scispace - formally typeset
Search or ask a question

ISAR Imaging for Security and Surveillance" by M. Cherniakov et al. (2013 


Best insight from top research papers

Radar technology, such as the holographic radar Rascan 4/4000, has the potential to provide high-resolution subsurface images of critical infrastructures for monitoring and conservation purposes . Gait recognition systems based on computer vision techniques can use the gait signature derived from silhouette images to identify individuals in video surveillance footage . Visualization systems can be adapted to improve the efficiency of security information and event management system operators by considering their increased fatigue and reduced attention span . A smart camera system based on OpenCV can be used to detect unwanted activities, such as theft, by identifying objects and using face recognition techniques . A home security surveillance system can be developed using sensors to detect movement and changes in temperature, and images of intruders can be captured and sent to a mobile phone .

Answers from top 5 papers

More filters
Papers (5)Insight
The provided paper is not "ISAR Imaging for Security and Surveillance" by M. Cherniakov et al. (2013). The provided paper is about the development of a camera and GSM interfacing system for home security surveillance.
Open accessProceedings ArticleDOI
Veena G.S, Chandrika Prasad, Khaleel K 
19 Dec 2013
12 Citations
The provided paper is not "ISAR Imaging for Security and Surveillance" by M. Cherniakov et al. (2013). The provided paper is titled "Automatic Theft Security System (Smart Surveillance Camera)" by Chandrika Prasad.
Open accessProceedings Article
Anatoly Yelizarov, Dennis Gamayunov 
01 Jan 2013
1 Citations
The provided paper is not "ISAR Imaging for Security and Surveillance" by M. Cherniakov et al. (2013). The provided paper is about adaptive security event visualization for continuous monitoring.
The provided paper is not "ISAR Imaging for Security and Surveillance" by M. Cherniakov et al. (2013). The provided paper is about the potentialities of the holographic radar Rascan 4/4000 as a non-destructive diagnostic tool for monitoring critical infrastructures.
The provided paper is not "ISAR Imaging for Security and Surveillance" by M. Cherniakov et al. (2013). The provided paper is "Speed Invariant, Human Gait Based Recognition System for Video Surveillance Security".

Related Questions

How does securitisation theory impact on the security of borders by the army?5 answersSecuritisation theory plays a crucial role in shaping border security measures, especially in the context of military involvement. The theory, rooted in the Copenhagen School, emphasizes the process of constructing security through speech acts and the inclusion/exclusion of issues into the security sphere. It highlights the interplay between securitising actors and audiences based on social capital ownership, influencing the emergence of hegemonic security discourses. Additionally, the theory's self-referential aspect does not negate the existence of power dynamics among actors in security fields. Furthermore, the politics of securitization, as a form of theory design, can systematically impact real-life political struggles, influencing the nature of security policies and practices. Overall, securitisation theory provides a framework for understanding how military actions at borders are justified and implemented in response to perceived security threats.
ISAR through CLEAN Technique5 answersThe Inverse Synthetic Aperture Radar (ISAR) technique can benefit from the CLEAN algorithm, a signal processing method used to extract point scatterers from radar images. By utilizing the high-resolution range profile of a target, a new CLEAN algorithm enhances 3D temporal ISAR image formation, leading to improved target dimension estimates for better classification accuracy. Additionally, a fast ISAR tomography technique has been proposed for 3D imaging of man-made targets, addressing computational complexity issues and optimizing data utilization from limited baselines, showcasing superior performance in reconstruction results. Moreover, in the realm of passive radar systems, the CLEAN approach aids in clutter cancellation, with a batch-based technique proposed for enhanced computational efficiency and clutter suppression in PR processing.
What is security in international relations?5 answersSecurity in international relations encompasses the protection of a nation-state's territorial integrity and quality of life, evolving to include broader concerns like human security and peace-building. It is a fundamental concept that has been extensively studied, with varying definitions and perspectives, emphasizing the importance of survival and the absence of threats or fear. Traditional views, such as realism, focus on state-centric security achieved through force and unity, while social constructivism highlights the role of interactions and shared values in shaping security perceptions. The end of the Cold War prompted a reevaluation of international security, considering new global challenges like climate change, migration, and terrorism, indicating the dynamic nature of security concerns in the contemporary world.
ISAR Image Enhancement and Recognition of Radar Targets5 answersISAR image enhancement and recognition of radar targets have been the focus of research in recent years. Various techniques have been proposed to improve the accuracy of target recognition. One approach is the use of multi-view ISAR imaging and fusion, which involves preprocessing the data, performing image registration and fusion, and extracting features for recognition. Another approach is the use of target recognition methods based on ISAR images, which involve feature extraction and classification techniques. Additionally, methods such as Triangle Preserving level-set-assisted Triangle-Points Affine Transform Reconstruction (TP-TATR) have been proposed to address challenges in ISAR ship target recognition, such as changes in target attitude. Furthermore, machine learning methods, including deep learning, are being explored for the classification of ships based on ISAR images. These advancements in ISAR image enhancement and recognition techniques have shown promising results in improving the accuracy of radar target recognition.
What is the role of AI in security?5 answersAI plays a crucial role in security by revolutionizing the field of cyber security and enabling organizations to better detect and respond to threats in real-time. It is used in various ways, including threat detection, incident response, security analytics, and more. AI-powered cyber security solutions leverage machine learning and other advanced techniques to analyze vast amounts of data and identify anomalies and patterns that might indicate an attack. The combination of AI and cyberspace security is important in promoting the development of artificial intelligence and network security. AI/ML techniques are also being used in hardware and architecture security to protect computing devices from emerging hardware security vulnerabilities. Additionally, AI approaches such as machine learning and federated learning are being applied to enhance the security of energy harvesting systems. Overall, AI plays a vital role in enhancing security measures and addressing the challenges posed by cyber threats.
What is intelligence in the context of security?5 answersIntelligence in the context of security refers to the collection, processing, analysis, and sharing of information to improve decision making and protect national security interests. It has traditionally been seen as a state-based process, but its role in the private sector and non-governmental organizations is increasing. In the field of artificial intelligence (AI) and machine learning (ML), security encompasses areas such as cyber-security, information security, defense security, and intelligence. The use of intelligence and security informatics (ISI) connects advanced information technologies, systems, algorithms, and databases with security-related applications. Applying the context of intelligence and security informatics in pedagogy can help make computer science topics more concrete and understandable, particularly in relation to national security and computer and network security.