Voice recognition systems
LILIN Americas, an entity of video surveillance provider Merit LILIN, serving North, Central and South America, announced that it has added an Amazon Alexa skill to its Device Hub device manager that enables customers to simply ask for a live or recorded view from any supported LILIN IP camera or NVR and have it displayed on their TV monitor. Amazon Alexa converts the end user's command to a directive and sends that directive through the Device Hub. This fast, hands-free solution eliminates the...
Telguard released new voice commands for HomeControl Flex, its interactive service solution. Using Alexa, HomeControl Flex subscribers can arm their security system and ask the status of the alarm system. Voice-Operated Alarm Systems “Our commitment to helping security dealers succeed in the residential market is at the core of what we do,” said George Brody, President of Telguard. “Helping them stay current with connected home technology gives them the advantage of integrati...
Sensory, a provider of speech and vision technologies that enhance the user experience and security of consumer electronics, announces the release of its fourth generation of TrulySecure FIDO Certified multimodal biometric authentication technology. Now smarter, faster and more secure than ever before, the TrulySecure 4.0 SDK boasts a variety of new AI features that cater to today’s smartphones, mobile apps, and IoT devices, including support for 3D cameras, GPU utilization for authenticat...
There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running. According to a survey conducted for the repor...
Viking Electronics, Inc., a developer and manufacturer of communication and security products, is excited to announce the completion of interoperability testing with Yealink, a unified communications (UC) terminal solution provider. These companies have worked cooperatively to ensure successful integration of Viking’s innovative VoIP products with Yealink’s communication solutions. A mutual dedication to quality and extensive experience in their respective fields makes this the next...
Control4 Corporation (NASDAQ: CTRL), a global provider of smart home solutions, announced the appointment of consumer-experience, product, and platform leader Charlie Kindel as Senior Vice President of Products & Services. Charlie was most recently at Amazon where he created and led the Alexa and Echo Smart Home efforts. The organization he built and ran at Amazon proved that voice is a highly natural user interface for interacting with the home and the recent accelerated growth in smart ho...
Leaping to the forefront of the rapidly growing fields of Artificial Intelligence (AI) and video analytics, Nortek Security & Control LLC (NSC), a global provider of smart connected devices and systems for residential, security, access control and digital health markets, announced the acquisition of San Jose, California-based IntelliVision Technologies Corp., a pioneer and leader in Artificial Intelligence, smart cameras and deep learning-based video analytics software. IntelliVision will operate as a wholly owned subsidiary of NSC. IntelliVision will continue to support its customers and products. IntelliVision is a market leader in AI and deep learning-based video analytics software for smart cameras, providing video analytics solutions for several markets including Smart Home/IoT, Smart Security, Smart Retail, Smart City and Smart Auto/ADAS. IntelliVision AI and video analytics solutions provide actionable insights for security and monitoring in smart home, smart enterprise, and smart city applications Monitoring Smart Home, City Applications "This acquisition is a great fit for us," NSC President Mike O'Neal said. "The IntelliVision team brings incredible strengths from which we will together build rich, future-ready solutions, with intelligence that will transform the NSC product line. This will extend our leadership position in security, automation and entertainment technology, with significant benefits for our partners and customers." IntelliVision AI and video analytics solutions provide actionable insights for security and monitoring in smart home, smart enterprise, and smart city applications; business intelligence for smart enterprise and smart retail; and advanced driver assistance systems (ADAS) for automobiles. Implementation By Major Brands The company's software includes licenses for dozens of patents and has been deployed globally in over 4 million cameras from over 50 top tier brand customers and consumer electronics manufacturers. Customers include Comcast, ADT, Netgear, Ring, Ambarella, Schneider Electric/Pelco, Dallmeier, DLink, Disney, and Zebra. "We are thrilled to become part of Nortek Security & Control," commented IntelliVision CEO Vaidhi Nathan, who will stay on to lead video analytics and artificial intelligence development under the NSC umbrella. "We now have the support and resources of a major market-leader. Plus, integrating IntelliVision's AI and video analytics technologies into NSC's security, control and entertainment platforms will create clear leadership advantages in the markets we collectively serve." The video analytics and AI technology will empower us to offer incredibly personalized control and automation solutions, and will add significantly to our security platforms" Personalized Control And Automation Solutions NSC Executive Vice President of Marketing and Innovation Joe Roberts said that IntelliVision technology will be embedded in key NSC products and systems. "The video analytics and AI technology will empower us to offer incredibly personalized control and automation solutions, and will add significantly to our security platforms," said Roberts. "This will create important new benefits for our dealers and exceptional experiences for the end-users of our products." Roberts cited IntelliVision's strengths in face detection, recognition and search, intelligent motion, object detection and tracking, intrusion/perimeter watch, object classification (people, vehicle, pet), license plate detection and recognition (LPR/ANPR), and audio recognition. Multi-factor Authentication Security System "For example, imagine a security or access control system that can recognize an approaching person," continued Roberts. "The system itself can provide a hands-free, multi-factor authentication that nearly eliminates false positives all while improving the user experience. And for automation, knowing who is in the room enables setting the lighting and climate scenes according to that person's preference. Now the connected home is not just smart, but intuitive." According to Roberts, the acquisition also strengthens the company's ongoing investments in voice and natural language technologies and significantly adds to the company's growing patent portfolio.
Gradiant is taking part at XPonential 2018 for the third time. This is the most important international fair for unmanned vehicles. This year, the Colorado Convention Center in Denver is hosting the event from April 30 to May 3 where the most relevant actors are showing the latest advances. Hand in hand with ICEX, inside the Spain Trade and Investment space in booth 1611, Gradiant is showing in the States UAS technologies and their own developments in life detection technologies. As Iago Gómez, head of UAS at Gradiant, explains “taking part in this event one more time is essential to validate and show our innovation and development work with drones, our goal is to give companies the best solutions.” At XPonential 2018, Gradiant is presenting the challenges and applications of intelligent video analysis technologies for UAS Marine Surveillance From UAV “The technologies our team is showing at XPonential been developed and validated by both, national and international companies and prove Gradiant’s innovation skills in such a competitive industry like unmanned aerial vehicles. Being present at such an event for the third consecutive year is an important recognition to the quality of our work, in addition to as well as the confirmation of mature state of our technologies in an exceptional international space,” adds José A. Rodríguez Artolazábal, head of Video Analytics at Gradiant. At XPonential 2018, Gradiant is presenting, in one of the poster sessions, the challenges and applications of intelligent video analysis technologies for UAS. Highlighting marine surveillance from a UAV, as well as search and rescue and other land management applications. Drone Detecting Technologies In this international and specialized scenario, Gradiant is showcasing Counter UAS, a system that comprises a suite of technologies for unmanned vehicles threat detection, classification, tracking and neutralisation. This system, specially designed for critical infrastructure protection and a perfect match for other surveillance scenarios, is modular, scalable and decentralized. Counter-Fi detects and neutralises UAVs using WiFi as communication systems. RF Ear sensor uses signal intelligence techniques to detect drones by using its own communications link. Smart Eye is a module based on passive EO/IR sensors, able to work as both primary or secondary sensor for automatic UAVs detection, tracking and classification on fixed and moving cameras. SJam is an adaptive waveform generator for neutralising drones. Specially designed for alive victims detection, Alivetor is a new tool for first responders that allows them to find survivors in a quick and reliable way Alivetor Tool for Victim Detection Besides, Gradiant is presenting security, defense and victims detections solutions. Alivetor is a drone payload designed for the detection of victims after earthquakes and other catastrophic situations resulting in people trapped under debris. Specially designed for alive victims detection, Alivetor is a new tool for first responders that allows them to find survivors in a quick and reliable way. Designed by Gradiant, Alivetor has been awarded at European Satellite Navigation Contest (ESNC 2017). To end up the US tour, Gradiant is assisting Connect:ID 2018, one of the biggest international conferences focused on biometric technologies, next-generation secure credentials, advanced digital ID solutions, mobile ID and fintech. In this context, the Spanish technology center is showing face, voice and signature biometric authenticators for digital on boarding and KYC processes with mobile devices. Gradiant Signer Biometric Authentication Gradiant Signer, specifically designed for Samsung Galaxy Note, allows accessing and securely signing any document anywhere. The user is authenticated via Samsung Pass to get access to a confidential document and sign it with S-Pen anywhere and anytime in a secure and reliable way, since user’s signature is verified through Gradiant’ DSV technology. faceIDNN verifies user’s identity by comparing the face with the photograph in his/her ID faceIDNN verifies user’s identity by comparing the face with the photograph in his/her ID, driver’s license or passport. Using both images, the verification techniques developed by Gradiant verify in real time if they belong to the same person. selfie&sign Face Biometric Recognition Likewise, selfie&sign is a secure and easy-to-use solution for mobile biometric login. This face biometric recognition solution incorporates an advanced mechanism to avoid spoofing based on the simultaneous verification of the user’s handwritten signature. Gradiant’ experience in facial recognition has allowed developing techniques for anti-spoofing attacks, as well as guaranteeing verification even when there are changes of appearance in front of the photograph of the ID card, or the person has aged. Both, faceIDNN and selfie&sign incorporate these technological innovations, especially in dealing with the customer and digital on boarding services.
Honeywell invites attendees to ISC West 2018 and visit Honeywell’s booth #14025 from April 11 to 13 in Las Vegas, to see the latest connected home and buildings technologies. Visitors will get an early preview of Honeywell Home’s next generation security solutions –from All-in-One to Tower versions – featuring smart designs to keep users safe and connected. Dealers can experience how Honeywell’s voice, video and mobile solutions integrate with today’s connected consumer lifestyle and help create new opportunities. Honeywell will also be showcasing the Total Connect platform and Alarmnet 360, as well as new solutions across video surveillance and access control, new lines of fire alarm panels, and smoke detection devices. Now more than ever, integration and connectivity are becoming more important to home and business owners alike" Honeywell Total Connect and Alarmnet 360 “Now more than ever, integration and connectivity are becoming more important to home and business owners alike,” said Alice DeBiasio, vice president and general manager, Professional Security, Honeywell Home and Building Technologies. “With an expanding ecosystem, software advancements and innovative technologies, Honeywell is delivering solutions to connect and protect homes and buildings and optimize how people live and work. We are committed to working with our professional security dealers and helping them grow their businesses as our industry continues to evolve.” Honeywell is announcing key integrations as part of the company’s ‘Works with Honeywell’ API program Technologies on display in the booth will include: Next generation residential security platform: New product portfolio with multiple designs to meet customer needs. Product family includes the Tower, 5-inch and 7-inch panels, security hub, hybrid solution, and range of peripherals. Built on a common platform, dealers can learn one system and know them all for easy installation and support. Total Connect Remote Services: Honeywell is announcing key integrations as part of the company’s ‘Works with Honeywell’ API program. Total Connect will integrate with Chamberlain and LiftMaster MyQ smart garage door control, and now 'Works with Amazon Alexa' to give users voice control of their security system from their connected home platform of choice. Partition support with leading VISTA panels will also be on display. LTE (Long Term Evolution) Cellular Communicators: An expanded line of 4G LTE radios provide enhanced security and system longevity. MAXPRO Cloud: The next release of the connected security platform will combine video, access and intrusion for small-to-medium-sized (SMB) businesses that manage multiple sites. NetAXS 123: The next iteration of access control solution that offers increased efficiency with a faster, user-friendly design that makes it simple to install. Pro-Watch Vendor and Identity Management Portal: This latest release allows remote submission and authorization of access control credentials and privileges for third-party vendors and contractors. Performance Series: All-in-one, multi-format enabled line of DVRs, ENVRs HQA and IP Cameras offer a flexible upgrade and expansion path for small and medium video installations. equIP Series: The growing line of IP cameras includes 2MP to 12MP 4K camera models to deliver scalable high-quality video and offers an open and flexible platform for integration. Fire-Lite and Silent Knight Smoke Detection Devices: This new line offers system reliability against false alarms, and reduced installation and maintenance costs. INTEVIO Public Address: A robust and economical paging solution that supports business, institutional and industrial operation with effective voice communication. In addition, Scott Harkins, vice president and general manager of Honeywell Connected Home, will participate in the session 'Connected Home - The Future is Now' on Wednesday, April 11, at 9:45-10:45 a.m. PDT. The panel session will explore how the ‘Internet of Things’ wave is impacting the connected and smart home space, and the opportunities it presents for security dealers.
