A water environment security monitoring algorithm based on intelligent video surveillance

被引:3
|
作者
Pang, Zihan [1 ]
Jia, Kebin [1 ]
Feng, Jinchao [1 ]
机构
[1] Beijing Univ Technol, Sch Elect Informat & Control Engn, Beijing, Peoples R China
关键词
water security environment; evaluation model; SVM;
D O I
10.1109/IIH-MSP.2014.54
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The rational allocation of water resources has become an important prerequisite for the protection of national economic and social sustainable development as the China economic develops rapidly, therefore establishing water security environment monitoring and evaluation mechanisms is a good way for providing services and solutions for regional environmental management and accident pollution. Considering features of super-large water transmission engineering, water environmental safety level assessment strategy based on intelligent video surveillance is designed. According to features of main water surface and that of moving target, and by using SVM the corresponding water environment security level classification model is designed. The application of sample offline learning methods guaranteed efficiency and accuracy of water quality assessment, and the results of several kernels are also analyzed and verified via tests. This algorithm has been successfully used in the central line project of south-to-north water diversion, and the test result shows that this algorithm is of high robustness and accuracy.
引用
收藏
页码:191 / 194
页数:4
相关论文
共 50 条
  • [1] Intelligent security video surveillance system based on DaVinci technology
    Cui Baoxia
    Cui Junjie
    Duan Yong
    [J]. 2013 FIFTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2013), 2013, : 655 - 658
  • [2] Intelligent monitoring of indoor surveillance video based on deep learning
    Liu, Yun-Xia
    Yang, Yang
    Shi, Aijun
    Peng Jigang
    Liu Haowei
    [J]. 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 648 - 653
  • [3] Intelligent Video Surveillance System in factory Based on TLD Algorithm
    Li, Yong
    Cai, Kejie
    [J]. 2017 CHINESE AUTOMATION CONGRESS (CAC), 2017, : 5993 - 5997
  • [4] Cloud Computing Based Intelligent Video Surveillance Framework for Logistics Security
    Alruwaili, Omar
    Armghan, Ammar
    Salem Alshudukhi, Khulud
    Flah, Aymen
    Pergl, Ivo
    [J]. IEEE Access, 2024, 12 : 150604 - 150622
  • [5] Ontology-Based Intelligent Security Framework for Smart Video Surveillance
    Shifa, Amna
    Asghar, Mamoona Naveed
    Fleury, Martin
    Afgan, Muhammad Sher
    [J]. PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 : 118 - 126
  • [6] Intelligent Video Surveillance for Animal Behavior Monitoring
    Aouayeb, Souhaieb
    Desquesnes, Xavier
    Emile, Bruno
    Mulot, Baptiste
    Treuillet, Sylvie
    [J]. IMAGE ANALYSIS AND PROCESSING, ICIAP 2022 WORKSHOPS, PT II, 2022, 13374 : 361 - 371
  • [7] AN INTELLIGENT EVENT DETECTION AND ALARM BASED SURVEILLANCE ALGORITHM FOR VIDEO SUMMARIZATION
    Javed, Ali
    Noman, Sidra
    [J]. 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING ( ICACTE 2011), 2011, : 817 - 821
  • [8] A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment
    Park, Juhyun
    Choi, Jeonghun
    Park, Myoungheum
    Hong, Sukwon
    Kim, Hyomin
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 211 - 216
  • [9] Fuzzy Judgment Algorithm Based on Security Alarm System in the Video Surveillance
    Long, Hao
    Huo, Na
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1663 - 1666
  • [10] An Intelligent Surveillance Video Analysis Service in Cloud Environment
    Chen, Tse-Shih
    Lin, Ming-Fen
    Chieuh, Tzi-cker
    Chang, Cheng-Hsin
    Tai, Wei-Heng
    [J]. 49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 1 - 6