Zacytuj

[1] IHS Markit video surveillance, “Top Video Surveillance Trends for 2017,” Mark. Week, pp. 14–18, 2016.Search in Google Scholar

[2] M. Andersson, J. Rydell, and J. Ahlberg, “Estimation of Crowd Behavior Using Sensor Networks and Sensor Fusion,” 12th Int. Conf. Inf. Fusion, Aug. 2009.Search in Google Scholar

[3] A. Kondrova, Kongnitīvo procesu sistēma. Rīga, 2010.Search in Google Scholar

[4] H. U. Keval, “Effective, Design, Configuration, and Use of Digital CCTV,” Doctoral thesis, University College London, 2009.Search in Google Scholar

[5] M. W. Baig, E. I. Barakova, L. Marcenaro, M. Rauterberg, and C. S. Regazzoni, “Crowd Emotion Detection Using Dynamic Probabilistic Models,” in From Animals to Animals 13, A. P. del Pobil, E. Martinez-Martin, J. Hallam, E. Cervera, A. Morales, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014, pp. 328–337. https://doi.org/10.1007/978-3-319-08864-8_3210.1007/978-3-319-08864-8_32Search in Google Scholar

[6] W. Little, Introduction to Sociology – 1st Canadian Edition Edition. pp. 141–168, 2014.Search in Google Scholar

[7] Y. Koizumi, S. Saito, H. Uematsu, Y. Kawachi, and N. Harada, “Unsupervised Detection of Anomalous Sound based on Deep Learning and the Neyman-Pearson Lemma,” IEEE/ACM Transactions on Audio, Speech, and Language Processing, vol. 27, no. 1, pp. 212–224, Jan. 2019. https://doi.org/10.1109/taslp.2018.287725810.1109/TASLP.2018.2877258Search in Google Scholar

[8] D. Chakrabarty and M. Elhilali, “Abnormal Sound Event Detection Using Temporal Trajectories Mixtures,” 2016 IEEE Int. Conf. Acoust. Speech Signal Process., pp. 216–220, 2016. https://doi.org/10.1109/ICASSP.2016.747166810.1109/ICASSP.2016.7471668Search in Google Scholar

[9] A. G. Abuarafah, M. O. Khozium, and E. Abdrabou, “Real-Time Crowd Monitoring Using Infrared Thermal Video Sequences,” J. Am. Sci., vol. 8, no. 3, 2012.Search in Google Scholar

[10] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, Jul. 2009. https://doi.org/10.1145/1541880.154188210.1145/1541880.1541882Search in Google Scholar

[11] H. Parvin, H. Alizadeh, and B. Minati, “A Modification on k-Nearest Neighbor Classifier,” Global Journal of Computer Science and Technology, vol. 10, no. 14, pp. 37–41, 2010.Search in Google Scholar

[12] R. Chalapathy and S. Chawla, “Deep Learning for Anomaly Detection: A Survey,” pp. 1–50, 2019.10.1145/3394486.3406704Search in Google Scholar

[13] Y. Chen, J. Qian, and V. Saligrama, “A New One-Class SVM for Anomaly Detection,” in 2013 IEEE International Conference on Acoustics, Speech and Signal Processing, pp. 3567–3571, 2013. https://doi.org/10.1109/ICASSP.2013.663832210.1109/ICASSP.2013.6638322Search in Google Scholar

[14] F. T. Liu and K. M. Ting, “Isolation Forest,” 2008 Eighth IEEE Int. Conf. Data Min., pp. 413–422, Dec. 2008. https://doi.org/10.1109/ICDM.2008.1710.1109/ICDM.2008.17Search in Google Scholar

[15] C. Chen, Y. Shao, and X. Bi, “Detection of Anomalous Crowd Behavior Based on the Acceleration Feature,” IEEE Sens. J., vol. 15, no. 12, pp. 7252–7261, 2015. https://doi.org/10.1109/JSEN.2015.247296010.1109/JSEN.2015.2472960Search in Google Scholar

[16] J. Z. C. Lai and T. J. Huang, “Fast Global k-Means Clustering Using Cluster Membership and Inequality,” Pattern Recognit., vol. 43, no. 5, pp. 1954–1963, 2010. https://doi.org/10.1016/j.patcog.2009.11.02110.1016/j.patcog.2009.11.021Search in Google Scholar

[17] M. M. Breunig, H. Kriegel, R. T. Ng, and J. Sander, “LOF: Identifying Density-Based Local Outliers,” in Proceedings of the 2000 ACM SIGMOD international conference on Management of data (SIGMOD ’00), pp. 1–12, 2000. https://doi.org/10.1145/342009.33538810.1145/342009.335388Search in Google Scholar

[18] M. Markou and S. Singh, “Novelty Detection: A Review – Part 1: Statistical Approaches,” Signal Processing, vol. 83, no. 12, pp. 2481–2497, Dec. 2003. https://doi.org/10.1016/j.sigpro.2003.07.01810.1016/j.sigpro.2003.07.018Search in Google Scholar

