2011
DOI: 10.1016/j.eswa.2010.09.070
|View full text |Cite
|
Sign up to set email alerts
|

Determining the best suited semantic events for cognitive surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…Besides the role of fuzzy logic in objects detection/tracking and traffic surveillance, there are other domains of surveillance where these concepts and implementations are applied. These domains include diverse applications such as healthcare [76,77] particularly for elderly people [34], fusion of images (infrared and visible regions) [35], and events determination [40]. Further research contributions in the surveillance domain include static and moving objects in surveillance [44], activity modeling [9], video enhancement [46,78], risk assessment [47], and walk directions estimations [52,79].…”
Section: Fuzzy Logic Based Methods For Surveillance Bvdmentioning
confidence: 99%
See 2 more Smart Citations
“…Besides the role of fuzzy logic in objects detection/tracking and traffic surveillance, there are other domains of surveillance where these concepts and implementations are applied. These domains include diverse applications such as healthcare [76,77] particularly for elderly people [34], fusion of images (infrared and visible regions) [35], and events determination [40]. Further research contributions in the surveillance domain include static and moving objects in surveillance [44], activity modeling [9], video enhancement [46,78], risk assessment [47], and walk directions estimations [52,79].…”
Section: Fuzzy Logic Based Methods For Surveillance Bvdmentioning
confidence: 99%
“…The commonly utilized metrics in computer vision domain including precision, recall, F1-score, accuracy, false positives and negatives, peak signal to noise ratio, accuracy rate, and false detection rate, among others, are also employed by some existing algorithms. For instance, the authors in [38,40,41], implemented accuracy, precision, recall, and F1 measures to justify their output results in various surveillance domains, including human detection and their motion information computation, as given in with these methods, it is possible to evaluate and validate the performance of fuzzy logic in surveillance domains when compared to other approaches employing machine learning and traditional image processing techniques.…”
Section: Performance Evaluation Of Fuzzy Based Surveillance Bvd Analyticsmentioning
confidence: 99%
See 1 more Smart Citation
“…-Monitoring Communications: is usually achieved by conducting an "intrusive surveillance" [27,28] (i.e covert vehicle [29], mainly a covert spying van), conducting a "directed surveillance" [30] (i.e relying on smart street or security cameras), or using human agents [31]. -Intercepting Communications: is usually achieved by identifying and intercepting IP/MAC addresses of cyber-criminals and suspects alike [32,33], in addition to tracking their e-mails/web-activities, and identifying their phone numbers and monitoring their phones messages, calls and logs (i.e land-lines and smart-phones [34]).…”
Section: Forensics Chain Of Custodymentioning
confidence: 99%
“…The authors classify events into four types: primitive, action, interaction, and composite. Fernández, Baiget, Roca, and González (2011) present an ontology-based methodology that guides the identification, stepby-step modeling, and generalization of the most relevant events to a specific surveillance domain. Gómez-Romero, Patricio, García, and Molina (2011) propose a computer vision framework aimed at the construction of a symbolic model of the scene by integrating tracking data and contextual information.…”
Section: Introductionmentioning
confidence: 99%