Results for: object detection - Page 2

Suggested Categories:

Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
AI Object Removers
AI object removers are software tools that identify and remove objects from digital images. They use machine learning techniques to accurately detect a specific object or set of objects, such as people, cars, buildings, trees, and plants. Once identified, the algorithm will then delete the object from the image without altering any other information. This technology can be used for various applications including removing unwanted persons and objects from photos or videos.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
Facial Recognition Software
Facial recognition software enables businesses and organizations to detect, identify, and analyze human faces and facial features. Facial recognition capabilities can be delivered via an API for use in third-party applications, offered as part of a standalone facial recognition application, or be included as a feature in computer vision or identity verification solutions.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
Extended Detection and Response (XDR) Platforms
Extended detection and response (XDR) platforms enable organizations to discover and address cybersecurity incidents across disparate hybrid systems such as networks, applications, endpoints, and the cloud.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
View more categories (20) for "object detection"

239 Products for "object detection" with 1 filter applied:

  • 1
    Cintoo Cloud
    If you are building, renovating, or managing your AEC or infrastructure assets using terrestrial laser scanning, Cintoo Cloud is your platform of choice to enhance all your scan-BIM workflows and make collaboration both easy and fast. Different stakeholders all have different objectives, resources, and technical knowledge. Cintoo Cloud makes it easy for you to share projects with your team, clients, or subcontractors, creating different permission levels to manage project access and what users...
    Starting Price: €90 per month
  • 2
    iSecurity Firewall

    iSecurity Firewall

    Raz-Lee Security

    ... that even iSeries novices can master in minutes. Protects all communication protocols (including SQL, ODBC, FTP, Telnet, SSH, and Pass-through). Intrusion Prevention System (IPS) with real-time detection of access attempts. Precisely controls what actions users may perform after access is granted – unlike standard firewall products. Protects both native and IFS objects – all of your databases are secured.
  • 3
    KEN Vision

    KEN Vision

    Caliber Interconnect Solutions

    ... surveillance system, requiring no changes to the infrastructure. Based on your requirements, customization is also possible and further anomalies can be detected. These are a few provisions of KEN Vision: • Anomaly detectionObject & Animal detection • Number plate recognition • Face recognition • Trespassing • Fire, Fight, and Fall detection • Safety equipment detection Get the peace of mind you deserve with KEN Vision, a dependable partner for all your security and safety needs!
    Starting Price: $100
  • 4
    SafePointe

    SafePointe

    SoundThinking

    ​SafePointe by SoundThinking is an AI-based concealed weapons detection system designed for high-throughput facilities. Each lane comprises two discreet metal bollards positioned 8–10 feet apart, equipped with an advanced 3D camera and an NVIDIA-powered edge processor running a state-of-the-art AI model. As individuals pass through, the system utilizes magnetic moment technology to identify digital signatures of magnetically conductive objects, analyzing motion data to determine direction...
  • 5
    Deep Block

    Deep Block

    Omnis Labs

    Deep Block is the world's fastest AI-powered remote sensing imagery analysis solution. Train your own AI models to detect instantly any objects in large satellite, aerial, and drone images. Deep Block's no-code data labeling interface lets you achieve your MLOps projects in days, with no prior expertise. Instead of hiring your own in-house AI engineering team, anybody can start training their own AI. If you have a mouse and a keyboard, you can use our web-based platform, check our...
    Starting Price: $10 per month
  • 6
    Fractal Analytics
    Reveal valuable insights by accurately recognizing objects in images and videos. From surveilling people in real-time at events to detecting if products are in the right place in shopping aisles, AI can drive value in many ways. Create in-depth analyses by placing image objects into relevant segments. AI-based algorithms can help insurers analyze home and auto damage to create more accurate claims for customers. Get immediate insights to take action when it matters most. AI algorithms enable...
  • 7
    NoviSight 3D
    NoviSight 3D cell analysis software advances your discovery by providing statistical data for spheroids and other 3D objects in microplate-based experiments. The software enables you to quantify cell activity in three dimensions and more easily capture rare cell events, obtain accurate cell counts, and improve detection sensitivity. With a convenient user interface, NoviSight software offers the tools you need for recognition, analysis, and statistics. NoviSight software’s True 3D technology...
  • 8
    iMyFone MarkGo
    Our professional video watermark remover MarkGo helps you erase annoying texts, undesired tourists, and unwanted objects without a pause. With simple clicks, you can remove watermarks from videos and export them without any quality loss. Having detected pixel colors automatically, MarkGo acquires the best-fit color to restore the image perfectly. MarkGo uses an updated digital media processing algorithm to remove objects from video seamlessly. To ensure a high resolution of the image, Mark...
    Starting Price: $7.95 per month
  • 9
    Loopr AI

    Loopr AI

    Loopr AI, Inc.

    LooprIQ Inspect's camera-based software is configured to identify the exact defects or anomalies that occur in your material. Detect scratches, cracks, bent tips, incomplete welds, foreign objects, and anything else that a human inspector can identify. Reduce your cost of quality with AI-based visual inspection that catches more defects instantly and consistently. Minimize part rework and recalls with AI-powered verification that instantly and objectively matches each assembled product with its...
  • 10
    Bosch Essential Video Analytics
    Essential Video Analytics 6.60 by Bosch is the system of choice when you need reliable video analytics for small and medium businesses, large retail stores, commercial buildings, and warehouses. The software system reliably detects, tracks, and analyzes moving objects while suppressing unwanted alarms from spurious sources in the image. Advanced tasks like multiple line crossing, loitering, crowd density estimation, and people counting are available. Object filters based on size, speed...
  • 11
    Google Cloud Video AI
    ... at the video, shot, or frame level. Create your own custom entity labels with AutoML Video Intelligence. Search your video catalog the same way you search documents. Extract metadata that can be used to index, organize, and search your video content, as well as control and filter content for what’s most relevant. Gain insights from video in near real-time using streaming video annotation and trigger events based on objects detected.
    Starting Price: $0.10 per minute
  • 12
    Digimizer

    Digimizer

    MedCalc Software Ltd

    Digimizer is an easy-to-use and flexible image analysis software package that allows precise manual measurements as well as automatic object detection with measurements of object characteristics. Pictures may be X-rays, micrographs, etc. Supported file formats are JPG, GIF, TIFF, BMP, PNG, WMF, EMF and DICOM files. Images can be rotated, flipped or straightened. Image brightness and contrast can be adjusted. Several filters can be applied.
  • 13
    Everledger

    Everledger

    Everledger

    ... products with the Everledger Platform. Producers on the Everledger Platform can now use the Identify app to provide clear evidence of production details for object-level provenance records that are added to the blockchain. Bring apps, sites, and people together with a powerful suite of APIs to manage supplier compliance status, chain of custody reporting, fraud detection, and media-rich provenance records for objects.
    Starting Price: $99 per month
  • 14
    VisioForge

    VisioForge

    VisioForge

    Our state-of-the-art video fingerprinting technology incorporates the latest advances in scene analysis, object tracking, and motion estimation to analyze the content of any video in order to identify its unique characteristics, such as colors, scene structure, and the motion of objects. This allows a copy of the video to be identified despite changes in resolution, bit-rate, method of encoding, or file format. The video can even be detected when it is included inside another video or when just...
    Starting Price: €900 per year
  • 15
    MD-VIDEO AI
    MD-VIDEO AI is the digital forensic software for recovering video data directly from media storage like a disk, memory card, and damaged video file. Deleted and damaged video frames can be recovered, and enhancement feature supports to improve the quality of the target frame. Moreover, the AI-based video analysis feature enables time-efficient investigation. More than 80 kinds of objects can be detected & recognized. The efficient filtering & sorting options help investigators to easily find...
  • 16
    Scout by Asseter.ai
    Scout is the AI-powered search engine for finding 3D models by picture across 3D stock marketplaces. Simply drop image of object you are looking for and get the most similar 3D models available at various stock marketplaces with the filtering and direct links provided. In default “Search asset by picture” mode Scout finds most similar models for the given picture. In “Picture Assembler” mode Scout detects individual object in the complicated picture and suggests 3D models, textures...
  • 17
    Dragonfly 3D World
    ... interactively. With its AI integration, users can apply deep learning for image segmentation, classification, and object detection. It offers advanced quantitative analysis tools, including region-of-interest analysis, measurements, and statistical evaluations. Its intuitive graphical user interface enables researchers to build reproducible workflows and perform batch processing.
  • 18
    Flim

    Flim

    Flim

    FLIM is for creative people who believes that image communication is the best way to express their ideas. Stills coming from movies, documentaries and soon from Ads and music videos. Each picture is registered by : Film, director, DOP, actor and also kind, style topics, release date. A.I detects : objects, clothes, quantity of characters, scenery, surrounding. Each picture gets a color analyze. Stop wasting your time browsing the internet, FLIM is here to help you find the right image...
  • 19
    PQ-FMEA+

    PQ-FMEA+

    PQ-FMEA

    FMEA, Failure Mode and Effects Analysis, is a mathod whose purpose is to detect potential fault of the analyzed object, their causes and effects. It is a very effective and efficient method of supporting quality management. Work in accordance with the requirements of ISO, AIAG, VDA, AIAG & VDA. Data consistency also in the control plan and process flow diagram. Ability to create analyses: PFMEA, DFMEA and work with RPFMEA, LFMEA, MFMEA, SwFMEA, UFMEA.
  • 20
    HitPaw Watermark Remover
    Al-inbuilt tech to detect & remove watermark automatically. Remove watermark from video and photo without blur. Delete watermarks, logos, texts, stamps, and any objects. Remove moving watermark from video with no effort. Add customized watermark to video & image freely. Preview in real-time and output in high quality.
    Starting Price: $9.99
  • 21
    CANTAB

    CANTAB

    Cambridge Cognition

    Originally developed at the University of Cambridge, the Cambridge Neuropsychological Test Automated Battery (CANTAB) includes highly sensitive, precise and objective measures of cognitive function, correlated to neural networks. CANTAB tests have demonstrated sensitivity to detecting changes in neuropsychological performance and include tests of working memory, learning and executive function; visual, verbal and episodic memory; attention, information processing and reaction time; social...
  • 22
    IntelliSpace
    ... and hard to detect. IntelliSpace Portal 9.0 offers a host of new and enhanced neuro applications such as NeuroQuant®¹,LoBi and CT Brain Perfusion. These tools are designed to facilitate rapid, objective, quantitative and consistent image evaluation. Given the increasing interest in pulmonary care, IntelliSpace Portal 9.0 offers you one comprehensive toolset to help you track pulmonary disease from detection to follow-up.
  • 23
    PT MultiScanner

    PT MultiScanner

    Positive Technologies

    PT MultiScanner provides multiple levels of anti-malware protection to detect and block infections on corporate infrastructure, uncover hidden threats, and facilitate investigation of malware-related security incidents. Counting on the same antivirus vendor to be right every time? Draw on the best anti-malware vendors and Positive Technologies expertise instead. Extensive integration support and scalability make PT MultiScanner the right choice for both startups and the largest corporations...
  • 24
    Wonder Studio

    Wonder Studio

    Wonder Dynamics

    No More MoCap, no complicated 3D software and no expensive production hardware—all the artist needs is a camera. Upload your CG character model to one shot or an entire scene and the system will automatically detect cuts and track the actor throughout the sequence. The system automatically detects the actor’s performance based on single-camera footage. Then, it takes that performance and transfers it to the CG character of your choice — automatically animated, lit, and composed. Wonder Studio...
  • 25
    IACrea

    IACrea

    IACrea

    Redecorate a home in seconds, The performance of IACrea can be excellent when the photos are "clear" (that one can easily recognize the objects, the type of part). Nevertheless the technology is very recent and can sometimes misinterpret the reference photo and give an inconsistent result (in particular, windows are sometimes detected as a wall). Do not hesitate to make several attempts and to take the piece from another angle if it does not work. The number of credits is voluntarily high...
    Starting Price: €50 per year
  • 26
    Amazon Rekognition
    Amazon Rekognition makes it easy to add image and video analysis to your applications using proven, highly scalable, deep learning technology that requires no machine learning expertise to use. With Amazon Rekognition, you can identify objects, people, text, scenes, and activities in images and videos, as well as detect any inappropriate content. Amazon Rekognition also provides highly accurate facial analysis and facial search capabilities that you can use to detect, analyze, and compare faces...
  • 27
    Reveelium

    Reveelium

    ITrust.fr

    ... and aggregates all types of logs from an information system and detects attacks or malicious activity in progress. An essential tool in the fight against cyber-malware Reveelium SIEM can be used alone or complemented by Ikare, Reveelium UEBA or ITrust’s Acsia EDR, to provide a true next-generation security center (SOC). Have the practices of its teams monitored by a third party and obtain an objective opinion on its level of safety.
  • 28
    EyeRecognize

    EyeRecognize

    EyeRecognize

    Our image and video recognition APIs are proven, highly scalable, and leverage deep learning technology that you can implement within your own applications without prior knowledge of machine learning expertise. EyeRecognize’s suite of image and video recognition API services allow you to identify objects, people, text, scenes, and activities in images and videos, as well as detect any faces and NSFW content. Face Detection and Analysis, detect all face in images and video and get attributes...
  • 29
    Aujas

    Aujas

    Aujas

    Aujas adopts a holistic and comprehensive approach to cyber risk management. We have the expertise to establish cybersecurity strategies, define roadmaps, develop policies and procedures and manage cyber risks. Our proven methodology leverages several industry standard best practices depending on the region, industry, and context. These best practices include NIST CSF, NIST 800-37, ISO 27001 and other regional standards like SAMA and NESA. Align CISO office with organizational objectives...
  • 30
    Honeywell Active Alert
    ... Standard package builds on the Base package by adding the ability to discern more advanced behaviors such as a person jumping a fence line or loitering, and vehicles parked or pulled off the road. The Active Alert Premium package builds on the Standard package by adding the ability to detect abandoned or removed objects, and possible theft incidents. Honeywell's suite of video analytics products is an ideal solution to enhance a facility’s current level of security.