搜索结果: 1-15 共查到“知识库 Surveillance”相关记录70条 . 查询时间(0.062 秒)
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
Privacy Authentication Forward-secure signature
2018/12/19
As surveillance systems are popular, the privacy of the recorded video becomes more important. On the other hand, the authenticity of video images should be guaranteed when used as evidence in court. ...
EXTRACTING 3D SEMANTIC INFORMATION FROM VIDEO SURVEILLANCE SYSTEM USING DEEP LEARNING
3-D space Camera calibration Target recognition Target tracking
2018/5/16
At present, intelligent video analysis technology has been widely used in various fields. Object tracking is one of the important part of intelligent video surveillance, but the traditional target tra...
SCHISTOSOMIASIS:GEOSPATIAL SURVEILLANCE AND RESPONSE SYSTEMS IN SOUTHEAST ASIA
Neglected tropical diseases (NTD) surveillance and response schistosomiasis elimination
2016/12/1
Geographic information system (GIS) and remote sensing (RS) from Earth-observing satellites offer opportunities for rapid assessment of areas endemic for vector-borne diseases including estimates of p...
DYNAMIC MISSION PLANNING TECHNOLOGY OF REMOTE SENSING SATELLITE FOR DISASTER SURVEILLANCE
Remote Sensing Satellite Disaster Surveillance Dynamic Mission Planning Heuristics Search
2016/3/17
The mission planning problem of remote sensing satellites for emergency missions is investigated. A dynamic mission planning technology is introduced to solve the problem. For generating the newplan a...
Security of Symmetric Encryption against Mass Surveillance
Algorithm-substitution attacks big brother kleptography
2016/1/9
Motivated by revelations concerning population-wide surveillance of encrypted communications,
we formalize and investigate the resistance of symmetric encryption schemes to mass surveillance. The foc...
Security of Linear Secret-Sharing Schemes against Mass Surveillance
linear secret-sharing algorithm-substitution attack mass surveillance
2015/12/29
Following the line of work presented recently by Bellare, Paterson
and Rogaway, we formalize and investigate the resistance of linear
secret-sharing schemes to mass surveillance. This primitive is w...
GEOSPATIAL INFORMATICS TECHNIQUES BASED REPRODUCTIVE HEALTH SURVEILLANCE SYSTEM
Statistics Geospatial Informatics Techniques Analysis Thematic mapping Integration Programming Software
2015/12/26
Reproductive health has been paid more attention by international society since the concept was put forward in the International Conference on Population and Development (ICPD) in Cairo, Egypt in 1994...
A More Cautious Approach to Security Against Mass Surveillance
Mass surveillance algorithm-substitution attack symmetric encryption
2015/12/24
At CRYPTO 2014 Bellare, Paterson, and Rogaway (BPR) presented a formal treatment of
symmetric encryption in the light of algorithm-substitution attacks (ASAs), which may be employed
by ‘big brother’...
Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks
algorithm substitution attacks kleptography symmetric encryption
2015/12/24
We present new algorithm-substitution attacks (ASAs) on symmetric encryption that improve over prior ones in two ways. First, while prior attacks only broke a sub-class of randomized schemes having a ...
Automated Visual Traffic Monitoring and Surveillance Through a Network of Distributed Units
Computer Vision Visual Analysis Fusion Location Based Services Calibration Change Detection Matching
2015/12/9
This work aims to present an intelligent system for tracking moving targets (such as vehicles, persons etc) based on a network of distributed autonomous units that capture and process images from one ...
A Collaborative Epidemical Surveillance and Response System Based on GIS and Information Technique
Bayesian Analysis Collaborative C/S Epidemiology GIS Response
2015/11/23
Since the manual operations of traditional epidemical surveillance and response are excessive, there are obvious drawbacks of sensitiveness and effectiveness during the process of surveillance and res...
Exploiting ground-based optical sensing technologies for volcanic gas surveillance
volcano monitoring volcano plumes IR and UV spectoscopy
2015/9/15
Measurements of volcanic gas composition and flux are crucial to probing and understanding a range of magmatic,
hydrothermal and atmospheric interactions. The value of optical remote sensing methods ...
Monitoring of fumarole discharge and CO2 soil degassing in the Azores: contribution to volcanic surveillance and public health risk assessment
volcanology geochemistry soil degassing monitoring risk
2015/9/10
Fluid geochemistry monitoring in the Azores involves the regular sampling and analysis of gas discharges from
fumaroles and measurements of CO2 diffuse soil gas emissions. Main degassing areas under ...
Society's Most Vulnerable Under Surveillance: The Ethics of Tagging and Tracking Dementia Patients With GPS Technology: A Comparative View
Tagging and Tracking Dementia Patients Surveillance
2015/8/4
The twentieth century was marked by an explosion of human rights, what Irwin Cotler eloquently deems the "secular religion of our times"4. Endeavouring to protect society's most vulnerable – children,...
Religious differences in child vaccination rates in urban Africa:Comparison of population surveillance data from Ouagadougou,Burkina Faso
Vaccination Religion Child Ouagadougou Burkina Faso
2015/7/24
Many studies have shown a significant relationship between religion and health in Western countries. In developing countries, however, there is a dearth of scientific studies on the matter. Using data...