A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2011; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detection of object abandonment using temporal logic
2009
Machine Vision and Applications
This paper describes a novel framework for a smart threat detection system that uses computer vision to capture, exploit and interpret the temporal flow of events related to the abandonment of an object ...
When an unattended object is detected, the system traces it back in time to determine and record who its most likely owner(s) may be. ...
Stauffer and Grimson [19] present an event detection module that classifies objects, including abandoned objects, using a neural network, but is limited to detecting only one abandoned object at a time ...
doi:10.1007/s00138-008-0181-8
fatcat:6ze7jwkzwfe63b6ty6pswp6v3i
Realization of Scenarios for Video Surveillance
2012
Image Processing & Communications
We briefly describe base algorithms (object detection, object localization, recognition of humans, movement detection and configuration of scene) used in three selected scenarios: violation of protected ...
zones, abandoned objects and vandalism (graffiti). ...
Another logical system considered for use in the recognition of objects and their behavior is a temporal logic. ...
doi:10.2478/v10248-012-0051-x
fatcat:z3zbco6zfrhsleyktxrxax3ao4
Abandoned Object Detection via Temporal Consistency Modeling and Back-Tracing Verification for Visual Surveillance
2018
IARJSET
We introduce an abandoned object detection tool based on a set of possible events and on a set of rules to act upon those events. ...
Abandoned object detection is an essential requirement in many video surveillance contexts. ...
Therefore, they propose an object search method which is adapted to transformation of the object. they use a template matching using Genetic Algorithm (GA) for detection of abandoned objects. ...
doi:10.17148/iarjset.2018.592
fatcat:lu4zh42tyna6noeudwtem7ld54
Robust abandoned object detection integrating wide area visual surveillance and social context
2013
Pattern Recognition Letters
This paper presents a video surveillance framework that robustly and efficiently detects abandoned objects in surveillance scenes. ...
The framework is based on a novel threat assessment algorithm which combines the concept of ownership with automatic understanding of social relations in order to infer abandonment of objects. ...
Any opinions expressed in this paper do not necessarily reflect the views of the European Community. The Community is not liable for any use that may be made of the information contained herein. ...
doi:10.1016/j.patrec.2013.01.018
fatcat:tredjkkbsfddzogbvkejikybbm
A semantic-based probabilistic approach for real-time video event recognition
2012
Computer Vision and Image Understanding
Then, we eciently organize such strategies for performing the recognition according to the temporal characteristics of events. ...
We demonstrate the validity of the proposed approach for recognizing human-object interactions in the video monitoring domain. ...
For the Abandoned-object PN, the left side denes the typical model for detecting abandoned objects [31] whilst the right side describes their detection considering that the action owner is not likely ...
doi:10.1016/j.cviu.2012.04.005
fatcat:27heofdnqnegjf77ac7gklu47y
Modeling and Recognition of Video Events with Fuzzy Semantic Petri Nets
[chapter]
2016
Advances in Intelligent Systems and Computing
The ontology stores assertions (facts) concerning classification of objects and detected relations. Fuzzy predicates querying the ontology content are used as guards of transitions in FSPN. ...
The Petri net structure is obtained by translating a Linear Temporal Logic formula specifying a scenario in a human-readable form. ...
Formulas in temporal logic are constructed from propositions linked by classical logic operators and temporal operators. ...
doi:10.1007/978-3-319-19090-7_38
fatcat:ki4twcmfizhvrcrjgtgmtvjpqi
Robust Real-time Detection of Abandoned Objects using a Dual Background Model
2020
KSII Transactions on Internet and Information Systems
, long-term abandonment, and owner's re-attendance as well as general detection of abandoned objects. ...
Detection of abandoned objects for smart video surveillance should be robust and accurate in various situations with low computational costs. ...
of Abandoned Objects using a Dual Background Model ...
doi:10.3837/tiis.2020.02.017
fatcat:geo6rqoo7vh5rnch5nz3ie5d6y
Abandoned object detection using operator-space pursuit
2015
2015 IEEE International Conference on Image Processing (ICIP)
This work presents a framework to be used in the detection of abandoned objects and other video events in a cluttered environment with a moving camera. ...
In the proposed method a target video, that may have features we would like to detect, is compared with a preacquired reference video, which is assumed to have no objects nor video events of interest. ...
CONCLUSIONS This paper presented a new method to detect abandoned objects and video events in a cluttered environment without the need of previous registration or fine temporal alignment. ...
doi:10.1109/icip.2015.7351147
dblp:conf/icip/ThomazSSNBK15
fatcat:lhcewwsbvja3le5qiuwowosigu
Detection of abandoned objects in crowded environments
2007
2007 IEEE Conference on Advanced Video and Signal Based Surveillance
Of particular significance is the case of unattended objects in mass transit areas. ...
With concerns about terrorism and global security on the rise, it has become vital to have in place efficient threat detection systems that can detect and recognize potentially dangerous situations, and ...
Here, we focus on the detection of abandoned baggage at train stations, where an object is defined as abandoned in a spatio-temporal context: when its owner has left a predefined detection area for longer ...
doi:10.1109/avss.2007.4425322
dblp:conf/avss/BhargavaCRA07
fatcat:2xclkzrke5hl7e2fgtpaxi6num
Smart resource-aware multimedia sensor network for automatic detection of complex events
2011
2011 8th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)
We illustrate a surveillance system which supports human operators, by automatically detecting the complex events and giving the possibility to recall the detected events and searching them in an intelligent ...
Four subsystems have been implemented, the tracking and detection system, the network configuration system, the reasoning system and an advanced archiving system in an annotated multimedia database. ...
Using the temporal specification and the constraints of ASP support to prevent non logical sequences of the simple events to detect the desired scenario. ...
doi:10.1109/avss.2011.6027362
dblp:conf/avss/MachotTDKPMLVOR11
fatcat:mtkk7xubb5gjhgnkjet7fmnxr4
Stationary foreground detection using background subtraction and temporal difference in video surveillance
2010
2010 IEEE International Conference on Image Processing
stationary foreground regions, which is useful for applications like the detection of abandoned/stolen objects and parked vehicles. ...
Secondly, some modifications are introduced on this base algorithm with the purpose of reducing the amount of stationary foreground detected. ...
In this context, detection of stationary foreground regions is one of the most critical requirements for surveillance systems based on the detection of abandoned or stolen objects [2] , or parked vehicles ...
doi:10.1109/icip.2010.5650699
dblp:conf/icip/BayonaSM10
fatcat:zv3ql5g7nnefjgc462zrxtai2m
Video Event Recognition for Surveillance Applications (VERSA)
[article]
2010
arXiv
pre-print
The approach for event recognition in VERSA is using a declarative logic language to define the spatial and temporal relationships that characterize a given event or activity. ...
Although the handling of uncertainty in the current VERSA implementation is simplistic, the language and architecture is amenable to extending using Fuzzy Logic or similar approaches. ...
., embodies an Event Template for detecting when a person has abandoned a
previously carried object. ...
arXiv:1007.3772v1
fatcat:apuv2tifhzbudmtwyzbxutka3y
Automatic Scenario Recognition for Visual-Surveillance by Combining Probabilistic Graphical Approaches
[chapter]
2011
Video Surveillance
The preliminary steps of these systems concern the motion detection, tracking of objects and their classification. ...
system has to recognize events as "running", "inside zone Z i ", to detect interaction between objects as "object O i meets objet O j " or to recognize the trajectory of the object. ...
This chapter is distributed under the terms of the Creative Commons Attribution-NonCommercial-ShareAlike-3.0 License, which permits use, distribution and reproduction for non-commercial purposes, provided ...
doi:10.5772/15761
fatcat:7r4pjbuetjd3vmokpeoapg3kai
OBJECT-ORIENTED LOGIC PROGRAMMING OF 3D INTELLIGENT VIDEO SURVEILLANCE SYSTEMS: THE PROBLEM STATEMENT
ОБЪЕКТНО-ОРИЕНТИРОВАННОЕ ЛОГИЧЕСКОЕ ПРОГРАММИРОВАНИЕ СИСТЕМ 3D ИНТЕЛЛЕКТУАЛЬНОГО ВИДЕОНАБЛЮДЕНИЯ: ПОСТАНОВКА ЗАДАЧИ
2017
Radioelectronics Nanosystems Information Technologies
ОБЪЕКТНО-ОРИЕНТИРОВАННОЕ ЛОГИЧЕСКОЕ ПРОГРАММИРОВАНИЕ СИСТЕМ 3D ИНТЕЛЛЕКТУАЛЬНОГО ВИДЕОНАБЛЮДЕНИЯ: ПОСТАНОВКА ЗАДАЧИ
The goal of this work is to implement the advantages of the logic programming approach in the area of 3D intelligent video surveillance. ...
An approach to the 3D intelligent video surveillance based on the means of the objectoriented logic programming is proposed. ...
Tolmatcheva for the help in the preparation of 3D video samples and Angelos Barmpoutis for his J4K [59] library that was used for the data collection. ...
doi:10.17725/rensit.2017.09.205
fatcat:p4qzuh44abgnhdwgi4i6beug7a
Temporal Logic-Based Artificial Immune System for Intrusion Detection
2022
Wireless Communications and Mobile Computing
Experimental results show that the proposed method can extend the detection range and improve the detection rate. This work proves the possibility of applying temporal logic to AIS system. ...
The HD mechanism is constructed by using the advantage of temporal logic to describe time-varying behaviors in system. Finally, simulation experiments were carried out on KDD99 and NSL-KDD datasets. ...
Acknowledgments This work is supported by National Natural Science Foundation of China (NSFC) (No.61472447). ...
doi:10.1155/2022/4685754
fatcat:ih3unv3kubealfberki6fpxp4i
« Previous
Showing results 1 — 15 out of 28,088 results