The present apparatus, system and method solves the problems of the prior art by enabling substantial dissipation of an electrical energy surge coming from communications antenna which has been struck by lightning. The apparatus is for mounting to an exterior of a building at or near communications antenna also located at the exterior of the building. The apparatus is connected with incoming coaxial cables extending from exterior mounted antenna and with outgoing coaxial cables which extend from the apparatus to communications equipment housed within a communications center. The lighting strike surge travels from antenna, along the incoming coaxial cable and is redirected within the apparatus by polyphasers which trip at capacity to redirect the surge to three separate grounding bars and prevent the surge from continuing along outgoing coaxial cables leading to communications equipment thus safely dissipating surge and shielding communications equipment.
H02H 1/04 - Arrangements for preventing response to transient abnormal conditions, e.g. to lightning
H02H 3/22 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to excess voltage of short duration, e.g. lightning
H02H 9/06 - Emergency protective circuit arrangements for limiting excess current or voltage without disconnection responsive to excess voltage using spark-gap arresters
H01Q 1/50 - Structural association of antennas with earthing switches, lead-in devices or lightning protectors
H02G 13/00 - Installations of lightning conductors; Fastening thereof to supporting structure
H02H 9/04 - Emergency protective circuit arrangements for limiting excess current or voltage without disconnection responsive to excess voltage
2.
METHOD AND SYSTEM FOR ENHANCING USE OF TWO-DIMENSIONAL VIDEO ANALYTICS BY USING DEPTH DATA
Methods, systems, and techniques for enhancing use of two-dimensional (2D) video analytics by using depth data. Two-dimensional image data representing an image comprising a first object is obtained, as well as depth data of a portion of the image that includes the first object. The depth data indicates a depth of the first object. An initial 2D classification of the portion of the image is generated using the 2D image data without using the depth data. The initial 2D classification is stored as an approved 2D classification when the initial 2D classification is determined consistent with the depth data. Additionally or alternatively, a confidence level of the initial 2D classification may be adjusted depending on whether the initial 2D classification is determined to be consistent with the depth data, or the depth data may be used with the 2D image data for classification.
A method of detecting an anomaly is provided, including dividing each frame of a video stream into a plurality of cells; in each cell formulate statistics based on metadata generated for the frame, the metadata related to presence of an object in the cell, velocity of objects in the cell, direction of motion of objects in the cell, and classification of objects in the cell; and using the formulated statistics to determine when the anomalous activity has occurred in one of the cells of the plurality of cells.
A system is provided, including: a radar sensor configured to transmit and receive a radar signal from a person; a depth camera configured to receive a depth image of the person; one or more processors communicative with memory having stored thereon computer program code configured when executed by the one or more processors to cause the one or more processors to perform a method comprising: detect the person; determine depth information relating to the person using the depth image; determine a correlation between the depth information of the person and the radar signal received from the person; and in response to the correlation not within a range of expected values, generating an alert. The depth information may be a volume or surface area of the person.
G01V 11/00 - Prospecting or detecting by methods combining techniques covered by two or more of main groups
G01S 13/86 - Combinations of radar systems with non-radar systems, e.g. sonar, direction finder
G08B 7/06 - Signalling systems according to more than one of groups ; Personal calling systems according to more than one of groups using electric transmission
Techniques for automatically detecting objects left behind. An example method includes receiving video frames of a scene from a three-dimensional (3D) camera and establishing, based on 3D depths associated with the video frames, a background of the scene. The method also includes detecting, in the frames, a foreground blob in the scene based on the foreground blob having a 3D depth that is different from the background. The method further includes detecting that the foreground blob has separated into a blob corresponding to a person and a second blob corresponding to an object, based on the person having a 3D depth that is different from the object. The method additionally includes determining that the person has been separated from the object for a threshold, and responsive to determining that the person has been separated from the object for the threshold, generating an alert indicating that the object is left behind.
A method for displaying video streams involves detecting multiple video events, and displaying multiple video streams on a display. Display windows for displayed video streams define an ordered sequence of display windows. When a new event is detected, the display of one or more of the video streams is shifted to respective next one or more display windows in an ordered sequence of display windows.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
For a mobile device with a depleted battery, an access control reader is configured to wirelessly transfer power, thereafter authorize an access request received from the mobile device, and, in response to authorizing the access request, grant access to a resource.
G07C 9/00 - Individual registration on entry or exit
G06F 1/26 - Power supply means, e.g. regulation thereof
H02J 50/10 - Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
H02J 50/80 - Circuit arrangements or systems for wireless supply or distribution of electric power involving the exchange of data, concerning supply or distribution of electric power, between transmitting devices and receiving devices
8.
METHOD AND SYSTEM FOR PERFORMING OBJECT DETECTION USING A CONVOLUTIONAL NEURAL NETWORK
Methods, systems, and techniques for performing object detection using a convolutional neural network (CNN) involve obtaining an image and then processing the image using the CNN to generate a first feature pyramid and a second feature pyramid from the first pyramid. The second pyramid includes an enhanced feature map, which is generated by combining an upsampled feature map and a feature map of the first feature pyramid that has a corresponding or lower resolution of a resolution of the enhanced feature map. The upsampled feature map is generated by upsampling a feature map of the second feature pyramid that is at a shallower position in the CNN than the enhanced feature map. The enhanced feature map is split into channel feature maps of different resolutions, with each of the channel feature maps corresponding to channels of the enhanced feature map. Object detection is performed on the channel feature maps.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and techniques for object detection and tracking are provided. A system may include a module configured to generate a plurality of region proposals, each region proposal comprising a part of a video frame, a CNN pre-trained for object detection, the plurality of region proposals being input to the CNN; a tracker for tracking one or more targets based on outputs from the CNN across the series of video frames and generating tracking information on the one or more targets; and a module further configured to refine the plurality of region proposals to be input to the CNN, based on the tracking information.
H04N 19/17 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object
H04N 21/80 - Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and techniques for redacted video exports are disclosed. Consistent with example embodiments, a bounding box may double as a redaction boundary.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 21/4722 - End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content for requesting additional data associated with the content
G08G 1/017 - Detecting movement of traffic to be counted or controlled identifying vehicles
11.
SYSTEM AND METHOD FOR IMPROVING SPEED OF SIMILARITY BASED SEARCHES
A method and system for processing images for a search is provided, including: receiving a plurality of images selected from search results; for each image in the plurality of images, retrieving a feature vector associated with the image; selecting a subset of the feature vectors based on similarity of feature vectors associated with the images in the plurality of images; and performing a search for feature vectors in a database similar to the feature vectors in the subset of feature vectors.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and techniques for performing a hash-based appearance search. A processor is used to obtain a hash vector that represents a search subject that is depicted in an image. The hash vector includes one or more hashes as a respective one or more components of the hash vector. The processor determines which one or more of the hashes satisfy a threshold criterion and which one or more of the components of the hash vector qualify as a scoring component. The one or more components that qualify correspond to a respective one or more hashes that satisfy the threshold criterion and that are represented in a scoring database that is generated based on different examples of a search target. The processor determines a score representing a similarity of the search subject to the different examples of the search target.
Tile stream selection for mobile bandwidth optimization is disclosed. Also disclosed is a method that includes storing a plurality of video tiles combinable to form a larger portion or all of a high resolution video. The method also includes processing a request to stream at least a first video tile of the video tiles. The processing includes determining a size of a first portion of a region of interest falling within the first video tile; determining whether the size of the first portion is below a threshold size; and transmitting, over at least one network, a first video stream that includes the first video tile. The first video tile is transmitted in: a first resolution when the size of the first portion is below the threshold size; and a second resolution when the size of the first portion is above the threshold size.
H04N 21/2365 - Multiplexing of several video streams
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 21/238 - Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H04W 4/18 - Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
14.
METHOD AND SYSTEM FOR TRACKING AN OBJECT-OF-INTEREST WITHOUT ANY REQUIRED TRACKING TAG THEREON
Methods, systems, and techniques for tagless tracking of an object-of-interest are disclosed. Image and non-image data are generated across a plurality of camera-specific regions, and the object-of-interest is tracked over a global map formed as a composite of these regions.
G06T 7/70 - Determining position or orientation of objects or cameras
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 13/282 - Image signal generators for generating image signals corresponding to three or more geometrical viewpoints, e.g. multi-view systems
H04N 21/80 - Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
Methods, systems, and techniques for monitoring an object-of-interest within a region involve receiving at least data from two sources monitoring a region and correlating that data to determine that an object-of-interest depicted or represented in data from one of the sources is the same object-of-interest depicted or represented in data from the other source. Metadata identifying that the object-of-interest from the two sources is the same object-of-interest is then stored for later use in, for example, object tracking.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and techniques for performing a facet search include receiving facet search commencement user input indicating that a search for a facet is to commence; in response to the facet search commencement user input, searching one or more video recordings for the facet; and displaying, on a display, facet image search results depicting the facet, wherein the facet image search results are selected from the one or more video recordings. An artificial neural network may be used for the facet search, and that network may be trained by generating a facet image training set that comprises training images, with the training images depicting a type of facet common to the training images; and training, by using the facet image training set, that neural network to classify the type of facet when a sample image comprising the type of facet is input to that network.
Methods, systems, and techniques for classifying an object-of-interest using an artificial neural network, such as a convolutional neural network. An artificial neural network receives a sample image including the object-of-interest overlaying a background and a sample background image excluding the object-of-interest and corresponding to the background overlaid by the object-of-interest. The object-of-interest is classified using the artificial neural network. The artificial neural network classifies the object-of-interest using the sample background and sample images. Prior to receiving the sample background and sample images the artificial neural network has been trained to classify the object-of-interest using training image pairs. Each of at least some of the training image pairs includes a first training image that includes a training object-of-interest overlaying a training background and a training background image excluding the training object-of-interest and corresponding to the training background.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
18.
METHOD AND SYSTEM FOR FACILITATING IDENTIFICATION OF AN OBJECT-OF-INTEREST
There are described methods and systems for facilitating identification of an object-of-interest. A face similarity score and a body similarity score of a query image relative to a gallery image are determined. A fused similarity score of the query image relative to the gallery image is determined by applying a relationship between the face similarity score, the body similarity score, and the fused similarity score. The fused similarity score is indicative of whether or not the object-of-interest and the potential object-of-interest are the same object-of-interest. For example, a machine learning process is used to fuse the face similarity score and the body similarity into the fused similarity score. The process is repeated for multiple gallery images. The gallery images may then be ranked according to their respective fused similarity scores.
G06K 9/68 - Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of reference, e.g. addressable memory
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
19.
SYSTEM AND METHOD FOR SELECTING A PART OF A VIDEO IMAGE FOR A FACE DETECTION OPERATION
A cropped bounding box selection operation is performed on a video captured by a video capture and playback system, to select one or more cropped bounding boxes from the video for processing by a face detection operation. The cropped bounding box selection operation identifies objects from the video images and assigns a ranking to each identified object based on certain priority criteria; one or more cropped bounding boxes corresponding to the objects with the highest ranking(s) are then processed by the face detection operation to detect a face in each object.
