Affiliation:
1. Tahar Moulay University of Saida Algeria, Algeria
Abstract
In the last decade, surveillance camera technology has become widely practiced in public and private places to ensure the safety of individuals. Merely, face to limits of violation the private life of people and the inability to identify malicious persons that hid their faces, finding a new policy of surveillance video has become compulsory. The authors' work deals on the development of a suspicious person detection system using a new insect behaviour algorithm called artificial social cockroaches ASC based on a new image representation method (n-gram pixel). It has as input a set of artificial cockroaches (human images) to classify them (hide) into shelters (classes) suspicious or normal depending on a set of aggregation rules (shelter darkness, congener's attraction and security quality). Their experiments were performed on a modified MuHAVi dataset and using the validation measures (recall, precision, f-measure, entropy and accuracy), in order to show the benefit derived from using such approach compared to the result of classical algorithms (KNN and C4.5). Finally, a visualisation step was achieved to see the results in graphical form with more realism for the purpose to help policeman, security associations and justice in their investigation.
Reference41 articles.
1. Back, T., & Schwefel, H. P. (1996, May). Evolutionary computation: An overview. In Evolutionary Computation, 1996, Proceedings of IEEE International Conference on (pp. 20-29). IEEE.
2. Text Clustering using Distances Combination by Social Bees: Towards 3D Visualisation Aspect.;H. A.Bouarara;International Journal of Information Retrieval Research,2014
3. Application of Meta-Heuristics Methods on PIR Protocols Over Cloud Storage Services
4. Machine learning tool and meta-heuristic based on genetic algorithms for plagiarism detection over mail service
5. A new swarm mechanism based on social spiders colonies: From web weaving to region detection.;C.Bourjot;Web Intelligence and Agent Systems,2003