A systematic review of intelligence video surveillance: Trends, techniques, frameworks, and datasets

GF Shidik, E Noersasongko, A Nugraha… - IEEE …, 2019 - ieeexplore.ieee.org
Video surveillance systems obtain a great interest as application-oriented studies that have
been growing rapidly in the past decade. The most recent studies attempt to integrate …

Performance Evaluation of Routing Protocols in Enterprise Networks

W Mwewa, SC Lubobya - American Journal of Computing and …, 2022 - ajpojournals.org
This paper evaluates the performance of routing protocols such as OSPF, EIGRP and IS-IS
in an enterprise network. Routing protocols are rules that govern the best route to transfer …

A grey wolf optimization based algorithm for optimum camera placement

A Kaushik, S Indu, D Gupta - Wireless Personal Communications, 2019 - Springer
Camera placement is very important for surveillance applications. Proposed work presents a
new method of optimum placement of visual sensors for maximum coverage of the …

How a good lightning protection program contributes to energy management and sustainability

S Mpanga, A Zulu, M Mwanza, K Ulgen - International symposium on …, 2022 - Springer
Lightning affects many aspects of our lives such as home appliances, machinery,
transportation, electrical energy transmission, environment, agriculture, economy, social …

Improved Parameters for Lightning Protection System Designs for Buildings in Zambia

S Mpanga, A Zulu, M Mwanza… - 2022 36th International …, 2022 - ieeexplore.ieee.org
Studies indicate that 90% of buildings in Sub-Saharan Africa are not protected against
lightning strikes. The literature shows that mass casualty events due to the lightning …

[HTML][HTML] Performance evaluation of an internet protocol security (IPSec) based multiprotocol label switching (MPLS) virtual private network

CK Simatimbe, SC Lubobya - Journal of Computer and Communications, 2020 - scirp.org
This paper evaluates the performance of Internet Protocol Security (IPSec) based
Multiprotocol Label Switching (MPLS) virtual private network (VPN) in a small to medium …

Knowledge Growing System Implementation on Design of Unmanned Aerial Vehicle in Maritime Security Monitoring

IH Kusumah - … on Computing Engineering and Design (ICCED), 2019 - ieeexplore.ieee.org
The preliminary research about the implementation of Knowledge Growing System (KGS) in
an Unmanned Aerial Vehicle (UAV) is described. The main topic of this research is maritime …

[PDF][PDF] Towards a Lightning Detection and Warning System in Zambia

S Mpanga, A Zulu, M Mwanza - Proc. 4th African Int. Conf. on …, 2023 - academia.edu
Lightning is essentially an electromagnetic field phenomenon that can fundamentally be
characterized using scientific methods. It would interest property designers and managers to …

Effectiveness Evaluation of Public Security Face Recognition Systems Based on Improved Unascertained C-Means

Z Liu, W Hong, H Zhang, J Ma - 2019 4th International …, 2019 - ieeexplore.ieee.org
In order to evaluate and improve the effectiveness of the public security face recognition
systems reasonably and scientifically in real scenes, we create an effectiveness evaluation …