SlideShare a Scribd company logo
1 of 8
IT3180 EmergingTrends andTechnologies
Assignment 4: Innovation project
Amped Five Software
Done By: Ramesh 115832B
Lam Zhen Le 116155U
Chan Ru Ai 115517Q
Daphne Ang 111512F
Background
EXAMPLE TEXT
Go ahead and replace
it with your own text.
Image
Processing
EXAMPLE TEXT
Go ahead and
replace it with
your own text.
Investigative
Forensics
EXAMPLE TEXT
Go ahead and
replace it with
your own text.
Security
Applications
Unique Selling Point
Report Fast
70 Different
Filters Multiple
Languages
Complete
Package
High Performance
Automatic Report
generation
(Sequence of all
operations applied)
Tools to target any
type of data from
cctv to latent
figerprint
Single Complete set
of tools for forensic
profesional
Security
Built-in security and fil
authentication to
detect tampering or
unauthorised changes
Who Uses It?
Why Use It?
Law Enforcement & Video
Survelliance
Improve Output to better see face,
licence Plate or anything useful for
investigation
Court Experts
Improve video or images to use as
evidence.
Automatically documents the used filters
Research
Used in several universities and research
institutes as a simple and fast way to
enhance images and video
Military & Inteligence
To stabilize full motion video survelliance
in hotile territories or enhance
surveliance images through fog and
sandstorms
Biometrics
Amped Five can improve fingetprint
image quality and measure height of
subjects from images
Strength Weakness Opportunity Threat
Tons of features and huge capabilities Very expensive and one needs to
undergo traning to use.
Vast opportunities available for
professionals from many different
fields
Threat only to criminals.
SWOT analysis
Camwhore
Extra
Skillset
CCTV at
home
How does it affect our work & lifestyle?
DEMO

More Related Content

What's hot

Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensicOnline
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniDr Raghu Khimani
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 
Informatica forense
Informatica forenseInformatica forense
Informatica forenseFredy Ricse
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensicsprimeteacher32
 
IP CCTV Introduction
IP CCTV IntroductionIP CCTV Introduction
IP CCTV Introductionmartynk
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkitMilap Oza
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV CamerasSachin Sharma
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 

What's hot (20)

Introduction to computer forensic
Introduction to computer forensicIntroduction to computer forensic
Introduction to computer forensic
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Current Forensic Tools
Current Forensic Tools Current Forensic Tools
Current Forensic Tools
 
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu KhimaniInvestigative Tools and Equipments for Cyber Crime by Raghu Khimani
Investigative Tools and Equipments for Cyber Crime by Raghu Khimani
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Informatica forense
Informatica forenseInformatica forense
Informatica forense
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensics
 
IP CCTV Introduction
IP CCTV IntroductionIP CCTV Introduction
IP CCTV Introduction
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 
Kali linux
Kali linuxKali linux
Kali linux
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 

Viewers also liked

Calicut university prospectus 2016 17 educationiconnect.com 7862004786
Calicut university prospectus 2016   17 educationiconnect.com 7862004786Calicut university prospectus 2016   17 educationiconnect.com 7862004786
Calicut university prospectus 2016 17 educationiconnect.com 786200478600007123
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economyAndry Alamsyah
 
Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 7862004786Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 786200478600007123
 
Vidromecanica Catalogue
Vidromecanica Catalogue Vidromecanica Catalogue
Vidromecanica Catalogue Vidromecanica
 
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. СедиментацияДисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. СедиментацияПетрова Елена Александровна
 
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...Indian dental academy
 
Endovenous treatment for varicose veins – the first choice (laser, radiofre...
Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...
Endovenous treatment for varicose veins – the first choice (laser, radiofre...Michał Molski
 
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows KernelDeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows KernelPeter Hlavaty
 
Ch 27 28 jeopardy
Ch 27 28 jeopardyCh 27 28 jeopardy
Ch 27 28 jeopardykevperrino
 
Reproduction jeopardy
Reproduction jeopardyReproduction jeopardy
Reproduction jeopardykevperrino
 
Ch 06_lecture_presentation
 Ch 06_lecture_presentation Ch 06_lecture_presentation
Ch 06_lecture_presentationkevperrino
 
Routers Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas ripRouters Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas ripJosu Orbe
 
Chapter 4 skin power point
Chapter 4 skin power pointChapter 4 skin power point
Chapter 4 skin power pointwatsonma12
 
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116Imelda Wijaya
 

Viewers also liked (17)

Calicut university prospectus 2016 17 educationiconnect.com 7862004786
Calicut university prospectus 2016   17 educationiconnect.com 7862004786Calicut university prospectus 2016   17 educationiconnect.com 7862004786
Calicut university prospectus 2016 17 educationiconnect.com 7862004786
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economy
 
ITS Business Card
ITS Business CardITS Business Card
ITS Business Card
 
Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 7862004786Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 7862004786
 
Portfolio2013lr
Portfolio2013lrPortfolio2013lr
Portfolio2013lr
 
Vidromecanica Catalogue
Vidromecanica Catalogue Vidromecanica Catalogue
Vidromecanica Catalogue
 
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. СедиментацияДисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
 
IGTEC Presentation1
IGTEC Presentation1IGTEC Presentation1
IGTEC Presentation1
 
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
 
Endovenous treatment for varicose veins – the first choice (laser, radiofre...
Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...
Endovenous treatment for varicose veins – the first choice (laser, radiofre...
 
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows KernelDeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
 
Ch 27 28 jeopardy
Ch 27 28 jeopardyCh 27 28 jeopardy
Ch 27 28 jeopardy
 
Reproduction jeopardy
Reproduction jeopardyReproduction jeopardy
Reproduction jeopardy
 
Ch 06_lecture_presentation
 Ch 06_lecture_presentation Ch 06_lecture_presentation
Ch 06_lecture_presentation
 
Routers Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas ripRouters Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas rip
 
Chapter 4 skin power point
Chapter 4 skin power pointChapter 4 skin power point
Chapter 4 skin power point
 
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
 

Similar to Ett amped five

Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...Codemotion
 
How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com Pentest-Tools.com
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepguestad6e9e
 
TET Presentation
TET PresentationTET Presentation
TET PresentationVideoguy
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Keith Harris
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor ToolElite ISI
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet EnterprisePuppet
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...MITRE ATT&CK
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT   TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT Mia Chang
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...NoNameCon
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxVrindapareek5
 
2016 Everfocus company profile
2016 Everfocus company profile2016 Everfocus company profile
2016 Everfocus company profileIvan Cheng
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Mauricio Velazco
 

Similar to Ett amped five (20)

Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
 
How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleep
 
Butler
ButlerButler
Butler
 
TET Presentation
TET PresentationTET Presentation
TET Presentation
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor Tool
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet Enterprise
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT   TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
 
Web application Testing
Web application TestingWeb application Testing
Web application Testing
 
Securitarian
SecuritarianSecuritarian
Securitarian
 
tem7
tem7tem7
tem7
 
Lam Tuan
Lam TuanLam Tuan
Lam Tuan
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptx
 
2016 Everfocus company profile
2016 Everfocus company profile2016 Everfocus company profile
2016 Everfocus company profile
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
 

More from Ramesh Maniam

Case study presentation
Case study presentationCase study presentation
Case study presentationRamesh Maniam
 
Draft proposal presentation
Draft proposal presentationDraft proposal presentation
Draft proposal presentationRamesh Maniam
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentationRamesh Maniam
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentationRamesh Maniam
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentationRamesh Maniam
 

More from Ramesh Maniam (6)

Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Draft proposal presentation
Draft proposal presentationDraft proposal presentation
Draft proposal presentation
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 
Comm skills show
Comm skills showComm skills show
Comm skills show
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Ett amped five

  • 1. IT3180 EmergingTrends andTechnologies Assignment 4: Innovation project Amped Five Software Done By: Ramesh 115832B Lam Zhen Le 116155U Chan Ru Ai 115517Q Daphne Ang 111512F
  • 2. Background EXAMPLE TEXT Go ahead and replace it with your own text. Image Processing EXAMPLE TEXT Go ahead and replace it with your own text. Investigative Forensics EXAMPLE TEXT Go ahead and replace it with your own text. Security Applications
  • 3. Unique Selling Point Report Fast 70 Different Filters Multiple Languages Complete Package High Performance Automatic Report generation (Sequence of all operations applied) Tools to target any type of data from cctv to latent figerprint Single Complete set of tools for forensic profesional Security Built-in security and fil authentication to detect tampering or unauthorised changes
  • 5. Why Use It? Law Enforcement & Video Survelliance Improve Output to better see face, licence Plate or anything useful for investigation Court Experts Improve video or images to use as evidence. Automatically documents the used filters Research Used in several universities and research institutes as a simple and fast way to enhance images and video Military & Inteligence To stabilize full motion video survelliance in hotile territories or enhance surveliance images through fog and sandstorms Biometrics Amped Five can improve fingetprint image quality and measure height of subjects from images
  • 6. Strength Weakness Opportunity Threat Tons of features and huge capabilities Very expensive and one needs to undergo traning to use. Vast opportunities available for professionals from many different fields Threat only to criminals. SWOT analysis
  • 7. Camwhore Extra Skillset CCTV at home How does it affect our work & lifestyle?