5,731 research outputs found

    Protection of Oil Pipeline Facilities - Practical Experiences from Croatia

    Get PDF
    The paper presents implemented physical security systems on an Oil Pipeline Terminal in Croatia, concept of operations and standardized procedures for an effective critical infrastructure protection solution

    Liberate your avatar; the revolution will be social networked

    Get PDF
    This paper brings together the practice-based creative research of artists Charlotte Gould and Paul Sermon, culminating in a collaborative interactive installation that investigates new forms of social and political narrative in multi-user virtual environments. The authors' artistic projects deal with the ironies and stereotypes that are found within Second Life in particular. Paul Sermon’s current creative practice looks specifically at the concepts of presence and performance within Second Life and 'first life', and attempts to bridge these two spaces through mixed reality techniques and interfaces. Charlotte Gould’s Ludic Second Life Narrative radically questions the way that users embody themselves in on-line virtual environments and identifies a counter-aesthetic that challenges the conventions of digital realism and consumerism. These research activities and outcomes come together within a collaborative site-specific public installation entitled Urban Intersections for ISEA09, focusing on contested virtual spaces that mirror the social and political history of Belfast. The authors' current collaborative practice critically investigates social, cultural and creative interactions in Second Life. Through these practice-based experiments the authors' argue that an enhanced social and cultural discourse within multi-user virtual environments will inevitably lead to growth, cohesion and public empowerment, and like all social networking platforms, contribute to greater social and political change in first life

    Disparity map generation based on trapezoidal camera architecture for multiview video

    Get PDF
    Visual content acquisition is a strategic functional block of any visual system. Despite its wide possibilities, the arrangement of cameras for the acquisition of good quality visual content for use in multi-view video remains a huge challenge. This paper presents the mathematical description of trapezoidal camera architecture and relationships which facilitate the determination of camera position for visual content acquisition in multi-view video, and depth map generation. The strong point of Trapezoidal Camera Architecture is that it allows for adaptive camera topology by which points within the scene, especially the occluded ones can be optically and geometrically viewed from several different viewpoints either on the edge of the trapezoid or inside it. The concept of maximum independent set, trapezoid characteristics, and the fact that the positions of cameras (with the exception of few) differ in their vertical coordinate description could very well be used to address the issue of occlusion which continues to be a major problem in computer vision with regards to the generation of depth map

    Human Motion Trajectory Prediction: A Survey

    Full text link
    With growing numbers of intelligent autonomous systems in human environments, the ability of such systems to perceive, understand and anticipate human behavior becomes increasingly important. Specifically, predicting future positions of dynamic agents and planning considering such predictions are key tasks for self-driving vehicles, service robots and advanced surveillance systems. This paper provides a survey of human motion trajectory prediction. We review, analyze and structure a large selection of work from different communities and propose a taxonomy that categorizes existing methods based on the motion modeling approach and level of contextual information used. We provide an overview of the existing datasets and performance metrics. We discuss limitations of the state of the art and outline directions for further research.Comment: Submitted to the International Journal of Robotics Research (IJRR), 37 page

    MusA: Using Indoor Positioning and Navigation to Enhance Cultural Experiences in a museum

    Get PDF
    In recent years there has been a growing interest into the use of multimedia mobile guides in museum environments. Mobile devices have the capabilities to detect the user context and to provide pieces of information suitable to help visitors discovering and following the logical and emotional connections that develop during the visit. In this scenario, location based services (LBS) currently represent an asset, and the choice of the technology to determine users' position, combined with the definition of methods that can effectively convey information, become key issues in the design process. In this work, we present MusA (Museum Assistant), a general framework for the development of multimedia interactive guides for mobile devices. Its main feature is a vision-based indoor positioning system that allows the provision of several LBS, from way-finding to the contextualized communication of cultural contents, aimed at providing a meaningful exploration of exhibits according to visitors' personal interest and curiosity. Starting from the thorough description of the system architecture, the article presents the implementation of two mobile guides, developed to respectively address adults and children, and discusses the evaluation of the user experience and the visitors' appreciation of these application

    Anonymous subject identification and privacy information management in video surveillance

    Get PDF
    The widespread deployment of surveillance cameras has raised serious privacy concerns, and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. Of equal importance are the privacy and efficiency of techniques to first, identify those individuals for privacy protection and second, provide access to original surveillance video contents for security analysis. In this paper, we propose an anonymous subject identification and privacy data management system to be used in privacy-aware video surveillance. The anonymous subject identification system uses iris patterns to identify individuals for privacy protection. Anonymity of the iris-matching process is guaranteed through the use of a garbled-circuit (GC)-based iris matching protocol. A novel GC complexity reduction scheme is proposed by simplifying the iris masking process in the protocol. A user-centric privacy information management system is also proposed that allows subjects to anonymously access their privacy information via their iris patterns. The system is composed of two encrypted-domain protocols: The privacy information encryption protocol encrypts the original video records using the iris pattern acquired during the subject identification phase; the privacy information retrieval protocol allows the video records to be anonymously retrieved through a GC-based iris pattern matching process. Experimental results on a public iris biometric database demonstrate the validity of our framework

    Electronic Security Systems (ESSs) in Academic Libraries

    Get PDF
    The present paper studies the variety of Electronic Security Systems available for the library environment, including its technological components. The study also includes the positive influence of a security system to secure the library’s day-to-day activities. The opportunities and challenges have also been discussed that influence the implementation of Electronic Security Systems to improve the library facilitates

    Defensive swarm: an agent-based modeling analysis

    Get PDF
    Security at remote military bases is a difficult, yet critical, mission. Remote locations are generally closer to enemy combatants and farther from supporting forces; the individuals charged with defending the bases do so with less equipment. These locations are also usually reliant on air-resupply missions to maintain mission readiness and effectiveness. This thesis analyzes how swarms of small autonomous unmanned aerial vehicles (UAVs) could assist in defensive operations. To accomplish this, I created an agent-based computer simulation model, which creates a tactical problem (enemies attempting to attack or infiltrate a notional base) that a swarm of UAVs attempts to defend against. Results indicate that a swarm can effectively deter 95% of attackers if each UAV is responsible for covering no more than 0.18 square miles and at least 40% of the UAVs are armed. I conclude that UAVs are an excellent addition to base defense and are particularly helpful at remote outposts with less organic capability (limited field of view, defensive assets, etc.). While this research deals specifically with countering a threat to a central base, the algorithms for swarm dynamics could be applied to future problems in mobile convoy or aircraft defense, and even peacetime applications like search and rescue.http://archive.org/details/defensiveswarmng1094556777Major, United States Air ForceApproved for public release; distribution is unlimited

    Strategic Incapacitation and the Policing of Occupy Wall Street in New York City, 2011

    Get PDF
    The US national response to the 11 September 2001 terrorist attacks accelerated the adoption and refinement of a new repertoire of protest policing we call ‘strategic incapacitation’ now employed by law enforcement agencies nationwide to police protest demonstrations. The occupation movement which formally began 17 September 2011 was the most significant social movement to utilise transgressive protest tactics in the United States in the last 40 years and posed a substantial challenge to law enforcement agencies. This research seeks to better understand the implementation of strategic incapacitation tactics through a detailed analysis of the policing of the first 2 months of Occupy Wall Street (OWS) protests in New York City. Original data for this study are derived from 2-week-long field observations made in New York City during the first and second month anniversaries of the OWS occupation in Zuccotti Park. These are supplemented by activist interviews, activist accounts posted on OWS websites, Facebook pages and Twitter feeds as well as news reports, official police documents, press releases and interviews with legal observers
    • 

    corecore