期刊文献+

公安与商网视频音频报警一体化系统设计与实现 被引量:1

下载PDF
导出
摘要 设计和开发的公安与商网视频音频报警一体化系统实现了视频、音频、报警三位一体,系统分为视频音频报警采集、设备管理服务和报警监控管理中心三个子系统。视频音频报警采集系统对前端摄像机进行嵌入式系统开发;设备管理服务系统采用模块化设计方式,不同的模块都是独立的应用程序;报警监控管理中心系统为用户提供一系列完整的远程监控功能的系统。
作者 王洪革 云微
出处 《电脑知识与技术》 2014年第4X期2851-2856,共6页 Computer Knowledge and Technology
  • 相关文献

参考文献3

二级参考文献2

共引文献13

同被引文献13

  • 1张振翎,李建华.网络欺诈及防范体系研究[J].信息安全与通信保密,2007,29(1):109-110. 被引量:4
  • 2Rubin S,Christodorescu M,Ganapathy V,et al.An auctioning reputation system based on anomaly[C]//Proceedings of the 12th ACM Conference on Computer and Communications Security.ACM,2005:270-279.
  • 3Hendrikx F,Bubendorfer K,Chard R.Reputation systems:A survey and taxonomy[J].Journal of Parallel and Distributed Computing,2015,75:184-197.
  • 4Mohanty B K,Passi K.Agent based e-commerce systems that react to buyers,feedbacks-A fuzzy approach[J].International Journal of approximate reasoning,2010,51(8):948-963.
  • 5Allen J.Case study:implementing MT for the translation of pre-sales marketing and post-sales software deployment documentation at Mycom International[M],Machine Translation:From Real Users to Research.Springer Berlin Heidelberg,2004:1-6.
  • 6Sun S,Wang 丁,Chen L,et al.Understanding Consumers,trust in Internet Financial Sales Platform:Evidence from a YueBaoM[C]// Proceeding of Pacific Asia Conference on Information System(PACIS).2014.
  • 7Li W,Chen H.Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis[C]//2014 IEEE Joint Intelligence and Security Informatics Conference(JISIC).IEEE,2014:64-67.
  • 8Liberatore M,Levine B N,Shields C.Strengthening forensic investigations of child pornography on p2p networks[C].Proceedings of the 6th International Conference.ACM,2010:19.
  • 9Haggerty J,Llewellyn-Jones D,Taylor M.Forweb:file fingerprinting for automated network forensics investigations Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications,Information,and Multimedia and Workshop.ICST(Institute for Com-puter Sciences,Social-Informatics and Telecommunications Engineering),2008:29.
  • 10Nair A S V,Ajeena B A S.A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes[Cj// Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing.ACM,2014:7.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部