Searched for: subject%3A%22II%255C%2B%255C-%255C%2BIntelligent%255C%2BImaging%22
(61 - 80 of 194)
- document
-
Rob Kemp, R.A.W. (author), Dijk, J. (author), Schutte, K. (author), Visser, N. (author)A novel filter that enhances underwater video footage in remotely operated vehicle systems is well suited to both military and civilian applicationsarticle 2014
- document
-
van Huis, J.R. (author), Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), den Hollander, R.J.M. (author), Dijk, J. (author), van Rest, J.H.C. (author)Automatic detection of abnormal behavior in CCTV cameras is important to improve the security in crowded environments, such as shopping malls, airports and railway stations. This behavior can be characterized at different time scales, e.g., by small-scale subtle and obvious actions or by large-scale walking patterns and interactions between...conference paper 2014
- document
-
Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), van Huis, J.R. (author), Dijk, J. (author), van Rest, J.H.C. (author)Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This...conference paper 2014
- document
-
Burghouts, G.J (author), Schutte, K (author), ten Hove, R.J.M. (author), van den Broek, S.P. (author), Baan, J. (author), Rajadell, O. (author), van Huis, J.R. (author), van Rest, J.H.C. (author), Hanckmann, P. (author), Bouma, H. (author), Sanroma, G. (author), Evans, M. (author), Ferryman, J. (author)Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The theft takes place in very different forms, in the midst of many people who pose no threat. The threats range...article 2014
- document
-
van den Broek, S.P. (author), Bouma, H. (author), den Hollander, R.J.M. (author), Veerman, H.E.T. (author), Benoist, K.W. (author), Schwering, P.B.W. (author)For maritime situational awareness, it is important to identify currently observed ships as earlier encounters. For example, past location and behavior analysis are useful to determine whether a ship is of interest in case of piracy and smuggling. It is beneficial to verify this with cameras at a distance, to avoid the costs of bringing an own...conference paper 2014
- document
-
Marck, J.W. (author), Bouma, H. (author), Baan, J (author), de Oliveira Filho, J. (author), van der Brink, M. (author)The capability to find individuals using CCTV cameras is important for surveillance applications at large areas such as railway stations, airports and shopping centers. However, it is laborious to track and trace people over multiple cameras post incident. In this paper, we describe the live demonstration of our interactive re-identification...conference paper 2014
- document
-
Torres, J. (author), Schutte, K. (author), Bouma, H. (author), Menendez, J.M. (author)Many image processing methods, such as techniques for people re-identification, assume photometric constancy between different images. This paper addresses the correction of photometric variations based upon changes in background areas to correct foreground areas. We assume a multiple light source model where all light sources can have different...article 2014
- document
-
Spitters, M.M. (author), Eendebak, P.T. (author), Worm, D.T.H. (author), Bouma, H. (author)Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming for security services to monitor all these open...conference paper 2014
- document
-
Hegyi, A. (author), Netten, B.D. (author), Wang, M. (author), Schakel, W. (author), Schreiter, T. (author), Yuan, Y. (author), van Arem, B. (author), Alkim, T. (author)The SPECIALIST algorithm can resolve jam waves on freeways using roadside technology: detector loops and speed limit gantries. In this paper we extend the algorithm, enabling the integration with cooperative system technologies and other road side detectors, such as in-car detection and actuation, and video-based monitoring (VBM). Integrating...conference paper 2013
- document
-
Dijk, J. (author), van Eekeren, A.W.M. (author), Toet, A. (author), den Hollander, R.J.M. (author), Schutte, K. (author), van Heijningen, A.W.P. (author), Bijl, P. (author)For many military operations, situational awareness is of great importance. During night conditions, this situational awareness can be improved using both analog and digital image-intensified cameras. The quality of image intensifiers is a topic of interest. One of the differences between a digital and analog system is noise behavior. For...article 2013
- document
-
Streefkerk, J.W. (author), Houben, M. (author), van Amerongen, P. (author), ter Haar, F. (author), Dijk, J. (author)Forensic professionals have to collect evidence at crime scenes quickly and without contamination. A handheld Augmented Reality (AR) annotation tool allows these users to virtually tag evidence traces at crime scenes and to review, share and export evidence lists. In an user walkthrough with this tool, eight end-users annotated a virtual crime...bookPart 2013
- document
-
Schols, R.M. (author), Wieringa, F.P. (author), Alić, L. (author), Bouvy, N.D. (author), Stassen, L.P.S. (author)Distinguishing critical tissues can be challenging in (para-)thyroid surgery. As a first step towards intraoperative image contrast enhancement, we collected and analyzed spectral signatures (350-1830nm) of thyroid, parathyroid and recurrent laryngeal nerve in 10 patients.conference paper 2013
- document
-
Heemskerk, C.J.M. (author), Eendebak, P.T. (author), Schropp, G.Y.R. (author), Hermes, H.V. (author), Elzendoorn, B.S.Q. (author), Magielsen, A.J. (author)Maintenance operations on ITER tokamak components will be largely performed by remote handling. In previous work it was shown that representative maintenance tasks could be performed significantly faster with direct visual feedback than with camera feedback. In post-test interviews, operators indicated that they regarded the lack of 3D...article 2013
- document
-
van Leeuwen, C.J. (author), Sijs, J. (author), Papp, Z. (author)A sensor network operating under changing operational conditions will have to adapt to its environment, topology and system performance. In order to obtain this flexible behavior, a reconfiguration framework is proposed for distributed signal processing solutions. The considered example in this article is distributed Kalman filtering, whereas...conference paper 2013
- document
-
de Boer, M.H.T. (author), van Maanen, P.P. (author), Vreeswijk, G. (author)Intelligence analysts have to work in highly demanding circumstances. This causes mistakes with severe consequences, which is the reason that support systems for intelligence analysts have been developed. The support system proposed in this paper assists humans by offering support that improves their performance, without reducing them in their...conference paper 2013
- document
-
Daanen, H.A.M. (author), ter Haar, F.B. (author)An overview of whole body scanners in 1998 (H.A.M. Daanen, G.J. Van De Water. Whole body scanners, Displays 19 (1998) 111-120) shortly after they emerged to the market revealed that the systems were bulky, slow, expensive and low in resolution. This update shows that new developments in sensing and processing technology, in particular in...article 2013
- document
-
van Rest, J.H.C. (author), Grootjen, F.A. (author), Grootjen, M. (author), Wijn, R. (author), Aarts, O.A.J. (author), Roelofs, M.L. (author), Burghouts, G.J. (author), Bouma, H. (author), Alic, L. (author), Kraaij, W. (author)Surveillance for security requires communication between systems and humans, involves behavioural and multimedia research, and demands an objective benchmarking for the performance of system components.Metadata representation schemes are extremely important to facilitate (system) interoperability and to define ground truth annotations for...article 2013
- document
-
Burghouts, G.J. (author), de Penning, H.L.H. (author), ten Hove, R.J.M. (author), Landsmeer, S. (author), van den Broek, S.P. (author), Hollander, R.J.M. (author), Hanckmann, P. (author), Kruithof, M.C. (author), van Leeuwen, C.J. (author), Korzec, S. (author), Bouma, H. (author), Schutte, K. (author)The contribution of this paper is a search engine that recognizes and describes 48 human actions in realistic videos. The core algorithms have been published recently, from the early visual processing (Bouma, 2012), discriminative recognition (Burghouts, 2012) and textual description (Hankmann, 2012) of 48 human actions. We summarize the key...conference paper 2013
- document
-
Alić, L. (author), Veenland, J.F. (author)PURPOSE: Tumour heterogeneity could be a valuable biomarker for differentiation, grading, response monitoring and outcome prediction. Many quantification techniques have been described, however in clinical practice these methods are scarcely used. The aim of this study is to evaluate the performance of the described methods and to identify the...conference paper 2013
- document
-
Burghouts, G.J. (author), Schutte, K. (author)We investigate how human action recognition can be improved by considering spatio-temporal layout of actions. From literature, we adopt a pipeline consisting of STIP features, a random forest to quantize the features into histograms, and an SVM classifier. Our goal is to detect 48 human actions, ranging from simple actions such as walk to...article 2013
Searched for: subject%3A%22II%255C%2B%255C-%255C%2BIntelligent%255C%2BImaging%22
(61 - 80 of 194)