dow: pp. 42-44 wp1: intelligent monitoring and automatic detection of threats

39
DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Upload: grace-chace

Post on 31-Mar-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

DoW: pp. 42-44

WP1: Intelligent Monitoring and Automatic Detection of Threats

Page 2: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

OutlineIntroduction

TasksDeliverablesMilestones

Discussion on Participants roles and resource allocationParticipants Roles GUT suggestions for the tasks

WP1 work organization: Conference calls, editorial tasks, reviewers, etc.

Identify partners collaborating in the other WPs close to WP1

Outline the content of the deliverables at least for the first one10:30-11:30 WP1 Session pt.110:30-11:30 WP1 Session pt.1

11:30-12:00 Coffee Break11:30-12:00 Coffee Break12:00-13:30 WP1 Session pt. 2, contd. if necessary12:00-13:30 WP1 Session pt. 2, contd. if necessary13:30-15:00 Lunch13:30-15:00 Lunch

Page 3: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Introduction

Page 4: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Task: 11. Establishing the framework of the

System for secure data gathering and transmission including:1.1. Building a prototype of the Node Station

(NS), which will be installed in various points of city agglomerations and tested in fields conditions - GUT

1.2. Central Station (CS) construction - GUT1.3. Developing a methodology for generating

scene descriptions utilizing processed audio and video signals, in conjunction with data acquired from the NSs (biometric sensors, cell phones identification, transmission scanners, monitoring devices, GPS, micro-transmitters, RFID tags) – PSI, GUT

1.4. Real-time secure data transmission to the CS and then to police mobile terminals – Apertus, Moviquity, TUKE

Page 5: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Task: 22. Analyzing, defining and integrating new

and current technologies used for image, video and voice recognition and extraction, especially for:2.1. Defining and recognizing particular audio

signals (calling for help in European languages, shooting, etc.) – PSI, TUKE, GUT

2.2. Creating algorithms for acquisition and pre-processing of audio and image signals – PSI, TUKE, INNOTEC, GUT

2.3. Implementing methods for extracting human biometric features from images - GUT, PUT

2.4. Implementing image analysis, motion tracking and object detection – FHTW, GUT

Page 6: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Deliverables D1.1 Report on the collection and analysis of user

requirements (M10) D1.2 Report on NS and CS hardware construction (M20) D1.3 Document reporting on acquired results of pilot trial

(M45) D1.4 Multimedia database documentation with analysis of

recommended algorithms (M45) D1.5 Specification of procedures for data exchange

including definition of system usage with respect to the law and police regulations (M50)

D1.6 Dissemination report (M60) D1.7 Complete documentation and manuals for all classes

of users of the system (M60) D1.8 The final version of the monitoring system with

validation report of recommendation and guidelines (M60)

Page 7: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Milestones M1.1: Completed detailed specifications for the system (M15) M1.2: Intermediary report for D1.2: (M18). M1.3: Working Node Station hardware with basic user interface

(M20) M1.4: Working Central Station hardware with basic user interface

(M20) M1.5: Intermediary report for D1.6: Scene description algorithms

(M30) M1.6: Algorithms for automatic detection of abnormal behaviour

based on audio, video and other signals (M35) M1.7: The methodology and model for data gathering (M36) M1.8: End-user Interface following the specification (M45) M1.9: Prototypes of Node Stations ready to be installed in

selected agglomerations (M50) M1.10: Completed set of documentations and manuals, published

scientific papers (M60)

Page 8: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

WP1 ScheduleM1.8

D1.3-4M45

D1.1M10

M1.1M15

M1.2M18

M1.3-4D1.2M20

M1.5M30

M1.6M35

M1.7M35

M1.9D1.5M50

M1.10D1.6,7,8M60

•user requ.

•specs

•intmed. report for

HW

•NS CS w/ GUI•hardware report

•scene descript.

•detection algor.

