A new approach for abnormal human activities recognition based on ConvLSTM architecture

R Vrskova, R Hudec, P Kamencay, P Sykora - Sensors, 2022 - mdpi.com
Recognizing various abnormal human activities from video is very challenging. This problem
is also greatly influenced by the lack of datasets containing various abnormal human …

Machine learning and deep learning models for human activity recognition in security and surveillance: a review

S Waghchaware, R Joshi - Knowledge and Information Systems, 2024 - Springer
Human activity recognition (HAR) has received the significant attention in the field of security
and surveillance due to its high potential for real-time monitoring, identifying the abnormal …

A Critical Study on Suspicious Object Detection with Images and Videos Using Machine Learning Techniques

P Dubey, RK Mittan - SN Computer Science, 2024 - Springer
Security has emerged as a significant concern in today's world, particularly in public places
such as railway stations, airports, shopping malls, and crowded areas. Unattended object …

Recognition of human activity and abnormal behavior using deep neural network

R Vrskova, R Hudec, P Kamencay… - 2022 ELEKTRO …, 2022 - ieeexplore.ieee.org
Recognizing various abnormal activities of human behavior from video is very challenging.
The overall results are affected by the available data-sets. The available data-sets contain …

[PDF][PDF] Iris Recognition Technology: Principles, Mechanism, and Market Forecasting (2022-2030)

RS Mohammed, AA Ahmed - PROCEEDINGS BOOK, 2022 - researchgate.net
Abstract Iris Recognition Technology is a biometric method that takes an image of an eye
pattern, converts the image into a binary template and then saves the data on a server for …

Unsupervised Machine Learning for Unusual Crowd Activity Detection

P Bagane, KH Krishna, SM Beram, P Purohit… - … Conference on Recent …, 2023 - Springer
Unusual human crowd activity detection is the approach to identifying undesired human
activities in a congested environment with a lot of objects in motion. This is accomplished by …

[PDF][PDF] Currency Recognition System Using Image Processing: Libyan Banknote as a Case Study

IN Asmaeil, A Albagul, AA Ahmed - International Journal, 2022 - academia.edu
Banknote recognition in the field of image processing is used to distinguish between
banknotes of different countries and determine their values. One of the problems that …

[PDF][PDF] Deep Contextual Analysis for Enhanced Suspiciousness Estimation

KS Yadav, S Singh, L Kumar - Authorea Preprints, 2024 - techrxiv.org
Suspiciousness detection is crucial for anticipating potential security threats and facilitating
timely intervention and risk mitigation. Enhanced by deep learning, vision-based systems …

[PDF][PDF] Intelligent Video Surveillance Techniques to Detect Suspicious Human Activities: A Critical Review

AH Soomro, N Shaikh, R Zia, RH Arain, SA Mangi - 2021 - ijtsm.ilmauniversity.edu.pk
Smart video surveillance systems have grown tremendously for providing security to
sensitive places. These intelligent systems are integrated with advanced Artificial …

The Internet of Medical Things (IoMT): Recent Advances and Future Applications

AQ Almabrouk, ASD Alarga, FHA Aldeeb… - African Journal of …, 2022 - aaasjournals.com
The evolution and digitalisation of the world have brought an innovative machine-to-
machine (M2M) communication system that is called the Internet of Things (IoT). Internet of …