Share Email Print


Counterterrorism, Crime Fighting, Forensics, and Surveillance Technologies II
For the purchase of this volume in printed format, please visit

Volume Details

Volume Number: 10802
Date Published: 21 November 2018

Table of Contents
show all abstracts | hide all abstracts
Front Matter: Volume 10802
Author(s): Proceedings of SPIE
Development of energy dispersive x-ray diffraction system for identifying dangerous materials
Author(s): Yifan Chen; Xin Wang; Baozhong Mu; Qinghua Song
Show Abstract
Simulation on x-rays backscatter imaging based on Monte Carlo methods for security inspection
Author(s): Shengling Huang; Xin Wang; Yifan Chen; Jie Xu; Baozhong Mu
Show Abstract
About influence of effect of multi-playing of frequency for broadband THz pulse on detection and identification of substances
Author(s): Vyacheslav A. Trofimov
Show Abstract
Porous silicon microcavities with embedded conjugated polymers for explosives detection
Author(s): Igor L. Martynov; Evgenii V. Osipov; Gennadii E. Kotkovskii; Irina S. Kryukova; Yury A. Kuzischcin; Alexander A. Chistyakov
Show Abstract
Vibrational spectroscopy as a high throughput technique for bacteria identification (Conference Presentation)
Author(s): Angela Flack; Cerys Jenkins ; Matthew J. Baker; Ganesh D. Sockalingum
Show Abstract
Chemical fingerprint identification system: beyond concept and towards applications for field expeditionary military forensic analysis
Author(s): Jason A. Guicheteau; Ashish Tripathi; McKay Allred; Tattianna Olvera; Erik D. Emmons; Phillip G. Wilcox; Kevin Hung; Anthony Koertner; Augustus W. Fountain III
Show Abstract
Waveguide-based machine readable fluorescence security feature for border control and security applications
Author(s): Jincy Johny; Kaushal Bhavsar; Simon Officer; Morgan Adams; Radhakrishna Prabhu
Show Abstract
Parameters of laser ionization of explosives for ion mobility spectrometry
Author(s): Artem E. Akmalov; Alexander A. Chistyakov; Gennadii E. Kotkovskii; Vitalii A. Kostarev
Show Abstract
Using dopants to increase the sensitivity of a laser field asymmetric ion mobility spectrometer for detection of explosives
Author(s): Artem E. Akmalov; Alexander A. Chistyakov; Gennadii E. Kotkovskii; Anna A. Teslya
Show Abstract
Novel active-SfM solution for three-dimensional crime scene documentation
Author(s): Krzysztof Lech; Krzysztof Mularczyk; Jakub Michonski; Kamil Januszkiewicz; Robert Sitnik
Show Abstract
An architecture for sensor modular autonomy for counter-UAS
Author(s): Paul A. Thomas; Gillian F. Marshall; David C. Lugton; David A. Faulkner; Scott Page; Simon Islip; Russell Brandon
Show Abstract
Quantifying the uncertainty of event detection in full motion video
Author(s): Niels M. P. Neumann; Rob Knegjens; Richard den Hollander; Serena Oggero; Gerardus J. Burghouts; Sebastiaan P. van den Broek
Show Abstract
Integrating coalition shared data in a system architecture for high level information management
Author(s): B. Essendorfer; A. Hoffmann; J. Sander; A. Kuwertz
Show Abstract
Application of hyperspectral imaging in hand biometrics
Author(s): Agnieszka Jenerowicz; Piotr Walczykowski; Lukasz Gladysz; Mateusz Gralewicz
Show Abstract
Feasibility analysis of unique ID (UID) generation for personal authentication of valuable documents using dorsal hand vein pattern
Author(s): Sajan Ambadiyil; Reema Jayarajan; V. P. Mahadevan Pillai; Radhakrishna Prabhu
Show Abstract
Comparative study of deep learning and classical methods: smart camera implementation for face authentication
Author(s): Pierre Bonazza; Johel Miteran; Dominique Ginhac; Julien Dubois
Show Abstract
Face recognition based on embedding learning
Author(s): Kaan Karaman; Aykut Koc; A. Aydın Alatan
Show Abstract
Video-based detection of abnormal activities in crowd using a combination of motion-based features
Author(s): Berkan Solmaz
Show Abstract
Autonomous computational intelligence-based behaviour recognition in security and surveillance
Author(s): Louis G. Clift; Jason Lepley; Hani Hagras; Adrian F. Clark
Show Abstract
Robust anomaly detection in urban environments using sensor and information fusion and a camera network
Author(s): Maria Andersson; Fredrik Hemström; Sara Molin
Show Abstract
Flexible human-definable automatic behavior analysis for suspicious activity detection in surveillance cameras to protect critical infrastructures
Author(s): Henri Bouma; Klamer Schutte; Johan-Martijn ten Hove; Gertjan Burghouts; Jan Baan
Show Abstract
Action recognition using the 3D dense microblock difference
Author(s): V. Voronin; M. Pismenskova; A. Zelensky; Yigang Cen; A. Nadykto; K. Egiazarian
Show Abstract
A practical approach for optical skimming and automatic identification of the pressed contents on touchscreen devices (Conference Presentation)
Author(s): Dinh Khoi Le; Volker Krummel; Moritz Blum; Benedikt J. Lueke
Show Abstract
Real-time fusion of visible and thermal infrared images in surveillance applications on SoC hardware
Author(s): Konrad Moren; Thomas Perschke
Show Abstract
Flexible image analysis for law enforcement agencies with deep neural networks to determine: where, who and what
Author(s): Henri Bouma; Bart Joosten; Maarten Kruithof; Maaike de Boer; Alexandru Ginsca; Benjamin Labbe; Quoc T. Vuong
Show Abstract
Removing nuisance in tracklet data
Author(s): Natalia Shepeleva; Thomas Hoch; Lukas Fischer; Werner Kloihofer; Bernhard Moser
Show Abstract
Detection of deleted frames on videos using a 3D convolutional neural network
Author(s): V. Voronin; R. Sizyakin; A. Zelensky; A. Nadykto; I. Svirin
Show Abstract
Printed explosives standards for the evaluation of stand-off optical systems
Author(s): Frank Schnürer; Christian Ulrich; Stefan Müller; Wenka Schweikert
Show Abstract
Reproducible generation of explosive traces for detection system testing
Author(s): Michael Wittek; Dirk Röseling; Frank Schnürer; Thomas Heintz; Alexander Dresel; Thomas Wegener; Martin Schmäh
Show Abstract
CYBERDOG: monitoring and control system for law enforcement forces K-9 special activities
Author(s): M. Wrona; M. Szołucha; M. Kastek; K. Firmanty; Jarosław Bareła
Show Abstract

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?