Application of cortical learning algorithms to movement classification towards automated video forensics

The need for proper and acceptable video forensics process is necessary due to the proliferation and advancement of video technologies in all aspects of our life, hence the legal system has heavily invested in this area. Also, the classification of the movements of objects detected from a video feed is an essential module to automate the forensic video process. Recently, new bio-inspired machine learning techniques have been proposed in the attempt of mimicking the function of the human brain. Hierarchical Temporal Memory (HTM) theory has proposed new computational learning models, Cortical Learning Algorithms (CLA), inspired from the neocortex, which offer a better understanding of how our brains function. This research aims to study the requirements of video forensic investigation and Police procedures to propose a new semi-automated post-incident analysis framework and to investigate the application of the CLA to movement classification towards an automated video forensics process. This research starts by reviewing the research related to police practices for video forensics as well as various proposed video forensic frameworks. Then a Questionnaire targeting CCTV/Video Forensics practitioners has been developed to capture the requirements for automating the video forensics process, this has been followed by proposing a new post-incident analysis framework. Then, a literature review covering state-of-the-art movement classification algorithms has been carried out. Finally, a novel CLA-based movement classification algorithm has been proposed and devised to classify the movements of moving objects in realistic video surveillance scenarios, and the test results have been evaluated. Tests applied on twenty-three videos have been conducted to detect movement anomalies in different scenarios. Additionally, in this study, the proposed algorithm has been evaluated and compared against several state-of-the-art anomaly detection algorithms. The proposed algorithm has achieved 66.29% average F-measure, with an improvement of 15.5%compared to the k-Nearest Neighbour Global Anomaly Score (kNN-GAS) algorithm. The Independent Component Analysis-Local Outlier Probability (ICA-LoOP) scored 42.75%, the Singular Value Decomposition Influence Outlier (SVD-IO) achieved 34.82%, whilst the Connectivity Based Factor algorithm (CBOF) scored 8.72%. The proposed models, which are based on HTM, have empirically portrayed positive potential and had exceeded in performance when compared to state-of-the-art algorithms

[1]  Michael Galetzka,et al.  Intelligent Predictions : an empirical study of the Cortical Learning Algorithm , 2014 .

[2]  Richard Hill,et al.  Cloud-based scalable object detection and classification in video streams , 2018, Future Gener. Comput. Syst..

[3]  Mark Pollitt,et al.  An Ad Hoc Review of Digital Forensic Models , 2007, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07).

[4]  Raymond Kurzweil,et al.  Age of intelligent machines , 1990 .

[5]  Ernest Fokoué,et al.  A Mathematical Formalization of Hierarchical Temporal Memory’s Spatial Pooler , 2017, Front. Robot. AI.

[6]  Larry S. Davis,et al.  AVSS 2011 demo session: A large-scale benchmark dataset for event recognition in surveillance video , 2011, AVSS.

[7]  Kolawole Akintola Real-time Object Detection and Tracking for Video Surveillance , 2015 .

[8]  Subutai Ahmad,et al.  Properties of Sparse Distributed Representations and their Application to Hierarchical Temporal Memory , 2015, ArXiv.

[9]  Rik Van de Walle,et al.  Performance analysis of machine learning for arbitrary downsizing of pre-encoded HEVC video , 2015, IEEE Transactions on Consumer Electronics.

[10]  Chang-Tsun Li Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security , 2013 .

[11]  Dileep George,et al.  How the brain might work: a hierarchical and temporal model for learning and recognition , 2008 .

[12]  Jérôme Euzenat,et al.  Semantic Precision and Recall for Ontology Alignment Evaluation , 2007, IJCAI.

[13]  Hui Wang,et al.  Separability-Oriented Subclass Discriminant Analysis , 2018, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  Bradley L. Schatz,et al.  An open architecture for digital evidence integration , 2006 .

[15]  Graham Cormode,et al.  People like us: mining scholarly data for comparable researchers , 2014, WWW.

[16]  Richard Ernest Bellman,et al.  An Introduction to Artificial Intelligence: Can Computers Think? , 1978 .

[17]  Mauro Barni,et al.  Detection of malevolent changes in digital video for forensic applications , 2007, Electronic Imaging.

[18]  Mohammad Atwah Al-ma'aitah,et al.  Artificial Intelligence in Law Enforcement, A Review , 2014 .

[19]  Thomas Serre,et al.  HMDB: A large video database for human motion recognition , 2011, 2011 International Conference on Computer Vision.

[20]  Philip E. T. Lewis,et al.  Research Methods for Business Students (5th edn) , 2007 .

[21]  Xinwen Fu,et al.  Network Security Fundamentals , 2008, Wiley Encyclopedia of Computer Science and Engineering.

[22]  Bo Chen,et al.  Out-of-Focus Projector Calibration Method with Distortion Correction on the Projection Plane in the Structured Light Three-Dimensional Measurement System , 2017, Sensors.

[23]  M. Frank,et al.  The Effect of Rapport in Forensic Interviewing , 2002 .

[24]  Christopher Hargreaves,et al.  An automated timeline reconstruction approach for digital forensic investigations , 2012 .

[25]  Shirley M. Radack,et al.  Forensic Techniques: Helping Organizations Improve Their Responses to Information Security Incidents | NIST , 2006 .

[26]  Juliet Erima,et al.  Preservation of digital research content in academic institutions: A case study of Moi University, Kenya , 2016, 2016 IST-Africa Week Conference.

[27]  Jian Tang,et al.  Enhancing Effectiveness of Outlier Detections for Low Density Patterns , 2002, PAKDD.

[28]  M. Munot,et al.  Research Methodology , 2019, Storytelling with Data in Healthcare.

[29]  B. G. Celler,et al.  Classification of basic daily movements using a triaxial accelerometer , 2004, Medical and Biological Engineering and Computing.

[30]  Kaushik Deb,et al.  Baggage Recognition in Occluded Environment using Boosting Technique , 2017, KSII Trans. Internet Inf. Syst..

[31]  Seamus O. Ciardhuáin,et al.  An Extended Model of Cybercrime Investigations , 2004, Int. J. Digit. EVid..

[32]  Petronilla Muthoni Muriithi,et al.  Academic research collaborations in Kenya : structure, processes and information technologies , 2015 .

[33]  i-LIDS Team,et al.  Imagery Library for Intelligent Detection Systems (i-LIDS); A Standard for Testing Video Based Detection Systems , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[34]  A. Alshaikh,et al.  Post Incident Analysis Framework for Automated Video Forensic Investigation , 2015 .

[35]  Mansour Moniri,et al.  Classification of smart video surveillance systems for commercial applications , 2005, IEEE Conference on Advanced Video and Signal Based Surveillance, 2005..

[36]  Ye Zhang,et al.  Irregular behavior recognition based on treading track , 2007, 2007 International Conference on Wavelet Analysis and Pattern Recognition.

[37]  Manoranjan Paul,et al.  Human detection in surveillance videos and its applications - a review , 2013, EURASIP J. Adv. Signal Process..

[38]  Chung-Lin Huang,et al.  Abnormal Event Detection in Video Using N-cut Clustering , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[39]  Paolo Gubian,et al.  Embedded Forensics , 2010, Handbook of Research on Computational Forensics, Digital Crime, and Investigation.

[40]  Warren G. Kruse,et al.  Computer Forensics: Incident Response Essentials , 2001 .

[41]  Brian D. Carrier Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers , 2003, Int. J. Digit. EVid..

[42]  Sergio A. Velastin,et al.  A Review of Computer Vision Techniques for the Analysis of Urban Traffic , 2011, IEEE Transactions on Intelligent Transportation Systems.

[43]  John Davies,et al.  Information Retrieval: Searching in the 21st Century , 2009, Information Retrieval.

[44]  Tieniu Tan,et al.  A survey on visual surveillance of object motion and behaviors , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[45]  Antonio Fernández-Caballero,et al.  A survey of video datasets for human action and activity recognition , 2013, Comput. Vis. Image Underst..

[46]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[47]  Sanjiv Augustine,et al.  Agile project management: steering from the edges , 2005, CACM.

[48]  Yuichiro Hayashi,et al.  Automated torso organ segmentation from 3D CT images using structured perceptron and dual decomposition , 2015, Medical Imaging.

[49]  Subutai Ahmad,et al.  How do neurons operate on sparse distributed representations? A mathematical theory of sparsity, neurons and active dendrites , 2016, ArXiv.

[50]  Bhavani M. Thuraisingham,et al.  A framework for a video analysis tool for suspicious event detection , 2005, MDM '05.

[51]  James W. Davis,et al.  The Recognition of Human Movement Using Temporal Templates , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[52]  Lihui Wang,et al.  A security framework for collaborative distributed system control at the device-level , 2003, IEEE International Conference on Industrial Informatics, 2003. INDIN 2003. Proceedings..

[53]  Venansius Baryamureeba,et al.  The Enhanced Digital Investigation Process Model , 2004 .

[54]  T. May Social Research: Issues, Methods and Process , 2001 .

[55]  Christopher D. Manning,et al.  Introduction to Information Retrieval , 2010, J. Assoc. Inf. Sci. Technol..

[56]  Peter Stephenson Modeling of Post-Incident Root Cause Analysis , 2003, Int. J. Digit. EVid..

[57]  M. B. Mukasey,et al.  Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition , 2008 .

[58]  Marie Katsurai,et al.  Bursty research topic detection from scholarly data using dynamic Co-word networks: A preliminary investigation , 2017, 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA)(.

[59]  James F. O'Brien,et al.  Exposing Digital Forgeries in Ballistic Motion , 2012, IEEE Transactions on Information Forensics and Security.

[60]  Ron White,et al.  how computers work , 1964 .

[61]  Jie Liu,et al.  Exposing Digital Video Forgery by Detecting Motion-Compensated Edge Artifact , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[62]  M Namratha,et al.  A Comprehensive Overview of Clustering Algorithms in Pattern Recognition , 2012 .

[63]  Jean-Marc Odobez,et al.  Topic models for scene analysis and abnormality detection , 2009, 2009 IEEE 12th International Conference on Computer Vision Workshops, ICCV Workshops.

[64]  Andrew Zisserman,et al.  Scene Classification Using a Hybrid Generative/Discriminative Approach , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[65]  Yizhen Wang,et al.  Resource quality prediction based on machine learning algorithms , 2017, 2017 4th International Conference on Systems and Informatics (ICSAI).

[66]  Alex Pentland,et al.  Pfinder: real-time tracking of the human body , 1996, Other Conferences.

[67]  Kyuchang Kang,et al.  ActionNet-VE Dataset: A Dataset for Describing Visual Events by Extending VIRAT Ground 2.0 , 2015, 2015 8th International Conference on Signal Processing, Image Processing and Pattern Recognition (SIP).

[68]  David Preston,et al.  A New Approach of Digital Forensic Model for Digital Forensic Investigation , 2011 .

[69]  Carlos Ordonez,et al.  Integrating K-means clustering with a relational DBMS using SQL , 2006, IEEE Transactions on Knowledge and Data Engineering.

[70]  Sharath Pankanti,et al.  Efficient 24/7 object detection in surveillance videos , 2015, 2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS).

[71]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[72]  Gaurav Verma,et al.  Implementation of Smart Video Surveillance System Using Motion Detection Technique , 2018 .

[73]  Michitaka Kameyama,et al.  Evaluation of the Hierarchical Temporal Memory as Soft Computing Platform and its VLSI Architecture , 2009, 2009 39th International Symposium on Multiple-Valued Logic.

[74]  Jörn M. Horschig,et al.  Directed Communication between Nucleus Accumbens and Neocortex in Humans Is Differentially Supported by Synchronization in the Theta and Alpha Band , 2015, PloS one.

[75]  Doug Carner Media forensics - Audio, video and image files: Structure, hash tags, metadata and tamper detection , 2013 .

[76]  Thomas Serre,et al.  Robust Object Recognition with Cortex-Like Mechanisms , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[77]  Carlos Ordonez,et al.  A Clustering Algorithm Merging MCMC and EM Methods Using SQL Queries , 2014, BigMine.

[78]  K. Saravanan,et al.  REVIEW ON CLASSIFICATION BASED ON ARTIFICIAL NEURAL NETWORKS , 2014 .

[79]  Shreya Banerjee,et al.  Empirical evaluation of K-Means, Bisecting K-Means, Fuzzy C-Means and Genetic K-Means clustering algorithms , 2015, 2015 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE).

[80]  Yva Doually,et al.  Information Technology , 1997, IFIP Advances in Information and Communication Technology.

[81]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[82]  Kjell Jørgen Hole Anti-fragile ICT Systems , 2016, Simula SpringerBriefs on Computing.

[83]  Fei-Fei Li,et al.  Large-Scale Video Classification with Convolutional Neural Networks , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[84]  Victor C. M. Leung,et al.  Future Information Technology, Application, and Service: FutureTech 2012 Volume 1 , 2012 .

[85]  B. V Prasanthi,et al.  Cyber Forensic Tools: A Review , 2016 .

[86]  Yvonne McGivern,et al.  The Practice of Market and Social Research: An Introduction , 2002 .

[87]  Feng Xia,et al.  Big Scholarly Data: A Survey , 2017, IEEE Transactions on Big Data.

[88]  Doina Precup,et al.  Hierarchical temporal graphical model for head pose estimation and subsequent attribute classification in real-world videos , 2015, Comput. Vis. Image Underst..

[89]  Ruibin Gong,et al.  Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework , 2005, Int. J. Digit. EVid..

[90]  Nils J. Nilsson,et al.  Artificial Intelligence , 1974, IFIP Congress.

[91]  Feng Pan,et al.  Anomaly detection based-on the regularity of normal behaviors , 2006, 2006 1st International Symposium on Systems and Control in Aerospace and Astronautics.

[92]  Chih-Yang Lin,et al.  Three-Pronged Compensation and Hysteresis Thresholding for Moving Object Detection in Real-Time Video Surveillance , 2017, IEEE Transactions on Industrial Electronics.

[93]  Nick Antonopoulos,et al.  Video Stream Analysis in Clouds: An Object Detection and Classification Framework for High Performance Video Analytics , 2019, IEEE Transactions on Cloud Computing.

[94]  Dileep George,et al.  Sequence memory for prediction, inference and behaviour , 2009, Philosophical Transactions of the Royal Society B: Biological Sciences.

[95]  Manfredo Atzori,et al.  Movement Error Rate for Evaluation of Machine Learning Methods for sEMG-Based Hand Movement Classification , 2014, IEEE Transactions on Neural Systems and Rehabilitation Engineering.

[96]  Sebastian Schemm,et al.  Nowcasting Foehn Wind Events Using the AdaBoost Machine Learning Algorithm , 2017 .

[97]  Benjamin Höferlin,et al.  Evaluation of background subtraction techniques for video surveillance , 2011, CVPR 2011.

[98]  Kejun Wang,et al.  Video-Based Abnormal Human Behavior Recognition—A Review , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[99]  Lennard G Streat A Scalable Flash-Based Hardware Architecture for the Hierarchical Temporal Memory Spatial Pooler , 2016 .

[100]  Dileep George,et al.  Towards a Mathematical Theory of Cortical Micro-circuits , 2009, PLoS Comput. Biol..

[101]  Chen-Feng Wu,et al.  A Handoff Algorithm of Dynamic Decisions with Extenics for Wireless Cellular Networks , 2010, J. Electr. Comput. Eng..

[102]  Jing Zhang,et al.  Exposing digital video forgery by ghost shadow artifact , 2009, MiFor '09.

[103]  Horacio Saggion,et al.  Scholarly Data Mining: Making Sense of Scientific Literature , 2017, 2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL).

[104]  Hui Li,et al.  Evolutionary artificial neural networks: a review , 2011, Artificial Intelligence Review.

[105]  Qiao Sun,et al.  An Efficient Distributed Database Clustering Algorithm for Big Data Processing , 2017 .

[106]  Luca Iocchi,et al.  Parallel multi-modal background modeling , 2017, Pattern Recognit. Lett..

[107]  Ian C Smith,et al.  Physical restraint and the therapeutic relationship , 2015 .

[108]  Sergio A. Velastin,et al.  How close are we to solving the problem of automated visual surveillance? , 2008, Machine Vision and Applications.

[109]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[110]  Peter Sommer Directors and corporate advisors' guide to digital investigations and evidence , 2005 .

[111]  Yumi Iwashita,et al.  Recognizing Humans in Motion: Trajectory-based Aerial Video Analysis , 2013, BMVC.

[112]  Sarah Mocas,et al.  Building theoretical underpinnings for digital forensics research , 2004, Digit. Investig..

[113]  Honglak Lee,et al.  Deep Learning for Real-Time Atari Game Play Using Offline Monte-Carlo Tree Search Planning , 2014, NIPS.

[114]  Heikki Mannila,et al.  Principles of Data Mining , 2001, Undergraduate Topics in Computer Science.

[115]  Bertrand Chupeau,et al.  A framework for video forensics based on local and temporal fingerprints , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[116]  Fangming Zhu,et al.  Enhancement of Classifiers in HTM-CLA Using Similarity Evaluation Methods , 2015, KES.

[117]  Scott Purdy Encoding Data for HTM Systems , 2016, ArXiv.

[118]  Fergal Byrne Encoding Reality: Prediction-Assisted Cortical Learning Algorithm in Hierarchical Temporal Memory , 2015, ArXiv.

[119]  Aaron F. Bobick,et al.  Recognition of multi-agent interaction in video surveillance , 1999, Proceedings of the Seventh IEEE International Conference on Computer Vision.

[120]  William Robson Schwartz,et al.  Smart surveillance framework: A versatile tool for video analysis , 2014, IEEE Winter Conference on Applications of Computer Vision.

[121]  Kaushik Roy,et al.  Hierarchical Temporal Memory Based on Spin-Neurons and Resistive Memory for Energy-Efficient Brain-Inspired Computing , 2014, IEEE Transactions on Neural Networks and Learning Systems.

[122]  John Haugeland,et al.  Artificial intelligence - the very idea , 1987 .

[123]  N. Meena,et al.  Performance Comparison of Moving Object Detection Techniques in Video Surveillance System 1 , 2013 .

[124]  William Stafford Noble,et al.  Support vector machine , 2013 .

[125]  Takashi Omori,et al.  Detection of unusual human behavior in intelligent house , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.

[126]  Guillaume-Alexandre Bilodeau,et al.  SuBSENSE: A Universal Change Detection Method With Local Adaptive Sensitivity , 2015, IEEE Transactions on Image Processing.

[127]  Kamran Ahsan,et al.  Digital Forensic Investigation Models, an Evolution study , 2015 .

[128]  J. O. Oringo,et al.  Constraints on Research Productivity in Kenyan Universities: Case Study of University of Nairobi, Kenya , 2016 .

[129]  Petronilla Muriithi Computer mediated collaboration among the academic research community: A case study of Kenya: Doctoral consortium paper , 2013, IEEE 7th International Conference on Research Challenges in Information Science (RCIS).

[130]  Zainuddin Hassan,et al.  COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS , 2011 .

[131]  José E. Meroño,et al.  Application of Numenta® Hierarchical Temporal Memory for land-use classification , 2010 .

[132]  Raymond Wafula Ongus,et al.  Analysis of the Implementation of an Institutional Repository: A Case Study of Dedan Kimathi University of Technology, Kenya , 2016 .

[133]  Mahadev Satyanarayanan,et al.  A Scalable and Privacy-Aware IoT Service for Live Video Analytics , 2017, MMSys.

[134]  Ting Xu,et al.  All-angle negative refraction and active flat lensing of ultraviolet light , 2013, Nature.

[135]  Aakanksha Chowdhery,et al.  The Design and Implementation of a Wireless Video Surveillance System , 2015, MobiCom.

[136]  Pierre Comon,et al.  Independent component analysis, A new concept? , 1994, Signal Process..

[137]  Weihong Wang,et al.  Exposing Digital Forgeries in Interlaced and Deinterlaced Video , 2007, IEEE Transactions on Information Forensics and Security.

[138]  Uffe Kock Wiil,et al.  Digital Forensics and Crime Investigation: Legal Issues in Prosecution at National Level , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[139]  Robin S. Edelstein,et al.  Childhood sexual assault victims: long-term outcomes after testifying in criminal court. , 2005, Monographs of the Society for Research in Child Development.

[140]  Gregg H. Gunsch,et al.  An Examination of Digital Forensic Models , 2002, Int. J. Digit. EVid..

[141]  Maya Cakmak,et al.  Power to the People: The Role of Humans in Interactive Machine Learning , 2014, AI Mag..

[142]  Manoj Kumar,et al.  Analysis of various information retrieval models , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).

[143]  Francois Capman,et al.  Embedded security system for multi-modal surveillance in a railway carriage , 2015, SPIE Security + Defence.

[144]  Shiwei Ma,et al.  Human action recognition based on locality constrained linear coding and two-dimensional spatial-temporal templates , 2017, 2017 Chinese Automation Congress (CAC).

[145]  Richard Comley,et al.  Colour space effect on tracking in video surveillance , 2010 .

[146]  Mohamed Sedky,et al.  Movement Classification Technique for Video Forensic Investigation , 2016 .

[147]  Hui Xiong,et al.  Understanding of Internal Clustering Validation Measures , 2010, 2010 IEEE International Conference on Data Mining.

[148]  J. Aggarwal Motion Analysis: Past, Present and Future , 2011 .

[149]  Xavier Sevillano,et al.  QuickSpot: a video analytics solution for on-street vacant parking spot detection , 2016, Multimedia Tools and Applications.

[150]  Wang Hao,et al.  A Content-Based Image Retrieval System Using Multiple Hierarchical Temporal Memory Classifiers , 2012, 2012 Fifth International Symposium on Computational Intelligence and Design.

[151]  Kamil Rocki,et al.  Effect of Spatial Pooler Initialization on Column Activity in Hierarchical Temporal Memory , 2015, AAAI.

[152]  Mauricio Espinoza,et al.  Detecting Similar Areas of Knowledge Using Semantic and Data Mining Technologies , 2016, CLEI Selected Papers.

[153]  I-Jeng Wang,et al.  Surveillance Camera Coordination Through Distributed Scheduling , 2005, Proceedings of the 44th IEEE Conference on Decision and Control.

[154]  Sridhar Ramaswamy,et al.  Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.

[155]  Yoginder S. Dandass,et al.  Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model , 2012, Comput. Inf. Sci..

[156]  Norita Md Norwawi,et al.  Internet of Things(IoT) digital forensic investigation model: Top-down forensic approach methodology , 2015, 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC).

[157]  Subutai Ahmad,et al.  Evaluating Real-Time Anomaly Detection Algorithms -- The Numenta Anomaly Benchmark , 2015, 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA).

[158]  Eugene H. Spafford,et al.  An Event-Based Digital Forensic Investigation Framework , 2004 .

[159]  Amos Storkey,et al.  Advances in Neural Information Processing Systems 20 , 2007 .

[160]  M. R. McLean Concurrent Learning Algorithm and the Importance Map , 2014, Network Science and Cybersecurity.

[161]  M. Amer,et al.  Nearest-Neighbor and Clustering based Anomaly Detection Algorithms for RapidMiner , 2012 .

[162]  Xiaoming Liu,et al.  An intelligent video framework for homeland protection , 2007, SPIE Defense + Commercial Sensing.

[163]  Cecilia Laschi,et al.  Visual Target Sequence Prediction via Hierarchical Temporal Memory Implemented on the iCub Robot , 2016, Living Machines.

[164]  Feng Xia,et al.  A Survey of Scholarly Data Visualization , 2018, IEEE Access.

[165]  Sriram Raghavan,et al.  Digital forensic research: current state of the art , 2012, CSI Transactions on ICT.

[166]  Mandeep Kaur,et al.  A Literature review on Cyber Forensic and its Analysis tools , 2016 .

[167]  Fabian Fallas-Moya Object Tracking Based on Hierarchical Temporal Memory Classification , 2015 .

[168]  Mansaf Alam,et al.  A survey on scholarly data: From big data perspective , 2017, Inf. Process. Manag..

[169]  P. G Scholar,et al.  A Survey on Moving Object Detection and Tracking Techniques , 2016 .

[170]  K. Flannelly Brain Evolution and Emotions , 2017 .

[171]  Xinzheng Zhang,et al.  Skill Learning for Intelligent Robot by Perception-Action Integration: A View from Hierarchical Temporal Memory , 2017, Complex..

[172]  ศิวะพร ภู่พันธ์,et al.  Research Design: Qualitative, Quantitative, and Mixed Methods Approaches , 2018 .

[173]  Laurent Itti,et al.  A Bayesian model for efficient visual search and recognition , 2010, Vision Research.

[174]  Ronald Poppe,et al.  A survey on vision-based human action recognition , 2010, Image Vis. Comput..

[175]  T. Wilson,et al.  Closed Circuit Television (CCTV) Earthquake Behaviour Coding Methodology: analysis of Christchurch Public Hospital video data from the 22 February Christchurch earthquake event , 2017, Natural Hazards.

[176]  Nicole Beebe,et al.  A hierarchical, objectives-based framework for the digital investigations process , 2005, Digit. Investig..

[177]  Takahiro Okabe,et al.  Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions , 2010, IEEE Transactions on Information Forensics and Security.

[178]  Nils J. Nilsson,et al.  Human-Level Artificial Intelligence? Be Serious! , 2005, AI Mag..

[179]  W. Eric L. Grimson,et al.  Learning Patterns of Activity Using Real-Time Tracking , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[180]  Lisa M. Brown,et al.  IBM smart surveillance system (S3): event based video surveillance system with an open and extensible framework , 2008, Machine Vision and Applications.

[181]  Yann LeCun,et al.  The Loss Surfaces of Multilayer Networks , 2014, AISTATS.

[182]  Sumeet Dua,et al.  Data Mining and Machine Learning in Cybersecurity , 2011 .

[183]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double quantization , 2009, MM&Sec '09.

[184]  Anoop Jain,et al.  Efficient Clustering Technique for Information Retrieval in Data Mining , 2012 .

[185]  Philip E. T. Lewis,et al.  Research Methods for Business Students , 2006 .

[186]  Tomasz Kapuscinski Using Hierarchical Temporal Memory for Vision-Based Hand Shape Recognition under Large Variations in Hand's Rotation , 2010, ICAISC.

[187]  Zeno Geradts,et al.  Forensic Video Investigation , 2000 .

[188]  L. Darrell Whitley,et al.  An overview of evolutionary algorithms: practical issues and common pitfalls , 2001, Inf. Softw. Technol..

[189]  Mubarak Shah,et al.  Tracking and Object Classification for Automated Surveillance , 2002, ECCV.

[190]  Andrew A. Adams,et al.  The future of video analytics for surveillance and its ethical implications , 2015 .

[191]  L. J. M. Rothkrantz,et al.  A smart surveillance system of distributed smart multi cameras modelled as agents , 2016, 2016 Smart Cities Symposium Prague (SCSP).

[192]  Zhenghong Yu,et al.  Image classification using HTM cortical learning algorithms , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).

[193]  Yihong Gong,et al.  Linear spatial pyramid matching using sparse coding for image classification , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.

[194]  Eugene H. Spafford,et al.  Getting Physical with the Digital Investigation Process , 2003, Int. J. Digit. EVid..

[195]  G. Davies,et al.  The Memorandum of Good Practice: theory versus application. , 2001, Child abuse & neglect.