IRO Journals

Journal of IoT in Social, Mobile, Analytics, and Cloud

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

Design of Deep Learning Algorithm for IoT Application by Image based Recognition
Volume-3 | Issue-3

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Health Record Management System – A Web-based Application
Volume-3 | Issue-4

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Secure Data Sharing Platform for Portable Social Networks with Power Saving Operation
Volume-3 | Issue-3

Review of Internet of Wearable Things and Healthcare based Computational Devices
Volume-3 | Issue-3

Stock Index Prediction with Financial News Sentiments and Technical Indicators
Volume-4 | Issue-3

Hybrid Framework on Automatic Detection and Recognition of Traffic Display board Signs
Volume-3 | Issue-3

Suspicious Human Activity Detection System
Volume-2 | Issue-4

ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3

EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2

Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4

Home / Archives / Volume-2 / Issue-4 / Article-5

Volume - 2 | Issue - 4 | december 2020

Suspicious Human Activity Detection System
Pages: 216-221
Published
31 October, 2020
Abstract

In collaboration with machine learning and artificial intelligence, anomaly detection systems are vastly used in behavioral analysis so that you can help in identity and prediction of prevalence of anomalies. It has applications in enterprise, from intrusion detection to system fitness tracking, and from fraud detection in credit score card transactions to fault detection in running environments. With the growing crime charges and human lack of confidence globally, majority of the countries are adopting precise anomaly detection systems to approach closer to a comfy area. Visualizing the Indian crime index which stands at 42. 38, the adoption of anomaly detection structures is an alarming want of time. Our own cannot be prevented with the aid of CCTV installations. These systems not simplest lead to identification on my own, but their optimized versions can help in prediction of unusual activities as properly

Keywords

Anomaly Detection Suspicious Human Activities

Full Article PDF Download Article PDF 
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here