Literatura científica selecionada sobre o tema "Electronic surveillance in literature"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Electronic surveillance in literature".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Electronic surveillance in literature"

1

Carr, C. J. "Electronic Surveillance of the Pharmacology-Toxicology Literature". Regulatory Toxicology and Pharmacology 21, n.º 2 (abril de 1995): 207. http://dx.doi.org/10.1006/rtph.1995.1028.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

NELLIS, MIKE. "SURVEILLANCE, REHABILITATION, AND ELECTRONIC MONITORING: GETTING THE ISSUES CLEAR". Criminology Public Policy 5, n.º 1 (fevereiro de 2006): 103–8. http://dx.doi.org/10.1111/j.1745-9133.2006.00104.x.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Aliabadi, Ali, Abbas Sheikhtaheri e Hossein Ansari. "Electronic health record–based disease surveillance systems: A systematic literature review on challenges and solutions". Journal of the American Medical Informatics Association 27, n.º 12 (14 de setembro de 2020): 1977–86. http://dx.doi.org/10.1093/jamia/ocaa186.

Texto completo da fonte
Resumo:
Abstract Objective Disease surveillance systems are expanding using electronic health records (EHRs). However, there are many challenges in this regard. In the present study, the solutions and challenges of implementing EHR-based disease surveillance systems (EHR-DS) have been reviewed. Materials and Methods We searched the related keywords in ProQuest, PubMed, Web of Science, Cochrane Library, Embase, and Scopus. Then, we assessed and selected articles using the inclusion and exclusion criteria and, finally, classified the identified solutions and challenges. Results Finally, 50 studies were included, and 52 unique solutions and 47 challenges were organized into 6 main themes (policy and regulatory, technical, management, standardization, financial, and data quality). The results indicate that due to the multifaceted nature of the challenges, the implementation of EHR-DS is not low cost and easy to implement and requires a variety of interventions. On the one hand, the most common challenges include the need to invest significant time and resources; the poor data quality in EHRs; difficulty in analyzing, cleaning, and accessing unstructured data; data privacy and security; and the lack of interoperability standards. On the other hand, the most common solutions are the use of natural language processing and machine learning algorithms for unstructured data; the use of appropriate technical solutions for data retrieval, extraction, identification, and visualization; the collaboration of health and clinical departments to access data; standardizing EHR content for public health; and using a unique health identifier for individuals. Conclusions EHR systems have an important role in modernizing disease surveillance systems. However, there are many problems and challenges facing the development and implementation of EHR-DS that need to be appropriately addressed.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Cosmides, G. J. "Electronic Surveillance of the Pharmacology-Toxicology Literature: The Need for Controlled Vocabularies and Registry Systems". Regulatory Toxicology and Pharmacology 21, n.º 2 (abril de 1995): 208–10. http://dx.doi.org/10.1006/rtph.1995.1029.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Boulanger, Virginie, Étienne Poirier, Anne MacLaurin e Caroline Quach. "Divergences between healthcare-associated infection administrative data and active surveillance data in Canada". Canada Communicable Disease Report 48, n.º 1 (26 de janeiro de 2022): 4–16. http://dx.doi.org/10.14745/ccdr.v48i01a02.

Texto completo da fonte
Resumo:
Background: Although Canada has both a national active surveillance system and administrative data for the passive surveillance of healthcare-associated infections (HAI), both have identified strengths and weaknesses in their data collection and reporting. Active and passive surveillance work independently, resulting in results that diverge at times. To understand the divergences between administrative health data and active surveillance data, a scoping review was performed. Method: Medline, Embase and Cumulative Index to Nursing and Allied Health Literature along with grey literature were searched for studies in English and French that evaluated the use of administrative data, alone or in comparison with traditional surveillance, in Canada between 1995 and November 2, 2020. After extracting relevant information from selected articles, a descriptive summary of findings was provided with suggestions for the improvement of surveillance systems to optimize the overall data quality. Results: Sixteen articles met the inclusion criteria, including twelve observational studies and four systematic reviews. Studies showed that using a single source of administrative data was not accurate for HAI surveillance when compared with traditional active surveillance; however, combining different sources of data or combining administrative with active surveillance data improved accuracy. Electronic surveillance systems can also enhance surveillance by improving the ability to detect potential HAIs. Conclusion: Although active surveillance of HAIs produced the most accurate results and remains the gold-standard, the integration between active and passive surveillance data can be optimized. Administrative data can be used to enhance traditional active surveillance. Future studies are needed to evaluate the feasibility and benefits of potential solutions presented for the use of administrative data for HAI surveillance and reporting in Canada.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Carpenter, Christine. "Privacy and Proportionality: Examining Mass Electronic Surveillance under Article 8 and the Fourth Amendment". International and Comparative Law Review 20, n.º 1 (1 de junho de 2020): 27–57. http://dx.doi.org/10.2478/iclr-2020-0002.

Texto completo da fonte
Resumo:
Summary An individual citizen’s right to privacy has found extensive protection in the modern democratic state. However, with the increase of technological innovation and new kinds of threats, democratic states must grapple with balancing a problem that can never be wholly solved—governments seeking to create the optimal degree of security inevitably conflicts with citizens’ optimal degree of privacy. This article examines one vehicle through which governments have prioritized national security at the expense of individual privacy: mass electronic surveillance. Employing the case study method, this article compares three cases where mass electronic surveillance measures were challenged before the European Court of Human Rights under Article 8 against four cases where such measures were challenged in the U.S. judicial system under the Fourth Amendment. This article seeks to determine how the treatment of privacy infringements created by mass electronic surveillance differs when examined in these two different privacy regimes. I argue the Strasbourg Court’s use of what is known in the literature as the “proportionality analysis” provoked by Article 8(2) allows for more substantial protections of privacy rights in Europe than under the Fourth Amendment in the U.S..
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Nishnianidze, Anri. "Surveillance in the Digital Age". European Scientific Journal, ESJ 20, n.º 37 (20 de fevereiro de 2024): 1. http://dx.doi.org/10.19044/esj.2024.v20n37p1.

Texto completo da fonte
Resumo:
Purpose: As technology advances, electronic devices have become ubiquitous among individuals of all backgrounds. From mobile phones to computing devices, people rely on these tools on a daily basis for both personal and professional purposes. The presented research seeks to investigate the extent to which individuals are being monitored in the digital realm and identify solutions to safeguard citizens from the threat of mass surveillance. Findings: In the modern era, it is common for people to utilize various devices for a multitude of purposes, such as search engines and social networks. However, many are unaware that the information they share online is not always erased from cyberspace. This study aims to shed light on how this data is obtained and utilized and the potential risks humanity faces if privacy is not safeguarded in the digital age. Research limitations/implications: The objective of this research is to thoroughly examine the current scientific literature, studies, and articles regarding the perils of surveillance in the digital era. The paper aims to highlight the challenges associated with combating surveillance. In the concluding section of the analysis, a concise set of recommendations will be provided, which are crucial to uphold in order to safeguard individuals' constitutional rights in the face of the potential ramifications of streamlined surveillance. Originality/value: In today's digital age, it has become almost universal for people to communicate through electronic devices in cyberspace, whether for work or personal purposes. Unfortunately, this environment is often not secure, and automated surveillance models can be used to acquire people's data without their knowledge or consent. This raises serious concerns about privacy and the protection of fundamental human rights. That is why it is essential to conduct research that sheds light on the means of surveillance and explores ways to fight against it.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Rose, G. W., V. R. Roth, K. N. Suh, M. Taljaard, C. Van Walraven e A. J. Forster. "USE OF AN ELECTRONIC DATA WAREHOUSE TO ENHANCE CARDIAC SURGICAL SITE SURVEILLANCE AT A LARGE CANADIAN CENTRE". Clinical & Investigative Medicine 31, n.º 4 (1 de agosto de 2008): 21. http://dx.doi.org/10.25011/cim.v31i4.4824.

Texto completo da fonte
Resumo:
Background/Purpose: Surgical site infection surveillance to determineincidence is a key infection control activity. Case detection is labour-intensive, therefore most infection control programs use manual or simple electronic mechanisms to “trigger” chart review. However, such “trigger” mechanisms are also labour-intensive, and often of poor specificity. Our objective is to develop a complex trigger mechanism using data from an electronic data warehouse, to improve specificity of surveillance of surgical site infection compared to current trigger mechanisms. Methods: We will derive an electronic trigger tool for cardiac surgical site infection surveillance using a nested case-control design, among a cohort of all patients undergoing coronary artery bypass grafting, cardiac valve repairor replacement, or heart transplant at the University of Ottawa Heart Institute, from July 1 2004 to June 30 2007. We will perform a systematic literature review to identify potential trigger factors to include in the model, then construct the trigger tool by backwards stepwise logistic regression. The best-fit model will be used to calculate the probability of surgical site infection. We will select the threshold probability to use in surveillance by visual inspection of receiver-operator-characteristic curves. The accuracy of this electronic trigger mechanism will be compared to pre-existing manual and simple electronic mechanisms using relative true positive ratios and relative false positive ratios. Results/Conclusions: We have selected 200 cases of surgical site infection and 541 controls from among 3744 procedures performed during the study period. As of the date ofthis abstract we are still undertaking the systematic review.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Back, Luani, Joao Luiz Kovaleski e Pedro Paulo Andrade Junior. "Technological Surveillance As A Tool For Information Management: A Literature Review". IEEE Latin America Transactions 13, n.º 10 (outubro de 2015): 3505–10. http://dx.doi.org/10.1109/tla.2015.7387261.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Vermeer, Yvette, Paul Higgs e Georgina Charlesworth. "What do we require from surveillance technology? A review of the needs of people with dementia and informal caregivers". Journal of Rehabilitation and Assistive Technologies Engineering 6 (janeiro de 2019): 205566831986951. http://dx.doi.org/10.1177/2055668319869517.

Texto completo da fonte
Resumo:
Introduction Dementia has become a major global concern and surveillance technology might provide support for informal caregivers and people with dementia. However, the needs of caregivers and people with dementia for surveillance technology have not been reviewed. Method A scoping literature review was used to identify the needs of caregivers and/or people with dementia towards surveillance technology. Electronic database searching was undertaken on LexisNexis, PubMed, Scopus, EMBASE, MEDLINE, Cumulative Index to Nursing, Allied Health Literature, PsycINFO, Web of Science, Assistive Technology database, and Google Scholar. Eligible studies were synthesized by theme. Results Twenty-eight eligible studies were identified, with the majority reporting the needs of caregivers rather than people with dementia. The predominant themes for caregivers were location accuracy, and increasing the safety of the person with dementia. People with dementia wanted simple useful technology that fits within their capacity and existing routines. Conclusions The needs of people with dementia must be considered when designing surveillance products. Studies have mostly focused on caregivers and discount ST product requirements. Further work is required to establish effective use of surveillance technology in dementia care. Therefore, further research should cross analyze these results by examining both the needs of caregivers, and people with dementia.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Electronic surveillance in literature"

1

Akram, Muhammad. "Surveillance centric coding". Thesis, Queen Mary, University of London, 2011. http://qmro.qmul.ac.uk/xmlui/handle/123456789/2320.

Texto completo da fonte
Resumo:
The research work presented in this thesis focuses on the development of techniques specific to surveillance videos for efficient video compression with higher processing speed. The Scalable Video Coding (SVC) techniques are explored to achieve higher compression efficiency. The framework of SVC is modified to support Surveillance Centric Coding (SCC). Motion estimation techniques specific to surveillance videos are proposed in order to speed up the compression process of the SCC. The main contributions of the research work presented in this thesis are divided into two groups (i) Efficient Compression and (ii) Efficient Motion Estimation. The paradigm of Surveillance Centric Coding (SCC) is introduced, in which coding aims to achieve bit-rate optimisation and adaptation of surveillance videos for storing and transmission purposes. In the proposed approach the SCC encoder communicates with the Video Content Analysis (VCA) module that detects events of interest in video captured by the CCTV. Bit-rate optimisation and adaptation are achieved by exploiting the scalability properties of the employed codec. Time segments containing events relevant to surveillance application are encoded using high spatiotemporal resolution and quality while the irrelevant portions from the surveillance standpoint are encoded at low spatio-temporal resolution and / or quality. Thanks to the scalability of the resulting compressed bit-stream, additional bit-rate adaptation is possible; for instance for the transmission purposes. Experimental evaluation showed that significant reduction in bit-rate can be achieved by the proposed approach without loss of information relevant to surveillance applications. In addition to more optimal compression strategy, novel approaches to performing efficient motion estimation specific to surveillance videos are proposed and implemented with experimental results. A real-time background subtractor is used to detect the presence of any motion activity in the sequence. Different approaches for selective motion estimation, GOP based, Frame based and Block based, are implemented. In the former, motion estimation is performed for the whole group of pictures (GOP) only when a moving object is detected for any frame of the GOP. iii While for the Frame based approach; each frame is tested for the motion activity and consequently for selective motion estimation. The selective motion estimation approach is further explored at a lower level as Block based selective motion estimation. Experimental evaluation showed that significant reduction in computational complexity can be achieved by applying the proposed strategy. In addition to selective motion estimation, a tracker based motion estimation and fast full search using multiple reference frames has been proposed for the surveillance videos. Extensive testing on different surveillance videos shows benefits of application of proposed approaches to achieve the goals of the SCC.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Fernandez, Arguedas Virginia. "Automatic object classification for surveillance videos". Thesis, Queen Mary, University of London, 2012. http://qmro.qmul.ac.uk/xmlui/handle/123456789/3354.

Texto completo da fonte
Resumo:
The recent popularity of surveillance video systems, specially located in urban scenarios, demands the development of visual techniques for monitoring purposes. A primary step towards intelligent surveillance video systems consists on automatic object classification, which still remains an open research problem and the keystone for the development of more specific applications. Typically, object representation is based on the inherent visual features. However, psychological studies have demonstrated that human beings can routinely categorise objects according to their behaviour. The existing gap in the understanding between the features automatically extracted by a computer, such as appearance-based features, and the concepts unconsciously perceived by human beings but unattainable for machines, or the behaviour features, is most commonly known as semantic gap. Consequently, this thesis proposes to narrow the semantic gap and bring together machine and human understanding towards object classification. Thus, a Surveillance Media Management is proposed to automatically detect and classify objects by analysing the physical properties inherent in their appearance (machine understanding) and the behaviour patterns which require a higher level of understanding (human understanding). Finally, a probabilistic multimodal fusion algorithm bridges the gap performing an automatic classification considering both machine and human understanding. The performance of the proposed Surveillance Media Management framework has been thoroughly evaluated on outdoor surveillance datasets. The experiments conducted demonstrated that the combination of machine and human understanding substantially enhanced the object classification performance. Finally, the inclusion of human reasoning and understanding provides the essential information to bridge the semantic gap towards smart surveillance video systems.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Zhou, Han, e 周晗. "Intelligent video surveillance in a calibrated multi-camera system". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45989217.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Margolis, David. "An analysis of electronic surveillance in the USAPATRIOT act". Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/776.

Texto completo da fonte
Resumo:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Health and Public Affairs
Legal Studies
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

O'Malley, Patrick D. "Human activity tracking for wide-area surveillance". [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1000150.

Texto completo da fonte
Resumo:
Thesis (M.S.)--University of Florida, 2002.
Title from title page of source document. Document formatted into pages; contains vi, 46 p.; also contains graphics. Includes vita. Includes bibliographical references.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Richard, Julie Ann. "On Dystopias| Do We Live in a Surveillance State?" Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10601160.

Texto completo da fonte
Resumo:

The technological advances in surveillance over the past 20 years have been astounding and are used in both the private and public sectors progressively each day. The extent of technological advances and the impact on our society seem almost reflective of something out of a work of science fiction. This study involves a qualitative content analysis of three early 20th century dystopian novels and news articles from newspapers such as The Guardian, that display current events pertaining to surveillance, including NSA surveillance methods leaked by Edward Snowden. The study relies upon macro sociological constructs, specifically formal social control to explain the social control imposed by our current government with the use of surveillance methods. Upon examination of the novels and news articles, it is revealed that there is a parallel between the novels and our current society which suggests that we live in a surveillance state. The importance of this study is to educate the public on data collection, analysis, and storage involved in the surveillance process. By showing that our current society is a surveillance state, this study expresses the importance of safeguarding our privacy, liberties, and civil rights as a means of reducing governmental social control.

Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Adams, Andrew J. "Multispectral persistent surveillance /". Online version of thesis, 2008. http://hdl.handle.net/1850/7070.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Chappuies, Margaret R. Chappuies. "Surveillance and Narrative Authority in Villette". University of Toledo Honors Theses / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=uthonors1513263903293044.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Medeme, Narasimha Rao. "Application of vehicle identification techniques in transportation surveillance with focus on security /". free to MU campus, to others for purchase, 2004. http://wwwlib.umi.com/cr/mo/fullcit?p1426087.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Karlsson, David. "Electronic Data Capture for Injury and Illness Surveillance : A usability study". Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-102737.

Texto completo da fonte
Resumo:
Despite the development of injury surveillance systems for use at large multi sportsevents (Junge 2008), their implementation is still methodologically and practicallychallenging. Edouard (2013) and Engebretsen (2013) have pointed out that thecontext of athletics championships feature unique constraints, such as a limiteddata-collection window and large amounts of data to be recorded and rapidlyvalidated. To manage these logistical issues, Electronic Data Capture (EDC) methodshave been proposed (Bjorneboe 2009, Alonso 2012, Edouard 2013). EDC systemshave successfully been used for surveillance during multi-sport events Derman et al(2013) and its potential for surveillance studies during athletics championships istherefore interesting. The focus for surveillance during athletics championships hasthis far been on injury and illness data collected from team medical staff in directassociation to the competitions. But the most common injury and illness problems inathletics are overuse syndromes (Alonso 2009, Edouard 2012, Jacobsson 2013) andknowledge of risk factors associated to these problems is also relevant in associationto championships. A desirable next step to extend the surveillance routines istherefore to include also pre-participation risk factors. For surveillance of overusesyndromes, online systems for athlete self-report of data on pain and othersymptoms have been reported superior to reports from coaches (Shiff 2010). EDCsystems have also been applied for athlete self-report of exposure and injury data inathletics and other individual sports and have been found to be well accepted with agood efficiency (Jacobsson 2013, Clarsen 2013). There are thus reasons forinvestigating EDC system use by both athletes and team medical staff during athleticchampionships.This thesis used a cross-sectional design to collect qualitative data from athletes andteam medical staff using interviews and “think-aloud” usability evaluation methods(Ericsson 1993; Kuusela 2000). It was performed over 3 days during the 2013European Athletics Indoor Championships in Gothenburg, Sweden. Online EDCsystems for collection of data from athletes and team medical staff, respectively,were prepared for the study. The system for use by team medical staff was intendedto collect data on injuries and illnesses sustained during the championship and thesystem for athletes to collect data on risk factors.This study does not provide a solution in how an EDC effort should be implementedduring athletics championships. It does however points towards usability factorsthat needs to be taken into consideration if taking such an approach.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Electronic surveillance in literature"

1

Taylor, L. B. Electronic surveillance. New York: F. Watts, 1987.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Taylor, L. B. Electronic surveillance. New York: F. Watts, 1987.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Kling, Andrew A. Surveillance. Detroit: Lucent Books, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Gilbert, Adrian. Top technology. London: QED, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Ridker, Andrew. Privacy policy: The anthology of surveillance poetics. Boston: Black Ocean, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Gilbert, Adrian. Technologie de pointe. Bois-des-Filion, Québec: Parfum d'encre, 2009.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Wilcox, Christine. Online privacy. San Diego, CA: ReferencePoint Press, Inc., 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

John Le Carré's post-cold war fiction. Columbia, Mo: University of Missouri Press, 2017.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Stefoff, Rebecca. Security vs. privacy: Open for debate. New York: Marshall Cavendish Benchmark, 2008.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Graham, Brad. 101 spy gadgets for the evil genius. 2a ed. New York, NY: McGraw-Hill/TAB Electronics, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Electronic surveillance in literature"

1

Moorlock, Greg. "Electronic Surveillance". In Encyclopedia of Global Bioethics, 1–7. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-05544-2_167-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Hollien, Harry. "Electronic Surveillance". In The Acoustics of Crime, 105–25. Boston, MA: Springer US, 1990. http://dx.doi.org/10.1007/978-1-4899-0673-1_5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Weik, Martin H. "electronic surveillance". In Computer Science and Communications Dictionary, 504. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_6007.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Moorlock, Greg. "Electronic Surveillance". In Encyclopedia of Global Bioethics, 1088–95. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-09483-0_167.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

ten Have, Henk, e Maria do Céu Patrão Neves. "Electronic Surveillance". In Dictionary of Global Bioethics, 455. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54161-3_223.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

del Carmen, Rolando V., e Jeffery T. Walker. "Electronic Surveillance". In Briefs of Leading Cases in Law Enforcement, 177–86. Tenth edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9780429053139-12.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

O’Sullivan, James. "Electronic Literature". In Towards a Digital Poetics, 23–59. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11310-0_2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Fitch, Claire. "Electronic Literature". In Sounding Emerging Media, 43–61. London: Focal Press, 2022. http://dx.doi.org/10.4324/9781003046561-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Lowe, David. "Surveillance of electronic communications". In Terrorism, Law and Policy, 147–77. 2a ed. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003195627-13.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Daems, Tom. "Electronic Monitoring in a Culture of Surveillance". In Electronic Monitoring, 1–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-34039-1_1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Electronic surveillance in literature"

1

Khastoo, Reza, Sameer Mostafa e Alastair Fraser. "Thermal Wellbore Failure Detection Case Studies: A High Temperature Multi-Finger Caliper Surveillance Approach". In SPE 2021 Symposium Compilation. SPE, 2021. http://dx.doi.org/10.2118/208445-ms.

Texto completo da fonte
Resumo:
Abstract Cooling of thermal wellbores such as steam assisted gravity drainage (SAGD) and cyclic steam stimulation (CSS) wells, is a common prerequistite to allow deployment of logging instruments due to the temperature limitation of imaging instruments’ electronics (<150°C). This paper presents a memory caliper technology housed in a thermoshield that can perform at up to 220°C, with the acquired data used to evaluate the integrity of tubulars and completion items (metal loss, deposition, deformation, and gap/hole damage), negating the need for cooling before deployment. Two cases are presented. One is a SAGD well with liner screens across the lateral section. The memory multi-finger caliper was deployed using coiled tubing and the data were successfully obtained across the lateral section with a maximum recorded temperature of 169°C. The second example is a vertical well in a steam flood field. Because of the uncertainty over the downhole temperature at the time of the well intervention, a temperature sensor was deployed in surface read-out mode above the caliper. This ensured the 220° temperature limit of the caliper would not be breached, and a maximum temperature of 208°C was recorded. The data confirm the feasibility of acquiring high accuracy/high resolution data from thermal wellbores without having to resort to manipulative cooling techniques to attain a temperature below 150°C. Enlargement of a limited entry perforation (LEP) was observed in the horizontal well and buckling was clearly detected in the vertical well. The broad measurement range of the caliper – 1.85" – 7.2" – enabled both the tubing and liner to be logged in a single well intervention, which facilitated a swift resumption of of steam injection activities. Ultimately, the high temperature MFC's ability to minimize deliberate cooling the thermal wellsbore before deployment, has time and cost saving implications throughout the life cycle of the well. Much of the existing literature examining downhole data acquistion in thermal wells, for the diagnosis of wellbore integrity issues, has relied on technologies that are unable to withstand temperatures much greater than 150°C. The ability to execute well interventions for data acquistion at higher temperatures offers the potential for empirical studies that compare the status and integrity of the wellbore completion in thermal and cooled conditions.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Sondagar, Bhavisha, Dhruvi Sheth, Pooja Raundale e Meloni Patel. "Systematic Literature Review of Rainforest Surveillance". In 2023 International Conference on Advanced Computing Technologies and Applications (ICACTA). IEEE, 2023. http://dx.doi.org/10.1109/icacta58201.2023.10392337.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Wickramasuriya, Jehan, Mohanned Alhazzazi, Mahesh Datt, Sharad Mehrotra e Nalini Venkatasubramanian. "Privacy-protecting video surveillance". In Electronic Imaging 2005, editado por Nasser Kehtarnavaz e Phillip A. Laplante. SPIE, 2005. http://dx.doi.org/10.1117/12.587986.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Hourcade, Juan Pablo, Ann Cavoukian, Ronald Deibert, Lorrie Faith Cranor e Ian Goldberg. "Electronic privacy and surveillance". In CHI '14: CHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM, 2014. http://dx.doi.org/10.1145/2559206.2579403.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Frikken, Keith B., e Mikhail J. Atallah. "Privacy preserving electronic surveillance". In Proceeding of the ACM workshop. New York, New York, USA: ACM Press, 2003. http://dx.doi.org/10.1145/1005140.1005148.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Kumar, K. Kishore, e H. Venkateswera Reddy. "Literature Survey On Video Surveillance Crime Activity Recognition". In 2022 First International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR). IEEE, 2022. http://dx.doi.org/10.1109/icaitpr51569.2022.9844189.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ghanem, Nagia M., David S. Doermann, Larry S. Davis e Daniel F. DeMenthon. "Mining tools for surveillance video". In Electronic Imaging 2004, editado por Minerva M. Yeung, Rainer W. Lienhart e Chung-Sheng Li. SPIE, 2003. http://dx.doi.org/10.1117/12.530607.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Sato, Kazuya, Akihiro Tsukada, Fumio Matsuda, Kaoru Kawasaki e Minoru Ozaki. "Multimedia systems for industrial surveillance". In Electronic Imaging '97, editado por Martin Freeman, Paul Jardetzky e Harrick M. Vin. SPIE, 1997. http://dx.doi.org/10.1117/12.264291.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Schouten, Theo E., Harco C. Kuppens e Egon L. van den Broek. "Video surveillance using distance maps". In Electronic Imaging 2006, editado por Nasser Kehtarnavaz e Phillip A. Laplante. SPIE, 2006. http://dx.doi.org/10.1117/12.643708.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Leiden, Kenneth, Alicia Fernandes e Stephen Atkins. "Managing aircraft by trajectory: Literature review and lessons learned". In 2018 Integrated Communications, Navigation, Surveillance Conference (ICNS). IEEE, 2018. http://dx.doi.org/10.1109/icnsurv.2018.8384864.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Electronic surveillance in literature"

1

Vande Griend, Nicholas A. Non-Traditional Intelligence, Reconnaissance, and Surveillance Electronic Intelligence for the Operational Electronic Warfare Officer. Fort Belvoir, VA: Defense Technical Information Center, maio de 2012. http://dx.doi.org/10.21236/ada564229.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Burcham, Patricia. A Comprehensive Literature Review of Autonomous Surveillance Technologies Relating to Dismounted Soldiers. Aberdeen Proving Ground, MD: DEVCOM Analysis Center, dezembro de 2022. http://dx.doi.org/10.21236/ad1188321.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Tobin, J., B. Chung, K. Moore, S. Yu, A. Schwartz, M. Wall, S. Morton et al. L1 Report for the Enhanced Surveillance Campaign Experimental Benchmarking of Pu Electronic Structure. Office of Scientific and Technical Information (OSTI), janeiro de 2006. http://dx.doi.org/10.2172/900152.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

STROYKOV, S., e I. NIKITINA. THE CURRENT STATE OF THE PROBLEM OF HYPERTEXT IN LINGUISTIC LITERATURE. Science and Innovation Center Publishing House, 2022. http://dx.doi.org/10.12731/2077-1770-2022-14-2-3-50-73.

Texto completo da fonte
Resumo:
In this paper it’s the first time the authors have reviewed linguistic literature (2008-2022) devoted to the problem of literary and electronic hypertext. The purpose of the paper is to review linguistic literature and identify the current state of the problem of literary and electronic hypertext. Materials and methods. On the basis of this purpose we reviewed 42 scientific papers published in 2008-2022 and representing the results of linguistic research of literary and electronic hypertext. For our study we used an analytical and descriptive method, which is traditional for linguistics and allows us to solve the tasks set in our paper. Results. A review of linguistic papers has shown that hypertext is a relevant subject of linguistic research. Scientists propose various definitions of this concept; consider it as a “special information and communication environment”. Many studies are devoted to literary (fiction and non-fiction) hypertext, however, a much larger number of papers are devoted to various aspects of electronic hypertext, including electronic fiction hypertext and electronic hypertext of some genres (news genres, online advertising, social network and online diary community as well as websites). We consider that it is the electronic environment where hypertext is implemented in all its functions. Practical implications. The results of the study can be used as a theoretical basis for further theoretical and practical study of various aspects of literary and electronic hypertext.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Patton, Carl E. Microwave Magnetic Solitons in Ferrite Films - Physics and Devices for Radar, Electronic Countermeasures, and Surveillance. Fort Belvoir, VA: Defense Technical Information Center, dezembro de 2001. http://dx.doi.org/10.21236/ada398901.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Cassidy, Michael, e Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I. West Lafayette, IN: Purdue University, 1990. http://dx.doi.org/10.5703/1288284314184.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Wang, Mu-Han, e Michael Cassidy. An Electronic Surveillance and Control System for the Management of Traffic on the Borman Expressway. West Lafayette, IN: Purdue University, 1996. http://dx.doi.org/10.5703/1288284313138.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Cassidy, Michael, e Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I. Purdue University Press, 1990. http://dx.doi.org/10.5703/1288284313426.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Cassidy, Michael, e Kumares Sinha. An Electronic Surveillance and Control System for Traffic Management on the Borman Expressway, Part I : Executive Summary. West Lafayette, IN: Purdue University, 1990. http://dx.doi.org/10.5703/1288284314185.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

US ARMY ELECTRONIC PROVING GROUND. Safety and Health Evaluation - Command, Control Communication, Computers, Intelligence, Surveillance, Reconnaissance, and Electronic Warfare Equipment. Change 1. Fort Belvoir, VA: Defense Technical Information Center, fevereiro de 2015. http://dx.doi.org/10.21236/ada621717.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia