Dissertationen zum Thema „Electronic surveillance in literature“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Electronic surveillance in literature.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Electronic surveillance in literature" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Akram, Muhammad. „Surveillance centric coding“. Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/2320.

Der volle Inhalt der Quelle
Annotation:
The research work presented in this thesis focuses on the development of techniques specific to surveillance videos for efficient video compression with higher processing speed. The Scalable Video Coding (SVC) techniques are explored to achieve higher compression efficiency. The framework of SVC is modified to support Surveillance Centric Coding (SCC). Motion estimation techniques specific to surveillance videos are proposed in order to speed up the compression process of the SCC. The main contributions of the research work presented in this thesis are divided into two groups (i) Efficient Compression and (ii) Efficient Motion Estimation. The paradigm of Surveillance Centric Coding (SCC) is introduced, in which coding aims to achieve bit-rate optimisation and adaptation of surveillance videos for storing and transmission purposes. In the proposed approach the SCC encoder communicates with the Video Content Analysis (VCA) module that detects events of interest in video captured by the CCTV. Bit-rate optimisation and adaptation are achieved by exploiting the scalability properties of the employed codec. Time segments containing events relevant to surveillance application are encoded using high spatiotemporal resolution and quality while the irrelevant portions from the surveillance standpoint are encoded at low spatio-temporal resolution and / or quality. Thanks to the scalability of the resulting compressed bit-stream, additional bit-rate adaptation is possible; for instance for the transmission purposes. Experimental evaluation showed that significant reduction in bit-rate can be achieved by the proposed approach without loss of information relevant to surveillance applications. In addition to more optimal compression strategy, novel approaches to performing efficient motion estimation specific to surveillance videos are proposed and implemented with experimental results. A real-time background subtractor is used to detect the presence of any motion activity in the sequence. Different approaches for selective motion estimation, GOP based, Frame based and Block based, are implemented. In the former, motion estimation is performed for the whole group of pictures (GOP) only when a moving object is detected for any frame of the GOP. iii While for the Frame based approach; each frame is tested for the motion activity and consequently for selective motion estimation. The selective motion estimation approach is further explored at a lower level as Block based selective motion estimation. Experimental evaluation showed that significant reduction in computational complexity can be achieved by applying the proposed strategy. In addition to selective motion estimation, a tracker based motion estimation and fast full search using multiple reference frames has been proposed for the surveillance videos. Extensive testing on different surveillance videos shows benefits of application of proposed approaches to achieve the goals of the SCC.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Fernandez, Arguedas Virginia. „Automatic object classification for surveillance videos“. Thesis, Queen Mary, University of London, 2012. http://qmro.qmul.ac.uk/xmlui/handle/123456789/3354.

Der volle Inhalt der Quelle
Annotation:
The recent popularity of surveillance video systems, specially located in urban scenarios, demands the development of visual techniques for monitoring purposes. A primary step towards intelligent surveillance video systems consists on automatic object classification, which still remains an open research problem and the keystone for the development of more specific applications. Typically, object representation is based on the inherent visual features. However, psychological studies have demonstrated that human beings can routinely categorise objects according to their behaviour. The existing gap in the understanding between the features automatically extracted by a computer, such as appearance-based features, and the concepts unconsciously perceived by human beings but unattainable for machines, or the behaviour features, is most commonly known as semantic gap. Consequently, this thesis proposes to narrow the semantic gap and bring together machine and human understanding towards object classification. Thus, a Surveillance Media Management is proposed to automatically detect and classify objects by analysing the physical properties inherent in their appearance (machine understanding) and the behaviour patterns which require a higher level of understanding (human understanding). Finally, a probabilistic multimodal fusion algorithm bridges the gap performing an automatic classification considering both machine and human understanding. The performance of the proposed Surveillance Media Management framework has been thoroughly evaluated on outdoor surveillance datasets. The experiments conducted demonstrated that the combination of machine and human understanding substantially enhanced the object classification performance. Finally, the inclusion of human reasoning and understanding provides the essential information to bridge the semantic gap towards smart surveillance video systems.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Zhou, Han, und 周晗. „Intelligent video surveillance in a calibrated multi-camera system“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45989217.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Margolis, David. „An analysis of electronic surveillance in the USAPATRIOT act“. Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/776.

Der volle Inhalt der Quelle
Annotation:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Health and Public Affairs
Legal Studies
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

O'Malley, Patrick D. „Human activity tracking for wide-area surveillance“. [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000150.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains vi, 46 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Richard, Julie Ann. „On Dystopias| Do We Live in a Surveillance State?“ Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10601160.

Der volle Inhalt der Quelle
Annotation:

The technological advances in surveillance over the past 20 years have been astounding and are used in both the private and public sectors progressively each day. The extent of technological advances and the impact on our society seem almost reflective of something out of a work of science fiction. This study involves a qualitative content analysis of three early 20th century dystopian novels and news articles from newspapers such as The Guardian, that display current events pertaining to surveillance, including NSA surveillance methods leaked by Edward Snowden. The study relies upon macro sociological constructs, specifically formal social control to explain the social control imposed by our current government with the use of surveillance methods. Upon examination of the novels and news articles, it is revealed that there is a parallel between the novels and our current society which suggests that we live in a surveillance state. The importance of this study is to educate the public on data collection, analysis, and storage involved in the surveillance process. By showing that our current society is a surveillance state, this study expresses the importance of safeguarding our privacy, liberties, and civil rights as a means of reducing governmental social control.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Adams, Andrew J. „Multispectral persistent surveillance /“. Online version of thesis, 2008. http://hdl.handle.net/1850/7070.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Chappuies, Margaret R. Chappuies. „Surveillance and Narrative Authority in Villette“. University of Toledo Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=uthonors1513263903293044.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Medeme, Narasimha Rao. „Application of vehicle identification techniques in transportation surveillance with focus on security /“. free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1426087.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Karlsson, David. „Electronic Data Capture for Injury and Illness Surveillance : A usability study“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-102737.

Der volle Inhalt der Quelle
Annotation:
Despite the development of injury surveillance systems for use at large multi sportsevents (Junge 2008), their implementation is still methodologically and practicallychallenging. Edouard (2013) and Engebretsen (2013) have pointed out that thecontext of athletics championships feature unique constraints, such as a limiteddata-collection window and large amounts of data to be recorded and rapidlyvalidated. To manage these logistical issues, Electronic Data Capture (EDC) methodshave been proposed (Bjorneboe 2009, Alonso 2012, Edouard 2013). EDC systemshave successfully been used for surveillance during multi-sport events Derman et al(2013) and its potential for surveillance studies during athletics championships istherefore interesting. The focus for surveillance during athletics championships hasthis far been on injury and illness data collected from team medical staff in directassociation to the competitions. But the most common injury and illness problems inathletics are overuse syndromes (Alonso 2009, Edouard 2012, Jacobsson 2013) andknowledge of risk factors associated to these problems is also relevant in associationto championships. A desirable next step to extend the surveillance routines istherefore to include also pre-participation risk factors. For surveillance of overusesyndromes, online systems for athlete self-report of data on pain and othersymptoms have been reported superior to reports from coaches (Shiff 2010). EDCsystems have also been applied for athlete self-report of exposure and injury data inathletics and other individual sports and have been found to be well accepted with agood efficiency (Jacobsson 2013, Clarsen 2013). There are thus reasons forinvestigating EDC system use by both athletes and team medical staff during athleticchampionships.This thesis used a cross-sectional design to collect qualitative data from athletes andteam medical staff using interviews and “think-aloud” usability evaluation methods(Ericsson 1993; Kuusela 2000). It was performed over 3 days during the 2013European Athletics Indoor Championships in Gothenburg, Sweden. Online EDCsystems for collection of data from athletes and team medical staff, respectively,were prepared for the study. The system for use by team medical staff was intendedto collect data on injuries and illnesses sustained during the championship and thesystem for athletes to collect data on risk factors.This study does not provide a solution in how an EDC effort should be implementedduring athletics championships. It does however points towards usability factorsthat needs to be taken into consideration if taking such an approach.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Hussey, Phillip Ryan. „The Evolution of Electronic Surveillance: Balancing National Security and Civil Liberties“. unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-06152007-110824/.

Der volle Inhalt der Quelle
Annotation:
Thesis (honors)--Georgia State University, 2007.
Title from file title page. Robert Howard, thesis advisor. Electronic text (50 p.) : digital, PDF file. Description based on contents viewed Jan 17, 2008. Includes bibliographical references (p. 48-50).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Benson, Etienne Samuel. „The wired wilderness : electronic surveillance and environmental values in wildlife biology“. Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/43219.

Der volle Inhalt der Quelle
Annotation:
Thesis (Ph. D. in History, Anthropology, and Science, Technology and Society (HASTS))--Massachusetts Institute of Technology, Program in Science, Technology and Society, 2006.
Includes bibliographical references.
In the second half of the twentieth century, American wildlife biologists incorporated Cold War-era surveillance technologies into their practices in order to render wild animals and their habitats legible and manageable. One of the most important of these was wildlife radio-tracking, in which collars and tags containing miniature transmitters were used to locate individual animals in the field. In addition to producing new ecological insights, radio-tracking served as a site where relationships among scientists, animals, hunters, animal rights activists, environmentalists, and others involved in wildlife conservation could be embodied and contested. While scholars have tended to interpret surveillance technologies in terms of the extension of human control over nature and society, I show how technological, biological, and ecological factors made such control fragmentary and open to reappropriation. Wildlife radio-tracking created vulnerabilities as well as capabilities; it provided opportunities for connection as well as for control. I begin by showing how biologists in Minnesota and Illinois in the early 1960s used radio-tracking to establish intimate, technologically-mediated, situated relationships with game animals such as ruffed grouse, which they hoped would bolster their authority vis-a-vis recreational hunters. I then show how the technique was contested by environmentalists when biologists applied it to iconic "wilderness wildlife" such as grizzly bears in Yellowstone National Park in the 1960s and 1970s. One way for biologists to render radio-tracking acceptable in the face of such opposition was to emphasize its continuity with traditional practices, as they did in a radio-tagging study of tigers in Nepal in the 1970s.
(cont.) Another way was to shift to less invasive techniques of remote sensing, such as the bioacoustic surveys of bowhead whales off Alaska's Arctic coast that were conducted in the 1980s after a proposal to radio-tag whales was rejected by marine mammalogists and Ifiupiat whalers. Finally, wildlife biologists could reframe radio-tracking as a means for popular connection rather than expert control, as they did by broadcasting the locations of satellite-tagged albatrosses to schoolchildren, gamblers, and the general public via the Internet in the 1990s and early 2000s.
by Etienne Samuel Benson.
Ph.D.in History, Anthropology, and Science, Technology and Society (HASTS
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Michaud, Mario. „Supervision d'une éolienne par Internet“. Thèse, Chicoutimi : Rimouski : Université du Québec à Chicoutimi ; Université du Québec à Rimouski, 2006. http://theses.uqac.ca.

