Abstract
Cross-border crime utilizes recent advanced systems to perform their illegal activities. Innovative sensory systems and specialized equipment are examples that were used for trafficking of human and of various illicit materials. The increasing challenges that border personnel must resolve require the usage of recent technological advances as well. Thus, the utilization of pioneer technologies seems imperative to precede technologically organized crime. Towards this objective, the introduction of unmanned vehicles (UxV) and the advances of relevant sub-systems have created a new solution to fight cross-border crime. Utilizing a combination of UxVs enriched with enhanced detection capabilities comprises an effective solution. The chapter will introduce and present the capability of an autonomous navigation system by exploiting swarm intelligence principles towards simplifying the overall operation. Computer vision advances and semantic enrichment of the acquired information are incorporated to deliver cutting-edge technologies. The described architecture and services can provide a complete solution for optimal border surveillance and increased situation awareness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Passas, N. (2003). Cross-border crime and the interface between legal and illegal actors. Security Journal, 16(1), 1 37.
Eurosur homepage. https://ec.europa.eu/home-affairs/what-we-do/policies/borders-and-visas/border-crossing/eurosur_en. Last accessed: 2 Nov 2019.
Cabreira, T., Brisolara, L. R., & Ferreira, P. (2019). Survey on coverage path planning with unmanned aerial vehicles. Drones, 3(1), 4.
Kapoutsis, A. C., Chatzichristofis, S. A., & Kosmatopoulos, E. B. (2017). Darp: Divide areas algorithm for optimal multi-robot coverage path planning. Journal of Intelligent & Robotic Systems, 86(3-4), 663–6 0.
Gabriely, Υ., & Rimon, E. (2001). Spanning-tree based coverage of continuous areas by a mobile robot. Annals of Mathematics and Artificial Intelligence, 31(1-4), 77.
Gower, J. C., & Ross, G. J. (1969). Minimum spanning trees and single linkage cluster analysis. Journal of the Royal Statistical Society: Series C (Applied Statistics), 18(1), 54–64.
Kapoutsis, A. C., Chatzichristofis, S. A., & Kosmatopoulos, E. B. (2019). A distributed, plug- n-play algorithm for multi-robot applications with a priori non-computable objective functions. The International Journal of Robotics Research, 38(7), 13–32.
Kosmatopoulos, E. B. (2009). An adaptive optimization scheme with satisfactory transient performance. Automatica, 45(3), 716–723.
Ren, S., He, K., Girshick, R., & Sun, J. (2015). Faster r-cnn: Towards real-time object detection with region proposal networks. In Advances in neural information processing systems (p. 1).
Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C. Υ., & Berg, A. C. (2016). Ssd: Single shot multibox detector. In European conference on computer vision (pp. 21–37). Springer.
Redmon, J., Divvala, S., Girshick, R., & Farhadi, A. (2016). Υou only look once: Unified, real-time object detection. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 77–77).
Henriques, J. F., Caseiro, R., Martins, P., & Batista, J. (2014). High-speed tracking with kernelized correlation filters. IEEE Transactions on Pattern Analysis and Machine Intelligence, 37(3), 5 3–5 6.
Everingham, M., Van Gool, L., Williams, C. K., Winn, J., & Zisserman, A. (2010). The pascal visual object classes (voc) challenge. International Journal of Computer Vision, 88(2), 303–333.
Guber, T. (1993). A translational approach to portable ontologies. Knowledge Acquisition, 5(2), 1–22.
Tsarkov, D., & Horrocks, I. (2006). Fact++ description logic reasoner: System description. In International joint conference on automated reasoning (pp. 2 2–2 7). Springer.
Sirin, E., Parsia, B., Grau, B. C., Kalyanpur, A., & Katz, Υ. (2007). Pellet: A practical owl- dl reasoner. Web Semantics: Science, Services and Agents on the World Wide Web, 5(2), 51–53.
Motik, B., Shearer, R., & Horrocks, I. (2007). Optimized reasoning in description logics using hypertableaux. In International conference on automated deduction (p. 67–3). Springer.
Frank, A. U. (2001). Tiers of ontology and consistency constraints in geographical information systems. International Journal of Geographical Information Science, 15(7), 667–667.
Hogenboom, A., Hogenboom, F., Frasincar, F., Schouten, K., & Van Der Meer, O. (2013). Semantics-based information extraction for detecting economic events. Multimedia Tools and Applications, 64(1), 27–52.
Bimschas, D., Hasemann, H., Hauswirth, M., Karnstedt, M., Kleine, O., Kroller, A., Leggieri, M., Mietz, R., Passant, A., Pfisterer, D., et al. (2011). Semantic-service pro- visioning for the internet of things. Electronic Communications of the EASST 37.
Hellmann, S., Lehmann, J., Auer, S., & Brίimmer, M. (2013). Integrating nlp using linked data. In International semantic web conference (p. 113). Springer.
Liyanage, H., Krause, P., & de Lusignan, S. (2015). Using ontologies to improve semantic interoperability in health data. BMJ Health & Care Informatics, 22(2), 30315.
Benjamins, V. R., Casanovas, P., Breuker, J., & Gangemi, A. (2005). Law and the semantic web: Legal ontologies, methodologies, legal information retrieval, and applications (Vol. 336). Berlin/Heidelberg/New York: Springer.
Eucise2020 fp7 project. http://www.eucise2020.eu/. Last accessed: 06 Dec 2019.
Acknowledgements
This work was supported by the ROBORDER project funded by the European Commission under Grant Agreement No 740593.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Orfanidis, G. et al. (2021). Border Surveillance Using Computer Vision-Enabled Robotic Swarms for Semantically Enriched Situational Awareness. In: Akhgar, B., Kavallieros, D., Sdongos, E. (eds) Technology Development for Security Practitioners. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-69460-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-69460-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69459-3
Online ISBN: 978-3-030-69460-9
eBook Packages: EngineeringEngineering (R0)