Tyrande, an unknown and secret location.

The No. 4 Tianji Shensuan uses the Tianji system to analyze the security surveillance video records sent by Kishijima Maple. The Tianji system is very efficient and simultaneously analyzes 64 security surveillance video recording clips at 64 times the timeline speed.

In these security surveillance video records, each person's facial features, behavioral dynamics, clothing characteristics, corresponding time nodes, and relevant identity information, etc., will all be marked by the Tianji system.

The Tianji system will also establish an action trajectory analysis based on the location and time when the security surveillance video record was generated, so as to determine whether the action trajectory of the corresponding target is reasonable.

For example, a male target A passes by the crime scene. Why does he pass by the crime scene? Will he pass by the crime scene at the same time before and after the crime?

The No. 4 Tianji Divine Accountant has invaded the Population Information Bureau where the crime scene was located, thereby obtaining a large amount of population information data so that the Tianji system can conduct matching analysis.

If male target A is a local near the crime scene and his behavior pattern has not changed before and after the crime, it means that male target A’s suspicion level is relatively low and he will directly pass the first round of screening by the Tianji system..

Unless the first round of screening by the Tianji system fails to screen out any problematic suspects, or all suspects screened by the Tianji system have been eliminated as suspects, male target A will not be subject to further investigation.

The analysis speed of the Tianji system is very fast. After all, it can process 64 videos at the same time at a speed of 64 times the timeline. This processing speed far exceeds the processing speed of humans.

In less than half an hour, the Tianji system processed all the security surveillance video records and directly discovered a target marked as [Key Suspect].

The No. 4 Tianji Shensuan immediately checked the key suspect targets marked by the Tianji system.

This key suspect was captured on a security camera 400 meters away from the crime scene. He was wearing a cap and a mask, making it impossible for human facial recognition programs to identify him.

However, current human recognition technology has long developed into various branches. Human facial feature recognition technology is the most basic technology. Other branch technologies include: human voiceprint feature recognition technology and human behavior dynamic feature recognition technology.

The human behavior dynamic feature recognition program can very well identify guys wearing caps and masks. Although the recognition rate cannot be compared with the human facial feature recognition program, the recognition rate is still very high.

The reason why the Tianji system marked the key suspect target as a key suspect is very simple. The action trajectory of this key suspect target is not a daily pattern. He is an outsider.

In addition, the key suspect target was not found in the security monitoring system within 200 meters of the crime scene and the crime scene, but during the period when the key suspect target 'disappeared', he did not appear in other security monitoring systems.

From the timeline analysis, it is very likely that the key suspect target entered the crime scene when other security surveillance systems were set up to shoot in a loop.

According to the results of the Tianji system, No. 4 Tianji Divine Calculation, he personally analyzed it and finally determined that there were indeed major problems with the key suspected targets. He contacted An Liang immediately.

"BOSS, we have discovered a key suspect target."Tianji Shensuan No. 4 sent the relevant video to An Liang.

While checking the video, An Liang asked,"Is there any way for us to obtain more security surveillance video records?

An Liang asked additionally,"For example, directly obtain the authority of the security monitoring system of the entire winter capital?""

No. 4 Tianji Divine Calculator responded affirmatively,"Yes, it is possible, but it will be very troublesome, unless we launch a hacker war against Neon, and then use the hacker war as a cover to obtain the authority of the public security monitoring system of Dongjing City, and finally achieve query security. The purpose of surveillance video recording"

"But once we go to war like this, I worry that mathematicians will guess what we're planning."No. 4 Tianji Divine Calculation Supplement

"In this case, let's wait for the data from the converts or the Entry-Exit Administration, and then use dynamic behavioral characteristics to filter. If there are still no results, we will consider launching a hacker war."An Liang responded

"OK"Tianji Shensuan No. 4 responded, and then added,"I think we can definitely find the mathematician in the surveillance video of the Exit-Entry Administration."

No. 4 Tianji Shensuan added,"No. 6 did a psychological profile analysis on the mathematician. No. 6 believed that according to the mathematician's way of committing crimes, he would definitely commit the crime himself to avoid any accidents."

"Similar to a mathematician's almost seamless method of committing crimes, the perpetrator must be pursuing absolute control, so No. 6 guessed that the mathematician was at the scene of the crime, and we will definitely catch the traces of the mathematician this time!"Tianji Shensuan No. 4 said with confidence.

Clown No. 6 is a senior executive of Renyi Security Company. He is a psychologist and behavioral scientist. This time the action against mathematicians, Clown No. 6 naturally joined in.

"hope so!"An Liang responded.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like