Background. FES Camera 3D-project NEDERLA NDS FORE NSISCHIN STITUUT NEDERLA NSISCHIN STITUUT NEDERLA NSISCHIN STITUUT
|
|
- Alicia Lester
- 8 years ago
- Views:
Transcription
1 FES Camera 3D-project Tracking people and cars just before, during and after a big incident using 3d modeling and CCTV. Background Gerda Edelman gerda@holmes.nl 2002: How many perpetrators are there? 3D reconstruction gives insight Nowadays Many cameras Large scale 3D models available Large scale reconstruction NFI got funding for a project aiming at the reconstruction of all movements of people and cars before, during and after a big incident. The goal of a large scale reconstruction is to find perpetrators, victims and witnesses. 1
2 FES-Camera-3D project Aim of the project The aim of the project is to get an organization for: Finding and downloading CCTV. Converting CCTV data into synchronized movie files. Analyzing CCTV, and movies from other sources, in context of space and time. Updating technology and 3d-models. Research on better methods for tracking people and cars, and detection of patterns in movements that require police attention. Sources The aim is to combine different sources of information: Security camera footage 3D models Phonecam images Cell phone data GPS data CCTV analysis: current procedure Watching all videos Writing a report Problems current procedure Lack of context (analyst needs to know the scene) No connection between different video streams Playing and replaying important parts is a lot of work Combining data to other evidence is difficult (phone cams, GSM-data etc) New procedure video analysis 2
3 Keileweg experiment CCTV data NFI got permission to use public CCTV data for experiments. Footage of 12 different security cameras in Rotterdam was obtained. Perpetrators GPS data 4 people 1 car 1,5 hours These people all carried a PDA for logging GPS data. Reconstructed movements can be compared to GPS data. New procedure video analysis Synchronization Complications: Multiplexed video streams Dynamic frame rates Different system clocks 3
4 New procedure video analysis 3D model of the area New procedure video analysis Virtual cameras in model Map with camera locations in 3D model New procedure video analysis Camera images in model 4
5 New procedure video analysis 3D reconstruction 3D reconstruction Testing 3D reconstruction Suspect car 3D reconstruction of car Can we reconstruct the movements of the suspect car? Do the results from tracking in CCTV match with the GPS data? Visualization of movements Comparison of reconstruction with GPS data Distance: 1350 m Distance: 1290 m 5
6 Advantages of new procedure 3D model creates: Overview (not necessary to know the scene) Visualization of movements Ability to look at the scene from different perspectives Ability to test testimony s Analysis is objective Analysis can be checked Combination with other data is possible Problems new procedure challenges Synchronization of videos is timeconsuming Viewing videos is time-consuming 3D reconstruction is laborintensive Solution: software development Software Under construction MovieSync Synchronization of video streams based on Object Character Recognition (OCR) EventViewer Synchronized video streams Shortcut to EventViewer_Keileweg 3D model SusFind (UvA) Shortcut to sdash Event viewer Detection of people Tracking people in multiple video streams Analysis of tracks Cell phone data Video report 6
7 Casework Testing new developments New procedure video analysis Synchronization New procedure video analysis Comparison of 3D models Laserscan from the ground Aerial stereo photography Laserscan from helicopter Both 7
8 New procedure video analysis Virtual cameras Needed: GPS coordinates of cameras Camera parameters (focal length) Field of view (camera match) New procedure video analysis Camera images in model New procedure video analysis Coincidence CCTV and Cell phone connection 8
9 Project partners National Police Services (KLPD) University of Amsterdam TNO (National Centre for expertise on technology) National Research program Multimedian Police organizations of Amsterdam, Rotterdam, the Hague and the airport Schiphol Questions? Comments? Brilliant ideas? 9
Piecing Digital Evidence Together. Service Information
Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM
More informationDealing with disasters with the Netherlands Forensic Institute. NFI Forensic response to disasters
Dealing with disasters with the Netherlands Forensic Institute NFI Forensic response Dealing with disasters NFI Forensic response The Netherlands Forensic Institute (NFI) is an agency of the Netherlands
More informationHow To Use Vizx2
VizX2 forensic video & image analysis find what you need to see Find what you need to see with VizX2 For the police and security services, digital photos and videos can contain vital leads. But how do
More informationFleet Manager Quick Guide (Non Maintenance Mode)
Fleet Manager Quick Guide (Non Maintenance Mode) Launch Fleet Manager: Open the Fleet Manager Application by: 1. Double clicking the icon located on the desktop - or 2. Via Start > Programs > MobileView
More informationป งบประมาณ พ.ศ.๒๕๕๘ ( ๑ ต ลาคม ๒๕๕๗ ถ ง 30 ก นยายน ๒๕๕๘ ) สร ปผลปร มาณงานพ สด การจ ดซ อ/จ าง/เช า ในรอบเด อนพฤศจ กายน ๒๕๕๗ ส าน กงานท ด นจ งหว ดเช
๑ ท ชม ๐๐๒๐.๑.๓/ ลว. ๗ พฤศจ กายน ๒๕๕๗ ๒๐,๐๐๐ ตกลงราคา เร อง รายงานขอจ ดซ อว สด น าม นเช อเพล งและหล อล น สาขาแม แตง รถยนต ย ห อโตโยต า ทะเบ ยน ฮก-๔๑๖๔ กทม จากบร ษ ทส ข มเซอร ว ส จ าก ด ๒ ท ชม ๐๐๒๐.๑.๓/
More informationSetting the Standard for Safe City Projects in the United States
Leading Safe Cities Setting the Standard for Safe City Projects in the United States Edge360 is a provider of Safe City solutions to State & Local governments, helping our clients ensure they have a secure,
More informationPolicing requirements for Closed Circuit Television
Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems
More informationFilmmaking. How to... use a camera, lighting and audio (sound)
Filmmaking How to... use a camera, lighting and audio (sound) 2 Lesson Objective For students to be able to use and fully understand the purpose of lighting, the importance of clear audio and the role
More informationVideo Analytics and Security
Video Analytics and Security Using video data to improve both safety and ROI March 2008 / White Paper Make the most of your energy Summary I. Executive Summary... 3 II. Captured on Video. Now What?...
More informationThe Usage of Electronic Security Equipment (Electronic Security Surveillance)
The Usage of Electronic Security Equipment (Electronic Security Surveillance) The usage of electronic security equipment (Electronic Security Surveillance) is important in the concept of physical security
More informationBLOODSTAIN PATTERN ANALYSIS & OTHER COURSE(S) ( FALL 2015).
( BLOODSTAIN PATTERN ANALYSIS & OTHER COURSE(S) ( FALL 2015). BASIC BLOODSTAIN ANALYSIS COURSE ( 40 HOURS -5 DAYS ) 21-25 September 2015. ADVANCED BLOODSTAIN ANALYSIS COURSE ( 40 HOURS -5 DAYS ) 9-13 November
More informationRemote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
More informationOur History. South Korea China. Hong Kong. Malaysia. Singapore. New Zealand. Australia
Our History In 1962, Wilson Parking first opened for business in Perth, Western Australia. 50 years on and Wilson Parking is the market leader operating throughout Australasia. Today Wilson Parking utilises
More informationMEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS ANIMATION PRODUCTION CERTIFICATE/DIPLOMA IN K/504/0480 LEVEL 3 UNIT 66
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA ANIMATION PRODUCTION K/504/0480 LEVEL 3 UNIT 66 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 ANIMATION PRODUCTION K/504/0480
More informationIntegrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
More informationCRIME SCENE INVESTIGATION
CRIME SCENE INVESTIGATION CHAPTER 2 Mr. Moss 1 CRIME SCENE INVESTIGATION Crime scenes tell a story Crime scene investigators must be careful and systematic Crime scene investigators must follow protocol
More informationKapitel 12. 3D Television Based on a Stereoscopic View Synthesis Approach
Kapitel 12 3D Television Based on a Stereoscopic View Synthesis Approach DIBR (Depth-Image-Based Rendering) approach 3D content generation DIBR from non-video-rate depth stream Autostereoscopic displays
More informationSafeguarding Data Storage for Video Surveillance and Security
Safeguarding Data Storage for Video Surveillance and Security 2005 Infortrend Corporation. All rights reserved. Table of Contents Overview... 3 Executive Summary... 3 Traditional Storage... 3 Advanced
More informationVEHICLE CCTV AND SAFETY SYSTEMS VEHICLE JOURNEY RECORDER. Mac Software Guide. www.smartwitness.com 1
VEHICLE CCTV AND SAFETY SYSTEMS VEHICLE JOURNEY RECORDER Mac Software Guide 1 MAC SOFTWARE Software Software Installation Installation (Windows) Mac SYSTEM REQUIREMENT Recommended Mac specifications for
More informationPolicy for Management of CCTV on Waste Operation Vehicles
Policy for Management of CCTV on Waste Operation Vehicles 1.0 POLICY 1.1 CCTV cameras are fitted to refuse vehicles for the purposes of Health and Safety of employees and members of the public, and for
More informationDrive greater litigation efficiency and better outcomes with the LexisNexis Case Analysis and Presentation Suite
Drive greater litigation efficiency and better outcomes with the LexisNexis Case Analysis and Presentation Suite From intake through discovery and trial presentation, each case brings the complex challenge
More informationP R E P R O D U C T I O N C H E C K L I S T
P R E P R O D U C T I O N C H E C K L I S T 1. Make a Production Schedule: a. Block out dates for all your shoots; Aim to leave at least 3 weeks for careful editing. If you are editing at the last minute,
More information5.5 VI Web Client User Guide
5.5 VI Web Client User Guide 5.5 VI Web Client The web client is a free thin client that allows you to access live and recorded video from any web browser. There is an optional Active X control that can
More informationCOVERAGE You re going to have to edit your film later. How do you make sure you get enough footage for that to work?
