Rozprawy doktorskie na temat „Surveillance”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Surveillance”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Mansoor, Shaheer. "System Surveillance". Thesis, Linköpings universitet, Statistik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-98189.
Pełny tekst źródłaCakici, Baki. "Disease surveillance systems". Licentiate thesis, KTH, Programvaru- och datorsystem, SCS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-33661.
Pełny tekst źródłaQC 20110520
Adams, Andrew J. "Multispectral persistent surveillance /". Online version of thesis, 2008. http://hdl.handle.net/1850/7070.
Pełny tekst źródłaAkram, Muhammad. "Surveillance centric coding". Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/2320.
Pełny tekst źródłaHjelm, Emil, i Robert Yousif. "Camera Surveillance Quadrotor". Thesis, KTH, Maskinkonstruktion (Inst.), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-184491.
Pełny tekst źródłaEn quadrotor är en helikopter med fyra rotorer placerade på lika avstånd från farkostens masscentrum, kontrollerad genom att låta de olika rotorerna generera olika mycket lyftkraft. Den använder sig av flera olika sensorer för att hålla sig stabil i luften, korrekt avläsning från sensorerna är därför kritiskt. Genom att reducera vibrationer, elektromagnetisk störning och externa störningar kan quadrotorns stabilitet öka. Syftet med detta projekt är att analysera möjligheten för ett quadrotorkameraövervakningssystem genom att optimera vibrationer, videosignal och externa störningar för en quadrotor. Quadrotorn ska styras genom FPV (First Person View) och kunna hovra på 10 meters höjd inom en radie av 3 meter. Endast sensorläsning kommer att optimeras, inte hantering av data. Microcontrollern som används är MultiWii Pro som har en accelerometer, ett gyroskop, en magnetometer, en GPS och en barometer. Genom att balansera motorer och lägga på vibrationsdämpande material mellan motorer och ram kunde vibrationerna minskas med 73 %. Elektromagnetisk störning på magnetometern gjordes försumbar med ett avstånd på 3 cm från kretskortet. Videosignal förbättrades genom att filtrera strömtillförseln till kamerasystemet med ett LC-filter. Isolering av barometern gjorde att höjdberäkningarna förbättrades. Quadrotorns position kunde låsas inom en radie på 4 meter och dess höjd kunde låsas inom ett intervall på 2 meter. Quadrotorn kan inte anses vara tillräckligt stabil för automatisk kameraövervakning, men med förbättring på mjukvaran skulle den kunna bli det.
Kangin, Dmitry. "Intelligent video surveillance". Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/80349/.
Pełny tekst źródłaSmith, Winston. "Collaborative UAV Surveillance". OpenSIUC, 2019. https://opensiuc.lib.siu.edu/theses/2565.
Pełny tekst źródłaHalliday, J. E. B. "Animal sentinel surveillance : evaluating domestic dogs as sentinels for zoonotic pathogen surveillance". Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4794.
Pełny tekst źródłaFairchild, Geoffrey Colin. "Improving disease surveillance : sentinel surveillance network design and novel uses of Wikipedia". Diss., University of Iowa, 2014. https://ir.uiowa.edu/etd/1452.
Pełny tekst źródłaRashid, Muhammad, i Mumtaz Mutarraf. "Remote Surveillance and Measurement". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2196.
Pełny tekst źródłaWireless Sensor Network (WSN), a collection of “sensor nodes” promises to change the scientist’s approach of gathering the environmental data in various fields. Sensor nodes can be used for non-stop sensing, event detection, location sensing and local control of actuators, this concept gives surety to many latest application areas like agriculture, military, home or factory automation, logistics and so on. Remote surveillance and measurement missions can be performed by using WSNs. The hot research topic now-a-days is to make such networks remotely controllable and adaptive to the environment and mission.
The work carried out in this thesis is the development of a surveillance application using TinyOS/nesC. The purpose of this application is to perform event-detection mission by using any one of the built-in sensor on Mica2 motes as well as a setup protocol is designed to make the WSN remotely controllable and adaptive to the mission. In this thesis, an experimental work is also performed using TinyDB to build up a surveillance system whose purpose is to detect and count the total number of person present at any time in a given room and to view the results at a remote place. Besides these two system applications, a comparative study between TinyDB and nesC is described which concludes that more hardware control can be achieved through nesC which is a more power efficient platform for long-term applications.
Aasen, Thomas Aron. "Case Based Surveillance System". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15843.
Pełny tekst źródłaJohannsson, Hordur. "Toward autonomous harbor surveillance". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/60167.
Pełny tekst źródłaIncludes bibliographical references (p. 105-113).
In this thesis we address the problem of drift-free navigation for underwater vehicles performing harbor surveillance and ship hull inspection. Maintaining accurate localization for the duration of a mission is important for a variety of tasks, such as planning the vehicle trajectory and ensuring coverage of the area to be inspected. Our approach uses only onboard sensors in a simultaneous localization and mapping setting and removes the need for any external infrastructure like acoustic beacons. We extract dense features from a forward-looking imaging sonar and apply pair-wise registration between sonar frames. The registrations are combined with onboard velocity, attitude and acceleration sensors to obtain an improved estimate of the vehicle trajectory. In addition, an architecture for a persistent mapping is proposed. With the intention of handling long term operations and repetitive surveillance tasks. The proposed architecture is flexible and supports different types of vehicles and mapping methods. The design of the system is demonstrated with an implementation of some of the key features of the system. In addition, methods for re-localization are considered. Finally, results from several experiments that demonstrate drift-free navigation in various underwater environments are presented.
by Hordur Johannsson.
S.M.
Herold, Fredrick W. "Total Border Security Surveillance". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605061.
Pełny tekst źródłaThis paper describes a system of Total Border Surveillance, which is cost effective, closes existing gaps and is less manpower intensive than the current techniques. The system utilizes a fleet of commercially available aircraft converted to unmanned capability, existing GPS and surveillance systems and autonomous ground stations to provide the desired coverage.
Wang, Simi. "Surveillance video data fusion". Thesis, Kingston University, 2016. http://eprints.kingston.ac.uk/35593/.
Pełny tekst źródłaOspina, Salinas Estela. "Health surveillance of workers". THĒMIS-Revista de Derecho, 2014. http://repositorio.pucp.edu.pe/index/handle/123456789/107293.
Pełny tekst źródłaEn nuestro ordenamiento jurídico, los derechos fundamentales a la vida y la salud delos trabajadores son dos bienes jurídicos importantes y no pueden ser desconocidos. Por ello, el Estado y los empleadores deben poner especial énfasis en la vigilancia de la salud yseguridad de los trabajadores para evitar que la relación laboral sea un obstáculo o una violación de tales derechos.A la luz de ello, la autora hace un análisis de la protección de dichos derechos fundamentales en el ámbito laboral en nuestro país. Haciendo uso de legislación comparada, presenta los conceptos generales de la vigilancia de la salud de los trabajadores y las responsabilidades del Estado y de los empleadores, permitiéndole concluir que nuestro ordenamiento aún tiene muchos retos para poder lograr una real protección y vigencia de los valores puestos en riesgo.
Shirima, Emil. "Privacy Aware Smart Surveillance". Kent State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=kent1563281303729063.
Pełny tekst źródłaKlein, Stephen Jeffrey. "MOBILE SECURITY SURVEILLANCE UNIT". Thesis, The University of Arizona, 2009. http://hdl.handle.net/10150/192512.
Pełny tekst źródłaGarcia, Jessica. "Obesity Surveillance in Childhood". ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/887.
Pełny tekst źródłaTedeschi, Francesca <1997>. "Mimesis and Surveillance Art". Master's Degree Thesis, Università Ca' Foscari Venezia, 2022. http://hdl.handle.net/10579/21291.
Pełny tekst źródłaWatt, Eliza. "Cyberspace, surveillance, law and privacy". Thesis, University of Westminster, 2017. https://westminsterresearch.westminster.ac.uk/item/q3xzx/cyberspace-surveillance-law-and-privacy.
Pełny tekst źródłaMcCahill, Michael. "The surveillance web : the rise and extent of visual surveillance in a northern city". Thesis, University of Hull, 1999. http://hydra.hull.ac.uk/resources/hull:14796.
Pełny tekst źródłaWoo, Sang-Bum. "Formation control for cooperative surveillance". [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-3203.
Pełny tekst źródłaMarcet, Ortega Marina. "Surveillance mechanisms in mammalian meiosis". Doctoral thesis, Universitat Autònoma de Barcelona, 2016. http://hdl.handle.net/10803/387429.
Pełny tekst źródłaIn order to protect germinal cells from genomic instability, surveillance mechanisms ensure that meiosis occurs properly. In mammals, spermatocytes that display recombination or sex body defects experience an arrest at pachytene stage. Previous studies from our lab described that the MRE11 complex-ATM-CHK2 pathway activates the recombination-dependent arrest in the presence of unrepaired double strand breaks (DSBs). In this work we aimed to identify if p53 family members, which are putative targets of ATM and CHK2, participate in the activation of the recombination-dependent arrest. As a genetic approach, we bred double mutant mice carrying a mutation of a member of the p53 family (p53, TAp63, p73) in a Trip13 defective background. Trip13 mutation causes recombination defects, which activate the recombination-dependent arrest in pachytene-stage spermatocytes. Thus, we studied how the absence of p53 family members affected the arrest phenotype of Trip13mod/mod spermatocytes. Our data showed that p53 and TAp63 deficiency, but not p73, allowed spermatocytes to progress further into late pachynema, despite accumulating numerous unrepaired DBSs. In addition, lack of p53 or TAp63 resulted in a decrease of apoptotic spermatocytes at early pachytene stage. Therefore, our results indicate that p53 and TAp63 are responsible to activate the recombination-dependent arrest in mouse spermatocytes. Even though, double mutant spermatocytes still arrested at pachytene stage. To study if double mutant spermatocytes were arresting due to the activation of the sex body deficient arrest we analyzed MSCI functionality in Trip13 mutants. Thus, by bypassing the recombination-dependent arrest has allowed us to elucidate a role for TRIP13 protein in meiotic silencing, which consequently triggers apoptosis in double mutants at late pachytene stage due to sex body impairment. These results infer that the recombination-dependent and the sex-body deficient arrest are activated by two genetically separated mechanisms. From the observation that TRIP13 is required to implement MSCI silencing, we performed an exhaustive analysis of transcription in Trip13 mutants. Our results suggested that RNA expression in Trip13 mutants was increased in early meiotic stage spermatocytes, assessed by EU-labeling RNA and phosphorylated(S2)-RNA polymerase II. Moreover, RNA sequencing data highlighted the observation that sex chromosome genes and pre-meiotic genes are overexpressed in Trip13 mutants, suggesting that TRIP13 is required to maintain the expression of these genes at low levels. Overall, the data presented in this work contributes to the understanding on how surveillance mechanisms control several crucial steps of meiotic prophase progression in mammalian spermatocytes.
Sümnig, Ariane. "Prospektive Surveillance der neonatalen Sepsis". [S.l.] : [s.n.], 2004. http://deposit.ddb.de/cgi-bin/dokserv?idn=972508554.
Pełny tekst źródłaPalm, Elin. "The Ethics of Workspace Surveillance". Doctoral thesis, KTH, Filosofi, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4611.
Pełny tekst źródłaQC 20100902
Tyrberg, Simon. "Offshore Surveillance of Wave Buoys". Thesis, Uppsala universitet, Elektricitetslära och åskforskning, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-109559.
Pełny tekst źródłaRahman, Junaedur. "Motion Detection for Video Surveillance". Thesis, Högskolan Dalarna, Datateknik, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:du-3487.
Pełny tekst źródłaMir, Amir. "Surveillance of partially observable systems". Thesis, University of Ottawa (Canada), 2008. http://hdl.handle.net/10393/27716.
Pełny tekst źródłaRiseby, Emil, i Alexander Svensson. "Multispectral Imaging for Surveillance Applications". Thesis, Linköpings universitet, Medie- och Informationsteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-115731.
Pełny tekst źródłaGlenister, Helen Mary. "Surveillance methods for hospital infection". Thesis, University of Surrey, 1991. http://epubs.surrey.ac.uk/664/.
Pełny tekst źródłaPalm, Elin. "Ethical aspects of workplace surveillance /". Stockholm : Kungliga Tekniska högskolan, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-474.
Pełny tekst źródłaKerkhof, Marjon. "Barrett esophagus: improving surveillance strategies". [S.l.] : Rotterdam : [The Author] ; Erasmus University [Host], 2007. http://hdl.handle.net/1765/13304.
Pełny tekst źródłaDoeve-Edwin, Isis Abiodun. "Surveillance in familial colorectal cancer". Thesis, Imperial College London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.404560.
Pełny tekst źródłaKaroui, Mohamed, i Mohamed Karoui. "Surveillance des processus dynamiques évènementiels". Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00767048.
Pełny tekst źródłaOwens, Jonathan. "Neural networks for video surveillance". Thesis, University of Sunderland, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.251141.
Pełny tekst źródłaZhou, Y. "Analysing large-scale surveillance video". Thesis, University of Liverpool, 2018. http://livrepository.liverpool.ac.uk/3024330/.
Pełny tekst źródłaGreen, Jonathan. "Testing nocturnal arachnid surveillance systems". Thesis, University of Nottingham, 2015. http://eprints.nottingham.ac.uk/29457/.
Pełny tekst źródłaRieutort, Delphine. "Développement de la surveillance observationnelle". Thesis, Université Grenoble Alpes (ComUE), 2015. http://www.theses.fr/2015GREAS015/document.
Pełny tekst źródłaImpact of population on the environment, and conversely, is obvious and represents a real challenge for Public Health since 2000. It has been shown an increase in cancer prevalence, respiratory disease or even reproductive disorders, for which multifactorial origins are strongly suspected. In this context, surveillance has become an essential tool to decision making in public health, and surveillance networks of health events are multiplying, giving rise to numerous databases (sometimes considered as “big data”), still poorly used.Objective of this thesis work was to develop a new concept of surveillance, the Observational Surveillance (OS). This allows an optimal use of observational databases, extendable to different kind of databases and problematics, taking into account various multiple information available.OS is based on the exposome approach, to restructure data as a network, allowing the study of associations between information and also their structure. In this purpose, several indicators have been developed to study in the meantime the different recruited association for an event of interest, but also the evolution of their structure over time. These indicators allow generating the unique signature of the event: the spectrum. A tool, named “Observational Surveillance Analysis” (OSA), allowing the routine use of methodology, has been developed in the R platform, which permits automation and standardization of results.Applications were used to illustrate the OS analysis and its portability and adaptability to different context and problematic. Three applications are based on the French National Occupational Diseases Surveillance and Prevention Network (RNV3P): bladder cancer, asthma and non-Hodgkin lymphoma. Three other applications are based on the Belgium occupational physicians group IDEWE: sore throat, caregivers and farmers.Thanks to different applications, it has been demonstrated the portability of the OS methodology to different databases, and also, to different analysis configuration, disease/exposures or activity/diseases. Furthermore, the “OSA” tool which has been developed, allows an easier use to routine analysis and, in the end, could be integrated in an existing surveillance network
Karoui, Mohamed. "Surveillance des processus dynamiques évènementiels". Thesis, Grenoble, 2011. http://www.theses.fr/2011GRENT110/document.
Pełny tekst źródłaAs part of this thesis, we focus on the monitoring of hybrid systems with high dynamic event. The aim is to detect faults that cause permanent and intermittent acceleration and deceleration systems tasks. It is in this context that the following are the main contributions of the work reported in this thesis: - The development of a method for process monitoring based on linear hybrid automata (AHL). This method involves first the establishment of the AHL model the dynamic system taking into account the physical and dynamic one. - The realization of a reachability analysis of defining all paths that can cause the system to its target while respecting the specifications imposed on it. The extension of the approach using the rectangular hybrid automata. This class of controllers has allowed us to model more complex systems, therefore, a hybrid modeling rich and also allowed a formal analysis. This part was punctuated by the implementation of the monitoring system by determining equations characterizing each summit of the automaton that models the system
Johansson, Fredrik. "Deniable Messaging Under Strong Surveillance". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-231834.
Pełny tekst źródłaI dagens samhälle är människor mer medvetna om vikten att använda kryptering för att skydda sin privata information. Därför har chatt-appar som WhatsApp och Signal blivit mer populära eftersom de erbjuder möjligheten att kryptera alla meddelande man skickar. Detta räcker inte alltid dock för att skydda den dataman skickar, en motståndare som har förmågan att spara alla meddelande en användare skickar och som kan tvinga användaren att ge bort nyckeln som använts vid kryptering, då räcker inte alltid normal kryptering. I OTPKX rapporten kom de på ett protokoll som skyddar användaren mot en som motståndare med hjälp av deniable encryption, vilket ger användaren möjligheten att skapa en falsk nyckel vilket gör så att motståndaren ser ett falskt meddelande. Denna rapport bygger vidare på OTPKX protokollet för att skydda användare mot en motståndare som kan spara alla meddelande som skickas, tvinga både skickare och mottagare att ge bort krypteringsnycklarna och har tillgång till bådas enheter. Protokollet i denna rapport använder sig av OTP för kryptering och för att skapa falska nycklar. En användare skapar både ett riktigt och ett falskt meddelande och sätter ihop dem och skickar det tillmottagaren. Då har båda parterna både det riktiga och falskameddelandet och kan därför skapa samma falska nyckel att visamotståndaren. Den orginala krypteringsnyckeln byts ut mot den falska och det falskameddelandet sparas på enheterna. Utifrån resultaten såg vi att våra protokoll ger Indistinguishably under Chosen-CiphertextsAttack och ger Integrity ofCipherTexts, vilket betyder att protokollen ger integritet och konfidentialitet. Protokollen skyddar användare mot motståndaren i rapporten. En användares deniability kan misslyckas om en motståndare skulle installera en key-logger på användarens enhet eller om motståndaren har tillgång till en användares enhet utan att användaren vet om det. Implementationen visade att protokollet går att implementeras och att den fortfarande ger samma säkerhet och deniability i verkligheten på kostnad av prestanda. Att byta ut den orignala nyckeln mot den falska nyckeln var den del som tog mest tid och försämrade prestandan mest.Den totala tiden det tog för att skicka ett meddelande på en ny enhet var ungefär 40ms och tog ungefär 620 på en äldre enhet. Att ta emot ett meddelande tog ungefär 40ms på en ny enhet och ungefär 780ms på en äldre enhet. Normal symmetrisk kryptering tar ungefär 1ms, vilket är mycket snabbare än vår implementation. Men i praktiken så anser vi inte att ökningen i tid för vår implementation är märkbar.
Laref, Laure. "La surveillance en droit pénal". Thesis, Limoges, 2020. http://www.theses.fr/2020LIMO0043.
Pełny tekst źródłaSurveillance has secular links with criminal law, their combination making it possible to meet the objectives pursued by criminal justice, namely the prevention and repression of offenses. New technologies, by facilitating the implementation of remote monitoring but nevertheless always more precise, have undoubtedly reinforced the interest of their acquaintance. This observation is confirmed with regard to situational surveillance which allows for penal management of spaces as well as for behavioral surveillance which facilitates penal management of conduct. Situational surveillance, that which mobilizes space to grant it a punitive function or which, on the contrary, deploys to prevent the threats it conceals, manifests itself in closed as well as in open environments, electronic surveillance blurring the limits - residual - which may exist between these two spaces. Behavioral surveillance, that which allows the authorities to refine the criminal management of the conduct of citizens, and even more so of individuals grappling with justice, today tends to penetrate both their body and their "being" in order to strengthen effectiveness of the devices used. The juxtaposition of these two forms of criminal surveillance - situational and behavioral - calls for the vigilance of the highest bodies and jurisdictions protecting human rights because of the fears and excesses that it arouses. However, the latter are struggling to find a satisfactory balance in the equation that is played out between the preservation of individual rights and freedoms and the purposes pursued by criminal law, especially since the latter, reassessed in the light of the concept of dangerousness, postulate more than ever the development of surveillance
MEIN, MIREILLE. "Surveillance acoustique de moteurs diesel". Le Mans, 1997. http://www.theses.fr/1997LEMA1008.
Pełny tekst źródłaFord, Michael K., i LeRoy P. Dennis. "The wireless ubiquitous surveillance testbed". Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/1124.
Pełny tekst źródłaThis thesis research examines the emergence of surveillance and biometrics technologies as a sensible baseline for building a ubiquitous surveillance testbed for the Naval Postgraduate School. This thesis also defines what ubiquitous surveillance is, employs biometric applications and technical strategies to build a working testbed, and addresses developmental issues surrounding the hypothesis for a ubiquitous surveillance testbed. The authors conducted several evaluations of the testbed using different scenarios and recommend emerging biometric and surveillance technologies to promote the maturation of the testbed into a premier ubiquitous habitat.
Lieutenant, United States Navy
Lieutenant, United States Navy
Schumann, Axel. "Airborne ubiquitous surveillance and monitoring". Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1349.
Pełny tekst źródłaThe thesis research examines the emergence of wireless technology as a pragmatic baseline supporting the goals of the Department of Defense developing towards Network Centric Forces. Increased international attention to the field of surveillance has developed parallel to the desire to interconnect all possible friendly forces in military operations and the Global War on Terror (GWOT). Ubiquitous surveillance is accomplished by prototyping a network node that is then integrated on board of a military type unmanned aerial vehicle (UAV). Although the commercial off the shelf network solution itself is broadly deployed, little is known so far how to operate and manage an airborne surveillance network node. The author shows that the use of unmanned aerial vehicles for networking purposes is not only possible but also manageable, even with remote operation of the unmanned aerial vehicle. The documented experiments over three generations of prototypes give insight about possibilities of how network infrastructure independence for the purpose of surveillance can be reached.
Kapitänleutnant, Federal German Navy
Alqaan, Hani. "Automatic pipeline surveillance air-vehicle". Thesis, Cranfield University, 2016. http://dspace.lib.cranfield.ac.uk/handle/1826/9876.
Pełny tekst źródłaVarin, Andre Carleton University Dissertation Engineering Electrical. "A wideband microwave surveillance receiver". Ottawa, 1987.
Znajdź pełny tekst źródłaPalm, Elin. "The ethics of workspace surveillance /". Stockholm : Filosofi och teknikhistoria, Kungliga Tekniska högskolan, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-4611.
Pełny tekst źródłaTran, Son Dinh. "Robust techniques for visual surveillance". College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8550.
Pełny tekst źródłaThesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Dennis, LeRoy P. Ford Michael K. "The wireless ubiquitous surveillance testbed /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FDennis.pdf.
Pełny tekst źródłaThesis advisor(s): Alex Bordetsky, Randy J. Hess. Includes bibliographical references (p. 101-105). Also available online.
Rafi, Murtaza. "Biomechanics of AAA surveillance patients". Thesis, KTH, Hållfasthetslära (Inst.), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264765.
Pełny tekst źródłaBukaortaaneurysm (AAA) uppstår på grund av lokal förstoring av bukaortan och drabbar 1-2 % av den äldre svenska befolkningen. Vid antagning får bukaortaaneurysm-patienterna en datortomografscanning (CT-A) och senare påföljs av 2D ultraljudsscanningar. Det finns ett behov att veta om en adekvat geometri kan konstrueras från datortomografiscanningen och 2D ultraljudsbilderna. För att testa vår hypotes har endast datortomografibilder från sex patienter använts med hypotetiska ultraljudstvärsnitt (HUCS) tagna från CT-A uppföljningarna. AAA-ytan vid baslinjen expanderades i en strukturmekanisk modell genom inre övertryck tills den nådde de hypotetiska ultraljudstvärsnitten. Därefter jämfördes de morfade geometrierna med de CT-A-baserade geometrierna. Geometriavvikelsen mellan de beräknades genom avståndsmätningar. Även, rupturriskindikatorerna volymer och spänningar jämfördes. Slutligen, genom en känslighetsanalys undersöktes effekten av positioneringen av hypotetiska ultraljudstvärsnitten på volymerna och spänningarna. Resultaten visar att en adekvat geometri kan konstrueras genom den undersökta koncepten av morfning. De genomsnittliga avstånden mellan de morfade och CT-A-baserade geometrierna är 2-4 mm. Genomsnittliga volymskillnaderna för de sex patienterna är mellan 3.8-16.2 %. Väggspänningarna för de morfade och CT-A-baserade geometrierna är nära enbart för den första uppföljningen.