To see the other types of publications on this topic, follow the link: Electronic surveillance in art.

Dissertations / Theses on the topic 'Electronic surveillance in art'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Electronic surveillance in art.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Margolis, David. "An analysis of electronic surveillance in the USAPATRIOT act." Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/776.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Health and Public Affairs
Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
2

Edwards, Floyd. "U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4617.

Full text
Abstract:
Since the implementation of the USA Patriot Act in October 2001, public trust in the U.S. federal government to protect individuals' right to privacy has been affected negatively. Many studies have addressed this topic, but few have delved deeply into the reasons behind the distrust. The purposes of this qualitative study were, to explore the perceptions and attitudes of U.S. citizens regarding the effect of the USA Patriot Act on their right to privacy, to determine whether a loss of trust in the government occurred, and to identify the factors contributing to the lack of trust. The theoretical foundation for this study was Rawl's Social Perspective of Public Trust, Sax's Augmentation of Social Contract Theory, and Ajzen's Theory of Planned Behavior. The central research question pertained to the views of U.S. citizens about the federal government's use of electronic surveillance to monitor their communication without their knowledge. A generic qualitative study design was employed using purposeful, semi-structured interviews of 20 purposely sampled adult male and female U.S. citizens. Data from the interviews were coded and categorized for thematic analysis. When confronted with the lesser known specifics of the electronic surveillance provision of the USA Patriot Act, participants were more likely to reject the government interference as an invasion of privacy. This study can provide guidance for the democratic basis of policymaking designed to protect U.S. citizens. The implication for social change includes providing information to policymakers of both the US and organizations of various sizes regarding the polarized views and lack of trust pertaining to electronic surveillance among U.S. public. This information can be used to implement program or campaign to foster trust.
APA, Harvard, Vancouver, ISO, and other styles
3

Ulkemen, Sinan Bland Robert L. "The impact of surveillance technology on the behaviors of municipal police departments." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shashidhara, Shilpa. "Resident Rights and Electronic Monitoring." Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc31546/.

Full text
Abstract:
The purpose of this exploratory study was to examine resident, family member and staff perceptions of electronic monitoring and their effect on resident rights. The sample consisted of 53 nursing home residents, 104 staff and 25 family members, in the Dallas Fort Worth metroplex, from a nursing facility in which residents utilize video cameras in their rooms (Nursing Facility 1), two nursing facilities that have video cameras in their common rooms areas (Nursing Facility 2 and 3) and a nursing facility that does not utilize video cameras (Nursing Facility 4). The interview questions and self-administered surveys were in regard to the participant's perceptions of electronic monitoring, perceived risks and benefits of video cameras, awareness of resident rights and consciousness of potential risks to resident rights. Data were analyzed using a mixed methods approach using both ATLAS t.i and SAS. Study findings revealed that residents, family members and staff are aware of the potential benefits of electronic monitoring in nursing facilities. While respondents are hesitant to have electronic monitoring in resident rooms, they are interested in utilizing electronic monitoring in common areas. While residents and staff believe that electronic monitoring compromises resident rights, family members believe resident rights are protected. Different types of staff have different perceptions of electronic monitoring. Those staff members that are more directly involved in resident care are less accepting of electronic monitoring compared to staff that have episodic visits with residents. Among staff members, nursing facilities with prior experience with electronic monitoring are less accepting of electronic monitoring. Further studies are needed to enhance this research.
APA, Harvard, Vancouver, ISO, and other styles
5

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/26536/1/James_Watt_Thesis.pdf.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
6

Watt, James Robert. "Electronic workplace surveillance and employee privacy : a comparative analysis of privacy protection in Australia and the United States." Queensland University of Technology, 2009. http://eprints.qut.edu.au/26536/.

Full text
Abstract:
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.
APA, Harvard, Vancouver, ISO, and other styles
7

Ozdogan, Ali. "Communication Assistance for Law Enforcement Act of 1994: A Case Study." Thesis, University of North Texas, 2001. https://digital.library.unt.edu/ark:/67531/metadc2877/.

Full text
Abstract:
The purpose of this study is: to explore and analyze the Communication Assistance for Law Enforcement Act of 1994 (CALEA), to identify problems related to CALEA, to identify solutions devised by other countries to overcome problems similar to CALEA's, and to propose feasible solutions to CALEA problems.
APA, Harvard, Vancouver, ISO, and other styles
8

Ulkemen, Sinan. "The Impact of Surveillance Technology on the Behaviors of Municipal Police Departments." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12209/.

Full text
Abstract:
Citizen complaints about inappropriate use of force indicate negative police-public relations, unresponsive police services, and the unresponsiveness of police management to citizens' concerns. However, the effective delivery of key policing services depends on the performance of individual police officers. Surveillance technology can monitor and control the behavior of officers, ensuring that police officers provide high quality policing services that meet the needs of citizens. Examples of surveillance technology such as in-car cameras and CCTV can be used as an administrative tool to respond to citizen complaints by police chief executives. This research examines the effect of surveillance technology on the behavior of municipal police departments that is operationalized as the number of citizen complaints that were filed against municipal police departments. This research also examines the impact of surveillance technology on dismissed and sustained complaints by using 511 large municipal police departments in the U.S. from Law Enforcement Management and Administrative Statistics (LEMAS) 2003 dataset. Three different models are developed to evaluate the impact of in-car cameras and CCTV on the citizen complaints and their dispositions. Two ordinary least square regression (OLS) models and a Heckman selection model are used to analyze the data. The Heckman selection model is utilized to correct for selection bias in truncated data for sustained complaints after log transformation. The results suggest that the use of surveillance technology by the police is necessary, but insufficient, in reducing the number of complaints. The finding suggests that videotaped evidence, recorded by surveillance technology, increased the number of convictions of accused officers in municipal police departments. The analysis also suggests that municipal police departments that used CCTV only in 2003 received a higher number of citizen complaints, in comparison to municipal police departments without CCTV, both in 2000 and 2003. No evidence was found to indicate that surveillance technology has a positive impact on the percentage of dismissed complaints.
APA, Harvard, Vancouver, ISO, and other styles
9

Pati, Nishikanta. "Occlusion Tolerant Object Recognition Methods for Video Surveillance and Tracking of Moving Civilian Vehicles." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5133/.

Full text
Abstract:
Recently, there is a great interest in moving object tracking in the fields of security and surveillance. Object recognition under partial occlusion is the core of any object tracking system. This thesis presents an automatic and real-time color object-recognition system which is not only robust but also occlusion tolerant. The intended use of the system is to recognize and track external vehicles entered inside a secured area like a school campus or any army base. Statistical morphological skeleton is used to represent the visible shape of the vehicle. Simple curve matching and different feature based matching techniques are used to recognize the segmented vehicle. Features of the vehicle are extracted upon entering the secured area. The vehicle is recognized from either a digital video frame or a static digital image when needed. The recognition engine will help the design of a high performance tracking system meant for remote video surveillance.
APA, Harvard, Vancouver, ISO, and other styles
10

Santiteerakul, Wasana. "Trajectory Analytics." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801885/.

Full text
Abstract:
The numerous surveillance videos recorded by a single stationary wide-angle-view camera persuade the use of a moving point as the representation of each small-size object in wide video scene. The sequence of the positions of each moving point can be used to generate a trajectory containing both spatial and temporal information of object's movement. In this study, we investigate how the relationship between two trajectories can be used to recognize multi-agent interactions. For this purpose, we present a simple set of qualitative atomic disjoint trajectory-segment relations which can be utilized to represent the relationships between two trajectories. Given a pair of adjacent concurrent trajectories, we segment the trajectory pair to get the ordered sequence of related trajectory-segments. Each pair of corresponding trajectory-segments then is assigned a token associated with the trajectory-segment relation, which leads to the generation of a string called a pairwise trajectory-segment relationship sequence. From a group of pairwise trajectory-segment relationship sequences, we utilize an unsupervised learning algorithm, particularly the k-medians clustering, to detect interesting patterns that can be used to classify lower-level multi-agent activities. We evaluate the effectiveness of the proposed approach by comparing the activity classes predicted by our method to the actual classes from the ground-truth set obtained using the crowdsourcing technique. The results show that the relationships between a pair of trajectories can signify the low-level multi-agent activities.
APA, Harvard, Vancouver, ISO, and other styles
11

Meyer, Aric. "FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards?" Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc9838/.

Full text
Abstract:
Electronic surveillance for foreign intelligence purposes was largely unregulated prior to 1978. The Foreign Intelligence Surveillance Act of 1978 (hereinafter "FISA") was enacted to implement a judicial authorization process for foreign intelligence electronic surveillance that would effectively balance competing needs for national security and civil liberty under the Fourth Amendment. This study examines the evolution of FISA and its effectiveness under the Fourth Amendment, as assessed by federal reviewing courts and scholars since the statute's enactment. The study concludes that the FISA electronic surveillance authorization process has been effective in providing a constitutional mechanism to obtain foreign intelligence information.
APA, Harvard, Vancouver, ISO, and other styles
12

Tedeschi, Francesca <1997&gt. "Mimesis and Surveillance Art." Master's Degree Thesis, Università Ca' Foscari Venezia, 2022. http://hdl.handle.net/10579/21291.

Full text
Abstract:
Partendo dalle nozioni fondamentali sul tema del mascheramento e del volto espresse da diversi critici e studiosi come Belting, Bettini, Frontisi-Ducroux, Vernant. A seguire, vi sarà sviluppata un'approfondita elaborazione sul concetto di mimesis. Il lavoro prevede l'analisi di tre case studies nell'ambito dell'arte contemporanea. Gli artisti individuati fanno parte di quella che viene definita corrente della "Surveillance Art", una critica politica ai metodi di sorveglianza sempre più presenti nelle nostre società contemporanee.
APA, Harvard, Vancouver, ISO, and other styles
13

Janmohammadi, Siamak. "Classifying Pairwise Object Interactions: A Trajectory Analytics Approach." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc801901/.

Full text
Abstract:
We have a huge amount of video data from extensively available surveillance cameras and increasingly growing technology to record the motion of a moving object in the form of trajectory data. With proliferation of location-enabled devices and ongoing growth in smartphone penetration as well as advancements in exploiting image processing techniques, tracking moving objects is more flawlessly achievable. In this work, we explore some domain-independent qualitative and quantitative features in raw trajectory (spatio-temporal) data in videos captured by a fixed single wide-angle view camera sensor in outdoor areas. We study the efficacy of those features in classifying four basic high level actions by employing two supervised learning algorithms and show how each of the features affect the learning algorithms’ overall accuracy as a single factor or confounded with others.
APA, Harvard, Vancouver, ISO, and other styles
14

Akram, Muhammad. "Surveillance centric coding." Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/2320.

Full text
Abstract:
The research work presented in this thesis focuses on the development of techniques specific to surveillance videos for efficient video compression with higher processing speed. The Scalable Video Coding (SVC) techniques are explored to achieve higher compression efficiency. The framework of SVC is modified to support Surveillance Centric Coding (SCC). Motion estimation techniques specific to surveillance videos are proposed in order to speed up the compression process of the SCC. The main contributions of the research work presented in this thesis are divided into two groups (i) Efficient Compression and (ii) Efficient Motion Estimation. The paradigm of Surveillance Centric Coding (SCC) is introduced, in which coding aims to achieve bit-rate optimisation and adaptation of surveillance videos for storing and transmission purposes. In the proposed approach the SCC encoder communicates with the Video Content Analysis (VCA) module that detects events of interest in video captured by the CCTV. Bit-rate optimisation and adaptation are achieved by exploiting the scalability properties of the employed codec. Time segments containing events relevant to surveillance application are encoded using high spatiotemporal resolution and quality while the irrelevant portions from the surveillance standpoint are encoded at low spatio-temporal resolution and / or quality. Thanks to the scalability of the resulting compressed bit-stream, additional bit-rate adaptation is possible; for instance for the transmission purposes. Experimental evaluation showed that significant reduction in bit-rate can be achieved by the proposed approach without loss of information relevant to surveillance applications. In addition to more optimal compression strategy, novel approaches to performing efficient motion estimation specific to surveillance videos are proposed and implemented with experimental results. A real-time background subtractor is used to detect the presence of any motion activity in the sequence. Different approaches for selective motion estimation, GOP based, Frame based and Block based, are implemented. In the former, motion estimation is performed for the whole group of pictures (GOP) only when a moving object is detected for any frame of the GOP. iii While for the Frame based approach; each frame is tested for the motion activity and consequently for selective motion estimation. The selective motion estimation approach is further explored at a lower level as Block based selective motion estimation. Experimental evaluation showed that significant reduction in computational complexity can be achieved by applying the proposed strategy. In addition to selective motion estimation, a tracker based motion estimation and fast full search using multiple reference frames has been proposed for the surveillance videos. Extensive testing on different surveillance videos shows benefits of application of proposed approaches to achieve the goals of the SCC.
APA, Harvard, Vancouver, ISO, and other styles
15

Fernandez, Arguedas Virginia. "Automatic object classification for surveillance videos." Thesis, Queen Mary, University of London, 2012. http://qmro.qmul.ac.uk/xmlui/handle/123456789/3354.

