Traceable Physical Security Systems for a Safe and Secure Society

نویسندگان

  • Tatsuhiko Kagehiro
  • Kenichi Yoneji
  • Harumi Kiyomizu
  • Yuki Watanabe
  • Yohei Kawaguchi
  • Zisheng Li
  • Hisashi Nagano
  • Yusuke Matsuda
چکیده

Tatsuhiko Kagehiro, Ph.D. Kenichi Yoneji Harumi Kiyomizu Yuki Watanabe, Dr. Info. Yohei Kawaguchi Zisheng Li, Dr. Eng. Hisashi Nagano Yusuke Matsuda OVERVIEW: In an era of terrorism and serious criminal activity, a strong reliance is being placed on security systems that keep society safe and secure. This in turn requires ways of determining the security of people and property, and the ability to extract relevant information from accumulated data quickly. In response, Hitachi has been studying the functions required to combine high security with convenience, two objectives with confl icting characteristics, at major public facilities where these systems are likely to be installed. The concept of “traceable physical security” is used to ensure people’s safety. Hitachi has also built a “multi-perspective search” system that can search collected image data using a variety of different attributes as keys.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A traceable optimistic fair exchange protocol in the standard model

An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...

متن کامل

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Distance-Aware Beamforming for Multiuser Secure Communication Systems

Typical cryptography schemes are not well suited for low complexity types of equipment, e.g., Internet of things (IoT) devices, as they may need high power or impose high computational complexity on the device. Physical (PHY) layer security techniques such as beamforming (in multiple antennas systems)  are possible alternatives to provide security for such applications. In this paper, we consid...

متن کامل

Do walkable neighborhoods promote physical activity؟

The American Society of Surgeons recommends that at least 30 minutes of moderate-intensity physical activity be performed daily for at least five days a week to ensure the minimum physical health of citizens. Follow these tips because there are not enough spaces, suitable, safe and secure for physical activity and sports for citizens or very rare (1).

متن کامل

Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption

In this study, we propose a secure communication scheme based on the synchronization of two identical fractional-order chaotic systems. The fractional-order derivative is in Caputo sense, and for synchronization, we use a robust sliding-mode control scheme. The designed sliding surface is taken simply due to using special technic for fractional-order systems. Also, unlike most manuscripts, the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014