SlideShare a Scribd company logo
“VISIO DETECT”
Do you use CCTV in your institution?
Do you constantly worry about Child Safety?
Maintaining Register of Visitors & Parents is Becoming a Nightmare?
Are you worried of Repeat offenders / Criminals coming for Employment ?
Is surveillance footage turning into a storage nightmare?
Let us be of some assistance in…
© OneTouch (2017-18) 1
Preamble…
• Schools are Temples of Education.
• Modern times is taking the Focus away.
• Let us help To Shape Future of the Country.
© OneTouch (2017-18) 2
Problem Statements
• In School Premises there are numerous cameras for security purpose, each camera is recording 24X7 &
every camera's recording has to be stored – that which is amounting to HUGE storage needs.
• Increasing Number of Visitors / Vendors Coming in to School.
• Parents / Guardians without ID Cards.
• Disgruntled Employees.
• Un-Authorized Movement.
• Unnecessary Bullying
• Weapon / Malicious Object Detection
• Movement / Proactive Detection and Alert of Un Authorized Movement in “Girls Only” Areas.
• Maintain Electronic Record or All Activity with Tagging of Students, Staff, Parents/Guardians & Visitors
© OneTouch (2017-18) 3
• An Intelligent application “VISIO DETECT” that can restructure your entire video storage by
subtracting the background and hence the storage space now becomes 30% of the total.
• All Registered Persons / Photographs are Loaded in the system and it records their movement.
• Creation of Virtual Boundaries and Generate Alert if Someone Crosses the line. Hence turning
whole system to Proactive rather than Reactive.
• Match New Potential Employee with Police / Law Enforcement Database list of Wanted /
Proclaimed offenders.
• The background image is updated every time when there is any change in the lighting
conditions or any other parameters.
• Detection of Bullying / Student activity.
• Detection of Caning or any such activity.
• Detection of Dangerous / Banned Object like Mobile Phones, Baseball Bats or Knife.
© OneTouch (2017-18) 4
Offerings in a Nutshell…
Some questions that you might have – 1/2
So how do we upload Pictures ?
Do we Collect the Pictures again?
• As a standard definition: Background subtraction, also known as foreground detection, is a
technique in the fields of image processing and computer vision wherein an image's foreground is
extracted for further processing (object recognition etc.).
• Motion detection feature stores the whole image in which the motion has been detected.
However the same has limitations on the Distance & Angle of capture, even if the camera is
equipped with a PIR sensors. The technology proposed “VISIO DETECT” not only just records the
motion but stores only the motion subtracting the background
• So do I to have change the cameras?
……………………….. No you don’t have to change the cameras.
(C) OneTouch (2017-18) 5
Some questions that you might have – 2/2
• We can talk to your existing database and upload the same. This is seamless integration.
• What More can we do?
• Attendance of Students.
• Count of Students in School
• Count of Teachers and Other staff.
• Detection & Unwanted Movement / Un attended movement in Dangerous areas like
Swimming Pool / Stables , LAB etc.
• Visitor Registration & Recording.
• And, repeating: - You don’t have to change the existing cameras.
(C) OneTouch (2017-18) 6
Basics:
Who are we?
• We are Consortium of Companies and Individuals / Veterans from IT Industry, who joined hands with
specific Aim & target towards the avenues of Machine Learning, Artificial Intelligence & Video Analytics.
• The consortium is well funded with Physical Presence in Delhi, Bengaluru & Jaipur in India.
• We have our Incubation Centers in Bengaluru & Jaipur with Sales and support happening out of Delhi
and Bengaluru.
Our Product Line includes
• Facial Recognition Solutions for - Person Tracking, People Counting, Crowd Analysis
• Deep Learning of Relationships Between Persons / Individuals in Premises.
• Object Detection
• NLP Algorithms
• Touch-less Attendance using Face recognition
Our Focus
• To Create non Invasive solutions that can utilize existing Infrastructure and devices.
12/24/2017 (C) OneTouch (2017-18) 7
It was a pleasure…
Thanking You…
Email – info@onetouchglobal.in
© OneTouch (2017-18) 8
(C) OneTouch (2017-18) 9

More Related Content

Similar to School Security System, Machine Learning, Safety of Students, Ensure Child safety in School

Why prototyping digital services is very important
Why prototyping digital services is very importantWhy prototyping digital services is very important
Why prototyping digital services is very important
Laura Oliver
 
