918 resultados para contrôle de surveillance
Resumo:
Objective To evaluate the safety of a non-chlorofluorocarbon metered dose salbutamol inhaler.
Resumo:
Objectives: In Europe, 25% of workers use video display terminals (VDTs). Occupational health surveillance has been considered a key element in the protection of these workers. Nevertheless, it is unclear if guidelines available for this purpose, based on EU standards and available evidence, meet currently accepted quality criteria. The aim of this study was to appraise three sets of European VDT guidelines (UK, France, Spain) in which regulatory and evidence-based approaches for visual health have been formulated and recommendations for practice made. Methods: Three independent appraisers used an adapted AGREE instrument with seven domains to appraise the guidelines. A modified nominal group technique approach was used in two consecutive phases: first, individual evaluation of the three guidelines simultaneously, and second, a face-to-face meeting of appraisers to discuss scoring. Analysis of ratings obtained in each domain and variability among appraisers was undertaken (correlation and kappa coefficients). Results: All guidelines had low domain scores. The domain evaluated most highly was Scope and purpose, while Applicability was scored minimally. The UK guidelines had the highest overall score, and the Spanish ones had the lowest. The analysis of reliability and differences between scores in each domain showed a high level of agreement. Conclusions: These results suggest current guidelines used in these countries need an update. The formulation of evidence-base European guidelines on VDT could help to reduce the significant variation of national guidelines, which may have an impact on practical application.
Resumo:
In this work, we present a multi-camera surveillance system based on the use of self-organizing neural networks to represent events on video. The system processes several tasks in parallel using GPUs (graphic processor units). It addresses multiple vision tasks at various levels, such as segmentation, representation or characterization, analysis and monitoring of the movement. These features allow the construction of a robust representation of the environment and interpret the behavior of mobile agents in the scene. It is also necessary to integrate the vision module into a global system that operates in a complex environment by receiving images from multiple acquisition devices at video frequency. Offering relevant information to higher level systems, monitoring and making decisions in real time, it must accomplish a set of requirements, such as: time constraints, high availability, robustness, high processing speed and re-configurability. We have built a system able to represent and analyze the motion in video acquired by a multi-camera network and to process multi-source data in parallel on a multi-GPU architecture.
Resumo:
These days as we are facing extremely powerful attacks on servers over the Internet (say, by the Advanced Persistent Threat attackers or by Surveillance by powerful adversary), Shamir has claimed that “Cryptography is Ineffective”and some understood it as “Cryptography is Dead!” In this talk I will discuss the implications on cryptographic systems design while facing such strong adversaries. Is crypto dead or we need to design it better, taking into account, mathematical constraints, but also systems vulnerability constraints. Can crypto be effective at all when your computer or your cloud is penetrated? What is lost and what can be saved? These are very basic issues at this point of time, when we are facing potential loss of privacy and security.
Resumo:
Surveillance studies has been somewhat inattentive to the perspective of the surveilled subject. It is the functioning of the surveillance apparatus, not the relatively inconsequential subject, which has tended to frame the focus of surveillance inquiries; leaving understandings of surveilled subjects’ experiences relatively limited. This research addresses this gap in the literature, exploring ways in which surveillance studies might understand the surveilled subject with greater consistency. Participants (N=47) shared their encounters with and perceptions of surveillance in a specific (Pearson International Airport) and general (everyday life) context through semi-structured interviews. The findings suggest that surveilled subjects’ encounters can be understood with some consistency – characterized by consistent criteria across subjects and contexts, and through a consistent theoretical framework across subjects in a specific context. However, consistency should not be confused with uniformity; encounters with surveillance must also be recognized for the extent to which they are nuanced and situated. For example, as this study also highlights, participants’ perceptions of encounters with surveillance at Pearson International Airport were differentially distributed in relation to identity characteristics (particularly minority status).
Resumo:
In the wake of the disclosures surrounding PRISM and other US surveillance programmes, this paper assesses the large-scale surveillance practices by a selection of EU member states: the UK, Sweden, France, Germany and the Netherlands. Given the large-scale nature of these practices, which represent a reconfiguration of traditional intelligence gathering, the paper contends that an analysis of European surveillance programmes cannot be reduced to a question of the balance between data protection versus national security, but has to be framed in terms of collective freedoms and democracy. It finds that four of the five EU member states selected for in-depth examination are engaging in some form of large-scale interception and surveillance of communication data, and identifies parallels and discrepancies between these programmes and the NSA-run operations. The paper argues that these programmes do not stand outside the realm of EU intervention but can be analysed from an EU law perspective via i) an understanding of national security in a democratic rule of law framework where fundamental human rights and judicial oversight constitute key norms; ii) the risks posed to the internal security of the Union as a whole as well as the privacy of EU citizens as data owners and iii) the potential spillover into the activities and responsibilities of EU agencies. The paper then presents a set of policy recommendations to the European Parliament.