2017
DOI: 10.1002/cpe.4408
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent approaches for security technologies

Abstract: These days, processed data size has been increasing and has grown exponentially, that is, not only text data but especially multimedia data with visual and auditory information. Such data may be generated by humans but also by many sources and technical equipment including IoT (Internet of Things) nodes. Intelligent technologies developed for representing the natural way of human thinking have a semantic gap between low level and high level information processing stages. Many research studies for reducing sema… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
4
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Due to the insufficient performance of huge training samples in paper [17], the weighted orthogonal matching pursuit was adopted in [18] to improve the ability of the model for handling large samples. With suitable communication technology, the anomaly detection method can used for application [19,20]. The main limitation of the motion based approach is that it cannot detect abnormal events with a sequence of similar normal actions, and it cannot distinguish among the appearance characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…Due to the insufficient performance of huge training samples in paper [17], the weighted orthogonal matching pursuit was adopted in [18] to improve the ability of the model for handling large samples. With suitable communication technology, the anomaly detection method can used for application [19,20]. The main limitation of the motion based approach is that it cannot detect abnormal events with a sequence of similar normal actions, and it cannot distinguish among the appearance characteristics.…”
Section: Related Workmentioning
confidence: 99%
“…The “things” or devices are recognizable and acquire “intelligence” thanks to the fact of being able to communicate information about themselves and access to aggregated information from other “things” and people . The continuous exchange of information between man‐man, machine‐machine, and machine‐man inevitably produces a huge amount of data, which demands analyses of data using unconventional methods within a Big Data context . This leads us to pose some questions, ie, How can we properly process these data?…”
Section: Introductionmentioning
confidence: 99%
“…3 The continuous exchange of information between man-man, machine-machine, and machine-man inevitably produces a huge amount of data, which demands analyses of data using unconventional methods within a Big Data context. [4][5][6] This leads us to pose some questions, ie, How can we properly process these data? How properly use these data in order to increase the competitiveness and efficiency of services, and how could they contribute to social development?…”
mentioning
confidence: 99%
“…Finally, we would like to express our sincere appreciation for the valuable contributions made by all the authors. Our special thanks go to Professor Geoffrey C. fox , the Editor in Chief of the Concurrency and Computation: Practice and Experience Journal, for allowing us to publish this Special Issue and for his great support throughout the entire publication process 16 …”
mentioning
confidence: 99%