Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
24,970 result(s) for "Video surveillance"
Sort by:
Background modeling and foreground detection for video surveillance
Background modeling and foreground detection are important steps in video processing used to detect robustly moving objects in challenging environments. This requires effective methods for dealing with dynamic backgrounds and illumination changes as well as algorithms that must meet real-time and low memory requirements.Incorporating both established and new ideas, Background Modeling and Foreground Detection for Video Surveillance provides a complete overview of the concepts, algorithms, and applications related to background modeling and foreground detection.
Peripheral Vision
In Portugal between 2005 and 2010, \"modernization through technology\" was the major political motto used to develop and improve the country's peripheral and backward condition. This study reflects on one of the resulting, specific aspects of this trend-the implementation of public video surveillance. The in-depth ethnography provides evidence of how the political construction of security and surveillance as a strategic program actually conceals intricate institutional relationships between political decision-makers and common citizens. Essentially, the detailed account of the major actors, as well as their roles and motivations, serves to explain phenomena such as the confusion between objective data and subjective perceptions or the lack of communication between parties, which as this study argues, underlies the idiosyncrasies and fragilities of Portugal's still relatively young democratic system.
Intelligent video surveillance systems : an algorithmic approach
This book will provide an overview of techniques for visual monitoring including video surveillance and human activity understanding. It will present the basic techniques of processing video from static cameras, starting with object detection and tracking. The author will introduce further video analytic modules including face detection, trajectory analysis and object classification. Examining system design and specific problems in visual surveillance, such as the use of multiple cameras and moving cameras, the author will elaborate on privacy issues focusing on approaches where automatic processing can help protect privacy-- Provided by publisher.
Automated detection of nocturnal motor seizures using an audio‐video system
Background Unsupervised nocturnal tonic‐clonic seizures (TCSs) may lead to sudden unexpected death in epilepsy (SUDEP). Major motor seizures (TCSs and hypermotor seizures) may lead to injuries. Our goal was to develop and validate an automated audio‐video system for the real‐time detection of major nocturnal motor seizures. Methods In this Phase‐3 clinical validation study, we assessed the performance of automated detection of nocturnal motor seizures using audio‐video streaming, computer vision and an artificial intelligence‐based algorithm (Nelli). The detection threshold was predefined, the validation dataset was independent from the training dataset, patients were prospectively recruited, and the analysis was performed in real time. The gold standard was based on expert evaluation of long‐term video electroencephalography (EEG). The primary outcome was the detection of nocturnal major motor seizures (TCSs and hypermotor seizures). The secondary outcome was the detection of other (minor) nocturnal motor seizures. Results We recruited 191 participants aged 1–72 years (median: 20 years), and we monitored them for 4183 h during the night. Device deficiency was present 10.5% of the time. Fifty‐one patients had nocturnal motor seizures during the recording. The sensitivity for the major motor seizures was 93.7% (95% confidence interval: 69.8%–99.8%). The system detected all 11 TCS and four out of five (80%) hypermotor seizures. For the minor motor seizure types, the sensitivity was low (8.3%). The false detection rate was 0.16 per h. Conclusion The Nelli system detects nocturnal major motor seizures with a high sensitivity and is suitable for implementation in institutions (hospitals, residential care facilities), where rapid interventions triggered by alarms can potentially reduce the risk of SUDEP and injuries.
Camera power : proof, policing, privacy, and audiovisual big data
Examines the policy questions raised by two ongoing revolutions in recording the police: copwatching and police-worn body cameras. Drawing on original research from over 200 jurisdictions and more than 100 interviews--with police leaders and officers, copwatchers, community members, civil rights and civil liberties experts, industry leaders, and technologists--Fan offers a vision of the potential and perils of the growing deluge of audiovisual big data.
Surveillance Video Georeference Method Based on Real Scene Model with Geometry Priors
With the comprehensive promotion of digital construction in China, cameras scattered throughout the country are of great significance in obtaining first-hand data. However, their potential role is limited due to the lack of georeference information on current surveillance cameras. Provided surveillance camera images and real scenes are combined and given georeference information, this problem can be solved, allowing cameras to generate significant social benefits. This article proposed an accurate registration method based on misalignment calibration and least squares matching between real scene and surveillance camera images to address this issue. Firstly, it is necessary to convert the navigation coordinate system from which cameras obtain data to the photogrammetric coordinate system and then solve for the misalignment and internal orientation elements of the camera. Then, accurate registration is achieved using the least squares matching on pyramid images. The experiment obtained surrounding image data of two common scenes with lens pitch angles of 45°, 55°, 65°, 75°, and 85° using the surveillance camera and obtained a 3D real scene model of each scene using a low-altitude aircraft. The experiment results show that the proposed method in this paper can achieve the expected goals of accurately matching real scene and surveillance camera images and assigning georeference information. Through extensive data analysis, the success rate and accuracy rate of registration are 98.1% and 97.06%, respectively.
