![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Early Wildfire Detection Using Convolutional Neural Network
Wildfires are one of the disasters that are difficult to detect early and cause significant damage to human life, ecological systems, and infrastructure. There have been several research attempts to detect wi...
-
Chapter and Conference Paper
Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing
Recently, deep neural network and cloud computing based intelligent video surveillance technology are growing interests in the industrial and academia. The synergy with both technologies emerges as a key role ...
-
Article
Deep feature learning for person re-identification in a large-scale crowdsourced environment
Finding the same individual across cameras in disjoint views at different locations and times, which is known as person re-identification (re-id), is an important but difficult task in intelligent visual surve...
-
Article
Compact deep learned feature-based face recognition for Visual Internet of Things
The Visual Internet of Things has received much attention in recent years due to its ability to get the object location via image information of the scene, attach the visual label to the object, and then retur...
-
Chapter and Conference Paper
Security Technologies Based on Home Gateway for Making Smart Home Secure
As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in ope...
-
Chapter and Conference Paper
Security Framework for Home Network: Authentication, Authorization, and Security Policy
As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Ho...
-
Chapter and Conference Paper
Security Policy Deployment in IPsec
Security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding appl...