This document describes a thesis defense presentation on dynamic scene understanding using temporal association rules. The presentation covers feature extraction using mean-shift tracking, event modeling through spectral clustering of object trajectories, mining frequent temporal patterns and association rules to learn a traffic scene model, and detecting anomalies by comparing test sequences to the learned model. Accuracy of 97% is achieved on junction and roundabout datasets for spatio-temporal anomaly detection.
Control of Uncertain Hybrid Nonlinear Systems Using Particle FiltersLeo Asselborn
This paper proposes an optimization-based algorithm for the control of uncertain hybrid nonlinear systems. The considered system class combines the nondeterministic evolution of a discrete-time Markov process with the deterministic switching of continuous dynamics which itself contains uncertain elements. A weighted particle filter approach is used to approximate the uncertain evolution of the system by a set of deterministic runs. The desired control performance for a finite time horizon is encoded by a suitable cost function and a chance-constraint, which restricts the maximum probability for entering unsafe state sets. The optimization considers input and state constraints in addition. It is demonstrated that the resulting optimization problem can be solved by techniques of conventional mixed-integer nonlinear programming (MINLP). As an illustrative example, a path planning scenario of a ground vehicle with switching nonlinear dynamics is presented.
Reading group - Week 2 - Trajectory Pooled Deep-Convolutional Descriptors (TDD)Saimunur Rahman
This presentation was prepared for ViPr Reading group at Multimedia University, Cyberjaya. The goal of this presentation was to make aware the lab members about the recent advancements in action recognition.
Paper presented at the 6th International Work-Conference on Ambient Assisted Living.
Abstract: Due to the increasing demand of multi-camera setup and long-term monitoring in vision applications, real-time multi-view action recognition has gain a great interest in recent years. In this paper, we propose a multiple kernel learning based fusion framework that employs a motion-based person detector for finding regions of interest and local descriptors with bag-of-words quantisation for feature representation. The experimental results on a multi-view action dataset suggest that the proposed framework significantly outperforms simple fusion techniques and state-of-the-art methods.
Control of Uncertain Hybrid Nonlinear Systems Using Particle FiltersLeo Asselborn
This paper proposes an optimization-based algorithm for the control of uncertain hybrid nonlinear systems. The considered system class combines the nondeterministic evolution of a discrete-time Markov process with the deterministic switching of continuous dynamics which itself contains uncertain elements. A weighted particle filter approach is used to approximate the uncertain evolution of the system by a set of deterministic runs. The desired control performance for a finite time horizon is encoded by a suitable cost function and a chance-constraint, which restricts the maximum probability for entering unsafe state sets. The optimization considers input and state constraints in addition. It is demonstrated that the resulting optimization problem can be solved by techniques of conventional mixed-integer nonlinear programming (MINLP). As an illustrative example, a path planning scenario of a ground vehicle with switching nonlinear dynamics is presented.
Reading group - Week 2 - Trajectory Pooled Deep-Convolutional Descriptors (TDD)Saimunur Rahman
This presentation was prepared for ViPr Reading group at Multimedia University, Cyberjaya. The goal of this presentation was to make aware the lab members about the recent advancements in action recognition.
Paper presented at the 6th International Work-Conference on Ambient Assisted Living.
Abstract: Due to the increasing demand of multi-camera setup and long-term monitoring in vision applications, real-time multi-view action recognition has gain a great interest in recent years. In this paper, we propose a multiple kernel learning based fusion framework that employs a motion-based person detector for finding regions of interest and local descriptors with bag-of-words quantisation for feature representation. The experimental results on a multi-view action dataset suggest that the proposed framework significantly outperforms simple fusion techniques and state-of-the-art methods.
Overview of schedule and cost risk analysis methodology for aerospace industry.
For more information how to perform schedule risk analysis using RiskyProject software please visit Intaver Institute web site: http://www.intaver.com.
About Intaver Institute.
Intaver Institute Inc. develops project risk management and project risk analysis software. Intaver's flagship product is RiskyProject: project risk management software. RiskyProject integrates with Microsoft Project, Oracle Primavera, other project management software or can run standalone. RiskyProject comes in three configurations: RiskyProject Lite, RiskyProject Professional, and RiskyProject Enterprise.
Physical processes in the earth system are modeled with mathematical representations called parameterizations. This talk will describe some of the conceptual approaches and mathematics used do describe physical parameterizations focusing on cloud parameterizations. This includes tracing physical laws to discrete representations in coarse scale models. Clouds illustrate several of the complexities and techniques common to many physical parameterizations. This includes the problem of different scales, sub-grid scale variability. Discussions of mathematical methods for dealing with the sub-grid scale will be discussed. In-exactness or indeterminate problems for both weather and climate will be discussed, including the problems of indeterminate parameterizations, and inexact initial conditions. Different mathematical methods, including the use of stochastic methods, will be described and discussed, with examples from contemporary earth system models.
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...YONG ZHENG
Yong Zheng. "Deviation-Based and Similarity-Based Contextual SLIM Recommendation Algorithms". ACM RecSys Doctoral Symposium, Proceedings of the 8th ACM Conference on Recommender Systems (ACM RecSys 2014), pp. 437-440, Silicon Valley, CA, USA, Oct 2014 [Doctoral Symposium, Acceptance rate: 47%]
Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...민진 최
This is the official slide for the WWW 2021 paper: Session-aware Linear Item-Item Models for Session-based Recommendation
If you have any questions, please contact zxcvxd@skku.edu.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Overview of schedule and cost risk analysis methodology for aerospace industry.
For more information how to perform schedule risk analysis using RiskyProject software please visit Intaver Institute web site: http://www.intaver.com.
About Intaver Institute.
Intaver Institute Inc. develops project risk management and project risk analysis software. Intaver's flagship product is RiskyProject: project risk management software. RiskyProject integrates with Microsoft Project, Oracle Primavera, other project management software or can run standalone. RiskyProject comes in three configurations: RiskyProject Lite, RiskyProject Professional, and RiskyProject Enterprise.
Physical processes in the earth system are modeled with mathematical representations called parameterizations. This talk will describe some of the conceptual approaches and mathematics used do describe physical parameterizations focusing on cloud parameterizations. This includes tracing physical laws to discrete representations in coarse scale models. Clouds illustrate several of the complexities and techniques common to many physical parameterizations. This includes the problem of different scales, sub-grid scale variability. Discussions of mathematical methods for dealing with the sub-grid scale will be discussed. In-exactness or indeterminate problems for both weather and climate will be discussed, including the problems of indeterminate parameterizations, and inexact initial conditions. Different mathematical methods, including the use of stochastic methods, will be described and discussed, with examples from contemporary earth system models.
[RecSys 2014] Deviation-Based and Similarity-Based Contextual SLIM Recommenda...YONG ZHENG
Yong Zheng. "Deviation-Based and Similarity-Based Contextual SLIM Recommendation Algorithms". ACM RecSys Doctoral Symposium, Proceedings of the 8th ACM Conference on Recommender Systems (ACM RecSys 2014), pp. 437-440, Silicon Valley, CA, USA, Oct 2014 [Doctoral Symposium, Acceptance rate: 47%]
Session-aware Linear Item-Item Models for Session-based Recommendation (WWW 2...민진 최
This is the official slide for the WWW 2021 paper: Session-aware Linear Item-Item Models for Session-based Recommendation
If you have any questions, please contact zxcvxd@skku.edu.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
4. Dynamic Scene Analysis
• Interaction of multiple agents in a specific
context and particular environment
• Activities reoccur over time and co-occur in
time
• Scene analysis gives an understanding of:
– where objects are located,
– what is happening,
– how they interact over a
period of time
6/6/2012 4
7. Related Work
• All the works start with some feature
extraction.
• Existing works in the literature are:
1. Trajectory-based
o Many require object detection
o Difficulties in handling occlusions
2. Optical Flow based
o Tracks motion between frames
o Preferable for complex videos as
it is fast and robust
6/6/2012 7
8. Video Scene Understanding Using Multi-scale Analysis [Yang et al.]
6/6/2012 8
─ Uses optical flow and
Bag-of-words representation
─ Each pixel is assigned
a codeword
─ Use diffusion maps - Clustering reveals the motion patterns, done using a spectral
analysis technique
• Trajectories used to find a set of behavior rules ,
followed by clustering
• Hidden Markov Models are used to detect primitive
events
• Event rule representation is based on Stochastic
Context-Free Grammar and extended with temporal
logic
• Event rule induction is performed to discover the hidden
temporal structures between primitive events using the
Minimum Description Length algorithm
Trajectory Series Analysis based Event Rule Induction for Visual
Surveillance [Zhang et al.]
9. Random Field Topic Model for Semantic Region Analysis in Crowded Scenes from
Tracklets [Zhou et al.]
6/6/2012 9
• tracklets are observed within a short period
• A Random Field Topic Model is integrated with
Markov Random Field to enforce spatial and
temporal coherence during the learning process
• Tracklets are grouped into one topic
• Pairwise MRF: connects neighboring tracklets
• Tracklets which are spatially and temporally close,
have similar distributions over semantic regions
Random Field Topic Model for Semantic Region Analysis
in Crowded Scenes from Tracklets [Zhou et al.]
10. General Steps
(1) Feature
Extraction
(2) Event
Modeling
(3) Event
Recognition
Atomic Event
• Involves a single object
• Represented by motion patterns
• Indicates the spatial properties
Composite Event
• Multiple atomic events taking
place in space & time: complex
activities
• Behavioral interaction: results in
spatio-temporal patterns
6/6/2012 10
11. Problem Statement
Given, a video of a scene acquired by a static
camera:
– Identify regions of different dynamics
– Learn spatio-temporal patterns in the scene and
interpret the semantics within
– Detect abnormal events based on a normalcy
model
6/6/2012 11
17. Feature Extraction: Mean-shift Tracking
17
1. We need to detect and track objects of interest, i.e. vehicles.
2. Target characterization
a) By a circular region in the image i.e. color PDF of target
pixels
3. Target localization
a) Update the model in frame
21. Spectral Clustering: Data Representation
o Nodes (1,2,..,n) –
Trajectories
o Edge weights (w) –
Similarity measure
(Dynamic Time Warping
Distance)
1 2 ..
.. n
w
w
Graph
Adjacency
matrix
t1 t2 … tn
t1 0 0.5 … 0.75
t2 0.5 0 … 0.66
… … … … …
tn 0.75 0.66 … 06/6/2012 21
We aim to clustering trajectories into distinct events in the
scene.
22. Spectral Clustering: Steps
(n x n) Affinity
Matrix
• Form Laplacian Matrix: Compute K largest
eigenvectors
• K estimated from the distortion score
Eigenvector
Matrix
• Cluster eigenvectors
• Assign trajectory points to corresponding
clusters
K-means
Clustering
6/6/2012 22
25. Video Association Mining
• We want to uncover unknown patterns in the
scene
• We want to focus is on relationships occurring
within time-intervals rather than just points in
time
• Temporal Pattern Mining: Used to discover
interesting patterns in the scene
• Association Rule Mining: Helps predict future
scene dynamics
6/6/2012 25
27. What is a Frequent Pattern?
• Frequent Temporal Pattern (FTP): Occurs many
times in the data; indicates co-occurring and
recurring activities in the scene
• A temporal pattern composed of k events is called
a k-pattern
• Relationships amongst events are encoded using
Allen’s temporal logic
• Each temporal pattern is appended with its time
duration
C
A
B
relationship
event
duration
3-pattern
6/6/2012
27
29. Interval-Based Event Miner: Algorithm
Level-by-Level Discovery Process
• IEMiner: based on the Apriori principle of item-set
mining
• Apriori principle: Every subset of a frequent k-pattern set
also has to be frequent
(1)
Candidate
Generation
(2)
Support
Counting
Frequent k-patterns
Candidate (k+1)-patterns
6/6/2012 29
30. Input: List of Event Sequences
• Each event sequence consists of a
sequence of triplets:
{event_label,start_time,end_time}
No Event Sequence
1 A 0 5 B 0 9 C 9 11
2 C 0 7 A 3 11 B 9 11
3 A 0 11 C 1 6 D 1 5
4 A 0 4 C 0 3 E 6 7 G 7 11
Obtain single
frequent events
Event Count
A 4
B 2
C 4
D 1
E 1
G 1
6/6/2012 30
FREQUENT
31. (1) Candidate Generation
Bottom-up approach
FIRST STEP:
GENERATE SET OF 2-PATTERNS
6/6/2012 31
No Event Sequence
1 A 0 5 B 0 9 C 9 11
2 C 0 7 A 3 11 B 9 11
3 A 0 11 C 1 6 D 1 5
4 A 0 4 C 0 3 E 6 7 G 7 11
Form composite
events
C
A
A
B
A starts B
C overlaps A
.
.
.
32. (1) Candidate Generation
Bottom-up approach
SECOND STEP: GENERATE(K+1)-PATTERNS FROM FREQUENT
K-PATTERNS AND 2-PATTERNS
LEVEL 2: K = 2
6/6/2012
32
C
A
A
B
A starts B
C overlaps A
.
.
.
A
A
A equals C
A overlaps B
.
.
.
C
B
Candidate 3-patterns
C
A
B
overlaps(C overlaps A) B
.
.
.
2-patterns2-patterns
33. (2) Support Counting
Single-pass Procedure
6/6/2012 33
• support of a TP indicates the number of
event sequences in which the pattern occurs
• For a pattern to be classified as frequent, it
should have a support value higher than
the user-specified min. support threshold
Determine frequency of
candidate patterns by
counting occurrences
34. (1) Candidate Generation
Bottom-up approach
SECOND STEP: GENERATE(3+1)-PATTERNS FROM FREQUENT
3-PATTERNS AND 2-PATTERNS
LEVEL 3: K = 3
6/6/2012 34
.
.
.
A
C equals D
A overlaps B
.
.
.
D
B
Candidate 4-patterns
.
.
C
A
B
meets
(B overlaps A) C
2-patterns3-patterns
C
C
A
B
D
equals (meets
(B overlaps A) C) D
35. (2) Support Counting
Single-pass Procedure
6/6/2012 35
Determine frequency of
candidate patterns by
counting occurrences
• At each iteration: Increment the level
• Terminates when the Candidate Set is EMPTY
36. Minimum Support Threshold
vs.
Number of Frequent Patterns
Junction Dataset
0.02 vs. 92 patterns
Roundabout Dataset
0.02 vs. 29 patterns
6/6/2012 36
37. Pruning Redundant Patterns
• Our pruning criteria:
6/6/2012 37
Relation_1 Relation_2
overlaps overlaps
during during
equals equals
CASE 1
Relation_1 Relation_2
overlaps starts
during
equals finishes
CASE 2
38. 6/6/2012 38
k-patterns before after
2-patterns 55 40
3-patterns 33 26
4-patterns 4 3
k-patterns before after
2-patterns 23 17
3-patterns 5 4
4-patterns 1 1
JUNCTION
ROUNDABOUT
Pruning Redundant Patterns
CASE 3 overlaps(C overlaps A) A
40. Learning Association Rules
• Temporal association rules (TAR) describe time-
dependent correlations
• TARs are constructed from pairs of FTPs: The
left-hand side is a sub-pattern of the right-hand
pattern
k-pattern(X) k+1-pattern(Y)
• A rule’s strength is measured
by:
and rules are retained if confidence value is above
a threshold
6/6/2012 40
49. (0) Trajectory Classification
• The classification problem entails classifying
trajectories from test sequences to event categories:
{A,B,C,…}
• Classification is based on the nearest-neighbor scheme
3??? B
B
A A B
A A B 2??
A
1? C C
C C
D D
D
D D
6/6/2012 49
50. (1) Spatial Outliers
• In the physical scene layout, these events deviate
from the normal direction-of-flow
• The trajectory direction is computed as:
• The test trajectory direction is compared to cluster
prototypes direction using the DTW distance
measure
• Abnormal trajectories exceed the threshold defined
per event cluster
6/6/2012 50
53. (2) Spatio-temporal Anomaly Detection
• Abnormal activities at this stage violate both
spatial and temporal constraints
• Hierarchical pattern matching
(level 1 to level k): Patterns from test sequence
are matched against the trained sets of FTPs
– Level 1: Single Frequent Events
– Level 2: 2-patterns
– Level 3: 3-patterns
– Level 4: 4-patterns
• Next…
6/6/2012 53
54. (2) Spatio-temporal Anomaly Detection
• Law of transitivity has to be incorporated in the
pattern-matching process, in order to reduce false
positives
• If duration of test patterns exceeds a threshold with
respect to duration of trained frequent patterns,
indicates the presence of a rare event
6/6/2012 54
C
B
C
A
A
B
A before B C equals A C before B
55. Anomaly Detection: Accuracy
• Based on the ground truth:
– True Positives (TP): normal test sequence is classified as
normal
– True Negatives (TN): abnormal test sequence is classified
as abnormal
– False Positives (FP): abnormal behavior classified as
normal
– False Negatives (FN): normal behavior classified as
abnormal
6/6/2012 55
58. Contributions
• Clustering of motion
trajectories using a spatial
technique and the DTW
measure
• Utilizing interval-based
temporal mining techniques
for event recognition in
dynamic scenes
• Hierarchical spatio-temporal
anomaly detection based on
quantitative measures
6/6/2012 58
A DCB
C
A
B
D
Point-based
Interval-based
duration
59. Future Directions
• Using a fully unsupervised robust visual
surveillance tracking system
• Performing motion segmentation and anomaly
detection in real-time
• Applying this approach to more complex
scenarios as well as other domains
6/6/2012 59
60. Conclusion
• The goal is to organize the video into different
event groups and find their temporal
dependencies
• Single-agent events are modeled by trajectories
• Multi-agent interactions are represented by
temporal patterns
• Association rules are useful in predicting future
activities
• Ability to model individual behavior of vehicles
in the scene, helps in localizing anomalies
6/6/2012 60
61. Motion Segmentation: Spectral Clustering
• We aim to clustering trajectories into distinct
events in the scene.
• Spectral clustering
– obtains data points in a low-dimensional space
– ability to deal with non-convex shaped clusters
6/6/2012 65
62. Mean-shift Tracking
• Mean-shift theory: find the center of mass for
ROI, move circle to centre of mass and
continue until convergence
1) Obtain target model and location
2) Minimize the distance between the target
and candidate model
3) Kernel is moved from previous location
to current location until convergence
6/6/2012 66
Editor's Notes
template
No need
Put what’s going on video
The aim is to organize the video into sets of events with associated temporal dependencies
All applications
Automatically segment the scene into semantic regions and learn their models
Event - The occurrence of an activity in a particular place during a time interval
Primitive events
Composite events – combination of atomic events
And (2) are not the problemmodify
OUTLINE…highlight n put everywhere
London: busy traffic intersection
London
OUTLINE
Color == feature space (using histograms)
Vehicle trajectories
More than 25 fps
Smoothen using a moving average filter
OUTLINE
-Learned from tracking
-Model – category of activities with similar semantic meaning
-CENTROID TRAJECTORIES
Interesting == recurrent
TPM is better than sequence mining coz rich set of relations (Allen) rather than just follows!
OUTLINE
K >=2
Mention the TIME DURATION here
Support missing here
IEMiner details…illustrate steps with event sequences
Each event sequence is 12 seconds long
Extend frequent k-pattern sets, one item at a time
Extend frequent k-pattern sets, one item at a time
Extend frequent k-pattern sets, one item at a time
OUTLINE
OUTLINE:
The traffic light sequence is accurately modeled by the forward TARs
OUTLINE
Put this as AD
Explain in detaillllllll
5 different anomalies were detected (name these)
Having extracted trajectories from this sequence
Traffic violations
Put the comparison results table here
Infrequent temporal pattern
Horizontal n vertical together!