Searched for: subject%3A%22Surveillance%22
(1 - 20 of 143)

Pages

document
Bouma, H. (author), Villani, M.L. (author), van Rooijen, A.L. (author), Räsänen, P. (author), Peltola, J. (author), Toivonen, S. (author), de Nicola, A. (author), Guarneri, M. (author), Stifini, C. (author), de Dominicis, L. (author)
Counter terrorism is a huge challenge for public spaces. Therefore, it is essential to support early detection of threats, such as weapons or explosives. An integrated fusion engine was developed for the management of a plurality of sensors to detect threats without disrupting the flow of commuters. The system improves security of soft targets ...
article 2023
document
van Rooijen, A.L. (author), Bouma, H. (author), Baan, J. (author), van Leeuwen, M.C. (author)
Person re-identification (Re-ID) can be used to find the owner of lost luggage, to find suspects after a terrorist attack, or to fuse multiple sensors. Common state-of-the-art deep-learning technology performs well on a large public dataset but it does not generalize well to other environments, which makes it less suitable for practical...
conference paper 2022
document
Binsch, O. (author), Oudejans, N. (author), van der Kuil, M.N.A. (author), Landman, A. (author), Smeets, M.M.J. (author), Leers, M.P.G. (author), Smit, A.S. (author)
Virtual reality (VR) simulation tools, in combination with miniaturized sensor and geotechnology, represent an opportunity to prepare high-risk professionals better for uncertain situations. In the current study, we tested whether VR preparation for a police surveillance task leads to increased performance and decreased stress, workload, and a...
article 2022
document
de Dominicis, L. (author), Bouma, H. (author), Toivonen, S. (author), Stifini, C. (author), Villani, M.L. (author), de Nicola, A. (author), van Rooijen, A.L. (author), Baan, J. (author), Peltola, J. (author), Lämsä, A. (author), Räsänen, P. (author)
conference paper 2021
document
Dijk, J. (author), van den Broek, S.P. (author), den Hollander, R.J.M. (author), Baan, J. (author), ten Hove, J.M. (author), Oorbeek, D. (author)
conference paper 2021
document
Huizinga, W. (author), van Lier, M. (author), Kruithof, M. (author), Dijk, J. (author)
conference paper 2021
document
van Rooijen, A.L. (author), Bouma, H. (author), Pruim, R.H.R. (author), Baan, J. (author), Uijens, W.R. (author), van Mil, J.D. (author)
Person re-identification (Re-ID) is a valuable technique because it can assist in finding suspects after a terrorist attack. However, the machine learning algorithms for person Re-ID are usually trained on large datasets with images of many different people in a public space. This could pose privacy concerns for the people involved. One way to...
conference paper 2020
document
Müller, W. (author), Reinert, F. (author), Rieter-Barrell, Y. (author), Ditzel, M. (author), Rojer, J. (author), Barbero, F. (author), Martínez, J.M.N. (author), Svensson, K. (author), Arecchi, A. (author)
In multinational defence operations, either EU or NATO driven, the exchange of surveillance and reconnaissance data and information is an essential aspect to provide to the commander the needed situational awareness. This improvement of situational awareness, especially in a maritime environment, may be achieved amongst others by extending the...
conference paper 2020
document
Cox, P.B. (author), van Rossum, W.L. (author)
Recent advances in digital beam forming for phased arrays in combination with digital signal processing should enable the development of multibeam radar in a bistatic configuration. In the bistatic setting, the pulse travelling outward from the transmitter should be followed or “chased” by the receiver. During transmission, depending on the...
conference paper 2020
document
den Hollander, R.J.M. (author), Adhikari, A. (author), Tolios, I. (author), van Bekkum, M. (author), Bal, A. (author), Hendriks, S. (author), Kruithof, M.C. (author), Gross, D. (author), Jansen, N. (author), Perez, G. (author), Buurman, K. (author), Raaijmakers, S.A. (author)
conference paper 2020
document
Dalibert, L. (author), Timan, T (author)
Cet article construit la biographie d’un objet technologique récent et non stabilisé : un type de caméra portée par la police aux Pays-Bas appelé Zepcam. En examinant les différentes inscriptions et traductions auxquelles sa conception et son introduction ont donné lieu, il retrace dans quelle mesure les finalités, les actions et finalement la...
article 2020
document
van den Broek, A.C. (author), van der Velde, J. (author), van den Baar, R.M.E.M. (author), Nijsten, L. (author), van Heijster, R. (author)
We present a study of border surveillance systems for automatic threat estimation. The surveillance systems should allow border control operators to be triggered in time so that adequate responses are possible. Examples of threats are smuggling, possibly by using small vessels, cars or drones, and threats caused by unwanted persons (e.g....
conference paper 2019
document
Müller, W. (author), Reinert, F. (author), Haferkorn, D. (author), Essendorfer, B. (author), Arecchi, A. (author), Svensson, K. (author), Rieter-Barrell, Y. (author), Ditzel, M. (author)
In multinational defence operations, either EU or NATO driven, the exchange of surveillance and reconnaissance data and information is an essential aspect to be able to act promptly. Coordinated processes and agreements are the basis, distribution architectures, services, interfaces and formats the prerequisite. In the NATO context, the Joint...
conference paper 2019
document
Beckers, A.L.D. (author), Sijs, J. (author), van Diggelen, J. (author), van Dijk, Roelof J.E. (author), Bouma, H. (author), Lomme, M. (author), Hommes, R.M. (author), Hillerström, F.H.J. (author), van der Waa, J.S. (author), van Velsen, A.L. (author), Mannucci, T. (author), Voogd, J.M. (author), van Staal, W. (author), Veltman, H.J. (author), Wessels, P.W. (author), Huizing, A. (author)
Intelligent robotic autonomous systems (unmanned aerial/ground/surface/underwater vehicles) are attractive for military application to relieve humans from tedious or dangerous tasks. These systems require awareness of the environment and their own performance to reach a mission goal. This awareness enables them to adapt their operations to...
conference paper 2019
document
Genderen, P.V. (author), Stolp, E. (author), Heebels, G. (author)
This paper addresses the early developments that have resulted in the design and development of active electronically scanned arrays (AESA) in The Netherlands. An early type of radar measuring the position of objects in range, azimuth and elevation in three dimensions (SPS-01/MTTR) is described in some detail. Requirements of the Royal...
conference paper 2019
document
Lloyd, C. (author), Mannucci, T. (author), Bouma, H. (author), Schutte, K. (author), Huizing, A. (author)
In recent years advances in machine learning methods such as deep learning has led to significant improvements in our ability to track people and vehicles, and to recognise specific individuals. Such technology has enormous potential to enhance the performance of image-based security systems. However, wide-spread use of such technology has...
conference paper 2019
document
Škorvánek, I. (author), Koops, B.J (author), Timan, T.2 (author)
This paper analyses the implications of a new form of surveillance—sewage monitoring—for criminal procedural law. Current law has not been written with a view to covering novel, technology-enabled forms of covert data acquisition, posing a challenge of regulatory connection. To what extent are new surveillance methods, such as sewage monitoring...
conference paper 2019
document
Devecchi, B.A. (author), Benoist, K.W. (author), Scheers, L.C.W. (author), Veerman, H.E.T. (author), Binsbergen, S.A. (author), van Eijk, A.M.J. (author)
Infrared imaging of the sea surface is used for many purposes, such as remote sensing of large oceanographic structures, environmental monitoring, surveillance applications and platform signature research. Many of these studies rely on determining the contrast of a target feature with its background and therefore benefit from accurately...
conference paper 2019
document
Bouma, H. (author), Schutte, K. (author), ten Hove, R.J.M. (author), Burghouts, G.J. (author), Baan, J. (author)
Surveillance systems are essential for the protection of military compounds and critical infrastructures. Automatic recognition of suspicious activities can augment human operators to find relevant threats. Common solutions for behavior analysis or action recognition require large amounts of training data. However, suspicious activities and...
conference paper 2018
document
Neumann, N.M.P. (author), Knegjens, R. (author), Den Hollander, R. (author), Oggero, S. (author), Burghouts, G.J. (author), Van Den Broek, S.P. (author)
Algorithms for the detection and tracking of objects can be combined into a system that automatically extracts relevant events from a large amount of video data. Such a system , can be particularly useful in video surveillance applications, notably to support analysts in retrieving information from hours of video while working under strict time...
conference paper 2018
Searched for: subject%3A%22Surveillance%22
(1 - 20 of 143)

Pages