Computational Intelligence - February 2013 - 59

Table 1 Notation used in our method.

a

SYMbOl

DeSCriPTiON

T

number of Topics

D

number of documenTs

V

number of unique locaTions

W

number of unique direcTions

Nj

number of locaTions in documenT j

ij

The mulTinomial disTribuTion of Topics specific To documenT j

zz

The mulTinomial disTribuTion of locaTions specific To Topic z

}z

The mulTinomial disTribuTion of direcTions specific To Topic z

zji

The Topic associaTed wiTh The ith locaTion in The documenT j

lji

The ith locaTion in documenT j

dji

The direcTion associaTed wiTh The ith locaTion in documenT j

nz,v

The co-occur Time of The zth Topic and The vth locaTion

nz,w

The co-occur Time of The zth Topic and The wth direcTion

nj,z

The co-occur Time of The jth documenT and The zth Topic

the motion vector will be quantized
into a high dimensional codebook.
Then the data will be handled by the
two principal parts of our approach:
graph model and rough sets classifier.
The graph model is used to convert the
video data into another representation,
i.e., the original motion frames can be
represented by low dimension feature
vectors, which will also represent the
atomic activities existing in each scene.
The rough sets classifier is used to classify the video behaviors, which are represented in the low dimension feature
vectors. Hence the topic model generates low dimension features that the
rough sets classifier recognizes. In the
next sections, we will describe the
topic model and rough sets classifier in
detail.
B. Graph Model

The bag-of-words assumption [35] is
important to the topic model, under
which all features are considered conditionally independent. The temporal
and spatial information will be discarded. However video data is a
sequence of inherent temporal and spatial information, without which the
behavior analysis will not be accurate.
Based on the original LDA model, the
follow-up improvements are focused
on offsetting the lost information. In
the text mining field, analysis of the
topic variation over time has become a
popular issue. The key to this issue is
how to introduce the time factor in the

i
z

b

z

T

l

d
i

}

T

c

j
Figure 4 The graph model of our method.

model [9], [36]-[38]. In the topic over
time model (TOT) [9], the time factor
was introduced as time-stamp for each
word, while in [36]-[38] models were
built under the Markov assumption. In
the TOT model, when a word was
sampled from a topic, a time-stamp was
also sampled.
Motivated by this, we propose
another way to use the model to generate a motion frame.
In most approaches, the codebook is
generated as follows:
❏ Divide the video into non-overlapping
video clips which are used as docu-

ments. If the video runs at 30fps, the
clip length is 1s, then each document
consists of 30 frames.
❏ Divide the frame into a grid to
extract features. If the resolution is
360#288, and each cell is 8#8, then
the grid is 45#36.
❏ Use optical flow to extract features. If
a motion is detected in a cell, then a
word representing the direction will
be generated. The number of direction is usually set to 4.
❏ We can obtain a codebook with
45#36#4 words. However, in our
model we generate the codebook with
45#36 words, i.e., we consider each
cell as the word, and the direction is
just a direction-stamp of the cell.This is

Training
Data
Calculate
Reducts
Calculate
Decision
Rules

Testing
Data
Decision
Rules

Select Matching
Rules

Calculate Strength of Matching
Rules for Decision Class

Select Decision Class with Maximal
Strength of Selected Rules
Decision Value
for Testing Data
Figure 5 The flow of classification using rough sets method.

February 2013 | Ieee ComputatIonal IntellIgenCe magazIne

59



Table of Contents for the Digital Edition of Computational Intelligence - February 2013

Computational Intelligence - February 2013 - Cover1
Computational Intelligence - February 2013 - Cover2
Computational Intelligence - February 2013 - 1
Computational Intelligence - February 2013 - 2
Computational Intelligence - February 2013 - 3
Computational Intelligence - February 2013 - 4
Computational Intelligence - February 2013 - 5
Computational Intelligence - February 2013 - 6
Computational Intelligence - February 2013 - 7
Computational Intelligence - February 2013 - 8
Computational Intelligence - February 2013 - 9
Computational Intelligence - February 2013 - 10
Computational Intelligence - February 2013 - 11
Computational Intelligence - February 2013 - 12
Computational Intelligence - February 2013 - 13
Computational Intelligence - February 2013 - 14
Computational Intelligence - February 2013 - 15
Computational Intelligence - February 2013 - 16
Computational Intelligence - February 2013 - 17
Computational Intelligence - February 2013 - 18
Computational Intelligence - February 2013 - 19
Computational Intelligence - February 2013 - 20
Computational Intelligence - February 2013 - 21
Computational Intelligence - February 2013 - 22
Computational Intelligence - February 2013 - 23
Computational Intelligence - February 2013 - 24
Computational Intelligence - February 2013 - 25
Computational Intelligence - February 2013 - 26
Computational Intelligence - February 2013 - 27
Computational Intelligence - February 2013 - 28
Computational Intelligence - February 2013 - 29
Computational Intelligence - February 2013 - 30
Computational Intelligence - February 2013 - 31
Computational Intelligence - February 2013 - 32
Computational Intelligence - February 2013 - 33
Computational Intelligence - February 2013 - 34
Computational Intelligence - February 2013 - 35
Computational Intelligence - February 2013 - 36
Computational Intelligence - February 2013 - 37
Computational Intelligence - February 2013 - 38
Computational Intelligence - February 2013 - 39
Computational Intelligence - February 2013 - 40
Computational Intelligence - February 2013 - 41
Computational Intelligence - February 2013 - 42
Computational Intelligence - February 2013 - 43
Computational Intelligence - February 2013 - 44
Computational Intelligence - February 2013 - 45
Computational Intelligence - February 2013 - 46
Computational Intelligence - February 2013 - 47
Computational Intelligence - February 2013 - 48
Computational Intelligence - February 2013 - 49
Computational Intelligence - February 2013 - 50
Computational Intelligence - February 2013 - 51
Computational Intelligence - February 2013 - 52
Computational Intelligence - February 2013 - 53
Computational Intelligence - February 2013 - 54
Computational Intelligence - February 2013 - 55
Computational Intelligence - February 2013 - 56
Computational Intelligence - February 2013 - 57
Computational Intelligence - February 2013 - 58
Computational Intelligence - February 2013 - 59
Computational Intelligence - February 2013 - 60
Computational Intelligence - February 2013 - 61
Computational Intelligence - February 2013 - 62
Computational Intelligence - February 2013 - 63
Computational Intelligence - February 2013 - 64
Computational Intelligence - February 2013 - 65
Computational Intelligence - February 2013 - 66
Computational Intelligence - February 2013 - 67
Computational Intelligence - February 2013 - 68
Computational Intelligence - February 2013 - 69
Computational Intelligence - February 2013 - 70
Computational Intelligence - February 2013 - 71
Computational Intelligence - February 2013 - 72
Computational Intelligence - February 2013 - 73
Computational Intelligence - February 2013 - 74
Computational Intelligence - February 2013 - 75
Computational Intelligence - February 2013 - 76
Computational Intelligence - February 2013 - 77
Computational Intelligence - February 2013 - 78
Computational Intelligence - February 2013 - 79
Computational Intelligence - February 2013 - 80
Computational Intelligence - February 2013 - Cover3
Computational Intelligence - February 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com