Results for: object detection - Page 4

Suggested Categories:

Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
Intrusion Detection and Prevention Systems
Intrusion detection and prevention systems (IDPS) enable IT teams and IT security professionals to identify potential threats, intrusions, and attacks on an organization's networks, applications, or systems, as well as provide tools to prevent intrusions and attacks. They can block malicious traffic, alert security teams, and log events for further analysis. By using intrusion detection and prevention systems, organizations can enhance their cybersecurity posture, detect threats early, and respond quickly to potential security incidents.
AI Object Removers
AI object removers are software tools that identify and remove objects from digital images. They use machine learning techniques to accurately detect a specific object or set of objects, such as people, cars, buildings, trees, and plants. Once identified, the algorithm will then delete the object from the image without altering any other information. This technology can be used for various applications including removing unwanted persons and objects from photos or videos.
Bot Detection and Mitigation Software
Bot detection and mitigation software is designed to help organizations detect and protect against malicious bots or automated computer programs. The software uses sophisticated algorithms to monitor network traffic and identify suspicious activity, alerting administrators when a potential threat is detected. Once bot activity has been identified it provides the user with options to deal with the threat, including blocking access, tracking down the source of malicious activity, or quarantining infected files. Bot detection and mitigation software can also provide protection from data theft, distributed denial-of-service attacks (DDoS) and other online threats. With its ever-evolving capabilities, this type of software can be an invaluable tool in securing organizational systems and networks.
Fraud Detection Software
Fraud detection software provides companies with the tools to evaluate and identify fraudulent activity and fraudulent transactions in order to prevent fraudulent access or financial fraud.
Gun Detection Systems
Gun detection systems, also known as weapon detection systems, are systems that are designed to detect the presence of firearms. They often use AI, soundwave, video analytics, and radar technology to pinpoint the location of a firearm on a person or in a given area. Gun detection systems can be used in public spaces like schools, shopping malls, and other places with high foot traffic.
Anomaly Detection Software
Anomaly detection software identifies unusual patterns, behaviors, or outliers in datasets that deviate from expected norms. It uses statistical, machine learning, and AI techniques to automatically detect anomalies in real time or through batch analysis. This software is widely used in cybersecurity, fraud detection, predictive maintenance, and quality control. By flagging anomalies, it enables early intervention, reduces risks, and enhances operational efficiency. Advanced versions offer customizable thresholds, real-time alerts, and integration with analytics dashboards for deeper insights.
Disinformation Detection Tools
Disinformation detection tools are specific applications designed to help identify and mitigate false information. These tools use advanced algorithms to analyze digital content, such as text, images, and videos. They can also be used to detect potential manipulation of online activity and websites. In some cases, these tools are integrated into media platforms so that malicious actors cannot spread misinformation or disinformation.
Deepfake Detection Software
Deepfake detection software is an advanced technology that enables users to detect and analyze deepfake images, videos, and other AI-generated content. It leverages sophisticated machine learning models to identify manipulations of original media content. This software can detect subtle changes in facial expressions, voice patterns, and other visual elements such as blurriness or color discrepancies. It also employs image-processing techniques such as pixel analysis to discover when parts of a video have been tampered with. Deepfake detection software is becoming increasingly important for ensuring the authenticity of digital media content.
Liveness Detection Software
Liveness detection software is used to identify a person who is present at the time of an authentication process. This type of software uses biometric data to determine whether the individual being authenticated is alive or not. It can provide additional security for access control, financial transactions, and other digital activities where identity verification is required. Liveness detection works by using either facial recognition, fingerprint scanning, or other types of biometric measurements to confirm an individual's presence in real-time. The accuracy and reliability of the liveness detection process depend on using high-quality cameras and sensors that are sophisticated enough to detect subtle changes in body temperature, image quality, and motion.
Clash Detection Software
Clash detection software is used in construction and engineering to identify and resolve conflicts within 3D models, such as overlaps between structural, mechanical, or electrical elements. By analyzing Building Information Models (BIM), this software highlights design clashes early, reducing the risk of errors during construction. It provides visual reports and detailed information on each clash, allowing project teams to address issues before they become costly in the field. Integrated with other BIM tools, clash detection software improves collaboration by streamlining communication around detected conflicts. Ultimately, it helps save time, control project costs, and ensure a smoother construction process.
Device Detection Software
Device detection software is designed to identify and analyze devices that connect to a network or a website. It helps businesses and organizations understand the type, model, and operating system of a device, enabling better user experience and enhanced security. By recognizing the device specifications, it allows for personalized content delivery, ensuring compatibility with different screen sizes and functionalities.
AI Content Detection Tools
AI content detection tools are software tools designed to detect whether a piece of text was written by an artificial intelligence system. These tools compare the text to a library of known AI-generated phrases and sentences, scoring it based on its similarity to those examples. The results can help provide insight into how much of the text was written by AI versus a human writer.
Data Breach Detection Software
Data breach detection software helps organizations identify and respond to unauthorized access or data leaks by monitoring networks, systems, and applications for suspicious activity. It uses advanced algorithms, machine learning, and real-time analysis to detect potential security threats and anomalies that could indicate a breach. The software often includes features like automated alerts, threat intelligence, and detailed reporting to enable quick investigation and mitigation. By continuously scanning for vulnerabilities and unusual behavior, it helps minimize the impact of data breaches and protects sensitive information. Ultimately, data breach detection software strengthens an organization's security posture and ensures compliance with data protection regulations.
Ad Fraud Detection Software
Ad fraud detection software identifies and prevents fraudulent activities within digital advertising campaigns, protecting advertisers from wasted spend and ensuring ad effectiveness.
VPN & Proxy Detection Software
VPN and proxy detection tools are software applications designed to identify the use of virtual private networks (VPN) and proxy services.
Cloud Detection and Response (CDR) Software
Cloud detection and response software is a type of cybersecurity technology used to monitor the cloud environment for malicious activities. It uses automated processes to detect abnormal behavior, investigate suspected threats, and take action in real-time. The software can be tailored to an organization's specific security needs, allowing them to identify potential risks quickly and respond accordingly. With this type of solution in place, organizations can better protect their data against cyber attacks.
Endpoint Detection and Response (EDR) Software
Endpoint Detection and Response (EDR) software provides continuous monitoring and analysis of endpoint devices—such as laptops, desktops, and servers—to detect, investigate, and respond to cybersecurity threats in real-time. It uses behavioral analysis, threat intelligence, and machine learning to identify suspicious activities, malware, and advanced attacks that traditional antivirus solutions may miss. EDR platforms offer automated threat containment, root cause analysis, forensic investigations, and remediation tools to minimize damage and downtime. By providing detailed visibility into endpoint activities and fast incident response capabilities, EDR software enhances an organization’s overall security posture. It is widely deployed in enterprises to protect against evolving cyber threats and maintain regulatory compliance.
Managed Detection and Response (MDR) Services
Managed detection and response (MDR) software enables the monitoring of endpoint and network security in order to detect and solve potential threats.
Network Detection and Response (NDR) Software
Network detection and response (NDR) software and solutions enable organizations to monitor network activity to identify potential security threats, and alert teams of these potential threats when they arise.
View more categories (20) for "object detection"

