Searched for: subject%3A%22Detection%22
(1 - 20 of 574)

Pages

document
Bouma, H. (author), Villani, M.L. (author), van Rooijen, A.L. (author), Räsänen, P. (author), Peltola, J. (author), Toivonen, S. (author), de Nicola, A. (author), Guarneri, M. (author), Stifini, C. (author), de Dominicis, L. (author)
Counter terrorism is a huge challenge for public spaces. Therefore, it is essential to support early detection of threats, such as weapons or explosives. An integrated fusion engine was developed for the management of a plurality of sensors to detect threats without disrupting the flow of commuters. The system improves security of soft targets ...
article 2023
document
Berendrecht, W.L. (author), van Vliet, M.E. (author), Griffioen, J. (author)
Quality control of large-scale monitoring networks requires the use of automatic procedures to detect potential outliers in an unambiguous and reproducible manner. This paper describes a methodology that combines existing statistical methods to accommodate for the specific characteristics of measurement data obtained from groundwater quality...
article 2023
document
Difrancesco, S. (author), van Baardewijk, J.U. (author), Cornelissen, A.S. (author), Varon, C. (author), Hendriks, R.C. (author), Brouwer, A.M. (author)
Wearable sensors offer new opportunities for the early detection and identification of toxic chemicals in situations where medical evaluation is not immediately possible. We previously found that continuously recorded physiology in guinea pigs can be used for early detection of exposure to an opioid (fentanyl) or a nerve agent (VX), as well as...
article 2023
document
Dimitrovski, T. (author), Bergman, T. (author), Zuraniewski, P. (author)
The use of Machine Learning in many control and management processes is rising fast. This is especially true for the management of cloud native applications and for anomaly detection in cyber-security mechanisms. However, it has been shown that ML is an attack surface on its own, especially when the attack is performed by another ML system....
conference paper 2023
document
de Koning, M.C. (author), Ma, K. (author), van Grol, M. (author), Iordanov, I. (author), Kruijne, M.J.L. (author), Idrees, K.B. (author), Xie, H. (author), Islamoglu, T. (author), Bross, R.P.T. (author), Farha, O.K. (author)
In the case of an incident with nerve agents, the timely and ready detection and identification of such a substance on suspected surfaces is essential. However, the detection of low levels of nerve agents on a surface is a considerable challenge for conventional detection equipment, especially with VX, a highly toxic nerve agent with low...
article 2022
document
Chiscop, I. (author), Soro, F. (author), Smith, P. (author)
Threat hunting and malware prediction are critical activities to ensure network and system security. These tasks are difficult due to increasing numbers of sophisticated malware families. Automatically detecting anomalous Domain Name System (DNS) queries in operational traffic facilitates the detection of new malware infections, significantly...
conference paper 2022
document
Berghuis, N.F. (author), Mars-Groenendijk, R.H. (author), Busker, R.W. (author), Paauw, A. (author), van Leeuwen, H.C. (author)
CRISPR–Cas (CC)-based detection technologies have some exceptional features, which hold the promise of developing into the nextgeneration diagnostic platforms. One of these features is the ability to trigger non-specific single-stranded DNA/RNA cleavage activity after specific target recognition and Cas enzyme activation. This cleavage activity...
article 2022
document
van den Brink, W.J. (author), van den Broek, T.J. (author), Palmisano, S. (author), Wopereis, S. (author), de Hoogh, I.M. (author)
Digital health technologies may support the management and prevention of disease through personalized lifestyle interventions. Wearables and smartphones are increasingly used to continuously monitor health and disease in everyday life, targeting health maintenance. Here, we aim to demonstrate the potential of wearables and smartphones to (1)...
article 2022
document
Karakitsios, S. (author), Maggos, T. (author), Busker, R.W. (author), Armand, P. (author), Bartzis, J.G. (author)
The overarching objective of the ERNCIP “Detection of Indoor Airborne Chemical & Biological Agents” Thematic Group (TG) is to strengthen resilience of critical infrastructure against airborne CB threats by improvement of detection capabilities. The subsidiary aim of the research described in this technical report is to develop knowledge on the...
report 2022
document
van Battum, C.H.H. (author), Wiegmans, B. (author), Atasoy, B. (author), van Wingerden, E. (author), de Waal, A. (author), Tavasszy, L.A. (author)
Container terminal capacity is often limited by (in)efciency bottlenecks. This paper provides the design and proof of concept for the bottleneck mitigation cycle (BMC), consisting of three steps: bottleneck classifcation, detection and alleviation. While, often, the literature only focuses on alleviation of a single bottleneck and ignores...
article 2022
document
Rooij S.B. van, (author), Bouma, H. (author), van Mil, J.D. (author), ten Hove, R.J.M. (author)
The increasing complexity of security challenges requires Law Enforcement Agencies (LEAs) to have improved analysis capabilities, e.g., with the use of Artificial Intelligence (AI). However, it is challenging to make large enough high-quality training and testing datasets available to the community that is developing AI tools to support LEAs in...
conference paper 2022
document
van Rooijen, A.L. (author), Bouma, H. (author), Baan, J. (author), van Leeuwen, M.C. (author)
Person re-identification (Re-ID) can be used to find the owner of lost luggage, to find suspects after a terrorist attack, or to fuse multiple sensors. Common state-of-the-art deep-learning technology performs well on a large public dataset but it does not generalize well to other environments, which makes it less suitable for practical...
conference paper 2022
document
Theunissen, M.H.C. (author), de Wilde, J.A. (author), Bezem, J. (author), van Harten, L. (author)
Introduction. A uniform triage protocol is developed for Preventive Child Healthcare (PCH) to improve the quality of detection of health problems in primary school children by PCH. The aim of this study is to investigate 1) the psychometric properties and 2) satisfaction of PCH professionals of this uniform triage protocol. Methods. We included...
article 2022
document
van der Burg, E. (author), Hogervorst, M.A. (author), Toet, A. (author)
Natural scenes are typically highly heterogeneous, making it difficult to assess camouflage effectiveness for moving objects since their local contrast varies with their momentary position. Camouflage performance is usually assessed through visual search and detection experiments involving human observers. However, such studies are time...
conference paper 2022
document
Derkink, F.M. (author), Doelman, D. (author), van Dam, D. (author), Brenny, B.J.M. (author), Speet, B.G. (author), van Brug, H. (author), Keller, C. (author), Snik, F. (author)
While the concentrations of trace gases in Earth’s atmosphere were roughly constant for thousands of years, human activities such as the burning of fossil fuels have caused significant changes ever since the industrial revolution. The remote sensing of trace gases has proved to be a useful technique for mapping and monitoring on the global scale...
conference paper 2022
document
Geurts, M. (author), Hogema, J. (author), Silvas, E. (author), Souman, J. (author), Rahman, A. (author), Hiller, J. (author)
To develop safe automated driving functions, knowing road-user’s lane change behaviour is critical. This detection problem may depend on multiple aspects such as road conditions, location, and weather. To understand the effect of these situational variables, this work introduces a lane change detection algorithm and assessed its performance...
conference paper 2022
document
Marques, J.F. (author), Varbanov, B.M. (author), Moreira, M.S. (author), Ali, H. (author), Muthusubramanian, N. (author), Zachariadis, C. (author), Battistel, F. (author), Beekman, M.W. (author), Haider, S.N. (author), Vlothuizen, W. (author), Bruno, A. (author), Terhal, B.M. (author), DiCarlo, L. (author)
article 2022
document
van der Jagt, O.C. (author), Onnerud, H. (author), Poullain, D. (author)
This article links the main challenges in explosives detection to terrorist scenarios, and provides a view on future opportunities for explosives detection systems and technological developments as a part of a comprehensive counter terrorism approach. A few trends and highlights are given with a focus on European multidisciplinary research...
article 2022
document
Booij, T.M. (author), Chiscop, I. (author), Meeuwissen, E. (author), Moustafa, N. (author), Hartog, F.T.H.D. (author)
article 2022
document
Oosterman, D.T. (author), Langenkamp, W.H. (author), van Bergen, E.L. (author)
In this paper we describe our initial findings on a method for improving anomaly detection on a dataset with scarcely labeled data, based on an ongoing use-case with the Belgian Customs Administration (BCA). Data on shipping containers is used to predict the level of risk associated with a shipment, as well as the probability that the shipment...
conference paper 2022
Searched for: subject%3A%22Detection%22
(1 - 20 of 574)

Pages