分布式智能视觉监控系统关键技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络及传感器技术的发展,视觉监控系统正向自动化、智能化与普适化方向的发展。现存的视觉监控系统大多仍然只具有采集、存储视频数据的功能,对于实时事件检测任务则交给在监视器前面的监控人员来完成。智能视觉监控系统不应只是具有事故的调查功能,而且还应该具有阻止潜在灾难事故发生的功能。分布式智能视觉监控存在着许多与目前的视觉监控系统不同的新问题和挑战。其中包括系统软件平台、事件挖掘与分析等。本文就分布式智能视觉监控中的某一些关键技术进行了讨论。主要研究工作及创新性体现在以下几个方面:
     1)基于服务质量的分布式Multi-Agent模型的软件平台
     针对目前的视觉监控系统中软件平台简单,功能单一,尚存在较多不完善的问题。本文设计了一种基于服务质量QoS的分布式Multi-Agent模型的视觉监控系统软件平台。该平台中各个Agent都是自主的进程,能够可有序一致的互相协调通信。采用引用不耦合、时间上耦合的基于消息组的发布/订阅模型,以利于实现对Agent间的动态性的适应和自发交互。根据分布式智能视觉监控系统所传输的数据类型与特点,提出了一种基于服务质量的数据传输机制。实验测试表明,该传输机制具有较小的数据传输时延。
     2)面向室内监控场景中前景目标稳定检测与跟踪
     针对室内监控场景中前景目标的持续检测以及鬼影的去除问题。本文提出了一种面向室内监控场景中前景目标稳定检测方法。该方法采用基于颜色和梯度信息融合、双重背景模型及其更新机制实现对动态的前景目标持续稳定地检测,消除了前景检测中出现的鬼影影响,较好地解决了室内监控场景中目标经常处于“停停走走”,目标比较大且目标各部分运动状态不一致等情况下的目标检测问题。采用基于粒子滤波的概率跟踪框架,选择基于Particle Filter粒子滤波跟踪方法对监控场景中目标进行跟踪,实现了多目标稳定地跟踪。实验结果表明:不管人是静止还是运动的,都可以同时对多人整体、人头以及手进行稳定地检测与跟踪。
     3)基于概率支持向量机方法的人脸识别方法
     针对传统支持向量机方法不提供后验概率的输出,建议了“1对1”多类支持向量机的概率建模方法,提高了支持向量机的分类性能。结合了SVM分类器与概率建模的优点,提出了一种基于概率支持向量机方法的人脸识别方法。针对智能会议场景对人脸识别的特殊情况,通过依据检测、跟踪得到头部区域与人脸区域的长度或面积比,选择正面的人脸进行识别,从而降低了人脸姿态对人脸识别的影响。实验结果表明:该方法不仅使人脸识别的精度得到了提高,还提供了其属于所在类中的可信程度。
     4)基于多层事件融合的场景事件实时分析
     文中给出了一种基于事件的语义描述定义,描述了事件的三种特性:(1)事件是描述时空过程的语义对象;(2)事件定义取决于场景;(3)事件具有层次性的结构。为解决智能监控场景中场景事件实时分析问题,提出了一种基于多层事件融合的场景事件分析模型以及对应的RBPF实时推理方法。利用事件具有层次结构特性以及各层事件之间的关系,将场景事件分解为不同层次的子事件,利用多层子事件融合进行场景事件分析,并以多层动态贝叶斯网络模型对其建模。构建该模型相应的RBPF推理方法,以实现对复杂场景事件进行实时分析。实验结果表明:该方法能够对动态场景中的场景事件进行实时推理,比PF方法具有更高的精度及较少的时间代价。
     总之,以上研究成果与创新内容较好地解决了智能监控领域中的几个关键性技术问题,具有广泛的应用前景和潜在的经济价值。
     本文得到国家自然科学基金项目(90304018,60672137),教育部博士点基金项目(20060497015)和湖北省自然科学基金项目(2004ABA043)的资助。
With the development of the network and sensor technologies, automatic and intelligent visual surveillance systems have become more and more popular. Existing visual surveillance systems provide the infrastructure only to capture, store and distribute video, while leaving the task of threat detection exclusively to human operators. Intelligent visual surveillance systems should create a shift in the security paradigm from "investigation of incidents" to "prevention of potentially catastrophic incidents". There exist some open problems and new challenges including software platform, event analysis, and etc., which are different from those in the existing visual surveillance systems. This dissertation addresses some key technologies in intelligent visual surveillance systems and has made innovative progress in the following respects:
     1) A Distributed Multi-Agent Software Platform based on Quality of Service
     A distributed multi-agent software platform based on quality of service is proposed. Each agent in the software architecture is an independent process, and can consistently communicate each other. The loose-coupled publish-subscribe model based on group messages is adopted, which caters for the spontaneous interaction between modules. A data transmitting mechanism based on quality of service is proposed according to the transmitting data types and features in the distributed intelligent visual surveillance systems. Experiment tests show that this mechanism has less delay for data transmitting.
     2) Consistent Foreground Object Detection and Tracking for the Indoor Scenes
     An algorithm of consistent foreground object detection for the indoor scenes is presented for foreground object detection tracking and eliminating ghost effect. The basic idea of this method is as follows: both color and gradient information are fused, and two background models, the original background and the runtime background, are created and dynamically updated in whole detection process. This method can efficiently solve the problem of consistent foreground object detection for the objects in a "move and stop" way. The tracking method based on the particle filter method can robustly track multiple objects. Experiment results show that this tracking method can simultaneously track the whole body, head and hand if person stop or move.
     3) Face Recognition Based on the Probability Outputs of Multi-class Support Vector Machines
     Standard Support Vector Machines (SVMs) does not provide probabilities output, a directly solving posterior probability method is presented for the probability outputs of' one against one' multi-class SVMs, which improves the classification ability. Face recognition based on the probability outputs of multi-class SVMs is proposed combining the advantages both SVM and probability modeling. Considering the special situation for face recognition in intelligent meeting scene, the front face is chosen for face recognition to reduce the pose effect, which is the ratio of the lengths or areas between the head and the face. Experiment results show that this method not only improves the precision of face recognition, but also provides the reliability of the classification.
     4) Real-time Analysis of Situation Events Based on Hierarchical Events Fusion
     The definition of semantic event is given. Its three characteristics are analyzed. (1) The event is the spatio-temporal object; (2) The event is related with the dynamic environment; (3) The event has hierarchical structure. Hierarchical dynamic Bayesian network based on hierarchical events fusion is modeled for situation event analysis, and a real-time recognition method based on RBPF method is proposed. Based on the hierarchical features for the event and these relations among events at different levels, situation event is decomposed into a sequence of sub-events at different levels. The corresponding RBPF method are constructed for the inference of the posterior probability of each node in a hierarchical dynamic Bayesian network in order to recognize situation events in real time. Simulation experiments results show that this method can analyze situation event in real time and achieve the better recognition precision and the less computation time than the PF method.
     In a word, it can be drawn that the achievements and innovations summarized above effectively solve these key problems in the field of intelligent visual surveillances, and have broad application perspective and potential economic value.
     This dissertation is supported by National Natural Science Foundation of China under Grant 90304018, 60672137, the Doctoral Program Foundation of Ministry of Education of China under Grant 20060497015 and the Natural Science Foundation of Hubei Province (No. 2004 ABA043).
引文
[1]R.T.Collins,A.J.Lipton,and T.Kanade.Introduction to the special section on video surveillance.IEEE Trans.Pattern Anal.Machine Intell.,2000,22(8):745-746.
    [2]HAMPAPUR A,BROWN L,CONNELL J,et al..Smart surveillance applications technologies and implications information communication and signal processing.Proceedings of the 2003 Joint Conference of the Fourth International Conference,2003(2):1133-1138.
    [3]方帅.计算机智能视频监控系统关键技术研究[D].沈刚:东北大学信息科学与工程学院,2005.
    [4]CMU.VSAM Research Overview[M/OL].Carnegie Mellon University,Robotics Institute,2000,http://www.cs.cmu.edu/People/vsam.
    [5]I.Haritaoglu,D.Harwood and L.S.Davis.W4:Real-Time Surveillance of People and Their Activities.IEEE Transactions on Pattern Analysis and Machine Intelligence,2000,22(8):809-830.
    [6]C.Wren,A.Azarbayejani,T.Darrell,and A.Pentland.Pfinder:Real-time Tracking of the Human Body.IEEE Transactions on Pattern Analysis and Machine Intelligence,1997,19(7):780-785.
    [7]J.Rehg,M.Loughlin,and K.Waters.Vision for a Smart Kiosk.Proc.IEEE Conf.on Computer Vision and Pattern Recognition,San Juan,Puerto Rico,IEEE Press,1997:690-696.
    [8]Weber S,Jennings J.Architectural Issues for Pervasive Computing.Proceedings of Workshop on Software Engineering for Wearable and Pervasive Computing,2000.
    [9]Jennings N R.On agent-based software engineering.Artificial Intelligence,2000,117(2):277-296.
    [10]蒋文斌.基于BACnet的视频监控系统关键技术研究[D].武汉:华中科技大学电子与工程系,2005.
    [11]刘六彬.嵌入式视频监控系统中uClinux的应用研究[D].杭州:浙江大学理学院,2003.
    [12]王军.多媒体网络传输的研究与实现[D].长沙:国防科技大学机电工程研究所,2002.
    [13]秦红武,苏开娜.分布式视觉监控系统的研究.计算机工程与应用,2005,41(20):114-117.
    [14]Xian-He Sun,Alan R.Blatecky.Middleware:the key to next generation computing.Parallel Distrib.Comput.,2004,64(6):689-691.
    [15]Alexandre R.J.Francois,Gerard G.Medioni.A Modular Middleware Flow Scheduling Framework.Proceedings of the eighth ACM international conference on Multimedia,Los Angeles,CA,2000:371-374.
    [16]Christelle Martin,Oiivier Gaiibert,Martial Michel,Fabrice Mougin,Vincent Stanford.NIST Smart Flow System Programmer's guide,2000,www.nist.gov/smartspace/toolChest/nsfs/dataFlow/progG/programmerGuide/programmerGuide.html.
    [17]Claudio Sacchi and Carlo S.Regazzoni.A distributed surveillance system for detection of abandoned objects in unmanned railway environments.IEEE transactions on vehicular technology,2000,49(5):2013-2026.
    [18]陈亨轩,吕承立等.多级分布式多媒体指挥监控系统设计.计算机工程与设计,2004,25(2):230-233.
    [19]李海刚,吴启迪.多Agent系统研究综述.同济大学学报,2003,31(6):728-732.
    [20]D.A.Fidaleo,H.A.Nguyen,and M.Trivedi.The networked sensor tapestry(NEST):a privacy enhanced software architecture for interactive analysis of data in video-sensor networks.Proceedings of the ACM 2nd International Workshop on Video Sureveillance and Sensor Networks(VSSN'04),New York,NY,USA,October 2004:46-53.
    [21]夏娜,蒋建国,胡社教,齐美彬.基于Multi-Agent的分布式智能视觉监控系统研究.计算机工程与应用,2003,(31):41-43.
    [22]邓超.面向Agent的智能化分布式计算及其应用研究[D].杭州:浙江大学计算机科学与技术学院,2005.
    [23]S.J.Maybank and T.N.Tan.Special section on visual surveillance—introduction.International Journal Computer Vision,2000,37(2):173-174.
    [24]J.W.Davis,A.F.Bobick.The representation and recognition of action using temporal templates.Computer vision and pattern recognition,Proceeding of IEEE Computer Society Conference,1997:928-934.
    [25]Yuanxin Zhu,Haibing Ren,Guangyou Xu,Xueyin Lin.Toward real-time human-computer interaction with continuous dynamic hand gestures.Proceeding of Face and Gesture Recognition,2000:544-549.
    [26] Pengyu Hong, Turk M., Huang T.S.. Constructing finite state machines for fast gesture recognition. Proceedings of 15th International Conference on Pattern Recognition, 2000: 691-694.
    [27] D. Ayers, M. Shah. Monitoring human behavior from video taken in an office environment. Image and Vision Computing, 2001,19(12): 833-846.
    [28] T. Starner and A. Pentland. Visual recognition of American sign language using Hidden Markov Models. In International Workshop on Automatic Face and Gesture Recognition, 1995:189-194.
    [29] C. Vogler and D. Metaxas. A framework for recognizing the simultaneous aspects of American sign language. Computer Vision and Image Understanding, 2001,81(3): 358-384.
    [30] A. Dielmann and S. Renals. Multistream dynamic Bayesian network for meeting segmentation. Lecture Notes in Computer Science, 2005,33(61): 76-86.
    [31] N. M. Oliver, B. Rosario, and A. Pentland. A Bayesian computer vision system for modeling human interactions. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000,22(8): 831-843.
    [32] Sebastien Marcel, Olivier Bernier, Jean-Emmanuel Viallet, Daniel Collobert. Hand gesture recognition using input-output hidden Markov models. Proceedings of the Fourth IEEE International Conference on Automatic Face and Gesture Recognition, 2000: 456-461.
    [33] Hyeon-Kyu Lee, Jin H. Kim. An HMM-based threshold model approach for gesture recognition. Pattern Analysis and Machine Intelligence, 1999, 21(10): 961-972.
    [34] A.D. Wilson, A. F. Bobick. Recognition and interpretation of parametric gesture. Proceedings of International conference on computer vision, 1998: 329-336.
    [35] A. D. Wilson, A. F. Bobick. Nonlinear PHMMs for the interpretation of parameterized gesture. Proceedings of 1998 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1998: 879-884.
    [36] Weiming Hu, Tieniu Tan, et al.. A Survey on Visual Surveillance of Object Motion and Behaviors. IEEE transactions on systems, man, and cybernetics-part C: Applications and reviews, 2004, 34(3): 334-352.
    [37] Banavar G., Becky J., et aLChallenges: An Application Model for Pervasive Computing. In Proceedings of MOBICOM 2000: the 6 Annual International Conference on Mobile Computing and Networking, 2000, Boston, MA USA, 2000: 266-274.
    [38] IBM: The role of intelligent agents in the information infrastructure, vol. 1999, 1997.
    [39] Gabbai, J. M. E., et al.. Visualisation of Multi-Agent System Organisations using a Self-Organising Map of Pareto Solutions, in Intelligent Data Engineering and Automated Learning (IDEAL 04), Lecture Notes in Computer Science, Yang, Z. R., et al., Eds. Exeter, UK: Springer, 2004: 841-847.
    [40] Bonabeau, E., et al.. Routing in telecommunications networks with smart ant-like agents. Proceedings of Intelligent Agents for Telecommunication Applications, 1998.
    [41] Paprzycki, M. and Abraham, A. Agent Systems Today: Methodological Considerations. Proceedings of International Conference on Management of e-Commerce and e-Government, Jangxi Science and Technology Press, 2003: 416-421.
    
    [42] Zhao XP, Li MS, Wang Q, Chan K, Leung H. An agent-based self-adaptive software process model. Journal of Software, 2004, 15(3): 348-359.
    [43] Xie W K, Shi Y C, et al.. Smart Platform-A Software Infrastructure for Smart Space (SISS). Proceedings of the Fourth International Conference on Multimodal Interfaces,IEEE Computer Society, 2002:429-434.
    
    [44] Nwana H. S. and Ndumu D. T.. A Perspective on Software Agents Research. The Knowledge Engineering Review, 1999,14(2): 1-18.
    [45] Y. Labrou and T. Finin. Semantics for an Agent Communication Language. Agent Theories, Architectures and Languages. Lecture Notes in Artificial Intelligence, Springer-Verlag, Berlin, 1998.
    [46] Cabri G, et al. MARS: A Programmable Coordination Architecture for Mobile Agents. IEEE Internet Computing, 2000,4 (4): 26-35.
    [47] Cabri G, Leonardi L, Zambonelli F. How to Coordinate Internet Applications based on Mobile Agents. Prceedings of IEEE Seventh International Workshops on Enabling Technologies, IEEE CS Press, 1998:104-109.
    [48] Java Message Service Tutorial, http://java.sun.com/products/jms/tutorial/.
    [49] Microsoft MSMQ http://www.microsoft.com/windows2000/technologies/communications /msmq/default.asp.
    [50] Kyle Burke. Extending CSP to investigate Linda ambiguities. Journal of Computing Colleges, 2003, 18(5): 284-285.
    [51] Gian Pietro Picco, Amy L. Murphy, Gruia-Catalin Roman. LIME: Linda meets mobility, Proceedings of the 21st international conference on Software engineering, 1999:368-377.
    [52] Robert Tolksdorf, Elena Paslaru Bontas, Lyndon J. B. Nixon. A coordination model for the semantic web. Proceedings of the 2006 ACM symposium on Applied computing, 2006:3-27.
    [53]Xiao Xiaoling,Li Layuan.A Multi-agent Architecture for Intelligent Distributed Surveillance Systems.Proceedings of DCABES2007,2007:76-378.
    [54]Y.Wang,L.M.Tao,et al..A flexible multi-server platform for distributed video information processing.The 5th International Conferenc~ on Computer Vision Systems,2007.
    [55]李腊元,李春林.计算机网络技术(第二版).北京:国防工业出版社,2001:83-90.
    [56]M.Valera and S.A.Velastin.Intelligent distributed surveillance systems:a review,IEE Visual Image Signal Process,2005,152(2):192-204.
    [57]I.Haritaoglu,D.Harwood and L.S.Davis.W4:Rea-Time Surveillance of People and Their Activities.IEEE Transactions on Pattern Analysis and Machine Intelligence,2000,22(8):809-830.
    [58]T.Olson,F.Brill.Moving object detection and event recognition algorithms for smart cameras.Proceedings DARPA Image Understanding Workshop,1997:159-175.
    [59]N.Friedman and S.Russell.Image Segmentation in Video Sequences:A Probabilistic Approach.Proceedings of 13th conference on Uncertainty in Artificial Intelligence,1997:175-181.
    [60]E.Grimson,C.Stauffer,R.Romano,and L.Lee.Using Adaptive Tracking to Classify and Monitoring Activities in a Site.Proceedings of Computer Vision and Pattern Recognition,1998:22-29.
    [61]A.Elgammal,D.Harwood,Larry Davis.Non-parametric Model for Background Subtraction.Proceedings of the 6th European Conf.on Computer Vision.2000:246-252.
    [62]A.Lipton,H.Fujiyoshi,and R.Patil.Moving target classification and tracking from real-time video.Proceedings of IEEE Workshop Application of Computer Vision,1998:8-14.
    [63]R.T.Collins,A.J.Lipton.A system for video surveillance and monitoring.Proceedings of Eighth International Topical Meeting on Robotics and Remote Systems,American Nuclear Society,1999.
    [64]Stauffer C.,Grimson W.E.L.Adaptive background mixture models for real-time tracking.Proceedings of CVPR,1999,2:246-252.
    [65]M.Werman and D.Keren.A Bayesian Method for Fitting Parametric and Non-Parametric Models to Noisy Data.IEEE Transactions on Pattern Analysis and Machine Intelligence,2001,23(5):528-534.
    [66]Collins,R.T.Lipton A.J.,Fujiyoshi H.,Kanade T.Algorithms for cooperative multisensor surveillance.Proceedings of the IEEE,2001,89(10):1456-1477.
    [67]Kumar A,Bar-Shalom Y,and Oron E..Precision Tracking based on Segmentation with Optimal Layering for Imaging Sensors.IEEE Transactions on Pattern Analysis and Machine Intelligence,1995,17(2):182-188.
