scholarly journals A Mobile Ad hoc Cloud Computing and Networking Infrastructure for Automated Video Surveillance System

2017 ◽  
Vol 13 (12) ◽  
pp. 767-780
Author(s):  
Sayed Chhattan Shah
2010 ◽  
pp. 1896-1912
Author(s):  
Hao Yin ◽  
Chuang Lin ◽  
Zhijia Chen ◽  
Geyong Min

The integration of wireless communication and embedded video systems is a demanding and interesting topic which has attracted significant research efforts from the community of telecommunication. This chapter discusses the challenging issues in wireless video surveillance and presents the detailed design for a novel highly-secure video surveillance system over ad hoc wireless networks. To this end, we explore the state-of-the-art cross domains of wireless communication, video processing, embedded systems, and security. Moreover, a new media-dependent video encryption scheme, including a reliable data embedding technique and real-time video encryption algorithm, is proposed and implemented to enable the system to work properly and efficiently in an open and insecure wireless environment. Extensive experiments are conducted to demonstrate the advantages of the new systems, including high security guarantee and robustness. The chapter would serve as a good reference for solving the challenging issues in wireless multimedia and bring new insights on the interaction of different technologies within the cross application domain.


Author(s):  
Yong-Hua Xiong ◽  
◽  
Shao-Yun Wan ◽  
Yong He ◽  
Dan Su

Cloud-based video surveillance systems, as a new cloud computing service model, are an emerging research topic, both at home and abroad. Current research is mainly focused on exploring applications of the system. This paper proposes a design and implementation method for cloud-based video surveillance systems using the characteristics of cloud computing, such as parallel computing, large storage space, and easy expandability. The system architecture and function modules are built, and a prototype cloud-based video surveillance system is established in a campus network using key technologies, including virtual machine task access control, video-data distributed storage, and database-active communicationmethods. Using the system, the user is able to place a webcam in a location that requires monitoring so that video surveillance can be achieved, and video data can be viewed through a browser. The system has the following advantages: low investment and maintenance cost, high portability, easily extendable, superior data security, and excellent sharing. As a private cloud server in the campus network, the system is able to not only provide convenient video surveillance services, but it can also be an excellent practical experimental platform for cloud computing-related research, which carries outstanding application value.


Author(s):  
Б. Мороз ◽  
A. Щербаков

The mathematical model of the automated video surveillance system is offered. Mathematical models of separate units of the aircraft are considered: quadrocopter dynamics, RC transmitter, RC receiver, HD camera. It is shown that such mathematical models are the most effective for performing key tasks.


Author(s):  
Hao Yin ◽  
Chuang Lin ◽  
Zhijia Chen ◽  
Geyong Min

The integration of wireless communication and embedded video systems is a demanding and interesting topic which has attracted significant research efforts from the community of telecommunication. This chapter discusses the challenging issues in wireless video surveillance and presents the detailed design for a novel highly-secure video surveillance system over ad hoc wireless networks. To this end, we explore the state-of-the-art cross domains of wireless communication, video processing, embedded systems, and security. Moreover, a new media-dependent video encryption scheme, including a reliable data embedding technique and real-time video encryption algorithm, is proposed and implemented to enable the system to work properly and efficiently in an open and insecure wireless environment. Extensive experiments are conducted to demonstrate the advantages of the new systems, including high security guarantee and robustness. The chapter would serve as a good reference for solving the challenging issues in wireless multimedia and bring new insights on the interaction of different technologies within the cross application domain.


Sign in / Sign up

Export Citation Format

Share Document