1 |
Public street surveillance a psychometric study on the perceived social risk /Brooks, David Jonathan. January 2003 (has links)
Thesis (M.Sc.)--Edith Cowan University, 2003. / Submitted to the Faculty of Computing, Health and Science. Includes bibliographical references.
|
2 |
Seeing red discourse, metaphor, and the implementation of red light cameras in Texas /Hayden, Lance Alan, January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2009. / Title from PDF title page (University of Texas Digital Repository, viewed on Sept. 9, 2009). Vita. Includes bibliographical references.
|
3 |
Am I being watched on the internet?: examining user perceptions of privacy, stress and self-monitoring under online surveillanceIp, Wai Ho 01 November 2013 (has links)
Modes of communication in modern society have become instant and frequent. Internet users usually post ongoing activities and check their friends’ statuses with texts and photos in social networking sites. During information seeking and sharing processes, they enable peer-to-peer surveillance on the Internet. The present research adopts Foucault’s (1977) Panopticon as a metaphor to investigate this new advent of online surveillance. Surveillance from unknown people on the Internet may not always exist, but the perception of being surveilled could be embedded in the users’ mind. This kind of suspicion may generate some surveillance effects such as low self-esteem and communication discouragement, namely panoptic effects without the presence of actual surveillance (Botan, 1996). This study focuses on the negative panoptic effects to Internet users, leading to three hypotheses related to privacy infringement, Internet stress and self-monitoring. An online survey was conducted with 325 respondents aged from 18 to 29. Regression analyses were used to investigate the explanatory power of one’s perception of being surveilled on the outcome variables. The results showed that the respondents with higher level of perceived online surveillance report higher sense of privacy infringement, more situational stress and higher desire of self-monitoring in their online disclosure. With awareness of being surveilled, the respondents realize the information they share online may be exposed to anonymous observers and be prone to storage and dissemination, resulting in privacy infringement. Since online information could be exposed and misused, the respondents feel stressful to share their views and emotions online. They may conduct self-censorship on their online disclosure so as to acquire credits from other Internet users and avoid punishment for improper manner. Implications of these findings are discussed in detail.
|
4 |
Demonstration of a faraday polarization controller for PMD mitigation and a bragg-grating-based fault surveillance scheme for long-haul transmission system.January 2003 (has links)
Sun Po-Wan. / Thesis submitted in: October 2002. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. / Includes bibliographical references (leaves 67-70). / Abstracts in English and Chinese. / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Lightwave Transmission System --- p.1 / Chapter 1.2 --- PMD-induced Degradation in System Penalty --- p.1 / Chapter 1.3 --- A Device Mitigating Distortion Caused By Polarization-Mode Dispersion --- p.3 / Chapter 1.4 --- The Need For A Surveillance Scheme --- p.4 / Chapter 1.5 --- A Scalable Non-Intrusive Surveillance Scheme for Long-Haul Transmission --- p.5 / Chapter 1.6 --- Outline of the Thesis --- p.6 / Chapter Chapter 2 --- A Device for Mitigation of First-Order Polarization-Mode Dispersion --- p.7 / Chapter 2.1 --- Introduction --- p.7 / Chapter 2.2 --- Origin of Polarization-Mode Dispersion --- p.7 / Chapter 2.3 --- Polarization-Mode Coupling --- p.9 / Chapter 2.4 --- Statistical Characteristics of Polarization-Mode Dispersion --- p.11 / Chapter 2.5 --- Common Schemes of PMD Compensation --- p.15 / Chapter 2.6 --- A Proposed Design of Faraday Polarization Controller for First-Order PMD Mitigation --- p.20 / Chapter 2.7 --- Theory of Magnetooptic Effects --- p.25 / Chapter 2.8 --- Compact Size of Faraday Polarization Controller --- p.28 / Chapter 2.9 --- Characterization of Faraday Polarization Controller --- p.31 / Chapter 2.9.1 --- Polarization State of FPC Output Against Input Current --- p.31 / Chapter 2.9.2 --- Frequency Response of Faraday Polarization Controller --- p.38 / Chapter 2.9.3 --- Use and Calibration of Polarimeter --- p.40 / Chapter 2.10 --- Summary --- p.43 / Chapter Chapter 3 --- Performance Evaluation of the Proposed Device in Mitigation of PMD-induced Distortion --- p.45 / Chapter 3.1 --- System Impairment and Power Penalty Due to First-Order PMD --- p.46 / Chapter 3.2 --- An Experiment for Testing PMD Compensation Capability of the Proposed Device --- p.47 / Chapter 3.3 --- Experimental Results --- p.50 / Chapter 3.4 --- Summary --- p.52 / Chapter Chapter 4 --- A Scalable Non-intrusive Surveillance Scheme for Long-Haul WDM Transmission --- p.53 / Chapter 4.1 --- Introduction --- p.53 / Chapter 4.2 --- Various Fault Surveillance Methods --- p.54 / Chapter 4.3 --- Limited Scalability of Previous Surveillance Schemes --- p.55 / Chapter 4.4 --- Principle of the Proposed Scheme --- p.56 / Chapter 4.5 --- Experimental Results --- p.58 / Chapter 4.6 --- Summary --- p.62 / Chapter Chapter 5 --- p.64 / Chapter 5.1 --- Conclusion --- p.64 / Chapter 5.2 --- Future Work --- p.65 / Bibliography --- p.67
|
5 |
Human activity tracking for wide-area surveillanceO'Malley, Patrick D. January 2002 (has links)
Thesis (M.S.)--University of Florida, 2002. / Title from title page of source document. Document formatted into pages; contains vi, 46 p.; also contains graphics. Includes vita. Includes bibliographical references.
|
6 |
Intelligent video surveillance in a calibrated multi-camera systemZhou, Han, 周晗 January 2011 (has links)
published_or_final_version / Electrical and Electronic Engineering / Master / Master of Philosophy
|
7 |
Guarding algorithms and robust video susrveillance /Zhou, Junqiang, January 2008 (has links)
Thesis (Ph.D.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 106 -110)
|
8 |
Design of an adaptive computing architecture for managing interactions in heterogeneous defence networks /McClure, Bruce Davis. January 2002 (has links) (PDF)
Thesis (M.Phil.) - University of Queensland, 2003. / Includes bibliography.
|
9 |
Application of vehicle identification techniques in transportation surveillance with focus on security /Medeme, Narasimha Rao. January 2004 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2004. / Typescript. Includes bibliographical references (leaves 82-83). Also available on the Internet.
|
10 |
Application of vehicle identification techniques in transportation surveillance with focus on securityMedeme, Narasimha Rao. January 2004 (has links)
Thesis (M.S.)--University of Missouri-Columbia, 2004. / Typescript. Includes bibliographical references (leaves 82-83). Also available on the Internet.
|
Page generated in 0.0769 seconds