Full text
Abstract:
The recent popularity of surveillance video systems, specially located in urban scenarios, demands the development of visual techniques for monitoring purposes. A primary step towards intelligent surveillance video systems consists on automatic object classification, which still remains an open research problem and the keystone for the development of more specific applications. Typically, object representation is based on the inherent visual features. However, psychological studies have demonstrated that human beings can routinely categorise objects according to their behaviour. The existing gap in the understanding between the features automatically extracted by a computer, such as appearance-based features, and the concepts unconsciously perceived by human beings but unattainable for machines, or the behaviour features, is most commonly known as semantic gap. Consequently, this thesis proposes to narrow the semantic gap and bring together machine and human understanding towards object classification. Thus, a Surveillance Media Management is proposed to automatically detect and classify objects by analysing the physical properties inherent in their appearance (machine understanding) and the behaviour patterns which require a higher level of understanding (human understanding). Finally, a probabilistic multimodal fusion algorithm bridges the gap performing an automatic classification considering both machine and human understanding. The performance of the proposed Surveillance Media Management framework has been thoroughly evaluated on outdoor surveillance datasets. The experiments conducted demonstrated that the combination of machine and human understanding substantially enhanced the object classification performance. Finally, the inclusion of human reasoning and understanding provides the essential information to bridge the semantic gap towards smart surveillance video systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Zhou, Han, and 周晗. "Intelligent video surveillance in a calibrated multi-camera system." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45989217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

O'Malley, Patrick D. "Human activity tracking for wide-area surveillance." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000150.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains vi, 46 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
18

Adams, Andrew J. "Multispectral persistent surveillance /." Online version of thesis, 2008. http://hdl.handle.net/1850/7070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Medeme, Narasimha Rao. "Application of vehicle identification techniques in transportation surveillance with focus on security /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1426087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

González, Díaz Paloma. "Prácticas artísticas digitales y tecnologías de control y vigilancia (2001- 2010)." Doctoral thesis, Universitat de Barcelona, 2013. http://hdl.handle.net/10803/130965.

Full text
Abstract:
El uso masivo de tecnologías de registro y vigilancia por parte del estado y de empresas privadas, corrobora la evolución y trascendencia actual de la propuesta ideada por Jeremy Bentham en el siglo XVIII: El Panóptico. Su modelo de funcionamiento se ha incorporado y expandido en nuestra sociedad con tal intensidad, que cada vez son más las prácticas artísticas contemporáneas que cuestionan su existencia y eficacia. El interés primordial de nuestro estudio es analizar éste fenómeno y su evolución en el ámbito del new media art, concretamente en las creaciones digitales de la primera década del siglo (2001-2010). Durante este periodo se amplían y diversifican las tecnologías de control y se radicaliza la normativa -nacional y supranacional-que avala el registro permanente a la ciudadanía. Nuestra investigación pretende dar a conocer, tanto los puntos de encuentro, como las discrepancias existentes en un conjunto de creaciones sumamente diverso y plural. En ellas se difunden nuevos aspectos culturales, políticos y estéticos de las disciplinas de supervisión tecnológica. A través de investigación pretendemos mostrar cómo los nuevos paradigmas tecnófilos han repercutido en la creación digital del nuevo siglo, estudiando y relacionando diversos factores: no podemos limitarnos a enumerar o a describir un tipo de obras tan específicas que inevitablemente han de asociarse con acontecimientos producidos en el entorno donde se desarrollan. Para llevar a cabo una investigación organizada hemos dividido el trabajo en tres grandes bloques que finalizan con las Conclusiones de la misma: 1. Un recorrido inicial sobre la contextualización histórica, el origen e inicio de las primeras prácticas de control tecnológico. 2. Un recorrido histórico sobre el desarrollo y evolución de tendencias y proyectos artísticos concretos sobre vigilancia tecnificada en media art. Se divide en apartados sobre las tácticas (y sistemas) de control principal abordadas, teniendo en cuenta su correlación con determinados hechos tecnológicos, políticos y sociales. 3. En la tercera se propone el estudio de las líneas de trabajo más habituales de las prácticas artísticas entre 2001 a 2010, teniendo en cuenta las actitudes y posiciones más frecuentes con las que han sido concebidas la mayoría de las piezas estudiadas.
The objective of Digital Artistic Practices and Control and Surveillance Technologies (2001-2010) is the analysis of the massive use of recording and surveillance technologies by the state and private companies along with its evolution in the field of new media art and in particular that of digital creations of the first decade of this century (2001- 2010). The specific objectives are: • To investigate the origins and evolution of control and surveillance technologies in depth to discover the background of digital artwork developed during the first decade of the 21st century. • To study the real causes of the evolution of technical surveillance in order to establish the cause-effect of the creations selected. • To consider to what extent the supposed democratisation of technologies has led to truly innovative and outstanding proposals as far as digital creation is concerned. • To propose new creative paradigms and characterise these types of digital practices. The investigation uncovers how digital artistic practices related to technical control and surveillance developed between 2001-2010 have evolved in line with technological, political and social transformations. This thesis contributes to organising and strengthening the study, within History of Art, of artistic practices centred on offering new viewpoints of how the individual is continuously confronted by technical registers belonging to the authorities.
APA, Harvard, Vancouver, ISO, and other styles
21

Eriksson, Hannes, and Sollie Ivan Brange. "Wireless IO : A wireless accessory for integration of an Axis Communications camera in a sensor network." Thesis, Högskolan i Halmstad, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-34203.

