A study on Security within public transit vehicles
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 9
Abstract
In public transit vehicles, security is the major concern for the passengers. Surveillance Systems provide the security by providing surveillance cameras in the vehicles and a storage that maintains the data. The applications that allow monitoring the data in surveillance systems of public transit vehicles will provide different features to access the video and allow to perform number of operations like exporting video, generating snapshots at a particular time, viewing the live as well as playback videos. This paper studies automation process of video surveillance system that can also be applied in the surveillance system of public transit vehicles. A new feature that enhances the security to the passengers such as tracking of vehicle through the GPS (Global positioning system) tracking system and also capability of providing the vehicle information like acceleration, speed, on the user interface of application to the user.
Authors and Affiliations
A Seshukumar, Dr. Vasavi, Dr. V. Rao
Tuning of Customer Relationship Management (CRM) via Customer Experience Management (CEM) using Sentiment Analysis on Aspects Level
This study proposes a framework that combines a supervised machine learning and a semantic orientation approach to tune Customer Relationship Management (CRM) via Customer Experience Management (CEM). The framework extra...
The Respondent’s Haptic on Academic Universities Websites of Pakistan Measuring Usability
This study based on survey, by using four higher educational (Universities) websites were selected for the usability testing with the help of response to the experience of eighty students of same age group and investigat...
Defense against SYN Flood Attack using LPTR-PSO: A Three Phased Scheduling Approach
Security has become a critical factor in today’s computation systems. The security threats that risk our confidential information can come in form of seemingly legitimate client request to server. While illegitimate requ...
Need and Role of Scala Implementations in Bioinformatics
Next Generation Sequencing has resulted in the generation of large number of omics data at a faster speed that was not possible before. This data is only useful if it can be stored and analyzed at the same speed. Big Dat...
Personalized E-Learning Recommender System using Multimedia Data
Due to the huge amounts of online learning materials, e-learning environments are becoming very popular as means of delivering lectures. One of the most common e-learning challenges is how to recommend quality learning m...