G06K 9/46 - Extraction of features or characteristics of the image
G06K 9/62 - Methods or arrangements for recognition using electronic means
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
20.
METHOD AND SYSTEM FOR INTERFACING WITH A USER TO FACILITATE AN IMAGE SEARCH FOR A PERSON-OF-INTEREST
Methods, systems, and techniques for interfacing with a user to facilitate an image search for a person-of-interest. A face thumbnail of the person-of-interest, a body thumbnail of the person-of-interest, and image search results of the person-of-interest are concurrently displayed on a display to help a user identify the person-of-interest who appears in one or more of a collection of video recordings. The user may provide feedback to the system regarding whether image search results show the person-of-interest, which feedback may be used to refine the image search results.
G06F 17/30 - Information retrieval; Database structures therefor
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
A power consuming electronics device that dissipates internal device heat via a heat sink is disclosed. The power consuming electronics device includes first and second complementary housing parts. The first housing part includes a first surface ending at a first peripheral edge, and the second housing part including a second surface ending at a second peripheral edge. The power consuming electronics device also includes a heat sink having an air exposed surface that is interposed between the first and second peripheral edges. Surface edges of the air exposed surface abut the first and second peripheral edges of the housing parts and are respectively matched therewith in shape and dimension so that an overall composite surface formed by the first and second surfaces of the housing parts and the air exposed surface of the heat sink is substantially continuous and uniform.
H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
G03B 17/55 - APPARATUS OR ARRANGEMENTS FOR TAKING PHOTOGRAPHS OR FOR PROJECTING OR VIEWING THEM; APPARATUS OR ARRANGEMENTS EMPLOYING ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ACCESSORIES THEREFOR - Details of cameras or camera bodies; Accessories therefor with provision for heating or cooling, e.g. in aircraft
G03B 5/00 - Adjustment of optical system relative to image or object surface other than for focusing of general interest for cameras, projectors or printers
A spherical camera is disclosed. The camera includes an imaging unit. A base of the camera includes a track. A spherical housing includes a first housing part for containing the imaging unit. A second housing part includes a dove tail shaped to be slidably received within the track of the base. A loop is positionable around a periphery surface of the base, the loop being tightenable from a first position wherein the spherical housing is tiltable along the track to a second position wherein the spherical housing is locked in position.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
G03B 17/55 - APPARATUS OR ARRANGEMENTS FOR TAKING PHOTOGRAPHS OR FOR PROJECTING OR VIEWING THEM; APPARATUS OR ARRANGEMENTS EMPLOYING ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ACCESSORIES THEREFOR - Details of cameras or camera bodies; Accessories therefor with provision for heating or cooling, e.g. in aircraft
A method of detecting unusual motion is provided, including: determining features occurring during a fixed time period; grouping the features into first and second subsets of the fixed time period; grouping the features in each of the first and second subsets into at least one pattern interval; and determining when an unusual event has occurred using at least one of the pattern intervals.
The present apparatus, system and method solves the problems of the prior art by enabling substantial dissipation of an electrical energy surge coming from communications antenna which has been struck by lightning. The apparatus is for mounting to an exterior of a building at or near communications antenna also located at the exterior of the building. The apparatus is connected with incoming coaxial cables extending from exterior mounted antenna and with outgoing coaxial cables which extend from the apparatus to communications equipment housed within a communications center. The lighting strike surge travels from antenna, along the incoming coaxial cable and is redirected within the apparatus by polyphasers which trip at capacity to redirect the surge to three separate grounding bars and prevent the surge from continuing along outgoing coaxial cables leading to communications equipment thus safely dissipating surge and shielding communications equipment.
H02H 1/04 - Arrangements for preventing response to transient abnormal conditions, e.g. to lightning
H02H 3/22 - Emergency protective circuit arrangements for automatic disconnection directly responsive to an undesired change from normal electric working condition, with or without subsequent reconnection responsive to excess voltage of short duration, e.g. lightning
H02H 9/06 - Emergency protective circuit arrangements for limiting excess current or voltage without disconnection responsive to excess voltage using spark-gap arresters
H01Q 1/50 - Structural association of antennas with earthing switches, lead-in devices or lightning protectors
H02G 13/00 - Installations of lightning conductors; Fastening thereof to supporting structure
H02H 9/04 - Emergency protective circuit arrangements for limiting excess current or voltage without disconnection responsive to excess voltage
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Security surveillance hardware, namely, encoders, recorders,
video analytics computer appliances; security software,
namely, user and/or operator software for controlling and
monitoring live images from security surveillance cameras on
a network and/or remotely via the Internet; security
software, namely, user and/or operator controlled software
for automated recording, storage, retrieval, enhancement and
analysis of images from security surveillance cameras;
computer software and hardware for physical and logical
identification of objects and events, operating video
surveillance and intrusion alarms; security and surveillance
processing hardware and software for analyzing video to
automatically extract, record and report information;
computerized storage systems for video, audio and analytical
information used for controlling security surveillance
equipment; computer based apparatus for remotely accessing
data; computer based apparatus for accessing data via
wireless communications networks; computer based apparatus
for accessing data via Internet communications networks;
cloud computing software for use in video surveillance
software systems; software for selecting and extracting
video clips for storage in the cloud; software for accessing
video clips in the cloud. Providing access to video surveillance systems; providing
access via telecommunications to video surveillance systems;
providing access via telecommunications to data pertaining
to video surveillance systems; providing access to video
surveillance, data and databases via wireless communications
services; electronic transmission of messages, data, alerts
and reports via fixed and mobile computers, terminals,
personal digital assistants (PDAS), smart phones and devices
enabling multiple users access to a global security
surveillance information network; transmission of audio and
video signals, namely, multiplexing video/audio data streams
together for transmission over networks for security
surveillance systems; providing access via
telecommunications to video clips stored in the cloud;
transmitting video clips to cloud based storage. Providing use of non-downloadable cloud computing software
for use in video surveillance; providing use of a web-based
non-downloadable software applications for use in video
surveillance; computer services, namely, installation,
implementation, maintenance and support in the nature of
diagnosing problems of software for security surveillance
systems; identifying and selecting video clips using
analytics; storage of video clips in the cloud. Computerized security services, namely, electronically
monitoring, detecting and reporting on suspicious and
abnormal patterns of activity.
