Please use this identifier to cite or link to this item:
http://148.72.244.84/xmlui/handle/xmlui/6324
Title: | Survey of Anomaly Detection Techniques in Intelligent Surveillance Systems |
Authors: | Viean Fuaad Abd Al-Rasheed Narjis Mezaal Shati |
Keywords: | anomalous activity, anomaly behavior, intelligent surveillance video, classification, Computer vision, crowd scene, behavior analysis, activity analysis |
Issue Date: | 2022 |
Publisher: | University of Diyala |
Citation: | https://dx.doi.org/10.24237/djps.1804.594B |
Abstract: | Smart surveillance systems are used to monitor specific regions such as houses, businesses, and borders. For a long time, abnormality detection in time-series data has been a significant study area. In today's society, unusual conduct signifies a threat or risk to others. An anomaly is something that deviates from what is anticipated, common, or usual. The most unexpected aspect of human behavior is determining if it is dubious or normal. It is extremely difficult to continually monitor public locations. Effective monitoring methods are critical to consistently increase the demand for successful inspection of open areas, handling difficulties such as traffic congestion, and ambiguities in crowded scenes. Handling millions of people during Hajj, intruder detection, fall detection, and so on. Raising knowledge of intelligent video surveillance technology and improving the degree of intelligent video surveillance has resulted in a reduction in data observation time. And analysis time has been reduced by half. Technology had advanced far too quickly. When introducing machine learning, artificial intelligence, and deep learning into the system, anomaly detection methods were developed using statistical models. |
URI: | http://148.72.244.84:8080/xmlui/handle/xmlui/6324 |
ISSN: | 2222-8373 |
Appears in Collections: | مجلة ديالى للعلوم الاكاديمية / Academic Science Journal (Acad. Sci. J.) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2cb20b10115f9f6a.pdf | 1.28 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.