Presented by Leland Holmquest Privacy Sensitive Surveillance for Assisted Living – A Smart Camera Approach Sven Fleck & Wolfgang Straβer CS895: Software.

Slides:



Advertisements
Similar presentations
© 2007 Open Grid Forum Grids in the IT Data Center OGF 21 - Seattle Nick Werstiuk October 16, 2007.
Advertisements

European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies Scalability.
This Area Will Not Be Seen Alliance Access Alliance Access.
1 Jin Li Microsoft Research. Outline The Upcoming Video Tidal Wave Internet Infrastructure: Data Center/CDN/P2P P2P in Microsoft Locality aware P2P Conclusions.
XProtect ® Professional Efficient solutions for mid-sized installations.
OneM2M Technical Requirements - Driven by EU BUTLER and IEEE PAC - Group Name: WG1 (REQ) Source: Friedbert Berens, FBConsulting Sarl,
XProtect® Expert 2013 Product presentation
Automatic software deployment using user-level virtualization for cloud-computing Future Generation Computer System (2013) Youhui Zhang, Yanhua Li, Weimin.
MS Exchange multi hosting web portal Sebastien Quinternet – Project supervised by Michael Johnson 1.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Web-based Distributed Flexible Manufacturing System (FMS) Monitoring and Control Student: Wei Liu Instructor: Dr. Chang Apr. 23, 2003.
Collaborative Context Recognition for Mobile Devices Software for Context-Aware Multi-User Systems Professor Joao Sousa David Gonzalez.
P2P Network for Very Large Virtual Environment Proceedings of the ACM symposium on virtual reality software and technology VRST '06.
Software Engineering for Safety : A Roadmap Presentation by: Manu D Vij CS 599 Software Engineering for Embedded Systems.
Introduction to the Application Layer Computer Networks Computer Networks Spring 2012 Spring 2012.
Chapter 3 : Distributed Data Processing
Analysis of Terminal Server Architectures for Thin Clients in a High Assurance Network Steven R. Balmer & Cynthia E. Irvine Department of Computer Science.
Software engineering on semantic web and cloud computing platform Xiaolong Cui Computer Science.
Milestone Systems Architecture and Engineering (A&E) Program
A Survey of Mobile Phone Sensing Michael Ruffing CS 495.
AMBIENT INTELLIGENCE Presented by GOKUL SURESH. INTRODUCTION  Evolution of Ambient Intelligence.  Science with a fictional view.  Enriching environment.
Automatic software deployment using user-level virtualization for cloud-computing Future Generation Computer System (2013) Youhui Zhang, Yanhua Li, Weimin.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Naixue GSU Slide 1 ICVCI’09 Oct. 22, 2009 A Multi-Cloud Computing Scheme for Sharing Computing Resources to Satisfy Local Cloud User Requirements.
Greg Andolshek Alex Koch Michael McCormick Team Lasso.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
An Introduction Table Of Context Sensor Network PreviewRouting in Sensor NetworksMobility in Sensor Networks Structure and characteristics of nodes and.
Cluster Reliability Project ISIS Vanderbilt University.
1 Dhiman Chattopadhyay Ranjan Dasgupta Rohan Banerjee Ankur Chakraborty December 2, 2012 Event Driven Video Surveillance System using City Cloud A solution.
Object Based Processing for Privacy Protected Surveillance Karl Martin Kostas N. Plataniotis University of Toronto Dept. of Electrical and Computer Engineering.
…optimise your IT investments Successful approaches for Test Data Management Philip Howard Research Director – Bloor Research.
By: Mahmood Arabi.  DNA collection is when the police or any other organization create a database with profiles on people (mostly criminals). Profiles.
MOVIE TERMINAL APPLICATION Michael Disney EKU, Dept. of Technology, CEN/CET.
Pervasive Health Monitoring Krishna Venkatasubramanian IMPACT LAB Arizona State University.
Consolidating M2M Data Streams in Flexible Scalable Edge Nodes The Multi Service Gateway Concept in M2M / Internet of Things (IoT) Solutions Robert Andres.
Smart Surveillance Technology Javier OcasioPerezWilliam Sanchez Rosa Mariel Martinez MarreroAbraham Diaz Santiago.
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
A framework for scalable cloud video recorder system in surveillance environment th International Conference on Ubiquitous Intelligence and Computing.
CLOUD COMPUTING Kevin Levy, Gunster David Zimmerman, IBM Marcos Galigarcía, Santander Private Banking.
Smart Surveillance Technology Javier OcasioWilliam Sanchez Mariel MartinezAbraham Diaz.
Chapter 8 – Cloud Computing
IoT and Hybrid Cloud. Page 2 IoT Revolution 50 billion things connected by 2020 IPv6 allows for 100 addresses for every atom on Earth! 44ZB of Data worldwide.
Some Hot Topics worth Discussing (or not) Yaxuan Qi NSLab Seminar, Mar 4, 2010.
© SERG Reverse Engineering (REportal) REportal: Reverse Engineering Portal (reportal.cs.drexel.edu)
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
There are two common types of VPS  Managed VPS  unmanaged VPS.  In the managed VPS vender is responsible for all over the maintenance of server means.
Wireless M2M System Architecture for Data Acquisition and Control Elmira Dichkova Bachvarova Central Laboratory of Mechatronics and Instrumentation Bulgarian.
Mohd Rozaini Bin Abd Rahim, Norsheila Fisal, Rozeha A
By:- Punith Sharma Ashwath D S Adithya S Srimatha B V
Cognitive Wi-Fi.
Presented by Edith Ngai MPhil Term 3 Presentation
Sensors Journal, IEEE, Issue Date: May 2013,
Cloud Security– an overview Keke Chen
Architecture for security monitoring in IoT environments
Dedicated Servers vs Cloud Hosting
The Control Room… …is the Central Location of Visualized Information
Should we have specialisations at all?
Power Control for Data Center
Juniper and IBM Delivering Value Together
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
Evaluating Pre-Processing Pipelines for Thermal-Visual Smart Camera
Your Next LIMS: SaaS or On-Premise? Presented by:
A Must to Know - Testing IoT
Smart Onboarding An EmpFinesse Work Partnership Solution.
Artificial Intelligence Changes the Security Landscape
eCareTaker: Context Aware Web Services
Relentless Distribution
Session I Cloud Introduction Session I
Copyright 2005 Prentice- Hall, Inc.
Presentation transcript:

