摘要:
A method is provided for detecting a threat in a distributed multi-camera surveillance system. The method includes: monitoring movement of an object in a field of view of a first camera using software installed at the first camera; detecting a suspicious object at the first camera when movement of the object does not conform with a motion flow model residing at the first camera; sending a tracking request from the first camera to a second camera upon detecting the suspicious object at the first camera; monitoring movement of the object in a field of view of the second camera using software installed at the second camera; assigning threat scores at the second camera when the movement of the object does not conform with a motion flow model residing at the second camera; and generating an alarm based in part on the threat scores detected at the first camera and the second camera.
摘要:
A surveillance system generally includes a data capture module that collects sensor data. A scoring engine module receives the sensor data and computes at least one of an abnormality score and a normalcy score based on the sensor data, at least one dynamically loaded learned data model, and a learned scoring method. A decision making module receives the at least one of the abnormality score and the normalcy score and generates an alert message based on the at least one of the abnormality score and the normalcy score and a learned decision making method to produce progressive behavior and threat detection.
摘要:
A multi-perspective context sensitive behavior assessment system includes an adaptive behavior model builder establishing a real-time reference model that captures intention of motion behavior. It operates by modeling outputs of multiple user defined scoring functions with respect to multiple references of application specific target areas of interest. The target areas have criticality values representing a user's preference regarding the target areas with respect to one another. The outputs of the scoring functions are multiplied by the critically values to form high level sequences of representation that are communicated to the user.
摘要:
The originator requests information from a target by launching a receptor agent that propagates across the mobile ad hoc network to the target. Along the way, intermediate nodes retain copies of the receptor. The target adds reply information to the receptor and launches it onto the network. When the reply-bearing receptor rendezvous with a receptor copies that contain matching patterns corresponding to the reply-bearing receptor, the reply information is transferred to those receptor copies. The information transferred may be encrypted at the target, using encryption key supplied by the originator. In this way, intermediate nodes cannot access the information being propagated in the receptors that they host.
摘要:
A peer-to-peer camera sensor network is defined using intelligent cameras that employ iSCSI initiators and iSCSI targets to read and write data and to send control commands directly across the network as iSCSI blocks. Because data transfer rides on top of the internet protocol, cameras can be directly attached to the internet without requiring attachment to a host computer. Image data represented as video frames are mapped onto iSCSI data blocks and are shared among the cameras directly to form an efficient virtual block level video image frame storage that can be directly manipulated by multiple cameras without data replications. Transport of multiple streams, associated with scalable or multilevel MPEG encoding scheme for instance, are automatically sequenced and realigned as the iSCSI data blocks are time-aligned.
摘要:
Distributed modules in a network dynamically select communication protocols to communicate in a secure or firewall-protected network. Applications register with a lookup service. The lookup service maintains a lookup table including registration information for multiple applications. Registration information may include, but is not limited to, IP address, firewall restrictions, tunnel protocol, port information, and proxy queue capabilities. An application seeking to communicate acquires the registration information for a desired recipient from the lookup table. The application uses the registration information to select communication protocols necessary to communicate with the recipient.
摘要:
A system and method for predictive abnormal behavior detection is disclosed. The system receives surveillance data such as video data and can create and update a plurality of prediction models. The system may also receive video data relating to a moving object and may generate a prediction of the future locations of the moving object based on the generated prediction models. The predicted motion may be scored by a scoring engine to determine if the predicted motion is unsafe or otherwise undesirable.
摘要:
A multi-perspective context sensitive behavior assessment system includes an adaptive behavior model builder establishing a real-time reference model that captures intention of motion behavior. It operates by modeling outputs of multiple user defined scoring functions with respect to multiple references of application specific target areas of interest. The target areas have criticality values representing a user's preference regarding the target areas with respect to one another. The outputs of the scoring functions are multiplied by the critically values to form high level sequences of representation that are communicated to the user.
摘要:
A system and method for predictive abnormal behavior detection is disclosed. The system receives surveillance data such as video data and can create and update a plurality of prediction models. The system may also receive video data relating to a moving object and may generate a prediction of the future locations of the moving object based on the generated prediction models. The predicted motion may be scored by a scoring engine to determine if the predicted motion is unsafe or otherwise undesirable.
摘要:
A surveillance system implements an architecture and process to support real-time abnormal behavior assessment operations in a distributed scalable sensor network. An automated behavior model builder generates behavior models from sensor data. A plurality of abnormal behavior scoring engines operating concurrently to generate abnormal behavior assessment models by scoring the behavior models. An execution performance manager performs fast switching of behavior models for the abnormal behavior scoring engines. The execution performance manager performs detection of abnormal behavior score distribution characteristic deviation by comparing a current abnormal behavior assessment model to a pre-recorded abnormal behavior assessment model. The execution performance manager selects a pre-recorded behavior model for the abnormal behavior scoring engines when the deviation exceeds a predetermined threshold.