IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Collaborative Video Surveillance for Distributed Visual Data Mining of Potential Risk and Crime Detection

Collaborative Video Surveillance for Distributed Visual Data Mining of Potential Risk and Crime Detection
View Sample PDF
Author(s): Chia-Hui Wang (Ming Chuan University, Taiwan), Ray-I Chang (National Taiwan University, Taiwan)and Jan-Ming Ho (Academia Sinica, Taiwan)
Copyright: 2011
Pages: 11
Source title: Surveillance Technologies and Early Warning Systems: Data Mining Applications for Risk Detection
Source Author(s)/Editor(s): Ali Serhan Koyuncugil (Capital Markets Board of Turkey, Turkey, and Baskent University, Turkey)and Nermin Ozgulbas (Baskent University, Turkey)
DOI: 10.4018/978-1-61692-865-0.ch010

Purchase

View Collaborative Video Surveillance for Distributed Visual Data Mining of Potential Risk and Crime Detection on the publisher's website for pricing and purchasing information.

Abstract

Thanks to fast technology advancement of micro-electronics, wired/wireless networks and computer computations in past few years, the development of intelligent, versatile and complicated video-based surveillance systems has been very active in both research and industry to effectively enhance safety and security. In this chapter, the authors first introduce the generations of video surveillance systems and their applications in potential risk and crime detection. For effectively supporting early warning system of potential risk and crime (which is load-heavy and time-critical), both collaborative video surveillance and distributed visual data mining are necessary. Moreover, as the surveillance video and data for safety and security are very important for all kinds of risk and crime detection, the system is required not only to data protection of the message transmission over Internet, but also to further provide reliable transmission to preserve the visual quality-of-service (QoS). As cloud computing, users do not need to own the physical infrastructure, platform, or software. They consume resources as a service, where Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and pay only for resources that they use. Therefore, the design and implementation of an effective communication model is very important to this application system.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom