2017 IEEE Region 10 Symposium (TENSYMP) 2017
DOI: 10.1109/tenconspring.2017.8070040
|View full text |Cite
|
Sign up to set email alerts
|

Direction estimation of crowd flow in surveillance videos

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…The detected spot area was limited to pixels, droplets were screened and bright spots were suppressed by setting the roundness and convexity of spots. The roundness of spots is shown in Equation (2), and the convexity is shown in Equation (3) [ 35 , 36 ]. The value range of the two is 0–1.…”
Section: Methodsmentioning
confidence: 99%
“…The detected spot area was limited to pixels, droplets were screened and bright spots were suppressed by setting the roundness and convexity of spots. The roundness of spots is shown in Equation (2), and the convexity is shown in Equation (3) [ 35 , 36 ]. The value range of the two is 0–1.…”
Section: Methodsmentioning
confidence: 99%
“…This makes the movements of such groups represent another challenge to crowd management. Anees et al [4] developed an approach to determine the direction of the global movement of the crowd. The dense areas were identified using key-point descriptors, which ultimately contributed to finding the flow direction.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Among the most effective measures to limit the spread of coronavirus are face masks and the implementation of social distancing. Crowd density, the average number of people in a scene, could be exploited to determine the crowd's direction [4]. Crowd events such as local dispersion, running, crowd splitting, evacuation, and crowd formation must be identified quickly [5].…”
Section: Introductionmentioning
confidence: 99%
“…These capabilities have been studied from different perspectives leading to a wide range of results including threats and individuals detection (Chackravarthy, Schmitt, & Yang, 2018) (Bellini, Cenni, Nesi, & Paoli, 2017), screening and tracking (Brust, y otros, 2017) (Anees & Kumar, 2017), recognition-based authentication (Balla & Jadhao, 2018) (Boukerche, Siddiqui, & Mammeri, 2017) or the improvement of legacy systems deployed throughout the city endowing them with intelligence (Zingoni, Diani, & Corsini, 2017) (Zhou, Saha, & Rangarajan, 2015). However, due to our particular approach, we must emphasise that there are hardly any studies (Dbouk, Mcheick, & Sbeity, 2014) (Bonatsos, Middleton, Melas, & Sabeur, 2013) that propose a comprehensive DSS involving at the same time emergency management, real-time decision support and forecasting of threats evolution and impact of most common terrorist attacks.…”
Section: Introductionmentioning
confidence: 99%