Results 71 to 80 of about 45,302 (256)
Fight detection in surveillance videos
Fight detection is an important topic for surveillance systems. However, there has been little success in creating an algorithm that can detect fight in surveillance videos with high performance. In this work, we propose a new method for the task of fight detection in surveillance videos.
Esen, Ersin +2 more
openaire +2 more sources
Secure and Efficient Reactive Video Surveillance for Patient Monitoring
Video surveillance is widely deployed for many kinds of monitoring applications in healthcare and assisted living systems. Security and privacy are two promising factors that align the quality and validity of video surveillance systems with the caliber ...
An Braeken +3 more
doaj +1 more source
ABSTRACT This review critically examines the integration of Digital Information and Communication Technologies (TDICs) in biochemistry education over the past decade, highlighting both the benefits and challenges from a critical theoretical perspective. A systematic review was conducted to identify relevant literature, followed by thematic analysis and
Francis Pereira‐Dias +1 more
wiley +1 more source
System design of video surveillance
This paper describes the steps involved in designing of a video surveillance system. It discusses the theory of video surveillance types, components involved, selection of the best equipment, and also a detailed virtual design.
Mohanad Abdulhamid, Mwongeera Murungi
doaj +1 more source
The impacts of biological invasions
ABSTRACT The Anthropocene is characterised by a continuous human‐mediated reshuffling of the distributions of species globally. Both intentional and unintentional introductions have resulted in numerous species being translocated beyond their native ranges, often leading to their establishment and subsequent spread – a process referred to as biological
Phillip J. Haubrock +42 more
wiley +1 more source
Can Human Visual Surveillance be Improved with Intent Recognition? [PDF]
In video surveillance applications, trained operators watch a number of screens simultaneously to detect potential security threats. Looking for such events in real time, in multiple videos simultaneously, is cognitively challenging for human operators ...
Alireza Tavakkoli, Donald Loffredo
doaj
ABSTRACT Basal and standard metabolic rate (BMR and SMR) are cornerstones of physiological ecology and are assumed to be relatively fixed intrinsic properties of organisms that represent the minimum energy required to sustain life. However, this assumption is conceptually flawed. Many core maintenance processes underlying SMR are temporally partitioned
Helena Norman +4 more
wiley +1 more source
An Inter-Frame Forgery Detection Algorithm for Surveillance Video
Surveillance systems are ubiquitous in our lives, and surveillance videos are often used as significant evidence for judicial forensics. However, the authenticity of surveillance videos is difficult to guarantee.
Qian Li, Rangding Wang, Dawen Xu
doaj +1 more source
The Degradation of Access‐Based Business Models: Customer Misbehavior and Shared Mobility
ABSTRACT Access‐based services are considered one of the strategies to embed sustainability in business models. Yet, because the evolution of these business models has been overlooked, we do not know whether their promise to create triple value is sustained.
Andres Camacho, Carmen Valor
wiley +1 more source
ABSTRACT With the rise of digital technology, adolescent cyberviolence has become a growing global concern in public health and criminal justice. This study used nationally representative data from South Korea (2017–2024) to examine the prevalence of eight types of cyberviolence (i.e., verbal abuse, defamation, stalking, sexual abuse, personal ...
Heng Choon (Oliver) Chan +2 more
wiley +1 more source

