Filters








215 Hits in 7.5 sec

Vehicle Traffic Driven Camera Placement for Better Metropolis Security Surveillance

Xiaobo Ma, Yihui He, Xiapu Luo, Jianfeng Li, Mengchen Zhao, Bo An, Xiaohong Guan
2018 IEEE Intelligent Systems  
Given the never-ending power offered by vehicles to metropolises, exploiting vehicle traffic to design camera placement strategies could potentially facilitate security surveillance.  ...  This article constitutes the first effort toward building the linkage between vehicle traffic and security surveillance, which is a critical problem for smart cities.  ...  VEHICLE TRAFFIC DRIVEN PLACEMENT STRATEGIES FOR BUILDING SURVEILLANCE INFRASTRUCTURE A. Problem Description Let V be the set of vehicles under surveillance and v ∈ V be a vehicle.  ... 
doi:10.1109/mis.2018.223110904 fatcat:2yg2wt2p5bcovnndmbrkueabay

Video Analytics for Business Intelligence [chapter]

Asaad Hakeem, Himaanshu Gupta, Atul Kanaujia, Tae Eun Choe, Kiran Gunda, Andrew Scanlon, Li Yu, Zhong Zhang, Peter Venetianer, Zeeshan Rasheed, Niels Haering
2012 Studies in Computational Intelligence  
We describe existing algorithms for extraction and processing of target and scene information, multi-sensor cross camera analysis, inferencing of simple, complex and abnormal video events, data mining,  ...  image search and retrieval, intuitive UIs for efficient customer experience, and text summarization of visual data.  ...  Target retrieval: In a retail store, from a surveillance stand point, it is very important that the security supervisor have the capability to search archived videos for person and vehicles of interest  ... 
doi:10.1007/978-3-642-28598-1_10 fatcat:shu47nw2unh73fsfpx46uvfdgi

Automated policing: the case of body-worn video

Ben Bowling, Shruti Iyer
2019 International Journal of Law in Context  
The evidence shows that policing tasks are being transformed by BWV cameras and analytics such as facial recognition.  ...  It explains how the technology functions and explores its surveillant, investigative, probative and regulatory applications.  ...  These include (i) calls for service and en route to emergency calls; (ii) pedestrian stops and stops on grounds of reasonable suspicion; (iii) traffic stops; (iv) foot and vehicle pursuit; (v) consensual  ... 
doi:10.1017/s1744552319000089 fatcat:umb2jrwqafgzhcmjfehfgzekma

Urban Computing

Yu Zheng, Licia Capra, Ouri Wolfson, Hai Yang
2014 ACM Transactions on Intelligent Systems and Technology  
Zheng et al. information will be delivered to the transportation authority for dispersing traffic and diagnosing the anomaly.  ...  The system continues the loop for an instant and unobtrusive detection of urban anomalies, helping improve people's driving experiences and reduce traffic congestion.  ...  Traffic Data. There are many ways to collect traffic data, such as using loop sensors, surveillance cameras, and floating cars.  ... 
doi:10.1145/2629592 fatcat:no5gcshbmrdfphv6ewm6wdoewq

Architecture as Crime Control

Neal Kumar Katyal
2001 Social Science Research Network  
For example, cameras could be used to monitor stairways.  ...  They tend to have minimal natural surveillance and poor opportunities for social interaction, thereby creating a false sense of security.  ...  Vitruvius's statement has served as the basis for understanding architecture throughout modem history. 357. I am not claiming that function is primary, or that "form ever follows function."  ... 
doi:10.2139/ssrn.290756 fatcat:oflfei6lrvaqhn52uj272t4o6e

Tijuana Transa: Transa as Metaphor and Theory on the US–Mexico Border

Jennifer A. Reimer
2016 Journal of Transnational American Studies  
These shots, taken at a high angle looking down at the border, suggest the view from planes, helicopters, or other vehicles of state surveillance-partitioning and containment instead of transboundary flows  ...  For example, how could a transa reading better illuminate the possibilities and limitations of Gregory Nava's 2006 film Bordertown, starring two actors who have themselves become global "avatars" for Latino  ... 
doaj:b966bf90edea44d2b238080fcc71a3c6 fatcat:4fgnjxggmbhl7hh3wh42cjyt6a

Volume 16 : 2018 Issue 3

UTM Malaysia
2018 PLANNING MALAYSIA JOURNAL  
for the provision of support facilities.  ...  Together, this finding provides essential guidance for park planners to plan for future QGOS and as part of the support to the 11 th Malaysian Plan (2016-2020).  ...  Further security features such as road humps to slow traffic and CCTV cameras would be useful additions.  ... 
doi:10.21837/pm.v16i7.494 fatcat:amm4awbfnnfmxfx6ihlnm5ukt4

