“AMIS-Shot” makes it possible to identify weapons by bullets and shells recovered from a crime scene with the purpose of efficiently solving criminal cases. Implementation of the system by law-enforcement agencies results in a considerable improvement of the clearance rate and improves the overall security of the civil society. “AMIS-Shot”:
Problems solved by “AMIS-Shot”
Mathematical algorithms of “AMIS-Shot”“AMIS-Shot” uses a high-precision algorithm based on years of forensic practice to encode and recognize images. The proprietary technique used in the software for processing complex image-related information (2D+3D) when comparing the traces of the striker pin considerably improved the selectiveness of this type of search. Here are just some of the program features:
Entering bullet and shell images in “AMIS-Shot”When creating a scanning request, the user must enter extensive information for each object, be it a bullet or shell – additional data and technical parameters. The system features an editable system of catalogs and dictionaries for simplifying data entry and ensuring consistency. The scanning process can be very diverse and differ by the state of the bullet (shell). The following parameters can be adjusted: the level and the angle of the lighting sector, as well as the scanner rotation step. Therefore, high-quality trace images require a special technique of scanning that covers the entire depth of deformation layer by layer. At the end of the process, the layers are merged after the selection of image areas with the best quality. Information obtained during layer-by-layer scanning is used for generating 3D images and surface profiles. The scanner is controlled by specialized scanning software. System architectureConfiguration of the “AMIS-Shot” system is determined by the size of the database and the required number of workstations. TCP/IP is used as the default data exchange protocol. The core of the system is based on the client/server architecture that supports independent communication of workstations to the central server processing their requests. |