Page 34 - Read Online
P. 34
Xu et al. J Surveill Secur Saf 2020;1:16-33 I http://dx.doi.org/10.20517/jsss.2020.04 Page 27
Figure 9. Trailing criminal behavior identification
Figure 10. Identification of wandering criminal behavior
To further verify the performance of the algorithm, the UMN video library and PETS200 video library
were used to perform simulation experiments on algorithm performance verification. First, the feasibility of
the algorithm was verified at the theoretical level by using the set ideal dataset for simulation experiments.