PRE2016 4 Groep3: Difference between revisions

From Control Systems Technology Group
Jump to navigation Jump to search
No edit summary
Line 64: Line 64:
*Create final presentation
*Create final presentation


The main goal of the model is to provide a general structure of a program which is capable of identifying suspicious persons in a crowd for security applications. The method should be based on biometrics which can be used to determine abnormal behavior in order to obtain a higher success rate than comparable human-based surveillance.  
The main goal of the model is to provide a general structure of a program which is capable of identifying suspicious persons for security applications. The method should be based on biometrics which can be used to determine abnormal behavior in order to obtain a higher success rate than comparable human-based surveillance.  


The objectives of the model are:
The objectives of the model are:

Revision as of 12:01, 30 April 2017

Group members

Student ID Name
0900940 Ryan van Mastrigt
0891024 René Verhoef
0854765 Lisselotte van Wissen
0944862 Sjanne Zeijlemaker
0980963 Michalina Tataj


Introduction

Problem description

Definitions

Abnormal behaviour
[explanation]
Biometrics
[explanation]


Objectives (/ TO DO list)

Goal: Develop a model for a video-based abnormal behaviour detection program

Objectives of this project:

  • Formulate concrete problem statement
  • Develop overview of the State-of-the-Art
    • List of possible biometrics for detecting abnormal/suspicious behaviour
    • List of different methods available for measuring biometrics (pros/cons, what method works best for what purpose/setting)
    • Current areas of research
    • Problems with current technologies
  • Develop model scenarios for determining abnormal behavior
    • Determine what constitutes abnormal behavior (heavily dependent on context)
    • Determine what scenarios should be looked at (airports, sports stadia, banks)
    • What techniques could be used (pros/cons, possible new ideas)
  • Develop USE aspects
    • Users:
      • Develop easy-to-understand graphical interface for primary users
      • Maintain sense of participation in primary users
      • Conduct survey among general public to research support of such an application and to probe stance on privacy vs security
      • Incorporate findings into design
    • Society:
      • Look into societal advantages (decreased criminal/terrorist activity, global sense of security, decrease in racial/religious tensions)
      • Look into societal disadvantages (decrease in (perceived) privacy)
      • Incorporate findings into design
    • Enterprise:
      • Make sure model is economically feasible and can compete with current systems
      • Look into advantages/disadvantages for enterprises
      • Incorporate findings into design
  • Finalize actual model design
  • Create final presentation

The main goal of the model is to provide a general structure of a program which is capable of identifying suspicious persons for security applications. The method should be based on biometrics which can be used to determine abnormal behavior in order to obtain a higher success rate than comparable human-based surveillance.

The objectives of the model are:

  • Technical objectives:
    • Decrease false-negative rate compared to human-based surveillance
    • Decrease false-positive rate compared to human-based surveillance
    • Provide results to primary user(s) (security guards/police)
  • USE objectives:
    • Users:
      • Provide easy-to-understand information to primary user
      • Provide a higher sense of security (secondary user)
    • Society:
      • Decrease terrorist activity
      • Higher global sense of security
      • Higher crime prevention
      • Decrease racial/religious tensions
    • Enterprise:
      • Create a system which is better than current systems, in order to sell to users
      • Be economically feasible
      • Decrease damage caused to assets (such as buildings) and maintain company reputation

State-of-the-art

Approach

Planning

[input Gantt chart]

Milestones

USE aspects

User

Primary users

[who]

Secondary users

[who]

User friendliness

Sense of participation

Public survey

Society

Advantages

Terrorist/criminal activity

Security

Racial/religious tensions

Disadvantages

Privacy concerns

Enterprise

Feasibility

Advantages

Disadvantages

Model

[explanation of concept/pseudocode] [link to actual code?]

Results

References