Page 34 - Read Online
P. 34

Xu et al. J Surveill Secur Saf 2020;1:16-33  I  http://dx.doi.org/10.20517/jsss.2020.04                                                              Page 27




























               Figure 9. Trailing criminal behavior identification












































               Figure 10. Identification of wandering criminal behavior


               To further verify the performance of the algorithm, the UMN video library and PETS200 video library
               were used to perform simulation experiments on algorithm performance verification. First, the feasibility of
               the algorithm was verified at the theoretical level by using the set ideal dataset for simulation experiments.
   29   30   31   32   33   34   35   36   37   38   39