{"title":"浅谈视频监控系统中的可疑行为发现","authors":"Yingjie Li, Yixin Yin","doi":"10.1109/WKDD.2009.22","DOIUrl":null,"url":null,"abstract":"Video surveillance systems are becoming common in commercial, industrial, and residential environments. The systems in used are constructed mainly by hard devices with no or very few soft intelligence. It is difficult for human to recognize important events as they happening and to control over unwilling situations by staring at the screens all the time. Soft intelligence to identify human behaviors in the surveillance systems is expected. A system’s architecture for this goal is presented in this paper. Bottom-up processing methods and top-down design schemes are integrated in the architecture. The integration may increase the accuracy of relevance algorithms and reduce the computing cost. The feasibility of the system is assured.","PeriodicalId":143250,"journal":{"name":"2009 Second International Workshop on Knowledge Discovery and Data Mining","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Towards Suspicious Behavior Discovery in Video Surveillance System\",\"authors\":\"Yingjie Li, Yixin Yin\",\"doi\":\"10.1109/WKDD.2009.22\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Video surveillance systems are becoming common in commercial, industrial, and residential environments. The systems in used are constructed mainly by hard devices with no or very few soft intelligence. It is difficult for human to recognize important events as they happening and to control over unwilling situations by staring at the screens all the time. Soft intelligence to identify human behaviors in the surveillance systems is expected. A system’s architecture for this goal is presented in this paper. Bottom-up processing methods and top-down design schemes are integrated in the architecture. The integration may increase the accuracy of relevance algorithms and reduce the computing cost. The feasibility of the system is assured.\",\"PeriodicalId\":143250,\"journal\":{\"name\":\"2009 Second International Workshop on Knowledge Discovery and Data Mining\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-01-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Second International Workshop on Knowledge Discovery and Data Mining\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/WKDD.2009.22\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Second International Workshop on Knowledge Discovery and Data Mining","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WKDD.2009.22","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Towards Suspicious Behavior Discovery in Video Surveillance System
Video surveillance systems are becoming common in commercial, industrial, and residential environments. The systems in used are constructed mainly by hard devices with no or very few soft intelligence. It is difficult for human to recognize important events as they happening and to control over unwilling situations by staring at the screens all the time. Soft intelligence to identify human behaviors in the surveillance systems is expected. A system’s architecture for this goal is presented in this paper. Bottom-up processing methods and top-down design schemes are integrated in the architecture. The integration may increase the accuracy of relevance algorithms and reduce the computing cost. The feasibility of the system is assured.