<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462009000400007</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Machine-Vision System to Detect Unusual Activities Online at Vehicular Intersections]]></article-title>
<article-title xml:lang="es"><![CDATA[Un Sistema de Visión por Computadora para Detectar en Línea Actividades Inusuales en Intersecciones Vehiculares]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Canchola Magdaleno]]></surname>
<given-names><![CDATA[Sandra Luz]]></given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Salas Rodríguez]]></surname>
<given-names><![CDATA[Joaquín]]></given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Jiménez Hernández]]></surname>
<given-names><![CDATA[Hugo]]></given-names>
</name>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González Barbosa]]></surname>
<given-names><![CDATA[José Joel]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hurtado Ramos]]></surname>
<given-names><![CDATA[Juan B.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Instituto Politéctico Nacional CICATA Qeretaro ]]></institution>
<addr-line><![CDATA[ Qro]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2009</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2009</year>
</pub-date>
<volume>13</volume>
<numero>2</numero>
<fpage>209</fpage>
<lpage>220</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462009000400007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462009000400007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462009000400007&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[In this article, we present a real-time machine-vision system to detect vehicles running on red light or performing forbidden turns at crossroads. The system operates during daytime by receiving video streams from two different sources. One of them is a camera viewing the crossroads to detect unusual activity, while a second camera watches the semaphore to keep synchrony with the traffic controller. The system performance and reliability have been tested on a real vehicular intersection during extended periods of time.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En este artículo, presentamos un sistema de visión por computadora para detectar, en tiempo real, vehículos pasándose el alto o realizando vueltas prohibidas en cruceros viales. El sistema opera durante el día recibiendo secuencias de video de dos diferentes fuentes. Una de ellas observa el crucero para detectar actividad inusual, mientras que la segunda monitorea el semáforo para mantener la sincronía con el controlar de tráfico. El desempeño y confiabilidad del sistema han sido probados en una intersección vehicular real durante períodos de tiempo que abarcan días.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Machine vision]]></kwd>
<kwd lng="en"><![CDATA[real-time systems]]></kwd>
<kwd lng="en"><![CDATA[unusual activity detection]]></kwd>
<kwd lng="en"><![CDATA[automatic surveillance]]></kwd>
<kwd lng="es"><![CDATA[Visión por computadora]]></kwd>
<kwd lng="es"><![CDATA[sistemas en tiempo real]]></kwd>
<kwd lng="es"><![CDATA[detección de actividad inusual]]></kwd>
<kwd lng="es"><![CDATA[vigilancia automática]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4"> Art&iacute;culos</font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>A Machine&#150;Vision System to Detect Unusual Activities Online at Vehicular Intersections</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b><i>Un Sistema de Visi&oacute;n por Computadora para Detectar en L&iacute;nea Actividades Inusuales en Intersecciones Vehiculares</i></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Sandra Luz Canchola Magdaleno, Joaqu&iacute;n Salas Rodr&iacute;guez, Hugo Jim&eacute;nez Hern&aacute;ndez, Jos&eacute; Joel Gonz&aacute;lez Barbosa and Juan B. Hurtado Ramos</b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i>CICATA Qro. IPN.</i> <a href="mailto:scanchola@ipn.mx">scanchola@ipn.mx</a>,   <a href="mailto:salas@ieee.org">salas@ieee.org</a>,   <a href="mailto:hugojh@gmail.com">hugojh@gmail.com</a>, <a href="mailto:jgonzalezba@ipn.mx">jgonzalezba@ipn.mx</a>, <a href="mailto:jbautistah@ipn.mx">jbautistah@ipn.mx</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">Article received on January 04, 2008    <br> Accepted on August 28, 2008</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">In this article, we present a real&#150;time machine&#150;vision system to detect vehicles running on red light or performing forbidden turns at crossroads. The system operates during daytime by receiving video streams from two different sources. One of them is a camera viewing the crossroads to detect unusual activity, while a second camera watches the semaphore to keep synchrony with the traffic controller. The system performance and reliability have been tested on a real vehicular intersection during extended periods of time.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords: </b>Machine vision, real&#150;time systems, unusual activity detection, automatic surveillance.