{"id":3964,"date":"2020-04-07T16:16:33","date_gmt":"2020-04-07T15:16:33","guid":{"rendered":"https:\/\/mecatron.rma.ac.be\/?page_id=3964"},"modified":"2020-04-16T22:27:23","modified_gmt":"2020-04-16T21:27:23","slug":"safeshore","status":"publish","type":"page","link":"https:\/\/mecatron.rma.ac.be\/index.php\/projects\/safeshore\/","title":{"rendered":"SafeShore"},"content":{"rendered":"<p><section class=\"kc-elm kc-css-116322 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-556988 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-12068\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-630866 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-513487 kc_col-sm-3 kc_column kc_col-sm-3\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-170103 kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/mecatron.rma.ac.be\/wp-content\/uploads\/2020\/04\/SafeShore_Logo.png\" class=\"\" alt=\"\" \/>    <\/div>\n<\/div><\/div><div class=\"kc-elm kc-css-640897 kc_col-sm-6 kc_column kc_col-sm-6\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-359309 kc_text_block\"><\/p>\n<p>Recent years have seen the dramatic rise of the use of Unmanned Aerial Systems or drones by governments, consumers and \u2013 unfortunately \u2013 also by terrorists and criminals. Indeed, whereas there are a great number of very good applications for the use of drones, these new technological tools provide also a threat in the hands of people with bad intentions. Examples are the use of unmanned aerial robotic vehicles or drones for operations such as illegal observation and surveillance and drugs trafficking, or even as attack vector. Currently, it is very difficult for law enforcement and border management authorities to deal with these new\u00a0 threats, as the Radar Cross Section of these drones is too small to be detected by regular radar systems.<\/p>\n<p>Several novel detection modalities are being researched to tackle this problem: RADAR, LIDAR, Acoustic Sensing, Radio Sensing, Thermal Sensing and Visual sensing. However, no individual sensing modality currently attains satisfying levels of accuracy. The European Commission noted this capability gap and decided to fund the H2020-SafeShore project, which has as a main goal to cover existing gaps in coastal border surveillance, increasing internal security by preventing cross-border crime such as trafficking in human beings and the smuggling of drugs.<\/p>\n<p>The SafeShore core solution for detecting small targets that are flying at low altitude is to use a 3D LIDAR that scans the sky and creates above the protected area a virtual dome shield. 3D LIDAR will be integrated with passive acoustic sensors, passive radio detection and video analytics. With this 3D LIDAR technology, the SafeShore system is able to cover a vast area of the coastal border using mobile platforms. Each mobile platform covers its area with a dome-shaped virtual detection shield with a radius of about 250-300m. Overlapping multiple platforms creates a continuous detection shield along the shoreline.<\/p>\n<p>\n<\/div><\/div><\/div><div class=\"kc-elm kc-css-1079 kc_col-sm-3 kc_column kc_col-sm-3\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-352406 kc-icon-wrapper\">\n\t\t<i class=\"fa-euro-sign\"><\/i>\n\t<\/div>\n<div class=\"kc-elm kc-css-170037 kc_text_block\"><\/p>\n<p style=\"text-align: center;\">European Commission<\/p>\n<p style=\"text-align: center;\">H2020<\/p>\n<p style=\"text-align: center;\"><span style=\"font-style: inherit;\">2016 &#8211; 2018<\/span><\/p>\n<p style=\"text-align: center;\">5.1 M\u20ac<\/p>\n<p>\n<\/div><div class=\"kc-elm kc-css-175329 kc_shortcode kc_single_image\">\n\n        <img decoding=\"async\" src=\"https:\/\/mecatron.rma.ac.be\/wp-content\/uploads\/2020\/04\/download.png\" class=\"\" alt=\"\" \/>    <\/div>\n<div class=\"kc-elm kc-css-127500\" style=\"height: 20px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-661760 kc-icon-wrapper\">\n\t\t<i class=\"ion-android-people\"><\/i>\n\t<\/div>\n<div class=\"kc-elm kc-css-435080 kc_text_block\"><\/p>\n<p style=\"text-align: center;\"><a style=\"font-style: inherit;\" href=\"https:\/\/mecatron.rma.ac.be\/index.php\/people\/daniela-doroftei\/\">Daniela Doroftei<\/a><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/mecatron.rma.ac.be\/index.php\/people\/geert-de-cubber\/\">Geert De Cubber<\/a><\/p>\n<p>\n<\/div><div class=\"kc-elm kc-css-337473\" style=\"height: 20px; clear: both; width:100%;\"><\/div><div class=\"kc-elm kc-css-606754 kc-icon-wrapper\">\n\t\t<i class=\"ion-ios-world-outline\"><\/i>\n\t<\/div>\n<div class=\"kc-elm kc-css-580516 kc_text_block\"><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/safeshore.eu\/\">http:\/\/safeshore.eu\/<\/a><\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-266733 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-100856 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-362825\" style=\"height: 20px; clear: both; width:100%;\"><\/div>\n<div class=\"kc-elm kc-css-841318 kc-title-wrap \">\n\n\t<h4 class=\"kc_title\">Project Video Gallery<\/h4>\n<\/div>\n<\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-598993 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-465807 kc_col-sm-6 kc_column kc_col-sm-6\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-600233 kc-title-wrap \">\n\n\t<h5 class=\"kc_title\">North Sea Demonstration<\/h5>\n<\/div>\n\n\t<div class=\"kc-elm kc-css-912785 kc_shortcode kc_video_play kc_video_wrapper\" data-video=\"https:\/\/www.youtube.com\/watch?v=AKKWkqwBnP4&amp;\" data-width=\"600\" data-height=\"338.98305084746\" data-fullwidth=\"yes\" data-autoplay=\"\" data-loop=\"yes\" data-control=\"yes\" data-related=\"\" data-showinfo=\"\" data-kc-video-mute=\"\">\n\t\t\t<\/div>\n\n<\/div><\/div><div class=\"kc-elm kc-css-88221 kc_col-sm-6 kc_column kc_col-sm-6\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-154318 kc-title-wrap \">\n\n\t<h5 class=\"kc_title\">Black Sea Demonstration<\/h5>\n<\/div>\n<div class=\"kc-elm kc-css-988551 kc_text_block\"><\/p>\n<div>\n    <video id=\"plyr69db02739042b\" controls class=\"easy-video-player\"><source src=\"https:\/\/vid2.stirileprotv.ro\/2018\/11\/27\/62004444-2.mp4\" type=\"video\/mp4\" \/><\/video>\n    <\/div>\n<p>    <script>\n        const evplayerplyr69db02739042b = new Plyr(document.getElementById('plyr69db02739042b'));\n        evplayerplyr69db02739042b.ratio = '16:9';\n        evplayerplyr69db02739042b.iconUrl = 'https:\/\/mecatron.rma.ac.be\/wp-content\/plugins\/easy-video-player\/lib\/plyr.svg';\n        evplayerplyr69db02739042b.blankVideo = 'https:\/\/mecatron.rma.ac.be\/wp-content\/plugins\/easy-video-player\/lib\/blank.mp4';  \n    <\/script><\/p>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-435736 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-507477 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-78980\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-668704 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-395168 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\">\n<div class=\"kc-elm kc-css-623985 kc-title-wrap \">\n\n\t<h4 class=\"kc_title\">Project Publications<\/h4>\n<\/div>\n<div class=\"kc-elm kc-css-490969 kc_text_block\"><\/p>\n<p><h3 class=\"papercite\">2019<\/h3>\n<ul class=\"papercite_bibliography\">\n<li>    G. De Cubber, &#8220;Opportunities and threats posed by new technologies,\" in <span style=\"font-style: italic\">SciFi-IT<\/span>, Ghent, Belgium,  2019.