Essays about: "Traffic Security"

Showing result 21 - 25 of 203 essays containing the words Traffic Security.

  1. 21. Selective Kernel Network based Crowding Counting and Crowd Density Estimation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jinchen Liu; [2023]
    Keywords : Crowding Counting; Convolution Neural Network; Selective kernel; Trängselräkning; konvolutionsneuralnätverk; Selektiv kärna;

    Abstract : Managing crowd density has become an immense challenge for public authorities due to population growth and evolving human dynamics. Crowd counting estimates the number of individuals in a given area or scene, making it a practical technique applicable in real-world scenarios such as surveillance and traffic control. READ MORE

  2. 22. Re-recognition of vehicles for enhanced insights on road traffic

    University essay from KTH/Skolan för teknikvetenskap (SCI)

    Author : Aron Asefaw; [2023]
    Keywords : Re-recognition; Computer Vision; LoFTR; Keypoints; SIFT; Transformers; Machine Learning; Homogrpahy; Deep Learning; SVM;

    Abstract : This study investigates the performance of two keypoint detection algorithms, SIFTand LoFTR, for vehicle re-recognition on a 2+1 road in Täby, utilizing three differentmethods: proportion of matches, ”gates” based on the values of the features andSupport Vector Machines (SVM). Data was collected from four strategically placedcameras, with a subset of the data manually annotated and divided into training,validation, and testing sets to minimize overfitting and ensure generalization. READ MORE

  3. 23. Cybersecurity Evaluation of an IP Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tova Stroeven; Felix Söderman; [2022]
    Keywords : cybersecurity; IP camera; baby camera; security camera; penetration testing; IoT; Biltema; privacy; ethical hacking;

    Abstract : The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. READ MORE

  4. 24. A Comprehensive Taxonomy of Attacks and Mitigations in IoT Wi-Fi Networks : physical and data-link layer

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Sarmed Almjamai; [2022]
    Keywords : Attack; Mitigation; Tools; Vulnerability; Security protocol; WPA2; WPA3; Wi-Fi; IoT; physical layer; data-link layer; MitM; DoS; Key-recovery; Traffic decryption;

    Abstract : The number of Internet of Things (IoT) devices is rising and Wireless Fidelity (Wi-Fi) networks are still widely used in IoT networks. Security protocols such as Wi-Fi Protected Access 2 (WPA2) are still in use in most Wi-Fi networks, but Wi-Fi Protected Access 3 (WPA3) is making its way as the new security standard. READ MORE

  5. 25. Anomalous Behavior Detection in Aircraft based Automatic Dependent Surveillance–Broadcast (ADS-B) system using Deep Graph Convolution and Generative model (GA-GAN)

    University essay from Linköpings universitet/Databas och informationsteknik

    Author : Jayesh Kenaudekar; [2022]
    Keywords : Intrusion detection aircraft aviation security adsb protocol AI deep learning machine learning graph generative model surveillance broadcast;

    Abstract : The Automatic Dependent Surveillance-Broadcast (ADS-B) is a key component of the Next Generation Air Transportation System (Next Gen) that manages the increasingly congested airspace and operation. From Jan 2020, the U.S. Federal Aviation Administration (FAA) mandated the use of (ADS-B) as a key component of Next Gen project. READ MORE