26.
HANDLING OF EVENT NOTIFICATIONS IN NON-STANDARD FORMATS
Methods, systems, and techniques for handling of event notifications in non-standard formats. An event notification sent from an event notification sending device of a video surveillance system is received at an event notification handling device of the system. The event notification is in a format not natively supported by at least one device of the system. The event notification is translated into a format supported by the at least one device, with the supported format being defined in a list of non-standard formats. A rule associated with the event notification is applied to perform an action. Prior to receiving the event notification, an initialization method may be performed in which the event notification handling device subscribes to receive the event notification.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Methods, systems, and techniques for sharing layers between convolutional neural networks (CNNs). A data processing system may include a first and a second CNN that share a first group of layers. The first CNN may include the first group of layers in series with a second group of layers and be configured such that data for the first CNN is input to the first group of layers. The second CNN may include the first group of layers in series with a third group of layers and be configured such that data for the second CNN is also input to the first group of layers.
There is provided an appearance search system comprising one or more cameras configured to capture video of a scene, the video having images of objects. The system comprises one or more processors and memory comprising computer program code stored on the memory and configured when executed by the one or more processors to cause the one or more processors to perform a method. The method comprises identifying one or more of the objects within the images of the objects. The method further comprises implementing a learning machine configured to generate signatures of the identified objects and generate a signature of an object of interest. The system further comprises a network configured to send the images of the objects from the camera to the one or more processors. The method further comprises comparing the signatures of the identified objects with the signature of the object of interest to generate similarity scores for the identified objects, and transmitting an instruction for presenting on a display one or more of the images of the objects based on the similarity scores.
G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
G06F 15/18 - in which a program is changed according to experience gained by the computer itself during a complete run; Learning machines (adaptive control systems G05B 13/00;artificial intelligence G06N)
A method and system for controlling a passage from a secured location to an unsecured location based on presence detection of the unsecured location, including: a radar system in the secure location configured to transmit radar signals to and receive radar signals from the unsecured location; on determination of the presence, by the radar system, of a first person in the unsecured location proximate to the passage, providing an alert. The determination of the presence of the first person in the unsecured location may be triggered by a second person in the secured location moving proximate to the exit or by the second person in the secured location requesting to exit through the passage.
Wireless communication of information from an access control device to a mobile communications device is disclosed. The mobile communications device is capable of communicating with at least two transmitters. The at least two transmitters include i) a first transmitter located at a first access controlled door that transmits first BLE beacons; and a ii) second transmitter located at a second access controlled door that transmits second BLE beacons. The mobile communications device includes a Bluetooth communication module that is configured to receive a plurality of BLE beacons, including the first BLE beacons and the second BLE beacons, from the at least two transmitters at different locations on a same floor within a premises. The mobile communications device also includes a microprocessor that is configured to execute instructions to determine a location of the mobile communications device based at least in part on signal properties of the first and second BLE beacons, beacon-identifying information contained in the first and second BLE beacons, and known locations of the first and second access controlled doors. The mobile communications device also includes a display that is configured to output text or graphics to inform a device user of the location of the mobile communications device relative to at least the first and second access controlled doors.
A computer-implemented method for detecting a person in a room using a sensor, such as a radar sensor or depth cameras is provided. The method can be used to detect sleeping persons in a publically accessible location to prevent loitering. Furthermore, the method can be used to identify which rooms amongst a plurality of rooms are occupied, for example changing rooms.
A combination video surveillance system and physical deterrent device is disclosed. At least one camera module of the video surveillance system defines a first field of view and is operable to generate image data corresponding to the first field of view. A video analytics module is configured to detect a foreground visual object falling within the first field of view, classify the visual object, and determine an appearance of the visual object. A positioning module is configured to determine a physical location of the visual object. A deterrence device controller is configured to receive the determined physical location of the visual object, to control a deterrence device to be aimed at the physical location of the visual object, and to control the deterrence device to selectively emit the physical effect.
G08B 15/00 - Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
33.
METHOD, SYSTEM AND COMPUTER PROGRAM PRODUCT FOR INTERACTIVELY IDENTIFYING SAME INDIVIDUALS OR OBJECTS PRESENT IN VIDEO RECORDINGS
A method, system and computer program product for interactively identifying same individuals or objects present in video recordings is disclosed. When a thumbnail in a set of thumbnails is selected, new information is obtained. The new information may be that an individual or object is present in the portion of the video recording associated with the thumbnail. A search can be carried out for the individual or object based on the new information. The search generates new match likelihoods for each of displayed thumbnails within a user interface page. The displayed thumbnails are re-ordered based on the new match likelihoods.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
34.
SYSTEM AND METHOD FOR TRAINING OBJECT CLASSIFIER BY MACHINE LEARNING
A system and method for training a computer-implemented object classifier includes detecting a foreground visual object within a sub-region of a scene, determining a background model of the sub-region of the scene, the background model representing the sub-region when any foreground visual object is absent from that sub-region, and training the object classifier by computer-implemented machine learning using the background model of the sub-region as a negative training example.
G06F 15/18 - in which a program is changed according to experience gained by the computer itself during a complete run; Learning machines (adaptive control systems G05B 13/00;artificial intelligence G06N)
G06K 9/46 - Extraction of features or characteristics of the image
G06K 9/62 - Methods or arrangements for recognition using electronic means
G06K 9/80 - Combination of image preprocessing and recognition functions
09 - Scientific and electric apparatus and instruments
38 - Telecommunications services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Electronic video security surveillance products, namely, electronic components of security systems; security software, namely, user and/or operator software for controlling and monitoring live images from security surveillance cameras on a network and/or remotely via the internet; security software, namely, user and/or operator controlled software for automated recording, storage, retrieval, enhancement and analysis of images from security surveillance cameras; computer software and hardware for physical and logical identification of objects and events, operating video surveillance and intrusion alarms; security and surveillance processing hardware and software for analyzing video to automatically extract, record and report information; computerized storage systems for video, audio and analytical information used for controlling security surveillance equipment; computer based hardware, namely, encoders, recorders, video analytics computer appliances, and servers for remotely accessing data, accessing data via wireless communications networks, and accessing data via internet communications networks; cloud computing software for use in video surveillance software systems; software for selecting and extracting video clips for storage in the cloud; software for accessing video clips in the cloud Providing access to video surveillance systems of others; telecommunications services, namely, providing access to video surveillance equipment; providing access via telecommunications to data pertaining to video surveillance systems; providing access to video surveillance, data and databases via wireless communications services; electronic transmission of messages, data, alerts and reports via fixed and mobile computers, terminals, personal digital assistants (PDAS), smartphones and devices enabling multiple users access to a global security surveillance information network; transmission of audio and video signals, namely, multiplexing video/audio data streams together for transmission over networks for security surveillance systems; providing access via telecommunications to video clips stored in the cloud; transmitting video clips to cloud based storage Providing temporary use of non-downloadable cloud computing software for use in video surveillance; providing temporary use of web-based non-downloadable software applications for use in video surveillance; computer services, namely, installation, implementation, maintenance and support of computer software to diagnose problems for security surveillance systems; identifying and selecting video clips using analytics for others; providing temporary use of on-line non-downloadable cloud computing software for electronic storage of data Computerized security services, namely, electronically monitoring, detecting and reporting on suspicious and abnormal patterns of activity
36.
PHYSICAL SECURITY SYSTEM HAVING MULTIPLE SERVER NODES CONFIGURED TO IMPLEMENT A CONDITIONALLY TRIGGERED RULE
A physical security system having multiple server nodes may be built as a distributed network. A first node of the system detects a trigger and a second node of the system detects an input signal that affects a condition to be satisfied prior to performing an action specified by the rule in response to the trigger. A condition evaluation node collects information permitting the condition to be evaluated, and when the condition is satisfied the system performs the action. The first, second, and condition evaluation nodes comprise part of a clustered system, and the condition evaluation node and the second node may be the same.
A multi-headed camera assembly includes a base comprising a plurality of tracks, a plurality of image sensor assemblies each comprising a support mechanism configured to allow a quick and efficient assembly of a lens assembly within a housing and each removably coupled to the base by a corresponding support frame among a plurality of support frames. Each support frame comprises a guide member for guiding tilt movement of a corresponding image sensor assembly and a support base movably coupled to a corresponding track so as to accomplish pan movement of the corresponding image sensor assembly. The multi-headed camera assembly further includes a surface mount mechanism, an in-ceiling mount mechanism, or a pendant mount mechanism so that the multi-headed camera assembly can be removably mounted to a surface, mounted into a ceiling, or connected to a pendant base.
Methods, systems, and techniques for tracking and pictorially displaying locations of tracked individuals involve retrieving a location of the tracked individual and pictorially representing the location of the tracked individual on a display. The location can be acquired using a credentials acquisition device to read credentials issued to the tracked individuals. Pictorially representing the location on a display may involve showing one or both of the location and number of the tracked individuals on a map.
A physical security system may define sites associated with cameras. Sites may be added as a child site off of a parent site to form a site family. Once set up, ranked user and group privileges on the parent site may be pushed to the child sites, and controlled by the parent site. The child sites may still define local users and groups so that the child site may operate if there is a loss of connectivity to the parent site.
Methods, systems, and techniques for adjusting camera focus to facilitate infrared imaging are employed to account for a difference in wavelength between visible and infrared light to permit sharp imaging regardless of whether imaging is performed using visible or infrared light. Camera focus is adjusted in accordance with base and offset values. The base value may be determined in accordance with a curve relating focus motor position and object distance and the offset value may be manually set by the user or automatically set by performing an autofocus method when the camera is operating in low light conditions.
A pendant housing for a camera. The housing comprises a substantially cylindrical casing. The substantially cylindrical casing further includes a top end portion that may be removeably mounted to a tube without a tool, a dome structure that may house at least a lens portion of a camera, a bottom end portion that may be removeably mounted to the dome structure without a tool, and a waterproof seal positioned between the bottom end portion and the dome structure.
A video surveillance system and methods for operating that sets the timeline for multiple views of video data from different cameras to playback separately from one another or to be linked so as to synchronize their playback. Placement and selection of a playback cursor to a particular point in a timeline of master view will cause linked views to automatically move to and synchronize to the same point in their associated timelines, and when the video data is being transmitted from multiple cameras to cause the cameras displaying the linked views to update so that the video data associated with each camera is updated to the selected point in time from the linked master view. Timeline resolutions for linked views are not affected by linking or unlinking views.
