Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video

Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video
Author :
Publisher : Springer
Total Pages : 144
Release :
ISBN-10 : 9783319755083
ISBN-13 : 3319755080
Rating : 4/5 (080 Downloads)

Book Synopsis Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video by : Olga Isupova

Download or read book Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video written by Olga Isupova and published by Springer. This book was released on 2018-02-24 with total page 144 pages. Available in PDF, EPUB and Kindle. Book excerpt: This thesis proposes machine learning methods for understanding scenes via behaviour analysis and online anomaly detection in video. The book introduces novel Bayesian topic models for detection of events that are different from typical activities and a novel framework for change point detection for identifying sudden behavioural changes. Behaviour analysis and anomaly detection are key components of intelligent vision systems. Anomaly detection can be considered from two perspectives: abnormal events can be defined as those that violate typical activities or as a sudden change in behaviour. Topic modelling and change-point detection methodologies, respectively, are employed to achieve these objectives. The thesis starts with the development of learning algorithms for a dynamic topic model, which extract topics that represent typical activities of a scene. These typical activities are used in a normality measure in anomaly detection decision-making. The book also proposes a novel anomaly localisation procedure. In the first topic model presented, a number of topics should be specified in advance. A novel dynamic nonparametric hierarchical Dirichlet process topic model is then developed where the number of topics is determined from data. Batch and online inference algorithms are developed. The latter part of the thesis considers behaviour analysis and anomaly detection within the change-point detection methodology. A novel general framework for change-point detection is introduced. Gaussian process time series data is considered. Statistical hypothesis tests are proposed for both offline and online data processing and multiple change point detection are proposed and theoretical properties of the tests are derived. The thesis is accompanied by open-source toolboxes that can be used by researchers and engineers.


Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video Related Books

Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video
Language: en
Pages: 144
Authors: Olga Isupova
Categories: Technology & Engineering
Type: BOOK - Published: 2018-02-24 - Publisher: Springer

DOWNLOAD EBOOK

This thesis proposes machine learning methods for understanding scenes via behaviour analysis and online anomaly detection in video. The book introduces novel B
Behavior Analysis with Machine Learning Using R
Language: en
Pages: 370
Authors: Enrique Garcia Ceja
Categories: Psychology
Type: BOOK - Published: 2021-11-26 - Publisher: CRC Press

DOWNLOAD EBOOK

Behavior Analysis with Machine Learning Using R introduces machine learning and deep learning concepts and algorithms applied to a diverse set of behavior analy
The TensorFlow Workshop
Language: en
Pages: 601
Authors: Matthew Moocarme
Categories: Computers
Type: BOOK - Published: 2021-12-15 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Get started with TensorFlow fundamentals to build and train deep learning models with real-world data, practical exercises, and challenging activities Key Featu
Anomaly Detection in Video Surveillance
Language: en
Pages: 396
Authors: Xiaochun Wang
Categories:
Type: BOOK - Published: - Publisher: Springer Nature

DOWNLOAD EBOOK

Network Anomaly Detection
Language: en
Pages: 364
Authors: Dhruba Kumar Bhattacharyya
Categories: Computers
Type: BOOK - Published: 2013-06-18 - Publisher: CRC Press

DOWNLOAD EBOOK

With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion de