Searched for:
(1 - 20 of 60)

Pages

document
Burghouts, G.J. (author), Hillerström, F.H.J. (author)
Current object recognition techniques are based on deep learning and require substantial training samples in order to achieve a good performance. Nonetheless, there are many applications in which no (or only a few) training images of the targets are available, whilst they are well-known by domain experts. Zero-shot learning is used in use cases...
conference paper 2021
document
Meyer-Vitali, A.P. (author), Bakker, R.M. (author), van Bekkum, M.A. (author), de Boer, M. (author), Burghouts, G. (author), van Diggelen, J. (author), Dijk, J. (author), Grappiolo, C. (author), de Greeff, J. (author), Huizing, A.G. (author), Raaijmakers, S. (author)
Hybrid Artificial Intelligence combines the best of two worlds: the power of recent advances in deep learning with the possibility to explicitly model human knowledge in connected systems. Together, this new generation of AI becomes more controllable, explainable and fair, in line with European norms and values.
report 2019
document
Bouma, H. (author), Schutte, K. (author), ten Hove, R.J.M. (author), Burghouts, G.J. (author), Baan, J. (author)
Surveillance systems are essential for the protection of military compounds and critical infrastructures. Automatic recognition of suspicious activities can augment human operators to find relevant threats. Common solutions for behavior analysis or action recognition require large amounts of training data. However, suspicious activities and...
conference paper 2018
document
Neumann, N.M.P. (author), Knegjens, R. (author), Den Hollander, R. (author), Oggero, S. (author), Burghouts, G.J. (author), Van Den Broek, S.P. (author)
Algorithms for the detection and tracking of objects can be combined into a system that automatically extracts relevant events from a large amount of video data. Such a system , can be particularly useful in video surveillance applications, notably to support analysts in retrieving information from hours of video while working under strict time...
conference paper 2018
document
Bowman, E.K. (author), Burghouts, G. (author), Overlier, L. (author), Kase, S.E. (author), Zimmerman, R.J. (author), Oggero, S. (author)
The US and nations of the NATO Alliance are increasingly threatened by the global spread of terrorism, humanitarian crises/disaster response, and public health emergencies. These threats are influenced by the unprecedented rise of information sharing technologies and practices, where mobile access to social networking sites is ubiquitous. In...
conference paper 2018
document
den Hollander, R.J.M. (author), Bouma, H. (author), van Rest, J.H.C. (author), ten Hove, J.M. (author), ter Haar, F.B. (author), Burghouts, G.J. (author)
Video analytics is essential for managing large quantities of raw data that are produced by video surveillance systems (VSS) for the prevention, repression and investigation of crime and terrorism. Analytics is highly sensitive to changes in the scene, and for changes in the optical chain so a VSS with analytics needs careful configuration and...
conference paper 2017
document
Schutte, K. (author), Burghouts, G. (author), van der Stap, N. (author), Westerwoudt, V.L. (author), Bouma, H. (author), Kruithof, M.C. (author), Baan, J. (author), ten Hove, R.J.M. (author)
The bottleneck in situation awareness is no longer in the sensing domain but rather in the data interpretation domain, since the number of sensors is rapidly increasing and it is not affordable to increase human data-analysis capacity at the same rate. Automatic image analysis can assist a human analyst by alerting when an event of interest...
conference paper 2016
document
Bowman, E.K. (author), Broome, B.D. (author), Holland, V.M. (author), Summers-Stay, D. (author), Rao, R.M. (author), Duselis, J. (author), Howe, J. (author), Madahar, B.K. (author), Boury-Brisset, A.C. (author), Forrester, B. (author), Kwantes, P. (author), Burghouts, G. (author), van Huis, J. (author), Mulayim, A.Y. (author)
This report summarizes the findings of an exploratory team of the North Atlantic Treaty Organization (NATO) Information Systems Technology panel into Content-Based Analytics (CBA). The team carried out a technical review into the current status of theoretical and practical developments of methods, tools and techniques supporting joint...
conference paper 2016
document
Lefter, I. (author), Burghouts, G.J. (author), Rothkrantz, L.J.M. (author)
This paper investigates how speech and gestures convey stress, and how they can be used for automatic stress recognition. As a first step, we look into how humans use speech and gestures to convey stress. In particular, for both speech and gestures, we distinguish between stress conveyed by the intended semantic message (e.g. spoken words for...
article 2016
document
Bouma, H. (author), Burghouts, G.J. (author), den Hollander, R.J.M. (author), van der Zee, S. (author), Baan, J. (author), ten Hove, R.J.M. (author), van Diepen, C.J. (author), van den Haak, W.P. (author), van Rest, J. (author)
Deception detection is valuable in the security domain to distinguish truth from lies. It is desirable in many security applications, such as suspect and witness interviews and airport passenger screening. Interviewers are constantly trying to assess the credibility of a statement, usually based on intuition without objective technical support....
conference paper 2016
document
Bouma, H. (author), Eendebak, P.T. (author), Schutte, K. (author), Azzopardi, G. (author), Burghouts, G.J. (author)
Object recognition and localization are important to automatically interpret video and allow better querying on its content. We propose a method for object localization that learns incrementally and addresses four key aspects. Firstly, we show that for certain applications, recognition is feasible with only a few training samples. Secondly, we...
conference paper 2015
document
Dijk, J. (author), Elands, P.J.M. (author), Burghouts, G. (author), Van Eekeren, A.W.M. (author)
In this paper we evaluate the added value of image interpretation techniques for EO sensors mounted on a UAV for operators in an operational setting. We start with evaluating the support by technology for strategic and tactical purposes in a real-time scenario. We discuss different variations regarding users, platforms and sensors, communication...
conference paper 2015
document
Bouma, H. (author), Baan, J. (author), ter Haar, F.B. (author), Eendebak, P.T. (author), den Hollander, R.J.M. (author), Burghouts, G.J. (author), Wijn, R. (author), van den Broek, S.P. (author), van Rest, J.H.C. (author)
In the security domain, cameras are important to assess critical situations. Apart from fixed surveillance cameras we observe an increasing number of sensors on mobile platforms, such as drones, vehicles and persons. Mobile cameras allow rapid and local deployment, enabling many novel applications and effects, such as the reduction of violence...
conference paper 2015
document
van Huis, J.R. (author), Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), Hollander, R.J.M. (author), Dijk, J. (author), van Rest, J.H.C. (author)
Automatic detection of abnormal behavior in CCTV cameras is important to improve the security in crowded environments, such as shopping malls, airports and railway stations. This behavior can be characterized at different time scales, e.g., by small-scale subtle and obvious actions or by large-scale walking patterns and interactions between...
conference paper 2014
document
Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), van Huis, J.R. (author), Dijk, J. (author), van Rest, J.H.C. (author)
Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This...
conference paper 2014
document
Burghouts, G.J. (author), Schutte, K (author), ten Hove, R.J.M. (author), van den Broek, S.P. (author), Baan, J. (author), Rajadell, O. (author), van Huis, J.R. (author), van Rest, J.H.C. (author), Hanckmann, P. (author), Bouma, H. (author), Sanroma, G. (author), Evans, M. (author), Ferryman, J. (author)
Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The theft takes place in very different forms, in the midst of many people who pose no threat. The threats range...
article 2014
document
van Eekeren, A.W.M. (author), Dijk, J. (author), Burghouts, G. (author)
Airborne platforms are recording large amounts of video data. Extracting the events which are needed to see is a timedemanding task for analysts. The reason for this is that the sensors record hours of video data in which only a fraction of the footage contains events of interest. For the analyst, it is hard to retrieve such events from the...
conference paper 2014
document
Lefter, I. (author), Burghouts, G.J. (author), Rothkrantz, L.J.M. (author)
Stressful situations are likely to occur at human operated service desks, as well as at human-computer interfaces used in public domain. Automatic surveillance can help notifying when extra assistance is needed. Human communication is inherently multimodal e.g. speech, gestures, facial expressions. It is expected that automatic surveillance...
article 2014
document
Burghouts, G.J. (author), Eendebak, P.T. (author), Bouma, H. (author), Hove, R.J.M. (author)
In this paper, we summarize how the action recognition can be improved when multiple views are available. The novelty is that we explore various combination schemes within the robust and simple bag-of-words (BoW) framework, from early fusion of features to late fusion of multiple classifiers. In new experiments on the publicly available IXMAS...
conference paper 2014
document
Bouma, H. (author), van Rest, J.H.C. (author), Burghouts, G.J. (author), Schutte, K. (author), Baan, J. (author)
To improve security in crowded environments, such as airports, shopping malls and railway stations, the number of surveillance cameras (CCTV) is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams can be observed. This makes it hard for an operator to be proactive. This paper gives...
article 2014
Searched for:
(1 - 20 of 60)

Pages