Suspicious behavior detection based on DECOC classifier

被引:0
|
作者
Ben Ayed, Mossaad [1 ]
Abid, Mohamed [2 ]
机构
[1] Sfax Univ, Comp Embedded Syst Lab, Sfax, Tunisia
[2] Univ Sfax, Natl Sch Engn Sfax, Comp Embedded Syst Lab, Sfax, Tunisia
关键词
component; Surveillance system; suspicious behaviors; tracking; DECOC; intelligent system; VISUAL SURVEILLANCE; SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Video surveillance systems become quickly an essential criteria and requirement for safety systems. The traditional systems based on manual vision should be replaced by intelligent decision. These systems suffer from not only lack of confidence but also from the worst accuracy. Many intelligent systems are proposed in literature to ensure automation and intelligent decision. Suspicious behavior as a particular case of surveillance, presents a great challenge. Problems faced of researchers are the difficulty of the behavior's detection and the real-time processing. This paper is focused in an abnormal behavior detection. A suspicious behavior recognition is proposed using Data-driven Error Correcting Output Code (DECOC) classifier. The proposed is proved in the experiment section in comparison with the most recent approaches.
引用
收藏
页码:594 / 598
页数:5
相关论文
共 50 条
  • [31] Rejection based classifier for face detection
    Elad, M
    Hel-Or, Y
    Keshet, R
    PATTERN RECOGNITION LETTERS, 2002, 23 (12) : 1459 - 1471
  • [32] BBAC: Behavior-based access control to detect user suspicious behavior
    Rikhtechi, Leila
    Rafeh, Vahid
    Rezakhani, Afshin
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (06) : 8207 - 8220
  • [33] SUSPICIOUS OBJECT DETECTION
    Joshi, Tarushikha
    Aarya, Harsh
    Kumar, Prashant
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION, & AUTOMATION (ICACCA) (FALL), 2016, : 146 - 151
  • [34] Detecting Suspicious Behavior Using a Graph-Based Approach
    Mookiah, Lenin
    Eberle, William
    Holder, Lawrence
    2014 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2014, : 357 - 358
  • [35] Suspicious Criminal Behavior Prediction Based on Roaming Trajectory Characteristics
    Wu, Xiaoquan
    Yan, Biying
    Chen, Feng
    Cao, Yaqi
    Zhang, Siqing
    Chen, Guanyu
    Cao, Rong
    Xia, Mengjun
    PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT), 2020, : 1023 - 1028
  • [36] Recognition of suspicious behavior using case-based reasoning
    夏利民
    杨宝娟
    涂宏斌
    JournalofCentralSouthUniversity, 2015, 22 (01) : 241 - 250
  • [37] Recognition of suspicious behavior using case-based reasoning
    Xia Li-min
    Yang Bao-juan
    Tu Hong-bin
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2015, 22 (01) : 241 - 250
  • [38] Recognition of suspicious behavior using case-based reasoning
    Li-min Xia
    Bao-juan Yang
    Hong-bin Tu
    Journal of Central South University, 2015, 22 : 241 - 250
  • [39] How "Suspicious" Is That Nodule? Review of "Suspicious" Afirma Gene Expression Classifier in High Risk Thyroid Nodules
    Roychoudhury, Sudarshana
    Klein, Melissa
    Souza, Fabiola
    Gimenez, Cecilia
    Laser, Alice
    Cocker, Rubina Shaheen
    Chau, Karen
    Das, Kasturi
    DIAGNOSTIC CYTOPATHOLOGY, 2017, 45 (04) : 308 - 311
  • [40] AN ALIASING DETECTION ALGORITHM BASED ON SUSPICIOUS COLOCALIZATIONS OF FOURIER COEFFICIENTS
    Coulange, Baptiste
    Moisan, Lionel
    2010 IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, 2010, : 2013 - 2016