Video Data Sample Clauses

Video Data. Video data were used in this study to validate the IID algorithm. The STAR Lab has access to all the 400+ WSDOT traffic surveillance video cameras deployed along the freeway corridors. These cameras cover I-5, I-405, I-90, SR 167, SR 520, and others. To capture ground-truth travel delay data, two cameras are needed, one at each end of the link being monitored. To facilitate a comparison with loop data-based IID estimates, these cameras’ fields of view are best centered at the loop stations bounding the freeway link. However, very few freeway links have both surveillance video cameras and inductance loops located at approximately the same places. The STAR Lab’s fiber connection can support two live video streams simultaneously, which satisfied the video data collection need for this project. Two video streams, one at each end of a freeway link, were recorded simultaneously to collect vehicle arrival and departure data for the link. Because the research team could not predict when an incident would occur, the video streams were recorded for long periods to ensure the capture of traffic volumes under incident impacts.
AutoNDA by SimpleDocs
Video Data. Video data is essential in understanding or interpreting the data recorded by the sen- sors and in understanding driver behaviour in general. Significant developments con- tinue with regard to cameras, frame rate, resolution, zoom level and storage capacity. Video data analysis will almost certainly be necessary for an ND study that aims to evaluate distraction or inattention in drivers and to study driver behaviour in general. Studying visual behaviour in particular is currently complex and expensive as it re- quires high sensitivity eye-tracking equipment and/or machine-vision techniques. An al- ternative could be the use of event-triggers to highlight areas of interest in the data, such as high longitudinal ‘g’, lateral accelerations or yaw. This can be complemented by manual video analysis to determine the exact nature of the distraction or inattention at specific points of interest. This technique relies on good quality video data in terms of, but not exclusive to, the number of camera and their angles, video resolution and frame rate. For a more complete understanding of both vehicle and environment factors it is rec- ommended to use a minimum of four cameras, the positions of which will ultimately be dictated by the nature of the data requirements. The red dots (and associated shaded areas indicating the fields of view) in Figure 5.1 show a basic layout for capturing good quality video data about the driver, the vehicle and the environment. It is clear, how- ever, that if an alternative shot is required, another camera will have to be introduced or a compromise will have to be made with the existing arrangement. Camera positioning will also be dictated somewhat by other factors, some of which can be difficult to resolve (such as suitable mounting positions or available space within the vehicle) and others which need careful consideration (such as ethical constraints re- stricting images of passengers). In most cases a compromise between meeting the ideal video requirements and finding a practical solution will need to be made.

Related to Video Data

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Licensee Data Licensee acknowledges and agrees that Licensee will be solely responsible for backing-up, and taking all appropriate measures to protect and secure, Licensee Data. Licensee acknowledges that Nuix may make, store and maintain back up copies of Licensee Data, but is not obliged to do so. Nuix will not be liable for any loss or corruption of Licensee Data.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

  • Product Information Contractor shall provide the following information for all goods provided pursuant to this Agreement: manufacturer’s name, product code number, and pack size.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Customer Data 4.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Product Data Illustrations, standard schedules, performance charts, instructions, brochures, diagrams, and other information furnished by Developer to illustrate a material, product, or system for some portion of the Work.

  • Metadata Bibliographical, structural & descriptive data of the Licensed Material as defined in Schedule 5.

  • Customer Materials 11.1. The Supplier including any of its employees, agents, consultants, contractors and any third party shall:

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

Time is Money Join Law Insider Premium to draft better contracts faster.