Literatura científica selecionada sobre o tema "Union Society for the Detection of Thieves"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Union Society for the Detection of Thieves".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Union Society for the Detection of Thieves"

1

Yamini Devi, J., Karthikeya Murki, B. Hanmanthu, Ayush Ram e Mohd Kamran. "An Efficient Novel Approach for Detection of Fuel Monitoring System through IoT Sensors for a Sustainable Environment". E3S Web of Conferences 430 (2023): 01095. http://dx.doi.org/10.1051/e3sconf/202343001095.

Texto completo da fonte
Resumo:
To address the Fuel Theft situation currently faced by society, a project has been designed to create a Fuel Theft and Monitoring system. Fuel theft is an illegal act that involves stealing fuel from vehicles or storage facilities. With the rising fuel prices, this issue has become a growing problem. There are various methods employed by fuel thieves, including siphoning, drilling, burglary, and tampering with fuel gauges. Among these, siphoning is the most frequently used method, where thieves use a hose to extract fuel from the vehicle’s tank. They may suck on the hose or use a pump to facilitate the process, which can be done quickly and easily in a matter of minutes. Burglary is a more destructive method where thieves break into a vehicle to directly access and steal fuel from the tank, potentially causing damage to the vehicle. Tampering with fuel gauges is another method used by fuel thieves, whereby they manipulate the gauges to make it appear as if the tank is empty when it is actually full. This allows them to fill up the tank without paying for the fuel. Fuel theft has significant financial implications for businesses and individuals alike. In the United States, it is estimated to cost businesses billions of dollars annually. Furthermore, fuel theft can also result in environmental pollution, as thieves may dispose of the stolen fuel on the ground or in waterways. Additionally, fuel theft during transit is a common occurrence, with reports suggesting that around 16% of diesel filled in trucks is stolen. This alone amounts to a theft of significant value each year. Addressing fuel theft requires proactive measures to protect oneself and prevent such crimes. One solution involves leveraging IoT technology, specifically using modules like GSM, GPS, and cloud computing. By implementing these technologies, we can work towards eradicating the problem of fuel theft and a sustainable environment.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Udovenko, Ilya V. "The space of unfreedom: GULAG and its society". Samara Journal of Science 9, n.º 2 (29 de maio de 2020): 204–9. http://dx.doi.org/10.17816/snv202211.

Texto completo da fonte
Resumo:
This paper analyzes the GULAG as a social phenomenon of the Soviet society and as a specific type of the Soviet unfree space. In particular, it considers social constructs and the relation between the camp administration, prisoners, hired workers and the local population. Paying close attention to the analysis of the social groups which a camp population was comprised of, their gender and social structure, this paper explores the living conditions, mode of life, customs and mores of the social environment in a camp. Based on the large database of various historical sources, such as governmental acts, statistical evidence, archival documents, publications in the camp press and memoirs, this paper also relies on the video interviews of former prisoners collected by the GULAG History Museum. Without denying the authoritarian nature of the corrective-labor camp system, the author came to the conclusion that the established organizational model of camp complexes determined the lack of distinct borders between the camp social space and the public space of the free world. Such blurred structure of corrective-labor camps leads to the fact that the camp culture with its archaic social principles dominated by the thieves culture extended its considerable influence over the whole society of the Soviet Union.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Sonkar, Riddhi, Sadhana Rathod, Renuka Jadhav e Deepali Patil. "CROWD ABNORMAL BEHAVIOUR DETECTION USING DEEP LEARNING". ITM Web of Conferences 32 (2020): 03040. http://dx.doi.org/10.1051/itmconf/20203203040.