Volume 16 :2018 issue 3

UTM Malaysia
2018 PLANNING MALAYSIA JOURNAL  
for the provision of support facilities.  ...  Together, this finding provides essential guidance for park planners to plan for future QGOS and as part of the support to the 11 th Malaysian Plan (2016-2020).  ...  Further security features such as road humps to slow traffic and CCTV cameras would be useful additions.  ... 
doi:10.21837/pmjournal.v16.i7.494 fatcat:dg6yf7kmvbgqtjlizos6iwpjeq

The New Parapolice: Risk Markets and Commodified Social Control

Curtis Clarke, George Rigakos
2003 Labour (Halifax)  
An InteIligarde security vehicle exclusively devoted to patrolling Toronto's public parking lots. It is equipped with an on-board camera. I didn't belizve it myself.  ...  Intelligarde president Ross McLeod held up the latest gadget in security officer surveillance equiprnent, a baton that would replace the aging DOS-driven deister system.  ...  We don't think it's right that this Company should be providing "security" in places like City Home. O f course, there is a real need for safe and secure housing and these concerns must be addressed.  ... 
doi:10.2307/25149374 fatcat:f4lb3fkemnhatatxmf27vhxx4y

Welcome Messages

2019 2019 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)  
The database along with its source code will be made open source for the research and academic purpose.  ...  In addition to the user fairness, we make the spatial streams which convey visually more important information be high-quality for achieving high video quality.  ...  CONCLUSION We proposed a method of knife detection for security improvement with images of security cameras.  ... 
doi:10.1109/ispacs48206.2019.8986291 fatcat:gu4zaxsqkncp5n2ebj5fybk7ce

Circular economy: A threat or a driver of technological advance in the mining sector?

V. A. Knysh, Luzin Institute for Economic Studies, Kola Science Center, Russian Academy of Sciences, Apatity, Russia, L. V. Ivanova, Luzin Institute for Economic Studies, Kola Science Center, Russian Academy of Sciences, Apatity, Russia
2020 Gornyi Zhurnal  
10 For a more general discussion of the interplay between the circular economy, employment, education, money and finance, public policy and taxation, see the book The Circular Economy: A Wealth of Flows  ...  The most prominent examples include CatReman, Rolls-Royce TotalCare, Philips Healthcare's performance contracts, and Ricoh's Managed Print Services, Most of which have developed their businesses for decades  ...  Smart, communicating vehicles sharing traffic and network information can further increase logistics' efficiencyanother area of our current innovation activities.  ... 
doi:10.17580/gzh.2020.09.04 fatcat:fbcotka6sbegtgzgddog2c2vgi

Volume 18 : 2020 Issue 4

MIP Malaysia
2020 PLANNING MALAYSIA JOURNAL  
providing the financial support for this paper to be published.  ...  ACKNOWLEDGEMENT The authors would like to express their appreciation to the respondents for their willingness to participate in and to give their time for this survey, and without whom, this study could  ...  All the informants concurred that alarms and surveillance cameras are useful.  ... 
doi:10.21837/pm.v18i14.814 fatcat:wzyk2odtizge7bl73vuyonwhqm

Socio-World SOCIAL RESEARCH & BEHAVIORAL SCIENCES [article]

Namig Isazade
2021 Zenodo  
ACKNOWLEDGEMENTS (Times New Roman, 12 Bold) [List here any individuals who contributed in the work but do not qualify for authorship base on the above criteria.]  ...  The identification of security risks shall include the establishment of a risk register for border surveillance.  ...  We used the Avigilon camera with a wide lens with a shot of 100 degrees as a surveillance camera. Its purpose is to monitor the overall situation in the relevant area.  ... 
doi:10.5281/zenodo.5781845 fatcat:n4amrc7ypfa6ri5htbvbxoerni

International Journal of Computer Science July 2021

IJCSIS Editor
2021 Zenodo  
CALL FOR PAPERS International Journal of Computer Science and Information Security (IJCSIS) January-December 2021 Issues The topics suggested by this issue can be discussed in term of concepts, surveys  ...  See authors guide for manuscript preparation and submission guidelines.  ...  Renaissance includes an add-on for existing fluoroscopy C-arms that provides 3D images for intraoperative verification of implant placement.  ... 
doi:10.5281/zenodo.5543977 fatcat:vxk2ynl3l5bbpcvpda2lt4qef4

Analysis of Aperture Shape Changing Trend Base on the Shaped Charge Jet Penetration through the Steel Target [chapter]

Junqing Huang, Yalong Ma, Kelei Huang, Jianxun Zhao
2012 Communications in Computer and Information Science  
The results of simulation experiments have shown that GEI is better for the evaluation of track irregularity than TQI.  ...  camera and similar optical instruments.  ...  -d 15:50-18:10 Room2 Topic: Modeling Theory and Technology-2 SuA1-d-1 An Efficiency driven Deterministic Optimization Approach for Sensor Placement in Image Luis Diago1, Nobuyoshi Muto2, Lu  ... 
doi:10.1007/978-3-642-34384-1_2 fatcat:xvp3o6agk5hxpmbjptnthxiz5m
« Previous Showing results 1 — 15 out of 215 results