2016 IEEE 1st International Conference on Power Electronics, Intelligent Control and Energy Systems (ICPEICES) 2016
DOI: 10.1109/icpeices.2016.7853652
|View full text |Cite
|
Sign up to set email alerts
|

Wadoro: An autonomous mobile robot for surveillance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…Furthermore, the identification with biometric identities will be carried out by the infrastructure alone without active identity proofing by the user. One step already in this direction is identity proofing from facial recognition without active user involvement, for example monitoring of users in unconstrained environments [29], autonomous recognition from face in surveillance systems [30], and other approaches of passive facial recognition as described in [31].…”
Section: Identificationmentioning
confidence: 99%
“…Furthermore, the identification with biometric identities will be carried out by the infrastructure alone without active identity proofing by the user. One step already in this direction is identity proofing from facial recognition without active user involvement, for example monitoring of users in unconstrained environments [29], autonomous recognition from face in surveillance systems [30], and other approaches of passive facial recognition as described in [31].…”
Section: Identificationmentioning
confidence: 99%
“…The sum of the pixels in light rectangular boxes is subtracted from sum of the pixels in dark rectangular boxes representing a single value for each feature [1]. Features are computed quickly using integral imaging since only four pixels are used at once to define the image.…”
Section: Figure 3: Feature Extraction In Haar Cascade Algorithmmentioning
confidence: 99%
“…So, the efficiency of the classifier is eminent. The classifier discards the background region and hence helps in identifying regions with a better probability of finding the desired target [1].…”
Section: Figure 3: Feature Extraction In Haar Cascade Algorithmmentioning
confidence: 99%
“…Security is an important concern in infrastructure systems. For decades, autonomous mobile robots have been utilized as surveillance [1][2] and crime-fighting agents for barrier assessments [3][4], intruder detection [5] [6], building virtual terrains or maps [7] [8], neutralizing explosives [9] [10], and recognizing abnormal human behaviors [11] [12]. Such robots have been designed with the ability to counter threats, limit risks to personnel, and reduce manpower requirements in hazardous environments [13][14] [3].…”
Section: Introductionmentioning
confidence: 99%