Dissertations / Theses on the topic 'Surveillance'

To see the other types of publications on this topic, follow the link: Surveillance.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Surveillance.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Mansoor, Shaheer. "System Surveillance." Thesis, Linköpings universitet, Statistik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-98189.

Full text
Abstract:
In recent years, trade activity in stock markets has increased substantially. This is mainly attributed to the development of powerful computers and intranets connecting traders to markets across the globe. The trades have to be carried out almost instantaneously and the systems in place that handle trades are burdened with millions of transactions a day, several thousand a minute. With increasing transactions the time to execute a single trade increases, and this can be seen as an impact on the performance. There is a need to model the performance of these systems and provide forecasts to give a heads up on when a system is expected to be overwhelmed by transactions. This was done in this study, in cooperation with Cinnober Financial Technologies, a firm which provides trading solutions to stock markets. To ensure that the models developed weren‟t biased, the dataset was cleansed, i.e. operational and other transactions were removed, and only valid trade transactions remained. For this purpose, a descriptive analysis of time series along with change point detection and LOESS regression were used. State space model with Kalman Filtering was further used to develop a time varying coefficient model for the performance, and this model was applied to make forecasts. Wavelets were also used to produce forecasts, and besides this high pass filters were used to identify low performance regions. The State space model performed very well to capture the overall trend in performance and produced reliable forecasts. This can be ascribed to the property of Kalman Filter to handle noisy data well. Wavelets on the other hand didn‟t produce reliable forecasts but were more efficient in detecting regions of low performance.
APA, Harvard, Vancouver, ISO, and other styles
2

Cakici, Baki. "Disease surveillance systems." Licentiate thesis, KTH, Programvaru- och datorsystem, SCS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-33661.

Full text
Abstract:
Recent advances in information and communication technologies have made the development and operation of complex disease surveillance systems technically feasible, and many systems have been proposed to interpret diverse data sources for health-related signals. Implementing these systems for daily use and efficiently interpreting their output, however, remains a technical challenge. This thesis presents a method for understanding disease surveillance systems structurally, examines four existing systems, and discusses the implications of developing such systems. The discussion is followed by two papers. The first paper describes the design of a national outbreak detection system for daily disease surveillance. It is currently in use at the Swedish Institute for Communicable Disease Control. The source code has been licenced under GNU v3 and is freely available. The second paper discusses methodological issues in computational epidemiology, and presents the lessons learned from a software development project in which a spatially explicit micro-meso-macro model for the entire Swedish population was built based on registry data.
QC 20110520
APA, Harvard, Vancouver, ISO, and other styles
3

Adams, Andrew J. "Multispectral persistent surveillance /." Online version of thesis, 2008. http://hdl.handle.net/1850/7070.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Akram, Muhammad. "Surveillance centric coding." Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/2320.

Full text
Abstract:
The research work presented in this thesis focuses on the development of techniques specific to surveillance videos for efficient video compression with higher processing speed. The Scalable Video Coding (SVC) techniques are explored to achieve higher compression efficiency. The framework of SVC is modified to support Surveillance Centric Coding (SCC). Motion estimation techniques specific to surveillance videos are proposed in order to speed up the compression process of the SCC. The main contributions of the research work presented in this thesis are divided into two groups (i) Efficient Compression and (ii) Efficient Motion Estimation. The paradigm of Surveillance Centric Coding (SCC) is introduced, in which coding aims to achieve bit-rate optimisation and adaptation of surveillance videos for storing and transmission purposes. In the proposed approach the SCC encoder communicates with the Video Content Analysis (VCA) module that detects events of interest in video captured by the CCTV. Bit-rate optimisation and adaptation are achieved by exploiting the scalability properties of the employed codec. Time segments containing events relevant to surveillance application are encoded using high spatiotemporal resolution and quality while the irrelevant portions from the surveillance standpoint are encoded at low spatio-temporal resolution and / or quality. Thanks to the scalability of the resulting compressed bit-stream, additional bit-rate adaptation is possible; for instance for the transmission purposes. Experimental evaluation showed that significant reduction in bit-rate can be achieved by the proposed approach without loss of information relevant to surveillance applications. In addition to more optimal compression strategy, novel approaches to performing efficient motion estimation specific to surveillance videos are proposed and implemented with experimental results. A real-time background subtractor is used to detect the presence of any motion activity in the sequence. Different approaches for selective motion estimation, GOP based, Frame based and Block based, are implemented. In the former, motion estimation is performed for the whole group of pictures (GOP) only when a moving object is detected for any frame of the GOP. iii While for the Frame based approach; each frame is tested for the motion activity and consequently for selective motion estimation. The selective motion estimation approach is further explored at a lower level as Block based selective motion estimation. Experimental evaluation showed that significant reduction in computational complexity can be achieved by applying the proposed strategy. In addition to selective motion estimation, a tracker based motion estimation and fast full search using multiple reference frames has been proposed for the surveillance videos. Extensive testing on different surveillance videos shows benefits of application of proposed approaches to achieve the goals of the SCC.
APA, Harvard, Vancouver, ISO, and other styles
5

Hjelm, Emil, and Robert Yousif. "Camera Surveillance Quadrotor." Thesis, KTH, Maskinkonstruktion (Inst.), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-184491.

Full text
Abstract:
A quadrotor is a helicopter with four rotors placed at equal distance from the crafts centre of gravity, controlled by letting the different rotors generate different amount of thrust. It uses various sensors to stay stable in the air, correct readings from these sensors are therefore critical. By reducing vibrations, electromagnetic interference and external disturbances the quadrotor’s stability can increase. The purpose of this project is to analyse the feasibility of a quadrotor camera surveillance system by optimizing the handling of vibrations, video signal and external disturbances for a quadrotor. The quadrotor will be flown through first person view and should be able to hover at 10 meters altitude in a radius of 3 meters. Only sensor readings will be optimized, not data processing. The flight controller used will be a MultiWii Pro which has an accelerometer, a gyroscope, a magnetometer, a GPS and a barometer. By balancing motors and applying vibration dampening material between the motors and the frame vibrations were reduced by 73 %. Electromagnetic interference to the magnetometer was made negligible when the magnetometer had a distance of 3 cm from the power circuit. Video signal was improved by applying a LC-filter. Isolating the barometer improved calculations for the altitude. The quadrotor’s position could be locked within a radius of 4 meters and its altitude could be locked in an interval of 2 meters. The quadrotor cannot be considered stable enough for automatic camera surveillance, however with software improvement it could be.
En quadrotor är en helikopter med fyra rotorer placerade på lika avstånd från farkostens masscentrum, kontrollerad genom att låta de olika rotorerna generera olika mycket lyftkraft. Den använder sig av flera olika sensorer för att hålla sig stabil i luften, korrekt avläsning från sensorerna är därför kritiskt. Genom att reducera vibrationer, elektromagnetisk störning och externa störningar kan quadrotorns stabilitet öka. Syftet med detta projekt är att analysera möjligheten för ett quadrotorkameraövervakningssystem genom att optimera vibrationer, videosignal och externa störningar för en quadrotor. Quadrotorn ska styras genom FPV (First Person View) och kunna hovra på 10 meters höjd inom en radie av 3 meter. Endast sensorläsning kommer att optimeras, inte hantering av data. Microcontrollern som används är MultiWii Pro som har en accelerometer, ett gyroskop, en magnetometer, en GPS och en barometer. Genom att balansera motorer och lägga på vibrationsdämpande material mellan motorer och ram kunde vibrationerna minskas med 73 %. Elektromagnetisk störning på magnetometern gjordes försumbar med ett avstånd på 3 cm från kretskortet. Videosignal förbättrades genom att filtrera strömtillförseln till kamerasystemet med ett LC-filter. Isolering av barometern gjorde att höjdberäkningarna förbättrades. Quadrotorns position kunde låsas inom en radie på 4 meter och dess höjd kunde låsas inom ett intervall på 2 meter. Quadrotorn kan inte anses vara tillräckligt stabil för automatisk kameraövervakning, men med förbättring på mjukvaran skulle den kunna bli det.
APA, Harvard, Vancouver, ISO, and other styles
6

Kangin, Dmitry. "Intelligent video surveillance." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/80349/.

Full text
Abstract:
In the focus of this thesis are the new and modified algorithms for object detection, recognition and tracking within the context of video analytics. The manual video surveillance has been proven to have low effectiveness and, at the same time, high expense because of the need in manual labour of operators, which are additionally prone to erroneous decisions. Along with increase of the number of surveillance cameras, there is a strong need to push for automatisation of the video analytics. The benefits of this approach can be found both in military and civilian applications. For military applications, it can help in localisation and tracking of objects of interest. For civilian applications, the similar object localisation procedures can make the criminal investigations more effective, extracting the meaningful data from the massive video footage. Recently, the wide accessibility of consumer unmanned aerial vehicles has become a new threat as even the simplest and cheapest airborne vessels can carry some cargo that means they can be upgraded to a serious weapon. Additionally they can be used for spying that imposes a threat to a private life. The autonomous car driving systems are now impossible without applying machine vision methods. The industrial applications require automatic quality control, including non-destructive methods and particularly methods based on the video analysis. All these applications give a strong evidence in a practical need in machine vision algorithms for object detection, tracking and classification and gave a reason for writing this thesis. The contributions to knowledge of the thesis consist of two main parts: video tracking and object detection and recognition, unified by the common idea of its applicability to video analytics problems. The novel algorithms for object detection and tracking, described in this thesis, are unsupervised and have only a small number of parameters. The approach is based on rigid motion segmentation by Bayesian filtering. The Bayesian filter, which was proposed specially for this method and contributes to its novelty, is formulated as a generic approach, and then applied to the video analytics problems. The method is augmented with optional object coordinate estimation using plain two-dimensional terrain assumption which gives a basis for the algorithm usage inside larger sensor data fusion models. The proposed approach for object detection and classification is based on the evolving systems concept and the new Typicality-Eccentricity Data Analytics (TEDA) framework. The methods are capable of solving classical problems of data mining: clustering, classification, and regression. The methods are proposed in a domain-independent way and are capable of addressing shift and drift of the data streams. Examples are given for the clustering and classification of the imagery data. For all the developed algorithms, the experiments have shown sustainable results on the testing data. The practical applications of the proposed algorithms are carefully examined and tested.
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Winston. "Collaborative UAV Surveillance." OpenSIUC, 2019. https://opensiuc.lib.siu.edu/theses/2565.

