Skip to main content
The Review of Paper "Computer vision in Security"
Author: Fothul Karim Forhan

The paper is the overview on a technology that helps us recognize different patterns and proceed it in a specific format. The focus is set on security field where CV helps to prevent attacks and massive resource looses. The introduction covers a bit of history as well as points to goals of the research.

The main part is divided into: Types of CV technologies applied in security matters, security matters that require CV and other safety matters.

For me the most fascinating part is CV in financial field. In the given example cv could identify fraudsters by emotional state, the way a fraudster behaves. After the thief is identified, the alarm is enabled automatically and the transaction is terminated. This is a direct example of how cv saves a companies' money.

The only thing that missing is lack of illustrations. It'd be great to see face-recognition algorithms visualization.

Overall, I really liked the style of paper, the coherent structure and clear explanations. Face recognition and road security parts made me think about working or at least practicing in this field as it's in the same time quite fun (algorithms, visualization) and really helps society.


Link to the reviewed paper:
https://forhanspeait2020.blogspot.com/2020/05/computer-vision-in-security-course-paper_7.html

Comments

Popular posts from this blog

Rule Utilitarianism. Big data The Utilitarianism theory defines what is write and what is wrong by assessing outcomes. No matter what bad consequences take place, the most ethical choice is always the one that has the greatest good. Big data falls under this theory just fine. While it's hard to give any precise guidelines, the example can be considered in the abstract. On the one hand it brings us economy boost by providing more specific information, on another hand it affects on the privacy of consumers. Examples of The Good Big data cuts business costs Help government to track citizens and prevent unwanted events Using big data improves company's pricing policy Allow competition with bigger companies Suggests to user more interest-related content  Examples of The Bad Ruins people's privacy Add an advantage to those who have been shown as a more trustable person by doing nothing personal online Uses tons of computational resources and not necessarily
Changes in image of IT specialist in Russia 2000-present At the beginning of millennium IT field wasn't as popular as it is in our time. Majority of population didn't have their own computers and being familiar with technologies used to be considered as something special. At that time individuals who work in IT had wide theory knowledge and most of them studied computer science in university. Required skills weren't so specific. Companies had a demand to make their system work and hire those who can provide such service. Due to lack of powerful machines and technologies itself systems were quite unreliable and it was a common thing to have unpredictable failures. People didn't believe in anything that's not written on paper.  Since 2006 internet became a useful tool for programmers and the rest of IT world. Many tech communities were formed and it has been provided communication inside the field. Companies could better analyze the market and requirements fo