Article Preview
TopIntroduction And Background
In the last decade a new paradigm has emerged named the bio-inspired computing, which requires understanding the biological phenomena (properties of adaptation, self-organization ...etc.) in order to elaborate a new information processing methodology using the essential properties of living. The aim is to reproduce and use the mechanisms observed in nature in different fields (IT, research, mathematics, robotics ...etc.).The first part of our work deliberated on the modelling of a neoteric approach called artificial haemostasis system (AHS) by mimicking the functioning of a natural physiological mechanism (haemostasis), which provides protection against blood loss for stopping the external haemorrhage. The AHS is composed of successive steps (primary haemostasis, secondary haemostasis, and fibrinolysis).
In recent years, the crimes against person and property and the bombings perpetrated by terrorist groups, are the main reasons invoked to justify the installation of surveillance cameras. Some events like September 11 or the attacks in the London subway in July 2005 urging the public authorities and political to act and retighten surveillance in public places in manner to secure the population. Nowadays, there are cameras everywhere in (streets, shops, museums, metro stations, ticket ma-chines, shops, airports, and banks....etc.) with the intent to detect the malicious persons (thieves, criminals, terrorists) and prevent crimes. Merely, the employment of surveillance-video to ensure the social safety, and the identification of dangerous persons by facial recognition collides with several drawbacks:
Figure 1, which was taken in a Jewellery store in the city of Messina on the island Italian of Sicilequi, shows a thief wearing a balaclava who enters the store and steals all the jewels. The policeman visualizes the act of burglary and analyses the video recording by surveillance camera located in this store. The problem is that it is impossible to detect the identity of this thief because he hides his face.
Figure 1.
Thief with hidden face in jewelry store
The disability to warn people before the malicious act, e.g. the terrorists or wanted persons can move in the streets and airports with false identity by altering their looks. These dangerous persons are indistinguishable by the classical system of surveillance-video. For this reason we had the idea to use the features and gestures of suspicious persons as show in Figure 2, to detect if a person is suspicious or not in order to signal him before that the malicious act will be committed.
Figure 2.
Gesture of suspicious persons
The technology of surveillance video can cause problems in particularly regarding the privacy preserving, because sometimes the surveillance video system is used to film “reality shows” that shows us the daily life of people. According to statistics in England daily a person who walks around downtown is filmed by 300 cameras. Consequently in order to protect the privacy of the citizen we must find a technique to satisfy the interests of all the parties including the person filming and the one filmed.