Wireless Sensor Networks for Detection of IED Emplacement
暂无分享,去创建一个
[1] Michael J. Brooks,et al. Detecting suspicious background changes in video surveillance of busy scenes , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.
[2] Yangsheng Xu,et al. Modeling of human walking trajectories for surveillance , 2003, Proceedings 2003 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2003) (Cat. No.03CH37453).
[3] Bahram Honary,et al. Location Determination and Tracking Using Radio Beacons , 2005 .
[4] Susan Hackwood,et al. Signal and image processing for crime control and crime prevention , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[5] Maurizio Filippone,et al. Detecting Suspicious Behavior in Surveillance Images , 2008, 2008 IEEE International Conference on Data Mining Workshops.
[6] T. Jan,et al. Neural network based threat assessment for automated visual surveillance , 2004, 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541).
[7] David W. Pendall. Persistent Surveillance and Its Implications for the Common Operating Picture , 2005 .
[8] Margot Roosevelt. Clearing the Roads , 2005 .
[9] Gaurav S. Sukhatme,et al. Detecting anomalous human interactions using laser range-finders , 2004, 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) (IEEE Cat. No.04CH37566).
[10] Arnold Wiliem,et al. Detecting Uncommon Trajectories , 2008, 2008 Digital Image Computing: Techniques and Applications.
[11] Neil C. Rowe. Detecting Suspicious Behavior from Positional Information , 2005 .
[12] Sergio A. Velastin,et al. Intelligent distributed surveillance systems: a review , 2005 .
[13] Matthew L. Jensen,et al. Deception detection through automatic, unobtrusive analysis of nonverbal behavior , 2005, IEEE Intelligent Systems.
[14] Sachi Desai,et al. Reliable classification of high explosive and chemical/biological artillery using acoustic sensors , 2005, SPIE Defense + Commercial Sensing.
[15] Matthew P O'Hara. Detection of IED Emplacement in Urban Environments , 2008 .
[16] István Z. Kovács,et al. Accuracy and timing aspects of location information based on signal-strength measurements in Bluetooth , 2005, 2005 IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications.
[17] Clay Wilson,et al. Improvised Explosive Devices (IEDs) in Iraq and Afghanistan: Effects and Countermeasures , 2006 .
[18] Yanghee Choi,et al. Distributed and energy-efficient target localization and tracking in wireless sensor networks , 2006, Comput. Commun..