SlideShare a Scribd company logo
New technologies to investigate human
trafficking and migrant smuggling
Michael O’Connell, Vice President and Executive Advisor
NEC Corporation.
3 © NEC Corporation 2017 NEC Confidential
4 © NEC Corporation 2017 NEC Confidential
5 © NEC Corporation 2017 NEC Confidential
6 © NEC Corporation 2017 NEC Confidential
7 © NEC Corporation 2017 NEC Confidential
8 © NEC Corporation 2017 NEC Confidential
NEC Central Research Labs
▌ Network of 9 Labs focused on
Global Research
▌ Employs over 1,000 R&D
Professionals
▌ Actively Partners with Key
Customers on Real World
Problems
North America
Latin America
Europe, Middle East and
Africa
Greater China
Japan
Asia-Pacific
1
3
1
1
1
2
10 © NEC Corporation 2017 NEC Confidential
History of NEC’s Initiatives in AI
NEC has a technology portfolio and business track record that extends over half a century, including AI technologies
that rank top around the world.
1960
OCR
Fingerprint
Recognition
Face
Recognition
Deep Learning
Heterogeneous
mixture
learning
Predictive Robust
Optimization Framework
Postal addresssorter
Applied in human resource matching,
image analysis
(RAPID Machine Learning)
Applied in demand
forecasting, etc.
2000
2010
Analysis
Prescription
Visualization Ranked 1st
four consecutive times
2009,2010,2013,2017
Autonomous
and Adaptive
Control
Police
Ranked 1st
eight times
2003~2016
Immigration
control
Iris
Recognition
Ranked 1st
2018
National
ID
* U.S. National Institute of Standards and Technology (NIST)
11 © NEC Corporation 2017 NEC Confidential
Value Creation by Combining Various data and AI Technologies
Real World
Over-
whelming
efficiency
Speed
Accuracy
Automation
Enhanced
Suggestion
To humans
Assist human
decisions
Bird's-eye view
Optimization
Identify human and objects
from data in the real world
Acquire knowledge by
combining various information
Visualization Analysis
Control optimally using
prediction and reasoning
Real World
Digitalization,
Improvement
of data quality
Recognition &
Identification
using
the five senses
Human
Things
Understanding
of meaning &
intent
Contexts
Analysis with
interpretation
High-precision
analysis
Planning &
optimization
Prescription
12 © NEC Corporation 2017 NEC Confidential
Aim is to build Smart and Safer Cities
13 © NEC Corporation 2017 NEC Confidential
Fingerprint
Iris
Ear Acoustic
Palm・Vein
Face
4 Consecutive wins
in NIST*1 Evaluation
(2009,2010,2013,2017)
*1 US Institute of Standards and Technology
5 Consecutive wins
in NIST*1 Evaluation
(2004,2007,2009,2012,2013)
Voiceprint
Rank No.1 in
NIST*1 Evaluation
(2018)
NEC’s Biometrics Recognition Technologies
NIST: National Institute of Standardsand Technology
Non-Regulatory agency of the US Department of Commerce
14 © NEC Corporation 2017 NEC Confidential
New investigative practices:
• Cyber world:
• Global cyber surveillance / monitoring network.
• Wider use of AI as data facilitator.
• Improved access to digital forensics.
• Enhanced support from social media providers for monitoring and reporting.
• Physical world:
• Enhanced border security screening systems utilising biometrics.
• Wider use of smart city surveillance solutions.
• Improved public private partnerships.
• Tip-lines and easier reporting mechanisms by victims and
witnesses / family through social media, collated and of use
to law enforcement / agencies for intervention.
NEC Public Safety | New Technologies to Investigate Human Trafficking and Migrant Smuggling

More Related Content

What's hot

ICSC
ICSCICSC
ICSC
eScan
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Sigma Software
 
Soil Monitoring system using Intel Galileo
Soil Monitoring system using Intel GalileoSoil Monitoring system using Intel Galileo
Soil Monitoring system using Intel Galileo
Mphasis
 
Technological innovation and legionella. Visophylabs
Technological innovation and legionella. VisophylabsTechnological innovation and legionella. Visophylabs
Technological innovation and legionella. Visophylabs
Visophy Labs
 
reThink CyberSecurity Israel post trip report
reThink CyberSecurity Israel post trip reportreThink CyberSecurity Israel post trip report
reThink CyberSecurity Israel post trip report
CIO Academy Asia Community
 
Thingstitute MoCo Projects Overview
Thingstitute MoCo Projects OverviewThingstitute MoCo Projects Overview
Thingstitute MoCo Projects Overview
Internet of Things DC
 
IC-SDV 2019: Anna Maria VIlla: Technology fields supported by machine learnin...
IC-SDV 2019: Anna Maria VIlla: Technology fields supported by machine learnin...IC-SDV 2019: Anna Maria VIlla: Technology fields supported by machine learnin...
IC-SDV 2019: Anna Maria VIlla: Technology fields supported by machine learnin...
Dr. Haxel Consult
 
Potato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 HoursPotato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 Hours
Reshveena Kaur
 
Digital Security
Digital SecurityDigital Security
Digital Security
accenture
 
IC-SDV 2019: Neural Networks today - Mihai Lupu (Research Studio Data Science...
IC-SDV 2019: Neural Networks today - Mihai Lupu (Research Studio Data Science...IC-SDV 2019: Neural Networks today - Mihai Lupu (Research Studio Data Science...
IC-SDV 2019: Neural Networks today - Mihai Lupu (Research Studio Data Science...
Dr. Haxel Consult
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed
Sabidur Rahman
 
4th industrial revolution - Future of Smart Tech and Global Implications
4th industrial revolution - Future of Smart Tech and Global Implications4th industrial revolution - Future of Smart Tech and Global Implications
4th industrial revolution - Future of Smart Tech and Global Implications
Bijal (Bee) Hayes-Thakore
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?
Bijal (Bee) Hayes-Thakore
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
NetworkCollaborators
 

What's hot (14)

ICSC
ICSCICSC
ICSC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Soil Monitoring system using Intel Galileo
Soil Monitoring system using Intel GalileoSoil Monitoring system using Intel Galileo
Soil Monitoring system using Intel Galileo
 
Technological innovation and legionella. Visophylabs
Technological innovation and legionella. VisophylabsTechnological innovation and legionella. Visophylabs
Technological innovation and legionella. Visophylabs
 
reThink CyberSecurity Israel post trip report
reThink CyberSecurity Israel post trip reportreThink CyberSecurity Israel post trip report
reThink CyberSecurity Israel post trip report
 
Thingstitute MoCo Projects Overview
Thingstitute MoCo Projects OverviewThingstitute MoCo Projects Overview
Thingstitute MoCo Projects Overview
 
IC-SDV 2019: Anna Maria VIlla: Technology fields supported by machine learnin...
IC-SDV 2019: Anna Maria VIlla: Technology fields supported by machine learnin...IC-SDV 2019: Anna Maria VIlla: Technology fields supported by machine learnin...
IC-SDV 2019: Anna Maria VIlla: Technology fields supported by machine learnin...
 
Potato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 HoursPotato Pirates: Computer Networking In 2 Hours
Potato Pirates: Computer Networking In 2 Hours
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
IC-SDV 2019: Neural Networks today - Mihai Lupu (Research Studio Data Science...
IC-SDV 2019: Neural Networks today - Mihai Lupu (Research Studio Data Science...IC-SDV 2019: Neural Networks today - Mihai Lupu (Research Studio Data Science...
IC-SDV 2019: Neural Networks today - Mihai Lupu (Research Studio Data Science...
 
5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed5 g and beyond! IEEE ICC 2018 keynotes reviewed
5 g and beyond! IEEE ICC 2018 keynotes reviewed
 
4th industrial revolution - Future of Smart Tech and Global Implications
4th industrial revolution - Future of Smart Tech and Global Implications4th industrial revolution - Future of Smart Tech and Global Implications
4th industrial revolution - Future of Smart Tech and Global Implications
 
How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?How to fast track your Internet of Thing deployments?
How to fast track your Internet of Thing deployments?
 
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
Cisco Connect 2018 Thailand - Changing the security equation demetris booth_c...
 

Similar to NEC Public Safety | New Technologies to Investigate Human Trafficking and Migrant Smuggling

NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety
 
The exciting new world of code & data
The exciting new world of code & dataThe exciting new world of code & data
The exciting new world of code & data
Steven Miller
 
The Knowledge Graph Explosion
The Knowledge Graph ExplosionThe Knowledge Graph Explosion
The Knowledge Graph Explosion
Neo4j
 
Fighting financial fraud at Danske Bank with artificial intelligence
Fighting financial fraud at Danske Bank with artificial intelligenceFighting financial fraud at Danske Bank with artificial intelligence
Fighting financial fraud at Danske Bank with artificial intelligence
Ron Bodkin
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal Agencies
InteractiveNEC
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
Neo4j
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
StampedeCon
 
Deep Learning disruption
Deep Learning disruptionDeep Learning disruption
Deep Learning disruption
Usman Qayyum
 
Harm Olde KPN
Harm Olde KPNHarm Olde KPN
Harm Olde KPN
TalentEvent
 
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, NvidiaODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
Alex Ermolaev
 
모바일VR 사용자 인터페이스를 위한 데이터 기반 기계 학습 - 딥픽셀 이제훈 대표
모바일VR 사용자 인터페이스를 위한 데이터 기반 기계 학습 - 딥픽셀 이제훈 대표모바일VR 사용자 인터페이스를 위한 데이터 기반 기계 학습 - 딥픽셀 이제훈 대표
모바일VR 사용자 인터페이스를 위한 데이터 기반 기계 학습 - 딥픽셀 이제훈 대표
eungjin cho
 
Emil Eifrém - The Data Platform for Today’s Intelligent Applications
Emil Eifrém - The Data Platform for Today’s Intelligent ApplicationsEmil Eifrém - The Data Platform for Today’s Intelligent Applications
Emil Eifrém - The Data Platform for Today’s Intelligent Applications
Neo4j
 
Value Drivers for Your Data – Big, Fast, or Smart
Value Drivers for Your Data – Big, Fast, or SmartValue Drivers for Your Data – Big, Fast, or Smart
Value Drivers for Your Data – Big, Fast, or Smart
IDEAS - Int'l Data Engineering and Science Association
 
II-SDV 2017 in Nice - The International Information Conference on Search, Dat...
II-SDV 2017 in Nice - The International Information Conference on Search, Dat...II-SDV 2017 in Nice - The International Information Conference on Search, Dat...
II-SDV 2017 in Nice - The International Information Conference on Search, Dat...
Dr. Haxel Consult
 
Prop ai artificial intelligence in real estate
Prop ai   artificial intelligence in real estateProp ai   artificial intelligence in real estate
Prop ai artificial intelligence in real estate
Antony Slumbers
 
The International Information Conference on Search, Data Mining and Visualiza...
The International Information Conference on Search, Data Mining and Visualiza...The International Information Conference on Search, Data Mining and Visualiza...
The International Information Conference on Search, Data Mining and Visualiza...
Dr. Haxel Consult
 
Optalysys Optical Processing for HPC
Optalysys Optical Processing for HPCOptalysys Optical Processing for HPC
Optalysys Optical Processing for HPC
inside-BigData.com
 
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
MDS ap
 
Software Development Predictions 2017
Software Development Predictions 2017Software Development Predictions 2017
Software Development Predictions 2017
Belatrix Software
 

Similar to NEC Public Safety | New Technologies to Investigate Human Trafficking and Migrant Smuggling (20)

NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
NEC Public Safety | The Global Risks to Policing from the Fusion of the Real ...
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
The exciting new world of code & data
The exciting new world of code & dataThe exciting new world of code & data
The exciting new world of code & data
 
The Knowledge Graph Explosion
The Knowledge Graph ExplosionThe Knowledge Graph Explosion
The Knowledge Graph Explosion
 
Fighting financial fraud at Danske Bank with artificial intelligence
Fighting financial fraud at Danske Bank with artificial intelligenceFighting financial fraud at Danske Bank with artificial intelligence
Fighting financial fraud at Danske Bank with artificial intelligence
 
NEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal AgenciesNEC's Digital Identity Platform for Federal Agencies
NEC's Digital Identity Platform for Federal Agencies
 
1. The Importance of Graphs in Government
1. The Importance of Graphs in Government1. The Importance of Graphs in Government
1. The Importance of Graphs in Government
 
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017AI in the Enterprise: Past,  Present &  Future - StampedeCon AI Summit 2017
AI in the Enterprise: Past, Present & Future - StampedeCon AI Summit 2017
 
Deep Learning disruption
Deep Learning disruptionDeep Learning disruption
Deep Learning disruption
 
Harm Olde KPN
Harm Olde KPNHarm Olde KPN
Harm Olde KPN
 
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, NvidiaODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
ODSC Presentation "Putting Deep Learning to Work" by Alex Ermolaev, Nvidia
 
모바일VR 사용자 인터페이스를 위한 데이터 기반 기계 학습 - 딥픽셀 이제훈 대표
모바일VR 사용자 인터페이스를 위한 데이터 기반 기계 학습 - 딥픽셀 이제훈 대표모바일VR 사용자 인터페이스를 위한 데이터 기반 기계 학습 - 딥픽셀 이제훈 대표
모바일VR 사용자 인터페이스를 위한 데이터 기반 기계 학습 - 딥픽셀 이제훈 대표
 
Emil Eifrém - The Data Platform for Today’s Intelligent Applications
Emil Eifrém - The Data Platform for Today’s Intelligent ApplicationsEmil Eifrém - The Data Platform for Today’s Intelligent Applications
Emil Eifrém - The Data Platform for Today’s Intelligent Applications
 
Value Drivers for Your Data – Big, Fast, or Smart
Value Drivers for Your Data – Big, Fast, or SmartValue Drivers for Your Data – Big, Fast, or Smart
Value Drivers for Your Data – Big, Fast, or Smart
 
II-SDV 2017 in Nice - The International Information Conference on Search, Dat...
II-SDV 2017 in Nice - The International Information Conference on Search, Dat...II-SDV 2017 in Nice - The International Information Conference on Search, Dat...
II-SDV 2017 in Nice - The International Information Conference on Search, Dat...
 
Prop ai artificial intelligence in real estate
Prop ai   artificial intelligence in real estateProp ai   artificial intelligence in real estate
Prop ai artificial intelligence in real estate
 
The International Information Conference on Search, Data Mining and Visualiza...
The International Information Conference on Search, Data Mining and Visualiza...The International Information Conference on Search, Data Mining and Visualiza...
The International Information Conference on Search, Data Mining and Visualiza...
 
Optalysys Optical Processing for HPC
Optalysys Optical Processing for HPCOptalysys Optical Processing for HPC
Optalysys Optical Processing for HPC
 
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
SAP Forum Ankara 2017 - "Verinin Merkezine Seyahat"
 
Software Development Predictions 2017
Software Development Predictions 2017Software Development Predictions 2017
Software Development Predictions 2017
 

More from NEC Public Safety

NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety
 
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
NEC Public Safety
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner Handbook
NEC Public Safety
 

More from NEC Public Safety (11)

NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller NEC Public Safety | NEC Airport Security Advances with Business Traveller
NEC Public Safety | NEC Airport Security Advances with Business Traveller
 
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter LeeNEC Public Safety | NEC XON 2020 Vision by Walter Lee
NEC Public Safety | NEC XON 2020 Vision by Walter Lee
 
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter LeeNEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
NEC Public Safety | Technology Foresight Evolution or Revolution by Walter Lee
 
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
NEC Public Safety | Riding the Wave of Disruption in 4.0 by Walter Lee
 
NEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer CitiesNEC Public Safety | Biometric for Safer Cities
NEC Public Safety | Biometric for Safer Cities
 
NEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for BanksNEC Public Safety | Digital Identity for Banks
NEC Public Safety | Digital Identity for Banks
 
NEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming IndustryNEC Public Safety | Facing the Odds in Gaming Industry
NEC Public Safety | Facing the Odds in Gaming Industry
 
NEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured WorldNEC Public Safety | Digital Identity for a Secured World
NEC Public Safety | Digital Identity for a Secured World
 
NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017NEC Public Safety | Safe Cities Index 2017
NEC Public Safety | Safe Cities Index 2017
 
NEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber SecurityNEC Public Safety | Integrating Physical & Cyber Security
NEC Public Safety | Integrating Physical & Cyber Security
 
NEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner HandbookNEC Public Safety | City Planner Handbook
NEC Public Safety | City Planner Handbook
 

Recently uploaded

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 

Recently uploaded (20)

Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 

NEC Public Safety | New Technologies to Investigate Human Trafficking and Migrant Smuggling

  • 1. New technologies to investigate human trafficking and migrant smuggling Michael O’Connell, Vice President and Executive Advisor NEC Corporation.
  • 2.
  • 3. 3 © NEC Corporation 2017 NEC Confidential
  • 4. 4 © NEC Corporation 2017 NEC Confidential
  • 5. 5 © NEC Corporation 2017 NEC Confidential
  • 6. 6 © NEC Corporation 2017 NEC Confidential
  • 7. 7 © NEC Corporation 2017 NEC Confidential
  • 8. 8 © NEC Corporation 2017 NEC Confidential NEC Central Research Labs ▌ Network of 9 Labs focused on Global Research ▌ Employs over 1,000 R&D Professionals ▌ Actively Partners with Key Customers on Real World Problems North America Latin America Europe, Middle East and Africa Greater China Japan Asia-Pacific 1 3 1 1 1 2
  • 9. 10 © NEC Corporation 2017 NEC Confidential History of NEC’s Initiatives in AI NEC has a technology portfolio and business track record that extends over half a century, including AI technologies that rank top around the world. 1960 OCR Fingerprint Recognition Face Recognition Deep Learning Heterogeneous mixture learning Predictive Robust Optimization Framework Postal addresssorter Applied in human resource matching, image analysis (RAPID Machine Learning) Applied in demand forecasting, etc. 2000 2010 Analysis Prescription Visualization Ranked 1st four consecutive times 2009,2010,2013,2017 Autonomous and Adaptive Control Police Ranked 1st eight times 2003~2016 Immigration control Iris Recognition Ranked 1st 2018 National ID * U.S. National Institute of Standards and Technology (NIST)
  • 10. 11 © NEC Corporation 2017 NEC Confidential Value Creation by Combining Various data and AI Technologies Real World Over- whelming efficiency Speed Accuracy Automation Enhanced Suggestion To humans Assist human decisions Bird's-eye view Optimization Identify human and objects from data in the real world Acquire knowledge by combining various information Visualization Analysis Control optimally using prediction and reasoning Real World Digitalization, Improvement of data quality Recognition & Identification using the five senses Human Things Understanding of meaning & intent Contexts Analysis with interpretation High-precision analysis Planning & optimization Prescription
  • 11. 12 © NEC Corporation 2017 NEC Confidential Aim is to build Smart and Safer Cities
  • 12. 13 © NEC Corporation 2017 NEC Confidential Fingerprint Iris Ear Acoustic Palm・Vein Face 4 Consecutive wins in NIST*1 Evaluation (2009,2010,2013,2017) *1 US Institute of Standards and Technology 5 Consecutive wins in NIST*1 Evaluation (2004,2007,2009,2012,2013) Voiceprint Rank No.1 in NIST*1 Evaluation (2018) NEC’s Biometrics Recognition Technologies NIST: National Institute of Standardsand Technology Non-Regulatory agency of the US Department of Commerce
  • 13. 14 © NEC Corporation 2017 NEC Confidential New investigative practices: • Cyber world: • Global cyber surveillance / monitoring network. • Wider use of AI as data facilitator. • Improved access to digital forensics. • Enhanced support from social media providers for monitoring and reporting. • Physical world: • Enhanced border security screening systems utilising biometrics. • Wider use of smart city surveillance solutions. • Improved public private partnerships. • Tip-lines and easier reporting mechanisms by victims and witnesses / family through social media, collated and of use to law enforcement / agencies for intervention.