Anixter is expanding the footprint of its North American flagship distribution Center in Alsip, Illinois, with the addition of a 238,000-sq.-ft. facility, equipped with an intelligent conveyor system and voice picking technology, making it Anixter’s largest—and smartest—distribution center. With 30 to 40 percent more storage capacity and new automation technology, Alsip is expected to speed up shipments significantly to customers. “The new facility will significantly decrease our processing time,” said Orlando McGee, Executive Vice President of Global Operations. “The technology and design of this facility will enable us to move orders into the shipping network faster. Ultimately, that nets out to better service overall to our customers.” McGee estimates that Anixter will see total productivity savings of 15-25 percent. The new facility will significantly decrease our processing time" LEED-Certified Facility The facility is LEED-certified, and the new motion-activated LED lighting system is estimated to be 40 percent more energy-efficient than a standard lighting system. Additionally, the 5,500-ft. smart conveyor system, which runs only when objects are placed on it, is estimated to be 35 percent more efficient than a belt-driven system and is designed for worker safety and ease of use. “The conveyor will be positioned at the right height so that product can be pushed directly onto the conveyor without lifting, reducing injuries,” commented McGee. The conveyor will be positioned at the right height so that product can be pushed directly onto the conveyor without lifting, reducing injuries" Voice Picking Technology With Bluetooth headsets and Android devices directing them to their next pick, employees will also have their hands and eyes free, and be able to confirm vocally in their preferred language. The new voice picking technology is expected to improve efficiency and accuracy as well as worker safety. According to Anixter CEO, Bob Eck, the new Alsip facility embodies the smart building approach that Anixter champions in the marketplace. “We excel at assisting customers in laying the groundwork for smart buildings—from structured cabling to automation and lighting systems—to improve safety, productivity, space utilization and efficiency. We’ve applied our own smart building principles to Alsip, and this new facility demonstrates the quantifiable business value of the smart building approach.” Anixter’s expanded distribution center in Alsip, Illinois, is expected to open in mid-April of this year.
iotega is an innovative security and lifestyle management platform which facilitates home automation enhancements and add-ons via software apps running on additional devices Tyco Security Products, part of Johnson Controls, announces the launch of iotega, its next generation wireless security and automation platform designed to provide safer, smarter living for homes and businesses. Security And Lifestyle Management Platform iotega is an innovative security and lifestyle management platform, which is supported by Tyco Security Product’s trusted, full-featured security technology and facilitates home automation enhancements and add-ons via software apps running on additional devices. Discrete in design, iotega includes a touch keypad, as well as optional 7Wi-Fi capacitive touchscreens, wireless keypad arming stations and flexible software app compatibility. It features robust and proven PowerG wireless technology, with end to end 128- bit AES encryption as well as adaptive best path and frequency hopping technology enabling secure best in class wireless coverage. iotega offers customers the flexibility to create the security and home automation solution that works for them. Features include 2-way voice, visual verification, a proximity sensor, built-in siren, 99 user codes and support for a wide range of common wireless communication protocols such as Wi-Fi, Z-Wave Plus, PowerG, together with optional 3G and LTE communicators and well over 200 security and home automation devices. SecureNet Powers iotega With easy plug and play installation, iotega’s first integrated solution is powered by the SecureNet interactive platform and supports numerous Z-Wave devices, smart switches and plugs, thermostats, door locks and a wide range of other home automation devices. Fully integrated with security monitoring stations, the SecureNet platform offers installers a comprehensive system management portal and an iOS and Android compatible cellphone app that can be customized for brand enhancement and additional revenue opportunities. With the SecureNet app, users can remotely control security and smart automation devices that are connected to the iotega platform and end users can easily manage notifications for alarm and other system events through email and text. "To partner with a market-leader in the security space such as Tyco Security Products is tremendously exciting for SecureNet" SecureNet And iotega Direct Integration “SecureNet’s direct integration with iotega marks an exciting new relationship, creating great opportunities and new revenue streams for dealers”, said Roger Barlow, Senior Director, Product Management, Tyco Security Products. “The combination of iotega’s best-in-class security features with SecureNet’s app provides home and small businesses owners a fast, convenient way to manage and control what’s important to them by tapping into the latest scalable, secure option for connected environments." “To partner with a market-leader in the security space such as Tyco Security Products is tremendously exciting for SecureNet. We believe the combination of iotega's new, innovative security and automation platform, and SecureNet's visionary application will greatly increase consumer-adoption of security solutions and smart technology across all our vertical markets", said Andrew Wilson, CEO SecureNet. "iotega, powered by SecureNet, will directly benefit our Dealer-Partners, giving them access to professional-grade, easy-to-use security and smart automation solutions. SecureNet's unified application offers our partners branding, cost efficiencies, future proofing, and above all else, a unique and superior end-user experience.”