188 Products for "object detection" with 1 filter applied:

  • 1
    Aruba Cloud

    Aruba Cloud

    Aruba Cloud

    ...IaaS and PaaS solutions for your cloud computing applications. A service that allows you to create and set up auto-backups, ideal solution to manage and protect your backups. With our Object Storage solution, based on the IaaS model, you can create and manage storage space to store all the data that you want. Domain Center is a web service offered by Aruba Cloud that allows users to purchase and transfer domain names and manage DNS. Monitor all your websites, Cloud Servers, dedicated servers, whether they reside in Aruba Cloud data centers, or are hosted by other providers. ...
  • 2
    FindFace

    FindFace

    NtechLab

    NtechLab platform processes video and recognizes human faces, bodies and actions, as well as cars and plate numbers. AI-powered technology enables record breaking accuracy and high speed of recognition. The multi-object and analytical capabilities of FindFace Multi unlock new scenarios for responding challenges of public sector and business. FindFace Multi quickly and accurately recognizes faces, human bodies, cars, and license plate numbers in a live video stream or in a video archive. Searching for faces, bodies, and vehicles in a database or in an archive is available both by a photo sample and by specific features, for example, by age, clothes color, or vehicle model. ...
  • 3
    InstructGPT
    InstructGPT is an open-source framework for training language models to generate natural language instructions from visual input. It uses a generative pre-trained transformer (GPT) model and the state-of-the-art object detector, Mask R-CNN, to detect objects in images and generate natural language sentences that describe the image. InstructGPT is designed to be effective across domains such as robotics, gaming and education; it can assist robots in navigating complex tasks with natural language instructions, or help students learn by providing descriptive explanations of processes or events.
    Starting Price: $0.0200 per 1000 tokens
  • 4
    Vectorizer

    Vectorizer

    Vectorizer

    Vectorization of raster images is done by converting pixel color information into simple geometric objects. The most common variant is looking over edge detection areas of the same or similar brightness or color, which are then expressed as a graphic primitives like lines, circles and curves. A Raster graphics image is a rectangular grid of pixels, in which each pixel (or point) has an associated color value. Changing the size of the raster image mostly results in loss of apparent quality. ...
    Starting Price: $5.09 one-time payment
  • 5
    AeroMegh
    ...It offers three primary products: AeroGCS, a smart drone mission planner for efficient flight and data capture; DroneNaksha, which provides photogrammetry solutions to process raw geo-tagged images into 2D and 3D outputs like orthomosaics and elevation models; and PicStork, an AI-powered tool that performs advanced analytics on processed images, enabling object detection and custom machine learning model creation. These integrated tools streamline drone operations across various sectors, including agriculture, construction, and power, enhancing efficiency and decision-making.
  • 6
    Martello Vantage DX
    Managing Microsoft Teams and Microsoft Office 365 application performance requires deep insight into the real user experience as well as coordination between IT departments and service providers that each work with different tools with different objectives. IT teams often struggle to qualify and solve application performance or voice quality issues because available data from user feedback and traditional monitoring tools don’t provide substantial insight into the user experience. Martello Vantage DX™ gives IT teams complete end-to-end visibility of Microsoft 365 user experience to rapidly detect and resolve problems before they impact the user experience. ...
  • 7
    Ultralytics

    Ultralytics

    Ultralytics

    ...The platform allows you to drag and drop datasets, select from pre-built templates or fine-tune custom models, then export to a wide variety of formats for cloud, edge or mobile deployment. With support for tasks including object detection, instance segmentation, image classification, pose estimation and oriented bounding-box detection, Ultralytics’ models deliver high accuracy and efficiency and are optimized for both embedded devices and large-scale inference. The product also includes Ultralytics HUB, a web-based tool where users can upload their images/videos, train models online, preview results (even on a phone), collaborate with team members, and deploy via an inference API.
  • 8
    SKY ENGINE

    SKY ENGINE

    SKY ENGINE AI

    ...SKY ENGINE AI Synthetic Data Generation makes Data Scientist life easier providing perfectly balanced datasets for any Computer Vision applications like object detection & recognition, 3D positioning, pose estimation and other sophisticated cases including analysis of multi-sensor data i.e., Radars, Lidars, Satellite, X-rays, and more.
  • 9
    cvi42

    cvi42

    Circle Cardiovascular Imaging

    ...Work more effectively with the best-in-class cardiovascular imaging solution. With over a decade of experience in developing workflows, our work is aimed at helping yours. Easily detect wall motion abnormality. Autodisplay of stroke volume, ejection fraction, and end-diastolic and end-systolic volumes and masses. Assess complex cardiovascular morphology with 2D and 3D visualization options, complemented with diverse measurement tools. Provides objective, user-independent, fully automatic quantitative analysis of myocardial blood flow with expert level accuracy. ...
  • 10
    Roora

    Roora

    Roora

    Roora provides high-quality data annotation services for machine learning, specializing in image, video, and text annotation across various industries such as healthcare, autonomous vehicles, and retail. With expertise in techniques like bounding boxes, semantic segmentation, and object detection, Roora helps businesses enhance AI models for better performance. The platform’s skilled team ensures that data labeling is accurate, scalable, and secure, improving AI systems' ability to recognize and classify visual elements in real-world applications like facial recognition, medical imaging, and autonomous navigation.
  • 11
    Label Studio

    Label Studio

    Label Studio

    The most flexible data annotation tool. Quickly installable. Build custom UIs or use pre-built labeling templates. Configurable layouts and templates adapt to your dataset and workflow. Detect objects on images, boxes, polygons, circular, and key points supported. Partition the image into multiple segments. Use ML models to pre-label and optimize the process. Webhooks, Python SDK, and API allow you to authenticate, create projects, import tasks, manage model predictions, and more. Save time by using predictions to assist your labeling process with ML backend integration. ...
  • 12
    IBM Z Service Management Suite
    ...Analyze IBM OMEGAMON metrics with popular AI platforms for improved visibility and anomaly detection.
  • 13
    Effcon (Effective-Control)
    MONAROV & Co. Consulting’s Effcon system (effective – control) is a unique automated system which was developed based on over 20 years of experience in the fields of Internal Control and Fraud Prevention Engagements. The system facilitates the maintenance of an automated, continuous and independent control system for purposes of identifying control weaknesses, fraud and irregularities, reducing operational risks and assessing the effectiveness of internal control in the organization. The...
  • 14
    iSyncSF

    iSyncSF

    H2TECH Software

    iSyncSF supports truly "n" level parent & child relationships. Admin/Developer does not need to define orders of an object, this app will detect the orders of data migration which makes this app super easy to configure & manage. iSyncSF is 100% native, so data will never go outside the salesforce environment even for the processing which gives 100% data security. Data Masking feature can enhance your data security while moving secure data from production to the sandbox. ...
  • 15
    Appknox

    Appknox

    Appknox

    ...Highest Rated Security solution on Gartner We rejoice when the Appknox system secures our client’s app against all vulnerabilities. At Appknox we’re dedicated to delivering Mobile Application Security to help businesses achieve their objectives today and in the near Future. Static Application Security Testing (SAST). With 36 different test cases, Appknox SAST can detect almost every vulnerability that’s lurking around by analyzing your source code. Our tests cover security compliances like OWASP Top 10, PCI-DSS, HIPAA and other commonly used security threat parameters. ...
  • 16
    Perfony

    Perfony

    Perfony

    Create your files, plan actions, manage priorities and deadlines to achieve your objectives. Thanks to the GANTT and KANBAN views, choose the most comfortable view to work in. Create your own teams, set up groups, appoint leaders and contributors, exchange in dedicated discussion threads, efficiently animate your meetings and share information. Identify overdue actions, detect unnecessary meetings, track the progress of files.
  • 17
    OptaliQ glauco
    Extend complex image analysis beyond human capabilities. Automatically detect and classify structural patterns. Optimize processing time and quality of image-based workflows. Augment visual assessments by objective and validated methods. Management tool for generation of high-quality diagnoses through peer-reviewed campaigns by medical experts; used as training data for machine learning. Our applications are cloud-ready AI-as-a-Service and also available as libraries for integration with imaging devices and diagnostics software. ...
  • 18
    SPC VISION

    SPC VISION

    INFODREAM

    ...This is statistical process control or Statistical Process Control (SPM) in French. This technique experienced a very important boom in the mid-1980s in the American automobile industry. The main objective of the SPC is, thanks to the quality control of the continuous production and by sampling, to reduce the scrap or rework rates , in anticipation of the non-quality. SPC software enables real-time analysis of your processes and alerts you when control limits are exceeded. © Infodream. Among the alerts, we will in particular detect overruns of control limits (which are tighter than the tolerance limits ) and drifts that demonstrate that a process is deteriorating. ...
  • 19
    DELIVERY CONTROL

    DELIVERY CONTROL

    MBM Italia S.r.l.

    ...Immediate notification of delivery results (signature, reasons for refusal, photographic documentation, ...). Real-time localization of vehicles and cargo composition. Data automatically transferred from the palmtop database to the central server. Verification of the objects unloaded / loaded at each delivery point. Electronic transmission of the “Despatch Advice” to the recipient with the exact data. The application to plan, track and certify the delivery of goods, detecting the state of execution in real time. Optimization and planning of routes and vehicle loading.
  • 20
    Cyberwatch

    Cyberwatch

    Cyberwatch

    ...Define your compliance rules and control your information system. Cyberwatch helps you to get a complete and contextualized list of assets and technologies in your Information System. Cyberwatch allows you to define your objectives thanks to an encyclopedia of rules with pre-sets.
  • 21
    Photomizer

    Photomizer

    Avanquest Software

    ...What looks like magic are in fact complex work routines of everyday life by picture editing specialists. Thousands of photos have been the inspiration, to collect, analyze, and optimally edit all possible situations. The software detects exactly the areas in the photo, which can be improved so that the picture editing occurs optimally. It is professional automation for those, who simply want perfect photo. The statistics function provides you an overview of how many photos were already optimized. The photo optimisation algorithm has been strongly improved; among other things, the so-called halo-effects around objects have been removed. ...
    Starting Price: $29.99
  • 22
    Photo Retoucher
    Photo Retoucher can perfect your photos, making you want to frame them and hang on a wall. Clean up old photos, remove unwanted objects, do a touchup to produce a perfect picture out of an ordinary snapshot. SoftOrbits Photo Retoucher helps remove imperfections from scanned photos and film frames, touch up digital images and polish snapshots to perfection. Employing artificial intelligence for its smart fill algorithm, SoftOrbits Photo Retoucher helps restoring old photos by removing folds and scratches, patching spots and fixing torn edges. ...
    Starting Price: $49.99 per license
  • 23
    MaxPatrol

    MaxPatrol

    Positive Technologies

    MaxPatrol is made for managing vulnerabilities and compliance on corporate information systems. Penetration testing, system checks, and compliance monitoring are at the core of MaxPatrol. Together, these mechanisms give an objective picture of the security stance across IT infrastructure as well as granular insight at the department, host, and application level, precisely the information needed to quickly detect vulnerabilities and prevent attacks. MaxPatrol makes it a cinch to keep an up-to-date inventory of IT assets. View information about network resources (network addresses, OS, available network applications and services), identify hardware and software in use, and monitor the state of updates. ...
  • 24
    Ymonitor

    Ymonitor

    Sentia

    ...We monitor all applications, trough all connections, on all locations and from all devices. One single point of truth for all layers of IT and business on desktop, tablet and mobile. Recognize data trends, detect anomalies, and correlate multiple data sources using the API. Receive alerts by email and sms and take proactive action before end-users experience impact. Index your performance data to determine the quality of your IT services. In order to objectively analyze the performance of your application, Sentia measures from the perspective of the end-user.
  • 25
    Predix APM

    Predix APM

    GE Digital

    ...Reduce unplanned downtime and increase availability and reliability by helping to ensure critical assets and systems are monitored and protected from emerging threats. Protect the health and safety of employees, the environment, and business objectives, by reducing asset-related incidents and unplanned downtime. Reduce costly emergency repairs by detecting problems early, turning unplanned downtime into planned/scheduled downtime.
  • 26
    QBurst Video Analytics
    ...Insights from video content analysis are being increasingly used to transform operations and drive efficiency in these sectors. Thermal cameras connected to video analytics software can detect movement even in darkness and warn of trespass in real time. Security staff can visually verify the situation and take relevant action. Object identification in live traffic streams reveal vehicle pile-ups and possible road congestion.
  • 27
    Gorilla IVAR

    Gorilla IVAR

    Gorilla Technology Group

    Video Analytics are sets of processes that use AI algorithms and metadata to scan video in order to detect patterns or recognize specific objects. Once processed, the video data can then be queried and searched for various/specific results. These are also known as IVAs - Intelligent Video Analytics. Government bodies actively opting for AI-based video systems to monitor traffic congestion. Face recognition technologies are being speedily adopted to support video-based data analytics and enhance face matching to serve several end-use applications. ...
  • 28
    Site Scan for ArcGIS
    ...Save time by using the measurement and analysis tools to get the answers you need from your data. Directly publish your drone data to your ArcGIS organization to perform advanced drone analytics such as object detection and application of artificial intelligence (AI).
  • 29
    WeatherSentry
    DTN delivers accurate, objective, real-time, and actionable insights to increase our 2 million customers’ confidence and support their business decisions. We empower our agriculture, energy weather, transportation and financial analytics customers – those who work endlessly to feed, fuel and protect our world. We believe that when our customers are supported with the most reliable and innovative information to the Nth Degree, they prosper and we all win.
  • 30
    DriveMod
    ...Drivemod’s flexibility ensures heterogeneous fleets operate smoothly regardless of vehicle type or manufacturer. Our AI software combines with leading sensors and computing hardware to create capabilities that far exceed that of human drivers. DriveMod can detect thousands of objects, propose thousands of candidate paths, and then navigate the optimal route — all in fractions of a second.