[19] W.-L. Hsu, Y.-C. Wang, and C.-L. Lin, “Abnormal Crowd Event Detection Based on Outlier in Time,” in 2014 Int. Conf. Mach. Learn. Cybern., vol. 1, pp. 359–363, 2014. https://doi.org/10.1109/icmlc.2014.700914210.1109/ICMLC.2014.7009142Search in Google Scholar

[20] T. Hassner, Y. Itcher, and O. Kliper-Gross, “Violent Flows: Real-Time Detection of Violent Crowd Behavior *,” 2012 IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit. Work., pp. 1–6, 2012. https://doi.org/10.1109/CVPRW.2012.623934810.1109/CVPRW.2012.6239348Search in Google Scholar

[21] C.-L. L. Wei-Lieh Hsu, Yu-Cheng Wang, “Spatio-Temporal Anomaly Detection in Crowd Movement Using SIFT,” in Proc. 2014 Int. Conf. Mach. Learn. Cybern., 2014.Search in Google Scholar

[22] Y.-T. Matsuda, T. Fujimura, K. Katahira, M. Okada, K. Ueno, K. Cheng, and K. Okanoya, “The Implicit Processing of Categorical and Dimensional Strategies: An fMRI Study of Facial Emotion Perception,” Front. Hum. Neurosci., vol. 7, no. September, 2013. https://doi.org/10.3389/fnhum.2013.0055110.3389/fnhum.2013.00551378383924133426Search in Google Scholar

[23] R. Fan, K. Xu, and J. Zhao, “Higher Contagion and Weaker Ties Mean Anger Spreads Faster Than Joy in Social Media,” pp. 1–23, 2016.Search in Google Scholar

[24] L. Coviello, J. H. Fowler, and M. Franceschetti, “Words on the Web: Noninvasive Detection of Emotional Contagion in Online Social Networks,” in Proc. IEEE, vol. 102, no. 12, pp. 1911–1921, 2014. https://doi.org/10.1109/JPROC.2014.236605210.1109/JPROC.2014.2366052Search in Google Scholar

[25] D. Mehta, M. F. H. Siddiqui, and A. Y. Javaid, “Facial Emotion Recognition: A Survey and Real-World User Experiences in Mixed Reality,” Sensors, vol. 18, no. 2, pp. 416, 2018. https://doi.org/10.3390/s1802041610.3390/s18020416585613229389845Search in Google Scholar

[26] S. Petrovica and H. K. Ekene, “Emotion Recognition for Intelligent Tutoring,” CEUR Workshop Proc., vol. 1684, 2016.Search in Google Scholar

[27] Z. S. Hippe, J. L. Kulikowski, T. Mroczek, and J. Wtorek, “Emotion Recognition and Its Applications,” Adv. Intell. Syst. Comput., vol. 300, no. July, 2014.Search in Google Scholar

[28] K. Glanz, “Social and Behavioral Theories 1. Learning Objectives,” Off. Behav. Soc. Sci. Res., 2005.Search in Google Scholar

[29] G. Bradski, “The OpenCV Library,” Dr. Dobb’s J. Softw. Tools, vol. 120, pp. 122–125, 2000.Search in Google Scholar

[30] J. Redmon and A. Farhadi, YOLO v.3, 2018.Search in Google Scholar

[31] J. Redmon, “Darknet: Open Source Neural Networks in C,” Pjreddie. [Online]. Available: http://pjreddie.com/darknet/Search in Google Scholar

[32] T.-Y. Lin, M. Maire, S. Belongie, J. Hays, P. Perona, D. Ramanan, P. Dollár, and C. L. Zitnick, “Microsoft COCO: Common Objects in Context,” Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8693 LNCS, no. PART 5, pp. 740–755, 2014. https://doi.org/10.1007/978-3-319-10602-1_4810.1007/978-3-319-10602-1_48Search in Google Scholar

[33] A. Bewley, Z. Ge, L. Ott, F. Ramos, and B. Upcroft, “Simple Online and Realtime Tracking,” in 2016 IEEE International Conference on Image Processing (ICIP), 2016, pp. 3464–3468. https://doi.org/10.1109/ICIP.2016.753300310.1109/ICIP.2016.7533003Search in Google Scholar

[34] T. Simon, H. Joo, I. Matthews, and Y. Sheikh, “Hand Keypoint Detection in Single Images Using Multiview Bootstrapping,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 4645–4653, 2017. https://doi.org/10.1109/CVPR.2017.49410.1109/CVPR.2017.494Search in Google Scholar

[35] Z. Cao, T. Simon, S.-E. Wei, and Y. Sheikh, “Realtime Multi-Person 2D Pose Estimation Using Part Affinity Fields,” in 2017 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 1302–1310, 2017. https://doi.org/10.1109/CVPR.2017.14310.1109/CVPR.2017.143Search in Google Scholar

[36] S.-E. Wei, V. Ramakrishna, T. Kanade, and Y. Sheikh, “Convolutional Pose Machines,” in Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 4724–4732, 2016. https://doi.org/10.1109/CVPR.2016.51110.1109/CVPR.2016.511Search in Google Scholar

eISSN:
2255-8691
Język:
Angielski
Częstotliwość wydawania:
2 razy w roku
Dziedziny czasopisma:
Computer Sciences, Artificial Intelligence, Information Technology, Project Management, Software Development