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_9\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_9\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"http:\/\/mecatron.rma.ac.be\/pub\/2019\/Sci-Fi-It-2019-DeCubber (2).pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/https:\/\/doi.org\/10.5281\/zenodo.2628758' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_9_block\">\n<p>The technological evolution is introducing in a fast pace new technologies in our everyday lives. As always, these new technologies can be applied for good causes and thereby give us the opportunity to do many interesting new things. Think for example about drones transporting blood samples between hospitals. However, like always, new technologies can also be applied for bad causes. Think for example about the same drones, but this time transporting bomb parcels instead of blood. In this paper, we focus on a number of novel technologies and discuss how security actors are currently doing their best to maximize the good use of these tools while minimizing the bad use. We will focus on research actions taken by Belgian Royal Military Academy in the domains of: &#8211; Augmented reality, and showcase how this technology can be used to improve surveillance operations. &#8211; Unmanned Aerial Systems (Drones), and showcase how the potential security threats posed by these systems can be mitigated by novel drone detection systems. &#8211; Unmanned Maritime Systems, and showcase how this technology can be used to increase the safety at sea. &#8211; Unmanned Ground Systems, and more specifically the autonomous cars, showcasing how to prevent potential cyber-attacks on these future transportation tools.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_9_block\">\n<pre><code class=\"tex bibtex\">@InProceedings{de2019opportunities,\nauthor = {De Cubber, Geert},\nbooktitle = {SciFi-IT},\ntitle = {Opportunities and threats posed by new technologies},\nyear = {2019},\nabstract = {The technological evolution is introducing in a fast pace new technologies in our everyday lives. As always, these new technologies can be applied for good causes and thereby give us the opportunity to do many interesting new things. Think for example about drones transporting blood samples between hospitals. However, like always, new technologies can also be applied for bad causes. Think for example about the same drones, but this time transporting bomb parcels instead of blood.\nIn this paper, we focus on a number of novel technologies and discuss how security actors are currently\ndoing their best to maximize the good use of these tools while minimizing the bad use. We will focus on research actions taken by Belgian Royal Military Academy in the domains of:\n- Augmented reality, and showcase how this technology can be used to improve surveillance operations.\n- Unmanned Aerial Systems (Drones), and showcase how the potential security threats posed by these systems can be mitigated by novel drone detection systems.\n- Unmanned Maritime Systems, and showcase how this technology can be used to increase the safety at sea.\n- Unmanned Ground Systems, and more specifically the autonomous cars, showcasing how to prevent potential cyber-attacks on these future transportation tools.},\ndoi = {https:\/\/doi.org\/10.5281\/zenodo.2628758},\naddress = {Ghent, Belgium},\nproject = {MarSur,SafeShore},\nurl = {http:\/\/mecatron.rma.ac.be\/pub\/2019\/Sci-Fi-It-2019-DeCubber (2).pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    G. De Cubber, &#8220;Explosive drones: How to deal with this new threat?,\" in <span style=\"font-style: italic\">International workshop on Measurement, Prevention, Protection and Management of CBRN Risks (RISE)<\/span>, Les Bon Villers, Belgium,  2019.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_10\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_10\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"http:\/\/mecatron.rma.ac.be\/pub\/2019\/Explosive drones - How to deal with this new threat.pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.5281\/ZENODO.2628752' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_10_block\">\n<p>As the commercial and recreative use of small unmanned aerial vehicles or drones is booming, so are the military and criminals starting to use these systems more and more. Due to improvements in flight stability, autonomy and payload capacity it becomes possible to equip these drones with explosive charges, making them threat agents where traditional response mechanisms have few answers against. In this paper, we will discuss this new type of threat in detail, making the difference between the loitering munition, as used by regular armies and the traditional drones equipped with explosive charges, used in guerrilla warfare and by criminals. We will then discuss what research actions are currently being undertaken to provide answers to each of these threats and what countermeasures that are currently already available and which ones will be available in the near future.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_10_block\">\n<pre><code class=\"tex bibtex\">@InProceedings{de2019explosive,\nauthor = {De Cubber, Geert},\nbooktitle = {International workshop on Measurement, Prevention, Protection and Management of CBRN Risks (RISE)},\ntitle = {Explosive drones: How to deal with this new threat?},\nyear = {2019},\nnumber = {9},\naddress = {Les Bon Villers, Belgium},\nabstract = {As the commercial and recreative use of small unmanned aerial vehicles or drones is booming, so are the military and criminals starting to use these systems more and more. Due to improvements in flight stability, autonomy and payload capacity it becomes possible to equip these drones with explosive charges, making them threat agents where traditional response mechanisms have few answers against. In this paper, we will discuss this new type of threat in detail, making the difference between the loitering munition, as used by regular armies and the traditional drones equipped with explosive charges, used in guerrilla warfare and by criminals. We will then discuss what research actions are currently being undertaken to provide answers to each of these threats and what countermeasures that are currently already available and which ones will be available in the near future.},\ndoi = {10.5281\/ZENODO.2628752},\nproject = {SafeShore},\nurl = {http:\/\/mecatron.rma.ac.be\/pub\/2019\/Explosive drones - How to deal with this new threat.pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    I. Lahouli, Z. Chtourou, M. A. Ben Ayed, R. Haelterman, G. De Cubber, and R. Attia, &#8220;Pedestrian Detection and Trajectory Estimation in the Compressed Domain Using Thermal Images,\" in <span style=\"font-style: italic\">Computer Vision, Imaging and Computer Graphics Theory and Applications<\/span>, Springer, 2019, p. 212\u2013227.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_11\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_11\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"https:\/\/www.springerprofessional.de\/en\/pedestrian-detection-and-trajectory-estimation-in-the-compressed\/16976092\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.1007\/978-3-030-26756-8_10' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_11_block\">\n<p>Since a few decades, the Unmanned Aerial Vehicles (UAVs) are considered precious tools for different military applications such as the automatic surveillance in outdoor environments. Nevertheless, the onboard implementation of image and video processing techniques poses many challenges like the high computational cost and the high bandwidth requirements, especially on low-performance processing platforms like small or medium UAVs. A fast and efficient framework for pedestrian detection and trajectory estimation for outdoor surveillance using thermal images is presented in this paper. First, the detection process is based on a conjunction between contrast enhancement techniques and saliency maps as a hotspot detector, on Discrete Chebychev Moments (DCM) as a global image content descriptor and on a linear Support Vector Machine (SVM) as a classifier. Second, raw H.264\/AVC compressed video streams with limited computational overhead are exploited to estimate the trajectories of the detected pedestrians. In order to simulate suspicious events, six different scenarios were carried out and filmed using a thermal camera. The obtained results show the effectiveness and the low computational requirements of the proposed framework which make it suitable for real-time applications and onboard implementation.