3,404 research outputs found

    Autonomous real-time surveillance system with distributed IP cameras

    Get PDF
    An autonomous Internet Protocol (IP) camera based object tracking and behaviour identification system, capable of running in real-time on an embedded system with limited memory and processing power is presented in this paper. The main contribution of this work is the integration of processor intensive image processing algorithms on an embedded platform capable of running at real-time for monitoring the behaviour of pedestrians. The Algorithm Based Object Recognition and Tracking (ABORAT) system architecture presented here was developed on an Intel PXA270-based development board clocked at 520 MHz. The platform was connected to a commercial stationary IP-based camera in a remote monitoring station for intelligent image processing. The system is capable of detecting moving objects and their shadows in a complex environment with varying lighting intensity and moving foliage. Objects moving close to each other are also detected to extract their trajectories which are then fed into an unsupervised neural network for autonomous classification. The novel intelligent video system presented is also capable of performing simple analytic functions such as tracking and generating alerts when objects enter/leave regions or cross tripwires superimposed on live video by the operator

    Outlier detection techniques for wireless sensor networks: A survey

    Get PDF
    In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered as outliers. The potential sources of outliers include noise and errors, events, and malicious attacks on the network. Traditional outlier detection techniques are not directly applicable to wireless sensor networks due to the nature of sensor data and specific requirements and limitations of the wireless sensor networks. This survey provides a comprehensive overview of existing outlier detection techniques specifically developed for the wireless sensor networks. Additionally, it presents a technique-based taxonomy and a comparative table to be used as a guideline to select a technique suitable for the application at hand based on characteristics such as data type, outlier type, outlier identity, and outlier degree

    Advancements In Crowd-Monitoring System: A Comprehensive Analysis of Systematic Approaches and Automation Algorithms: State-of-The-Art

    Full text link
    Growing apprehensions surrounding public safety have captured the attention of numerous governments and security agencies across the globe. These entities are increasingly acknowledging the imperative need for reliable and secure crowd-monitoring systems to address these concerns. Effectively managing human gatherings necessitates proactive measures to prevent unforeseen events or complications, ensuring a safe and well-coordinated environment. The scarcity of research focusing on crowd monitoring systems and their security implications has given rise to a burgeoning area of investigation, exploring potential approaches to safeguard human congregations effectively. Crowd monitoring systems depend on a bifurcated approach, encompassing vision-based and non-vision-based technologies. An in-depth analysis of these two methodologies will be conducted in this research. The efficacy of these approaches is contingent upon the specific environment and temporal context in which they are deployed, as they each offer distinct advantages. This paper endeavors to present an in-depth analysis of the recent incorporation of artificial intelligence (AI) algorithms and models into automated systems, emphasizing their contemporary applications and effectiveness in various contexts

    Wireless Sensor Networks for Detection of IED Emplacement / 14th ICCRTS: C2 and Agility

    Get PDF
    14th International Command and Control Research and Technology Symposium (ICCRTS), June 15-17, 2009, Washington DC.This paper appeared in the Proceedings of the 14th International Command and Control Research and Technology Symposium, Washington, DC, June 2009.We are investigating the use of wireless nonimaging-sensor networks for the difficult problem of detection of suspicious behavior related to IED emplacement. Hardware for surveillance by nonimaging-sensor networks can cheaper than that for visual surveillance, can require much less computational effort by virtue of simpler algorithms, and can avoid problems of occlusion of view that occur with imaging sensors. We report on four parts of our investigation. First, we discuss some lessons we have learned from experiments with visual detection of deliberately-staged suspicious behavior, which suggest that the magnitude of the acceleration vector of a tracked person is a key clue. Second, we describe experiments we conducted with tracking of moving objects in a simulated sensor network, showing that tracking is not always possible even with excellent sensor performance due to the illconditioned nature of the mathematical problems involved. Third, we report on experiments we did with tracking from acoustic data of explosions during a NATO test. Fourth, we report on experiments we did with people crossing a live sensor network. We conclude that nonimaging-sensor networks can detect a variety of suspicious behavior, but implementation needs to address a number of tricky problems.supported in part by the National Science Foundation under the EXP Program and in part by the National Research Council under their Research Associateship Program at the Army Research Laborator

    Contemporary Affirmation of Machine Learning Models for Sensor Validation and Recommendations for Future research Directions

    Get PDF
    Wireless Sensor Networks (WSNs) are important and needed systems for the future as the notion "Internet of Things" has emerged lately. They're used for observation, tracking, or controlling of several uses in sector, health care, home, and military. Yet, the quality of info collected by sensor nodes is changed by anomalies that happen because of various grounds, including node failures, reading errors, unusual events, and malicious assaults. Thus, fault detection is a necessary procedure before it's used in making selections to make sure the quality of sensor information. A multitude of methods can be called multiple-changeable systems/agents. For example methods such as for example creating heating system, ventilation and air conditioner(HVAC) methods are changeable methods / agents . Multiple-changeable methods /agents such as for instance these commonly don't meet performance expectations imagined at design time. Such failings can be a result of a number of factors, for example difficulties due to improper installment, substandard maintenance, or products failure. These issues, or "faults," can comprise mechanical disappointments, management difficulties, design mistakes, and improper operator treatment
    corecore