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">En este art&iacute;culo, presentamos un sistema de visi&oacute;n por computadora para detectar, en tiempo real, veh&iacute;culos pas&aacute;ndose el alto o realizando vueltas prohibidas en cruceros viales. El sistema opera durante el d&iacute;a recibiendo secuencias de video de dos diferentes fuentes. Una de ellas observa el crucero para detectar actividad inusual, mientras que la segunda monitorea el sem&aacute;foro para mantener la sincron&iacute;a con el controlar de tr&aacute;fico. El desempe&ntilde;o y confiabilidad del sistema han sido probados en una intersecci&oacute;n vehicular real durante per&iacute;odos de tiempo que abarcan d&iacute;as.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras clave: </b>Visi&oacute;n por computadora, sistemas en tiempo real, detecci&oacute;n de actividad inusual, vigilancia autom&aacute;tica.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v13n2/v13n2a7.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. <b>Angel, A., M. Hickman, P. Mirchandani, and D. Chandnani. </b>"Methods of Analyzing Traffic Imagery Collected from Aerial Platforms." <i>IEEE Transactions on Intelligent Transportation Systems </i>4, no. 2 (2003): 99 &#150;107.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048560&pid=S1405-5546200900040000700001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2. <b>Atev, S., H. Arumugam, O. Masoud, R. Janardan, and N. P. Papanikolopoulos. </b>"A Vision&#150;Based Approach to Collision Prediction at Traffic Intersections." <i>IEEE Transactions on Intelligent Transportation Systems </i>6, no. 4 (2005): 416&#150;423.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048561&pid=S1405-5546200900040000700002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3. <b>Beymer, D., P. McLauchlan, B. Coifman, and J. Malik. </b>"A Real Time Computer Vision System for Measuring Traffic Parameters." <i>Computer Vision and Pattern Recognition.  </i>San Juan, Puerto Rico: IEEE Computer Society, 1997. 495&#150;501.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048562&pid=S1405-5546200900040000700003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4. <b>Boiman, O., and M. Irani. </b>"Detecting Irregularities in Images and in Video." <i>International Conference on Computer Vision. </i>Beijing, China: IEEE Computer Society, 2005. 462&#150;469.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048563&pid=S1405-5546200900040000700004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. <b>Brand, M., N. Oliver, and A. Pentland. </b>"Coupled Hidden Markov Models for Complex Action Recognition." <i>Computer Vision and Pattern Recognition. </i>Los Alamitos, CA, USA: IEEE Computer Society, 1997. 994&#150;999.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048564&pid=S1405-5546200900040000700005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. <b>Chan, M. T., A. Hoogs, J. Schmiederer, and M. Petersen. </b>"Detecting Rare Events in Video using Semantic Primitives with HMM." <i>International Conference on Pattern Recognition. </i>Cambridge, UK: IEEE Computer Society, 2004. 150&#150;154.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048565&pid=S1405-5546200900040000700006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7. <b>Cucchiara, R., M. Piccardi, and P. Mello. </b>"Image Analysis and Rule&#150;Based Reasoning for a Traffic Monitoring System." <i>Transactions on Intelligent Transportation Systems. </i>Beijing, China: IEEE Computer Society, 2000. 119 &#150; 130.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048566&pid=S1405-5546200900040000700007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8. <b>Dailey, D. J., F. W. Cathey, and S. Pumrin.  </b>"An Algorithm to Estimate Mean Traffic Speed using Uncalibrated Cameras." <i>IEEE Transactions on Intelligent Transportation Systems </i>1, no. 2 (2000): 119&#150;130.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048567&pid=S1405-5546200900040000700008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9. <b>Dee, H., and D. Hogg. </b>"Detecting Inexplicable Behaviour." <i>British Machine Vision Conference. </i>Kingston, UK, 2004. 477&#150;486.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048568&pid=S1405-5546200900040000700009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10. <b>Duda, R.O., P.E. Hart, and D.G. Stork. </b><i>Pattern Classification. </i>Wiley, 2001.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048569&pid=S1405-5546200900040000700010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. <b>Fuerstenberg, K. C., and B. Roessler. </b>"Advanced Intersection Safety &#150; The EC project INTERSAFE." <i>Intelligent Vehicles Symposium. </i>2006. 89 &#150; 93.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048570&pid=S1405-5546200900040000700011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12. <b>Gutchess, D., M. Trajkovics, E. Cohen&#150;Solal, D. Lyons, and A. K. Jain. </b>"A Background Model Initialization Algorithm for Video Surveillance." <i>International Conference on Computer Vision. </i>Vancouver, Canada: IEEE Computer Society, 2001. 733 &#150; 740.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048571&pid=S1405-5546200900040000700012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13. <b>Johnson, N., and D. C. Hogg. </b>"Learning the Distribution of Object Trajectories for Event Recognition." <i>Image and Vision Computing </i>14, no. 8 (1996): 609&#150;615.