Journal of Shandong University(Engineering Science) ›› 2020, Vol. 50 ›› Issue (1): 28-34.doi: 10.6040/j.issn.1672-3961.0.2019.179

• Control Science & Engineering • Previous Articles     Next Articles

Risk assessment method based on spatial hidden danger distribution and motion intention analysis

Yuenan ZHAO1(),Guiyou CHEN1,*(),Chen SUN1,Ning LU1,Liwei LIAO2   

  1. 1. School of Control Science and Engineering, Shandong University, Jinan 250061, Shandong, China
    2. School of Software and Microelectronics, Peking University, Beijing 100871, China
  • Received:2019-04-19 Online:2020-02-20 Published:2020-02-14
  • Contact: Guiyou CHEN E-mail:201734497@mail.sdu.edu.cn;chenguiyou@sdu.edu.cn
  • Supported by:
    山东省重点研发计划项目(2017GGX90105);山东省自然科学基金(ZR2017MF014)

Abstract:

To solve problems of slow detection and lack of behavioral safety analysis in intelligent nursing, a risk assessment method based on spatial hidden danger distribution and motion intention analysis was proposed. The k-means++ algorithm and background elimination method were used to enhance the object detection capability of YOLO(you only look once) v3, which led to the classification and localization of human targets as well as dangerous objects. The Kalman filter was used to predict the moving trajectory, where two parameters, namely the deviation angle of motion and the distance between the human target and danger, were used to construct the human movement patterns. The risk assessment model was established, and the degree of danger was evaluated according to different movement behavior patterns. Experimental results showed that for identifying different objects in the test set, both the detection precision and the recall rate of the enhanced YOLOv3 algorithm were over 95%. An increasement of IOU(intersection over union) at 7% was witnessed, and frames rate reached 31.3 frames/s. These results proved the real-time performance of the system. Since the proposed risk assessment model incorporated motion intentions of the human target, this method was expected to boost the performance in fitting the risk progression of different movement patterns, making the risk assessment more reasonable.

Key words: intelligent surveillance, YOLOv3, Kalman filter, spatial hidden danger, motion intention, risk assessment

CLC Number: 

  • TP391.4

Fig.1

Structure of YOLOv3"

Fig.2

Algorithm workflow"

Fig.3

Analysis of clustering effect"

Fig.4

Object detection of improved YOLOv3"

Fig.5

Boxplot of IOU"

Table 1

Comparison of different algorithms frameworks"

不同框架 平均IOU 精度 召回率 帧率/(帧·s-1)
YOLOv3-416[15] 0.71 0.95 0.95 33.4
SSD-321[13] 0.65 0.89 0.91 16.4
Faster-RCNN[12] 0.80 0.94 0.95 6.6
Casc-RCNN[20] 0.82 0.96 0.96 8.0
增强YOLOv3-416 0.78 0.96 0.97 31.3

Fig.6

Comparison of real and predicted tracks"

Fig.7

Impact of parameter kd"

Fig.8

Impact of parameter σ"

Table 2

The change of risk in 3 different interactive modes"

危险情形 d/pix θ R/%
Cl 410. 17 32. 35 34.04
C2 375. 20 23. 83 40. 90
C3 339. 27 22. 63 48. 09
C4 293.44 14.37 58.08
C5 243.51 0. 16 69. 03
C6 186. 98 23. 48 79. 27
Cl 143. 70 7.91 87. 75
C8 104. 97 9.60 93. 13
A1 149. 29 114. 18 62.80
A2 130. 50 126. 43 60.29
A3 158. 10 148. 30 49. 36
A4 187.02 126. 88 53.74
A5 216. 72 144. 73 44. 17
A6 251.81 125. 33 45.43
A7 238. 58 176. 94 27. 66
A8 303. 30 128. 75 37. 18
B1 292.49 44. 24 55.79
B2 262.21 42.09 62. 25
B3 231.67 49. 05 67.33
B4 204. 43 59. 19 70. 55
B5 183.45 66. 42 72. 57
B6 168.08 79.21 71.64
B7 159.23 98. 25 67.05
B8 163. 83 111.08 62. 11
B9 182. 95 125. 36 54.77
BIO 219. 62 141.77 44. 76
Bll 256. 68 146. 49 38. 74
B12 284. 98 164. 52 30. 60

