It is a presentation for acamedia talk about cloud computing for intelligent video surveillance, i.e. VSaaS, given in 2010. Some of our research results are also presented in this presentation.
It is a presentation for acamedia talk about intelligent video surveillance and video sousveillance given in 2010. Some of our research results are also presented in this presentation.
IBM : Gouvernance de l\'Information - Principes & Mise en oeuvreNicolas Desachy
La gouvernance de l\'information devient primordiale dans un monde de plus en plus intelligent, interconnecté et instrumenté. IBM est présent à la fois par un savoir faire et une offre modulaire, intégrée et ouverte.
New trends in video analytics and surveillance systems for the mining industrySchneider Electric
Presented at the 2013 Society of Mining, Metallurgy and Exploration Annual Meeting (SME 2013). Mining operations require a wider approach for surveillance systems to meet needs ranging from process monitoring to people and assets protection. Intelligent video analytics can identify specific conditions and notify operators of potential issues, allowing mining operations to make quick, informed decisions.
Like all of Chartbeat Publishing products, the Video Dashboard offers real-time insights to provide a clear understanding around what’s resonating with your users.
It is a presentation for acamedia talk about intelligent video surveillance and video sousveillance given in 2010. Some of our research results are also presented in this presentation.
IBM : Gouvernance de l\'Information - Principes & Mise en oeuvreNicolas Desachy
La gouvernance de l\'information devient primordiale dans un monde de plus en plus intelligent, interconnecté et instrumenté. IBM est présent à la fois par un savoir faire et une offre modulaire, intégrée et ouverte.
New trends in video analytics and surveillance systems for the mining industrySchneider Electric
Presented at the 2013 Society of Mining, Metallurgy and Exploration Annual Meeting (SME 2013). Mining operations require a wider approach for surveillance systems to meet needs ranging from process monitoring to people and assets protection. Intelligent video analytics can identify specific conditions and notify operators of potential issues, allowing mining operations to make quick, informed decisions.
Like all of Chartbeat Publishing products, the Video Dashboard offers real-time insights to provide a clear understanding around what’s resonating with your users.
Our secure remote connectivity tool provides full video recording of all work our engineers perform on client systems. We have requirements to analyze the video log to detect suspicious activity, provide forensic and root cause analysis capabilities. Some of the obvious use cases include detection of credit card patterns or personally identifiable information (PII) as well as malicious activity like dropping database objects. We need to process hundreds of gigabytes per day representing thousands of hours of video. Our solution leverages a variety of Hadoop components to perform optical text recognition and indexing, keyboard and mouse movement analysis as well as integration with variety of other data sources such as our monitoring, documentation, ticketing and communication systems. We will present our complete architecture starting from multi-source data ingestion through data processing and analysis up to the end user interface, reporting and integration layer.
Big Data - The 5 Vs Everyone Must KnowBernard Marr
This slide deck, by Big Data guru Bernard Marr, outlines the 5 Vs of big data. It describes in simple language what big data is, in terms of Volume, Velocity, Variety, Veracity and Value.
Real time video analytics with InfoSphere Streams, OpenCV and RStephan Reimann
Unstructured data are a fast growing area and a source for many innovative Big Data & Analytics solutions. Often the first idea of unstructured data seems to be that it's probably text data, even though that is just a small part. A lot of that "new data" is sensor data and especially multimedia (audio, video). Even though this part is growing extremly fast, it is very rarely used in analytics today. And even less in a real time context.
In order to experience what does it mean and how does it feel (and if it is possible to make sense of it) to work with this new data in real time, Wilfried Hoge and I have created a demo that shows our own experience and explains important concepts & implementation. approaches. The demo we created shows a drill equipment as it is used to build tunnels and how to analyze the output on the conveyor belt visually with machine learning approaches.
Facebook The Perfect Startup - Version FRFabernovel
Découvrez avec quel brio Facebook réussit à répondre a 5 challenges qui se posent à toute startup: technologie et experience utilisateur, business model, écosystème, disruption mobile et vision à long terme...
*Téléchargez le PDF pour lire l'étude en haute qualité*
Beyond the Lens: Ensuring Success with CCTV Camera InstallationDaisy Kaur
In an era where security is paramount, businesses and homeowners alike are increasingly turning to Closed-Circuit Television (CCTV) systems to safeguard their premises. However, the effectiveness of a CCTV system is not solely dependent on the quality of the cameras; proper installation plays a crucial role. In this article, we delve into the significance of professional CCTV camera installation and why it is an indispensable investment for ensuring comprehensive security.
What is the Future of CCTV Technology For Security.pdfIsabella Barry
The first instance of CCTV was during World War II when a camera housed inside a box was utilised to watch the GermansV2 rocket take off. Since its inception more than 75 years ago, little has evolved in
terms of the capabilities of CCTV, despite its application, which has largely altered with CCTV now being utilised to identify criminal behaviour both domestically and commercially.
Our secure remote connectivity tool provides full video recording of all work our engineers perform on client systems. We have requirements to analyze the video log to detect suspicious activity, provide forensic and root cause analysis capabilities. Some of the obvious use cases include detection of credit card patterns or personally identifiable information (PII) as well as malicious activity like dropping database objects. We need to process hundreds of gigabytes per day representing thousands of hours of video. Our solution leverages a variety of Hadoop components to perform optical text recognition and indexing, keyboard and mouse movement analysis as well as integration with variety of other data sources such as our monitoring, documentation, ticketing and communication systems. We will present our complete architecture starting from multi-source data ingestion through data processing and analysis up to the end user interface, reporting and integration layer.
Big Data - The 5 Vs Everyone Must KnowBernard Marr
This slide deck, by Big Data guru Bernard Marr, outlines the 5 Vs of big data. It describes in simple language what big data is, in terms of Volume, Velocity, Variety, Veracity and Value.
Real time video analytics with InfoSphere Streams, OpenCV and RStephan Reimann
Unstructured data are a fast growing area and a source for many innovative Big Data & Analytics solutions. Often the first idea of unstructured data seems to be that it's probably text data, even though that is just a small part. A lot of that "new data" is sensor data and especially multimedia (audio, video). Even though this part is growing extremly fast, it is very rarely used in analytics today. And even less in a real time context.
In order to experience what does it mean and how does it feel (and if it is possible to make sense of it) to work with this new data in real time, Wilfried Hoge and I have created a demo that shows our own experience and explains important concepts & implementation. approaches. The demo we created shows a drill equipment as it is used to build tunnels and how to analyze the output on the conveyor belt visually with machine learning approaches.
Facebook The Perfect Startup - Version FRFabernovel
Découvrez avec quel brio Facebook réussit à répondre a 5 challenges qui se posent à toute startup: technologie et experience utilisateur, business model, écosystème, disruption mobile et vision à long terme...
*Téléchargez le PDF pour lire l'étude en haute qualité*
Beyond the Lens: Ensuring Success with CCTV Camera InstallationDaisy Kaur
In an era where security is paramount, businesses and homeowners alike are increasingly turning to Closed-Circuit Television (CCTV) systems to safeguard their premises. However, the effectiveness of a CCTV system is not solely dependent on the quality of the cameras; proper installation plays a crucial role. In this article, we delve into the significance of professional CCTV camera installation and why it is an indispensable investment for ensuring comprehensive security.
What is the Future of CCTV Technology For Security.pdfIsabella Barry
The first instance of CCTV was during World War II when a camera housed inside a box was utilised to watch the GermansV2 rocket take off. Since its inception more than 75 years ago, little has evolved in
terms of the capabilities of CCTV, despite its application, which has largely altered with CCTV now being utilised to identify criminal behaviour both domestically and commercially.
Now security is one of the topmost concern of retail shops, mega marts and all the corporate offices. Hence installing a CCTV Camera is the only wise option available. Get to know more about CCTV Cameras in this presentation.
Expert in CCTV camera installation in Chennai, a dealer with great experience in CCTV camera installation and maintenance in Chennai. Get All major CCTV Camera Brands at the best prices along with Service Warranty assurance by the best CCTV camera service providers in Chennai.
https://mrperfectsolutions.in/cctv-camera/
Cybersecurity Trends and CyberVision : 2015 - 2025Dr David Probert
Personal Vision of the Evolution of the Cybersecurity Sector during the next 10 years - 2015 - 2015.The presentation includes a review of the major players, both the "Good Guys" and the "Bad Guys". We discuss the important role of Artificial Intelligence, Machine Learning & Adaptive Systems in proving "Speed of Light" response to the continuous 24/7 Real-Time Threats that now target Business & Government. We conclude the presentation with a quick review of the Business Sector including the leading "new wave" cybersecurity companies, mergers, acquisitions and Venture Capital Investment.
A sharing talk in Hsinchu Coders for GTC 2016 Taiwan.
This part includes featured startups.
Materials from public release from company in discussion, or my own photos.
Thanks NVIDIA Taiwan for the event.
[CB20] Cleaning up the mess: discovery, monitoring, analysis, and notificatio...CODE BLUE
Tons of insecure IoT devices are out there and ready to be compromised to join next IoT botnet or misused in even more serious threats. Since many of them are unmanaged, the situation does not seem to improve naturally in a short term. This talk will focus on series of efforts on discovery, monitoring, analysis, and notification of these devices trying to clean up "the mess".
This presentation is completely new idea .In this presentation i explain the security with the help of cloud computing......this will be the new idea in new world...
Unveiling the Future: Top Trends in CCTV Security for 2023MagnumSecurity1
In the dynamic world of security technology, staying ahead of the curve is essential. As we step into 2023, the landscape of CCTV security is undergoing exciting transformations.
Know More: https://magnumsecurity.ae/cctv-monitoring.php
This is an academic talk for professors and graduate students. In addition to introducing recent trends in embedded computer vision (ECV), I also present our research experience in ECV.
My slides for acamedia talk about embedded vision in 2010. Some of our research results are also presented in this presentation.
Few slides have chinese characters.
More from IEEE International Conference on Intelligent Information Hiding and Multimedia Signal Processing (16)
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
2. Wang, Yuan-Kai (王元凱) Cloud Vision p. 2
What about this Talk
Intelligent video surveillance for
Public safety
Home security
High performance cloud computing
GPGPU
Algorithm parallelization
VSaaS: video surveillance as a service
Mobile cloud computing
All demo examples are done by our
ISLab(www.islab.tw)
3. Wang, Yuan-Kai (王元凱) Cloud Vision p. 3
Who Am I
輔仁大學
電機工程系副教授,資訊中心前主任
中央大學網路學習科技研究所兼任副教授
中華民國影像處理與圖形辨識學會
理事、監事、秘書長
中華民國大專校院資訊服務協會
理事
Who Is Who in the World
Who Is Who in Science and Engineering
Who Is Who in Asia
4. Wang, Yuan-Kai (王元凱) Cloud Vision p. 4
What Did I Do
經濟部學界科專計畫(2004~2012)
以視覺為基礎之智慧型環境建構
國科會計畫(2010~2011)
以視覺為基礎之睡眠障礙分析
產學合作
智慧型行動視訊監控系統
智慧型嵌入式攝影機之研究(I)(II)
不受限環境人臉辨識系統於機器人之應用
電腦視覺於家庭照護之應用
智慧型運輸系統之研究
5. Wang, Yuan-Kai (王元凱) Cloud Vision p. 5
Contents
1. Intelligent Video Surveillance
2. Cloud Computing and GPGPU
3. VSaaS: Video Surveillance as a
Service
4. Conclusions and Discussions
6. 6
1. Intelligent
Video Surveillance
1.1 Video Surveillance
1.2 Intelligent Video Surveillance
1.3 Demos
7. Wang, Yuan-Kai (王元凱) Cloud Vision p. 7
1.1 Video Surveillance
Video surveillance
Use video camera to monitor an area for
crime investigation
Two applications
Police and public safety
Home seciruty
8. Wang, Yuan-Kai (王元凱) Cloud Vision p. 8
Video Surveillance Market
• CCTV has been a mass-product
market
• Since the 911 event, the market
is continuously increasing
(百萬美元)
Source: JP Freeman
9. Wang, Yuan-Kai (王元凱) Cloud Vision p. 9
Who’s Watching You?
UK has the most CCTV cameras in
Europe
4.2 million cameras which is
20% of the world's CCTV
1 camera for every 14 people in UK
On average a person can be caught on
camera 200-300 times a day
13. Wang, Yuan-Kai (王元凱) Cloud Vision p. 13
Case Study
94年5月17日台中市蠻牛千面人案,
造成全省恐慌
破案關鍵在於
幾個放置毒蠻牛
的超商監視器
錄到千面人身影
歹徒車號被
提款機監視器
清楚拍下
動員500警員
觀看6000小時的錄影資料
14. Wang, Yuan-Kai (王元凱) Cloud Vision p. 14
Home Security
Video surveillance for homecare
Use CCTV/IP cameras to monitor
homes
Like千里眼@中華電信
Increasing demands for
Burglar care
Child care
Pet care
Elder care
Community/neighborhood care
Health care
Sleep care
16. Wang, Yuan-Kai (王元凱) Cloud Vision p. 16
Summary of the Survey
安全監控是3群年齡層都最重視的應
用
第二重視的應用:隨年齡有所不同
17. Wang, Yuan-Kai (王元凱) Cloud Vision p. 17
Burglar Care
Care about burglar events when
You are at home
Nobody is at home (Vacation home)
18. Wang, Yuan-Kai (王元凱) Cloud Vision p. 18
Child Care - Baby Monitor
Care about baby's
Wake-up
Crying Audio/video
Suffocation Wireless Device
19. Wang, Yuan-Kai (王元凱) Cloud Vision p. 19
Child Care – Nanny Monitor
Nanny may not appropriately
take care of the baby
Use a hidden camera for monitoring
20. Wang, Yuan-Kai (王元凱) Cloud Vision p. 20
Elder Care
Home : aging in place
Monitoring the elder by cameras
Fall detection by cameras
Institutional and nursing homes
21. Wang, Yuan-Kai (王元凱) Cloud Vision p. 21
Pet Care
• While the owner is away from home
• A surveillance camera helps assure
• Pet's well-being
• Dogs and cats don't cause damage
22. Wang, Yuan-Kai (王元凱) Cloud Vision p. 22
Community Care
Parking lot, fence Dangerous
public place
ex., swimming pool
Access control
23. Wang, Yuan-Kai (王元凱) Cloud Vision p. 23
Health Care
Video conferencing at home
with doctors for diagnostics
24. Wang, Yuan-Kai (王元凱) Cloud Vision p. 24
Sleep Care
Feel not well for sleeping?
Go to sleep at hospital's sleep center
Bio-signal and video are recorded
OSA: Obstructive Sleep Apnea
Why not sleep at home?
CPAP
25. Wang, Yuan-Kai (王元凱) Cloud Vision p. 25
Video Surveillance
Generations
Paradigm shift of video surveillance
Role from security monitoring to the personalized video contents
Advent of the intelligent surveillance
Changes in technology & desire
1. Network
2. Video compression
3. Live images Intelligent
Surveillance
IP Surveillance
CCTV (DVR)
CCTV (VCR)
1G
2G 3G
26. Wang, Yuan-Kai (王元凱) Cloud Vision p. 26
CCTV Video Surveillance
Video Display & Record
VCR / DVR
Analog
Multiplexer components
Centralized
Monitoring
Video Capture
analogue analogue analogue analogue
27. Wang, Yuan-Kai (王元凱) Cloud Vision p. 27
Digital Video Surveillance
High scalibility
IPCam + analog camera
Network transmission
Remote control
Digital storgage
digital
Network
digital
digital
analogue analogue analogue
analogue
28. Wang, Yuan-Kai (王元凱) Cloud Vision p. 28
Visual Surveillance
Visual Surveillance = Digital CCTV + Video Analytics
Smart/Intelligent Surveillance
29. Wang, Yuan-Kai (王元凱) Cloud Vision p. 29
1.2 Video Analytics
Intelligent video surveillance
Use video camera to monitor an area for
Crime prevention
Intelligent ICT service
From video surveillance
to visual surveillance
Impose video analytics
by computer vision algorithm
30. Wang, Yuan-Kai (王元凱) Cloud Vision p. 30
Why Visual Surveillance
Too many cameras, too few human guards
“After only 20 minutes, human attention to video
monitors degenerates to an unacceptable level.”
(Sandia National Laboratories)
33. Wang, Yuan-Kai (王元凱) Cloud Vision p. 33
IBM S3
Exploratory Computer Vision Group in IBM T.J. Watson Research Center.
http://www.research.ibm.com/ecvg/
44. Wang, Yuan-Kai (王元凱) Cloud Vision p. 44
A Proposed Architecture for
Police Office (1/2)
鄧紹華、詹毓青,智慧型視訊監控技術在警政治安上之可行性研究,
中央警察大學資訊管理所碩士論文,2009
45. Wang, Yuan-Kai (王元凱) Cloud Vision p. 45
A Proposed Architecture for
Police Office (2/2)
鄧紹華、詹毓青,智慧型視訊監控技術在警政治安上之可行性研究,
中央警察大學資訊管理所碩士論文,2009
46. Wang, Yuan-Kai (王元凱) Cloud Vision p. 46
Current Solutions
for Home Security
Standalone system with three
components
Camera: CCTV, IPCam, SmartCam
Storage: DVR
(Digital Video Recorder)
2. DVR
View: PC,
Smart Phone
3. Viewer
1.Camera
47. Wang, Yuan-Kai (王元凱) Cloud Vision p. 47
Problems of Current Solution
Purchase, maintenance, update of
Facility & Storage
Cabling
Rental service could be better
than buying a home security system
Like: electricity, gas, cable TV, ...
