Rozprawy doktorskie na temat „Electronic surveillance in literature”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Electronic surveillance in literature”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Akram, Muhammad. "Surveillance centric coding". Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/2320.
Pełny tekst źródłaFernandez, Arguedas Virginia. "Automatic object classification for surveillance videos". Thesis, Queen Mary, University of London, 2012. http://qmro.qmul.ac.uk/xmlui/handle/123456789/3354.
Pełny tekst źródłaZhou, Han, i 周晗. "Intelligent video surveillance in a calibrated multi-camera system". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45989217.
Pełny tekst źródłaMargolis, David. "An analysis of electronic surveillance in the USAPATRIOT act". Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/776.
Pełny tekst źródłaBachelors
Health and Public Affairs
Legal Studies
O'Malley, Patrick D. "Human activity tracking for wide-area surveillance". [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000150.
Pełny tekst źródłaTitle from title page of source document. Document formatted into pages; contains vi, 46 p.; also contains graphics. Includes vita. Includes bibliographical references.
Richard, Julie Ann. "On Dystopias| Do We Live in a Surveillance State?" Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10601160.
Pełny tekst źródłaThe technological advances in surveillance over the past 20 years have been astounding and are used in both the private and public sectors progressively each day. The extent of technological advances and the impact on our society seem almost reflective of something out of a work of science fiction. This study involves a qualitative content analysis of three early 20th century dystopian novels and news articles from newspapers such as The Guardian, that display current events pertaining to surveillance, including NSA surveillance methods leaked by Edward Snowden. The study relies upon macro sociological constructs, specifically formal social control to explain the social control imposed by our current government with the use of surveillance methods. Upon examination of the novels and news articles, it is revealed that there is a parallel between the novels and our current society which suggests that we live in a surveillance state. The importance of this study is to educate the public on data collection, analysis, and storage involved in the surveillance process. By showing that our current society is a surveillance state, this study expresses the importance of safeguarding our privacy, liberties, and civil rights as a means of reducing governmental social control.
Adams, Andrew J. "Multispectral persistent surveillance /". Online version of thesis, 2008. http://hdl.handle.net/1850/7070.
Pełny tekst źródłaChappuies, Margaret R. Chappuies. "Surveillance and Narrative Authority in Villette". University of Toledo Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=uthonors1513263903293044.
Pełny tekst źródłaMedeme, Narasimha Rao. "Application of vehicle identification techniques in transportation surveillance with focus on security /". free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1426087.
Pełny tekst źródłaKarlsson, David. "Electronic Data Capture for Injury and Illness Surveillance : A usability study". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-102737.
Pełny tekst źródłaHussey, Phillip Ryan. "The Evolution of Electronic Surveillance: Balancing National Security and Civil Liberties". unrestricted, 2007. http://etd.gsu.edu/theses/available/etd-06152007-110824/.
Pełny tekst źródłaTitle from file title page. Robert Howard, thesis advisor. Electronic text (50 p.) : digital, PDF file. Description based on contents viewed Jan 17, 2008. Includes bibliographical references (p. 48-50).
Benson, Etienne Samuel. "The wired wilderness : electronic surveillance and environmental values in wildlife biology". Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/43219.
Pełny tekst źródłaIncludes bibliographical references.
In the second half of the twentieth century, American wildlife biologists incorporated Cold War-era surveillance technologies into their practices in order to render wild animals and their habitats legible and manageable. One of the most important of these was wildlife radio-tracking, in which collars and tags containing miniature transmitters were used to locate individual animals in the field. In addition to producing new ecological insights, radio-tracking served as a site where relationships among scientists, animals, hunters, animal rights activists, environmentalists, and others involved in wildlife conservation could be embodied and contested. While scholars have tended to interpret surveillance technologies in terms of the extension of human control over nature and society, I show how technological, biological, and ecological factors made such control fragmentary and open to reappropriation. Wildlife radio-tracking created vulnerabilities as well as capabilities; it provided opportunities for connection as well as for control. I begin by showing how biologists in Minnesota and Illinois in the early 1960s used radio-tracking to establish intimate, technologically-mediated, situated relationships with game animals such as ruffed grouse, which they hoped would bolster their authority vis-a-vis recreational hunters. I then show how the technique was contested by environmentalists when biologists applied it to iconic "wilderness wildlife" such as grizzly bears in Yellowstone National Park in the 1960s and 1970s. One way for biologists to render radio-tracking acceptable in the face of such opposition was to emphasize its continuity with traditional practices, as they did in a radio-tagging study of tigers in Nepal in the 1970s.
(cont.) Another way was to shift to less invasive techniques of remote sensing, such as the bioacoustic surveys of bowhead whales off Alaska's Arctic coast that were conducted in the 1980s after a proposal to radio-tag whales was rejected by marine mammalogists and Ifiupiat whalers. Finally, wildlife biologists could reframe radio-tracking as a means for popular connection rather than expert control, as they did by broadcasting the locations of satellite-tagged albatrosses to schoolchildren, gamblers, and the general public via the Internet in the 1990s and early 2000s.
by Etienne Samuel Benson.
Ph.D.in History, Anthropology, and Science, Technology and Society (HASTS
Michaud, Mario. "Supervision d'une éolienne par Internet". Thèse, Chicoutimi : Rimouski : Université du Québec à Chicoutimi ; Université du Québec à Rimouski, 2006. http://theses.uqac.ca.
Pełny tekst źródłaLa p. de t. porte en outre: Mémoire de recherche présenté à l'Université du Québec à Rimouski comme exigence partielle du programme de maîtrise en ingénierie pour l'obtention du grade ès sciences appliquées (M.Sc.A.). CaQCU Bibliogr.: f. [125]. Document électronique également accessible en format PDF. CaQCU
McClure, Bruce Davis. "Design of an adaptive computing architecture for managing interactions in heterogeneous defence networks /". [St. Lucia, Qld.], 2002. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe17146.pdf.
Pełny tekst źródłaIp, Wai Ho. "Am I being watched on the internet?: examining user perceptions of privacy, stress and self-monitoring under online surveillance". HKBU Institutional Repository, 2013. https://repository.hkbu.edu.hk/etd_oa/26.
Pełny tekst źródłaChia, Leigh Stephen. "The novel as panopticon : exploring surveillance". Thesis, University of Northampton, 2012. http://nectar.northampton.ac.uk/8852/.
Pełny tekst źródłaYuk, Shun-cho Jacky, i 郁順祖. "Adaptive video defogging base on background modeling". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/208174.
Pełny tekst źródłapublished_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Leite, A. "Near real-time vaccine safety surveillance using United Kingdom electronic health records". Thesis, London School of Hygiene and Tropical Medicine (University of London), 2018. http://researchonline.lshtm.ac.uk/4649039/.
Pełny tekst źródłaLi, Gang. "A Holistic Study on Electronic and Visual Signal Integration for Efficient Surveillance". The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1492639972377528.
Pełny tekst źródłaLi, Mo. "Building sensor network surveillance systems : on the applicability /". View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?CSED%202009%20LIMO.
Pełny tekst źródłaYeung, Alex Tak Lok. "A competitive analysis of digital video surveillance products' manufacturers in Asia Pacific region". access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?msc-meem-b1991300xa.pdf.
Pełny tekst źródłaTitle from title screen (viewed on Jan. 10, 2006) "A dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering Management." Includes bibliographical references.
Ulkemen, Sinan Bland Robert L. "The impact of surveillance technology on the behaviors of municipal police departments". [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12209.
Pełny tekst źródłaBras, Johan J. "A simulation of the single scan accuracy of a two-dimensional pulsed surveillance radar". Master's thesis, University of Cape Town, 1991. http://hdl.handle.net/11427/8460.
Pełny tekst źródłaThe following dissertation considers the single-scan two-dimensional positional accuracy of a pulsed surveillance radar. The theoretical aspects to the positional accuracy are considered and a generalized analytical approach is presented. Practical position estimators are often complex, and theoretical predictions of their performance generally yield unfriendly mathematical equations. In order to evaluate the performance of these estimators, a simulation method is described based on replicating the received video signal. The accuracy of such a simulation is determined largely by the accuracy of the models applied, and these are considered in detail. Different azimuth estimation techniques are described, and their performances are evaluated with the aid of the signal simulation. The best azimuth accuracy performance is obtained with the class of analogue processing estimators, but they are found to be more susceptible to interference than their binary processing counterparts. The class of binary processing estimators offer easily implemented techniques which are relatively insensitive to radar cross-section scintillation characteristics. A hybrid estimator, using both analogue and binary processing, is also evaluated and found to give an improved accuracy performance over the binary processing method while still maintaining the relative insensitivity to radar cross-section fluctuation.
Davis, Stephen. "Radio frequency tagging in the retail industry". Thesis, University of the West of England, Bristol, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.262824.
Pełny tekst źródłaKumar, B. G. Vijay. "Supervised dictionary learning for action recognition and localization". Thesis, Queen Mary, University of London, 2012. http://qmro.qmul.ac.uk/xmlui/handle/123456789/8780.
Pełny tekst źródłaThompson, Graham William. "Surveillance and male sexuality : the rhetoric of the office in American literature". Thesis, Nottingham Trent University, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310851.
Pełny tekst źródłaAndersen, Evan D. "A surveillance system to create and distribute geo-referenced mosaics from SUAV video /". Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2416.pdf.
Pełny tekst źródłaIshikawa, Shoichiro. "Electronic surveillance and the police : a comparative study of the Canadian and Japanese systems". Thesis, University of British Columbia, 1986. http://hdl.handle.net/2429/26140.
Pełny tekst źródłaLaw, Peter A. Allard School of
Graduate
Reilly, Simon Mark. "The use of electronic surveillance and performance measures in the workplace : a qualitative investigation". Thesis, Durham University, 2010. http://etheses.dur.ac.uk/429/.
Pełny tekst źródłaEdwards, Floyd. "U.S. Individuals' Perceptions of Government Electronic Surveillance After Passage of the USA Patriot Act". ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/4617.
Pełny tekst źródłaBossio, Jorge, i Fabiola Gutierrez. "Rights versus crime: twenty years of wiretapping and digital surveillance in Peru". Association for Progressive Communications (APC) and Humanist Institute for Cooperation with Developing Countries (Hivos), 2014. http://hdl.handle.net/10757/599314.
Pełny tekst źródłaFu, Xiao. "Linking electronic health records with the biomedical literature". Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/linking-electronic-health-records-with-the-biomedical-literature(4e7cd7f7-8fbf-4a81-a99d-cf0723175603).html.
Pełny tekst źródłaChen, Zhuo, i 陈卓. "A methodology for trajectory based learning and prediction of human motions in visual surveillance". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47145985.
Pełny tekst źródłaZhu, Junda. "Exploiting Constraints for Effective Visual Tracking in Surveillance Applications". The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1331138092.
Pełny tekst źródłaAmbardekar, Amol A. "Efficient vehicle tracking and classification for an automated traffic surveillance system". abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1451111.
Pełny tekst źródłaHou, Yali, i 侯亚丽. "Video-based people counting and crowd segmentation". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47032339.
Pełny tekst źródłaDean, Andrew. "'Intelligent' strips for tagging articles including their dispensing methods". Thesis, University of Warwick, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.340474.
Pełny tekst źródłaScott, Jessica. "Perceived Barriers to the use of Electronic Health Records for Infectious Disease Surveillance in Canada". Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32000.
Pełny tekst źródłaSavadatti-Kamath, Sanmati S. "Video analysis and compression for surveillance applications". Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26602.
Pełny tekst źródłaCommittee Chair: Dr. J. R. Jackson; Committee Member: Dr. D. Scott; Committee Member: Dr. D. V. Anderson; Committee Member: Dr. P. Vela; Committee Member: Dr. R. Mersereau. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Muir, Lorna. "Between discipline and control : cinematic engagements with contemporary transformations in the surveillance society". Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=186203.
Pełny tekst źródłaWilson, Kevin G. 1952. "The social significance of home networking : public surveillance and social management". Thesis, McGill University, 1985. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=72035.
Pełny tekst źródłaYamashita, Miyo. "Electronic surveillance and the prospects for privacy in Canada's private sector by the year 2000". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0020/NQ44634.pdf.
Pełny tekst źródłaTuli, Gaurav. "Modeling and Twitter-based Surveillance of Smoking Contagion". Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/64426.
Pełny tekst źródłaPh. D.
Nestel, Thomas J. "Using surveillance camera systems to monitor public domains can abuse be prevented? /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FNestel.pdf.
Pełny tekst źródłaThesis Advisor(s): David Brannan. "March 2006." Includes bibliographical references (p. 77-80). Also available online.
Urbonaitė, Milda. "Asmens privatumas elektroninėje darbo vietoje: teisiniai aspektai". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2006. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2006~D_20061214_175318-90958.
Pełny tekst źródłaConniry, Krystal Lynn. "National Security, Mass Surveillance, and Citizen Rights under Conditions of Protracted Warfare". PDXScholar, 2016. http://pdxscholar.library.pdx.edu/open_access_etds/3204.
Pełny tekst źródłaFahey, Rebecca Lee. "Evaluation of the System Attributes of Timeliness and Completeness of the West Virginia Electronic Disease Surveillance System' NationalEDSS Based System". ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/1341.
Pełny tekst źródłaShashidhara, Shilpa. "Resident Rights and Electronic Monitoring". Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc31546/.
Pełny tekst źródłaKing, Carina. "Can routinely collected electronic health data be used to develop novel healthcare associated infection surveillance tools?" Thesis, Imperial College London, 2013. http://hdl.handle.net/10044/1/17759.
Pełny tekst źródłaKim, Kamyoung. "Spatial analytical approaches for supporting security monitoring". Columbus, Ohio : Ohio State University, 2007. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1186593136.
Pełny tekst źródła