Affective State Based Anomaly Detection in Crowd

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

3D Gabor Based Hyperspectral Anomaly Detection

Hyperspectral anomaly detection is one of the main challenging topics in both military and civilian fields. The spectral information contained in a hyperspectral cube provides a high ability for anomaly detection. In addition, the costly spatial information of adjacent pixels such as texture can also improve the discrimination between anomalous targets and background. Most studies miss the wort...

متن کامل

Global Anomaly Crowd Behavior Detection Using Crowd Behavior Feature Vector

In the area of crowd abnormal detection, the parameter of population density, is seldom used to the global crowd behavior detection. Some of the references simply use the LBP or spatial-temporal LBP features to fulfill the abnormal detection. They don’t make full use of the crowd density characteristics and dynamic characteristics. This paper proposes a novel method by increasing the dimension ...

متن کامل

Crowd Anomaly Detection for Automated Video Surveillance

Video-based crowd behaviour detection aims at tackling challenging problems such as automating and identifying changing crowd behaviours under complex real life situations. In this paper, real-time crowd anomaly detection algorithms have been investigated. Based on the spatio-temporal video volume concept, an innovative spatio-temporal texture model has been proposed in this research for its ri...

متن کامل

Hierarchical crowd analysis and anomaly detection

Objective: This work proposes a novel approach to model the spatiotemporal distribution of crowd motions and detect anomalous events. Methods: We first learn the regions of interest (ROIs) which inform the behavioral patterns by trajectory analysis with Hierarchical Dirichlet Processes (HDP), so that the main trends of crowd motions can be modeled. Based on the ROIs, we then build a series of h...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied Computer Systems

سال: 2019

ISSN: 2255-8691

DOI: 10.2478/acss-2019-0017