gptkbp:instance_of
|
gptkb:surveillance_technology
|
gptkbp:can_be
|
analog
digital
wired
wireless
IP-based
|
gptkbp:can_be_used_for
|
crowd control
event security
|
gptkbp:can_provide
|
evidence in investigations
|
gptkbp:composed_of
|
gptkb:camera
monitors
recorders
|
gptkbp:connects
|
the internet
|
gptkbp:control_system
|
gptkb:software
|
https://www.w3.org/2000/01/rdf-schema#label
|
Closed-circuit television
|
gptkbp:is_accessible_by
|
authorized personnel
|
gptkbp:is_available_in
|
various resolutions
|
gptkbp:is_criticized_for
|
privacy concerns
surveillance overreach
|
gptkbp:is_equipped_with
|
gptkb:speeches
motion detection
night vision capabilities
|
gptkbp:is_implemented_in
|
gptkb:government_buildings
hospitals
restaurants
data centers
hotels
power plants
warehouses
stadiums
construction sites
military bases
parking lots
border crossings
malls
public transport stations
prisons
emergency response centers
airports security checkpoints
|
gptkbp:is_integrated_with
|
access control systems
alarm systems
|
gptkbp:is_monitored_by
|
remote locations
|
gptkbp:is_often_used_in
|
banks
schools
airports
retail environments
|
gptkbp:is_part_of
|
smart city initiatives
|
gptkbp:is_regulated_by
|
privacy laws
|
gptkbp:is_subject_to
|
hacking risks
|
gptkbp:is_used_by
|
businesses
government agencies
homes
|
gptkbp:provides
|
real-time video feed
|
gptkbp:recordings
|
gptkb:video
|
gptkbp:storage
|
video data
|
gptkbp:used_for
|
monitoring
|
gptkbp:used_in
|
gptkb:public_safety
traffic monitoring
security applications
|
gptkbp:bfsParent
|
gptkb:Ali_vs._Liston_II
gptkb:Ali_vs._Liston_I
gptkb:Ali_vs._Foreman
gptkb:Ali_vs._Berbick
gptkb:Ali_vs._Norton_I
gptkb:Ali_vs._Norton_II
gptkb:Ali_vs._Patterson_II
gptkb:Ali_vs._Shavers
gptkb:Ali_vs._Spinks_II
gptkb:Wrestle_Mania_I
|
gptkbp:bfsLayer
|
4
|