3,219 research outputs found

    Crime Monitoring and Controlling System by Mobile Device

    Get PDF
    The Closed Circuit Television (CCTV) have been used at very large scale for monitoring, recording and getting popular in whole world. The major goal of Closed Circuit Television system is monitoring or observing crime and tracking the objects. The smart phone Mobile world is also expanding at a rapid scale since the technology was invented. Most of smart phones users live in those countries where usage of CCTV system is very common in life. This project studies a monitoring system for smart phone mobile users based on CCTV system, where information will be sent from mobile phones to server so that CCTV system can work more specifically and accurately by monitoring and tracking objects. A safety assurance approach is proposed, in which a user can inform his location for close observation. If he/she feels like a potential threat. In that case of emergency situation, location, problem and all possible difficulties can be determined in comparatively less time by concern authorities like police as they have already monitoring the situation. DOI: 10.17762/ijritcc2321-8169.15012

    Can we ID from CCTV? Image quality in digital CCTV and face identification performance

    Get PDF
    CCTV is used for an increasing number Of purposes, and the new generation of digital systems can be tailored to serve a wide range of security requirements. However, configuration decisions are often made without considering specific task requirements, e.g. the video quality needed for reliable person identification. Our Study investigated the relationship between video quality and the ability of untrained viewers to identify faces from digital CCTV images. The task required 80 participants to identify 64 faces belonging to 4 different ethnicities. Participants compared face images taken from a high quality photographs and low quality CCTV stills, which were recorded at 4 different video quality bit rates (32, 52, 72 and 92 Kbps). We found that the number of correct identifications decreased by 12 (similar to 18%) as MPEG-4 quality decreased from 92 to 32 Kbps, and by 4 (similar to 6%) as Wavelet video quality decreased from 92 to 32 Kbps. To achieve reliable and effective face identification, we recommend that MPEG-4 CCTV systems should be used over Wavelet, and video quality should not be lowered below 52 Kbps during video compression. We discuss the practical implications of these results for security, and contribute a contextual methodology for assessing CCTV video quality

    Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration

    Get PDF
    There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems ‘expose’ relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT)

    Development and Implementation of a Monitoring System for STRC with the Aid of Head Detection

    Get PDF
    The Development and Implementation of a Monitoring System for STRC with the Aid of Head Detection aims to automate the research room operations to increase its efficiency. It consists of a head detection system, website managed database and a mobile application controlled room access. The website and mobile application cater to two types of users namely, the administrator and the students. The website exclusively features announcements and management of equipment inventory both handled by the administrator. The mobile application features an IN/OUT button which manages the users access on the five (5) research rooms in the building. The head detection system detects, tracks and counts each person that enters a research room. The count noted by the system is then compared to the count of students that used the mobile application for room access. The e-mail and SMS notification system observes the comparison of the two counts and sends the appropriate notification to the administrator when there is a violation in the conditions set for the two systems. The database serves as the central point as it holds every information needed by each element in order to communicate with the whole system

    Honesty, social presence, and self-service in retail

    Get PDF
    Retail self-service checkouts (SCOs) can benefit consumers and retailers, providing control and autonomy to shoppers independent from staff. Recent research indicates that the lack of presence of staff may provide the opportunity for consumers to behave dishonestly. This study examined whether a social presence in the form of visual, humanlike SCO interface agents had an effect on dishonest user behaviour. Using a simulated SCO scenario, participants experienced various dilemmas in which they could financially benefit themselves undeservedly. We hypothesised that a humanlike social presence integrated within the checkout screen would receive more attention and result in fewer instances of dishonesty compared to a less humanlike agent. Our hypotheses were partially supported by the results. We conclude that companies adopting self-service technology may consider the implementation of social presence to support ethical consumer behaviour, but that more research is required to explore the mixed findings in the current study

    Police Body Worn Cameras and Privacy: Retaining Benefits While Reducing Public Concerns

    Get PDF
    Recent high-profile incidents of police misconduct have led to calls for increased police accountability. One proposed reform is to equip police officers with body worn cameras, which provide more reliable evidence than eyewitness accounts. However, such cameras may pose privacy concerns for individuals who are recorded, as the footage may fall under open records statutes that would require the footage to be released upon request. Furthermore, storage of video data is costly, and redaction of video for release is time-consuming. While exempting all body camera video from release would take care of privacy issues, it would also prevent the public from using body camera footage to uncover misconduct. Agencies and lawmakers can address privacy problems successfully by using data management techniques to identify and preserve critical video evidence, and allowing non-critical video to be deleted under data-retention policies. Furthermore, software redaction may be used to produce releasable video that does not threaten the privacy of recorded individuals

    WSN and RFID integration to support intelligent monitoring in smart buildings using hybrid intelligent decision support systems

    Get PDF
    The real time monitoring of environment context aware activities is becoming a standard in the service delivery in a wide range of domains (child and elderly care and supervision, logistics, circulation, and other). The safety of people, goods and premises depends on the prompt reaction to potential hazards identified at an early stage to engage appropriate control actions. This requires capturing real time data to process locally at the device level or communicate to backend systems for real time decision making. This research examines the wireless sensor network and radio frequency identification technology integration in smart homes to support advanced safety systems deployed upstream to safety and emergency response. These systems are based on the use of hybrid intelligent decision support systems configured in a multi-distributed architecture enabled by the wireless communication of detection and tracking data to support intelligent real-time monitoring in smart buildings. This paper introduces first the concept of wireless sensor network and radio frequency identification technology integration showing the various options for the task distribution between radio frequency identification and hybrid intelligent decision support systems. This integration is then illustrated in a multi-distributed system architecture to identify motion and control access in a smart building using a room capacity model for occupancy and evacuation, access rights and a navigation map automatically generated by the system. The solution shown in the case study is based on a virtual layout of the smart building which is implemented using the capabilities of the building information model and hybrid intelligent decision support system.The Saudi High Education Ministry and Brunel University (UK
    corecore