NRC-CNRC | IIT-ITI | Computational
Video Group | Video
Demonstrations | Download
| Feedback | My ACE
As a pilot project with the mandate to enhance the security within the
NRC premises, NRC has installed ACE Surveillance technology with
several of its surveillance cameras.
The ACE Surveillance software provides NRC
commissioners a complete knowledge of all activities happening
at the monitored premises. Either at the desk or away from it
a commissioner is able - within minutes - to get a complete description
of the passed events and to retrieve the best possible capture
of the event or person of a particular interest.
Technical details: Installed:
January 11, 2007
two building entrances without receptionists (one of which is the
- Runs non-stop 24/7 on a existing equipment:
- Two ADT- installed
analog RCA surveillance cameras that monitor the entries to the
desk-top computer (1GHz Processor, 1 Gb RAM, extra 1Gb of hard-drive -
for optional local copy of CES-es)
- An alarm sound is
produced when someone new arrives.
- The last captured
snapshot of the person/object is shown, time-stamped - to
ensure the officer that nothing happened since then and now
- Real-time back-rewind
- to enable the officer who was a way from the desk to see what
happened while he was away.
- Remote CES
(Critical Evidence Snapshots) summarization and browsing
using the ACE-Browser - accessible remotely by any commissioner with
the password and login information.
Interactive ACE-browse demo: click here.
See ACE-Surveillance in action: real-life CES
summarizations obtained by ACE users on a variety of monitoring
assignments. Easily browse over the detected events and objects by day
and hour, see their annotations and selected best-shot captures (data
courteously provided by our clients)
Days viewed in this demo correspond to different real
monitored assignments: difference is seen as a new station, camera
and/or setup (e.g different angles of view, lighting conditions, camera
image quality, complexity of observed events, number of of tracked
objects, their velocities, shapes and sizes)
Video recognition (detection and tracking) quality vs. quality of video
images, at different times of the day.
Output of the
ACE: The entire activity captured by the surveillance system
over several hours (from the office window) is summarized into 2
minutes (600Kb) of annotated video comprised of Critical Evidence
Older demos (January - May 2006):
These are the results from several real-life
monitoring tasks as obtained by the recognition module of the CES
client. Note the quality of the video image for different
cameras and lighting conditions.
(Timestamp is shown at top right of the video image.
Detected objects/actions are highlighted with coloured boxes. Blue box
- the center of computed foreground. Red box - motion center. Green box
- enclosing around the object)
1. Monitoring the premises in front
of an office:
2. Monitoring the premises in front of a
3. Three-cam monitoring around a house:
Hours of operation: 15 hours (21:00 - 14:30)
Cam 1 - overviews carport in the front of the house: USB web-cam (summary avi
Cam 2 - overviews carport in the front of the house: wireless CCTV cam+
Video2USB converter (summary
avi - 800Kb)
Cam 3 - overviews the road in the back of the house: USB
avi - 4Mb)
| # of
extracted CES: X, Y, Z
Enter here to interactive security monitoring.
Press ">>" when you are there.
4. Example of automated surveillance
| Hours of operation: 10
hours (22:00 - 8:00).
Cam 1: USB web-cam.
|# of extracted CES: 23
Enter here. Password: "c.e.s." (lowercase).
Last updated: 2007-X-05
Project Leader: Dmitry