6th International Symposium on Telecommunications (IST) 2012
DOI: 10.1109/istel.2012.6483112
|View full text |Cite
|
Sign up to set email alerts
|

Behavior recognition and anomaly behavior detection using clustering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The authors who venture to design complete proposals, from the capture of video frames up to the behavior analysis of moving objects, need to determine constraints on their models in order to make feasible the computation of the heavy workload involved in every process (Berclaz et al, 2008), (Basharat et al, 2008), (Li et al, 2012), (Jiang et al, 2011). The works of these authors and (Ermis et al, 2008), (Kiryati et al, 2008), (Shi et al, 2010), (Hanapiah et al, 2010), (Feizi et al, 2012), (Haque and Murshed, 2012), (Cong et al, 2013) are generally focused on the search for better results on a set of standard video datasets created in their own trials or adopted from research groups around the world. Some approaches also deal with real world scenes, but are generally limited in flexibility in what concerns scenarios, targets, video length and reality.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors who venture to design complete proposals, from the capture of video frames up to the behavior analysis of moving objects, need to determine constraints on their models in order to make feasible the computation of the heavy workload involved in every process (Berclaz et al, 2008), (Basharat et al, 2008), (Li et al, 2012), (Jiang et al, 2011). The works of these authors and (Ermis et al, 2008), (Kiryati et al, 2008), (Shi et al, 2010), (Hanapiah et al, 2010), (Feizi et al, 2012), (Haque and Murshed, 2012), (Cong et al, 2013) are generally focused on the search for better results on a set of standard video datasets created in their own trials or adopted from research groups around the world. Some approaches also deal with real world scenes, but are generally limited in flexibility in what concerns scenarios, targets, video length and reality.…”
Section: Related Workmentioning
confidence: 99%
“…However, the size of the grid regions in our case, isn't determined empirically. In the work of (Feizi et al, 2012), the number of pixels in the cluster size is conveniently determined by their method. Already the work of (Kwon et al, 2013) used the concept of entropy to adjust the size of the regions, which they named cell in order to tune the best data arrays that detect abnormal motions.…”
Section: Related Workmentioning
confidence: 99%
“…If either the short-term action or the trajectory are found to be ''abnormal'', this is highlighted to the user. In [7] an approach for behavior modeling and detection of certain types of anomalous behavior is proposed. This paper first, proposes busy-idle rates, as the behavior features, to define a behavior model for a block of pixels.…”
Section: Introductionmentioning
confidence: 99%
“…Then, it uses spectral clustering for classifying behaviors. Once behavior model for each cluster is obtained using the histogram of the samples, reference [7] uses these models to perform anomalous behavior detection in a test video of the same scene.…”
Section: Introductionmentioning
confidence: 99%