This article explores the construction and optimization of a diversified information collaboration model for public emergency management based on blockchain technology. Firstly, the basic concepts and characteristics ...
详细信息
With the rapid evolution of the Internet and artificial intelligence, big data has emerged as an indispensable asset in today's societal advancement. Given the monumental task of processing and analyzing massive a...
详细信息
The proceedings contain 24 papers. The topics discussed include: analysis on early dropouts in engineering careers;depression diagnosis using text-based AI methods – a systematic review;satellite orbit prediction usi...
The proceedings contain 24 papers. The topics discussed include: analysis on early dropouts in engineering careers;depression diagnosis using text-based AI methods – a systematic review;satellite orbit prediction using a machine learning approach;bibliometric software: the most commonly used in research;bio-business of polymer derived from cassava waste for the industrial plastic sector;dynamic models to determine external factors and their impact on the shrimp price forecast;how to use Instagram to travel the world? an approach to discovering relevant insights from tourist media content;public safety perception in Ecuador: an approach from social networks over data analytics;relationship between corporate social responsibility, assets and income of companies in Ecuador;retrospective of scientific production on e-democracy;sticky floor and glass ceiling in Ecuador. the evolution of the gender wage gap, 2010-2021;and technical indicator for a better intraday understanding of uptrends or downtrends in the financial markets using volume transactions as a trigger.
Diversified firms improve performance and competitiveness in the market by efficiently allocating resources among their various products or services, leading to economies of scope. In this study, we focus on product d...
详细信息
Trusted computingtechnology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. The incorporation of Trusted computing introduces a se...
详细信息
Quantum computer(QC) technology is progressing remarkably and is becoming one of the important computing technologies of the future. However, the number of qubits that current quantum computers can run is limited, so ...
详细信息
Although the surveillance industry is growing due to increased concerns for public safety, traditional surveillance systems can be ineffective due to fixed positions, limited coverage, and the need for human operation...
详细信息
ISBN:
(纸本)9798350330656;9798350330649
Although the surveillance industry is growing due to increased concerns for public safety, traditional surveillance systems can be ineffective due to fixed positions, limited coverage, and the need for human operation. This paper proposes an edge computing surveillance system that can detect, track, and identify human presence using AI software. The system includes a video camera integrated into a structure that allows pan and tilt movements and a processing unit that performs all computations locally. The system can operate in two different modes, manual and automatic, and it can be controlled from a user-friendly web application. The manual mode allows the user to control the camera remotely, adjusting the position with buttons and handling additional functionalities like zoom. On the other hand, in automatic mode, the system detects people and identifies if they are an unknown subject or not. Identifications are recorded in an online log and the system takes pictures of unknown people to recognize recurrent intruders.
作者:
Kuppili, RohanAgarwal, KhusbooBhosale, TanmayGouthaman, P.School of Computing
College of Engineering and Technology Srm Institute of Science and Technology Department of Networking and Communications Kattankulathur603203 India School of Computing
Srm Institute of Science and Technology Faculty of Engineering and Technology Department of Networking and Communications Kattankulathur603203 India
Innovative technology for weapon detection during security monitoring is necessary today due to the rising threats of violence and terror. The paper discusses a detailed design of a weapon detection system intended fo...
详细信息
The proceedings contain 34 papers. The topics discussed include: ionospheric scintillation prediction using decision tree and rainforest techniques;closed pig barn control system model;circular object sorting machine ...
ISBN:
(纸本)9798350385946
The proceedings contain 34 papers. The topics discussed include: ionospheric scintillation prediction using decision tree and rainforest techniques;closed pig barn control system model;circular object sorting machine with LabVIEW software control;experimental study of real-time water quality analysis with deep neural network (DNN) on edge computing;designing hv reactor with multiple air gap structure based on fringing flux factor;a system for PD pulse generating, monitoring, and system characterization;and identifier handling in information systems: the case of university student registration systems in Thailand.
Cloud computingtechnology has completely changed the way computer data is processed. It involves using remote servers to store, manage, and process data, rather than relying on local servers or personal computers. Th...
详细信息
暂无评论