Academic literature on the topic 'Surveillance'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Surveillance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Surveillance"

1

Stanley, Vanessa. "Surveillance, Surveillance, Surveillance." Culture and Cosmos 16, no. 1 and 2 (October 2012): 465–75. http://dx.doi.org/10.46472/cc.01216.0279.

Full text
Abstract:
This presentation is a compilation of my three video installations, Your Universe – Inner Dome, Star Dome and Clear Clear Clear Target Star (2009). The collection of video-work shows the hidden and usually unseen aspects of astronomical exploration collected while at the Siding Spring Observatory in New South Wales, Australia. Each video is filmed directly from the monitor screens in the operations room that imaged the inner dome, the sky/star dome and the targeted star while the universe was being surveyed. The videos engender multi-levels of surveillance to become a comment on our need for such surveillance, to take control over what we do not understand, what is intangible and that which is unreachable.
APA, Harvard, Vancouver, ISO, and other styles
2

Green, Nicola, and Nils Zurawski. "Surveillance and Ethnography: Researching Surveillance as Everyday Life." Surveillance & Society 13, no. 1 (January 7, 2015): 27–43. http://dx.doi.org/10.24908/ss.v13i1.5321.

Full text
Abstract:
This article argues for a wider and more nuanced understanding of ethnography’s role in Surveillance Studies than has sometimes historically been the case. The article begins by (briefly) deconstructing some of the ways that the concepts of both ‘surveillance’ and ‘ethnography’ have been deployed in empirical surveillance research over time, in order to set the scene for a critical interrogation of the variety of ethnographic approaches so far used within Surveillance Studies. The paper then goes on to review Surveillance Studies approaches broadly, and a range of qualitative and ethnographically-informed approaches in particular, within interdisciplinary empirical research related to surveillance relations. The ensuing discussion identifies several points where the existing empirical evidence base would benefit from more extensive ethnographic studies, at multiple sites and scales, that methodologically recognize surveillance as situated and meaningful everyday life processes and practices, rather than surveillant activities and relationships in settings defined as ‘surveillance’ in an a priori fashion. The article concludes by suggesting that approaches oriented towards empirically understanding surveillance practices as ‘everyday life’ have a significant future contribution to make, particularly with respect to building and developing our theoretical understandings of surveillant assemblages in everyday life contexts.
APA, Harvard, Vancouver, ISO, and other styles
3

Phadtare, Gauri, and Anushree Goud. "Electronic Surveillance." International Journal of Trend in Scientific Research and Development Volume-2, Issue-4 (June 30, 2018): 1623–25. http://dx.doi.org/10.31142/ijtsrd14335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Le Mer, Hadrien. "Prendre soin, reprendre en main, ou lâcher prise : trois manières de surveiller la nuit carcérale." Revue française de sociologie Vol. 64, no. 4 (July 26, 2024): 691–723. http://dx.doi.org/10.3917/rfs.644.0691.

Full text
Abstract:
L’un des enjeux principaux de la journée de travail du surveillant pénitentiaire consiste à déléguer le travail de réinsertion et de prise en charge de la vulnérabilité des personnes détenues à d’autres professionnels. La nuit, la prison se vide de ses différents intervenants et ce « sale boulot » s’impose aux seuls surveillants. Cette généralisation d’un « sale boulot » qui n’est plus délégable fait apparaitre une polarisation des attitudes de surveillance. La première, l’attitude statutaire, consiste à refuser le travail de réinsertion au profit d’une préservation de soi et de son sommeil. À l’opposé de ce désengagement professionnel, je distingue deux types de missionnariat. Le premier, le missionnariat sécuritaire, s’élabore contre l’idée d’une population pénale vulnérable et met en avant l’idée d’une dangerosité des personnes détenues qui profiteraient de la nuit pour s’épanouir dans l’illégalité. Le second, le missionnariat du soin, consiste à l’inverse à s’approprier le travail de réinsertion et de prise en charge de la vulnérabilité nocturne au profit d’un anoblissement moral de la mission professionnelle de surveillance. N’étant pas véritablement formés à la mission de réinsertion, les surveillants puisent dans des socialisations préalables pour parvenir à produire une réponse à la fragilité nocturne des personnes détenues et se situer préférentiellement dans l’une de ces trois attitudes. Je m’efforce d’analyser certaines des régularités observables entre passés sociaux des surveillants et attitudes de surveillance adoptées pendant la nuit.
APA, Harvard, Vancouver, ISO, and other styles
5

Topak, Özgün E. "The authoritarian surveillant assemblage: Authoritarian state surveillance in Turkey." Security Dialogue 50, no. 5 (June 26, 2019): 454–72. http://dx.doi.org/10.1177/0967010619850336.

