1,842 research outputs found

    A review on intelligent monitoring and activity interpretation

    Get PDF
    This survey paper provides a tour of the various monitoring and activity interpretation frameworks found in the literature. The needs of monitoring and interpretation systems are presented in relation to the area where they have been developed or applied. Their evolution is studied to better understand the characteristics of current systems. After this, the main features of monitoring and activity interpretation systems are defined.Este trabajo presenta una revisión de los marcos de trabajo para monitorización e interpretación de actividades presentes en la literatura. Dependiendo del área donde dichos marcos se han desarrollado o aplicado, se han identificado diferentes necesidades. Además, para comprender mejor las particularidades de los marcos de trabajo, esta revisión realiza un recorrido por su evolución histórica. Posteriormente, se definirían las principales características de los sistemas de monitorización e interpretación de actividades.This work was partially supported by Spanish Ministerio de Economía y Competitividad / FEDER under DPI2016-80894-R grant

    A Review on Intelligent Monitoring and Activity Interpretation

    Get PDF

    Framework for integrated oil pipeline monitoring and incident mitigation systems

    Get PDF
    Wireless Sensor Nodes (motes) have witnessed rapid development in the last two decades. Though the design considerations for Wireless Sensor Networks (WSNs) have been widely discussed in the literature, limited investigation has been done for their application in pipeline surveillance. Given the increasing number of pipeline incidents across the globe, there is an urgent need for innovative and effective solutions for deterring the incessant pipeline incidents and attacks. WSN pose as a suitable candidate for such solutions, since they can be used to measure, detect and provide actionable information on pipeline physical characteristics such as temperature, pressure, video, oil and gas motion and environmental parameters. This paper presents specifications of motes for pipeline surveillance based on integrated systems architecture. The proposed architecture utilizes a Multi-Agent System (MAS) for the realization of an Integrated Oil Pipeline Monitoring and Incident Mitigation System (IOPMIMS) that can effectively monitor and provide actionable information for pipelines. The requirements and components of motes, different threats to pipelines and ways of detecting such threats presented in this paper will enable better deployment of pipeline surveillance systems for incident mitigation. It was identified that the shortcomings of the existing wireless sensor nodes as regards their application to pipeline surveillance are not effective for surveillance systems. The resulting specifications provide a framework for designing a cost-effective system, cognizant of the design considerations for wireless sensor motes used in pipeline surveillance

    Code, space and everyday life

    Get PDF
    In this paper we examine the role of code (software) in the spatial formation of collective life. Taking the view that human life and coded technology are folded into one another, we theorise space as ontogenesis. Space, we posit, is constantly being bought into being through a process of transduction – the constant making anew of a domain in reiterative and transformative practices - as an incomplete solution to a relational problem. The relational problem we examine is the ongoing encounter between individuals and environment where the solution, to a greater or lesser extent, is code. Code, we posit, is diversely embedded in collectives as coded objects, coded infrastructure, coded processes and coded assemblages. These objects, infrastructure, processes and assemblages possess technicity, that is, unfolding or evolutive power to make things happen; the ability to mediate, supplement, augment, monitor, regulate, operate, facilitate, produce collective life. We contend that when the technicity of code is operationalised it transduces one of three forms of hybrid spatial formations: code/space, coded space and backgrounded coded space. These formations are contingent, relational, extensible and scaleless, often stretched out across networks of greater or shorter length. We demonstrate the coded transduction of space through three vignettes – each a day in the life of three people living in London, UK, tracing the technical mediation of their interactions, transactions and mobilities. We then discuss how code becomes the relational solution to five different classes of problems – domestic living, travelling, working, communicating, and consuming

    Small unmanned airborne systems to support oil and gas pipeline monitoring and mapping

    Get PDF
    Acknowledgments We thank Johan Havelaar, Aeryon Labs Inc., AeronVironment Inc. and Aeronautics Inc. for kindly permitting the use of materials in Fig. 1.Peer reviewedPublisher PD

    Key technologies for safe and autonomous drones

    Get PDF
    Drones/UAVs are able to perform air operations that are very difficult to be performed by manned aircrafts. In addition, drones' usage brings significant economic savings and environmental benefits, while reducing risks to human life. In this paper, we present key technologies that enable development of drone systems. The technologies are identified based on the usages of drones (driven by COMP4DRONES project use cases). These technologies are grouped into four categories: U-space capabilities, system functions, payloads, and tools. Also, we present the contributions of the COMP4DRONES project to improve existing technologies. These contributions aim to ease drones’ customization, and enable their safe operation.This project has received funding from the ECSEL Joint Undertaking (JU) under grant agreement No 826610. The JU receives support from the European Union’s Horizon 2020 research and innovation programme and Spain, Austria, Belgium, Czech Republic, France, Italy, Latvia, Netherlands. The total project budget is 28,590,748.75 EUR (excluding ESIF partners), while the requested grant is 7,983,731.61 EUR to ECSEL JU, and 8,874,523.84 EUR of National and ESIF Funding. The project has been started on 1st October 2019

    Understanding Metro Station Usage using Closed Circuit Television Cameras Analysis

    Get PDF
    In this paper, we propose to show how video data available in standard CCTV transportation systems can represent a useful source of information for transportation infrastructure management, optimization and planning if adequately analyzed (e.g. to facilitate equipment usage understanding, to ease diagnostic and planning for system managers). More precisely, we present two algorithms allowing to estimate the number of people in a camera view and to measure the platform time-occupancy by trains. A statistical analysis of the results of each algorithm provide interesting insights regarding station usage. It is also shown that combining information from the algorithms in different views provide a finer understanding of the station usage. An end-user point of view confirms the interest of the proposed analysis

    Securing the Everyday City: The Emerging Geographies of Counter-Terrorism

    Get PDF
    This thesis investigates the presence of counter-terrorist security within the everyday life of cities. It emerges from, and contributes to, ongoing debates concerning the place of security in contemporary urbanism, and discussions regarding the increased saturation of urban spaces with a diverse range of security interventions. Drawing on this work, this thesis argues that in order to better understand the urban geographies of security, instead of exclusively conceiving security as only imposed on urban spaces, we must ask how processes of securing cities are ʻlivedʼ. In doing so this study responds to the lack of attention to the complex relations between processes of security and lived everyday urban life. This thesis explores the neglected everyday life of security through a case study of an emerging form of counter-terrorist security apparatus within cities in the UK, examining the broadening of the National Security Strategy of the United Kingdom and the continuing development of CONTEST, the United Kingdomʼs counter-terrorist strategy. Taking London as a named example, the study concentrates on the security interventions of two research sites, the Southbank and Bankside area of the South Bank, and the Victoria Line of the London Underground, to examine how security addresses the everyday life of the city and how such practices are experienced as part of lived everyday urban life. In sum, this thesis focuses, first, on the processes through which the everyday city is secured and, second, it draws attention to and describes how those processes of securing are encountered and enacted, as they become part of the everyday life of cities
    corecore