Audio Analytics & Content Management (VCMS)

Slides:



Advertisements
Similar presentations
Axis Intelligent Video Intelligence where you need it.
Advertisements

C ONTENTS 1-Introduction What are smart homes 2-Why smart homes 3- Applications of smart homes 4- The main objective of the project 5- The main phases.
L ă cr ă mioara STOICU-TIVADAR, Vasile STOICU-TIVADAR, Dorin BERIAN “Politehnica” University Timisoara Department of Automation and Applied Informatics,
Axis Intelligent Video Strategy Focus on Embedded Video Analytics.
-MONITOR - Advanced environment & safety monitoring technology -Prof. Andrzej Czyzewski, Gdansk Univ. of Technology & team Multimedia Systems Department.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Roaming Security Robot Ruslan Masinjila Aida Militaru.
September 2003, 7 th EDG Conference, Heidelberg – Roberta Faggian, CERN/IT CERN – European Organization for Nuclear Research The GRACE Project GRid enabled.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
Complete Cloud Security Anyone, anywhere, any app, any device.
Surveillance and Security Systems Cyber Security Integration.
Safety, Security & Savings
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers By Kartik Patel.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
SmartCatch Systems Putting Intelligence into Surveillance
IOT – Firefighting Example
Chapter 19: Network Management
e-Learning Our view and experience
Software Application Overview
What’s new and What’s coming Guy Arazi: Director of Products
Security service management of tomorrow
BMC Integration Service Overview and Architecture
Utilize Internal Data via Mobile Business Apps
Intelligent Video Surveillance – The End of CCTV
PLM, Document and Workflow Management
Security systems for cities
IT323 - Software Engineering 2
Deployment Planning Services
Nikolaos Matskanis Common Information Space – Cluster of European Projects for Enhanced Interoperability The.
WELCOME Mobile Applications Testing
HDR, SDR, Cloud, Robots & Happy Viewer
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
Internal Affairs Tracking within Offender Management System
Call AVG Antivirus Support | Fix Your PC
Ontrack® Online™ VMware Portal
Storage & Digital Asset Management CIO Council Update
Wavestore Integrates… OptaSense Acoustic Fibre & PIDS
Wavestore Integrates…
Wavestore Integrates…
Wavestore Integrates…
Wavestore Integrates…
Wavestore Integrates… Raytec white and infrared LED lighting
Embedded & Cloud Platforms
Wavestore Integrates…
Dynamic Web Pages Jin Wu INF 385E Information Architecture
Wavestore Integrates…
Microsoft Virtual Academy
Contents subject to change.
Bringing Large Commercial Airport Capabilities to Your Local Community
atEvent + HubSpot Integtration Instructions
Future Requirements of WIS Centres
Academy Hub An eUnomia Factory Solution.
A 5-minute overview of ADAudit Plus
NVR 3 Corporate
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Business Intelligence
BACHELOR’S THESIS DEFENSE
HIPAA Compliance Services CTG HealthCare Solutions, Inc.
HarborGuard-Pro© Offshore Early Detection and Warning System
CAD DESK PRIMAVERA PRESENTATION.
Developing Vehicular Data Cloud Services in the IoT Environment
Employee Monitoring Solution
Causelink Enterprise RCA Software Introduction
03 | Basic Admin Capabilities
What's New in eCognition 9
Building a minimum viable Security Operations Centre
Presentation transcript:

Audio Analytics & Content Management (VCMS) 18/01/2019 P-REACT Audio Analytics & Content Management (VCMS)

A Use Case Event takes place on a region under P-REACT surveillance; the audio and/or video monitoring modules are triggered Metadata for each file are generated according to its attributes. The multimedia content is sent to the P-React cloud infrastructure for event validation while nearby cameras are activated Once validated, an alert is clearly displayed on the P-REACT GUI and also forwarded to VCMS as a verified event Authenticated users may access the system through: The GUI Initiating callbacks to API Time tracking metadata are also automatically generated allowing the system to erase content that should not be retained any longer.

18/01/2019 VCMS GUI

More Operational aspects User Privileges: supports different levels of authentication Basic: view content Intermediate: view, update, download content, access to users’ repository Tech Admin: manages all technical aspects, no access to actual content Administrator: manages both technical and data aspects Advanced Queries Proximity searches Integrated maps Calculates duration of incident Provides field-related information

Motivation: Audio Surveillance “Audio covers a 360° area day and night, at a low cost, and surpasses the limitation of the viewing of conventional surveillance cameras.” “The lack of audio in surveillance systems impacts significantly the ability of security personnel to act timely, if at all, in cases of emergency” The use of audio sensors in surveillance and monitoring applications has proved to be particularly useful for the detection of events like screaming and gunshots Impose prohibitively growing expenses as the number of deployed sensors escalates Solutions aim use in open and unrestricted environments, effective operation of the systems

Audio Analytics Critical for the seamless triggering of a surveillance system. Manages the detection abnormal events: Screaming , Gunshots, Glass Breaking Event detection takes place on the embedded system, upon occurrence of an event the results are transferred on the cloud for further analysis Aims to limit the number of false positive and therefore allowing the system to operate without unwanted traffic in the form of metadata objects Due to privacy reasons, the audio data is not retained Analytics module on the embedded system solves the classification problem with a number of cascaded binary classification tree On the cloud side a number of different analytics methods are available for analysis Offering more flexibility compared to the designed strategy on the ES Nov 2015

ES Classification Strategy Analytics module on the embedded system solves the classification problem with a number of cascaded binary classification trees Audio Analytics Human Screaming Non-Screaming Non-Human Emergency Sound Normal Sound Nov 2015

How does it look in practice? 18/01/2019 How does it look in practice?

Thank You! Nikolaos Koutras Liza Charalambous Managing Director (Administration CP) management@aditess.com Liza Charalambous Researcher & Software Engineer (Technical CP) lc@aditess.com