Hierarchical Semantic Processing Architecture for Smart Sensors in Surveillance Networks

被引:36
作者
Bruckner, Dietmar [1 ]
Picus, Cristina [2 ]
Velik, Rosemarie [3 ]
Herzner, Wolfgang [2 ]
Zucker, Gerhard [4 ]
机构
[1] Vienna Univ Technol, Inst Comp Technol, A-1040 Vienna, Austria
[2] Austrian Inst Technol, Dept Safety & Secur, A-1220 Vienna, Austria
[3] Carinthian Tech Res, A-9524 Villach, Austria
[4] Austrian Inst Technol, Dept Energy, A-1210 Vienna, Austria
关键词
Data mining; hierarchical model; semantic symbols; sensor fusion; sensor networks; surveillance;
D O I
10.1109/TII.2012.2186142
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data acquisition by multidomain data acquisition provides means for environment perception usable for detecting unusual and possibly dangerous situations. When being automated, this approach can simplify surveillance tasks required in, for example, airports or other security sensitive infrastructures. This paper describes a novel architecture for surveillance networks based on combining multimodal sensor information. Compared to previous methodologies using only video information, the proposed approach also uses audio data thus increasing its ability to obtain valuable information about the sensed environment. A hierarchical processing architecture for observation and surveillance systems is proposed, which recognizes a set of predefined behaviors and learns about normal behaviors. Deviations from "normality" are reported in a way understandable even for staff without special training. The processing architecture, including the physical sensor nodes, is called smart embedded network of sensing entities (SENSE). Parts of this work have been published previously; the main enhancements of this paper compared to previous publications are detailed descriptions of the layers 1 and 4, "preprocessing including plausibility checks" and "parameter inference." In the other layers, details not necessary for a general understanding of the approach have been omitted.
引用
收藏
页码:291 / 301
页数:11
相关论文
共 38 条
  • [1] [Anonymous], 1980, MARKOV RANDOM FIELDS, DOI DOI 10.1090/CONM/001
  • [2] Bauer D., 2006, P 18 INT C PATT REC
  • [3] Benet G, 2010, C HUM SYST INTERACT, P779, DOI 10.1109/HSI.2010.5514479
  • [4] Bishop CM., 1995, NEURAL NETWORKS PATT
  • [5] Bruckner Dietmar, 2008, 2008 Conference on Human System Interactions, P668, DOI 10.1109/HSI.2008.4581520
  • [6] Bruckner D., 2007, THESIS VIENNA U TECH
  • [7] Behavior Learning in Dwelling Environments With Hidden Markov Models
    Bruckner, Dietmar
    Velik, Rosemarie
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2010, 57 (11) : 3653 - 3660
  • [8] BURGSTALLER W, 2007, THESIS VIENNA U TECH
  • [9] Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access
    Cheminod, Manuel
    Pironti, Alfredo
    Sisto, Riccardo
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (01) : 30 - 40
  • [10] An agent-based intelligent control platform for industrial holonic manufacturing systems
    Colombo, AW
    Schoop, R
    Neubert, R
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2006, 53 (01) : 322 - 337