Video analysis and surveillance systems are increasingly important for high-level security applications like monitoring airports, oil refineries, military sites, and traffic. Modern solutions use centralized management of high-resolution cameras, wireless networking, storage of video for over a year, and features like object detection, motion analysis, and alert generation. This allows real-time and offline search of video based on parameters. Case studies demonstrate how these solutions improve security for airports by detecting unattended baggage or intruders, oil refineries by monitoring perimeter fences, and traffic by analyzing congestion and vehicle classification.
A presentation by David Alexander, ICAO AVSEC PM, Professional Aviation Services.
Delivered during the 34th annual Southern African Transport Conference (SATC) held in Centurion, South Africa.
Insights from David Alexander ICAO AVSEC Pm and General Manager: AVSEC at Professional Aviation Security on current aviation security challenges including recent airport attacks and providing some possible practical solutions
This is a complete report on Bio-metrics, finger print detection. It include what finger print is, how to scan and refin finger print, how the mechanism of its detection work, applications, etc
A presentation by David Alexander, ICAO AVSEC PM, Professional Aviation Services.
Delivered during the 34th annual Southern African Transport Conference (SATC) held in Centurion, South Africa.
Insights from David Alexander ICAO AVSEC Pm and General Manager: AVSEC at Professional Aviation Security on current aviation security challenges including recent airport attacks and providing some possible practical solutions
This is a complete report on Bio-metrics, finger print detection. It include what finger print is, how to scan and refin finger print, how the mechanism of its detection work, applications, etc
They reduce the need for foot patrols by security guards. The speed, maneuverability, and advanced technologies of UAVs make them a valuable complement to ground security. Drone security ensures efficient monitoring and coverage of normally inaccessible areas.
AI-powered real-time video analytics has a lot to offer for the defence sector. From automating security surveillance to crowd analytics, the technology can amp up the efficiency of defence sector.
MEP solutions for hospitals,hotels,airports and data centres
safety security
IT solns like digital signature pad and Spinetix digital signage hyper media player
A CCTV system is not a physical barrier. It does not limit access to certain areas, make an object harder to steal, or a person more difficult to assault and rob. This does not mean it is not an example of situational crime prevention. It is highly situational, and as will be shown, does have some crime prevention capacity in the right situations. Although CCTV has many functions, the primary preventative utility is to trigger a perceptual mechanism in a potential offender. It seeks to change offender perception so the offender believes if he commits a crime, he will be caught. In other words, CCTV aims to increase the perceived risk of capture, a factor which, assuming the offender is behaving in a rational (or limited rational) manner, will de-motivate the potential offender. For this crime prevention process to succeed. So we developed this prototype which shows improved results in terms of crime reporting by the public using mobile devices and improved management of reports due to automation of crime reporting and monitoring. Pankaj Sharma | Parikshit Jhala | Nirmal Mathur | Jagtar Singh" Video Crime Monitoring" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3544.pdf http://www.ijtsrd.com/computer-science/real-time-computing/3544/-video-crime-monitoring/pankaj-sharma
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
A Kalashnikov rifle (Russian: Калашников) is any one of a series of automatic rifles based on the original design of Mikhail Kalashnikov. They are officially known in Russian as "Avtomát Kaláshnikova" (Russian: Автома́т Кала́шникова, lit. 'Kalashnikov's Automatic Gun'), but are widely known as Kalashnikovs, AKs, or in Russian slang, a "Kalash". They were originally manufactured in the Soviet Union, primarily by Kalashnikov Concern, formerly Izhmash, but these rifles and their variants are now manufactured in many other countries. The Kalashnikov is one of the most widely used guns in the world, with an estimated 72 million rifles in global circulation
They reduce the need for foot patrols by security guards. The speed, maneuverability, and advanced technologies of UAVs make them a valuable complement to ground security. Drone security ensures efficient monitoring and coverage of normally inaccessible areas.
AI-powered real-time video analytics has a lot to offer for the defence sector. From automating security surveillance to crowd analytics, the technology can amp up the efficiency of defence sector.
MEP solutions for hospitals,hotels,airports and data centres
safety security
IT solns like digital signature pad and Spinetix digital signage hyper media player
A CCTV system is not a physical barrier. It does not limit access to certain areas, make an object harder to steal, or a person more difficult to assault and rob. This does not mean it is not an example of situational crime prevention. It is highly situational, and as will be shown, does have some crime prevention capacity in the right situations. Although CCTV has many functions, the primary preventative utility is to trigger a perceptual mechanism in a potential offender. It seeks to change offender perception so the offender believes if he commits a crime, he will be caught. In other words, CCTV aims to increase the perceived risk of capture, a factor which, assuming the offender is behaving in a rational (or limited rational) manner, will de-motivate the potential offender. For this crime prevention process to succeed. So we developed this prototype which shows improved results in terms of crime reporting by the public using mobile devices and improved management of reports due to automation of crime reporting and monitoring. Pankaj Sharma | Parikshit Jhala | Nirmal Mathur | Jagtar Singh" Video Crime Monitoring" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3544.pdf http://www.ijtsrd.com/computer-science/real-time-computing/3544/-video-crime-monitoring/pankaj-sharma
International Journal of Engineering Inventions (IJEI) provides a multidisciplinary passage for researchers, managers, professionals, practitioners and students around the globe to publish high quality, peer-reviewed articles on all theoretical and empirical aspects of Engineering and Science.
A Kalashnikov rifle (Russian: Калашников) is any one of a series of automatic rifles based on the original design of Mikhail Kalashnikov. They are officially known in Russian as "Avtomát Kaláshnikova" (Russian: Автома́т Кала́шникова, lit. 'Kalashnikov's Automatic Gun'), but are widely known as Kalashnikovs, AKs, or in Russian slang, a "Kalash". They were originally manufactured in the Soviet Union, primarily by Kalashnikov Concern, formerly Izhmash, but these rifles and their variants are now manufactured in many other countries. The Kalashnikov is one of the most widely used guns in the world, with an estimated 72 million rifles in global circulation
BSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptxVikki Choudhry
BSS-LS Technology developed for autonomously producing High-Purity, Green Hydrogen H2 by hydrothermal oxidation of aluminium
Technology advantages –
Available raw materials are used: water and industrial aluminium powder with the possibility of recycling.
Technology scalability and sustainability
No Carbon Footprint
Obtaining high-purity hydrogen suitable for use in hydrogen fuel cells
The heat released during the reaction process is further used to provide energy
Energy independence and mobility with
Filling station with an autonomous module for producing high-purity green hydrogen
GBAS An introduction - Proprietary Information - BSS_AT Vikki Choudhry
GBAS - Ground Based Augmentation System - Satellite- Based Navigation and Landing is achieved by overcoming the inherent challenges (distortion due to ionospheric and tropospheric irregularities )
Corrizon™ a single component waterborne metal protector that creates an immun...Vikki Choudhry
A revolutionary advanced technology of Corrizon™ which protects the base metal against corrosion. Applications in Oil and Gas exploration, Marine, Defence & Aerospace, Construction, Chemical and Automotive.
BSS_M alternative to Batteries in Automotive EVs Vikki Choudhry
AN ALTERNATIVE TO LEGACY BATTERIES THAT IS;
- Equivalent Performance to Lithium Ion
- Half the Price of Lithium Ion
- Approximately 1/10 the cost per cycle of operation of lead acid
- 1/3 the Mass and Volume of lead acid & 4 to 5 times life span
- Approximately half the mass and volume of Lithium Ion
- Completely Fire resistant
- Made from 100 % Recycle-able and Abundant low cost materials : ZINC & NICKEL
BSS understands that there is a need to induct Water Purification Equipment to enable microbial purification of available surface water and municipality treated water to BIS standards for human consumption.
Based on our intensive research on design, development and procurement of low cost and sustainable WPE “Water Purification Equipment” solution for the Indian Armed Forces.
BSS Matériel Limited, upon collaborating with CB-Tech Inc. (USA) and NAQWA LLC (Russian Federation) for the identification, development, evaluation and deployment of state-of-the-art Nanotechnology, to meet the global challenge of access to safe drinking water, has developed low cost, point-of-use (POU) water purification systems for safe drinking water having zero wastage of water.
BSS_M KMZ Presentation - A Gamechanger in Medical Diagnostics Vikki Choudhry
BSS Materiel Limited and KMZ Holdings LLC presentation on Zeptronic Diagnostics - A Gamechanger in Medical Diagnostics
System and Method for Diagnostic Analysis of Human Body Systems, Organs and Cells.
BSS_M Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone Vikki Choudhry
BSS Materiel ] Bharat Supply & Support of Military Materials and Equipment ] brief presentation made to ADB " Army Design Bureau " on UAVs ; Counter- UAV system ; UTM and Weaponized Drone concept.
2. Introduction
Security refers to “freedom from risk or
danger”.
Video security is used to protect homes,
property and people.
Because of increased crime in many towns and
cities, video security is essential.
Another reason for video security is documenta-
tion. If a crime is committed, you will have a
record of it. This evidence is readily available
and can be quite valuable.
4. Now in Mumbai 26th Nov 2008
Hotel Taj Mahal
CST Railway Station
Taxi at Vile Parle
5. Mumbai Terror Attack
Terrorists infiltrated in to Mumbai through sea route which could
have been tracked in the sea itself
They alighted on the shore in group of ten people with heavy
luggage and entered the land which again could have been
monitored
Few of the terrorists were staying in the hotel and were able to
move large material inside their rooms and also survey the hotel
building which also could have been monitored
Few terrorists went firing all across the city through railway
station, hospital and roads and were not being monitored which
if could have been done, the terrorists could have been trapped
and prevented from causing damage to that extent
6. Increasing crime rates and terrorist activity, as well
as an increasing demand for more protection of
people and assets is affecting the growth of the
security related applications and more specifically,
the video surveillance system.
An obvious benefit of video surveillance is 24/7
monitoring of both densely populated areas,
remote and isolated locations. Whether used for
live monitoring, recording or both, video has
proven to be invaluable for identifying individuals
spotting criminal activity, recording accidents and
other events.
Introduction
contd...
7. Traditional Surveillance Systems
Traditional CCTV security systems conventionally are:
Analog or Digital type
Limited Tape life or Storage in terms of Time
Complex High End Central Management System
Systems are totally dumb and require very high Human
intervention
Ideal for small thefts and similar incidents but cannot deal with
terrorist attacks
8. IT IS MORE IMPORTANT TO SAVE HUMAN LIFE
THAN TO FIND OUT THE REASON THROUGH
POSTMORTEM
MISSION TO COMBAT TERRORISM RIGHT AT
THE DOOR
WE PROVIDE THE NEXT GENERATION SECURITY
SYSTEMS WITH ARTIFICIAL INTELLIGENCE
9. Video Analysis & Surveillance in
High End Security
Monitoring important places like Airports and Railway
stations.
Securing nuclear power sites and national
infrastructures.
Used for Military and Defense purposes
Monitor important roads and public places.
Detection and abandoning (possibly dangerous) objects
10. Requirements
Low latency
Data storage and Management including proper
backup.
Searching and retrieval of stored visual information
High degree of accuracy in producing alarms for
predefined events.
Object detection and Tracking
Motion detection and analysis
Visualization at different levels (eg. enhancing &
restoration)
Sensors : - To monitor movement along the fences
- For people/vehicle counting
11. High End Centralized Management
H.264 based compression technique which would
enable quality video stream on 1 mbps bandwidth
Storage upto 1 year or more
Easy retrieval with respect to Time and Place
Detection of illegitimate loitering
Detection of unidentified objects
Object detection and tracking
System to build more accountability
Ideal resource center for Police / ATS/ RAW and other
Intelligence agencies
12. Proposed Solution
Central
Storage
Wireless Network
Motion Analysis
Intrusion Analysis
Object Analysis
Colour Analysis
Shape Analysis
Encoder Encoder
Online
Monitoring
Offline
Monitoring
On Alert
Monitoring
Centralized Management System
Camera 1 Camera 2
13. Proposed Solution
The proposed solution includes High resolution cameras fixed at
numerous locations across the city which would include public
places, prohibited areas, sensitive areas etc.
These camera will be connected to encoders whereby the
captured would be encoded to desired format and then
transmitted to the Centralized Management System over
wireless network
The CMS will process and analyze the videos at run time and
store them with tags referring to various parameters like object
characteristics, motion, intrusion etc.
In case of any intrusion or other set parameter being active an
alert will be generated at the CMS
Online Monitoring will also be available with switching between
the cameras
14. Monitoring Features
The Online monitoring enables analysis of the video with respect to object
sizes, shapes, colour and stores the same with reference tags
The Online monitoring allows search facility with parameters like motion,
object details, intrusion
For e.g. at any given point if the user wishes to monitor a particular shape or
oversize objects, he will receive videos from the respective cameras on his
screen where such objects are being located
The Offline monitoring enables access to stored video (about 1 year) with
comprehensive search facility. For e.g. user can access videos of a particular
day of a particular colour car across all the locations being monitored
“On Alert” monitoring enables users to receive online alerts in case of any
intrusion, loitering in particular areas, over speeding vehicle or detection of a
particular shape of object like gun etc. The user can immediately access the
video from respective camera and track the suspicious person / object
15. Object Detection
Object detection provides surveillance-watch
automation that automatically detects objects.
e.g : People,Vehicles etc.
17. Intrusion Detection
Provides a security alarm when a person or
vehicle moves within a prohibited area under
video surveillance.
18. Stopped Vehicle Detection
Stopped vehicle detection
automatically detects and
alarms on the presence of a
stopped vehicle in an area
where parking/standing is a
violation.
19. Object Removal Detection
Provides an alarm when an item is removed from
its last location. Detection can be defined to
immediately alarm when an object is removed/
stolen.
20. Unattended Baggage Detection
Unattended baggage detection provides an alarm
when an item (package, debris, baggage, etc.) is
deposited or appears in a controlled area. In
addition, detection can be configured to ignore
items that are attended by a nearby person.
21. Autonomous PTZ Tracking
Detects and tracks a moving object by automatic commanding of
the mechanical pan, tilt, and zoom of a PTZ security camera. With
this automatic acquiring capabilities, the target is kept in-site and
in-focus providing magnified identification and information
gathering possibilities.
24. Airport Security
Airports must be able to discover and deal with
potential security and operational problems, such
as:
* Unattended baggage
* Illegally parked vehicles (vehicle detection)
* Intruders
* Multiple Entries into a secured area
* Baggage tampering
25. Airport Security
Video surveillance is also important to implement at
airport’s apron, that is the area aircrafts are parked
and maintained by specialized ground vehicles.
For tracking of vehicles, e.g. fueling vehicles and
baggage cars, as well as tracking of individuals.
contd...
26. Airport Security
A main requirement behind the adopted video
system architecture is that the system must be capable
of monitoring and recognizing the activities and
interaction of numerous vehicles and personnel in a
dynamic environment over extended periods
contd..
28. Oil Refinery
Application : 24x7 monitoring of a 5-mile perimeter
of the fence
Threat Scenarios:
Vehicles or people loitering outside fence (severe)
Vehicles or people going over, under, or through
fence (critical)
Vehicles or people near inside of fence (critical)
Abandoned objects near fence (inside or out),
e.g., duffle bag of explosives (severe)
Camera disabling (moved, masked, lost power)
31. Military & Defense Applications
To detect enemy planes and warships
To detect intruders at the fences of border areas
32. Ship Identification
Physical Environment Issues
· Water (constantly moving)
· Tides (edge and height of water constantly changing in view of
camera)
· Weather (rain, snow, fog, rapid shifts from sunny to cloudy)
· High winds
· Shore birds (primarily sea gulls)
34. Need for Traffic Monitoring
To reduce the traffic congestion on highways
Reduce the road accidents
Identifying suspicious vehicles. Etc..,
35. Traffic Monitoring
Traffic scene analysis in 3 categories
A straight forward vehicle detection and counting system.
Congestion monitoring
Vehicle classification and tracking systems which involve
much more detailed scene traffic analysis.
36. Traffic Monitoring
Recognizes vehicle patterns and compares
subsequent images to determine vehicle and
direction.
Thus it can detect any car driving the wrong way
into a lane against the flow.
contd...