Full text
Abstract:
When installing new network security cameras in buildings, the cameras are often connected to sensors via signal wires. Since most building already have internet and electricity drawn throughout the structure, the procedure of routing a new signal wire can be costly and time demanding. By replacing this wire with a wireless link, the cost and time it takes for the customer to install a camera could be reduced. The objective for this thesis is to investigate different wireless technologies used in short range, low power wireless communication networks such as PANs and LANs. Focusing on technologies used in the surveillance segment a decision will be made on which wireless technology that would suit as a link between a sensor and a camera for transmitting trigger signals. The technology will then be implemented in a proof-of-concept accessory, which can give an Axis Communications camera wireless functionality through it’s IO port.
APA, Harvard, Vancouver, ISO, and other styles
22

Karlsson, David. "Electronic Data Capture for Injury and Illness Surveillance : A usability study." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-102737.

Full text
Abstract:
Despite the development of injury surveillance systems for use at large multi sportsevents (Junge 2008), their implementation is still methodologically and practicallychallenging. Edouard (2013) and Engebretsen (2013) have pointed out that thecontext of athletics championships feature unique constraints, such as a limiteddata-collection window and large amounts of data to be recorded and rapidlyvalidated. To manage these logistical issues, Electronic Data Capture (EDC) methodshave been proposed (Bjorneboe 2009, Alonso 2012, Edouard 2013). EDC systemshave successfully been used for surveillance during multi-sport events Derman et al(2013) and its potential for surveillance studies during athletics championships istherefore interesting. The focus for surveillance during athletics championships hasthis far been on injury and illness data collected from team medical staff in directassociation to the competitions. But the most common injury and illness problems inathletics are overuse syndromes (Alonso 2009, Edouard 2012, Jacobsson 2013) andknowledge of risk factors associated to these problems is also relevant in associationto championships. A desirable next step to extend the surveillance routines istherefore to include also pre-participation risk factors. For surveillance of overusesyndromes, online systems for athlete self-report of data on pain and othersymptoms have been reported superior to reports from coaches (Shiff 2010). EDCsystems have also been applied for athlete self-report of exposure and injury data inathletics and other individual sports and have been found to be well accepted with agood efficiency (Jacobsson 2013, Clarsen 2013). There are thus reasons forinvestigating EDC system use by both athletes and team medical staff during athleticchampionships.This thesis used a cross-sectional design to collect qualitative data from athletes andteam medical staff using interviews and “think-aloud” usability evaluation methods(Ericsson 1993; Kuusela 2000). It was performed over 3 days during the 2013European Athletics Indoor Championships in Gothenburg, Sweden. Online EDCsystems for collection of data from athletes and team medical staff, respectively,were prepared for the study. The system for use by team medical staff was intendedto collect data on injuries and illnesses sustained during the championship and thesystem for athletes to collect data on risk factors.This study does not provide a solution in how an EDC effort should be implementedduring athletics championships. It does however points towards usability factorsthat needs to be taken into consideration if taking such an approach.
APA, Harvard, Vancouver, ISO, and other styles
23

Hussey, Phillip Ryan. "The Evolution of Electronic Surveillance: Balancing National Security and Civil Liberties." unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-06152007-110824/.

Full text
Abstract:
Thesis (honors)--Georgia State University, 2007.
Title from file title page. Robert Howard, thesis advisor. Electronic text (50 p.) : digital, PDF file. Description based on contents viewed Jan 17, 2008. Includes bibliographical references (p. 48-50).
APA, Harvard, Vancouver, ISO, and other styles
24

Benson, Etienne Samuel. "The wired wilderness : electronic surveillance and environmental values in wildlife biology." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/43219.

Full text
Abstract:
Thesis (Ph. D. in History, Anthropology, and Science, Technology and Society (HASTS))--Massachusetts Institute of Technology, Program in Science, Technology and Society, 2006.
Includes bibliographical references.
In the second half of the twentieth century, American wildlife biologists incorporated Cold War-era surveillance technologies into their practices in order to render wild animals and their habitats legible and manageable. One of the most important of these was wildlife radio-tracking, in which collars and tags containing miniature transmitters were used to locate individual animals in the field. In addition to producing new ecological insights, radio-tracking served as a site where relationships among scientists, animals, hunters, animal rights activists, environmentalists, and others involved in wildlife conservation could be embodied and contested. While scholars have tended to interpret surveillance technologies in terms of the extension of human control over nature and society, I show how technological, biological, and ecological factors made such control fragmentary and open to reappropriation. Wildlife radio-tracking created vulnerabilities as well as capabilities; it provided opportunities for connection as well as for control. I begin by showing how biologists in Minnesota and Illinois in the early 1960s used radio-tracking to establish intimate, technologically-mediated, situated relationships with game animals such as ruffed grouse, which they hoped would bolster their authority vis-a-vis recreational hunters. I then show how the technique was contested by environmentalists when biologists applied it to iconic "wilderness wildlife" such as grizzly bears in Yellowstone National Park in the 1960s and 1970s. One way for biologists to render radio-tracking acceptable in the face of such opposition was to emphasize its continuity with traditional practices, as they did in a radio-tagging study of tigers in Nepal in the 1970s.
(cont.) Another way was to shift to less invasive techniques of remote sensing, such as the bioacoustic surveys of bowhead whales off Alaska's Arctic coast that were conducted in the 1980s after a proposal to radio-tag whales was rejected by marine mammalogists and Ifiupiat whalers. Finally, wildlife biologists could reframe radio-tracking as a means for popular connection rather than expert control, as they did by broadcasting the locations of satellite-tagged albatrosses to schoolchildren, gamblers, and the general public via the Internet in the 1990s and early 2000s.
by Etienne Samuel Benson.
Ph.D.in History, Anthropology, and Science, Technology and Society (HASTS
APA, Harvard, Vancouver, ISO, and other styles
25

Michaud, Mario. "Supervision d'une éolienne par Internet." Thèse, Chicoutimi : Rimouski : Université du Québec à Chicoutimi ; Université du Québec à Rimouski, 2006. http://theses.uqac.ca.

Full text
Abstract:
Thèse (M.Eng.) -- Université du Québec à Chicoutimi, programme en extension à l'Université du Québec à Rimouski, 2006.
La p. de t. porte en outre: Mémoire de recherche présenté à l'Université du Québec à Rimouski comme exigence partielle du programme de maîtrise en ingénierie pour l'obtention du grade ès sciences appliquées (M.Sc.A.). CaQCU Bibliogr.: f. [125]. Document électronique également accessible en format PDF. CaQCU
APA, Harvard, Vancouver, ISO, and other styles
26

Yen, Koon-wai Michael. "Urban channel for electronic media and arts." Hong Kong : University of Hong Kong, 1996. http://sunzi.lib.hku.hk/hkuto/record.jsp?B25951397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

McClure, Bruce Davis. "Design of an adaptive computing architecture for managing interactions in heterogeneous defence networks /." [St. Lucia, Qld.], 2002. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe17146.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Ip, Wai Ho. "Am I being watched on the internet?: examining user perceptions of privacy, stress and self-monitoring under online surveillance." HKBU Institutional Repository, 2013. https://repository.hkbu.edu.hk/etd_oa/26.

Full text
Abstract:
Modes of communication in modern society have become instant and frequent. Internet users usually post ongoing activities and check their friends’ statuses with texts and photos in social networking sites. During information seeking and sharing processes, they enable peer-to-peer surveillance on the Internet. The present research adopts Foucault’s (1977) Panopticon as a metaphor to investigate this new advent of online surveillance. Surveillance from unknown people on the Internet may not always exist, but the perception of being surveilled could be embedded in the users’ mind. This kind of suspicion may generate some surveillance effects such as low self-esteem and communication discouragement, namely panoptic effects without the presence of actual surveillance (Botan, 1996). This study focuses on the negative panoptic effects to Internet users, leading to three hypotheses related to privacy infringement, Internet stress and self-monitoring. An online survey was conducted with 325 respondents aged from 18 to 29. Regression analyses were used to investigate the explanatory power of one’s perception of being surveilled on the outcome variables. The results showed that the respondents with higher level of perceived online surveillance report higher sense of privacy infringement, more situational stress and higher desire of self-monitoring in their online disclosure. With awareness of being surveilled, the respondents realize the information they share online may be exposed to anonymous observers and be prone to storage and dissemination, resulting in privacy infringement. Since online information could be exposed and misused, the respondents feel stressful to share their views and emotions online. They may conduct self-censorship on their online disclosure so as to acquire credits from other Internet users and avoid punishment for improper manner. Implications of these findings are discussed in detail.
APA, Harvard, Vancouver, ISO, and other styles
29

Leite, A. "Near real-time vaccine safety surveillance using United Kingdom electronic health records." Thesis, London School of Hygiene and Tropical Medicine (University of London), 2018. http://researchonline.lshtm.ac.uk/4649039/.

Full text
Abstract:
This thesis describes the feasibility of implementing a near real-time vaccine safety surveillance system (NRTVSS) using data from the Clinical Practice Research Datalink (CPRD), a United Kingdom (UK) research-level primary care database. NRTVSS is one method in the vaccine safety post-licensure toolkit, used since 2005. To understand how NRTVSS has been applied I conducted a systematic review of studies using NRTVSS. I identified 31 systems, mainly in the USA. Several sequential tests were in use, most commonly the Poisson-based maximized sequential probability ratio test (PMaxSPRT, 44%) and its binomial version (BMaxSPRT, 24%). Only 75% of studies addressed confounding, mainly by adjusting the expected rate. Delays in data availability may hinder the feasibility of implementing a system; some studies delayed the analysis, whilst others adjusted for delays and partially accrued periods. In CPRD, delays in recording outcomes are particularly relevant. Hence, I assessed those delays for selected outcomes of interest for vaccine safety (Bell’s palsy, Guillain-Barré syndrome (GBS), optic neuritis, and febrile seizures (FS)) by comparing the deemed date of diagnosis to the date the event was recorded in the system. Three-quarters of the records accrued during the first month, considered as sufficient to implement NRTVSS. I thus trialled the implementation of a system using previously collected CPRD data, for seasonal influenza/GBS and measles-mumps-rubella/FS. This included power calculations for detecting a signal. I used PMaxSPRT for both vaccine/outcome pairs and BMaxSPRT for measles-mumps-rubella/FS. Both tests were adjusted for delays in recording outcomes, based on the previous analysis. It was possible to implement a system, but power was < 80% to detect less than a four-fold increase in the risk of GBS following influenza vaccine. For this pair, I re-evaluated power after removing delays in data availability, with no significant improvement. This work establishes the foundation of a NRTVSS using CPRD for potential application in the UK. Future research could assess further vaccine/outcome pairs and explore the use of other statistical tests. Overall, this project contributes to UK vaccine pharmacovigilance.
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Gang. "A Holistic Study on Electronic and Visual Signal Integration for Efficient Surveillance." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1492639972377528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Yuk, Shun-cho Jacky, and 郁順祖. "Adaptive video defogging base on background modeling." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/208174.

Full text
Abstract:
The performance of intelligent video surveillance systems is always degraded under complicated scenarios, like dynamic changing backgrounds and extremely bad weathers. Dynamic changing backgrounds make the foreground/background segmentation, which is often the first step in vision-based algorithms, become unreliable. Bad weathers, such as foggy scenes, not only degrade the visual quality of the monitoring videos, but also seriously affect the accuracy of the vision-based algorithms. In this thesis, a fast and robust texture-based background modeling technique is first presented for tackling the problem of foreground/background segmentation under dynamic backgrounds. An adaptive multi-modal framework is proposed which uses a novel texture feature known as scale invariant local states (SILS) to model an image pixel. A pattern-less probabilistic measurement (PLPM) is also derived to estimate the probability of a pixel being background from its SILS. Experimental results show that texture-based background modeling is more robust than illumination-based approaches under dynamic backgrounds and lighting changes. Furthermore, the proposed background modeling technique can run much faster than the existing state-of-the-art texture-based method, without sacrificing the output quality. Two fast adaptive defogging techniques, namely 1) foreground decremental preconditioned conjugate gradient (FDPCG), and 2) adaptive guided image filtering are next introduced for removing the foggy effects on video scenes. These two methods allow the estimation of the background transmissions to converge over consecutive video frames, and then background-defog the video sequences using the background transmission map. Results show that foreground/background segmentation can be improved dramatically with such background-defogged video frames. With the reliable foreground/ background segmentation results, the foreground transmissions can then be recovered by the proposed 1) foreground incremental preconditioned conjugate gradient (FIPCG), or 2) on-demand guided image filtering. Experimental results show that the proposed methods can effectively improve the visual quality of surveillance videos under heavy fog and bad weathers. Comparing with state-of-the-art image defogging methods, the proposed methods are shown to be much more efficient.
published_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
32

Zeitz, Anne. "(Contre-)observations : les relations d'observation et de surveillance dans l'art contemporain, la littérature et le cinéma." Thesis, Paris 8, 2014. http://www.theses.fr/2014PA080051.

Full text
Abstract:
Jamais les enjeux de la surveillance dans la société n’ont été autant mis en avant dans les discours politiques et la presse internationale que depuis les divulgations d’Edward Snowden sur les programmes de surveillance américains, durant l’été 2013. Plus d’une dizaine d’années auparavant, l’exposition CTRL [SPACE] au ZKM de Karlsruhe avait montré comment, depuis longtemps, les mécanismes de la surveillance, des médias de masse et la convergence de leurs fonctionnements se reflétaient dans l’art contemporain. Peter Weibel pointait dès les années 60, dans ses installations et ses écrits, les comportements contradictoires qui se développent dans une société de surveillance. De la société de surveillance à la société de contrôle, la société spectaculaire, puis post-Spectaculaire, jusqu’à l’actuelle société de sousveillance, c’est-À-Dire de la cybersurveillance et de la dataveillance, l’influence de ces mécanismes a toujours fait controverse. Alors qu’une approche artistique s’attache avant tout à la manipulation, voire à l’effacement de l’individu et de sa réalité, une autre approche se concentre sur les possibilités de créativité et d’inventivité qui se présentent à l’individu au sein d’une société caractérisée par la surveillance et les médias de masse. La présente recherche se situe dans la tension qui émerge entre ces deux positions. Le point de départ est le terme observer, qui renvoie à la fois à un acte perceptuel et à un acte d’adaptation. En même temps, tout acte d’observation s’insère nécessairement dans une « relation » d’observation. Et il faut envisager la réversibilité potentielle de la relation. En effet, l’art contemporain révèle des tactiques de contre-Surveillance et de contre-Observation, cette dernière étant révélatrice de la façon dont nous vivons les changements socio-Politiques – notamment depuis le 11 septembre 2001. Une théorie et une pratique de la (contre-)observation sont nécessaires afin d’analyser l’esthétique qui apparaît ainsi
He matter of surveillance has never been as present in political discourse and the international press as much as since the divulgence of the American surveillance programs by Edward Snowden in the summer of 2013. Nonetheless, more then 10 years earlier, the exhibition CTRL [SPACE] at the ZKM in Karlsruhe had widely shown how the mechanisms of surveillance and mass media and the convergence of their functioning had, for a long time, been reflected in contemporary art. Since the 1960s, Peter Weibel had already pointed to the contradictory modes of behaviour that develop in a society of surveillance in his installations and writings. From the society of surveillance to the society of control, the spectacular society, and then post-Spectacular society, to the current society of “sousveillance”, that is of cyber-Surveillance and dataveillance, the influence of these mechanisms has always been discussed with controversy. While one artistic approach focuses mainly on the manipulation, or even disappearance of the individual and their reality, another approach concentrates on the possibilities of creativity and inventiveness that present themselves to the individual in a society characterized by surveillance and mass media.The present doctoral thesis situates itself in the tension that emerges between these two positions. The point of departure is the term to observe that signifies a perceptual act as well as an act of adaptation. At the same time, every act of observation necessarily takes part in an observational “relationship”. Therefore, the potential reversibility of the relationship has to be taken into account. Effectively, contemporary art reveals tactics of counter-Surveillance and counter-Observation. The latter give insight into the way we deal with socio-Political changes – especially since the 11th of September 2001. A theory and a practice of (counter-)observation are necessary to analyze the aesthetics that have appeared in this regard
APA, Harvard, Vancouver, ISO, and other styles
33

Li, Mo. "Building sensor network surveillance systems : on the applicability /." View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20LIMO.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yeung, Alex Tak Lok. "A competitive analysis of digital video surveillance products' manufacturers in Asia Pacific region." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?msc-meem-b1991300xa.pdf.

Full text
Abstract:
Thesis (M.Sc.)--City University of Hong Kong, 2005.
Title from title screen (viewed on Jan. 10, 2006) "A dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering Management." Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
35

Henry, Anne L. "Animated electronic painting /." Online version of thesis, 1992. http://hdl.handle.net/1850/12240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Carneiro, Carla Margarida da Silva. "Voluntary electronic patient record state of the art." Master's thesis, Universidade da Beira Interior, 2012. http://hdl.handle.net/10400.6/1191.

Full text
Abstract:
Introduction: With an ongoing economic crisis, Portugal and many other countries are looking into ways to increase efficiencies in all sectors. With almost 10% of the Gross Domestic Product (GDP) spent in Healthcare, there is a need to improve the use of resources. A Voluntary Electronic Patient Record (VEPR) is an online record of health and healthcare related data provided by the patient himself, available to him, and his authorized health care providers and relatives, in a ubiquitous way anywhere/everywhere. According to some authors through VEPRs, every health institution could have an easier access to a summary of the patient’s most important health data if needed and authorized. Just like Portugal, Australia, for example, is currently preparing a health care reform and the implementation of a Personally Controlled Electronic Health Record (PCEHR) system is also being studied. Surveys to general practitioners and consumers of eHealth are being conducted in order to evaluate the quality and sustainability of Australia’s health care and to develop change and adoption strategies for the PCEHR system. VEPRs can be provided by private companies, hospitals and health organizations or health departments of governments themselves. In Portugal there is at least one VEPR free of charge provided by a private company. This has raised issues of security of data and risks, and has not been approved by the data protection agency, possibly due to considerations on its massive use as well as the ethical issues of linking it to national health data from the NHS. In addition to this private VEPR, Portugal also provides some health online services: eAgenda and eRNU (“Registo Nacional de Utentes”) since 2009. Currently, eAgenda allows patients to schedule for doctor´s appointments and to ask for prescriptions renewal. The online health service, eRNU, allows users to check their general practitioner, the health institution in which they are registered, the health services it provides and its opening schedule. VEPR can be efficient, allowing better sharing of information between health care providers through the online availability of health information. It can be convenient; provide easy access to timely and accurate information no matter where the patient is or when he needs it. It is empowering as it enables the patient to be more active and involved with his own health care. To ensure the privacy of the patient’s health information, a security program is required to allow only the appropriately authorized individuals to access the VEPR and to save the record’s data in case of a technical breakdown occurs. On the other hand, although everyone can have a VEPR, this is normally restricted to younger, more info-included citizens as access to the internet is not universal and there is a natural difficulty in older generations to use IT and Internet. This, however, can be mitigated and will only have a tendency to dissipate in future. Aims: 1. To assess the state of the art about VEPR; 2. To assess the state of the art about VEPR in Portugal; 3. To assess users expectancies towards VEPR in Portugal; 4. To help developing and set in motion a VEPR adjusted to Portuguese population’s health challenges. Methodology: This is a transversal study with a qualitative and quantitative approach. To elaborate this paper, a literature review was made in order to identify sources of information about VEPR and current state of the art on this field. It was established a cooperation with the Portuguese Ministry of Health as it was the only way to indirect and directly collect data about the portuguese VEPR, eAgenda and eRNU. A questionnaire composed of 14 questions, made anonymous, was created using Lime SurveyTM, named “Inquérito para utilizadores dos serviços eAgenda e eRNU”, permission obtained and it was then sent to eAgenda and eRNU users through their e-mail addresses. Data was processed using Microsoft Office Excel 97-2003 and statistically analyzed resorting to Epi Info 7. Because the last question was an open question, the related data was processed manually. Results: Currently, eAgenda and eRNU serve about 4% of the portuguese population. The typical user is female, married, completed high school, has children and age median 38, 5 years old. Own and household appointments scheduling were the more frequently selected as the most useful functionalities as well as those that most contributed to improvement on health care delivery. Waiting time reduction was the most frequent selected advantage of eAgenda and eRNU. Conclusions: It is to be concluded that eAgenda and eRNU are well suited for the portuguese population as only 3,28% of the inquired users pointed eAgenda and eRNU services has not having any advantage. More studies are still required to understand the patterns of use and to promote the online services so that more people, not only 4% of the overall portuguese population, may take advantage of their benefits.
APA, Harvard, Vancouver, ISO, and other styles
37

Seymour, Ronda Lee. "Using electronic media to enhance art instruction by home schoolers." Instructions for remote access. Click here to access this electronic resource. Access available to Kutztown University faculty, staff, and students only, 2001. http://www.kutztown.edu/library/services/remote_access.asp.

Full text
Abstract:
Thesis (M.S.)--Kutztown University of Pennsylvania, 2001.
Source: Masters Abstracts International, Volume: 45-06, page: 2810. Typescript. Abstract appears on leaves 1-2. Includes bibliographical references (leaves 58-60).
APA, Harvard, Vancouver, ISO, and other styles
38

Bras, Johan J. "A simulation of the single scan accuracy of a two-dimensional pulsed surveillance radar." Master's thesis, University of Cape Town, 1991. http://hdl.handle.net/11427/8460.

Full text
Abstract:
Bibliography: leaves 194-198.
The following dissertation considers the single-scan two-dimensional positional accuracy of a pulsed surveillance radar. The theoretical aspects to the positional accuracy are considered and a generalized analytical approach is presented. Practical position estimators are often complex, and theoretical predictions of their performance generally yield unfriendly mathematical equations. In order to evaluate the performance of these estimators, a simulation method is described based on replicating the received video signal. The accuracy of such a simulation is determined largely by the accuracy of the models applied, and these are considered in detail. Different azimuth estimation techniques are described, and their performances are evaluated with the aid of the signal simulation. The best azimuth accuracy performance is obtained with the class of analogue processing estimators, but they are found to be more susceptible to interference than their binary processing counterparts. The class of binary processing estimators offer easily implemented techniques which are relatively insensitive to radar cross-section scintillation characteristics. A hybrid estimator, using both analogue and binary processing, is also evaluated and found to give an improved accuracy performance over the binary processing method while still maintaining the relative insensitivity to radar cross-section fluctuation.
APA, Harvard, Vancouver, ISO, and other styles
39

Davis, Stephen. "Radio frequency tagging in the retail industry." Thesis, University of the West of England, Bristol, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.262824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kumar, B. G. Vijay. "Supervised dictionary learning for action recognition and localization." Thesis, Queen Mary, University of London, 2012. http://qmro.qmul.ac.uk/xmlui/handle/123456789/8780.

Full text
Abstract:
Image sequences with humans and human activities are everywhere. With the amount of produced and distributed data increasing at an unprecedented rate, there has been a lot of interest in building systems that can understand and interpret the visual data, and in particular detect and recognise human actions. Dictionary based approaches learn a dictionary from descriptors extracted from the videos in the first stage and a classifier or a detector in the second stage. The major drawback of such an approach is that the dictionary is learned in an unsupervised manner without considering the task (classification or detection) that follows it. In this work we develop task dependent(supervised) dictionaries for action recognition and localization, i.e., dictionaries that are best suited for the subsequent task. In the first part of the work, we propose a supervised max-margin framework for linear and non-linear Non-Negative Matrix Factorization (NMF). To achieve this, we impose max-margin constraints within the formulation of NMF and simultaneously solve for the classifier and the dictionary. The dictionary (basis matrix) thus obtained maximizes the margin of the classifier in the low dimensional space (in the linear case) or in the high dimensional feature space (in the non-linear case). In the second part the work, we develop methodologies for action localization. We first propose a dictionary weighting approach where we learn local and global weights for the dictionary by considering the localization information of the training sequences. We next extend this approach to learn a task-dependent dictionary for action localization that incorporates the localization information of the training sequences into dictionary learning. The results on publicly available datasets show that the performance of the system is improved by using the supervised information while learning dictionary.
APA, Harvard, Vancouver, ISO, and other styles
41

Andersen, Evan D. "A surveillance system to create and distribute geo-referenced mosaics from SUAV video /." Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2416.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Ishikawa, Shoichiro. "Electronic surveillance and the police : a comparative study of the Canadian and Japanese systems." Thesis, University of British Columbia, 1986. http://hdl.handle.net/2429/26140.

Full text
Abstract:
"Electronic Surveillance", the mechanical technique to monitor private communications of the suspect is one of the most powerful weapons of the police in modern crime-prevailing societies. In Canada the attempt to set up a legal framework to balance the police need for electronic surveillance against the citizen's right to privacy resulted in the Protection of Privacy Act proclaimed on June 30, 1974. In Japan, in contrast, with no specific legislation governing electronic surveillance, the police refrain from resorting to this enchanting method of criminal investigation. The purpose of this study is to propose a desirable electronic surveillance law in Japan, taking advantage of the Canadian precedent in this field. The introductory portion of this study focuses on the concept of privacy in the West and Japan. Despite the vast difference in traditional privacy consciousness between Canada and Japan, privacy has been recognized as a legally protected interest in both countries. In the first half of the main portion, the study analyzes the Canadian electronic surveillance legislation from the standpoint of the police. While providing the most powerful investigative tool, the law also has had a negative impact upon the Canadian police in that it brought about undue interference, judicial or otherwise, in the operation of criminal investigation. In the last half of the main portion, the study deals with the Japanese system for electronic surveillance. The conclusion reached is that the Canadian legislative precedent can, with some necessary modification, be an appropriate model for Japan, and that Japan should introduce an electronic surveillance system with less intrusive power than in Canada while preserving the traditional independent authority of the police in criminal investigation.
Law, Peter A. Allard School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
43

Reilly, Simon Mark. "The use of electronic surveillance and performance measures in the workplace : a qualitative investigation." Thesis, Durham University, 2010. http://etheses.dur.ac.uk/429/.

Full text
Abstract:
Electronic workplace surveillance takes many forms. It includes CCTV, recording telephone conversations, employee ID cards, and electronically gathering and measuring work performance. The increased incidences of electronic surveillance have had a number of effects on employees. This research concentrated on the use of quantified electronic performance measurement. It specifically examined the impact on managers and managing. It examined surveillance from an employment relationship perspective, taking as its primary lens that of exchange and exchange theory. The research demonstrated that the exchange relationships managers have with other managers, workers, or employers, as part of the psychological contract, is being compromised. Managers feel under pressure to manage based on the surfeit of electronic measures rather than by using innate or acquired management skills. Many managers in this research are no longer managers in the conventional sense; instead, they have become “Performance Intermediary Executives” invariably reliant on a plethora of electronic measures provided for them to help them manage successfully. Managers have also started questioning the equitable nature of the psychological contract between them and their employer/line manager. The result of this equity disjuncture was made manifest by the subtle forms of resistance used on a daily basis. Managers are being led down a managerial path leading to further resistance and inequitable employment and exchange relationships. This research suggests that claimed improvements in performance and performance management using electronic surveillance could be wiped out by poor and de-professionalised management. Organisations should be aware that surveillance for surveillance sake is not necessarily always the best way forward. Electronic workplace surveillance is not intrinsically all good or all bad, but judging from the findings in this research, its impact is broadly perceived by managers negatively, which is not good for all parties in the employment relationship.
APA, Harvard, Vancouver, ISO, and other styles
44

Hahn, Michael Gerard. "Examining the creative process : electronic technology in art and design /." Online version of thesis, 1993. http://hdl.handle.net/1850/11765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bossio, Jorge, and Fabiola Gutierrez. "Rights versus crime: twenty years of wiretapping and digital surveillance in Peru." Association for Progressive Communications (APC) and Humanist Institute for Cooperation with Developing Countries (Hivos), 2014. http://hdl.handle.net/10757/599314.

Full text
Abstract:
The systematic monitoring of citizens by the state in Peru was revealed in 2000, after the collapse of the second administration of ex-president Alberto Fujimori (1995-2000). Fujimori resigned in his last year in office, after a network of government espionage and corruption was revealed. This included video recordings of secret meetings and alleged communications surveillance conducted and managed by presidential advisor Vladimiro Montesinos, working with the National Intelligence Service (SIN). This systematic surveillance by the state resulted in the dissemination of private information, recordings and videos of public officials, journalists and many other influential people. These events sparked the beginning of the debate around the purpose of surveillance in Peru, and the violation of the right to private communications by state agencies and private entities – and what legislation could be developed to regulate this. This discussion is ongoing, with more cases of communications interception being revealed.
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Zhuo, and 陈卓. "A methodology for trajectory based learning and prediction of human motions in visual surveillance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47145985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zhu, Junda. "Exploiting Constraints for Effective Visual Tracking in Surveillance Applications." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1331138092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Ambardekar, Amol A. "Efficient vehicle tracking and classification for an automated traffic surveillance system." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1451111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Scott, Jessica. "Perceived Barriers to the use of Electronic Health Records for Infectious Disease Surveillance in Canada." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32000.

Full text
Abstract:
This thesis examines the potential interface that exists between health information, specifically electronic health record (EHR) systems, and notifiable disease surveillance in Canada. It aims to highlight the benefits and barriers experienced by the current national notifiable disease surveillance strategy, as well as to highlight the successes and roadblocks to the successful implementation and adoption of EHR technologies in Canada. Qualitative methodologies, which include the 16 semi-structured interviews conducted with four key stakeholder groups, including public health experts, physicians, health administrators and academics that are concerned with EHR adoption and public health were used to obtain data. Data from interviews was analysed using grounded theory methodology and then verified using member checking and other data validation methods. Emergent themes from obtained data indicated that there is a large potential for the improvement of the current notifiable disease through the use of EHR technologies: however, the barriers currently faced by both the notifiable disease surveillance system and the state of implementation and adoption of EHR technologies prevent this from occurring. These barriers include political, financial, human, security/privacy, and technology barriers. Differences between stakeholder groups were explored, and potential solutions and insights into existing barriers were provided. The information gained from this study provides insight into the efficiency of the current infectious disease surveillance system and the progress of and need for the implementation of EHRs nationwide. In addition, the results of this study provide stakeholders with a deeper understanding of the barriers facing the use of EHR technologies for infectious disease surveillance and provide a starting place to address these issues. The results of this study can help to inform policy regarding public health surveillance and EHR implementation and adoption.
APA, Harvard, Vancouver, ISO, and other styles
50

Hou, Yali, and 侯亚丽. "Video-based people counting and crowd segmentation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47032339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography