32,794 research outputs found

    Real-time Control of Video Surveillance Systems with Program Supervision Techniques

    Get PDF
    International audienceIn this article, we describe a knowledge-based controlled platform using program supervision techniques. This platform eases the creation and the configuration of video surveillance systems. Several issues need to be addressed to provide a correct system configuration: (1) to choose, among a library of programs, those which are best satisfying a given user request, (2) to assign a correct value for each program parameter, (3) to evaluate performances and to guarantee a performance rate which is satisfactory regarding end-user requirements. This platform is composed of three main components: the library of programs, the knowledge base and the control component. The knowledge is either given by experts or learnt by the system. The control is generic in the sense that it is independent of any application. To validate this platform, we have built and evaluated six video surveillance systems which are featured with three properties: adaptability, reliability and real-time processing

    Teaching Big Brother to be a team player: Computer monitoring and quality

    Get PDF
    Computer monitoring should not be seen as a way of gathering information about workers, per se, but rather as one part of a production and quality strategy that provides needed information to a diverse team of workers. In its most powerful and effective form. computer monitoring is the use of computers to collect. process, and provide feedback information about work with the intent of improving performance and developing employees. Unfortunately, computer monitoring has also been used to punish employees. Here, a study of a successful computer monitoring system at Hughes Aircraft Company is described. The study shows that computer monitoring can facilitate integrated production and quality control strategies withouf negative effects on employee quality of work life. Managers who wish to design and effectively use computer monitoring systems should: (1) Use the monitoring system to provide feedback data to the workforce-not to gather social information (e.g., time taken for bathroom breaks): (2) Determine the type of data that employees believe will help them and be willing to adapt the system as they get ideas about how to use the data; (3) Design a system that gathers integrated data-data that will allow for useful comparisons between, as well as within, specific tasks; and (4) Realize that computer monitoring is only as noxious as the management system itself

    Privacy & law enforcement

    Get PDF

    Filtering, Piracy Surveillance and Disobedience

    Get PDF
    There has always been a cyclical relationship between the prevention of piracy and the protection of civil liberties. While civil liberties advocates previously warned about the aggressive nature of copyright protection initiatives, more recently, a number of major players in the music industry have eventually ceded to less direct forms of control over consumer behavior. As more aggressive forms of consumer control, like litigation, have receded, we have also seen a rise in more passive forms of consumer surveillance. Moreover, even as technology has developed more perfect means for filtering and surveillance over online piracy, a number of major players have opted in favor of “tolerated use,” a term coined by Professor Tim Wu to denote the allowance of uses that may be otherwise infringing, but that are allowed to exist for public use and enjoyment. Thus, while the eventual specter of copyright enforcement and monitoring remains a pervasive digital reality, the market may fuel a broad degree of consumer freedom through the toleration or taxation of certain kinds of activities. This Article is meant largely to address and to evaluate these shifts by drawing attention to the unique confluence of these two important moments: the growth of tolerated uses, coupled with an increasing trend towards more passive forms of piracy surveillance in light of the balance between copyright enforcement and civil liberties. The content industries may draw upon a broad definition of disobedience in their campaigns to educate the public about copyright law, but the market’s allowance of DRM-free content suggests an altogether different definition. The divide in turn between copyright enforcement and civil liberties results in a perfect storm of uncertainty, suggesting the development of an even further division between the role of the law and the role of the marketplace in copyright enforcement and innovation, respectively

    Confronting the Evolving Safety and Security Challenge at Colleges and Universities

    Get PDF
    [Excerpt] “Colleges and universities have long been scrutinized and confronted with lawsuits regarding safety and security measures designed and implemented to protect students and prevent dangerous incidents on campus. Under the doctrine of in loco parentis, college administrators assume responsibility for the physical safety and well-being of students as they matriculate through their academic programs. However, in recent decades, the realization that university communities are not immune to criminal activity has led to federal legislation and judicial opinions that have attempted to identify what legal duty colleges and universities have to prevent security breaches. Moreover, college and university administrators have looked to the courts and legal counsel to determine an institution’s exposure to legal liability and strategies that might be used to minimize such exposure. This charge has been, and remains, a daunting challenge for the higher education community. This Article reviews recent cases regarding the legal duty American colleges and universities have to protect the student community from harm or injury resulting from safety or security breaches. Moreover, this Article identifies legal challenges colleges and universities may face in response to campus surveillance efforts and negligence hiring and retention allegations. Finally, the Article offers some insight intended to advance the legal community’s efforts to counsel and advise college and university administrators regarding the issue of campus safety.

    WSN and RFID integration to support intelligent monitoring in smart buildings using hybrid intelligent decision support systems

    Get PDF
    The real time monitoring of environment context aware activities is becoming a standard in the service delivery in a wide range of domains (child and elderly care and supervision, logistics, circulation, and other). The safety of people, goods and premises depends on the prompt reaction to potential hazards identified at an early stage to engage appropriate control actions. This requires capturing real time data to process locally at the device level or communicate to backend systems for real time decision making. This research examines the wireless sensor network and radio frequency identification technology integration in smart homes to support advanced safety systems deployed upstream to safety and emergency response. These systems are based on the use of hybrid intelligent decision support systems configured in a multi-distributed architecture enabled by the wireless communication of detection and tracking data to support intelligent real-time monitoring in smart buildings. This paper introduces first the concept of wireless sensor network and radio frequency identification technology integration showing the various options for the task distribution between radio frequency identification and hybrid intelligent decision support systems. This integration is then illustrated in a multi-distributed system architecture to identify motion and control access in a smart building using a room capacity model for occupancy and evacuation, access rights and a navigation map automatically generated by the system. The solution shown in the case study is based on a virtual layout of the smart building which is implemented using the capabilities of the building information model and hybrid intelligent decision support system.The Saudi High Education Ministry and Brunel University (UK
    corecore