Adaptive algorithms for automated intruder detection in surveillance networks
Many types of automated visual surveillance systems have been presented in the recent
literature. Most of the schemes require custom equipment, or involve significant complexity …
literature. Most of the schemes require custom equipment, or involve significant complexity …
Anomaly clustering based on correspondence analysis
Traffic patterns in backbone IP networks often deviate from the norm, to lead to events
commonly termed as anomalies. Different algorithms have been proposed in literature to …
commonly termed as anomalies. Different algorithms have been proposed in literature to …
Learning algorithms for anomaly detection from images
Visual surveillance networks are installed in many sensitive places in the present world.
Human security officers are required to continuously stare at large numbers of monitors …
Human security officers are required to continuously stare at large numbers of monitors …
Taking meredith out of Grey's anatomy: Automating hospital ICU emergency signaling
In this paper we propose a new algorithm based on kernel machines for automatic,
instantaneous detection of emergencies occurring in a hospital Intensive Care Unit. The …
instantaneous detection of emergencies occurring in a hospital Intensive Care Unit. The …
The kernel-based online anomaly detection algorithm: Detailed derivation and development
The evolution of intelligent computer networks, distributed processing facilities, range of
communication protocols, and arrays of smart devices has significantly raised the …
communication protocols, and arrays of smart devices has significantly raised the …
RouteFinder: Real-time optimum vehicle routing using mobile phone network
Road traffic congestion is a major issue in most mega cities. The traffic jams are often
exacerbated by drivers habitually following the same routes. A real-time, optimum vehicle …
exacerbated by drivers habitually following the same routes. A real-time, optimum vehicle …