Research Article

Kidnapping Detection and Recognition in Previous Unknown Environment

Figure 3

Workflows of prior-check and posterior-check processes.