A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems.
Kudzaishe MhouDustin van der HaarPublished in: ICISA (2018)
Keyphrases
- neural network
- false alarms
- decision making
- case study
- database
- distributed systems
- object detection
- detection scheme
- computing systems
- automatic detection
- life cycle
- detection algorithm
- building blocks
- computer systems
- intelligent systems
- software engineering
- digital images
- management system
- information systems
- artificial intelligence
- information retrieval
- databases