Results for 'CCTV'

10 found
Order:
  1. Using the Existing CCTV Network for Crowd Management, Crime Prevention, and Work Monitoring using AIML.N. M. S. Desai - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-12.
    Closed-Circuit Television (CCTV) systems are essential in modern security setups because they provide continuous surveillance, acting as both a deterrent and a critical tool for monitoring and evidence collection. Unlike human guards who can be limited by fatigue and blind spots, CCTV cameras offer consistent, 24/7 coverage of key areas. They fill gaps in the current security system by enabling real-time monitoring and recording incidents for later review, ensuring that potential security breaches are detected and addressed more effectively. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  34
    Real Time Effective Management of Street Parking.Amarnadh V. - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    The "Smart and Effective Real-time Management of Street Parking" project is designed to enhance urban parking enforcement through the use of advanced machine learning and computer vision technologies. The system leverages CCTV cameras to continuously monitor parking spaces, detecting their availability and instances where vehicles are incorrectly parked. By analyzing video feeds, the system identifies parking violations and extracts license plate numbers using Optical Character Recognition (OCR). Notifications are promptly sent to drivers regarding their parking status, ensuring timely enforcement (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Mrs. Aremac and the camera: A response to Ryberg.Annabelle Lever - 2008 - Res Publica 14 (1):35-42.
    In a recent article in Respublica, Jesper Ryberg argues that CCTV can be compared to a little old lady gazing out onto the street below. This article takes issue with the claim that government surveillance can be justified in this manner. Governments have powers and responsibilities that little old ladies lack. Even if CCTV is effective at preventing crime, there may be less intrusive ways of doing so. People have a variety of legitimate interests in privacy, and protection (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  4. Unblinking eyes: the ethics of automating surveillance.Kevin Macnish - 2012 - Ethics and Information Technology 14 (2):151-167.
    In this paper I critique the ethical implications of automating CCTV surveillance. I consider three modes of CCTV with respect to automation: manual, fully automated, and partially automated. In each of these I examine concerns posed by processing capacity, prejudice towards and profiling of surveilled subjects, and false positives and false negatives. While it might seem as if fully automated surveillance is an improvement over the manual alternative in these areas, I demonstrate that this is not necessarily the (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  5. Ethics and Artificial Intelligence.Mark Ryan - 2021 - In Deborah C. Poff & Alex C. Michalos (eds.), Encyclopedia of Business and Professional Ethics. Springer Verlag. pp. 1-5.
    A subdiscipline has emerged around AI ethics, which is comprised of a wide array of individuals: computer scientists, ethicists, cognitive scientists, roboticists, legal professionals, economists, sociologists, gender, and race theorists. This has led to a very interesting branch of research, addressing issues surrounding the development and use of AI. This chapter will give a very brief snapshot of some of the most pertinent ethical concerns. Many of the issues in the Big Data Ethics chapter in this collection are often applicable (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Torture Pornopticon: (In)security Cameras, Self-Governance and Autonomy.Steve Jones - 2015 - In Linnie Blake & Xavier Aldana Reyes (eds.), Digital Horror: Haunted Technologies, Network Panic and the Found Footage Phenomenon. I.B. Tauris. pp. 29-41.
    ‘Torture porn’ films centre on themes of abduction, imprisonment and suffering. Within the subgenre, protagonists are typically placed under relentless surveillance by their captors. CCTV features in more than 45 contemporary torture-themed films (including Captivity, Hunger, and Torture Room). Security cameras signify a bridging point between the captors’ ability to observe and to control their prey. Founded on power-imbalance, torture porn’s prison-spaces are panoptical. Despite failing to encapsulate contemporary surveillance’s complexities (see Haggerty, 2011), the panopticon remains a dominant paradigm (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  42
    Robust Human Target Detection and Acquisition.N. Sushanth - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-13.
    en the increasing importance of human target detection in various security applications, many existing systems face challenges related to cost, accuracy, and adaptability. This work presents the development of a machine learning-based system called Human Target Detection and Acquisition, designed to assist security personnel in the detection and tracking of human targets through an adaptive and cost-effective approach. In this, standard CCTV cameras provide visual data, which intelligent algorithms process to identify and track human targets, even in challenging conditions. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. IoT Based Intruder Prevention using Fogger.T. Krishna Prasath - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):81-90.
    Anamoly detection in videos plays an important role in various real-life applications. Most of traditional approaches depend on utilizing handcrafted features which are problem-dependent and optimal for specific tasks. Nowadays, there has been a rise in the amount of disruptive and offensive activities that have been happening. Due to this, security has been given principal significance. Public places like shopping centers, avenues, banks, etc. are increasingly being equipped with CCTVs to guarantee the security of individuals. Subsequently, this inconvenience is making (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. (2 other versions)Privacy, democracy, and security.Annabelle Lever - 2013 - The Philosophers' Magazine 63 (4):99-105.
    It is especially hard, at present, to read the newspapers without emitting a howl of anguish and outrage. Philosophy can heal some wounds but, in this case, political action may prove a better remedy than philosophy. It can therefore feel odd trying to think philosophically about surveillance at a time like this, rather than joining with like-minded people to protest the erosion of our civil liberties, the duplicity of our governments, and the failings in our political institutions - including our (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. COVID-19 Face Mask Detection Alert System.McDonald Moyo & Cen Yuefeng - 2022 - Computer Engineering and Intelligent Systems 13 (2):1-15.
    Study shows that mask-wearing is a critical factor in stopping the COVID-19 transmission. By the time of this article, most states have mandated face masking in public space. Therefore, real-time face mask detection becomes an essential application to prevent the spread of the pandemic. This study will present a face mask detection system that can detect and monitor mask-wearing from camera feeds and alert when there is a violation. The face mask detection algorithm uses a haar cascade classifier to find (...)
    Download  
     
    Export citation  
     
    Bookmark