Autonomy's Intelligent Scene Analysis System (iSAS) provides video analytics that enable you to identify items, objects, and events within a video. The solution helps users of any CCTV system detect important activity that may indicate a potential threat, an illegal action, or a situation where help is required. The system can be trained to detect virtually any type of scene that an organization would like to detect.
Autonomy iSAS integrates with new or existing CCTV installations and can be used retrospectively. A straightforward interface eliminates the need for training. iSAS can be configured to help an organization detect a suspicious scene. For example, a single system could simply alarm a user, play a pre-recorded message over a loud speaker, or begin the recording of images (pre-recording is also an option). Another example, in multi-level systems, such as town centers, iSAS can be configured to send live, suspicious images to an operator's master unit. As well as holding a full set of suspicious image management options, the operator can also continue the training of each system to improve overall performance.
Industry statistics show that up to 85 percent of on-screen information is lost within 15 minutes of the system operator being logged on. Additionally, most CCTV systems are less than 30 percent efficient. Autonomy iSAS takes up a high percentage of this loss to dramatically improve the efficiency of any CCTV system. The system identifies specific or potential incidents to operators for verification, action, or both.
Some examples of suspicious events include:
A person entering or exiting a restricted area
A vehicle moving in an unauthorized direction or lane
An abandoned item
A traffic accident
A person loitering or running
A vehicle moving too fast or in a dangerous manner
Autonomy iSAS can be applied to any new or existing CCTV system and can be trained by any proficient system operator, without requiring specialist input from Autonomy. iSAS adds a new dimension to the application of CCTV, whether on motorways, or in town centers, airports, stadiums, or train and bus stations.
Forthcoming Events for Intelligent Scene Analysis
Archived Events for Intelligent Scene Analysis
There do not seem to be any upcoming events related to this page at the moment, please visit our seminar and webinar pages for more information.
Summary: ...and departments. There have been many specific instances where Autonomy’s technology has proved invaluable to Cheshire Constabulary. The Operational Policing department recently resolved an incident that involved a series of abandoned 999 calls which were tying up police resources. The department was...
Summary: ...were realized in the district of Colmschate; and at the moment there is a new housing development being built, called the Vijfhoek (meaning pentagon). Furthermore the town council has started with an urban renewal program concerning the edge of the town centre, known as the ring of canals-project. The...
Summary: ...technology. By building up a conceptua understanding of the meaning within data, IDOL can understand the links between separate pieces of information and present them as conceptually related – even if there are no shared keywords. More in hope than expectation I typed in ‘Presumption against retrospective...
Summary: ...HP Autonomy and Inpute delivers automated Document Capture Solution to An Post. The solution After reviewing many potential vendors, An Post selected Inpute Technologies to implement a POD solution. According to Damian O’Toole, IT Manager, Mail, An Post, “We were one of the first to introduce a document...
Summary: ...training schedules—all from within the portal. “We have more than 350 active dealers that sell our products. If they need information on our products, sales training, technical support information from our knowledge base, or where to watch a training Webinar, they can now access all of this information...
Summary: ...voice files in a much more efficient way. The categorization helps us grade much more quickly and efficiently,” said Rhonda Chatman, Quality Assurance and Training Manager for PFSweb. Reduced Call Handling Time Data screen capture enables PFSweb to accomplish a number of goals: • Identify training...
Summary: ...SAP implementation in Croatia and processes between 400,000 and 500,000 invoices per year. The removal of paper handling from this process eliminates errors from lost or mismatched documents; INA now have a complete audit trail for orders and invoice payments enabling them to demonstration conformance...
Summary: ...straightforward and lent themselves to a scanning solution,” said O’Reilly. The project After an open tender process, Inpute Technologies were awarded the contract based on its ability to provide software, hardware, consultancy and training to meet the CSO’s requirements, plus Inpute’s relevant...
Summary: ...we owned, as well as support our present cases,” Martin says. The solution also needed to accommodate both paper and electronic records. “HP TRIM was the most complete fit for our needs.” Implementing the solution was straightforward. “Set up went easily,” Martin notes. HP led a training session...
Summary: ...EMC Legato ApplicationXtender Partner Binary Office, Inc, Programmed custom workflow routing Results Accelerated admissions process for nearly 20,000 applications per year. Eliminated potential for lost files. Improved service to faculty; can route package electronically with annotations “In the end,...
Summary: ...input from thousands of clinicians and participants in locations across the world. The Osteoarthritis Initiative (OAI), sponsored by the National Institutes of Health and a consortium of pharmaceutical companies, is one of the best examples of TeleForm in action for UCSF. OAI is a major four-year nationwide...
Summary: ...input from thousands of clinicians and participants in locations across the world. The Osteoarthritis Initiative (OAI), sponsored by the National Institutes of Health and a consortium of pharmaceutical companies, is one of the best examples of TeleForm in action for UCSF. OAI is a major four-year nationwide...
This is a small selection of the Autonomy case studies available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...of monitoring video feeds. Intelligent Scene Analysis System (ISAS) provides an advanced solution that helps you identify important activity such as a potential threats, illegal actions, or situations that require additional help. ISAS integrates with any new or existing CCTV installation and improves...
Summary: ...confguration HP Autonomy gives you the flexibility to set and refine your own definitions of what behavior could constitute a potential security threat and also define the precise action to be taken once a potential threat has been correctly identified. Your operators can train the system to recognize...
Summary: ...highest resolution •Analyze: Perform a variety of analytics on surveillance information including detection of suspicious objects/events, license plate recognition, and face recognition •Connect: Generate simple event alerts based on understanding CCTV content, and leverage Autonomy IDOL to identify...
Summary: ...are under 24/7 surveillance to ensure that critical client data is preserved and protected against any potential threats. The hosted data is protected by biometrically controlled doors, exterior and interior CCTV cameras, glass breaks, motion detectors, alarm panels, audible alarms, lights and silent...
Summary: ...the database, you can assign actions via a code to each license plate so that predefined instructions or actions will be followed on identification: raise barrier, change traffic lights, display LCD text, play WAV file to signal an alarm, alert supervisor via email, store image of vehicle, or increase/...
Summary: ...personal information over the phone without the customer present • Accessing restricted or unauthorized applications • Transferring of information from one application to another (Copy/Paste) The ability to interpret the meaning of all interactions also enables Autonomy ICE to recognize potential...
Summary: ...identify number plates, cross-reference them against a database, and only raise the barrier for specific vehicles. Integrated with Autonomy Intelligent Scene Analysis System, it can issue motion detection alarms when monitoring areas of restricted access and notify security personnel and police of trespassing....
Summary: ...series of workflows are automatically initiated to review and identify any potential issues. A set of messagebased tools enables one-step approval or escalation, depending on the appropriate action. All actions create an event record that is recorded and fully auditable, to demonstrate compliance and...
Summary: ...assets simply do not fit today’s multimedia world. When you try to handle rich media content independently, department by department, silos begin to develop. The sales, marketing, graphics, training, and web teams each create their own stockpile, which walls the information off on departmental servers...
Summary: ...VERS. Data centers are located around the globe to meet jurisdictional requirements, and are protected by biometrically controlled doors, exterior and interior CCTV cameras, glass break and motion detectors, alarm panels, audible alarms, lights, and silent alarms. Product Brief Cloud Based Solutions Archiving...
Summary: ...Autonomy's Top Ranked Hosted eDiscovery for Financial Institutions. The hosted data is protected by biometrically controlled doors, exterior and interior CCTV cameras, glass breaks, motion detectors, alarm panels, audible alarms, lights and silent alarms, inspiring the utmost customer confidence in its...
Summary: ...using the Results Miner • Access implicit results through the floating toolbar that can be configured with any number of sources. • Train Active Folders to do the research for you by adding sample content or entering a natural language query; active folders fetches links to relevant content from Autonomy...
This is a small selection of the Autonomy Product Briefs available, please visit our publications site at http://publications.autonomy.com/ for more information.
Summary: ...the content within an interaction made via phone, email, chat, web, or desktop application, Autonomy ICE identifies and takes action on any suspicious or potentially threatening interaction occurring within the organization. When a suspicious interaction is identified, Autonomy ICE can be configured to...
Summary: ...False-positives are items incorrectly flagged as suspicious, reducing valuable time available to investigate truly suspicious activities. Lexicon- and keyword-based monitoring methods are inherently flawed in that they only catch a percentage of the actual incriminating communications that have taken...
Summary: ...70 Type II). The data centers are under 24x7 surveillance and protected by biometrically controlled doors, exterior and interior CCTV cameras, glass break and motion detectors, alarm panels, audible alarms, lights, and silent alarms. Businesses can also choose a hybrid deployment that uses a combination...
Summary: ...your products, instant feedback from other customers and social media contacts on the quality and suitability of the item, and price comparisons with other retailers, including the potential to buy the product elsewhere more cheaply. •Scanning product information in-store for home delivery. Rather than...
Summary: ...Establishing a best practice enterprise classification scheme (US English). Where the records have a short retention period (3–7 years), the simplest conversion strategy is to manage parallel systems, with little or no retrospective conversion. Where records will remain active over 5–10 years, provided...
Summary: ...that all potentially relevant electronically stored information (ESI) be found. One can imagine that if a litigator were to search for the phrase “paint the town red,” the Boolean search engine would return not only documents relating to possible engagement of inappropriate behavior, but would also...
Summary: ...This fully automated process takes the onus off of custodians and data stewards to identify and preserve the Electronically Stored Information (ESI) that they consider to be potentially relevant, while alleviating the risk of lost or misplaced data that could accompany such a manual process.
...
Summary: ...people and processes need to be put in place, education and training programmes need to be set up to ensure that staff fully understand the risks of non-compliance and what they need to do to avoid it, and available technology needs to be exploited to support these changes. Among the plethora of potential...
Summary: ...resolution and fraud prevention. A phrase of interest can be entered along with metadata to further enhance the results by limiting items based on speaker, emotion, dates, caller ID data and duration. Ad hoc searching is also available in the active recording to examine other concepts that may be pertinent...
Summary: ...70- or “SAS70”-compliant. These data centers are under 24/7 surveillance and protected by biometrically controlled doors, exterior and interior CCTV cameras, glass break and motion detectors, alarm panels, audible alarms, lights and silent alarms. Based on a unique, split-cell architecture with grid-based...
Summary: ...blogs, datasets, bit streams, file streams, news streams, Web parts and Web pages. 10 The risks and consequences of record keeping failures, such as financial losses, brand and reputational damage or legal actions are well known and examples can be found almost daily, in any newspaper, audit report or...
Summary: ...Business white paper Why and how to choose the r.... Your IT staff can then focus on more strategic projects for your c Cloud-based data protection can also improve your support for remote offices and bran Instead of burdening your enterprise WAN or LAN, they can interact directly with the Business white...
This is a small selection of the Autonomy White Papers available, please visit our publications site at http://publications.autonomy.com/ for more information.
There do not seem to be any press releases related to this page in 2013 at the moment, please visit the news section on www.autonomy.com for the latest news.
There do not seem to be any press releases related to this page in 2011 at the moment, please visit the news section on www.autonomy.com for the latest news.