fig8
From: Big data analytics of crime prevention and control based on image processing upon cloud computing

Figure 8. Identification of illegal intrusion crimes
Figure 8. Identification of illegal intrusion crimes
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/