|
參考文獻 [1]W. R. Dornberger, “V-2,” Viking Press, First Edition, Apr. 1954. [2]V. Romesh, “Distance Education in Technological Age,” Anmol Publications Pvt. Ltd., First Edition, Jan. 2005. [3]D. P. B. Smith, “Magtape 1,” Wikimedia Commons, Jan. 2005. [4]G. Maas, “AMPEX 2 Zoll,” Wikimedia Commons, Sep. 2007. [5]H. Kruegle, “CCTV Surveillance: Video Practices and Technology,” Elsevier Butterworth-Heinemann, Second Edition, May 2007. [6]D. Ericd, “CD-R,” Wikimedia Commons, Jan. 2012. [7]F. Alt, “Verbatim DVD-R Spindle,” Wikimedia Commons, Jul. 2005. [8]P. Dixon, “Surveillance in America: An Encyclopedia of History, Politics, and the Law,” World Privacy Forum, First Edition, Feb. 2016. [9]G. C. Robb, “Police Use of CCTV (Closed Circuit Television) Surveillance Constitutional Implications and Proposed Regulations,” University of Michigan Journal of Law Reform, vol. 13, no. 3, pp. 571-602, May 1980. [10]B. Yesil, “Watching Ourselves,” Cultural Studies, pp. 400-416, Aug. 2006. [11]BBC website. Available: http://news.bbc.co.uk/2/hi/americas/1865828.stm, Mar. 2002. [12]C. Norris, M. M. Cahill and D. Wood, “Editorial. The Growth of CCTV: a global perspective on the international diffusion of video surveillance in publicly accessible space,” Surveillance & Society, pp. 110-135, Apr. 2004. [13]林啟豐、劉邦俊、段仁豪、邱敏煌和葉鳴紳, “數位影像平台於監控系統之整合應用,” 中華技術期刊, 第2卷, 頁數 28-41, 7月 2011. [14]17 Media website. Available: http://17.media/, Jul. 2015. [15]Pokémon Go website. Available: http://www.pokemongo.com/, Jul. 2016. [16]Taiwan From Above website. Available: https://www.facebook.com/Abovetai/, Sep. 2013. [17]iThome website. Available: http://www.ithome.com.tw/node/76084, Sep. 2012. [18] Appledaily website. http://www.appledaily.com.tw, Jan. 2015. [19] Reuters website. http://uk.reuters.com/, Jun. 2017. [20] Setn website. http://www.setn.com/, Mar. 2017. [21] Taipei Police website. http://police.gov.taipei/, Apr. 2015. [22]N. Li and Z. Zhang, “Abnormal Crowd Behavior Detection Using Topological Methods,” Proc. of International Conference on Software Engineering Artificial intelligent, Networking and Parallel/Distributed Computing, pp. 13-18, Jul. 2011. [23]R. Mehran, A. Oyama, and M. Shah, “Abnormal Crowd Behavior Detection Using Social Force Model,” Proc. of International Conference on Computer Vision and Pattern Recognition, pp. 935-942, Jun. 2009. [24]C. Bian, D. Chen and S. Wang, “Velocity Field Based Modeling and Simulation of Crowd in Confrontation Operations,” Proc. of International Conference on Parallel and Distributed Systems, pp. 646-651, Dec. 2010. [25]S. Wu, B. E. Moore and M. Shah, “Chaotic Invariants of Lagrangian Particle Trajectories for Anomaly Detection in Crowded Scene,” Proc. of International Conference on Computer Vision and Pattern Recognition, pp. 2054-2060, Jun. 2010. [26]Y. Wen, J. Du and J. M. Lee, “Abnormal Event Detection Based on Social Force Model Combined with Crowd Violent Flow,” Proc. of International Conference on Cloud Computing and Intelligence Systems, pp. 440-446, Aug. 2016. [27]R. M. Haralick, K. Shanmugam and I. Dinstein, “Textural Features for Image Classification,” Proc. of International Conference on Systems, Man and Cybernetics, pp. 610-621, Nov. 1973. [28]Y. Zhou, S. Yan and T. Huang, “Detecting Anomaly in Videos from Trajectory Similarity Analysis,” Proc. of International Conference on Multimedia and Expo, pp. 1087-1090, Jul. 2007. [29]T. Li, H. Chang, M. Wang, B. Ni, R. Hong and S. Yan, “Crowd Scene Analysis: a Survey,” IEEE Transactions on Circuits and System for Video Technology, vol. 25, no. 3, pp. 367-386, Sep. 2014. [30]C. Bian, D. Chen and S. Wang, “Velocity Field Based Modeling and Simulation of Crowd in Confrontation Operations,” Proc. of International Conference on Parallel and Distributed Systems, pp. 646-651, Dec. 2010. [31]D. Y. Chen and P. C. Huang, “Dynamic Hman Cowd Mdeling and Its Application to Anomalous Events Detection,” Proc. of International Conference on Multimedia and Expo, pp. 1582-1587, Jul. 2010. [32]B. G. Amidan, T. A. Ferryman and S. K. Cooley, “Data Outlier Detection Using the Chebyshev Theorem,” Proc. of International Conference on Aerospace, pp.3814-3819, Mar. 2005. [33] W. W. S. Wei, “Time Series Analysis : Univariate and Multivariate Methods,” Addison Wesley, Second Edition, Jan. 2006. [34]W. L. Hsu, C. C. Hsiao, T. L. Chang and T. L. Chen, “Vision-based Monitoring Method Using Gray Relational Analysis,” IET Computer Vision, Vol. 3, pp.103-111, Sep. 2009. [35]M. K Hu, “Visual Pattern Recognition by Moment Invariants,” IRE Transaction on Information Theory, Vol. 8, pp.179-187, Feb. 1962. [36]W. Kim and C. Jung, “Illumination-Invariant Background Subtraction: Comparative Review, Models, and Prospects,” IEEE Access, Vol. 5, pp.8369-8384, Apr. 2017. [37]W. L. Hsu, Y. C. Wang and C. L. Lin, “Abnormal Crowd Event Detection Based on Outlier in Time Series,” Proc. of International Conference on Machine Learning and Cybernetics, pp.359-363, Jul. 2014. [38]R. Mukundan, S. H. Ong and P. A. Lee, “Image Analysis by Tchebichef Moments,” IEEE Transactions on Image Processing, Vol. 10, pp.1357-1364, Sep. 2001. [39]University of Minnesota website. http://mha.cs.umn.edu/movies/, Dec. 2016. [40]I. Chang, G. C. Tiao and C. Chen, “Estimation of Time Series Parameters in the Presence of Outliers,” Technometrics, Vol. 30, pp.193-204, May 1988. [41]R. S. Tsay. “Outlier, Level Shifts and Variance Changes in Time Series,” Journal of Forecasting, Vol. 7, pp.1-20, Jan. 1988. [42]Autobox website. http://www.autobox.com/cms/index.php/downloads, Feb. 2017. [43]C. S. Tsai, Y. C. Wang and W. L. Hsu, “Crowd Abnormal Event Detection by Using Time Series Analysis,” Journal of Computers, Mar. 2017. (Accept) [44]W. L. Hsu, Y. C. Wang and K. F. Lin, “The Path of Crowd Dominated-Motion Detection Based on Spatial Autocorrelation,” Proc. of International Conference on Machine Learning and Cybernetics, pp. 715-719, Jul. 2016. [45]C++ Builder website. https://www.embarcadero.com/products/cbuilder, Feb. 2016. [46]W. L. Hsu, C. C. Hsiao, Y. L. Chang and T. L. Chen, “Vision-based Monitoring Method Using Gray Relational Analysis,” IET Computer Vision, Vol. 3, pp.103-111, Sep. 2009. [47]V. M. Llic, M. Stankovic and E. H. Mulalic, “Comments on “Generalization of Shannon–Khinchin Axioms to Nonextensive Systems and the Uniqueness Theorem for the Nonextensive Entropy”,” IEEE Transactions on Information Theory, Vol. 59, pp. 6950-6952, May 2013. [48]IBM SPSS website. https://www.ibm.com/analytics/us/en/, Jul. 2017. [49]H. Narasimhan and S. Agarwal, “Support Vector Algorithms for Optimizing the Partial Area under the ROC Curve,” Neural Computation, Vol. 29, pp. 1919-1963, Jun. 2017. [50]Alex's Work website. http://alex-phd.blogspot.tw/2014/03/optical-flowopencv.html, Jul. 2017.
|