CINXE.COM
Search results for: surveillance
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: surveillance</title> <meta name="description" content="Search results for: surveillance"> <meta name="keywords" content="surveillance"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="surveillance" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="surveillance"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 444</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: surveillance</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">444</span> Intervention of Threat and Surveillance on the Obedience of Preschool Children</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarah%20Mhae%20Diaz">Sarah Mhae Diaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Erika%20Anna%20De%20Leon"> Erika Anna De Leon</a>, <a href="https://publications.waset.org/abstracts/search?q=Jacklin%20Alwil%20Cartagena"> Jacklin Alwil Cartagena</a>, <a href="https://publications.waset.org/abstracts/search?q=Geordan%20Caruncong"> Geordan Caruncong</a>, <a href="https://publications.waset.org/abstracts/search?q=Micah%20Riezl%20Gonzales"> Micah Riezl Gonzales</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study examined the intervention of threat and surveillance on the obedience of 100 preschool children through a task variable experiment replicated from the previous studies of Higbee (1979), and Chua, J., Chua, M., & Pico (1983). Nowadays, obedience among Filipino children to authority is disregarded since they are more outspoken and rebel due to social influences. With this, aside from corporal punishment, threat and surveillance became a mean of inducing obedience. Threat, according to the Dissonance Theory, can give attitudinal change. On the other hand, surveillance, according to the Theory of Social Facilitation, can either contribute to the completion or failure to do a task. Through a 2x2 factorial design, results show; (1) threat (F(1,96) = 12.487, p < 0.05) and (2) surveillance (F(1,96)=9.942, p<.05) had a significant main effect on obedience, suggesting that the Dissonance Theory and Theory of Social Facilitation is respectively true in the study. On the other hand, (3) no interaction (F(1,96)=1.303, p > .05) was seen since threat and surveillance both have a main effect that could be positive or negative, or could be because of their complementary property as supported by the post-hoc results. Also, (4) most effective commanding style is threat and surveillance setting (M = 30.04, SD = 7.971) due to the significant main effect of the two variables. With this, in the Filipino Setting, threat and surveillance has proven to be a very effective strategy to discipline and induce obedience from a child. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=experimental%20study" title="experimental study">experimental study</a>, <a href="https://publications.waset.org/abstracts/search?q=obedience" title=" obedience"> obedience</a>, <a href="https://publications.waset.org/abstracts/search?q=preschool%20children" title=" preschool children"> preschool children</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=threat" title=" threat"> threat</a> </p> <a href="https://publications.waset.org/abstracts/27034/intervention-of-threat-and-surveillance-on-the-obedience-of-preschool-children" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27034.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">487</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">443</span> Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Stephen%20L.%20Roberts">Stephen L. Roberts</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=algorithms" title="algorithms">algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=global%20health" title=" global health"> global health</a>, <a href="https://publications.waset.org/abstracts/search?q=pandemic" title=" pandemic"> pandemic</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a> </p> <a href="https://publications.waset.org/abstracts/80131/signs-signals-and-syndromes-algorithmic-surveillance-and-global-health-security-in-the-21st-century" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80131.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">442</span> A Method for Processing Unwanted Target Caused by Reflection in Secondary Surveillance Radar</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khanh%20D.Do">Khanh D.Do</a>, <a href="https://publications.waset.org/abstracts/search?q=Loi%20V.Nguyen"> Loi V.Nguyen</a>, <a href="https://publications.waset.org/abstracts/search?q=Thanh%20N.Nguyen"> Thanh N.Nguyen</a>, <a href="https://publications.waset.org/abstracts/search?q=Thang%20M.Nguyen"> Thang M.Nguyen</a>, <a href="https://publications.waset.org/abstracts/search?q=Vu%20T.Tran"> Vu T.Tran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Along with the development of Secondary surveillance radar (SSR) in air traffic surveillance systems, the Multipath phenomena has always been a noticeable problem. This following article discusses the geometrical aspect and power aspect of the Multipath interference caused by reflection in SSR and proposes a method to deal with these unwanted multipath targets (ghosts) by false-target position predicting and adaptive target suppressing. A field-experiment example is mentioned at the end of the article to demonstrate the efficiency of this measure. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=multipath" title="multipath">multipath</a>, <a href="https://publications.waset.org/abstracts/search?q=secondary%20surveillance%20radar" title=" secondary surveillance radar"> secondary surveillance radar</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20signal%20processing" title=" digital signal processing"> digital signal processing</a>, <a href="https://publications.waset.org/abstracts/search?q=reflection" title=" reflection"> reflection</a> </p> <a href="https://publications.waset.org/abstracts/154203/a-method-for-processing-unwanted-target-caused-by-reflection-in-secondary-surveillance-radar" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154203.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">162</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">441</span> Evaluation of the Notifiable Diseases Surveillance System, South, Haiti, 2022</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Djeamsly%20Salomon">Djeamsly Salomon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Epidemiological surveillance is a dynamic national system used to observe all aspects of the evolution of priority health problems, through: collection, analysis, systematic interpretation of information, and dissemination of results with necessary recommendations. The study was conducted to assess the mandatory disease surveillance system in the Sud Department. Methods: A study was conducted from March to May 2021 with key players involved in surveillance at the level of health institutions in the department . The CDC's 2021 updated guideline was used to evaluate the system. We collected information about the operation, attributes, and usefulness of the surveillance system using interviewer-administered questionnaires. Epi-Info7.2 and Excel 2016 were used to generate the mean, frequencies and proportions. Results: Of 30 participants, 23 (77%) were women. The average age was 39 years[30-56]. 25 (83%) had training in epidemiological surveillance. (50%) of the forms checked were signed by the supervisor. Collection tools were available at (80%). Knowledge of at least 7 notifiable diseases was high (100%). Among the respondents, 29 declared that the collection tools were simple, 27 had already filled in a notification form. The maximum time taken to fill out a form was 10 minutes. The feedback between the different levels was done at (60%). Conclusion: The surveillance system is useful, simple, acceptable, representative, flexible, stable and responsive. The data generated was of high quality. However, it is threatened by the lack of supervision of sentinel sites, lack of investigation and weak feedback. This evaluation demonstrated the urgent need to improve supervision in the sites and to feedback information. Strengthen epidemiological surveillance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=evaluation" title="evaluation">evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=notifiable%20diseases" title=" notifiable diseases"> notifiable diseases</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a> </p> <a href="https://publications.waset.org/abstracts/160211/evaluation-of-the-notifiable-diseases-surveillance-system-south-haiti-2022" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160211.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">440</span> Real-Time Aerial Marine Surveillance System for Safe Navigation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vinesh%20Thiruchelvam">Vinesh Thiruchelvam</a>, <a href="https://publications.waset.org/abstracts/search?q=Umar%20Mumtaz%20Chowdry"> Umar Mumtaz Chowdry</a>, <a href="https://publications.waset.org/abstracts/search?q=Sathish%20Kumar%20Selvaperumal"> Sathish Kumar Selvaperumal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The prime purpose of the project is to provide a sophisticated system for surveillance specialized for the Port Authorities in the Maritime Industry. The current aerial surveillance does not have a wide dimensioning view. The channels of communication is shared and not exclusive allowing for communications errors or disturbance mainly due to traffic. The scope is to analyze the various aspects as real-time aerial and marine surveillance is one of the most important methods which could ensure the domain security of the sailors. The system will improve real time data as obtained for the controller base station. The key implementation will be based on camera speed, angle and adherence to a sustainable power utilization module. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=SMS" title="SMS">SMS</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20time" title=" real time"> real time</a>, <a href="https://publications.waset.org/abstracts/search?q=GUI" title=" GUI"> GUI</a>, <a href="https://publications.waset.org/abstracts/search?q=maritime%20industry" title=" maritime industry "> maritime industry </a> </p> <a href="https://publications.waset.org/abstracts/6760/real-time-aerial-marine-surveillance-system-for-safe-navigation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6760.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">498</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">439</span> Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mobarok%20Hossain%20Bhuyain">Mobarok Hossain Bhuyain</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=human%20detection" title="human detection">human detection</a>, <a href="https://publications.waset.org/abstracts/search?q=target%20tracking" title=" target tracking"> target tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20network" title=" neural network"> neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=particle%20filter" title=" particle filter"> particle filter</a> </p> <a href="https://publications.waset.org/abstracts/131472/detection-and-tracking-for-the-protection-of-the-elderly-and-socially-vulnerable-people-in-the-video-surveillance-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/131472.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">438</span> Description and Evaluation of the Epidemiological Surveillance System for Meningitis in the Province of Taza Between 2016 and 2020</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bennasser%20Samira">Bennasser Samira</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Meningitis, especially the meningococcal one, is a serious problem of public health. A system of vigilanceand surveillance is in place to allow effective actions to be taken on actual or potential health problems caused by all forms of meningitis. Objectives: 1. Describe the epidemiological surveillance system for meningitis in the province of Taza. 2. Evaluate the quality and responsiveness of the epidemiological surveillance system for meningitis in the province of Taza. 3. Propose measures to improve this system at the provincial level. Methods: This was a descriptive study with a purely quantitative approach by evaluating the quality and responsiveness of the system during 5 years between January 2016 and December 2020. We usedfor that the investigation files of meningitis cases and the provincial database of meningitis. We calculated some quality indicators of surveillance system already defined by the National Program for the Prevention and Control of Meningitis. Results: The notification is passive, the completeness of the data is quite good (94%), and the timeliness don’t exceed 71%. The quality of the data is acceptable (91% agreement). The systematic and rapid performance of lumbar punctures increases the diagnostic capabilities of the system. The local response actions are effected in 100%. Conclusion: The improvement of this surveillance system depends on strengthening the staff skills in diagnostic, reviewing surveillance tools, and encouraging judicious use of the data. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=evaluation" title="evaluation">evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=meningitis" title=" meningitis"> meningitis</a>, <a href="https://publications.waset.org/abstracts/search?q=system" title=" system"> system</a>, <a href="https://publications.waset.org/abstracts/search?q=taza" title=" taza"> taza</a>, <a href="https://publications.waset.org/abstracts/search?q=morocco" title=" morocco"> morocco</a> </p> <a href="https://publications.waset.org/abstracts/144392/description-and-evaluation-of-the-epidemiological-surveillance-system-for-meningitis-in-the-province-of-taza-between-2016-and-2020" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/144392.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">437</span> Syndromic Surveillance Framework Using Tweets Data Analytics</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=David%20Ming%20Liu">David Ming Liu</a>, <a href="https://publications.waset.org/abstracts/search?q=Benjamin%20Hirsch"> Benjamin Hirsch</a>, <a href="https://publications.waset.org/abstracts/search?q=Bashir%20Aden"> Bashir Aden</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Syndromic surveillance is to detect or predict disease outbreaks through the analysis of medical sources of data. Using social media data like tweets to do syndromic surveillance becomes more and more popular with the aid of open platform to collect data and the advantage of microblogging text and mobile geographic location features. In this paper, a Syndromic Surveillance Framework is presented with machine learning kernel using tweets data analytics. Influenza and the three cities Abu Dhabi, Al Ain and Dubai of United Arabic Emirates are used as the test disease and trial areas. Hospital cases data provided by the Health Authority of Abu Dhabi (HAAD) are used for the correlation purpose. In our model, Latent Dirichlet allocation (LDA) engine is adapted to do supervised learning classification and N-Fold cross validation confusion matrix are given as the simulation results with overall system recall 85.595% performance achieved. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Syndromic%20surveillance" title="Syndromic surveillance">Syndromic surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=Tweets" title=" Tweets"> Tweets</a>, <a href="https://publications.waset.org/abstracts/search?q=Machine%20Learning" title=" Machine Learning"> Machine Learning</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20mining" title=" data mining"> data mining</a>, <a href="https://publications.waset.org/abstracts/search?q=Latent%20Dirichlet%20allocation%20%28LDA%29" title=" Latent Dirichlet allocation (LDA)"> Latent Dirichlet allocation (LDA)</a>, <a href="https://publications.waset.org/abstracts/search?q=Influenza" title=" Influenza"> Influenza</a> </p> <a href="https://publications.waset.org/abstracts/120850/syndromic-surveillance-framework-using-tweets-data-analytics" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/120850.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">116</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">436</span> Medical Surveillance Management</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jina%20K.">Jina K.</a>, <a href="https://publications.waset.org/abstracts/search?q=Kittinan%20C.%20Athitaya%20J."> Kittinan C. Athitaya J.</a>, <a href="https://publications.waset.org/abstracts/search?q=Weerapat%20B."> Weerapat B.</a>, <a href="https://publications.waset.org/abstracts/search?q=Amornrat%20T."> Amornrat T.</a>, <a href="https://publications.waset.org/abstracts/search?q=Waraphan%20N."> Waraphan N.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Working in the exploration and production of petroleum exposed workers to various health risks, including but not limited to physical and chemical risks. Although lots of barriers have been put in place, e.g., hazard monitoring in the workplace, appropriate training on health hazards, proper personal protective equipment (PPE), the health hazard may harm the workers if the barriers are not effectively implemented. To prove the effectiveness of these barriers, it is necessary to monitor exposure by putting in place the medical surveillance program via biological monitoring of chemical hazards and physical check-ups for physical hazards. Medical surveillance management is the systematic assessment and monitoring of employees exposed or potentially exposed to occupational hazards with the goal of reducing and ultimately preventing occupational illness and injury. The paper aims to demonstrate the effectiveness of medical surveillance management in mitigating health risks associated with physical and chemical hazards in the petroleum industry by focusing on implementing programs for biological monitoring and physical examinations, including defining procedures for biological monitoring, urine sample collection, physical examinations, and result management on offshore petroleum platforms. The implementation of medical surveillance management has proven effective in monitoring worker exposure to physical and chemical hazards, leading to reduced medical expenses and the risk associated with work-related diseases significantly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=medical%20surveillance" title="medical surveillance">medical surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=petroleum%20industry" title=" petroleum industry"> petroleum industry</a>, <a href="https://publications.waset.org/abstracts/search?q=occupational%20hazards" title=" occupational hazards"> occupational hazards</a>, <a href="https://publications.waset.org/abstracts/search?q=medical%20surveillance%20process" title=" medical surveillance process"> medical surveillance process</a> </p> <a href="https://publications.waset.org/abstracts/190592/medical-surveillance-management" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/190592.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">17</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">435</span> Efficient Utilization of Unmanned Aerial Vehicle (UAV) for Fishing through Surveillance for Fishermen</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=T.%20Ahilan">T. Ahilan</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Aswin%20Adityan"> V. Aswin Adityan</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Kailash"> S. Kailash</a> </p> <p class="card-text"><strong>Abstract:</strong></p> UAV’s are small remote operated or automated aerial surveillance systems without a human pilot aboard. UAV’s generally finds its use in military and special operation application, a recent growing trend in UAV’s finds its application in several civil and non military works such as inspection of power or pipelines. The objective of this paper is the augmentation of a UAV in order to replace the existing expensive sonar (sound navigation and ranging) based equipment amongst small scale fisherman, for whom access to sonar equipment are restricted due to limited economic resources. The surveillance equipment’s present in the UAV will relay data and GPS location onto a receiver on the fishing boat using RF signals, using which the location of the schools of fishes can be found. In addition to this, an emergency beacon system is present for rescue operations and drone recovery. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=UAV" title="UAV">UAV</a>, <a href="https://publications.waset.org/abstracts/search?q=Surveillance" title=" Surveillance"> Surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=RF%20signals" title=" RF signals"> RF signals</a>, <a href="https://publications.waset.org/abstracts/search?q=fishing" title=" fishing"> fishing</a>, <a href="https://publications.waset.org/abstracts/search?q=sonar" title=" sonar"> sonar</a>, <a href="https://publications.waset.org/abstracts/search?q=GPS" title=" GPS"> GPS</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20stream" title=" video stream"> video stream</a>, <a href="https://publications.waset.org/abstracts/search?q=school%20of%20fish" title=" school of fish"> school of fish</a> </p> <a href="https://publications.waset.org/abstracts/34394/efficient-utilization-of-unmanned-aerial-vehicle-uav-for-fishing-through-surveillance-for-fishermen" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34394.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">457</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">434</span> West Nile Virus in North-Eastern Italy: Overview of Integrated Surveillance Activities</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Laura%20Amato">Laura Amato</a>, <a href="https://publications.waset.org/abstracts/search?q=Paolo%20Mulatti"> Paolo Mulatti</a>, <a href="https://publications.waset.org/abstracts/search?q=Fabrizio%20Montarsi"> Fabrizio Montarsi</a>, <a href="https://publications.waset.org/abstracts/search?q=Matteo%20Mazzucato"> Matteo Mazzucato</a>, <a href="https://publications.waset.org/abstracts/search?q=Laura%20Gagliazzo"> Laura Gagliazzo</a>, <a href="https://publications.waset.org/abstracts/search?q=Michele%20Brichese"> Michele Brichese</a>, <a href="https://publications.waset.org/abstracts/search?q=Manlio%20Palei"> Manlio Palei</a>, <a href="https://publications.waset.org/abstracts/search?q=Gioia%20Capelli"> Gioia Capelli</a>, <a href="https://publications.waset.org/abstracts/search?q=Lebana%20Bonfanti"> Lebana Bonfanti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> West Nile virus (WNV) re-emerged in north-eastern Italy in 2008, after ten years from its first appearance in Tuscany. In 2009, a national surveillance programme was implemented, and re-modulated in north-eastern Italy in 2011. Hereby, we present the results of surveillance activities in 2008-2016 in the north-eastern Italian regions, with inferences on WNV epidemiological trend in the area. The re-modulated surveillance programmes aimed at early detecting WNV seasonal reactivation by searching IgM antibodies in horses. In 2013, the surveillance plans were further modified including a risk-based approach. Spatial analysis techniques, including Bernoulli space-time scan-statistics, were applied to the results of 2010–2012 surveillance on mosquitoes, equines, and humans to identify areas where WNV reactivation was more likely to occur. From 2008 to 2016, residential horses tested positive for anti-WNV antibodies on a yearly basis (503 cases), also in areas where WNV circulation was not detected in mosquito populations. Surveillance activities detected 26 syndromic cases in horses, 102 infected mosquito pools and WNV in 18 dead wild birds. Human cases were also recurrently detected in the study area during the surveillance period (68 cases of West Nile neuroinvasive disease). The recurrent identification of WNV in animals, mosquitoes, and humans indicates the virus has likely become endemic in the area. In 2016, findings of WNV positives in horses or mosquitoes were included as triggers for enhancing screening activities in humans. The evolution of the epidemiological situation prompts for continuous and accurate surveillance measures. The results of the 2013-2016 surveillance indicate that the risk-based approach was effective in early detecting seasonal reactivation of WNV, key factor of the integrated surveillance strategy in endemic areas. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=arboviruses" title="arboviruses">arboviruses</a>, <a href="https://publications.waset.org/abstracts/search?q=horses" title=" horses"> horses</a>, <a href="https://publications.waset.org/abstracts/search?q=Italy" title=" Italy"> Italy</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=west%20nile%20virus" title=" west nile virus"> west nile virus</a>, <a href="https://publications.waset.org/abstracts/search?q=zoonoses" title=" zoonoses"> zoonoses</a> </p> <a href="https://publications.waset.org/abstracts/80742/west-nile-virus-in-north-eastern-italy-overview-of-integrated-surveillance-activities" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80742.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">358</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">433</span> Bayesian Prospective Detection of Small Area Health Anomalies Using Kullback Leibler Divergence </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chawarat%20Rotejanaprasert">Chawarat Rotejanaprasert</a>, <a href="https://publications.waset.org/abstracts/search?q=Andrew%20Lawson"> Andrew Lawson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Early detection of unusual health events depends on the ability to detect rapidly any substantial changes in disease, thus facilitating timely public health interventions. To assist public health practitioners to make decisions, statistical methods are adopted to assess unusual events in real time. We introduce a surveillance Kullback-Leibler (SKL) measure for timely detection of disease outbreaks for small area health data. The detection methods are compared with the surveillance conditional predictive ordinate (SCPO) within the framework of Bayesian hierarchical Poisson modeling and applied to a case study of a group of respiratory system diseases observed weekly in South Carolina counties. Properties of the proposed surveillance techniques including timeliness and detection precision are investigated using a simulation study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bayesian" title="Bayesian">Bayesian</a>, <a href="https://publications.waset.org/abstracts/search?q=spatial" title=" spatial"> spatial</a>, <a href="https://publications.waset.org/abstracts/search?q=temporal" title=" temporal"> temporal</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=prospective" title=" prospective"> prospective</a> </p> <a href="https://publications.waset.org/abstracts/52142/bayesian-prospective-detection-of-small-area-health-anomalies-using-kullback-leibler-divergence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/52142.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">311</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">432</span> Development and Implementation of E-Disease Surveillance Systems for Public Health Southern Africa: A Critical Review</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Taurai%20T.%20Chikotie">Taurai T. Chikotie</a>, <a href="https://publications.waset.org/abstracts/search?q=Bruce%20W.%20Watson"> Bruce W. Watson</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The manifestation of ‘new’ infectious diseases and the re-emergence of ‘old’ infectious diseases now present global problems and Southern Africa has not been spared from such calamity. Although having an organized public health system, countries in this region have failed to leverage on the proliferation in use of Information and Communication Technologies to promote effective disease surveillance. Objective: The objective of this study was to critically review and analyse the crucial variables to consider in the development and implementation of electronic disease surveillance systems in public health within the context of Southern Africa. Methodology: A critical review of literature published in English using, Google Scholar, EBSCOHOST, Science Direct, databases from the Centre for Disease Control (CDC and articles from the World Health Organisation (WHO) was undertaken. Manual reference and grey literature searches were also conducted. Results: Little has been done towards harnessing the potential of information technologies towards disease surveillance and this has been due to several challenges that include, lack of funding, lack of health informatics experts, poor supporting infrastructure, an unstable socio-political and socio-economic ecosystem in the region and archaic policies towards integration of information technologies in public health governance. Conclusion: The Southern African region stands to achieve better health outcomes if they adopt the use of e-disease surveillance systems in public health. However, the dynamics and complexities of the socio-economic, socio-political and technical variables would need addressing to ensure the successful development and implementation of e-disease surveillance systems in the region. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=critical%20review" title="critical review">critical review</a>, <a href="https://publications.waset.org/abstracts/search?q=disease%20surveillance" title=" disease surveillance"> disease surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20health%20informatics" title=" public health informatics"> public health informatics</a>, <a href="https://publications.waset.org/abstracts/search?q=Southern%20Africa" title=" Southern Africa"> Southern Africa</a> </p> <a href="https://publications.waset.org/abstracts/79599/development-and-implementation-of-e-disease-surveillance-systems-for-public-health-southern-africa-a-critical-review" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79599.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">281</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">431</span> Video Foreground Detection Based on Adaptive Mixture Gaussian Model for Video Surveillance Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Alavianmehr">M. A. Alavianmehr</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Tashk"> A. Tashk</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Sodagaran"> A. Sodagaran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Modeling background and moving objects are significant techniques for video surveillance and other video processing applications. This paper presents a foreground detection algorithm that is robust against illumination changes and noise based on adaptive mixture Gaussian model (GMM), and provides a novel and practical choice for intelligent video surveillance systems using static cameras. In the previous methods, the image of still objects (background image) is not significant. On the contrary, this method is based on forming a meticulous background image and exploiting it for separating moving objects from their background. The background image is specified either manually, by taking an image without vehicles, or is detected in real-time by forming a mathematical or exponential average of successive images. The proposed scheme can offer low image degradation. The simulation results demonstrate high degree of performance for the proposed method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=image%20processing" title="image processing">image processing</a>, <a href="https://publications.waset.org/abstracts/search?q=background%20models" title=" background models"> background models</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20surveillance" title=" video surveillance"> video surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=foreground%20detection" title=" foreground detection"> foreground detection</a>, <a href="https://publications.waset.org/abstracts/search?q=Gaussian%20mixture%20model" title=" Gaussian mixture model"> Gaussian mixture model</a> </p> <a href="https://publications.waset.org/abstracts/16364/video-foreground-detection-based-on-adaptive-mixture-gaussian-model-for-video-surveillance-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16364.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">516</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">430</span> Power Line Communication Integrated in a Wireless Power Transfer System: Feasibility of Surveillance Movement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Hemnath">M. Hemnath</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Kannan"> S. Kannan</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Kiran"> R. Kiran</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Thanigaivelu"> K. Thanigaivelu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper is based on exploring the possible opportunities and applications using Power Line Communication (PLC) for security and surveillance operations. Various research works are done for introducing PLC into onboard vehicle communication and networking (CAN, LIN etc.) and various international standards have been developed. Wireless power transfer (WPT) is also an emerging technology which is studied and tested for recharging purposes. In this work we present a system which embeds the detection and the response into one which eliminates the need for dedicated network for data transmission. Also we check the feasibility for integrating wireless power transfer system into this proposed security system for transmission of power to detection unit wirelessly from the response unit. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=power%20line%20communication" title="power line communication">power line communication</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20power%20transfer" title=" wireless power transfer"> wireless power transfer</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a> </p> <a href="https://publications.waset.org/abstracts/29830/power-line-communication-integrated-in-a-wireless-power-transfer-system-feasibility-of-surveillance-movement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29830.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">535</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">429</span> Root Cause Analysis of Surveillance Quality in Tanjung Priok Port to Prevent Epidemic Potential Disease as a Form of Bioterrorism Threat</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dina%20A.%20Amu">Dina A. Amu</a>, <a href="https://publications.waset.org/abstracts/search?q=Fifi%20N.%20Afifah"> Fifi N. Afifah</a>, <a href="https://publications.waset.org/abstracts/search?q=Catur%20Rosidati"> Catur Rosidati</a>, <a href="https://publications.waset.org/abstracts/search?q=Tirton%20Nefianto"> Tirton Nefianto</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Indonesia was shaken up by the avian influenza cases that had caused the country suffered losses of millions of dollars. The avian influenza case had even been suspected as a bioterrorism attack since it was an uncommon case in epidemiology. Furthermore, this avian influenza virus is a high pathogenic one and Indonesia has the highest case of fatality rate in the world. Bioterrorism threats or epidemic potential disease outbreaks currently does not exist in Tanjung Priok port yet. However, the surveillance system enhancement on epidemic potential diseases should be taken as a prevention, especially because Indonesia is currently facing the ASEAN Economic Society (AES). Therefore, this research evaluates the health surveillance system which is organized by Control, Quarantine and Surveillance Department, Health Office of Tanjung Priok Port. This study uses qualitative-evaluative method which utilizes Urgency Seriousness Growth (USG) method to determine priority issues and Root Cause analysis to determine the cause of prior problem. The result of this research shows that the implementation of epidemic potential disease surveillance in Tanjung Priok port has not done in the best possible way. It is because the lack of time allocation and the succinctness of the check list of ship's environmental health inspection. Therefore, Health Ministry of Indonesia should recruit more employees at the health office of Tanjung Priok port, hold a simulation of ship's inspection and simplify the list for ship's environmental health inspection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=surveillance" title="surveillance">surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemic%20potential%20disease" title=" epidemic potential disease"> epidemic potential disease</a>, <a href="https://publications.waset.org/abstracts/search?q=port%20health" title=" port health"> port health</a>, <a href="https://publications.waset.org/abstracts/search?q=bioterrorism" title=" bioterrorism"> bioterrorism</a> </p> <a href="https://publications.waset.org/abstracts/67720/root-cause-analysis-of-surveillance-quality-in-tanjung-priok-port-to-prevent-epidemic-potential-disease-as-a-form-of-bioterrorism-threat" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67720.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">363</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">428</span> Automatic Motion Trajectory Analysis for Dual Human Interaction Using Video Sequences</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yuan-Hsiang%20Chang">Yuan-Hsiang Chang</a>, <a href="https://publications.waset.org/abstracts/search?q=Pin-Chi%20Lin"> Pin-Chi Lin</a>, <a href="https://publications.waset.org/abstracts/search?q=Li-Der%20Jeng"> Li-Der Jeng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Advance in techniques of image and video processing has enabled the development of intelligent video surveillance systems. This study was aimed to automatically detect moving human objects and to analyze events of dual human interaction in a surveillance scene. Our system was developed in four major steps: image preprocessing, human object detection, human object tracking, and motion trajectory analysis. The adaptive background subtraction and image processing techniques were used to detect and track moving human objects. To solve the occlusion problem during the interaction, the Kalman filter was used to retain a complete trajectory for each human object. Finally, the motion trajectory analysis was developed to distinguish between the interaction and non-interaction events based on derivatives of trajectories related to the speed of the moving objects. Using a database of 60 video sequences, our system could achieve the classification accuracy of 80% in interaction events and 95% in non-interaction events, respectively. In summary, we have explored the idea to investigate a system for the automatic classification of events for interaction and non-interaction events using surveillance cameras. Ultimately, this system could be incorporated in an intelligent surveillance system for the detection and/or classification of abnormal or criminal events (e.g., theft, snatch, fighting, etc.). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=motion%20detection" title="motion detection">motion detection</a>, <a href="https://publications.waset.org/abstracts/search?q=motion%20tracking" title=" motion tracking"> motion tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=trajectory%20analysis" title=" trajectory analysis"> trajectory analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20surveillance" title=" video surveillance"> video surveillance</a> </p> <a href="https://publications.waset.org/abstracts/13650/automatic-motion-trajectory-analysis-for-dual-human-interaction-using-video-sequences" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/13650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">548</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">427</span> The Effect of a Computer-Assisted Glycemic Surveillance Protocol on Nursing Workload</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=%C3%96zlem%20Canbolat">Özlem Canbolat</a>, <a href="https://publications.waset.org/abstracts/search?q=Sevgisun%20Kapucu"> Sevgisun Kapucu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aim of this study was to determine the effect of a computer-assisted glycemic surveillance protocol on nursing workload in intensive care unit. The study is completed in an Education and Research Hospital in Ankara with the attendance of volunteered 19 nurse who had been worked in reanimation unit. Nurses used the written protocol and computer-assisted glycemic surveillance protocol for glycemic follow-up approach of the intensive care patients. Nurses used the written protocol first in the glycemic follow-up of the patient, then used the computer-assisted protocol. (Nurses used the written protocol first, then the computer-assisted protocol in the glycemic follow-up of the patient). Less time was spent in glycemic control with computerized protocol than written protocol and this difference is statistically significant (p < 0.001). It was determined that the computerized protocol application was completed in about 10 seconds (25% shorter) than the written protocol implementation. The computer-assisted glycemic surveillance protocol was found to be more easy and appropriate by nurses and the satisfaction level of the users was higher than with written protocol. While 79% of the nurses find it confusing to implement the written protocol, 79% were satisfied with the use of computerized protocol. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=computer-assisted%20protocol" title="computer-assisted protocol">computer-assisted protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=glycemic%20control" title=" glycemic control"> glycemic control</a>, <a href="https://publications.waset.org/abstracts/search?q=insulin%20infusion%20protocol" title=" insulin infusion protocol"> insulin infusion protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=intensive%20care" title=" intensive care"> intensive care</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20workload" title=" nursing workload"> nursing workload</a> </p> <a href="https://publications.waset.org/abstracts/81279/the-effect-of-a-computer-assisted-glycemic-surveillance-protocol-on-nursing-workload" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81279.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">221</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">426</span> Evaluation of the Surveillance System for Rift Valley Fever in Ruminants in Mauritania, 2019</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20El%20Kory%20Yacoub">Mohamed El Kory Yacoub</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Bezeid%20El%20Mamy%20Beyatt"> Ahmed Bezeid El Mamy Beyatt</a>, <a href="https://publications.waset.org/abstracts/search?q=Djibril%20Barry"> Djibril Barry</a>, <a href="https://publications.waset.org/abstracts/search?q=Yanogo%20Pauline"> Yanogo Pauline</a>, <a href="https://publications.waset.org/abstracts/search?q=Nicolas%20Meda"> Nicolas Meda</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Introduction: Rift Valley Fever is a zoonotic arbovirosis that severely affects ruminants, as well as humans. It causes abortions in pregnant females and deaths in young animals. The disease occurs during heavy rains followed by large numbers of mosquito vectors. The objective of this work is to evaluate the surveillance system for Rift Valley Fever. Methods: We conducted an evaluation of the Rift Valley Fiver surveillance system. Data were collected from the analysis of the national database of the Mauritanian Network of Animal Disease Epidemiological Surveillance at the Ministry of Rural Development, of RVF cases notified from the whole national territory, of questionnaires and interviews with all persons involved in RVF surveillance at the central level. The quality of the system was assessed by analyzing the quantitative attributes defined by the Centers for Disease Control and Prevention. Results: In 2019, 443 cases of RVF were notified by the surveillance system, of which 36 were positive. Among the notified cases of Rift Valley Fever, the 0- to the 3-year-old age group of small ruminants was the most represented with 49.21% of cases, followed by 33.33%, which was recorded in large ruminants in the 0 to 7-year-old age group, 11.11% of cases were older than seven years. The completeness of the data varied between 14.2% (age) and 100% (species). Most positive cases were recorded between October and November 2019 in seven different regions. Attribute analysis showed that 87% of the respondents were able to use the case definition well, and 78.8% said they were familiar with the reporting and feedback loop of the Rift Valley Fever data. 90.3% of the respondents found it easy, while 95% of them responded that it was easy for them to transmit their data to the next level. Conclusions: The epidemiological surveillance system for Rift Valley Fever in Mauritania is simple and representative. However, data quality, stability, and responsiveness are average, as the diagnosis of the disease requires laboratory confirmation and the average delay for this confirmation is long (13 days). Consequently, the lack of completeness of the recorded data and of description of cases in terms of time-place-animal, associated with the delay between the stages of the surveillance system can make prevention, early detection of epidemics, and the initiation of measures for an adequate response difficult. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=evaluation" title="evaluation">evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemiological%20surveillance%20system" title=" epidemiological surveillance system"> epidemiological surveillance system</a>, <a href="https://publications.waset.org/abstracts/search?q=rift%20valley%20fever" title=" rift valley fever"> rift valley fever</a>, <a href="https://publications.waset.org/abstracts/search?q=mauritania" title=" mauritania"> mauritania</a>, <a href="https://publications.waset.org/abstracts/search?q=ruminants" title=" ruminants"> ruminants</a> </p> <a href="https://publications.waset.org/abstracts/136646/evaluation-of-the-surveillance-system-for-rift-valley-fever-in-ruminants-in-mauritania-2019" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/136646.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">148</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">425</span> Urban Citizenship in a Sensor Rich Society</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mike%20Dee">Mike Dee</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Urban public spaces are sutured with a range of surveillance and sensor technologies that claim to enable new forms of ‘data based citizen participation’, but also increase the tendency for ‘function-creep’, whereby vast amounts of data are gathered, stored and analysed in a broad application of urban surveillance. This kind of monitoring and capacity for surveillance connects with attempts by civic authorities to regulate, restrict, rebrand and reframe urban public spaces. A direct consequence of the increasingly security driven, policed, privatised and surveilled nature of public space is the exclusion or ‘unfavourable inclusion’ of those considered flawed and unwelcome in the ‘spectacular’ consumption spaces of many major urban centres. In the name of urban regeneration, programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’ city initiatives refashion public space as sites of selective inclusion and exclusion. In this context of monitoring and control procedures, in particular, children and young people’s use of space in parks, neighbourhoods, shopping malls and streets is often viewed as a threat to the social order, requiring various forms of remedial action. This paper suggests that cities, places and spaces and those who seek to use them, can be resilient in working to maintain and extend democratic freedoms and processes enshrined in Marshall’s concept of citizenship, calling sensor and surveillance systems to account. Such accountability could better inform the implementation of public policy around the design, build and governance of public space and also understandings of urban citizenship in the sensor saturated urban environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=citizenship" title="citizenship">citizenship</a>, <a href="https://publications.waset.org/abstracts/search?q=public%20space" title=" public space"> public space</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=young%20people" title=" young people"> young people</a> </p> <a href="https://publications.waset.org/abstracts/12025/urban-citizenship-in-a-sensor-rich-society" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12025.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">448</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">424</span> Violence Detection and Tracking on Moving Surveillance Video Using Machine Learning Approach</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abe%20Degale%20D.">Abe Degale D.