Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








868 Hits in 4.9 sec

Localizing Firearm Carriers by Identifying Human-Object Pairs [article]

Abdul Basit, Muhammad Akhtar Munir, Mohsen Ali, Arif Mahmood
2020 arXiv   pre-print
A network is trained to classify these paired-bounding-boxes into human carrying the identified firearm or not.  ...  Each detected human is paired with each detected firearm, allowing us to create a paired bounding box that contains both object and the human.  ...  This paper introduces first such method which uses human and hand detection followed by firearm detection to identify firearm carriers in crowded scenes.  ... 
arXiv:2005.09329v2 fatcat:ywxykyftdvhzfnql24zbqrqsgu

Detection and Localization of Firearm Carriers in Complex Scenes for Improved Safety Measures [article]

Arif Mahmood, Abdul Basit, M. Akhtar Munir, Mohsen Ali
2023 arXiv   pre-print
To address this problem, we propose a novel approach that leverages human-firearm interaction information, which provides valuable clues for localizing firearm carriers.  ...  Our approach incorporates an attention mechanism that effectively distinguishes humans and firearms from the background by focusing on relevant areas.  ...  The main contributions of our work are as follows: • We propose a novel deep learning architecture that effectively identifies localized firearm carriers by incorporating human-firearm instance pair detection  ... 
arXiv:2309.09236v1 fatcat:t5dumnvafragxolskd2gqacc3a

USE OF SPECIAL KNOWLEDGE OF SPECIALISTS IN THE FIELD OF FORENSIC BALLISTICS IN THE PROCESS OF CONDUCTING INVESTIGATIVE ACTIONS AND EXPERT RESEARCH ON CRIMINAL OFFENCES AGAINST THE FOUNDATIONS OF NATIONAL SECURITY [article]

Oleg Batiuk, Iryna HRUSHKO
2024 Zenodo  
the human or animal body; holes in various objects, detachments; traces of projectile ricochet;unburned dust particles; traces of soot; traces of thermal effects; muzzle prints on an obstacle.  ...  specialists for modelling the trajectory of a bullet flight by d [...]  ...  By examining these ballistic signatures side-by-side in a comparison microscope, firearm examiners can determine whether a pair of bullets or cartridge cases was fired or ejected from the same firearm.  ... 
doi:10.5281/zenodo.10838603 fatcat:ih3uj2n345e57dysw2uxyzq34q

Corpus-Based Thesaurus Construction for Image Retrieval in Specialist Domains [chapter]

Khurshid Ahmad, Mariam Tariq, Bogdan Vrusias, Chris Handy
2003 Lecture Notes in Computer Science  
Corpus linguistic and information extraction methods are used for identifying key terms and conceptual relationships in specialist texts that may be used for query expansion purposes.  ...  An experienced scene of crime officer can identify and describe the 'existence' of various (parts of) human beings and objects in a scene-ofcrime image, particularly the physical attributes and relative  ...  The link between an image and its verbal description is one of the central issues in most disciplines that deal with human vision and by implication human intelligence.  ... 
doi:10.1007/3-540-36618-0_36 fatcat:65y47duhsvewvpepflppw5a5ve

Divide-and-Conquer Attack: Harnessing the Power of LLM to Bypass Safety Filters of Text-to-Image Models [article]

Yimo Deng, Huangxun Chen
2024 arXiv   pre-print
Although our research adopts an attack perspective, our ultimate objective is to identify and address vulnerabilities in TTI models, thereby aligning them more closely with human values and ensuring their  ...  As shown in Figure 8 , more than half of the image generated by DALL•E 3 under adversarial prompts are identified as harmful by GPT-4.  ... 
arXiv:2312.07130v3 fatcat:2tej5zjx6rgrvm3poaiszx5i4e

Why we need to legalise cannabis for medical use in the UK

2018 Pharmaceutical journal (1933)  
The pair claimed they were running a legitimate business selling legal highs.  ...  Wider cross-government objectives We will also support a range of international cross-government objectives that overlap with this Strategy.  ... 
doi:10.1211/pj.2018.20204287 fatcat:ygaw56sybzcftk6smgc435nlqy

Page 88 of None Vol. 10, Issue 247 [page]

1860 None  
of his tusks have been sawn off, he is identified.  ...  Some of these animals obtain considerable local reputation.  ... 

'Sorry, Wrong Number': Why Media Polls on Gun Control are So Often Unreliable

Gary A. Mauser, David B. Kopel
1994 Social Science Research Network  
Without arguing for or against gun controls, this article examines the interviewing and sampling methods used by media polls and finds that some polls claiming impressive majorities in favor of severe  ...  The article is written by Dr. Paul H. Blackman, Research Coordinator with the National Rifle Association Institute for Legislative Action. Dr.  ...  The three women were not knowledgeable about firearms and identified firearms mostly by pictures and how rapidly they fired.  ... 
doi:10.2139/ssrn.1272295 fatcat:qav6manrifh5zdp7s5nznqt7au

Reciprocal Concealed Carry: The Constitutional Issues

William D. Araiza
2019 Social Science Research Network  
such marriages, then an analogous pairing in Boston would not. 93 By contrast, under a CCR law, a holder of a concealed carry permit issued by Vermont may take that permit into New York and insist that  ...  This statement slightly overstates the effect of the CCR bill, as it requires that any such permit-carrier not be otherwise prohibited by federal law from possessing a concealed weapon.  ... 
doi:10.2139/ssrn.3335274 fatcat:rcsu7hcbfjguvkqquda6eb5cnu

International security studios: managerial, technical, legal, environmental, informative and psychological aspects. International collective monograph. Volume II [article]

Iryna V. BASYSTA, Oleg BATIUK, Iryna HRUSHKO, Victor BESCHASTNYY, Ielyzaveta LVOVA, Tetiana BORODENKO, Ihor HANENKO, Kateryna HURKOVSKA, Volodymyr BRATKOVSKYI, Oleksandr KALINICHENKO, Olena SIMONENKO, Marat KOVAL (+19 others)
2024 Zenodo  
By examining these ballistic signatures side-by-side in a comparison microscope, firearm examiners can determine whether a pair of bullets or cartridge cases was fired or ejected from the same firearm.  ...  The great effort associated with the search for a bullet is justified by the importance it has for the possibility of identifying the barrel of a firearm by traces on the bullet.  ... 
doi:10.5281/zenodo.10846685 fatcat:qabuwuntbra6vny43ykgau63be

IAFS 2017 Abstracts

2017 Forensic Science International  
FATAL CARDIAC PERFORATION BY LEAKED PMMA CEMENT AFTER PERCUTANEOUS VERTEBROPLASTY Disclosure: All authors have declared no conflicts of interest.  ...  Firearm (56.7%) was the most common weapon followed by knife (19%). Most cult/gang killings (68.8%) and robbery (74%) were by firearms.  ...  Two domestic accidents involved firearms use by children. All suicides were by hanging.  ... 
doi:10.1016/j.forsciint.2017.07.019 pmid:28743352 fatcat:pdrympkytzbzlkah4vnqismhau

Terahertz Communications and Sensing for 6G and Beyond: A Comprehensive Review [article]

Wei Jiang, Qiuheng Zhou, Jiguang He, Mohammad Asif Habibi, Sergiy Melnyk, Mohammed El Absi, Bin Han, Marco Di Renzo, Hans Dieter Schotten, Fa-Long Luo, Tarek S. El-Bawab, Markku Juntti (+2 others)
2024 arXiv   pre-print
The THz band is one potential enabler to this end due to the large unused frequency bands and the high spatial resolution enabled by the short signal wavelength and large bandwidth.  ...  We overview several related technologies that either are required by or are beneficial for THz systems and networks. The synergistic design of sensing and communications is explored in depth.  ...  However, the LoS THz link is highly susceptible to being blocked by macro objects, such as buildings, furniture, vehicles, and foliage, and micro-objects, e.g., humans, in comparison with the traditional  ... 
arXiv:2307.10321v2 fatcat:4yb72e7mxvbllam53w3hotvwea

Learning to Detect Open Carry and Concealed Object with 77GHz Radar [article]

Xiangyu Gao, Hui Liu, Sumit Roy, Guanbin Xing, Ali Alansari, Youchen Luo
2022 arXiv   pre-print
This capability is achieved by the initial signal processing for localization and generating range-azimuth-elevation image cubes, followed by a deep learning-based prediction network and a multi-shot post-processing  ...  module for detecting objects.  ...  The imaging process is followed by the contrast detection to identify weapon contour or edge using various methods like local binary fitting [10] , two-level expectation maximization [12] , and Gaussian  ... 
arXiv:2111.00551v2 fatcat:vqjtczlyl5d3xp3b254zyks4xa

Predicting Violence Rating Based on Pairwise Comparison

Ying JI, Yu WANG, Jien KATO, Kensaku MORI
2020 IEICE transactions on information and systems  
Identifying violent videos and rating violence extent is of great importance to media filtering and children protection.  ...  Each video is annotated with 6 fine-grained objective attributes, which are considered to be closely related to violence extent.  ...  Chen [10] extracts Motion SIFT (MoSIFT) to detect distinctive local features by combining local appearance and temporal information in surveillance video.  ... 
doi:10.1587/transinf.2020edp7056 fatcat:7jxl753s3jcrjkvt2iuduuixc4

Using speculation to meet evidence: Reply to alba and messner

Gary Kleck
1995 Journal of quantitative criminology  
Objective. This study examined ownership patterns of automatic/semiautomatic firearms in the United States. Methods.  ...  Sixty percent of gun owners reported owning an automatic or semiautomatic firearm.  ...  ACKNOWLEDGMENTS This research was supported in part by the Harvard Injury Control Center, which is funded by the Centers for Disease Control and Prevention.  ... 
doi:10.1007/bf02630572 fatcat:sn33jw3xgvay5bbsgbyzkiyoqm
« Previous Showing results 1 — 15 out of 868 results