1,010 research outputs found

    Design and Implementation of An Improved Digital Video Surveillance System

    Get PDF
    Video surveillance systems also known as Close Circuit Television (CCTV) is the systematic investigation or monitoring of the actions or communications of one or more persons in a place. Video surveillance has been a key component in ensuring security at various institutions due to the increase in crime rate ranging from armed robbery, kidnapping and recently bomb blasts around the globe which has necessitated its installation in most establishments.This study therefore described the steps involved in designing an improved video surveillance system. The study discussed the theory of improved video surveillance types, components involved, selection of the best equipment and the details of its virtual design. The system was designed to monitor the footages of a particular surrounding with acamera resolution of 1680 by 1050 and the monitor displayed the desired output from a simulated implementation of the system with the router which served as an internet connection that transmitted the signal over the internet to any device with internet access.An improved video surveillance system has therefore become a foremost global strategic tool for fighting the war against terrorism, preventing crime, protecting cooperate assets and enhancing public safety which has made forensic investigations very easier for the police force. Keywords: Improved Video surveillance system, Communications, Security, Footages, Virtual Design, Close Circuit Television, Internet Access. DOI: 10.7176/CEIS/11-2-07 Publication date: April 30th 202

    Nigeria Paper Currency Serial Number Pattern Recognition System for Crimes Control

    Get PDF
    Only secured and conducive environment void of robbery, kidnapping, fake currency and all forms of insurgencies will foster production and distribution of goods, investment and saving that enhance national economic growth and development. This is a mirage in a country generally believed and tagged the giant of African; Nigeria. Crime, in whatever name or nomenclature, has a significant negative impact on the welfare and economy prosperities of our society. The urge to get rich promotes Crime like armed robbery, kidnapping for ransom and production of counterfeit banknotes to mention but a few. Innocent people have suffered psychological distress, fear, anger, depression, physical harm, financial loss and in most cases untimely death during the operations by these hoodlums. Banks, Cash-In-Transit Vehicle, and ATM points are often robbed by gangs in search for paper currency. Kidnappers as well demand for paper currency as ransom while some other gangs are involved in the production of counterfeit banknotes so as to enrich themselves no minding the negative effect on the nation’s economy.  The banknotes collected during the operations by the hoodlums are taken to banks. Yet, the banks will not detect or recognize any of these notes which attest to the fact that our system lacks check and balance. The system is very porous without a recourse to this era of technology when machine is trained to do virtually everything for our convenience. Currency as an entity has a unique identification number. The identification number is an alphanumeric currency issuance of about 10 digits comprises two (2) capital letters and eight (8) numbers usually positioned at a strategic location on either front or back of the 5, 10, 20, 50, 100, 200, 500 and 1000 naira notes. It is a reliable and intelligent system developed to track banknotes unique identifiers numbers- serial numbers, in order to control financial related crimes. Keywords: Nigeria Paper Currency Serial Number, Pattern Recognition DOI: 10.7176/IKM/11-3-04 Publication date: April 30th 202

    Implementation of Closed-circuit Television (CCTV) Using Wireless Internet Protocol (IP) Camera

    Get PDF
    This paper presents three techniques for configuring, interfacing and networking of a wireless IP-based camera for real-time security surveillance systems design. The three different real-time implementation techniques proposed for configuring, interfacing and networking the IP camera are: 1). accessing the IP-based camera using the WANSCAM or XXCAM vendor software, 2). accessing the IP-based camera via Firefox® web browser , and 3). accessing the IP camera via MATLAB with SIMULINK on an internet ready system. The live streaming video based on the proposed techniques can be adapted for image detection, recognition and tracking for real-time intelligent security surveillance systems design.  The paper also carried out a thorough comparative analysis of the three methods of achieving video streaming resulting from the output of the IP-based cameras. The analysis shows that the WANSCAM or XXCAM software displays the best video animations from the IP-based cameras when compared with the performance of the other methods. Keywords: Closed-circuit television, Internet protocol, Security surveillance, IP-based cameras, Wireless networking, animation

    Eye in the Sky: Real-time Drone Surveillance System (DSS) for Violent Individuals Identification using ScatterNet Hybrid Deep Learning Network

    Full text link
    Drone systems have been deployed by various law enforcement agencies to monitor hostiles, spy on foreign drug cartels, conduct border control operations, etc. This paper introduces a real-time drone surveillance system to identify violent individuals in public areas. The system first uses the Feature Pyramid Network to detect humans from aerial images. The image region with the human is used by the proposed ScatterNet Hybrid Deep Learning (SHDL) network for human pose estimation. The orientations between the limbs of the estimated pose are next used to identify the violent individuals. The proposed deep network can learn meaningful representations quickly using ScatterNet and structural priors with relatively fewer labeled examples. The system detects the violent individuals in real-time by processing the drone images in the cloud. This research also introduces the aerial violent individual dataset used for training the deep network which hopefully may encourage researchers interested in using deep learning for aerial surveillance. The pose estimation and violent individuals identification performance is compared with the state-of-the-art techniques.Comment: To Appear in the Efficient Deep Learning for Computer Vision (ECV) workshop at IEEE Computer Vision and Pattern Recognition (CVPR) 2018. Youtube demo at this: https://www.youtube.com/watch?v=zYypJPJipY

    Video Surveillance for Road Traffic Monitoring

    Get PDF
    This project addresses the improvement of the current process of road traffic monitoring system being implemented in Malaysia. The current monitoring system implies video feeds from a particular road to a place where there will be personnel monitoring the traffic condition. The personnel will then manually update the traffic condition to various radio and television networks throughout the country to be broadcasted. FM radio is a famous channel for traffic updates since every vehicle is equipped with one. This project will provide a real-time update of the current traffic condition

    Transportation, Terrorism and Crime: Deterrence, Disruption and Resilience

    Get PDF
    Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks. This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and the possible mitigation or response tactics that may be effective in deterring attacks or saving lives in the event of an attack. It includes case studies that can be used as educational tools for understanding terrorist methodologies, as well as ordinary emergencies that might become a terrorist’s blueprint

    Real-time Coordinate Estimation for Self-Localization of the Humanoid Robot Soccer BarelangFC

    Get PDF
    In implementation, of the humanoid robot soccer consists of more than three robots when played soccer on the field. All the robots needed to be played the soccer as human done such as seeking, chasing, dribbling and kicking the ball. To do all of these commands, it is required a real-time localization system so that each robot will understand not only the robot position itself but also the other robots and even the object on the field’s environment. However, in real-time implementation and due to the limited ability of the robot computation, it is necessary to determine a method which has fast computation and able to save much memory. Therefore, in this paper we presented a real-time localization implementation method using the odometry and Monte Carlo Localization (MCL) method. In order to verify the performance of this method, some experiment has been carried out in real-time application. From the experimental result, the proposed method able to estimate the coordinate of each robot position in X and Y position on the field.Dalam implementasinya, robot humanoid soccer terdiri lebih dari tiga robot di lapangan ketika sedang bermain bola. Semua robot diharapkan dapat memainkan sepak bola seperti manusia seperti mencari, mengejar, menggiring bola dan menendang bola. Untuk melakukan semua perintah tersebut, diperlukan sistem lokalisasi real-time sehingga setiap robot tidak hanya memahami posisi robotnya sendiri tetapi juga robot-robot lain bahkan objek yang berada di sekitar lapangan. Namun dalam implementasi real-time dan karena keterbatasan kemampuan komputasi robot, diperlukan suatu metode komputasi yang cepat dan mampu menghemat banyak memori. Oleh karena itu, dalam makalah ini menyajikan metode implementasi lokalisasi real-time dengan menggunakan metode odometry and Monte Carlo Localization (MCL). Untuk memverifikasi kinerja metode ini, beberapa percobaan telah dilakukan dalam aplikasi real-time. Dari hasil percobaan, metode yang diusulkan mampu mengestimasi koordinat posisi robot pada posisi X dan Y di lapangan ketika sedang bermain bola

    A UBIQUITOUS TECHNOLOGY FRAMEWORK FOR CURBING THE BOKO HARAM MENACE IN NIGERIA

    Get PDF
    The security threat posed by the Boko Haram sect in Nigeria has remained unabated with no hope in sight. Weexamined the concept and applications of ubiquitous technology and taking advantage of its potentials, proposed anarchitectural framework – N-tier Ubiquitous Architectural Framework (NUAF) – for curbing the Boko Harammenace in Nigeria. NUAF is a hierarchical and segregational distributed architectural framework which in itssimplest form consists of the base-tier, inner-tier and top-tier. The real life implementation of NUAF is howeverdependent on some anticipated research sucesses in nanotechnology and wireless network security.Keywords: Internal security, Terrorism, Boko Haram, Ubiquitous technology and Distributed architectur
    corecore