ABSTRACT
For the construction site image understanding, object detection and recognition are the most important tasks. In the construction site with electrical equipment, the scene need to be monitored carefully to avoid accident. In our work, one anomaly detection method via the cloud computation is proposed. The method consists of the one-stage deep learning object detection model and the one-class classification. The one-stage object detection method detects and recognizes the objects in the scenes. Then, the one-class SVM alarms the abnormal region. The proposal algorithm has been tested on several scenes of real construction sites, and achieves fine results practicably.
- S. Canu, Y. Grandvalet, V. Guigue, and A. Rakotomamonjy. 2005. SVM and Kernel Methods Matlab Toolbox. Perception Systèmes et Information, INSA de Rouen, Rouen, France. (2005).Google Scholar
- Navneet Dalal and Bill Triggs. 2005. Histograms of oriented gradients for human detection. In Proceedings of the Computer Vision and Pattern Recognition (CVPR), Vol. 1. IEEE, 886--893.Google ScholarDigital Library
- P. F. Felzenszwalb, R. B. Girshick, D. McAllester, and D. Ramanan. 2010. Object Detection with Discriminatively Trained Part-Based Models. IEEE Transactions on Pattern Analysis and Machine Intelligence 32, 9 (Sept 2010), 1627--1645.Google ScholarDigital Library
- Ross Girshick. 2015. Fast r-cnn. In Proceedings of the IEEE international conference on computer vision. 1440--1448.Google ScholarDigital Library
- Ross Girshick, Jeff Donahue, Trevor Darrell, and Jitendra Malik. 2014. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition. 580--587.Google ScholarDigital Library
- Ross Girshick, Jeff Donahue, Trevor Darrell, and Jitendra Malik. 2014. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 580--587.Google ScholarDigital Library
- Giovanni Gualdi, Andrea Prati, and Rita Cucchiara. 2012. Multistage particle windows for fast and accurate object detection. IEEE transactions on pattern analysis and machine intelligence 34, 8 (2012), 1589--1604.Google ScholarDigital Library
- Kaiming He, Georgia Gkioxari, Piotr Dollår, and Ross Girshick. 2017. Mask r-cnn. arXiv preprint arXiv:1703.06870 (2017).Google Scholar
- Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 770--778.Google ScholarCross Ref
- Huang Jie and Zhang Hai. 2008. Plane detection based on support vector machine and information fusion. Electronics Optics & Control 15, 9 (2008), 6--9.Google Scholar
- Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. ImageNet classification with deep convolutional neural networks. In Proceedings of Advances in neural information processing systems. 1097--1105.Google Scholar
- Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE 86, 11 (1998), 2278--2324.Google ScholarCross Ref
- Wei Liu, Dragomir Anguelov, Dumitru Erhan, Christian Szegedy, Scott Reed, Cheng-Yang Fu, and Alexander C Berg. 2016. SSD: Single shot multibox detector. In Proceedings of European Conference on Computer Vision (ECCV). Springer, 21--37.Google ScholarCross Ref
- D. G. Lowe. 1999. Object recognition from local scale-invariant features. In Proceedings of the IEEE International Conference on Computer Vision (ICCV), Vol. 2. 1150--1157 vol. 2.Google ScholarDigital Library
- Timo Ojala, Matti Pietikainen, and David Harwood. 1994. Performance evaluation of texture measures with classification based on Kullback discrimination of distributions. In Proceedings of the International Conference on Pattern Recognition, Vol. 1. IEEE, 582--585.Google ScholarCross Ref
- Joseph Redmon, Santosh Divvala, Ross Girshick, and Ali Farhadi. 2016. You only look once: Unified, real-time object detection. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 779--788.Google ScholarCross Ref
- Joseph Redmon and Ali Farhadi. 2017. YOLO9000: better, faster, stronger. In Proceedings of the IEEE conference on computer vision and pattern recognition. 7263--7271.Google ScholarCross Ref
- Joseph Redmon and Ali Farhadi. 2018. Yolov3: An incremental improvement. arXiv preprint arXiv:1804.02767 (2018).Google Scholar
- Bernhard Schölkopf, John C Platt, John Shawe-Taylor, Alex J Smola, and Robert C Williamson. 2001. Estimating the support of a high-dimensional distribution. Neural computation 13, 7 (2001), 1443--1471.Google ScholarDigital Library
- Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. (2015), 14 pages.Google Scholar
- Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015. Going Deeper With Convolutions. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR).Google ScholarCross Ref
- Tian Wang and Hichem Snoussi. 2014. Detection of abnormal visual events via global optical flow orientation histogram. IEEE Transactions on Information Forensics and Security 9, 6 (2014), 988--998.Google ScholarDigital Library
Index Terms
- Abnormal object detection and recognition in the complex construction site via cloud computing
Recommendations
Deep Learning for Anomaly Detection: A Review
Anomaly detection, a.k.a. outlier detection or novelty detection, has been a lasting yet active research area in various research communities for several decades. There are still some unique problem complexities and challenges that require advanced ...
CloudShield: Real-time Anomaly Detection in the Cloud
CODASPY '23: Proceedings of the Thirteenth ACM Conference on Data and Application Security and PrivacyIn cloud computing, it is desirable if suspicious activities can be detected by automatic anomaly detection systems. Although anomaly detection has been investigated in the past, it remains unsolved in cloud computing. Challenges are: characterizing the ...
An LOF-Based Adaptive Anomaly Detection Scheme for Cloud Computing
COMPSACW '13: Proceedings of the 2013 IEEE 37th Annual Computer Software and Applications Conference WorkshopsOne of the most attractive things about cloud computing from the perspective of business people is that it provides an effective means to outsource IT. The behaviors of business applications on cloud are constantly evolving due to technical upgrading, ...
Comments