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048572&pid=S1405-5546200900040000700013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14. <b>Jung, Y.K., K.W. Lee, and Y.S. Ho. </b>"Content&#150;Based Event Retrieval using Semantic Scene Interpretation for Automated Traffic Surveillance." <i>IEEE Transactions on Intelligent Transportation Systems </i>2, no. 3 (2001): 151 &#150; 163.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048573&pid=S1405-5546200900040000700014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15. <b>Kamijo, S., Y. Matsushita, K. Ikeuchi, and M. Sakauchi. </b>"Traffic Monitoring and Accident Detection at Intersections." <i>IEEE Transactions on Intelligent Transportation Systems </i>1, no. 2 (2000): 108&#150;118.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048574&pid=S1405-5546200900040000700015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16. <b>Kato, J., T. Watanabe, S. Joga, J. Rittscher, and A. Blake. </b>"An HMM&#150;Based Segmentation Method for Traffic Monitoring Movies." <i>IEEE Pattern Analysis and Machine Intelligence </i>24, no. 9 (2002): 1291 &#150; 1296.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048575&pid=S1405-5546200900040000700016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17. <b>Kato, J., T. Watanabe, S. Joga, Y. Liu, and H. Hase. </b>"An HMM/MRF&#150;Based Stochastic Framework for Robust Vehicle Tracking." <i>IEEE Transactions on Intelligent Transportation Systems </i>5, no. 3 (2004): 142 &#150; 154.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048576&pid=S1405-5546200900040000700017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">18. <b>Lucas, B. D., and T. Kanade. </b>"An Iterative Image Registration Technique with an Application to Stereo Vision." <i>Image  Understanding  Workshop.  </i>Washington, DC, USA: Defense Advanced Research Projects Agency, 1981. 121&#150;130.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048577&pid=S1405-5546200900040000700018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">19. <b>Medioni, G. G., I. Cohen, F. Bremond, S. Hongeng, and R. Nevatia. </b>"Event Detection and Analysis from Video Streams." <i>IEEE Pattern Analysis and Machine Intelligence </i>23, no. 8 (2001): 873&#150;889.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048578&pid=S1405-5546200900040000700019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">20. <b>Otsu, N. "A Threshold Selection Method from Gray Level Histograms." </b><i>IEEE Transactions on Systems, Man and Cybernetics </i>VIII (1978): 62&#150;66.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048579&pid=S1405-5546200900040000700020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">21. <b>Salas, J., H. Jim&eacute;nez, J. Gonz&aacute;lez, J. Hurtado, and S. Canchola. </b>"A Double Layer Background Model to Detect Unusual Events." Edited by Springer Berlin / Heidelberg. <i>Lecture Notes in Computer Science </i>4678 (2007): 406&#150;416.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048580&pid=S1405-5546200900040000700021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">22. <b>Schoepflin, T., and D. Dailey. </b>"Dynamic Camera Calibration of Roadside Traffic Management Cameras for Vehicle Speed Estimation." <i>IEEE Transactions on Intelligent Transportation Systems </i>4, no. 2 (2003): 90 &#150; 98.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048581&pid=S1405-5546200900040000700022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">23. <b>Stauffer, C., and W. E. L. Grimson. </b>"Adaptive Background Mixture Models for Real&#150;Time Tracking." <i>Computer Vision and Pattern Recognition. </i>Fort Colins, CO., USA: IEEE Computer Society, 1999. 246&#150;252.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048582&pid=S1405-5546200900040000700023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">24. <b>Stauffer, C., and W. E. L. Grimson. </b>"Learning Patterns of Activity Using Real&#150;Time Tracking." <i>IEEE Pattern Analysis and Machine Intelligence </i>22, no. 8 (2000): 747&#150;757.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048583&pid=S1405-5546200900040000700024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">25. <b>Tai, J.C., and K.T. Song. </b>"Background Segmentation and its Application to Traffic Monitoring using Modified Histogram.<b>" </b><i>Int. Conf. on Networking, Sensing and Control. </i>Taipei, Taiwan, 2004. 13 &#150; 18.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048584&pid=S1405-5546200900040000700025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">26. <b>Tomasi, C., and J. Shi. </b>"Good Features to Track." <i>Computer Vision and Pattern Recognition .  </i>Seattle, Washington, USA: IEEE Computer Society, 1994. 593&#150;600.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048585&pid=S1405-5546200900040000700026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">27. <b>Veeraraghavan, H., O. Masoud, and N. P. Papanikolopoulos. </b>"Computer Vision Algorithms for Intersection Monitoring." <i>IEEE Transactions on Intelligent Transportation Systems </i>4, no. 2 (2003): 78&#150;89.