Application of Cloud Storage in Traffic Video Detection

Author(s):  
Ru Xue ◽  
Zong-Sheng Wu ◽  
A-Ning Bai
2014 ◽  
Vol 7 (1) ◽  
pp. 326395
Author(s):  
Yingying Zhao ◽  
Sheng Jiang ◽  
Zhaowei Qu ◽  
Pengfei Tao

2015 ◽  
Vol 20 (2) ◽  
pp. 17-27
Author(s):  
Szymon Bigaj ◽  
Andrzej Głowacz ◽  
Jacek Kościow ◽  
Zbigniew Mikrut ◽  
Piotr Pawlik

Abstract The paper presents an application for generating ground truth data for the purposes of video detection and justifies its use in systems which analyze road traffic videos. The usefulness of described application in the development of video detection software is presented - especially during scene configuration and comparative analysis of video detection results versus ground truth data. The latter is possible due to simplicity of the result text files generated in a similar way both by the presented application and by the video detection algorithm. Two exemplary applications of the tool designed to generate ground truth data are presented, together with a discussion of their construction, functionality and abilities.


2012 ◽  
Vol 3 (3) ◽  
pp. 60-61
Author(s):  
V.Sajeev V.Sajeev ◽  
◽  
R.Gowthamani R.Gowthamani

2017 ◽  
Vol 10 (2) ◽  
Author(s):  
Irfan Santiko ◽  
Rahman Rosidi ◽  
Seta Agung Wibawa

Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


Sign in / Sign up

Export Citation Format

Share Document