Board logo

subject: Guangdong Public Security Bureau, 10 Kinds Of Video Surveillance Skills And Methods Of Practical [print this page]


Futian, Shenzhen City, Guangdong Province Public Security Bureau branch office video management applications through regular communication, cooperation and joint activity, in the global context of the formation of a large judged, a good atmosphere for large applications, and refined, including Monitor Ambush linkage method, circle track expansion method, series and more than 10 of the Act, including Video Surveillance Actual application of skills and methods of case detection channel widened to enhance the crack growth. 2009, Fukuda by video surveillance to assist the police cracked 557 cases, the arresting law Crime 912 suspects, criminal gangs 52.

2009 6 early video Futian Branch Office found that King police station area in May there were several electric cars stolen from the case. Starting from the video images of civilian police, the gang's modus integrated model, personnel and vehicle information analysis, identified the suspect vehicle and suspects. After careful investigation, on July 4 morning, when the three suspects were prepared to go out to commit crimes, they were police arrested at the scene and seized a vehicle committing the crime, a number of tools of crime.

2009 8 31 18 pm, two suspicious men riding a bike track in the Fu Hua Road, Futian District, Jintian Road, loitering, Futian police station control room to detect suspect this is the goal in the search for perpetrators. Monitoring staff, after reporting the police station immediately arranged an ambush force. 18:25 hues Humou drive and wait through the red light, two men riding bicycles near the side Humou car and tap on the window to sell the invoice to divert attention away the victim on the way co-pilot seat bag. Police in the video control room Shot Committed crimes within that time the suspect started immediately with the police ambush site linkage, on the spot and arrested the suspect and seized stolen goods.

Circle track expansion method: The case of the scene centered around the use spread to the neighboring control points, by analyzing the video image information, the organic coherence of the temporal relationship between control points, determine the suspect's out of line, the process of committing the crime, the number of criminals , modus vehicles, narrowing the scope of investigation.

Scenario Backtracking: The case study analysis of a suspect line, Traffic Tools, clothing, belongings and other factors, see the corresponding region of the surveillance video, which showed a suspect.

Ambush linkage method: suspicious persons or a major situation, with Monitoring System Time to find, track targets, precision strike.

String and matching method: in the same region or different regions with different video surveillance data reflect different control characteristics of suspects, methods of crime, behavior characteristics, select the object and committed crimes to compare judged to achieve string and investigation.

Space-time superposition: According to the discovery of the suspect vehicle of the suspect vehicle through the road, time, and obtain monitoring data overlay analysis, control law of the suspect committing the crime.

Predict dubious of Law: Cases and a pre-master key sessions, sections, features of the suspect or victim information is analyzed, through video surveillance, targeted for prevention and control and combat organized police force.

Track waiting for France: a video monitor and Motor Vehicle Recognition system to master the activities of suspects and vehicles, after the law, suspects and vehicles in the road after an ambush waiting may be. Trajectory planning method

points: monitor locked by surrounding the incident to the suspect after suspect escape route under the control points, a relay of its track, from the point to a line, to determine the activities of the suspect area.

Information related law: not yet confirm the identity, residence of the suspects, the suspects under surveillance reflect the characteristics or activities track of information related to expand channels for verification.

Cross-integration method: Based on the crime in and around the cross-analysis of monitoring data and comprehensive information on the information, fixed evidence.

by: gaga




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0