Full text
Abstract:
This article examines Turkey’s authoritarian state surveillance regime by developing the concept of the authoritarian surveillant assemblage (ASA), building on and expanding the concept of the surveillant assemblage (SA). Turkey’s ASA is the outcome of diverse surveillance systems, which continuously expand their reach, form new connections and incorporate new actors. These systems include a protest and dissent surveillance system, an internet surveillance system, a synoptic media surveillance system and an informant–collaborator surveillance system. Turkey’s ASA is controlled by the Turkish state and serves its repressive interests. Although pivotal in emphasizing the complexity of surveillance connections and increasing diversification of and collaboration among surveillance actors, the SA model of surveillance puts the main emphasis on decentralized, uncoordinated and multifaceted forms of surveillance, and does not offer sufficient analytical space to understand how an authoritarian state could coordinate diverse surveillance systems and use it for the overarching purpose of control. The article draws on Michael Mann’s theory of state power and the authoritarian state to address these limitations of the SA and conceptualize the ASA. It shows how the diverse systems of Turkey’s ASA work in concert with one another under the hierarchical command of Erdoğan’s Justice and Development Party (AKP) to control the population and suppress dissent.
APA, Harvard, Vancouver, ISO, and other styles
6

Macnish, Kevin. "Just Surveillance? Towards a Normative Theory of Surveillance." Surveillance & Society 12, no. 1 (March 1, 2014): 142–53. http://dx.doi.org/10.24908/ss.v12i1.4515.

Full text
Abstract:
Despite recent growth in surveillance capabilities there has been little discussion regarding the ethics of surveillance. Much of the research that has been carried out has tended to lack a coherent structure or fails to address key concerns. I argue that the just war tradition should be used as an ethical framework which is applicable to surveillance, providing the questions which should be asked of any surveillance operation. In this manner, when considering whether to employ surveillance, one should take into account the reason for the surveillance, the authority of the surveillant, whether or not there has been a declaration of intent, whether surveillance is an act of last resort, what is the likelihood of success of the operation and whether surveillance is a proportionate response. Once underway, the methods of surveillance should be proportionate to the occasion and seek to target appropriate people while limiting surveillance of those deemed inappropriate. By drawing on the just war tradition, ethical questions regarding surveillance can draw on a long and considered discourse while gaining a framework which, I argue, raises all the key concerns and misses none.
APA, Harvard, Vancouver, ISO, and other styles
7

Ligairi, Josua, Donald Wilson, and Isimeli Tukana. "Existing NCD Monitoring and Surveillance Systems and its adaptability to Fiji’s context: A Systematic Review." Pacific Health Dialog 21, no. 7 (June 22, 2021): 440–48. http://dx.doi.org/10.26635/phd.2021.101.

Full text
Abstract:
Introduction: The United Nations high-level meeting of the General Assembly on the Prevention and Control of Non-communicable Diseases passed a political declaration on Non-Communicable Diseases (NCD) prevention and control in 2011, emphasizing the great need for NCD surveillance including in Low-to-Middle-Income-Countries (LMICs). Method: A review of literature was conducted and set for full text citations published in English dated 1 January, 2007 to 31 August 2019. MESH terms or key words were selected from the following groups of generic terms: the following words “Health surveillance systems” and “NCD monitoring and surveillance system”. The literatures were tabulated according to the authors, date that was published and which journal, the title of the study, the surveillance design and their recommendations. The 13 articles that were identified, only one was conducted in a developing country while the rest were conducted in high income countries. Results: 60% of the NCD surveillace system reviewed use passive surveillance, 30% uses passive assisted sentinel surveillance and 10% use passive assited spatial surveillance. Based on countries surveillance system there was an equal distribution on involvement in policy development (33%), behavioural risk associated aggregates (33%) and intergrated health information System (33%).Through intense review, passive assisted sentinel surveillance was mostly practiced and the use of spatial surveillace in this context for interregional comparisons of specified diseases. Conclusion: There was less evidence on surveillance in LMIC but the following surveillance systems were identified as essential for Fiji’s proposed NCD surveillance system. This study suggest that a probable surveillance system that can be adopted by Fiji is a passive assisted sentinel surveillance system enhanced with Spatial data. Further consultation and a feasibility study can be proposed as a way forward for this study findings.
APA, Harvard, Vancouver, ISO, and other styles
8

Lippert, Randy K., and Jolina Scalia. "Attaching Hollywood to a Surveillant Assemblage: Normalizing Discourses of Video Surveillance." Media and Communication 3, no. 3 (October 20, 2015): 26–38. http://dx.doi.org/10.17645/mac.v3i3.286.