Hasegawa gfke 2014
Hasegawa gfke 2014Hasegawa gfke 2014
Hasegawa gfke 2014
innovationoecd
 
Huawei STW 2018 public
Huawei STW 2018 publicHuawei STW 2018 public
Huawei STW 2018 public
Alan Smeaton
 
Introduction Centillien
Introduction CentillienIntroduction Centillien
Introduction Centillien
Gerard Kanters
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
[Slides] Four Steps Brands Can Take to Design Internet of Things Experiences
[Slides] Four Steps Brands Can Take to Design Internet of Things Experiences[Slides] Four Steps Brands Can Take to Design Internet of Things Experiences
[Slides] Four Steps Brands Can Take to Design Internet of Things Experiences
Altimeter, a Prophet Company
 
Intra and security
Intra and securityIntra and security
Intra and security
Gerard Kanters
 
“Building Embedded Vision Products: Management Lessons From The School of Har...
“Building Embedded Vision Products: Management Lessons From The School of Har...“Building Embedded Vision Products: Management Lessons From The School of Har...
“Building Embedded Vision Products: Management Lessons From The School of Har...
Edge AI and Vision Alliance
 
Eye see overview general capabilities
Eye see   overview general capabilitiesEye see   overview general capabilities
Eye see overview general capabilities
EyeSee Research
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
Inttelix
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz Forensics
Oz Forensics
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
Veridium
 
Emotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.pptEmotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.ppt
Gopi Naidu
 
Elderly Assistance- Deep Learning Theme detection
Elderly Assistance- Deep Learning Theme detectionElderly Assistance- Deep Learning Theme detection
Elderly Assistance- Deep Learning Theme detection
Tanvi Mittal
 
Security Framework For HIPAA HITECH
Security Framework For HIPAA HITECHSecurity Framework For HIPAA HITECH
Security Framework For HIPAA HITECH
Patrick Angel - MBA, CISSP(c) CISM(c) CRISC(c) CISA(c)
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
Inttelix
 
Intra for healthcare
Intra for healthcareIntra for healthcare
Intra for healthcare
Gerard Kanters
 
Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client Presentation
Ayapparaj SKS
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
StudentRocks
 

Similar to School Security System, Machine Learning, Safety of Students, Ensure Child safety in School (20)

Why prototyping digital services is very important
Why prototyping digital services is very importantWhy prototyping digital services is very important
Why prototyping digital services is very important
 
Hasegawa gfke 2014
Hasegawa gfke 2014Hasegawa gfke 2014
Hasegawa gfke 2014
 
Huawei STW 2018 public
Huawei STW 2018 publicHuawei STW 2018 public
Huawei STW 2018 public
 
Introduction Centillien
Introduction CentillienIntroduction Centillien
Introduction Centillien
 
Face recognition
Face recognitionFace recognition
Face recognition
 
[Slides] Four Steps Brands Can Take to Design Internet of Things Experiences
[Slides] Four Steps Brands Can Take to Design Internet of Things Experiences[Slides] Four Steps Brands Can Take to Design Internet of Things Experiences
[Slides] Four Steps Brands Can Take to Design Internet of Things Experiences
 
Intra and security
Intra and securityIntra and security
Intra and security
 
“Building Embedded Vision Products: Management Lessons From The School of Har...
“Building Embedded Vision Products: Management Lessons From The School of Har...“Building Embedded Vision Products: Management Lessons From The School of Har...
“Building Embedded Vision Products: Management Lessons From The School of Har...
 
Eye see overview general capabilities
Eye see   overview general capabilitiesEye see   overview general capabilities
Eye see overview general capabilities
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Inttelix Suspect Detection System
Inttelix Suspect Detection SystemInttelix Suspect Detection System
Inttelix Suspect Detection System
 
Guide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz ForensicsGuide - How to choose Liveness detection - Oz Forensics
Guide - How to choose Liveness detection - Oz Forensics
 
Secure Mobile Banking
Secure Mobile BankingSecure Mobile Banking
Secure Mobile Banking
 
Emotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.pptEmotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.ppt
 
Elderly Assistance- Deep Learning Theme detection
Elderly Assistance- Deep Learning Theme detectionElderly Assistance- Deep Learning Theme detection
Elderly Assistance- Deep Learning Theme detection
 
Security Framework For HIPAA HITECH
Security Framework For HIPAA HITECHSecurity Framework For HIPAA HITECH
Security Framework For HIPAA HITECH
 
Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Intra for healthcare
Intra for healthcareIntra for healthcare
Intra for healthcare
 
Credit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client PresentationCredit Card Fraud Detection Client Presentation
Credit Card Fraud Detection Client Presentation
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 

School Security System, Machine Learning, Safety of Students, Ensure Child safety in School

  • 1. “VISIO DETECT” Do you use CCTV in your institution? Do you constantly worry about Child Safety? Maintaining Register of Visitors & Parents is Becoming a Nightmare? Are you worried of Repeat offenders / Criminals coming for Employment ? Is surveillance footage turning into a storage nightmare? Let us be of some assistance in… © OneTouch (2017-18) 1
  • 2. Preamble… • Schools are Temples of Education. • Modern times is taking the Focus away. • Let us help To Shape Future of the Country. © OneTouch (2017-18) 2
  • 3. Problem Statements • In School Premises there are numerous cameras for security purpose, each camera is recording 24X7 & every camera's recording has to be stored – that which is amounting to HUGE storage needs. • Increasing Number of Visitors / Vendors Coming in to School. • Parents / Guardians without ID Cards. • Disgruntled Employees. • Un-Authorized Movement. • Unnecessary Bullying • Weapon / Malicious Object Detection • Movement / Proactive Detection and Alert of Un Authorized Movement in “Girls Only” Areas. • Maintain Electronic Record or All Activity with Tagging of Students, Staff, Parents/Guardians & Visitors © OneTouch (2017-18) 3
  • 4. • An Intelligent application “VISIO DETECT” that can restructure your entire video storage by subtracting the background and hence the storage space now becomes 30% of the total. • All Registered Persons / Photographs are Loaded in the system and it records their movement. • Creation of Virtual Boundaries and Generate Alert if Someone Crosses the line. Hence turning whole system to Proactive rather than Reactive. • Match New Potential Employee with Police / Law Enforcement Database list of Wanted / Proclaimed offenders. • The background image is updated every time when there is any change in the lighting conditions or any other parameters. • Detection of Bullying / Student activity. • Detection of Caning or any such activity. • Detection of Dangerous / Banned Object like Mobile Phones, Baseball Bats or Knife. © OneTouch (2017-18) 4 Offerings in a Nutshell…
  • 5. Some questions that you might have – 1/2 So how do we upload Pictures ? Do we Collect the Pictures again? • As a standard definition: Background subtraction, also known as foreground detection, is a technique in the fields of image processing and computer vision wherein an image's foreground is extracted for further processing (object recognition etc.). • Motion detection feature stores the whole image in which the motion has been detected. However the same has limitations on the Distance & Angle of capture, even if the camera is equipped with a PIR sensors. The technology proposed “VISIO DETECT” not only just records the motion but stores only the motion subtracting the background • So do I to have change the cameras? ……………………….. No you don’t have to change the cameras. (C) OneTouch (2017-18) 5
  • 6. Some questions that you might have – 2/2 • We can talk to your existing database and upload the same. This is seamless integration. • What More can we do? • Attendance of Students. • Count of Students in School • Count of Teachers and Other staff. • Detection & Unwanted Movement / Un attended movement in Dangerous areas like Swimming Pool / Stables , LAB etc. • Visitor Registration & Recording. • And, repeating: - You don’t have to change the existing cameras. (C) OneTouch (2017-18) 6
  • 7. Basics: Who are we? • We are Consortium of Companies and Individuals / Veterans from IT Industry, who joined hands with specific Aim & target towards the avenues of Machine Learning, Artificial Intelligence & Video Analytics. • The consortium is well funded with Physical Presence in Delhi, Bengaluru & Jaipur in India. • We have our Incubation Centers in Bengaluru & Jaipur with Sales and support happening out of Delhi and Bengaluru. Our Product Line includes • Facial Recognition Solutions for - Person Tracking, People Counting, Crowd Analysis • Deep Learning of Relationships Between Persons / Individuals in Premises. • Object Detection • NLP Algorithms • Touch-less Attendance using Face recognition Our Focus • To Create non Invasive solutions that can utilize existing Infrastructure and devices. 12/24/2017 (C) OneTouch (2017-18) 7
  • 8. It was a pleasure… Thanking You… Email – info@onetouchglobal.in © OneTouch (2017-18) 8