scholarly journals An Automated Surveillance System Based on Multi-Processor and GPU Architecture

2017 ◽  
Vol 7 (6) ◽  
pp. 2319-2323
Author(s):  
M. B. Ayed ◽  
S. Elkosantini ◽  
M. Abid

Video surveillance systems are a powerful tool applied in various systems. Traditional systems based on human vision are to be avoided due to human errors. An automated surveillance system based on suspicious behavior presents a great challenge to developers. Such detection is a rather complex procedure and also a rather time-consuming one. An abnormal behavior could be identified by: actions, faces, route, etc. The definition of the characteristics of an abnormal behavior still present a big problem. This paper proposes a specific architecture for a surveillance system. The aim is to accelerate the system and obtain a reliable and accelerated suspicious behavior recognition. Finally, the experiment section illustrates the results with comparison of some of the most recent approaches.

2014 ◽  
Vol 1046 ◽  
pp. 266-269
Author(s):  
Feng Xu

In recent years, video surveillance has become more and more important for enhanced security and it is indispensable technology for fighting against all types of crime with the construction of sky-net in China. Abnormal detection is the focus of intelligent video surveillance and the information of abnormal behavior can be used in the investigation of criminal cases, which combines computer vision and artificial intelligence technology and has wide application prospect in public security work. In this paper, first the current research situation of the intelligent surveillance system is introduced. Then the category of abnormal behavior detection is expounded. Finally the function module of abnormal detection system is designed and the key technology of moving target detection, target tracking and abnormality judgment is discussed in view of the actual situation of surveillance system in criminal cases.


2020 ◽  
Vol 27 (4) ◽  
pp. 373-387 ◽  
Author(s):  
Jesus Benito-Picazo ◽  
Enrique Domínguez ◽  
Esteban J. Palomo ◽  
Ezequiel López-Rubio

The design of automated video surveillance systems often involves the detection of agents which exhibit anomalous or dangerous behavior in the scene under analysis. Models aimed to enhance the video pattern recognition abilities of the system are commonly integrated in order to increase its performance. Deep learning neural networks are found among the most popular models employed for this purpose. Nevertheless, the large computational demands of deep networks mean that exhaustive scans of the full video frame make the system perform rather poorly in terms of execution speed when implemented on low cost devices, due to the excessive computational load generated by the examination of multiple image windows. This work presents a video surveillance system aimed to detect moving objects with abnormal behavior for a panoramic 360∘ surveillance camera. The block of the video frame to be analyzed is determined on the basis of a probabilistic mixture distribution comprised by two mixture components. The first component is a uniform distribution, which is in charge of a blind window selection, while the second component is a mixture of kernel distributions. The kernel distributions generate windows within the video frame in the vicinity of the areas where anomalies were previously found. This contributes to obtain candidate windows for analysis which are close to the most relevant regions of the video frame, according to the past recorded activity. A Raspberry Pi microcontroller based board is employed to implement the system. This enables the design and implementation of a system with a low cost, which is nevertheless capable of performing the video analysis with a high video frame processing rate.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4419
Author(s):  
Hao Li ◽  
Tianhao Xiezhang ◽  
Cheng Yang ◽  
Lianbing Deng ◽  
Peng Yi

In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention. At present, many researchers focus on how to select the region of interest (RoI) accurately and then realize privacy protection in videos by selective encryption. However, relatively few researchers focus on building a security framework by analyzing the security of a video surveillance system from the system and data life cycle. By analyzing the surveillance video protection and the attack surface of a video surveillance system in a smart city, we constructed a secure surveillance framework in this manuscript. In the secure framework, a secure video surveillance model is proposed, and a secure authentication protocol that can resist man-in-the-middle attacks (MITM) and replay attacks is implemented. For the management of the video encryption key, we introduced the Chinese remainder theorem (CRT) on the basis of group key management to provide an efficient and secure key update. In addition, we built a decryption suite based on transparent encryption to ensure the security of the decryption environment. The security analysis proved that our system can guarantee the forward and backward security of the key update. In the experiment environment, the average decryption speed of our system can reach 91.47 Mb/s, which can meet the real-time requirement of practical applications.


