According to foreign media reports, a Japanese startup called Vaak claims to have developed an artificial intelligence software that analyzes surveillance videos in stores to detect suspicious behavior involving theft and identify thieves before they "take action", thereby achieving the purpose of preventing crime.
The software is called "Vaak Eye". It is said that it can use algorithms to analyze whether people captured by surveillance video have discrete movements and behaviors suspected of theft, such as looking around or fidgeting. If the algorithm determines that someone has a high probability of shoplifting, it will send an alert to store staff through a mobile phone program to prevent crime. According to the American Fun News website, this complex algorithm deeply learns more than 100,000 hours of surveillance video, from people's faces, clothing, movements, overall behavior, to macro data such as crime rates in the area where the store is located, and even weather conditions, and analyzes more than 100 different factors related to theft to make judgments.
The Japanese IT Media website reported that Vaak Eye helped detect at least seven shoplifters in 10 days during testing. Recalling the first time Vaak Eye helped detect a shoplifting attempt, Vaak founder Ryo Tanaka said, "We have taken an important step towards a society where crime can be prevented through artificial intelligence systems." Currently, Vaak Eye is being tested in dozens of stores in the Tokyo area. Vaak plans to expand it to 100,000 stores in Japan in the next three years.
The author believes that "Vaak Eye" mainly detects and judges the actions and expressions of people, which is also the future development direction of AI , from passive prevention to active prevention. However, the application of this kind of technology is also very controversial, because the more accurate the technology is, it means that it needs to collect more comprehensive and rich data for algorithm training, and this process is offensive to users who value human rights and privacy. Whether this kind of technology can be widely popularized depends on the acceptance of the user market.
Previous article:The EU issued a code of ethics. The application of AI technology has brought benefits to the security industry.
Next article:D-Link router hacked again? This time hackers used this to hack D-Link routers!
- Popular Resources
- Popular amplifiers
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Analysis of the information security mechanism of AUTOSAR, the automotive embedded software framework
- Brief Analysis of Automotive Ethernet Test Content and Test Methods
- How haptic technology can enhance driving safety
- Let’s talk about the “Three Musketeers” of radar in autonomous driving
- Why software-defined vehicles transform cars from tools into living spaces
- How Lucid is overtaking Tesla with smaller motors
- Wi-Fi 8 specification is on the way: 2.4/5/6GHz triple-band operation
- Wi-Fi 8 specification is on the way: 2.4/5/6GHz triple-band operation
- Vietnam's chip packaging and testing business is growing, and supply-side fragmentation is splitting the market
- Vietnam's chip packaging and testing business is growing, and supply-side fragmentation is splitting the market
- EEWORLD University Hall - Five Lectures on Microwaves
- [Environmental Expert’s Smart Watch] Part 1: Long-awaited unboxing!
- [NXP Rapid IoT Review] Hello GPIO
- How to draw a plum blossom pad in AD? The plum blossom pad network is independent and does not belong to any network
- #idlemarket# Transfer a brand new STM32L433 development board
- Leakage current and withstand voltage test of single-cell lithium battery powered products
- Getting Started with I2C on MSP MCUs
- TMS320VC5509A and aic23b chip have problems collecting noise signal frequency
- TFT LCD display to set the timer
- Carbon Film Resistors Risks