Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (490)

Search Parameters:
Keywords = camera security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
12 pages, 561 KB  
Data Descriptor
Perceptions of Security, Victimization, and Coexistence: A Database from Cali, Colombia
by Jhon James Mora, Enrique Javier Burbano-Valencia, Angie Mondragón-Mayo and José Santiago Arroyo Mina
Data 2026, 11(2), 41; https://doi.org/10.3390/data11020041 (registering DOI) - 14 Feb 2026
Abstract
This article addresses a key evidence gap in urban safety policy in Colombia: the absence of publicly accessible microdata that jointly measure victimization, perception of security, and probability of sanctions among socioeconomically vulnerable residents. It aims to provide a clean, linkable dataset that [...] Read more.
This article addresses a key evidence gap in urban safety policy in Colombia: the absence of publicly accessible microdata that jointly measure victimization, perception of security, and probability of sanctions among socioeconomically vulnerable residents. It aims to provide a clean, linkable dataset that enables analysis of variations in these issues across demographic and territorial groups in Cali (recently classified as the 29th most dangerous city worldwide, with 1028 and 1065 homicides in 2024 and 2025, respectively). It reports face-to-face survey data collected from 22 July to 16 August 2024, at Sistema de Identificación de Potenciales Beneficiarios de Programas Sociales (SISBEN) service points. The final dataset includes 2139 adults (aged 18–95 years) and combines (i) primary responses on perceived safety (e.g., public space safety and surveillance cameras), perceived likelihood of sanction, victimization, and self-protection measures with (ii) selected sociodemographic and household characteristics drawn from SISBEN IV records. Individual-level linkage was implemented using respondent identification at interviews, yielding an integrated anonymized file suitable for replication and secondary analysis. The dataset enables distributive analyses of insecurity (e.g., by sex, age, and ethnicity—including Afro-descendant populations) within a policy-relevant target group and supports evaluation and targeting of local interventions by providing individual-level indicators. Full article
Show Figures

Figure 1

18 pages, 7090 KB  
Article
SAW-Based Active Cleaning Cover Lens for Physical AI Optical Sensors
by Jiwoon Jeon, Jungwoo Yoon, Woochan Kim, Youngkwang Kim and Sangkug Chung
Symmetry 2026, 18(2), 347; https://doi.org/10.3390/sym18020347 - 13 Feb 2026
Abstract
This paper presents a cover lens concept for camera modules based on surface acoustic waves (SAW) to mitigate the degradation of physical AI optical sensor field-of-view performance caused by surface contamination. The proposed approach utilizes a single-phase unidirectional transducer (SPUDT) that intentionally breaks [...] Read more.
This paper presents a cover lens concept for camera modules based on surface acoustic waves (SAW) to mitigate the degradation of physical AI optical sensor field-of-view performance caused by surface contamination. The proposed approach utilizes a single-phase unidirectional transducer (SPUDT) that intentionally breaks left–right symmetry through a geometrically asymmetric electrode array to generate SAW, thereby removing droplet contamination. First, the acoustic streaming induced inside a single sessile droplet by the SAW was visualized, and the dynamic behavior of the droplet upon SAW actuation was observed using a high-speed camera. The internal flow developed into a recirculating vortex structure with directional deflection relative to the SAW propagation direction, indicating a symmetry-broken streaming pattern rather than a purely symmetric circulation. Upon the application of the SAW, the droplet was confirmed to move a total of 7.2 mm along the SAW propagation direction, accompanied by interfacial deformation and oscillation. Next, an analysis of transport trajectories for five sessile droplets dispensed at different y-coordinates (y1y5) revealed that all droplets were transported along the x-axis regardless of their initial positions. Furthermore, the analysis of transport velocity as a function of droplet viscosity (1 cP and 10 cP) and volume (2 μL, 4 μL, and 6 μL) demonstrated that the transport velocity gradually increased with driving voltage but decreased as viscosity increased under identical actuation conditions. Finally, the proposed cover lens was applied to an automotive front camera module to verify its effectiveness in improving object recognition performance by removing surface contamination. Based on its simple structure and driving principle, the proposed technology is deemed to be expandable as a surface contamination cleaning technology for various physical AI perception systems, including intelligent security cameras and drone camera lenses. Full article
Show Figures

