SlideShare une entreprise Scribd logo
1  sur  8
IT3180 EmergingTrends andTechnologies
Assignment 4: Innovation project
Amped Five Software
Done By: Ramesh 115832B
Lam Zhen Le 116155U
Chan Ru Ai 115517Q
Daphne Ang 111512F
Background
EXAMPLE TEXT
Go ahead and replace
it with your own text.
Image
Processing
EXAMPLE TEXT
Go ahead and
replace it with
your own text.
Investigative
Forensics
EXAMPLE TEXT
Go ahead and
replace it with
your own text.
Security
Applications
Unique Selling Point
Report Fast
70 Different
Filters Multiple
Languages
Complete
Package
High Performance
Automatic Report
generation
(Sequence of all
operations applied)
Tools to target any
type of data from
cctv to latent
figerprint
Single Complete set
of tools for forensic
profesional
Security
Built-in security and fil
authentication to
detect tampering or
unauthorised changes
Who Uses It?
Why Use It?
Law Enforcement & Video
Survelliance
Improve Output to better see face,
licence Plate or anything useful for
investigation
Court Experts
Improve video or images to use as
evidence.
Automatically documents the used filters
Research
Used in several universities and research
institutes as a simple and fast way to
enhance images and video
Military & Inteligence
To stabilize full motion video survelliance
in hotile territories or enhance
surveliance images through fog and
sandstorms
Biometrics
Amped Five can improve fingetprint
image quality and measure height of
subjects from images
Strength Weakness Opportunity Threat
Tons of features and huge capabilities Very expensive and one needs to
undergo traning to use.
Vast opportunities available for
professionals from many different
fields
Threat only to criminals.
SWOT analysis
Camwhore
Extra
Skillset
CCTV at
home
How does it affect our work & lifestyle?
DEMO

Contenu connexe

Tendances

OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionSeccuris Inc.
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Cristian Garcia G.
 
Investigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseInvestigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseVaine Luiz Barreira, MBA
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1whitehat 'People'
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)Priyanka Aash
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALRisi Avila
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxBhupeshkumar Nanhe
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijackingleminhvuong
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics IntroJake K.
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric VanderburgEric Vanderburg
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercisesJisc
 
Module 04 digital evidence
Module 04 digital evidenceModule 04 digital evidence
Module 04 digital evidencesagaroceanic11
 

Tendances (20)

OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
ForeScout: Our Approach
ForeScout: Our ApproachForeScout: Our Approach
ForeScout: Our Approach
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Anti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and preventionAnti-Forensics: Real world identification, analysis and prevention
Anti-Forensics: Real world identification, analysis and prevention
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 
Intrusion .ppt
Intrusion .pptIntrusion .ppt
Intrusion .ppt
 
Steganography
SteganographySteganography
Steganography
 
Investigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação ForenseInvestigação de Crimes Digitais - Carreira em Computação Forense
Investigação de Crimes Digitais - Carreira em Computação Forense
 
Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1Introduction to IDS & IPS - Part 1
Introduction to IDS & IPS - Part 1
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
IOT Forensics
IOT ForensicsIOT Forensics
IOT Forensics
 
SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)SACON - Deception Technology (Sahir Hidayatullah)
SACON - Deception Technology (Sahir Hidayatullah)
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
 
L6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptxL6 Digital Forensic Investigation Tools.pptx
L6 Digital Forensic Investigation Tools.pptx
 
Module 6 Session Hijacking
Module 6   Session HijackingModule 6   Session Hijacking
Module 6 Session Hijacking
 
Network Forensics Intro
Network Forensics IntroNetwork Forensics Intro
Network Forensics Intro
 
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking   Chapter 3 - Network and Computer Attacks - Eric VanderburgEthical hacking   Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
 
Phishing simulation exercises
Phishing simulation exercisesPhishing simulation exercises
Phishing simulation exercises
 
Module 04 digital evidence
Module 04 digital evidenceModule 04 digital evidence
Module 04 digital evidence
 
Snort
SnortSnort
Snort
 

En vedette

Calicut university prospectus 2016 17 educationiconnect.com 7862004786
Calicut university prospectus 2016   17 educationiconnect.com 7862004786Calicut university prospectus 2016   17 educationiconnect.com 7862004786
Calicut university prospectus 2016 17 educationiconnect.com 786200478600007123
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economyAndry Alamsyah
 
Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 7862004786Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 786200478600007123
 
Vidromecanica Catalogue
Vidromecanica Catalogue Vidromecanica Catalogue
Vidromecanica Catalogue Vidromecanica
 
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. СедиментацияДисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. СедиментацияПетрова Елена Александровна
 
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...Indian dental academy
 
Endovenous treatment for varicose veins – the first choice (laser, radiofre...
Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...
Endovenous treatment for varicose veins – the first choice (laser, radiofre...Michał Molski
 
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows KernelDeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows KernelPeter Hlavaty
 
Ch 27 28 jeopardy
Ch 27 28 jeopardyCh 27 28 jeopardy
Ch 27 28 jeopardykevperrino
 
Reproduction jeopardy
Reproduction jeopardyReproduction jeopardy
Reproduction jeopardykevperrino
 
Ch 06_lecture_presentation
 Ch 06_lecture_presentation Ch 06_lecture_presentation
Ch 06_lecture_presentationkevperrino
 
Routers Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas ripRouters Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas ripJosu Orbe
 
Chapter 4 skin power point
Chapter 4 skin power pointChapter 4 skin power point
Chapter 4 skin power pointwatsonma12
 
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116Imelda Wijaya
 

En vedette (17)

Calicut university prospectus 2016 17 educationiconnect.com 7862004786
Calicut university prospectus 2016   17 educationiconnect.com 7862004786Calicut university prospectus 2016   17 educationiconnect.com 7862004786
Calicut university prospectus 2016 17 educationiconnect.com 7862004786
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economy
 
ITS Business Card
ITS Business CardITS Business Card
ITS Business Card
 
Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 7862004786Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 7862004786
 
Portfolio2013lr
Portfolio2013lrPortfolio2013lr
Portfolio2013lr
 
Vidromecanica Catalogue
Vidromecanica Catalogue Vidromecanica Catalogue
Vidromecanica Catalogue
 
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. СедиментацияДисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
 
IGTEC Presentation1
IGTEC Presentation1IGTEC Presentation1
IGTEC Presentation1
 
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
 
Endovenous treatment for varicose veins – the first choice (laser, radiofre...
Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...
Endovenous treatment for varicose veins – the first choice (laser, radiofre...
 
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows KernelDeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
 
Ch 27 28 jeopardy
Ch 27 28 jeopardyCh 27 28 jeopardy
Ch 27 28 jeopardy
 
Reproduction jeopardy
Reproduction jeopardyReproduction jeopardy
Reproduction jeopardy
 
Ch 06_lecture_presentation
 Ch 06_lecture_presentation Ch 06_lecture_presentation
Ch 06_lecture_presentation
 
Routers Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas ripRouters Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas rip
 
Chapter 4 skin power point
Chapter 4 skin power pointChapter 4 skin power point
Chapter 4 skin power point
 
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
 

Similaire à Ett amped five

Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...Codemotion
 
How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com Pentest-Tools.com
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepguestad6e9e
 
TET Presentation
TET PresentationTET Presentation
TET PresentationVideoguy
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Keith Harris
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor ToolElite ISI
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet EnterprisePuppet
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...MITRE ATT&CK
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT   TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT Mia Chang
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...NoNameCon
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxVrindapareek5
 
2016 Everfocus company profile
2016 Everfocus company profile2016 Everfocus company profile
2016 Everfocus company profileIvan Cheng
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Mauricio Velazco
 

Similaire à Ett amped five (20)

Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
 
How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleep
 
Butler
ButlerButler
Butler
 
TET Presentation
TET PresentationTET Presentation
TET Presentation
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor Tool
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet Enterprise
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT   TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
 
Web application Testing
Web application TestingWeb application Testing
Web application Testing
 
Securitarian
SecuritarianSecuritarian
Securitarian
 
tem7
tem7tem7
tem7
 
Lam Tuan
Lam TuanLam Tuan
Lam Tuan
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptx
 
2016 Everfocus company profile
2016 Everfocus company profile2016 Everfocus company profile
2016 Everfocus company profile
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
 

Plus de Ramesh Maniam

Case study presentation
Case study presentationCase study presentation
Case study presentationRamesh Maniam
 
Draft proposal presentation
Draft proposal presentationDraft proposal presentation
Draft proposal presentationRamesh Maniam
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentationRamesh Maniam
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentationRamesh Maniam
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentationRamesh Maniam
 

Plus de Ramesh Maniam (6)

Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Draft proposal presentation
Draft proposal presentationDraft proposal presentation
Draft proposal presentation
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 
Comm skills show
Comm skills showComm skills show
Comm skills show
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Ett amped five

  • 1. IT3180 EmergingTrends andTechnologies Assignment 4: Innovation project Amped Five Software Done By: Ramesh 115832B Lam Zhen Le 116155U Chan Ru Ai 115517Q Daphne Ang 111512F
  • 2. Background EXAMPLE TEXT Go ahead and replace it with your own text. Image Processing EXAMPLE TEXT Go ahead and replace it with your own text. Investigative Forensics EXAMPLE TEXT Go ahead and replace it with your own text. Security Applications
  • 3. Unique Selling Point Report Fast 70 Different Filters Multiple Languages Complete Package High Performance Automatic Report generation (Sequence of all operations applied) Tools to target any type of data from cctv to latent figerprint Single Complete set of tools for forensic profesional Security Built-in security and fil authentication to detect tampering or unauthorised changes
  • 5. Why Use It? Law Enforcement & Video Survelliance Improve Output to better see face, licence Plate or anything useful for investigation Court Experts Improve video or images to use as evidence. Automatically documents the used filters Research Used in several universities and research institutes as a simple and fast way to enhance images and video Military & Inteligence To stabilize full motion video survelliance in hotile territories or enhance surveliance images through fog and sandstorms Biometrics Amped Five can improve fingetprint image quality and measure height of subjects from images
  • 6. Strength Weakness Opportunity Threat Tons of features and huge capabilities Very expensive and one needs to undergo traning to use. Vast opportunities available for professionals from many different fields Threat only to criminals. SWOT analysis
  • 7. Camwhore Extra Skillset CCTV at home How does it affect our work & lifestyle?