Full text
Abstract:
Autonomous collaborative robotics is a topic of significant interest to groups such as the Air Force Research Lab (AFRL) and the National Aeronautics and Space Administration (NASA). These two groups have been developing systems for the operation of autonomous vehicles over the past several years, but each system has several critical drawbacks. AFRL’s Unmanned Systems Autonomy Services (UxAS) supports pathfinding for multiple tasks performed by groups of vehicles, but has no formal verification, very little physical flight time, and no concept of collision avoidance. NASA’s Independent Configurable Architecture for Reliable Operations of Unmanned Systems (ICAROUS) has collision avoidance, partial formal verification, and thousands of hours of physical flight time, but has no concept of collaboration. AFRL and NASA each wanted to incorporate the features of the other’s software into their own, and so the CRoss-Application Translator for Operational Unmanned Systems (CRATOUS) was created. CRATOUS creates a communication bridge between UxAS and ICAROUS, allowing for full feature integration of the two system. This combined software is the first system that allows for the safe and reliable cooperation of groups of unmanned vehicles.
APA, Harvard, Vancouver, ISO, and other styles
8

Halliday, J. E. B. "Animal sentinel surveillance : evaluating domestic dogs as sentinels for zoonotic pathogen surveillance." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4794.

Full text
Abstract:
The capacity of zoonotic pathogens to infect multiple hosts creates surveillance challenges but also provides opportunities to gather data from animal species that can be used to understand risks to human health. This thesis presents a conceptual and practical assessment of the utility of domestic dog serosurveillance for the detection and surveillance of two pathogens, influenza A and Leptospira spp. The first chapter gives a theoretical framework that can be used to explore the attributes of animal sentinels and assess their utility in different contexts. In subsequent chapters, this framework is applied in a practical assessment of the utility of a domestic dog serosurveillance approach for the detection and surveillance influenza A and Leptospira spp. at two sites in Africa. Two cross-sectional surveys of the avian and mammal populations at a site in Northern Cameroon were conducted in early 2006 to determine if H5N1 influenza A viruses had circulated in this area and in which species that presence could be detected. Serological and molecular evidence of extensive H5 virus circulation in the domestic duck population was identified. 47% of domestic ducks at the Maga site were cELISA positive for anti-influenza A antibodies and 20% were HI test positive against an H5N1 antigen. There was also evidence of exposure to H5 subtype viruses in the local dog and pig populations. At the Kibera site in Nairobi, a cohort study was established to carry out surveillance of influenza A and Leptospira spp. in the domestic dog population and cross-sectional surveys of the domestic poultry and rodent populations were completed. There was no indication of influenza A circulation in any of the animal species surveyed, indicating low risk of zoonotic influenza A infection in the human population of Kibera. In contrast, there was extensive molecular and serological evidence of the presence of Leptospira spp. in both the rodent and dog populations. 18% of 236 trapped rodents were PCR positive for kidney carriage of pathogenic leptospires and the estimated seroprevalence of anti- Leptospira antibodies in the dog population ranged from 5-36% during the course of the study, indicating high potential risk of leptospirosis infection in the human population. The results indicate that dog serosurveillance can be used as useful tool for the determination of broad-scale patterns of pathogen presence and relative levels of population exposure. However, there are limitations of the data that can be gathered from animal sentinels and the complexities introduced particularly by incomplete understanding of diagnostic test performance must be recognized. Animal sentinel surveillance may be of most use for addressing fundamental questions of what pathogens are present where. In the developing world particularly where disease burden data are still lacking, dog sentinel serosurveillance can provide essential baseline data that can be used to target future research and resource allocation.
APA, Harvard, Vancouver, ISO, and other styles
9

Fairchild, Geoffrey Colin. "Improving disease surveillance : sentinel surveillance network design and novel uses of Wikipedia." Diss., University of Iowa, 2014. https://ir.uiowa.edu/etd/1452.

Full text
Abstract:
Traditional disease surveillance systems are instrumental in guiding policy-makers' decisions and understanding disease dynamics. The first study in this dissertation looks at sentinel surveillance network design. We consider three location-allocation models: two based on the maximal coverage model (MCM) and one based on the K-median model. The MCM selects sites that maximize the total number of people within a specified distance to the site. The K-median model minimizes the sum of the distances from each individual to the individual's nearest site. Using a ground truth dataset consisting of two million de-identified Medicaid billing records representing eight complete influenza seasons and an evaluation function based on the Huff spatial interaction model, we empirically compare networks against the existing volunteer-based Iowa Department of Public Health influenza-like illness network by simulating the spread of influenza across the state of Iowa. We compare networks on two metrics: outbreak intensity (i.e., disease burden) and outbreak timing (i.e., the start, peak, and end of the epidemic). We show that it is possible to design a network that achieves outbreak intensity performance identical to the status quo network using two fewer sites. We also show that if outbreak timing detection is of primary interest, it is actually possible to create a network that matches the existing network's performance using 42% fewer sites. Finally, in an effort to demonstrate the generic usefulness of these location-allocation models, we examine primary stroke center selection. We describe the ineffectiveness of the current self-initiated approach and argue for a more organized primary stroke center system. While these traditional disease surveillance systems are important, they have several downsides. First, due to a complex reporting hierarchy, there is generally a reporting lag; for example, most diseases in the United States experience a reporting lag of approximately 1-2 weeks. Second, many regions of the world lack trustworthy or reliable data. As a result, there has been a surge of research looking at using publicly available data on the internet for disease surveillance purposes. The second and third studies in this dissertation analyze Wikipedia's viability in this sphere. The first of these two studies looks at Wikipedia access logs. Hourly access logs dating back to December 2007 are available for anyone to download completely free of charge. These logs contain, among other things, the total number of accesses for every article in Wikipedia. Using a linear model and a simple article selection procedure, we show that it is possible to nowcast and, in some cases, forecast up to the 28 days tested in 8 of the 14 disease-location contexts considered. We also demonstrate that it may be possible in some cases to train a model in one context and use the same model to nowcast or forecast in another context with poor surveillance data. The second of the Wikipedia studies looked at disease-relevant data found in the article content. A number of disease outbreaks are meticulously tracked on Wikipedia. Case counts, death counts, and hospitalization counts are often provided in the article narrative. Using a dataset created from 14 Wikipedia articles, we trained a named-entity recognizer (NER) to recognize and tag these phrases. The NER achieved an F1 score of 0.753. In addition to these counts in the narrative, we tested the accuracy of tabular data using the 2014 West African Ebola virus disease epidemic. This article, like a number of other disease articles on Wikipedia, contains granular case counts and deaths counts per country affected by the disease. By computing the root-mean-square error between the Wikipedia time series and a ground truth time series, we show that the Wikipedia time series are both timely and accurate.
APA, Harvard, Vancouver, ISO, and other styles
10

Rashid, Muhammad, and Mumtaz Mutarraf. "Remote Surveillance and Measurement." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2196.

Full text
Abstract:

Wireless Sensor Network (WSN), a collection of “sensor nodes” promises to change the scientist’s approach of gathering the environmental data in various fields. Sensor nodes can be used for non-stop sensing, event detection, location sensing and local control of actuators, this concept gives surety to many latest application areas like agriculture, military, home or factory automation, logistics and so on. Remote surveillance and measurement missions can be performed by using WSNs. The hot research topic now-a-days is to make such networks remotely controllable and adaptive to the environment and mission.

The work carried out in this thesis is the development of a surveillance application using TinyOS/nesC. The purpose of this application is to perform event-detection mission by using any one of the built-in sensor on Mica2 motes as well as a setup protocol is designed to make the WSN remotely controllable and adaptive to the mission. In this thesis, an experimental work is also performed using TinyDB to build up a surveillance system whose purpose is to detect and count the total number of person present at any time in a given room and to view the results at a remote place. Besides these two system applications, a comparative study between TinyDB and nesC is described which concludes that more hardware control can be achieved through nesC which is a more power efficient platform for long-term applications.

APA, Harvard, Vancouver, ISO, and other styles
11

Aasen, Thomas Aron. "Case Based Surveillance System." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15843.

Full text
Abstract:
Many problems in the field of automatic video surveillance exists today. Some have yet to be overcome. One of these problems is how a computer system automatically can determine if a situation should cause an alarm or not. To resolve this problem, the use of Case-based reasoning (CBR) is proposed. CBR is a technique that allows a system to reason about different situations and to learn from them. The aim is to produce a system that utilizes these abilities. The system should learn to recognize the situations that causes different alarms. When a situation is recognized and categorized, these false alarms can be completely avoided. This master thesis explains and shows the advantages of using such a system together with advanced image processing techniques.
APA, Harvard, Vancouver, ISO, and other styles
12

Johannsson, Hordur. "Toward autonomous harbor surveillance." Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/60167.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.
Includes bibliographical references (p. 105-113).
In this thesis we address the problem of drift-free navigation for underwater vehicles performing harbor surveillance and ship hull inspection. Maintaining accurate localization for the duration of a mission is important for a variety of tasks, such as planning the vehicle trajectory and ensuring coverage of the area to be inspected. Our approach uses only onboard sensors in a simultaneous localization and mapping setting and removes the need for any external infrastructure like acoustic beacons. We extract dense features from a forward-looking imaging sonar and apply pair-wise registration between sonar frames. The registrations are combined with onboard velocity, attitude and acceleration sensors to obtain an improved estimate of the vehicle trajectory. In addition, an architecture for a persistent mapping is proposed. With the intention of handling long term operations and repetitive surveillance tasks. The proposed architecture is flexible and supports different types of vehicles and mapping methods. The design of the system is demonstrated with an implementation of some of the key features of the system. In addition, methods for re-localization are considered. Finally, results from several experiments that demonstrate drift-free navigation in various underwater environments are presented.
by Hordur Johannsson.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
13

Herold, Fredrick W. "Total Border Security Surveillance." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605061.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California
This paper describes a system of Total Border Surveillance, which is cost effective, closes existing gaps and is less manpower intensive than the current techniques. The system utilizes a fleet of commercially available aircraft converted to unmanned capability, existing GPS and surveillance systems and autonomous ground stations to provide the desired coverage.
APA, Harvard, Vancouver, ISO, and other styles
14

Wang, Simi. "Surveillance video data fusion." Thesis, Kingston University, 2016. http://eprints.kingston.ac.uk/35593/.

Full text
Abstract:
The overall objective under consideration is the design of a system capable of automatic inference about events occurring in the scene under surveillance. Using established video processing techniques. low level inferences are relatively straightforward to establish as they only determine activities of some description. The challenge is to design a system that is capable of higher-level inference, that can be used to notify stakeholders about events having semantic importance. It is argued that re-identification of the entities present in the scene (such as vehicles and pedestrians) is an important intermediate objective, to support many of the types of higher level interference required. The input video can be processed in a number of ways to obtain estimates of the attributes of the objects and events in the scene. These attributes can then be analysed, or 'fused', to enable the high-level inference. One particular challenge is the management of the uncertainties, which are associated with the estimates, and hence with the overall inferences. Another challenge is obtaining accurate estimates of prior probabilities, which can have a significant impact on the final inferences. This thesis makes the following contributions. Firstly, a review of the nature of the uncertainties present in a visual surveillance system and quantification of the uncertainties associated with current techniques. Secondly, an investigation into the benefits of using a new high resolution dataset for the problem of pedestrain re-identification under various scenarios including occlusoon. This is done by combining state-of-art techniques with low level fusion techniques. Thirdly, a multi-class classification approach to solve the classification of vehicle manufacture logos. The approach uses the Fisher Discriminative classifier and decision fusion techniques to identify and classify logos into its correct categories. Fourthly, two probabilistic fusion frameworks were developed, using Bayesian and Evidential Dempster-Shafer methodologies, respectively, to allow inferences about multiple objectives and to reduce the uncertainty by combining multiple information sources. Fifthly, an evaluation framework was developed, based on the Kelly Betting Strategy, to effectively accommodate the additional information offered by the Dempster-Shafer approach, hence allowing comparisons with the single probabilistic output provided by a Bayesian analysis.
APA, Harvard, Vancouver, ISO, and other styles
15

Ospina, Salinas Estela. "Health surveillance of workers." THĒMIS-Revista de Derecho, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/107293.

Full text
Abstract:
In our legal system, fundamental rights to life and health of workers are important legallyprotected goods that cannot be disregarded. Therefore, the State and the   employers must put special emphasis on health and security surveillance of workers to prevent that employment relationships become an obstacle or a violation of such rights.In light of these precepts, the author makes an analysis of the protection given to these fundamental rights in our country. Basing on comparative legislation, she poses general concepts of  the State’s and the  employer´s responsibility of health and security surveillance of workers, allowing her to conclude that our system has still to confront many challenges in the path to achieve effective protection and enforcement of therights at stake.
En nuestro ordenamiento jurídico, los derechos fundamentales a la vida y la salud delos trabajadores son dos bienes jurídicos importantes y no pueden ser desconocidos. Por ello, el Estado y los empleadores deben poner especial énfasis en la vigilancia de la salud yseguridad de los trabajadores para evitar que la relación laboral sea un obstáculo o una violación de tales derechos.A la luz de ello, la autora hace un análisis de la protección de dichos derechos fundamentales en el ámbito laboral en nuestro país. Haciendo uso de legislación comparada,  presenta los conceptos generales de la vigilancia de la salud de los trabajadores y las responsabilidades del Estado y de los empleadores, permitiéndole concluir que nuestro ordenamiento aún tiene muchos retos para poder lograr una real protección y vigencia de los valores puestos en riesgo.
APA, Harvard, Vancouver, ISO, and other styles
16

Shirima, Emil. "Privacy Aware Smart Surveillance." Kent State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=kent1563281303729063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Klein, Stephen Jeffrey. "MOBILE SECURITY SURVEILLANCE UNIT." Thesis, The University of Arizona, 2009. http://hdl.handle.net/10150/192512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Garcia, Jessica. "Obesity Surveillance in Childhood." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/887.

Full text
Abstract:
Current practice behaviors for obesity management have remained refractory. Research has shown that lack of time and poor training/skills by primary care providers has led to poor or absent obesity counseling in practice. The purpose of this intervention was to facilitate obesity counseling in a pediatric office by using an evidence-based model called the 5As model of behavioral change. Lewin's change theory was the framework for this project to help clinicians transition their practice to include the 5As model in practice. The project consisted of a 30-minute power point presentation that included 2 case samples demonstrating how the 5As would be applied to each scenario. A physician and two family nurse practitioners evaluated the program via an open-ended survey on their obesity approach and thoughts on the 5As model. The results showed 100% support for the 5As model. All 3 participants stated they would implement the 5As model into practice and had positive remarks on the simplicity of its application. To help prevent clinical inertia and combat childhood obesity providers' must be made aware of the latest evidence and recommendations available to them. Project such as this one serve to merge research into clinical practice. The long-term social implications of getting the 5As into practice can help the United States meet Healthy People 2020 objectives and promote preventive care.
APA, Harvard, Vancouver, ISO, and other styles
19

Tedeschi, Francesca <1997&gt. "Mimesis and Surveillance Art." Master's Degree Thesis, Università Ca' Foscari Venezia, 2022. http://hdl.handle.net/10579/21291.

Full text
Abstract:
Partendo dalle nozioni fondamentali sul tema del mascheramento e del volto espresse da diversi critici e studiosi come Belting, Bettini, Frontisi-Ducroux, Vernant. A seguire, vi sarà sviluppata un'approfondita elaborazione sul concetto di mimesis. Il lavoro prevede l'analisi di tre case studies nell'ambito dell'arte contemporanea. Gli artisti individuati fanno parte di quella che viene definita corrente della "Surveillance Art", una critica politica ai metodi di sorveglianza sempre più presenti nelle nostre società contemporanee.
APA, Harvard, Vancouver, ISO, and other styles
20

Watt, Eliza. "Cyberspace, surveillance, law and privacy." Thesis, University of Westminster, 2017. https://westminsterresearch.westminster.ac.uk/item/q3xzx/cyberspace-surveillance-law-and-privacy.

Full text
Abstract:
The thesis titled, Cyberspace, Surveillance, Law and Privacy analyses the implications of state sponsored cyber surveillance on the exercise of the human right to privacy of communications and data privacy of individuals, subject to untargeted interception of digital communications. The principle aim of the thesis is to assess the legality of mass cyber surveillance of the Five Eyes alliance, with an emphasis on the United States and the United Kingdom. The study also considers the growing trend among the law enforcement agencies to access data without consent located in foreign jurisdictions without recourse to the Mutual Legal Assistance arrangements. The objective of the thesis is to demonstrate that these activities breach states’ human rights obligations under the international human rights frameworks and to show the unprecedented impact that surveillance technologies continue to have on this right. The research also highlights the inadequate protection of privacy in the internet. This leads to the evaluation of a number of possible legal solutions on the international level to the problem of mass surveillance, since the internet is a global environment designed for unrestricted data flows among jurisdictions and therefore facilitates continued violation of privacy of communications and data privacy. The thesis finds that bearing in mind (a) the highly politicised nature of the internet governance discourse, (b) the reluctance of states to subject peacetime espionage to international law regulation through a legally binding treaty, (c) the fact that international human rights law relating to privacy of communications is in need of modernization, (d) the reluctance of states to commit to a legally binding cyber treaty, (e) the slow pace with which customary cyber international law rules emerge and (f) the tendencies of states on the domestic level towards the introduction of draconian surveillance legislation at the expense of privacy, any progress in this regard at this stage will be piecemeal and likely to be achieved through a combination of the updating of the existing international and regional human rights and data protection instruments and soft law agreements.
APA, Harvard, Vancouver, ISO, and other styles
21

McCahill, Michael. "The surveillance web : the rise and extent of visual surveillance in a northern city." Thesis, University of Hull, 1999. http://hydra.hull.ac.uk/resources/hull:14796.

Full text
Abstract:
Surveillance is something which has always existed. In the tribal cultures of preindustrial society, for example, the level of social surveillance was intense, because most people could see and hear just about everything that was going on in the camp (McCrone, 1995). In modern industrial societies, on the other hand, bureaucratic surveillance emerged as a highly rationalised mode of information gathering in response to the size and complexity of the administrative tasks faced by the modem nation state (Giddens, 1985; Dandeker, 1990). But with the recent advance of the so-called 'information revolution', many theorists have asked whether the advent of modem video, computer and telecommunications systems have given rise to a new surveillance, qualitatively different from that which existed before (see Lyon, 1994: 40-56). The main features of the 'new surveillance' are summed up by Gary T. Marx (1988), who states that it transcends distance, time, darkness and physical barriers; it is invisible (or of low visibility), involuntary, capital rather than labour intensive, involves decentralised self-policing, introduces suspicion of whole categories of persons rather than targeting specific individuals, and is both more intensive and more extensive (Lyon, 1994: 68). As David Lyon (1993, 1994) has pointed out, in an attempt to come to grips with the New Surveillance many writers have seized upon Foucault's idea of the Panopticon as a metaphor which captures neatly some of the features of contemporary society, linking changing technologies of surveillance with the debate over the emergence of the Information Age. Most of this literature has focused on computerisation and in particular at how 'the shift from paper-based to digital documentation heralds several profound changes in the nature and extent of surveillance' (Poster, 1990; Robins and Webster, 1988; Gandy, 1993). Thus, according to these writers, the ultimate realisation of the panoptic on is facilitated by information technology which means that 'not just the prison or the factory, but the social totality, comes to function as the hierarchical and disciplinary panoptic machine' (Robins and Webster, 1988: 59). For many writers, the rise of visual surveillance systems reflects this dynamic extending the disciplinary power of the panopticon to non-institutionalised public and private spaces (Fyfe and Bannister, 1994; Reeve, 1998). A combination of modern video and telecommunications systems has extended the disciplinary potential of surveillance systems in both time and space. As a result of these technological developments surveillance is no longer confined to the enclosed and controlled settings of institutions, the direct supervision of the subject population no longer requires the physical co-presence of the observer, and images can be 'lifted out' of the immediate nexus of social control and authoritative interventions made at some future, as yet unspecified, time and place. However, the present study is not concerned solely with the novelty or otherwise of visual surveillance systems. Instead, it attempts to show how the introduction of 'new' technology fits in with 'old' social practices and with 'existing' human relations. The study begins by telling a story about Northern City and its relationship with closed-circuit television (CCTV) surveillance systems. The use of the word relationship here is important, because it implies a two-way relationship between society and technology. This approach rejects the notion that technological systems 'have some autonomous "logic" which "impacts" on cities as an external force' (Graham and Marvin, 1996: 104). Instead, it aims to show how 'individuals, social groups and institutions ... have some degree of choice in shaping the design, development and application of technologies in specific cases' (ibid: 105). This approach focuses our attention on a number of issues. For instance, how is the construction and application of 'new' technology shaped by existing local elites? Does the human mediation of technology place limits on panoptic systems? How does the introduction of new technology fit in with the existing organisational, occupational and personal concerns of those operating the systems? Does the exclusionary potential of new technology reinforce existing social divisions? These are just some of the questions to be addressed in this thesis. Chapter one reviews the current literature by locating and analysing the growth of CCTV surveillance systems in relation to the central concerns of theorists of modernity. The themes of 'time-space distanciation', 'globalisation' and 'risk' are used in an attempt to identify some of the technological, socio-economic, and political forces that are propelling the CCTV revolution. Chapter two takes us from 'grand theory' to the 'real world' by posing the following question: How did CCTV become the new 'common sense' in contemporary strategies of crime control? This question is addressed by examining the debate over the introduction of CCTV surveillance systems in one city in the North of England (Northern City). The chapter draws on various texts - interviews, council documents and a local newspaper - to show how 'new modes of governance' (Garland, 1996) in crime control created a convergence of interests in Northern City which pushed CCTV to the top of the agenda. Chapter three argues that the starting point for any attempt to understand the impact of visual surveillance systems must be to take as its object of analysis not a separate and discrete CCTV system, but a 'surveillance web'. It is shown how a combination of public and private CCTV systems linked with pager systems, panic alarms, radio links and mobile and fixed telephone networks is facilitating the development of surveillance web's which weave unseen through the fabric of contemporary cities. Chapters four to six provide detailed case studies of the construction and operation of CCTV systems in two shopping malls, the workplace, and high-rise housing schemes. Chapter seven takes us back to theory and discusses the implications of the present study for theories of time-space, surveillance and social control.
APA, Harvard, Vancouver, ISO, and other styles
22

Woo, Sang-Bum. "Formation control for cooperative surveillance." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-3203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Marcet, Ortega Marina. "Surveillance mechanisms in mammalian meiosis." Doctoral thesis, Universitat Autònoma de Barcelona, 2016. http://hdl.handle.net/10803/387429.

Full text
Abstract:
Per tal de protegir les cèl·lules germinals de sofrir inestabilitat genòmica, diversos mecanismes de control s’encarreguen de que la progressió de la meiosis sigui correcte. En mamífers, els espermatòcits que presenten defectes de recombinació o de la formació de la vesícula sexual pateixen un bloqueig a l’estadi de paquitè. Estudis previs del nostre laboratori descriuen que la via complex MRE11-ATM-CHK2 activa l’arrest dependent de recombinació en presència de trencaments de doble cadena (DSBs) no reparats. L’objectiu d’aquest treball ha estat identificar si els membres de la família p53, els quals són possibles substrats de ATM i CHK2, participen en l’activació del arrest depenent de recombinació. En una aproximació genètica, hem obtingut ratolins doble mutants portadors d’una mutació de un membre de la família p53 (p53, Tap63 o p73) en un fons defectiu per Trip13. La mutació de Trip13 causa defectes de recombinació, el qual activa l’arrest depenent de recombinació en els espermatòcits a l’estadi de paquitè. Per tant, hem estudiat com l’absència d’algun membre de la família p53 afectava aquest fenotip d’arrest el espermatòcits Trip13mod/mod. Els nostres resultats demostren que tant la deficiència de p53 com Tap63, però no p73, permeten que els espermatòcits progressin més enllà i arribin a l’estadi de paquitè tardà tot i acumular nombrosos DSBs no reparats. Addicionalment, l’absència de p53 o Tap63 resulta en una disminució del nombre d’espermatòcits apoptòtics a l’estadi de paquitè primerenc. Així, els nostres resultats indiquen que p53 i TAp63 són responsables d’activar l’arrest dependent de recombinació en els espermatòcits de ratolí. Tot i així, els espermatòcits doble mutants encara presenten un bloqueig a l’estadi de paquitè. Per tal d’estudiar si els espermatòcits doble mutants arresten a causa de l’activació de l’arrest depenent de la correcta formació de la vesícula sexual, hem analitzat la funcionalitat del MSCI en els mutants Trip13. Per tant, el fet de saltar-se l’arrest dependent de recombinació ens ha permès elucidar el paper de TRIP13 en el silenciament meiòtic, de manera que al fallar la vesícula sexual es desencadena l’apoptosi i bloqueig dels mutants Trip13. Aquests resultats infereixen que el bloqueig depenent de recombinació i el depenent de la correcta formació de la vesícula sexual, són mecanismes que s’activen per mecanismes genèticament separats. A partir de l’observació que TRIP13 és necessari per implementar el silenciament del MSCI, he dut a terme un anàlisis exhaustiu de la transcripció en els mutants de Trip13. Els nostres resultats de marcatge de RNA amb EU i activació de la RNA polimerasa II fosforilada (S2) suggereixen que la expressió de RNA en els espermatòcits mutants per Trip13 es troba incrementada en els estadis inicials de la meiosis. Addicionalment, la seqüenciació del RNA ha permès observar que els gens dels cromosomes sexuals i gens pre-meiòtics es troben sobre expressats en els mutants de Trip13, suggerint que TRIP13 és necessari per mantenir l’expressió d’aquests gens a nivells baixos. En conjunt, els resultats presentats en aquest treball contribueixen a entendre com els mecanismes de control regulen diversos passes crucials de la progressió de la profase meiòtica en els espermatòcits de mamífer.
In order to protect germinal cells from genomic instability, surveillance mechanisms ensure that meiosis occurs properly. In mammals, spermatocytes that display recombination or sex body defects experience an arrest at pachytene stage. Previous studies from our lab described that the MRE11 complex-ATM-CHK2 pathway activates the recombination-dependent arrest in the presence of unrepaired double strand breaks (DSBs). In this work we aimed to identify if p53 family members, which are putative targets of ATM and CHK2, participate in the activation of the recombination-dependent arrest. As a genetic approach, we bred double mutant mice carrying a mutation of a member of the p53 family (p53, TAp63, p73) in a Trip13 defective background. Trip13 mutation causes recombination defects, which activate the recombination-dependent arrest in pachytene-stage spermatocytes. Thus, we studied how the absence of p53 family members affected the arrest phenotype of Trip13mod/mod spermatocytes. Our data showed that p53 and TAp63 deficiency, but not p73, allowed spermatocytes to progress further into late pachynema, despite accumulating numerous unrepaired DBSs. In addition, lack of p53 or TAp63 resulted in a decrease of apoptotic spermatocytes at early pachytene stage. Therefore, our results indicate that p53 and TAp63 are responsible to activate the recombination-dependent arrest in mouse spermatocytes. Even though, double mutant spermatocytes still arrested at pachytene stage. To study if double mutant spermatocytes were arresting due to the activation of the sex body deficient arrest we analyzed MSCI functionality in Trip13 mutants. Thus, by bypassing the recombination-dependent arrest has allowed us to elucidate a role for TRIP13 protein in meiotic silencing, which consequently triggers apoptosis in double mutants at late pachytene stage due to sex body impairment. These results infer that the recombination-dependent and the sex-body deficient arrest are activated by two genetically separated mechanisms. From the observation that TRIP13 is required to implement MSCI silencing, we performed an exhaustive analysis of transcription in Trip13 mutants. Our results suggested that RNA expression in Trip13 mutants was increased in early meiotic stage spermatocytes, assessed by EU-labeling RNA and phosphorylated(S2)-RNA polymerase II. Moreover, RNA sequencing data highlighted the observation that sex chromosome genes and pre-meiotic genes are overexpressed in Trip13 mutants, suggesting that TRIP13 is required to maintain the expression of these genes at low levels. Overall, the data presented in this work contributes to the understanding on how surveillance mechanisms control several crucial steps of meiotic prophase progression in mammalian spermatocytes.
APA, Harvard, Vancouver, ISO, and other styles
24

Sümnig, Ariane. "Prospektive Surveillance der neonatalen Sepsis." [S.l.] : [s.n.], 2004. http://deposit.ddb.de/cgi-bin/dokserv?idn=972508554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Palm, Elin. "The Ethics of Workspace Surveillance." Doctoral thesis, KTH, Filosofi, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4611.

Full text
Abstract:
The general framework of this thesis is that of ethical Technology Assessment (eTA). Whereas the first essay proposes an inclusive approach to technology assessment by delineating an ethical checklist, the following essays focus on two of the checklist points, i.e. “privacy” and “control, influence and power”, in relation to workspace surveillance. The core idea of Essay I (written in collaboration with Sven Ove Hansson) is that, due to its strong social impact, new technology and novel use of existing technology should be considered from the perspective of ethics. We suggest that assessments should be conducted on the basis of nine crucial ethical aspects of technology. In Essay II an in-depth analysis of the meaning and value of privacy in the realm of work is undertaken. The meaning and value of privacy is explained as well as why it should be protected. It is argued that two dimensions of privacy should be safeguarded; “informational privacy” and “local privacy” for the reason that workers’ personal autonomy is protected thereby. Essay III is concerned with how workspace surveillance requires that job-applicants claim their privacy interests in employment negotiations to a much larger extent than what was previously the case. In most cases however, a dependency asymmetry between employer and job-candidate makes the latter ill-equipped for doing so. This asymmetry serves as the point of departure for an analysis of the conditions under which consent should be considered a criterion on moral acceptability with regard to employment contracting. The analysis suggests ways of rectifying this imbalance, raising demands on the quality of contractual consent. Essay IV discusses the extent to which it should be morally permissible for current or prospective employees to trade off their privacy in employment negotiations. The analysis starts out from, and questions, a libertarian case for voluntary self-enslavement. It is concluded that not even an orthodox libertarian can justify trade offs of a social good like liberty. Neither should employees be allowed to abstain informational privacy for the reason that such a trade-off could harm their future selves. In Essay V a dimensional analysis is proposed as a means to identify actually or potentially privacy invasive surveillance practices. It discusses ways in which different types of surveillance intrude upon employees’ privacy in order to guide the evaluation of such practice. Even though negative implications cannot be avoided altogether, by means of the proposed analysis, minimally intrusive means of monitoring can be identified.
QC 20100902
APA, Harvard, Vancouver, ISO, and other styles
26

Tyrberg, Simon. "Offshore Surveillance of Wave Buoys." Thesis, Uppsala universitet, Elektricitetslära och åskforskning, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-109559.

Full text
Abstract:
To gain further knowledge about the motion of the wave buoys involved in the Islandsberg project for wave power, a surveillance system has been designed. The base for the system consists of a lattice tower to be placed on one of two islets southwest of Lysekil: Klammerskären. The distance from the islets to the wave energy research park and the wave buoys is between 150 and 300 meters. The tower will be 12 meters high and in it a network camera will be mounted, together with a small wind turbine, two solar panels, a battery bank and equipment for communication with land. A signal cable presently dispatched in the sea near Klammerskären will be used to connect the islets to a measuring station at the nearby island of Gullholmen. All the necessary permits for the project have been acquired, all of the equipment to be used has been delivered, and the full procedures for the construction and installation of the tower and the surveillance system have been laid out. The tower however, has not yet been mounted and the system has not been tested as a whole. When completed, the tower may be used as a station for further measurements within the Islandsberg project.
APA, Harvard, Vancouver, ISO, and other styles
27

Rahman, Junaedur. "Motion Detection for Video Surveillance." Thesis, Högskolan Dalarna, Datateknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:du-3487.

Full text
Abstract:
This thesis is related to the broad subject of automatic motion detection and analysis in videosurveillance image sequence. Besides, proposing the new unique solution, some of the previousalgorithms are evaluated, where some of the approaches are noticeably complementary sometimes.In real time surveillance, detecting and tracking multiple objects and monitoring their activities inboth outdoor and indoor environment are challenging task for the video surveillance system. Inpresence of a good number of real time problems limits scope for this work since the beginning. Theproblems are namely, illumination changes, moving background and shadow detection.An improved background subtraction method has been followed by foreground segmentation, dataevaluation, shadow detection in the scene and finally the motion detection method. The algorithm isapplied on to a number of practical problems to observe whether it leads us to the expected solution.Several experiments are done under different challenging problem environment. Test result showsthat under most of the problematic environment, the proposed algorithm shows the better qualityresult.
APA, Harvard, Vancouver, ISO, and other styles
28

Mir, Amir. "Surveillance of partially observable systems." Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27716.

Full text
Abstract:
Surveillance of a partially observable system is complex. There are many systems that can be considered as partially observable due to their unknown or partially known structures or the nature of their unknown products and/or partially known results. The impacts of the consumption of genetically modified food (GM) are an example of a system that is only partially observable. The safety of genetically modified foods (GM) products has caused much controversy. Absence of sufficient and reliable information prevents neither certain confidence about the harmlessness of product consumption, nor any certain conclusion to merit a ban for fear of harm. The lack of any reliable or conclusive post-market observation and consumption effects information, make it difficult to establish a global protocol for such products. This paper introduces a model for the analysis of partially observable information from the surveillance of post-market consumption of systems such as genetically modified foods (GM) products. This model uses Markov Chains, paired with a Bayesian updating function to estimate the statistical impacts of surveillance observations and modified surveillance policies. A case study on population health status is used as an illustrative example, which is modeled to demonstrate the impact of policy interventions on simulated data. A cost decision analysis model is also applied to illustrate the impact of policy intervention costs. The model uses a first order Markov chain to estimate the period-over-period change in health status and a Bayesian updating procedure to estimate the population health status based on observations from post-market surveillance. The results show how observation samples can be used to provide information on system changes and improvements.
APA, Harvard, Vancouver, ISO, and other styles
29

Riseby, Emil, and Alexander Svensson. "Multispectral Imaging for Surveillance Applications." Thesis, Linköpings universitet, Medie- och Informationsteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-115731.

Full text
Abstract:
Silicon based sensors is a commonly used technology in digital cameras today. That has made such cameras relatively cheap and widely used. Unfortunately they are constructed to capture and represent image quality for humans. Several image applications work better without the restrictions of the visible spectrum. Human visual restrictions are often indirectly put on technology by using images showing only visible light. Thinking outside the box in this case is seeing beyond the visible spectrum.
APA, Harvard, Vancouver, ISO, and other styles
30

Glenister, Helen Mary. "Surveillance methods for hospital infection." Thesis, University of Surrey, 1991. http://epubs.surrey.ac.uk/664/.

Full text
Abstract:
Eight selective surveillance methods were assessed for their effectiveness in detecting hospital infection and the time required for data collection. The methods were compared with a reference method which was designed to identify all patients and infections in the study population (patients occupying 122 beds of a district general hospital). The selective methods were: - laboratory based ward surveillance - laboratory based telephone surveillance - ward liaison surveillance - laboratory based ward liaison surveillance - risk factor surveillance - temperature chart surveillance - treatment chart surveillance - temperature and treatment chart surveillance. The proportions of community acquired infection (CAI) and hospital acquired infection (HAI) detected by the selective surveillance methods varied; the highest proportion of CAI (70%) was identified by treatment chart surveillance, and temperature and treatment chart surveillance, and of HAI (71%), detected by laboratory based ward liaison surveillance. The time for data collection ranged from 1.5 hours/122 beds/week for laboratory based telephone surveillance to almost 8 hours for temperature and treatment chart surveillance. The time for the reference method was 22.1 hours/122 beds/week. Using the proportion of patients with HAI detected and time required for data collection to assess the methods, laboratory based ward liaison surveillance was the most effective and an efficient method. This method was revised minimally and introduced into six district general hospitals by infection control nurses. The time for data collection ranged from 4 to almost 8 hours/120 beds/week. The revision did not affect the proportion of HAI detected, however, the proportion of CAI identified was significantly reduced. The reproducibility of laboratory based ward liaison surveillance was good. The results will enable infection control teams to make an objective and rational choice of methods for the surveillance of hospital infection.
APA, Harvard, Vancouver, ISO, and other styles
31

Palm, Elin. "Ethical aspects of workplace surveillance /." Stockholm : Kungliga Tekniska högskolan, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Kerkhof, Marjon. "Barrett esophagus: improving surveillance strategies." [S.l.] : Rotterdam : [The Author] ; Erasmus University [Host], 2007. http://hdl.handle.net/1765/13304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Doeve-Edwin, Isis Abiodun. "Surveillance in familial colorectal cancer." Thesis, Imperial College London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Karoui, Mohamed, and Mohamed Karoui. "Surveillance des processus dynamiques évènementiels." Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00767048.

Full text
Abstract:
Dans le cadre de ce sujet de thèse, on s'intéresse à la surveillance des systèmes hybrides à forte dynamique événementielle. L'objectif est de détecter les défauts permanents et intermittents qui causent l'accélération et le ralentissement des tâches des systèmes. C'est dans ce contexte que se situent les principales contributions suivantes des travaux consignés dans la présente thèse : - Le développement d'une méthode de surveillance des processus basée sur les automates hybrides linéaires (AHL). Cette méthode consiste en premier lieu à l'établissement du modèle AHL du système dynamique en tenant compte des contraintes physiques et dynamiques de celui-ci. - La réalisation d'une analyse d'atteignabilité qui consiste à définir toutes les trajectoires pouvant amener le système à son objectif tout en respectant le cahier des charges qui lui est imposé. L'extension de l'approche en utilisant les automates hybrides rectangulaires. Cette sous-classe d'automates nous a permis de modéliser des systèmes plus complexes donc une modélisation hybride riche et a permis également une analyse formelle. Cette partie a été ponctuée par l'implémentation du système de surveillance qui consiste à déterminer les équations caractérisant chaque sommet de l'automate qui modélise le système.
APA, Harvard, Vancouver, ISO, and other styles
35

Owens, Jonathan. "Neural networks for video surveillance." Thesis, University of Sunderland, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.251141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zhou, Y. "Analysing large-scale surveillance video." Thesis, University of Liverpool, 2018. http://livrepository.liverpool.ac.uk/3024330/.

Full text
Abstract:
Analysing large-scale surveillance video has drawn signi cant attention because drone technology and high-resolution sensors are rapidly improving. The mobility of drones makes it possible to monitor a broad range of the environment, but it introduces a more di cult problem of identifying the objects of interest. This thesis aims to detect the moving objects (mostly vehicles) using the idea of background subtraction. Building a decent background is the key to success during the process. We consider two categories of surveillance videos in this thesis: when the scene is at and when pronounced parallax exists. After reviewing several global motion estimation approaches, we propose a novel cost function, the log-likelihood of the student t-distribution, to estimate the background motion between two frames. The proposed idea enables the estimation process to be e cient and robust with auto-generated parameters. Since the particle lter is useful in various subjects, it is investigated in this thesis. An improvement to particle lters, combining near-optimal proposal and Rao-Blackwellisation, is discussed to increase the e ciency when dealing with non-linear problems. Such improvement is used to solve visual simultaneous localisation and mapping (SLAM) problems and we call it RB2-PF. Its superiority is evident in both simulations of 2D SLAM and real datasets of visual odometry problems. Finally, RB2-PF based visual odometry is the key component to detect moving objects from surveillance videos with pronounced parallax. The idea is to consider multiple planes in the scene to improve the background motion estimation. Experiments have shown that false alarms signi cantly reduced. With the landmark information, a ground plane can be worked out. A near-constant velocity model can be applied after mapping the detections on the ground plane regardless of the position and orientation of the camera. All the detection results are nally processed by a multi-target tracker, the Gaussian mixture probabilistic hypothesis density (GM-PHD) lter, to generate tracks.
APA, Harvard, Vancouver, ISO, and other styles
37

Green, Jonathan. "Testing nocturnal arachnid surveillance systems." Thesis, University of Nottingham, 2015. http://eprints.nottingham.ac.uk/29457/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Rieutort, Delphine. "Développement de la surveillance observationnelle." Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAS015/document.

Full text
Abstract:
L'impact de la population sur l'environnement et celui de l'environnement sur la santé humaine est indéniable et représente depuis les années 2000 de réels enjeux de Santé Publique. Il a été constaté en outre des augmentations de prévalence de cancer, de maladies respiratoires ou encore des troubles de la reproduction, dont les origines multifactorielles sont de plus en plus suspectées. Dans ce contexte, la surveillance est devenue un outil indispensable à la prise de décision en santé publique, et les réseaux de surveillances des évènements sanitaires se sont multipliés, donnant naissance à de nombreuses bases de données, parfois massives, dont les utilisations sont encore limitées.L'objectif de ces travaux de thèse était de développer un nouveau concept de surveillance, la Surveillance Observationnelle (SO), permettant une utilisation optimale des bases de données observationnelles, généralisable à différentes bases et problématiques, et pouvant tenir compte des informations multiples qu'elles contiennent.La SO est basée sur la méthode de l'exposome, ayant pour but de restructurer les données sous forme de réseau, permettant ainsi l'étude des associations entre les informations mais également l'étude de leur structure. Il a alors été développé plusieurs indicateurs permettant d'étudier à la fois les différentes associations d'informations recrutées au sein d'une base de données pour un évènement de santé, mais également d'étudier l'évolution de leur structure dans le temps par un suivi dynamique, ces indicateurs permettant de générer la signature unique d'un évènement de santé : le spectre. Un outil, appelé « Observational Surveillance Analysis » (OSA) permettant l'utilisation en routine de la méthodologie a également été développé dans la plateforme R, permettant une automatisation et une standardisation des résultats.Des exemples d'applications ont permis d'illustrer le déroulement de l'analyse de la SO ainsi que sa portabilité et adaptabilité au contexte et à la problématique. Trois applications sont basées sur les données du Réseau National de Vigilance et de Prévention des Pathologies Professionnelles (RNV3P) : le cancer de la vessie, l'asthme et enfin le lymphome non hodgkinien. Trois autres applications sont basées sur la base de données du groupe de médecins du travail Belge IDEWE : les douleurs à la gorge, les aides-soignants et les agriculteurs.Grâce aux différentes applications, il a été démontré la portabilité de la méthodologie de la SO à des bases de données différentes, mais également à des configurations d'analyse différentes, pathologie/expositions ou activité/expositions. De plus, l'outil « OSA » qui a été développé permet une utilisation facilitée pour l'analyse en routine des données et pourrait à terme être intégré dans un réseau de surveillance déjà existant
Impact of population on the environment, and conversely, is obvious and represents a real challenge for Public Health since 2000. It has been shown an increase in cancer prevalence, respiratory disease or even reproductive disorders, for which multifactorial origins are strongly suspected. In this context, surveillance has become an essential tool to decision making in public health, and surveillance networks of health events are multiplying, giving rise to numerous databases (sometimes considered as “big data”), still poorly used.Objective of this thesis work was to develop a new concept of surveillance, the Observational Surveillance (OS). This allows an optimal use of observational databases, extendable to different kind of databases and problematics, taking into account various multiple information available.OS is based on the exposome approach, to restructure data as a network, allowing the study of associations between information and also their structure. In this purpose, several indicators have been developed to study in the meantime the different recruited association for an event of interest, but also the evolution of their structure over time. These indicators allow generating the unique signature of the event: the spectrum. A tool, named “Observational Surveillance Analysis” (OSA), allowing the routine use of methodology, has been developed in the R platform, which permits automation and standardization of results.Applications were used to illustrate the OS analysis and its portability and adaptability to different context and problematic. Three applications are based on the French National Occupational Diseases Surveillance and Prevention Network (RNV3P): bladder cancer, asthma and non-Hodgkin lymphoma. Three other applications are based on the Belgium occupational physicians group IDEWE: sore throat, caregivers and farmers.Thanks to different applications, it has been demonstrated the portability of the OS methodology to different databases, and also, to different analysis configuration, disease/exposures or activity/diseases. Furthermore, the “OSA” tool which has been developed, allows an easier use to routine analysis and, in the end, could be integrated in an existing surveillance network
APA, Harvard, Vancouver, ISO, and other styles
39

Karoui, Mohamed. "Surveillance des processus dynamiques évènementiels." Thesis, Grenoble, 2011. http://www.theses.fr/2011GRENT110/document.

Full text
Abstract:
Dans le cadre de ce sujet de thèse, on s'intéresse à la surveillance des systèmes hybrides à forte dynamique événementielle. L'objectif est de détecter les défauts permanents et intermittents qui causent l'accélération et le ralentissement des tâches des systèmes. C'est dans ce contexte que se situent les principales contributions suivantes des travaux consignés dans la présente thèse : - Le développement d'une méthode de surveillance des processus basée sur les automates hybrides linéaires (AHL). Cette méthode consiste en premier lieu à l'établissement du modèle AHL du système dynamique en tenant compte des contraintes physiques et dynamiques de celui-ci. - La réalisation d'une analyse d'atteignabilité qui consiste à définir toutes les trajectoires pouvant amener le système à son objectif tout en respectant le cahier des charges qui lui est imposé. L'extension de l'approche en utilisant les automates hybrides rectangulaires. Cette sous-classe d'automates nous a permis de modéliser des systèmes plus complexes donc une modélisation hybride riche et a permis également une analyse formelle. Cette partie a été ponctuée par l'implémentation du système de surveillance qui consiste à déterminer les équations caractérisant chaque sommet de l'automate qui modélise le système
As part of this thesis, we focus on the monitoring of hybrid systems with high dynamic event. The aim is to detect faults that cause permanent and intermittent acceleration and deceleration systems tasks. It is in this context that the following are the main contributions of the work reported in this thesis: - The development of a method for process monitoring based on linear hybrid automata (AHL). This method involves first the establishment of the AHL model the dynamic system taking into account the physical and dynamic one. - The realization of a reachability analysis of defining all paths that can cause the system to its target while respecting the specifications imposed on it. The extension of the approach using the rectangular hybrid automata. This class of controllers has allowed us to model more complex systems, therefore, a hybrid modeling rich and also allowed a formal analysis. This part was punctuated by the implementation of the monitoring system by determining equations characterizing each summit of the automaton that models the system
APA, Harvard, Vancouver, ISO, and other styles
40

Johansson, Fredrik. "Deniable Messaging Under Strong Surveillance." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231834.

Full text
Abstract:
In today’s society, people are more aware of the need for encryption to keep their private information safe. Therefore chat apps like WhatsApp and Signal are popular since they allow people to talk encrypted over instant messaging. However, normal encryption might not always be enough to keep the data safe. An adversary who can record and keep a transcript of everything a person sends over the Internet, could force the person to reveal the key used for encryption and therefore know what they sent. OTPKX is a protocol that prevents this with the help of deniable encryption, by giving a user the ability to create a fake message and key to show to the adversary. This thesis continues the work to create a protocol that gives deniability against an adversary that can record everything, force both sender and receiver to reveal their keys, and also have access to both devices. The protocol proposed in this thesis uses One Time Pad for encryption and for creating fake keys. A user creates both a real message, a fake message, combines them, and sends them to the receiver. Then both users have access to the fake message and can therefore both create the same fake key. The original key used for encryption is then replaced with the fake key and the fake message is stored on the device. No evidence of the real message or key is stored, and the fake data is the same at the sender and receiver. We find that our protocol is Indistinguishably under Chosen-CiphertextsAttack and provides Integrity of CipherTexts and therefore gives integrity and confidentiality. The protocol also gives users deniability so that they are protected against all attacker models in this thesis. The deniability could fail if an attacker has a keylogger on a users device or if the attacker has access to a device without the user knowing about it. The proof of concept implementation showed that it is possible to implement the protocol and have the same security and deniability at the cost of some performance. The biggest performance cost was replacing the original key with the fake key, which took most of the time when encrypting and decrypting. The total time for sending a message was around 40ms on a new device and around 620ms on an older device, receiving a message also took around 40ms on a new device and around 780ms on an older device. Normal Symmetric encryption takes about 1ms, which is much faster than our implementation. However in practice we do not believe this increase in time to be noticeable.
I dagens samhälle är människor mer medvetna om vikten att använda kryptering för att skydda sin privata information. Därför har chatt-appar som WhatsApp och Signal blivit mer populära eftersom de erbjuder möjligheten att kryptera alla meddelande man skickar. Detta räcker inte alltid dock för att skydda den dataman skickar, en motståndare som har förmågan att spara alla meddelande en användare skickar och som kan tvinga användaren att ge bort nyckeln som använts vid kryptering, då räcker inte alltid normal kryptering. I OTPKX rapporten kom de på ett protokoll som skyddar användaren mot en som motståndare med hjälp av deniable encryption, vilket ger användaren möjligheten att skapa en falsk nyckel vilket gör så att motståndaren ser ett falskt meddelande. Denna rapport bygger vidare på OTPKX protokollet för att skydda användare mot en motståndare som kan spara alla meddelande som skickas, tvinga både skickare och mottagare att ge bort krypteringsnycklarna och har tillgång till bådas enheter. Protokollet i denna rapport använder sig av OTP för kryptering och för att skapa falska nycklar. En användare skapar både ett riktigt och ett falskt meddelande och sätter ihop dem och skickar det tillmottagaren. Då har båda parterna både det riktiga och falskameddelandet och kan därför skapa samma falska nyckel att visamotståndaren. Den orginala krypteringsnyckeln byts ut mot den falska och det falskameddelandet sparas på enheterna. Utifrån resultaten såg vi att våra protokoll ger Indistinguishably under Chosen-CiphertextsAttack och ger Integrity ofCipherTexts, vilket betyder att protokollen ger integritet och konfidentialitet. Protokollen skyddar användare mot motståndaren i rapporten. En användares deniability kan misslyckas om en motståndare skulle installera en key-logger på användarens enhet eller om motståndaren har tillgång till en användares enhet utan att användaren vet om det. Implementationen visade att protokollet går att implementeras och att den fortfarande ger samma säkerhet och deniability i verkligheten på kostnad av prestanda. Att byta ut den orignala nyckeln mot den falska nyckeln var den del som tog mest tid och försämrade prestandan mest.Den totala tiden det tog för att skicka ett meddelande på en ny enhet var ungefär 40ms och tog ungefär 620 på en äldre enhet. Att ta emot ett meddelande tog ungefär 40ms på en ny enhet och ungefär 780ms på en äldre enhet. Normal symmetrisk kryptering tar ungefär 1ms, vilket är mycket snabbare än vår implementation. Men i praktiken så anser vi inte att ökningen i tid för vår implementation är märkbar.
APA, Harvard, Vancouver, ISO, and other styles
41

Laref, Laure. "La surveillance en droit pénal." Thesis, Limoges, 2020. http://www.theses.fr/2020LIMO0043.

Full text
Abstract:
La surveillance entretient avec le droit pénal des liens séculaires, leur combinaison permettant de satisfaire les objectifs poursuivis par la justice pénale, à savoir la prévention et la répression des infractions. Les nouvelles technologies, en facilitant la mise en oeuvre d’une surveillance distanciée mais néanmoins toujours plus précise, ont incontestablement conforté l’intérêt de leur accointance. Ce constat se vérifie au regard de la surveillance situationnelle qui permet une gestion pénale des espaces comme à l’endroit de la surveillance comportementale qui facilite la gestion pénale des conduites. La surveillance situationnelle, celle qui mobilise l’espace pour lui octroyer une fonction punitive ou qui, au contraire, se déploie afin de prévenir les menaces qu’il recèle, se manifeste en milieu fermé comme en milieu ouvert, la surveillance électronique estompant les limites - résiduelles - qui peuvent subsister entre ces deux espaces. La surveillance comportementale, celle qui permet aux autorités d’affiner la gestion pénale des conduites des citoyens, et plus encore des individus aux prises avec la justice, tend aujourd’hui à pénétrer tant leur corps que leur « être » afin de renforcer l’efficacité des dispositifs employés. La juxtaposition de ces deux formes de surveillance pénale - situationnelle et comportementale - appelle la vigilance des plus hautes instances et juridictions protectrices des Droits de l’homme en raison des craintes et des dérives qu’elle suscite. Pourtant, ces dernières peinent à trouver un équilibre satisfaisant dans l’équation qui se joue entre la préservation des droits et libertés de chacun et les finalités poursuivies par le droit pénal, d’autant que ces dernières, réévaluées à l’aune de la notion de dangerosité, postulent plus que jamais le développement de la surveillance
Surveillance has secular links with criminal law, their combination making it possible to meet the objectives pursued by criminal justice, namely the prevention and repression of offenses. New technologies, by facilitating the implementation of remote monitoring but nevertheless always more precise, have undoubtedly reinforced the interest of their acquaintance. This observation is confirmed with regard to situational surveillance which allows for penal management of spaces as well as for behavioral surveillance which facilitates penal management of conduct. Situational surveillance, that which mobilizes space to grant it a punitive function or which, on the contrary, deploys to prevent the threats it conceals, manifests itself in closed as well as in open environments, electronic surveillance blurring the limits - residual - which may exist between these two spaces. Behavioral surveillance, that which allows the authorities to refine the criminal management of the conduct of citizens, and even more so of individuals grappling with justice, today tends to penetrate both their body and their "being" in order to strengthen effectiveness of the devices used. The juxtaposition of these two forms of criminal surveillance - situational and behavioral - calls for the vigilance of the highest bodies and jurisdictions protecting human rights because of the fears and excesses that it arouses. However, the latter are struggling to find a satisfactory balance in the equation that is played out between the preservation of individual rights and freedoms and the purposes pursued by criminal law, especially since the latter, reassessed in the light of the concept of dangerousness, postulate more than ever the development of surveillance
APA, Harvard, Vancouver, ISO, and other styles
42

MEIN, MIREILLE. "Surveillance acoustique de moteurs diesel." Le Mans, 1997. http://www.theses.fr/1997LEMA1008.