Figure 1

5 pages, 214 KB  
Proceeding Paper
Methodology for Rapid Security Testing of IP Cameras
by Lidia Prudente-Tixteco, Gabriel Sanchez-Perez, Jesus Olivares-Mercado and Aldo Hernandez-Suarez
Eng. Proc. 2026, 123(1), 33; https://doi.org/10.3390/engproc2026123033 - 11 Feb 2026
Viewed by 56
Abstract
There are many types of IP surveillance cameras that connect to organizational or home data networks. However, these devices have vulnerabilities from their technological nature, and people often ignore procedures to protect their networks and devices, which generates security risks for networks, users, [...] Read more.
There are many types of IP surveillance cameras that connect to organizational or home data networks. However, these devices have vulnerabilities from their technological nature, and people often ignore procedures to protect their networks and devices, which generates security risks for networks, users, and information where they are connected. IP camera vulnerabilities can be exploited by threats and unauthorized persons to cause damage to an infrastructure. Security tests require specific knowledge, equipment, and specialized tools. Furthermore, their execution includes different steps and devices that require time for execution and processing. A methodology for rapid security testing of IP cameras could help identify vulnerabilities and security gaps to select cybersecurity controls to mitigate the risk of their use. This article presents a proof of concept for a methodology for rapid security tests on IP cameras based on NIST SP 800-115, to guide analysts in security tests to obtain results that allow them to take actions to mitigate risks. Full article
(This article belongs to the Proceedings of First Summer School on Artificial Intelligence in Cybersecurity)
Show Figures

Figure 1

28 pages, 2553 KB  
Review
Comparative Study of Supervised Deep Learning Architectures for Background Subtraction and Motion Segmentation on CDnet2014
by Oussama Boufares, Wajdi Saadaoui and Mohamed Boussif
Signals 2026, 7(1), 14; https://doi.org/10.3390/signals7010014 - 2 Feb 2026
Viewed by 119
Abstract
Foreground segmentation and background subtraction are critical components in many computer vision applications, such as intelligent video surveillance, urban security systems, and obstacle detection for autonomous vehicles. Although extensively studied over the past decades, these tasks remain challenging, particularly due to rapid illumination [...] Read more.
Foreground segmentation and background subtraction are critical components in many computer vision applications, such as intelligent video surveillance, urban security systems, and obstacle detection for autonomous vehicles. Although extensively studied over the past decades, these tasks remain challenging, particularly due to rapid illumination changes, dynamic backgrounds, cast shadows, and camera movements. The emergence of supervised deep learning-based methods has significantly enhanced performance, surpassing traditional approaches on the benchmark dataset CDnet2014. In this context, this paper provides a comprehensive review of recent supervised deep learning techniques applied to background subtraction, along with an in-depth comparative analysis of state-of-the-art approaches available on the official CDnet2014 results platform. Specifically, we examine several key architecture families, including convolutional neural networks (CNN and FCN), encoder–decoder models such as FgSegNet and Motion U-Net, adversarial frameworks (GAN), Transformer-based architectures, and hybrid methods combining intermittent semantic segmentation with rapid detection algorithms such as RT-SBS-v2. Beyond summarizing existing works, this review contributes a structured cross-family comparison under a unified benchmark, a focused analysis of performance behavior across challenging CDnet2014 scenarios, and a critical discussion of the trade-offs between segmentation accuracy, robustness, and computational efficiency for practical deployment. Full article
Show Figures

Figure 1

5 pages, 173 KB  
Proceeding Paper
From Camera to Algorithm: OpenCV and AI Workshop for the Cybersecurity of the Future
by Pablo Natera-Muñoz, Fernando Broncano-Morgado and Pablo Garcia-Rodriguez
Eng. Proc. 2026, 123(1), 4; https://doi.org/10.3390/engproc2026123004 - 30 Jan 2026
Viewed by 150
Abstract
Artificial vision and artificial intelligence (AI) are increasingly interconnected in cybersecurity. This work presents an overview of OpenCV-based visual computing as a core tool for intelligent security systems that analyze real-time visual data. It includes practical exercises on face, edge, motion, and color [...] Read more.
Artificial vision and artificial intelligence (AI) are increasingly interconnected in cybersecurity. This work presents an overview of OpenCV-based visual computing as a core tool for intelligent security systems that analyze real-time visual data. It includes practical exercises on face, edge, motion, and color detection, forming the basis for advanced object recognition using YOLOv10. Real applications, such as document processing and camera-based anomaly detection, are implemented in a microservice architecture with OpenCV, and deep learning frameworks. Integrating computer vision and AI is shown to be essential for developing resilient and autonomous cybersecurity infrastructures. Full article
(This article belongs to the Proceedings of First Summer School on Artificial Intelligence in Cybersecurity)
26 pages, 2167 KB  
Article
AI-Powered Service Robots for Smart Airport Operations: Real-World Implementation and Performance Analysis in Passenger Flow Management
by Eleni Giannopoulou, Panagiotis Demestichas, Panagiotis Katrakazas, Sophia Saliverou and Nikos Papagiannopoulos
Sensors 2026, 26(3), 806; https://doi.org/10.3390/s26030806 - 25 Jan 2026
Viewed by 438
Abstract
The proliferation of air travel demand necessitates innovative solutions to enhance passenger experience while optimizing airport operational efficiency. This paper presents the pilot-scale implementation and evaluation of an AI-powered service robot ecosystem integrated with thermal cameras and 5G wireless connectivity at Athens International [...] Read more.
The proliferation of air travel demand necessitates innovative solutions to enhance passenger experience while optimizing airport operational efficiency. This paper presents the pilot-scale implementation and evaluation of an AI-powered service robot ecosystem integrated with thermal cameras and 5G wireless connectivity at Athens International Airport. The system addresses critical challenges in passenger flow management through real-time crowd analytics, congestion detection, and personalized robotic assistance. Eight strategically deployed thermal cameras monitor passenger movements across check-in areas, security zones, and departure entrances while employing privacy-by-design principles through thermal imaging technology that reduces personally identifiable information capture. A humanoid service robot, equipped with Robot Operating System navigation capabilities and natural language processing interfaces, provides real-time passenger assistance including flight information, wayfinding guidance, and congestion avoidance recommendations. The wi.move platform serves as the central intelligence hub, processing video streams through advanced computer vision algorithms to generate actionable insights including passenger count statistics, flow rate analysis, queue length monitoring, and anomaly detection. Formal trial evaluation conducted on 10 April 2025, with extended operational monitoring from April to June 2025, demonstrated strong technical performance with application round-trip latency achieving 42.9 milliseconds, perfect service reliability and availability ratings of one hundred percent, and comprehensive passenger satisfaction scores exceeding 4.3/5 across all evaluated dimensions. Results indicate promising potential for scalable deployment across major international airports, with identified requirements for sixth-generation network capabilities to support enhanced multi-robot coordination and advanced predictive analytics functionalities in future implementations. Full article
(This article belongs to the Section Sensors and Robotics)
Show Figures

Figure 1

26 pages, 7633 KB  
Review
Compound Meta-Optics for Advanced Optical Engineering
by Hak-Ryeol Lee, Dohyeon Kim and Sun-Je Kim
Sensors 2026, 26(3), 792; https://doi.org/10.3390/s26030792 - 24 Jan 2026
Viewed by 511
Abstract
Compound meta-optics, characterized by the unprecedented complex optical architectures containing single or multiple meta-optics elements, has emerged as a powerful paradigm for overcoming the physical limitations of single-layer metasurfaces. This review systematically examines the recent progress in this burgeoning field, primarily focusing on [...] Read more.
Compound meta-optics, characterized by the unprecedented complex optical architectures containing single or multiple meta-optics elements, has emerged as a powerful paradigm for overcoming the physical limitations of single-layer metasurfaces. This review systematically examines the recent progress in this burgeoning field, primarily focusing on the development of high-performance optical systems for imaging, display, sensing, and computing. We first focus on the design of compound metalens architectures that integrate metalenses with additional elements such as iris, refractive optics, or other meta-optics elements. These configurations effectively succeed in providing multiple high-quality image quality metrics simultaneously by correcting monochromatic and chromatic aberrations, expanding the field of view, enhancing overall efficiency, and so on. Thus, the compound approach enables practical applications in next-generation cameras and sensors. Furthermore, we explore the advancement of cascaded metasurfaces in the realm of wave-optics, specifically for advanced meta-holography and optical computing. These multi-layered systems facilitate complex wavefront engineering, leading to significant increases in information capacity and functionality for security and analog optical computing applications. By providing a comprehensive overview of fundamental principles, design strategies, and emerging applications, this review aims to offer a clear perspective on the pivotal role of compound meta-optics in devising and optimizing compact, multifunctional optical systems to optics engineers with a variety of professional knowledge backgrounds and techniques. Full article
(This article belongs to the Section Optical Sensors)
Show Figures

