Friday, October 21, 2011

Video Analytic


Dear Friends,
Here’s a article on Video Analytic & Face Detection System. The most important thing which requires in video analytic is a Camera & regarding (IP base or Stand alone) Software.

What is Video Analytics?
Video Analytics, also known as IVS (Intelligent Video Surveillance) is a new emerging market for security allowing its users to easily monitor and secure areas with security cameras. With this new state of the art technology, businesses can easily monitor places of interest with sophisticated software that makes detecting threats or unwanted visitors simple and effective.

Intelligent Video Surveillance consists of algorithms that detect movement or changes in live and recorded video to see whether the movement or changes mean a possible threat is about to occur or occurring. These algorithms work by examining each pixel of the video and putting together all the pixel changes. If many pixels are changing in one area and that area is moving in a direction, the software considers this to be motion. Depending on the policies and alerts you have setup, you will be notified of this motion or other actions can be automatically taken by the software such as motion tracking which follows the motion until it is no longer detected.

Object Recognition
You can program the recording software to distinguish certain objects within the video feed. Should this object change, be moved or removed, the software will immediately pick up this change. 

Advanced Motion Detection/Tracking
Pick up even the slightest movement within the monitored area from any angle, and program the camera to follow these movements. The software can even be used to track speed, direction of travel and more. 

License Plate Recognition
Video analytics software can even be programmed to detect license plates and take special images of these plates for retrieval. This sort of software is commonly used in places such as gas stations and toll booths to keep a track of traffic passing through. 

Centralized Video Analytics Control
Another important element of video analytics is that all of these uses can be controlled from a central point. Video analytics software is connected to the each individual camera through a network, allowing control over any number of different feeds and cameras from a single point. It can also be used to send alerts, notices, etc. in cases of emergency.
Video analytics can be used with either digital network cameras or analog CCTV (Closed Circuit TV) cameras. However, the software requires a digital image to work with. In order to incorporate video analytics into an analog system you must first be able to convert the video feeds into a digital format. This is required in order for the software to analyze the video in such a precise way.
The increasing use of video is driving enterprises to look for better ways to manage their video platforms. One approach is to use "intelligent" video components with built-in video analytics (VA). An intelligent video surveillance platform can analyze scenes in real time for suspicious situations and immediately share the information with appropriate decision-makers. IP-based video systems can integrate with motion detection and alarm management applications so the system decides when to send video, at what frame rate and resolution, and when to alert a specific operator for monitoring and response.

Video Analytics
There are many ways to implement VA, ranging from general purpose dedicated VA systems to VA-enabled components that tackle a specific problem. Though a dedicated VA system can satisfy many pressing organizational requirements, there are drawbacks to the approach, especially when the enterprise has diverse VA goals, mixed environments and scalability requirements to satisfy
An alternative is to deploy an IP-based open systems video management platform that can support diverse "best of breed" VA components. This approach allows a company to "mix and match" VA solutions to specific needs. In addition to being more cost effective, an open systems video management platform ensures flexibility and scalability. As the VA needs of the organization change and as VA technology improves, an open video management platform ensures that the organization will be able to shift focus and keep pace with new technology
If designed wisely and used to their full potential, VA solutions can provide an ROI that surpasses many other types of video or surveillance applications.

Overview of Video Analytics
The main purpose of VA is to provide better information faster. Instead of relying solely on human scrutiny of video monitors to detect anomalies in the environment, VA software uses predefined rules and algorithms to analyze the video and extract information. These algorithms detect the outlines or edges of objects or in some cases identify the object or the pattern of its movement. VA then makes decisions about the images based on whether a preset protocol is confirmed or violated.
A standard CCTV design differs in fundamental ways from a video design that incorporates VA. In the former situation, guards interact with pan/tilt/zoom cameras that are capable of high resolution, requiring enough cameras to enable close-ups of images with enough detail to be recognizable. These cameras in the required quantities are typically very costly. The cost of such a system is increased by the number of guards that might be necessary to monitor a large number of cameras, such as would be the case for securing wide areas.
In a design using VA for wide-area surveillance, the number of cameras and guards is reduced. Fixed cameras generally cover the fence line or property boundaries and are connected to computers running VA software for detection, with a smaller number of PTZ cameras used for tracking by guards. This reduces the number of cameras, thus reducing the cost of the infrastructure. Some VA products also offer target hand-off from one PTZ to the next as the target moves from one camera’s field of view to another.
VA may also relieve the burden on the infrastructure. If the VA algorithm determines that the current video data is not of high priority, it might lower resolution to conserve bandwidth or storage space. Conversely, if the data is of high interest, it might automatically remove noise or improve resolution to enhance the image.
VA also provides capabilities that people simply cannot perform well such as counting and classifying many objects rapidly. Even when used for very complex operations such as facial recognition (comparing video images of faces against a database of criminal mug shots), many VA programs attain accuracy levels between 80 and 99 per cent.

Motion Detection and Beyond
Research indicates that people cannot remain attentive when required to monitor video for an extended period of time, especially when there are many cameras to watch. For this reason, most VA programs generate an alert when movement is detected within the camera's field of view. This motion detection capability reduces the amount of visual information that security personnel have to view at one time, allowing them to focus on more critical tasks.
At the most basic level, VA incorporates motion detection and event handling "rules" that make decisions about when to record and send video, at what frame rate and resolution, and when and whom to alert about the event. Early motion detection VA led to an unacceptable level of "false alarms," but most VA software today can be tuned to be more discerning or less discerning, depending on the asset you are protecting. Further, VA software can “learn” the scene, further reducing false alarms by understanding whether a moving object is truly an “object of interest”. If the asset is extremely costly, the system can be tuned to be more conservative. In this situation more kinds of movement will trigger an alert.

General Purpose versus Specialized Video Analytics Applications
Today VA extends far beyond motion detection. Despite many solutions that purport to be "general purpose," the most effective VA solutions are designed for a specific purpose -- such as facial recognition, behavior recognition, wide-area perimeter detection or people counting --with little overlap between applications.
Advanced analytics are currently used in defense and intelligence applications, and some of these techniques are beginning to reach the commercial market. For example, vendors are offering face recognition software that can be integrated into video surveillance systems. Other software is being developed that can recognize specific objects like weapons. And motion detection is being extended to include detection of specific activities (directional motion, atypical motion, or no motion) that might be considered suspicious in certain environments. Most of these applications are best satisfied by high specialized "best of breed" solutions.
As technology improves, the uses and capabilities of VA will expand and become even more specialized.

VA has many uses, including:
  • Motion detection and/or directional motion
  • Behavior recognition
  • Facial recognition
  • License plate recognition
  • Tracking and classifying objects
  • Smoke and fire sentries
  • Wide area perimeter security
  • Detection of objects left behind such as unattended baggage, abandoned vehicles
Common Video Analytic Methodologies
Some VA applications operate at the pixel level of an image, and within the software is an algorithm that describes the arrangement of pixels or changes within the pixels within the camera's field of view. This "pixel recognition" algorithm detects certain things or events by comparing objects in view with reference images. Others rely on pre-processing a scene at a “macro” level, to reduce the possible targets for observation, then analyzing shapes and forms and their interaction with each other.
At the other end of the VA scenario is the user. The user sets up rules that would define an “object of interest” -- specific security rules relating to the object or event. Common rules include parameters describing speed, direction, time of day, size of object, etc. When the object or event is detected by the pixel recognition algorithm that violate a rule, an alert or alarm is triggered.
For example, most perimeter security VA applications are designed to detect someone crossing a predetermined line. When a change is noted in the pixels within a camera's FOV, the VA software analyzes the difference in pixel count along with the size, location and the speed of the change. These measurements help classify the most likely cause of the change. The VA program subsequently consults its list of user-defined rules and performs a pre-specified action such as triggering an alarm or moving a camera.

Pixels on Target
The term "pixels on target" is a measurement of the number of pixels required for a given VA algorithm to be able to detect an object within an image. Some VA software can detect an intrusion with only four pixels on target, which represents a very small area of the scene. (Twelve pixels, for example, represent 1/20,000 of a scene).
Some VA solutions require only ten pixels to accurately detect and classify a human, but would require the camera’s to be much closer to the targeted area. The lower the number of "pixels on target" the farther away targets can be detected and the fewer cameras you will need. The chart below shows the pixels-on-target for a camera with a 30-degree field of view digitized at a 640x480 resolution. If 32,000 pixels-on-target are required for detection of a given object or event, the maximum distance of the target is 75 feet. If 8,000 pixels-on-target are required, 38 feet is the maximum distance. Note that algorithms that require only 8 pixels-on-target enable the same camera to detect targets at the much longer distance of 1,200 feet.



Integration Issues
Video analytics solutions are often used with other applications such as intrusion detection sensors, access control, card systems used for security purposes, and even business database software. Since any given VA application feeds into other systems, integration is a significant issue that must always be taken into account.
When deploying video analytics, it is critical to ensure that the video platform can accommodate a wide variety of hardware and software. An open systems platform designed for interoperability ensures that organizations and integrators alike will be able to select the best solution for today while retaining the flexibility to change solutions if technology or requirements change. This approach minimizes risk and future proofs the core solution to other network applications such as email servers or alarm systems.

Benefits: 

Real-Time Video Monitoring
IVS software can display live video in real time. Also in real time are alerts for security policies you setup. These alerts will notify you immediately when there is a threat. Various alerts can be setup. These include email notification SMS messaging, on-screen alerts, alarms and triggers and even contacting the proper authorities.

Improves Quality of Surveillance
With IVS software you have the ability to be notified immediately when unusual activity is detected. This allows any available personnel to react upon alerts from the IVS software.

Accurate Detection
IVS software has the ability to detect specific behaviors. This means if someone is heading towards somewhere they should not be, you will be warned. The software also has the ability to be used indoors and outdoors, even in low light situations. Imagine being able to detect a car thief trying to break into a car in your parking lot in the middle of the night.

Ease of Implementation
IVS software can be integrated with existing CCTV/Analog systems or implemented with new state of the art IP network cameras. With a wide range of compatible cameras, IVS software can be implemented in any solution using security cameras.

Decreases Labor Costs
Due to the IVS software handling all alerts from possible threats, less personnel is needed to view video. With standard video systems, someone must always be watching for unwanted visitors but with the IVS software watching for you, more video can be watched by a lower number of people. Video no longer needs to be watched by a live person 24 hours a day, 7 days a week. This decreases labor costs and increases productivity.

Conclusion
No one video analytics solution does everything. As with any technology decision, it is important to choose a solution that fulfills your organization's current requirements while providing a foundation for any and all later possible combinations of VA solutions and other technologies.

       Hope the readers will find all the above information helpful to understand the topic & clear the concept of Video Analytic.

Click the below link to download the PPT on Video Analytic.


Thanks & regards.
Jayesh Ahire.

Saturday, October 15, 2011

Effective Listening Skills



Dear Friends,
First of all i would like to thank you all for reading my blogs. And i am glad that you people found my work useful. That encouraging me to write more articles and provide more PPT's on various topics.

In this blog I am trying to provide you most of the important things. Which will help you to understand the topic and contents? The below paragraphs will help you to create your own PPT on “Effective listening Skills " So please go through it. And if still you are not able to make your own PPT. Then just click the link given below and download PPT on "Effective Listening Skills".


What is listening?

Listening and hearing are not the same.  Hearing is the first stage of listening.  Hearing occurs when your ears pick up sound waves which are then transported to your brain.  This stage is your sense of hearing.
Listening is a communication process and, to be successful, is an active process.  In other words, you must be an active participant in this communication process.  In active listening, meaning and evaluation of a message must take place before a listener can respond to a speaker.   Therefore, the listener is actively working while the speaker is talking.
How can this happen? It is simple. Our thought speed is much faster than our speech speed.  But be careful!   Don't allow the thought speed to race into daydreaming.  This habit will defeat your attempt to become an active listener.


Brief Theory of Communication:

Expressing our wants, feelings, thoughts and opinions clearly and effectively is only half of the communication process needed for interpersonal effectiveness. The other half is listening and understanding what others communicate to us. When a person decides to communicate with another person, he/she does so to fulfill a need. The person wants something, feels discomfort, and/or has feelings or thoughts about something. In deciding to communicate, the person selects the method or code which he/she believes will effectively deliver the message to the other person. The code used to send the message can be either verbal or nonverbal. When the other person receives the coded message, they go through the process of decoding or interpreting it into understanding and meaning. Effective communication exists between two people when the receiver interprets and understands the sender’s message in the same way the sender intended it.  


The Three Basic Listening Modes:

Competitive or Combative Listening happens when we are more interested in promoting our own point of view than in understanding or exploring someone else’s view. We either listen for openings to take the floor, or for flaws or weak points we can attack. As we pretend to pay attention we are impatiently waiting for an opening, or internally formulating our rebuttal and planning our devastating comeback that will destroy their argument and make us the victor.

In Passive or Attentive Listening we are genuinely interested in hearing and understanding the other person’s point of view. We are attentive and passively listen. We assume that we heard and understand correctly. But stay passive and do not verify it.

Active or Reflective Listening is the single most useful and important listening skill. In active listening we are also genuinely interested in understanding what the other person is thinking, feeling, wanting or what the message means, and we are active in checking out our understanding before we respond with our own new message. We restate or paraphrase our understanding of their message and reflect it back to the sender for verification. This verification or feedback process is what distinguishes active listening and makes it effective.
The Technique:

Active listening is really an extension of the Golden Rule. To know how to listen to someone else, think about how you would want to be listened to.
While the ideas are largely intuitive, it might take some practice to develop (or re-develop) the skills. Here’s what good listeners know — and you should, too: 

Face the speaker. Sit up straight or lean forward slightly to show your attentiveness through body language.

Maintain eye contact, to the degree that you all remain comfortable.

Minimize external distractions. Put down your book or magazines, don’t think about the things you have to do afterwards and do not answer your cell phone if not emergency & don’t reply any useless SMS.

Respond appropriately to show that you understand. Murmur (“uh-huh” and “um-hmm”) and nod. Raise your eyebrows. Say words such as “Really,” “Interesting,” as well as more direct prompts: “What did you do then?” and “What did she say?”

Focus solely on what the speaker is saying. Try not to think about what you are going to say next. The conversation will follow a logical flow after the speaker makes her point.

Minimize internal distractions. If your own thoughts keep horning in, simply let them go and continuously re-focus your attention on the speaker, much as you would during meditation.

Keep an open mind. Wait until the speaker is finished before deciding that you disagree. Try not to make assumptions about what the speaker is thinking.

Avoid letting the speaker know how you handled a similar situation. Unless they specifically ask for advice, assume they just need to talk it out.

Even if the speaker is launching a complaint against you, wait until they finish to defend yourself. The speaker will feel as though their point had been made. They won’t feel the need to repeat it, and you’ll know the whole argument before you respond. Research shows that, on average, we can hear four times faster than we can talk, so we have the ability to sort ideas as they come in…and be ready for more.

Engage yourself. Ask questions for clarification, but, once again, wait until the speaker has finished. That way, you won’t interrupt their train of thought. After you ask questions, paraphrase their point to make sure you didn’t misunderstand. Start with: “So you’re saying…”

As you work on developing your listening skills, you may feel a bit panicky when there is a natural pause in the conversation. What should you say next? Learn to settle into the silence and use it to better understand all points of view. Ironically, as your listening skills improve, so will your aptitude for conversation.


Suggestion for listening:

1. Set a purpose for listening.

What do you want to achieve?
  • Main ideas or details of the topic?
  • Improved notes?
  • Better ability to participate in discussion?
  • Staying awake during lecture?
2. Concentrate on the message by eliminating internal and external distractions.

Examples of external distraction:
  • Participants arriving late
  • noise from outside hall etc.
Examples of internal distraction:
  • concern over argument with friend from the night before
  • Worry about stack of papers on instructor desk due to be returned at end of class etc.
3. Think of questions. You may need to jot down questions.

To ask during discussion or individually.
  •    Informational Type:  "I don't understand...."
  •    Clarifying Type:  "Is is true that...?"
4. Capitalize on your faster thought speed. Use this time wisely.

Predict what will be discussed next.
  • Evaluate evidence presented.
  • Find links among topics or details.
  • Think of additional questions or comments you might make.
5. Listen for transitions. These are often specific clues to various parts of a lecture.

Introduction or Summary:
  • Today's lecture covers....
  • Today I'd like to discuss....
  • Let's look at the topic of....
  • To summarize....
  • As a review....
  • Recapping....
  • In conclusion....
Enumeration or Sequence:
  • First, second, third
  • First, next, then, finally
  • Most important, least important
  • In addition, last
Compare and Contrast:
  • similarly, both, likewise, in like manner
  • however, on the other hand, instead of, nevertheless
Cause and Effect:
  • the cause of, for this reason, because
  • as a result, results in, thus, therefore
6. Hear the speaker out.   
  • Don't jump to conclusions.
  • Don't stop listening because of an emotional response to a word or topic.
  • Don't give up because the subject is difficult.
7. Be alert for other verbal and nonverbal cues.
  • Tone of voice changes.
  • Item is written on chalkboard or overhead transparency.
  • Specific phrases may be used such as "Last semester...." or "Some students have had difficulty with this." These phrases may be cues that details will be on the test. 

Note: After reading please don’t misunderstand that, I am a intelligent guy or something. Most of the text has been adapted from the website given below. I had just brought all the useful data on 1 page and arranged it, As per sequence.The PPT is made by myself with the help of some articles.So it's possible that the above article and the PPT does not match 100%. Hope you people will like my work & will find it useful.

              http://www.elmhurst.edu
              http://www.drnadig.com

To download the PPT click the link: 

thank & regards
Jayesh Ahire.