User Guide
Why can I only view 3 results?
You can also view all results when you are connected from the network of member institutions only. For non-member institutions, we are opening a 1-month free trial version if institution officials apply.
So many results that aren't mine?
References in many bibliographies are sometimes referred to as "Surname, I", so the citations of academics whose Surname and initials are the same may occasionally interfere. This problem is often the case with citation indexes all over the world.
How can I see only citations to my article?
After searching the name of your article, you can see the references to the article you selected as soon as you click on the details section.
 ASOS INDEKS
  Citation Number 1
 Views 4
Automated Real Time Detection of Suspicious Appearances Using Deep Learning
2021
Journal:  
Havacılık ve Uzay Teknolojileri Dergisi
Author:  
Abstract:

Security camera systems especially in public areas such as airports, courthouses or sports facilities etc. are used to find fugitive persons or detect suspicious behaviors manually under the monitoring of an operator. In hallway-like sections in public facilities, repeated appearances of an unknown ordinary person in a short span of time can be defined as suspicious behavior. However, the fact that multiple cameras are monitored by a single operator makes it harder to detect suspicious behaviors especially in crowded fields. Therefore, support decision systems are required to support operator. If individuals are detected on images automatically and their appearances on the camera are recorded on a database by giving them a temporary identity, suspicious behaviors can be reported to an operator as a support decision system. For this reason, two different methods are used together as a hybrid solution in the study; a MTCNN based facial detection is used on the real time security camera images that currently provide face images, and an identification method, created with facial landmarks produced with a deep learning algorithm that was trained with res-net, was used on the obtained person’s face images. It has been presented that suspicious behaviors can be detected by interpreting the temporary identity information that was obtained. The success of the application was experimentally tested, and the causes of success and failures in the results were discussed.

Keywords:

Citation Owners
Attention!
To view citations of publications, you must access Sobiad from a Member University Network. You can contact the Library and Documentation Department for our institution to become a member of Sobiad.
Off-Campus Access
If you are affiliated with a Sobiad Subscriber organization, you can use Login Panel for external access. You can easily sign up and log in with your corporate e-mail address.
Similar Articles










Havacılık ve Uzay Teknolojileri Dergisi

Journal Type :   Uluslararası

Havacılık ve Uzay Teknolojileri Dergisi