Figure 1

36 pages, 4183 KB  
Article
Distinguishing a Drone from Birds Based on Trajectory Movement and Deep Learning
by Andrii Nesteruk, Valerii Nikitin, Yosyp Albrekht, Łukasz Ścisło, Damian Grela and Paweł Król
Sensors 2026, 26(3), 755; https://doi.org/10.3390/s26030755 - 23 Jan 2026
Viewed by 243
Abstract
Unmanned aerial vehicles (UAVs) increasingly share low-altitude airspace with birds, making early distinguishing between drones and biological targets critical for safety and security. This work addresses long-range scenarios where objects occupy only a few pixels and appearance-based recognition becomes unreliable. We develop a [...] Read more.
Unmanned aerial vehicles (UAVs) increasingly share low-altitude airspace with birds, making early distinguishing between drones and biological targets critical for safety and security. This work addresses long-range scenarios where objects occupy only a few pixels and appearance-based recognition becomes unreliable. We develop a model-driven simulation pipeline that generates synthetic data with a controlled camera model, atmospheric background and realistic motion of three aerial target types: multicopter, fixed-wing UAV and bird. From these sequences, each track is encoded as a time series of image-plane coordinates and apparent size, and a bidirectional long short-term memory (LSTM) network is trained to classify trajectories as drone-like or bird-like. The model learns characteristic differences in smoothness, turning behavior and velocity fluctuations, and to achieve reliable separation between drone and bird motion patterns on synthetic test data. Motion-trajectory cues alone can support early distinguishing of drones from birds when visual details are scarce, providing a complementary signal to conventional image-based detection. The proposed synthetic data and sequence classification pipeline forms a reproducible testbed that can be extended with real trajectories from radar or video tracking systems and used to prototype and benchmark trajectory-based recognizers for integrated surveillance solutions. The proposed method is designed to generalize naturally to real surveillance systems, as it relies on trajectory-level motion patterns rather than appearance-based features that are sensitive to sensor quality, illumination, or weather conditions. Full article
(This article belongs to the Section Industrial Sensors)
Show Figures

Graphical abstract

29 pages, 3737 KB  
Article
Off-Grid Surveillance Powered by Solar Energy: A Comparative Study of MPPT Algorithms
by Duhan Güneş, Ayşe Aybike Şeker and Belgin Emre Türkay
Energies 2026, 19(2), 489; https://doi.org/10.3390/en19020489 - 19 Jan 2026
Viewed by 206
Abstract
The growing global population has increased the demand for reliable security systems, especially in areas with limited or unstable energy infrastructure. Renewable energy sources, particularly solar panels, offer an effective solution to ensure continuous operation of cameras and sensors on security poles in [...] Read more.
The growing global population has increased the demand for reliable security systems, especially in areas with limited or unstable energy infrastructure. Renewable energy sources, particularly solar panels, offer an effective solution to ensure continuous operation of cameras and sensors on security poles in such regions. This study analyzes data from a solar-powered security pole and develops Maximum Power Point Tracking (MPPT) algorithms to improve system efficiency. The original design, which relied solely on a buck converter, lacked flexibility. To address this, a buck–boost converter capable of operating in both buck and boost modes was designed, and the proposed algorithms were implemented and tested on this converter. Classical MPPT techniques, including Perturb and Observe (P&O) and Incremental Conductance (IC), were evaluated for their performance. Additionally, under partial shading conditions, metaheuristic approaches such as Particle Swarm Optimization (PSO) and Grey Wolf Optimizer (GWO) were examined and compared. The performance of all algorithms was assessed in terms of energy efficiency and system adaptability. This study aims to contribute to renewable energy-based solutions by developing flexible and high-performance energy management systems for applications with limited energy access, such as security poles in rural areas. Full article
Show Figures

Figure 1

15 pages, 1607 KB  
Article
Using Steganography and Artificial Neural Network for Data Forensic Validation and Counter Image Deepfakes
by Matimu Caswell Nkuna, Ebenezer Esenogho and Ahmed Ali
Computers 2026, 15(1), 61; https://doi.org/10.3390/computers15010061 - 15 Jan 2026
Viewed by 326
Abstract
The merging of the Internet of Things (IoT) and Artificial Intelligence (AI) advances has intensified challenges related to data authenticity and security. These advancements necessitate a multi-layered security approach to ensure the security, reliability, and integrity of critical infrastructure and intelligent surveillance systems. [...] Read more.
The merging of the Internet of Things (IoT) and Artificial Intelligence (AI) advances has intensified challenges related to data authenticity and security. These advancements necessitate a multi-layered security approach to ensure the security, reliability, and integrity of critical infrastructure and intelligent surveillance systems. This paper proposes a two-layered security approach that combines a discrete cosine transform least significant bit 2 (DCT-LSB-2) with artificial neural networks (ANNs) for data forensic validation and mitigating deepfakes. The proposed model encodes validation codes within the LSBs of cover images captured by an IoT camera on the sender side, leveraging the DCT approach to enhance the resilience against steganalysis. On the receiver side, a reverse DCT-LSB-2 process decodes the embedded validation code, which is subjected to authenticity verification by a pre-trained ANN model. The ANN validates the integrity of the decoded code and ensures that only device-originated, untampered images are accepted. The proposed framework achieved an average SSIM of 0.9927 across the entire investigated embedding capacity, ranging from 0 to 1.988 bpp. DCT-LSB-2 showed a stable Peak Signal-to-Noise Ratio (average 42.44 dB) under various evaluated payloads ranging from 0 to 100 kB. The proposed model achieved a resilient and robust multi-layered data forensic validation system. Full article
(This article belongs to the Special Issue Multimedia Data and Network Security)
Show Figures

Graphical abstract

21 pages, 65310 KB  
Article
The Effect of Electromagnetic Pulse Attacks on USB Camera Performance
by Gang Wei, Lei Shu, Wei Lin, Xing Yang, Ru Han, Kailiang Li and Kai Huang
J. Sens. Actuator Netw. 2026, 15(1), 4; https://doi.org/10.3390/jsan15010004 - 29 Dec 2025
Viewed by 858
Abstract
The camera is a core device for modern surveillance and data collection, widely used in various fields including security, transportation, and healthcare. However, their widespread deployment has proportionally escalated associated security risks. This paper initially examines the current state of research on attack [...] Read more.
The camera is a core device for modern surveillance and data collection, widely used in various fields including security, transportation, and healthcare. However, their widespread deployment has proportionally escalated associated security risks. This paper initially examines the current state of research on attack methods targeting camera systems, providing a comprehensive review of various attack techniques and their security implications. Subsequently, we focus on a specific attack method against universal serial bus (USB) cameras, known as electromagnetic pulse (EMP) attacks, which utilize EMP to prevent the system from detecting the cameras. We simulated EMP attacks using a solar insecticidal lamp (which generates EMP by releasing high-voltage pulses) and a commercially available EMP generator. The performance of the cameras under various conditions was evaluated by adjusting the number of filtering magnetic rings on the USB cable and the distance between the camera and the interference source. The results demonstrate that some USB cameras are vulnerable to EMP attacks. Although EMP attacks might not invariably cause image distortion or permanent damage, their covert nature can lead to false detection of system failures, data security, and system maintenance. Based on these findings, it is recommended to determine the optimal number of shielding rings for cameras or their safe distance from EMP sources through the experimental approach outlined in this study, thereby enhancing the security and resilience of USB camera enabled systems in specific scenarios. Full article
Show Figures

