Vis enkel innførsel

dc.contributor.authorUllah, Habib
dc.contributor.authorAltamimi, Ahmed Bder
dc.contributor.authorUzair, Muhammad
dc.contributor.authorUllah, Mohib
dc.date.accessioned2019-04-25T08:25:13Z
dc.date.available2019-04-25T08:25:13Z
dc.date.created2018-03-29T12:34:47Z
dc.date.issued2018
dc.identifier.citationNeurocomputing. 2018, 290 74-86.nb_NO
dc.identifier.issn0925-2312
dc.identifier.urihttp://hdl.handle.net/11250/2595399
dc.description.abstractWe propose a novel Gaussian kernel based integration model (GKIM) for anomalous entities detection and localization in pedestrian flows. The GKIM integrates spatio-temporal features for efficient and robust motion representation to capture the distinctive and meaningful information about the anomalous entities. We next propose a block based detection framework by training a recurrent conditional random field (R-CRF) using the GKIM features. The trained R-CRF model is then used to detect and localize the anomalous entities during the online testing stage. We conduct comprehensive experiments on three benchmark datasets and compare the performance of the proposed method with the state-of-the-art anomalous entities detection methods. Our experiments show that the proposed GKIM outperforms the compared methods in terms of equal error rate (EER) and detection rate (DR) in both frame-level and pixel-level comparisons. The frame-level analysis detects the presence of an anomalous entity in a frame regardless of its location. The pixel-level analysis localizes the anomalous entity in term of its pixels.nb_NO
dc.language.isoengnb_NO
dc.publisherElseviernb_NO
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleAnomalous entities detection and localization in pedestrian flowsnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber74-86nb_NO
dc.source.volume290nb_NO
dc.source.journalNeurocomputingnb_NO
dc.identifier.doi10.1016/j.neucom.2018.02.045
dc.identifier.cristin1576209
dc.description.localcode© 2018. This is the authors’ accepted and refereed manuscript to the article. Locked until 15.3.2020 due to copyright restrictions. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/nb_NO
cristin.unitcode194,63,10,0
cristin.unitnameInstitutt for datateknologi og informatikk
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal