Abstract: Disclosed are various embodiments for detecting and reporting improper activity, such a traffic violation. In one embodiment, a computing device receives multiple image frames from a client device. The computing device detects that a vehicle shown in at least one of the image frames is in violation of a rule. The computing device generates an evidence package based on at least one of the image frames. The computing device transmits the evidence to an evidence review device for review by an enforcement individual.
Abstract: Discussed are various systems, computer-readable mediums, and methods for determining a vehicle is of interest, referred to as a targeted vehicle, based on an image capture of the car. A user may position a mobile computing device on the dash of his or her vehicle. While the user is driving, the mobile computing device may collect image frames of other vehicles and transmit them to a remote server. The remote server may identify a vehicle as a targeted vehicle and notify one or more users of the identification including details regarding why the vehicle is targeted.
Abstract: Disclosed are various embodiments for detecting and reporting improper activity, such a traffic violation. In one embodiment, a computing device receives multiple image frames from a client device. The computing device detects that a vehicle shown in at least one of the image frames is in violation of a rule. The computing device generates an evidence package based on at least one of the image frames. The computing device transmits the evidence to an evidence review device for review by an enforcement individual.