Intruder detection in camera networks using the one-class neighbor machine
We propose a new algorithm based on machine learning techniques for automatic intruder detection in surveillance networks. The algorithm is theoretically founded on the concept of minimum volume sets. Through application to real images from an example, simple closed-circuit television system and com...
| Main Authors: | Ahmed, Tarem Ozair, Wei, Xianglin, Ahmed, Supriyo, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/1417/ http://irep.iium.edu.my/1417/1/Paper_3_NAEC-tarem.pdf |
Similar Items
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Automated surveillance in distributed, wireless visual networks: a comparative study
by: Ahmed, Tarem, et al.
Published: (2013)
by: Ahmed, Tarem, et al.
Published: (2013)
Automated surveillance in distributed, visual networks: an empirical comparison of recent algorithms
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Night vision camera system for intruder detection in indoor and outdoor environment
by: Sak, Jenn Shin
Published: (2015)
by: Sak, Jenn Shin
Published: (2015)
PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA
by: Wei, Xianglin, et al.
Published: (2012)
by: Wei, Xianglin, et al.
Published: (2012)
Intruder detection
by: Muhamad Haffiz, Muhamad Adlin
Published: (2013)
by: Muhamad Haffiz, Muhamad Adlin
Published: (2013)
SMART: a subspace based malicious peers detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2013)
by: Wei, Xianglin, et al.
Published: (2013)
A pay-and-stay model for tackling intruders in hybrid wireless mesh networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Intruder detection using histogram and edge detection algorithms
by: Tan, Kai Yang
Published: (2016)
by: Tan, Kai Yang
Published: (2016)
Robbery Scene Detection Detect Intruders to Home Area
by: Chin, Wai Kit
Published: (2016)
by: Chin, Wai Kit
Published: (2016)
An efficient routing protocol for mobile ad hoc networks with Neighbor Awareness and Multicasting
by: Pathan, Al-Sakib Khan, et al.
Published: (2004)
by: Pathan, Al-Sakib Khan, et al.
Published: (2004)
NAMP: Neighbor Aware Multicast Routing Protocol for mobile ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Low Cost Night Vision System for Intruder Detection
by: Ng Liang, Shing, et al.
Published: (2015)
by: Ng Liang, Shing, et al.
Published: (2015)
Intruding the forbidden sea of money laundering
by: Chen, Kendra Jing Wen, et al.
Published: (2018)
by: Chen, Kendra Jing Wen, et al.
Published: (2018)
Property premises intruders detection using face recognition method / Joveni Henry
by: Joveni Henry
Published: (2017)
by: Joveni Henry
Published: (2017)
Intruder localization wireless sensor network radar design with virtual reference tags
by: Abdullah, Hadi
Published: (2014)
by: Abdullah, Hadi
Published: (2014)
You tube spam comment detection using support vector machine and k–nearest neighbor
by: Aziz, Aqliima, et al.
Published: (2017)
by: Aziz, Aqliima, et al.
Published: (2017)
Neighbor Selection Protocol for Heterogeneous Information Dissemination in Opportunistic Networks
by: Halikul, Lenando, et al.
Published: (2015)
by: Halikul, Lenando, et al.
Published: (2015)
Unmanned aerial vehicle with night vision for tracking intruder
by: Dhinesh, Ramotharan
Published: (2015)
by: Dhinesh, Ramotharan
Published: (2015)
One-class support vector machines for protein-protein interactions prediction
by: Alashwal, H., et al.
Published: (2006)
by: Alashwal, H., et al.
Published: (2006)
Intruder avoidance system via short message service (SMS)
by: Toha, Siti Fauziah, et al.
Published: (2011)
by: Toha, Siti Fauziah, et al.
Published: (2011)
Solving Two Deadlock Cycles through Neighbor Replication on Grid Deadlock Detection Model
by: Noriyani, Mohd Zin, et al.
Published: (2012)
by: Noriyani, Mohd Zin, et al.
Published: (2012)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Overloading conditions management in remote networks by coupling neighboring microgrids
by: Pashajavid, E., et al.
Published: (2015)
by: Pashajavid, E., et al.
Published: (2015)
Smart Security Camera Using Machine Learning
by: Foo, Jia Lim
Published: (2019)
by: Foo, Jia Lim
Published: (2019)
An experimental research on GPS based boundary intruding boat monitoring system
by: Puviarasi, R., et al.
Published: (2019)
by: Puviarasi, R., et al.
Published: (2019)
Heterogeneous Distributed Sensor Networks (HDSN)
by: Pathan, Al-Sakib Khan
Published: (2007)
by: Pathan, Al-Sakib Khan
Published: (2007)
Introduction to wireless sensor network security
by: Pathan, Al-Sakib Khan
Published: (2010)
by: Pathan, Al-Sakib Khan
Published: (2010)
Fi-Wi Network for future cloud
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
An efficient detection model of selective forwarding attacks in wireless mesh networks
by: Khanam, Shapla, et al.
Published: (2012)
by: Khanam, Shapla, et al.
Published: (2012)
Security management in heterogeneous distributed sensor networks
by: Pathan, Al-Sakib Khan
Published: (2011)
by: Pathan, Al-Sakib Khan
Published: (2011)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Multi-dimensional networking and distributed computing services
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Web Camera Application For Motion Detection
by: Koay, Su Yeong
Published: (2003)
by: Koay, Su Yeong
Published: (2003)
Similar Items
-
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014) -
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012) -
Automated visual surveillance using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2013) -
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012) -
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)