2014 2nd International Conference on Devices, Circuits and Systems (ICDCS) 2014
DOI: 10.1109/icdcsyst.2014.6926141
|View full text |Cite
|
Sign up to set email alerts
|

Exposure fusion for concealed weapon detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The transform being orthogonal and non-sinusoidal in nature effectively allows the decomposition of a signal into sets of rectangular and orthogonal signals called Walsh functions. These Walsh functions are made up of only two values, +1 and -1 [17]. The transformation is not weighted and provides only real values.…”
Section: Hadamard Transformmentioning
confidence: 99%
“…The transform being orthogonal and non-sinusoidal in nature effectively allows the decomposition of a signal into sets of rectangular and orthogonal signals called Walsh functions. These Walsh functions are made up of only two values, +1 and -1 [17]. The transformation is not weighted and provides only real values.…”
Section: Hadamard Transformmentioning
confidence: 99%
“…Weapon detection is mainly categorized into traditional & [4,5,6,7,8], image processing techniques [9,10,11,12,13], Machine Learning (ML) algorithms [14,15,16] and deep learning algorithms [17,18,19,20,21,22,23]. Traditional weapon detection techniques mainly focus on thermal/infrared and X-Ray techniques for detection are expensive and excess usage leads to radiation which cause deadly diseases like cancer and malignant tumours [24].…”
Section: Introductionmentioning
confidence: 99%
“…It is a common method of image registration. In the document, the overlap points of two correction images are extracted by matching the SFIT features with scale and direction invariance [11,12]. The feature operators usually used to extract overlapping corner points include Harris [13,14], Canny [15,16], and Moravec [17,18].…”
Section: Introductionmentioning
confidence: 99%