Full text
Abstract:
This article examines video surveillance images in Hollywood film. It moves beyond previous accounts of video surveillance in relation to film by theoretically situating the use of these surveillance images in a broader “surveillant assemblage”. To this end, scenes from a sample of thirty-five (35) films of several genres are examined to discern dominant discourses and how they lend themselves to normalization of video surveillance. Four discourses are discovered and elaborated by providing examples from Hollywood films. While the films provide video surveillance with a positive associative association it is not without nuance and limitations. Thus, it is found that some forms of resistance to video surveillance are shown while its deterrent effect is not. It is ultimately argued that Hollywood film is becoming attached to a video surveillant assemblage discursively through these normalizing discourses as well as structurally to the extent actual video surveillance technology to produce the images is used.
APA, Harvard, Vancouver, ISO, and other styles
9

Kalvaityte, Martyna, and Nicolas Saintonge. "La surveillance sous surveillance." Books N° 94, no. 2 (February 1, 2019): 70–72. http://dx.doi.org/10.3917/books.094.0070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hier, Sean P. "Probing the Surveillant Assemblage: on the dialectics of surveillance practices as processes of social control." Surveillance & Society 1, no. 3 (September 1, 2002): 399–411. http://dx.doi.org/10.24908/ss.v1i3.3347.

Full text
Abstract:
Recent dialogue on the contemporary nature of information and data gathering techniques has incorporated the notion of assemblages to denote an increasing convergence of once discrete systems of surveillance. The rhizomatic expansion of late modern ‘surveillant assemblages’ is purported not only to enable important transformations in the purpose and intention of surveillance practices, but to facilitate a partial democratization of surveillance hierarchies. Seeking to account for the forces and desires which give rise to, and sustain, surveillant assemblages, this paper explicates the workings of a dialectic embedded in many surveillance practices to reveal a polarization effect involving the simultaneous leveling and solidification of hierarchies. Empirical data from the intensification of welfare monitoring are presented to illustrate the dialectics of surveillance practices as processes of social control.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Surveillance"

1

Mansoor, Shaheer. "System Surveillance." Thesis, Linköpings universitet, Statistik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-98189.

Full text
Abstract:
In recent years, trade activity in stock markets has increased substantially. This is mainly attributed to the development of powerful computers and intranets connecting traders to markets across the globe. The trades have to be carried out almost instantaneously and the systems in place that handle trades are burdened with millions of transactions a day, several thousand a minute. With increasing transactions the time to execute a single trade increases, and this can be seen as an impact on the performance. There is a need to model the performance of these systems and provide forecasts to give a heads up on when a system is expected to be overwhelmed by transactions. This was done in this study, in cooperation with Cinnober Financial Technologies, a firm which provides trading solutions to stock markets. To ensure that the models developed weren‟t biased, the dataset was cleansed, i.e. operational and other transactions were removed, and only valid trade transactions remained. For this purpose, a descriptive analysis of time series along with change point detection and LOESS regression were used. State space model with Kalman Filtering was further used to develop a time varying coefficient model for the performance, and this model was applied to make forecasts. Wavelets were also used to produce forecasts, and besides this high pass filters were used to identify low performance regions. The State space model performed very well to capture the overall trend in performance and produced reliable forecasts. This can be ascribed to the property of Kalman Filter to handle noisy data well. Wavelets on the other hand didn‟t produce reliable forecasts but were more efficient in detecting regions of low performance.
APA, Harvard, Vancouver, ISO, and other styles
2

Cakici, Baki. "Disease surveillance systems." Licentiate thesis, KTH, Programvaru- och datorsystem, SCS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-33661.

Full text
Abstract:
Recent advances in information and communication technologies have made the development and operation of complex disease surveillance systems technically feasible, and many systems have been proposed to interpret diverse data sources for health-related signals. Implementing these systems for daily use and efficiently interpreting their output, however, remains a technical challenge. This thesis presents a method for understanding disease surveillance systems structurally, examines four existing systems, and discusses the implications of developing such systems. The discussion is followed by two papers. The first paper describes the design of a national outbreak detection system for daily disease surveillance. It is currently in use at the Swedish Institute for Communicable Disease Control. The source code has been licenced under GNU v3 and is freely available. The second paper discusses methodological issues in computational epidemiology, and presents the lessons learned from a software development project in which a spatially explicit micro-meso-macro model for the entire Swedish population was built based on registry data.
QC 20110520
APA, Harvard, Vancouver, ISO, and other styles
3

Adams, Andrew J. "Multispectral persistent surveillance /." Online version of thesis, 2008. http://hdl.handle.net/1850/7070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Akram, Muhammad. "Surveillance centric coding." Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/2320.

Full text
Abstract:
The research work presented in this thesis focuses on the development of techniques specific to surveillance videos for efficient video compression with higher processing speed. The Scalable Video Coding (SVC) techniques are explored to achieve higher compression efficiency. The framework of SVC is modified to support Surveillance Centric Coding (SCC). Motion estimation techniques specific to surveillance videos are proposed in order to speed up the compression process of the SCC. The main contributions of the research work presented in this thesis are divided into two groups (i) Efficient Compression and (ii) Efficient Motion Estimation. The paradigm of Surveillance Centric Coding (SCC) is introduced, in which coding aims to achieve bit-rate optimisation and adaptation of surveillance videos for storing and transmission purposes. In the proposed approach the SCC encoder communicates with the Video Content Analysis (VCA) module that detects events of interest in video captured by the CCTV. Bit-rate optimisation and adaptation are achieved by exploiting the scalability properties of the employed codec. Time segments containing events relevant to surveillance application are encoded using high spatiotemporal resolution and quality while the irrelevant portions from the surveillance standpoint are encoded at low spatio-temporal resolution and / or quality. Thanks to the scalability of the resulting compressed bit-stream, additional bit-rate adaptation is possible; for instance for the transmission purposes. Experimental evaluation showed that significant reduction in bit-rate can be achieved by the proposed approach without loss of information relevant to surveillance applications. In addition to more optimal compression strategy, novel approaches to performing efficient motion estimation specific to surveillance videos are proposed and implemented with experimental results. A real-time background subtractor is used to detect the presence of any motion activity in the sequence. Different approaches for selective motion estimation, GOP based, Frame based and Block based, are implemented. In the former, motion estimation is performed for the whole group of pictures (GOP) only when a moving object is detected for any frame of the GOP. iii While for the Frame based approach; each frame is tested for the motion activity and consequently for selective motion estimation. The selective motion estimation approach is further explored at a lower level as Block based selective motion estimation. Experimental evaluation showed that significant reduction in computational complexity can be achieved by applying the proposed strategy. In addition to selective motion estimation, a tracker based motion estimation and fast full search using multiple reference frames has been proposed for the surveillance videos. Extensive testing on different surveillance videos shows benefits of application of proposed approaches to achieve the goals of the SCC.
APA, Harvard, Vancouver, ISO, and other styles
5

Hjelm, Emil, and Robert Yousif. "Camera Surveillance Quadrotor." Thesis, KTH, Maskinkonstruktion (Inst.), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-184491.

Full text
Abstract:
A quadrotor is a helicopter with four rotors placed at equal distance from the crafts centre of gravity, controlled by letting the different rotors generate different amount of thrust. It uses various sensors to stay stable in the air, correct readings from these sensors are therefore critical. By reducing vibrations, electromagnetic interference and external disturbances the quadrotor’s stability can increase. The purpose of this project is to analyse the feasibility of a quadrotor camera surveillance system by optimizing the handling of vibrations, video signal and external disturbances for a quadrotor. The quadrotor will be flown through first person view and should be able to hover at 10 meters altitude in a radius of 3 meters. Only sensor readings will be optimized, not data processing. The flight controller used will be a MultiWii Pro which has an accelerometer, a gyroscope, a magnetometer, a GPS and a barometer. By balancing motors and applying vibration dampening material between the motors and the frame vibrations were reduced by 73 %. Electromagnetic interference to the magnetometer was made negligible when the magnetometer had a distance of 3 cm from the power circuit. Video signal was improved by applying a LC-filter. Isolating the barometer improved calculations for the altitude. The quadrotor’s position could be locked within a radius of 4 meters and its altitude could be locked in an interval of 2 meters. The quadrotor cannot be considered stable enough for automatic camera surveillance, however with software improvement it could be.
En quadrotor är en helikopter med fyra rotorer placerade på lika avstånd från farkostens masscentrum, kontrollerad genom att låta de olika rotorerna generera olika mycket lyftkraft. Den använder sig av flera olika sensorer för att hålla sig stabil i luften, korrekt avläsning från sensorerna är därför kritiskt. Genom att reducera vibrationer, elektromagnetisk störning och externa störningar kan quadrotorns stabilitet öka. Syftet med detta projekt är att analysera möjligheten för ett quadrotorkameraövervakningssystem genom att optimera vibrationer, videosignal och externa störningar för en quadrotor. Quadrotorn ska styras genom FPV (First Person View) och kunna hovra på 10 meters höjd inom en radie av 3 meter. Endast sensorläsning kommer att optimeras, inte hantering av data. Microcontrollern som används är MultiWii Pro som har en accelerometer, ett gyroskop, en magnetometer, en GPS och en barometer. Genom att balansera motorer och lägga på vibrationsdämpande material mellan motorer och ram kunde vibrationerna minskas med 73 %. Elektromagnetisk störning på magnetometern gjordes försumbar med ett avstånd på 3 cm från kretskortet. Videosignal förbättrades genom att filtrera strömtillförseln till kamerasystemet med ett LC-filter. Isolering av barometern gjorde att höjdberäkningarna förbättrades. Quadrotorns position kunde låsas inom en radie på 4 meter och dess höjd kunde låsas inom ett intervall på 2 meter. Quadrotorn kan inte anses vara tillräckligt stabil för automatisk kameraövervakning, men med förbättring på mjukvaran skulle den kunna bli det.
APA, Harvard, Vancouver, ISO, and other styles
6

Kangin, Dmitry. "Intelligent video surveillance." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/80349/.

Full text
Abstract:
In the focus of this thesis are the new and modified algorithms for object detection, recognition and tracking within the context of video analytics. The manual video surveillance has been proven to have low effectiveness and, at the same time, high expense because of the need in manual labour of operators, which are additionally prone to erroneous decisions. Along with increase of the number of surveillance cameras, there is a strong need to push for automatisation of the video analytics. The benefits of this approach can be found both in military and civilian applications. For military applications, it can help in localisation and tracking of objects of interest. For civilian applications, the similar object localisation procedures can make the criminal investigations more effective, extracting the meaningful data from the massive video footage. Recently, the wide accessibility of consumer unmanned aerial vehicles has become a new threat as even the simplest and cheapest airborne vessels can carry some cargo that means they can be upgraded to a serious weapon. Additionally they can be used for spying that imposes a threat to a private life. The autonomous car driving systems are now impossible without applying machine vision methods. The industrial applications require automatic quality control, including non-destructive methods and particularly methods based on the video analysis. All these applications give a strong evidence in a practical need in machine vision algorithms for object detection, tracking and classification and gave a reason for writing this thesis. The contributions to knowledge of the thesis consist of two main parts: video tracking and object detection and recognition, unified by the common idea of its applicability to video analytics problems. The novel algorithms for object detection and tracking, described in this thesis, are unsupervised and have only a small number of parameters. The approach is based on rigid motion segmentation by Bayesian filtering. The Bayesian filter, which was proposed specially for this method and contributes to its novelty, is formulated as a generic approach, and then applied to the video analytics problems. The method is augmented with optional object coordinate estimation using plain two-dimensional terrain assumption which gives a basis for the algorithm usage inside larger sensor data fusion models. The proposed approach for object detection and classification is based on the evolving systems concept and the new Typicality-Eccentricity Data Analytics (TEDA) framework. The methods are capable of solving classical problems of data mining: clustering, classification, and regression. The methods are proposed in a domain-independent way and are capable of addressing shift and drift of the data streams. Examples are given for the clustering and classification of the imagery data. For all the developed algorithms, the experiments have shown sustainable results on the testing data. The practical applications of the proposed algorithms are carefully examined and tested.
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Winston. "Collaborative UAV Surveillance." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/theses/2565.

Full text
Abstract:
Autonomous collaborative robotics is a topic of significant interest to groups such as the Air Force Research Lab (AFRL) and the National Aeronautics and Space Administration (NASA). These two groups have been developing systems for the operation of autonomous vehicles over the past several years, but each system has several critical drawbacks. AFRL’s Unmanned Systems Autonomy Services (UxAS) supports pathfinding for multiple tasks performed by groups of vehicles, but has no formal verification, very little physical flight time, and no concept of collision avoidance. NASA’s Independent Configurable Architecture for Reliable Operations of Unmanned Systems (ICAROUS) has collision avoidance, partial formal verification, and thousands of hours of physical flight time, but has no concept of collaboration. AFRL and NASA each wanted to incorporate the features of the other’s software into their own, and so the CRoss-Application Translator for Operational Unmanned Systems (CRATOUS) was created. CRATOUS creates a communication bridge between UxAS and ICAROUS, allowing for full feature integration of the two system. This combined software is the first system that allows for the safe and reliable cooperation of groups of unmanned vehicles.
APA, Harvard, Vancouver, ISO, and other styles
8

Halliday, J. E. B. "Animal sentinel surveillance : evaluating domestic dogs as sentinels for zoonotic pathogen surveillance." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4794.

Full text
Abstract:
The capacity of zoonotic pathogens to infect multiple hosts creates surveillance challenges but also provides opportunities to gather data from animal species that can be used to understand risks to human health. This thesis presents a conceptual and practical assessment of the utility of domestic dog serosurveillance for the detection and surveillance of two pathogens, influenza A and Leptospira spp. The first chapter gives a theoretical framework that can be used to explore the attributes of animal sentinels and assess their utility in different contexts. In subsequent chapters, this framework is applied in a practical assessment of the utility of a domestic dog serosurveillance approach for the detection and surveillance influenza A and Leptospira spp. at two sites in Africa. Two cross-sectional surveys of the avian and mammal populations at a site in Northern Cameroon were conducted in early 2006 to determine if H5N1 influenza A viruses had circulated in this area and in which species that presence could be detected. Serological and molecular evidence of extensive H5 virus circulation in the domestic duck population was identified. 47% of domestic ducks at the Maga site were cELISA positive for anti-influenza A antibodies and 20% were HI test positive against an H5N1 antigen. There was also evidence of exposure to H5 subtype viruses in the local dog and pig populations. At the Kibera site in Nairobi, a cohort study was established to carry out surveillance of influenza A and Leptospira spp. in the domestic dog population and cross-sectional surveys of the domestic poultry and rodent populations were completed. There was no indication of influenza A circulation in any of the animal species surveyed, indicating low risk of zoonotic influenza A infection in the human population of Kibera. In contrast, there was extensive molecular and serological evidence of the presence of Leptospira spp. in both the rodent and dog populations. 18% of 236 trapped rodents were PCR positive for kidney carriage of pathogenic leptospires and the estimated seroprevalence of anti- Leptospira antibodies in the dog population ranged from 5-36% during the course of the study, indicating high potential risk of leptospirosis infection in the human population. The results indicate that dog serosurveillance can be used as useful tool for the determination of broad-scale patterns of pathogen presence and relative levels of population exposure. However, there are limitations of the data that can be gathered from animal sentinels and the complexities introduced particularly by incomplete understanding of diagnostic test performance must be recognized. Animal sentinel surveillance may be of most use for addressing fundamental questions of what pathogens are present where. In the developing world particularly where disease burden data are still lacking, dog sentinel serosurveillance can provide essential baseline data that can be used to target future research and resource allocation.
APA, Harvard, Vancouver, ISO, and other styles
9

Fairchild, Geoffrey Colin. "Improving disease surveillance : sentinel surveillance network design and novel uses of Wikipedia." Diss., University of Iowa, 2014. https://ir.uiowa.edu/etd/1452.

Full text
Abstract:
Traditional disease surveillance systems are instrumental in guiding policy-makers' decisions and understanding disease dynamics. The first study in this dissertation looks at sentinel surveillance network design. We consider three location-allocation models: two based on the maximal coverage model (MCM) and one based on the K-median model. The MCM selects sites that maximize the total number of people within a specified distance to the site. The K-median model minimizes the sum of the distances from each individual to the individual's nearest site. Using a ground truth dataset consisting of two million de-identified Medicaid billing records representing eight complete influenza seasons and an evaluation function based on the Huff spatial interaction model, we empirically compare networks against the existing volunteer-based Iowa Department of Public Health influenza-like illness network by simulating the spread of influenza across the state of Iowa. We compare networks on two metrics: outbreak intensity (i.e., disease burden) and outbreak timing (i.e., the start, peak, and end of the epidemic). We show that it is possible to design a network that achieves outbreak intensity performance identical to the status quo network using two fewer sites. We also show that if outbreak timing detection is of primary interest, it is actually possible to create a network that matches the existing network's performance using 42% fewer sites. Finally, in an effort to demonstrate the generic usefulness of these location-allocation models, we examine primary stroke center selection. We describe the ineffectiveness of the current self-initiated approach and argue for a more organized primary stroke center system. While these traditional disease surveillance systems are important, they have several downsides. First, due to a complex reporting hierarchy, there is generally a reporting lag; for example, most diseases in the United States experience a reporting lag of approximately 1-2 weeks. Second, many regions of the world lack trustworthy or reliable data. As a result, there has been a surge of research looking at using publicly available data on the internet for disease surveillance purposes. The second and third studies in this dissertation analyze Wikipedia's viability in this sphere. The first of these two studies looks at Wikipedia access logs. Hourly access logs dating back to December 2007 are available for anyone to download completely free of charge. These logs contain, among other things, the total number of accesses for every article in Wikipedia. Using a linear model and a simple article selection procedure, we show that it is possible to nowcast and, in some cases, forecast up to the 28 days tested in 8 of the 14 disease-location contexts considered. We also demonstrate that it may be possible in some cases to train a model in one context and use the same model to nowcast or forecast in another context with poor surveillance data. The second of the Wikipedia studies looked at disease-relevant data found in the article content. A number of disease outbreaks are meticulously tracked on Wikipedia. Case counts, death counts, and hospitalization counts are often provided in the article narrative. Using a dataset created from 14 Wikipedia articles, we trained a named-entity recognizer (NER) to recognize and tag these phrases. The NER achieved an F1 score of 0.753. In addition to these counts in the narrative, we tested the accuracy of tabular data using the 2014 West African Ebola virus disease epidemic. This article, like a number of other disease articles on Wikipedia, contains granular case counts and deaths counts per country affected by the disease. By computing the root-mean-square error between the Wikipedia time series and a ground truth time series, we show that the Wikipedia time series are both timely and accurate.
APA, Harvard, Vancouver, ISO, and other styles
10

Rashid, Muhammad, and Mumtaz Mutarraf. "Remote Surveillance and Measurement." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2196.

Full text
Abstract:

Wireless Sensor Network (WSN), a collection of “sensor nodes” promises to change the scientist’s approach of gathering the environmental data in various fields. Sensor nodes can be used for non-stop sensing, event detection, location sensing and local control of actuators, this concept gives surety to many latest application areas like agriculture, military, home or factory automation, logistics and so on. Remote surveillance and measurement missions can be performed by using WSNs. The hot research topic now-a-days is to make such networks remotely controllable and adaptive to the environment and mission.

The work carried out in this thesis is the development of a surveillance application using TinyOS/nesC. The purpose of this application is to perform event-detection mission by using any one of the built-in sensor on Mica2 motes as well as a setup protocol is designed to make the WSN remotely controllable and adaptive to the mission. In this thesis, an experimental work is also performed using TinyDB to build up a surveillance system whose purpose is to detect and count the total number of person present at any time in a given room and to view the results at a remote place. Besides these two system applications, a comparative study between TinyDB and nesC is described which concludes that more hardware control can be achieved through nesC which is a more power efficient platform for long-term applications.

APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Surveillance"

1

Sewell, Graham. Surveillance. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

1970-, Goold B. J., ed. Surveillance. New York, NY: Routledge, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

New South Wales. Law Reform Commission. Surveillance. [Sydney]: New South Wales Law Reform Commission, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Michaels, David, Kent Harper, Marco Mehlitz, and Jennifer Lynch. Surveillance. Los Angeles, CA: Magnolia Home Entertainment, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kling, Andrew A. Surveillance. Detroit: Lucent Books, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Johnson, William M. Eavesdropping, technical surveillance & technical surveillance countermeasures. Seattle, WA: Business Espionage Controls & Countermeasures Association, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Taylor, Emmeline. Surveillance Schools. London: Palgrave Macmillan UK, 2013. http://dx.doi.org/10.1057/9781137308863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Oxford, John. Influenza Surveillance. Unitec House, 2 Albert Place, London N3 1QB, UK: Future Medicine Ltd, 2014. http://dx.doi.org/10.2217/9781780843605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Taylor, Emmeline. Surveillance Futures. Abingdon, Oxon ; New York, NY : Routledge, 2016.: Routledge, 2016. http://dx.doi.org/10.4324/9781315611402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Canada, Law Reform Commission of. Electronic surveillance. Ottawa: Law ReformCommission of Canada, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Surveillance"

1

Sewell, Graham. "The prison and the factory." In Surveillance, 40–56. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sewell, Graham. "The gaze at work." In Surveillance, 98–117. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sewell, Graham. "Surveillance at work." In Surveillance, 1–11. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sewell, Graham. "The surveillant assemblage at work." In Surveillance, 81–97. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sewell, Graham. "We’ve always been working away at surveillance." In Surveillance, 12–39. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sewell, Graham. "Someone to watch over me." In Surveillance, 57–80. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sewell, Graham. "Heterotopias of surveillance at work." In Surveillance, 118–41. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sewell, Graham. "Modern surveillance is rubbish." In Surveillance, 142–55. Abingdon, Oxon ; New York, NY : Routledge, 2021. | Series: Key ideas in business & management: Routledge, 2021. http://dx.doi.org/10.4324/9781351180566-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mirzoeff, Nicholas. "Surveillance and Counter-Surveillance." In An Introduction to Visual Culture, 89–104. 3rd ed. London: Routledge, 2023. http://dx.doi.org/10.4324/9780429280238-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Flühr, Holger. "Surveillance." In Avionik und Flugsicherungstechnik, 137–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01612-7_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Surveillance"

1

Campbell, Duncan. "Global surveillance." In the tenth conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/332186.332274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saini, Mukesh, Pradeep Atrey, Sharad Mehrotra, and Mohan Kankanhalli. "Anonymous surveillance." In 2011 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 2011. http://dx.doi.org/10.1109/icme.2011.6012206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Renner, R., Z. Hemani, G. Tjoumas, K. Turley, C. Callender, B. Elstad, and P. Smith. "Persistent Surveillance." In 2009 17th International Conference on Geoinformatics. IEEE, 2009. http://dx.doi.org/10.1109/geoinformatics.2009.5293548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Calderara, Simone, Rita Cucchiara, and Andrea Prati. "Multimedia surveillance." In the 4th ACM international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1178782.1178797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seiders, Barbara, Dennis McQuerry, Thomas A. Ferryman, Paul D. Whitney, and Anthony Rybka. "Information surveillance." In AeroSense 2002, edited by Mark K. Hamilton. SPIE, 2002. http://dx.doi.org/10.1117/12.475855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Briggs, Pam, Elizabeth Churchill, Mark Levine, James Nicholson, Gary W. Pritchard, and Patrick Olivier. "Everyday Surveillance." In CHI'16: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2851581.2856493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Latulipe, Celine, and Annabel Manning. "Layered surveillance." In the 28th of the international conference extended abstracts. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1753846.1753907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hargude, Sonali, and S. R. Idate. "i-surveillance: Intelligent surveillance system using background subtraction technique." In 2016 International Conference on Computing Communication Control and automation (ICCUBEA). IEEE, 2016. http://dx.doi.org/10.1109/iccubea.2016.7860046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Choudhary, Vikas, and Anil K. Tiwari. "Surveillance Video Synopsis." In Image Processing (ICVGIP). IEEE, 2008. http://dx.doi.org/10.1109/icvgip.2008.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Laou, P. "Autonomous surveillance microsystems." In Opto-Canada: SPIE Regional Meeting on Optoelectronics, Photonics, and Imaging, edited by John C. Armitage. SPIE, 2017. http://dx.doi.org/10.1117/12.2283944.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Surveillance"

1

Patton, G. W. Air surveillance. Office of Scientific and Technical Information (OSTI), June 1995. http://dx.doi.org/10.2172/433030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dunphy, Brendan M., Brad Tucker, and Lyric Bartholomay. Mosquito Surveillance. Ames: Iowa State University, Digital Repository, 2008. http://dx.doi.org/10.31274/farmprogressreports-180814-164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bartholomay, Lyric. Mosquito Surveillance. Ames: Iowa State University, Digital Repository, 2007. http://dx.doi.org/10.31274/farmprogressreports-180814-165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dunphy, Brendan M., Brad Tucker, and Lyric Bartholomay. Mosquito Surveillance. Ames: Iowa State University, Digital Repository, 2008. http://dx.doi.org/10.31274/farmprogressreports-180814-331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dunphy, Brendan M., Brad Tucker, and Lyric Bartholomay. Mosquito Surveillance. Ames: Iowa State University, Digital Repository, 2008. http://dx.doi.org/10.31274/farmprogressreports-180814-918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grappel, Robert D., Garrett S. Harris, Mark J. Kozar, and Randall T. Wiken. Elementary Surveillance (ELS) and Enhanced Surveillance (EHS) Validation via Mode S Secondary Radar Surveillance. Fort Belvoir, VA: Defense Technical Information Center, April 2008. http://dx.doi.org/10.21236/ada489387.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Saldi, K. A., R. L. Dirkes, and M. L. Blanton. Surface-water surveillance. Office of Scientific and Technical Information (OSTI), June 1995. http://dx.doi.org/10.2172/433031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Antonio, E. J. External radiation surveillance. Office of Scientific and Technical Information (OSTI), June 1995. http://dx.doi.org/10.2172/433035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Blask, Steven. Airborne Video Surveillance. Fort Belvoir, VA: Defense Technical Information Center, February 2002. http://dx.doi.org/10.21236/ada402884.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jefferies, Stuart M. Space Surveillance Simulator. Fort Belvoir, VA: Defense Technical Information Center, August 2006. http://dx.doi.org/10.21236/ada455961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography