Academic literature on the topic 'Electronic surveillance in literature'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic surveillance in literature.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic surveillance in literature"

1

Carr, C. J. "Electronic Surveillance of the Pharmacology-Toxicology Literature." Regulatory Toxicology and Pharmacology 21, no. 2 (April 1995): 207. http://dx.doi.org/10.1006/rtph.1995.1028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

NELLIS, MIKE. "SURVEILLANCE, REHABILITATION, AND ELECTRONIC MONITORING: GETTING THE ISSUES CLEAR." Criminology Public Policy 5, no. 1 (February 2006): 103–8. http://dx.doi.org/10.1111/j.1745-9133.2006.00104.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Aliabadi, Ali, Abbas Sheikhtaheri, and Hossein Ansari. "Electronic health record–based disease surveillance systems: A systematic literature review on challenges and solutions." Journal of the American Medical Informatics Association 27, no. 12 (September 14, 2020): 1977–86. http://dx.doi.org/10.1093/jamia/ocaa186.

Full text
Abstract:
Abstract Objective Disease surveillance systems are expanding using electronic health records (EHRs). However, there are many challenges in this regard. In the present study, the solutions and challenges of implementing EHR-based disease surveillance systems (EHR-DS) have been reviewed. Materials and Methods We searched the related keywords in ProQuest, PubMed, Web of Science, Cochrane Library, Embase, and Scopus. Then, we assessed and selected articles using the inclusion and exclusion criteria and, finally, classified the identified solutions and challenges. Results Finally, 50 studies were included, and 52 unique solutions and 47 challenges were organized into 6 main themes (policy and regulatory, technical, management, standardization, financial, and data quality). The results indicate that due to the multifaceted nature of the challenges, the implementation of EHR-DS is not low cost and easy to implement and requires a variety of interventions. On the one hand, the most common challenges include the need to invest significant time and resources; the poor data quality in EHRs; difficulty in analyzing, cleaning, and accessing unstructured data; data privacy and security; and the lack of interoperability standards. On the other hand, the most common solutions are the use of natural language processing and machine learning algorithms for unstructured data; the use of appropriate technical solutions for data retrieval, extraction, identification, and visualization; the collaboration of health and clinical departments to access data; standardizing EHR content for public health; and using a unique health identifier for individuals. Conclusions EHR systems have an important role in modernizing disease surveillance systems. However, there are many problems and challenges facing the development and implementation of EHR-DS that need to be appropriately addressed.
APA, Harvard, Vancouver, ISO, and other styles
4

Cosmides, G. J. "Electronic Surveillance of the Pharmacology-Toxicology Literature: The Need for Controlled Vocabularies and Registry Systems." Regulatory Toxicology and Pharmacology 21, no. 2 (April 1995): 208–10. http://dx.doi.org/10.1006/rtph.1995.1029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boulanger, Virginie, Étienne Poirier, Anne MacLaurin, and Caroline Quach. "Divergences between healthcare-associated infection administrative data and active surveillance data in Canada." Canada Communicable Disease Report 48, no. 1 (January 26, 2022): 4–16. http://dx.doi.org/10.14745/ccdr.v48i01a02.

Full text
Abstract:
Background: Although Canada has both a national active surveillance system and administrative data for the passive surveillance of healthcare-associated infections (HAI), both have identified strengths and weaknesses in their data collection and reporting. Active and passive surveillance work independently, resulting in results that diverge at times. To understand the divergences between administrative health data and active surveillance data, a scoping review was performed. Method: Medline, Embase and Cumulative Index to Nursing and Allied Health Literature along with grey literature were searched for studies in English and French that evaluated the use of administrative data, alone or in comparison with traditional surveillance, in Canada between 1995 and November 2, 2020. After extracting relevant information from selected articles, a descriptive summary of findings was provided with suggestions for the improvement of surveillance systems to optimize the overall data quality. Results: Sixteen articles met the inclusion criteria, including twelve observational studies and four systematic reviews. Studies showed that using a single source of administrative data was not accurate for HAI surveillance when compared with traditional active surveillance; however, combining different sources of data or combining administrative with active surveillance data improved accuracy. Electronic surveillance systems can also enhance surveillance by improving the ability to detect potential HAIs. Conclusion: Although active surveillance of HAIs produced the most accurate results and remains the gold-standard, the integration between active and passive surveillance data can be optimized. Administrative data can be used to enhance traditional active surveillance. Future studies are needed to evaluate the feasibility and benefits of potential solutions presented for the use of administrative data for HAI surveillance and reporting in Canada.
APA, Harvard, Vancouver, ISO, and other styles
6

Carpenter, Christine. "Privacy and Proportionality: Examining Mass Electronic Surveillance under Article 8 and the Fourth Amendment." International and Comparative Law Review 20, no. 1 (June 1, 2020): 27–57. http://dx.doi.org/10.2478/iclr-2020-0002.

Full text
Abstract:
Summary An individual citizen’s right to privacy has found extensive protection in the modern democratic state. However, with the increase of technological innovation and new kinds of threats, democratic states must grapple with balancing a problem that can never be wholly solved—governments seeking to create the optimal degree of security inevitably conflicts with citizens’ optimal degree of privacy. This article examines one vehicle through which governments have prioritized national security at the expense of individual privacy: mass electronic surveillance. Employing the case study method, this article compares three cases where mass electronic surveillance measures were challenged before the European Court of Human Rights under Article 8 against four cases where such measures were challenged in the U.S. judicial system under the Fourth Amendment. This article seeks to determine how the treatment of privacy infringements created by mass electronic surveillance differs when examined in these two different privacy regimes. I argue the Strasbourg Court’s use of what is known in the literature as the “proportionality analysis” provoked by Article 8(2) allows for more substantial protections of privacy rights in Europe than under the Fourth Amendment in the U.S..
APA, Harvard, Vancouver, ISO, and other styles
7

Nishnianidze, Anri. "Surveillance in the Digital Age." European Scientific Journal, ESJ 20, no. 37 (February 20, 2024): 1. http://dx.doi.org/10.19044/esj.2024.v20n37p1.

Full text
Abstract:
Purpose: As technology advances, electronic devices have become ubiquitous among individuals of all backgrounds. From mobile phones to computing devices, people rely on these tools on a daily basis for both personal and professional purposes. The presented research seeks to investigate the extent to which individuals are being monitored in the digital realm and identify solutions to safeguard citizens from the threat of mass surveillance. Findings: In the modern era, it is common for people to utilize various devices for a multitude of purposes, such as search engines and social networks. However, many are unaware that the information they share online is not always erased from cyberspace. This study aims to shed light on how this data is obtained and utilized and the potential risks humanity faces if privacy is not safeguarded in the digital age. Research limitations/implications: The objective of this research is to thoroughly examine the current scientific literature, studies, and articles regarding the perils of surveillance in the digital era. The paper aims to highlight the challenges associated with combating surveillance. In the concluding section of the analysis, a concise set of recommendations will be provided, which are crucial to uphold in order to safeguard individuals' constitutional rights in the face of the potential ramifications of streamlined surveillance. Originality/value: In today's digital age, it has become almost universal for people to communicate through electronic devices in cyberspace, whether for work or personal purposes. Unfortunately, this environment is often not secure, and automated surveillance models can be used to acquire people's data without their knowledge or consent. This raises serious concerns about privacy and the protection of fundamental human rights. That is why it is essential to conduct research that sheds light on the means of surveillance and explores ways to fight against it.
APA, Harvard, Vancouver, ISO, and other styles
8

Rose, G. W., V. R. Roth, K. N. Suh, M. Taljaard, C. Van Walraven, and A. J. Forster. "USE OF AN ELECTRONIC DATA WAREHOUSE TO ENHANCE CARDIAC SURGICAL SITE SURVEILLANCE AT A LARGE CANADIAN CENTRE." Clinical & Investigative Medicine 31, no. 4 (August 1, 2008): 21. http://dx.doi.org/10.25011/cim.v31i4.4824.

Full text
Abstract:
Background/Purpose: Surgical site infection surveillance to determineincidence is a key infection control activity. Case detection is labour-intensive, therefore most infection control programs use manual or simple electronic mechanisms to “trigger” chart review. However, such “trigger” mechanisms are also labour-intensive, and often of poor specificity. Our objective is to develop a complex trigger mechanism using data from an electronic data warehouse, to improve specificity of surveillance of surgical site infection compared to current trigger mechanisms. Methods: We will derive an electronic trigger tool for cardiac surgical site infection surveillance using a nested case-control design, among a cohort of all patients undergoing coronary artery bypass grafting, cardiac valve repairor replacement, or heart transplant at the University of Ottawa Heart Institute, from July 1 2004 to June 30 2007. We will perform a systematic literature review to identify potential trigger factors to include in the model, then construct the trigger tool by backwards stepwise logistic regression. The best-fit model will be used to calculate the probability of surgical site infection. We will select the threshold probability to use in surveillance by visual inspection of receiver-operator-characteristic curves. The accuracy of this electronic trigger mechanism will be compared to pre-existing manual and simple electronic mechanisms using relative true positive ratios and relative false positive ratios. Results/Conclusions: We have selected 200 cases of surgical site infection and 541 controls from among 3744 procedures performed during the study period. As of the date ofthis abstract we are still undertaking the systematic review.
APA, Harvard, Vancouver, ISO, and other styles
9

Back, Luani, Joao Luiz Kovaleski, and Pedro Paulo Andrade Junior. "Technological Surveillance As A Tool For Information Management: A Literature Review." IEEE Latin America Transactions 13, no. 10 (October 2015): 3505–10. http://dx.doi.org/10.1109/tla.2015.7387261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Vermeer, Yvette, Paul Higgs, and Georgina Charlesworth. "What do we require from surveillance technology? A review of the needs of people with dementia and informal caregivers." Journal of Rehabilitation and Assistive Technologies Engineering 6 (January 2019): 205566831986951. http://dx.doi.org/10.1177/2055668319869517.

Full text
Abstract:
Introduction Dementia has become a major global concern and surveillance technology might provide support for informal caregivers and people with dementia. However, the needs of caregivers and people with dementia for surveillance technology have not been reviewed. Method A scoping literature review was used to identify the needs of caregivers and/or people with dementia towards surveillance technology. Electronic database searching was undertaken on LexisNexis, PubMed, Scopus, EMBASE, MEDLINE, Cumulative Index to Nursing, Allied Health Literature, PsycINFO, Web of Science, Assistive Technology database, and Google Scholar. Eligible studies were synthesized by theme. Results Twenty-eight eligible studies were identified, with the majority reporting the needs of caregivers rather than people with dementia. The predominant themes for caregivers were location accuracy, and increasing the safety of the person with dementia. People with dementia wanted simple useful technology that fits within their capacity and existing routines. Conclusions The needs of people with dementia must be considered when designing surveillance products. Studies have mostly focused on caregivers and discount ST product requirements. Further work is required to establish effective use of surveillance technology in dementia care. Therefore, further research should cross analyze these results by examining both the needs of caregivers, and people with dementia.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Electronic surveillance in literature"

1

Akram, Muhammad. "Surveillance centric coding." Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/2320.

Full text
Abstract:
The research work presented in this thesis focuses on the development of techniques specific to surveillance videos for efficient video compression with higher processing speed. The Scalable Video Coding (SVC) techniques are explored to achieve higher compression efficiency. The framework of SVC is modified to support Surveillance Centric Coding (SCC). Motion estimation techniques specific to surveillance videos are proposed in order to speed up the compression process of the SCC. The main contributions of the research work presented in this thesis are divided into two groups (i) Efficient Compression and (ii) Efficient Motion Estimation. The paradigm of Surveillance Centric Coding (SCC) is introduced, in which coding aims to achieve bit-rate optimisation and adaptation of surveillance videos for storing and transmission purposes. In the proposed approach the SCC encoder communicates with the Video Content Analysis (VCA) module that detects events of interest in video captured by the CCTV. Bit-rate optimisation and adaptation are achieved by exploiting the scalability properties of the employed codec. Time segments containing events relevant to surveillance application are encoded using high spatiotemporal resolution and quality while the irrelevant portions from the surveillance standpoint are encoded at low spatio-temporal resolution and / or quality. Thanks to the scalability of the resulting compressed bit-stream, additional bit-rate adaptation is possible; for instance for the transmission purposes. Experimental evaluation showed that significant reduction in bit-rate can be achieved by the proposed approach without loss of information relevant to surveillance applications. In addition to more optimal compression strategy, novel approaches to performing efficient motion estimation specific to surveillance videos are proposed and implemented with experimental results. A real-time background subtractor is used to detect the presence of any motion activity in the sequence. Different approaches for selective motion estimation, GOP based, Frame based and Block based, are implemented. In the former, motion estimation is performed for the whole group of pictures (GOP) only when a moving object is detected for any frame of the GOP. iii While for the Frame based approach; each frame is tested for the motion activity and consequently for selective motion estimation. The selective motion estimation approach is further explored at a lower level as Block based selective motion estimation. Experimental evaluation showed that significant reduction in computational complexity can be achieved by applying the proposed strategy. In addition to selective motion estimation, a tracker based motion estimation and fast full search using multiple reference frames has been proposed for the surveillance videos. Extensive testing on different surveillance videos shows benefits of application of proposed approaches to achieve the goals of the SCC.
APA, Harvard, Vancouver, ISO, and other styles
2

Fernandez, Arguedas Virginia. "Automatic object classification for surveillance videos." Thesis, Queen Mary, University of London, 2012. http://qmro.qmul.ac.uk/xmlui/handle/123456789/3354.

Full text
Abstract:
The recent popularity of surveillance video systems, specially located in urban scenarios, demands the development of visual techniques for monitoring purposes. A primary step towards intelligent surveillance video systems consists on automatic object classification, which still remains an open research problem and the keystone for the development of more specific applications. Typically, object representation is based on the inherent visual features. However, psychological studies have demonstrated that human beings can routinely categorise objects according to their behaviour. The existing gap in the understanding between the features automatically extracted by a computer, such as appearance-based features, and the concepts unconsciously perceived by human beings but unattainable for machines, or the behaviour features, is most commonly known as semantic gap. Consequently, this thesis proposes to narrow the semantic gap and bring together machine and human understanding towards object classification. Thus, a Surveillance Media Management is proposed to automatically detect and classify objects by analysing the physical properties inherent in their appearance (machine understanding) and the behaviour patterns which require a higher level of understanding (human understanding). Finally, a probabilistic multimodal fusion algorithm bridges the gap performing an automatic classification considering both machine and human understanding. The performance of the proposed Surveillance Media Management framework has been thoroughly evaluated on outdoor surveillance datasets. The experiments conducted demonstrated that the combination of machine and human understanding substantially enhanced the object classification performance. Finally, the inclusion of human reasoning and understanding provides the essential information to bridge the semantic gap towards smart surveillance video systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhou, Han, and 周晗. "Intelligent video surveillance in a calibrated multi-camera system." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45989217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Margolis, David. "An analysis of electronic surveillance in the USAPATRIOT act." Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/776.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Health and Public Affairs
Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
5

O'Malley, Patrick D. "Human activity tracking for wide-area surveillance." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000150.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains vi, 46 p.; also contains graphics. Includes vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
6

Richard, Julie Ann. "On Dystopias| Do We Live in a Surveillance State?" Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10601160.

Full text
Abstract:

The technological advances in surveillance over the past 20 years have been astounding and are used in both the private and public sectors progressively each day. The extent of technological advances and the impact on our society seem almost reflective of something out of a work of science fiction. This study involves a qualitative content analysis of three early 20th century dystopian novels and news articles from newspapers such as The Guardian, that display current events pertaining to surveillance, including NSA surveillance methods leaked by Edward Snowden. The study relies upon macro sociological constructs, specifically formal social control to explain the social control imposed by our current government with the use of surveillance methods. Upon examination of the novels and news articles, it is revealed that there is a parallel between the novels and our current society which suggests that we live in a surveillance state. The importance of this study is to educate the public on data collection, analysis, and storage involved in the surveillance process. By showing that our current society is a surveillance state, this study expresses the importance of safeguarding our privacy, liberties, and civil rights as a means of reducing governmental social control.

APA, Harvard, Vancouver, ISO, and other styles
7

Adams, Andrew J. "Multispectral persistent surveillance /." Online version of thesis, 2008. http://hdl.handle.net/1850/7070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chappuies, Margaret R. Chappuies. "Surveillance and Narrative Authority in Villette." University of Toledo Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=uthonors1513263903293044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Medeme, Narasimha Rao. "Application of vehicle identification techniques in transportation surveillance with focus on security /." free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1426087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karlsson, David. "Electronic Data Capture for Injury and Illness Surveillance : A usability study." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-102737.

Full text
Abstract:
Despite the development of injury surveillance systems for use at large multi sportsevents (Junge 2008), their implementation is still methodologically and practicallychallenging. Edouard (2013) and Engebretsen (2013) have pointed out that thecontext of athletics championships feature unique constraints, such as a limiteddata-collection window and large amounts of data to be recorded and rapidlyvalidated. To manage these logistical issues, Electronic Data Capture (EDC) methodshave been proposed (Bjorneboe 2009, Alonso 2012, Edouard 2013). EDC systemshave successfully been used for surveillance during multi-sport events Derman et al(2013) and its potential for surveillance studies during athletics championships istherefore interesting. The focus for surveillance during athletics championships hasthis far been on injury and illness data collected from team medical staff in directassociation to the competitions. But the most common injury and illness problems inathletics are overuse syndromes (Alonso 2009, Edouard 2012, Jacobsson 2013) andknowledge of risk factors associated to these problems is also relevant in associationto championships. A desirable next step to extend the surveillance routines istherefore to include also pre-participation risk factors. For surveillance of overusesyndromes, online systems for athlete self-report of data on pain and othersymptoms have been reported superior to reports from coaches (Shiff 2010). EDCsystems have also been applied for athlete self-report of exposure and injury data inathletics and other individual sports and have been found to be well accepted with agood efficiency (Jacobsson 2013, Clarsen 2013). There are thus reasons forinvestigating EDC system use by both athletes and team medical staff during athleticchampionships.This thesis used a cross-sectional design to collect qualitative data from athletes andteam medical staff using interviews and “think-aloud” usability evaluation methods(Ericsson 1993; Kuusela 2000). It was performed over 3 days during the 2013European Athletics Indoor Championships in Gothenburg, Sweden. Online EDCsystems for collection of data from athletes and team medical staff, respectively,were prepared for the study. The system for use by team medical staff was intendedto collect data on injuries and illnesses sustained during the championship and thesystem for athletes to collect data on risk factors.This study does not provide a solution in how an EDC effort should be implementedduring athletics championships. It does however points towards usability factorsthat needs to be taken into consideration if taking such an approach.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic surveillance in literature"

1

Taylor, L. B. Electronic surveillance. New York: F. Watts, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Taylor, L. B. Electronic surveillance. New York: F. Watts, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kling, Andrew A. Surveillance. Detroit: Lucent Books, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gilbert, Adrian. Top technology. London: QED, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ridker, Andrew. Privacy policy: The anthology of surveillance poetics. Boston: Black Ocean, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gilbert, Adrian. Technologie de pointe. Bois-des-Filion, Québec: Parfum d'encre, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wilcox, Christine. Online privacy. San Diego, CA: ReferencePoint Press, Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

John Le Carré's post-cold war fiction. Columbia, Mo: University of Missouri Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stefoff, Rebecca. Security vs. privacy: Open for debate. New York: Marshall Cavendish Benchmark, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Graham, Brad. 101 spy gadgets for the evil genius. 2nd ed. New York, NY: McGraw-Hill/TAB Electronics, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Electronic surveillance in literature"

1

Moorlock, Greg. "Electronic Surveillance." In Encyclopedia of Global Bioethics, 1–7. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-05544-2_167-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hollien, Harry. "Electronic Surveillance." In The Acoustics of Crime, 105–25. Boston, MA: Springer US, 1990. http://dx.doi.org/10.1007/978-1-4899-0673-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Weik, Martin H. "electronic surveillance." In Computer Science and Communications Dictionary, 504. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moorlock, Greg. "Electronic Surveillance." In Encyclopedia of Global Bioethics, 1088–95. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-09483-0_167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

ten Have, Henk, and Maria do Céu Patrão Neves. "Electronic Surveillance." In Dictionary of Global Bioethics, 455. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54161-3_223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

del Carmen, Rolando V., and Jeffery T. Walker. "Electronic Surveillance." In Briefs of Leading Cases in Law Enforcement, 177–86. Tenth edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9780429053139-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

O’Sullivan, James. "Electronic Literature." In Towards a Digital Poetics, 23–59. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11310-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fitch, Claire. "Electronic Literature." In Sounding Emerging Media, 43–61. London: Focal Press, 2022. http://dx.doi.org/10.4324/9781003046561-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lowe, David. "Surveillance of electronic communications." In Terrorism, Law and Policy, 147–77. 2nd ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003195627-13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Daems, Tom. "Electronic Monitoring in a Culture of Surveillance." In Electronic Monitoring, 1–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34039-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic surveillance in literature"

1

Khastoo, Reza, Sameer Mostafa, and Alastair Fraser. "Thermal Wellbore Failure Detection Case Studies: A High Temperature Multi-Finger Caliper Surveillance Approach." In SPE 2021 Symposium Compilation. SPE, 2021. http://dx.doi.org/10.2118/208445-ms.

Full text
Abstract:
Abstract Cooling of thermal wellbores such as steam assisted gravity drainage (SAGD) and cyclic steam stimulation (CSS) wells, is a common prerequistite to allow deployment of logging instruments due to the temperature limitation of imaging instruments’ electronics (<150°C). This paper presents a memory caliper technology housed in a thermoshield that can perform at up to 220°C, with the acquired data used to evaluate the integrity of tubulars and completion items (metal loss, deposition, deformation, and gap/hole damage), negating the need for cooling before deployment. Two cases are presented. One is a SAGD well with liner screens across the lateral section. The memory multi-finger caliper was deployed using coiled tubing and the data were successfully obtained across the lateral section with a maximum recorded temperature of 169°C. The second example is a vertical well in a steam flood field. Because of the uncertainty over the downhole temperature at the time of the well intervention, a temperature sensor was deployed in surface read-out mode above the caliper. This ensured the 220° temperature limit of the caliper would not be breached, and a maximum temperature of 208°C was recorded. The data confirm the feasibility of acquiring high accuracy/high resolution data from thermal wellbores without having to resort to manipulative cooling techniques to attain a temperature below 150°C. Enlargement of a limited entry perforation (LEP) was observed in the horizontal well and buckling was clearly detected in the vertical well. The broad measurement range of the caliper – 1.85" – 7.2" – enabled both the tubing and liner to be logged in a single well intervention, which facilitated a swift resumption of of steam injection activities. Ultimately, the high temperature MFC's ability to minimize deliberate cooling the thermal wellsbore before deployment, has time and cost saving implications throughout the life cycle of the well. Much of the existing literature examining downhole data acquistion in thermal wells, for the diagnosis of wellbore integrity issues, has relied on technologies that are unable to withstand temperatures much greater than 150°C. The ability to execute well interventions for data acquistion at higher temperatures offers the potential for empirical studies that compare the status and integrity of the wellbore completion in thermal and cooled conditions.
APA, Harvard, Vancouver, ISO, and other styles
2

Sondagar, Bhavisha, Dhruvi Sheth, Pooja Raundale, and Meloni Patel. "Systematic Literature Review of Rainforest Surveillance." In 2023 International Conference on Advanced Computing Technologies and Applications (ICACTA). IEEE, 2023. http://dx.doi.org/10.1109/icacta58201.2023.10392337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wickramasuriya, Jehan, Mohanned Alhazzazi, Mahesh Datt, Sharad Mehrotra, and Nalini Venkatasubramanian. "Privacy-protecting video surveillance." In Electronic Imaging 2005, edited by Nasser Kehtarnavaz and Phillip A. Laplante. SPIE, 2005. http://dx.doi.org/10.1117/12.587986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hourcade, Juan Pablo, Ann Cavoukian, Ronald Deibert, Lorrie Faith Cranor, and Ian Goldberg. "Electronic privacy and surveillance." In CHI '14: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2559206.2579403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Frikken, Keith B., and Mikhail J. Atallah. "Privacy preserving electronic surveillance." In Proceeding of the ACM workshop. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/1005140.1005148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kumar, K. Kishore, and H. Venkateswera Reddy. "Literature Survey On Video Surveillance Crime Activity Recognition." In 2022 First International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR). IEEE, 2022. http://dx.doi.org/10.1109/icaitpr51569.2022.9844189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ghanem, Nagia M., David S. Doermann, Larry S. Davis, and Daniel F. DeMenthon. "Mining tools for surveillance video." In Electronic Imaging 2004, edited by Minerva M. Yeung, Rainer W. Lienhart, and Chung-Sheng Li. SPIE, 2003. http://dx.doi.org/10.1117/12.530607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sato, Kazuya, Akihiro Tsukada, Fumio Matsuda, Kaoru Kawasaki, and Minoru Ozaki. "Multimedia systems for industrial surveillance." In Electronic Imaging '97, edited by Martin Freeman, Paul Jardetzky, and Harrick M. Vin. SPIE, 1997. http://dx.doi.org/10.1117/12.264291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schouten, Theo E., Harco C. Kuppens, and Egon L. van den Broek. "Video surveillance using distance maps." In Electronic Imaging 2006, edited by Nasser Kehtarnavaz and Phillip A. Laplante. SPIE, 2006. http://dx.doi.org/10.1117/12.643708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Leiden, Kenneth, Alicia Fernandes, and Stephen Atkins. "Managing aircraft by trajectory: Literature review and lessons learned." In 2018 Integrated Communications, Navigation, Surveillance Conference (ICNS). IEEE, 2018. http://dx.doi.org/10.1109/icnsurv.2018.8384864.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Electronic surveillance in literature"

1

Vande Griend, Nicholas A. Non-Traditional Intelligence, Reconnaissance, and Surveillance Electronic Intelligence for the Operational Electronic Warfare Officer. Fort Belvoir, VA: Defense Technical Information Center, May 2012. http://dx.doi.org/10.21236/ada564229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Burcham, Patricia. A Comprehensive Literature Review of Autonomous Surveillance Technologies Relating to Dismounted Soldiers. Aberdeen Proving Ground, MD: DEVCOM Analysis Center, December 2022. http://dx.doi.org/10.21236/ad1188321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tobin, J., B. Chung, K. Moore, S. Yu, A. Schwartz, M. Wall, S. Morton, et al. L1 Report for the Enhanced Surveillance Campaign Experimental Benchmarking of Pu Electronic Structure. Office of Scientific and Technical Information (OSTI), January 2006. http://dx.doi.org/10.2172/900152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

STROYKOV, S., and I. NIKITINA. THE CURRENT STATE OF THE PROBLEM OF HYPERTEXT IN LINGUISTIC LITERATURE. Science and Innovation Center Publishing House, 2022. http://dx.doi.org/10.12731/2077-1770-2022-14-2-3-50-73.

Full text
Abstract:
In this paper it’s the first time the authors have reviewed linguistic literature (2008-2022) devoted to the problem of literary and electronic hypertext. The purpose of the paper is to review linguistic literature and identify the current state of the problem of literary and electronic hypertext. Materials and methods. On the basis of this purpose we reviewed 42 scientific papers published in 2008-2022 and representing the results of linguistic research of literary and electronic hypertext. For our study we used an analytical and descriptive method, which is traditional for linguistics and allows us to solve the tasks set in our paper. Results. A review of linguistic papers has shown that hypertext is a relevant subject of linguistic research. Scientists propose various definitions of this concept; consider it as a “special information and communication environment”. Many studies are devoted to literary (fiction and non-fiction) hypertext, however, a much larger number of papers are devoted to various aspects of electronic hypertext, including electronic fiction hypertext and electronic hypertext of some genres (news genres, online advertising, social network and online diary community as well as websites). We consider that it is the electronic environment where hypertext is implemented in all its functions. Practical implications. The results of the study can be used as a theoretical basis for further theoretical and practical study of various aspects of literary and electronic hypertext.
APA, Harvard, Vancouver, ISO, and other styles
5

Patton, Carl E. Microwave Magnetic Solitons in Ferrite Films - Physics and Devices for Radar, Electronic Countermeasures, and Surveillance. Fort Belvoir, VA: Defense Technical Information Center, December 2001. http://dx.doi.org/10.21236/ada398901.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cassidy, Michael, and Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I. West Lafayette, IN: Purdue University, 1990. http://dx.doi.org/10.5703/1288284314184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Mu-Han, and Michael Cassidy. An Electronic Surveillance and Control System for the Management of Traffic on the Borman Expressway. West Lafayette, IN: Purdue University, 1996. http://dx.doi.org/10.5703/1288284313138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Cassidy, Michael, and Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I. Purdue University Press, 1990. http://dx.doi.org/10.5703/1288284313426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cassidy, Michael, and Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I : Executive Summary. West Lafayette, IN: Purdue University, 1990. http://dx.doi.org/10.5703/1288284314185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

US ARMY ELECTRONIC PROVING GROUND. Safety and Health Evaluation - Command, Control Communication, Computers, Intelligence, Surveillance, Reconnaissance, and Electronic Warfare Equipment. Change 1. Fort Belvoir, VA: Defense Technical Information Center, February 2015. http://dx.doi.org/10.21236/ada621717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography