Searched for: author%3A%22van+Rooijen%2C+A.L.%22
(1 - 9 of 9)
document
Bouma, H. (author), Villani, M.L. (author), van Rooijen, A.L. (author), Räsänen, P. (author), Peltola, J. (author), Toivonen, S. (author), de Nicola, A. (author), Guarneri, M. (author), Stifini, C. (author), de Dominicis, L. (author)
Counter terrorism is a huge challenge for public spaces. Therefore, it is essential to support early detection of threats, such as weapons or explosives. An integrated fusion engine was developed for the management of a plurality of sensors to detect threats without disrupting the flow of commuters. The system improves security of soft targets ...
article 2023
document
Bouma, H. (author), van van Mil, J.D. (author), ten Hove, R.J.M. (author), Pruim, R. (author), van Rooijen, A.L. (author), Kern, A.S.Y. (author), Ballan, L. (author), Kromhout, B. (author), Dominic Wolbers, D. (author), de Moel, H. (author), Dolstra, N. (author), Bomhof, G. (author), de Rooij, D. (author)
It is important to combat fraud on travel documents (e.g., passports), identity documents (e.g., ID-card) and breeder documents (e.g., birth certificates) to facilitate the travel of bona-fide travelers and to prevent criminal cross-border activities, such as terrorism, illegal migration, smuggling, and human trafficking. However, it is...
conference paper 2022
document
van Rooijen, A.L. (author), Bouma, H. (author), Baan, J. (author), van Leeuwen, M.C. (author)
Person re-identification (Re-ID) can be used to find the owner of lost luggage, to find suspects after a terrorist attack, or to fuse multiple sensors. Common state-of-the-art deep-learning technology performs well on a large public dataset but it does not generalize well to other environments, which makes it less suitable for practical...
conference paper 2022
document
Bouma, H. (author), Reuter, A. (author), Brouwer, P. (author), George, M. (author), Ferryman, J. (author), Boyle, J. (author), Juršėnas, A. (author), Karinsalo, A. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Gicic, D. (author), Goller, G. (author), Ledinauskas, E. (author), Ruseckas, J. (author), Kromhout, B. (author), de Moel, H. (author), Dolstra, N. (author)
Authentication of travel documents (e.g., passports) and breeder documents (e.g., birth certificates) is important to facilitate legal movement of passengers and to prevent cross-border crime, such as terrorism, smuggling, illegal migration and human trafficking. However, it is time consuming and difficult to verify all security features, the...
conference paper 2021
document
de Dominicis, L. (author), Bouma, H. (author), Toivonen, S. (author), Stifini, C. (author), Villani, M.L. (author), de Nicola, A. (author), van Rooijen, A.L. (author), Baan, J. (author), Peltola, J. (author), Lämsä, A. (author), Räsänen, P. (author)
conference paper 2021
document
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)
Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...
conference paper 2020
document
Katsaros, E. (author), Bouma, H. (author), van Rooijen, A.L. (author), van Dusseldorp, E. (author)
Vehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the...
conference paper 2020
document
Bouma, H. (author), Pruim, R.H.R. (author), van Rooijen, A.L. (author), ten Hove, R.J.M. (author), van Mil, J.D. (author), Kromhout, B. (author)
The current capabilities and capacities of border guards and immigration services can be enhanced using technologies that automate the analysis of travel, identity and breeder documents in order to detect fraud. These technologies can be relevant for countering emerging threats in document and identity verification (e.g., forged documents,...
conference paper 2020
document
van Rooijen, A.L. (author), Bouma, H. (author), Verbeek, F. (author)
Person re-identification (re-id) is the task of identifying a person of interest across disjoint camera views in a multi-camera system. This is a challenging problem due to the different poses, viewpoints and lighting conditions. Deeply learned systems have become prevalent in the person re-identification field as they are capable to deal with...
conference paper 2019
Searched for: author%3A%22van+Rooijen%2C+A.L.%22
(1 - 9 of 9)