28,088 Hits in 4.5 sec

Detection of object abandonment using temporal logic

Medha Bhargava, Chia-Chih Chen, M. S. Ryoo, J. K. Aggarwal
2009 Machine Vision and Applications  
This paper describes a novel framework for a smart threat detection system that uses computer vision to capture, exploit and interpret the temporal flow of events related to the abandonment of an object  ...  When an unattended object is detected, the system traces it back in time to determine and record who its most likely owner(s) may be.  ...  Stauffer and Grimson [19] present an event detection module that classifies objects, including abandoned objects, using a neural network, but is limited to detecting only one abandoned object at a time  ... 
doi:10.1007/s00138-008-0181-8 fatcat:6ze7jwkzwfe63b6ty6pswp6v3i

Realization of Scenarios for Video Surveillance

Wojciech Chmiel, Joanna Kwiecień, Zbigniew Mikrut
2012 Image Processing & Communications  
We briefly describe base algorithms (object detection, object localization, recognition of humans, movement detection and configuration of scene) used in three selected scenarios: violation of protected  ...  zones, abandoned objects and vandalism (graffiti).  ...  Another logical system considered for use in the recognition of objects and their behavior is a temporal logic.  ... 
doi:10.2478/v10248-012-0051-x fatcat:z3zbco6zfrhsleyktxrxax3ao4

Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance

Miss. Komal Sunil Patil, Prof. Girish A. Kulkarni
2018 IARJSET  
We introduce an abandoned object detection tool based on a set of possible events and on a set of rules to act upon those events.  ...  Abandoned object detection is an essential requirement in many video surveillance contexts.  ...  Therefore, they propose an object search method which is adapted to transformation of the object. they use a template matching using Genetic Algorithm (GA) for detection of abandoned objects.  ... 
doi:10.17148/iarjset.2018.592 fatcat:lu4zh42tyna6noeudwtem7ld54

Robust abandoned object detection integrating wide area visual surveillance and social context

James Ferryman, David Hogg, Jan Sochman, Ardhendu Behera, José A. Rodriguez-Serrano, Simon Worgan, Longzhen Li, Valerie Leung, Murray Evans, Philippe Cornic, Stéphane Herbin, Stefan Schlenger (+1 others)
2013 Pattern Recognition Letters  
This paper presents a video surveillance framework that robustly and efficiently detects abandoned objects in surveillance scenes.  ...  The framework is based on a novel threat assessment algorithm which combines the concept of ownership with automatic understanding of social relations in order to infer abandonment of objects.  ...  Any opinions expressed in this paper do not necessarily reflect the views of the European Community. The Community is not liable for any use that may be made of the information contained herein.  ... 
doi:10.1016/j.patrec.2013.01.018 fatcat:tredjkkbsfddzogbvkejikybbm

A semantic-based probabilistic approach for real-time video event recognition

Juan C. SanMiguel, José M. Martínez
2012 Computer Vision and Image Understanding  
Then, we eciently organize such strategies for performing the recognition according to the temporal characteristics of events.  ...  We demonstrate the validity of the proposed approach for recognizing human-object interactions in the video monitoring domain.  ...  For the Abandoned-object PN, the left side denes the typical model for detecting abandoned objects [31] whilst the right side describes their detection considering that the action owner is not likely  ... 
doi:10.1016/j.cviu.2012.04.005 fatcat:27heofdnqnegjf77ac7gklu47y

Modeling and Recognition of Video Events with Fuzzy Semantic Petri Nets [chapter]

Piotr Szwed
2016 Advances in Intelligent Systems and Computing  
The ontology stores assertions (facts) concerning classification of objects and detected relations. Fuzzy predicates querying the ontology content are used as guards of transitions in FSPN.  ...  The Petri net structure is obtained by translating a Linear Temporal Logic formula specifying a scenario in a human-readable form.  ...  Formulas in temporal logic are constructed from propositions linked by classical logic operators and temporal operators.  ... 
doi:10.1007/978-3-319-19090-7_38 fatcat:ki4twcmfizhvrcrjgtgmtvjpqi

Robust Real-time Detection of Abandoned Objects using a Dual Background Model

2020 KSII Transactions on Internet and Information Systems  
, long-term abandonment, and owner's re-attendance as well as general detection of abandoned objects.  ...  Detection of abandoned objects for smart video surveillance should be robust and accurate in various situations with low computational costs.  ...  of Abandoned Objects using a Dual Background Model  ... 
doi:10.3837/tiis.2020.02.017 fatcat:geo6rqoo7vh5rnch5nz3ie5d6y

Abandoned object detection using operator-space pursuit

Lucas A. Thomaz, Allan F da Silva, Eduardo A. B. da Silva, Sergio L. Netto, Xiao Bian, Hamid Krim
2015 2015 IEEE International Conference on Image Processing (ICIP)  
This work presents a framework to be used in the detection of abandoned objects and other video events in a cluttered environment with a moving camera.  ...  In the proposed method a target video, that may have features we would like to detect, is compared with a preacquired reference video, which is assumed to have no objects nor video events of interest.  ...  CONCLUSIONS This paper presented a new method to detect abandoned objects and video events in a cluttered environment without the need of previous registration or fine temporal alignment.  ... 
doi:10.1109/icip.2015.7351147 dblp:conf/icip/ThomazSSNBK15 fatcat:lhcewwsbvja3le5qiuwowosigu

Detection of abandoned objects in crowded environments

Medha Bhargava, Chia-Chih Chen, M. S. Ryoo, J. K. Aggarwal
2007 2007 IEEE Conference on Advanced Video and Signal Based Surveillance  
Of particular significance is the case of unattended objects in mass transit areas.  ...  With concerns about terrorism and global security on the rise, it has become vital to have in place efficient threat detection systems that can detect and recognize potentially dangerous situations, and  ...  Here, we focus on the detection of abandoned baggage at train stations, where an object is defined as abandoned in a spatio-temporal context: when its owner has left a predefined detection area for longer  ... 
doi:10.1109/avss.2007.4425322 dblp:conf/avss/BhargavaCRA07 fatcat:2xclkzrke5hl7e2fgtpaxi6num

Smart resource-aware multimedia sensor network for automatic detection of complex events

Fadi Al Machot, Carlo Tasso, Bernhard Dieber, Kyandoghere Kyamakya, Claudio Piciarelli, Christian Micheloni, Sabrina Londero, Massimiliano Valotto, Paolo Omero, Bernhard Rinner
2011 2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)  
We illustrate a surveillance system which supports human operators, by automatically detecting the complex events and giving the possibility to recall the detected events and searching them in an intelligent  ...  Four subsystems have been implemented, the tracking and detection system, the network configuration system, the reasoning system and an advanced archiving system in an annotated multimedia database.  ...  Using the temporal specification and the constraints of ASP support to prevent non logical sequences of the simple events to detect the desired scenario.  ... 
doi:10.1109/avss.2011.6027362 dblp:conf/avss/MachotTDKPMLVOR11 fatcat:mtkk7xubb5gjhgnkjet7fmnxr4

Stationary foreground detection using background subtraction and temporal difference in video surveillance

Alvaro Bayona, Juan C. SanMiguel, Jose M. Martinez
2010 2010 IEEE International Conference on Image Processing  
stationary foreground regions, which is useful for applications like the detection of abandoned/stolen objects and parked vehicles.  ...  Secondly, some modifications are introduced on this base algorithm with the purpose of reducing the amount of stationary foreground detected.  ...  In this context, detection of stationary foreground regions is one of the most critical requirements for surveillance systems based on the detection of abandoned or stolen objects [2] , or parked vehicles  ... 
doi:10.1109/icip.2010.5650699 dblp:conf/icip/BayonaSM10 fatcat:zv3ql5g7nnefjgc462zrxtai2m

Video Event Recognition for Surveillance Applications (VERSA) [article]

Stephen O'Hara
2010 arXiv   pre-print
The approach for event recognition in VERSA is using a declarative logic language to define the spatial and temporal relationships that characterize a given event or activity.  ...  Although the handling of uncertainty in the current VERSA implementation is simplistic, the language and architecture is amenable to extending using Fuzzy Logic or similar approaches.  ...  ., embodies an Event Template for detecting when a person has abandoned a previously carried object.  ... 
arXiv:1007.3772v1 fatcat:apuv2tifhzbudmtwyzbxutka3y

Automatic Scenario Recognition for Visual-Surveillance by Combining Probabilistic Graphical Approaches [chapter]

Ahmed Ziani, Cina Motame
2011 Video Surveillance  
The preliminary steps of these systems concern the motion detection, tracking of objects and their classification.  ...  system has to recognize events as "running", "inside zone Z i ", to detect interaction between objects as "object O i meets objet O j " or to recognize the trajectory of the object.  ...  This chapter is distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike-3.0 License, which permits use, distribution and reproduction for non-commercial purposes, provided  ... 
doi:10.5772/15761 fatcat:7r4pjbuetjd3vmokpeoapg3kai


Alexei A. Morozov, Olga S. Sushkova, Alexander F. Polupanov
2017 Radioelectronics Nanosystems Information Technologies  
The goal of this work is to implement the advantages of the logic programming approach in the area of 3D intelligent video surveillance.  ...  An approach to the 3D intelligent video surveillance based on the means of the objectoriented logic programming is proposed.  ...  Tolmatcheva for the help in the preparation of 3D video samples and Angelos Barmpoutis for his J4K [59] library that was used for the data collection.  ... 
doi:10.17725/rensit.2017.09.205 fatcat:p4qzuh44abgnhdwgi4i6beug7a

Temporal Logic-Based Artificial Immune System for Intrusion Detection

Xiyue Chen, Jianmin Pang, Mohammad Farukh Hashmi
2022 Wireless Communications and Mobile Computing  
Experimental results show that the proposed method can extend the detection range and improve the detection rate. This work proves the possibility of applying temporal logic to AIS system.  ...  The HD mechanism is constructed by using the advantage of temporal logic to describe time-varying behaviors in system. Finally, simulation experiments were carried out on KDD99 and NSL-KDD datasets.  ...  Acknowledgments This work is supported by National Natural Science Foundation of China (NSFC) (No.61472447).  ... 
doi:10.1155/2022/4685754 fatcat:ih3unv3kubealfberki6fpxp4i
« Previous Showing results 1 — 15 out of 28,088 results