Presented by Leland Holmquest Privacy Sensitive Surveillance for Assisted Living – A Smart Camera Approach Sven Fleck & Wolfgang Straβer CS895: Software for Context- aware Multi-user Systems Professor João Pedro Sousa 26 OCT 11

2 State of the Art: IRAQI Intelligence

Outline  Introduction  Classification of AAL & Video Surveillance Systems  Related Work  Problem Statements  Proposed Smart System  Architecture  Visualization Decoupled  Conclusion 3

Introduction Camera proliferation – Current architectures not scalable – Inefficient – Difficult to secure Lack of privacy 4

Classification Manual vs. Automated Centralized vs. Distributed 5

Related Work Automated Surveillance Systems – All centralized server – Asserts this architecture inherently expensive (bandwidth) and prone to misuse Privacy Respecting Surveillance – Masking Assisted Living (manual vs. automated) Smart Cameras 6

Problem Statements 1)Privacy – current systems do not address 2)Overstraining data – too much data, too difficult to monitor 3)Limited flexibility & expandability – bandwidth issues, central processing issues 7

Propose Smart Camera Solution Scene acquisition Scene analysis Virtual world Integrated visualization 8

System Architecture 9

Visualization Decoupled 3D Visualization Node – XGRT Google Earth Web App 10

Conclusion Privacy not currently addressed Distributed and automated smart camera Cameras use Support Vector Machines Currently in the field and effective 11 1.Privacy 2.Overstraining 3.Flexible and expandability Problem statements revisited

Questions? 12