The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focus on the use of unmanned aerial vehicle teams for performing cooperative perception using Data Distribution Service (DDS) Network. We develop a DDS framework to manage the incoming and out bounding network traffic of multiple types of data that is exchanged inside the UAV network. Experimental results both in laboratory and in actual flight are presented to help characterize the proposed...
This paper deals with automatic estimation of the horizon in videos from fixed surveillance cameras. The proposed algorithm is fully automatic in the sense that no user input is needed per-camera and it works with various scenes (indoor, outdoor, traffic, pedestrian, livestock, etc.). The algorithm detects moving objects, tracks them in time, assesses some of their geometric properties related to...
Paper presents a brief idea about drones, their technology, the process to make that technology energy-efficient and can be used for different purposes. Major aim of our prototype is for surveillance of terrifying notions and hidden activities which can be captured in the camera which gives us an aerial view of objects. Our major aim is to increase the flight time of the drone as much as possible...
This paper proposes a scheme for observing cooperative Unmanned Surface Vehicles (USV), using a rotorcraft Unmanned Aerial Vehicle (UAV) with camera movements (tilt and yaw) prioritized over UAV movements. Most of the current researches consider a fixed-wing type UAV for surveillance of multiple moving targets (MMT), whose functionality is limited to just UAV movements. Experiments in simulation are...
Intruder detection in a protected zone can be performed by the physical protection which acts within the object's perimeter and survey's it (patrols, monitoring screens of CCTV systems, etc.), but intruder detection can be also done using active protection elements. Active protection elements include alarm systems (electronic safety and distress alarm systems, CCTV security systems, system for control...
We address security and trust in the context of a commercial IP camera. We take a hands-on approach, as we not only define abstract vulnerabilities, but we actually implement the attacks on a real camera. We then discuss the nature of the attacks and the root cause; we propose a formal model of trust that can be used to address the vulnerabilities by explicitly constraining compositionality for trust...
This work presents a video-based sequence synchronization algorithm to be used in real-time video surveillance applications. The signals are aligned based on an online dynamic time warping approach that uses only video content information. The algorithm was tested in the alignment of reference and target videos acquired in a cluttered industrial environment with a moving camera. During each recording,...
Surveillance is one of the most important security system in today's life as it protects home from theft, burglaries and murders, as become routine in big cities. This system is very useful as it is used in many places like offices, industrial, storehouse or bank locker room, ATM etc. This embedded based home security system designed by use of smart sensors like pyroelectric infrared sensor (PIR),...
Due to increase the terrorist activities throughout the world, it is very important to control and monitor their activities and quickly execute the required plan accordingly. This paper presents a smart Global Positioning System (GPS) based surveillance robotic system using Raspberry Pi for security application and remote sensing. This robotic system is fully controlled wirelessly via internet web...
An application framework is proposed in this paper that considers low cost surveillance mechanism and data acquisition in the forest. An application is developed as proof of concept with detailed design that can take advantage of unmanned urban vehicle to be directly configured and controlled in real-time. The advantages are numerous; it can be used for many purposes. For example, it can be used for...
Person Re-Identification (person re-id) is a crucial task as its applications in visual surveillance and human-computer interaction. In this work, we present a novel joint Spatial and Temporal Attention Pooling Network (ASTPN) for video-based person re-identification, which enables the feature extractor to be aware of the current input video sequences, in a way that interdependency from the matching...
In this study, a real-time system design, which can track (RGB) targets in dynamic environments with an active camera, was implemented. Object tracking applications are quite important for military, surveillance system and operational robot applications and getting more important day by day. This design allows us tracking an object using fewer cameras. The design consists of three main parts that...
Surveillance video cameras have been increasingly deployed on roadway networks providing important support for roadway management. While the information-rich video images are a valuable source of traffic data, these surveillance video cameras are typically designed for manual observation of roadway conditions and are not for automatic traffic data collection. The benefits of turning these surveillance...
An application framework is proposed in this paper that considers low cost surveillance mechanism and data acquisition in the forest. An application is developed as proof of concept with detailed design that can take advantage of unmanned urban vehicle to be directly configured and controlled in real-time. The advantages are numerous; it can be used for many purposes. For example, it can be used for...
This paper proposes a method for detecting moving objects on an underwater video. Video obtained using an underwater camera to capture the environmental conditions of the area. This research is the initial stage of the underwater surveillance system. Underwater surveillance system enables objects passing can be recognized shapes, types, and its behavior. The detection method used in this research...
In automatic and image processing based wildfire smoke detection various spatial and temporal procedures are used to detect certain wildfire features. The final step is usually the classification procedure that finally decides if some detected phenomena represents wildfire smoke or not. In classification procedure various classifiers can be used, but as the system has to work in real time and usually...
This paper presents the current state of a novel event-based surveillance framework for real-time detection and tracking of the person-of-interest with IP PTZ network camera. Formulating the problem in a (non-linear) Bayesian filtering framework in combination with Convolutional Neural Networks (CNN), we develop dynamical and adaptive approaches for identifying the Person-of-Interest(PoI) from its...
In a surveillance system, the privacy becomes important since those who are not relevant to an event may be recorded by many surveillance systems. On the other hand, the authenticity of video frames in surveillance systems should be guaranteed if a video is used as evidence. Hence a signature is attached for each frame. However, it is contradictory to provide both privacy and authenticity of a video...
Use of surveillance cameras as a monitoring tool for home environments, elderly, and children has becoming a common practice. However, people with visual impairments have difficulties in using this kind of device because it relies only on visual information. Towards solving this problem, this work aims to propose a solution that combines deep learning techniques for object recognition in the video...
In this paper we present a framework that is able to reliably and completely autonomously detect abnormal behavior in surveillance images. As input, we rely solely on a long-wave infrared (LWIR) image sensor. Our abnormal behavior detection pipeline consists of two consecutive stages. In a first stage, we perform efficient and fast pedestrian detection and tracking. In a second step, the detected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.