6,253 research outputs found

    Graph Laplacian for Image Anomaly Detection

    Get PDF
    Reed-Xiaoli detector (RXD) is recognized as the benchmark algorithm for image anomaly detection; however, it presents known limitations, namely the dependence over the image following a multivariate Gaussian model, the estimation and inversion of a high-dimensional covariance matrix, and the inability to effectively include spatial awareness in its evaluation. In this work, a novel graph-based solution to the image anomaly detection problem is proposed; leveraging the graph Fourier transform, we are able to overcome some of RXD's limitations while reducing computational cost at the same time. Tests over both hyperspectral and medical images, using both synthetic and real anomalies, prove the proposed technique is able to obtain significant gains over performance by other algorithms in the state of the art.Comment: Published in Machine Vision and Applications (Springer

    Online real-time crowd behavior detection in video sequences

    Get PDF
    Automatically detecting events in crowded scenes is a challenging task in Computer Vision. A number of offline approaches have been proposed for solving the problem of crowd behavior detection, however the offline assumption limits their application in real-world video surveillance systems. In this paper, we propose an online and real-time method for detecting events in crowded video sequences. The proposed approach is based on the combination of visual feature extraction and image segmentation and it works without the need of a training phase. A quantitative experimental evaluation has been carried out on multiple publicly available video sequences, containing data from various crowd scenarios and different types of events, to demonstrate the effectiveness of the approach

    Autonomous real-time surveillance system with distributed IP cameras

    Get PDF
    An autonomous Internet Protocol (IP) camera based object tracking and behaviour identification system, capable of running in real-time on an embedded system with limited memory and processing power is presented in this paper. The main contribution of this work is the integration of processor intensive image processing algorithms on an embedded platform capable of running at real-time for monitoring the behaviour of pedestrians. The Algorithm Based Object Recognition and Tracking (ABORAT) system architecture presented here was developed on an Intel PXA270-based development board clocked at 520 MHz. The platform was connected to a commercial stationary IP-based camera in a remote monitoring station for intelligent image processing. The system is capable of detecting moving objects and their shadows in a complex environment with varying lighting intensity and moving foliage. Objects moving close to each other are also detected to extract their trajectories which are then fed into an unsupervised neural network for autonomous classification. The novel intelligent video system presented is also capable of performing simple analytic functions such as tracking and generating alerts when objects enter/leave regions or cross tripwires superimposed on live video by the operator

    The dendritic cell algorithm for intrusion detection

    Get PDF

    The dendritic cell algorithm for intrusion detection

    Get PDF
    As one of the solutions to intrusion detection problems, Artificial Immune Systems (AIS) have shown their advantages. Unlike genetic algorithms, there is no one archetypal AIS, instead there are four major paradigms. Among them, the Dendritic Cell Algorithm (DCA) has produced promising results in various applications. The aim of this chapter is to demonstrate the potential for the DCA as a suitable candidate for intrusion detection problems. We review some of the commonly used AIS paradigms for intrusion detection problems and demonstrate the advantages of one particular algorithm, the DCA. In order to clearly describe the algorithm, the background to its development and a formal definition are given. In addition, improvements to the original DCA are presented and their implications are discussed, including previous work done on an online analysis component with segmentation and ongoing work on automated data preprocessing. Based on preliminary results, both improvements appear to be promising for online anomaly-based intrusion detection.Comment: Bio-Inspired Communications and Networking, IGI Global, 84-102, 201

    Monitoring of Tool and Component Wear for Self-Adaptive Digital Twins: A Multi-Stage Approach through Anomaly Detection and Wear Cycle Analysis

    Get PDF
    In today’s manufacturing landscape, Digital Twins play a pivotal role in optimising processes and deriving actionable insights that extend beyond on-site calculations. These dynamic representations of systems demand real-time data on the actual state of machinery, rather than static images depicting idealized configurations. This paper presents a novel approach for monitoring tool and component wear in CNC milling machines by segmenting and classifying individual machining cycles. The method assumes recurring sequences, even with a batch size of 1, and considers a progressive increase in tool wear between cycles. The algorithms effectively segment and classify cycles based on path length, spindle speed and cycle duration. The tool condition index for each cycle is determined by considering all axis signals, with upper and lower thresholds established for quantifying tool conditions. The same approach is adapted to predict component wear progression in machine tools, ensuring robust condition determination. A percentage-based component state description is achieved by comparing it to the corresponding Tool Condition Codes (TCC) range. This method provides a four-class estimation of the component state. The approach has demonstrated robustness in various validation cases
    corecore