Category: - clear 
Security 
2Votes
Promote Idea
Promote
D714   Category: Security     Status: Pending
The field of computer vision is quickly advancing to the point where algorithms can automatically detect people in videos and also recognize their activity and actions.
I suggest developing Computer vision algorithms that specialize in detecting suspicious and violent behaviour in open spaces, such as streets, neighborhoods etc.
The input videos can be transmitted in real time from the grid of existing cameras (such as traffic cameras and security cameras on buildings) to a central server that will process the videos and notify the relevant authorities if a suspicious behaviour is identified. Additional cameras can be installed in problematic areas/neighborhoods to increase the coverage.

comment »  

 
2Votes
Promote Idea
Promote
D707   Category: Security     Status: Pending
WAVE is a revolutionary mobile application that would change how emergency situations are handled in real time. It brings together three technologies that have become part of our daily lives.
1. Internet
2. Smartphones
3. Mobile Applications

The application appropriately accomodates anticipated insecure situations and automatically reports them to the authorities including 9-1-1 call centers. It would be every user's one-stop to report emergency situations (to self or other) and to be on guard  for  potential threats in his proximity. The power of such an application is beyond just ensuring your safety. 

Everyone in close proximimty would be notified of the type of threat and professionals like doctors , army/police personal nearby could approach the victim to help. This would change the world of social networks that we know now. Through this application, a link is formed between a person who needs help and person who can provide help. The receiver and the provider of the help now share
More...

comment »  

 
1Votes
Promote Idea
Promote
D683   Category: Security     Status: Pending

My idea is to create a personal ELECTRONIC card, such as the card that is used to represent social security number in the U.S. However this card would be extremely secure due to its complexity that would include other than personal information, BIOMETRICS. This would make the new personal card to be extremely secure. It can contain all the personal information of an individual in a grater scale than any identification card or social security card. Having an Electronic Personal Card would make genuine identification reliable, secure and accurate. And the best part of all: Identity Theft would become impossible.  No other person other than the genuine owner of the card could identify as such with an electronic biometrics card.

comment »  

 
1Votes
Promote Idea
Promote
D673   Category: Security     Status: Pending

Wearable Mobile Smart Objects are electronic devices with integrated biometric technologies, related identification technologies like the radio frequency identification (RFID); and global positioning system technologies, designed in the form of accessories like eye glasses, hand gloves, socks, shoes, wrist watches and wrist band. They are designed to capture identities of the user, interact and communicate about themselves and their users to electronic networks and databases for identification, access control, monitoring, other security uses and navigation.

Our daily lives are already organized through a myriad of electronic passage points in public places (airports, train stations, bus stations) and private places for access control and security. The technology currently in use involves mainly possessing magnetic access cards or passwords/personal identification number for access. These technologies are not foolproof to controlling who accesses a facility since cards can be misplaced o

More...

comment »  

 
1Votes
Promote Idea
Promote
D658   Category: Security     Status: Pending
iAlarm is a home alarm that is accessible anywhere which protects your home or business.

comment »  

 
1Votes
Promote Idea
Promote
D648   Category: Security     Status: Pending
UUVs or underwater drones can be very effective when it comes to performing reconnaissance and locating underwater mines when risks may be too high for humans. However, such drones can remain in operation for approximately 24 hours after being deployed. Underater drones would be more effective if they can stay in operation for more than this amount of time before being sent back to be refueled. One way to do that is to build a very hydrodynamic underwater drone. The more hydrodynamic it is, the more efficient. More efficient means less energy consumption in order to operate, thus more hours of operation. In this case the UUV would make it safer for the navy to carry on the mission and accomplishing it.

The idea is to design and build an autonomous underwater vehicle (AUV) which is a special kind of UUVs that operates independently of direct human input. This AUV would have the shape and geometry of the manta ray fish. The AUV would be made of a relatively flat body and flexible triangul
More...

1 comment »  

 
1Votes
Promote Idea
Promote
D638   Category: Security     Status: Pending
I have elaborated  on this idea in the attached pdf.

comment »  

 
1Votes
Promote Idea
Promote
D635   Category: Security     Status: Pending

Wearable Mobile Smart Objects are electronic devices with integrated biometric technologies, related identification technologies like the radio frequency identification (RFID); and global positioning system technologies, designed in the form of accessories like eye glasses, hand gloves, socks, shoes, wrist watches and wrist band. They are designed to capture identities of the user, interact and communicate about themselves and their users to electronic networks and databases for identification, access control, monitoring, other security uses and navigation.

Our daily lives are already organized through a myriad of electronic passage points in public places (airports, train stations, bus stations) and private places for access control and security. The technology currently in use involves mainly possessing magnetic access cards or passwords/personal identification number for access. These technologies are not foolproof to controlling who accesses a facility since cards can be misplaced o

More...

comment »  

 
1Votes
Promote Idea
Promote
D634   Category: Security     Status: Pending

Wearable Mobile Smart Objects are electronic devices with integrated biometric technologies, related identification technologies like the radio frequency identification (RFID); and global positioning system technologies, designed in the form of accessories like eye glasses, hand gloves, socks, shoes, wrist watches and wrist band. They are designed to capture identities of the user, interact and communicate about themselves and their users to electronic networks and databases for identification, access control, monitoring, other security uses and navigation.

Our daily lives are already organized through a myriad of electronic passage points in public places (airports, train stations, bus stations) and private places for access control and security. The technology currently in use involves mainly possessing magnetic access cards or passwords/personal identification number for access. These technologies are not foolproof to controlling who accesses a facility since cards can be misplaced o

More...

comment »  

 
1Votes
Promote Idea
Promote
D600   Category: Security     Status: Pending
Armor would be comprised of pannels made form the substance D3O, and used for a variety of applacations.

Details in pdf.

comment »  

 
2 3 4 5 Next > Last>>
Displaying results 1 - 10 of 44

 
Statistics
488 ideas
723 comment
1,399 votes
1,706 users
Invite A Friend