⇒ Cloud Computing
48. Wang, Yuan-Kai (王元凱) Cloud Vision p. 48
Problems of Current Solution
Time to watch is unknown
Real-time event alert is helpful
Lack of smart sensors
Instead of video recording in the cloud,
How about video analytics?
⇒ Intelligent Video Surveillance
by Cloud Computing
49. Wang, Yuan-Kai (王元凱) Cloud Vision p. 49
Evolution to Cloud
監控 儲存 管理 分析 虛擬化
智慧分析
IP網路
監控
IP視訊監控
DVR
類比CCTV
(DVR儲存)
Time Lapse 數位
VCR
類比CCTV
(VCR儲存)
CCTV camera
VSaaS
類比
類比CCTV
時間
1950~ 1980 1990 2000 2010 2011
部份資料來源:拓璞產業研究所,2008年5
50. Wang, Yuan-Kai (王元凱) Cloud Vision p. 50
1.3 DEMOS
1. Camera Tampering Detection
2. Tripwire
3. Face Recognition
4. Smart Building
51. Wang, Yuan-Kai (王元凱) Cloud Vision p. 51
DEMO 1:
Camera Tampering Detection
Possible tampering
Spray-painting
Replacement
Hit/collision
Defocus
Blocking
...
52. Wang, Yuan-Kai (王元凱) Cloud Vision p. 52
Motivation
For a large video surveillance
installation
How to ensure every camera is OK?
A case study
A police IDC with more than 600
cameras
A person is responsible for checking
One Day One check in morning
Takes about 40 minutes
Then you never know it functions well
until tomorrow
53. Wang, Yuan-Kai (王元凱) Cloud Vision p. 53
Replacement
Intentionally by human
False alarm: Earthquake
5
3
54. Wang, Yuan-Kai (王元凱) Cloud Vision p. 54
Spray Painting
Intentionally by human
5
4
55. Wang, Yuan-Kai (王元凱) Cloud Vision p. 55
Defocusing
Intentionally by human
False alarm:
water drops
5
5
56. Wang, Yuan-Kai (王元凱) Cloud Vision p. 56
Blocking – Full Occlusion
Intentionally by human
False alarm: passing of large objects
556
6
57. Wang, Yuan-Kai (王元凱) Cloud Vision p. 57
Blocking – Partial Occlusion
Intentionally by human
貼紙 廣告傳單 寶特瓶
包裝盒 雨傘 塑膠玩具
557
7
58. Wang, Yuan-Kai (王元凱) Cloud Vision p. 58
The System
Sabotage detection before visual
surveillance algorithms
Server-based solution for large-scale
surveillance in a police IDC
> 400 cameras
Advantages
No more daily check
with 40 minutes
Alert functions
24 hours
60. Wang, Yuan-Kai (王元凱) Cloud Vision p. 60
Demo 2: Tripwire
Tripwire detection is an important
application for proactive crime
prevention
Restricted ingress and egress
Unidirectional or bidirectional
Precondition:
Precise Moving
Object Detection d(Position)
and Tracking
61. Wang, Yuan-Kai (王元凱) Cloud Vision p. 61
Moving Object Detection in
Day-and-Night
Background subtraction is the most
important method
However, it can not work at night
Image processing techniques must be
added
Night vision should be important
because crimes
usually happens
at night
62. Wang, Yuan-Kai (王元凱) Cloud Vision p. 62
Can't do tripwire detection in these two cases
63. Wang, Yuan-Kai (王元凱) Cloud Vision p. 63
Example with GUI
Various Input
Interface:
Webcam
IP Camera
Analog Camera
Customize Multi
Tripwire
Self-defining
direction
Active alarm &
log(xml, video)
64. Wang, Yuan-Kai (王元凱) Cloud Vision p. 64
Applications
Traffic control
警戒線:對由下而上的車
輛進行警報與計數
65. Wang, Yuan-Kai (王元凱) Cloud Vision p. 65
DEMO 3: Face Recognition
Video-based method in
unconstrained environment
Training image Test video
67. Wang, Yuan-Kai (王元凱) Cloud Vision p. 67
DEMO 4: Smart Building
Integrated monitoring within building
Tracking target: person
11 techniques are integrated by top-
down design
A long-term test site is built
68. Wang, Yuan-Kai (王元凱) Cloud Vision p. 68
Heterogeneous Cameras
We use various kinds of cameras
環場攝影機
PTZ攝影機
紅外線熱像攝影機
固定式攝影機
活動攝影機
活動攝影機畫面
70. 2. Cloud Computing
and GPGPU
2.1 Cloud Computing
2.2 High Performance Computing
2.3 HPC Cloud by GPGPU
2.4 CUDA
2.5 Parallel Computing
2.6 Demos
71. Wang, Yuan-Kai (王元凱) Cloud Vision p. 71
2.1 Cloud Computing
Put computation and data in the cloud
1st Cloud Nth Cloud
Computing Storage Application Computing Storage Application
Web Server Web Server
Provider 1
..... Provider N
Internet
End-User PC Notebook Phone/PDA
72. Wang, Yuan-Kai (王元凱) Cloud Vision p. 72
Technologies for
Computing Cloud
It needs a data center in the cloud
with high computing resources
CPU clusters
(Server Farm)
Storage: SAN
Fiber
networking
Also it needs
Virtualization
Web Service
73. Wang, Yuan-Kai (王元凱) Cloud Vision p. 73
Services in Cloud Computing
AaaS Architecture as a Service
BaaS Business as a Service
CaaS
DaaS
Computing as a Service
Data as a Service
XaaS
DBaaS Database as a Service
EaaS Ethernet as a Service
FaaS Frameworks as a Service
GaaS Globalization or Governance as a Service
HaaS Hardware as a Service
IMaaS Information as a Service
IaaS Infrastructure or Integration as a Service
IDaaS Identity as a Service
LaaS Lending as a Service
MaaS Mashups as a Service
OaaS Organization or Operations as a Service
SaaS Software or Storage as a Service
PaaS Platform as a Service
TaaS Technology or Testing as a Service
VaaS Voice as a Service
VSaaS Video Surveillance as a Service
74. Wang, Yuan-Kai (王元凱) Cloud Vision p. 74
Cloud Architecture
User-Level
應用
Social Computing, Enterprise, ISV,…
User-Level 程式語言
Web 2.0 介面, Mashups, Workflows, …
S
Middleware
a P 控制
a a I Core
Qos Neqotiation, Ddmission Control,
Pricing, SLA Management, Metering…
S a a Middleware
虛擬化
S a VM, VM management and Deployment
S
硬體設施
System Level Infrastructure: Computer, Storage,
Network
75. Wang, Yuan-Kai (王元凱) Cloud Vision p. 75
Service Hierarchy
More about
SaaS for
SaaS
multimedia
PaaS
IaaS
Hardware
Data Storage
Clusters Others
Centers s
76. Wang, Yuan-Kai (王元凱) Cloud Vision p. 76
SaaS for Multimedia
Challenges
Can IaaS afford multimedia computing,
such as intelligent video surveillance?
