搜索结果: 1-15 共查到“Surveillance”相关记录82条 . 查询时间(0.046 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Sparse Tensor Optimization Approaches for Traffic Flow Prediction, Anomaly Detection and Video Surveillance
交通流预测 异常检测 视频监控 稀疏张量 优化方法
2023/4/13
Weather surveillance radar data shows 45 million insects taking flight over brightly lit city(图)
Weather surveillance radar data 45 million insects flight lit city
2021/4/16
The expansion of artificial night lights globally has had important impacts on animal behavior and health. A new study led by researchers at the University of Oklahoma on the effects of brig...
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
Privacy Authentication Forward-secure signature
2018/12/19
As surveillance systems are popular, the privacy of the recorded video becomes more important. On the other hand, the authenticity of video images should be guaranteed when used as evidence in court. ...
EXTRACTING 3D SEMANTIC INFORMATION FROM VIDEO SURVEILLANCE SYSTEM USING DEEP LEARNING
3-D space Camera calibration Target recognition Target tracking
2018/5/16
At present, intelligent video analysis technology has been widely used in various fields. Object tracking is one of the important part of intelligent video surveillance, but the traditional target tra...
第三届野生动物监测视频数据自动分析研讨会(The 3nd Workshop on Automated Analysis of Video Data for Wildlife Surveillance)
第三届 野生动物监测视频数据自动分析 研讨会
2017/3/28
National Marine Fisheries Service (NMFS) of the United States National Oceanic and Atmospheric Administration (NOAA), the Department of Fisheries of Western Australia, the Australia Institute of Marin...
Direct Communication between Cell’s Surveillance and Protein Synthesizing Machinery Eliminates Genetic Errors
Direct Communication Cell’s Surveillance Protein Synthesizing Machinery Eliminates Genetic Errors
2017/2/15
New research out of Case Western Reserve University School of Medicine describes a mechanism by which an essential quality control system in cells identifies and destroys faulty genetic material. The ...
SCHISTOSOMIASIS:GEOSPATIAL SURVEILLANCE AND RESPONSE SYSTEMS IN SOUTHEAST ASIA
Neglected tropical diseases (NTD) surveillance and response schistosomiasis elimination
2016/12/1
Geographic information system (GIS) and remote sensing (RS) from Earth-observing satellites offer opportunities for rapid assessment of areas endemic for vector-borne diseases including estimates of p...
DYNAMIC MISSION PLANNING TECHNOLOGY OF REMOTE SENSING SATELLITE FOR DISASTER SURVEILLANCE
Remote Sensing Satellite Disaster Surveillance Dynamic Mission Planning Heuristics Search
2016/3/17
The mission planning problem of remote sensing satellites for emergency missions is investigated. A dynamic mission planning technology is introduced to solve the problem. For generating the newplan a...
国际媒介与传播研究学会2016年会会前会“算法通信时代的监测安全”(Surveillance and Security in the Age of Algorithmic Communication an IAMCR 2016 pre-conference)
国际媒介与传播研究学会 年会 算法通信时代的监测安全
2016/3/9
Conference description: What is the future for surveillance and data security as our world is increasingly structured by algorithmic decision-making, artificial intelligence, the internet of things, a...
Security of Symmetric Encryption against Mass Surveillance
Algorithm-substitution attacks big brother kleptography
2016/1/9
Motivated by revelations concerning population-wide surveillance of encrypted communications,
we formalize and investigate the resistance of symmetric encryption schemes to mass surveillance. The foc...
Security of Linear Secret-Sharing Schemes against Mass Surveillance
linear secret-sharing algorithm-substitution attack mass surveillance
2015/12/29
Following the line of work presented recently by Bellare, Paterson
and Rogaway, we formalize and investigate the resistance of linear
secret-sharing schemes to mass surveillance. This primitive is w...
GEOSPATIAL INFORMATICS TECHNIQUES BASED REPRODUCTIVE HEALTH SURVEILLANCE SYSTEM
Statistics Geospatial Informatics Techniques Analysis Thematic mapping Integration Programming Software
2015/12/26
Reproductive health has been paid more attention by international society since the concept was put forward in the International Conference on Population and Development (ICPD) in Cairo, Egypt in 1994...
A More Cautious Approach to Security Against Mass Surveillance
Mass surveillance algorithm-substitution attack symmetric encryption
2015/12/24
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of
symmetric encryption in the light of algorithm-substitution attacks (ASAs), which may be employed
by ‘big brother’...
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
algorithm substitution attacks kleptography symmetric encryption
2015/12/24
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior ones in two ways. First, while prior attacks only broke a sub-class of randomized schemes having a ...