Searched for: author:"Bouma, H."
(1 - 20 of 78)

Pages

document
Gerats, B. (author), Bouma, H. (author), Uijens, W. (author), Englebiennel, G. (author), Spreeuwers, L. (author)
Data and statistics are key to soccer analytics and have important roles in player evaluation and fan engagement. Automatic recognition of soccer events - such as passes and corners - would ease the data gathering process, potentially opening up the market for soccer analytics at non professional clubs. Existing approaches extract events on...
conference paper 2021
document
Bouma, H. (author), Reuter, A. (author), Brouwer, P. (author), George, M. (author), Ferryman, J. (author), Boyle, J. (author), Juršėnas, A. (author), Karinsalo, A. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Gicic, D. (author), Goller, G. (author), Ledinauskas, E. (author), Ruseckas, J. (author), Kromhout, B. (author), de Moel, H. (author), Dolstra, N. (author)
Authentication of travel documents (e.g., passports) and breeder documents (e.g., birth certificates) is important to facilitate legal movement of passengers and to prevent cross-border crime, such as terrorism, smuggling, illegal migration and human trafficking. However, it is time consuming and difficult to verify all security features, the...
conference paper 2021
document
de Dominicis, L. (author), Bouma, H. (author), Toivonen, S. (author), Stifini, C. (author), Villani, M.L. (author), de Nicola, A. (author), van Rooijen, A.L. (author), Baan, J. (author), Peltola, J. (author), Lämsä, A. (author), Räsänen, P. (author)
conference paper 2021
document
Minh Ngô, L. (author), Wang, W. (author), Mandira, B. (author), Karaoğlu, S. (author), Bouma, H. (author), Dibeklioğlu, H. (author), Gevers, T. (author)
Deception is a common phenomenon in society, both in our private and professional lives. However, humans are notoriously bad at accurate deception detection. Based on the literature, human accuracy of distinguishing between lies and truthful statements is 54% on average, in other words, it is slightly better than a random guess. While people do...
conference paper 2021
document
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)
Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...
conference paper 2020
document
Katsaros, E. (author), Bouma, H. (author), van Rooijen, A.L. (author), van Dusseldorp, E. (author)
Vehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the...
conference paper 2020
document
Bouma, H. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Kromhout, B. (author)
The current capabilities and capacities of border guards and immigration services can be enhanced using technologies that automate the analysis of travel, identity and breeder documents in order to detect fraud. These technologies can be relevant for countering emerging threats in document and identity verification (e.g., forged documents,...
conference paper 2020
document
Meijer, R. (author), van Dam, E. (author), Bouma, H. (author), Baan, J. (author), van der Hurk, S.E. (author)
Objective: The objective of this research is to study the feasibility of measuring behavioral indicators that reflect effects of infrastructure and interaction with other road users. Methods: An observation study was performed using 6 cameras above a separated cycle path next to a road which included a crossing with both cyclists and cars. A...
article 2020
document
Bouma, H. (author), Prabhu, R. (author), Stokes, R.J. (author), Yitzhaky, Y. (author)
[No abstract available]
article 2019
document
van Rooijen, A.L. (author), Bouma, H. (author), Verbeek, F. (author)
Person re-identification (re-id) is the task of identifying a person of interest across disjoint camera views in a multi-camera system. This is a challenging problem due to the different poses, viewpoints and lighting conditions. Deeply learned systems have become prevalent in the person re-identification field as they are capable to deal with...
conference paper 2019
document
Beckers, A.L.D. (author), Sijs, J. (author), van Diggelen, J. (author), van Dijk, Roelof J.E. (author), Bouma, H. (author), Lomme, M. (author), Hommes, R.M. (author), Hillerström, F.H.J. (author), van der Waa, J.S. (author), van Velsen, A.L. (author), Mannucci, T. (author), Voogd, J.M. (author), van Staal, W. (author), Veltman, H.J. (author), Wessels, P.W. (author), Huizing, A. (author)
Intelligent robotic autonomous systems (unmanned aerial/ground/surface/underwater vehicles) are attractive for military application to relieve humans from tedious or dangerous tasks. These systems require awareness of the environment and their own performance to reach a mission goal. This awareness enables them to adapt their operations to...
conference paper 2019
document
de Boer, M.H.T. (author), Bouma, H. (author), Kruithof, M.C. (author), Joosten, B. (author)
Annotating a large set of images, especially with bounding boxes, is a tedious task. In this paper, we propose an intuitive image annotation tool. This tool not only allows (non-expert) users to annotate images with novel concepts, but is also able to achieve acceptable performance with a smaller number of annotated images. The tool can also...
conference paper 2019
document
Lloyd, C. (author), Mannucci, T. (author), Bouma, H. (author), Schutte, K. (author), Huizing, A. (author)
In recent years advances in machine learning methods such as deep learning has led to significant improvements in our ability to track people and vehicles, and to recognise specific individuals. Such technology has enormous potential to enhance the performance of image-based security systems. However, wide-spread use of such technology has...
conference paper 2019
document
Bouma, H. (author), Schutte, K. (author), ten Hove, R.J.M. (author), Burghouts, G.J. (author), Baan, J. (author)
Surveillance systems are essential for the protection of military compounds and critical infrastructures. Automatic recognition of suspicious activities can augment human operators to find relevant threats. Common solutions for behavior analysis or action recognition require large amounts of training data. However, suspicious activities and...
conference paper 2018
document
Meijer, R. (author), van Dam, E. (author), Bouma, H. (author), Baan, J. (author), van der Hurk, S.E. (author)
Although, in The Netherlands the infrastructure has been made cyclist friendly, 78.400 cyclist were treated at the first aid because of an accident in 2014. Especially with the upcoming of various types of powered bikes, more detailed analyses on the safety critical situations for cy-clists is needed in order to adequately adapt and further...
conference paper 2018
document
Rooijen, A.L. (author), Bouma, H. (author), Verbeek, F. (author)
conference paper 2018
document
Bouma, H. (author), Joosten, B. (author), Kruithof, M.C. (author), de Boer, M.H.T. (author), Ginsca, A. (author), Labbe, B. (author), Vuong, Q.T. (author)
Due to the increasing need for effective security measures and the integration of cameras in commercial products, a huge amount of visual data is created today. Law enforcement agencies (LEAs) are inspecting images and videos to find radicalization, propaganda for terrorist organizations and illegal products on darknet markets. This is time...
conference paper 2018
document
de Boer, M.H.T. (author), Bouma, H. (author), Kruithof, M.C. (author), ter Haar, F.B. (author), Fischer, N.M. (author), Hagendoorn, L.K. (author), Joosten, B. (author), Raaijmakers, S. (author)
The information available on-line and off-line, from open as well as from private sources, is growing at an exponential rate and places an increasing demand on the limited resources of Law Enforcement Agencies (LEAs). The absence of appropriate tools and techniques to collect, process, and analyze the volumes of complex and heterogeneous data...
conference paper 2017
document
Fischer, N.M. (author), Kruithof, M.C. (author), Bouma, H. (author)
In the field of security and defense, it is extremely important to reliably detect moving objects, such as cars, ships, drones and missiles. Detection and analysis of moving objects in cameras near borders could be helpful to reduce illicit trading, drug trafficking, irregular border crossing, trafficking in human beings and smuggling. Many...
conference paper 2017
document
Satsangi, Y. (author), Whiteson, S. (author), Oliehoek, F.A. (author), Bouma, H. (author)
Automated tracking is key to many computer vision applications. However, many tracking systems struggle to perform in real-time due to the high computational cost of detecting people, especially in ultra high resolution images. We propose a new algorithm called PartiMax that greatly reduces this cost by applying the person detector only to the...
conference paper 2017
Searched for: author:"Bouma, H."
(1 - 20 of 78)

Pages