Time filter

Source Type

Harada N.,Platform Strategic Marketing Division | Ishidera E.,Ubiquitous Solutions Group | Oami R.,Information and Media Processing Laboratories | Nakao T.,Service Platforms Research Laboratories
NEC Technical Journal

Previously, image analysis software for human behavior was considered to be an optional extra. Recently, however, image analysis software acting as a business supporting tool has been gaining importance, and the scale of video monitoring systems is becoming larger with the spread of monitoring cameras and trends toward networked equipment. We at NEC, as well, aim to realize a video monitoring system for security which supports operators watching video monitors to become aware of abnormal states. In order to realize the system, we are attempting to put analysis technologies for human behavior into practical use. For automatically detecting prohibited activity and dangerous behavior, persons are automatically detected among the images captured by monitoring cameras, and these persons are tracked by the monitoring cameras. The obtained information is analyzed in real time in accordance with the rules preset for monitoring. This paper explains the technical problems related to the analysis of human behavior and our approaches to solving these problems. In addition, we would like to introduce examples of the applications of analysis technologies working in conjunction with associated systems. Source

Dempo H.,System Platforms Research Laboratories | Kami N.,System Platforms Research Laboratories | Takemura T.,Service Platforms Research Laboratories | Yanagisawa M.,Service Platforms Research Laboratories
NEC Technical Journal

As the cloud computing environment spreads, importance of IT/network resource operation increases. For example, swiftness of configuration changes and flexibility of resource deployment are required. Therefore, this research and development has proceeded with research on the new autonomic operation control information network architecture, route information sharing technique, and virtualization equipment profiling technology. By interlocking these mutually, realization of the autonomic operation control infrastructure in the cloud computing environment is aimed. Source

Ogawa R.,Service Platforms Research Laboratories | Maeno Y.,Service Platforms Research Laboratories | Nakae M.,Service Platforms Research Laboratories
NEC Technical Journal

In the virtual server integrated environment, users from different organizations must share resources correctly via various types of software, so illegal access and information leak will be prevented in advance. In the cloud computing environment where dynamic placement of resources and creation/deletion of services occur frequently, however, managing and setting access control correctly is a large burden to the operation. To solve this issue, we have developed the integrated access control management technology supporting multi-layer and multi-vendor software. This paper introduces the overview of the technology developed and the proposal for its international standardization. Source

Shimamura H.,Service Platforms Research Laboratories | Soejima K.,Service Platforms Research Laboratories | Kuroda T.,Service Platforms Research Laboratories | Nishimura S.,Service Platforms Research Laboratories
NEC Technical Journal

In achieving a SaaS-type cloud computing that will contain applications for multiple tenants, the density of containing tenants per infrastructure greatly affects the costs for providing services. This paper introduces the fine-grained application flow control technology that maximizes the density of containing tenants through letting the tenants share applications and then separating the tenants from each other for individual processes. Source

Isoyama K.,Service Platforms Research Laboratories | Sato T.,Service Platforms Research Laboratories | Kida K.,Service Platforms Research Laboratories | Yoshida M.,Service Platforms Research Laboratories
NEC Technical Journal

Recent progress in networks and devices has promoted a great diversity of M2M services and the number of devices connected to the M2M service platforms is expected to continue to grow. This paper introduces a complex event processing (CEP) technology that detects significant data changes in the M2M services in real time via data collected from a large number of devices. Source

Discover hidden collaborations