Searched for: subject%3A%22Surveillance%22
(41 - 60 of 144)

Pages

document
Bouma, H. (author), Baan, J. (author), Burghouts, G.J. (author), Eendebak, P.T. (author), van Huis, J.R. (author), Dijk, J. (author), van Rest, J.H.C. (author)
Proactive detection of incidents is required to decrease the cost of security incidents. This paper focusses on the automatic early detection of suspicious behavior of pickpockets with track-based features in a crowded shopping mall. Our method consists of several steps: pedestrian tracking, feature computation and pickpocket recognition. This...
conference paper 2014
document
Burghouts, G.J (author), Schutte, K (author), ten Hove, R.J.M. (author), van den Broek, S.P. (author), Baan, J. (author), Rajadell, O. (author), van Huis, J.R. (author), van Rest, J.H.C. (author), Hanckmann, P. (author), Bouma, H. (author), Sanroma, G. (author), Evans, M. (author), Ferryman, J. (author)
Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The theft takes place in very different forms, in the midst of many people who pose no threat. The threats range...
article 2014
document
Marck, J.W. (author), Bouma, H. (author), Baan, J (author), de Oliveira Filho, J. (author), van der Brink, M. (author)
The capability to find individuals using CCTV cameras is important for surveillance applications at large areas such as railway stations, airports and shopping centers. However, it is laborious to track and trace people over multiple cameras post incident. In this paper, we describe the live demonstration of our interactive re-identification...
conference paper 2014
document
Wijn, R. (author), van den Berg, H. (author), Lousberg, M. (author)
This paper examines factors contributing to the effectiveness of camera operators in urban camera surveillance. The use of camera surveillance has taken an enormous flight in the past decades. Despite this increase, its effectiveness is strongly debated. One reason for the disputed effectiveness may be that an understanding of how to use camera...
article 2013
document
van den Bossche, S. (author), Taris, T. (author), Houtman, I. (author), Smulders, P. (author), Kompier, M. (author)
Incidence rates of third party workplace violence in Europe have increased, but little is known about the causes thereof. It has been suggested that the growth of the service sector and the intensification of work could be responsible for the increase. This study aimed to identify trends in the prevalence of physical workplace violence across...
article 2013
document
van Rest, J.H.C. (author), Grootjen, F.A. (author), Grootjen, M. (author), Wijn, R. (author), Aarts, O.A.J. (author), Roelofs, M.L. (author), Burghouts, G.J. (author), Bouma, H. (author), Alic, L. (author), Kraaij, W. (author)
Surveillance for security requires communication between systems and humans, involves behavioural and multimedia research, and demands an objective benchmarking for the performance of system components.Metadata representation schemes are extremely important to facilitate (system) interoperability and to define ground truth annotations for...
article 2013
document
Lefter, I. (author), Rothkrantz, L.J.M. (author), Burghouts, G.J. (author)
Multimodal fusion is a complex topic. For surveillance applications audio-visual fusion is very promising given the complementary nature of the two streams. However, drawing the correct conclusion from multi-sensor data is not straightforward. In previous work we have analysed a database with audio- visual recordings of unwanted behavior in...
article 2013
document
Bouma, H. (author), Vogels, J. (author), Aarts, O.A.J. (author), Kruszynski, K.J. (author), Wijn, R. (author), Burghouts, G.J. (author)
Camera surveillance and recognition of deviant behavior is important for the prevention of criminal incidents. A single observation of subtle deviant behavior of an individual may sometimes be insufficient to merit a follow-up action. Therefore, we propose a method that can combine multiple weak observations to make a strong indication that an...
conference paper 2013
document
Bouma, H. (author), Baan, J. (author), Landsmeer, S. (author), Kruszynski, K.J. (author), van Antwerpen, G. (author), Dijk, J. (author)
The capability to track individuals in CCTV cameras is important for e.g. surveillance applications at large areas such as train stations, airports and shopping centers. However, it is laborious to track and trace people over multiple cameras. In this paper, we present a system for real-time tracking and fast interactive retrieval of persons in...
conference paper 2013
document
Bouma, H. (author), Baan, J. (author), Borsboom, S. (author), van Zon, K. (author), Luo, X. (author), Loke, B. (author), Stoeller, B. (author), van Kuilenburg, H. (author), Dijk, J. (author)
To improve security, the number of surveillance cameras is rapidly increasing. However, the number of human operators remains limited and only a selection of the video streams are observed. Intelligent software services can help to find people quickly, evaluate their behavior and show the most relevant and deviant patterns. We present a software...
conference paper 2013
document
Bouma. H., (author), Dekker, R.J. (author), Schoemaker, R.M. (author), Mohamoud, A.A. (author)
This paper aims at the segmentation of seafaring vessels in optical satellite images, which allows an accurate length estimation. In maritime situation awareness, vessel length is an important parameter to classify a vessel. The proposed segmentation system consists of robust foreground-background separation, wake detection and ship-wake...
conference paper 2013
document
Dijk, J. (author), van Eekeren, A.W.M. (author), Rajadell Rojas, O. (author), Burghouts, G.J. (author), Schutte, K. (author)
Surveillance and reconnaissance tasks are currently often performed using an airborne platform such as a UAV. The airborne platform can carry different sensors. EO/IR cameras can be used to view a certain area from above. To support the task from the sensor analyst, different image processing techniques can be applied on the data, both in real...
conference paper 2013
document
Lefter, I. (author), Rothkrantz, L. (author), Somhorst, M. (author)
At this moment many surveillance systems are installed in public domains to control the safety of people and properties. They are constantly watched by human operators who are easily overloaded. To support the human operators, a surveillance system model is designed that detects suspicious behaviour in a non-public area. Its task is to alert the...
conference paper 2012
document
Hunter, A.J. (author), Fillinger, L. (author), Zampolli, M. (author), Clarijs, M.C. (author)
Surveillance of waterside locations for protection against threats from small fast surface vessels and underwater intruders is a very relevant but challenging problem. For this reason, the Netherlands Organisation for Applied Scientific Research (TNO) is developing SOBEK – a family of passive sonar technologies for waterside surveillance. The...
conference paper 2012
document
Sanromà, G. (author), Burghouts, G.J. (author), Schutte, K. (author)
Human behavior understanding from visual data has applications such as threat recognition. A lot of approaches are restricted to limited time actions, which we call short-term actions. Long-term behaviors are sequences of short-term actions that are more extended in time. Our hypothesis is that they usually present some structure that can be...
conference paper 2012
document
Wijn, R. (author), van der Kleij, R. (author)
TNO draagt met diverse onderzoeken bij aan het ontwikkelen en toepassen van kennis om de effectiviteit van cameratoezicht te vergroten. Dit artikel beschrijft een onderzoek naar de mogelijkheid om mensen met stoornissen in het autistische spectrum in te zetten in cameratoezichtcentrales.
article 2012
document
Lefter, I. (author), Burghouts, G.J. (author), Rothkrantz, L.J.M. (author)
We propose a new method for audio-visual sensor fusion and apply it to automatic aggression detection. While a variety of definitions of aggression exist, in this paper we see it as any kind of behavior that has a disturbing effect on others. We have collected multi- and unimodal assessments by humans, who have given aggression scores on a 3...
conference paper 2012
document
Riediker, M. (author), Schubauer-Berigan, M.K. (author), Brouwer, D.H. (author), Nelissen, I. (author), Koppen, G. (author), Frijns, E. (author), Clark, K.A. (author), Hoeck, J. (author), Liou, S.H. (author), Ho, S.F. (author), Bergamaschi, E. (author), Gibson, R. (author)
Objective: Few epidemiological studies have addressed the health of workers exposed to novel manufactured nanomaterials. The small current workforces will necessitate pooling international cohorts. Method: A roadmap was defined for a globally harmonized framework for the careful choice of materials, exposure characterisation, identification of...
article 2012
document
Bouma, H. (author), Raaijmakers, S.A. (author), Halma, A.H.R. (author), Wedemeijer, H. (author)
Many threats in the real world can be related to activity of persons on the internet. Internet surveillance aims to predict and prevent attacks and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many websites. In this paper, we...
conference paper 2012
document
Hu, N. (author), Bouma, H. (author), Worring, M. (author)
Video cameras are widely used for monitoring public areas, such as train stations, airports and shopping centers. When crowds are dense, automatically tracking individuals becomes a challenging task. We propose a new tracker which employs a particle filter tracking framework, where the state transition model is estimated by an optical-flow...
conference paper 2012
Searched for: subject%3A%22Surveillance%22
(41 - 60 of 144)

Pages