of handguns in video surveillance images. It aims to investigate the reduction of false positives by including pose information associated with the way the handguns are held in the images belonging to the training dataset. The results highlighted the best average precision (96.36%) and recall (97.23%) obtained by RetinaNet fine-tuned with the unfrozen ResNet-50 backbone and the best precision (96.23%) and F1 score values (93.36%) obtained by YOLOv3 when it was trained on the dataset including pose information. This last architecture was the only one that showed a consistent improvement—around 2%—when pose information was expressly considered during training.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 59833-59842 ◽  
Author(s):  
Wenchao Jiang ◽  
Yinhu Zhai ◽  
Zhigang Zhuang ◽  
Paul Martin ◽  
Zhiming Zhao ◽  
...  

2021 ◽  
Author(s):  
Anne M Luescher ◽  
Julian Koch ◽  
Wendelin J Stark ◽  
Robert N Grass

Aerosolized particles play a significant role in human health and environmental risk management. The global importance of aerosol-related hazards, such as the circulation of pathogens and high levels of air pollutants, have led to a surging demand for suitable surrogate tracers to investigate the complex dynamics of airborne particles in real-world scenarios. In this study, we propose a novel approach using silica particles with encapsulated DNA (SPED) as a tracing agent for measuring aerosol distribution indoors. In a series of experiments with a portable setup, SPED were successfully aerosolized, re-captured and quantified using quantitative polymerase chain reaction (qPCR). Position-dependency and ventilation effects within a confined space could be shown in a quantitative fashion achieving detection limits below 0.1 ng particles per m3 of sampled air. In conclusion, SPED show promise for a flexible, cost-effective and low-impact characterization of aerosol dynamics in a wide range of settings.


2020 ◽  
Vol 19 (2) ◽  
pp. 21-35
Author(s):  
Ryan Beal ◽  
Timothy J. Norman ◽  
Sarvapali D. Ramchurn

AbstractThis paper outlines a novel approach to optimising teams for Daily Fantasy Sports (DFS) contests. To this end, we propose a number of new models and algorithms to solve the team formation problems posed by DFS. Specifically, we focus on the National Football League (NFL) and predict the performance of real-world players to form the optimal fantasy team using mixed-integer programming. We test our solutions using real-world data-sets from across four seasons (2014-2017). We highlight the advantage that can be gained from using our machine-based methods and show that our solutions outperform existing benchmarks, turning a profit in up to 81.3% of DFS game-weeks over a season.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Charles Marks ◽  
Arash Jahangiri ◽  
Sahar Ghanipoor Machiani

Every year, over 50 million people are injured and 1.35 million die in traffic accidents. Risky driving behaviors are responsible for over half of all fatal vehicle accidents. Identifying risky driving behaviors within real-world driving (RWD) datasets is a promising avenue to reduce the mortality burden associated with these unsafe behaviors, but numerous technical hurdles must be overcome to do so. Herein, we describe the implementation of a multistage process for classifying unlabeled RWD data as potentially risky or not. In the first stage, data are reformatted and reduced in preparation for classification. In the second stage, subsets of the reformatted data are labeled as potentially risky (or not) using the Iterative-DBSCAN method. In the third stage, the labeled subsets are then used to fit random forest (RF) classification models—RF models were chosen after they were found to be performing better than logistic regression and artificial neural network models. In the final stage, the RF models are used predictively to label the remaining RWD data as potentially risky (or not). The implementation of each stage is described and analyzed for the classification of RWD data from vehicles on public roads in Ann Arbor, Michigan. Overall, we identified 22.7 million observations of potentially risky driving out of 268.2 million observations. This study provides a novel approach for identifying potentially risky driving behaviors within RWD datasets. As such, this study represents an important step in the implementation of protocols designed to address and prevent the harms associated with risky driving.


2021 ◽  
Author(s):  
László Viktor Jánoky ◽  
Péter Ekler ◽  
János Levendovszky

JSON Web Tokens (JWT) provide a scalable, distributed way of user access control for modern web-based systems. The main advantage of the scheme is that the tokens are valid by themselves – through the use of digital signing – also imply its greatest weakness. Once issued, there is no trivial way to revoke a JWT token. In our work, we present a novel approach for this revocation problem, overcoming some of the problems of currently used solutions. To compare our solution to the established solutions, we also introduce the mathematical framework of comparison, which we ultimately test using real-world measurements.


2022 ◽  
Vol 6 (1) ◽  
pp. 1-29
Author(s):  
Anshul Agarwal ◽  
Krithi Ramamritham

Buildings, viewed as cyber-physical systems, become smart by deploying Building Management Systems (BMS). They should be aware about the state and environment of the building. This is achieved by developing a sensing system that senses different interesting factors of the building, called as “facets of sensing.” Depending on the application, different facets need to be sensed at various locations. Existing approaches for sensing these facets consist of deploying sensors at all the places so they can be sensed directly. But installing numerous sensors often aggravate the issues of user inconvenience, cost of installation and maintenance, and generation of e-waste. This article proposes how intelligently using the existing information can help to estimate the facets in cyber-physical systems like buildings, thereby reducing the sensors to be deployed. In this article, an optimization framework has been developed, which optimally deploys sensors in a building such that it satisfies BMS requirements with minimum number of sensors. The proposed solution is applied to real-world scenarios with cyber-physical systems. The results indicate that the proposed optimization framework is able to reduce the number of sensors by 59% and 49% when compared to the baseline and heuristic approach, respectively.


Sign in / Sign up

Export Citation Format

Share Document