no code implementations • 3 May 2020 • Meng Yuan, Seyed Yahya Nikouei, Alem Fitwi, Yu Chen, Yunxi Dong
The collection of a lot of personal information about individuals, including the minor members of a family, by closed-circuit television (CCTV) cameras creates a lot of privacy concerns.
no code implementations • 9 Mar 2020 • Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch
Adopting unsupervised methods that do not reveal any private information, the I-ViSE scheme utilizes general features of a human body and color of clothes.
no code implementations • 12 Sep 2019 • Seyed Yahya Nikouei, Yu Chen, Alexander Aved, Erik Blasch, Timothy R. Faughnan
This paper presents a forensic surveillance strategy by introducing an Instant Suspicious Activity identiFication at the Edge (I-SAFE) using fuzzy decision making.
no code implementations • 24 Apr 2018 • Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi, Timothy R. Faughnan
Edge computing efficiently extends the realm of information technology beyond the boundary defined by cloud computing paradigm.
no code implementations • 24 Apr 2018 • Seyed Yahya Nikouei, Yu Chen, Sejun Song, Ronghua Xu, Baek-Young Choi, Timothy R. Faughnan
Edge computing allows more computing tasks to take place on the decentralized nodes at the edge of networks.