2010
DOI: 10.1007/s10796-010-9255-z
|View full text |Cite
|
Sign up to set email alerts
|

Effective distributed service architecture for ubiquitous video surveillance

Abstract: Video surveillance systems are playing an important role to protect lives and assets of individuals, enterprises and governments. Due to the prevalence of wired and wireless access to Internet, it would be a trend to integrate present isolated video surveillance systems by applying distributed computing environment and to further gestate diversified multimedia intelligent surveillance (MIS) applications in ubiquity. In this paper, we propose a distributed and secure architecture for ubiquitous video surveillan… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Δ in (4) is the deviation between S_tar and S_cur obtained from each sensor. D in (5) is a set of positive values of Δ. h in (6) is the number of elements in D. Equation (6) calculates the average deviation between S_tar and S_cur only for sensors that do not reach the target score. According to these equations, the larger the d, the larger the σ in N, and the larger the increase or decrease control values of devices are selected stochastically.…”
Section: B Methods Of Calculating Actuator Control Valuementioning
confidence: 99%
See 1 more Smart Citation
“…Δ in (4) is the deviation between S_tar and S_cur obtained from each sensor. D in (5) is a set of positive values of Δ. h in (6) is the number of elements in D. Equation (6) calculates the average deviation between S_tar and S_cur only for sensors that do not reach the target score. According to these equations, the larger the d, the larger the σ in N, and the larger the increase or decrease control values of devices are selected stochastically.…”
Section: B Methods Of Calculating Actuator Control Valuementioning
confidence: 99%
“…CPS processes real-world information with powerful computing resources in cyberspace and reflects the result in real-world actions. CPS includes, for example, smart grids [4], healthcare [5], video surveillance systems involving real-time analysis of camera images [6], and vehicle systems using car sensors [7]. The utilization domain of CPS will expand in the future, then various services that use a variety of devices indoors and outdoors such as office and street will increase.…”
Section: Introductionmentioning
confidence: 99%
“…Li, Wu, Karanam, and Radke, 2014 considers person re-detection in an airport environment; while Arroyo, Yebes, Bergasa, Daza, and Almazán, 2015 consider suspicious behaviour detection in a shopping mall). Similarly, when considering the system wide implications of video surveillance, the literature has focussed on aspects such as the data and networking requirements of such large scale systems (Ajiboye, Birch, Chatwin, & Young, 2015;Chang, Wang, Wang, Liu, & Ho, 2012); interfaces to retrieve and display results (Ye, Liao, Dong, Zeng, & Zhong, 2015); or the needs of researchers and developers to aid in the development of such techniques (Nazare, dos Santos, Ferreira, & Robson Schwartz, 2014).…”
Section: Introductionmentioning
confidence: 99%
“…Despite significant benefit these systems provide, they tend to reach their limit in terms of scalability, resource utilization, ubiquitous access, searching, processing, and storage when large-scale surveillance support is required. In order to overcome this situation, a new breed of cloud-based surveillance systems has just started to emerge [4][5][6][7], which utilize the enormous processing capability, storage, and other resources provided by the cloud infrastructure.…”
Section: Introductionmentioning
confidence: 99%