首页> 外文会议>iCatse international conference on information science and applications >A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems
【24h】

A Review of Threat Profiling Techniques for Use in Concealed Weapon Detection Systems

机译:隐藏武器检测系统中使用的威胁分析技术综述

获取原文

摘要

In this paper, we discuss different types of threat assessment approaches for use in surveillance systems. We look at each method separately from others with the aim of showing the evolvement of the technology. A detailed description and an in-depth look at current research are conducted in order to give a more concise review. Doing an in-depth individual analysis of each method allows for a better comparison approach with other methods. We also look at the advantages and disadvantages of each approach and compare it with other methods in order to get a better sense of the performance of the technique as compared to others. A discussion on a benchmark comparison of these methods is also given and a few recommendations are presented along with our proposed approach.
机译:在本文中,我们讨论了在监控系统中使用的不同类型的威胁评估方法。我们将每个方法与他人分开看,目的是显示技术的演变。进行详细描述和深入研究当前研究,以便提供更简洁的审查。对每个方法进行深入的单独分析允许更好地与其他方法进行比较方法。我们还研究了各种方法的优缺点,并将其与其他方法进行比较,以便与他人相比获得更好的技术性能。还给出了关于这些方法的基准比较的讨论,并提出了一些建议的建议方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号