Surveillance and film
\"Examines the ways that surveillance has been represented in cinema over the last forty years, especially themes of voyeurism, ethics, trust, and control\"-- Provided by publisher.
Drones, Real Estate Video Surveillance, and Neighbourhood Right to Privacy – The Potential Area of Normative Impact from the Perspective of the Polish Law
The use of new technologies covers more and more areas of social life, including securing and protecting property, especially real estate. For these purposes cameras mounted on drones may be used, allowing the possibility to record vidoes containing an overview of the monitored property (real estate). However, this type of property protection may also be connected with the violation of rights of neighboring property owners which are monitored indirectly. These issues are presented in this paper, where the author discusses, inter alia , what risks are associated with the implementation of neighborhood video surveillance done with drones and its consequences. Based on the indicated research area, the author wonders in particular on the provisions of the constitutional right to privacy and personal rights defined in the private law legislation, including its international dimension connected with ECHR and GDPR. The presentation containes observations made from the point of view of the Polish law, where—as in many other legal jurisdictions—these issues have not yet been resolved legislatively, and where the search for an optimal model for resolving similar problems is still underway. For this reason, the author tries to outline the potential area of normative impact of the phenomenon of real estate monitoring by drones, which may become helpful in the forthcoming legislative projects concerning the normalization of this phenomenon.
Your face belongs to us : a secretive startup's quest to end privacy as we know it
\"In this riveting feat of reporting, Kashmir Hill illuminates the improbable rise of Clearview AI and how Hoan Ton-That, a computer engineer and Richard Schwartz, a Giuliani associate, launched a terrifying facial recognition app with society-altering potential. They were assisted by a cast of controversial characters, including conservative provocateur Charles Johnson and billionaire Trump backer Peter Thiel. The app can scan a blurry portrait, and, in just seconds, collect every instance of a person's online life. It can find your name, your social media profiles, your friends and family, even your home address (as well as photos of you that you may not even have known existed). The story of Clearview AI opens up a window into a larger, more urgent one about our tortured relationship to technology, the way it entertains and seduces us even as it steals our privacy and lays us bare to bad actors in politics, criminal justice, and tech. This technology has been quietly growing more powerful for decades. Ubiquitous in China and Russia, it was also developed by American companies, including Google and Facebook, who decided it was too radical to release. That did not stop Clearview. They gave demos of the tech to interested private investors and contracted it out to hundreds of law enforcement agencies around the country. American law enforcement, including the Department of Homeland Security, has already used it to arrest people for everything from petty theft to assault. Without regulation it could expand the reach of policing-as it has in China and Russia-to a terrifying, dystopian level\"-- Provided by publisher.
Designing of Intelligent Video-Surveillance Systems in Road Tunnels Using Software Tools
Video Surveillance Systems (VSSs) are integral parts of road tunnels. Currently, they perform a number of functions, such as ensuring the protection of tunnel technologies, monitoring tunnel operation, or recognising license plates. If VSSs are to be designed to protect the tunnel and its technologies from unauthorised intentional human activity, it is necessary to ensure that they are designed in such a way as to meet the essential functionality requirement of the physical protection system (PPS). In this case, the VSS, as one of the alarm systems, should perform the function of early intrusion detection. The verification of the functionality of the PPS is possible using a software tool to model and simulate various intrusion scenarios. This article provides an example of the use of the SATANO software evaluation tool. The VSS enables multiple applications, such as monitoring, detection, knowledge, and identification. In this paper, the defined current standardised requirements for the design of VSSs in tunnels are considered from the point of view of their possible use for intelligent video analysis, enabling the recognition of various risk situations (e.g., faults or accidents of vehicles). Using the software tool, IP Video Design Tool, the requirements for the design of cameras in tunnels are assessed and adapted from the perspective of the use of intelligent video analysis. In the event that there is a requirement to use the VSS during emergency situations (e.g., fire), it is necessary to assess the operating conditions and period of time through which the VSS would operate in a given tunnel. This article presents the results of the simulation of the spread of a fire in a tunnel and its impact on the operation of the VSS.