Results 71 to 80 of about 45,302 (256)

Fight detection in surveillance videos

open access: yes2013 11th International Workshop on Content-Based Multimedia Indexing (CBMI), 2013
Fight detection is an important topic for surveillance systems. However, there has been little success in creating an algorithm that can detect fight in surveillance videos with high performance. In this work, we propose a new method for the task of fight detection in surveillance videos.
Esen, Ersin   +2 more
openaire   +2 more sources

Secure and Efficient Reactive Video Surveillance for Patient Monitoring

open access: yesSensors, 2016
Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber ...
An Braeken   +3 more
doaj   +1 more source

Integrating Digital Technologies Into Biochemistry Education: A Decade of Efforts, Pandemic Impacts, and Emerging Insights

open access: yesBiochemistry and Molecular Biology Education, EarlyView.
ABSTRACT This review critically examines the integration of Digital Information and Communication Technologies (TDICs) in biochemistry education over the past decade, highlighting both the benefits and challenges from a critical theoretical perspective. A systematic review was conducted to identify relevant literature, followed by thematic analysis and
Francis Pereira‐Dias   +1 more
wiley   +1 more source

System design of video surveillance

open access: yesSistemnì Doslìdženâ ta Informacìjnì Tehnologìï, 2019
This paper describes the steps involved in designing of a video surveillance system. It discusses the theory of video surveillance types, components involved, selection of the best equipment, and also a detailed virtual design.
Mohanad Abdulhamid, Mwongeera Murungi
doaj   +1 more source

The impacts of biological invasions

open access: yesBiological Reviews, EarlyView.
ABSTRACT The Anthropocene is characterised by a continuous human‐mediated reshuffling of the distributions of species globally. Both intentional and unintentional introductions have resulted in numerous species being translocated beyond their native ranges, often leading to their establishment and subsequent spread – a process referred to as biological
Phillip J. Haubrock   +42 more
wiley   +1 more source

Can Human Visual Surveillance be Improved with Intent Recognition? [PDF]

open access: yesJournal of Systemics, Cybernetics and Informatics, 2013
In video surveillance applications, trained operators watch a number of screens simultaneously to detect potential security threats. Looking for such events in real time, in multiple videos simultaneously, is cognitively challenging for human operators ...
Alireza Tavakkoli, Donald Loffredo
doaj  

The myth of the metabolic baseline: sleep–wake cycles undermine a foundational assumption in organismal biology

open access: yesBiological Reviews, EarlyView.
ABSTRACT Basal and standard metabolic rate (BMR and SMR) are cornerstones of physiological ecology and are assumed to be relatively fixed intrinsic properties of organisms that represent the minimum energy required to sustain life. However, this assumption is conceptually flawed. Many core maintenance processes underlying SMR are temporally partitioned
Helena Norman   +4 more
wiley   +1 more source

An Inter-Frame Forgery Detection Algorithm for Surveillance Video

open access: yesInformation, 2018
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee.
Qian Li, Rangding Wang, Dawen Xu
doaj   +1 more source

The Degradation of Access‐Based Business Models: Customer Misbehavior and Shared Mobility

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Access‐based services are considered one of the strategies to embed sustainability in business models. Yet, because the evolution of these business models has been overlooked, we do not know whether their promise to create triple value is sustained.
Andres Camacho, Carmen Valor
wiley   +1 more source

Adolescent Cyberviolence in South Korea: A Multi‐Year, National Population‐Based Study of Cyberviolence Prevalence (2017–2024)

open access: yesBehavioral Sciences &the Law, EarlyView.
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy