Table of Contents Author Guidelines Submit a Manuscript
Volume 2018, Article ID 2959030, 10 pages
Research Article

Precision Security: Integrating Video Surveillance with Surrounding Environment Changes

1CAS Research Center for Ecology and Environment of Central Asia, Xinjiang Institute of Ecology and Geography, Chinese Academy of Sciences, Urumqi 830011, China
2School of Management Engineering and Business, Hebei University of Engineering, Handan 056038, China
3Center for Geo-Spatial Information, Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China
4School of Information Science and Engineering, Xiamen University, Xiamen 361005, China
5Key Laboratory of IOT Terminal Pivotal Technology, Harbin Institute of Technology, Shenzhen 518000, China

Correspondence should be addressed to Guiwei Zhang; nc.ude.uebeh@iewiuggnahz

Received 22 July 2017; Revised 19 October 2017; Accepted 14 December 2017; Published 8 February 2018

Academic Editor: Roberto Natella

Copyright © 2018 Wenfeng Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Video surveillance plays a vital role in maintaining the social security although, until now, large uncertainty still exists in danger understanding and recognition, which can be partly attributed to intractable environment changes in the backgrounds. This article presents a brain-inspired computing of attention value of surrounding environment changes (EC) with a processes-based cognition model by introducing a ratio value of EC-implications within considered periods. Theoretical models for computation of warning level of EC-implications to the universal video recognition efficiency (quantified as time cost of implication-ratio variations from to , ) are further established. Imbedding proposed models into the online algorithms is suggested as a future research priority towards precision security for critical applications and, furthermore, schemes for a practical implementation of such integration are also preliminarily discussed.