TITLE

Adaptive video communication for an intelligent distributed system: Tuning sensors parameters for surveillance purposes

AUTHOR(S)
Micheloni, Christian; Lestuzzi, Marco; Foresti, Gian Luca
PUB. DATE
December 2008
SOURCE
Machine Vision & Applications;Dec2008, Vol. 19 Issue 5/6, p359
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Surveillance systems include a large set of techniques for both low level and high level tasks. In particular, in the last decade the research community has witnessed a high proliferation of techniques that span from object detection and tracking to object recognition and event understanding. Although some techniques have been proved to be very effective, those tasks cannot be considered solved. Even less, we can consider concluded the research in the field of the analysis of the activities (event analysis). It is this topic together with the problem of the information sharing among different sensors that represents the core of this work. Here, a system architecture for a video surveillance system with distributed intelligence over multiple processing units and with distributed communication over multiple heterogeneous channels (wireless, satellite, local IP networks, etc.) is proposed. A new real-time technique for changing the video transmission parameters (e.g., frame rate, spatial/colour resolution, etc.) according to the available bandwidth (which depends on the number of the detected alarm situations, on the required video quality, etc.) will be presented.
ACCESSION #
34560970

 

Related Articles

  • Dantel still looking to marry up. McElligott, Tim // Telephony;6/4/2007 Supplement, Vol. 248, p14 

    The article discusses the monitoring and surveillance systems developed by Dantel Inc. With the out-of-band remote access, Dantel has created a new remote monitoring and communication system Disaster Resistant Event Network (DREN), which is designed to catch and transport critical event data...

  • METHODS OF SHARED KEY AGREEMENT IN COHERENT MULTIPLEXING. Ajung Kim // Modern Physics Letters B;7/10/2004, Vol. 18 Issue 16, p833 

    A method of shared secret key distribution applicable to optical coherent multiplexing systems is proposed. It provides ways to detect the extent of eavesdropping. Detecting test factors and system design rules are suggested, and performance evaluation is performed in terms of mutual information...

  • Video, Power & Control. Herman, Jeffrey // Security: Solutions for Enterprise Security Leaders;Mar2005, Vol. 42 Issue 3, p68 

    Reports on the technological changes taking place in the security video cabling industry in the U.S. Migration from traditional coaxial cable toward copper twisted pair; Distance performance of analog security video cameras; Use of security video pass-thru video baluns. INSET: Cabling Terms.

  • SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY. MOHANTY, PRABHUDUTTA; PANIGRAHI, SANGRAM; SARMA, NITYANANDA; SATAPATHY, SIDDHARTHA SANKAR // Journal of Theoretical & Applied Information Technology;3/1/2010, Vol. 13 Issue 1/2, p14 

    Wireless sensor networks are usually deployed for gathering data from unattended or hostile environment. Several application specific sensor network data gathering protocols have been proposed in research literatures. However, most of the proposed algorithms have given little attention to the...

  • MACHINE-TO-MACHINE.  // Aviation Week & Space Technology;9/25/2006, Vol. 165 Issue 12, p73 

    This article focuses on the significance of airborne networking to improve intelligence, surveillance and reconnaissance sensor platforms in the battlefield. This promises to shorten the time required to find, identify and attack fleeting time-critical targets. Airborne networking that allows...

  • Head Above Water.  // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p42 

    Reports on the use of security equipment including video surveillance to guard ships and port facilities. Use of specialty sensors positioned along channels and port entryways to small unmanned aircraft configured with day and night cameras; Number of coastal and interwaterway ports in the U.S....

  • Time efficient ghost removal for motion detection in visual surveillance systems. Yin, F.; Makris, D.; Velastin, S. A. // Electronics Letters;11/6/2008, Vol. 44 Issue 23, p1351 

    The problem of ‘ghosts’ that appear on foreground/background separation methods is investigated. The contribution provided is a fast and effective algorithm for ghost detection and removal, that can be integrated to any motion detection system that estimates a difference map between...

  • Secure phone calls.  // Management Services;Mar1993, Vol. 37 Issue 3, p40 

    For the executive who regularly exchanges sensitive information and is known to do so by potential snoopies, a secure telephone, the Sectel 9600, has been introduced by Motorola Inc. This is a secure voice/data terminal using normal two-wire connections and capable of handling clear or secure...

  • ON THE MARKET.  // Security: Solutions for Enterprise Security Leaders;Apr99, Vol. 36 Issue 4, p51 

    Features several monitoring and communications security systems. PowerCode series of supervised wireless prodcuts from Visonic; Vehicle security system from PageAlarm; Motion detector from Texecom and Elk Products.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics