This work presents BurTrap, a networking system which integrates wireless modules (such as TelosB nodes) with networked surveillance cameras to automatically, accurately, timely track and identify burglar who stole th...
详细信息
ISBN:
(纸本)9781467307734;9781467307758
This work presents BurTrap, a networking system which integrates wireless modules (such as TelosB nodes) with networked surveillance cameras to automatically, accurately, timely track and identify burglar who stole the property. First, we design an energy-efficient wakeup scheduling protocol that guarantees a successful target tracking while reducing the communication energy consumption of the portable wireless module. Then, we identify burglar among all the objects appeared in the obtained video information by performing trajectory fitting between the estimated geometric trajectory and the estimated local visual trajectory. Through extensive experiments, we show that BurTrap can pinpoint the burglar with extremely high accuracy.
Survivability is a necessary property of network system in disturbed environment. A survivable network always experience five phases, i.e., normal phase, resistance phase, destroyed phase, recovery phase, and adaptati...
详细信息
Traditional temporal logics such as LTL (Linear Temporal Logic) and CTL (Computation Tree Logic) have shown tremendous success in specifying and verifying hardware and software systems. However, this kind of logic can...
详细信息
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext...
详细信息
To give concurrent consideration both the efficiency and the security(intensity of intractable problem) in the standard model,a chosen ciphertext secure identity-based broadcast encryption is *** the chosen ciphertext security model,by using identity(ID) sequence and adding additional information in ciphertext,the self-adaptive chosen identity security(the full security) and the chosen ciphertext security are gained *** reduction of scheme's security is the decisional bilinear Diffie-Hellman(BDH) intractable assumption,and the proof of security shows that the proposed scheme is indistinguishable against adaptive chosen ciphertext attacks in the standard model under the decisional BDH intractable *** the security level is improved,and it is suitable for higher security environment.
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ...
详细信息
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of event correlation, and it makes use of Bayesian network inference algorithm, which analysis of causal relationship of the events to deal with the missing data. This method to consider the interaction between evidence events and sequence relationship, it realizes formalization of the electronic evidence and reduces data redundancy in evidence analysis, which strengthens the pertinence of data process and evidence analysis, forensics system becomes more perfect.
In the development of informationsystems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the info...
详细信息
In the development of informationsystems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the informationsystem. At present, Web tree component still has a series of problems in communication efficiency, displaying and updating rate, etc. This paper uses MyEclipse and MySql as development tools to design and implement web tree component based on WebSocket, the component can display and update tree structure dynamically, Theory analysis and experimental results show that the improved scheme provides a better user experience, comparing with the previous traditional long polling based on AJAX technology, it effectively reduces the amount of data transmission, communication overhead, etc.
In this paper, we propose a novel tiny hardware assisted hypervisor, called Aquarius, to introspect the commodity OSes in a non-bypassable way. Compared to previous hypervisor-based approaches, Aquarius offers three d...
详细信息
This paper presents a method for locating text based on a simplified pulse coupled neural network (PCNN). The PCNN generates a firings map in a similar way to the human visual system with non-linear image processing...
详细信息
This paper presents a method for locating text based on a simplified pulse coupled neural network (PCNN). The PCNN generates a firings map in a similar way to the human visual system with non-linear image processing. The PCNN is used to segment the original image into different planes and edges detected using both the PCNN firings map and a phase congruency detector. The different edges are integrated using an automatically adjusted weighting coefficient. Both the simplified PCNN and the phase congruency energy model in the frequency domain imitate the human visual system. This paper shows how to use PCNN by changing the compute space from the spatial domain to the frequency domain for solving the text location problem. The algorithm is a simplified PCNN edge-based (PCNNE) algorithm. Three comparison tests are used to evaluate the algorithm. Tests on large data sets show PCNNE efficiently detects texts with various colors, font sizes, positions, and uneven illumination. This method outperforms several traditional methods both in text detection rate and text detection accuracy.
We propose an approach to recognize group activities which involve several persons based on modeling the interactions between human bodies. Benefitted from the recent progress in pose estimation [1], we model the acti...
详细信息
We propose an approach to recognize group activities which involve several persons based on modeling the interactions between human bodies. Benefitted from the recent progress in pose estimation [1], we model the activities as the interactions between the parts belong to the same person (intra-person) and those between the parts of different persons (inter-person). Then a unified, discriminative model which integrates both types of interactions is developed. The experiments on the UT-Interaction Dataset [2] show the promising results and demonstrate the power of the interacting models.
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with Beehi...
详细信息
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with BeehiveZ. Four types of queries are all supported in BeehiveZ, i.e. exact query based on structure, similarity query based on structure, exact query based on behavior, similarity query based on behavior. BeehiveZ provides different indexes to facilitate the efficient query processing of different types of queries. To make BeehiveZ more applicable, label similarity is considered.
暂无评论