3,353 research outputs found

    Co-operative surveillance cameras for high quality face acquisition in a real-time door monitoring system

    Get PDF
    The increasing number of CCTV cameras in use poses a problem of information overloading for end users. Smart technologies are used in video surveillance to automatically analyze and detect events of interest in real-time, through 2D and 3D video processing techniques called video analytics. This paper presents a smart surveillance stereo vision system for real-time intelligent door access monitoring. The system uses two IP cameras in a stereo configuration and a pan-tilt-zoom (PTZ) camera, to obtain real-time localised, high quality images of any triggering events

    Co-operative surveillance cameras for high quality face acquisition in a real-time door monitoring system

    Get PDF
    The increasing number of CCTV cameras in use poses a problem of information overloading for end users. Smart technologies are used in video surveillance to automatically analyze and detect events of interest in real-time, through 2D and 3D video processing techniques called video analytics. This paper presents a smart surveillance stereo vision system for real-time intelligent door access monitoring. The system uses two IP cameras in a stereo configuration and a pan-tilt-zoom (PTZ) camera, to obtain real-time localised, high quality images of any triggering events

    Co-operative surveillance cameras for high quality face acquisition in a real-time door monitoring system

    Get PDF
    A poster session on co-operative surveillance cameras for high quality face acquisition in a real-time door monitoring syste

    Análisis espacial y prognosis de la seguridad en entornos urbanos : comprensión de la trazabilidad de la conducta espacial y de su vínculo con las fuerzas motrices de la seguridad

    Get PDF
    Tesis de la Universidad Complutense de Madrid, Facultad de Geografía e Historia, Departamento de Geografía Humana, leída el 30-01-2018Currently, our societies demand a permanent and trustable security. The number and typologyof threats that they are facing on daily basis can lead to their eminent collapse. The ground of theabove-mentioned status quo is simple: a security applied en mass is based on a fallacies and myths.This mythical security puts on risk much more than an ordinary clash between theoretical securitymodels: the entire social peace system is questioned. Transversally to those threats is proposed thetraceability concept, frequently used in bioscience and biometric technologies, but not in commonuse for spatial analysis purposes. Within this unprecedented research founded in the field of thespatial analysis, we will analyze the main security driving forces existing in our societies - from amulti-scale perspective - with the aim to achieve a final social improvement.The doctoral thesis presented herein covers a comprehensive pursuit of the spatial conductbehaviour and its traceability. In this thesis, focused on urban areas, it will be analyzed how thecontemporary surveillance technologies work, evaluating whether those technologies and massprograms are covering the security demanded by the societies. Within the following chapters we willreview how modern security have intentionally designed and developed a smokescreen that istricking a true pragmatic security and which is creating an unprecedented security failure. Once thissmokescreen is revealed and questioned, the results are demonstrating minimal capabilities of itsapplication and profitability for traceability purposes. What we presented herein, is not exclusively ameta-theoretical analysis of a state of art...Actualmente, nuestras sociedades demandan un estado permanente y verificable de seguridad.Los riesgos y amenazas a los que nos enfrentamos a diario pueden constituir el punto deinflexión que derive a nuestras sociedades - tal y como las conocemos y comprendemos - hacia uncolapso inminente. Los motivos de dicho status quo son simples: la seguridad - como producto - aplicadaen masa se fundamenta en un arquetipo de falacias y mitos. A pesar de que objetivamente sonindiscutibles las capacidades de vigilia tecnológica actual, la ratio volumen- eficiencia es sumamentecuestionable. Consecuentemente, el producto resultante adquirido - la seguridad como garantía de lapaz y orden social - pone en riesgo mucho más que una mera confrontación entre planteamientosmeta-teóricos: el conjunto de paz y garantías sociales vigentes en nuestra sociedad está en riesgo.Transversalmente al conjunto de riesgos y amenazas presentes nos encontramos con elconcepto de la trazabilidad, frecuentemente usado en ciencias naturales y tecnologías vinculadas alanálisis biométrico, pero raramente asociado al análisis espacial. Durante la presente investigación,de la cual no existen precedentes en cuanto al tratamiento de la temática, nos centraremos en el análisisde las fuerzas motrices vinculadas a la seguridad – desde una perspectiva multiescalar – con elobjetivo de aportar un beneficio social...Depto. de GeografíaFac. de Geografía e HistoriaTRUEunpu

    Video Processing Analysis For Non-Invasive Fatigue Detection And Quantification

    Get PDF
    Fatigue is a common symptom of weakness either physically or mentally. These symptoms may led to a drop in motivation, weakened sensitivity, slowing of responsiveness and inability to give full attention. All of these problems can cause adverse effects, such as accidents, especially those that require full attention as drivers of vehicles, and rail operators, the pilot of an aircraft or ship operators. This research investigates systems to detect and quantify the signs of fatigue using non-invasive facial analytics. There are four main algorithms that represent the major contribution from the PhD research. These algorithms encompass facial fatigue detection and quantification system as a whole. Firstly, a new technique to detect the face is introduced. This face detection algorithm is an affiliation of colour skin segmentation technique, connected component of binary image usage, and learning machine algorithm. The introduced face detection algorithm is able to reduce the false positive detection rate by a very significant margin. For the facial fatigue detection and quantification, the major fatigue signs features are from the eye activity. A new algorithm called the , Interdependence and Adaptive Scale Mean Shift (IASMS) is presented. The IASMS is able to quantify the state of eye as well as to track non-rigid eye movement. IASMS integrates the mean shift tracking algorithm with an adaptive scale scheme, which is used to track the iris and quantify the iris size. The IASMS is associated with face detection algorithm, image enhanced scheme, eye open detection technique and iris detection method in the initialisation process. This proposed method is able to quantify the eye activities that represent the blink rate and the duration of eye closure. The third contribution is yawning analysis algorithm. Commonly yawning is detected based on a wide mouth opening. Frequently however this approach is thwarted by the common human reaction to hand-cover the mouth during yawning. In this research, a new approach to analyse yawning which takes into account the covered mouth is introduced. This algorithm combines with a new technique of mouth opening measurements, covered mouth detection, and facial distortion (wrinkles) detection. By using this proposed method, yawning is still able to detect even though the mouth is covered. In order to have reliable results from the testing and evaluating of the developed fatigue detection algorithm, the real signs of fatigue are required. This research develops a recorded face activities database of the people that experience fatigue. This fatigue database is called as the Strathclyde Fatigue Facial (SFF). To induce the fatigue signs, ethically approved sleep deprivation experiments were carried out. In these experiments twenty participants, and four sessions were undertaken, which the participant has to deprive their sleep in 0, 3, 5, and 8 hours. The participants were subsequently requested to carry out 5 cognitive tasks that are related to the sleep loss. The last contribution of this research is a technique to recognise the fatigue signs. The existing fatigue detection system is based on single classification. However, this work presents a new approach for fatigue recognition which the fatigue is classified into levels. The levels of fatigue are justified based on the sleep deprivation stages where the SFF database is fully used for training, testing and evaluation of the developed fatigue recognition algorithm. This fatigue recognition algorithm is then integrated into a Fatigue Monitoring Tool (FMT) platform. This FMT has been used to test the participant that carried out the tasks as ship crew in shipping bridge simulator

    Why Digital Policing is Different

    Get PDF
    Many Fourth Amendment debates boil down to following argument: if police can already do something in an analog world, why does it matter that new digital technology allows them to do it better, more efficiently, or faster? This Article addresses why digital is, in fact, different when it comes to police surveillance technologies. The Article argues that courts should think of these digital technologies not as enhancements of traditional analog policing practices but as something completely different, warranting a different Fourth Amendment approach. Properly understood, certain digital searches should be legally distinguishable from analog search precedent such that the older cases no longer control the analysis

    Persistent Surveillance

    Get PDF
    Persistent surveillance technologies grant police vast new investigative capabilities. The technologies both monitor targeted areas and generate databases of searchable information about people, places, and patterns that can be connected and accessed for criminal prosecutions. In the face of this growing police surveillance, courts have struggled to make sense of a fragmented Fourth Amendment doctrine. The Supreme Court has offered some clues that “digital may be different” when it comes to surveillance, but lower courts have been left struggling to apply old law to new technologies. Warrantless use of persistent surveillance technologies raises hard questions about when a “search” occurs and whether the Fourth Amendment should limit overbroad police collection. This Article attempts to solve the persistent surveillance puzzle. First, it defines persistent surveillance technologies and explains why these policing systems represent a different privacy and security threat— one constitutionally distinguishable from traditional policing tools. Second, the Article examines the legal questions courts must ask in evaluating the Fourth Amendment implications of new persistent surveillance technologies used without a warrant. This Part synthesizes lessons learned from recent Supreme Court cases on digital surveillance and offers a new framework for future analysis. Third, this Article examines the technological framing questions courts must ask in evaluating these networked systems. Revealingly, how courts choose to define the scope, scale, and capacity of the technology itself— what I call the unit of surveillance—will shape the Fourth Amendment answers. The long-term goal of this Article is to offer a Fourth Amendment framework for all future persistent surveillance technologies. The short-term project applies these principles to two vexing persistent surveillance puzzles recently before the federal courts involving aerial surveillance planes and long-term pole cameras

    Future worlds: threats and opportunities for policing and security

    Get PDF
    An article about the threats and opportunities for policing and security in the future operating environment for public and private sector capabilities and capacities

    Imaging : making the invisible visible : proceedings of the symposium, 18 May 2000, Technische Universiteit Eindhoven

    Get PDF
    • …
    corecore