295 resultados para Multi-camera networks
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.
Resumo:
This paper discusses the idea and demonstrates an early prototype of a novel method of interacting with security surveillance footage using natural user interfaces in place of traditional mouse and keyboard interaction. Current surveillance monitoring stations and systems provide the user with a vast array of video feeds from multiple locations on a video wall, relying on the user’s ability to distinguish locations of the live feeds from experience or list based key-value pair of location and camera IDs. During an incident, this current method of interaction may cause the user to spend increased amounts time obtaining situational and location awareness, which is counter-productive. The system proposed in this paper demonstrates how a multi-touch screen and natural interaction can enable the surveillance monitoring station users to quickly identify the location of a security camera and efficiently respond to an incident.
Resumo:
This paper presents a method for the continuous segmentation of dynamic objects using only a vehicle mounted monocular camera without any prior knowledge of the object’s appearance. Prior work in online static/dynamic segmentation is extended to identify multiple instances of dynamic objects by introducing an unsupervised motion clustering step. These clusters are then used to update a multi-class classifier within a self-supervised framework. In contrast to many tracking-by-detection based methods, our system is able to detect dynamic objects without any prior knowledge of their visual appearance shape or location. Furthermore, the classifier is used to propagate labels of the same object in previous frames, which facilitates the continuous tracking of individual objects based on motion. The proposed system is evaluated using recall and false alarm metrics in addition to a new multi-instance labelled dataset to evaluate the performance of segmenting multiple instances of objects.
Resumo:
Person re-identification is particularly challenging due to significant appearance changes across separate camera views. In order to re-identify people, a representative human signature should effectively handle differences in illumination, pose and camera parameters. While general appearance-based methods are modelled in Euclidean spaces, it has been argued that some applications in image and video analysis are better modelled via non-Euclidean manifold geometry. To this end, recent approaches represent images as covariance matrices, and interpret such matrices as points on Riemannian manifolds. As direct classification on such manifolds can be difficult, in this paper we propose to represent each manifold point as a vector of similarities to class representers, via a recently introduced form of Bregman matrix divergence known as the Stein divergence. This is followed by using a discriminative mapping of similarity vectors for final classification. The use of similarity vectors is in contrast to the traditional approach of embedding manifolds into tangent spaces, which can suffer from representing the manifold structure inaccurately. Comparative evaluations on benchmark ETHZ and iLIDS datasets for the person re-identification task show that the proposed approach obtains better performance than recent techniques such as Histogram Plus Epitome, Partial Least Squares, and Symmetry-Driven Accumulation of Local Features.
Resumo:
Large arrays and networks of carbon nanotubes, both single- and multi-walled, feature many superior properties which offer excellent opportunities for various modern applications ranging from nanoelectronics, supercapacitors, photovoltaic cells, energy storage and conversation devices, to gas- and biosensors, nanomechanical and biomedical devices etc. At present, arrays and networks of carbon nanotubes are mainly fabricated from the pre-fabricated separated nanotubes by solution-based techniques. However, the intrinsic structure of the nanotubes (mainly, the level of the structural defects) which are required for the best performance in the nanotube-based applications, are often damaged during the array/network fabrication by surfactants, chemicals, and sonication involved in the process. As a result, the performance of the functional devices may be significantly degraded. In contrast, directly synthesized nanotube arrays/networks can preclude the adverse effects of the solution-based process and largely preserve the excellent properties of the pristine nanotubes. Owing to its advantages of scale-up production and precise positioning of the grown nanotubes, catalytic and catalyst-free chemical vapor depositions (CVD), as well as plasma-enhanced chemical vapor deposition (PECVD) are the methods most promising for the direct synthesis of the nanotubes.
Resumo:
School connectedness is central to the long term well-being of adolescents, and high quality parent-child relationships facilitate school connectedness. This study examined the extent to which family relationship quality is associated with the school connectedness of pre- and early teenagers, and how this association varies with adolescent involvement in peer drinking networks. The sample consisted of 7,372 10-14 year olds recruited from 231 schools in 30 Australian communities. Participants completed the Communities that Care youth survey. A multi-level model of school connectedness was used, with a random term for school-level variation. Key independent variables included family relationship quality, peer drinking networks, and school grade. Control variables included child gender, sensation seeking, depression, child alcohol use, parent education, and language spoken at home. For grade 6 students, the association of family relationship quality and school connectedness was lower when peer drinking networks were present, and this effect was nonsignificant for older (grade 8) students. Post hoc analyses indicated that the effect for family relationship quality on school connectedness was nonsignificant when adolescents in grade 6 reported that the majority of friends consumed alcohol. The results point to the importance of familyschool partnerships in early intervention and prevention.
Resumo:
Organisations employ Enterprise Social Networks (ESNs) (such as Yammer) expecting better intra-organisational communication and collaboration. However, ESNs are struggling to gain momentum and wide adoption among users. Promoting user participation is a challenge, particularly in relation to lurkers – the silent ESN members who do not contribute any content. Building on behaviour change research, we propose a three-route model consisting of the central, peripheral and coercive routes of influence that depict users’ cognitive strategies, and we examine how management interventions (e.g. sending promotional emails) impact users’ beliefs and (consequent) posting and lurking behaviours in ESNs. Furthermore, we identify users’ salient motivations to lurk or post. We employ a multi-method research design to conceptualise, operationalise and validate the research model. This study has implications for academics and practitioners regarding the nature, patterns and outcomes of management interventions in prompting ESN.
Resumo:
This research is a step forward in improving the accuracy of detecting anomaly in a data graph representing connectivity between people in an online social network. The proposed hybrid methods are based on fuzzy machine learning techniques utilising different types of structural input features. The methods are presented within a multi-layered framework which provides the full requirements needed for finding anomalies in data graphs generated from online social networks, including data modelling and analysis, labelling, and evaluation.
Resumo:
It is well known that, for major infrastructure networks such as electricity, gas, railway, road, and urban water networks, disruptions at one point have a knock on effect throughout the network. There is an impressive amount of individual research projects examining the vulnerability of critical infrastructure network. However, there is little understanding of the totality of the contribution made by these projects and their interrelationships. This makes their review a difficult process for both new and existing researchers in the field. To address this issue, a two-step literature review process is used, to provide an overview of the vulnerability of the transportation network in terms of four main themes - research objective, transportation mode, disruption scenario and vulnerability indicator –involving the analysis of related articles from 2001 to 2013. Two limitations of existing research are identified: (1) the limited amount of studies relating to multi-layer transportation network vulnerability analysis, and (2) the lack of evaluation methods to explore the relationship between structure vulnerability and dynamical functional vulnerability. In addition to indicating that more attention needs to be paid to these two aspects in future, the analysis provides a new avenue for the discovery of knowledge, as well as an improved understanding of transportation network vulnerability.
Resumo:
This thesis introduces a method of applying Bayesian Networks to combine information from a range of data sources for effective decision support systems. It develops a set of techniques in development, validation, visualisation, and application of Complex Systems models, with a working demonstration in an Australian airport environment. The methods presented here have provided a modelling approach that produces highly flexible, informative and applicable interpretations of a system's behaviour under uncertain conditions. These end-to-end techniques are applied to the development of model based dashboards to support operators and decision makers in the multi-stakeholder airport environment. They provide highly flexible and informative interpretations and confidence in these interpretations of a system's behaviour under uncertain conditions.
Resumo:
Vehicle speed is an important attribute for analysing the utility of a transport mode. The speed relationship between multiple modes of transport is of interest to traffic planners and operators. This paper quantifies the relationship between bus speed and average car speed by integrating Bluetooth data and Transit Signal Priority data from the urban network in Brisbane, Australia. The method proposed in this paper is the first of its kind to relate bus speed and average car speed by integrating multi-source traffic data in a corridor-based method. Three transferable regression models relating not-in-service bus, in-service bus during peak periods, and in-service bus during off-peak periods with average car speed are proposed. The models are cross-validated and the interrelationships are significant.
Resumo:
This thesis focused upon the development of improved capacity analysis and capacity planning techniques for railways. A number of innovations were made and were tested on a case study of a real national railway. These techniques can reduce the time required to perform decision making activities that planners and managers need to perform. As all railways need to be expanded to meet increasing demands, the presumption that analytical capacity models can be used to identify how best to improve an existing network at least cost, was fully investigated. Track duplication was the mechanism used to expanding a network's capacity, and two variant capacity expansion models were formulated. Another outcome of this thesis is the development and validation of bi objective models for capacity analysis. These models regulate the competition for track access and perform a trade-off analysis. An opportunity to develop more general mulch-objective approaches was identified.
Resumo:
This paper presents a feasibility study on structural damage alarming and localization of long-span cable-supported bridges using multi-novelty indices formulated by monitoring-derived modal parameters. The proposed method which requires neither structural model nor damage model is applicable to structures of arbitrary complexity. With the intention to enhance the tolerance to measurement noise/uncertainty and the sensitivity to structural damage, an improved novelty index is formulated in terms of auto-associative neural networks (ANNs) where the output vector is designated to differ from the input vector while the training of the ANNs needs only the measured modal properties of the intact structure under in-service conditions. After validating the enhanced capability of the improved novelty index for structural damage alarming over the commonly configured novelty index, the performance of the improved novelty index for damage occurrence detection of large-scale bridges is examined through numerical simulation studies of the suspension Tsing Ma Bridge (TMB) and the cable-stayed Ting Kau Bridge (TKB) incurred with different types of structural damage. Then the improved novelty index is extended to formulate multi-novelty indices in terms of the measured modal frequencies and incomplete modeshape components for damage region identification. The capability of the formulated multi-novelty indices for damage region identification is also examined through numerical simulations of the TMB and TKB.
Resumo:
Background As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow significantly. Such use of medical images raises serious concerns for their continuous security protection, which digital watermarking has shown great potential to address. Methods We present a content-independent embedding scheme for medical image watermarking. We observe that the perceptual content of medical images varies widely with their modalities. Recent medical image watermarking schemes are image-content dependent and thus they may suffer from inconsistent embedding capacity and visual artefacts. To attain the image content-independent embedding property, we generalise RONI (region of non-interest, to the medical professionals) selection process and use it for embedding by utilising RONI’s least significant bit-planes. The proposed scheme thus avoids the need for RONI segmentation that incurs capacity and computational overheads. Results Our experimental results demonstrate that the proposed embedding scheme performs consistently over a dataset of 370 medical images including their 7 different modalities. Experimental results also verify how the state-of-the-art reversible schemes can have an inconsistent performance for different modalities of medical images. Our scheme has MSSIM (Mean Structural SIMilarity) larger than 0.999 with a deterministically adaptable embedding capacity. Conclusions Our proposed image-content independent embedding scheme is modality-wise consistent, and maintains a good image quality of RONI while keeping all other pixels in the image untouched. Thus, with an appropriate watermarking framework (i.e., with the considerations of watermark generation, embedding and detection functions), our proposed scheme can be viable for the multi-modality medical image applications and distant medical services such as teleradiology and eHealth.
Resumo:
This article contributes to the theorization of the role of informal regulation (undertaken by leading firms) in the ongoing organization of global production networks. It does so through a qualitative case study of BHP Billiton's Ravensthorpe Nickel Operation (RNO) in the rural Shire of Ravensthorpe in Western Australia. This less tangible, and to date under-researched, dimension of global production networks is foregrounded through a focus on the corporate social responsibility strategy implemented by RNO in the service of achieving and/or demonstrating a broader ‘social licence to operate’. This ‘licence’ functions – beyond the corporation – as a legitimated and legitimating multi-scalar mechanism through which to gain and maintain access to mineral resources and thus to establish viable and ongoing global production networks. Further, this informal regulation is shown to shape social relations and qualities of place conducive to competitive global mineral extraction and to facilitate the positioning of local communities and places in mineral global production networks.