Der volle Inhalt der Quelle
Annotation:
Thèse (M.Eng.) -- Université du Québec à Chicoutimi, programme en extension à l'Université du Québec à Rimouski, 2006.
La p. de t. porte en outre: Mémoire de recherche présenté à l'Université du Québec à Rimouski comme exigence partielle du programme de maîtrise en ingénierie pour l'obtention du grade ès sciences appliquées (M.Sc.A.). CaQCU Bibliogr.: f. [125]. Document électronique également accessible en format PDF. CaQCU
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

McClure, Bruce Davis. „Design of an adaptive computing architecture for managing interactions in heterogeneous defence networks /“. [St. Lucia, Qld.], 2002. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe17146.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Ip, Wai Ho. „Am I being watched on the internet?: examining user perceptions of privacy, stress and self-monitoring under online surveillance“. HKBU Institutional Repository, 2013. https://repository.hkbu.edu.hk/etd_oa/26.

Der volle Inhalt der Quelle
Annotation:
Modes of communication in modern society have become instant and frequent. Internet users usually post ongoing activities and check their friends’ statuses with texts and photos in social networking sites. During information seeking and sharing processes, they enable peer-to-peer surveillance on the Internet. The present research adopts Foucault’s (1977) Panopticon as a metaphor to investigate this new advent of online surveillance. Surveillance from unknown people on the Internet may not always exist, but the perception of being surveilled could be embedded in the users’ mind. This kind of suspicion may generate some surveillance effects such as low self-esteem and communication discouragement, namely panoptic effects without the presence of actual surveillance (Botan, 1996). This study focuses on the negative panoptic effects to Internet users, leading to three hypotheses related to privacy infringement, Internet stress and self-monitoring. An online survey was conducted with 325 respondents aged from 18 to 29. Regression analyses were used to investigate the explanatory power of one’s perception of being surveilled on the outcome variables. The results showed that the respondents with higher level of perceived online surveillance report higher sense of privacy infringement, more situational stress and higher desire of self-monitoring in their online disclosure. With awareness of being surveilled, the respondents realize the information they share online may be exposed to anonymous observers and be prone to storage and dissemination, resulting in privacy infringement. Since online information could be exposed and misused, the respondents feel stressful to share their views and emotions online. They may conduct self-censorship on their online disclosure so as to acquire credits from other Internet users and avoid punishment for improper manner. Implications of these findings are discussed in detail.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Chia, Leigh Stephen. „The novel as panopticon : exploring surveillance“. Thesis, University of Northampton, 2012. http://nectar.northampton.ac.uk/8852/.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Yuk, Shun-cho Jacky, und 郁順祖. „Adaptive video defogging base on background modeling“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/208174.

Der volle Inhalt der Quelle
Annotation:
The performance of intelligent video surveillance systems is always degraded under complicated scenarios, like dynamic changing backgrounds and extremely bad weathers. Dynamic changing backgrounds make the foreground/background segmentation, which is often the first step in vision-based algorithms, become unreliable. Bad weathers, such as foggy scenes, not only degrade the visual quality of the monitoring videos, but also seriously affect the accuracy of the vision-based algorithms. In this thesis, a fast and robust texture-based background modeling technique is first presented for tackling the problem of foreground/background segmentation under dynamic backgrounds. An adaptive multi-modal framework is proposed which uses a novel texture feature known as scale invariant local states (SILS) to model an image pixel. A pattern-less probabilistic measurement (PLPM) is also derived to estimate the probability of a pixel being background from its SILS. Experimental results show that texture-based background modeling is more robust than illumination-based approaches under dynamic backgrounds and lighting changes. Furthermore, the proposed background modeling technique can run much faster than the existing state-of-the-art texture-based method, without sacrificing the output quality. Two fast adaptive defogging techniques, namely 1) foreground decremental preconditioned conjugate gradient (FDPCG), and 2) adaptive guided image filtering are next introduced for removing the foggy effects on video scenes. These two methods allow the estimation of the background transmissions to converge over consecutive video frames, and then background-defog the video sequences using the background transmission map. Results show that foreground/background segmentation can be improved dramatically with such background-defogged video frames. With the reliable foreground/ background segmentation results, the foreground transmissions can then be recovered by the proposed 1) foreground incremental preconditioned conjugate gradient (FIPCG), or 2) on-demand guided image filtering. Experimental results show that the proposed methods can effectively improve the visual quality of surveillance videos under heavy fog and bad weathers. Comparing with state-of-the-art image defogging methods, the proposed methods are shown to be much more efficient.
published_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Leite, A. „Near real-time vaccine safety surveillance using United Kingdom electronic health records“. Thesis, London School of Hygiene and Tropical Medicine (University of London), 2018. http://researchonline.lshtm.ac.uk/4649039/.

Der volle Inhalt der Quelle
Annotation:
This thesis describes the feasibility of implementing a near real-time vaccine safety surveillance system (NRTVSS) using data from the Clinical Practice Research Datalink (CPRD), a United Kingdom (UK) research-level primary care database. NRTVSS is one method in the vaccine safety post-licensure toolkit, used since 2005. To understand how NRTVSS has been applied I conducted a systematic review of studies using NRTVSS. I identified 31 systems, mainly in the USA. Several sequential tests were in use, most commonly the Poisson-based maximized sequential probability ratio test (PMaxSPRT, 44%) and its binomial version (BMaxSPRT, 24%). Only 75% of studies addressed confounding, mainly by adjusting the expected rate. Delays in data availability may hinder the feasibility of implementing a system; some studies delayed the analysis, whilst others adjusted for delays and partially accrued periods. In CPRD, delays in recording outcomes are particularly relevant. Hence, I assessed those delays for selected outcomes of interest for vaccine safety (Bell’s palsy, Guillain-Barré syndrome (GBS), optic neuritis, and febrile seizures (FS)) by comparing the deemed date of diagnosis to the date the event was recorded in the system. Three-quarters of the records accrued during the first month, considered as sufficient to implement NRTVSS. I thus trialled the implementation of a system using previously collected CPRD data, for seasonal influenza/GBS and measles-mumps-rubella/FS. This included power calculations for detecting a signal. I used PMaxSPRT for both vaccine/outcome pairs and BMaxSPRT for measles-mumps-rubella/FS. Both tests were adjusted for delays in recording outcomes, based on the previous analysis. It was possible to implement a system, but power was < 80% to detect less than a four-fold increase in the risk of GBS following influenza vaccine. For this pair, I re-evaluated power after removing delays in data availability, with no significant improvement. This work establishes the foundation of a NRTVSS using CPRD for potential application in the UK. Future research could assess further vaccine/outcome pairs and explore the use of other statistical tests. Overall, this project contributes to UK vaccine pharmacovigilance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Li, Gang. „A Holistic Study on Electronic and Visual Signal Integration for Efficient Surveillance“. The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1492639972377528.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Li, Mo. „Building sensor network surveillance systems : on the applicability /“. View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20LIMO.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Yeung, Alex Tak Lok. „A competitive analysis of digital video surveillance products' manufacturers in Asia Pacific region“. access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?msc-meem-b1991300xa.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.Sc.)--City University of Hong Kong, 2005.
Title from title screen (viewed on Jan. 10, 2006) "A dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering Management." Includes bibliographical references.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Ulkemen, Sinan Bland Robert L. „The impact of surveillance technology on the behaviors of municipal police departments“. [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12209.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Bras, Johan J. „A simulation of the single scan accuracy of a two-dimensional pulsed surveillance radar“. Master's thesis, University of Cape Town, 1991. http://hdl.handle.net/11427/8460.

Der volle Inhalt der Quelle
Annotation:
Bibliography: leaves 194-198.
The following dissertation considers the single-scan two-dimensional positional accuracy of a pulsed surveillance radar. The theoretical aspects to the positional accuracy are considered and a generalized analytical approach is presented. Practical position estimators are often complex, and theoretical predictions of their performance generally yield unfriendly mathematical equations. In order to evaluate the performance of these estimators, a simulation method is described based on replicating the received video signal. The accuracy of such a simulation is determined largely by the accuracy of the models applied, and these are considered in detail. Different azimuth estimation techniques are described, and their performances are evaluated with the aid of the signal simulation. The best azimuth accuracy performance is obtained with the class of analogue processing estimators, but they are found to be more susceptible to interference than their binary processing counterparts. The class of binary processing estimators offer easily implemented techniques which are relatively insensitive to radar cross-section scintillation characteristics. A hybrid estimator, using both analogue and binary processing, is also evaluated and found to give an improved accuracy performance over the binary processing method while still maintaining the relative insensitivity to radar cross-section fluctuation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Davis, Stephen. „Radio frequency tagging in the retail industry“. Thesis, University of the West of England, Bristol, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.262824.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Kumar, B. G. Vijay. „Supervised dictionary learning for action recognition and localization“. Thesis, Queen Mary, University of London, 2012. http://qmro.qmul.ac.uk/xmlui/handle/123456789/8780.

Der volle Inhalt der Quelle
Annotation:
Image sequences with humans and human activities are everywhere. With the amount of produced and distributed data increasing at an unprecedented rate, there has been a lot of interest in building systems that can understand and interpret the visual data, and in particular detect and recognise human actions. Dictionary based approaches learn a dictionary from descriptors extracted from the videos in the first stage and a classifier or a detector in the second stage. The major drawback of such an approach is that the dictionary is learned in an unsupervised manner without considering the task (classification or detection) that follows it. In this work we develop task dependent(supervised) dictionaries for action recognition and localization, i.e., dictionaries that are best suited for the subsequent task. In the first part of the work, we propose a supervised max-margin framework for linear and non-linear Non-Negative Matrix Factorization (NMF). To achieve this, we impose max-margin constraints within the formulation of NMF and simultaneously solve for the classifier and the dictionary. The dictionary (basis matrix) thus obtained maximizes the margin of the classifier in the low dimensional space (in the linear case) or in the high dimensional feature space (in the non-linear case). In the second part the work, we develop methodologies for action localization. We first propose a dictionary weighting approach where we learn local and global weights for the dictionary by considering the localization information of the training sequences. We next extend this approach to learn a task-dependent dictionary for action localization that incorporates the localization information of the training sequences into dictionary learning. The results on publicly available datasets show that the performance of the system is improved by using the supervised information while learning dictionary.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Thompson, Graham William. „Surveillance and male sexuality : the rhetoric of the office in American literature“. Thesis, Nottingham Trent University, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310851.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Andersen, Evan D. „A surveillance system to create and distribute geo-referenced mosaics from SUAV video /“. Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2416.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Ishikawa, Shoichiro. „Electronic surveillance and the police : a comparative study of the Canadian and Japanese systems“. Thesis, University of British Columbia, 1986. http://hdl.handle.net/2429/26140.

Der volle Inhalt der Quelle
Annotation:
"Electronic Surveillance", the mechanical technique to monitor private communications of the suspect is one of the most powerful weapons of the police in modern crime-prevailing societies. In Canada the attempt to set up a legal framework to balance the police need for electronic surveillance against the citizen's right to privacy resulted in the Protection of Privacy Act proclaimed on June 30, 1974. In Japan, in contrast, with no specific legislation governing electronic surveillance, the police refrain from resorting to this enchanting method of criminal investigation. The purpose of this study is to propose a desirable electronic surveillance law in Japan, taking advantage of the Canadian precedent in this field. The introductory portion of this study focuses on the concept of privacy in the West and Japan. Despite the vast difference in traditional privacy consciousness between Canada and Japan, privacy has been recognized as a legally protected interest in both countries. In the first half of the main portion, the study analyzes the Canadian electronic surveillance legislation from the standpoint of the police. While providing the most powerful investigative tool, the law also has had a negative impact upon the Canadian police in that it brought about undue interference, judicial or otherwise, in the operation of criminal investigation. In the last half of the main portion, the study deals with the Japanese system for electronic surveillance. The conclusion reached is that the Canadian legislative precedent can, with some necessary modification, be an appropriate model for Japan, and that Japan should introduce an electronic surveillance system with less intrusive power than in Canada while preserving the traditional independent authority of the police in criminal investigation.
Law, Peter A. Allard School of
Graduate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Reilly, Simon Mark. „The use of electronic surveillance and performance measures in the workplace : a qualitative investigation“. Thesis, Durham University, 2010. http://etheses.dur.ac.uk/429/.

Der volle Inhalt der Quelle
Annotation:
Electronic workplace surveillance takes many forms. It includes CCTV, recording telephone conversations, employee ID cards, and electronically gathering and measuring work performance. The increased incidences of electronic surveillance have had a number of effects on employees. This research concentrated on the use of quantified electronic performance measurement. It specifically examined the impact on managers and managing. It examined surveillance from an employment relationship perspective, taking as its primary lens that of exchange and exchange theory. The research demonstrated that the exchange relationships managers have with other managers, workers, or employers, as part of the psychological contract, is being compromised. Managers feel under pressure to manage based on the surfeit of electronic measures rather than by using innate or acquired management skills. Many managers in this research are no longer managers in the conventional sense; instead, they have become “Performance Intermediary Executives” invariably reliant on a plethora of electronic measures provided for them to help them manage successfully. Managers have also started questioning the equitable nature of the psychological contract between them and their employer/line manager. The result of this equity disjuncture was made manifest by the subtle forms of resistance used on a daily basis. Managers are being led down a managerial path leading to further resistance and inequitable employment and exchange relationships. This research suggests that claimed improvements in performance and performance management using electronic surveillance could be wiped out by poor and de-professionalised management. Organisations should be aware that surveillance for surveillance sake is not necessarily always the best way forward. Electronic workplace surveillance is not intrinsically all good or all bad, but judging from the findings in this research, its impact is broadly perceived by managers negatively, which is not good for all parties in the employment relationship.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Edwards, Floyd. „U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act“. ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4617.

Der volle Inhalt der Quelle
Annotation:
Since the implementation of the USA Patriot Act in October 2001, public trust in the U.S. federal government to protect individuals' right to privacy has been affected negatively. Many studies have addressed this topic, but few have delved deeply into the reasons behind the distrust. The purposes of this qualitative study were, to explore the perceptions and attitudes of U.S. citizens regarding the effect of the USA Patriot Act on their right to privacy, to determine whether a loss of trust in the government occurred, and to identify the factors contributing to the lack of trust. The theoretical foundation for this study was Rawl's Social Perspective of Public Trust, Sax's Augmentation of Social Contract Theory, and Ajzen's Theory of Planned Behavior. The central research question pertained to the views of U.S. citizens about the federal government's use of electronic surveillance to monitor their communication without their knowledge. A generic qualitative study design was employed using purposeful, semi-structured interviews of 20 purposely sampled adult male and female U.S. citizens. Data from the interviews were coded and categorized for thematic analysis. When confronted with the lesser known specifics of the electronic surveillance provision of the USA Patriot Act, participants were more likely to reject the government interference as an invasion of privacy. This study can provide guidance for the democratic basis of policymaking designed to protect U.S. citizens. The implication for social change includes providing information to policymakers of both the US and organizations of various sizes regarding the polarized views and lack of trust pertaining to electronic surveillance among U.S. public. This information can be used to implement program or campaign to foster trust.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Bossio, Jorge, und Fabiola Gutierrez. „Rights versus crime: twenty years of wiretapping and digital surveillance in Peru“. Association for Progressive Communications (APC) and Humanist Institute for Cooperation with Developing Countries (Hivos), 2014. http://hdl.handle.net/10757/599314.

Der volle Inhalt der Quelle
Annotation:
The systematic monitoring of citizens by the state in Peru was revealed in 2000, after the collapse of the second administration of ex-president Alberto Fujimori (1995-2000). Fujimori resigned in his last year in office, after a network of government espionage and corruption was revealed. This included video recordings of secret meetings and alleged communications surveillance conducted and managed by presidential advisor Vladimiro Montesinos, working with the National Intelligence Service (SIN). This systematic surveillance by the state resulted in the dissemination of private information, recordings and videos of public officials, journalists and many other influential people. These events sparked the beginning of the debate around the purpose of surveillance in Peru, and the violation of the right to private communications by state agencies and private entities – and what legislation could be developed to regulate this. This discussion is ongoing, with more cases of communications interception being revealed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Fu, Xiao. „Linking electronic health records with the biomedical literature“. Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/linking-electronic-health-records-with-the-biomedical-literature(4e7cd7f7-8fbf-4a81-a99d-cf0723175603).html.

Der volle Inhalt der Quelle
Annotation:
Clinical records and biomedical literature, which have grown exponentially in recent years, are important for clinicians to provide personalised treatments and for individual patients to understand their health conditions well. However, essential information is often expressed in natural language. Those expressions in biomedical and clinical domains are distinct, making their processing a daunting task for automated systems. This thesis is the first comprehensive study focussing on concept extraction and multi-level normalisation across biomedical and clinical domains. In this research, we describe our work on 1) developing machine learning-based methods to recognise phenotypic concepts from biomedical and clinical articles; 2) analysing the semantic, syntactic, morphological and lexical characteristics of concepts in these two heterogeneous domains and based on this analysis, 3) proposing a normalisation method for linking phenotypic mentions from clinical records and biomedical literature to terminology standards.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Chen, Zhuo, und 陈卓. „A methodology for trajectory based learning and prediction of human motions in visual surveillance“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47145985.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Zhu, Junda. „Exploiting Constraints for Effective Visual Tracking in Surveillance Applications“. The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1331138092.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Ambardekar, Amol A. „Efficient vehicle tracking and classification for an automated traffic surveillance system“. abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1451111.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Hou, Yali, und 侯亚丽. „Video-based people counting and crowd segmentation“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47032339.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Dean, Andrew. „'Intelligent' strips for tagging articles including their dispensing methods“. Thesis, University of Warwick, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.340474.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Scott, Jessica. „Perceived Barriers to the use of Electronic Health Records for Infectious Disease Surveillance in Canada“. Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32000.

Der volle Inhalt der Quelle
Annotation:
This thesis examines the potential interface that exists between health information, specifically electronic health record (EHR) systems, and notifiable disease surveillance in Canada. It aims to highlight the benefits and barriers experienced by the current national notifiable disease surveillance strategy, as well as to highlight the successes and roadblocks to the successful implementation and adoption of EHR technologies in Canada. Qualitative methodologies, which include the 16 semi-structured interviews conducted with four key stakeholder groups, including public health experts, physicians, health administrators and academics that are concerned with EHR adoption and public health were used to obtain data. Data from interviews was analysed using grounded theory methodology and then verified using member checking and other data validation methods. Emergent themes from obtained data indicated that there is a large potential for the improvement of the current notifiable disease through the use of EHR technologies: however, the barriers currently faced by both the notifiable disease surveillance system and the state of implementation and adoption of EHR technologies prevent this from occurring. These barriers include political, financial, human, security/privacy, and technology barriers. Differences between stakeholder groups were explored, and potential solutions and insights into existing barriers were provided. The information gained from this study provides insight into the efficiency of the current infectious disease surveillance system and the progress of and need for the implementation of EHRs nationwide. In addition, the results of this study provide stakeholders with a deeper understanding of the barriers facing the use of EHR technologies for infectious disease surveillance and provide a starting place to address these issues. The results of this study can help to inform policy regarding public health surveillance and EHR implementation and adoption.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Savadatti-Kamath, Sanmati S. „Video analysis and compression for surveillance applications“. Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26602.

Der volle Inhalt der Quelle
Annotation:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Dr. J. R. Jackson; Committee Member: Dr. D. Scott; Committee Member: Dr. D. V. Anderson; Committee Member: Dr. P. Vela; Committee Member: Dr. R. Mersereau. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Muir, Lorna. „Between discipline and control : cinematic engagements with contemporary transformations in the surveillance society“. Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=186203.

Der volle Inhalt der Quelle
Annotation:
This thesis examines how cinema engages with changing surveillance practices, and the hypothesised paradigm shift from discipline to control. The first part of the thesis outlines those changes in terms of three crucial areas in any discussion of surveillance – the organisation of the body, space and time. Since its publication in the 1970s, Michel Foucault’s Discipline and Punish has been a continuous influence on much social theory. However, recent developments in surveillance practices suggest that the Foucauldian model of discipline may no longer be the most appropriate theoretical framework within which to discuss contemporary modes of surveillance. In Postscript on Control Societies, written in 1990, Gilles Deleuze offers a possible new paradigm (the control society) through which to explore emerging trends in surveillance practices, often linked to the increasing use of digital technologies. While the paradigm of control does not simply replace that of discipline, it does help us to understand the development and amelioration of disciplinary structures. The second part of the thesis offers an original perspective on ongoing debates in surveillance studies concerning discipline and control, by investigating how this shift is articulated and reflected upon in a diverse range of films (from mainstream productions such as Enemy of the State to avant-garde ‘essays’ such as Harun Farocki’s Ich glaubte Gefangene zu sehen) which explicitly engage with changes in surveillance practice. It focuses specifically on the cinematic representation of the body, space and time in the context of the hypothesised transition from discipline to control, and addresses a series of important questions for cinema’s engagement with surveillance: can cinema, with its reliance on the visual image, address the emerging surveillance society which is increasingly invisible and, if so, what strategies does cinema use to achieve this; and, what is the implication of such strategies for the cinematic spectator? In conclusion, the thesis reflects on how cinema shapes our understanding of the emerging surveillance society.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Wilson, Kevin G. 1952. „The social significance of home networking : public surveillance and social management“. Thesis, McGill University, 1985. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=72035.

Der volle Inhalt der Quelle
Annotation:
This thesis analyzes the social significance of the integration of the home into computer networks. The social significance of home networking is grasped when these systems are understood in their relationship to emerging forms of electronic social control. The thesis establishes this connection through an analysis of structural trends in the videotex industry which demonstrates the value to the corporate sector of cybernetic information generated by interactive systems. The North American tradition of privacy policy is reviewed and demonstrated as inadequate for the protection of personal privacy in home networking. It is further shown that privacy policy does not represent an adequate theorization of social control in computer networking, since it does not account for practices of aggregate social control, which have been termed in the thesis "social management," so vital to the cybernetic economy of late capitalism. Finally, the thesis argues that current conceptual frameworks and policy mechanisms cannot assure the socially beneficial development of home networking, given the tendency towards the integration of such systems into structures of social control.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Yamashita, Miyo. „Electronic surveillance and the prospects for privacy in Canada's private sector by the year 2000“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0020/NQ44634.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Tuli, Gaurav. „Modeling and Twitter-based Surveillance of Smoking Contagion“. Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/64426.

Der volle Inhalt der Quelle
Annotation:
Nicotine, in the form of cigarette smoking, chewing tobacco, and most recently as vapor smoking, is one of the most heavily used addictive drugs in the world. Since smoking imposes a significant health-care and economic burden on the population, there have been sustained and significant efforts for the past several decades to control it. However, smoking epidemic is a complex and "policy-resistant" problem that has proven difficult to control. Despite the known importance of social networks in the smoking epidemic, there has been no network-centric intervention available for controlling the smoking epidemic yet. The long-term goal of this work is the development and implementation of an environment needed for developing network-centric interventions for controlling the smoking contagion. In order to develop such an environment we essentially need: an operationalized model of smoking that can be simulated, to determine the role of online social networks on smoking behavior, and actual methods to perform network-centric interventions. The objective of this thesis is to take first steps in all these categories. We perform Twitter-based surveillance of smoking-related tweets, and use mathematical modeling and simulation techniques to achieve our objective. Specifically, we use Twitter data to infer sentiments on smoking and electronic cigarettes, to estimate the proportion of user population that gets exposed to smoking-related messaging that is underage, and to identify statistically anomalous clusters of counties where people discuss about electronic cigarette a lot more than expected. In other work, we employ mathematical modeling and simulation approach to study how different factors such as addictiveness and peer-influence together contribute to smoking behavior diffusion, and also develop two methods to stymie social contagion. This lead to a total of four smoking contagion-related studies. These studies are just a first step towards the development of a network-centric intervention environment for controlling smoking contagion, and also to show that such an environment is realizable.
Ph. D.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Nestel, Thomas J. „Using surveillance camera systems to monitor public domains can abuse be prevented? /“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FNestel.pdf.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): David Brannan. "March 2006." Includes bibliographical references (p. 77-80). Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Urbonaitė, Milda. „Asmens privatumas elektroninėje darbo vietoje: teisiniai aspektai“. Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061214_175318-90958.

Der volle Inhalt der Quelle
Annotation:
Substantial technology developments over the past two decades have dramatically transformed today’s workplaces. It became easier to perform work functions. However, these changes made employers to think about productive and effective working time usage in the electronic working place. Companies began to use electronic surveillance. The appliance of this equipment determined the appearance of legal problems. Hence the usage of control technologies brings the conflict among the interests of employer and employee. There arises necessity to decide to whose interests to give the preference. There is offered to seek the balance of the interests in order to retain the confidence and trustworthy atmosphere in the workplace. In fact, this is achieved when the fundamental data protection principles – legitimacy, transparency, proportionality and security – are being applied. The legal regulation of USA and European Union differently estimates the problem of the privacy in the electronic working place. The United States inclined to give the preference to business interests because employer posses the electronic equipment. Besides here the employer can use the provider exception. This shows that the employee in the United States can have no reasonable expectation of privacy in the electronic working place. However, in Europe the electronic surveillance is morally illegal and infringes the constitutional right of privacy. European Union values the data protection principles and the... [to full text]
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Conniry, Krystal Lynn. „National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare“. PDXScholar, 2016. http://pdxscholar.library.pdx.edu/open_access_etds/3204.

Der volle Inhalt der Quelle
Annotation:
This paper explores the complex relationship between securing the rights of citizens to privacy and national security priorities under conditions of government mass surveillance. The inquiry examines the conflict between those who support and those who stand in opposition of government surveillance, and is framed around the question of whether changes in technology and the concept of nationalism help inform our understanding of the increase in surveillance post-9/11. From a peace and conflict studies perspective, the work analyzes how the rise of nationalism in the post-9/11 era and the protracted wars against terrorism, in combination with the growth of technological power, have impacted the relationship between state-surveillance and democracy. Findings identify protracted warfare, technology and corporate profits as conflict drivers within the surveillance system, which gives rise to moral dilemmas and structural polarizations in the political culture and institutions of the state and society. The analysis concludes that these dilemmas systematically create an imbalance of power between the citizen to the state, and cannot be fully addressed unless the efficacy of war is critically questioned.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Fahey, Rebecca Lee. „Evaluation of the System Attributes of Timeliness and Completeness of the West Virginia Electronic Disease Surveillance System' NationalEDSS Based System“. ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1341.

Der volle Inhalt der Quelle
Annotation:
Despite technological advances in public health informatics, the evaluation of infectious disease surveillance systems data remains incomplete. In this study, a thorough evaluation was performed of the West Virginia Electronic Disease Surveillance System (WVEDSS, 2007-2010) and the West Virginia Electronic Disease Surveillance System NationalEDSS -Based System (WVEDSS-NBS; March 2012 - March 2014) for Category II infectious diseases in West Virginia. The purpose was to identify key areas in the surveillance system process from disease diagnosis to disease prevention that need improvement. Grounded in the diffusion of innovation theory, a quasi-experimental, interrupted, time-series design was used to evaluate the 2 data sets. Research questions examined differences in mean reporting time, the 24-hour standard, and comparison of complete fields (DOB, gender etc.) of the data sets using independent samples t tests. The study found (a) that the mean reporting times were shorter for WVEDSS compared to WVEDSS-NBS (p < .05) for all vaccine-preventable infectious diseases (VPID) in Category II except for mumps; (b) that the 24-hour standard was not met for WVEDSS compared to WVEDSS-NBS (p < .05) for all VPID in Category II except for mumps, and (c) that most fields were complete for WVEDSS compared to WVEDSS-NBS (p < .05) for all VPID in Category II except for meningococcal disease. Healthcare professionals in the state can use the results of this research to improve the system attributes of timeliness and completeness. Implications for positive social change included improved access to public health data to better understand health disparities, which, in turn could reduce morbidity and mortality within the population.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Shashidhara, Shilpa. „Resident Rights and Electronic Monitoring“. Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc31546/.

Der volle Inhalt der Quelle
Annotation:
The purpose of this exploratory study was to examine resident, family member and staff perceptions of electronic monitoring and their effect on resident rights. The sample consisted of 53 nursing home residents, 104 staff and 25 family members, in the Dallas Fort Worth metroplex, from a nursing facility in which residents utilize video cameras in their rooms (Nursing Facility 1), two nursing facilities that have video cameras in their common rooms areas (Nursing Facility 2 and 3) and a nursing facility that does not utilize video cameras (Nursing Facility 4). The interview questions and self-administered surveys were in regard to the participant's perceptions of electronic monitoring, perceived risks and benefits of video cameras, awareness of resident rights and consciousness of potential risks to resident rights. Data were analyzed using a mixed methods approach using both ATLAS t.i and SAS. Study findings revealed that residents, family members and staff are aware of the potential benefits of electronic monitoring in nursing facilities. While respondents are hesitant to have electronic monitoring in resident rooms, they are interested in utilizing electronic monitoring in common areas. While residents and staff believe that electronic monitoring compromises resident rights, family members believe resident rights are protected. Different types of staff have different perceptions of electronic monitoring. Those staff members that are more directly involved in resident care are less accepting of electronic monitoring compared to staff that have episodic visits with residents. Among staff members, nursing facilities with prior experience with electronic monitoring are less accepting of electronic monitoring. Further studies are needed to enhance this research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

King, Carina. „Can routinely collected electronic health data be used to develop novel healthcare associated infection surveillance tools?“ Thesis, Imperial College London, 2013. http://hdl.handle.net/10044/1/17759.

Der volle Inhalt der Quelle
Annotation:
Background: Healthcare associated infections (HCAI) pose a significant burden to health systems both within the UK and internationally. Surveillance is an essential component to any infection control programme, however traditional surveillance systems are time consuming and costly. Large amounts of electronic routine data are collected within the English NHS, yet these are not currently exploited for HCAI surveillance. Aim: To investigate whether routinely collected electronic hospital data can be exploited for HCAI surveillance within the NHS. Methods: This thesis made use of local linked electronic health data from Imperial College Healthcare NHS Trust, including information on patient admissions, discharges, diagnoses, procedures, laboratory tests, diagnostic imaging requests and traditional infection surveillance data. To establish the evidence base on surveillance and risks of HCAI, two literature reviews were carried out. Based on these, three types of innovative surveillance tools were generated and assessed for their utility and applicability. Results: The key findings were firstly the emerging importance of automated and syndromic surveillance in infection surveillance, but the lack of investigation and application of these tools within the NHS. Syndromic surveillance of surgical site infections was successful in coronary artery bypass graft patients; however it was an inappropriate methodology for caesarean section patients. Automated case detection of healthcare associated urinary tract infections, based on electronic microbiology data, demonstrated similar rates of infection to those recorded during a point prevalence survey. Routine administrative data demonstrated mixed utility in the creation of simplified risk scores or infection, with poorly performing risk models of surgical site infections but reasonable model fit for HCA UTI. Conclusion: Whilst in principle routine administrative data can be used to generate novel surveillance tools for healthcare associated infections; in reality it is not yet practical within the IT infrastructure of the NHS.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Kim, Kamyoung. „Spatial analytical approaches for supporting security monitoring“. Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1186593136.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie