Automated Attendance System using RFID and IoT
Volume-7 | Issue-3

IoT Enabled Smart Bin for Waste Management with Incentivized Rewards
Volume-6 | Issue-1

Smart and Explainable Credit Card Fraud Detection Using XGBoost and SHAP
Volume-7 | Issue-2

An IoT-based Smart Security Locker System with OTP Verification
Volume-5 | Issue-3

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

DDoS Detection using Machine Learning Techniques
Volume-4 | Issue-1

Design of Deep Learning Algorithm for IoT Application by Image based Recognition
Volume-3 | Issue-3

Cloud-based Library Management and Book Tracking through the Internet of Things
Volume-4 | Issue-4

Advanced Traffic Light Controller using FPGA and ARDUINO
Volume-6 | Issue-2

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Suspicious Human Activity Detection System
Volume-2 | Issue-4

ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3

EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2

Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4

Home / Archives / Volume-2 / Issue-4 / Article-5

Volume - 2 | Issue - 4 | december 2020

Suspicious Human Activity Detection System
Pages: 216-221
DOI
10.36548/jismac.2020.4.005
Published
31 October, 2020
Abstract

In collaboration with machine learning and artificial intelligence, anomaly detection systems are vastly used in behavioral analysis so that you can help in identity and prediction of prevalence of anomalies. It has applications in enterprise, from intrusion detection to system fitness tracking, and from fraud detection in credit score card transactions to fault detection in running environments. With the growing crime charges and human lack of confidence globally, majority of the countries are adopting precise anomaly detection systems to approach closer to a comfy area. Visualizing the Indian crime index which stands at 42. 38, the adoption of anomaly detection structures is an alarming want of time. Our own cannot be prevented with the aid of CCTV installations. These systems not simplest lead to identification on my own, but their optimized versions can help in prediction of unusual activities as properly

Keywords

Anomaly Detection Suspicious Human Activities

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here