2020
DOI: 10.1109/access.2020.2991225
|View full text |Cite
|
Sign up to set email alerts
|

Design and Performance Evaluation of an AI-Based W-Band Suspicious Object Detection System for Moving Persons in the IoT Paradigm

Abstract: The threat of terrorism has spread all over the world, and the situation has become grave. Suspicious object detection in the Internet of Things (IoT) is an effective way to respond to global terrorist attacks. The traditional solution requires performing security checks one by one at the entrance of each gate, resulting in bottlenecks and crowding. In the IoT paradigm, it is necessary to be able to perform suspicious object detection on moving people. Artificial intelligence (AI) and millimeter-wave imaging a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 30 publications
(28 reference statements)
0
7
0
Order By: Relevance
“…The incorporation of edge AI technology has emerged as a game changer for real-time video analytics in surveillance systems. It is now simpler and more effective to process video data in a decentralized network for use in a surveillance system due to the increased use of AI technologies and IoT devices (Yu et al, 2020).…”
Section: IImentioning
confidence: 99%
See 1 more Smart Citation
“…The incorporation of edge AI technology has emerged as a game changer for real-time video analytics in surveillance systems. It is now simpler and more effective to process video data in a decentralized network for use in a surveillance system due to the increased use of AI technologies and IoT devices (Yu et al, 2020).…”
Section: IImentioning
confidence: 99%
“…Surveillance systems can benefit greatly from utilizing the computational power of edge devices and integrating AI models right inside of them. [2];One of these is a significant decrease in latency, which guarantees that crucial insights are generated in real-time and enables quicker response times to security incidents. [8]; Furthermore, Edge AI solutions significantly lessen the need for cloud resources, reducing bandwidth snarls and providing more affordable and scalable security systems.…”
Section: Introductionmentioning
confidence: 99%
“…The perception layer is mainly responsible for perception and data collection. It senses and monitors surrounding things and events through sensor collection nodes and obtains corresponding data [36][37][38]. It lies at the bottom of the three-tier system architecture of the Internet of Things.…”
Section: A Iot System Architecturementioning
confidence: 99%
“…Various image processing techniques have been demonstrated on mmW images such as compressive sensing [13], [14], super-resolution [15], [16], denoising and image enhancement [17], [18]. Classification techniques on such images have been previously explored [19], [20], although the literature on these techniques is still scarce. The majority of classification research focuses on generating images with systems using traditional imaging techniques, relying on a raster scanning principle, i.e.…”
Section: Introductionmentioning
confidence: 99%