2012 9th International Conference &Amp; Expo on Emerging Technologies for a Smarter World (CEWIT) 2012
DOI: 10.1109/cewit.2012.6606979
|View full text |Cite
|
Sign up to set email alerts
|

Trajectory extraction for abnormal behavior detection in public area

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…In this method, preprocessing of noise reduction, 5,15 background modeling, 27 morphological processing, 28 shadow elimination 29 were performed successively to obtain multiple targets. Pedestrian and vehicle were classified according to the length‐width ratio and the duty cycle of the target box 15 .…”
Section: Traffic Violation Recognitionmentioning
confidence: 99%
“…In this method, preprocessing of noise reduction, 5,15 background modeling, 27 morphological processing, 28 shadow elimination 29 were performed successively to obtain multiple targets. Pedestrian and vehicle were classified according to the length‐width ratio and the duty cycle of the target box 15 .…”
Section: Traffic Violation Recognitionmentioning
confidence: 99%
“…Therefore, we introduce joint training as the second stage that aims to extract the most useful latent data representations, and at the same time, enhance discrimination ability. Besides, we apply a schedule of dynamic loss weights to control the degree of distortion of the underlying distribution, that is, we change the value of α, β, γ in (18) over training epochs (detailed in part B of next section). Note that during the training, we choose Adam optimizer as our optimization technique, and use Leaky Rectified Linear Unit (Leaky ReLU) as the activation function, which overcomes dying neuron issue of ReLU.…”
Section: E Model Trainingmentioning
confidence: 99%
“…Understanding and discovering knowledge from trajectory data is a key issue in urban computing [1]. In real life, numerous applications are based on trajectory data mining techniques such as effectively identifying users' transportation modes [2]- [9], analysis on vessel activities [10]- [13], traffic congestion prediction [14]- [16], stampede events warning [15], and abnormal trajectory detection [17], [18]. For research purposes, studies like learning animal migratory habits and identifying the intensity of hurricane [19] are highly relying on trajectory data mining techniques.…”
Section: Introductionmentioning
confidence: 99%
“…Crowd control system should be able to provide early warning of the occurrence of abnormal behavior in the video environment. Motion trajectory could be obtained by using the moving human tracking algorithm and the abnormal behavior could be estimated by extracting the length, pixel, covariance, motion degree and other information from the trajectory [7].The study of behavioral analysis mainly focuses on the behavior identification of a limited class of simple rules or abnormal behavior detection of single target in a particular scene [8], complex and large amount of calculation of the image processing should be carried out before behavioral analysis, this reduces the efficiency of the algorithm and it's difficult to achieve intelligent frontend equipment. Most of the algorithms can only achieve the static matching of single target behavior in the process of analysis and the capture efficiency is low.…”
Section: Analysis Of the Behavior Of Abnormal Objectsmentioning
confidence: 99%