Abstract:
The present invention relates to a method for estimating a possible route of an incomplete tag access information. The method comprises the steps of by a Region Ontology Generator (30), creating a region ontology for each tag access information received by the Region Ontology Generator (30), setting the row and column of the region ontology according to the connected region identification by the Region Ontology Generator (30), filling up the region ontology with tag identification numbers and need tag values by the Region Ontology Generator (30), generating intensity profile data of a user based on historical access frequency data by an Intensity Profiling Module (50), searching for probable route taken by the user based on the region ontology by a Probably Route Searching Module (70) and estimating the best route based on the probable route found and intensity profile data by a Best Route Estimation module (80). FIG. 1
Abstract:
A surveillance camera system contemplated in our invention includes at least one steerable or PTZ camera 305 and a plurality of static or fixed view cameras 303, comprising individual static cameras SC1, SC2, SC3 which are configured or implemented to automatically select and track an object 307 last detected by any one of the cameras. Our method comprises the following steps or process stages, enumerated as F1 to F6 for reference: F1 Listen for incoming event-detection message, i.e. when an object of interest is detected. F2 If only one event is detected, the object-tracking data or information is then derived from the object-detection message and the process proceeds to F6 below; if more than one event is detected, proceeds to F3. F3 The user selects from among the multiple objects detected a global target the particular target to be tracked by the system overriding all other objects previously detected and tracked by the system. F4 Local offset of the selected target is then determined. F5 Object-tracking data is then obtained from the target whereby the pan, tilt and zoom (PTZ) movement commands may be derived. F6 ? The derived PTZ commands is sent to the steerable camera to start tracking the user selected target.
Abstract:
There is disclosed a system for detecting an unattended or abandoned object within an area; the system comprises: at least one video acquisition unit (101) adapted for capturing at least one image of the area; an event analysis unit (102) being operably connected to the video acquisition unit (101); and a video display unit (109) being operably connected to the even analysis unit (102) for displaying all outputs from the event analysis unit (102). In one embodiment, the event analysis unit (102) is adapted to construct a background based on the image; detect at least one motion area within the image; detect at least one static object within the image; classify the object as to whether the detected static object is an abandoned object; and update the background based on the outputs from the all modules to obtain a final output image. A method thereof is also disclosed herein.
Abstract:
The present invention relates to a surveillance system having a method for tampering detection and correction. The surveillance system is able to detect tampering of the camera view and thereon, adjust its video analytics configuration parameters to perform video analytics even though the orientation of the camera (10) has been changed as long as a partial of the ROI is within the tampered camera view. The surveillance system comprises of at least one camera (10), a video acquisition module (20), a storage device (30), an image processing module (40), a display module (50) and a post detection module (60).
Abstract:
The present invention relates to a method for estimating a possible route of an incomplete tag access information. The method comprises the steps of receiving all tag access information including tag identification numbers, connected region identification and need tag values; creating a region ontology for each tag access information received; setting the row and column of the region ontology according to the connected region identification; filling up the region ontology with tag identification numbers and need tag values; generating intensity profile data based on historical data; searching for probable route based on the region ontology; estimating the best route based on the probable route found and intensity profile data; and displaying the best route.
Abstract:
The present invention relates to a system (100) for determining priority of visuals (220) and a method thereof. The system (100) comprises a plurality of visual capturing components (10) for capturing visuals (220); an event detecting component (50) for detecting events in the visuals (220) associated with each of the visual capturing component (10) and a visual priority determining component (110) for determining the priority of the visuals (220) of the visual capturing component (10) based on a set of parameters.
Abstract:
The present invention relates to a surveillance system having a method for tampering detection and correction. The surveillance system is able to detect tampering of the camera view and thereon, adjust its video analytics configuration parameters to perform video analytics even though the orientation of the camera (10) has been changed as long as a partial of the ROI is within the tampered camera view. The surveillance system comprises of at least one camera (10), a video acquisition module (20), a storage device (30), an image processing module (40), a display module (50) and a post detection module (60).