1 / 15

Devices III

Devices III. Surveillance Cameras. Surveillance of the Borders. 235 different video surveillance systems currently in operation along America's borders (6000 miles Canada + Mexico)

miron
Download Presentation

Devices III

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Devices III Surveillance Cameras CSE 8394

  2. Surveillance of the Borders • 235 different video surveillance systems currently in operation along America's borders (6000 miles Canada + Mexico) • A 26-camera surveillance system in Douglas, Arizona, and a 32-camera system in Blaine, Washington (Installed in 1990) • Installed in pairs (for day and night vision) • Can read the license plates and movements from 2 miles away • Remotely controlled from miles away through wireless • Problems • Won’t work above 68oF (95% of the time fails) • Very expensive (0.25 mil/camera) CSE 8394

  3. New Technologies • Near Infra Red (NIR) Camera • Simultaneous imaging in visible and near infra-red spectrum • Uses InGaAs-based focal plane array with extremely high spectral sensitivity • LIGHTGRABBER technology • Can capture images at light levels as low as 0.3 lux Demo CSE 8394

  4. Automated Video Security (AVS) • Computer automated image analysis • Automatically detect unusual events and trigger alarms • Reduces the volume of data presented to security personnel.  • Can monitor large areas and handle complex time-varying images CSE 8394

  5. AVS Components • May use existing CCTV surveillance infrastructure CSE 8394

  6. Challenges - Video Surveillance (Conventional) • Automatic detection and tracking of people • Implement simplistic approaches to incident detection • False triggers are generated by moving foliage, passing headlights, cloud shadows etc. • Useful only in highly constrained environments CSE 8394

  7. AVS Solutions • Maximum detection and tracking with minimal false triggers • Can detect stationary objects (packages) introduced into the scene • Sophisticated algorithms • Temporal processing • Model based analysis CSE 8394

  8. AVS Applications • Perimeter security • Interior security • Under vehicle surveillance • Safety • Warning on large animals, joggers • Data acquisition • Traffic data • Counting Bee project to detect explosives Demo page CSE 8394

  9. Integrated Surveillance Intelligence System (ISIS) • State-of-the-art technology to monitor borders from distance • Three components • Remote video surveillance (RVS) • Unattended ground sensors • ICAD software CSE 8394

  10. Underwater Surveillance • Distributed Surveillance Sensor Network (DSSN) • Use of small, inexpensive undersea vehicles (Autonomous Underwater Vehicles (AUVs) for surveillance applications • Based on MIT’s Autonomous Ocean Sampling Network (AOSN) • Sensors communicate acoustically CSE 8394

  11. DSSN (cont’d) CSE 8394

  12. DSSN (cont’d) CSE 8394

  13. DSSN (cont’d) CSE 8394

  14. Other Side of the Fence CSE 8394

  15. Who are Against Surveillance? • SCP (Surveillance Camera Players!) • Movement to destroy the myth that only suspects fear being watched • Proclaims that any amount of video monitoring will prevent terrorism • Points to the statistical fallacy of facial recognition in a crowd CSE 8394

More Related