•data gathering

•results of pilot trial•MMDB

•user GUI

•data exch. for police•NS ready

•reports•docs,

•manuals•final

verification

T1.2M25

Page 9: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Discussion on Participants roles and resource allocation

Page 10: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats
Page 11: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

All partners explain their main contributions to WP1 per task per deliverable • Check resource allocation according to DoW • Preliminary objectives per task distribution • Identify main tasks to be done inside each task o Define a detailed work‐plan for the next three months o Identify task responsible partner o WP1 work organisation: Conference calls, editorial tasks, reviewers, etc. • Identify partners collaborating in the other WPs close to WP1 • Outline the content of the deliverables at least for the first one

Page 12: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Partners’ contributions to WP1All Partners should now explain their main

contributions to WP1 per task per deliverable

Page 13: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Initially declared Participant rolesParticipant 2 Apertus - task: 1.4Participant 20 FHTW - task: 2.4Participant 5 GUT - task 1 and 2Participant 6 INNOTEC - task: 2.2Participant 8 GHP - consulting and tool testingParticipant 9 MOVIQUITY - task 1.4Participant 10 PSI - task: 1.3, 2.1 - 2.2Participant 11 PSNI - task: 5.2 – should it be

2.2?Participant 12 PUT - role not defined in DoW?Participant 18 TUKE - task: 1.4, 2.1 - 2.2

Page 14: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

2 Apertus - task: 1.4Apertus Public Foundation for Open Training

and Distance Learningfounded by Hungarian Government,CEO, Péter Racskóhead of the IT department, Zoltan Nagy

Task 1.4 – Real-time secure data transmission to the CS and then to police mobile terminals

Task 1 Task 2

Navigate to:

Ds Ms

Page 15: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

2 Apertus - task: 1.4Discuss Participant suggestions for the task /

other tasksSpecification of the system – M1.1 – M15Report on transmission technologies,

standards and protocols aimed at secure real-time transmission - Should be ready before D1.2 – M20

The report after implementation will be used in – Data exchange procedures - D1.5 – M50

Dissemination, Documentation, Manuals, Recommendations, Guidelines – D1.68 – M60 Task 1 Task 2

Navigate to:

Ds Ms

Page 16: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

20 FHTW - task: 2.4The University of Applied Sciences

Technikum, WienProf. Dr.-Ing. Jakob Wassermann

Task 2.4 – Implementing image analysis, motion tracking and object detection

Task 1 Task 2

Navigate to:

Ds Ms

Page 17: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

20 FHTW - task: 2.4

Task 1 Task 2

Navigate to:

Ds Ms

Discuss Participant suggestions for the task / other tasksSpecification of the system – M1.1 – M15NS, CS basic user interfaces - Software

released M1.3,4 – M20Scene description algorithms – M1.5 – M30Detection of abnormal behavior – M1.6 –

M35Multimedia database with algorithms -

D1.4 – M45 image analysis, motion tracking, object

detection – implementation on smart camerasEnd-user interfaces – M1.8 – M45Dissemination, Documentation, Manuals,

Recommendations, Guidelines – D1.68 – M60

Page 18: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

6 InnoTec - task: 2.2InnoTec DATA GmbH & Co. KG, Germany

Nils JohanningTask 2.2 – Creating algorithms for

acquisition and pre-processing of audio and image signals

Task 1 Task 2

Navigate to:

Ds Ms

Page 19: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

6 InnoTec - task: 2.2

Task 1 Task 2

Navigate to:

Ds Ms

Discuss Participant suggestions for the task / other tasksSpecification of the system – M1.1 – M15Hardware construction - D1.2 – M20

Int.med. Report for HW – M1.2 – M18 Providing hardware for NS, CS, cameras with noise

and vibrations reduction, microphone arrays, multi-channel sound cards, sensors, RFID modules (other tracking techniques)

NS, CS basic user interfaces - Software released M1.3,4 – M20

Methodology and model for data gathering – M1.7 – M36

End-user interfaces – M1.8 – M45NS, CS prototypes ready for installation – M1.9 –

M50Dissemination, Documentation, Manuals,

Guidelines – D1.68 – M60

Page 20: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

8 GHP – consulting and tool testingGeneral Headquarters of Police, Poland

Radosław Chinalski, Deputy Director of the Criminal Bureau

Task: – Consulting and tool testing

Task 1 Task 2

Navigate to:

Ds Ms

Page 21: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Task 1 Task 2

Navigate to:

Ds Ms

8 GHP – consulting and tool testingDiscuss Participant suggestions for the task /

other tasksUser requirements - D1.1 - M10Specification of the system – M1.1 – M15NS, CS basic user interfaces - Software

released M1.3,4 – M20Pilot trials – D1.3 – M45End-user interfaces – M1.8 – M45Data exchange procedures - D1.5 – M50Dissemination, Documentation, Manuals,

Recommendations, Guidelines – D1.68 – M60

Page 22: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

9 Moviquity – task 1.4APIF MOVIQUITY SA, Spain

José Manuel Gil, Managing DirectorTask 1.4 – Real-time secure data

transmission to the CS and then to police mobile terminals

Task 1 Task 2

Navigate to:

Ds Ms

Page 23: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

9 Moviquity – task 1.4

Task 1 Task 2

Navigate to:

Ds Ms

Discuss Participant suggestions for the task / other tasksSpecification of the system – M1.1 – M15Hardware construction D1.2 – M20

Int.med. Report for HW – M1.2 – M18 Software for PDAs Wireless engineering, network solutions Providing wireless network architecture

NS, CS basic user interfaces - Software released M1.3,4 – M20

Methodology and model for data gathering – M1.7 – M36End-user interfaces – M1.8 – M45Data exchange procedures - D1.5 – M50NS, CS prototypes ready for installation – M1.9 – M50Dissemination, Documentation, Manuals,

Recommendations, Guidelines – D1.68 – M60

Page 24: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

10 PSI – task 1.3, 2.1, 2.2Products and Systems of Information Technology,

GermanyDr. Stephan Gottwald, Project Manager, Business

ConsultantDr Ing Haluk Sarlan, Consultant, Project ManagerKambiz Fazel, Consultant, Software Engineer

Task 1.3 – Developing a methodology for scene descriptions with audio and video signals in conjunction with data from NS

Task 2.1 – Defining and recognizing particular audio signals

Task 2.2 – Algorithms for acquisition and pre-processing of audio and video signals

Task 1 Task 2

Navigate to:

Ds Ms

Page 25: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

10 PSI – task 1.3, 2.1, 2.2

Task 1 Task 2

Navigate to:

Ds Ms

Discuss Participant suggestions for the task / other tasksSpecification of the system – M1.1 – M15Hardware construction D1.2 – M20

Int.med. Report for HW – M1.2 – M18 Technology for control centers – PSIcommand, PSIecontrol

NS, CS basic user interfaces - Software released M1.3,4 – M20

Methodology and model for data gathering – M1.7 – M36

End-user interfaces – M1.8 – M45Data exchange procedures - D1.5 – M50NS, CS prototypes ready for installation – M1.9 –

M50Dissemination, Documentation, Manuals,

Recommendations, Guidelines – D1.68 – M60

Page 26: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

11 PSNI – task 5.2Police Service of Northern Ireland

Gerald MurrayTask 5.2?

Task 1 Task 2

Navigate to:

Ds Ms

Page 27: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

11 PSNI – task 5.2

Task 1 Task 2

Navigate to:

Ds Ms

Discuss Participant suggestions for the task / other tasksUser requirements - D1.1 - M10Specification of the system – M1.1 – M15NS, CS basic user interfaces - Software released

M1.3,4 – M20Methodology and model for data gathering – M1.7 –

M36Pilot trials – D1.3 – M45End-user interfaces – M1.8 – M45Data exchange procedures - D1.5 – M50Dissemination, Documentation, Manuals,

Recommendations, Guidelines – D1.68 – M60

Page 28: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

12 PUT – role not definedPoznan University of Technology, Poland

Prof. Adam Dabrowski

Task 1 Task 2

Navigate to:

Ds Ms

Page 29: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

12 PUT – role not defined

Task 1 Task 2

Navigate to:

Ds Ms

Discuss Participant suggestions for the task / other tasksSpecification of the system – M1.1 – M15NS, CS basic user interfaces - Software released

M1.3,4 – M20Scene description algorithms – M1.5 – M30Detection of abnormal behavior – M1.6 – M35End-user interfaces – M1.8 – M45Multimedia database with algorithms - D1.4 –

M45 Biometry HMI (human-machine interfaces)

Dissemination, Documentation, Manuals, Recommendations, Guidelines – D1.68 – M60

Page 30: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

18 TUKE – task 1.4, 2.1, 2.2Technical University of Kosice, Slovakia

Anton Cizmar, rectorProf. Lubomir Dobos

Task 1.4 – Real-time secure data transmission to the CS and then to police mobile terminals

Task 2.1 – Defining and recognizing particular audio signals

Task 2.2 – Algorithms for acquisition and pre-processing of audio and video signals

Task 1 Task 2

Navigate to:

Ds Ms

Page 31: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

18 TUKE – task 1.4, 2.1, 2.2

Task 1 Task 2

Navigate to:

Ds Ms

Discuss Participant suggestions for the task / other tasksSpecification of the system – M1.1 – M15NS, CS basic user interfaces - Software released M1.3,4 –

M20Scene description algorithms – M1.5 – M30Detection of abnormal behavior – M1.6 – M35End-user interfaces – M1.8 – M45Multimedia database with algorithms - D1.4 – M45

Sound acquisition and processing Sound recognition Speech processing Sound transfer

Dissemination, Documentation, Manuals, Recommendations, Guidelines – D1.68 – M60

Page 32: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

5 GUT - task: 1 and 2Gdansk University of Technology, Poland

Prof. Andrzej CzyżewskiTask 1 – Establishing the framework of the

System for secure data gathering and transmission

Task 2 – Analyzing, defining and integrating new and current technologies used for image, video and voice recognition and extraction

Task 1 Task 2

Navigate to:

Ds Ms

Page 33: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

5 GUT - task: 1 and 2

Task 1 Task 2

Navigate to:

Ds Ms

Discuss Participant suggestions for the task / other tasks

Go to Task 1 and 2 GUT suggestions

Page 34: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Resource allocation

Participant 2 Apertus - task: 1.4Participant 20 FHTW - task: 2.4Participant 5 GUT - task 1 and 2Participant 6 INNOTEC - task: 2.2Participant 8 GHP - consulting and tool testingParticipant 9 MOVIQUITY - task 1.4Participant 10 PSI - task: 1.3, 2.1 - 2.2Participant 11 PSNI - task: 5.2 – should it be 2.2?Participant 12 PUT - role not defined in DoW?Participant 18 TUKE - task: 1.4, 2.1 - 2.2

Page 35: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Objectives and tasks

Page 36: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

1st Deliverable(s) Outline the content of the deliverables at

least for the first one:

D1.1 Report on the collection and analysis of user requirements (M10)

D1.2 Report on NS and CS hardware construction (M20)

Navigate to:

All Deliverables List

Page 37: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

SummaryDefine a detailed work-plan for the next three

monthsWP1 work organisation: Conference calls,

editorial tasks, reviewers, etc.

Task 1 Task 2

Navigate to:

Ds Ms

Page 38: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Relations with other partnersIdentify partners collaborating in the

other WPs close to WP1WP2 - Identification and Observation of Mobile Objects in Urban EnvironmentPUT, MOVIQUITY, TUKE

WP6 - Interactive Multimedia Applications Portal for Intelligent Observation SystemMOVIQUITY, PUT, TUKE

WP7 - Biometrics and Intelligent Methods for Extraction and Supplying Security InformationPSI, PUT, GUT

Page 39: DoW: pp. 42-44 WP1: Intelligent Monitoring and Automatic Detection of Threats

Report from WP1End-users requirements! – parallel with

WP7FHTW – 2.4 task discussed and approvedPUT – human face recognitionAGH – Piotr Romaniak – video quality of

experience assessment and optimization - New subtaskAudio quality – New subtaskNS installation abroadWP1 (WP7, WP8 also) work meeting in

Spring in GdanskSome mistakes in DoW detected (PSI roles,

PSNI)