scholarly journals Method of dynamic image`s identification in videosurveillance systems of critical infrastructure

Author(s):  
Руслан Валентинович Грищук ◽  
Ігор Володимирович Гуменюк ◽  
Володимир Васильович Охрімчук
2020 ◽  
Vol 2 (1) ◽  
pp. 35-42
Author(s):  
Hemalatha R ◽  
Rhesa M.J. ◽  
Revathi S

The hest for technological advancement in mobile communication is due to augmentation of wireless user. The deployment of 5G mobile communication is less than 4G mobile communication due to challenges in security like cyberwarfare, espionage, critical infrastructure threats. Nevertheless, critic of neurological discomforts, tissue damage in living organisms occur in the existence of EMF radiation. Also, physical scarcity for spectral efficiency arises due to ubiquitous data traffic. Inspite of these disputes data rate, low latency, device to device communication is also a challenge. In this paper we provide a survey on radiation effects, security threats, traffic management.


1999 ◽  
Author(s):  
Maximilian K. Bremer ◽  
Daniel Feliz ◽  
Troy Perry

2020 ◽  
Author(s):  
Yanping Chen ◽  
Dongjie Yu ◽  
Jane Cansoni

BACKGROUND Background: Nowadays, the application of computer technology in the medical field is more and more extensive, and many diseases can achieve better diagnosis and treatment effects through computer technology. OBJECTIVE Objective: The paper applies intelligent facial dynamic image information to the clinical treatment of peripheral acupuncture and moxibustion for the treatment of peripheral facial paralysis. An automatic acupoint positioning algorithm based on facial information dynamic image is proposed, which provides an objective and standard basis for the treatment of facial acupuncture and moxibustion. METHODS Methods: The paper selects the head threshold, that is, the facial dynamic image information as the research background, and divides the facial features according to the "three courts and five eyes" rule, and uses the Minimum Eigenvalue operator to detect the corner points of the facial features, locate the facial features, and use the face. The feature position is used as a reference coordinate for facial acupoint positioning. RESULTS Results: After verification, it was found that the positioning was accurate, and the peripheral facial paralysis of the patient was improved after warm acupuncture point positioning treatment, which improved the facial nerve function of the patient, improved the treatment efficiency and shortened the treatment time. Therefore, this technology is worthy of clinical promotion. CONCLUSIONS Conclusion: Through experimental analysis, the algorithm is proved to be effective and accurate. Based on facial dynamic image information to locate acupoints, warm acupuncture has a significant effect on peripheral facial paralysis, which can significantly improve facial nerve function and shorten treatment time, which is worthy of clinical promotion.


2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


Sign in / Sign up

Export Citation Format

Share Document