Fig.9

Warning of dangerous motion pattern"

1 黄凯奇, 陈晓棠, 康运锋, 等. 智能视频监控技术综述[J]. 计算机学报, 2015, 38 (6): 1093- 1118.
HUANG Kaiqi , CHEN Xiaotang , KANG Yunfeng , et al. Intelligent visual surveillance: a review[J]. Chinese Journal of Computers, 2015, 38 (6): 1093- 1118.
2 尹宏鹏, 陈波, 柴毅, 等. 基于视觉的目标检测与跟踪综述[J]. 自动化学报, 2016, 42 (10): 1466- 1489.
YIN Hongpeng , CHEN Bo , CHAI Yi , et al. Vision-based object detection and tracking: a review[J]. Acta Automatica Scinica, 2016, 42 (10): 1466- 1489.
3 LI Ce , HAN Zhenjun , YE Qixiang , et al. Visual abnormal behavior detection based on trajectory sparse reconstruction analysis[J]. Neurocomputing, 2013, 119 (16): 94- 100.
4 LEE D G , SUK H I , PARK S K , et al. Motion influence map for unusual human activity detection and localization in crowded scenes[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2015, 25 (10): 1- 1.
doi: 10.1109/TCSVT.2015.2481139
5 COSAR S , DONATIELLO G , BOGORNY V , et al. Towards abnormal trajectory and event detection in video surveillance[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2017, 27 (3): 683- 695.
doi: 10.1109/TCSVT.2016.2589859
6 XIE Dan , SHU Tianmin , TODOROVIC S , et al. Learning and inferring "Dark Matter" and predicting human intents and trajectories in videos[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2018, 40 (7): 1639- 1652.
doi: 10.1109/TPAMI.2017.2728788
7 AHMED S A , DOGRA D P , KAR S , et al. Surveillance scene representation and trajectory abnormality detection using aggregation of multiple concepts[J]. Expert Systems with Applications, 2018, 101, 43- 55.
doi: 10.1016/j.eswa.2018.02.013
8 REDMON J, DIVVALA S, GIRSHICK R, et al. You only look once: unified, real-time object detection[C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. Las Vegas, USA: IEEE Press, 2016: 779-788.
9 FELZENSZWALB P, MCALLESTER D, RAMANAN D. A discriminatively trained, multiscale, deformable part model[C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. Anchorage, USA: IEEE Press, 2008: 1-8.
10 GIRSHICK R, DONAHUE J, DARREL T, et al. Rich feature hierarchies for accurate object detection and semantic segmentation[C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. Columbus, USA: IEEE Press, 2014: 580-587.
11 GIRSHICK R. Fast R-CNN[C]//Proceedings of IEEE International Conference on Computer Vision. Santiago, Chile: IEEE Press, 2015: 1440-1448.
12 REN Shaoqing , HE Kaiming , GIRSHICK R , et al. Faster R-CNN: towards real-time object detection with region proposal networks[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017, 39 (6): 1137- 1149.
doi: 10.1109/TPAMI.2016.2577031
13 LIU Wei, ANGUELOV D, ERHAN D, et al. SSD: single shot multiBox detector[C]//Proceedings of European Conference on Computer Vision. Amsterdam, Holland: Springer Cham, 2016: 21-37.
14 LIN T Y , GOYAL P , GIRSHICK R , et al. Focal loss for dense object detection[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2018, (99): 2999- 3007.
15 REDMON J, FARHADI A. YOLOv3: an incremental improvement[EB/OL]. (2018-04-08) [2018-09-27]. https://arxiv.org/pdf/1804.02767.pdf.
16 HE Kaiming, ZHANG Xiangyu, REN Shaoqing, et al. Deep residual learning for image recognition[C]//Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. Las Vegas, USA: IEEE Press, 2016: 770-778.
17 ZHAO Xia, NI Yingting, JIA Haihang. Modified object detection method based on YOLO[C]//Proceedings of Chinese Conference on Computer Vision. Singapore: Springer, 2017: 233-244.
18 ARTHUR D, VASSILVITSKII S. K-means++: the advantages of careful seeding[C]//Proceedings of Eighteenth Acm-siam Symposium on Discrete Algorithms. New Orleans, USA: Society for Industrial and Applied Mathematics, 2007: 1027-1035.
19 REDMON J, FARHADI A. YOLO9000: better, faster, stronger[C]//Proceedings of Conference on Computer Vision and Pattern Recognition. Honolulu, USA: IEEE Press, 2017: 6517-6525.
20 CAI Zhaowei, VASCONCELOS N. Cascade R-CNN: delving into high quality object detection[C]//Proceedings of Conference on Computer Vision and Pattern Recognition. Salt Lake City, USA: IEEE Press, 2018: 6154-6162.
[1] DONG Man, LIU Shuqin. A compound algorithm for SOC estimation of lithium batteries for magnetic suspension artificial heart pump based on UKF and AH [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(2): 121-127.
[2] DENG Junwu, ZHANG Yumin, ZHANG Hongdi, DU Xiaokun. Fault diagnosis and fault-tolerant control methods of X-tail UAV [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(5): 166-172.
[3] HUANG Jie, HE Xiao. Fault estimation for discrete-time systems with output dead-zone using two-stage Tobit kalman filter [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2017, 47(5): 136-142.
[4] LAN Yi-hua, REN Hao-zheng*, ZHANG Yong, ZHAO Xue-feng. An improved Kalman filter algorithm based on the “current” model [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(5): 12-17.
[5] DING Xin-zhong1, ZHANG Cheng-rui1*, LI Hu-xiu1, YU Le-hua2. Identification of inertia and state estimation for PMSM [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2012, 42(2): 70-76.
[6] TIAN Guo-Hui, JI Yan-Jing, HUANG Bin. Human motion detection based on multi-feature fusion [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(5): 43-47.
[7] CUI Peng,ZHANG Cheng-hui,ZHANG Mei . An innovation of the optional estimate for singular linear discrete systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(4): 13-18 .
[8] LIU Shuai,ZHONG Mai-ying . The H fault estimation for linear discrete timevarying systems [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2007, 37(3): 36-40 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] WANG Su-yu,<\sup>,AI Xing<\sup>,ZHAO Jun<\sup>,LI Zuo-li<\sup>,LIU Zeng-wen<\sup> . Milling force prediction model for highspeed end milling 3Cr2Mo steel[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(1): 1 -5 .
[2] ZHANG Yong-hua,WANG An-ling,LIU Fu-ping . The reflected phase angle of low frequent inhomogeneous[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 22 -25 .
[3] SHI Lai-shun,WAN Zhong-yi . Synthesis and performance evaluation of a novel betaine-type asphalt emulsifier[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(4): 112 -115 .
[4] LI Liang, LUO Qiming, CHEN Enhong. Graph-based ranking model for object-level search
[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 15 -21 .
[5] CHEN Rui, LI Hongwei, TIAN Jing. The relationship between the number of magnetic poles and the bearing capacity of radial magnetic bearing[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(2): 81 -85 .
[6] . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 27 -32 .
[7] QIN Tong, SUN Fengrong*, WANG Limei, WANG Qinghao, LI Xincai. 3D surface reconstruction using the shape based interpolation guided by maximal discs[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 1 -5 .
[8] LIU Wen-liang, ZHU Wei-hong, CHEN Di, ZHANG Hong-quan. Detection and tracking of moving targets using the morphology match in radar images[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 31 -36 .
[9] WANG Li-ju,HUANG Qi-cheng,WANG Zhao-xu . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(6): 51 -56 .
[10] SUN Dianzhu, ZHU Changzhi, LI Yanrui. [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 84 -86 .