Difference between revisions of "The Security Vision Database"

From Security Vision
Jump to: navigation, search
Line 34: Line 34:
 
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Country Countries]</h4>
 
<h4 class="card-title">[https://www.securityvision.io/wiki/index.php/Category:Country Countries]</h4>
 
</div>
 
</div>
 +
</div>
 +
<BR>
  
 +
<div class="fast-track">
 +
<div class="card-body dataviz-card">
 +
<h4 class="card-title">Search</h4>
 
</div>
 
</div>
  
 +
<div class="card-body account-card">
 +
<h4 class="card-title">Graph & Map</h4>
 +
</div>
 +
</div>
 
==== '''What is the Security Vision Database?''' ====  
 
==== '''What is the Security Vision Database?''' ====  
 
The Security Vision Database is an attempt at documenting the existence of what we call "security vision" technologies accross the world. By this, we mean systems that utilize algorithmic image processing for purposes of security. Images can be visual, but also acoustic, thermal, etc. The most common technologies include for example [[Facial Recognition|facial recognition]], [[Iris Recognition|iris]] and [[Fingerprint Recognition|fingerprint recognition]], [[Object Detection|object detection]], [[Object Tracking|object tracking]], etc. These technologies are deployed for a variety of purposes: [[surveillance]], [[Crime Prevention|crime prevention]], [[Border Control|border control]], [[Health Surveillance|public health surveillance]], [[Traffic Surveillance|traffic control]], but also [[Political Surveillance|political]] or [[Labor Surveillance|labor surveillance]]. You can start browsing from any of the categories above, or use the search bar. You can also browse the dataset visually through our graph and map visualisations.
 
The Security Vision Database is an attempt at documenting the existence of what we call "security vision" technologies accross the world. By this, we mean systems that utilize algorithmic image processing for purposes of security. Images can be visual, but also acoustic, thermal, etc. The most common technologies include for example [[Facial Recognition|facial recognition]], [[Iris Recognition|iris]] and [[Fingerprint Recognition|fingerprint recognition]], [[Object Detection|object detection]], [[Object Tracking|object tracking]], etc. These technologies are deployed for a variety of purposes: [[surveillance]], [[Crime Prevention|crime prevention]], [[Border Control|border control]], [[Health Surveillance|public health surveillance]], [[Traffic Surveillance|traffic control]], but also [[Political Surveillance|political]] or [[Labor Surveillance|labor surveillance]]. You can start browsing from any of the categories above, or use the search bar. You can also browse the dataset visually through our graph and map visualisations.

Revision as of 11:13, 23 April 2024


Search

What is the Security Vision Database?[edit | ]

The Security Vision Database is an attempt at documenting the existence of what we call "security vision" technologies accross the world. By this, we mean systems that utilize algorithmic image processing for purposes of security. Images can be visual, but also acoustic, thermal, etc. The most common technologies include for example facial recognition, iris and fingerprint recognition, object detection, object tracking, etc. These technologies are deployed for a variety of purposes: surveillance, crime prevention, border control, public health surveillance, traffic control, but also political or labor surveillance. You can start browsing from any of the categories above, or use the search bar. You can also browse the dataset visually through our graph and map visualisations.