Searched for: subject%3A%22Physics%255C%2B%2526%255C%2BElectronics%255C%2B%253B%255C%2BCommunication%255C%2B%2526%255C%2BInformation%22
(1 - 8 of 8)
document
Burghouts, G.J. (author), van Slingerland, P. (author), ten Hove, R.J.M. (author), den Hollander, R.J.M. (author), Schutte, K. (author)
Theft of cargo from a truck or attacks against the driver are threats hindering the day to day operations of trucking companies. In this work we consider a system, which is using surveillance cameras mounted on the truck to provide an early warning for such evolving threats. Low-level processing involves tracking people and calculating motion...
conference paper 2014
document
de Oliveira Filho, J.A. (author), Papp, Z. (author), Djapic, R. (author), Oostveen, J.C. (author)
The paper describes a model based approach for architecture design of runtime reconfigurable, large-scale, networked signal processing applications. A graph based modeling formalism is introduced to describe all relevant aspects of the design (functional, concurrency, hardware, communication, energy, etc.). The formalism can be used to evaluate...
conference paper 2013
document
van Rest, J.H.C. (author), Grootjen, F.A. (author), Grootjen, M. (author), Wijn, R. (author), Aarts, O.A.J. (author), Roelofs, M.L. (author), Burghouts, G.J. (author), Bouma, H. (author), Alic, L. (author), Kraaij, W. (author)
Surveillance for security requires communication between systems and humans, involves behavioural and multimedia research, and demands an objective benchmarking for the performance of system components.Metadata representation schemes are extremely important to facilitate (system) interoperability and to define ground truth annotations for...
article 2013
document
Netten, B.D. (author), Kester, L.J.H.M. (author), Wedemeijer, H. (author), Passchier, I. (author), Driessen, B.J.F. (author)
This paper presents the rationale and design of the DynaMap, a Local Dynamic Map (LDM) for infrastructure-based cooperative applications on Road side and Central ITS Stations. Most LDMs are developed primarily for use in cooperative vehicles. The requirements for infrastructure-based applications are different from vehicle-based applications...
conference paper 2013
document
de Boer, M.H.T. (author), Schutte, K. (author), Kraaij, W. (author)
The semantic gap is one of the challenges in the GOOSE project. In this paper a Semantic Event Classification (SEC) system is proposed as an initial step in tackling the semantic gap challenge in the GOOSE project. This system uses semantic text analysis, multiple feature detectors using the BoW model, SVM-based concept classifiers, event...
conference paper 2013
document
Bouma, H. (author), Azzopardi, G. (author), Spitters, M.M. (author), de Wit, J.J. (author), Versloot, C.A. (author), van der Zon, R.W.L. (author), Eendebak, P.T. (author), Baan, J. (author), ten Hove, R.J.M. (author), van Eekeren, A.W.M. (author), ter Haar, F.B. (author), den Hollander, R.J.M. (author), van Huis, R.J. (author), de Boer, M.H.T. (author), van Antwerpen, G. (author), Broekhuijsen, B.J. (author), Daniele, L.M. (author), Brandt, P. (author), Schavemaker, J.G.M. (author), Kraaij, W. (author), Schutte, K. (author)
We describe the TNO system and the evaluation results for TRECVID 2013 Multimedia Event Detection (MED) and instance search (INS) tasks. The MED system consists of a bag-of-word (BOW) approach with spatial tiling that uses low-level static and dynamic visual features, an audio feature and high-level concepts. Automatic speech recognition (ASR)...
conference paper 2013
document
Knoop, V. (author), van Lint, J. (author), Vries, J. (author), Kester, L.J.H.M. (author), Passchier, I. (author)
Congestion is a major problem in large, urbanized areas. Intelligent transport solutions aim to reduce this problem. In general, traffic is monitored with the use of sensors, the resulting data are processed, a traffic state is estimated, and a control measure is computed and implemented. The availability and the quality of the data and the...
article 2013
document
Bouma, H. (author), Raaijmakers, S.A. (author), Halma, A.H.R. (author), Wedemeijer, H. (author)
Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many websites. In this paper, we...
conference paper 2012
Searched for: subject%3A%22Physics%255C%2B%2526%255C%2BElectronics%255C%2B%253B%255C%2BCommunication%255C%2B%2526%255C%2BInformation%22
(1 - 8 of 8)