Suspicious Human Activity Detection System
PDF

How to Cite

Bhambri, Pankaj, Sachin Bagga, Dhanuka Priya, Harnoor Singh, and Harleen Kaur Dhiman. 2020. “Suspicious Human Activity Detection System”. Journal of ISMAC 2 (4): 216-21. https://doi.org/10.36548/jismac.2020.4.005.

Keywords

— Anomaly Detection
— Suspicious Human Activities
Published: 31-10-2020

Abstract

In collaboration with machine learning and artificial intelligence, anomaly detection systems are vastly used in behavioral analysis so that you can help in identity and prediction of prevalence of anomalies. It has applications in enterprise, from intrusion detection to system fitness tracking, and from fraud detection in credit score card transactions to fault detection in running environments. With the growing crime charges and human lack of confidence globally, majority of the countries are adopting precise anomaly detection systems to approach closer to a comfy area. Visualizing the Indian crime index which stands at 42. 38, the adoption of anomaly detection structures is an alarming want of time. Our own cannot be prevented with the aid of CCTV installations. These systems not simplest lead to identification on my own, but their optimized versions can help in prediction of unusual activities as properly

References

  1. https://medium.com/@everisUS/video-analysis-to-detect-suspicious-activity-based-on-deep-learning-fee2032ea14a
  2. http://www.svcl.ucsd.edu/projects/anomaly/dataset.htm
  3. https://www.kaggle.com/jubaerad/weapons-in-images-segmented-videos
  4. https://www.kaggle.com/ritupande/fire-detection-from-cctv
  5. https://www.kaggle.com/mohamedmustafa/real-life-violence-situations-dataset
  6. S.K. Panda, G.S.M. Reddy, S.B.Goyal, T.K., P. Bhambri, M.V. Rao, A.S. Singh, A.H. Fakih, P.K. Shukla, P.K. Shukla, A.B. Gadicha, and C.J. Shelke, “Method for Management of Scholarship of Large Number of Students based on Blockchain”, Indian Patent issue 36/2019, application 201911034937, (2019), September 06.
  7. W. CHU, K.T. LEE, W. LUO, P. Bhambri, and S. Kautish, “Predicting the Security Threats of Internet Rumors and Spread of False Information Based On Sociological Principle”, Computer Standards & Interfaces, (2020), ISSN 0920-5489, https://doi.org/10.1016/j.csi.2020.103454.