Figure 1

17 pages, 957 KB  
Article
Cybersecure Intelligent Sensor Framework for Smart Buildings: AI-Based Intrusion Detection and Resilience Against IoT Attacks
by Md Abubokor Siam, Khadeza Yesmin Lucky, Syed Nazmul Hasan, Jobanpreet Kaur, Harleen Kaur, Md Salah Uddin and Mia Md Tofayel Gonee Manik
Sensors 2025, 25(24), 7680; https://doi.org/10.3390/s25247680 - 18 Dec 2025
Viewed by 739
Abstract
The rapid development of the Internet of Things (IoT), a network of interconnected devices and sensors, has improved operational efficiency, comfort, and sustainability in smart buildings. However, relying on interconnected systems also introduces cybersecurity vulnerabilities. For instance, attackers can exploit zero-day vulnerabilities (previously [...] Read more.
The rapid development of the Internet of Things (IoT), a network of interconnected devices and sensors, has improved operational efficiency, comfort, and sustainability in smart buildings. However, relying on interconnected systems also introduces cybersecurity vulnerabilities. For instance, attackers can exploit zero-day vulnerabilities (previously unknown security flaws), launch Distributed Denial of Service (DDoS) attacks (overwhelming network resources with traffic), or access sensitive Building Management Systems (BMS, centralized platforms for controlling building operations). By targeting critical assets such as Heating, Ventilation, and Air Conditioning (HVAC) systems, security cameras, and access control networks, they may compromise the safety and functionality of the entire building. To address these threats, this paper presents a cybersecure intelligent sensor framework to protect smart buildings from various IoT-related cyberattacks. The main component is an automated Intrusion Detection System (IDS, software that monitors network activity for suspicious actions), which uses machine learning algorithms to rapidly identify, classify, and respond to potential threats. Furthermore, the framework integrates intelligent sensor networks with AI-based analytics, enabling continuous monitoring of environmental and system data for behaviors that might indicate security breaches. By using predictive modeling (forecasting attacks based on prior data) and automated responses, the proposed system enhances resilience against attacks such as denial of service, unauthorized access, and data manipulation. Simulation and testing results show high detection rates, low false alarm frequencies, and fast response times, thereby supporting the cybersecurity of smart building infrastructures and minimizing downtime. Overall, the findings suggest that AI-enhanced cybersecurity systems offer promise for IoT-based smart building security. Full article
(This article belongs to the Special Issue Intelligent Sensors and Artificial Intelligence in Building)
Show Figures

Figure 1

32 pages, 14384 KB  
Article
CSPC-BRS: An Enhanced Real-Time Multi-Target Detection and Tracking Algorithm for Complex Open Channels
by Wei Li, Xianpeng Zhu, Aghaous Hayat, Hu Yuan and Xiaojiang Yang
Electronics 2025, 14(24), 4942; https://doi.org/10.3390/electronics14244942 - 16 Dec 2025
Viewed by 269
Abstract
Ensuring worker safety compliance and secure cargo transportation in complex port environments is critical for modern logistics hubs. However, conventional supervision methods, including manual inspection and passive video monitoring, suffer from limited coverage, poor real-time responsiveness, and low robustness under frequent occlusion, scale [...] Read more.
Ensuring worker safety compliance and secure cargo transportation in complex port environments is critical for modern logistics hubs. However, conventional supervision methods, including manual inspection and passive video monitoring, suffer from limited coverage, poor real-time responsiveness, and low robustness under frequent occlusion, scale variation, and cross-camera transitions, leading to unstable target association and missed risk events. To address these challenges, this paper proposes CSPC-BRS, a real-time multi-object detection and tracking framework for open-channel port scenarios. CSPC (Coordinated Spatial Perception Cascade) enhances the YOLOv8 backbone by integrating CASAM, SPPELAN-DW, and CACC modules to improve feature representation under cluttered backgrounds and degraded visual conditions. Meanwhile, BRS (Bounding Box Reduction Strategy) mitigates scale distortion during tracking, and a Multi-Dimensional Re-identification Scoring (MDRS) mechanism fuses six perceptual features—color, texture, shape, motion, size, and time—to achieve stable cross-camera identity consistency. Experimental results demonstrate that CSPC-BRS outperforms the YOLOv8-n baseline by improving the mAP@0.5:0.95 by 9.6% while achieving a real-time speed of 132.63 FPS. Furthermore, in practical deployment, it reduces the false capture rate by an average of 59.7% compared to the YOLOv8 + Bot-SORT tracker. These results confirm that CSPC-BRS effectively balances detection accuracy and computational efficiency, providing a practical and deployable solution for intelligent safety monitoring in complex industrial logistics environments. Full article
Show Figures

Figure 1

11 pages, 258 KB  
Article
Perspectives on Rising Societal Crime on Workplace Productivity in a Small Island Developing State
by Adeoye Adenekan, Marsha Ivey and Srikanta Banerjee
Int. J. Environ. Res. Public Health 2025, 22(12), 1858; https://doi.org/10.3390/ijerph22121858 - 12 Dec 2025
Viewed by 298
Abstract
Objectives: The crime rate in Trinidad and Tobago has increased over the last few years. It is important to understand the impact of rising societal crime on university workplace productivity in order to make meaningful recommendations to mitigate the negative effects of crime. [...] Read more.
Objectives: The crime rate in Trinidad and Tobago has increased over the last few years. It is important to understand the impact of rising societal crime on university workplace productivity in order to make meaningful recommendations to mitigate the negative effects of crime. Methods: We conducted semi-structured interviews online via Zoom and face-to-face with both academic and non-academic staff from a university located in Trinidad and Tobago in April 2025. We employed purposive sampling and topics explored included participants’ views on crime, the effect of crime on workplace productivity, the effect of crime on workplace concentration, the effect of crime on participants’ mental health, concerns about safety at the workplace, and desired changes or suggestions to ensure improved safety at the workplace. Data were manually analyzed, and we employed thematic analysis to understand the participants’ data. Results: Analysis included data from 10 participants. Participants represented both academic and non-academic staff, with varied ethnic backgrounds, age range, and were both from Mount Hope and the main campus. Seven of the participants believed that their work productivity had been negatively affected by the crime situation. All the participants agreed that the crime situation was out of control; two of the participants claimed to have been victims of crime. Five of the participants believed they had experienced depressive symptoms, while six participants claimed to have experienced poor concentration on the job. Five participants expressed genuine concerns that something terrible could happen to them within their workplace premises. In order to improve security at the workplace, seven of the participants suggested the employment of more security personnel, while six participants highlighted the need for more surveillance and closed-circuit television (CCTV) cameras. Participants identified four major categories or themes: views on crime and its effects on individuals; effects of crime on workplace productivity; effects of crime on mental well-being; and suggestions and opportunities to improve security at the workplace. Conclusions: From this study, it can be inferred that the majority of the participants were negatively affected by the climate of crime in the country. A comprehensive risk assessment would identify potential risks and vulnerabilities faced by staff, while enhanced surveillance measures and the promotion of the Employee Assistance Program (EAP) can support those impacted. Staff should also be trained to respond effectively to potential threats. Full article
(This article belongs to the Section Behavioral and Mental Health)
22 pages, 35671 KB  
Article
Cyber-Physical System for Terminal Infrastructure Monitoring: A Depth-Free Registration Framework via Geometric-Model Fusion
by Wanli Dang, Jian Cheng, Chao Wang, Qian Luo and Meng Li
Appl. Sci. 2025, 15(24), 13079; https://doi.org/10.3390/app152413079 - 11 Dec 2025
Viewed by 454
Abstract
The monitoring and security of large-scale terminal infrastructures represent a critical application domain for industrial cyber-physical systems. However, real-time 3D visualization in such environments faces significant challenges from dense crowds, specular reflections, and complex architectural layouts. This paper presents a cyber-physical system for [...] Read more.
The monitoring and security of large-scale terminal infrastructures represent a critical application domain for industrial cyber-physical systems. However, real-time 3D visualization in such environments faces significant challenges from dense crowds, specular reflections, and complex architectural layouts. This paper presents a cyber-physical system for terminal infrastructure monitoring, underpinned by a novel, depth-free camera registration framework. At its core, the system establishes explicit geometric mappings across four coordinate systems (world, 3D model, camera, image), leveraging known installation parameters to eliminate dependency on depth sensors. Dynamic inconsistencies are resolved through a multi-stage layout refinement process, enabling robust operation under terminal-specific challenges. The framework maintains real-time performance at over 25 FPS when processing 16 concurrent video streams on commercial hardware. Extensive evaluations demonstrate a 44.9% reduction in registration error compared to state-of-the-art methods, validating the system’s practicality for enhancing situational awareness and security in large-scale, dynamic terminals. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Back to TopTop