Mobile video is the size of a mobile phone.

Апр 27, 2024
logo11d 4 1

Mobile video the size of a mobile phone

Mobile video the size of a mobile phone

If the main strategy of your business is mobility in search of profit , and not a contemplative wait for the arrival of a carriage of jam in the distant city of N., then maintaining the momentum is tantamount to maintaining the usual comfort. Your economic and personal security actually becomes dependent on the speed of your movement through life. Previously, good physical training of personal security was sufficient. Now, with this approach, you can only sadly watch the caravans of what is still your well-being go into the distance.

The vast majority of modern security methods are based on technologies that dominate business. This is absolutely natural, since the object of protection today is understood as a person and his business, technogenic and ecological habitat. All points of appearance and travel routes, home, and business contacts come under control. Now the question arises: how can security keep up with the fast boss? How can you effectively resist attackers without overstaffing or arming yourself to the point of exhaustion?

Is it possible to transfer all the experience of security activities to the environment of new technologies? Of course yes. They carry it as best they can. Although the desire to keep up sometimes leads to interesting results. The most recognized and capacious information is visual; everything else is important additions. Therefore, let’s try to trace the development processes using the example of modern digital video surveillance.

As soon as the possibility of processing video signals in real time arose, the first examples of new security equipment appeared. Methods of digital filtering, motion analysis, pattern recognition or targeting were immediately adopted. These tasks were solved using available components and available hardware. Moreover, the needs were so great, and the prospects seemed so tempting, that the fastest possible implementation of ideas was put at the forefront. It is clear that using standard tools, especially personal computers, was much cheaper and made it possible to accumulate accumulated experience, which was multiplied every hour by everyone — from a lone hacker to Microsoft. An extensive approach to this problem, as always, solved it only partially and at the same time gave rise to new ones.

The first thing I would like to focus on is the standard living environment of new systems. PC-based digital video surveillance is fraught with hidden dangers. It is a hundred times easier to spoil or use it to the detriment of the security system for the same reason that the developer simplified his life using familiar personal computers. This problem arises even more seriously in the light of another one, also generated by this method of development. Conventional surveillance systems are gradually being transformed into digital ones. Transmission of video images and C(complex) data via all possible communication channels is a reality. The likelihood of interception or modification increases many times over when transmitted by standard means. Now let’s imagine the dimensions of such monsters. A personal computer becomes a monster when you try to place it covertly or use it as a mobile security tool. This may be the most vulnerable spot. What is easy to see lies poorly.

Conclusion: there is a need for digital video surveillance devices, but there is an even greater need for compact devices that operate on their own algorithms and platforms. In mobile and multifunctional devices. The analogy with cell phones is complete. Will you take a “mobile phone” the size of a laptop with you? Yesterday we would have taken it, today we know how children will be born. And it’s not a matter of habit anymore, it’s just that the technology of life and business is becoming different.

The use of digital video surveillance systems is multifaceted and constantly expanding. The functional load on them is also growing. If previously the main security tool was the eye, enhanced by a video camera, then modern systems take on the functions of perimeter sensors, access control systems and approach firefighters. Mobile security deployments in general have changed incredibly, thanks to the widespread adoption of cellular telephony and satellite communications. Thus, there are more and more forms of integrated security and video surveillance systems. It is natural to want to unify these complexes and obtain equipment that can meet all requirements. Let's try to classify existing visual control systems. Of course, this classification is to a certain extent arbitrary, and the given names overlap, but it will help to understand the direction of development.

So, SBV (visual) K (control) can be divided into: stationary, temporary, covert, mobile and distributed. Let us remember that we are talking only about digital systems. Stationary VK complexes are quite widely represented on the Russian market and, as a rule, are based on controllers for high-speed input and processing of video data and software, as a rule, from a domestic manufacturer. A service that is limited only by the developer’s imagination, a constant increase in hardware computing power, plus additional capabilities of the PC itself are the undoubted advantages of such complexes. And we, in fact, already presented their disadvantages at the very beginning. And if intercepting and changing data is a matter of their further modernization, then stationarity is the main drawback, because in other groups such complexes are only partially applicable.

Temporary, secretive, mobile and distributedvideo surveillance systems have one feature that unites them all — a compact and multifunctional device should be chosen as the elementary building cell. Compactness means speed of deployment, low consumption, discreet operation, ease of installation and low cost. Multifunctionality means maintaining the main advantages of stationary systems: remote control, processing and compression of video signals. algorithmized motion detectors, telemetry reception and transmission, pattern recognition, integration into distributed computer networks. Again, a comparison with cellular telephony arises — if the basis of the SBVK is GSM9001800 video data transmission channel, then the size and power consumption of such equipment should be compared with transmission devices, that is, a mobile phone. And such a comparison of dimensions at the present stage will be advantageous for any use case.

The emergence of inexpensive and high-performance processors (RISC group TMS, Hitachi, Motorola and media group Sharp, Philips, Matsushita, etc.), which are capable of compressing and processing video data in real time using MPEG-like algorithms, makes it possible to create mobile devices for analyzing and transmitting video. Compression of up to 15 — 20 kBit/s guarantees transmission over narrowband channels of up to 15 frames per second b/w and up to 10 frames of color images. Remote control allows you to scale the image, thin it out in time and adjust it to maintain either image quality or motion dynamics. A significant advantage is the presence of built-in video motion detectors in the devices, which dramatically expands the capabilities of the systems. Possessing built-in memory, they become capable of secretly, without activating transmission, taking pictures of all violations with fairly high quality in JPEG format and storing them for as long as desired. The use of a compact PCMCIA disk actually transforms the device into a small video recorder, the size of a cigarette pack — for example, a bookmark for four video sources with a storage time of up to 1 month. In addition, it is always possible to activate the transmission of live, recorded video data at the right time or select the photographs taken by time. Moreover, activation can occur via almost any available communication channels: telephone, satellite, cellular or radio channels. Both the security service and the device itself can initiate the transfer, notifying about any violations that have occurred. It is important that access to such transmitters or recorders can be obtained from anywhere, but only to a sharply limited circle of persons authorized in the unauthorized access system. With this approach, the scope of application of security systems is greatly expanded.

Their geometry of success is based on new patterns of use in security activities. We can only outline some of the application options based on the mobility of compact video processing and transmission tools. Each such option implies the use of all the listed advantages of security video modems: rapid deployment of secretive distributed security complexes, bookmarks with the service of a computer complex, use in domestic conditions for organizing inexpensive security of residential premises, transfer of important information in any conditions, car security, remote control of objects, warning and remote reconnaissance of the area.

Мы используем cookie-файлы для наилучшего представления нашего сайта. Продолжая использовать этот сайт, вы соглашаетесь с использованием cookie-файлов.
Принять