Tyco's exhibit will highlight integrated cyber-secure management platforms and solutions Tyco Security Products returns to ISC West in Las Vegas between April 5-7 in Booth 20005. The exhibit will highlight the integrated cyber-secure management platforms and solutions ranging from complex enterprise environments to smart, active households. These solutions provide end users with actionable intelligence and deep operational benefits far beyond traditional core security functions, allowing a comprehensive view of their operations. Robust Management Platforms And Deep Integrations “The ability to effectively analyze massive amounts of data collected from a myriad of systems found in a building into useful and comprehensive information coupled with reporting and business insights are powerful tools for decision-makers in driving efficiencies and managing risk,” said Anita Santos, Vice President of Marketing for Tyco Security Products. “Our robust management platforms and deep integrations provide our customers with the intelligence to improve security and safety but also extends far beyond that by influencing the economic and operational impact of their buildings as well.” A major highlight of ISC West 2017 is the innovative Software House iStar Ultra Video; A hand-sized solution with embedded video recording and management in a single appliance. An award candidate in the 2017 SIA New Product Showcase for innovative technology, iStar Ultra Video offers highly distributed, small site security with enterprise scalability with remote management capabilities. iStar Ultra Video offers highly distributed, small site security with enterprise scalability with remote management capabilities Also from Software House, C•CURE 9000 Visitor Management in v2.60 features a new self-service Kiosk Application which allows a visitor to look up an appointment, check in and automatically generate and assign a temporary credential with notification to the host. The latest release of C•CURE 9000 v2.60 features customisable access control workflows for efficient management of access credential requests. Complete Security Solutions Headlining the ISC West 2017 booth is the Complete Security Solution; an all-in-one solution with integrated Kantech access control, Exacq video surveillance, and DSC intrusion detection. The Complete Security Solution is the exemplification of the strength of the integrations within Tyco Security Products’ portfolio. It allows end users to manage all aspects of on-premises physical security from a single easy-to-use interface with feature-rich remote and mobile management capabilities. End users can arm and disarm the system from either the Kantech EntraPass access control user interface or the exacqVision VMS and view partition/zone status and receive push notifications for triggered alarms via 24/7 mobile apps. The DSC iotega is an innovative security and lifestyle management platform, which is supported by Tyco Security Product’s trusted, full-featured security technology and facilitates home automation enhancements and add-ons via software apps. iotega offers customers the flexibility to create the security and home automation solution that works for them. It also features robust and proven PowerG wireless technology along with 2-way voice and visual verification. With easy plug and play installation, iotega’s first integrated solution is powered by the SecureNet interactive platform and supports numerous Z-Wave devices, smart switches and plugs, thermostats, door locks and a wide range of other home automation devices. Other Product Releases Presented At The Show A transformed victor GUI for American Dynamics victor VMS and VideoEdge NVR 5.0 with enhanced Intelligent Tracking, Perimeter Protection, and License Plate Recognition (ANPR) analytics. In addition, the latest release introduces TrickleStor, a feature that allows video recorded in Illustra IP cameras’ SD cards to trickle back to the VideoEdge NVR in the event of an outage to provide cost-effective video redundancy. The latest version of Kantech's EntraPass Security Software, EntraPass v7.1, features the EntraPass Go Pass mobile application that allows card holders to use their iOS cellphone devices as an access control credential. Using the EntraPass Go Pass mobile app, cardholders can gain access to doors simply by pressing the appropriate icon of the door in the app, as they approach the door or from anywhere in the world. The EntraPass Go Install app for installers is now available for Android users. Tyco Security Products is also pleased to present a session on cyber-secure platforms as part of ISC WEST’s educational track Exacq has added critical cybersecurity features demanded by IT departments in its version 8.4 of exacqVision. The VMS supports HTTPS to encrypt the communication between supported cameras and the NVR, and users can now easily configure security certificates used by exacqVision Web Services for HTTPS communication. The Illustra Flex 2MP PTZ has 20x optical zoom with continuous auto-focus plus 10X digital zoom, providing very effective video surveillance over long distances. The new Illustra Pro 12MP Fisheye provides high quality 360° or 180° panoramic video with ultra-smooth ePTZ movements and onboard dewarping technology for distortion-corrected video streaming. Innometriks high-assurance solutions for mission critical applications including hostile outdoor environments, help customers meet the credential verification and identity authentication requirements set forth by the U.S. Government. With an open platform approach, Innometriks solutions integrate seamlessly with industry-leading PACS, including Software House C•CURE 9000. OpSec, Meet InfoSec Tyco Security Products is also pleased to present a session on cyber-secure platforms as part of ISC WEST’s educational track. “OpSec, Meet InfoSec”, presented by William Brown, Sr. Engineering Manager, Regulatory and Product Security, for Tyco Security Products, will be held on Thursday April 6, 10–11 a.m. in Room 309 and will focus on practical steps for integrators to garner an IT security buy-in for a customer project. For more information on the Tyco Security Products full portfolio and ISC West events, please visit Booth 20005.
Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution Global terrorism is on the rise. For many years, the West felt immune to these incidents, often asserting that these were problems felt only in countries with heated conflicts, such as Syria, Iraq, Israel and Nigeria. However, recent terror attacks have taken place in both Europe and the United States: Belgium, France (Paris and Nice), Orlando, various cities in Germany, Turkey, and the list goes on.The intelligence community is constantly looking for a single-point “source” to help prevent the next terror attack. However, in my experience serving as Head of Military Intelligence of the Israel Defense Forces, and through my work with the international intelligence community, I have learned that such a single source does not exist. There is no simple solution to terror prevention.Proactive And Combined ApproachBut taking a proactive approach can help the fight against terror. To be proactive, the intelligence community must create an ecosystem of information—a network of interconnected sensors that combine to provide a clearer picture of the situations that security agencies must assess to prevent attacks from happening. The intelligence community must create an ecosystem of information—a network of interconnected sensors that combine to provide a clearer picture When it comes to preventing terror, this network might include an array of sensors: signal intelligence, cyber intelligence, visual intelligence—not only from satellites—surveillance balloons, drones, special forces, human intelligence, interrogations and others. Any of these sources alone would not get the job done; combined, however, they provided a clear picture of the security landscape. Intelligence agencies collect all these single points of information and fuse them together. Almost in real-time, this fusion creates actionable intelligence for end-users (special forces, air force, any actor who can utilize the intelligence). This combining of sources we employed in my career led me to understand the power of fusion.The power of fusion is the key to effective preventative security.Global Megatrends And Demand For Convenient SecurityThere are two relevant megatrends in the world right now: Urbanisation and the rise of the megacity, which inevitably leads to rising crime rates The need to prevent terrorism With these two relevant trends, increased security has become a necessity. However, there is a misconception that increased security means increased inconvenience for people. As such, there is a need to create systems that provide the high level of security necessary in today’s world, given the aforementioned megatrends, while still maintaining the convenience and pace in our everyday lives. Biometric technology provides an answer to this. If we can quickly and securely identify individuals before they enter a building—or prevent them from doing so—many security crises can be prevented before they take place. Power Of Fusion And Multi-modal BiometricsThis is where the power of fusion comes into play. Any biometric sensor on its own – facial recognition, fingerprints, iris recognition, voice recognition—cannot provide the accuracy, speed, or ease of use needed for strong security that is also convenient for the public.Developing an effective biometric technology for secure access requires us to build a new intelligence ecosystem—a fusion of technologies that provide speed and accuracy, and are simple for the end-user. The most secure and convenient biometric technologies for identity verification must use the power of fusion. We find these types of solutions in multi-modal biometric technologies. Multi-modal biometrics allow people to move freely, yet securely, through their daily lives Multi-modal biometrics refers to a technology that combines a number of biometrics working together as a multifactor solution. This can include software that uses a fusion of biometric technologies, smartphones that require access via a fingerprint and PIN code, or access through voice and facial recognition, to name just a few. The primary advantages of such systems are the heightened levels of accuracy and security, as well as greater levels of accessibility and flexibility for users.The industry is trending towards adoption of multi-modal biometrics. This is because stand-alone biometric technologies, such as iris scanning, face recognition, fingerprinting or otherwise, are exposed to a) questions of accuracy and b) the ability for fraud to attempt to trick the system. But, by fusing a number of technologies such as face, body and voice, we can create a system that is highly accurate. In cases in which in-motion identification is part of the technology, a user may not even be required to stop for identification. This fusion of sensors allows us to identify a person in real-time, with high accuracy and speed. By employing the power of fusion, neither security nor convenience need be compromised. Adoption And Real World Use Of Multi-modal Biometrics The use of multi-modal biometrics is expanding, and is being sought after by some of the largest companies in the world to secure facilities. Market research firm Technavio predicts that the global advanced authentication market (multi-factor and biometrics solutions) will experience a CAGR of 17 percent between 2016 and 2020. Lead analyst Amrita Choudhury commented that threats in the realm of digital security in retail, healthcare and the banking and financial services industry are driving companies toward multi-modal biometrics. According to Choudhury, multi-modal biometrics will likely gain widespread acceptance over the next four years. The use of multi-modal biometrics is expanding, and is being sought after by some of the largest companies in the world to secure facilities While we often see multi-modal biometrics in homeland security, military and law enforcement applications, more often, these technologies are being deployed for consumers. For example, certain smartphones, such as the Samsung Galaxy 5S, utilize face and voice biometrics for greater authentication accuracy. We can also see these technologies in banking apps and cloud platforms focused on the enterprise security market.However, multi-modal biometrics are certainly not limited to the digital/cyber realm. In fact, physical locations – buildings, healthcare facilities, corporations, schools and universities, stadiums and airports could all benefit from more secure and more convenient access made possible by multi-modal biometrics.We live in a world in which we contend with new threats created by rising crime and terror. By applying the power of fusion to physical secure access technologies, we can increase the level of security that is necessary without feeling that we live in a police state. Multi-modal biometrics allow people to move freely, yet securely, through their daily lives, providing access to those we recognize, and allowing the power of fusion to prevent access to those who are unfamiliar. In this way, we can practice proactive preventative security without encroaching on the pace of life.
Deploying audio solutions would flag incidents not caught on camera With the increasing number of campus shootings and lockdowns, security is a top priority for schools. Decision-makers are looking to repair the inefficient security measures on campuses by either upgrading their current systems or installing state-of-the-art technologies to enhance situational awareness. Traditionally, security personnel have relied on video as the primary method of monitoring. However, this strategy is outdated, similar to how watching silent movies is now obsolete. A security team who solely uses video to evaluate a situation is left with data that is limited and many times inconclusive. Only with the integration of audio into existing security systems is a security officer able to fully understand the gravity of a situation and be better equipped to respond to the danger. Many leaders in the education sector have begun to emphasize the importance of adopting audio in monitoring programs and security protocols including Guy Grace. Grace is an industry veteran with over 31 years of security experience. He is a Steering Committee Director for PASS, the Partner Alliance for Safer Schools, as well as the Director of Security & Emergency Preparedness for Littleton Public Schools. “Sound and sight are the new dynamics in school surveillance so to say,” Grace said. “I look at it as we need both.” The security director also affirmed that audio monitoring, especially when conducted through two-way solutions, is a great tool to provide accountability. “All of your first customer service interaction between your office staff and your visitors starts there at that intercom. Sometimes in very rare situations, it can get volatile,” Grace explained. “So it’s good to have, for those types of situations, the ability to hear and record what’s going on at your key customer service points.” Benefits Of Audio On Campus When audio is paired with video, security needs are met and additional evidence is gained. Integrating microphones with cameras gives staff access to more details about a suspect or scene. Voices, names, languages spoken and directives are just a few examples of what information can be aggregated. This additional data is crucial for first responders as they assess the suspect’s intentions and threat level. When audio is paired with video, security needs are met and additional evidence is gained Video cameras are effective surveillance tools, but they are not able to capture everything. A small school may only have a few cameras installed throughout their grounds, creating surveillance blind spots for select buildings or areas. Meanwhile, a large entity, such as the Los Angeles Unified School District, which has over 900 schools, has hundreds of cameras. These cameras cannot be monitored at all times. In both cases, deploying audio solutions would automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Dissuading Young Offenders Beyond detection, audio monitoring creates opportunities for prevention. In a situation where a rowdy teen walks onto school property after hours, a two-way audio unit allows security to speak to an individual remotely in real-time. Having the ability to communicate in real-time can be a powerful warning that dissuades a trespasser from vandalising the property or committing other offences. Conflict Resolution Conflict resolution is another key benefit of audio monitoring. Bullying is one of the most prevalent issues concerning school communities today. According to the National Center for Education Statistics, about 22 percent of students ages 12-18 reported being bullied at school. Installing microphones at a school’s key traffic or interaction points provides accountability by documenting what is said, which can then be used to resolve disputes or placate verbally hostile individuals. Audio Analytics For Aggression Detection In addition to audio monitoring equipment, school administrators should also consider deploying audio analytics solutions. Specifically, aggression and gunshot detection are some of the best security tools in the campus security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. Aggression detectors are capable of accurately recognizing duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. "Audio analytics solutions are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security" A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. Audio Monitoring: Privacy Best Practices The benefits of integrating audio monitoring and sound detection into a school security solution are clear, but before any administration implements these systems, they need to understand the correlation between monitoring and privacy. The federal law indicates that when there is no expectation of privacy, such as in a public place, monitoring is supported. What school administrations need to focus on as they deploy surveillance solutions, is removing the expectation of privacy. Here are few best practices. Post clearly visible signage stating that audio and video surveillance are taking place on the premises. Typical places for mounting these signs can include school fences, main entrances and the main office. Notify students that the school is under surveillance by stating it in the student code of conduct. This increases awareness and reduces a school’s liability should an individual claim he or she did not see a sign on campus. Remind school staff of the purpose of the monitoring equipment. Reiterate that security personnel will only use audio to investigate and resolve wrongdoings so as to enhance the safety of staff and students. Conclusion Audio monitoring is quickly gaining attention in the education sector. It is a technology that is a cost-effective add-on to an existing system, making it an affordable solution. Moreover, audio yields a high return on investment, and for that reason, we will likely see schools across the country continue to adopt it.
Voice biometrics is fast becoming a security imperative due to increasing instances of fraud and identity theft. From identifying customers at banks and call centers to securing mobile devices in a “bring your own device” world, the use of a person’s unique “voiceprint” is fast gaining ground as an identifier. The global voice biometrics market is expected to reach $4.7 billion (U.S.) by 2020. Much of it is being driven by the increasing need to improve security levels in industries such as banking, retail, defense and health care. AGNITiO’s Voice Biometric Solution “The main push has been the need to have secure and friendly authentication procedures,” explains Emilio Martínez, CEO and chairman of voice biometrics provider AGNITiO. “We cannot continue torturing our customers by using long passwords. This cannot be the future.” Founded in 2004, the Spanish company developed a Speaker Recognition Engine that is able to filter the unique characteristics that the vocal tract imprints on the voice’s sound waves. As a dynamic biometric, the voice print can be stored on a computer server and used in the authentication process. It becomes very much like a password that can be revoked and changed to increase security. Voice Biometric Applications AGNITiO worked mainly with government agencies in developing security applications for mission-critical operations in more than 35 countries. The application has been deployed by police, intelligence agencies, and courts where it is used to prevent crime, identify criminals and provide evidence in court. Now voice biometrics has begun to move out of the public space into commercial applications. “The technology is safe enough to be used in authentication,” he explains. “The main application that we have seen so far has been in government and the next step was in call centers.” "The main push has been the need to have secure and friendly authentication procedures", says Emilio Martinez, CEO and Chairman, AGNITiO After its success in government, the technology is now being deployed in financial services and in call centers where customers must be identified during a phone conversation. Typically, authentication has involved asking a series of questions based on public records that assumingly only the caller can answer. Yet, fraudsters may know more about these authentication factors than the real person. Preventing call center fraud has typically taken two different paths. One requires that each caller establish his or her identity through a strong authentication process. “The other way, which is how some of our partners are using voice biometrics, [is based on collecting voices of] those who commit fraud,” says Martínez. They create a “black list” of identified fraudsters, and use their voice prints to identify them in real time while they’re still on the phone. “So you don’t have to bother the one million good customers,” he adds. Multifactor Authentication Process Voice biometrics is becoming one part of a multifactor authentication process. This approach is gaining ground in the area of mobile devices, especially in corporate settings where workers are using their own smartphones and tablets, according to Martínez. “When you talk about ‘bring your own device,’ there are multiple problems security-wise that you have to solve,” he observes. “How do you protect that device and separate your own applications from the business’s applications? What happens when you enter the building? Perhaps you cannot access some of the applications depending on your location and how the system works.” Yet, all the layers of protection are useless if the wrong person gains control of the device. A vital aspect of security then becomes making sure the right person is using the device. Voice biometrics then becomes one part of the multifactor authentication process, which can be used depending on the needs of the employee and the particular environment in which he or she is working. Using a voice ID would not work in a noisy room where many people are present. Yet, it might be the authentication of choice at home or when gloves or dirty hands make fingerprint verification problematic. Future Of Voice Authentication Martínez predicts that in the coming years voice biometrics will become increasingly secure and efficient at the device level. Eventually, all mobile devices will incorporate some kind of embedded voice recognition technology as part of multifactor authentication. Call center customers will also see a greatly increased level of service and speed in which authentication will take place through normal speech.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalized service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client Data Storage And Backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data center in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric Circles Of Security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the center of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data center(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorized badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-ton truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data Security Process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorization Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behavior and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analyzing Body Recognition Factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognizing the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analyzed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognized. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behavior and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognize people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorized to be a passenger in their car (to identify possible car-jacking scenarios).
One of the world’s most famous hotel-chains, DoubleTree by Hilton, part of Hilton Worldwide, has selected a high-performance fire system from Advanced Fire Systems Inc. at their eight-story, 366 room hotel in Boston, Massachusetts. The challenge was to replace an existing system, integrate speakers to all guest rooms and ensure that all audio messages and strobes were fully synchronized across the hotel, in the event of a fire situation, without the need for costly re-wiring. Advanced Audio System The Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync" An Advanced audio system was specified by the stylish, four-star, DoubleTree by Hilton Boston North Shore as it met regulatory requirements for the low frequency 520 Hz warning tones necessary for the sleeping areas of the hotel and its award-winning emergency communications system, PerfectSync, synchronized tones and digital messages to ensure compliance with local codes. Christopher Whitmarsh, President at Hayden Systems, Inc., commented: “I was confident that the Advanced equipment could meet the application requirements based on my knowledge and experience with the equipment. In this case, the Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync, ensuring the hotel adhered to strict guidelines. The system integrated seamlessly into the fabric of the building and provided the client with a solution that met their needs as well as satisfying the rigorous demands of the local fire authority.” PerfectSync Emergency Communications System PerfectSync automatically synchronises audio, voice and strobe signals across Advanced’s Axis AX fire alarm networks dynamically, as conditions change. Synchronization of audio and visual signals across multiple notification zones, floors & areas, prevents confusion in an emergency situation and aids in meeting intelligibility standards. Using high performance, distributed, digital amplifiers that come standard with an integral backup amplifier and power source, should a fire spread to an adjacent floor or area, audio and visual indicators come on immediately, and the audio messages will quickly synchronize with any identical audio message on the system. Advanced’s Axis AX Fire Alarm System Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format, offering a vast range of configurations, control and interface options all with simple set-up and operation. The Axis AX systems includes easily networked panels, audio panels and command centers, DynamixSmoke smoke control and a huge range of peripherals, devices and interfaces that make it ideal to suit almost any fire and life safety application. Advanced Fire Systems Mike Troiano, President and CEO of Advanced in the USA, said: “Advanced fire systems are specified in some of the most famous and prestigious hotels across the world and it was a pleasure to work with our customer Hayden Systems, Inc. to provide a system that will meet the rigorous standards required and ensure that the DoubleTree by Hilton’s staff and guests alike are safeguarded.” “PerfectSync insures synchronization of audio, paging and strobe signals without the need for special wiring or programming, it’s all done automatically by the Axis AX system. Since its introduction in 2014, Award Winning PerfectSync has built a solid reputation with engineering firms and fire authorities alike for its ability to deliver superior performance. The end result is a technologically advanced, easy to use audio and visual communications system that improves life safety for all of the occupants of a building in an emergency situation.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control center in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
The deep learning phenomenon continues to excite the IT world, with computing power now at the level where it can be properly used in practical applications. Hikvision has been at the forefront of applying the technology in the surveillance industry and beyond. It has already released its first set of products that harness the power of artificial intelligence (AI). The concept of deep learning takes inspiration from the way the human brain works. Our brain is a very complex deep learning model. Brain neural networks are comprised of billions of interconnected neurons; deep learning simulates this structure. These multi-layer networks can collect information and perform corresponding actions according to analysis of that information.The ability of deep learning to enhance the recognition of human beings makes it a great addition to the security arsenal Reducing False Alarms In the past two years, the technology has excelled in speech recognition, computer vision, voice translation, and much more. It has even surpassed human capabilities in the areas of facial verification and image classification; hence, it has been highly regarded in the field of video surveillance for the security industry. Its ability to enhance the recognition of human beings - distinguishing them from animals, for example - makes the technology a great addition to the security arsenal. This is especially relevant in a world where false alarms account for 94%-99% of all alarms, according to police and fire service statistics. Deep Learning For Data Processing Deep learning is intrinsically different from other algorithms. The way it solves the insufficiencies of traditional algorithms is encompassed in the following aspects. The algorithmic model for deep learning has a much deeper structure than the traditional algorithms. Sometimes, the number of layers can reach over a hundred, enabling it to process large amounts of data in complex classifications. Deep learning is very similar to the human learning process and has a layer-by-layer feature-abstraction process. Each layer will have different 'weighting', and this weighting reflects on what was learnt about the images’ 'components'.The more features there are, the more accurate the recognition and classification will be Feature Classification And Recognition The higher the layer level, the more specific the components. Just like the human brain, an original signal in deep learning passes through layers of processing; next, it takes a partial understanding (shallow) to an overall abstraction (deep) where it can perceive the object. Deep learning does not require manual intervention but relies on a computer to extract features by itself. This way, it is able to extract as many features from the target as possible, including abstract features that are difficult or impossible to describe. The more features there are, the more accurate the recognition and classification will be. Some of the most direct benefits that deep learning algorithms can bring include achieving comparable or even better-than-human pattern recognition accuracy, strong anti-interference capabilities, and the ability to classify and recognize thousands of features. Conventional Surveillance Challenges Conventional surveillance systems mostly detect moving targets without further analysis. Even smart IP cameras can only map individual points on a shape one by one, making it difficult to calibrate some features (e.g. forehead or cheek), thus decreasing accuracy. For perimeter security, for example, other technologies can be (and are) used to provide more comprehensive security. But they all have their downsides. Infrared emission detectors can be ‘jumped over’ but are also prone to false alarms caused by animals. Electronic fences can be a safety hazard and are limited in certain areas. Some of these solutions can also be expensive and complicated to install.Frequent false alarms are always an issue for end-users, who need to spend time to investigate each one Identifying False Alarms Objects such as animals, leaves, or even light can cause false alarms, so being able to identify the presence of a human shape really improves the accuracy of perimeter VCA functions. Frequent false alarms are always an issue for end-users, who need to spend time to investigate each one, potentially delaying any necessary response and generally affecting efficiency. Imagine, for example, a scenario where it’s relatively quiet – a location at night where there are few cars and people around. Even here, there could be 50 false alarms in a night. Assuming it takes 2-3 minutes to check out a false alarm, and that just 3 out of the 50 warrants more attention – say 15 minutes each. A guard either needs to check the system and look back at the alert, or someone needs to be dispatched to the location and look around, checking if anyone has indeed ‘entered without permission’. In most organizations, these would need to be reported/recorded too, adding to the overall time spent on this ‘false alarm’. Increasing Recognition Accuracy Deep learning, however, makes a big difference. With a large amount of good quality data from the cameras and other sources, like the Hikvision Research Institute, and over a hundred data cleaning team members to label the video images, sample data with millions of categories within the industry have been accumulated. With this large amount of quality training data, human, vehicle, and object pattern recognition models become more and more accurate for video surveillance use. Based on a series of experiments, the recognition accuracy of solutions using the deep learning algorithm increased accuracy by 38% - applying this to the previous example, that’s a saving of nearly one hour each night. This makes deep learning technology a great advantage in a perimeter security solution, with much more accurate line crossing, intrusion, entrance and exit detection.The value of deep learning technology stretches further than traditional security Accurate Motion Detection The value of deep learning technology stretches further than traditional security. For example, tracking movement patterns of individuals can see if they are ‘loitering’ and a potential threat in the future. A threshold could be set to five metres radius of movement, or ten seconds of staying in the same place. If the person passes either threshold, an alarm could be triggered. The solution tracks the individual and compares this behaviour to a database to see if it recognizes a pattern. Another application would be in a scenario where ‘falling down’ could be a threat, like an elderly care home. If a height threshold was set at 0.5m and duration time 10 seconds, for example, the solution would be able to see a person falling down (as they go below 0.5m) and might be in trouble (if they ‘stay down’ for longer than 10 seconds). AI-Powered Deep Learning The solution uses the parameters set to compare with its database and raise an alarm. With features and benefits like these, it’s easy to see how many smart applications could be catered for by deep learning technology.Artificial intelligence has massive potential To sum up 10,000-strong R&D Centre is pushing the boundaries of surveillance solutions and bringing even more benefits to them. Artificial intelligence has massive potential, and Hikvision is always exploring new ways to apply this exciting technology throughout the security industry and beyond. Intelligent Search Hikvision deep learning solutions are available at three levels: DeepinView camera can conduct target tracking, grading and capturing when an alarm is triggered. ‘Traditional’ IP camera using a DeepinMind NVR will add the function of searching intelligently by picture, saving time on searching for targets compared with a regular NVR. DeepinView camera and a DeepinMind NVR delivers a full power solution, with the camera sending the information to the NVR, which can then analyze it. This accelerates recording and false alarm filtering.