A review of threat profiling techniques for use in concealed weapon detection systems

Kudzaishe Mhou, Dustin van der Haar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we discuss different types of threat assessment approaches for use in surveillance systems. We look at each method separately from others with the aim of showing the evolvement of the technology. A detailed description and an in-depth look at current research are conducted in order to give a more concise review. Doing an in-depth individual analysis of each method allows for a better comparison approach with other methods. We also look at the advantages and disadvantages of each approach and compare it with other methods in order to get a better sense of the performance of the technique as compared to others. A discussion on a benchmark comparison of these methods is also given and a few recommendations are presented along with our proposed approach.

Original languageEnglish
Title of host publicationInformation Science and Applications 2018 - ICISA 2018
EditorsKuinam J. Kim, Kuinam J. Kim, Nakhoon Baek
PublisherSpringer Verlag
Pages201-209
Number of pages9
ISBN (Print)9789811310553
DOIs
Publication statusPublished - 2019
EventInternational Conference on Information Science and Applications, ICISA 2018 - Kowloon, Hong Kong
Duration: 25 Jun 201827 Jun 2018

Publication series

NameLecture Notes in Electrical Engineering
Volume514
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

ConferenceInternational Conference on Information Science and Applications, ICISA 2018
Country/TerritoryHong Kong
CityKowloon
Period25/06/1827/06/18

Keywords

  • Close circuit television (CCTV)
  • Concealed weapon detection (CWD)

ASJC Scopus subject areas

  • Industrial and Manufacturing Engineering

Fingerprint

Dive into the research topics of 'A review of threat profiling techniques for use in concealed weapon detection systems'. Together they form a unique fingerprint.

Cite this