2019
DOI: 10.5120/ijca2019918383
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Crowd Detection Algorithms using Wireless Sensor Networks: A Case of People Crowds

Abstract: In this paper a survey is carried out on crowd detection algorithms, highlighting challenges and gaps visa -avis people crowd detection. The research identifies some of the key capabilities considered invaluable in effective people crowd detection and compares some of the current crowd detection algorithms with regard to these. The results reveal that most algorithms are primarily non-people crowd detection algorithms. While people crowds are intelligent and can easily bypass most of the current crowd detectio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…Active attacks are the ones in which the attacker tries to interfere with the normal functioning of the WSN. Besides building monitoring, the conceptualized technique can be extended to other scenarios, such as fall prediction in health monitoring using smart floor [62] or crowd monitoring and detection using WSN [63]. We point out a possible application in networks of untrusted devices, in which nodes of the network must jointly compute a function without knowing other parties involved in the computation and without revealing their private inputs.…”
Section: Conclusion and Further Workmentioning
confidence: 99%
“…Active attacks are the ones in which the attacker tries to interfere with the normal functioning of the WSN. Besides building monitoring, the conceptualized technique can be extended to other scenarios, such as fall prediction in health monitoring using smart floor [62] or crowd monitoring and detection using WSN [63]. We point out a possible application in networks of untrusted devices, in which nodes of the network must jointly compute a function without knowing other parties involved in the computation and without revealing their private inputs.…”
Section: Conclusion and Further Workmentioning
confidence: 99%
“…Crowd counting techniques are essential to ensure the public safety, such as preventing stampede in a parade, or optimizing layout of the site. To estimate the number of people within a district, a common strate-gy is to count the number of mobile phones accessed to the base station [1]. This strategy is generally effective, but it cannot reveal the local crowd density in the certain area with high risk, such as crossroad and pla-Information Technology and Control 2023/3/52 694 za.…”
Section: Introductionmentioning
confidence: 99%
“…For each image, all pedestrians' heads are manually annotated with crosses as ground truth. A common approach to generate ground-truth density map D GT , is to calculate the convolution of spatial information and a gaussian kernel G, which can be expressed as Equation (1).…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations