Searched for: subject%3A%22Surveillance%22
(61 - 80 of 144)

Pages

document
Bouma, H. (author), Rajadell Rojas, O. (author), Worm, D.T.H. (author), Versloot, C.A. (author), Wedemeijer, H. (author)
Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time consuming to monitor many open sources. In this...
conference paper 2012
document
van den Broek, S.P. (author), Schwering, P.B.W. (author), Liem, K.D. (author), Schleijpen, H.M.A. (author)
In maritime operational scenarios, such as smuggling, piracy, or terrorist threats, it is not only relevant who or what an observed object is, but also where it is now and in the past in relation to other (geographical) objects. In situation and impact assessment, this information is used to determine whether an object is a threat. Single...
conference paper 2012
document
Bouma, H. (author), Borsboom, A.S. (author), den Hollander, R.J.M. (author), Landsmeer, S.H. (author), Worring, M. (author)
The capability to track individuals in CCTV cameras is important for surveillance and forensics alike. However, it is laborious to do over multiple cameras. Therefore, an automated system is desirable. In literature several methods have been proposed, but their robustness against varying viewpoints and illumination is limited. Hence performance...
conference paper 2012
document
van den Broek, A.C. (author), den Breejen, E. (author), Dekker, R.J. (author), Smith, A.J.E. (author)
In this paper we have analyzed military and security requirements for surveillance. Using a data-set of wide swath SAR imagery for the English channel and high resolution SAR data for the Zeebrugge and Rotterdam harbour we have discussed if these requirements can be met by using this kind of data. The requirement to detect anomalous behaviour at...
conference paper 2012
document
Hofmann, K.M. (author), Gavrila, D.M. (author)
We introduce a framework for unconstrained 3D human upper body pose estimation from multiple camera views in complex environment. Its main novelty lies in the integration of three components: single-frame pose recovery, temporal integration and model texture adaptation. Single-frame pose recovery consists of a hypothesis generation stage, in...
article 2012
document
Rothkrantz, L. (author), Lefter, I. (author)
The paper describes a surveillance system of cameras installed at lamppost of a military area. The surveillance system has been designed to detect unwanted visitors or suspicious behaviors. The area is composed of streets, building blocks and surrounded by gates and water. The video recordings are monitored by operators at regular times. Next...
conference paper 2011
document
Dijk, J. (author), Rieter-Barrell, Y. (author), van Rest, J.H.C. (author), Bouma, H. (author)
In our society, unwanted situations occur daily. Examples of these unwanted situations are everyday crime, escalating events and demonstrations, aggression in cities, public transport, acts of violence, the destruction of windows, cables, and trespassing into critical infrastructures and private properties. To ensure public safety and security,...
article 2011
document
Burghouts, G.J. (author), Schutte, K. (author)
Amsterdam, The Netherlands, 27th of May 2010. The national security authorities call out to secure the area around the central train station. 150 Security officers, both military and police, are instructed to guard the area and to pick out those people with hostile intent. Although the officers were very effective in assessing people’s...
conference paper 2011
document
Belfiori, F. (author), Maas, A.P.M. (author), Hoogeboom, P. (author), van Rossum, W.L. (author)
The work presented in this paper was aimed at the design of a compact radar device to be used for private area surveillance applications. The radar is connected to a pan tilt zoom camera and it provides the camera system with high accuracy position information (bearing and range) of moving targets; in this way the camera can be steered to the...
conference paper 2011
document
Streefkerk, J.W. (author)
The main argument in this thesis is that mobile technology has to adapt information presentation to the mobile use context and Human Factors (attention, workload and individual characteristics). This will provide better support for work in these domains than non-adaptive systems. We expect such context-aware mobile support (CAMS) systems to...
doctoral thesis 2011
document
Hofmann, K.M. (author)
The recovery of 3D human pose is an important problem in computer vision with many potential applications in human computer interfaces, motion analysis (e.g. sports, medical) and surveillance. 3D human pose also provides informative, viewinvariant features for a subsequent activity recognition step. Most if not all previous work on 3D human pose...
doctoral thesis 2011
document
Dekker, R.J. (author), van den Broek, A.C. (author)
Within the GMES initiative, several projects focus on supporting the European Union Common Foreign and Security Policy (CFSP) and the Common Security and Defence Policy (CSDP). Two of them are GMOSS (2004-2008) and, addressed in this paper, G-MOSAIC (2009-2011). GMOSS was the predecessor of G-MOSAIC. An important issue in GMOSS was to connect...
bookPart 2011
document
Dekker, R.J. (author), van der Broek, A.C. (author)
Within the GMES initiative, several projects focus on supporting the European Union Common Foreign and Security Policy (CFSP) and the Common Security and Defence Policy (CSDP). Two of them are GMOSS (2004-2008) and, addressed in this paper, GMOSAIC (2009-2011). GMOSS was the predecessor of G-MOSAIC. An important issue in GMOSS was to connect the...
conference paper 2011
document
Streefkerk, J.W. (author), van Esch-Bussemakers, M. (author), Neerincx, M. (author)
Motivation - Automated task allocation systems are prone to errors (e.g. incorrect advice) due to context events. Empirical assessment is needed of how the costs of incorrect task allocation advice relate to the benefits. Research approach - Claims regarding benefits and costs are tested in a team surveillance task in a synthetic task...
conference paper 2010
document
Schilder, C.M.C. (author), Rypkema, J.A. (author), TNO Defensie en Veiligheid (author)
De toenemende behoefte aan cameratoezicht leidt tot een groei van het aantal camera’s, waardoor operators in toezichtcentrales worden geconfronteerd met steeds meer camerabeelden. Er komt een moment dat de hoeveelheid camerabeelden te groot wordt en operators de beelden onvoldoende kunnen uitkijken. De werkbelasting wordt te hoog en incidenten...
article 2010
document
Deiana, D. (author), Kossen, A.S. (author), van Rossum, W.L. (author), TNO Defensie en Veiligheid (author)
Surveillance in an urban environment under all atmospheric conditions and situations can be performed by means of radars. The multipath created by buildings and moving targets can be exploited, for example in order to increase SNR. In this paper we present the initial results of the measurements of a moving target in a roadblock scenario in non...
conference paper 2010
document
van Rossum, W.L. (author), de Wit, J.J.M. (author), Otten, M.P.G. (author), Huizing, A.G. (author), TNO Defensie en Veiligheid (author)
This paper presents three valuable applications of scalable multifunction RF (SMRF) systems. These systems allow radar, ESM and communication functionality using a single front-end architecture. With the use of a novel system design tool, concepts for SMRF architectures for airborne, groundbased and naval application have been obtained based on...
conference paper 2010
document
TNO Defensie en Veiligheid (author), Schoemaker, R.M. (author), Sandbrink, R.D.J. (author), van Voorthuijsen, G.P. (author)
A priori information on suspicious behaviour is extremely valuable for countering threats involving improvised explosive devices (IEDs). Suspicious activities along routes during expeditionary operations can be monitored by unattended networks using simple sensing nodes that can gather data for continuous monitoring of daily vehicle activity....
conference paper 2010
document
TNO Defensie en Veiligheid (author), Dijk, J. (author), Schutte, K. (author), Toet, A. (author), Hogervorst, M.A. (author)
We present the design and first field trial results of the INVIS integrated night vision surveillance and observation system, in particular for the image enhancement techniques implemented. The INVIS is an all-day-andnight all-weather navigation and surveillance tool, combining three-band cameras. We present a processing pipeline for this system...
conference paper 2010
document
Streefkerk, J.W. (author), van Esch-Bussemakers, M. (author), Neerincx, M. (author), TNO Defensie en Veiligheid (author)
To optimally distribute tasks within police teams during mobile surveillance, a context-aware task allocation system is designed and evaluated with end-users. This system selects and notifies appropriate team members of current incidents, based on context information (officer availability, officer proximity to the incident and incident priority)...
conference paper 2009
Searched for: subject%3A%22Surveillance%22
(61 - 80 of 144)

Pages