To see the other types of publications on this topic, follow the link: Surveillance technology.

Dissertations / Theses on the topic 'Surveillance technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Surveillance technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Merino, Jose Carlos Alvarez, and Kazuo Hatakeyama. "Technology surveillance of the solar refrigeration by absorption/adsorption." Institute of Electrical and Electronics Engineers Inc, 2016. http://hdl.handle.net/10757/622310.

Full text
Abstract:
PICMET 2016 - Portland International Conference on Management of Engineering and Technology: Technology Management For Social Innovation, Proceedings4 January 2017, Article number 7806767, Pages 1976-19822016 Portland International Conference on Management of Engineering and Technology, PICMET 2016; Honolulu; United States; 4 September 2016 through 8 September 2016; Category numberCFP16766-ART; Code 125891<br>In order to establish networks of cooperation looking for not to duplicate research and even to make use of existing research in a remote form, it is necessary to identify and classify (around the world) the researchers and laboratories, that are researching in the topic of solar refrigeration by absorption/adsorption. The methodology consists in: i) the technology's classification, ii) technological trajectory Identification, iii) a thematic bibliographic review, and iv) patent's analysis. In this way, with the previous determination of keywords, will be identified main authors and their respective institutions. With the same keywords, are determined the licensed patents (in certain span of time). In addition, the analysis of publications, patents, and commercial products give us an opportunity to establish comparisons between prototypes and tests (in several conditions). The larger results implicate the use of actor's network and the remote access to the data and tests, for a collaborative research, overcoming the lack of laboratory resource and accelerating the knowledge acquisition<br>Revisión por pares
APA, Harvard, Vancouver, ISO, and other styles
2

Marrero, Jose A., and Richard E. Makarski. "A surveillance society and the conflict state: leveraging ubiquitous surveillance and biometrics technology to improve homeland security." Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/4890.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>The thesis research examines the emergence of surveillance and biometrics technologies as a pragmatic baseline supporting the goals of homeland security. Assessment of existing catalysts of the world condition, conflict states, terrorist and criminal networks have facilitated increased U.S. and international attention to the field of surveillance and biometric technology. This study scrutinizes surveillance, biometric techniques, strategies, and prevailing present day applications. It contrasts the evolving requirements for improved security with a balanced consideration of civil liberties and privacy. The authors address developmental issues surrounding the hypothesis for a ubiquitous surveillance grid to monitor and combat terrorism, crime, and other contributing illicit behaviors. The authors recommend that federal, state, local, and corporate agencies unite in improving homeland security by implementing the deterrence, detection, monitoring, and response actions that these technologies have to offer.
APA, Harvard, Vancouver, ISO, and other styles
3

Makarski, Richard E. Marrero Jose A. "A surveillance society and the conflict state : leveraging ubiquitous surveillance and biometrics technology to improve homeland security /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FMakarski.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2002.<br>Thesis advisor(s): Alex Bordetsky, Dale Courtney. Includes bibliographical references (p. 211-234). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Moss, Tina C. "Technological surveillance: Understanding how individuals perceive and respond to digital surveillance risks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2024. https://ro.ecu.edu.au/theses/2774.

Full text
Abstract:
Surveillance is not a new phenomenon, however, in the modern era surveillance has become a highly sophisticated undertaking due to technological digitisation, becoming more invasive, omnipresent and routine. Nowadays the concept of privacy has driven contemporary surveillance discourse, noting increased complexities around sharing personal information. Such a shift has altered the way the public responds to and perceives the risk of surveillance technologies. Such perceptions have been further compounded by technological convergence, which has not only removed the expectations of anonymity, but challenged existing legislative and regulatory arrangements that govern single-function technologies, increasing the perception of vulnerability and exploitation. The contemporary surveillance literature often focuses on specialist or expert opinions and lacks a comprehensive understanding of how laypeople perceive and respond to technological surveillance risks. This study examined laypeople’s perceptions of surveillance technologies risks, by drawing on two principles of cognitive theory of risk perception, the Psychometric Paradigm and judged heuristics. Using a mixed method, multiphase research approach, Phase One involved the use of psychometric mapping that positioned nominated surveillance technologies according to Familiar and Dread Risk characteristics. Phase Two employed focus groups to explore laypeople’s cognisance of surveillance risk, capturing their knowledge, understandings and lived experience. The significance of this study lies in its contribution to the understanding of laypeople's risk perceptions of digital surveillance technologies and how such perceptions impact their interactions with these technologies. Findings indicated that voluntary choice and control were the most significant risk mediator (acceptance) characteristics, with an evaluation of benefits against risk consequence markedly influenced by affective decisions, further shaped by of socio-demographic factors. Consequently, the study addresses the pressing need to understand how laypeople perceive technological surveillance risk in the modern age by uncovering valuable insights that inform policy, technology development, and public dialogue. Such an understanding is crucial for policymakers and researchers as they seek to bridge the gap between expert assessments and public perceptions of risk.
APA, Harvard, Vancouver, ISO, and other styles
5

McGregor, Suzanne, and Elvia Jaggers. "Surveillance of Information Technology (IT) Performance Based Service Acquisitions (PBSAs)." Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/9994.

Full text
Abstract:
Joint Applied Project<br>GAO report 05-274 states nearly half of an organization's yearly budget is being spent on services. Consequently, DoD must ensure that contractors performing these services are being effectively monitored. The purpose of this joint applied project is to examine IT performance based service acquisitions and assess what performance measurements are being used to gauge the contractor's effectiveness. This research project will provide a literary review of Performance Based Contracts (PBCs), Performance Based Service Contracts (PBSC), Performance Based Service Acquisition (PBSA) and related topics. This review will be conducted using various Governmental legislative and regulatory guidance and best commercial practices. The research will include a gathering of survey information from contracting officers, Directors of Information Management offices, Information Technology (IT) technical personnel and TACOM IT contractors. This information will then provide a comparative analysis for recommendations and conclusions. To conclude, this joint applied project will include creating and posting performance measurement guidance for the TACOM Community website to provide all contracting personnel with the means to develop performance measures for IT performance based service contracts.
APA, Harvard, Vancouver, ISO, and other styles
6

Riseby, Emil, and Alexander Svensson. "Multispectral Imaging for Surveillance Applications." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-115731.

Full text
Abstract:
Silicon based sensors is a commonly used technology in digital cameras today. That has made such cameras relatively cheap and widely used. Unfortunately they are constructed to capture and represent image quality for humans. Several image applications work better without the restrictions of the visible spectrum. Human visual restrictions are often indirectly put on technology by using images showing only visible light. Thinking outside the box in this case is seeing beyond the visible spectrum.
APA, Harvard, Vancouver, ISO, and other styles
7

Lee, Young. "Modern Surveillance and Social Shaping : With Contemplation on Technology and Industrialization." Thesis, Uppsala universitet, Institutionen för geovetenskaper, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-176916.

Full text
Abstract:
This thesis explores how power relations are reflected on society in the act of surveillance basedon Michel Foucault’s discourse in the light that events that happen in the arrangement of certaintime and place reveal the context in situation in history and things happen as a consequence ofsuch situational events even at the time when technology advances at a remarkable pace andstate-of-the-art technologies do not rest to surprise us.In that regard, I start by presenting motivation and historical background of surveillance. Then Idescribe current surveillance technology and state in three aspect; biometrics which is adominating off-line surveillance methodology, internet which is a dominating on-line surveillanceframeset, and the centralization of big data for the utilization of these all. Then I analyze socialcondition for surveillance by investigating current and recent history, the impact ofscience/technology on society, and how the mindset and culture of contemporary times hasformed itself. In the conclusion and discussion, I analyze what will happen if such trend ofmachine culture continues and present suggestion about what can be done.
APA, Harvard, Vancouver, ISO, and other styles
8

Kirby, Debra. "Minding the gap: the growing divide between privacy and surveillance technology." Monterey California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34689.

Full text
Abstract:
CHDS State/Local<br>Pervasive mass surveillance in a given in U.S. society. However, whether U.S. citizens sacrifice privacy as a result remains under debate. Does privacy fade away in light of the connected world in which we all live? The recent U.S. Supreme Court decision in U.S. v. Jones did not address whether pervasive mass surveillance by the government constituted a search under the Fourth Amendment, and, thereby, triggering constitutional review. The lack of legal guidance presents challenges for law enforcement investigations, as it can takes years for a court to decide a privacy case and surveillance technology evolves at a far more rapid pace. Given the refusal, or inability, of the courts to answer what constitutional privacy protections are afforded U.S. citizens in light of the growing use of sensor technology to conduct mass surveillance, inclusive of GPS, RFID, and LPR, comprehensive legislative privacy options must be explored. To date, privacy has been left to the individual states, which results in privacy protections based upon geography. Federal privacy legislation is limited, focusing on certain technologies, such as eavesdropping under Title III, or certain privacy issues, such medical record data under HIPAA. Further, very few laws govern the use and dissemination of the PII data that derives not only from governmental surveillance, but also from commercial data collection. A federal data protection act would define the privacy interests protected, rather than using the law to limit the governments specific use of a surveillance technology, which would ensure that the rules of engagement for the government surveillance were clear and held the government accountable to its citizens.
APA, Harvard, Vancouver, ISO, and other styles
9

Eriksson, Pontus, Carl Nordström, and Alexander Troshin. "Surveillance Using Facial Recognition and Social Media Data." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-385696.

Full text
Abstract:
People share more and more on social media, aware that they are being surveilled but unaware of the scope and the ways that their data is processed. Large amounts of resources are dedicated to performing the surveillance, both in terms of labor and computation. This project explores the scope of data collection and processing by showing that it is possible to gather, process, and store data from the social media platforms Twitter and Reddit in real-time using only a personal computer. The focus was to use facial recognition to find specific individuals in the stream of data, but the data collected can be used for other purposes. We have also explored the ethical concerns regarding both the collection and processing of such data.<br>Människor delar mer och mer på social medier medvetna om att de blir övervakade, men omedvetna om i vilken utsträckning och på vilka sätt datan är processad. Idag används mycket resurser för att urföra dessa uppgifter. Med det här projektet visar vi att det är möjligt att samla in, processa och spara data från sociala medierna Reddit och Twitter i realtid genom att enbart använda en persondator. Vårat fokus har varit att använda ansiktsigenkänning för att identifiera specifika individer från en dataström, men datan kan användas för andra syften. Vi har också kollat på de etiska dilemman som dyker upp i samband med insamling och processning av sådan data.
APA, Harvard, Vancouver, ISO, and other styles
10

Palm, Elin. "The Ethics of Workspace Surveillance." Doctoral thesis, KTH, Filosofi, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4611.

Full text
Abstract:
The general framework of this thesis is that of ethical Technology Assessment (eTA). Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I (written in collaboration with Sven Ove Hansson) is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We suggest that assessments should be conducted on the basis of nine crucial ethical aspects of technology. In Essay II an in-depth analysis of the meaning and value of privacy in the realm of work is undertaken. The meaning and value of privacy is explained as well as why it should be protected. It is argued that two dimensions of privacy should be safeguarded; “informational privacy” and “local privacy” for the reason that workers’ personal autonomy is protected thereby. Essay III is concerned with how workspace surveillance requires that job-applicants claim their privacy interests in employment negotiations to a much larger extent than what was previously the case. In most cases however, a dependency asymmetry between employer and job-candidate makes the latter ill-equipped for doing so. This asymmetry serves as the point of departure for an analysis of the conditions under which consent should be considered a criterion on moral acceptability with regard to employment contracting. The analysis suggests ways of rectifying this imbalance, raising demands on the quality of contractual consent. Essay IV discusses the extent to which it should be morally permissible for current or prospective employees to trade off their privacy in employment negotiations. The analysis starts out from, and questions, a libertarian case for voluntary self-enslavement. It is concluded that not even an orthodox libertarian can justify trade offs of a social good like liberty. Neither should employees be allowed to abstain informational privacy for the reason that such a trade-off could harm their future selves. In Essay V a dimensional analysis is proposed as a means to identify actually or potentially privacy invasive surveillance practices. It discusses ways in which different types of surveillance intrude upon employees’ privacy in order to guide the evaluation of such practice. Even though negative implications cannot be avoided altogether, by means of the proposed analysis, minimally intrusive means of monitoring can be identified.<br>QC 20100902
APA, Harvard, Vancouver, ISO, and other styles
11

Hunt, Daniel, and Magnus Olsson. "ATSVIS : Airport Traffic Surveillance and Visual Information System." Thesis, Mälardalen University, Department of Mathematics and Physics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-259.

Full text
Abstract:
<p>Det primära målet med examensarbetet var att utforma ett koncept på hur man kan göra flygtrafiken säkrare både på marken och i luften. Konceptet fick namnet ATSVIS, vilket står Airport Traffic Surveillance and Visual Information System. ATSVIS är tänkt att ge anvisningar om vad nya idéer och ny teknologi kan tillföra piloten och trafikledningen. ATSVIS avser även att automatisera och förenkla flygtrafiken, vilket skall leda till säkrare flygtrafik både i luften och på marken. Konceptet ATSVIS kommer att utformas efter egna idéer och från intervjuer med branschfolk. Huvudarbetet av examensarbetet kommer att vara att ta fram en simulator där man kan visa och pröva hur ATSVIS fungerar.</p><br><p>The primary objective with the thesis is to formulate a concept on how to do the air traffic safer, both on the land and in the air. The concept got the name ATSVIS, which stands for Airport Traffic Surveillance and Visual Information System. ATSVIS is intended to give instructions what new ideas and new technology can do, to allocate the pilot and the traffic management. ATSVIS also intend to automate and to simplify the air traffic. The concept is formulated after own ideas and from interviews with people in the flight industry. The central work of the thesis is a simulator in which one can show and to examine how ATSVIS functions work.</p>
APA, Harvard, Vancouver, ISO, and other styles
12

Ulkemen, Sinan Bland Robert L. "The impact of surveillance technology on the behaviors of municipal police departments." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ghataoura, D. S. "Networking and application interface technology for wireless sensor network surveillance and monitoring." Thesis, University College London (University of London), 2012. http://discovery.ucl.ac.uk/1348374/.

Full text
Abstract:
Distributed unattended ground sensor (UGS) networks are commonly deployed to support wide area battlefield surveillance and monitoring missions. The information they generate has proven to be valuable in providing a necessary tactical information advantage for command and control, intelligence and reconnaissance field planning. Until recently, however, there has been greater emphasis within the defence research community for UGS networks to fulfil their mission objectives successfully, with minimal user interaction. For a distributed UGS scenario, this implies a network centric capability, where deployed UGS networks can self-manage their behaviour in response to dynamic environmental changes. In this thesis, we consider both the application interface and networking technologies required to achieve a network centric capability, within a distributed UGS surveillance setting. Three main areas of work are addressed towards achieving this. The first area of work focuses on a capability to support autonomous UGS network management for distributed surveillance operations. The network management aspect is framed in terms of how distributed sensors can collaborate to achieve their common mission objectives and at the same time, conserve their limited network resources. A situation awareness methodology is used, in order to enable sensors which have similar understanding towards a common objective to be utilised, for collaboration and to allow sensor resources to be managed as a direct relationship according to, the dynamics of a monitored threat. The second area of work focuses on the use of geographic routing to support distributed surveillance operations. Here we envisage the joint operation of unmanned air vehicles and UGS networks, working together to verify airborne threat observations. Aerial observations made in this way are typically restricted to a specific identified geographic area. Information queries sent to inquire about these observations can also be routed and restricted to using this geographic information. In this section, we present our bio-inspired geographic routing strategy, with an integrated topology control function to facilitate this. The third area of work focuses on channel aware packet forwarding. Distributed UGS networks typically operate in wireless environments, which can be unreliable for packet forwarding purposes. In this section, we develop a capability for UGS nodes to decide which packet forwarding links are reliable, in order to reduce packet transmission failures and improve overall distributed networking performance.
APA, Harvard, Vancouver, ISO, and other styles
14

Ulkemen, Sinan. "The Impact of Surveillance Technology on the Behaviors of Municipal Police Departments." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12209/.

Full text
Abstract:
Citizen complaints about inappropriate use of force indicate negative police-public relations, unresponsive police services, and the unresponsiveness of police management to citizens' concerns. However, the effective delivery of key policing services depends on the performance of individual police officers. Surveillance technology can monitor and control the behavior of officers, ensuring that police officers provide high quality policing services that meet the needs of citizens. Examples of surveillance technology such as in-car cameras and CCTV can be used as an administrative tool to respond to citizen complaints by police chief executives. This research examines the effect of surveillance technology on the behavior of municipal police departments that is operationalized as the number of citizen complaints that were filed against municipal police departments. This research also examines the impact of surveillance technology on dismissed and sustained complaints by using 511 large municipal police departments in the U.S. from Law Enforcement Management and Administrative Statistics (LEMAS) 2003 dataset. Three different models are developed to evaluate the impact of in-car cameras and CCTV on the citizen complaints and their dispositions. Two ordinary least square regression (OLS) models and a Heckman selection model are used to analyze the data. The Heckman selection model is utilized to correct for selection bias in truncated data for sustained complaints after log transformation. The results suggest that the use of surveillance technology by the police is necessary, but insufficient, in reducing the number of complaints. The finding suggests that videotaped evidence, recorded by surveillance technology, increased the number of convictions of accused officers in municipal police departments. The analysis also suggests that municipal police departments that used CCTV only in 2003 received a higher number of citizen complaints, in comparison to municipal police departments without CCTV, both in 2000 and 2003. No evidence was found to indicate that surveillance technology has a positive impact on the percentage of dismissed complaints.
APA, Harvard, Vancouver, ISO, and other styles
15

Fiusco, Francesco. "Improvement of a Space Surveillance and Tracking Analysis tool." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-247880.

Full text
Abstract:
This thesis deals with the improvement of SPOOK (SPace Objects Observation and Kalmanltering), an orbit calculation tool developed by Airbus Defence and Space GmbH. The workdescribed in this thesis aims at improving the architecture and analysis capabilities of thesoftware on dierent levels: Design and build a framework that can use SPOOK as a calculation engine and use itscapabilities to build a complete SST system for man-made objects orbiting the Earth,providing commercial services (e.g. collision avoidance, visualization, re-entry analysis,etc.), catalog maintenance and simulations. A complete Python API was designed andimplemented, which makes now SPOOK a complete cataloguing system for man-madespace objects that can provide services to the end user; Estimate covariance information from TLE data published by the US Space Command(available e.g. on Space-track.org); Devise and validate metrics that can assess the quality of an orbit determination processautomatically, to ensure as small human interaction as possible; Preliminarily implement a fast Lambert problem solver.In addition to this, a variety of miscellaneous activities were performed.<br>Detta examensarbete handlar om förbättringar av SPOOK (observation av rymdobjekt ochKalmanfiltrering), ett beräkningsverktyg för omloppsbanor utvecklat av Airbus Defence och Space GmbH. Detta arbete syftar till att förbättra arkitekturen hos programvaran och dess förmåga att utföra analys på olika nivåer:•Designa och bygga ett ramverk användes SPOOK som beräkningsmotor och använda dess kapacitet för att bygga ett komplett SST-system för konstgjorda material kretsande runt jorden, tillhandahålla kommersiella tjänster (e.g. undvika kollision, visualisering, analys av återinträde etc.), katalogunderhåll och simuleringar. En komplett Python-API designades och implementerades, som nu gör SPOOK till ett komplett katalogiseringssystem för konstgjorda rymdobjekt som kan tillhandahålla tjänster för slutanvändare;•Uppskatta kovariansen av TLE data publicerad av US Space Command (tillgängligt via Space-track.org);•Utforma och validera kvalitetskoefficienter som automatiskt kan bedöma kvaliteten hos uppskattningen av en omloppsbana och därmed minimera interaktionen med användaren;Preliminärt implementera en snabb lösare för Lambertproblem.
APA, Harvard, Vancouver, ISO, and other styles
16

Howell, James Perry. "Parents, watching: introducing surveillance into modern American parenting." Diss., University of Iowa, 2010. https://ir.uiowa.edu/etd/818.

Full text
Abstract:
During the last quarter of the twentieth century, there has been a significant expansion in the means by which parents in the United States might use technologies to watch their children. Watching and worrying about children are not new to the job of parenthood, but the ways of watching now available to parents represents a change of degree so great as to represent a change in kind. The parental gaze has become technologized. This dissertation investigates what happens when man-made devices insert themselves into this most basic of human endeavors. Parenting desires, social expectations, and technological capacities have co-evolved in the United States to a point where the norms of parental watching are increasingly technology-based. This is a "mixed methods," cross-case study. It delves into the particulars of three distinct media while looking for patterns of use and effects across the different technologies. The core of this investigation is three case studies of particular surveillance technologies that all came to prominence, in terms of their popularity or frequency of use, in the United States in the last thirty years. The three subjects of these case studies--fetal ultrasound, Eisenberg, Murkoff, and Hathaway's 1984 pregnancy advice and guide book What to Expect When You're Expecting, and baby monitors--are all media that offer parents the opportunity to be better and less anxious parents by enhancing their powers of parenting observation. They form an optical--textual--acoustic triad that demonstrates the breadth of media that are enlisted into surveillance practices. These new anxiety technologies change thinking, perceptions, and attitudes. They serve both to introduce new human capacities and to direct and to mold existing capacities. They have also helped to change our ideas of what is possible. A few overarching characteristics of American parental thinking have helped to pushed surveillance to prominence. Middle class American parents of the last quarter of the twentieth century have come to feel that the world is a more dangerous place for their children. They perceive their offspring as more vulnerable to dangers and as less capable of avoiding these dangers on their own. Parents also feel an increased sense of personal responsibility for the safety of their children. It is not that that contemporary parents have warmer or deeper feelings toward their children, but rather that contemporary parents believe that they both can and should control a much broader range of dangers to their children than parents in the past believed they could control. The "anxiety technologies" of this study serve in part to bring home to their users the riskiness of parenting and the vulnerability of the fetus/infant. These technologies have come to promote responsibility expansion, efficiency orientation, and risk focus for parents. While these technologies do provide parents with a great deal more focused information, many of the perceived enhancements in powers to effect outcomes are presumptive, illusory effects of actual increases in information. Information without influence is as likely to contribute to anxiety as to power.
APA, Harvard, Vancouver, ISO, and other styles
17

Mattisson, Frida. "Image processing with interacting interface for surveillance." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-101992.

Full text
Abstract:
Spicio är ett övervakningssystem som innehåller en algoritm utvecklad för att jämföra två bilder för att uppfatta förändring i scenen. En webbklient för att användaren ska kunna kontrollera systemet på annan ort, interagera med de detekterade bilderna på olika sätt och se livestream från de kopplade kamerorna. Systemet är utvecklat för att kunna fungera i olika scener med olika förhållanden. Genom att välja en känslighetsparameter kollar systemet om detektionen utifrån storleken på förändringen är stor nog att rapportera. Systemet är även utvecklat genom en rad olika funktioner att stå emot regn och snö, genom att tröskla bort små objekt och förändringar. Användaren får feedback ifrån systemet som skickar mail vid varje detektion.
APA, Harvard, Vancouver, ISO, and other styles
18

Wynn, Eric Z. "Privacy in the face of surveillance: Fourth Amendment considerations for facial recognition technology." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45279.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>Facial recognition technology adds a new dimension to government and police surveillance. If these organizations were to employ active surveillance using facial recognition technology, the implication could mean that people appearing in public places no longer have an expectation of privacy in anonymity. Real-time identification using facial recognition surveillance technology is not currently ready for successful employment by law enforcement or government agencies, but the speed with which the technology is being developed means that a constitutional challenge to this new technology will serve as a turning point for the future of Fourth Amendment privacy jurisprudence and shape the future of surveillance in the digital age. This research explores the history and current state of facial recognition technology and examines the impacts of surveillance on privacy expectations. This thesis also reviews existing Fourth Amendment legal protections of privacy through a review of cases relating to government surveillance and privacy. The research effort finds that while facial recognition surveillance does not expressly violate current privacy protections, the courts have historically matured with advancing technology, and future court decisions are likely to decide soon whether the Fourth Amendment leans more toward safeguarding privacy or security when it comes to facial recognition surveillance.
APA, Harvard, Vancouver, ISO, and other styles
19

El, Khoury John Said. "Simulation of Crash Prevention Technology at a No- Passing Zone site." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/9689.

Full text
Abstract:
No-passing zone crashes constitute a sizable percentage of the total crashes on two-lane rural roads. A detection and warning system has been devised and implemented at a no-passing zone site on route 114 of Southwest Virginia to address this problem. The warning system aims at deterring drivers from illegally conducting a passing maneuver within the no-passing zone area. The violating driver is warned in real time to stop the illegal act. This system is currently operational and its main function is to warn the no-passing zone violator. The aim of this research is to extend the warning system to the opposing vehicle in the same lane of the persistent violator in order to avoid crashes caused by the illegal maneuver that is taking place at a crest vertical curve of the two-lane rural road. In order to test the new system prior to its physical installation, a computer simulation has been developed to represent the real world violation conditions so that a better understanding of the problem and its varying scenarios would be achieved. The new simulation, which is the focus of this thesis, takes advantage of an existing simulation developed earlier to replicate only the illegal maneuver without giving any warnings to the opposing vehicle. The new program simulates the outcome of deploying a warning sign to the opposing driver for crash avoidance purposes assuming that all violators persist to pass the vehicle ahead. More than 712,000 computer runs were conducted to simulate the various possible outcomes including the sensitivity analysis. A critical comparison was made between the previous system that warned only the violating vehicle and the current program that warns both the violator as well as the opposing vehicle. The results indicate that warning the opposing driver would reduce the rate of unavoidable crashes by approximately 11% in the east direction and 13.25% in the west direction.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
20

Benson, Etienne Samuel. "The wired wilderness : electronic surveillance and environmental values in wildlife biology." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/43219.

Full text
Abstract:
Thesis (Ph. D. in History, Anthropology, and Science, Technology and Society (HASTS))--Massachusetts Institute of Technology, Program in Science, Technology and Society, 2006.<br>Includes bibliographical references.<br>In the second half of the twentieth century, American wildlife biologists incorporated Cold War-era surveillance technologies into their practices in order to render wild animals and their habitats legible and manageable. One of the most important of these was wildlife radio-tracking, in which collars and tags containing miniature transmitters were used to locate individual animals in the field. In addition to producing new ecological insights, radio-tracking served as a site where relationships among scientists, animals, hunters, animal rights activists, environmentalists, and others involved in wildlife conservation could be embodied and contested. While scholars have tended to interpret surveillance technologies in terms of the extension of human control over nature and society, I show how technological, biological, and ecological factors made such control fragmentary and open to reappropriation. Wildlife radio-tracking created vulnerabilities as well as capabilities; it provided opportunities for connection as well as for control. I begin by showing how biologists in Minnesota and Illinois in the early 1960s used radio-tracking to establish intimate, technologically-mediated, situated relationships with game animals such as ruffed grouse, which they hoped would bolster their authority vis-a-vis recreational hunters. I then show how the technique was contested by environmentalists when biologists applied it to iconic "wilderness wildlife" such as grizzly bears in Yellowstone National Park in the 1960s and 1970s. One way for biologists to render radio-tracking acceptable in the face of such opposition was to emphasize its continuity with traditional practices, as they did in a radio-tagging study of tigers in Nepal in the 1970s.<br>(cont.) Another way was to shift to less invasive techniques of remote sensing, such as the bioacoustic surveys of bowhead whales off Alaska's Arctic coast that were conducted in the 1980s after a proposal to radio-tag whales was rejected by marine mammalogists and Ifiupiat whalers. Finally, wildlife biologists could reframe radio-tracking as a means for popular connection rather than expert control, as they did by broadcasting the locations of satellite-tagged albatrosses to schoolchildren, gamblers, and the general public via the Internet in the 1990s and early 2000s.<br>by Etienne Samuel Benson.<br>Ph.D.in History, Anthropology, and Science, Technology and Society (HASTS
APA, Harvard, Vancouver, ISO, and other styles
21

Stykow, Henriette. "Small data on a large scale : Torn between convenience and surveillance." Thesis, Umeå universitet, Designhögskolan vid Umeå universitet, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-110630.

Full text
Abstract:
Technology has become an inherent part of our daily lives. If we don’t want to abstain from the benefits technology brings, we have to acknowledge the fact that tech generates data and adjust our norms and habits to it. This thesis critiques how corporations and governmental institutions collect, store and analyze data of individuals. It discusses the economic and technological forces that stand behind the collection and usage of data in the past, today, and the near future. Beyond that, it alludes to political implications. The overarching goal is to stimulate reflection about culture and future. To achieve that, the design of an interactive educational web story within the browser is proposed. A curated personal data platform in combination with interactive web stories make data collection, data usage, and the risks of data aggregation visible. Business practices and interests are rendered transparent on the basis of users’ actual online behavior and exposure. The web stories allows to understand the meaning and value of the data traces users leave online. In five chapters, they experience the basic technologies of the Internet, business motivations, and surveillance practices in the context of their individual web browsing behavior. Each chapter invites to explore details of the topic to accommodate for individual need and interest in the matter. A critical reflection on the future of data collection is encouraged, tools and settings within the browser help users to protect their digital identities.
APA, Harvard, Vancouver, ISO, and other styles
22

Out, Michèle. "Government Surveillance Technology and the Value of Trust : The Relation of Trust between Government and Society, and its Effect on Cooperation and Morality." Thesis, Linköpings universitet, Institutionen för kultur och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-73074.

Full text
Abstract:
This thesis is about government surveillance technology in relation to the value of trust in society. The 2006 EU Data Retention Directive is used as an example of surveillance technology that invades privacy for the sake of security. I will show that trust enables cooperation and morality in society, and ask in what way the Directive relates to these values. The focus lies upon the relation of trust between government and citizens. I will argue that the Directive fails to recognize the value of trust in relation to cooperation and morality in society, because it fails to respect its citizens, and therefore has a bad influence on the climate of trust.
APA, Harvard, Vancouver, ISO, and other styles
23

MacWillie, John. "Technical sensoriums : a speculative investigation into the entanglement and convergence of surveillance and technology." Thesis, University of Leeds, 2015. http://etheses.whiterose.ac.uk/13092/.

Full text
Abstract:
Surveillance and technology are among the most prevalent phenomena in the developed world, the proliferation of which is abetted by an ever increasing profusion of products and services extending the competencies of these capabilities into new opportunities and markets worldwide. More significantly, this momentum is leading to a convergence of these disparate competencies towards a common techno-surveillant milieu. Yet much of what is written and theoretically understood about these topics (singularly and collectively) fails to provide for a unified accounting that anticipates either the trajectory or the heterogeneous forms of this converging phenomenon. This projects sets out to excavate why our understanding of techno-surveillance is so myopic. Following the evidence, I assert that this short-sightedness is not simply the result of methodological shortcomings. Rather, most researchers of surveillance and technology are blinded by philosophical presumptions (primarily grounded in epistemology) that exclude the kinds of questions (largely ontological) they must ask to go deeper in their investigations. This study examines the archaeological detritus of an early techno-surveillant system, the characteristics of which are typical of the kinds of systems that have come to challenge researchers about the implications of their analyses. Based on this analysis, this study proposes an ontological model, which I call ontigeny that is consistent with the evidence and helps to explain the heterogeneity of techno-surveillance, as well as its potential trajectories.
APA, Harvard, Vancouver, ISO, and other styles
24

Arikan, Funda. "Web Gis Based Animal Diseases Surveillance System." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610466/index.pdf.

Full text
Abstract:
Today, infectious animal diseases and the propagation speeds of these diseaseshave been threatening the human health. Threats from animal disease outbreakssuch as Avian Influenza have increased in both number and complexity. So, it is extremely important to determine the animal diseases at first appearances and totake precautions according to propagation speeds of the diseases. Geographic Information Systems (GIS) have become an important tool inveterinary epidemiology, surveillance and monitoring of animal diseases. Such approaches can be used for public health planning and predicting disease risks. This study aims to build a GIS web-based animal health surveillance system in Turkey in order to monitor and analyse disease outbreaks. Different sources of data<br>geographical data, animal holding locations, disease outbreak recordings, reporting information and special GIS functions have been incorporated in the application. It enables to determine the first, second and third degree risk zones of a disease, query the animals, holdings and disease events, create thematic maps and show the results of explored landscape features associated with Avian Influenza outbreak of 2006 and present graphically illustrated reports. This study will make the management of the disease outbreak situation easier, enhance the response mechanism of the decision makers, help to make better decisions, control the disease as quickly as possible, protect both the animals and humans against diseases, also provide a tool to evaluate different strategies to prevent the spread of infectious diseases. So, in an infectious disease case, emergency precautions can be taken and control strategies can be planned.
APA, Harvard, Vancouver, ISO, and other styles
25

Kratzer, Gadala E. "A methodology approach for conducting a Business Case Analysis for the Advanced Technology Ordnance Surveillance (ATOS) Advanced Concept Technology Demonstration (ACTD). /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FKratzer.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kratzer, Gadala E. "A methodological approach for conducting a Business Case Analysis for the Advanced Technology Ordnance Surveillance (ATOS) Advanced Concept Technology Demonstration (ACTD)." Thesis, Monterey California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1766.

Full text
Abstract:
The purpose of this thesis is to provide a methodological approach for conducting a Business Case Analysis (BCA) for the Advanced Technology Ordnance Surveillance (ATOS) Advanced Concept Technology Demonstration (ACTD). This study compares the cost savings over time of having an ATOS infrastructure in place at Navy Munitions Management locations compared to the base case of "as-is" inventory management. ATOS is a Radio Frequency Identification (RFID)-based automated system that provides a capability to collect environmental data in near real-time and supports munitions management tasks on stored munitions pallets. This type of data has never before being available and is critical for making more precise decisions about the shelf life and operational performance of individual munitions throughout their service life. ATOS is not meant to be a replacement for the status quo processes of Ordnance Management (OM). Instead, ATOS is meant to enhance many of the current processes and add additional capabilities and dimensions to OM. A Business Case Analysis for a notional site, using exemplar data sets indicates that with an initial investment of 1.3 million dollars, a Net Present Value (NPV) of 5.3 million dollars can be obtained over a 10-year period. The payback period is less than one year, and the Return on Investment is 214 %, or almost 11 % annual, compounded ROI.
APA, Harvard, Vancouver, ISO, and other styles
27

Andersson, Maria, Fredrik Gustafsson, Louis St-Laurent, and Donald Prevost. "Recognition of Anomalous Motion Patterns in Urban Surveillance." Linköpings universitet, Reglerteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-93983.

Full text
Abstract:
We investigate the unsupervised K-means clustering and the semi-supervised hidden Markov model (HMM) to automatically detect anomalous motion patterns in groups of people (crowds). Anomalous motion patterns are typically people merging into a dense group, followed by disturbances or threatening situations within the group. The application of K-means clustering and HMM are illustrated with datasets from four surveillance scenarios. The results indicate that by investigating the group of people in a systematic way with different K values, analyze cluster density, cluster quality and changes in cluster shape we can automatically detect anomalous motion patterns. The results correspond well with the events in the datasets. The results also indicate that very accurate detections of the people in the dense group would not be necessary. The clustering and HMM results will be very much the same also with some increased uncertainty in the detections.<br><p>Funding Agencies|Vinnova (Swedish Governmental Agency for Innovation Systems) under the VINNMER program||</p>
APA, Harvard, Vancouver, ISO, and other styles
28

Menegazzo, Noemi <1994&gt. "Controlling China: an exploratory study into China's surveillance technology and its implications for Chinese citizens." Master's Degree Thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13769.

Full text
Abstract:
The aim of my work is to reach an understanding of the technological systems deployed by the Chinese government to control and monitor its population and the effect that those systems have on the Chinese citizens. Starting from the concept of surveillance, developed by the English philosopher Jeremy Bentham in its work “The Panopticon”, Foucault’s later interpretation of it, and the most modern adaptation of the concept to the specificities of the digital and technological society, the first part of the work will analyse the evolution of the surveillance concept and of surveillance technologies, taking into consideration also the case of western countries, such as the UK and the US. The second main topic will be the specific case of China and will provide an explanation of the evolution of surveillance practices from the monitoring systems deployed in the traditional China based on the Confucian philosophy to the newest technologies of control implemented in the most recent years. Furthermore, I will focus on the changes of surveillance and control systems after the foundation of the PRC in 1949, and the creation of the communist state, which brought huge political and societal changes. Then, taking the Tiananmen Square Massacre as a turning point, the focus will be on the new technologies implemented in China to control its population, also thanks to the cooperation with foreign firms. The last chapter will then focus on the latest project launched by the Chinese government in 2014, known under the name of “Social credit system”, which is an ambitious project whose aim is to create a huge database of data about every Chinese citizen, and give them a score based on their trustworthiness, that would affect their everyday life in different ways. I will then concentrate on the possible effect of this system, especially on those categories of people that may suffer the most from this project, such as political dissidents, human rights activist and so on.
APA, Harvard, Vancouver, ISO, and other styles
29

Martinez, Rodney G. "Watchkeeper." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FMartinez.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2010.<br>Thesis Advisor: Cook, Glenn. Second Reader: Pfeiffer, Karl. "March 2010." Author(s) subject terms: Enterprise Architecture, Information Management System (IMS), Inter-agency Operation Center, Enterprise Service Bus, Software Architecture, Software Architecture Analysis, VIRT (Valuable Information at the Right Time), Quality Attribute, WatchKeeper. Includes bibliographical references (p. 59-62). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
30

Simsek, Yilmaz. "New Surveillance Technologies and the Invasion of Privacy Rights." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4252/.

Full text
Abstract:
Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
APA, Harvard, Vancouver, ISO, and other styles
31

Eguchi, Makoto. "System dynamics analysis of incentives for Automatic Dependent Surveillance Broadcast (ADS-B) equipage." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/43184.

Full text
Abstract:
Thesis (S.M. in Technology and Policy)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2008.<br>Includes bibliographical references (p. 81-82).<br>The demand for air transportation is anticipated to continue to grow in the future. In order to accommodate future demands, the U.S. Joint Planning and Development Office (JPDO) proposed the Next Generation Air Transportation System (NextGen). One of the NextGen technologies currently under development is Automatic Dependent Surveillance - Broadcast (ADS-B), which is a new satellite-based surveillance technology. In order to achieve the adoption of ADS-B, equipage by aircraft operators is essential. However, it is sometimes difficult to achieve the transition from a current technology to a new technology. Therefore, encouraging the individual user's adoption is a key factor of the successful technology transition. This thesis develops the system dynamics model to represent how individual users adopt a new technology, and analyzes how the adoption of new technologies can be encouraged using the system dynamics model. The effects of the following four incentive policies are examined: (1) Acceleration of operational benefits, (2) Preferred access, (3) Financial incentive, and (4) Mandate equipage. The result of the policy analysis shows the each incentive policy is effective to encourage the early adoption of ADS-B. Especially, achieving early benefits is important to accelerate equipage. Moving forward the mandate date of ADS-B equipage also can be effective to increase total benefits.<br>by Makoto Eguchi.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
32

Cassa, Christopher A. "Privacy and identifiability in clinical research, personalized medicine, and public health surveillance." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45624.

Full text
Abstract:
Thesis (Ph. D.)--Harvard-MIT Division of Health Sciences and Technology, 2008.<br>This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Includes bibliographical references (p. 191-200).<br>Electronic transmission of protected health information has become pervasive in research, clinical, and public health investigations, posing substantial risk to patient privacy. From clinical genetic screenings to publication of data in research studies, these activities have the potential to disclose identity, medical conditions, and hereditary data. To enable an era of personalized medicine, many research studies are attempting to correlate individual clinical outcomes with genomic data, leading to thousands of new investigations. Critical to the success of many of these studies is research participation by individuals who are willing to share their genotypic and clinical data with investigators, necessitating methods and policies that preserve privacy with such disclosures. We explore quantitative models that allow research participants, patients and investigators to fully understand these complex privacy risks when disclosing medical data. This modeling will improve the informed consent and risk assessment process, for both demographic and medical data, each with distinct domain-specific scenarios. We first discuss the disclosure risk for genomic data, investigating both the risk of re-identification for SNPs and mutations, as well as the disclosure impact on family members. Next, the deidentification and anonymization of geospatial datasets containing information about patient home addresses will be examined, using mathematical skewing algorithms as well as a linear programming approach. Finally, we consider the re-identification potential of geospatial data, commonly shared in both textual form and in printed maps in journals and public health practice. We also explore methods to quantify the anonymity afforded when using these anonymization techniques.<br>by Christopher A. Cassa.<br>Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
33

Hurley, Emily Elizabeth. "Surveillance Technology and the Neoliberal State: Expanding the Power to Criminalize in a Data-Unlimited World." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78250.

Full text
Abstract:
For the past several decades, the neoliberal school of economics has dominated public policy, encouraging American politicians to reduce the size of the government. Despite this trend, the power of the state to surveille, criminalize, and detain has become more extensive, even as the state appears to be growing less powerful. By allowing information technology corporations such as Google to collect location data from users with or without their knowledge, the state can tap into a vast surveillance network at any time, retroactively surveilling and criminalizing at its discretion. Furthermore, neoliberal political theory has eroded the classical liberal conception of freedom so that these surveillance tactics to not appear to restrict individuals' freedom or privacy so long as they give their consent to be surveilled by a private corporation. Neoliberalism also encourages the proliferation of information technologies by making individuals responsible for their economic success and wellbeing in an increasingly competitive world, thus pushing more individuals to use information technologies to enter into the gig economy. The individuating logic of neoliberalism, combined with the rapid economic potentialities of information technology, turn individuals into mere sources of human capital. Even though the American state's commitment to neoliberalism precludes it from covertly managing the labor economy, it can still manage a population through criminalization and incarceration. Access to users' data by way of information technology makes the process of criminalization more manageable and allows the state to more easily incarcerate indiscriminately.<br>Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
34

Muir, Lorna. "Between discipline and control : cinematic engagements with contemporary transformations in the surveillance society." Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=186203.

Full text
Abstract:
This thesis examines how cinema engages with changing surveillance practices, and the hypothesised paradigm shift from discipline to control. The first part of the thesis outlines those changes in terms of three crucial areas in any discussion of surveillance – the organisation of the body, space and time. Since its publication in the 1970s, Michel Foucault’s Discipline and Punish has been a continuous influence on much social theory. However, recent developments in surveillance practices suggest that the Foucauldian model of discipline may no longer be the most appropriate theoretical framework within which to discuss contemporary modes of surveillance. In Postscript on Control Societies, written in 1990, Gilles Deleuze offers a possible new paradigm (the control society) through which to explore emerging trends in surveillance practices, often linked to the increasing use of digital technologies. While the paradigm of control does not simply replace that of discipline, it does help us to understand the development and amelioration of disciplinary structures. The second part of the thesis offers an original perspective on ongoing debates in surveillance studies concerning discipline and control, by investigating how this shift is articulated and reflected upon in a diverse range of films (from mainstream productions such as Enemy of the State to avant-garde ‘essays’ such as Harun Farocki’s Ich glaubte Gefangene zu sehen) which explicitly engage with changes in surveillance practice. It focuses specifically on the cinematic representation of the body, space and time in the context of the hypothesised transition from discipline to control, and addresses a series of important questions for cinema’s engagement with surveillance: can cinema, with its reliance on the visual image, address the emerging surveillance society which is increasingly invisible and, if so, what strategies does cinema use to achieve this; and, what is the implication of such strategies for the cinematic spectator? In conclusion, the thesis reflects on how cinema shapes our understanding of the emerging surveillance society.
APA, Harvard, Vancouver, ISO, and other styles
35

Willey, James R. "The presence and perceived impact of video surveillance technology in Indiana public schools as reported by building principals." Muncie, Ind. : Ball State University, 2008. http://cardinalscholar.bsu.edu/750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Nilsson, Henrik. "Evaluation of Methods for Person Re-identification between Non-overlapping Surveillance Cameras." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177889.

Full text
Abstract:
This thesis describes a comparison of several state-of-the-art methods used for re-identification of a person between several non-overlapping views captured by surveillance cameras. Since 2014, the focus of the area of person re-identification has been heavily oriented towards approaches employing the use of neural network due to the increase in performance shown from this approach. Three different methods employing convolutional neural networks as a means of attempting automatic person re-identification have mainly been evaluated in this thesis. These three methods are named Spatial-Temporal Person Re-identification (ST-reID), Top DropBlock Network (Top-DB-Net), and Adaptive L2 Regularization. A fourth method known as Multiple Expert Brainstorming Network (MEB-Net) using domain adaptation is used for comparison to the results of applying the trained models from the other three methods on an unseen environment. As an attempt at improving the results of applying the models on an unseen environment, two different approaches have been taken. The first of these is an attempt at segmenting the person from the background by creating a mask that encapsulates the person while disregarding the background, as opposed to using a rectangular cropped image for training and evaluating the methods. To do this, Mask-RCNN which is a framework for object instance segmentation is used. The second approach explored in this thesis is attempting automatic white balancing as a means of removing the effect of the illumination source of the scenes before the person images are extracted. Both approaches show positive results when the model is applied on an unseen environment as opposed to using the unchanged person images, although the results have not been able to match those that have been obtained using domain adaptation.<br><p>Examensarbetet är utfört vid Institutionen för teknik och naturvetenskap (ITN) vid Tekniska fakulteten, Linköpings universitet</p>
APA, Harvard, Vancouver, ISO, and other styles
37

Kurt, Evren. "Surveillance And Control In The Age Of Information: A Critical Analysis Of The Technology-power Relationship." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12611611/index.pdf.

Full text
Abstract:
This study deals with the notions and practices of surveillance and control in the current society. By this means, it aims to discuss the relation between technology and power on basis of surveillance technologies witnessed in all domains of life. With the extensive use of new technologies as camera monitoring, biometrics, and smart cards, power holders get the opportunity and tools to monitor all actions and data of individuals. How this is achieved and for what purposes and the ideology behind the surveillance practices are the main issues of this study. In accordance with this goal, the use of surveillance technologies as a tool of power to provide rationalization in which everything is visible, predictable, and controllable, to maintain social control, and to ensure the domination of power over the society is discussed through examining the applications of surveillance in Turkey and in other countries. Besides, the becoming of surveillance and control as natural and usual aspects of the current society in the eyes of people and their becoming a culture are also pointed out and analyzed in order to comprehend the location of these notions in everyday life. All these issues are discussed critically in order to analyze the role and ideological function of surveillance, in particular, and the relation of technology with power, in general.
APA, Harvard, Vancouver, ISO, and other styles
38

Meyer, Mark A. (Mark Aaron). "Use of location data for the surveillance, analysis, and optimization of clinical processes." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/35517.

Full text
Abstract:
Thesis (S.M.)--Harvard-MIT Division of Health Sciences and Technology, 2006.<br>Includes bibliographical references (leaves 33-35).<br>Location tracking systems in healthcare produce a wealth of data applicable across many aspects of care and management. However, since dedicated location tracking systems, such as the oft mentioned RFID tracking system, are still sparsely deployed, a number of other data sources may be utilized to serve as a proxy for physical location, such as barcodes and manual timestamp entry, and may be better suited to indicate progress through clinical workflows. INCOMING!, a web-based platform that monitors and tracks patient progress from the operating room to the post-anesthesia care unit (PACU), is one such system that utilizes manual timestamps routinely entered as standard process of care in the operating room in order to track a patient's progress through the post-operative period. This integrated real time system facilitates patient flow between the PACU and the surgical ward and eases PACU workload by reducing the effort of discharging patients.<br>(cont.) We have also developed a larger-scale integrated system for perioperative processes that integrates perioperative data from anesthesia and surgical devices and operating room (OR) / hospital information systems, and projects the real-time integrated data as a single, unified, easy to visualize display. The need to optimize perioperative throughput creates a demand for integration of the datastreams and for timely data presentation. The system provides improved context-sensitive information display, improved real-time monitoring of physiological data, real-time access to readiness information, and improved workflow management. These systems provide improved data access and utilization, providing context-aware applications in healthcare that are aware of a user's location, environment, needs, and goals.<br>by Mark A. Meyer.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
39

Yu, Lang. "Evaluating and Implementing JPEG XR Optimized for Video Surveillance." Thesis, Linköping University, Computer Engineering, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-54307.

Full text
Abstract:
<p>This report describes both evaluation and implementation of the new coming image compression standard JPEG XR. The intention is to determine if JPEG XR is an appropriate standard for IP based video surveillance purposes. Video surveillance, especially IP based video surveillance, currently has an increasing role in the security market. To be a good standard for surveillance, the video stream generated by the camera is required to be low bit-rate, low latency on the network and at the same time keep a high dynamic display range. The thesis start with a deep insightful study of JPEG XR encoding standard. Since the standard could have different settings,optimized settings are applied to JPEG XR encoder to fit the requirement of network video surveillance. Then, a comparative evaluation of the JPEG XR versusthe JPEG is delivered both in terms of objective and subjective way. Later, part of the JPEG XR encoder is implemented in hardware as an accelerator for further evaluation. SystemVerilog is the coding language. TSMC 40nm process library and Synopsys ASIC tool chain are used for synthesize. The throughput, area, power ofthe encoder are given and analyzed. Finally, the system integration of the JPEGXR hardware encoder to Axis ARTPEC-X SoC platform is discussed.</p>
APA, Harvard, Vancouver, ISO, and other styles
40

Brien, Lynn F. "Privacy and Geospatial Technologies." ScholarWorks@UNO, 2009. http://scholarworks.uno.edu/td/971.

Full text
Abstract:
This research examines the role of geospatial and ancillary technologies in the erosion of privacy in contemporary society. The development of Remote Sensing, GIS, and GPS technologies are explored as a means of understanding both their current and predicted uses and capabilities. Examination is also made of the legal basis and current status of privacy rights in the United States. Finally, current and predicted uses and capabilities of geospatial and ancillary technologies are critically examined in light of existing privacy protections as a means of determining the ways in which these technologies are impacting privacy currently and what their effects may be in the future.
APA, Harvard, Vancouver, ISO, and other styles
41

Kajevic, Belhira. "Biometrics: A New Mean of Surveillance and Migration Control." Thesis, Malmö högskola, Institutionen för globala politiska studier (GPS), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22187.

Full text
Abstract:
We live in an era of advanced technological innovations and it is therefore difficult to acquire a proper overview of the different surveillance techniques deployed for the purpose of enhancing and administrating migration control. The intent of this paper is to disseminate one of the new technologies on the market: the biometric technology that is an identification and verification system based on measurements of biological traits. Different approaches are used to explore and investigate the technological functions, social structures and political justifications for their validity and their role in the implementation of the biometric technology. The paper also provides an overview of the different areas of political and social management that are affected by the implementation of the biometric techniques.The principal aim of this work is to examine how the implementation of the biometric techniques will affect privacy for all people, taking both information privacy and personal integrity into consideration. The second question deals with migration management, as the current implementation mainly involves travel documents. It focuses on the consequences of the so-called war on terror and its call for prevention of terrorism and irregular migration. The dilemma between national security and the right to privacy, public good and private interests, and the realms of state and individual rights are also discussed and analysed.Hence, the framework and the fundamental structure of this thesis are based on three core issues pertinent to the implementation of biometrics in the EU: threats posed on the right to privacy, securitization of migration, and intensification of surveillance and state control. The findings are used to identify the threats posed on right to privacy and the way this right is compromised, and the consequences of practices and policies in the field of migration that are discriminatory and exclusory. Lastly, by employing different theories, this paper examines why state seeks technological control over citizens and why individuals comply with state control and surveillance.
APA, Harvard, Vancouver, ISO, and other styles
42

Areskog, John, and Oden Qvarnström. "Alternative mechanical interfaces for alignment of image sensor and lens in surveillance cameras." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20286.

Full text
Abstract:
To manufacture better cameras at lower costs is of great interest to the surveillance industry. Inthe process of manufacturing cameras, the mounting of the optics and the digital image sensor, isa crucial part of producing a high quality image. For high resolution cameras, mechanical passivealignment of the optics and image sensor is insufficient for producing a picture of adequate quality.This is caused by inherit problems from manufacturing, resulting in performance issues for theparts. For the lens, these performance issues causes the light path to deviate and the focal pointto be off center. In the same way, manufacturing of the image sensor causes similar problems.These problems results in an image of subpar quality, if the interface solely relies on mechanicalpassive alignment. To compensate for these problems a computer aided machine is used to alignthe lens and the image sensor. The lens and the sensor, are placed in the machine, aligned forbest possible image quality and fixated in its place. This fixation is done with UV light curedadhesive. The process is drawn with some issues, the curing of the adhesive causes unpredictableshrinkage that affects the image quality. In addition, contaminations such as dust or dirt on theparts, are impossible to remove once the fixation is complete, causing blemishes on the images.These faults results in scrapping of expensive parts, which is costly for the manufacturer. Thisthesis aims to find alternative mounting solutions to the parts, that result in less scrapping ofexpensive components, without sacrificing image quality. The result is two concepts that can beused as inspiration for future improvement of surveillance camera manufacturing. A new adhesiveinterface, that can reduce, manufacturing cost and the unreliable shrinkage of the adhesive, as wellas a new mechanical coupling that allows reassembly after cleaning, is presented.iii
APA, Harvard, Vancouver, ISO, and other styles
43

Brown, Bronchae M. Schulz Brian L. P. "The effects of the joint multi-mission electro-optical system on littoral maritime Intelligence, Surveillance, and Reconnaissance operations." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FBrown.pdf.

Full text
Abstract:
Thesis (M.S. in Information Warfare Systems Engineering)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): last name, first name ; "September 2009." Description based on title screen as viewed on November 05, 2009. Author(s) subject terms: Infrared, Electro-optic, Joint Capability Technology Demonstration, Intelligence Surveillance and Reconnaissance, Modeling and Simulation Includes bibliographical references (p. 141-144). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
44

Karlsson, Simon. "Real-time Location System with Passive RFID for surveillance of trusted objects in a room." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-63803.

Full text
Abstract:
The use of Radio Frequency Identification (RFID) in Real-Time Location Systems (RTLS) in asset management has been in limited use, mainly in large organizations such as hospitals and military. The research in this area is making progress and new solutions with reduced costs with greater resolution are presented by different companies that enable the technology to be used in new operating areas. This thesis is about the development, implementation and integration of a RTLS solution that enables surveillance of the position of keys. The RTLS solution utilizes RTLS hardware to receive the positions of the keys. The report describes how the RTLS hardware is selected and how the software solution is designed and implemented. The report describes also result of how the finished solution with software and hardware cooperates. The most vital problem was to create an efficient zone structure that implements the surveillance hierarchy of the keys. The thesis was conducted at a company (PAAM Systems) that offers solutions in access and asset management. The company aims to use a RTLS in an asset management application for keys. The purpose of this work is to examine the existing solutions on the market that provide a RTLS with passive RFID technology.
APA, Harvard, Vancouver, ISO, and other styles
45

Song, Zixuan. "A Network based Home surveillance/ monitoring system : Router based Deployment and Network Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47314.

Full text
Abstract:
Home surveillance/monitoring systems are widely used nowadays. An intelligent surveillance system can provide multiple functions for uses. The assumption underlying this thesis project is that a home surveillance system can help people manage their homes better. The thesis presents two investigations into an intelligent home surveillance system implementation. First we will focus on the development of a router platform, which can manage the cameras connected to an intelligent home surveillance system. Such a system will include at least one router, one or more cameras. Some of these cameras will be connected by wireless links. Each camera will be dynamically allocated an IP address. The system will manage and control the various elements of the home surveillance/monitoring system via the network. Second, we will examine potential network security solutions, and choose a suitable solution. A key result of this thesis project is that SRTP and MIKEY are suitable for use in a home surveillance/monitoring system and together they provide authentication and privacy for the information from the camera (and potentially other information). This privacy is an important aspect of a home surveillance/monitoring system, since improper use of this information could be damaging to the homeowner’s privacy and personal integrity.
APA, Harvard, Vancouver, ISO, and other styles
46

Weston, Dean R. "Camera surveillance, an analysis of preventive rationalities and panopticism in relation to an expanding technology of social control." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ58518.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Patti, Alexandra C. "Technology and Big Data Meet the Risk of Terrorism in an Era of Predictive Policing and Blanket Surveillance." ScholarWorks@UNO, 2015. http://scholarworks.uno.edu/td/2014.

Full text
Abstract:
Surveillance studies suffer from a near-total lack of empirical data, partially due to the highly secretive nature of surveillance programs. However, documents leaked by Edward Snowden in June of 2013 provided unprecedented proof of top-secret American data mining initiatives that covertly monitor electronic communications, collect, and store previously unfathomable quantities of data. These documents presented an ideal opportunity for testing theory against data to better understand contemporary surveillance. This qualitative content analysis compared themes of technology, privacy, national security, and legality in the NSA documents to those found in sets of publicly available government reports, laws, and guidelines, finding inconsistencies in the portrayal of governmental commitments to privacy, transparency, and civil liberties. These inconsistencies are best explained by the risk society theoretical model, which predicts that surveillance is an attempt to prevent risk in globalized and complex contemporary societies.
APA, Harvard, Vancouver, ISO, and other styles
48

Register, Michael G. "Justifying the means| Electronic domestic surveillance programs before and following the September 11, 2001 terrorist attack on the United States." Thesis, Utica College, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10155656.

Full text
Abstract:
<p> Throughout the years, the United States government and local law enforcement has used electronic domestic surveillance for criminal justice purposes. Shortly after World War II, the government began to abuse the power of electronic domestic surveillance for the purposes of gathering intelligence on American citizens. After the September 11, 2001 terrorist attacks on the United States, electronic domestic surveillance focused heavily on American citizens in the name of national security. The government has a duty to protect the United States and American citizens. The use of electronic domestic surveillance is a method for that purpose; however, the infringement of American&rsquo;s Fourth Amendment rights has become a conflict for the government while trying to maintain national security. Along with attempting to keep security for American citizens, the United States government has lacked transparency in their electronic domestic surveillance methods, causing controversy with American citizens. It is a question of how much privacy would Americans sacrifice for their security. The research in this paper focuses on the comparison of the electronic domestic surveillance methods, how these processes affected the Fourth Amendment rights of American citizens, and the response to these programs and violations by Americans and the United States government, respectively. </p>
APA, Harvard, Vancouver, ISO, and other styles
49

Obasi, Jonah E. "Police Officers' Perceptions of Body-Worn Camera Technology." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4544.

Full text
Abstract:
In the past several years, police-community relations have received enormous scrutiny based on several high-profile incidents involving the use of deadly force. Politicians, civil societies, and victims' families have called for law enforcement agencies to equip local officers with body-worn cameras to increase transparency and accountability. The purpose of the study was to investigate how law enforcement officers in a Sheriff's office in the Southern United States perceived ease of use and usefulness of body-worn camera technology and to identify if gender and years of service related to police officers' acceptance of body-worn cameras as a component of their regular uniform. The theoretical foundation for this study was based on the Technology Acceptance Model (TAM) developed by Davis in 1989. Paper survey using TAM instrument was used to collect data from officers at the training center. A hierarchical multiple regression analysis was conducted to determine which independent variables predicted the frequency of use of body-worn cameras. Analysis of data collected from 88 officers found that their perceptions of the ease of use of body-worn cameras were moderately and positively correlated with their perceptions of the cameras' usefulness and their attitudes toward the camera. The relationship between usefulness and years of service was negative, indicating that as officers' length of service increased, their perceptions of body-worn cameras usefulness decreased. However, officers' attitudes toward using body-worn cameras were a predictor of their reported frequency of use. Findings from the study could contribute to positive social change by providing policymakers with new tools to craft training policies to enhance police-community relations.
APA, Harvard, Vancouver, ISO, and other styles
50

Kuklewski, Andrzej. "Accounting for uncertainty in a business case analysis for implementing advanced technology ordnance surveillance in a munitions management environment." Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/10141.

Full text
Abstract:
MBA Professional Report<br>The purpose of this project was to support the Advanced Technology Ordnance Surveillance (ATOS) project office in conducting a return on investment analysis. The approach taken to support the ROI analysis was to build a model consistent with the need for a Business Case Analysis (BCA) for an ATOS Advanced Concept Technology Demonstration (ACTD), which allows generating the return on investment distribution, while also assuming a range of uncertain savings assumptions. Additionally, the model that was built required testing with notional data in order to evaluate its functionality.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography