1,842 research outputs found
A review on intelligent monitoring and activity interpretation
This survey paper provides a tour of the various monitoring and activity interpretation frameworks found in the literature. The needs of monitoring and interpretation systems are presented in relation to the area where they have been developed or applied. Their evolution is studied to better understand the characteristics of current systems. After this, the main features of monitoring and activity interpretation systems are defined.Este trabajo presenta una revisión de los marcos de trabajo para monitorización e interpretación de actividades presentes en la literatura. Dependiendo del área donde dichos marcos se han desarrollado o aplicado, se han identificado diferentes necesidades. Además, para comprender mejor las particularidades de los marcos de trabajo, esta revisión realiza un recorrido por su evolución histórica. Posteriormente, se definirían las principales características de los sistemas de monitorización e interpretación de actividades.This work was partially supported by Spanish Ministerio de Economía y Competitividad / FEDER under DPI2016-80894-R grant
Framework for integrated oil pipeline monitoring and incident mitigation systems
Wireless Sensor Nodes (motes) have witnessed rapid development in the last two decades. Though the design considerations for Wireless Sensor Networks (WSNs) have been widely discussed in the literature, limited investigation has been done for their application in pipeline surveillance. Given the increasing number of pipeline incidents across the globe, there is an urgent need for innovative and effective solutions for deterring the incessant pipeline incidents and attacks. WSN pose as a suitable candidate for such solutions, since they can be used to measure, detect and provide actionable information on pipeline physical characteristics such as temperature, pressure, video, oil and gas motion and environmental parameters. This paper presents specifications of motes for pipeline surveillance based on integrated systems architecture. The proposed architecture utilizes a Multi-Agent System (MAS) for the realization of an Integrated Oil Pipeline Monitoring and Incident Mitigation System (IOPMIMS) that can effectively monitor and provide actionable information for pipelines. The requirements and components of motes, different threats to pipelines and ways of detecting such threats presented in this paper will enable better deployment of pipeline surveillance systems for incident mitigation. It was identified that the shortcomings of the existing wireless sensor nodes as regards their application to pipeline surveillance are not effective for surveillance systems. The resulting specifications provide a framework for designing a cost-effective system, cognizant of the design considerations for wireless sensor motes used in pipeline surveillance
Code, space and everyday life
In this paper we examine the role of code (software) in the spatial formation of
collective life. Taking the view that human life and coded technology are folded into
one another, we theorise space as ontogenesis. Space, we posit, is constantly being
bought into being through a process of transduction – the constant making anew of a
domain in reiterative and transformative practices - as an incomplete solution to a
relational problem. The relational problem we examine is the ongoing encounter
between individuals and environment where the solution, to a greater or lesser extent,
is code. Code, we posit, is diversely embedded in collectives as coded objects, coded
infrastructure, coded processes and coded assemblages. These objects, infrastructure,
processes and assemblages possess technicity, that is, unfolding or evolutive power to
make things happen; the ability to mediate, supplement, augment, monitor, regulate,
operate, facilitate, produce collective life. We contend that when the technicity of
code is operationalised it transduces one of three forms of hybrid spatial formations:
code/space, coded space and backgrounded coded space. These formations are
contingent, relational, extensible and scaleless, often stretched out across networks of
greater or shorter length. We demonstrate the coded transduction of space through
three vignettes – each a day in the life of three people living in London, UK, tracing
the technical mediation of their interactions, transactions and mobilities. We then
discuss how code becomes the relational solution to five different classes of problems
– domestic living, travelling, working, communicating, and consuming
Small unmanned airborne systems to support oil and gas pipeline monitoring and mapping
Acknowledgments We thank Johan Havelaar, Aeryon Labs Inc., AeronVironment Inc. and Aeronautics Inc. for kindly permitting the use of materials in Fig. 1.Peer reviewedPublisher PD
Key technologies for safe and autonomous drones
Drones/UAVs are able to perform air operations that are very difficult to be performed by manned aircrafts. In addition, drones' usage brings significant economic savings and environmental benefits, while reducing risks to human life. In this paper, we present key technologies that enable development of drone systems. The technologies are identified based on the usages of drones (driven by COMP4DRONES project use cases). These technologies are grouped into four categories: U-space capabilities, system functions, payloads, and tools. Also, we present the contributions of the COMP4DRONES project to improve existing technologies. These contributions aim to ease drones’ customization, and enable their safe operation.This project has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 826610. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Spain, Austria, Belgium, Czech Republic, France, Italy, Latvia, Netherlands. The total project budget is 28,590,748.75 EUR (excluding ESIF partners), while the requested grant is 7,983,731.61 EUR to ECSEL JU, and 8,874,523.84 EUR of National and ESIF Funding. The project has been started on 1st October 2019
Understanding Metro Station Usage using Closed Circuit Television Cameras Analysis
In this paper, we propose to show how video data available in standard CCTV transportation systems can represent a useful source of information for transportation infrastructure management, optimization and planning if adequately analyzed (e.g. to facilitate equipment usage understanding, to ease diagnostic and planning for system managers). More precisely, we present two algorithms allowing to estimate the number of people in a camera view and to measure the platform time-occupancy by trains. A statistical analysis of the results of each algorithm provide interesting insights regarding station usage. It is also shown that combining information from the algorithms in different views provide a finer understanding of the station usage. An end-user point of view confirms the interest of the proposed analysis
Securing the Everyday City: The Emerging Geographies of Counter-Terrorism
This thesis investigates the presence of counter-terrorist security within the everyday life of cities. It emerges from, and contributes to, ongoing debates concerning the place of security in contemporary urbanism, and discussions regarding the increased saturation of urban spaces with a diverse range of security interventions. Drawing on this work, this thesis argues that in order to better understand the urban geographies of security, instead of exclusively conceiving security as only imposed on urban spaces, we must ask how processes of securing cities are ʻlivedʼ. In doing so this study responds to the lack of attention to the complex relations between processes of security and lived everyday urban life. This thesis explores the neglected everyday life of security through a case study of an emerging form of counter-terrorist security apparatus within cities in the UK, examining the broadening of the National Security Strategy of the United Kingdom and the continuing development of CONTEST, the United Kingdomʼs counter-terrorist strategy. Taking London as a named example, the study concentrates on the security interventions of two research sites, the Southbank and Bankside area of the South Bank, and the Victoria Line of the London Underground, to examine how security addresses the everyday life of the city and how such practices are experienced as part of lived everyday urban life. In sum, this thesis focuses, first, on the processes through which the everyday city is secured and, second, it draws attention to and describes how those processes of securing are encountered and enacted, as they become part of the everyday life of cities
Recommended from our members
Advances in crowd analysis for urban applications through urban event detection
The recent expansion of pervasive computing technology has contributed with novel means to pursue human activities in urban space. The urban dynamics unveiled by these means generate an enormous amount of data. These data are mainly endowed by portable and radio-frequency devices, transportation systems, video surveillance, satellites, unmanned aerial vehicles, and social networking services. This has opened a new avenue of opportunities, to understand and predict urban dynamics in detail, and plan various real-time services and applications in response to that. Over the last decade, certain aspects of the crowd, e.g., mobility, sentimental, size estimation and behavioral, have been analyzed in detail and the outcomes have been reported. This paper mainly conducted an extensive survey on various data sources used for different urban applications, the state-of-the-art on urban data generation techniques and associated processing methods in order to demonstrate their merits and capabilities. Then, available open-access crowd data sets for urban event detection are provided along with relevant application programming interfaces. In addition, an outlook on a support system for urban application is provided which fuses data from all the available pervasive technology sources and finally, some open challenges and promising research directions are outlined
- …