Texto completo da fonte
Resumo:
Crowd analysis has become an extremely famous research point in the territory of computer vision. Computerized examination of group exercises utilizing reconnaissance recordings is a significant issue for public security since it permits the identification of hazardous groups and where they’re going. We all see how many problems are faced because of the crowd. In our country, many terrorists are there. They plant a bomb in a crowded area which causes a lot of injuries. Thieves are mostly found or always leave in crowded areas so they can easily get an advantage of the crowd. In that situation, crowd analysis is very important. This paper presents the design of the deep learning architecture that provides control over the crowd behavior that will help to avoid violence or any other act which occurs because of the crowd which causes harmful effects to the society. So we are proposing a system that detects abnormal behavior of crowds using deep learning techniques.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Jung, Minji, Heekyung Yang e Kyungha Min. "Improving Deep Object Detection Algorithms for Game Scenes". Electronics 10, n.º 20 (17 de outubro de 2021): 2527. http://dx.doi.org/10.3390/electronics10202527.

Texto completo da fonte
Resumo:
The advancement and popularity of computer games make game scene analysis one of the most interesting research topics in the computer vision society. Among the various computer vision techniques, we employ object detection algorithms for the analysis, since they can both recognize and localize objects in a scene. However, applying the existing object detection algorithms for analyzing game scenes does not guarantee a desired performance, since the algorithms are trained using datasets collected from the real world. In order to achieve a desired performance for analyzing game scenes, we built a dataset by collecting game scenes and retrained the object detection algorithms pre-trained with the datasets from the real world. We selected five object detection algorithms, namely YOLOv3, Faster R-CNN, SSD, FPN and EfficientDet, and eight games from various game genres including first-person shooting, role-playing, sports, and driving. PascalVOC and MS COCO were employed for the pre-training of the object detection algorithms. We proved the improvement in the performance that comes from our strategy in two aspects: recognition and localization. The improvement in recognition performance was measured using mean average precision (mAP) and the improvement in localization using intersection over union (IoU).
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Yu, Haiyang, Ruili Wang, Pengao Li e Ping Zhang. "Flood Detection in Polarimetric SAR Data Using Deformable Convolutional Vision Model". Water 15, n.º 24 (5 de dezembro de 2023): 4202. http://dx.doi.org/10.3390/w15244202.

Texto completo da fonte
Resumo:
Floods represent a significant natural hazard with the potential to inflict substantial damage on human society. The swift and precise delineation of flood extents is of paramount importance for effectively supporting flood response and disaster relief efforts. In comparison to optical sensors, Synthetic Aperture Radar (SAR) sensor data acquisition exhibits superior capabilities, finding extensive application in flood detection research. Nonetheless, current methodologies exhibit limited accuracy in flood boundary detection, leading to elevated instances of both false positives and false negatives, particularly in the detection of smaller-scale features. In this study, we proposed an advanced flood detection method called FWSARNet, which leveraged a deformable convolutional visual model with Sentinel-1 SAR images as its primary data source. This model centered around deformable convolutions as its fundamental operation and took inspiration from the structural merits of the Vision Transformer. Through the introduction of a modest number of supplementary parameters, it significantly extended the effective receptive field, enabling the comprehensive capture of intricate local details and spatial fluctuations within flood boundaries. Moreover, our model employed a multi-level feature map fusion strategy that amalgamated feature information from diverse hierarchical levels. This enhancement substantially augmented the model’s capability to encompass various scales and boost its discriminative power. To validate the effectiveness of the proposed model, experiments were conducted using the ETCI2021 dataset. The results demonstrated that the Intersection over Union (IoU) and mean Intersection over Union (mIoU) metrics for flood detection achieved impressive values of 80.10% and 88.47%, respectively. These results surpassed the performance of state-of-the-art (SOTA) models. Notably, in comparison to the best results documented on the official ETCI2021 dataset competition website, our proposed model in this paper exhibited a remarkable 3.29% improvement in flood prediction IoU. The experimental outcomes underscore the capability of the FWSARNet method outlined in this paper for flood detection using Synthetic Aperture Radar (SAR) data. This method notably enhances the accuracy of flood detection, providing essential technical and data support for real-world flood monitoring, prevention, and response efforts.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Voishcheva, Kristina Aleksandrovna, Aleksei Valerievich Bondarenko, Larisa Sergeevna Pritchina e Valentin Yur’evich Vakhrushev. "Digitalization of customs control of cultural properties in international trad". Mezhdunarodnaja jekonomika (The World Economics), n.º 5 (1 de maio de 2021): 363–75. http://dx.doi.org/10.33920/vne-04-2105-04.

Texto completo da fonte
Resumo:
The development of international trade and the growing influence of visual images on the consciousness of modern society have led to a steadily growing demand for art objects. However, the art market is a gold mine for professional thieves. Every month, more than a thousand works of art are stolen in the world. The criminal art business ranks third after drug trafficking and the arms trade. The level of detection of crimes related to the theft of art objects is still negligibly low (only 1.5 % of court cases end in favor of the owners), the amount of money is colossal (according to general estimates, the global value of stolen works is 3.7 billion pounds), and the interest of the internal authorities of different countries in training specialized search personnel is scanty. The relevance of the presented topic lies in the fact that the globalization of international trade in cultural values and the high corruption component require improving customs administration and improving the quality of customs activities. Today, innovative technologies are able to automate the process of control over cultural values, speed up and simplify the process of interaction between foreign trade participants and customs authorities, as well as ensure complete safety of transportation of cultural heritage objects. Objective: to develop proposals for improving customs control over the movement of cultural property, in particular, by creating an information interdepartmental system for monitoring the movement of cultural property using blockchain technologies and the Internet of Things, which can provide greater transparency in the movement of art objects. Object of research: ensuring customs control over the movement of cultural heritage objects. Subject of research: cutting-edge technologies as a means of improving the effectiveness of customs control over the movement of cultural property.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Würnschimmel, Christoph, Dominik Menges, Maciej Kwiatkowski, Silvan Sigg, Lukas Prause, Agostino Mattei, Daniel Engeler et al. "Prostate cancer screening in Switzerland: a literature review and consensus statement from the Swiss Society of Urology". Swiss Medical Weekly 154, n.º 5 (31 de maio de 2024): 3626. http://dx.doi.org/10.57187/s.3626.

Texto completo da fonte
Resumo:
Over a decade ago, the United States Preventive Services Taskforce (USPSTF) recommended against prostate-specific antigen (PSA)-based screening for prostate cancer in all men, which considerably influenced prostate cancer screening policies worldwide after that. Consequently, the world has seen increasing numbers of advanced stages and prostate cancer deaths, which later led the USPSTF to withdraw its initial statement. Meanwhile, the European Union has elaborated a directive to address the problem of implementing prostate cancer screening in “Europe’s Beating Cancer Plan”. In Switzerland, concerned urologists formed an open Swiss Prostate Cancer Screening Group to improve the early detection of prostate cancer. On the 20th of September 2023, during the annual general assembly of the Swiss Society of Urology (SGU/SSU) in Lausanne, members positively voted for a stepwise approach to evaluate the feasibility of implementing organised prostate cancer screening programs in Switzerland. The following article will summarise the events and scientific advances in the last decade during which evidence and promising additional modalities to complement PSA-based prostate cancer screening have emerged. It also aims to provide an overview of contemporary strategies and their potential harms and benefits.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Bian, Genqing, Wenjing Qu e Bilin Shao. "Blockchain-Based Trusted Federated Learning with Pre-Trained Models for COVID-19 Detection". Electronics 12, n.º 9 (30 de abril de 2023): 2068. http://dx.doi.org/10.3390/electronics12092068.

Texto completo da fonte
Resumo:
COVID-19 is a serious epidemic that not only endangers human health, but also wreaks havoc on the development of society. Recently, there has been research on using artificial intelligence (AI) techniques for COVID-19 detection. As AI has entered the era of big models, deep learning methods based on pre-trained models (PTMs) have become a focus of industrial applications. Federated learning (FL) enables the union of geographically isolated data, which can address the demands of big data for PTMs. However, the incompleteness of the healthcare system and the untrusted distribution of medical data make FL participants unreliable, and medical data also has strong privacy protection requirements. Our research aims to improve training efficiency and global model accuracy using PTMs for training in FL, reducing computation and communication. Meanwhile, we provide a secure aggregation rule using differential privacy and fully homomorphic encryption to achieve a privacy-preserving Byzantine robust federal learning scheme. In addition, we use blockchain to record the training process and we integrate a Byzantine fault tolerance consensus to further improve robustness. Finally, we conduct experiments on a publicly available dataset, and the experimental results show that our scheme is effective with privacy-preserving and robustness. The final trained models achieve better performance on the positive prediction and severe prediction tasks, with an accuracy of 85.00% and 85.06%, respectively. Thus, this indicates that our study is able to provide reliable results for COVID-19 detection.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Anderson, David. "Stock theft and moral economy in colonial Kenya". Africa 56, n.º 4 (outubro de 1986): 399–416. http://dx.doi.org/10.2307/1159997.

Texto completo da fonte
Resumo:
Opening ParagraphFrom the earliest years of colonial government in Kenya, cattle raiding by Africans against their neighbours, and in particular livestock thefts from European farmers, presented the administration with their most persistent policing problem in the rural areas of the colony. As the period of colonial rule in Kenya was drawing to a close, reported cases of stock theft were once again showing a sharp increase, climbing from 1578 cases in 1955 to 4243 in 1962 (Kenya Police Dept, 1955 and 1962). In a pattern by then familiar to the Kenya administration, this prompted the renewal of demands from the European settler community for more extensive and concerted government action to deal with the activities of the thieves. Settler opinion held that the continuing prevalence of stock theft had much to do with the ‘social prestige’ attached to the crime in many African communities. The unwillingness of the African public to assist in the prevention and detection of stock theft had long been interpreted as a tacit sanctioning of such theft, leading to the conclusion that, within the ‘moral economy’ of many African communities, stock theft was not thought of as a crime at all. ‘After all,’ commented the Provincial Commissioner of the Rift Valley Province in 1959, ‘stock theft is the traditional sport of the young men of many tribes, and the elders cannot be expected to act as kill-joys and stamp it out unless they themselves are liable to suffer.’ This view was applied most readily to the pastoralists of the Rift Valley and western Kenya, the Maasai and Kalenjin, who were commonly involved in crimes of this sort. The belief that stock theft was an acceptable form of accumulation within Kalenjin and Maasai society determined the nature of the legislation put forward by the colonial administration to deal with the crime. Policing and punishment were accordingly based upon the notion of collective responsibility for acts of stock theft, with wide powers to extend collective punishments to families, villages and even entire locations found to be implicated in thefts.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Radosic, Nadezda, Dragana Kastratovic, Snjezana Tomic, Milica Terzic, Srdjan Markovic e Branko Milakovic. "Awareness detection in anaesthesia during otorhino-maxillofacial surgery using bispectral index - monitoring technology". Medical review 65, n.º 3-4 (2012): 111–14. http://dx.doi.org/10.2298/mpns1204111r.

Texto completo da fonte
Resumo:
Introduction. Awareness is characterized by intraoperative presence of consciousness and recollecting of the events occurring during general anaesthesia. The study was aimed at detecting awareness during general anaesthesia in otorhino-maxillofacial procedure. Methods. The study is a part of a prospective, phase IV, academic study carried out at the Department for Otorhinolaringology, Clinical Centre of Serbia, and Maxillofacial Surgery. The study was approved by the Ethics Committee of the Clinical Centre of Serbia and performed in accordance with European Union Clinical Trials Directive. The evaluation included 40 patients (T-propofol and Esevofluran group) subjected to different surgical procedures (American Society of Anesthesiologists I-III). Depth of anaesthesia was monitored during surgical procedures according to the hemodynamic parameters (blood pressure, pulse, oxygen saturation, electrocardiography, capnometry). Bispectral index monitoring was applied; however, the insight into the obtained bispectral index values was possible only after the completion of the surgery when the comparison with hemodynamic values was performed. Modified Brice interview was postoperatively applied to the patients in whom awareness was suspected. Results. Based on the hemodynamic parameter values obtained in 40 anesthetized patients, no cases of awareness were expected. After the completion of the surgical procedures, the recorded graphic and numeric bispectral index values obtained in the course of anaesthesia were analyzed. Higher bispectral index values (BIS > 60) were recorded in 1 T-group patient. Conclusion. It is possible to miss an awareness episode without using bispectral index technology monitoring during general anaesthesia in otorhinolaryngology and maxillofacial surgery. Bispectral index monitoring should be the clinical standard in general anaesthesia.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Union Society for the Detection of Thieves"

1

Baysoy, D. Y., M. Subaşi, Angelos Angelopoulos e Takis Fildisis. "Detection of Landmines by Neutron Backscattering: Effects of Soil Moisture on the Detection System". In ORGANIZED BY THE HELLENIC PHYSICAL SOCIETY WITH THE COOPERATION OF THE PHYSICS DEPARTMENTS OF GREEK UNIVERSITIES: 7th International Conference of the Balkan Physical Union. AIP, 2010. http://dx.doi.org/10.1063/1.3322558.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Zografov, N., N. Tankovsky, M. Vankov, Angelos Angelopoulos e Takis Fildisis. "Excitation, Detection and Analysis of Low-Frequency Electroacoustic Signals in Electrolytes". In ORGANIZED BY THE HELLENIC PHYSICAL SOCIETY WITH THE COOPERATION OF THE PHYSICS DEPARTMENTS OF GREEK UNIVERSITIES: 7th International Conference of the Balkan Physical Union. AIP, 2010. http://dx.doi.org/10.1063/1.3322322.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Mijovic, S. R., M. J. Vuceljic, Angelos Angelopoulos e Takis Fildisis. "Detection of Group of Super Fast Electrons in Hydrogen Plasma From the Ratio of the Intensity of H[sub 2] Fulcher α(d[sup 3]Π[sub u]−a[sup 3]Σ[sub g]) and H[sub α] Spectral Lines". In ORGANIZED BY THE HELLENIC PHYSICAL SOCIETY WITH THE COOPERATION OF THE PHYSICS DEPARTMENTS OF GREEK UNIVERSITIES: 7th International Conference of the Balkan Physical Union. AIP, 2010. http://dx.doi.org/10.1063/1.3322397.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Gerginova, Tatjana. "NATIONAL SECURITY AND RESISTANCE OF THE REPUBLIC OF NORTH MACEDONIA IN A MODERN GLOBAL SECURITY ENVIRONMENT". In SECURITY HORIZONS. Faculty of Security- Skopje, 2022. http://dx.doi.org/10.20544/icp.3.6.22.p10.

Texto completo da fonte
Resumo:
In the framework of the paper, the author will analyze the need of the Republic of North Macedonia for effective and efficient dealing with hybrid threats in order to protect the national interests and create national resilience of the society. Prevention from threats is one of the primary goals of the Republic of North Macedonia. For the achievement of this goal, in the Strategy for building resilience and dealing with hybrid threats, the use of certain methods is determined. The Strategy identifies six instruments aimed at creating an ability to detect and reduce vulnerability to hybrid threats, while seeking to increase the ability to respond in accordance with the framework established by NATO and the European Union. The activities of the state will be divided into six areas of operational activities: political instruments, economic instruments, military forces, civilian instruments, information instruments and the need to protect critical infrastructure. In the concluding remarks, the author gives recommendations in the direction of how Macedonia can effectively deal with hybrid threats (every country must build an effective concept for tackling a range of challenges as well as defense against cyber and hybrid threats; each country must be able to adapt to the unpredictable, complex and changing security environment, establishing and maintaining appropriate security capabilities with the primary goal of protecting national interests, etc.). The content will be prepared on the basis of analysis of scientific literature and using electronic content. In the preparation of the content of the paper, the author will apply the general scientific methods: descriptive method, normative method, comparative method and the method of content analysis as a separate scientific method. Keywords: national resilience, hybrid threats, detection, rejection and response to threats
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia