Computational Intelligence - February 2013 - 64

(a)

(b)

(c)

(d)

Figure 14 Behaviors detected by our model in QMUL dataset2. (a) Vertical and vertical-right
traffic flow, (b) only vertical traffic flow, (c) pedestrian across road, and (d) pedestrian across
road when there is traffic flow.
Table 4 Weighted average recall precision and accuracy of four algorithms in qmul
dataset1.
algoriThm

exhausTive

geneTic

covering

lem2

recaLL

0.610

0.599

0.565

0.702

Precision

0.625

0.626

0.574

0.697

accUracy

0.605

0.588

0.582

0.776

coVerage

0.962

0.955

0.658

0.283

Table 5 Weighted average recall precision and accuracy of four algorithms in qmul
dataset2.
algoriThm

exhausTive

geneTic

covering

lem2

recaLL

0.503

0.505

0.438

0.610

Precision

0.549

0.551

0.452

0.583

accUracy

0.5

0.503

0.441

0.617

coVerage

0.98

0.975

0.885

0.3

Table 6 Confusion matrix of exhaustive algorithm in qmul dataset1.
behavior 1

2

3

4

5

recall

coverage

1

15

10

3

4

6

0.388

1

2

10

44

2

7

1

0.706

0.988

3

10

7

105

12

6

0.754

0.943

4

9

17

15

21

12

0.273

0.977

5

10

3

1

7

48

0.715

0.948

0.55

0.85

0.35

0.67

Precision 0.38

64

IEEE ComputatIonal IntEllIgEnCE magazInE | FEbruary 2013

At first, we set the number of topics
to 4. As shown in Fig. 7, the 4 topics
indicate 4 directions. We also set the
number of topics to 4 in the original
LDA, as shown in Fig. 8, the topics
under our model are different from the
LDA's. Because moving directly up and
down co-occur frequently, they are
assigned to the same topic, which can
be seen in Fig. 8(a). Since there are
more than 4 behaviors in the video,
4 topics are not enough to represent
the behaviors. Therefore, some different behaviors will be assigned to one
topic though they are not "frequently"
co-occurring, which can be seen in
Fig. 8(b). We can see that the cutting
across traffic behavior and the vertical
traffic behavior are assigned to the
same topic in Fig. 8(c) and (d).
We then set the number to 5. From
the results in Fig. 9, we find that there
is a topic red that indicates cutting
across traffic. The 4 topics still indicate
4 directions.
When the number comes to 6, it is
shown in Fig. 10 that the vertical traffic
flow has been split into more fine granularities. From Fig. 10(a) and (c) we
note that the traffic flow toward left has
been split into two topics: blue and
cyan. The blue occurs when there is
cutting across traffic (from up to left) or
there is pedestrian on the left. The cyan
occurs when there is horizontal traffic.
In Fig. 10(d), the traffic flow downwards has split into two topics: pink
and red. The red occurs when the traffic flow will turn right, and the pink
just indicates that the traffic flow moves
directly down. The two remainder topics cyan and yellow indicate the horizontal traffic flow.
In Table 2, it can be seen that the
granularity of activities becomes better
with number of topics increasing.
2) Behavior Detection:
As we discussed in section I, the
abnor malities are combinations of
atomic activities that cannot co-occur,
and the experiments above show that
the more topics there are, the finer
activity granularity will be. As there
are 6 atomic activities, no more than



Table of Contents for the Digital Edition of Computational Intelligence - February 2013

Computational Intelligence - February 2013 - Cover1
Computational Intelligence - February 2013 - Cover2
Computational Intelligence - February 2013 - 1
Computational Intelligence - February 2013 - 2
Computational Intelligence - February 2013 - 3
Computational Intelligence - February 2013 - 4
Computational Intelligence - February 2013 - 5
Computational Intelligence - February 2013 - 6
Computational Intelligence - February 2013 - 7
Computational Intelligence - February 2013 - 8
Computational Intelligence - February 2013 - 9
Computational Intelligence - February 2013 - 10
Computational Intelligence - February 2013 - 11
Computational Intelligence - February 2013 - 12
Computational Intelligence - February 2013 - 13
Computational Intelligence - February 2013 - 14
Computational Intelligence - February 2013 - 15
Computational Intelligence - February 2013 - 16
Computational Intelligence - February 2013 - 17
Computational Intelligence - February 2013 - 18
Computational Intelligence - February 2013 - 19
Computational Intelligence - February 2013 - 20
Computational Intelligence - February 2013 - 21
Computational Intelligence - February 2013 - 22
Computational Intelligence - February 2013 - 23
Computational Intelligence - February 2013 - 24
Computational Intelligence - February 2013 - 25
Computational Intelligence - February 2013 - 26
Computational Intelligence - February 2013 - 27
Computational Intelligence - February 2013 - 28
Computational Intelligence - February 2013 - 29
Computational Intelligence - February 2013 - 30
Computational Intelligence - February 2013 - 31
Computational Intelligence - February 2013 - 32
Computational Intelligence - February 2013 - 33
Computational Intelligence - February 2013 - 34
Computational Intelligence - February 2013 - 35
Computational Intelligence - February 2013 - 36
Computational Intelligence - February 2013 - 37
Computational Intelligence - February 2013 - 38
Computational Intelligence - February 2013 - 39
Computational Intelligence - February 2013 - 40
Computational Intelligence - February 2013 - 41
Computational Intelligence - February 2013 - 42
Computational Intelligence - February 2013 - 43
Computational Intelligence - February 2013 - 44
Computational Intelligence - February 2013 - 45
Computational Intelligence - February 2013 - 46
Computational Intelligence - February 2013 - 47
Computational Intelligence - February 2013 - 48
Computational Intelligence - February 2013 - 49
Computational Intelligence - February 2013 - 50
Computational Intelligence - February 2013 - 51
Computational Intelligence - February 2013 - 52
Computational Intelligence - February 2013 - 53
Computational Intelligence - February 2013 - 54
Computational Intelligence - February 2013 - 55
Computational Intelligence - February 2013 - 56
Computational Intelligence - February 2013 - 57
Computational Intelligence - February 2013 - 58
Computational Intelligence - February 2013 - 59
Computational Intelligence - February 2013 - 60
Computational Intelligence - February 2013 - 61
Computational Intelligence - February 2013 - 62
Computational Intelligence - February 2013 - 63
Computational Intelligence - February 2013 - 64
Computational Intelligence - February 2013 - 65
Computational Intelligence - February 2013 - 66
Computational Intelligence - February 2013 - 67
Computational Intelligence - February 2013 - 68
Computational Intelligence - February 2013 - 69
Computational Intelligence - February 2013 - 70
Computational Intelligence - February 2013 - 71
Computational Intelligence - February 2013 - 72
Computational Intelligence - February 2013 - 73
Computational Intelligence - February 2013 - 74
Computational Intelligence - February 2013 - 75
Computational Intelligence - February 2013 - 76
Computational Intelligence - February 2013 - 77
Computational Intelligence - February 2013 - 78
Computational Intelligence - February 2013 - 79
Computational Intelligence - February 2013 - 80
Computational Intelligence - February 2013 - Cover3
Computational Intelligence - February 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com