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048586&pid=S1405-5546200900040000700027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">28. <b>Xiang, T., and S. Gong. </b>"Video Behaviour Profiling and Abnormality Detection without Manual Labelling." <i>International Conference on Computer Vision. </i>Beijing, China: IEEE Computer Society, 2005. 1238&#150;1245.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048587&pid=S1405-5546200900040000700028&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">29. <b>Yamada, K., and M. Soga.  </b>"A Compact Integrated Visual Motion Sensor for its Applications." <i>IEEE Transactions on Intelligent Transportation Systems </i>4, no. 1 (2003): 35 &#150; 42.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048588&pid=S1405-5546200900040000700029&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">30. <b>Zhong, H., J. Shi, and M. Visontai. </b>"Detecting Unusual Activity in Video." <i>Computer Vision and Pattern Recognition . </i>Washington, DC., USA: IEEE Computer Society, 2004. 819&#150;826.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2048589&pid=S1405-5546200900040000700030&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Angel]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hickman]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Mirchandani]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Chandnani]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Methods of Analyzing Traffic Imagery Collected from Aerial Platforms."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2003</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>99 -107</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Atev]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Arumugam]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Masoud]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Janardan]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Papanikolopoulos]]></surname>
<given-names><![CDATA[N. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["A Vision-Based Approach to Collision Prediction at Traffic Intersections."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2005</year>
<volume>6</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>416-423</page-range></nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beymer]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[McLauchlan]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Coifman]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Malik]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA["A Real Time Computer Vision System for Measuring Traffic Parameters."]]></source>
<year></year>
<conf-name><![CDATA[ Computer Vision and Pattern Recognition]]></conf-name>
<conf-date>1997</conf-date>
<conf-loc>San Juan </conf-loc>
<page-range>495-501</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boiman]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Irani]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Detecting Irregularities in Images and in Video."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ International Conference on Computer Vision]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc>Beijing </conf-loc>
<page-range>462-469</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brand]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Oliver]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Pentland]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Coupled Hidden Markov Models for Complex Action Recognition."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ Computer Vision and Pattern Recognition]]></conf-name>
<conf-date>1997</conf-date>
<conf-loc>Los Alamitos CA</conf-loc>
<page-range>994-999</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoogs]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Schmiederer]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Petersen]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Detecting Rare Events in Video using Semantic Primitives with HMM."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ International Conference on Pattern Recognition]]></conf-name>
<conf-date>2004</conf-date>
<conf-loc>Cambridge </conf-loc>
<page-range>150-154</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cucchiara]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Piccardi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Mello]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Image Analysis and Rule-Based Reasoning for a Traffic Monitoring System."]]></article-title>
<source><![CDATA[Transactions on Intelligent Transportation Systems]]></source>
<year>2000</year>
<page-range>119 - 130</page-range><publisher-loc><![CDATA[Beijing ]]></publisher-loc>
<publisher-name><![CDATA[IEEE Computer Society]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dailey]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cathey]]></surname>
<given-names><![CDATA[F. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Pumrin]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["An Algorithm to Estimate Mean Traffic Speed using Uncalibrated Cameras."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2000</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>119-130</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dee]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Hogg]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Detecting Inexplicable Behaviour."]]></article-title>
<source><![CDATA[British Machine Vision Conference]]></source>
<year>2004</year>
<page-range>477-486</page-range><publisher-loc><![CDATA[Kingston ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Duda]]></surname>
<given-names><![CDATA[R.O.]]></given-names>
</name>
<name>
<surname><![CDATA[Hart]]></surname>
<given-names><![CDATA[P.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Stork]]></surname>
<given-names><![CDATA[D.G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Pattern Classification]]></source>
<year>2001</year>
<publisher-name><![CDATA[Wiley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fuerstenberg]]></surname>
<given-names><![CDATA[K. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Roessler]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Advanced Intersection Safety - The EC project INTERSAFE."]]></article-title>
<source><![CDATA[]]></source>
<year>2006</year>
<conf-name><![CDATA[ Intelligent Vehicles Symposium]]></conf-name>
<conf-loc> </conf-loc>
<page-range>89 - 93</page-range></nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gutchess]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Trajkovics]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Cohen-Solal]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Lyons]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["A Background Model Initialization Algorithm for Video Surveillance."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ International Conference on Computer Vision]]></conf-name>
<conf-date>2001</conf-date>
<conf-loc>Vancouver </conf-loc>
<page-range>733 - 740</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johnson]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Hogg]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Learning the Distribution of Object Trajectories for Event Recognition."]]></article-title>
<source><![CDATA[Image and Vision Computing]]></source>
<year>1996</year>
<volume>14</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>609-615</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jung]]></surname>
<given-names><![CDATA[Y.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[K.W.]]></given-names>
</name>
<name>
<surname><![CDATA[Ho]]></surname>
<given-names><![CDATA[Y.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Content-Based Event Retrieval using Semantic Scene Interpretation for Automated Traffic Surveillance."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2001</year>
<volume>2</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>151 - 163</page-range></nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamijo]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Matsushita]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Ikeuchi]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Sakauchi]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Traffic Monitoring and Accident Detection at Intersections."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2000</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>108-118</page-range></nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kato]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Watanabe]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Joga]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Rittscher]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Blake]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["An HMM-Based Segmentation Method for Traffic Monitoring Movies."]]></article-title>
<source><![CDATA[IEEE Pattern Analysis and Machine Intelligence]]></source>
<year>2002</year>
<volume>24</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1291 - 1296</page-range></nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kato]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Watanabe]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Joga]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Hase]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["An HMM/MRF-Based Stochastic Framework for Robust Vehicle Tracking."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2004</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>142 - 154</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lucas]]></surname>
<given-names><![CDATA[B. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Kanade]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["An Iterative Image Registration Technique with an Application to Stereo Vision."]]></article-title>
<source><![CDATA[Image Understanding Workshop]]></source>
<year>1981</year>
<page-range>121-130</page-range><publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Defense Advanced Research Projects Agency]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Medioni]]></surname>
<given-names><![CDATA[G. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Bremond]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Hongeng]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Nevatia]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Event Detection and Analysis from Video Streams."]]></article-title>
<source><![CDATA[IEEE Pattern Analysis and Machine Intelligence]]></source>
<year>2001</year>
<volume>23</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>873-889</page-range></nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Otsu]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["A Threshold Selection Method from Gray Level Histograms."]]></article-title>
<source><![CDATA[IEEE Transactions on Systems, Man and Cybernetics]]></source>
<year>1978</year>
<volume>VIII</volume>
<page-range>62-66</page-range></nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salas]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Jiménez]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Hurtado]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Canchola]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["A Double Layer Background Model to Detect Unusual Events."]]></article-title>
<source><![CDATA[Lecture Notes in Computer Science]]></source>
<year>2007</year>
<volume>4678</volume>
<page-range>406-416</page-range></nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schoepflin]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Dailey]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Dynamic Camera Calibration of Roadside Traffic Management Cameras for Vehicle Speed Estimation."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2003</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>90 - 98</page-range></nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stauffer]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Grimson]]></surname>
<given-names><![CDATA[W. E. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Adaptive Background Mixture Models for Real-Time Tracking."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ Computer Vision and Pattern Recognition]]></conf-name>
<conf-date>1999</conf-date>
<conf-loc>Fort Colins CO</conf-loc>
<page-range>246-252</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stauffer]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Grimson]]></surname>
<given-names><![CDATA[W. E. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Learning Patterns of Activity Using Real-Time Tracking."]]></article-title>
<source><![CDATA[IEEE Pattern Analysis and Machine Intelligence]]></source>
<year>2000</year>
<volume>22</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>747-757</page-range></nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tai]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Song]]></surname>
<given-names><![CDATA[K.T.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Background Segmentation and its Application to Traffic Monitoring using Modified Histogram."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ Int. Conf. on Networking, Sensing and Control.]]></conf-name>
<conf-date>2004</conf-date>
<conf-loc>TaipeiTaiwan </conf-loc>
<page-range>13 - 18</page-range></nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tomasi]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Good Features to Track."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ Computer Vision and Pattern Recognition]]></conf-name>
<conf-date>1994</conf-date>
<conf-loc>Seattle Washington</conf-loc>
<page-range>593-600</page-range></nlm-citation>
</ref>
<ref id="B27">
<label>27</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Veeraraghavan]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Masoud]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Papanikolopoulos]]></surname>
<given-names><![CDATA[N. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Computer Vision Algorithms for Intersection Monitoring."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2003</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>78-89</page-range></nlm-citation>
</ref>
<ref id="B28">
<label>28</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xiang]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Gong]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Video Behaviour Profiling and Abnormality Detection without Manual Labelling."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ International Conference on Computer Vision]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc>Beijing </conf-loc>
<page-range>1238-1245</page-range></nlm-citation>
</ref>
<ref id="B29">
<label>29</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yamada]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Soga]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["A Compact Integrated Visual Motion Sensor for its Applications."]]></article-title>
<source><![CDATA[IEEE Transactions on Intelligent Transportation Systems]]></source>
<year>2003</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>35 - 42</page-range></nlm-citation>
</ref>
<ref id="B30">
<label>30</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhong]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Visontai]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA["Detecting Unusual Activity in Video."]]></article-title>
<source><![CDATA[]]></source>
<year></year>
<conf-name><![CDATA[ Computer Vision and Pattern Recognition]]></conf-name>
<conf-date>2004</conf-date>
<conf-loc>Washington, DC. </conf-loc>
<page-range>819-826</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
