Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/13753
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rao T.J.N. | - |
dc.contributor.author | Girish G.N. | - |
dc.contributor.author | Tahiliani, M.P. | - |
dc.contributor.author | Rajan J. | - |
dc.date.accessioned | 2020-03-31T14:15:20Z | - |
dc.date.available | 2020-03-31T14:15:20Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, 2018, Vol.2, pp.787-813 | en_US |
dc.identifier.uri | 10.4018/978-1-5225-7113-1.ch041 | - |
dc.identifier.uri | https://idr.nitk.ac.in/jspui/handle/123456789/13753 | - |
dc.description.abstract | Automatic visual surveillance systems serve as in-place threat detection devices being able to detect and recognize anomalous activities which otherwise would lead to potentially harmful situations, and alert the concerned authorities to take appropriate counter actions. However, development of an efficient visual surveillance system is quite challenging. Designing an unusual activity detection mechanism which is accurate and real-time is the primary challenge. Review of literature carried out led to the inference that there are some attributes which are essential for a successful unusual event detection mechanism for surveillance application. The desired approach must detect genuine anomalies in real-world scenarios with acceptable accuracy, should adapt to changing environments and, should require less computational time and memory. In this chapter, an attempt has been made to provide an insight into some of the prominent approaches employed by researchers to solve these issues with a hope that it will benefit researchers towards developing a better surveillance system. © 2019 by IGI Global. | en_US |
dc.title | Anomalous event detection methodologies for surveillance application: An insight | en_US |
dc.type | Book Chapter | en_US |
Appears in Collections: | 3. Book Chapters |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.