• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 54
  • 16
  • 5
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 99
  • 99
  • 27
  • 21
  • 21
  • 20
  • 20
  • 16
  • 16
  • 14
  • 13
  • 12
  • 11
  • 11
  • 11
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Statistical modeling for low level vision algorithms /

Gao, Xiang, January 2002 (has links)
Thesis (Ph. D.)--Lehigh University, 2003. / Includes vita. Includes bibliographical references (leaves 167-176).
22

A low-complexity radar for human tracking

Lin, Adrian 28 August 2008 (has links)
Not available / text
23

Planning, localization, and mapping for a mobile robot in a camera network

Meger, David Paul. January 2007 (has links)
Networks of cameras such as building security systems can be a source of localization information for a mobile robot assuming a map of camera locations as well as calibration information for each camera is available. This thesis describes an automated system to acquire such information. A fully automated camera calibration system uses fiducial markers and a mobile robot in order to drastically improve ease-of-use compared to standard techniques. A 6DOF EKF is used for mapping and is validated experimentally over a 50 m hallway environment. Motion planning strategies are considered both in front of a single camera to maximize calibration accuracy and globally between cameras in order to facilitate accurate measurements. For global motion planning, an adaptive exploration strategy based on heuristic search allows compromise between distance traveled and final map uncertainty which provides the system a level of autonomy which could not be obtained with previous techniques.
24

Combining multiple Iris matchers using advanced fusion techniques to enhance Iris matching performance

Nelufule, Nthatheni Norman 17 September 2014 (has links)
M.Phil. (Electrical And Electronic Engineering) / The enormous increase in technology advancement and the need to secure information e ectively has led to the development and implementation of iris image acquisition technologies for automated iris recognition systems. The iris biometric is gaining popularity and is becoming a reliable and a robust modality for future biometric security. Its wide application can be extended to biometric security areas such as national ID cards, banking systems such as ATM, e-commerce, biometric passports but not applicable in forensic investigations. Iris recognition has gained valuable attention in biometric research due to the uniqueness of its textures and its high recognition rates when employed on high biometric security areas. Identity veri cation for individuals becomes a challenging task when it has to be automated with a high accuracy and robustness against spoo ng attacks and repudiation. Current recognition systems are highly a ected by noise as a result of segmentation failure, and this noise factors increase the biometric error rates such as; the FAR and the FRR. This dissertation reports an investigation of score level fusion methods which can be used to enhance iris matching performance. The fusion methods implemented in this project includes, simple sum rule, weighted sum rule fusion, minimum score and an adaptive weighted sum rule. The proposed approach uses an adaptive fusion which maps feature quality scores with the matcher. The fused scores were generated from four various iris matchers namely; the NHD matcher, the WED matcher, the WHD matcher and the POC matcher. To ensure homogeneity of matching scores before fusion, raw scores were normalized using the tanh-estimators method, because it is e cient and robust against outliers. The results were tested against two publicly available databases; namely, CASIA and UBIRIS using two statistical and biometric system measurements namely the AUC and the EER. The results of these two measures gives the AUC = 99:36% for CASIA left images, the AUC = 99:18% for CASIA right images, the AUC = 99:59% for UBIRIS database and the Equal Error Rate (EER) of 0.041 for CASIA left images, the EER = 0:087 for CASIA right images and with the EER = 0:038 for UBIRIS images.
25

Campus policing : an ethnography of the University of Cape Town Campus Control Unit

Ncube, Lashias January 1996 (has links)
Includes bibliography. / The aim of undertaking the project was to investigate the activities of the University of Cape Town Campus Control unit. The study is based on the premise that there is an underestimation of Campus Control work. A number of basic questions were examined in the field. The researcher sought to determine, among other things, the extent to which the unit's work is invisible, and the extent to which the university community's reported ambivalence and indifference to Campus Control practice a result of a lack of clarity regarding the role of the unit within the university. The research also moved from the premise that there is too great an emphasis on the use of crime statistics as indices of the unit' effectiveness. The racial and gender configuration of assignments was also investigated as was the training offered to new and old recruits. Participant observation as a body of different methods and techniques of research was used. The researcher spent six weeks in the field with the campus control officers in order to experience the demands of policing from "the native's point of view". The unit is in the process of transforming. It seeks to embrace the discourse of community participation with a view to getting the entire community involved in the provision of its own safety and security. The community involvement initiatives are also designed to improve the relationship between the unit and the community. In the past, the relationship has been a very traumatic one, fraught with mistrust and had far-reaching consequences for the unit's performance. The study comes to the conclusion that both women and blacks in Campus Control are a case of structural marginality. The unit does not reflect the racial and gender composition of the community it serves. It was also discovered that some of the unit's glaring shortcomings are played out in the sphere of training. The study should help members of the university community to understand and appreciate the role of this indispensable unit within the university community.
26

Occlusion Tolerant Object Recognition Methods for Video Surveillance and Tracking of Moving Civilian Vehicles

Pati, Nishikanta 12 1900 (has links)
Recently, there is a great interest in moving object tracking in the fields of security and surveillance. Object recognition under partial occlusion is the core of any object tracking system. This thesis presents an automatic and real-time color object-recognition system which is not only robust but also occlusion tolerant. The intended use of the system is to recognize and track external vehicles entered inside a secured area like a school campus or any army base. Statistical morphological skeleton is used to represent the visible shape of the vehicle. Simple curve matching and different feature based matching techniques are used to recognize the segmented vehicle. Features of the vehicle are extracted upon entering the secured area. The vehicle is recognized from either a digital video frame or a static digital image when needed. The recognition engine will help the design of a high performance tracking system meant for remote video surveillance.
27

A study of the market and the buying behavior of electronic autosecurity systems for private cars in Hong Kong.

January 1993 (has links)
by Cheng Lai-fan, Candice, Li Po-yi, Mabel. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1993. / Includes bibliographical references (leaf 120). / ACKNOWLEDGMENT --- p.i / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iv / LIST OF TABLES --- p.vii / LIST OF FIGURES --- p.viii / Chapter / Chapter I. --- INTRODUCTION --- p.1 / Objectives of the Research --- p.2 / Chapter II. --- LITERATURE REVIEW --- p.4 / Number of Private Cars in Hong Kong --- p.4 / Problem of Vehicle Theft in Hong Kong --- p.5 / Definition of Electronic Autosecurity Systems --- p.8 / Market of Electronic Autosecurity Systems for Private Cars in Hong Kong --- p.9 / Chapter III. --- METHODOLOGY --- p.10 / Target Population --- p.10 / Method of Data Collection --- p.10 / Pretest --- p.11 / Questionnaire --- p.11 / Sampling --- p.12 / Chapter IV. --- SURVEY FINDINGS --- p.14 / Use of Autosecurity Systems --- p.14 / Demographic Data About the Respondents --- p.15 / Age --- p.15 / Sex --- p.15 / Education --- p.16 / Driving Experience --- p.16 / Data About the Car --- p.17 / Data About Mechanical Autosecurity Devices Installed --- p.18 / Degree of Satisfaction --- p.18 / Data About Electronic Autosecurity Systems Installed --- p.19 / Brand Awareness --- p.19 / Country of Origin --- p.19 / Time Spent on Information Search --- p.19 / Cost --- p.20 / Degree of Satisfaction --- p.20 / Satisfactory and Dissatisfactory Aspects --- p.22 / Information Sources --- p.24 / Evaluative Criteria in the Purchase of Electronic Autosecurity Systems --- p.25 / Decision Process --- p.26 / Product Switching Behavior of Users of Mechanical Autosecurity Devices --- p.28 / Chapter V. --- LIMITATIONS --- p.30 / Chapter VI. --- CONCLUSION AND RECOMMENDATIONS --- p.34 / Conclusion --- p.34 / Information Sources --- p.35 / Evaluative Criteria --- p.36 / Decision Process --- p.37 / Product Switching Behavior --- p.39 / Recommendations --- p.41 / Forecast of Market Potential of Electronic Autosecurity Systems for Private Cars in Hong Kong --- p.41 / Market Share --- p.41 / Market Potential --- p.42 / Other Considerations --- p.43 / Marketing Strategies --- p.43 / Product Strategies --- p.43 / Pricing Strategies --- p.45 / Promotional Strategies --- p.46 / Channel Strategies --- p.51 / APPENDIX / Chapter A. --- PRETESTED QUESTIONNAIRE (ENGLISH & CHINESE) --- p.52 / Chapter B. --- SUMMARY OF SURVEY FINDINGS --- p.63 / EXHIBIT / Chapter I. --- NEWSPAPER ARTICLES ON CAR THEFTS IN HONG KONG --- p.104 / Chapter II. --- PRODUCT CATALOGUES OF ELECTRONIC AUTOSECURITY SYSTEMS --- p.111 / BIBLIOGRAPHY --- p.120
28

A simulation of a microcomputer-based intrusion detection system

Bartholomew, John Warren January 2011 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
29

DirectShow Approach to Low-Cost Multimedia Security Surveillance System

Xiao, Wu 12 1900 (has links)
In response to the recent intensive needs for civilian security surveillance, both full and compact versions of a Multimedia Security Surveillance (MSS) system have been built up. The new Microsoft DirectShow technology was applied in implementing the multimedia stream-processing module. Through Microsoft Windows Driver Model interface, the chosen IEEE1394 enabled Fire-i cameras as external sensors are integrated with PC based continuous storage unit. The MSS application also allows multimedia broadcasting and remote controls. Cost analysis is included.
30

Estudo sobre sistemas de segurança em instalações elétricas automatizadas. / A study about security systems in automatized eletric installations.

Janes, Ricardo 15 April 2009 (has links)
Este trabalho apresenta um estudo sobre os principais sistemas de segurança utilizados em instalações elétricas automatizadas, com enfoque no controle de acesso físico, utilizando tecnologias biométricas. São apresentadas neste trabalho as principais características dos sistemas de segurança aplicados à detecção e combate de incêndios, ao controle do acesso físico, ao controle interno e externo da segurança, como circuitos fechados de televisão e controle de segurança perimetral, e as tecnologias biométricas que podem ser usadas para o controle de acesso de pessoas. É apresentado o desenvolvimento de um protótipo de baixo custo, utilizando tecnologia biométrica para o controle de acesso físico, assim como as principais vantagens e desvantagens, algoritmos e relações custo-benefício para o uso de biometria em sistemas de segurança. O estudo mostra que o uso da biometria como ferramenta para a melhoria dos sistemas de segurança existentes é uma tendência mundial, no entanto, existe uma preocupação crescente sobre a confidencialidade das informações biométricas das pessoas. / This work presents a study of the main security systems used in automatized electric installations, with approach in the physical access control, using biometric technologies. The main characteristics of the security systems applied to the detection and fire combat, to the physical access control, to the internal and external security control, as closed-circuits television and perimetral security control, and the biometric technologies are presented in this work that can be used for the people access control. The development of a low cost prototype is presented, using biometric technology for the physical access control, as well as the main advantages and disadvantages, algorithms and cost-benefit relations for the use of biometry in security systems. The study shows that the use of the biometry as tool for the existing security systems improvement is a world-wide trend, however, an increasing concern exists of the people biometric information confidentiality.

Page generated in 0.0908 seconds