</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng%20Jian"> Cheng Jian</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When creating automated video surveillance systems, violent action recognition is crucial. In recent years, hand-crafted feature detectors have been the primary method for achieving violence detection, such as the recognition of fighting activity. Researchers have also looked into learning-based representational models. On benchmark datasets created especially for the detection of violent sequences in sports and movies, these methods produced good accuracy results. The Hockey dataset's videos with surveillance camera motion present challenges for these algorithms for learning discriminating features. Image recognition and human activity detection challenges have shown success with deep representation-based methods. For the purpose of detecting violent images and identifying aggressive human behaviours, this research suggested a deep representation-based model using the transfer learning idea. The results show that the suggested approach outperforms state-of-the-art accuracy levels by learning the most discriminating features, attaining 99.34% and 99.98% accuracy levels on the Hockey and Movies datasets, respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=violence%20detection" title="violence detection">violence detection</a>, <a href="https://publications.waset.org/abstracts/search?q=faster%20RCNN" title=" faster RCNN"> faster RCNN</a>, <a href="https://publications.waset.org/abstracts/search?q=transfer%20learning%20and" title=" transfer learning and"> transfer learning and</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance%20video" title=" surveillance video"> surveillance video</a> </p> <a href="https://publications.waset.org/abstracts/171296/violence-detection-and-tracking-on-moving-surveillance-video-using-machine-learning-approach" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171296.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">106</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">423</span> H.264 Video Privacy Protection Method Using Regions of Interest Encryption</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Taekyun%20Doo">Taekyun Doo</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheongmin%20Ji"> Cheongmin Ji</a>, <a href="https://publications.waset.org/abstracts/search?q=Manpyo%20Hong"> Manpyo Hong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Like a closed-circuit television (CCTV), video surveillance system is widely placed for gathering video from unspecified people to prevent crime, surveillance, or many other purposes. However, abuse of CCTV brings about concerns of personal privacy invasions. In this paper, we propose an encryption method to protect personal privacy system in H.264 compressed video bitstream with encrypting only regions of interest (ROI). There is no need to change the existing video surveillance system. In addition, encrypting ROI in compressed video bitstream is a challenging work due to spatial and temporal drift errors. For this reason, we propose a novel drift mitigation method when ROI is encrypted. The proposed method was implemented by using JM reference software based on the H.264 compressed videos, and experimental results show the verification of our proposed methods and its effectiveness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=H.264%2FAVC" title="H.264/AVC">H.264/AVC</a>, <a href="https://publications.waset.org/abstracts/search?q=video%20encryption" title=" video encryption"> video encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy%20protection" title=" privacy protection"> privacy protection</a>, <a href="https://publications.waset.org/abstracts/search?q=post%20compression" title=" post compression"> post compression</a>, <a href="https://publications.waset.org/abstracts/search?q=region%20of%20interest" title=" region of interest"> region of interest</a> </p> <a href="https://publications.waset.org/abstracts/57651/h264-video-privacy-protection-method-using-regions-of-interest-encryption" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57651.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">422</span> Valorization of Surveillance Data and Assessment of the Sensitivity of a Surveillance System for an Infectious Disease Using a Capture-Recapture Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jean-Philippe%20Amat">Jean-Philippe Amat</a>, <a href="https://publications.waset.org/abstracts/search?q=Timoth%C3%A9e%20Vergne"> Timothée Vergne</a>, <a href="https://publications.waset.org/abstracts/search?q=Aymeric%20Hans"> Aymeric Hans</a>, <a href="https://publications.waset.org/abstracts/search?q=B%C3%A9n%C3%A9dicte%20Ferry"> Bénédicte Ferry</a>, <a href="https://publications.waset.org/abstracts/search?q=Pascal%20Hendrikx"> Pascal Hendrikx</a>, <a href="https://publications.waset.org/abstracts/search?q=Jackie%20Tapprest"> Jackie Tapprest</a>, <a href="https://publications.waset.org/abstracts/search?q=Barbara%20Dufour"> Barbara Dufour</a>, <a href="https://publications.waset.org/abstracts/search?q=Agn%C3%A8s%20Leblond"> Agnès Leblond</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The surveillance of infectious diseases is necessary to describe their occurrence and help the planning, implementation and evaluation of risk mitigation activities. However, the exact number of detected cases may remain unknown whether surveillance is based on serological tests because identifying seroconversion may be difficult. Moreover, incomplete detection of cases or outbreaks is a recurrent issue in the field of disease surveillance. This study addresses these two issues. Using a viral animal disease as an example (equine viral arteritis), the goals were to establish suitable rules for identifying seroconversion in order to estimate the number of cases and outbreaks detected by a surveillance system in France between 2006 and 2013, and to assess the sensitivity of this system by estimating the total number of outbreaks that occurred during this period (including unreported outbreaks) using a capture-recapture model. Data from horses which exhibited at least one positive result in serology using viral neutralization test between 2006 and 2013 were used for analysis (n=1,645). Data consisted of the annual antibody titers and the location of the subjects (towns). A consensus among multidisciplinary experts (specialists in the disease and its laboratory diagnosis, epidemiologists) was reached to consider seroconversion as a change in antibody titer from negative to at least 32 or as a three-fold or greater increase. The number of seroconversions was counted for each town and modeled using a unilist zero-truncated binomial (ZTB) capture-recapture model with R software. The binomial denominator was the number of horses tested in each infected town. Using the defined rules, 239 cases located in 177 towns (outbreaks) were identified from 2006 to 2013. Subsequently, the sensitivity of the surveillance system was estimated as the ratio of the number of detected outbreaks to the total number of outbreaks that occurred (including unreported outbreaks) estimated using the ZTB model. The total number of outbreaks was estimated at 215 (95% credible interval CrI95%: 195-249) and the surveillance sensitivity at 82% (CrI95%: 71-91). The rules proposed for identifying seroconversion may serve future research. Such rules, adjusted to the local environment, could conceivably be applied in other countries with surveillance programs dedicated to this disease. More generally, defining ad hoc algorithms for interpreting the antibody titer could be useful regarding other human and animal diseases and zoonosis when there is a lack of accurate information in the literature about the serological response in naturally infected subjects. This study shows how capture-recapture methods may help to estimate the sensitivity of an imperfect surveillance system and to valorize surveillance data. The sensitivity of the surveillance system of equine viral arteritis is relatively high and supports its relevance to prevent the disease spreading. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20inference" title="Bayesian inference">Bayesian inference</a>, <a href="https://publications.waset.org/abstracts/search?q=capture-recapture" title=" capture-recapture"> capture-recapture</a>, <a href="https://publications.waset.org/abstracts/search?q=epidemiology" title=" epidemiology"> epidemiology</a>, <a href="https://publications.waset.org/abstracts/search?q=equine%20viral%20arteritis" title=" equine viral arteritis"> equine viral arteritis</a>, <a href="https://publications.waset.org/abstracts/search?q=infectious%20disease" title=" infectious disease"> infectious disease</a>, <a href="https://publications.waset.org/abstracts/search?q=seroconversion" title=" seroconversion"> seroconversion</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a> </p> <a href="https://publications.waset.org/abstracts/48616/valorization-of-surveillance-data-and-assessment-of-the-sensitivity-of-a-surveillance-system-for-an-infectious-disease-using-a-capture-recapture-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48616.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">297</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">421</span> Epidemiological Profile of Acute Flaccid Paralysis (PFA), Haiti, 2018-2021</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sophonie%20Sarielle%20Jean%20Jacques%20Bertrand">Sophonie Sarielle Jean Jacques Bertrand</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Acute flaccid paralysis (PFA) is the sudden weakness or paralysis of muscles seen in children under 15 years of age. According to the WHO, PFA remains a real public health problem. For Haiti, the PFA represents a national priority. This study aims to describe the epidemiological profile of cases of Acute Flaccid Paralysis (PFA) in Haiti from 2018-2020. Methods: A descriptive cross-sectional study covering the period of 2018-2021 was carried out. epidemiological surveillance data PFA exported to Integrated Monitoring Evaluation Surveillance (MESI) were used. Sociodemographic variables were studied. Prevalence and clinical mortality rate were calculated. Epi Info 7.2 and Excel 2016 were used for data analysis. Results: 76 AFP cases were recorded for the period, or 13 (17%) in 2018, 23 (30%) in 2019, 8 (11%) in 2020 32 (42%) in 2021. Children aged 5-14 years accounted for 36% of cases (n= 26). The M/F sex ratio was 0.52, with a predominance of the female sex. The clinical mortality rate was 2.6%. The prevalence was 1.77/100,000 people. Conclusion: From 2018-2021, 76 cases of PFA cases were recorded in the 10 departments of the country, of which the West department was the most affected. Maintaining high vaccination coverage and a standard acute flaccid paralysis surveillance system are essential for the eradication of this condition. Strengthen epidemiological surveillance of PFA. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=epidemiology" title="epidemiology">epidemiology</a>, <a href="https://publications.waset.org/abstracts/search?q=PFA" title=" PFA"> PFA</a>, <a href="https://publications.waset.org/abstracts/search?q=Ha%C3%AFti" title=" Haïti"> Haïti</a>, <a href="https://publications.waset.org/abstracts/search?q=MESI" title=" MESI"> MESI</a> </p> <a href="https://publications.waset.org/abstracts/159838/epidemiological-profile-of-acute-flaccid-paralysis-pfa-haiti-2018-2021" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159838.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">85</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">420</span> Evaluation of Firearm Injury Syndromic Surveillance in Utah</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=E.%20Bennion">E. Bennion</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Acharya"> A. Acharya</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Barnes"> S. Barnes</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20Ferrell"> D. Ferrell</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Luckett-Cole"> S. Luckett-Cole</a>, <a href="https://publications.waset.org/abstracts/search?q=G.%20Mower"> G. Mower</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Nelson"> J. Nelson</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20Nguyen"> Y. Nguyen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Objective: This study aimed to evaluate the validity of a firearm injury query in the Early Notification of Community-based Epidemics syndromic surveillance system. Syndromic surveillance data are used at the Utah Department of Health for early detection of and rapid response to unusually high rates of violence and injury, among other health outcomes. The query of interest was defined by the Centers for Disease Control and Prevention and used chief complaint and discharge diagnosis codes to capture initial emergency department encounters for firearm injury of all intents. Design: Two epidemiologists manually reviewed electronic health records of emergency department visits captured by the query from April-May 2020, compared results, and sent conflicting determinations to two arbiters. Results: Of the 85 unique records captured, 67 were deemed probable, 19 were ruled out, and two were undetermined, resulting in a positive predictive value of 75.3%. Common reasons for false positives included non-initial encounters and misleading keywords. Conclusion: Improving the validity of syndromic surveillance data would better inform outbreak response decisions made by state and local health departments. The firearm injury definition could be refined to exclude non-initial encounters by negating words such as “last month,” “last week,” and “aftercare”; and to exclude non-firearm injury by negating words such as “pellet gun,” “air gun,” “nail gun,” “bullet bike,” and “exit wound” when a firearm is not mentioned. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=evaluation" title="evaluation">evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=health%20information%20system" title=" health information system"> health information system</a>, <a href="https://publications.waset.org/abstracts/search?q=firearm%20injury" title=" firearm injury"> firearm injury</a>, <a href="https://publications.waset.org/abstracts/search?q=syndromic%20surveillance" title=" syndromic surveillance"> syndromic surveillance</a> </p> <a href="https://publications.waset.org/abstracts/143199/evaluation-of-firearm-injury-syndromic-surveillance-in-utah" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143199.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">419</span> The Representation of Female Characters by Women Directors in Surveillance Spaces in Turkish Cinema</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Berceste%20G%C3%BCl%C3%A7in%20%C3%96zdemir">Berceste Gülçin Özdemir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The representation of women characters in cinema has been discussed for centuries. In cinema where dominant narrative codes prevail and scopophilic views exist over women characters, passive stereotypes of women are observed in the representation of women characters. In films shot from a woman’s point of view in Turkish Cinema and even in the films outside the main stream in which the stories of women characters are told, the fact that women characters are discussed on the basis of feminist film theories triggers the question: ‘Are feminist films produced in Turkish Cinema?’ The spaces that are used in the representation of women characters are observed to be used as spaces that convert characters into passive subjects on the basis of the space factor in the narrative. The representation of women characters in the possible surveillance spaces integrates the characters and compresses them in these spaces. In this study, narrative analysis was used to investigate women characters representation in the surveillance spaces. For the study framework, firstly a case study films are selected, and in the second level, women characters representations in surveillance spaces are argued by narrative analysis using feminist film theories. Two questions are argued with feminist film theories: ‘Why do especially women directors represent their female characters to viewers by representing them in surveillance spaces?’ and ‘Can this type of presentation contribute to the feminist film practice and become important with regard to feminist film theories?’ The representation of women characters in a passive and observed way in surveillance spaces of the narrative reveals the questioning of also the discourses of films outside of the main stream. As films that produce alternative discourses and reveal different cinematic languages, those outside the main stream are expected to bring other points of view also to the representation of women characters in spaces. These questionings are selected as the baseline and Turkish films such as Watch Tower and Mustang, directed by women, were examined. This examination paves the way for discussions regarding the women characters in surveillance spaces. Outcomes can be argued from the viewpoint of representation in the genre by feminist film theories. In the context of feminist film theories and feminist film practice, alternatives should be found that can corporally reveal the existence of women in both the representation of women characters in spaces and in the usage of the space factor. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=feminist%20film%20theory" title="feminist film theory">feminist film theory</a>, <a href="https://publications.waset.org/abstracts/search?q=representation" title=" representation"> representation</a>, <a href="https://publications.waset.org/abstracts/search?q=space" title=" space"> space</a>, <a href="https://publications.waset.org/abstracts/search?q=women%20directors" title=" women directors"> women directors</a> </p> <a href="https://publications.waset.org/abstracts/64547/the-representation-of-female-characters-by-women-directors-in-surveillance-spaces-in-turkish-cinema" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64547.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">287</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">418</span> Promoting 'One Health' Surveillance and Response Approach Implementation Capabilities against Emerging Threats and Epidemics Crisis Impact in African Countries</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ernest%20Tambo">Ernest Tambo</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghislaine%20Madjou"> Ghislaine Madjou</a>, <a href="https://publications.waset.org/abstracts/search?q=Jeanne%20Y.%20Ngogang"> Jeanne Y. Ngogang</a>, <a href="https://publications.waset.org/abstracts/search?q=Shenglan%20Tang"> Shenglan Tang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhou%20XiaoNong"> Zhou XiaoNong</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Implementing national to community-based 'One Health' surveillance approach for human, animal and environmental consequences mitigation offers great opportunities and value-added in sustainable development and wellbeing. 'One Health' surveillance approach global partnerships, policy commitment and financial investment are much needed in addressing the evolving threats and epidemics crises mitigation in African countries. The paper provides insights onto how China-Africa health development cooperation in promoting “One Health” surveillance approach in response advocacy and mitigation. China-Africa health development initiatives provide new prospects in guiding and moving forward appropriate and evidence-based advocacy and mitigation management approaches and strategies in attaining Universal Health Coverage (UHC) and Sustainable Development Goals (SDGs). Early and continuous quality and timely surveillance data collection and coordinated information sharing practices in malaria and other diseases are demonstrated in Comoros, Zanzibar, Ghana and Cameroon. Improvements of variety of access to contextual sources and network of data sharing platforms are needed in guiding evidence-based and tailored detection and response to unusual hazardous events. Moreover, understanding threats and diseases trends, frontline or point of care response delivery is crucial to promote integrated and sustainable targeted local, national “One Health” surveillance and response approach needs implementation. Importantly, operational guidelines are vital in increasing coherent financing and national workforce capacity development mechanisms. Strengthening participatory partnerships, collaboration and monitoring strategies in achieving global health agenda effectiveness in Africa. At the same enhancing surveillance data information streams reporting and dissemination usefulness in informing policies decisions, health systems programming and financial mobilization and prioritized allocation pre, during and post threats and epidemics crises programs strengths and weaknesses. Thus, capitalizing on “One Health” surveillance and response approach advocacy and mitigation implementation is timely in consolidating Africa Union 2063 agenda and Africa renaissance capabilities and expectations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Africa" title="Africa">Africa</a>, <a href="https://publications.waset.org/abstracts/search?q=one%20health%20approach" title=" one health approach"> one health approach</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=response" title=" response"> response</a> </p> <a href="https://publications.waset.org/abstracts/58024/promoting-one-health-surveillance-and-response-approach-implementation-capabilities-against-emerging-threats-and-epidemics-crisis-impact-in-african-countries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58024.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">421</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">417</span> Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yao-Hong%20Tsai">Yao-Hong Tsai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=unmanned%20aerial%20vehicle" title="unmanned aerial vehicle">unmanned aerial vehicle</a>, <a href="https://publications.waset.org/abstracts/search?q=object%20tracking" title=" object tracking"> object tracking</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=collision%20avoidance" title=" collision avoidance"> collision avoidance</a> </p> <a href="https://publications.waset.org/abstracts/99181/vision-based-collision-avoidance-for-unmanned-aerial-vehicles-by-recurrent-neural-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99181.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">416</span> Text Mining of Veterinary Forums for Epidemiological Surveillance Supplementation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20Munaf">Samuel Munaf</a>, <a href="https://publications.waset.org/abstracts/search?q=Kevin%20Swingler"> Kevin Swingler</a>, <a href="https://publications.waset.org/abstracts/search?q=Franz%20Br%C3%BClisauer"> Franz Brülisauer</a>, <a href="https://publications.waset.org/abstracts/search?q=Anthony%20O%E2%80%99Hare"> Anthony O’Hare</a>, <a href="https://publications.waset.org/abstracts/search?q=George%20Gunn"> George Gunn</a>, <a href="https://publications.waset.org/abstracts/search?q=Aaron%20Reeves"> Aaron Reeves</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Web scraping and text mining are popular computer science methods deployed by public health researchers to augment traditional epidemiological surveillance. However, within veterinary disease surveillance, such techniques are still in the early stages of development and have not yet been fully utilised. This study presents an exploration into the utility of incorporating internet-based data to better understand the smallholder farming communities within Scotland by using online text extraction and the subsequent mining of this data. Web scraping of the livestock fora was conducted in conjunction with text mining of the data in search of common themes, words, and topics found within the text. Results from bi-grams and topic modelling uncover four main topics of interest within the data pertaining to aspects of livestock husbandry: feeding, breeding, slaughter, and disposal. These topics were found amongst both the poultry and pig sub-forums. Topic modeling appears to be a useful method of unsupervised classification regarding this form of data, as it has produced clusters that relate to biosecurity and animal welfare. Internet data can be a very effective tool in aiding traditional veterinary surveillance methods, but the requirement for human validation of said data is crucial. This opens avenues of research via the incorporation of other dynamic social media data, namely Twitter and Facebook/Meta, in addition to time series analysis to highlight temporal patterns. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=veterinary%20epidemiology" title="veterinary epidemiology">veterinary epidemiology</a>, <a href="https://publications.waset.org/abstracts/search?q=disease%20surveillance" title=" disease surveillance"> disease surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=infodemiology" title=" infodemiology"> infodemiology</a>, <a href="https://publications.waset.org/abstracts/search?q=infoveillance" title=" infoveillance"> infoveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=smallholding" title=" smallholding"> smallholding</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20media" title=" social media"> social media</a>, <a href="https://publications.waset.org/abstracts/search?q=web%20scraping" title=" web scraping"> web scraping</a>, <a href="https://publications.waset.org/abstracts/search?q=sentiment%20analysis" title=" sentiment analysis"> sentiment analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=geolocation" title=" geolocation"> geolocation</a>, <a href="https://publications.waset.org/abstracts/search?q=text%20mining" title=" text mining"> text mining</a>, <a href="https://publications.waset.org/abstracts/search?q=NLP" title=" NLP"> NLP</a> </p> <a href="https://publications.waset.org/abstracts/159869/text-mining-of-veterinary-forums-for-epidemiological-surveillance-supplementation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159869.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">415</span> Analysis of Maternal Death Surveillance and Response: Causes and Contributing Factors in Addis Ababa, Ethiopia, 2022</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sisay%20Tiroro%20Salato">Sisay Tiroro Salato</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Background: Ethiopia has been implementing the maternal death surveillance and response system to provide real-time actionable information, including causes of death and contributing factors. Analysis of maternal mortality surveillance data was conducted to identify the causes and underlying factors in Addis Ababa, Ethiopia. Methods: We carried out a retrospective surveillance data analysis of 324 maternal deaths reported in Addis Ababa, Ethiopia, from 2017 to 2021. The data were extracted from the national maternal death surveillance and response database, including information from case investigation, verbal autopsy, and facility extraction forms. The data were analyzed by computing frequency and presented in numbers, proportions, and ratios. Results: Of 324 maternal deaths, 92% died in the health facilities, 6.2% in transit, and 1.5% at home. The mean age at death was 28 years, ranging from 17 to 45. The maternal mortality ratio per 100,000 live births was 77for the five years, ranging from 126 in 2017 to 21 in 2021. The direct and indirect causes of death were responsible for 87% and 13%, respectively. The direct causes included obstetric haemorrhage, hypertensive disorders in pregnancy, puerperal sepsis, embolism, obstructed labour, and abortion. The third delay (delay in receiving care after reaching health facilities) accounted for 57% of deaths, while the first delay (delay in deciding to seek health care) and the second delay (delay in reaching health facilities) and accounted for 34% and 24%, respectively. Late arrival to the referral facility, delayed management after admission, andnon-recognition of danger signs were underlying factors. Conclusion: Over 86% of maternal deaths were attributed by avoidable direct causes. The majority of women do try to reach health services when an emergency occurs, but the third delays present a major problem. Improving the quality of care at the healthcare facility level will help to reduce maternal death. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=maternal%20death" title="maternal death">maternal death</a>, <a href="https://publications.waset.org/abstracts/search?q=surveillance" title=" surveillance"> surveillance</a>, <a href="https://publications.waset.org/abstracts/search?q=delays" title=" delays"> delays</a>, <a href="https://publications.waset.org/abstracts/search?q=factors" title=" factors"> factors</a> </p> <a href="https://publications.waset.org/abstracts/154084/analysis-of-maternal-death-surveillance-and-response-causes-and-contributing-factors-in-addis-ababa-ethiopia-2022" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154084.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">112</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=14">14</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=15">15</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=surveillance&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>