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_11_block\">\n<pre><code class=\"tex bibtex\">@InCollection{lahouli2019pedestrian,\nauthor = {Lahouli, Ichraf and Chtourou, Zied and Ben Ayed, Mohamed Ali and Haelterman, Rob and De Cubber, Geert and Attia, Rabah},\nbooktitle = {Computer Vision, Imaging and Computer Graphics Theory and Applications},\npublisher = {Springer},\ntitle = {Pedestrian Detection and Trajectory Estimation in the Compressed Domain Using Thermal Images},\nyear = {2019},\npages = {212--227},\nabstract = {Since a few decades, the Unmanned Aerial Vehicles (UAVs) are considered precious tools for different military applications such as the automatic surveillance in outdoor environments. Nevertheless, the onboard implementation of image and video processing techniques poses many challenges like the high computational cost and the high bandwidth requirements, especially on low-performance processing platforms like small or medium UAVs. A fast and efficient framework for pedestrian detection and trajectory estimation for outdoor surveillance using thermal images is presented in this paper. First, the detection process is based on a conjunction between contrast enhancement techniques and saliency maps as a hotspot detector, on Discrete Chebychev Moments (DCM) as a global image content descriptor and on a linear Support Vector Machine (SVM) as a classifier. Second, raw H.264\/AVC compressed video streams with limited computational overhead are exploited to estimate the trajectories of the detected pedestrians. In order to simulate suspicious events, six different scenarios were carried out and filmed using a thermal camera. The obtained results show the effectiveness and the low computational requirements of the proposed framework which make it suitable for real-time applications and onboard implementation.},\ndoi = {10.1007\/978-3-030-26756-8_10},\nproject = {SafeShore},\nurl = {https:\/\/www.springerprofessional.de\/en\/pedestrian-detection-and-trajectory-estimation-in-the-compressed\/16976092},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    I. Lahouli, R. Haelterman, Z. Chtourou, G. De Cubber, and R. Attia, &#8220;Pedestrian Tracking in the Compressed Domain Using Thermal Images,\" in <span style=\"font-style: italic\">Representations, Analysis and Recognition of Shape and Motion from Imaging Data, Communications in Computer and Information Science<\/span>, Springer International Publishing, 2019, vol. 842, p. 35\u201344.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_12\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_12\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"https:\/\/app.dimensions.ai\/details\/publication\/pub.1113953804\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.1007\/978-3-030-19816-9_3' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_12_block\">\n<p>The video surveillance of sensitive facilities or borders poses many challenges like the high bandwidth requirements and the high computational cost. In this paper, we propose a framework for detecting and tracking pedestrians in the compressed domain using thermal images. Firstly, the detection process uses a conjunction between saliency maps and contrast enhancement techniques followed by a global image content descriptor based on Discrete Chebychev Moments (DCM) and a linear Support Vector Machine (SVM) as a classifier. Secondly, the tracking process exploits raw H.264 compressed video streams with limited computational overhead. In addition to two, well-known, public datasets, we have generated our own dataset by carrying six different scenarios of suspicious events using a thermal camera. The obtained results show the effectiveness and the low computational requirements of the proposed framework which make it suitable for real-time applications and onboard implementation.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_12_block\">\n<pre><code class=\"tex bibtex\">@InCollection{lahouli2019pedestriantracking,\nauthor = {Lahouli, Ichraf and Haelterman, Rob and Chtourou, Zied and De Cubber, Geert and Attia, Rabah},\nbooktitle = {Representations, Analysis and Recognition of Shape and Motion from Imaging Data, Communications in Computer and Information Science},\npublisher = {Springer International Publishing},\ntitle = {Pedestrian Tracking in the Compressed Domain Using Thermal Images},\nyear = {2019},\npages = {35--44},\nvolume = {842},\nabstract = {The video surveillance of sensitive facilities or borders poses many challenges like the high bandwidth requirements and the high computational cost. In this paper, we propose a framework for detecting and tracking pedestrians in the compressed domain using thermal images. Firstly, the detection process uses a conjunction between saliency maps and contrast enhancement techniques followed by a global image content descriptor based on Discrete Chebychev Moments (DCM) and a linear Support Vector Machine (SVM) as a classifier. Secondly, the tracking process exploits raw H.264 compressed video streams with limited computational overhead. In addition to two, well-known, public datasets, we have generated our own dataset by carrying six different scenarios of suspicious events using a thermal camera. The obtained results show the effectiveness and the low computational requirements of the proposed framework which make it suitable for real-time applications and onboard implementation.},\ndoi = {10.1007\/978-3-030-19816-9_3},\nproject = {SafeShore},\nurl = {https:\/\/app.dimensions.ai\/details\/publication\/pub.1113953804},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    D. Doroftei and G. De Cubber, &#8220;Using a qualitative and quantitative validation methodology to evaluate a drone detection system,\" <span style=\"font-style: italic\">ACTA IMEKO<\/span>, vol. 8, iss. 4, p. 20\u201327, 2019.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_13\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_13\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"https:\/\/acta.imeko.org\/index.php\/acta-imeko\/article\/view\/IMEKO-ACTA-08%20%282019%29-04-05\/pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.21014\/acta_imeko.v8i4.682' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_13_block\">\n<p>Now that the use of drones is becoming more common, the need to regulate the access to airspace for these systems is becoming more pressing. A necessary tool in order to do this is a means of detecting drones. Numerous parties have started the development of such drone detection systems. A big problem with these systems is that the evaluation of the performance of drone detection systems is a difficult operation that requires the careful consideration of all technical and non-technical aspects of the system under test. Indeed, weather conditions and small variations in the appearance of the targets can have a huge difference on the performance of the systems. In order to provide a fair evaluation, it is therefore paramount that a validation procedure that finds a compromise between the requirements of end users (who want tests to be performed in operational conditions) and platform developers (who want statistically relevant tests) is followed. Therefore, we propose in this article a qualitative and quantitative validation methodology for drone detection systems. The proposed validation methodology seeks to find this compromise between operationally relevant benchmarking (by providing qualitative benchmarking under varying environmental conditions) and statistically relevant evaluation (by providing quantitative score sheets under strictly described conditions).<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_13_block\">\n<pre><code class=\"tex bibtex\">@Article{doroftei2019using,\nauthor = {Doroftei, Daniela and De Cubber, Geert},\njournal = {{ACTA} {IMEKO}},\ntitle = {Using a qualitative and quantitative validation methodology to evaluate a drone detection system},\nyear = {2019},\nmonth = dec,\nnumber = {4},\npages = {20--27},\nvolume = {8},\nabstract = {Now that the use of drones is becoming more common, the need to regulate the access to airspace for these systems is becoming more pressing. A necessary tool in order to do this is a means of detecting drones. Numerous parties have started the development of such drone detection systems. A big problem with these systems is that the evaluation of the performance of drone detection systems is a difficult operation that requires the careful consideration of all technical and non-technical aspects of the system under test. Indeed, weather conditions and small variations in the appearance of the targets can have a huge difference on the performance of the systems. In order to provide a fair evaluation, it is therefore paramount that a validation procedure that finds a compromise between the requirements of end users (who want tests to be performed in operational conditions) and platform developers (who want statistically relevant tests) is followed. Therefore, we propose in this article a qualitative and quantitative validation methodology for drone detection systems. The proposed validation methodology seeks to find this compromise between operationally relevant benchmarking (by providing qualitative benchmarking under varying environmental conditions) and statistically relevant evaluation (by providing quantitative score sheets under strictly described conditions).},\ndoi = {10.21014\/acta_imeko.v8i4.682},\npdf = {https:\/\/acta.imeko.org\/index.php\/acta-imeko\/article\/view\/IMEKO-ACTA-08%20%282019%29-04-05\/pdf},\nproject = {SafeShore},\npublisher = {{IMEKO} International Measurement Confederation},\nurl = {https:\/\/acta.imeko.org\/index.php\/acta-imeko\/article\/view\/IMEKO-ACTA-08%20%282019%29-04-05\/pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    A. Coluccia, A. Fascista, A. Schumann, L. Sommer, M. Ghenescu, T. Piatrik, G. De Cubber, M. Nalamati, A. Kapoor, M. Saqib, N. Sharma, M. Blumenstein, V. Magoulianitis, D. Ataloglou, A. Dimou, D. Zarpalas, P. Daras, C. Craye, S. Ardjoune, D. De la Iglesia, M. M\u00e1ndez, R. Dosil, and I. Gonz\u00e1lez, &#8220;Drone-vs-Bird Detection Challenge at IEEE AVSS2019,\" in <span style=\"font-style: italic\">2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)<\/span>,  2019, pp. 1-7.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_14\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_14\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"https:\/\/ieeexplore.ieee.org\/abstract\/document\/8909876\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.1109\/AVSS.2019.8909876' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_14_block\">\n<p>This paper presents the second edition of the \u201cdrone-vs-bird\u201d detection challenge, launched within the activities of the 16-th IEEE International Conference on Advanced Video and Signal-based Surveillance (AVSS). The challenge&#8217;s goal is to detect one or more drones appearing at some point in video sequences where birds may be also present, together with motion in background or foreground. Submitted algorithms should raise an alarm and provide a position estimate only when a drone is present, while not issuing alarms on birds, nor being confused by the rest of the scene. This paper reports on the challenge results on the 2019 dataset, which extends the first edition dataset provided by the SafeShore project with additional footage under different conditions.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_14_block\">\n<pre><code class=\"tex bibtex\">@INPROCEEDINGS{8909876,\nauthor={A. {Coluccia} and A. {Fascista} and A. {Schumann} and L. {Sommer} and M. {Ghenescu} and T. {Piatrik} and G. {De Cubber} and M. {Nalamati} and A. {Kapoor} and M. {Saqib} and N. {Sharma} and M. {Blumenstein} and V. {Magoulianitis} and D. {Ataloglou} and A. {Dimou} and D. {Zarpalas} and P. {Daras} and C. {Craye} and S. {Ardjoune} and D. {De la Iglesia} and M. {M\u00e1ndez} and R. {Dosil} and I. {Gonz\u00e1lez}},\nbooktitle={2019 16th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)},\ntitle={Drone-vs-Bird Detection Challenge at IEEE AVSS2019},\nyear={2019},\nvolume={},\nnumber={},\npages={1-7},\nproject = {SafeShore,MarSur},\ndoi = {10.1109\/AVSS.2019.8909876},\nabstract = {This paper presents the second edition of the \u201cdrone-vs-bird\u201d detection challenge, launched within the activities of the 16-th IEEE International Conference on Advanced Video and Signal-based Surveillance (AVSS). The challenge's goal is to detect one or more drones appearing at some point in video sequences where birds may be also present, together with motion in background or foreground. Submitted algorithms should raise an alarm and provide a position estimate only when a drone is present, while not issuing alarms on birds, nor being confused by the rest of the scene. This paper reports on the challenge results on the 2019 dataset, which extends the first edition dataset provided by the SafeShore project with additional footage under different conditions.},\nurl = {https:\/\/ieeexplore.ieee.org\/abstract\/document\/8909876},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h3 class=\"papercite\">2018<\/h3>\n<ul class=\"papercite_bibliography\">\n<li>    I. Lahouli, R. Haelterman, Z. Chtourou, G. De Cubber, and R. Attia, &#8220;Pedestrian Detection and Tracking in Thermal Images from Aerial MPEG videos,\" in <span style=\"font-style: italic\">International Conference on Computer Vision Theory and Applications<\/span>, Funchal, Portugal,  2018, p. 487\u2013495.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_4\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_4\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"https:\/\/www.scitepress.org\/Papers\/2018\/67237\/67237.pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.5220\/0006723704870495' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_4_block\">\n<p>Video surveillance for security and intelligence purposes has been a precious tool as long as the technology has been available but is computationally heavy. In this paper, we present a fast and efficient framework for pedestrian detection and tracking using thermal images. It is designed for automatic surveillance applications in an outdoor environment like preventing border intrusions or attacks on sensitive facilities using image and video processing techniques implemented on-board Unmanned Aerial Vehicles (UAV)s. The proposed framework exploits raw H.264 compressed video streams with limited computational overhead. Our work is driven by the fact that Motion Vectors (MV) are an integral part of any video compression technique, by day and night capabilities of thermal sensors and the distinguished thermal signature of humans. Six different scenarios were carried out and filmed using a thermal camera in order to simulate suspicious events. The obtained results show the effectiveness of the proposed framework and its low computational requirements which make it adequate for on-board processing and real-time applications.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_4_block\">\n<pre><code class=\"tex bibtex\">@InProceedings{lahouli2018pedestrian,\nauthor = {Lahouli, Ichraf and Haelterman, Robby and Chtourou, Zied and De Cubber, Geert and Attia, Rabah},\nbooktitle = {International Conference on Computer Vision Theory and Applications},\ntitle = {Pedestrian Detection and Tracking in Thermal Images from Aerial {MPEG} videos},\nyear = {2018},\norganization = {DOI 10.5220\/0006723704870495},\npages = {487--495},\npublisher = {{SCITEPRESS} - Science and Technology Publications},\nvolume = {1},\nabstract = {Video surveillance for security and intelligence purposes has been a precious tool as long as the technology has been available but is computationally heavy. In this paper, we present a fast and efficient framework for pedestrian detection and tracking using thermal images. It is designed for automatic surveillance applications in an outdoor environment like preventing border intrusions or attacks on sensitive facilities using image and video processing techniques implemented on-board Unmanned Aerial Vehicles (UAV)s. The proposed framework exploits raw H.264 compressed video streams with limited computational overhead. Our work is driven by the fact that Motion Vectors (MV) are an integral part of any video compression technique, by day and night capabilities of thermal sensors and the distinguished thermal signature of humans. Six different scenarios were carried out and filmed using a thermal camera in order to simulate suspicious events. The obtained results show the effectiveness of the proposed framework and its low computational requirements which make it adequate for on-board processing and real-time applications.},\ndoi = {10.5220\/0006723704870495},\nproject = {SafeShore},\naddress = {Funchal, Portugal},\nurl = {https:\/\/www.scitepress.org\/Papers\/2018\/67237\/67237.pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    I. Lahouli, R. Haelterman, J. Degroote, M. Shimoni, G. De Cubber, and R. Attia, &#8220;Accelerating existing non-blind image deblurring techniques through a strap-on limited-memory switched Broyden method,\" <span style=\"font-style: italic\">IEICE TRANSACTIONS on Information and Systems<\/span>, vol. 1, iss. 1, p. 8, 2018.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_5\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_5\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/5\/E101.D_2017MVP0022\/_pdf\/-char\/en\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.1587\/transinf.2017mvp0022' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_5_block\">\n<p>Video surveillance from airborne platforms can suffer from many sources of blur, like vibration, low-end optics, uneven lighting conditions, etc. Many different algorithms have been developed in the past that aim to recover the deblurred image but often incur substantial CPU-time, which is not always available on-board. This paper shows how a strap-on quasi-Newton method can accelerate the convergence of existing iterative methods with little extra overhead while keeping the performance of the original algorithm, thus paving the way for (near) real-time applications using on-board processing.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_5_block\">\n<pre><code class=\"tex bibtex\">@Article{lahouli2018accelerating,\nauthor = {Lahouli, Ichraf and Haelterman, Robby and Degroote, Joris and Shimoni, Michal and De Cubber, Geert and Attia, Rabah},\njournal = {IEICE TRANSACTIONS on Information and Systems},\ntitle = {Accelerating existing non-blind image deblurring techniques through a strap-on limited-memory switched {Broyden} method},\nyear = {2018},\nnumber = {1},\npages = {8},\nvolume = {1},\nabstract = {Video surveillance from airborne platforms can suffer from many sources of blur, like vibration, low-end optics, uneven lighting conditions, etc. Many different algorithms have been developed in the past that aim to recover the deblurred image but often incur substantial CPU-time, which is not always available on-board. This paper shows how a strap-on quasi-Newton method can accelerate the convergence of existing iterative methods with little extra overhead while keeping the performance of the original algorithm, thus paving the way for (near) real-time applications using on-board processing.},\ndoi = {10.1587\/transinf.2017mvp0022},\nfile = {:lahouli2018accelerating - Accelerating Existing Non Blind Image Deblurring Techniques through a Strap on Limited Memory Switched Broyden Method.PDF:PDF},\npublisher = {The Institute of Electronics, Information and Communication Engineers},\nproject = {SafeShore},\nurl = {https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E101.D\/5\/E101.D_2017MVP0022\/_pdf\/-char\/en},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    I. Lahouli, E. Karakasis, R. Haelterman, Z. Chtourou, G. De Cubber, A. Gasteratos, and R. Attia, &#8220;Hot spot method for pedestrian detection using saliency maps, discrete Chebyshev moments and support vector machine,\" <span style=\"font-style: italic\">IET Image Processing<\/span>, vol. 12, iss. 7, p. 1284\u20131291, 2018.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_6\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_6\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"https:\/\/ieeexplore.ieee.org\/document\/8387035\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.1049\/iet-ipr.2017.0221' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_6_block\">\n<p>The increasing risks of border intrusions or attacks on sensitive facilities and the growing availability of surveillance cameras lead to extensive research efforts for robust detection of pedestrians using images. However, the surveillance of borders or sensitive facilities poses many challenges including the need to set up many cameras to cover the whole area of interest, the high bandwidth requirements for data streaming and the high-processing requirements. Driven by day and night capabilities of the thermal sensors and the distinguished thermal signature of humans, the authors propose a novel and robust method for the detection of pedestrians using thermal images. The method is composed of three steps: a detection which is based on a saliency map in conjunction with a contrast-enhancement technique, a shape description based on discrete Chebyshev moments and a classification step using a support vector machine classifier. The performance of the method is tested using two different thermal datasets and is compared with the conventional maximally stable extremal regions detector. The obtained results prove the robustness and the superiority of the proposed framework in terms of true and false positives rates and computational costs which make it suitable for low-performance processing platforms and real-time applications.