H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronizing decoder's clock; Client middleware
06 - Common metals and ores; objects made of metal
09 - Scientific and electric apparatus and instruments
35 - Advertising and business services
36 - Financial, insurance and real estate services
37 - Construction and mining; installation and repair services
38 - Telecommunications services
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Metal brackets for use in connection with housings for
cameras and security equipment. Security surveillance hardware, namely, surveillance
cameras, encoders, recorders, video analytics computer
appliances; servers and power supplies; environmental
enclosures, namely, structures specially adapted to hold and
protect cameras from outside elements and tampering; optical
lenses for closed-circuit television and video surveillance;
security software, namely, user and/or operator software for
controlling and monitoring live images from security
surveillance cameras on a network and/or remotely via the
internet; security software, namely, user and/or operator
controlled software for automated recording, storage,
retrieval, enhancement and analysis of images from security
surveillance cameras; computer software and hardware for
physical and logical identification of objects and access
management, operating video surveillance and intrusion
alarms, managing visitor controls and situational awareness
event monitoring; joysticks used for controlling security
surveillance equipment; keyboards; security and surveillance
equipment for video and audio, namely, object recognition
devices, motion detectors, sound detectors, traffic
detectors, access door controllers, intrusion detectors;
security and surveillance processing hardware and software
for analyzing analog and digital video images to
automatically extract, record and report information;
computerized storage devices for video, audio and analytical
information used for controlling security surveillance
equipment; license plate recognition systems comprising
vehicle recognition devices and license plate recognition
devices; data processing apparatus; computer based apparatus
for remotely accessing data; computer based apparatus for
accessing data via wireless communications networks;
computer based apparatus for accessing data via internet
communications networks; encoded electronic integrated
circuit cards and chip card reading devices; computer
devices for reading smart cards, radio frequency
identification devices and biometric information for
monitoring security access, identification, inventory, or
physical state; encoded electronic integrated circuits
containing programming for use in controlling and monitoring
security access, identification, inventory and physical
state; radio frequency identification (RFID) credentials,
namely, cards, tags; encoded electronic chip cards and
integrated circuit cards, namely, smart cards, containing
programming used to control and monitor security access,
identification, inventory and physical state; low light
technology in the nature of low light image sensors, noise
reducing electronics, low light image processing software,
semiconductors, and printed circuit boards containing same
sold as an integral component of security surveillance
cameras and systems; analytics equipment for point-of-sales
(POS) security systems, namely, hardware and software for
analyzing digital video images to extract, record and report
information and associate that information with information
received from POS equipment; housings for cameras and
security equipment; camera mounts and enclosures; cloud
computing software for use in video surveillance and access
control software systems. Providing consumer product information and recommendations
relating to security systems namely video surveillance and
access control systems. Financial appraisal of video surveillance and access control
security systems. Installation and repair of video surveillance and access
control systems; computer services, namely, installation,
implementation, and maintenance of hardware for security
surveillance systems and access control systems. Providing access to video surveillance and access control
systems; providing access via telecommunications to video
surveillance and access control systems; providing access
via telecommunications to data pertaining to video
surveillance and access control systems; providing access to
video surveillance and access control systems, data and
databases via wireless communications services; electronic
transmission of messages, data and reports via fixed and
mobile computers, terminals, personal digital assistants
(PDAS), smartphones and devices enabling multiple users
access to a global security surveillance and access control
information network; transmission of audio and video
signals, namely, multiplexing video/audio data streams
together for transmission over networks for security
surveillance and access control systems. Training services, namely, training regarding the
installation, repair and use of security surveillance and
access control hardware, software, and systems. Custom design and engineering of security surveillance and
access control software and systems; providing temporary use
of non-downloadable cloud computing software for use in the
operation of video surveillance and access control systems;
providing temporary use of a web-based non-downloadable
software applications for use in video surveillance and
access control services, consulting services in the field of
the design and development of security surveillance systems
and access control systems; consulting services in the field
of the design and development of security surveillance
systems and access control systems; computer services,
namely, installation, implementation, maintenance and
support in the nature of diagnosing problems of software for
security surveillance systems and access control systems. Computerized security services, namely, electronically
monitoring, detecting and reporting on suspicious and
abnormal patterns of activity.
A mounting housing for a camera includes a surface contacting member and a sliding member that is slidable within an interior conduit within the surface contacting member. The surface contacting member has a back end that is located behind a mounting surface when the mounting housing is mounted and a front end, connected to the back end, that is located in front of the mounting surface when the mounting housing is mounted. A spring is pivotably coupled to and extends outwardly from the back end, and the spring is pivotable to apply force on to a back side of the mounting surface when the mounting housing is mounted. The sliding member is slidable along the interior conduit between mounted and un-mounted positions. The sliding member is lockable in the mounted position to bias the spring against the mounting surface when the mounting housing is mounted.
F16M 13/02 - Other supports for positioning apparatus or articles; Means for steadying hand-held apparatus or articles for supporting on, or attaching to, an object, e.g. tree, gate, window-frame, cycle
G03B 17/48 - APPARATUS OR ARRANGEMENTS FOR TAKING PHOTOGRAPHS OR FOR PROJECTING OR VIEWING THEM; APPARATUS OR ARRANGEMENTS EMPLOYING ANALOGOUS TECHNIQUES USING WAVES OTHER THAN OPTICAL WAVES; ACCESSORIES THEREFOR - Details of cameras or camera bodies; Accessories therefor adapted for combination with other photographic or optical apparatus
A computer implemented method for managing data received from a video source device is disclosed. At least a first storage tier and a second storage tier on a storage medium are identified for respectively storing different categories of data. As data streams are received from the video source, the data streams are associated with at least the first storage tier or the second storage tier and data from the received streams are stored in the associated storage tier. When the storage medium is full, or meets some other specified maximum capacity threshold, data is deleted beginning with data that has an age that exceeds one or more specified maximum retention times, followed by data with the oldest age from one or both of the first and second storage tiers.
A system for streaming multiple encodings of a source video stream is disclosed. A source video device system captures and/or receives source video comprising a plurality of source video frames. The source video device system encodes the source video frames into virtual frames, with each of the virtual frames being encoded using at least one different encoding parameter. The source video device system forms a container frame from the virtual frames and transmits the container frame over a network. In an example embodiment, the container frame comprises the virtual frames associated with a particular source frame and a container timestamp applicable to all of the virtual frames in the container frame.
A system for streaming multiple encodings of a source video stream is disclosed. A source video device system captures and/or receives source video comprising a plurality of source video frames. The source video device system encodes the source video frames into virtual frames, with each of the virtual frames being encoded using at least one different encoding parameter. To each virtual frame is appended virtual stream identifier which is appropriate for a selected transmission mechanism. The source video device system forms a container frame from the virtual frames and transmits the container frame over a network. Devices receiving transmissions over unreliable connections may reconstruct the transmitted streams using the synchronization headers.
A camera includes a camera housing with a housing wall demarcating the interior of the camera housing, an optical aperture and a lenslet aperture extending through the housing wall, and an opaque blocking wall adjoined to and extending inwardly from the housing wall and circumscribing the lenslet aperture; a lenslet in the lenslet aperture aligned with an on- camera light source; a lens contained within the camera housing and aligned with the optical aperture to receive light entering the camera housing through the optical aperture; an imager within the camera housing and aligned with the lens to capture light passing through the lens; and circuitry contained within the camera housing communicative with the imager and operable to operate the camera. The circuitry includes a printed circuit board that abuts the opaque blocking wall and on which is mounted a light source positioned to be circumscribed by the opaque blocking wall.
A camera that supports removable storage divided into multiple partitions is configured to write files to removable storage that is formatted into journaled and non-journaled partitions. The journaled partition uses a journaling file system and the non-journaled partition uses a non- journaling file system that is supported natively by an operating system, such as the operating system of a desktop computer. The non-journaled partition has stored on it computer program code executable by a processor to use the operating system to access files stored on the journaled partition. The camera may also be configured to partition the removable storage into the journaled and non-journaled partitions. The camera writes data to the journaled partition. This permits the processor to access the files stored on the journaled partition by the camera even if the operating system does not natively support the journaled partition.
H04N 5/335 - Transforming light or analogous information into electric information using solid-state image sensors [SSIS]
G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
G06F 17/30 - Information retrieval; Database structures therefor
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
A ceiling mount for a security camera includes a back end located in a ceiling space when the ceiling mount is mounted, a front end located below the ceiling when the ceiling mount is mounted, and a spring-loaded clamp to clamp the ceiling mount to the ceiling. The spring-loaded clamp includes a spring connected to a force application member. The clamp can be locked in a loaded state before the mounting process begins. When in the loaded state the spring in the clamp is sufficiently deflected to allow the ceiling to pass between the front end and the force application member. During mounting, once the back end has been pushed into the ceiling space the clamp can be released from the loaded state, which allows the spring to push the force application member against the ceiling and secure the ceiling mount to the ceiling.
A security camera includes a camera head and a cable assembly with an integrated processing module. The camera head contains a lens and an image sensor, while the processing module contains image processing circuitry for processing images obtained using the image sensor and power circuitry used to power the image processing circuitry and the camera head. A cable connects the camera head and the processing module. The processing module is sized to fit through an aperture in a mounting surface that can be covered by the camera head when the camera head is mounted to the mounting surface, which facilitates ease of installation.
G08B 13/196 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
H04N 5/30 - Transforming light or analogous information into electric information
H04N 7/18 - Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
52.
IMAGING APPARATUS WITH SCENE ADAPTIVE AUTO EXPOSURE COMPENSATION
A method adjusts an auto exposure target in an auto-exposure operation on a sequence of images, such as a sequence of infrared images. The method comprises: obtaining a histogram of at least one of the images; applying a weighted histogram table to the histogram to obtain weighted histogram bins wherein at least some bins in the histogram containing saturated pixels are assigned a higher weighting value and at least some bins in the histogram containing unsaturated pixels are assigned a lower weighting value, and summing the weighted histogram bins to obtain a saturation score and decreasing an auto exposure target for an auto exposure operation when the saturation score exceeds a first threshold value, and increasing the auto-exposure target when the saturation score is below the first threshold value and the image is underexposed.
A method for generating an infrared (IR) beam for illuminating a scene to be imaged comprises providing at least two IR emitters, including a first IR emitter operable to emit a wide beam component of the IR beam, and a second IR emitter operable to emit a narrow beam component of the IR beam, wherein the wide beam component has a linear profile that has a lower standard deviation than a linear profile of the narrow beam component. The method also comprises selecting a desired linear profile for the IR beam, and selecting a power ratio of power directed to the first IR emitter and power directed to the second IR emitter that produces the IR beam with the desired linear profile when the narrow beam component and wide beam component are combined; and directing power to the first and second IR emitters at the selected power ratio to generate the wide and narrow beam components, and combining the generated wide and narrow beam components to produce the IR beam.
G08B 13/181 - Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems
The present disclosure is directed at a security camera having dual communication ports. The camera includes a camera body mountable to a mounting surface and comprising an aperture, a lens, an imager, primary communication circuitry comprising a primary communication port accessible from outside the camera body, secondary communication circuitry comprising a secondary communication port accessible from outside the camera body, and control and processing circuitry communicatively coupled to the imager and to the primary and secondary communication circuitry. The primary communication port is on one side of the mounting when the camera body is mounted and the secondary communication port and the aperture are on an opposing side of the mounting surface when the camera body is mounted. A digital communication signal is sent to the secondary communication port when the secondary communication port is coupled to an active link.
A physical security system having multiple server nodes may be built as a distributed network. To send data between the nodes in the network, a first node may access a node identifier identifying a second node, with both the first and second nodes forming at least part of a server cluster, and the first node may then send the data to the second node. The node identifier forms at least part of cluster membership information identifying all and accessible by all server nodes in that server cluster. Functionality such as the ability to share views between system users and the ability for those users to control an unattended display may be implemented on a distributed network, a federated network, or another type of network.
A video system (100) for intelligent visual display includes a video camera (110) having an imager (115) that produces a first set of image data (400) representing an image of a scene. Video analytics (120) receive and analyze the first set of image data to track an object. The video analytics generate metadata (410) synchronized to the first set of image data and representing location information of an image of the object in the image of the scene. A display management module (340) receives the first set of image data and the metadata to derive from the first set of image data a second set of image data (420) representing a cropped close-up image of the object. The second set of image data is distinct from the first set of image data to enable separate display presentation of the cropped close-up image and the image of the scene.
09 - Scientific and electric apparatus and instruments
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Security surveillance hardware, namely surveillance cameras; environmental enclosures, namely, structures to hold and protect cameras from outdoor elements and tampering; optical lenses for closed circuit television and video surveillance; security software, namely user and operator software for control and monitoring of live images from security surveillance cameras both on a local area network and remotely from the Internet and software for automated recording, storage, retrieval and enhancement of images from security surveillance cameras. (1) Installation and repair of security systems; custom design and engineering of closed circuit television security systems; electronic monitoring services for security, namely, closed circuit television and video surveillance monitoring, surveillance image analysis and surveillance image processing; security consulting services, namely, closed circuit television and video surveillance system appraisals and recommendations.
Video analytics and a mass storage unit are contained in a camera housing of a video camera. The video analytics analyzes video data produced by the video camera and detects whether there is an occurrence of a defined event of interest. Video data stored in the mass storage unit include video data of different qualities that represent the occurrence and nonoccurrence in a field of view of the video camera of the defined event of interest detected. Storing video data of different qualities reduces system storage capacity demands. A storage buffer and a hard-disk drive store the video data. A total hard-disk drive storage time spent transferring to and storing a portion of the video data in the hard-disk drive is substantially less than a total buffer storage time spent storing the video data in the storage buffer. This storage time allocation extends the operational lifetime of the hard-disk drive.
A camera system (100) comprises an image capturing device (102), object detection module (204), object tracking module (206), and match classifier (218). The object detection module (204) receives image data and detects objects appearing in one or more of the images. The object tracking module (206) temporally associates instances of a first object detected in a first group of the images. The first object has a first signature representing features of the first object. The match classifier (218) matches object instances by analyzing data derived from the first signature of the first object and a second signature of a second object detected in a second image. The second signature represents features of the second object derived from the second image. The match classifier (218) determine whether the second signature matches the first signature. A training process automatically configures the match classifier (218) using a set of possible object features.
A camera system (100) comprises an image capturing device (102) and an object classification module (210) connected to the image capturing device (102). The image capturing device (102) has a field of view and produces image data representing an image of the field of view. The object classification module (210) is operable to determine whether or not an object in an image is a member of an object class. The object classification module (210) includes N decision steps (400) configured in a cascade configuration, wherein at least one of the N decision steps (400) is operable to (a) accept an object as a member of the object class, (b) reject an object as a member of the object class, and (c) call on a next step (400) to determine whether or not an object is a member of the object class.
An automated electronic video surveillance system (50) enables a high-resolution mega-pixel camera (52) to capture high quality, detailed, magnified images (76, 78) at multiple locations, simultaneously with an overview of the whole scene (70). A preferred embodiment requiring no moving parts provides full 360 degree continuous viewing (72) with up to 5x all-digital zoom capability. The system performs continuous surveillance and active resolution allocation in the form of a feedback control subsystem (80,82) that dynamically allocates resources so that important details within a scene receive appropriate scrutiny, while uninteresting areas are imaged at a lower resolution.
09 - Scientific and electric apparatus and instruments
37 - Construction and mining; installation and repair services
42 - Scientific, technological and industrial services, research and design
45 - Legal and security services; personal services for individuals.
Goods & Services
Security surveillance hardware, namely surveillance cameras; camera enclosures and housings to protect cameras from outdoor elements and tampering; optical lenses for closed circuit television and video surveillance; security software, namely user and/or operator software for control and monitoring of live images from security surveillance cameras both on a local area network and remotely from the Internet and software for automated recording, storage, retrieval and enhancement of images from security surveillance cameras. Installation and repair of closed circuit television and video surveillance systems. Design and custom engineering of closed circuit television and video surveillance systems. Security services, namely closed circuit television and video surveillance monitoring, image analysis and image processing; security consulting services, namely, closed circuit television and video surveillance system appraisals and recommendations.