Full text
Abstract:
L'objectif de ce travail est de determiner la faisabilite d'une surveillance acoustique des diesels de secours des centrales nucleaires. Les principales difficultes de cette etude proviennent de la non-stationnarite des signaux acoustiques a traiter, et de la forte reverberation des locaux. Le choix d'une approche acoustique, a caractere novateur, est justifie par le retour d'experience de ces materiels et par l'attrait d'un systeme base sur une instrumentation simple. En effet, un certain nombre de defauts types sont detectes de facon auditive par le personnel de service, ce qui laisse presager de l'efficacite d'un systeme de surveillance acoustique base sur une instrumentation restreinte et non intrusive. Le recensement des defauts rencontres sur ces materiels a permis de degager trois systemes interessant la surveillance acoustique : la distribution (culbuterie, soupapes), l'injection (injecteurs, pompes a injection) et la suralimentation (turbo-compresseurs, collecteurs d'echappement). La caracterisation de defauts a ete entreprise par analyse de signaux acoustiques enregistres sur des moteurs : des campagnes de mesures ont ete menees sur des diesels en exploitation sur site nucleaire ou sur banc d'essai constructeur. L'analyse des signaux acoustiques enregistres a proximite des sources defaillantes a permis la caracterisation partielle de dereglage de jeux aux culbuteurs. Un systeme de detection automatique base sur une demarche de type reconnaissance des formes a ete mis au point pour la detection de quatre dereglages differents des jeux aux culbuteurs ; il presente de bonnes performances de reconnaissance independamment du cylindre affecte, et on montre qu'il est transposable sur un autre moteur. On peut envisager a partir de ce systeme, l'implantation sur site d'une maquette de surveillance temps reel utilisant un microphone mobile sur chaque rangee de cylindres. D'autres perspectives sont proposees pour la surveillance acoustique, avec en particulier la simulation en conditions reelles de defauts de type additifs tels que ceux pouvant affecter le systeme de suralimentation (detonation, fuite). Cette possibilite pourra etre exploitee pour l'elaboration d'un systeme de surveillance complementaire utilisant des capteurs fixes places au dessus du moteur.
APA, Harvard, Vancouver, ISO, and other styles
43

Ford, Michael K., and LeRoy P. Dennis. "The wireless ubiquitous surveillance testbed." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1124.

Full text
Abstract:
Approved for public release; distribution is unlimited
This thesis research examines the emergence of surveillance and biometrics technologies as a sensible baseline for building a ubiquitous surveillance testbed for the Naval Postgraduate School. This thesis also defines what ubiquitous surveillance is, employs biometric applications and technical strategies to build a working testbed, and addresses developmental issues surrounding the hypothesis for a ubiquitous surveillance testbed. The authors conducted several evaluations of the testbed using different scenarios and recommend emerging biometric and surveillance technologies to promote the maturation of the testbed into a premier ubiquitous habitat.
Lieutenant, United States Navy
Lieutenant, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
44

Schumann, Axel. "Airborne ubiquitous surveillance and monitoring." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1349.

Full text
Abstract:
Approved for public release; distribution is unlimited
The thesis research examines the emergence of wireless technology as a pragmatic baseline supporting the goals of the Department of Defense developing towards Network Centric Forces. Increased international attention to the field of surveillance has developed parallel to the desire to interconnect all possible friendly forces in military operations and the Global War on Terror (GWOT). Ubiquitous surveillance is accomplished by prototyping a network node that is then integrated on board of a military type unmanned aerial vehicle (UAV). Although the commercial off the shelf network solution itself is broadly deployed, little is known so far how to operate and manage an airborne surveillance network node. The author shows that the use of unmanned aerial vehicles for networking purposes is not only possible but also manageable, even with remote operation of the unmanned aerial vehicle. The documented experiments over three generations of prototypes give insight about possibilities of how network infrastructure independence for the purpose of surveillance can be reached.
Kapitänleutnant, Federal German Navy
APA, Harvard, Vancouver, ISO, and other styles
45

Alqaan, Hani. "Automatic pipeline surveillance air-vehicle." Thesis, Cranfield University, 2016. http://dspace.lib.cranfield.ac.uk/handle/1826/9876.

Full text
Abstract:
This thesis presents the developments of a vision-based system for aerial pipeline Right-of-Way surveillance using optical/Infrared sensors mounted on Unmanned Aerial Vehicles (UAV). The aim of research is to develop a highly automated, on-board system for detecting and following the pipelines; while simultaneously detecting any third-party interference. The proposed approach of using a UAV platform could potentially reduce the cost of monitoring and surveying pipelines when compared to manned aircraft. The main contributions of this thesis are the development of the image-analysis algorithms, the overall system architecture and validation of in hardware based on scaled down Test environment. To evaluate the performance of the system, the algorithms were coded using Python programming language. A small-scale test-rig of the pipeline structure, as well as expected third-party interference, was setup to simulate the operational environment and capture/record data for the algorithm testing and validation. The pipeline endpoints are identified by transforming the 16-bits depth data of the explored environment into 3D point clouds world coordinates. Then, using the Random Sample Consensus (RANSAC) approach, the foreground and background are separated based on the transformed 3D point cloud to extract the plane that corresponds to the ground. Simultaneously, the boundaries of the explored environment are detected based on the 16-bit depth data using a canny detector. Following that, these boundaries were filtered out, after being transformed into a 3D point cloud, based on the real height of the pipeline for fast and accurate measurements using a Euclidean distance of each boundary point, relative to the plane of the ground extracted previously. The filtered boundaries were used to detect the straight lines of the object boundary (Hough lines), once transformed into 16-bit depth data, using a Hough transform method. The pipeline is verified by estimating a centre line segment, using a 3D point cloud of each pair of the Hough line segments, (transformed into 3D). Then, the corresponding linearity of the pipeline points cloud is filtered within the width of the pipeline using Euclidean distance in the foreground point cloud. Then, the segment length of the detected centre line is enhanced to match the exact pipeline segment by extending it along the filtered point cloud of the pipeline. The third-party interference is detected based on four parameters, namely: foreground depth data; pipeline depth data; pipeline endpoints location in the 3D point cloud; and Right-of-Way distance. The techniques include detection, classification, and localization algorithms. Finally, a waypoints-based navigation system was implemented for the air- vehicle to fly over the course waypoints that were generated online by a heading angle demand to follow the pipeline structure in real-time based on the online identification of the pipeline endpoints relative to a camera frame.
APA, Harvard, Vancouver, ISO, and other styles
46

Varin, Andre Carleton University Dissertation Engineering Electrical. "A wideband microwave surveillance receiver." Ottawa, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Palm, Elin. "The ethics of workspace surveillance /." Stockholm : Filosofi och teknikhistoria, Kungliga Tekniska högskolan, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4611.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tran, Son Dinh. "Robust techniques for visual surveillance." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8550.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.
Thesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
49

Dennis, LeRoy P. Ford Michael K. "The wireless ubiquitous surveillance testbed /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FDennis.pdf.

Full text
Abstract:
Thesis (M.S. in Information Systems and Operations)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Alex Bordetsky, Randy J. Hess. Includes bibliographical references (p. 101-105). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
50

Rafi, Murtaza. "Biomechanics of AAA surveillance patients." Thesis, KTH, Hållfasthetslära (Inst.), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264765.

Full text
Abstract:
Abdominal aortic aneurysms (AAA) occurs due to local enlargement of the abdominal aorta and affects about 1-2 % of the elderly Swedish population. At admission, AAA patients receive a Computed Tomography-Angiography (CT-A) scanning, and later they are followed-up by 2D ultrasound examinations. There is a need to know if an adequate geometry can be constructed from the baseline CT-A scan and follow-up 2D ultrasounds. To test our hypothesis only CT-A images have been used from six patients and hypothetical ultrasound cross-sections (HUCS) were extracted from the follow-up CT-A scans. The baseline AAA surface was expanded in a mechanical model by applying pressure inside of it until it reached the HUCS. The obtained morphed geometries were then compared with the CT-A-based geometries. The discrepancy between them were calculated by distance measurements. Also, the rupture risk indicators volumes and stresses were compared. Finally, a sensitivity analysis studied the effect of HUCS positioning on the volumes and stresses. The results show that an adequate geometry can be constructed by the investigated concept of morphing. The average distances between the morphed and CT-A-based geometries are 2-4 mm. The average volume difference for the six patients are between 3.8-16.2 %. The wall stress for the morphed and CT-A-based geometries are close only for the first follow-up.
Bukaortaaneurysm (AAA) uppstår på grund av lokal förstoring av bukaortan och drabbar 1-2 % av den äldre svenska befolkningen. Vid antagning får bukaortaaneurysm-patienterna en datortomografscanning (CT-A) och senare påföljs av 2D ultraljudsscanningar. Det finns ett behov att veta om en adekvat geometri kan konstrueras från datortomografiscanningen och 2D ultraljudsbilderna. För att testa vår hypotes har endast datortomografibilder från sex patienter använts med hypotetiska ultraljudstvärsnitt (HUCS) tagna från CT-A uppföljningarna. AAA-ytan vid baslinjen expanderades i en strukturmekanisk modell genom inre övertryck tills den nådde de hypotetiska ultraljudstvärsnitten. Därefter jämfördes de morfade geometrierna med de CT-A-baserade geometrierna. Geometriavvikelsen mellan de beräknades genom avståndsmätningar. Även, rupturriskindikatorerna volymer och spänningar jämfördes. Slutligen, genom en känslighetsanalys undersöktes effekten av positioneringen av hypotetiska ultraljudstvärsnitten på volymerna och spänningarna. Resultaten visar att en adekvat geometri kan konstrueras genom den undersökta koncepten av morfning. De genomsnittliga avstånden mellan de morfade och CT-A-baserade geometrierna är 2-4 mm. Genomsnittliga volymskillnaderna för de sex patienterna är mellan 3.8-16.2 %. Väggspänningarna för de morfade och CT-A-baserade geometrierna är nära enbart för den första uppföljningen.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography