ip video
Recently Published Documents


TOTAL DOCUMENTS

58
(FIVE YEARS 4)

H-INDEX

4
(FIVE YEARS 1)

Author(s):  
А.Б. Семенов ◽  
Д.А. Гончаров ◽  
А.В. Лёвкин

Введено понятие эшелонной схемы построения коммутационного поля центрального узла систем IP-видеонаблюдения и выполнена соответствующая ей модернизация типовых принципов расположение образующего его оборудования. Обоснована возможность размещения оборудования центрального узла в 19-дюймовом шкафу шириной 600 мм при количестве телекамер вплоть до 480. Проведена оценка средней длины коммутационных шнуров и показано, что обращение к эшелонной схеме дает практически двукратное сокращение этого параметра, что улучшает условия администрирование системы. The concept of an echelon scheme for constructing the switching field of the central node of IP-video surveillance systems was introduced and the corresponding modernization of the standard principles of the arrangement of the equipment forming it was performed. The possibility of placing the equipment of the central unit in a 19-inch cabinet 600 mm wide with the number of cameras up to 480 was substantiated. The estimation of the average length of the patch cords was carried out and was shown that the use of the echelon scheme gave an almost double reduction of this parameter that improved the conditions for system administration.


This paper proposes an AES based Encryption and Decryption of a live IP video used for security in surveillance systems. Here, the key is generated based on neural networks techniques for facial recognition. Principal component analysis and Eigen vector algorithms are used to extract biometric facial features which are used to train the neural network. At the receiver side, the original video plays only if the user is authenticated or else it plays an encrypted video. This work proposes an AES architecture based on optimizing timing in terms of adding inner and outer pipeline registers for each round and Key Expansions. Further by optimizing the Crypto Multiplication for Mix columns via LUT based approach aid in further optimization in terms of timing. LUT and Pipelined based implementation techniques are optimal for FPGA based implementations. ROM table and pipelining are the two techniques used to implement AES. Result indicates that with the combination of pipelined architecture and Distributed/Split LUTPipelined techniques, the encryption has higher throughput and speed


2018 ◽  
Vol 14 (7) ◽  
pp. 881-907
Author(s):  
Vitor Chaves de Oliveira ◽  
Sérgio Bimbi Junior ◽  
Andreiwid Sheffer Corrêa ◽  
Inácio Henrique Yano ◽  
Mauricio Becker ◽  
...  
Keyword(s):  

2018 ◽  
Vol 127 (5) ◽  
pp. 32-37 ◽  
Author(s):  
Chris Northwood ◽  
Robert Wadge
Keyword(s):  

2018 ◽  
Vol 18 ◽  
pp. 02004
Author(s):  
Kirill Zhigalov ◽  
Karen Avetisyan

This article is devoted to the integration of cloud technology functions into 3D IP video surveil-lance systems in order to conduct further video Analytics, incoming real-time data, as well as stored video materials on the server in the «cloud». The main attention is devoted to «cloud technologies» usage optimizing the process of recognition of the desired object by increasing the criteria of flexibility and scalability of the system. Transferring image load from the client to the cloud server, to the virtual part of the system. The development of the issues considered in the article in terms of data analysis, which will significantly improve the effectiveness of the implementation of special tasks facing special units.


2017 ◽  
Vol 100 (2) ◽  
pp. 227-240 ◽  
Author(s):  
Smart C. Lubobya ◽  
Mqhele Enock-Hershal Dlodlo ◽  
Gerhard de Jager ◽  
Ackim Zulu

Sign in / Sign up

Export Citation Format

Share Document