Human Victim Detection
نویسندگان
چکیده
This paper presents an approach to achieve robust victim detection from color video images. The applied approach goes out from the Viola-Jones algorithm for Haar-features based template recognition. This algorithm was adapted to recognize persons lying on the ground in difficult outdoor illumination conditions.
منابع مشابه
Victim detection with Infrared Camera in a "Rescue Robot"
Nowadays the presence of robots is a must in many fields. One of these, is assisting and rescuing injured people in a disaster such as earthquake, flood, ... where the human assistance is difficult due to hard and dangerous conditions and long delays, in such cases robots can be used to detect victims and report their locations to rescuers. One of the most useful tools is IR (InfraRed) Camera. ...
متن کاملIntegro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs
Detecting fake accounts in online social networks (OSNs) protects OSN operators and their users from various malicious activities. Most detection mechanisms attempt to predict and classify user accounts as real (i.e., benign, honest) or fake (i.e., malicious, Sybil) by analyzing user-level activities or graph-level structures. These mechanisms, however, are not robust against adversarial attack...
متن کاملReactions to resistance: the role of contextual factors in sex offending.
Upon encountering victim resistance during the commission of a sexual assault, an offender makes a decision as to how to react to the resistance via the use of varying degrees of coercive or noncoercive tactics. Exhaustive chi-squared automatic interaction detection (CHAID) analyses were performed on a sample of 369 criminal events to detect the significant situational and crime-specific factor...
متن کاملCollaborative Defense Mechanism Using Statistical Detection Method against DDoS Attacks
Distributed Denial-of-Service attack (DDoS) is one of the most outstanding menaces on the Internet. A DDoS attack generally attempts to overwhelm the victim in order to deny their services to legitimate users. A number of approaches have been proposed for defending against DDoS attacks accurately in real time. However, existing schemes have limits in terms of detection accuracy and delay if the...
متن کاملDDoS Attack Detection Using Cooperative Overlay Networks and Gossip Protocol
DDoS attacks have major impact on the affected networks viz. packet transmission delays, network outage, website sabotage, financial losses, legitimate-user blockage and reputation damage. Existing DDoS detection techniques are either implemented at the victim node (but the damage is already done) or at many intermediate routers which run DDoS detection algorithms, that adds additional delay an...
متن کامل