    [68]John L.A.and Krishnamurthy V..Performance Analysis of a Dynamic Programming Tracking Before Detection Algorithm.IEEE Transactions on Aerospace and Electronic Systems,2003,38(1):228-242.
    [69]M.Isard and A.Blake.CONDENSATION-Conditional Density Propagation for Visual Tracking.International Journal on Computer Vision 1998,29(1):5-28.
    [70]Karaulova I,Hall P,Marshall A.A hierarchical model of dynamics for tracking people with a single video camera.Proceedings of British Machine Vision Conference,IEEE Press,2000:352-361.
    [71]Ju S,Black M,Yaccob Y.Cardboard people:A parameterized model of articulated image motion.Proceedings of international Conference on Automatic Face and Gesture Recognition,IEEE Press,1996:38-44.
    [72]Niyogi S,Adelson E.Analyzing and recognizing walking figures in XYT.Proceedings of Computer Vision and Pattern Recognition,IEEE Press,1994:469-474.
    [73]Rohr K.Towards model-based recognition of human movements in image sequences.CV GIP:Image Understanding,1994,59(1):94-115.
    [74]Waehter S,NagelH-H.Tracking persons in monocular image sequences.Computer Vision and Image Understanding,1999,74(3):174-192.
    [75]Urtasun R.,Fleet D.J.,and Fua P..3D people tracking with Gaussian process dynamical models.Proceedings of CVPR,2006:238-245.
    [76]McKenna S et al.Track ing groups of people.Computer Vision and Image Understanding,2000,80(1):42-56.
    [77]Doueet A,de Freitas N,Gordon N J.Sequential Monte Carlo Methods in Practice.New York:Springer-Verlag,2001.
    [78]Liu J,Chen R.Sequential monte carlo methods for dynamic systems.Journal of the American Statistical Association.1998,93:1032-1044.
    [79]Wu Y,Huang T S.A Co-inference Approach to Robust Visual Tracking.Proceedings of ICCV.IEEE Press,2001,2:26-33.
    [80]李安平.复杂环境下的视频目标跟踪算法研究[D].上海:上海交通大学电子信息与电气工程学院,2006.
    [81] Nummiaro K., Koller-Meier E., and Van Gool L.. Color Features for Tracking Non-rigid Objects. Special Issue on Visual Surveillance, Chinese Journal of Automation, 2003, 29 (3): 345-355.
    
    [82] Liu D H, Lam K M, Shen L S. Optimal sampling of Gabor features for face recognition. Pattern Recognition Letters, 2004,25(2): 267-276.
    
    [83] Baron R. Mechanisms of human facial recognition. Int. J. Man-Machine Studies, 1981, 15:137-178.
    [84] Brunelli R, Poggio T. Face recognition: Features versus templates. IEEE Transactions on Pattern Analysis Machine Intelligence, 1993,15(10): 1042-1052.
    [85] D. J. Beymer. Pose-Invariant Face Recognition Using Real and Virtual Views[D]. Massachusetts Institute of Technology, Cambridge, MA, 1995.
    [86] Cootes T F, Wheeler G V, Walker K N, Taylor C J. View-based active appearance models. Image and Vision Computing, 2002,20(9-10): 657-664.
    [87] Jolliffe L T. Principle Component Analysis. New York, Springer-Verlag, 1986.
    [88] Tipping M, Bishop C. Probabilistic principal component analysis. Journal of the Royal Statistical Society, Series B., 1999,61: 611-622.
    [89] Tipping M, Bishop C. mixtures of probabilistic principal component analyzers. Neural Computation, 1999,11(2): 443-482.
    [90] Vapnik V. The Nature of Statistical Learning Theory. Springer-Verlag, 1995.
    [91] Kegl B, Krzyzak A, Linder T, Zeger K. Learning and design of principal curves. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22(3): 281-297.
    [92] Li S Z, Fu Q D, Gu L, Scholkopf B, Cheng Y-M, Zhang H-J. Kernel machine based learning for multi-view face detection and pose estimation. Proceedings of 8th IEEE International Conference on Computer Vision, Vancouver, Canada, July 2001: 674-679.
    [93] Bartlett M, Lades H, Sejnowski T. Independent component representations for face recognition. Proceedings of SPIE: Conference on Human Vision and Electronic Imaging 111,1998,2399:528-539.
    [94] Hyvrinen A, Hoyer P. Emergence of phase and shift invariant features by decomposition of natural images into independent feature subspaces. Neural Computation, 2000, 12: 1705-1720.
    [95] Mika S, et al.. Fisher discriminant analysis with kernels. Proceedings of Workshop on Neural Networks for Signal Processing, IEEE Press, 1999: 41-48.
    [96] Baudat G, Anouar F. Generalized discriminant analysis using a kernel approach. Neural Computation, 2000,12: 2385-2404.
    [97] Anil K. Ghosh and Probal Chaudhuri. Optimal smoothing in kernel discriminant analysis. Statistica Sinica, 2004,14: 457-483.
    [98] Yu H, Yang J. A direct Ida algorithm for high-dimensional data with application to face recognition. Pattern Recognition, 2001,34: 2067-2070.
    [99] L. Chen, H. Liao, M. Ko, J. Lin, and G. Yu. A new LDA-based face recognition system which can solve the small sample size problem. Pattern Recognition, 2000, 33: 1713-1726.
    [100] Yang M-H. Face Recognition Using Extended Isomap. Proceedings of International conference of Image Processing, IEEE Press, 2002: 117-120.
    [101] Saul L K, Roweis S T. Think Globally, Fit Locally: Unsupervised Learning of Low Dimensional Manifolds. Journal of Machine Learning Research, 2003,4: 119-155.
    [102] J.C. Platt. Probabilities for Support Vector Machines. In: Advances in Large Margin Classifiers. Massachusetts: MIT Press, 2000: 61-74.
    [103] 肖小玲,李腊元等.一种多类支持向量机概率建模新方法.计算机工程.2006,32(20): 28-29.
    [104] M. Moreira and E. Mayoraz. Improved Pairwise Coupling Classification with Correcting Classifiers. Proceedings Of 10th European Conference on Machine Learning, 1998: 160-171.
    [105] T.Hastie, R.Tibshirani. Classification by Pairwise Coupling.The Annals of Statistics, 1998,26(1): 451-471.
    [106] Sangho Park, J.K.A., et al.. Recognition of two-person, interactions using a hierarchical Bayesian network. In. ACM SIGMM International Workshop on Video Surveillance, 2003:65-76
    [107] Sung K, Poggio T. Example-Based Learning for ViewBased Human Face Detection. IEEE Tran. on Pattern Analysis Machine Intelligence, 1998, 20(1): 39-51.
    [108] Hilary buxton. Learning and understanding dynamic scene activity: a review. Image and Vision Computing, 2003,21(1): 125-136.
    [109] Nguyen N., Phung D., Venkatesh S., Bui H.. Learning and detecting activities from movement trajectories using the hierarchical hidden Markov model. Proceedings of International Conference on Computer Vision and Pattern Recognition, IEEE Press, 2005: 955-960.
    [110] N. Oliver, A. Garg and E. Horvitz. Layered representations for learning and inferring office activity from multiple sensory channels. Computer Vision and Image Understanding, 2004,96(2): 163-180.
    [111] Dong Zhang, Daniel Gatica-Perez, Samy Bengio, et al.. Modeling Individual and Group Actions in Meetings: a Two-Layer HMM Framework. Proceedings of International Conference on Multimedia: Video Surveillance and Sensor Networks. ACM Press, 2004.
    [112] Y. Ivanov and A. Bobick. Recognition of visual activities and interactions by stochastic parsing. IEEE Transactions on Pattern Recognition and Machine Intelligence, 2000,22(8): 852-872.
    [113] David S. Kosbie. Hierarchical events in graphical user interfaces. Proceedings of Conference on Human Factors in Computing Systems, ACM Press, 1994: 131-132.
    [114] Gerard Medioni, Isaac Cohen, et al.. Event Detection and Analysis from Video Streams. IEEE transactions on pattern analysis and machine intelligence, 2001,23(8): 873-889.
    [115] R.Polana and R.Nelson. Detecting activities. Journal of Visual Communication and Image Representation, 1994,5(2): 172-180.
    [116] Mohan Manubhai Trivedi, Kohsia Samuel Huang, Ivana Mikic. Dynamic Context Capture and Distributed Video Arrays for Intelligent Spaces. IEEE Transactions on Systems, Man, and, Cybernetics- Part A: Systems and humans, 2005, 35(1): 145-163.
    [117] Albrecht Schmidt. Implicit Human Computer Interaction Through Context. Personal Technologies, 2000,4(2): 191-199.
    [118] A. Bobick, J. Davis. Real time recognition of activity using temporal templates. Proceedings of Third IEEE Workshop on applications of computer vision, Florida, 1996: 39-42.
    [119] Sangho Park. A Hierarchical Graphical Model for Recognizing Human Actions and Interactions in Video [D]. The University of Texas, 2004.
    [120] Ram Nevatia. Hierarchical Language-based Representation of Events in Video Streams. Proceedings of IEEE Workshop on Event Mining, IEEE Press, 2003: 39-45.
    [121] Bobick A, Davis J. Real-time recognition of activity using temporal templates.Proceeding of IEEE Workshop on Applications of Computer Vision. 1996:39-42.
    [122] Philip Kelly, Noel E. O'Connor, Alan F. Smeaton: Event Detection in Pedestrian Detection and Tracking Applications. Proceedings of SAMT, 2007: 296-299.
    [123] N.M.Oliver, B.Rosario, and A.Pentland. A Bayesian computer vision system for modeling human interactions. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000,22(8): 831-843.
    [124] Vaswani N., Roy-Chowdhury A.K, Chellappa R.. Shape Activity: a continuous-state HMM for moving deforming shapes with application to abnormal activity detection. IEEE Transactions on Image Processing. 2005,14(10): 1603-1616.
    [125]Youtian Du,Feng Chen,Wenli Xu,Weidong Zhang.Interacting Activity Recognition Using Hierarchical Durational-State Dynamic Bayesian Network.PCM 2006:185-192.
    [126]M.Pachter,P R Chandler.Universal Linearization Concept for Extended Kalman Filters.IEEE Trans.on Aerospace and Electronic Systems,1993,29(3):946-961.
    [127]Anping Li Zhongliang Jing Shiqiang Hu.Particle filter based visual tracking with multi-cue adaptive fusion.Chinese Optics Letters,2005,3(6):326-329.
    [128]Xinyu Xu,Baoxin Li.Rao-Blackweilised particle filter for tracking with application in visual surveillance.Proceeding of 2nd Joint IEEE International Workshop on Visual Surveillance and Performance Evaluation of Tracking and Surveillance,2005:17-24.
    [129]B.Vo,S.Singh and A.Doucet.Sequential Monte Carlo methods for Bayesian Multi-target filtering with Random Finite Sets.IEEE Trans.Aerospace and Electronic Systems.2005,41(4):1224-1245.
    [130]J Carpenter,P Clifford,P Feamhead.Improved Particle Filter for Nonlinear Problems.IEE proc.Radar,Sonar,Navig.,1999,146(1):2-7.
    [131]A Doucet,N Gordon,V Krishnamurthy.Particle Filters for State Estimation of Jump Markov Linear Systems.IEEE Transactions on Signal Processing,2001,49(3):613-624.
    [132]肖小玲,李腊元.基于粒子滤波的场景事件实时识别.武汉理工大学学报(交通科学与工程版),2007,31(5):823-826.
    [133]Casella,G.and Robert,C.P.Rao-Blackwellisation of sampling schemes.Biometrika,1996,83(1):81-94.
    [134]肖小玲,李腊元.基于多层事件融合的场景事件实时分析.武汉理工大学学报(交通科学与工程版),2008,32(2):279-282.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700