MAKE IT YOUR STORY CINEMATOGRAPHY Film is a visual medium - which just means it s a story you consume through your eyeballs. So, when you ve got your story figured out, you need to think about the best
More informationLesson 3: Behind the Scenes with Production
Lesson 3: Behind the Scenes with Production Overview: Being in production is the second phase of the production process and involves everything that happens from the first shot to the final wrap. In this
More informationIP Video Surveillance
IP Video Surveillance Solutions and Services Wireless IP PDA Administration Wireless Access Point Viewer Remote Control IP Video Server IP Network Alarm Management Video Recording Analog Video Server Access
More informationSURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
More informationCCTV Surveillance: Business Security & Video Best Practices
CCTV Surveillance: Business Security & Video Best Practices T A B L E O F C O N T E N T S Introduction P A G E 3 Why CCTV? P A G E 4 Is CCTV Right for You? P A G E 7 Video Security Best Practices? P A
More informationBuild Stronger Cases with Mobile Device Link Analysis
White Paper Build Stronger Cases with Mobile Device Link Analysis How data from mobile devices reveals the patterns of life that can make for stronger proactive and reactive investigations - on the street
More information1/26/15. Chapter 2 Crime Scene
Chapter 2 Crime Scene Chapter 2 Crime Scene By the end of this chapter you will be able to: By the end of this chapter you will be able to: Investigation and Evidence Collection 1 Investigation and Evidence
More informationSmarter Security Solutions
www.smartwitness.com Smarter Security Solutions 2011 Range INTRODUCING THE WORLD S SMALLEST WIFI IP CAMERA! Laptop/PC Wireless CCTV System Digital Recording Wireless CCTV System WiFi IP Cameras Spy Camera
More informationA PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir
More informationHow To Get Listed Quicker By The Search Engines
Mark Besh VISUAL INTRODUCTION Using Video To Get Listed Quicker on Search Engines There s a lot of talk about Search Engine Optimization (SEO) these days. Even though all this does need to be done to get
More informationCCTV CODE OF PRACTICE
CCTV CODE OF PRACTICE Policy area: Operation of CCTV on University Premises Definitions CCTV means Closed Circuit Television. Control Room(s) means those Control Rooms manned by Security staff at the City,
More informationForensics in Nuclear Security. by the Netherlands Forensic Institute
Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than
More informationPANOPTO: THE RECORDER (WINDOWS)
The Panopto Recorder is a desktop application that is installed on the classroom computers and allows instructors to capture and upload a lecture. If the classroom you are using has been set up for lecture
More informationUsing Google Drive. Using Google Drive. Information Security Requirements
Using Google Drive Information Security Requirements Google Drive is a cloud storage service available to CWRU students, faculty and staff that allows you to store, share, and synchronize files using multiple
More informationProviding leading edge digital forensic services with proven experience and expertise
Providing leading edge digital forensic services with proven experience and expertise Today s prevalence of electronic data demands a reliable proven solution. At CY4OR, we provide a leading edge service
More informationCity Surveillance and the Cloud
Keep Watch on Your Projects Through the Cloud, 24/7/365 Unlock the all the potential tools of a modern enterprise video surveillance system with a costeffective and elegantly simple cloud video surveillance
More informationPROGRAM OUTLINE 2015 - PAGE 1
PROGRAM OUTLINE 2015 - PAGE 1 MODULE 1 (8 WEEKS) INTRO TO 3D MODELING WITH MAYA An introduction on how to begin building and manipulating objects in 3D Space. DRAWING BASICS Here we will learn drawing
More informationVideo Analytics and Security
Video Analytics and Security Video Analytics and Security Using video data to improve both safety and ROI TABLE OF CONTENTS I. Executive Summary... 1 II. Captured on Video. Now What?... 2 III. Start Where
More informationCreating an Interactive Digital Animation Level: 3 Sub-level: Unit 312 Credit value: 8 Guided learning hours: 65
Unit Title: Creating an Interactive Digital Animation Level: 3 Sub-level: Unit 312 Credit value: 8 Guided learning hours: 65 Unit purpose and aim This unit helps learners to familiarise themselves with
More informationSOLUTION. Forensic Video Analysis
SOLUTION Forensic Video Analysis reveal the concealed IN A WORLD OF SURVEILLANCE CAMERAS, catching a criminal suspect on video isn t much of a problem. For law enforcement and homeland security, the real
More informationTeacher Guide. English Examining Film. Teacher Guide. Series overview. Curriculum links. Educational approach
3. Series overview Learners enjoy watching films, but are often intimidated by having to analyse them as a genre of literature. This series aims to introduce learners to films as texts. We cover basic
More informationCCTV User Group GUIDE FOR SMALL USERS. PRIVATE and COMMERCIAL
CCTV User Group GUIDE FOR SMALL USERS PRIVATE and COMMERCIAL 1 CONTENTS Section Number Description Page number 1. Introduction 3 2. Human Rights Act and its implications for you 3 3. Data Protection and
More informationCRIME SCENE PROCEDURES II.
CRIME SCENE PROCEDURES II. Contact at the Scene... 2 Preliminary Survey or Crime Scene Walk-Through... 3 Scene Search for Trace Evidence... 3 Scene Search for Biological Evidence... 4 Crime Scene Photography...
More informationHow to Implement a Unified Security Management Platform:
How to Implement a Unified Security Management Platform: A Case Study From the University of Kentucky Nathan Brown University of Kentucky Police Major Tom Sorrell, RCDD BCCLT, Inc. Agenda Introductions
More informationVisual and mobile Smart Data
Copyright 2013 Augmented Vision - DFKI 06.12.2013 1 Visual and mobile Smart Data Didier Stricker didier.stricker@dfki.de Department Augmented Vision @ DFKI Head: Didier Stricker Founded in July 2008 30
More informationMiddle School Project: Final Cut Pro This Is Our School
Middle School Project: Final Cut Pro This Is Our School The Unit of Practice Invitation How can students show their community the contributions that their school makes to it? During this project, students
More informationMETHODS 2: PHOTOGRAPHS, VIDEO, AUDIO. INF5220 September 12 th, 2012 Sisse Finken, Design group
METHODS 2: PHOTOGRAPHS, VIDEO, AUDIO INF5220 September 12 th, 2012 Sisse Finken, Design group FEEDBACK OBSERVATION I Drawing of the site (memory; has anything changed since last Lme?; is somebody/something
More informationUnit 3 Crime Scene Processing & Analysis Processing vs. Analysis Analysis depends on Detailed observations Proper procedures Logical connections Results of lab tests Scene patterns Integrating all data
More information196 Practical Crime Scene Investigations for Hot Zones
The Documentation 9 Documentation is an essential part of any crime scene investigation. Everything that is associated with the crime scene investigation must be documented in writing and becomes part
More informationPOWER NETWORK. 800-02577-iPcams 2/10 Rev. A
POWER NETWORK Total Connect Online Help Guide for: ip Cameras ipcam-wi Camera ipcam-pt Pan and Tilt Camera 800-02577-iPcams 2/10 Rev. A POWER NETWORK ip Cameras Online Help Guide This guide covers the
More informationCrime Scene Virtual Tour. Just on the Spot
Crime Scene Virtual Tour Just on the Spot - 1 - Introducing Crime Scene Virtual Tour Virtual Tour Solution for Crime Scene Investigation Crime Scene Virtual Tour (CSVT) provides a distinctive virtual reality
More informationCCTV INSPECTION OF SEWER LINES. A. Section 02730 Sanitary Gravity Sewer Lines. B. Section 02731 Sanitary Gravity Sewer Line Testing
CCTV INSPECTION OF SEWER LINES PART 1 GENERAL 1.1 SECTION INCLUDES A. CCTV Inspections 1.2 RELATED SECTIONS A. Section 02730 Sanitary Gravity Sewer Lines B. Section 02731 Sanitary Gravity Sewer Line Testing
More informationViewing a Crime Drama
LESSON PLAN Level: Grades 9 11 About the Author: Adapted, with permission, from a unit developed by Mark Zamparo, an Ottawa-based media educator Viewing a Crime Drama Overview In this lesson students explore
More informationDistrict Court Building (DCB) Audiovisual Systems Briefing Paper for Practitioners
District Court Building (DCB) Audiovisual Systems Briefing Paper for Practitioners DCB Audiovisual Briefing Paper Final Draft.doc Page 1 of 6 Table of Contents 1 Document Version History... 2 2 Definitions...
More informationTHE USE OF CCTV IN CRIMINAL INVESTIGATIONS
Practice Advice on THE USE OF CCTV IN CRIMINAL INVESTIGATIONS This has been published as an interim product due to the development of Authorised Professional Practice (APP) and may be published in an alternative
More informationBONEMA TECHNOLOGIES PRODUCT FEATURES. The following training provides information on the Bonema product features.
BONEMA TECHNOLOGIES PRODUCT FEATURES The following training provides information on the Bonema product features. Real-time tracking Vehicle tracking relies both on the Global Positioning satellites (GPS)
More informationCSC590: Selected Topics BIG DATA & DATA MINING. Lecture 2 Feb 12, 2014 Dr. Esam A. Alwagait
CSC590: Selected Topics BIG DATA & DATA MINING Lecture 2 Feb 12, 2014 Dr. Esam A. Alwagait Agenda Introduction What is Big Data Why Big Data? Characteristics of Big Data Applications of Big Data Problems
More informationVisual Rhetoric/Visual Literacy: Writing About Film
h t t p : / / u w p. a a s. d u k e. e d u / w s t u d i o Visual Rhetoric/Visual Literacy: Writing About Film This handout discusses ways to approach film as a visual medium. It offers suggestions for
More informationIntroduction to 3D Imaging
Chapter 5 Introduction to 3D Imaging 5.1 3D Basics We all remember pairs of cardboard glasses with blue and red plastic lenses used to watch a horror movie. This is what most people still think of when
More informationVideo Conferencing - Watching
Video Conferencing - Watching electa Live V4 supports many-to-many video broadcasting. Each virtual room is preset with a certain number of video inputs, which allows several attendees to share their web
More informationApplications of GIS in Law Enforcement. John Beck Global Law Enforcement Manager Esri 12/10/2014
Applications of GIS in Law Enforcement John Beck Global Law Enforcement Manager Esri 12/10/2014 My Background - Global Law Enforcement Manager - Joined Esri in Sep. 2013 - Undergraduate degree - Geography
More informationTeaching New Sellers about ebay Selling Limits and Payment Holds. Griff Dean of ebay Education
Teaching New Sellers about ebay Selling Limits and Payment Holds Griff Dean of ebay Education Two Topics for New Sellers Selling Limits Account limits Category limits Item limits ebay Payment Holds Selling
More informationGeneral background on mobile devices and solutions including context awareness
General background on mobile devices and solutions including context awareness Kjell Are Refsvik 20 January 16, 2012 IMT2551 Mobile Systems Fundamentals CC: BY-NC-SA http://www.ansatt.hig.no/kjellr/imt2551
More informationMarketing Services Manual
Marketing Services Manual Table of Contents 2 3 Departmental Structure 4 Online Tools 5 Office Basics 6 Printed Publications 7 Electronic Publications 8 Printed Collateral/Graphic Design 9 Media Relations
More informationKnowledge for a successful forensic chain provided by The Netherlands Forensic Institute. NFI Academy
Knowledge for a successful forensic chain provided by The Netherlands Forensic Institute NFI Academy Welcome to the NFI Academy Key to the expertise of The Netherlands Forensic Institute In the context
More informationT-REDSPEED White paper
T-REDSPEED White paper Index Index...2 Introduction...3 Specifications...4 Innovation...6 Technology added values...7 Introduction T-REDSPEED is an international patent pending technology for traffic violation
More informationTravelers between Finland and Russia: Translation needs IMU-project
Travelers between Finland and Russia: Translation needs Tutkimus- ja Analysointikeskus TAK Oy :: GSM +358 45 137 5099 :: info@tak.fi :: www.tak.fi TABLE OF CONTENTS Summary... 1 Introduction... 2 Structure
More informationReconstruction of Construction Accidents
Reconstruction of Construction Accidents New Tools for Litigation, Vol.3 Newsletter on using 3-D Computer Simulations and Analytical techniques to accurately reconstruct and illustrate an event. Challenge
More informationEnriching the transport model of. the Rotterdam. region by cell phone data. MT-ITS Budapest, June 3 2015. Klaas Friso
Enriching the transport model of the Rotterdam region by cell phone data MT-ITS Budapest, June 3 2015 Klaas Friso New data technology. New capabilities Using traditional methods (like Household Travel
More informationEXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS
EXAMINATION OUTLINE FOR PRIVATE INVESTIGATORS 2014 I. Ethics (18%) This area assesses the candidate s ability to comply with ethical standards of private investigators regarding privacy rights, confidentiality,
More informationVideo Surveillance Trends Report. An inside look at how IT Executives and System Integrators are managing video surveillance data
Video Surveillance Trends Report An inside look at how IT Executives and System Integrators are managing video surveillance data Video Surveillance Trends: Find out how IT Executives and System Integrators
More informationVIDEO MONITORING & ALARM VERIFICATION NASKAM SECURITY SERVICES PTY LTD
VIDEO MONITORING & ALARM VERIFICATION VIDEO MONITORING What is Video Monitoring Video or CCTV Monitoring as a service has been around for many years particularly in the Mining and Access Control Industries
More informationWhite Paper. Sensor Technologies for the Protection of remote assets
White Paper Sensor Technologies for the Protection of remote assets In today s complex geopolitical environment, Government Agencies and Public Bodies have a responsibility to provide protection and resilience
More informationIntegrated Security System
Integrated Security System Door Access Control System Elevator Access Control System Elevator Vandalism Protection System Car Park Control System Time Attendance System A Simple Building Integration System
More informationData Acquisition & Field Test Data Analysis
Data Acquisition & Field Test Data Analysis Dave LeBlanc IVBSS 2008 Public Meeting April 10-11, 2008 Eagle Crest Resort & Conference Center Ypsilanti, MI Topics Overview purpose of data collection Data
More informationSTATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION
STATE OF NEVADA Department of Administration Division of Human Resource Management CLASS SPECIFICATION TITLE GRADE EEO-4 CODE SUPERVISORY CRIMINAL INVESTIGATOR II 43* D 13.241 SUPERVISORY CRIMINAL INVESTIGATOR
More informationLONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO
LONDON DOWNTOWN CLOSED CIRCUIT TELEVISION (CCTV) PROGRAM CODE OF PRACTICE CITY OF LONDON, ONTARIO Contents Page Number 1. Introduction Page 2 2. Defining the Responsible Persons Page 2 3. Purpose and Principles
More informationMOTOROLA OPTIMIZED VIDEO SECURITY
MOTOROLA OPTIMIZED VIDEO SECURITY VIDEO SURVEILLANCE SOLUTIONS Deploying video is an effective way to bring cost-effective security to a neighborhood or a city. A well-executed video solution can help
More informationA Web Conference System Architecture for the Broadband Era. Yoichi Kato
International Telecommunication Union International Multimedia Telecommunications Consortium A Web Conference System Architecture for the Broadband Era Yoichi Kato General Manager, Web Conference Systems
More informationWho is at the Scene. The CSI unit documents the crime scene in detail and collects any physical evidence.
At the Crime Scene Who is at the Scene Police officers are typically the first to arrive at a crime scene. They arrest the perpetrator is he's still there and call for an ambulance if necessary. They are
More informationThe functions and costs of law enforcement aviation units. Lynn Langton Statistician Bureau of Justice Statistics
The functions and costs of law enforcement aviation units Lynn Langton Statistician Bureau of Justice Statistics Why study law enforcement aviation units? Advantages of airborne policing Able to cover
More informationAbout Your Presenter. Digital Forensics For Attorneys. Overview of Digital Forensics
Larry E. Daniel, EnCE, DFCP, BCE Digital Forensic Examiner Digital Forensics for Attorneys An Overview of Digital Forensics About Your Presenter EnCase Certified Examiner (EnCE) Digital Forensics Certified
More informationFactors to Consider in Digital Photography - Formats and Tools
METHODS 2 FILMIC APPROACHES: PHOTO, VIDEO INF5220 February 9 th, 2016 Guri Verne, Design group (based on Sisse Finken s lecture notes) FEEDBACK OBSERVATION I Good work doing an effort, reflecting! Well
More information5) Familiarity of witness with exhibit for identification
Medical Records: If the custodian of records delivers them by subpoena, pursuant to N.C. Gen. Stat. 1A- 1, Rule 45(c)(2), for the sole purpose of delivering the medial records, the custodian need not appear
More informationTime, Position & Visibility in Disputed Auto Versus Pedestrian Accident Cases
Time, Position & Visibility in Disputed Auto Versus Pedestrian Accident Cases By Injury Attorney Walter A. Haynes IV, Esq. Case study In San Francisco how often have we heard some incarnation of the following:
More informationChapter 1. Animation. 1.1 Computer animation
Chapter 1 Animation "Animation can explain whatever the mind of man can conceive. This facility makes it the most versatile and explicit means of communication yet devised for quick mass appreciation."
More informationCISCO IP PHONE 7960 MANUAL ESPANOL
CISCO IP PHONE 7960 MANUAL ESPANOL So may advice to users is read before selecting and when you will find a free trail version to test out before you pay then you will have superior idea you might need
More informationFuture Laboratories et eksempel på Eksperimentelle projekt-processer
Innovationsprocesser Uge U6: Future Laboratories et eksempel på Eksperimentelle projekt-processer Büscher, M., Kristensen, M. and Mogensen, P.H. (2008): Making the future palpable 1 Bio-monitors Display,
More informationTraceable Physical Security Systems for a Safe and Secure Society
Hitachi Review Vol. 63 (2014), No. 5 254 Featured Articles Traceable Physical Security Systems for a Safe and Secure Society Tatsuhiko Kagehiro, Ph.D. Kenichi Yoneji Harumi Kiyomizu Yuki Watanabe, Dr.
More information2. Neither the name of SWGIT, nor the names of its contributors, may be used to endorse or promote products derived from its documents.
Disclaimer: As a condition to the use of this document and the information contained herein, the SWGIT requests notification by e-mail before or contemporaneously to the introduction of this document,
More informationNew Technology Capabilities
New Technology Capabilities Software/Applications 1. Biometric ID capability 2. Standardized secure, connectivity, and storage of data (bio, roles, etc) 3. Rules- based expert engine a. Automated dispatch
More informationReview of Recording of Council Meetings and Workshops
1348 ITEM NO.: 20.4 ON AGENDA TO: Council on 26 August 2014 FROM: SUBJECT: Director Corporate Services Review of Recording of Council Meetings and Workshops 1. PURPOSE OF REPORT 1.1 Review of recording
More informationMAGDALENA PILKO PORTFOLIO 2014
MAGDALENA PILKO PORTFOLIO 2014 MAGDALENA PILKO is an Austrian photographer, who completed her studies of photography at the KABK in The Hague (NL) in 2008. In her projects, she often emphasizes the ephemeral
More informationCCTV - Video Analytics for Traffic Management
CCTV - Video Analytics for Traffic Management Index Purpose Description Relevance for Large Scale Events Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 12 Purpose
More informationInvite Your Audience and Communicate For a Result
Invite Your Audience and Communicate For a Result Beyond Lecture Capturing and Presentation Recording System istudio is an easy-to-use, real-time lecture capture and content production system that lets
More informationNetVu. App for Android TM. Installation & Usage Guide
NetVu App for Android TM Installation & Usage Guide Contents Installation...3 Main Menu...4 Video Replay...5 View a different camera...6 Viewing Time and Date...7 Video Replay Controls...8 Events...9 Go
More informationIE Operating Instruction Manual
IE Operating Instruction Manual June. 5. 2013 1 contents 1. Brief introduction of IE browsing operation... 3 1.1. Installation of plug-ins and login... 3 2. IE menu introduction... 4 2.1 Home... 4 2.2
More information