2012
DOI: 10.1016/j.eswa.2011.09.134
|View full text |Cite
|
Sign up to set email alerts
|

Mining anomalous events against frequent sequences in surveillance videos from commercial environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…The advantage of rule based system is that easy to recognize new events by modifying some rules. The main steps involved in a recognition system are Mining anomalous events against frequent sequences in surveillance videos from commercial environments [89] focus on abnormal events linked with frequent chain of events. The main result in identifying such events is early deployment of resources in particular areas.…”
Section: Methods Identified/reviewed Other Than Deep Learningmentioning
confidence: 99%
“…The advantage of rule based system is that easy to recognize new events by modifying some rules. The main steps involved in a recognition system are Mining anomalous events against frequent sequences in surveillance videos from commercial environments [89] focus on abnormal events linked with frequent chain of events. The main result in identifying such events is early deployment of resources in particular areas.…”
Section: Methods Identified/reviewed Other Than Deep Learningmentioning
confidence: 99%
“…The authors in (Anwar, Petrounias, Morris, and Kodogiannis, 2012) have developed an anomaly detection method to analyze anomalous events. However, the proposed method works at microscopic level.…”
Section: Computer Vision-based Methodsmentioning
confidence: 99%
“…BI is also characterised as a non-financial measurement tool, which supports a firm by using multi-dimensional and unstructured data (Gao andXu, 2009, Chaudhuri et al, 2011). This data could include pictures (Anwar et al, 2012), online product reviews (Chung and Tseng, 2012), blog entries (Chau and Xu, 2012), search portals (Roussinov and Chau, 2008), customer behaviour (Hsieh, 2011), market survey reports, project status reports, meeting records, customer complaints, e-mails, patent application sheets and competitor advertisements, all recorded in documents (Tseng and Chou, 2006). BI's characteristics for a financial measurement system include transaction data, (Ramakrishnan et al, 2012), fraudulent financial data, authentic data, bank status data, or interbank payment data (Hu et al, 2012), which provides the players involved, such as executives, managers, business analysts and others in a firm (Popovič et al, 2014) with adequate information for decision-making.…”
Section: Micro Level Of Bimentioning
confidence: 99%