Essays about: "Traffic Security"
Showing result 21 - 25 of 203 essays containing the words Traffic Security.
-
21. Selective Kernel Network based Crowding Counting and Crowd Density Estimation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Managing crowd density has become an immense challenge for public authorities due to population growth and evolving human dynamics. Crowd counting estimates the number of individuals in a given area or scene, making it a practical technique applicable in real-world scenarios such as surveillance and traffic control. READ MORE
-
22. Re-recognition of vehicles for enhanced insights on road traffic
University essay from KTH/Skolan för teknikvetenskap (SCI)Abstract : This study investigates the performance of two keypoint detection algorithms, SIFTand LoFTR, for vehicle re-recognition on a 2+1 road in Täby, utilizing three differentmethods: proportion of matches, ”gates” based on the values of the features andSupport Vector Machines (SVM). Data was collected from four strategically placedcameras, with a subset of the data manually annotated and divided into training,validation, and testing sets to minimize overfitting and ensure generalization. READ MORE
-
23. Cybersecurity Evaluation of an IP Camera
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. READ MORE
-
24. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE
-
25. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)
University essay from Linköpings universitet/Databas och informationsteknikAbstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE