fig8
From: Big data analytics of crime prevention and control based on image processing upon cloud computing

Figure 8. Identification of illegal intrusion crimes

Figure 8. Identification of illegal intrusion crimes
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/