Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cameras and other sensors are increasingly deployed for private space monitoring applications such as home monitoring, assisted/enhanced living and child monitoring. Since these cameras capture highly sensitive information and transfer it over public communication infrastructures, security and privacy is a major concern. This work presents a secure camera device along with a secure data delivery and...
Nowadays, providing a security system for houses has become a vital research in which the latest technologies are being adopted to serve this purpose. Wireless network is one of the technologies that have been used to provide remote monitor and control for the home appliances. This paper aims to propose a security door lock system based on Raspberry pi technology where cameras, keypad and pi-lids...
In many security systems, it is sufficient to monitor a certain territory with the same type of devices in such a way that each point of the territory falls into the coverage area of at least one device while minimizing the energy consumption of the devices. However, in some security systems, it is necessary to observe objects from a certain side. For example, to identify a person you need to see...
Before inception of Internet of Things (IoT), personal computers and laptop were used to handle daily tasks of individuals like mail surfing, access to bank portal, observing current temperature, among others. Nowadays, IoT-enabled smart devices like smart mobile phones, PDAs, and tablets are being used by them for such tasks due to rapid growth in IoT. Smart homes have been widely accepted by individuals...
In this paper we discuss and analyze possible futures for technologies in the field of computer vision (CV). Using a method we have coined speculative analysis we take a broad look at research trends in the field to categorize risks, analyze which ones are most threatening and likely, and ultimately summarize conclusions for how the field may attempt to stem future harms caused by CV technologies...
Family security is one of the key goals of a digital home system. At present, webcams are widely used in home remote monitoring systems. This is due to the fact that its passive monitoring nature leaves a potential security problem and cannot be used for providing proactive security. To solve this problem, this paper proposes the design of a remote embedded intelligent security monitoring system based...
In this paper, we study full-view coverage in camera sensor networks, by exploiting their limited mobility of orientation rotation. We focus on the fairness based coverage maximization problem, i.e., how to schedule the orientations of the camera sensors to maximize the minimum accumulated full-view coverage time of target points. To solve this problem, we first try to reduce the space dimension of...
In this paper, we proposed an IoT-based visitor detection system. It uses an IR sensor to detect human body and two ultrasonic sensors to locate visitor servo motor under the position. When a visitor is detected it drives camera module to locate the visitor. Recoded video and sensor data are stored in the Database. Saved data can see via the PC and Smart device. We developed the system using Raspberry...
Car parking has become a serious problem of everyday occurrence for educational institutions with the decreasing parking supply, increasing enrollments and high percentage of vehicle ownership, in result causing congestion, time and money wastage. This problem is getting worse and more frustrating in Jazan University due to the fact that majority of students, faculty and staff members own cars and...
Crowd monitoring is an important task of security forces. If an emergency occurs during large events, authorities should take urgent measures to prevent causalities. Also understanding crowd dynamics such as tracking crowds or sparse people goups before an emergency occurs is a need. Therefore, crowd detection and analysis is a critical research area. There are several studies for crowd monitoring...
The home of the future should be a smart one, to support us in our daily life. Up to now only a few security incidents in that area are known. Depending on different security analyses, this fact is rather a result of the low spread of Smart Home products than the success of such systems security. Given that Smart Homes become more and more popular, we will consider current incidents and analyses to...
Indian Railways are the leading railway system of Asia and the second leading railway system of the world. In the India as compared with other sector railways are the biggest sector, which provides more employment. It is a convenient, chief and efficient public transportation system. As per the recent year the security of station platform is an important issue. CCTV and DVR are the present monitoring...
Since last few years, security systems are getting more awareness and importance. A Multi Layer Bank Security System is a system for validating, monitoring and controlling the security at bank locker rooms. Today, there are many banks using authorize access control approach to prevent the locker room from unauthorized access. In this paper highly reliable, multi level and most efficient locker room...
Over the years an increasing demand for an automated security system begins to emerge. Many applications that help in protecting life and properties are being developed. Most of them are aimed at improving the work of security personnel and security agencies. However, security is a responsibility of everyone not only the security agencies or security personnel alone. This paper present an interactive...
Below are a number of specific weaknesses inherent to contemporary ATM devices including the ones with biometric checks or with other advanced applications. Reasons are considered that lead to applications of intelligent, logic-based methods aiming at reduction of risk factors to ATMs. Special attention is paid to applications of Puzzle method in ATMs. To make a more independently functioning ATM,...
With the increasing development of the sports in China, the application of network technology, which is a crucial link in sports events, is required more. This article will introduce the success and features of some typical technologies such as WAPI, TelePresence, Optical Network, etc. The implementation of network system control will also be discussed. It has been found out that sports events may...
Video transmission is a key technology of security monitoring systems used in underground constructions. The video transmission based on carrier wave is an emerging and promising technology compared with the widely used technologies using coaxial cable, twisted-pair wire, optical fiber, and wireless wave. The study presents a novel design scheme of image transmission system based on carrier wave....
Tragically, mass gatherings such as music festivals, sports events or pilgrimage quite often end in terrible crowd disasters with many victims. In the past, research focused on developing physical models that model human behavior in order to simulate pedestrian flows and to identify potentially hazardous locations. However, no automatic systems for detection of dangerous motion behavior in crowds...
System designers and requirements analysts face many competing requirements, such as performance, usability, security, cost, and so forth. To make trade-offs among requirements, ideally analysts would like to quantitatively measure consequences of alternative solutions on requirements. However, during the early stages of requirements and system design, it is hard to quantitatively measure all factors...
The presence of increased memory and computational power in imaging sensor networks is attracting researchers to exploit existing image processing algorithms on distributed memory and computational power. In this paper, a typical perimeter is investigated with a number of sensors placed to form an image sensor network for the purpose of image acquisition, transmission, and search. Image search algorithm...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.