Difference between revisions of "The Security Vision Database"
(157 intermediate revisions by 3 users not shown) | |||
Line 1: | Line 1: | ||
− | + | <!-- | |
− | |||
==Map of deployments== | ==Map of deployments== | ||
{{#ask: [[Category:Deployments]] [[City.Has Coordinates::+]] | {{#ask: [[Category:Deployments]] [[City.Has Coordinates::+]] | ||
Line 7: | Line 6: | ||
|limit=500 | |limit=500 | ||
}} | }} | ||
+ | --> | ||
+ | <div class="fast-track"> | ||
+ | <div class="card-body start-card"> | ||
+ | <h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Deployments Deployments]</h4> | ||
+ | </div> | ||
− | + | <div class="card-body dataset-card"> | |
− | + | <h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Dataset Datasets]</h4> | |
+ | </div> | ||
− | = | + | <div class="card-body inst-card"> |
− | + | <h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Institution Institutions]</h4> | |
− | + | </div> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | </div> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | <div class="fast-track"> | |
− | + | <div class="card-body prod-card"> | |
− | + | <h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Products Products]</h4> | |
− | + | </div> | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | <div class="card-body city-card"> | |
− | + | <h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:City Cities]</h4> | |
− | + | </div> | |
− | |||
− | |||
− | == | + | <div class="card-body country-card"> |
+ | <h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Country Countries]</h4> | ||
+ | </div> | ||
+ | </div> | ||
− | + | ==== '''What is the Security Vision Database?''' ==== | |
+ | The Security Vision Database is an attempt at documenting the existence of what we call "security vision" technologies accross the world. By this, we mean systems that utilize algorithmic image processing for purposes of security. Images can be visual, but also acoustic, thermal, etc. The most common technologies include for example [[Facial Recognition|facial recognition]], [[Iris Recognition|iris]] and [[Fingerprint Recognition|fingerprint recognition]], [[Object Detection|object detection]], [[Object Tracking|object tracking]], etc. These technologies are deployed for a variety of purposes: [[surveillance]], [[Crime Prevention|crime prevention]], [[Border Control|border control]], [[Health Surveillance|public health surveillance]], [[Traffic Surveillance|traffic control]], but also [[Political Surveillance|political]] or [[Labor Surveillance|labor surveillance]]. You can start browsing from any of the categories above, or use the search bar. You can also browse the dataset visually through our graph and map visualisations. | ||
− | |||
− | + | <div class="fast-track"> | |
− | + | <div class="card-body search-card"> | |
+ | <h4 class="card-title">[https://www.securityvision.io/wiki/index.php?search Search]</h4> | ||
+ | </div> | ||
− | |||
− | + | <div class="card-body dataviz-card"> | |
+ | <h4 class="card-title">[https://www.securityvision.io/viz/sv-3d-06/ Graph & Map] (↗︎)</h4> | ||
+ | </div> | ||
+ | </div> | ||
− | |||
+ | <!-- Hide "what links here", see Header Footer extension--> | ||
__NOTOC__ | __NOTOC__ | ||
+ | __NONSFOOTER__ |
Latest revision as of 16:52, 23 April 2024
What is the Security Vision Database?[edit | ]
The Security Vision Database is an attempt at documenting the existence of what we call "security vision" technologies accross the world. By this, we mean systems that utilize algorithmic image processing for purposes of security. Images can be visual, but also acoustic, thermal, etc. The most common technologies include for example facial recognition, iris and fingerprint recognition, object detection, object tracking, etc. These technologies are deployed for a variety of purposes: surveillance, crime prevention, border control, public health surveillance, traffic control, but also political or labor surveillance. You can start browsing from any of the categories above, or use the search bar. You can also browse the dataset visually through our graph and map visualisations.