scholarly journals CCTV, Risk Management and Regulation Mechanisms in Publicly-Used Places: a Discussion Based on Swiss Examples

2002 ◽  
Vol 2 (2/3) ◽  
Author(s):  
Jean Ruegg ◽  
Valerie November ◽  
Francisco Klauser

This paper focuses on the relations between different types of actors involved in both conceiving and using video-surveillance systems. More specifically, it deals with the reasons that support the growing use of video-surveillance systems, and the organisation structures and implementation schemes that are designed to cope with them. The analysis raises issues linked to the complexity of social and spatial relations that CCTV tends to produce. Based on four Swiss case studies chosen in function of different objectives (risks), different types of public spaces that are under surveillance (city centre, motorway, industrial zone, public transport), as well as different stages of completion of a CCTV project, the main results are to document new categories of actors: the definition of the relationship between CCTV-providers and end-users must be enlarged. Many more actors are playing important roles in terms of risk management and decision making while designing and implementing CCTV systems. Risks under surveillance: different types of risks are under surveillance. The study is underlining that different forms of surveillance must be distinguished, given the spatial characteristics of every risk (diffuse, located, specific and/or territorialized). The 'distancing effect': CCTV obviously creates distance between the object and the place where surveillance is actually made. To go a bit further, the paper claims that several kinds of distancing effects should be considered. These distancing effects modify both the quality of places under surveillance and the general context where mechanisms can be designed and implemented for a better public regulation of CCTV uses.

Author(s):  
M. Amreev ◽  
R. Safin ◽  
T. Pavlova ◽  
E. Temyrkanova ◽  
Y. Garmashova

The use of video surveillance systems is used in the areas of security, law and order, in the territories of protected objects, in monitoring the movement of road vehicles and in other areas. The main disadvantage of a video surveillance system is its susceptibility to weather influences (rain, fog, snowfall, etc.), which degrades the quality of the video system by reducing the signal level. Therefore, the urgency of finding new ways and possibilities to improve the quality of video signals is one of the priority areas of signal processing. The main task of this work was to determine the main parameters, simulate the transmission line and amplifier, and select the schematic diagram of the transmitting and receiving path with the voltage and current ratings. Both the receiver and the cable video transmitter have different means of adjusting to different transmission line lengths. The signal at the output of each receiver should be in the range from 0.9 to 1.1 V, and the spread of the total ohmic resistance of the wires of the video transmission line at the input of the receiver should be no more than 2 – 3%. Based on these parameters, the equipment is configured for transmitting video over the channel. The magnitude of the mismatch is regulated by potentiometers, which allow smooth adjustment of the video transmission equipment [1]. As a rule, video transmission over the channel is carried out at a distance of 50 to 1500 m. If it is necessary to transmit video at distances less than 50 m, additional resistances are connected in series at the receiver input so that the total line resistance is 30 - 50 Ohm [1].


2016 ◽  
Vol 12 (4) ◽  
pp. 45-62 ◽  
Author(s):  
Reza Mohammadi ◽  
Reza Javidan

In applications such as video surveillance systems, cameras transmit video data streams through network in which quality of received video should be assured. Traditional IP based networks cannot guarantee the required Quality of Service (QoS) for such applications. Nowadays, Software Defined Network (SDN) is a popular technology, which assists network management using computer programs. In this paper, a new SDN-based video surveillance system infrastructure is proposed to apply desire traffic engineering for practical video surveillance applications. To keep the quality of received videos adaptively, usually Constraint Shortest Path (CSP) problem is used which is a NP-complete problem. Hence, heuristic algorithms are suitable candidate for solving such problem. This paper models streaming video data on a surveillance system as a CSP problem, and proposes an artificial bee colony (ABC) algorithm to find optimal solution to manage the network adaptively and guarantee the required QoS. The simulation results show the effectiveness of the proposed method in terms of QoS metrics.


2016 ◽  
Vol 138 (11) ◽  
Author(s):  
Simon Moritz Göhler ◽  
Tobias Eifler ◽  
Thomas J. Howard

The robustness of a design has a major influence on how much the product's performance will vary and is of great concern to design, quality, and production engineers. While variability is always central to the definition of robustness, the concept does contain ambiguity, and although subtle, this ambiguity can have significant influence on the strategies used to combat variability, the way it is quantified and ultimately, the quality of the final design. In this contribution, the literature for robustness metrics was systematically reviewed. From the 108 relevant publications found, 38 metrics were determined to be conceptually different from one another. The metrics were classified by their meaning and interpretation based on the types of the information necessary to calculate the metrics. Four different classes were identified: (1) sensitivity robustness metrics; (2) size of feasible design space robustness metrics; (3) functional expectancy and dispersion robustness metrics; and (4) probability of compliance robustness metrics. The goal was to give a comprehensive overview of robustness metrics and guidance to scholars and practitioners to understand the different types of robustness metrics and to remove the ambiguities of the term robustness. By applying an exemplar metric from each class to a case study, the differences between the classes were further highlighted. These classes form the basis for the definition of four specific subdefinitions of robustness, namely the “robust concept,” “robust design,” “robust function,” and “robust product.”


2021 ◽  
Vol 4 (519) ◽  
pp. 276-285
Author(s):  
D. R. Zoidze ◽  
◽  
O. O. Gubarev ◽  

The article is aimed at studying the evolution of approaches to risk management in organizations. As result of the carried out study, three existing approaches were identified: the «Three Lines of Protection» model (2013), the «Three Lines» model (2020), and the «Dynamic Risk Management» model (2020). It is proposed to consider the «Three Lines of Protection» model as a transition from non-systemic risk management in organizations to a structured vision of this process with a clear definition of the responsibilities of key participants. The article explains the advantages and disadvantages of this approach. Its advantages include simplicity and clarity in use in practice. Among the shortcomings of the model are the following: an overly structured approach to risk management in organizations; too cautious attitude to possible risks; dubious versatility of the model; imperfection of its structure. Three directions for possible improvement of the model are defined. It is identified that in 2020 there was an updated approach to risk management in organizations – the «Three Lines» model. A comparison of the «Three Lines of Protection» model with the «Three Lines» model was carried out. The main advantages of the new approach are determined. The emergence of an alternative vision of the process of risk management and control in organizations against the background of new social challenges – the «Dynamic risk management» is researched. The advantages of this approach include its priority areas in risk management in organizations, i.e.: risk management taking into account their consequences, risk management based on actions, risk management with an orientation towards digital technologies. The differences between traditional models and the newest approach are specified. It is determined that each of the three principles of the latest approach improves the quality of risk management in organizations as participants in the survey conducted by Gartner company. Purpose of further research in this direction be the institutional registration of coordinated interaction between the two directions of the modern model of risk management and control of the risks.


2017 ◽  
Vol 7 (6) ◽  
pp. 2319-2323
Author(s):  
M. B. Ayed ◽  
S. Elkosantini ◽  
M. Abid

Video surveillance systems are a powerful tool applied in various systems. Traditional systems based on human vision are to be avoided due to human errors. An automated surveillance system based on suspicious behavior presents a great challenge to developers. Such detection is a rather complex procedure and also a rather time-consuming one. An abnormal behavior could be identified by: actions, faces, route, etc. The definition of the characteristics of an abnormal behavior still present a big problem. This paper proposes a specific architecture for a surveillance system. The aim is to accelerate the system and obtain a reliable and accelerated suspicious behavior recognition. Finally, the experiment section illustrates the results with comparison of some of the most recent approaches.


2011 ◽  
Vol 162 (7) ◽  
pp. 227-232
Author(s):  
Diane Morattel

In land-use planning, taking natural hazards into account cannot be based uniquely on the degree of danger, as shown on natural hazards maps. The level of risk brought in by the different types of human activity in the areas exposed to these hazards must also be taken into consideration. The communes in canton Vaud will soon have completed the realisation of all gravitational natural hazards maps according to catchment area. Consequently, a cantonal and intercommunal strategy for integral risk management must be put in place. The implementation of this strategy requires some prerequisites such as: legislation based on risks, a definition of protection objectives, the organisation of a decision-making process involving all parties concerned, and which will make possible a comprehensive evaluation of land-use related interests. These reflections should result in a change of attitude when faced with the risks linked to natural hazards, and hence land-use adapted to these risks respecting the principles of precaution, equity and proportionality.


2021 ◽  
Vol 58 (4) ◽  
pp. 243-261
Author(s):  
Ahmad Ostovar ◽  
Suna Bensch ◽  
Thomas Hellström

AbstractThe ability to understand the surrounding environment and being able to communicate with interacting humans are important functionalities for many automated systems where visual input (e.g., images, video) and natural language input (speech or text) have to be related to each other. Possible applications are automatic image caption generation, interactive surveillance systems, or human robot interaction. In this paper, we propose algorithms for automatic responses to natural language queries about an image. Our approach uses a predefined neural net for detection of bounding boxes and objects in images, spatial relations between bounding boxes are modeled with a neural net, the queries are analyzed with a syntactic parser, and algorithms to map natural language to properties in the images are introduced. The algorithms make use of semantic similarity and antonyms. We evaluate the performance of our approach with test users assessing the quality of our system’s generated answers.


2021 ◽  
Vol 1 (2 (340)) ◽  
pp. 127-138
Author(s):  
Dmytro Pelipas ◽  

The article deals with the problem of readiness of future physical education teachers to sports-patriotic activity. We examined the emergence and development of the category "readiness" in the studies of psychologists, physiologists, teachers, specialists of physical culture and sport. Different approaches to the definition of readiness for activity in individual researchers are explained by different types of readiness, different types of activity itself and the specificity of a variety of professional specialties. We have determined that the readiness of future physical culture teachers for sports-patriotic activity is a complex, integral category, which consists of psychological, scientific-theoretical, psychophysical and physical training, and is a state of professional mastery of a teacher and the possibility of its implementation in practice with the aim of sports-patriotic education of the younger generation. According to the quality of readiness of future physical culture teachers for sports-patriotic activity, we have defined the following criteria: informational and cognitive; motivational and axiological, reflexive, operative, activity-practical. The determined levels and indicators of future physical education teachers' readiness for sports-patriotic activity: low, medium, high. Further research will focus on the connection of sport-patriotic activity of future physical culture teachers with the aspects of functioning in the conditions of New Ukrainian School.


Author(s):  
M. V. Yesina ◽  
S. G. Vdovenko ◽  
I. D. Gorbenko

The article takes a verifier of equivalence of the quality of indistinguishability (uncertainty) of the semantic security for the cryptosystems defense against of attacker's cryptanalyses based on matched (selected) open text. The issues of analysis and research of security models of post-quantum cryptoalgorithms in relation to cryptoprimitives of all types, the definition of criteria for assessing their compliance with different security models (according to different types of crypto-transformations) are relevant and of practical importance. The indistinguishability (uncertainty) of encrypted text is an important property of the security of many encryption schemes. The indistinguishability (uncertainty) property when attacking on the basis of matched (selected) plain text is considered a basic requirement for the majority of reliably protected public-key cryptosystems. Some schemes also provide an indistinguishability for attack based on selected (selected) encrypted text and attack based on adaptively picked (selected) encrypted text. The indistinguishability (uncertainty) of an attack on the basis of a selected (selected) open text is equivalent to the properties of semantic security. If the cryptosystem has the property of indistinguishability, the attacker will not be able to distinguish between pairs of encrypted texts based on the message that they encrypt. In the case of non-differentiation (uncertainty) of ciphertext protects all known cryptosystems from the intruder which: is a probabilistic Turing machine of polynomial time; has all algorithms; has full access to communications. Using the property of the indeterminacy (uncertainty) of the encrypted text at the present time, it is guaranteed to protect all known symmetric and asymmetric cryptosystems from the classical or quantum cryptanalysis of the intruder. Here are a review of mostly attacks on the encryption security namely an attack based on adaptively matched (selected) ciphertexts, an attack based on adaptively matched (selected) open texts, an attack based on both of this types of texts, an attack based on matched (selected) ciphertexts, an attack based on matched (selected) open texts and a recognition attacks (recognizability).


2021 ◽  
Vol 7 (1) ◽  
pp. 4-11
Author(s):  
Luís Carvalhinho ◽  
Paulo Rosa

The training processes of nature-based sport professionals, the mastery of different types of knowledge, the quality of technical, pedagogical and scientific intervention in different activities, the safeguarding of safety and risk management issues, the good practices associated with sustainability and development are, among others, some of the areas that can (and should) contribute to the development of this area. Considering this purpose and based on a synthesis of applied research, as well as the accumulation of two decades of experience, we present our understanding of what we consider relevant for the way to go, in the context of training and intervention in nature-based sport.


Sign in / Sign up

Export Citation Format

Share Document