Commercial Services & Supplies

Avigilon: Appearance Alerts to Commercial VMS


Avigilon Corporation, a Motorola Solutions company, presents the newest version of its video management software, Avigilon Control Center (ACC) 7.4, which incorporates artificial intelligence-powered facial recognition technology. FEATURES OF AVIGILON CONTROL CENTER (ACC) 7.4 The new "appearance alerts" capability will help commercial organizations, such as educational institutions and hospitals, accelerate response times by identifying people of interest in enterprise settings. For example, the technology can alert the security team at a local high school when a banned or flagged individual has entered the campus. People of interest are identified based on a secure, controlled watch list created and maintained by authorized users at the commercial organization. For organizations that use the new ACC software and license their Avigilon cameras for facial recognition, cameras will seek to identify potential matches based on the watch list.

How Light's rapid neural networks beat motion detection


Here we are reviewing some of the major improvements that Light's rapid neural networks make over standard motion detection. We are building on the learnings from our previous article in which we compare Light with an IVS. Light has only gotten better since and this footage shows why. Light's rapid neural networks scan and understand the behavior of the people inside your security footage. The above video shows you what Light would see if you could "look through its eyes".

Distributed Probabilistic Learning for Camera Networks with Missing Data

Neural Information Processing Systems

Probabilistic approaches to computer vision typically assume a centralized setting, with the algorithm granted access to all observed data points. However, many problems in wide-area surveillance can benefit from distributed modeling, either because of physical or computational constraints. Most distributed models to date use algebraic approaches (such as distributed SVD) and as a result cannot explicitly deal with missing data. In this work we present an approach to estimation and learning of generative probabilistic models in a distributed context where certain sensor data can be missing. In particular, we show how traditional centralized models, such as probabilistic PCA and missing-data PPCA, can be learned when the data is distributed across a network of sensors.

A Similarity-preserving Network Trained on Transformed Images Recapitulates Salient Features of the Fly Motion Detection Circuit

Neural Information Processing Systems

Learning to detect content-independent transformations from data is one of the central problems in biological and artificial intelligence. An example of such problem is unsupervised learning of a visual motion detector from pairs of consecutive video frames. Rao and Ruderman formulated this problem in terms of learning infinitesimal transformation operators (Lie group generators) via minimizing image reconstruction error. Unfortunately, it is difficult to map their model onto a biologically plausible neural network (NN) with local learning rules. Here we propose a biologically plausible model of motion detection.

Artificial Intelligence Bolsters Physical Security


In the wake of the May 2018 mass shooting that resulted in 10 deaths at Santa Fe (Texas) High School, the Santa Fe Independent School District looked at all possible options to improve school safety within reasonable financial constraints. The district considered the idea of technology to enhance its approximately 750 cameras with facial recognition but did not immediately see a workable solution -- for reasons of cost, and concerns about shaky accuracy that could lead to false positives, says Kip Robins, director of technology for Santa Fe ISD, which has about 4,500 students. The district ultimately contracted with a company called AnyVision, which demonstrated its Better Tomorrow product, an artificial-intelligence-based application that plugs into an existing camera network and provides the ability to do surveillance based on a certain face, body or object. School districts or other end users can create a watch list to keep an eye out for potential pedophiles, for example, or someone known to be mentally unstable. The Santa Fe ISD's solution is part of a growing cadre of software offerings that use artificial intelligence to power through reams of data and notice certain predetermined visual information – whether it's someone's face, or a certain license plate, or simply human movement in a place and time where there shouldn't be any.

AI, Machine Learning and Robotics: Privacy, Security Issues


The use of artificial intelligence, machine learning and robotics has enormous potential, but along with that promise come critical privacy and security challenges, says technology attorney Stephen Wu. For example, in healthcare, "we're beginning to see surgical robots ... and robots that take supplies from one part of a hospital to another. But along with those bold technological advances come emerging privacy and security concerns. "The HIPAA Security Rule doesn't talk about surgical robots and AI systems," he notes. Nevertheless, HIPAA's administrative, physical and technical safeguard requirements still apply, he says. As a result, organizations must determine, for example, "what kind of security management procedures are touching these devices and systems - and do you have oversight over them?" Also critical is ensuring that "communications are secure from one point to another," he points out. "If you have an AI system that's drawing records from an electronic health record, how is that transmission being secured?

Cyxtera Experts Predict: The Next Wave of Machine Learning


Machine learning (ML) is shaping the cyberworld and how users interact with organizations. It has made incredible impacts on the anti-fraud industry and strengthened present security solutions. Learn what Cyxtera's machine learning experts are seeing now and predicting for the future of machine learning – and how the technology can be leveraged by both attackers and security teams. Adversarial machine learning is a technique in which algorithms are fed malicious input in an attempt to fool them into making analysis mistakes. Criminals looking to exploit algorithms can already use this technique to a limited extent, and Cyxtera's experts foresee adversarial machine learning being increasingly leveraged by criminals, making it more prevalent in the future of fraud attacks.

How AI and IoT are Emerging as the Future of the Industry?


The Internet of things (IoT) has a significant potential to fall into the endless pit of a buzzword- vagueness, and it merely is an ecosystem of various kinds of objects that are connected through the Internet. These kinds of objects ranging from cell phones and wearables to machines, generate a constant and massive amount of data every day. The artificial intelligence (AI) also often falls into the same trap. The goal of artificial intelligence in the new IoT scenario is not only to use the humongous data to extract meaningful insights but also to help IoT integrated setups to derive higher value. It implies the machine's intelligence, where the device gains the capabilities of simulating a real human brain.

Improve debt collection processes with AI


In addition to conventional decision logics for determining the next step, there are many other exciting applications in receivables management, including the automation of complex written communication with end customers and third parties. This requires the accurate recognition of incoming queries and the correct deduction of next measures. Performing this assessment using artificial intelligence enables the direct initiation of steps, respectively context-dependent forwarding to the right administrators. By combining machine learning with human experience, this allows queries to be answered effectively and as quickly as possible. After deciding to entrust manual processes in debt collection to artificial intelligence, two important topics need to be considered: firstly, the quantity, nature and quality of the database that can be used for modelling.

Chinese elite police join Serbian units in first European drills as Beijing's influence spreads to Balkans

The Japan Times

SMEDEREVO, SERBIA – Chinese special police took part in their first joint training drills in Europe on Thursday, joining Serbia's elite anti-terrorist unit and local police in an exercise at a Chinese-owned steel mill outside Belgrade. Machine gun fire and stun grenade blasts shook the plant in Smederevo, some 60 km east of the Serbian capital, as police from the two countries used three helicopters and 20 armored vehicles in a staged raid to rescue hostages. Serbia's interior minister, Nebojsa Stefanovic, said he planned more cooperation with Chinese law enforcement agencies, saying Serbia was "learning from a bigger and stronger" country. "China is not only our strategic partner, but also … a friendly and a brotherly country," he told reporters. Some 180 special police officers from China's Henan province participated in the exercise at the mill, which was bought by China's Hesteel in 2016 and employs a number of Chinese citizens.