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_6_block\">\n<pre><code class=\"tex bibtex\">@Article{lahouli2018hot,\nauthor = {Lahouli, Ichraf and Karakasis, Evangelos and Haelterman, Robby and Chtourou, Zied and De Cubber, Geert and Gasteratos, Antonios and Attia, Rabah},\njournal = {IET Image Processing},\ntitle = {Hot spot method for pedestrian detection using saliency maps, discrete {Chebyshev} moments and support vector machine},\nyear = {2018},\nnumber = {7},\npages = {1284--1291},\nvolume = {12},\nabstract = {The increasing risks of border intrusions or attacks on sensitive facilities and the growing availability of surveillance cameras lead to extensive research efforts for robust detection of pedestrians using images. However, the surveillance of borders or sensitive facilities poses many challenges including the need to set up many cameras to cover the whole area of interest, the high bandwidth requirements for data streaming and the high-processing requirements. Driven by day and night capabilities of the thermal sensors and the distinguished thermal signature of humans, the authors propose a novel and robust method for the detection of pedestrians using thermal images. The method is composed of three steps: a detection which is based on a saliency map in conjunction with a contrast-enhancement technique, a shape description based on discrete Chebyshev moments and a classification step using a support vector machine classifier. The performance of the method is tested using two different thermal datasets and is compared with the conventional maximally stable extremal regions detector. The obtained results prove the robustness and the superiority of the proposed framework in terms of true and false positives rates and computational costs which make it suitable for low-performance processing platforms and real-time applications.},\ndoi = {10.1049\/iet-ipr.2017.0221},\npublisher = {IET Digital Library},\nproject = {SafeShore},\nurl = {https:\/\/ieeexplore.ieee.org\/document\/8387035},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    I. Lahouli, R. Haelterman, G. De Cubber, Z. Chtourou, and R. Attia, &#8220;A fast and robust approach for human detection in thermal imagery for surveillance using UAVs,\" in <span style=\"font-style: italic\">15th Multi-Conference on Systems, Signals and Devices<\/span>, Hammamet, Tunisia,  2018.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_7\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_7\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"https:\/\/ieeexplore.ieee.org\/document\/8570637\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.1109\/ssd.2018.8570637' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_7_block\">\n<p>The use of Unmanned Aerial Vehicles (UAV)s has spread in various fields such as surveillance and search and rescue purposes. This leads to many research efforts that are focusing on the detection of people using aerial images. However, these platforms have limited resources of power and bandwidth which cause many restrictions and challenges. The use of the thermal sensors offers the possibility to work day and night and the detection of the human bodies because of its distinguished thermal signature. In this paper, we propose a fast and efficient method for the detection of humans in outdoor scenes using thermal images taken from aerial platforms. We start by extracting the bright blobs based on a conjunction between a saliency map and a contrast enhancement techniques. Then, we use the Discrete Chebyshev Moments as a shape descriptor and finally, we classify the blobs into humans and non-humans. The proposed framework is first tested using a well-known thermal database that covers a wide range of lighting and weather conditions and further and then compared to an also well-known blob extractor which is the Maximally Stable Extremal Regions detector (MSER). The results highlight the effectiveness and even the superiority of the proposed method in terms of true positives, false alarms and processing time.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_7_block\">\n<pre><code class=\"tex bibtex\">@InProceedings{lahouli2018fast,\nauthor = {Lahouli, Ichraf and Haelterman, Robby and De Cubber, Geert and Chtourou, Zied and Attia, Rabah},\nbooktitle = {15th Multi-Conference on Systems, Signals and Devices},\ntitle = {A fast and robust approach for human detection in thermal imagery for surveillance using {UAVs}},\nyear = {2018},\nvolume = {1},\nabstract = {The use of Unmanned Aerial Vehicles (UAV)s has spread in various fields such as surveillance and search and rescue purposes. This leads to many research efforts that are focusing on the detection of people using aerial images. However, these platforms have limited resources of power and bandwidth which cause many restrictions and challenges. The use of the thermal sensors offers the possibility to work day and night and the detection of the human bodies because of its distinguished thermal signature. In this paper, we propose a fast and efficient method for the detection of humans in outdoor scenes using thermal images taken from aerial platforms. We start by extracting the bright blobs based on a conjunction between a saliency map and a contrast enhancement techniques. Then, we use the Discrete Chebyshev Moments as a shape descriptor and finally, we classify the blobs into humans and non-humans. The proposed framework is first tested using a well-known thermal database that covers a wide range of lighting and weather conditions and further and then compared to an also well-known blob extractor which is the Maximally Stable Extremal Regions detector (MSER). The results highlight the effectiveness and even the superiority of the proposed method in terms of true positives, false alarms and processing time.},\ndoi = {10.1109\/ssd.2018.8570637},\nfile = {:lahouli2018fast - A Fast and Robust Approach for Human Detection in Thermal Imagery for Surveillance Using UAVs.PDF:PDF},\nproject = {SafeShore},\naddress = {Hammamet, Tunisia},\nurl = {https:\/\/ieeexplore.ieee.org\/document\/8570637},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    D. Doroftei and G. De Cubber, &#8220;Qualitative and quantitative validation of drone detection systems,\" in <span style=\"font-style: italic\">International Symposium on Measurement and Control in Robotics ISMCR2018<\/span>, Mons, Belgium,  2018.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_8\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_8\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"http:\/\/mecatron.rma.ac.be\/pub\/2018\/Paper_Daniela.pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.5281\/ZENODO.1462586' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_8_block\">\n<p>As drones are more and more entering our world, so comes the need to regulate the access to airspace for these systems. A necessary tool in order to do this is a means of detecting these drones. Numerous commercial and non-commercial parties have started the development of such drone detection systems. A big problem with these systems is that the evaluation of the performance of drone detection systems is a difficult operation, which requires the careful consideration of all technical and non-technical aspects of the system under test. Indeed, weather conditions and small variations in the appearance of the targets can have a huge difference on the performance of the systems. In order to provide a fair evaluation and an honest comparison between systems, it is therefore paramount that a stringent validation procedure is followed. Moreover, the validation methodology needs to find a compromise between the often contrasting requirements of end users (who want tests to be performed in operational conditions) and platform developers (who want tests to be performed that are statistically relevant). Therefore, we propose in this paper a qualitative and quantitative validation methodology for drone detection systems. The proposed validation methodology seeks to find this compromise between operationally relevant benchmarking (by providing qualitative benchmarking under varying environmental conditions) and statistically relevant evaluation (by providing quantitative score sheets under strictly described conditions).<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_8_block\">\n<pre><code class=\"tex bibtex\">@InProceedings{doroftei2018qualitative,\nauthor = {Doroftei, Daniela and De Cubber, Geert},\nbooktitle = {International Symposium on Measurement and Control in Robotics ISMCR2018},\ntitle = {Qualitative and quantitative validation of drone detection systems},\nyear = {2018},\nvolume = {1},\nabstract = {As drones are more and more entering our world, so comes the need to regulate the access to airspace for these systems. A necessary tool in order to do this is a means of detecting these drones. Numerous commercial and non-commercial parties have started the development of such drone detection systems. A big problem with these systems is that the evaluation of the performance of drone detection systems is a difficult operation, which requires the careful consideration of all technical and non-technical aspects of the system under test. Indeed, weather conditions and small variations in the appearance of the targets can have a huge difference on the performance of the systems. In order to provide a fair evaluation and an honest comparison between systems, it is therefore paramount that a stringent validation procedure is followed. Moreover, the validation methodology needs to find a compromise between the often contrasting requirements of end users (who want tests to be performed in operational conditions) and platform developers (who want tests to be performed that are statistically relevant). Therefore, we propose in this paper a qualitative and quantitative validation methodology for drone detection systems. The proposed validation methodology seeks to find this compromise between operationally relevant benchmarking (by providing qualitative benchmarking under varying environmental conditions) and statistically relevant evaluation (by providing quantitative score sheets under strictly described conditions).},\ndoi = {10.5281\/ZENODO.1462586},\nfile = {:doroftei2018qualitative - Qualitative and Quantitative Validation of Drone Detection Systems.PDF:PDF},\nkeywords = {Unmanned Aerial Vehicles, Drones, Detection systems, Drone detection, Test and evaluation methods},\nproject = {SafeShore},\naddress = {Mons, Belgium},\nurl = {http:\/\/mecatron.rma.ac.be\/pub\/2018\/Paper_Daniela.pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h3 class=\"papercite\">2017<\/h3>\n<ul class=\"papercite_bibliography\">\n<li>    G. De Cubber, R. Shalom, A. Coluccia, O. Borcan, R. Chamr{&#8216;a}d, T. Radulescu, E. Izquierdo, and Z. Gagov, &#8220;The SafeShore system for the detection of threat agents in a maritime border environment,\" in <span style=\"font-style: italic\">IARP Workshop on Risky Interventions and Environmental Surveillance<\/span>, Les Bon Villers, Belgium,  2017.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_0\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_0\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"http:\/\/mecatron.rma.ac.be\/pub\/2017\/SafeShore Abstract RISE-2017_.pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.5281\/zenodo.1115552' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_0_block\">\n<p>This paper discusses the goals of the H2020-SafeShore project, which has as a main goal to cover existing gaps in coastal border surveillance, increasing internal security by preventing cross-border crime such as trafficking in human beings and the smuggling of drugs. It is designed to be integrated with existing systems and create a continuous detection line along the border<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_0_block\">\n<pre><code class=\"tex bibtex\">@InProceedings{de2017safeshore,\nauthor = {De Cubber, Geert and Shalom, Ron and Coluccia, Angelo and Borcan, Octavia and Chamr{'a}d, Richard and Radulescu, Tudor and Izquierdo, Ebroul and Gagov, Zhelyazko},\nbooktitle = {IARP Workshop on Risky Interventions and Environmental Surveillance},\ntitle = {The {SafeShore} system for the detection of threat agents in a maritime border environment},\nyear = {2017},\norganization = {IARP},\nabstract = {This paper discusses the goals of the H2020-SafeShore project, which has as a main goal to cover existing gaps in coastal border\nsurveillance, increasing internal security by preventing cross-border crime such as trafficking in human beings and the smuggling of drugs. It is designed to be integrated with existing systems and create a continuous detection line along the border},\ndoi = {10.5281\/zenodo.1115552},\nkeywords = {SafeShore, Counter UAV, Counter RPAS},\nlanguage = {en},\nproject = {Safeshore},\naddress = {Les Bon Villers, Belgium},\nurl = {http:\/\/mecatron.rma.ac.be\/pub\/2017\/SafeShore Abstract RISE-2017_.pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    M. Buric and G. De Cubber, &#8220;Counter Remotely Piloted Aircraft Systems,\" <span style=\"font-style: italic\">MTA Review<\/span>, vol. 27, iss. 1, 2017.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_1\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_1\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"http:\/\/mecatron.rma.ac.be\/pub\/2017\/Counter Remotely Piloted Aircraft Systems.pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.5281\/zenodo.1115502' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_1_block\">\n<p>An effective Counter Remotely Aircraft System is a major objective of many researchers and industries entities. Their activity is strongly impelled by the operational requirements of the Law Enforcement Authorities and naturally follows both the course of the latest terrorist events and technological developments. The designing process of an effective Counter Remotely Aircraft System needs to benefit from a systemic approach, starting from the legal aspects, and ending with the technical ones. From a technical point of view, the system has to work according to the five \u201ckill chain\u201d model starting with the detection phase, going on with the classification, prioritization, tracking and neutralization of the targets and ending with the forensic phase.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_1_block\">\n<pre><code class=\"tex bibtex\">@Article{buric2017counter,\nauthor = {Buric, Marian and De Cubber, Geert},\njournal = {MTA Review},\ntitle = {Counter Remotely Piloted Aircraft Systems},\nyear = {2017},\nnumber = {1},\nvolume = {27},\nabstract = {An effective Counter Remotely Aircraft System is a major objective of many researchers and industries entities. Their activity is strongly impelled by the operational requirements of the Law Enforcement Authorities and naturally follows both the course of the latest terrorist events and technological developments. The designing process of an effective Counter Remotely Aircraft System needs to benefit from a systemic approach, starting from the legal aspects, and ending with the technical ones. From a technical point of view, the system has to work according to the five \u201ckill chain\u201d model starting with the detection phase, going on with the classification, prioritization, tracking and neutralization of the targets and ending with the forensic phase.},\ndoi = {10.5281\/zenodo.1115502},\nkeywords = {Counter Remotely Piloted Aircraft Systems, drone, drone detection tracking and neutralization, RPAS, SafeShore},\nlanguage = {en},\npublisher = {Military Technical Academy Publishing House},\nproject = {SafeShore},\nurl = {http:\/\/mecatron.rma.ac.be\/pub\/2017\/Counter Remotely Piloted Aircraft Systems.pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    A. Coluccia, M. Ghenescu, T. Piatrik, G. D. Cubber, A. Schumann, L. Sommer, J. Klatte, T. Schuchert, J. Beyerer, M. Farhadi, R. Amandi, C. Aker, S. Kalkan, M. Saqib, N. Sharma, S. Daud, K. Makkah, and M. Blumenstein, &#8220;Drone-vs-Bird detection challenge at IEEE AVSS2017,\" in <span style=\"font-style: italic\">2017 14th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)<\/span>, Lecce, Italy,  2017, p. 1\u20136.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_2\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_2\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"http:\/\/mecatron.rma.ac.be\/pub\/2017\/WOSDETCpaper (1).pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.1109\/avss.2017.8078464' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_2_block\">\n<p>Small drones are a rising threat due to their possible misuse for illegal activities, in particular smuggling and terrorism. The project SafeShore, funded by the European Commission under the Horizon 2020 program, has launched the drone-vs-bird detection challenge to address one of the many technical issues arising in this context. The goal is to detect a drone appearing at some point in a video where birds may be also present: the algorithm should raise an alarm and provide a position estimate only when a drone is present, while not issuing alarms on birds. This paper reports on the challenge proposal, evaluation, and results<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_2_block\">\n<pre><code class=\"tex bibtex\">@InProceedings{coluccia2017drone,\nauthor = {Angelo Coluccia and Marian Ghenescu and Tomas Piatrik and Geert De Cubber and Arne Schumann and Lars Sommer and Johannes Klatte and Tobias Schuchert and Juergen Beyerer and Mohammad Farhadi and Ruhallah Amandi and Cemal Aker and Sinan Kalkan and Muhammad Saqib and Nabin Sharma and Sultan Daud and Khan Makkah and Michael Blumenstein},\nbooktitle = {2017 14th {IEEE} International Conference on Advanced Video and Signal Based Surveillance ({AVSS})},\ntitle = {Drone-vs-Bird detection challenge at {IEEE} {AVSS}2017},\nyear = {2017},\nmonth = aug,\norganization = {IEEE},\npages = {1--6},\npublisher = {{IEEE}},\nabstract = {Small drones are a rising threat due to their possible misuse for illegal activities, in particular smuggling and terrorism. The project SafeShore, funded by the European Commission under the Horizon 2020 program, has launched the drone-vs-bird detection challenge to address one of the many technical issues arising in this context. The goal is to detect a drone appearing at some point in a video where birds may be also present: the algorithm should raise an alarm and provide a position estimate only when a drone is present, while not issuing alarms on birds. This paper reports on the challenge proposal, evaluation, and results},\ndoi = {10.1109\/avss.2017.8078464},\nproject = {SafeShore},\naddress = {Lecce, Italy},\nurl = {http:\/\/mecatron.rma.ac.be\/pub\/2017\/WOSDETCpaper (1).pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<li>    I. Lahouli, R. Haelterman, Z. Chtourou, G. De Cubber, and R. Attia, &#8220;Pedestrian Tracking in the Compressed Domain Using Thermal Images,\" in <span style=\"font-style: italic\">VIIth International Workshop on Representation, analysis and recognition of shape and motion from Image data<\/span>, Savoie, France,  2017.    <br \/>   <a href=\"javascript:void(0)\" id=\"papercite_3\" class=\"papercite_toggle\">[BibTeX]<\/a>      <a href=\"javascript:void(0)\" id=\"papercite_abstract_3\" class=\"papercite_toggle\">[Abstract]<\/a>         <a href=\"http:\/\/mecatron.rma.ac.be\/pub\/2017\/RFMI2017_LAHOULI.pdf\" title='Download PDF' class='papercite_pdf'>[Download PDF]<\/a>         <a href='http:\/\/dx.doi.org\/10.1007\/978-3-030-19816-9_3' class='papercite_doi' title='View on publisher site'>[DOI]<\/a><br \/>\n<blockquote class=\"papercite_bibtex\" id=\"papercite_abstract_3_block\">\n<p>The video surveillance of sensitive facilities or borders poses many challenges like the high bandwidth requirements and the high computational cost. In this paper, we propose a framework for detecting and tracking pedestrians in the compressed domain using thermal images. Firstly, the detection process uses a conjunction between saliency maps and contrast enhancement techniques followed by a global image content descriptor based on Discrete Chebychev Moments (DCM) and a linear Support Vector Machine (SVM) as a classifier. Secondly, the tracking process exploits raw H.264 compressed video streams with limited computational overhead. In addition to two, well-known, public datasets, we have generated our own dataset by carrying six different scenarios of suspicious events using a thermal camera. The obtained results show the effectiveness and the low computational requirements of the proposed framework which make it suitable for real-time applications and on-board implementation.<\/p>\n<\/blockquote>\n<div class=\"papercite_bibtex\" id=\"papercite_3_block\">\n<pre><code class=\"tex bibtex\">@InProceedings{lahouli2017pedestrian,\nauthor = {Lahouli, Ichraf and Haelterman, Robby and Chtourou, Zied and De Cubber, Geert and Attia, Rabah},\nbooktitle = {VIIth International Workshop on Representation, analysis and recognition of shape and motion from Image data},\ntitle = {Pedestrian Tracking in the Compressed Domain Using Thermal Images},\nyear = {2017},\nnumber = {1},\nvolume = {1},\nabstract = {The video surveillance of sensitive facilities or borders poses many challenges like the high bandwidth requirements and the high computational cost. In this paper, we propose a framework for detecting and tracking pedestrians in the compressed domain using thermal images. Firstly, the detection process uses a conjunction between saliency maps and contrast enhancement techniques followed by a global image content descriptor based on Discrete Chebychev Moments (DCM) and a linear\nSupport Vector Machine (SVM) as a classifier. Secondly, the tracking process exploits raw H.264 compressed video streams with limited computational overhead. In addition to two, well-known, public datasets, we have generated our own dataset by carrying six different scenarios of suspicious events using a thermal camera. The obtained results show the effectiveness and the low computational requirements of the proposed framework which make it suitable for real-time applications and on-board implementation.},\ndoi = {10.1007\/978-3-030-19816-9_3},\nproject = {SafeShore},\naddress = {Savoie, France},\nurl = {http:\/\/mecatron.rma.ac.be\/pub\/2017\/RFMI2017_LAHOULI.pdf},\nunit= {meca-ras}\n}<\/code><\/pre>\n<\/p>\n<\/div>\n<\/li>\n<\/ul>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/section><section class=\"kc-elm kc-css-351403 kc_row\"><div class=\"kc-row-container  kc-container\"><div class=\"kc-wrap-columns\"><div class=\"kc-elm kc-css-46258 kc_col-sm-12 kc_column kc_col-sm-12\"><div class=\"kc-col-container\"><div class=\"kc-elm kc-css-22738\" style=\"height: 20px; clear: both; width:100%;\"><\/div><\/div><\/div><\/div><\/div><\/section><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2771,"parent":2797,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3964","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages\/3964","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/comments?post=3964"}],"version-history":[{"count":16,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages\/3964\/revisions"}],"predecessor-version":[{"id":4177,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages\/3964\/revisions\/4177"}],"up":[{"embeddable":true,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/pages\/2797"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/media\/2771"}],"wp:attachment":[{"href":"https:\/\/mecatron.rma.ac.be\/index.php\/wp-json\/wp\/v2\/media?parent=3964"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}