Searched for: subject%3A%22II%255C%2B%255C-%255C%2BIntelligent%255C%2BImaging%22
(101 - 120 of 194)
- document
-
Bouma, H. (author), Burghouts, G.J. (author), de Penning, H.L.H. (author), Hanckmann, P. (author), ten Hove, R.J.M. (author), Korzec, S. (author), Kruithof, M.C. (author), Landsmeer, S. (author), van Leeuwen, C.J. (author), van den Broek, S.P. (author), Halma, A.H.R. (author), den Hollander, R.J.M. (author), Schutte, K. (author)Ground surveillance is normally performed by human assets, since it requires visual intelligence. However, especially for military operations, this can be dangerous and is very resource intensive. Therefore, unmanned autonomous visual-intelligence systems are desired. In this paper, we present an improved system that can recognize actions of a...conference paper 2013
- document
-
Real-time tracking and fast retrieval of persons in multiple surveillance cameras of a shopping mallBouma, H. (author), Baan, J. (author), Landsmeer, S. (author), Kruszynski, K.J. (author), van Antwerpen, G. (author), Dijk, J. (author)The capability to track individuals in CCTV cameras is important for e.g. surveillance applications at large areas such as train stations, airports and shopping centers. However, it is laborious to track and trace people over multiple cameras. In this paper, we present a system for real-time tracking and fast interactive retrieval of persons in...conference paper 2013
- document
-
Burghouts, G.J. (author), Eendebak, P.T. (author), Bouma, H. (author), ten Hove, R.J.M. (author)Action recognition is a hard problem due to the many degrees of freedom of the human body and the movement of its limbs. This is especially hard when only one camera viewpoint is available and when actions involve subtle movements. For instance, when looked from the side, checking one’s watch may look very similar to crossing one’s arms. In this...conference paper 2013
- document
-
Schutte, K. (author), Bomhof, F.W. (author), Burghouts, G.J. (author), van Diggelen, J. (author), Hiemstra, P. (author), van 't Hof, J. (author), Kraaij, W. (author), Pasman, K.H.W. (author), Smith, A.J.E. (author), Versloot, C.A. (author), de Wit, J.J. (author)More and more sensors are getting Internet connected. Examples are cameras on cell phones, CCTV cameras for traffic control as well as dedicated security and defense sensor systems. Due to the steadily increasing data volume, human exploitation of all this sensor data is impossible for effective mission execution. Smart access to all sensor data...conference paper 2013
- document
-
Schwering, P.B.W. (author), Kemp, R.A.W. (author), Schutte, K. (author)Recognition and identification ranges are limited to the quality of the images. Both the received contrast and the spatial resolution determine if objects are recognizable. Several aspects affect the image quality. First of all the sensor itself. The image quality depends on the size of the infrared detector array and the sensitivity. Second,...conference paper 2013
- document
-
Eendebak, P.T. (author), van Eekeren, A.W.M. (author), den Hollander, R.J.M. (author)We present a robust method for landing zone selection using obstacle detection to be used for UAV emergency landings. The method is simple enough to allow real-time implementation on a UAV system. The method is able to detect objects in the presence of camera movement and motion parallax. Using the detected obstacles we select a safe landing...conference paper 2013
- document
-
van Eekeren, A.W.M. (author), Schutte, K. (author), Dijk, J. (author), Schwering, P.B.W. (author)A well-known phenomena that diminishes the recognition range in infrared imagery is atmospheric turbulence. In literature many methods are described that try to compensate for the distortions caused by atmospheric turbulence. Most of these methods use a global processing approach in which they assume a global shift and a uniform blurring in all...conference paper 2013
- document
-
van Leeuwen, C. (author), Halma, A. (author), Schutte, K. (author)Detection of anomalies (outliers or abnormal instances) is an important element in a range of applications such as fault, fraud, suspicious behavior detection and knowledge discovery. In this article we propose a new method for anomaly detection and performed tested its ability to detect anomalous behavior in videos from DARPA's Mind's Eye...conference paper 2013
- document
-
Bouma, H. (author), Baan, J. (author), Borsboom, S. (author), van Zon, K. (author), Luo, X. (author), Loke, B. (author), Stoeller, B. (author), van Kuilenburg, H. (author), Dijk, J. (author)To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most relevant and deviant patterns. We present a software...conference paper 2013
- document
-
Bouma. H., (author), Dekker, R.J. (author), Schoemaker, R.M. (author), Mohamoud, A.A. (author)This paper aims at the segmentation of seafaring vessels in optical satellite images, which allows an accurate length estimation. In maritime situation awareness, vessel length is an important parameter to classify a vessel. The proposed segmentation system consists of robust foreground-background separation, wake detection and ship-wake...conference paper 2013
- document
-
Burghouts, G.J. (author), Eendebak, P.T. (author), Bouma, H. (author), ten Hove, R.J.M. (author)This paper describes the TNO action recognition system that was used to generate the results for our submission to the competition track of the THUMOS ’13 challenge at ICCV ’13. This system deploys only the STIP features that were provided on the website of the challenge. A bag-of-features model is extended with three noveltiesconference paper 2013
- document
-
Burghouts, G.J. (author), Schutte, K. (author)Many human actions are correlated, because of compound and/or sequential actions, and similarity. Indeed, human actions are highly correlated in human annotations of 48 actions in the 4,774 videos from visint.org. We exploit such correlations to improve the detection of these 48 human actions, ranging from simple actions such as walk to complex...conference paper 2012
- document
-
van Nunen, E. (author), Kwakkernaat, M.R.J.A.E. (author), Ploeg, J. (author), Netten, B.D. (author)In May 2011, the Grand Cooperative Driving Challenge (GCDC) was held, providing the possibility for teams to develop and compare their cooperative driving solutions in a competitive setting. The challenge was organized to further accelerate developments in the area of cooperative driving. Nine international teams challenged each other to handle...article 2012
- document
-
Lefter, I. (author), Rothkrantz, L. (author), Somhorst, M. (author)At this moment many surveillance systems are installed in public domains to control the safety of people and properties. They are constantly watched by human operators who are easily overloaded. To support the human operators, a surveillance system model is designed that detects suspicious behaviour in a non-public area. Its task is to alert the...conference paper 2012
- document
-
Schols, R.M. (author), Alić, L. (author), Beets, G.L. (author), Breukink, S.O. (author), Wieringa, F.P. (author), Stassen, L.P.S. (author)BACKGROUND: During colorectal surgical dissections, recognizing essential anatomy is crucial to prevent iatrogenic injury. This study builds forth upon previously identified new inherent anatomical spectral contrasts in fresh human colonic samples. AIM: Assessment of optical spectrometry for discriminating critical tissues (colon, adipose tissue...conference paper 2012
- document
-
Sanromà, G. (author), Burghouts, G.J. (author), Schutte, K. (author)Human behavior understanding from visual data has applications such as threat recognition. A lot of approaches are restricted to limited time actions, which we call short-term actions. Long-term behaviors are sequences of short-term actions that are more extended in time. Our hypothesis is that they usually present some structure that can be...conference paper 2012
- document
-
Lefter, I. (author), Burghouts, G.J. (author), Rothkrantz, L.J.M. (author)We propose a new method for audio-visual sensor fusion and apply it to automatic aggression detection. While a variety of definitions of aggression exist, in this paper we see it as any kind of behavior that has a disturbing effect on others. We have collected multi- and unimodal assessments by humans, who have given aggression scores on a 3...conference paper 2012
- document
- Schwering, P.B.W. (author), van den Broek, S.P. (author), Liem, K.D. (author), Schleijpen, H.M.A. (author) conference paper 2012
- document
-
Schols, R.M. (author), Bouvy, N.D. (author), Wieringa, F.P. (author), Alić, L. (author), Stassen, L.P.S. (author)INTRODUCTION: In thyroid and parathyroid surgery iatrogenic injury of the parathyroid glands or the recurrent laryngeal nerve (RLN) is a possible complication that needs to be prevented. The visible contrast between thyroid and parathyroid tissue is delicate to observe. The aim of this pilot study was to collect in vivo spectral reflectance...conference paper 2012
- document
-
Bol, K. (author), Haeck, J.C. (author), Alić, L. (author), Niessen, W.J. (author), de Jong, M. (author), Bernsen, M.D. (author), Veenland, J.F. (author)Three different DCE-MRI quantification methods: model-free-based, compartment-model-based and principal component analysis, are compared by evaluating parameter maps for histological defined volumes of vital and non-vital tumor tissue. To obtain an accurate spatial correspondence between histology and DCE-MRI, a two-step registration process was...conference paper 2012
Searched for: subject%3A%22II%255C%2B%255C-%255C%2BIntelligent%255C%2BImaging%22
(101 - 120 of 194)