in Education by
Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. We don’t allow questions seeking recommendations for books, tools, software libraries, and more. You can edit the question so it can be answered with facts and citations. Closed 1 year ago. Improve this question I have a problem related to computer vision and machine learning. Basically we are working on video surveillance system which will be trained to detect any suspicious activity like theft or shop lifting in stores.We are confused that is that will be able to solve this problem or not. We don't know that is it feasible or not. So kindly just suggest us something. Any help will be appreciated. While I understand that Open CV is great for face-detection and usable for face-recognition, can it be used for analyzing "actions", s.a. the act of sitting, the act of lifting an object off the shelf ? If so, what are some of these algorithms I should dig deeper into ? Are there other libraries (other than OpenCV) which need to be used for such tasks? Are there open-source libraries for the same? JavaScript questions and answers, JavaScript questions pdf, JavaScript question bank, JavaScript questions and answers pdf, mcq on JavaScript pdf, JavaScript questions and solutions, JavaScript mcq Test , Interview JavaScript questions, JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)

1 Answer

0 votes
by
What you are trying to achieve is currently a very active area in computer vision and machine learning research called Behaviour Analysis or Activity Detection. State of the art approaches can be found in journals like PAMI or conferences like CVPR or NIPS. As of today, it is nowhere near the performance you would require to build an automatic theft-detection system in the general case (i.e., any surveillance camera looking into any scene in any orientation). Behaviour Analysis is based on many underlying techniques, such as identifying the pose of people in images. Current research is still trying to figure out if there's a person in the picture and the position of its limbs in the general case. Here's what might be feasible with the current research state: A system that help an operator focus on potential threats when cameras have a clear unobstructed view to a clear and mostly static environment (e.g., glass displays). An operator could therefore monitor many more cameras than before, because the system will automatically hide the cameras that clearly does not contain suspicious activity or movement. To know more about current possibilities, I recommend you to check the literature (like this example), decompose the problem into subparts and leverage your priors (your a priori knowledge of the scene and people you're looking at) as much as possible.

Related questions

0 votes
    which of the scenarios can we overcome by using BPM? option a) Theft b)Time wastage c) None of these Select the correct answer from above options...
asked Dec 19, 2021 in Education by JackTerrance
0 votes
    which of the scenarios can we overcome by using BPM? option a) Theft b)Time wastage c) None of these Select the correct answer from above options...
asked Dec 18, 2021 in Education by JackTerrance
0 votes
    You are given a dataset on cancer detection. You have built a classification model and achieved an accuracy of 96 percent ... with your model performance? What can you do about it?...
asked Apr 27, 2021 in Technology by JackTerrance
0 votes
0 votes
    Using spy cameras in malls and shops to capture private parts of any person comes under section 67 of IT Act, ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    I'm getting this error when trying to add products to google content, my google account seems ok the ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Feb 13, 2022 in Education by JackTerrance
0 votes
    Q10.Explain the following-(i) E-Learning (ii) E-banking (iii) E-Shopping (iv) E-governance Select the correct answer from above options...
asked Dec 21, 2021 in Education by JackTerrance
0 votes
    _________ databases are used to store Session information, User profile, preferences, and shopping cart data. (1)Key-Value Pair (2)Graph (3)Document (4)Column...
asked Apr 21, 2021 in Technology by JackTerrance
+1 vote
    _________ databases are used to store Session information, User profile, preferences, and shopping cart data....
asked Oct 11, 2020 in Education by anonymous
0 votes
    which of the following is a disadvantage of making payment online ? A) Theft of credit card number b) ... dependence on computers Select the correct answer from above options...
asked Dec 10, 2021 in Education by JackTerrance
0 votes
    Which of the following is an affect of intellectual property theft Select the correct answer from above options...
asked Dec 2, 2021 in Education by JackTerrance
0 votes
    Cracking digital identity of any individual or doing identity theft, comes under __________ of IT Act. (a) Section 65 ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    It seems using getters inside templates causes Angular change detection to go into a loop (getter gets ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked May 8, 2022 in Education by JackTerrance
...