Author(s):  
Qasim Mahmood Rajpoot ◽  
Christian Damsgaard Jensen

Pervasive usage of video surveillance is rapidly increasing in developed countries. Continuous security threats to public safety demand use of such systems. Contemporary video surveillance systems offer advanced functionalities which threaten the privacy of those recorded in the video. There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction of investigating the existing legal infrastructure for ensuring privacy in video surveillance and suggest guidelines in order to help those who want to deploy video surveillance while least compromising the privacy of people and complying with legal infrastructure.


2016 ◽  
Vol 12 (4) ◽  
pp. 45-62 ◽  
Author(s):  
Reza Mohammadi ◽  
Reza Javidan

In applications such as video surveillance systems, cameras transmit video data streams through network in which quality of received video should be assured. Traditional IP based networks cannot guarantee the required Quality of Service (QoS) for such applications. Nowadays, Software Defined Network (SDN) is a popular technology, which assists network management using computer programs. In this paper, a new SDN-based video surveillance system infrastructure is proposed to apply desire traffic engineering for practical video surveillance applications. To keep the quality of received videos adaptively, usually Constraint Shortest Path (CSP) problem is used which is a NP-complete problem. Hence, heuristic algorithms are suitable candidate for solving such problem. This paper models streaming video data on a surveillance system as a CSP problem, and proposes an artificial bee colony (ABC) algorithm to find optimal solution to manage the network adaptively and guarantee the required QoS. The simulation results show the effectiveness of the proposed method in terms of QoS metrics.


Author(s):  
Jie Xu

Abstract Recent advances in the field of object detection and face recognition have made it possible to develop practical video surveillance systems with embedded object detection and face recognition functionalities that are accurate and fast enough for commercial uses. In this paper, we compare some of the latest approaches to object detection and face recognition and provide reasons why they may or may not be amongst the best to be used in video surveillance applications in terms of both accuracy and speed. It is discovered that Faster R-CNN with Inception ResNet V2 is able to achieve some of the best accuracies while maintaining real-time rates. Single Shot Detector (SSD) with MobileNet, on the other hand, is incredibly fast and still accurate enough for most applications. As for face recognition, FaceNet with Multi-task Cascaded Convolutional Networks (MTCNN) achieves higher accuracy than advances such as DeepFace and DeepID2+ while being faster. An end-to-end video surveillance system is also proposed which could be used as a starting point for more complex systems. Various experiments have also been attempted on trained models with observations explained in detail. We finish by discussing video object detection and video salient object detection approaches which could potentially be used as future improvements to the proposed system.


2014 ◽  
Vol 602-605 ◽  
pp. 2317-2320
Author(s):  
Yang Li ◽  
Qing Hong Wu ◽  
Xue Xiao

With the continuous improvement of security awareness, home security has become the focus of attention. The actual demand for home video surveillance system, designed a cheap, practical, small size and low power consumption of video surveillance systems, this paper uses microprocessor S3C2440 ARM9 core as the core hardware control, embedded Linux operating system with software the control core, and cheap, generic USB camera video capture device as a front end to complete the design of a home video surveillance system.


1992 ◽  
Vol 26 (3) ◽  
pp. 384-391 ◽  
Author(s):  
Abraham G. Hartzema ◽  
Miquel S. Porta ◽  
Hugh H. Tilson ◽  
Carlos R. Herrera ◽  
Jeffrey T. Moss ◽  
...  

OBJECTIVE: To determine the feasibility of accurately assessing the types of hospital adverse drug reaction (ADR) surveillance systems. DESIGN: Cross-sectional survey by mailed, self-administered questionnaire followed by selected verification interviews. SETTING: Harris County, Texas. PARTICIPANTS: All hospitals in the county with different pharmacy directors. MAIN OUTCOME MEASURE: Self description of surveillance system and number of ADRs reported. RESULTS: Forty-nine of 61 hospitals (80 percent) responded to a questionnaire. Forty-seven (96 percent) of the responding hospitals collected information on ADRs with 11 (22 percent) describing their surveillance system as active. Those individuals most often cited as responsible for ADR surveillance included pharmacists, quality assurance personnel, and nurses. Data were verified by personal interviews for 10 hospitals. The number of ADRs reported during the interviews was significantly lower than that reported in the questionnaires. Overall, the reporting of fatal and severe ADRs were more reliable than the reporting of moderate ADRs. These differences were the result of inadequate documentation and the lack of a uniform definition of ADRs. CONCLUSIONS: These data suggest that a large-scale ongoing survey of surveillance systems and reported adverse event rates has limitations and the reliability of data derived from a questionnaire should be verified. To improve the accuracy of surveys used to monitor hospital ADR surveillance systems, it is essential to develop reliable definitions for classifying ADRs and surveillance methods, as well as accurate measures of ADR documentation procedures.


Author(s):  
Redwan A.K. Noaman ◽  
Mohd Alauddin Mohd Ali ◽  
Nasharuddin Zainal ◽  
Faisal Saeed

Vision-based systems for surveillance applications have been used widely and gained more research attention. Detecting people in an image stream is challenging because of their intra-class variability, the diversity of the backgrounds, and the conditions under which the images were acquired. Existing human detection solutions suffer in their effectiveness and efficiency. In particular, the accuracy of the existing detectors is characterized by their high false positive and negative. In addition, existing detectors are slow for online surveillance systems which lead to large delay that is not suitable for surveillance systems for real-time monitoring. In this paper, a holistic framework is proposed for enhancing the performance of human detection in surveillance system. In general, the framework includes the following stages: environment modeling, motion object detection, and human object recognition. In environment modeling, modal algorithm has been suggested for background initialization and extraction. Then for effectively classifying the motion object, edge detecting and B-spline algorithm have been used for shadow detection and removal. Then, enhanced Lucas–Kanade optical flow has been used to get the area of interest for object segmentation. Finally, to enhance the segmentation, some morphological processes were performed. In the motion object recognition stage, segmentation for each blob is performed and processed to the human detector which is a complete learning-based system for detecting and localizing objects/humans in images using mixtures of deformable part models (PFF detector). Results show enhancement in each phase of the proposed framework. These enhancements are shown in the overall performance of human detection in surveillance system.


2020 ◽  
Vol 11 (04) ◽  
pp. 564-569
Author(s):  
Patrick C. Burke ◽  
Rachel Benish Shirley ◽  
Jacob Raciniewski ◽  
James F. Simon ◽  
Robert Wyllie ◽  
...  

Abstract Background Performing high-quality surveillance for influenza-associated hospitalization (IAH) is challenging, time-consuming, and essential. Objectives Our objectives were to develop a fully automated surveillance system for laboratory-confirmed IAH at our multihospital health system, to evaluate the performance of the automated system during the 2018 to 2019 influenza season at eight hospitals by comparing its sensitivity and positive predictive value to that of manual surveillance, and to estimate the time and cost savings associated with reliance on the automated surveillance system. Methods Infection preventionists (IPs) perform manual surveillance for IAH by reviewing laboratory records and making a determination about each result. For automated surveillance, we programmed a query against our Enterprise Data Vault (EDV) for cases of IAH. The EDV query was established as a dynamic data source to feed our data visualization software, automatically updating every 24 hours.To establish a gold standard of cases of IAH against which to evaluate the performance of manual and automated surveillance systems, we generated a master list of possible IAH by querying four independent information systems. We reviewed medical records and adjudicated whether each possible case represented a true case of IAH. Results We found 844 true cases of IAH, 577 (68.4%) of which were detected by the manual system and 774 (91.7%) of which were detected by the automated system. The positive predictive values of the manual and automated systems were 89.3 and 88.3%, respectively.Relying on the automated surveillance system for IAH resulted in an average recoup of 82 minutes per day for each IP and an estimated system-wide payroll redirection of $32,880 over the four heaviest weeks of influenza activity. Conclusion Surveillance for IAH can be entirely automated at multihospital health systems, saving time, and money while improving case detection.


Sign in / Sign up

Export Citation Format

Share Document