2020
DOI: 10.4018/978-1-7998-1290-6.ch006
|View full text |Cite
|
Sign up to set email alerts
|

Image Processing and Post-Data Mining Processing for Security in Industrial Applications

Abstract: The chapter analyzes scientific approaches suitable for industrial security involving environment health monitoring and safety production control. In particular, it discusses data mining algorithms able to add hidden information important for security improvement. In particular k-means and artificial intelligence algorithms are applied in different cases of study by discussing the procedures useful to set the model including image processing and post clustering processing facilities. The chapter is focused on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…In food factory the blockchain could guarantee the product quality by integrating traceability information and quality test results. Concerning food quality processes BC can be also a tool suitable to map product defects within a defined tolerance: product defects detection can be supported by image vision techniques [33], [36], [38]. In Fig.…”
Section: Discussionmentioning
confidence: 99%
“…In food factory the blockchain could guarantee the product quality by integrating traceability information and quality test results. Concerning food quality processes BC can be also a tool suitable to map product defects within a defined tolerance: product defects detection can be supported by image vision techniques [33], [36], [38]. In Fig.…”
Section: Discussionmentioning
confidence: 99%
“…Built-in video cameras, particularly front-facing digital cameras, are now more common in mobile phones. Facial biometric authentication has become very popular compared to the optical fingerprint recognition component in cell phones, such as in the approach of [49,50]. The works related to e-wallets and their findings are shown in Table 1.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Data security is an important research topic in industry research [1]. Concerning this topic, multimedia platforms could be easily attacked in al cyberspace environments.…”
Section: Introductionmentioning
confidence: 99%