29 research outputs found

    An Approach to detecting crowd anomalies for entrance and checkpoint security

    Get PDF
    This thesis develops an approach for detecting behavioral anomalies using tracks of pedestrians, including specified threat tracks. The application area is installation security with focus on monitoring the entrances of these installations. The approach specifically allows operator interaction to specify threats and to interactively adjust the system parameters depending on the context of the situation. This research has discovered physically meaningful features that are developed and organized in a manner so that features can be systematically added or deleted depending on the situation and operator preference. The features can be used with standard classifiers such as the one class support vector machine that is used in this research. The one class support vector machine is very stable for this application and provides significant insight into the nature of its decision boundary. Its stability and ease of system use stems from a unique automatic tuning approach that is computationally efficient and compares favorable with competing approaches. This automatic tuning approach is believed to be novel and was developed as part of this research. Results are provided using both measured and synthetic data

    The sustainability of deep-sea fishing in Greenland from a benthic ecosystem perspective: the nature of habitats, impacts of trawling and the effectiveness of governance

    Get PDF
    The deep sea (>200 m) is the world’s least explored and largest biome, covering ~65% of the earth’s surface, it is increasingly subject to anthropogenic disturbance from fishing. The offshore Greenland halibut (Reinhardtius hippoglossoides) fishery, west Greenland, employs demersal trawl gear at depths of 800-1,400 m. Recent Marine Stewardship Council (MSC) certification of this fishery highlighted the paucity of knowledge of benthic habitats and trawling impacts. This interdisciplinary thesis employs a benthic video sled to investigate deep-sea habitats and trawling impacts and conducts a critical analysis of the fishery’s governance, with reference to the role of the MSC certification. The results provide new insights into this poorly known region of the Northwest Atlantic, including identifying four candidate vulnerable marine ecosystems (VMEs). Imagery obtained demonstrates that chronic trawling has had extensive impacts on the seafloor, which are significantly associated with the benthic communities observed. Further, trawling effort is shown to have a significant negative association with the abundance of some VME indicator taxa. The governance case study finds an effective system of state-led governance, supported by scientific, certification and industry actors. Outcomes directly attributable to engagement with the MSC certification include the introduction of a management plan and new benthic research programmes. However, questions are raised about the MSC certification, providing case study examples of existing criticisms. Assessments are weak with respect to benthic habitats and overreliant on the definitive, expert judgement of Conformity Assessment Bodies (CABs), whose independence is questioned. The assurance offered by the MSC certification in terms of the sustainability of trawling impacts on benthic ecosystems is found to seriously lack credibility. Findings are of direct relevance to the management of deep-sea fisheries in Greenland and elsewhere. Widely applicable critical insights into deep-sea fishery governance are presented, including into the role of eco-labels as a market-mechanism to promote sustainable fishery management

    Greek Primary Educators\u27 Perceptions of Strategies for Mitigating Cyber Child Exploitation

    Get PDF
    Cyber child exploitation is a problem in Greece due to the economic crisis and the resulting lack of government focus on social improvements. Research reveals the importance of educating school teachers of the potential for cyber exploitation of children and argues that early detection of child-focused cybercrimes will decrease the prevalence of child exploitation. The purpose of this interpretive qualitative study was to explore the phenomenon of cyber child exploitation in Greece and to identify strategies teachers may employ to identify and avert cyber child exploitation. Grounded theory provided the framework for this research. The sample consisted of 20 school teachers from a private primary school in suburban Greece. The 20 teachers were over 21 years old, presently certified as teachers and working in primary school, willing to share on voluntary basis information about their experiences and concerns with cyber child exploitation awareness among students, as well as parents. One-to-one interviews were conducted to gather data. Coding was the procedure followed to divide the interview data and rearrange based on common patterns. The resulting themes revealed that no consistent strategies were used to protect children, teachers play a significant role in the prevention of cyber child exploitation, and there is a need for professional development of programs to protect children. Implications for positive social change suggest that educational institutions will help protect children as teachers become more knowledgeable about specific measures to effectively recognize cyber predators. With the guidance of well-informed teachers, students may learn to use the World Wide Web in an effective fashion while being able to avoid the dangers posed by cyber predators

    Air Force Institute of Technology Research Report 2009

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems and Engineering Management, Operational Sciences, Mathematics, Statistics and Engineering Physics
    corecore