Crowdsourcing and cloudsourcing CCTV surveillance
نویسندگان
چکیده
منابع مشابه
Explorer Crowdsourcing and Cloudsourcing CCTV Surveillance
General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edin...
متن کاملCloudsourcing CCTV Surveillance
General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edin...
متن کاملCctv and the Social Structuring of Surveillance
The installation of Closed Circuit Television Cameras (CCTV) on British streets has been the crime prevention initiative of the century. However, little attention has been paid to who and what the cameras actually watch and how operators select their targets. This paper draws on a twoyear study in the operation of CCTV control rooms to examine how target selection is socially differentiated by ...
متن کاملA Neural System for Automated Cctv Surveillance
Centralized CCTV systems relay multiple video streams to a central point for monitoring by an operator. The operator receives a continuous stream of information, mostly related to normal activity, making it difficult to maintain concentration at a sufficiently high level. While it is difficult to place quantitative boundaries on the number of scenes and time period over which effective monitori...
متن کاملAutomatic event detection in CCTV surveillance
Using a simple but robust real-time algorithm that allows tracking of multiple objects in complex environments, the authors propose an application in automatic surveillance by linking blobs’ information, in terms of trajectories and positions, with the events to be detected. Working in the background of the CCTV surveillance systems and based on whether a selected event has been detected or not...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Datenschutz und Datensicherheit - DuD
سال: 2013
ISSN: 1614-0702,1862-2607
DOI: 10.1007/s11623-013-0173-3