首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 718 毫秒
1.
为了提高车载视频监控系统的视频传输质量,本文基于排队论,利用多链路捆绑技术,设计了基于TD-SCDMA,WCDMA和CDMA2000的多模车载视频监控的负载均衡算法.该负载均衡算法以各个网卡在数据传输时的传输时延、信号强度、运营商因子和丢包率加权作为均衡因子,依次作为负载均衡时数据转发的依据.经实验测试,本算法能够充分利用增加用户卡来增加传输速率,并通过捆绑不同运营商的用户卡来提高数据传输的稳定性,并且该算法较常用的轮询算法的数据传输速率有了较大提高.  相似文献   

2.
为提高雷达情报传输的灵活性、机动性,提出了基于CDMA1X的雷达情报传输系统,该系统以中国联通通信公司的CDMA无线网络平台为基础,实现雷达数据的传输。文中介绍了传输系统的结构和传输控制、数据通信等关键技术,阐述了系统的工作原理,给出了主要模块的功能结构图和软件设计思想,并对系统的主要性能进行了分析。最后,通过对大量雷达数据的仿真,表明该传输系统能够满足数据传输实时性、可靠性、安全性的要求,适合雷达应急通信和机动雷达的数据传输。  相似文献   

3.
基于ARM的移动无线传输系统设计   总被引:1,自引:0,他引:1  
基于ARM的无线传输是通过ARM控制器控制CDMA模块登陆网络完成与监控中心之间的信息交互。用户数据信息只是整个信息传输管理系统的一个应用,通过更换不同的数据库模块实现不同的信息传输,从而构成不同的信息传输管理系统。为方便实现TCP/IP网络协议,模块设计采用高性能ARM处理器(LPC2292)并移植了嵌入式操作系统μC/OS-Ⅱ.该系统可广泛用于远程监控系统。对如何利用CDMA业务传送用户数据信息进行了研究。  相似文献   

4.
设计与实现了一种基于WCDMA和CDMA20001X手持式双模音视频传输终端.重点针对终端系统软件体系架构、软件功能模块、双模传输调度关键技术等方面进行设计与实现.搭建双模音视频传输监控测试平台,测试结果表明相比于单模传输系统,利用WCDMA和CDMA20001X两个无线网络进行数据传输,有效提高了系统性能.  相似文献   

5.
刘开梦  何维  田增山 《电视技术》2012,36(5):99-102,130
设计并实现了一种基于WCDMA和CDMA2000 EVDO无线3G网络的车载式双模无线视频监控系统。介绍了车载式视频监控终端嵌入式设备的整体硬件结构,以及相应功能模块定义和说明。从系统总体结构、主要流程图和关键技术等方面详细描述了监控中心的软件实现。测试结果表明,该车载式监控系统充分利用WCDMA和CDMA2000 EVDO双模网络进行数据传输,相比于传统单模视频传输系统,有效提高了视频传输质量。  相似文献   

6.
介绍了基于SOPC技术的无线远程监控系统的设计与实现.现场设备可采集多个防火防盗传感器状态数据并对现场拍照,通过无线通信传输信息到监控中心,如遇事故可控制现场报警器发出警报并使用无线模块报警.  相似文献   

7.
基于3G的双模远程视频监控系统设计   总被引:2,自引:2,他引:0  
设计并实现了一种基于TD-SCDMA和CDMA2000 1X无线网络的双模远程视频监控系统,描述了监控系统设计和实现中的关键技术,包括监控终端的软、硬件结构,以及监控中心的软件设计。实验结果表明,该系统充分利用了TD-SCDMA和CD-MA2000 1X的传输带宽,相比于单模视频传输系统,有效提高了视频传输速率。  相似文献   

8.
为了研究CDMA系统抗多址干扰和多径干扰能力的目的,采用同一信道下比较调制对系统性能的影响,以及相同的调制方法下比较不同信道系统的性能的方法,做了对CDMA多用户传输系统的仿真实验,获得CDMA通信系统抗多址干扰和抗多径干扰能力与系统扩频码正交性能之间的关系,得到CDMA系统优化性能的结论,并通过仿真实例验证各种传输模型的特点。  相似文献   

9.
本文首先介绍了应用于CDMA系统的声码器,然后结合一种基于IP的CDMA2000系统,描述了语音传输与控制流程,并讨论了在各种业务流控制模型中声码器的管理方法,说明该系统节约了声码器资源、简化了信令流程并提高了业务质量。  相似文献   

10.
针时我国无人/少人值守变电站的推广应用,本文以CDMA无线通信技术为基础,提供了一套实时监控多个输变电设施的远程监控系统解决方案,设计方案以ARM嵌入式控制器为基础,通过连接现场数字电压检测仪,对电参数进行监测,对监控数据的网络传输,可利用CDMA数据传输模块的功能来实现,以保证管理人员能够借助无线采集终端收集的信息数据,实现电力监控,以此进一步提升了电力系统的自动化管理水平.  相似文献   

11.
In law enforcement applications such as surveillance and forensics, video is often presented as evidence. It is therefore of paramount importance to establish the authenticity and reliability of the video data. This paper presents an intelligent video authentication algorithm which integrates learning based Support Vector Machine classification with Singular Value Decomposition watermarking. During video capture and storage, intrinsic local correlation information is extracted from the frames and embedded in the frames at local levels. Tamper detection and classification is performed using the inherent video information and embedded correlation information. The proposed algorithm is independent of the choice of watermark and does not require any key to store. Further, it is robust to global tampering such as frame addition and removal, local attacks such as object alteration and can differentiate between acceptable operations and malicious tampering. Experiments are performed on an extensive database which contains non-tampered videos and videos with several types of tampering. The results show that the proposed algorithm outperforms existing video authentication algorithms.  相似文献   

12.
从《欧美隐私盾》协议被欧盟法院判定无效的核心论据出发,对美国政府基于不同执法目的下的电子数据调取体系进行了探究。指出尽管美国政府在一般执法情形下的数据调取体系较为严谨和规范,但是基于国家安全目的的数据监视和调取体系具有一定的不透明性和不规范性,正是这一特点导致欧盟法院认为其无法满足欧盟对于个人数据的保护标准,从而给两者的数据跨境传输合作机制带来了负面影响。  相似文献   

13.
Automated Visual Surveillance in Realistic Scenarios   总被引:1,自引:0,他引:1  
In this article, we present Knight, an automated surveillance system deployed in a variety of real-world scenarios ranging from railway security to law enforcement. We also discuss the challenges of developing surveillance systems, present some solutions implemented in Knight that overcome these challenges, and evaluate Knight's performance in unconstrained environments  相似文献   

14.
Police accountability organizations known as “cop‐watching” groups are proliferating thanks to smartphone penetration and the ease of video sharing on social networks. These groups use digital media technologies to challenge official accounts of events and encroach on the borders of traditional journalism. This qualitative project collected material over the course of 2 years, and uses participant observation and long‐form interviews to explore the nature of this activism. Grounded analysis suggests that cop‐watching represents a unique form of citizenship; one that combines text and practice to produce embodied narratives, which can give voice to the concerns of others. As a form of so‐called sousveillance, cop‐watching extends and complicates existing theories about surveillance, journalism, and visual evidence.  相似文献   

15.
本文以某市开发区的治安管理、交通管理、城市执法的需求,提出了针对问题的治安动态监控系统解决方案,并给出了基于运营商现有的网络资源MPLS VPN详细的的建设方案,对系统能达到的主要功能作了简单的阐述.  相似文献   

16.
为满足个人随时随地实施视频监控的需求,设计了一种3G智能手机视频监控平台。在分析移动视频监控系统的总体结构基础上,着重阐述了手机客户端监控软件开发方法、监控视频的传输模式和传输协议。它采用专用的安防视频标准SVAC以满足安防要求;客户端多画面播放以实现多路监控,多线程编码以提高软件运行速度。搭建的原型试验系统表明能实现流畅稳定的实时监控。  相似文献   

17.
Human and machine recognition of faces: a survey   总被引:43,自引:0,他引:43  
The goal of this paper is to present a critical survey of existing literature on human and machine recognition of faces. Machine recognition of faces has several applications, ranging from static matching of controlled photographs as in mug shots matching and credit card verification to surveillance video images. Such applications have different constraints in terms of complexity of processing requirements and thus present a wide range of different technical challenges. Over the last 20 years researchers in psychophysics, neural sciences and engineering, image processing analysis and computer vision have investigated a number of issues related to face recognition by humans and machines. Ongoing research activities have been given a renewed emphasis over the last five years. Existing techniques and systems have been tested on different sets of images of varying complexities. But very little synergism exists between studies in psychophysics and the engineering literature. Most importantly, there exists no evaluation or benchmarking studies using large databases with the image quality that arises in commercial and law enforcement applications In this paper, we first present different applications of face recognition in commercial and law enforcement sectors. This is followed by a brief overview of the literature on face recognition in the psychophysics community. We then present a detailed overview of move than 20 years of research done in the engineering community. Techniques for segmentation/location of the face, feature extraction and recognition are reviewed. Global transform and feature based methods using statistical, structural and neural classifiers are summarized  相似文献   

18.
Intelligent distributed surveillance systems: a review   总被引:11,自引:0,他引:11  
This survey describes the current state-of-the-art in the development of automated visual surveillance systems so as to provide researchers in the field with a summary of progress achieved to date and to identify areas where further research is needed. The ability to recognise objects and humans, to describe their actions and interactions from information acquired by sensors is essential for automated visual surveillance. The increasing need for intelligent visual surveillance in commercial, law enforcement and military applications makes automated visual surveillance systems one of the main current application domains in computer vision. The emphasis of this review is on discussion of the creation of intelligent distributed automated surveillance systems. The survey concludes with a discussion of possible future directions.  相似文献   

19.
王天豹 《移动信息》2023,45(10):188-190
智能视频监控技术可利用计算机视觉和图像处理技术,对监控视频进行分析和处理。随着计算机技术的不断发展和应用需求的增加,智能视频监控技术已经成为安防领域的重要研究方向。文中综述了智能视频监控技术的应用和发展方面。首先,介绍了智能视频监控技术的基本原理和技术特点。其次,探讨了智能视频监控技术的应用。最后,展望了智能视频监控技术的发展趋势。未来,随着深度学习技术的发展和大数据技术的普及,智能视频监控技术将会更加智能化、普及化,可以应用于更广泛的领域和场景。总之,智能视频监控技术是一项极具应用前景的技术,其在各个领域得到了广泛应用,并在不断地进步和创新。  相似文献   

20.
张起贵  陈瑜 《电视技术》2014,38(5):164-168,177
依托嵌入式技术和移动通信网络的发展,提出了一个基于3G网络和海思Hi3515的无线智能视频监控方案,完成了系统的总体设计,介绍了系统的组成结构和各单元的工作原理,并着重阐述了智能视频监控前端的硬件和软件设计。监控系统集成智能视频分析、智能控制等功能,可以在监控事件中只传输监控的有用信息,能够灵活地设定监控信息的接收方,并且可以根据用户的控制信息选择相应的传输方式。PC监控端能够根据前端的监控视频数据获取相应的电子地图和周边信息,并可实现多路监控。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号