Digital signal is continuously fed into a
massive data set
Intensive computing power is necessary
for ISP(Image and Signal Processing)
We need High Performance Computing (HPC)
77. Wang, Yuan-Kai (王元凱) Cloud Vision p. 77
2.2 High Performance
Computing (HPC)
Classically it is called
supercomputing
Supercomputing has been combined
with networking technology and
evolved into HPC
Virtualization Utility Cluster
Service Parallel
Model Distributed
High
Cloud Web 2.0 Grid Performance
Computing Computing
78. Wang, Yuan-Kai (王元凱) Cloud Vision p. 78
Why HPC?
It is used for
Massive data processing
Intensive computation
Example application: video processing
Intelligent video surveillance,
Computer vision, ...
Complexity of video processing
One video: 1 Megapixels, 30fps, 100 flops
per pixel
⇒ 3 Gigaflops per video
79. Wang, Yuan-Kai (王元凱) Cloud Vision p. 79
New Approaches for HPC
Cluster/distributed computing
MAP-REDUCE (Google)
MPI
Multi-processing computing
Multicore CPU
GPGPU
FPGA/DSP
CellBE
Combination
GPU cluster
80. Wang, Yuan-Kai (王元凱) Cloud Vision p. 80
HPC Architecture of IaaS
The end user sees a
finished application
Compute
Power
End user Load
Firewall
Balancer
Improved
servers by
Virtual Machine is
deployed and started co-processing:
Virtual
Machine From multicore
Automation to manycore
Software Virtual The virtual machine is
Owner Machine uploaded to storage
and configures to use
storage.
Storage
IaaS
Vendor
82. Wang, Yuan-Kai (王元凱) Cloud Vision p. 82
SMP: Multicore CPU
Two or more CPUs on a chip
Core i7: Quad cores
Intel Core 2 Duo
One
Processor
With multiple
execution Cores
83. Wang, Yuan-Kai (王元凱) Cloud Vision p. 83
SMP: Multicore CPU
Increased compute density
Increase performance with
energy saving
84. Wang, Yuan-Kai (王元凱) Cloud Vision p. 84
SMP: GPGPU
GPGPU has more homogeneous cores
than CPU
120 ~ 512 cores
GPGPU is more powerful than
multicore CPU
For DSP processing
Vendors: nVidia, ATI, Intel
85. Wang, Yuan-Kai (王元凱) Cloud Vision p. 85
AMP: Co-processing
Multicore CPU + Stream processor
CellBE ISP
IO FPGA (Image and
Signal
GPGPU Processing)
86. Wang, Yuan-Kai (王元凱) Cloud Vision p. 86
CellBE (1/2)
By IBM, Sony, Toshiba alliance from
2000
One PowerPC core, 8 compute
cores (SPEs)
Sony
PS3
90. Wang, Yuan-Kai (王元凱) Cloud Vision p. 90
GPGPU+CPU
GPU has been a co-processor of CPU
GPU helps improve graphics processing
CPU focuses SMP + AMP
on IO
control
91. Wang, Yuan-Kai (王元凱) Cloud Vision p. 91
GPU Cluster (1/2)
GPU cluster is a brand new
architecture for HPC
GPU+CPU as a compute node
Many compute nodes are clustered as a
unified HPC computer
Early experimented from 2010
UIUC NCSA: AC cluster
Maryland CPU-GPU cluster
CSIRO GPU cluster
Taiwan: NCHC, NTU
More researches are actively studied
92. Wang, Yuan-Kai (王元凱) Cloud Vision p. 92
GPU Cluster (2/2)
Example:
Maryland
CPU-GPU cluster
• If utility, load balancing, and virtualization can
be incorporated into the GPU cluster
architecture
• Cloud computing can be more powerful
•Especially for intelligent video surveillance
93. Wang, Yuan-Kai (王元凱) Cloud Vision p. 93
Multi-Everything
Parallelism everywhere with SW &
HW assistance
Virtual •New Parallel Languages
Container OS OS OS •New Threading tools
VMM: •Thread Management &
Abstraction layers
Operating •Transactional memory
App App App •Auto-threading compilers
System:
•Auto-threading hardware
Application: Thread Thread Thread
Code/Data Code/Data Code/Data
Thread: Segment Segment Segment
Chip: CPU GPU DSP
94. Wang, Yuan-Kai (王元凱) Cloud Vision p. 94
2.3 HPC Cloud by GPGPU
HPC cloud is
Cloud computing with
HPC architecture and performance
HPC As A Service (HPCaaS):
HPC in the cloud
95. Wang, Yuan-Kai (王元凱) Cloud Vision p. 95
Ex.: Amazon HPC
Five families of Amazon EC2
Standard, Micro, High-CPU, High-
Memory, Cluster Compute
Cluster Compute
Large computational problems for
business and researchers
Provide Amazon Elastic MapReduce
service (Hadoop)
Cooperated with researchers at the
Lawrence Berkeley National
Laboratory to develop the HPC cloud
offering
96. Wang, Yuan-Kai (王元凱) Cloud Vision p. 96
HPC Cloud by GPGPU
In my viewpoint
GPGPU can be an enabling technology
for HPC cloud
For single computer/one compute node
GPU can be used to greatly
enhance performance
Personal supercomputer (nVidia)
If one compute node is not enough
Clustering many
compute nodes
97. Wang, Yuan-Kai (王元凱) Cloud Vision p. 97
Advantages of GPGPU for
Cloud Computing
Compared with PC-based cloud
computing
Improve space density
Improve compute performance
Compared with supercomputer
Application/software portability
Power saving
Similar teraflops performance
98. Wang, Yuan-Kai (王元凱) Cloud Vision p. 98
Challenges in HPC Cloud
Virtualization
Software development
No more free lunch for software
Software has to be re-written
Multi-threading
Programming model
Multi-threading
SPMD(Single Program Multiple Data)
Let's take GPGPU/CUDA model as an example
99. Wang, Yuan-Kai (王元凱) Cloud Vision p. 99
2.4 CUDA
ex.: nVidia Fermi/GT200
Tesla 20-series/10-series
Multicore Many-core
100. Wang, Yuan-Kai (王元凱) Cloud Vision p. 100
Memory Hierarchy
Good for
locality
principle
Temporal
locality
Spatial
locality
Good for
ISP
101. Wang, Yuan-Kai (王元凱) Cloud Vision p. 101
CUDA
Parallel programming for nVidia's
GPGPU
Use C/C++ language
Java, Fortran, Matlab, ...
When executing CUDA programs,
the GPU operates as coprocessor to
the main CPU
102. Wang, Yuan-Kai (王元凱) Cloud Vision p. 102
CUDA Hardware
Environment: CPU+GPU
GPU
PCI-E
Organizes, interprets, and CPU GPU
communicates information
GPU
Handles the core processing on large quantities
of parallel information
Compute-intensive portions of applications
that are executed many times, but on different
data, are extracted from the main application
and compiled to execute in parallel on the GPU
103. Wang, Yuan-Kai (王元凱) Cloud Vision p. 103
Processing Flow on CUDA
Main
2 Memory
CPU 3
Copy processing 5 Instruct the
data Copy the processing
result
4
1 Memory
for GPU Execute
Allocate parallel in
device memory each core
6
Release
device memory
104. Wang, Yuan-Kai (王元凱) Cloud Vision p. 104
GPUs for Multimedia
3.5X 10 X 10 X
PowerDirector7 Ultra CUDA JPEG Decoder DivideFrame GPU Decoder
26 X 10 X
Hyperspectral Image GPU Decoder Motion Estimation for
Compression on (Vegas/Premiere) - H.264/AVC on
NVIDIA GPUs Using the Power of Multiple GPUs
NVIDIA Graphic Card to Using NVIDIA CUDA
Decode H.264 Video Files
105. Wang, Yuan-Kai (王元凱) Cloud Vision p. 105
GPUs for Computer Vision(1/2)
87 X 26 X 200 X 100 X
CUDA SURF – A Real-time Leukocyte Tracking: Real-time Spatiotemporal Image Denoising with
Implementation for SURF ImageJ Plugin Stereo Matching Using the Bilateral Filter
TU Darmstadt University of Virginia Dual-Cross-Bilateral Grid Wlroclaw University
of Technology
85 X 100 X 8X 13 X
Digital Breast Fast Optical Flow on GPU A Framework for Efficient Accelerating Advanced MRI
Tomosynthesis At Video Rate for Full HD and Scalable Execution of Reconstructions
Reconstruction Resolution Domain-specific Templates University of Illinois
Massachusetts General Onera On GPU
Hospital NEC Labs, Berkeley, Purdue
106. Wang, Yuan-Kai (王元凱) Cloud Vision p. 106
GPUs for Computer Vision(2/2)
20 X 13 X 109 X 263 X
GPU for Surveillance Fast Human Detection with Fast Sliding-Window GPU Acceleration of Object
Cascaded Ensembles Object Detection Classification Algorithm
Using NVIDIA CUDA
300 X 10 X 45 X 3X
Audience Measurement – Real-time A GPU Accelerated Canny Edge Detection
Real-time Video Analysis Visual Tracker by Evolutionary
for Counting People, Face Stream Processing Computer Vision System
Detection and Tracking
107. Wang, Yuan-Kai (王元凱) Cloud Vision p. 107
Programming Challenges of
CUDA
We have to manually parallelize the
algorithm
We need expertise both in
Algorithms of image and signal processing
Filtering, frequency analysis, compression,
feature extraction, recognition, ...
Theory, tools and methodology of parallel
computing
Communication, synchronization, resource
management, load balancing, debugging, ...
108. Wang, Yuan-Kai (王元凱) Cloud Vision p. 108
2.5 Parallel Computing
Serial
Computing
Parallel
Computing
109. Wang, Yuan-Kai (王元凱) Cloud Vision p. 109
What is Parallel Computing?
Solving a problem simultaneously with
multiple processing elements (PE’s),
or multiple cores
Dividing the problem into independent parts
Each PE executes its part concurrently with
the other PE’s
110. Wang, Yuan-Kai (王元凱) Cloud Vision p. 110
Parallelization
Multicore/Multi-threading
Data Parallelization
Data distribution
Parallel convolution
Reduction algorithm
Amdahl’s law
Memory Hierarchy Management
Locality principle
Program accesses a relatively small portion of the address space at any instant of time
111. Wang, Yuan-Kai (王元凱) Cloud Vision p. 111
Four Steps to Create
a Parallel Program
Partitioning
D O
e A r
c s c
o s p p h p p M
m i 0 1
e 0 1
a p0 p1
p g s p
o n t p
s
i m p p r
p p i p2 p3
e 2 3
a n
t t 2 3 g
i n i
o t o
n n
Sequential Tasks Parallel Processors
Processes program
computation
112. Wang, Yuan-Kai (王元凱) Cloud Vision p. 112
Methods to Decompose a
Problem
Two basic approaches to partition
computational work
Domain decomposition GPGPU
Partition the data used
Cooperate
in solving the problem
Function decomposition CPU
Partition the jobs (functions)
from the overall work (problem)
113. Wang, Yuan-Kai (王元凱) Cloud Vision p. 113
Domain Decomposition (1/3)
An image example
It is 2D data
Three popular partition ways
114. Wang, Yuan-Kai (王元凱) Cloud Vision p. 114
Domain Decomposition (2/3)
Domain data are usually processed
by loop
for (i=0; i<height; i++)
for (j=0; j<width; j++)
img2[i][j] = RemoveNoise(img1[i][j]);
j
i
The X-ray image
of a circuit board
Original image(img1) Enhanced image(img2)
115. Wang, Yuan-Kai (王元凱) Cloud Vision p. 115
Domain Decomposition (3/3)
j
i A three-block partition
example OpenMP
// Thread 1 CUDA(SPMD)
for (i=0; i<height/3; i++)
for (j=0; j<width; j++)
img2[i][j] = RemoveNoise(img1[i][j]);
// Thread 2
for (i=height/3; i<height*2/3; i++)
fork(threads)
subdomain 1 subdomain 2 subdomain 3
for (j=0; j<width; j++)
i=0 i=4 i=8 img2[i][j] = RemoveNoise(img1[i][j]);
i=1 i=5 i=9 // Thread 3
i=2 i=6 i=10
i=3 i=7 i=11
for (i=height*2/3; i<height; i++)
for (j=0; j<width; j++)
join(barrier) img2[i][j] = RemoveNoise(img1[i][j]);
116. Wang, Yuan-Kai (王元凱) Cloud Vision p. 116
Function Decomposition (1/2)
Functional decomposition
is a way to exploit task
parallelism
Task parallelism by threading
Fork operation creates multiple
threads
Each thread runs on a PE
A thread may perform the same
or different operations on the
same or different data
117. Wang, Yuan-Kai (王元凱) Cloud Vision p. 117
Function Decomposition (2/2)
Ex.: Image Streaming
An image capture & streaming program
Partitioned into 3 tasks (functions)
Each function is set to be a thread,
running in a PE, or CPU core
Compress
Capture Images, Stream the Internet
Images Process Images
Images
Input Output
Computer
118. Wang, Yuan-Kai (王元凱) Cloud Vision p. 118
Issues with Parallelization
Good parallel programs
Execute correctly
with good speedup
Ideal speedup by Amdahl's law
Speedup = N if you has N cores
However, no ideal speedup exists
Because parallel overhead, such as
Data communication
Data dependencies and synchronization
Other issues: design overhead
No free lunch for software development
119. Wang, Yuan-Kai (王元凱) Cloud Vision p. 119
2.6 DEMOS
1. FPGA for Moving Object Detection
2. GPGPU for Image Restoration
3. GPGPU for Feature Extraction
120. Wang, Yuan-Kai (王元凱) Cloud Vision p. 120
DEMO 1: FPGA for
Moving Object Detection
Background subtraction, ...
• 2.8 GHz Intel CPU
• Software: C/C++ FPGA
• Frame rate: 10 fps for 1 channel
121. Wang, Yuan-Kai (王元凱) Cloud Vision p. 121
Background Subtraction
Current
Frame B
k + 1
Background
M k +1 ( x, y ) P k+1 Image Update
Background Image
= Pk +1 ( x, y ) − Bk ( x, y ) -
Bk
M
k + 1
Bk +1 ( x, y )
= αBk ( x, y ) + (1 − α ) Pk +1 ( x, y )
Post Processing
Motion Object Image
Speed up by (1) Circuit design, (2) Parallelization
122. Wang, Yuan-Kai (王元凱) Cloud Vision p. 122
Parallelization by Hardware
Parallelism: 7-level pipeline
SIMD with stream processing
124. Wang, Yuan-Kai (王元凱) Cloud Vision p. 124
DEMO 2: GPGPU for
Image Restoration
Restore and enhance an image
Its complexity is high for large images
Original Complexity: Restored
O(N2)
125. Wang, Yuan-Kai (王元凱) Cloud Vision p. 125
The Method
CPU GPGPU
Copy Data to Illumination
GPGPU Estimation
Illumination
Compensation
Reduction
Algorithm
Copy Data Contrast
from GPGPU Enhancement
Intel Core 2 - 2 cores Tesla C1060 - 240 SPs
(3.0GHZ) (1.296GHZ)
126. Wang, Yuan-Kai (王元凱) Cloud Vision p. 126
Parallelization by GPGPU
Multicore/Multi-threading
Tesla C1060 : 240 SP (Stream Processor)
CUDA: , Thread , Block , Grid
Data Parallelization
Parallel convolution
Parallel convolution
M pixels PE data time
1 pixels pixels 1 pixels t0 t1 t2 t3 t4 t5
A(0) A(0)+A(1) A(0)+A(1)+A(2)+A(3) sum
0
1 A(1)
{
M PE i PE i 2 A(2) A(2)+A(3)
pixels pixels pixels pixels A(3)
3
{
4 A(4) A(4)+A(5) A(4)+A(5)+A(6)+A(7)
pixels 5 A(5)
1 pixels 1 pixels 6 A(6) A(6)+A(7)
pixels 7 A(7)
127. Wang, Yuan-Kai (王元凱) Cloud Vision p. 127
Experimental Results (1/2)
Original images CPU results GPGPU results
128. Wang, Yuan-Kai (王元凱) Cloud Vision p. 128
Experimental Results (2/2)
Original images CPU results GPGPU results
129. Wang, Yuan-Kai (王元凱) Cloud Vision p. 129
Execution Time
18000
16000
14000
12000
CPU-SSR
ms
10000 CUDA-SSR
CPU-MSR
8000
CUDA-MSR
6000 CPU-MSRCR
CUDA-MSRCR
4000
2000
0
256 x 256 512 x 512 1024 x 1024 2048 x 2048
Image Sizes
130. Wang, Yuan-Kai (王元凱) Cloud Vision p. 130
GPGPU Speedup over CPU
35
30
30x
speedup
Speedup
25
20
CUDA-SSR
15 CUDA-MSR
CUDA-MSRCR
10
5
0 Image
256 x 256 512 x 512 1024 x 1024 2048 x 2048 Sizes
138. Wang, Yuan-Kai (王元凱) Cloud Vision p. 138
VSaaS
Video Surveillance as a Service
Pay-as-you-go (Rental) Service
Bringing SaaS to physical security,
hosted & managed video
Potential to make video surveillance
cheaper and easier to deploy and use
Re-shape the home and small business
market segments for video surveillance
Only few systems started from 2010
139. Wang, Yuan-Kai (王元凱) Cloud Vision p. 139
Advantages of VSaaS
Economics
Reduced TCO
(Total Cost of Ownership)
Eliminated time and effort
Efficiency
Fast and flexible deployment
Easy scalability and upgrade
Access anytime anywhere
140. Wang, Yuan-Kai (王元凱) Cloud Vision p. 140
Architecture
DVR by SaaS
SaaS
Camera
VSaaS
Camera should
be place in local
places
DVR in clouds
141. Wang, Yuan-Kai (王元凱) Cloud Vision p. 141
A VSaaS Example
Securitystation in UK
Functions
Live viewing, recording, storage,
playback and system management
Web interface
Mobile access with iPhone or iPad
Plug and Play (PnP) support of IP
cameras
No video analytics currently
Rental service: £5/camera/month
142. Wang, Yuan-Kai (王元凱) Cloud Vision p. 142
A VSaaS Exmaple
Securitystation in UK
Currently,
1.VSaaS can
be seen only
in industry
2.Video analytics
has not yet been
put into VSaaS
143. Wang, Yuan-Kai (王元凱) Cloud Vision p. 143
Cloud Family
Impact of Cloud Computing
Death of the desktop
Transfer to thin client
1. 雲端的「雲」 : Computing cloud
Public cloud
Private cloud
Enterprise cloud
Hybrid cloud
2. 雲端的「端」 : Mobile Cloud
144. Wang, Yuan-Kai (王元凱) Cloud Vision p. 144
Mobile Cloud
Accessing the “cloud” with mobile
devices
Mobile devices becoming part of a
larger cloud construct
Advantages
Offloading computation and save
energy
145. Wang, Yuan-Kai (王元凱) Cloud Vision p. 145
Mobile Cloud Computing
ABI research think it can be next
disruptive force, because
More phones as connected nodes
Feature phones, but not smart phones
Applications are not related to carrier
ABI Research in 2009
1. By 2008, 42.8 million users
(1.1% of mobile cellular subscriber)
2. By 2015, 240 million users, (19%)
$5.2 billion revenues
146. Wang, Yuan-Kai (王元凱) Cloud Vision p. 146
Future Architecture of
Mobile VSaaS
Producer Consumer
147. Wang, Yuan-Kai (王元凱) Cloud Vision p. 147
Problems of VSaaS
•Video is transmitted and stored in a remote site
Capture Record/Analysis View
xDSL
FTTH/Fiber
•Transmission by ADSL is limited
• 640x480 videos with H.264
• 2~4 cameras at a frame rate of 10 fps
may be supported
Front-end video analytics is necessary
More research study is needed
148. Wang, Yuan-Kai (王元凱) Cloud Vision p. 148
DEMO 1: Mobil Video
Surveillance
Event-driven Instant Messaging
149. Wang, Yuan-Kai (王元凱) Cloud Vision p. 149
Current Mobile Surveillance
Mobile phone directly connects to the
camera
Mobile networks
(circuit-switched
& packet-switched) Remote monitor
Camera client
Drawbacks:
1. Not event-driven
2. High communication cost
150. Wang, Yuan-Kai (王元凱) Cloud Vision p. 150
Instant Alarm Messaging
Is Important
【連絡人】
【客戶端】 【保全監控中心】 3
1
異常訊息發報 通知連絡人
低速專線
或電話線
歹徒入侵
3
【勤務中心】 通知警察
保全主機
各式感知器 2
服務派遣處理
151. Wang, Yuan-Kai (王元凱) Cloud Vision p. 151
Our System Architecture
Keyframe Web
Selection Server
PC
Object
1. Object Info. Video
Detection
2. Keyframe Streaming
&Tracking
3. Video Clip Mobile
Phone
Video SMS
Transcoding Messaging
157. Wang, Yuan-Kai (王元凱) Cloud Vision p. 157
Conclusions
Video surveillance can be widely
applied to
Home security
Building/Campus security
Public safety
Video analytics, or intelligent video
surveillance, can benefit from
Cloud computing
High performance computing
158. Wang, Yuan-Kai (王元凱) Cloud Vision p. 158
Suggestions
HiCloud with Video Analytics
CaaS for Academic Research
159. Wang, Yuan-Kai (王元凱) Cloud Vision p. 159
Hicloud with Video Analytics
影像擷取 相機異常偵測 人臉辨識 查詢、過濾、聯防
Video Image Object Object Object Behavior
Capture Enhance /Event Tracking
/Event
Analysis Retrieval
Detection Recognition
影像強化 警戒線、路徑追蹤
流浪漢監控 跌倒、人潮行為分析
160. Wang, Yuan-Kai (王元凱) Cloud Vision p. 160
CaaS for Academic Research
The academy needs CaaS
For data intensive computing
Models
The academy as users
Rent CaaS
The academy as technology sources
Technology transfer
Delegated research project
The academy as partners
A target: smart campus
Long range tracking within campus
Tracking target: car and person