intelligent surveillance
Recently Published Documents


TOTAL DOCUMENTS

243
(FIVE YEARS 65)

H-INDEX

15
(FIVE YEARS 4)

2021 ◽  
pp. 1-15
Author(s):  
V. Muhammed Anees ◽  
G. Santhosh Kumar

Crowd behaviour analysis and management have become a significant research problem for the last few years because of the substantial growth in the world population and their security requirements. There are numerous unsolved problems like crowd flow modelling and crowd behaviour detection, which are still open in this area, seeking great attention from the research community. Crowd flow modelling is one of such problems, and it is also an integral part of an intelligent surveillance system. Modelling of crowd flow has now become a vital concern in the development of intelligent surveillance systems. Real-time analysis of crowd behavior needs accurate models that represent crowded scenarios. An intelligent surveillance system supporting a good crowd flow model will help identify the risks in a wide range of emergencies and facilitate human safety. Mathematical models of crowd flow developed from real-time video sequences enable further analysis and decision making. A novel method identifying eight possible crowd flow behaviours commonly seen in the crowd video sequences is explained in this paper. The proposed method uses crowd flow localisation using the Gunnar-Farneback optical flow method. The Jacobian and Hessian matrix analysis along with corresponding eigenvalues helps to find stability points identifying the flow patterns. This work is carried out on 80 videos taken from UCF crowd and CUHK video datasets. Comparison with existing works from the literature proves our method yields better results.


2021 ◽  
Vol 11 (24) ◽  
pp. 11887
Author(s):  
Kai-Hung Chang ◽  
Shao-Kang Hung

A tether-powered unmanned aerial vehicle is presented in this article to demonstrate the highest altitude and the longest flight time among surveyed literature. The grid-powered ground station transmits high voltage electrical energy through a well-managed conductive tether to a 2-kg hexacopter hovering in the air. Designs, implementations, and theoretical models are discussed in this research work. Experimental results show that the proposed system can operate over 50 m for 4 h continuously. Compared with battery-powered multicopters, tether-powered ones have great advantages on specific-area long-endurance applications, such as precision agriculture, intelligent surveillance, and vehicle-deployed cellular sites.


Author(s):  
Imane Benraya ◽  
Nadjia Benblidia ◽  
Yasmine Amara

<p>Background subtraction is the first and basic stage in video analysis and smart surveillance to extract moving objects. In fact, the background subtraction library (BGSLibrary) was created by Andrews Sobral in 2012, which currently combines 43 background subtraction algorithms from the most popular and widely used in the field of video analysis. Each algorithm has its own characteristics, strengths and weaknesses in extracting moving objects. The evaluation allows the identification of these characteristics and helps researchers to design the best methods. Unfortunately, the literature lacks a comprehensive evaluation of the algorithms included in the library. Accordingly, the present work will evaluate these algorithms in the BGSLibrary through the segmentation performance, execution time and processor, so as to, achieve a perfect, comprehensive, real-time evaluation of the system. Indeed, a background modeling challenge (BMC) dataset was selected using the synthetic video with the presence of noise. Results are presented in tables, columns and foreground masks.</p>


Author(s):  
Jiaping Yu ◽  
Haiwen Chen ◽  
Kui Wu ◽  
Tongqing Zhou ◽  
Zhiping Cai ◽  
...  

2021 ◽  
pp. 135-147
Author(s):  
Nour Ahmed Ghoniem ◽  
Samiha Hesham ◽  
Sandra Fares ◽  
Mariam Hesham ◽  
Lobna Shaheen ◽  
...  

2021 ◽  
Author(s):  
Ryan Wen Liu ◽  
Maohan Liang ◽  
Jiangtian Nie ◽  
Sahil Garg ◽  
Yang Zhang ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4262
Author(s):  
Xinyue Fan ◽  
Yang Lin ◽  
Chaoxi Zhang ◽  
Jia Zhang

Person re-identification (ReID) plays an important role in intelligent surveillance and receives widespread attention from academics and the industry. Due to extreme changes in viewing angles, some discriminative local regions are suppressed. In addition, the data with similar backgrounds collected by a fixed viewing angle camera will also affect the model’s ability to distinguish a person. Therefore, we need to discover more fine-grained information to form the overall characteristics of each identity. The proposed self-erasing network structure composed of three branches benefits the extraction of global information, the suppression of background noise and the mining of local information. The two self-erasing strategies that we proposed encourage the network to focus on foreground information and strengthen the model’s ability to encode weak features so as to form more effective and richer visual cues of a person. Extensive experiments show that the proposed method is competitive with the advanced methods and achieves state-of-the-art performance on DukeMTMC-ReID and CUHK-03(D) datasets. Furthermore, it can be seen from the activation map that the proposed method is beneficial to spread the attention to the whole body. Both metrics and the activation map validate the effectiveness of our proposed method.


Author(s):  
Sushama Khanvilkar ◽  
◽  
Santosh Gupta ◽  
Hinal Rane ◽  
Calvin Galbaw ◽  
...  

Recognition of the human activities in videos has gathered numerous demands in various applications of computer vision like Ambient Assisted Living, intelligent surveillance, Human-Computer interaction. One of the most pioneering techniques for Human Detection in Video Surveillance based on deep learning and this project mainly focuses on various approaches based on that. This paper provides an idea of solution to use video surveillance more effectively, by detecting any humans present and notifying the concerned people. The deep learning model, preferred for fast computation, Convolution Neural Network is used by stacking 3 blocks of layers on fully connected layers. This provided an identification of humans and naïve approach to eliminate inanimate human like objects such as mannequins.


Sign in / Sign up

Export Citation Format

Share Document