The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current requirements for vehicular video security systems are making it more challenging to handle the ever-increasing amount of video data produced by the video security systems installed within vehicles. Due to different standard regulations and recommendations, and quite often because of the requirements set by the operators themselves, recorded data not only needs to be stored temporarily within...
Car parking has become a serious problem of everyday occurrence for educational institutions with the decreasing parking supply, increasing enrollments and high percentage of vehicle ownership, in result causing congestion, time and money wastage. This problem is getting worse and more frustrating in Jazan University due to the fact that majority of students, faculty and staff members own cars and...
Despite the large and spectacular development in the field of vehicle safety, particularly in the context of driver safety needs, solutions remain insufficient and independent. In this paper, we propose a new system that has been dubbed 3SD "Security and Surveillance System for Drivers". It is a multifunction system as a complete package based on intelligent sensors and cameras that constantly...
Each year the number of passengers travelling around the world is steadily increasing. Hence, the efficient handling of border crossings while maintaining a high security is a demanding challenge for the future. In this work we present the key security components for a novel proposed one-stop-shop (OSS) border control system, which tries to achieve greatest throughput of travelers while applying highest...
In a HD traffic bayonet, HD camera captures a few images once the vehicles drive cross the underground sensing coils. Time interval between two adjacent images is usually uncertain. In this paper, a background modeling and foreground extraction scheme is proposed for these images captured in the bayonet. The proposed scheme contains three modules: initial background modeling, foreground extraction...
Inspired by the dramatic evolution of VANE clouds, this paper proposes a new VANET-cloud service called VWaaS (Vehicle Witnesses as a Service) in which vehicles moving on the road serve as anonymous witnesses of designated events such as a terrorist attack or a deadly accident. When confronted the events, a group of vehicles with mounted cameras collaborate with roadside stationary cameras to take...
Shortcomings of existing training management systems have caused the decline of training quality in driving schools. This paper presents a new driving training management system based on the Internet of Things, which combines the technologies of radio frequency identification and video identification. It provides mainly functions of student attendance authentication, training timing, distance measuring...
Vehicles' safety surveillances have been paid more attentions on by the governments with increasingly rampant terrorist activities like car bombing attacks and illegal immigrations. Lots of terrorists may hide the bombs under the vehicles to avoid the searches by the workers. Illegal immigrants usually adopt the same tricks. Hence, vehicles' bottom will be one of the most important searching places...
Vehicle inspection at ports of entry is a critical component of border security. One part of the vehicle screening process involves customs and border protection (CBP) personnel performing a preliminary inspection of the underside of random vehicles by looking under the vehicle through a mirror mounted on a stick, searching for anomalies or foreign objects present on the undercarriage structure and...
Vehicle clamping is a practice that started in the 1950's in order to enforce traffic and parking regulations usually inside private premises. It often involves the immobilization of a vehicle via a wheel lock that is attached to the tyres of a car in order to make sure that it cannot be driven. However, not only is this practice burdensome to drivers, there are also serious ethical issues surrounding...
Emergency vehicles are increasingly dependent on ICT systems. Public safety responder's need is to enhance mission critical voice with broadband data. Command and control applications aboard a vehicle are commonplace. There is a need to ease situational awareness and decision making by using cameras and sensor information. However, countries and user organizations are developing own solutions according...
The Vehicular Surveillance and Sensing System (VS3) is a 3G-based mobile device for car security applications. On the car side, it consists of a CO2 sensor, a camera module, a 3G module, and a microprocessor. On the user side, only a 3G mobile phone is needed. VS3 provides the following features: (i) it can be triggered by events detected on car, (ii) events can be abnormal air quality or potential...
Stand-alone cameras or CCTV networks are nowadays commonly present in public areas such as city centers, stores and more recently in transportation infrastructures. In the meantime, automatic processing of video data is a field of activity stirring up the utmost attention in the pattern recognition community; state-of-the-art advances in this area enable the reliable extraction of features and the...
This paper describes a new imaging platform that has been commercially developed for security applications. The primary goal of this approach is to reveal objects that may be concealed under a persons clothing using natural light, i.e., the imagery is essentially passive and so no external illumination of the subject is involved. A second goal is to be able to carry out such security screening in...
Urban environments present unique challenges from the perspective of surveillance and security. Threat activity in urban environments tends to be very similar to background activity, while the volume of activity is often very high. The widespread geographical area presents issues from the perspective of response. These characteristics of urban environments create challenges to traditional applications...
We conduct an assessment of existing video analytic technology as applied to critical infrastructure protection, particularly in the transportation sector. Based on discussions with security personnel at multiple facilities, we assemble a list of desired video analytics functionality, which we group into five categories: low-level activity detection, high-level behavior detection, discrimination,...
Perimeter security is a priority issue being addressed worldwide by aviation, marine port, military, and government agencies to counter threats of terrorism. These agencies are pursuing initiatives to find the appropriate combination of techniques that will yield productive and cost-effective solutions. At this conference last year, we presented a solution called SPAN: the Secure Perimeter Awareness...
Geospatial video surveillance network (GVSN) is an effective remote sensing approach for urban security and emergency applications. In this paper, the GVSN system could be separated into four basic functional parts that include change detection, object recognition, target tracking and target positioning. Each part has its special utility to solve the security and emergency problems. When the functions...
This paper presents an architecture to support fast prototyping of augmented reality systems, based on virtual reality. The architecture defines simulation services separated from other aspects of the system. These services support incremental evolution of simulated prototypes into nonsimulated systems. Focus is also placed on user interaction,through the definition of an interaction architecture...
The research intends to develop the object detection and counting system using image processing. Overall works are software development of a system that requires a video stream or single image. They consist of the following components: background without any moving objects and the scene with moving objects. The system is designed to find the differentiation which is the moving objects and find the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.