To see the other types of publications on this topic, follow the link: Closed-circuit television (CCTV) system.

Journal articles on the topic 'Closed-circuit television (CCTV) system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Closed-circuit television (CCTV) system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Liu, Yu Xin. "Detection Criteria and Reliability Analysis of Highway Closed Circuit Television." Applied Mechanics and Materials 409-410 (September 2013): 1379–82. http://dx.doi.org/10.4028/www.scientific.net/amm.409-410.1379.

Full text
Abstract:
Closed circuit television (CCTV) monitoring system is used to control traffic and facilitates. In this paper the logical structure of the CCTV system is introduced first. Then the system composition is recommended. Finally the main detection items of CCTV channel, system reliability and maintainability analysis are introduced in details.
APA, Harvard, Vancouver, ISO, and other styles
2

Jacobs, R. J. "Screen Color and Reading Performance on Closed–Circuit Television." Journal of Visual Impairment & Blindness 84, no. 10 (December 1990): 569–72. http://dx.doi.org/10.1177/0145482x9008401022.

Full text
Abstract:
To investigate whether screen color is an important variable in the prescription of CCTV systems, the author measured the visual performance of CCTV users on white, green, and amber screens. When the screen luminance and contrast were equated for each CCTV, the users’ reading performance was unaffected by the screen color. Although some individuals expressed a clear subjective preference or dislike for one color or another, there was no obvious link between the cause of low vision and preference for or aversion to that color.
APA, Harvard, Vancouver, ISO, and other styles
3

Walton, Abram L. J., Sharon A. DeVaney, and Darrel L. Sandall. "Graduate Students’ Perceptions of Privacy and Closed Circuit Television Systems in Public Settings." International Journal of Technology and Human Interaction 7, no. 3 (July 2011): 50–69. http://dx.doi.org/10.4018/jthi.2011070104.

Full text
Abstract:
This qualitative study used grounded theory to examine how university graduate students felt about closed circuit television (CCTV) as it relates to the privacy and safety of students on campuses. As a result of violence at a few universities, more administrators are considering the implementation of CCTV systems. Because graduate students are an important part of the university population, their views were solicited. A qualitative approach was used because of the lack of previous research on this particular topic. Themes that emerged from interviews with 10 graduate students at a large Midwestern land-grant university were identified as: right to safety, right to privacy, personal privacy responsibilities, post-CCTV sense of privacy, post-CCTV sense of safety, crime displacement, false sense of safety, and international perspectives. The findings provide insight into graduate students’ perceptions of a CCTV system and have implications for implementation decisions regarding such a system. Additionally, the findings were utilized to formulate hypotheses for a larger scale research project.
APA, Harvard, Vancouver, ISO, and other styles
4

Vibhakar, Dhaval, Suraj Jha, Aditya Kamble, and Saurabh Suman. "Integrated CCTV Surveillance System for Public Transportation." International Journal of Engineering and Advanced Technology 10, no. 3 (February 28, 2021): 30–33. http://dx.doi.org/10.35940/ijeat.c2157.0210321.

Full text
Abstract:
The urban center residential district Railway is one in every of the busiest railway stations in Bharat and carries over seven.5 million commuters daily. The railways spreads over 123.78 km (76.91 mi).The Railways encompass thirty-nine stations. Trains typically begin from and terminate at necessary stations. in line with a survey ,the total stats given by the RPF(Railway Police Force) & GRP(GOVERNMENT RAILWAY POLICE), 2,700 railway commuters killed, over 1,400 whereas crossing tracks up until last and this variety has been increasing daily. This is creating railways a dangerous possibility for travel and transportation. The video closed-circuit television used is irving to be not useful and not updated. To overcome this drawback we tend to area unit creating associate integrated video closed-circuit television for detection of crimes and missed objects and explains during this paper.We area unit exploitation high resolution cameras which might focus and might be simply accustomed establish someone and can also be helpful in dark.
APA, Harvard, Vancouver, ISO, and other styles
5

Kovaleva, Olga Aleksandrovna, Shumskikh Yuliya L'vovna, Baskakova Natalia Pavlovna, Yultyeva Yulia Borisovna, and Pestova Tatyana Pavlovna. "The Use of Closed-circuit Television (CCTV) Systems for Detecting Offenses: International Experience." Journal of Advanced Research in Dynamical and Control Systems 11, no. 11-SPECIAL ISSUE (November 29, 2019): 152–58. http://dx.doi.org/10.5373/jardcs/v11sp11/20192942.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Contestabile, MBA, John, David Patrone, MS, and Steven Babin, MSE, MD, PhD. "The National Capital Region closed circuit television video interoperability project." Journal of Emergency Management 14, no. 1 (January 1, 2016): 31. http://dx.doi.org/10.5055/jem.2016.0270.

Full text
Abstract:
Objective: The National Capital Region (NCR) includes many government jurisdictions and agencies using different closed circuit TV (CCTV) cameras and video management software. Because these agencies often must work together to respond to emergencies and events, a means of providing interoperability for CCTV video is critically needed.Design: Video data from different CCTV systems that are not inherently interoperable is represented in the “data layer.” An “integration layer” ingests the data layer source video and normalizes the different video formats. It then aggregates and distributes this video to a “presentation layer” where it can be viewed by almost any application used by other agencies and without any proprietary software. A native mobile video viewing application is also developed that uses the presentation layer to provide video to different kinds of smartphones.Setting: The NCR includes Washington, DC, and surrounding counties in Maryland and Virginia. Results: The video sharing architecture allows one agency to see another agency's video in their native viewing application without the need to purchase new CCTV software or systems. A native smartphone application was also developed to enable them to share video via mobile devices even when they use different video management systems.Conclusions: A video sharing architecture has been developed for the NCR that creates an interoperable environment for sharing CCTV video in an efficient and cost effective manner. In addition, it provides the desired capability of sharing video via a native mobile application.
APA, Harvard, Vancouver, ISO, and other styles
7

Uslan, M. M., R. Shen, and Y. Shragai. "The Evolution of Video Magnification Technology." Journal of Visual Impairment & Blindness 90, no. 6 (November 1996): 465–78. http://dx.doi.org/10.1177/0145482x9609000604.

Full text
Abstract:
Closed-circuit television (CCTV) systems are the product of a long line of technological advances in several fields, including optics, electrical signal processing, and video display technology. Many different models are now on the market, and more advanced ones are frequently introduced. This article traces the development of early CCTV systems, examines CCTVs that are on the market today, and speculates on video magnification technology of the future, which will make extensive use of computer-related technology.
APA, Harvard, Vancouver, ISO, and other styles
8

Onie, Sandersan, Xun Li, Morgan Liang, Arcot Sowmya, and Mark Erik Larsen. "The Use of Closed-Circuit Television and Video in Suicide Prevention: Narrative Review and Future Directions." JMIR Mental Health 8, no. 5 (May 7, 2021): e27663. http://dx.doi.org/10.2196/27663.

Full text
Abstract:
Background Suicide is a recognized public health issue, with approximately 800,000 people dying by suicide each year. Among the different technologies used in suicide research, closed-circuit television (CCTV) and video have been used for a wide array of applications, including assessing crisis behaviors at metro stations, and using computer vision to identify a suicide attempt in progress. However, there has been no review of suicide research and interventions using CCTV and video. Objective The objective of this study was to review the literature to understand how CCTV and video data have been used in understanding and preventing suicide. Furthermore, to more fully capture progress in the field, we report on an ongoing study to respond to an identified gap in the narrative review, by using a computer vision–based system to identify behaviors prior to a suicide attempt. Methods We conducted a search using the keywords “suicide,” “cctv,” and “video” on PubMed, Inspec, and Web of Science. We included any studies which used CCTV or video footage to understand or prevent suicide. If a study fell into our area of interest, we included it regardless of the quality as our goal was to understand the scope of how CCTV and video had been used rather than quantify any specific effect size, but we noted the shortcomings in their design and analyses when discussing the studies. Results The review found that CCTV and video have primarily been used in 3 ways: (1) to identify risk factors for suicide (eg, inferring depression from facial expressions), (2) understanding suicide after an attempt (eg, forensic applications), and (3) as part of an intervention (eg, using computer vision and automated systems to identify if a suicide attempt is in progress). Furthermore, work in progress demonstrates how we can identify behaviors prior to an attempt at a hotspot, an important gap identified by papers in the literature. Conclusions Thus far, CCTV and video have been used in a wide array of applications, most notably in designing automated detection systems, with the field heading toward an automated detection system for early intervention. Despite many challenges, we show promising progress in developing an automated detection system for preattempt behaviors, which may allow for early intervention.
APA, Harvard, Vancouver, ISO, and other styles
9

Goodrich, Gregory L. "The CCTV Book: Habilitation and Rehabilitation with Closed Circuit Television Systems." Optometry and Vision Science 75, no. 7 (July 1998): 465–66. http://dx.doi.org/10.1097/00006324-199807000-00011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gim, U.-Ju, Jae-Jun Lee, Jeong-Hun Kim, Young-Ho Park, and Aziz Nasridinov. "An Automatic Shoplifting Detection from Surveillance Videos (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 10 (April 3, 2020): 13795–96. http://dx.doi.org/10.1609/aaai.v34i10.7169.

Full text
Abstract:
The use of closed circuit television (CCTV) surveillance devices is increasing every year to prevent abnormal behaviors, including shoplifting. However, damage from shoplifting is also increasing every year. Thus, there is a need for intelligent CCTV surveillance systems that ensure the integrity of shops, despite workforce shortages. In this study, we propose an automatic detection system of shoplifting behaviors from surveillance videos. Instead of extracting features from the whole frame, we use the Region of Interest (ROI) optical-flow fusion network to highlight the necessary features more accurately.
APA, Harvard, Vancouver, ISO, and other styles
11

Thanh Le, Tuan, JongBeom Jeong, and Eun-Seok Ryu. "Efficient Transcoding and Encryption for Live 360 CCTV System." Applied Sciences 9, no. 4 (February 21, 2019): 760. http://dx.doi.org/10.3390/app9040760.

Full text
Abstract:
In recent years, the rapid development of surveillance information in closed-circuit television (CCTV) has become an indispensable element in security systems. Several CCTV systems designed for video compression and encryption need to improve for the best performance and different security levels. Specially, the advent of 360 video makes the CCTV promising for surveillance without any blind areas. Compared to current systems, 360 CCTV requires the large bandwidth with low latency to run smoothly. Therefore, to improve the system performance, it needs to be more robust to run smoothly. Video transmission and transcoding is an essential process in converting codecs, changing bitrates or resizing the resolution for 360 videos. High-performance transcoding is one of the key factors of real time CCTV stream. Additionally, the security of video streams from cameras to endpoints is also an important priority in CCTV research. In this paper, a real-time transcoding system designed with the ARIA block cipher encryption algorithm is presented. Experimental results show that the proposed method achieved approximately 200% speedup compared to libx265 FFmpeg in transcoding task, and it could handle multiple transcoding sessions simultaneously at high performance for both live 360 CCTV system and existing 2D/3D CCTV system.
APA, Harvard, Vancouver, ISO, and other styles
12

Susilawati, Sita, and Maulana Ashari. "Perancangan Jaringan Closed Circuit Television ( CCTV ) Berbasis Online Sebagai Monitoring Pada SDN 4 Praya." Jurnal Manajemen Informatika dan Sistem Informasi 1, no. 1 (February 7, 2018): 11. http://dx.doi.org/10.36595/misi.v1i1.12.

Full text
Abstract:
Technology that becomes main system that is utilized good at institution, firm and even at schools was beginning apply technology purpose to water down well that of security, monitoring, information access even system security utilizing technology, so one institution, firm and even school have more security system maximal. SDN 4 PRAYA gets initiative to want utilize technologies in learning system at within class, so student and schoolgirl gets at monitoring with far distance and also near in teaching and learning process that be happens. But technology what applicable for memonitoring teaching and learning activity at within class. What can at monitoring processes distance teaching and learning go away. On this research, researcher has done data collecting method and applies analisis's method, of that result, researcher has gotten one solution for design of Network CCTV gets Online basis as Monitoring On SDN 4 Praya. CCTV'S Network implementation gets online basis on eventually get as been applied SDN'S monitoring 4 Praya With be applied CCTV gets online basis, can know happening teaching and learning process within class and CCTV'S performance form online good of peripheral facet can be known. With implementations supportive specification monitoring can thru access distance goes away.
APA, Harvard, Vancouver, ISO, and other styles
13

Pack, Michael L., Brian L. Smith, and William T. Scherer. "Automated Camera Repositioning Technique for Video Image Vehicle Detection Systems: Integrating with Freeway Closed-Circuit Television Systems." Transportation Research Record: Journal of the Transportation Research Board 1856, no. 1 (January 2003): 25–33. http://dx.doi.org/10.3141/1856-04.

Full text
Abstract:
Transportation agencies have invested significantly in extensive closed-circuit television (CCTV) systems to monitor freeways in urban areas. While thes systems have proven to be very effective in supporting incident management, they do not support the collection of quantitative measures of traffic conditions. Instead, they simply provide images that must be interpreted by trained operators. While there are several video image vehicle detection systems (VIVDS) on the market that have the capability to automatically derive traffic measures fro video imagery, these systems require the installation of fixed-position cameras. Thus, they have not been integrated with the existing moveable CCTV cameras. VIVDS camera positioning and calibration challenges were addressed and a prototype machine-vision system was developed that successfully integrated existing moveable CCTV cameras with VIVDS. Results of testing the prototype are presentedindicating that when the camera’s initial zoom level was kept between ×1 and ×1.5, the camera consistently could be returned to its original position with a repositioning accuracy of less than 0.03 to 0.1 regardless of the camera’s displaced pan, tilt, or zoom settings at the time of repositioning. This level of positional accuracy when combined with a VIVDS resulted in vehicle count errors of less than 1%.
APA, Harvard, Vancouver, ISO, and other styles
14

Setiawan, Arif, Ahmad Subhan Yazid, and M. Didik Rohmad Wahyudi. "Room Monitoring System Using OpenWRT-Based Webcam." IJID (International Journal on Informatics for Development) 4, no. 1 (May 26, 2015): 15. http://dx.doi.org/10.14421/ijid.2015.04103.

Full text
Abstract:
The development of Closed Circuit Television (CCTV) technology makes it easier for a user to monitor a room. However, the use of CCTV still cannot reach all levels of society due to the price is relatively expensive. Therefore, it is necessary to build a new system that has the same features as CCTV devices in general but at a more affordable price. This system was built using the OpenWRT operating system. The operating system will be installed on a wireless router with several additional tools to support its functionality such as speakers, GSM modems, webcams, and flash drives. The resulting system has the ability to detect movement and store images and videos when suspicious movements are detected. In addition, this system also has several other features such as alarm alerts, Short Message Service (SMS) warnings, user email reports, and easy access via WIFI and the internet.
APA, Harvard, Vancouver, ISO, and other styles
15

Kim, Dohun, Heegwang Kim, Yeongheon Mok, and Joonki Paik. "Real-Time Surveillance System for Analyzing Abnormal Behavior of Pedestrians." Applied Sciences 11, no. 13 (July 2, 2021): 6153. http://dx.doi.org/10.3390/app11136153.

Full text
Abstract:
In spite of excellent performance of deep learning-based computer vision algorithms, they are not suitable for real-time surveillance to detect abnormal behavior because of very high computational complexity. In this paper, we propose a real-time surveillance system for abnormal behavior analysis in a closed-circuit television (CCTV) environment by constructing an algorithm and system optimized for a CCTV environment. The proposed method combines pedestrian detection and tracking to extract pedestrian information in real-time, and detects abnormal behaviors such as intrusion, loitering, fall-down, and violence. To analyze an abnormal behavior, it first determines intrusion/loitering through the coordinates of an object and then determines fall-down/violence based on the behavior pattern of the object. The performance of the proposed method is evaluated using an intelligent CCTV data set distributed by Korea Internet and Security Agency (KISA).
APA, Harvard, Vancouver, ISO, and other styles
16

Arfan, M., Ahmad Nurjalal, Maman Somantri, and Sudjadi. "Pengenalan Aktivitas Manusia pada Area Tambak Udang dengan Convolutional Neural Network." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (February 28, 2021): 174–79. http://dx.doi.org/10.29207/resti.v5i1.2888.

Full text
Abstract:
Thievery is a problem that can harm theft victims. Thievery usually occurs at night when there is no supervision of goods in a location. To avoid thievery and monitor conditions in a location, CCTV (Closed-Circuit Television) cameras can be used. However, the function of CCTV camera systems is only a passive monitoring systems. In this paper, a human activity recognition is designed using CCTV cameras to produce a security system. Inputs on the recognition process are videos obtained from CCTV cameras installed in the shrimp pond. Human activity recognition that is used in this study is Convolutional Neural Network. Before the human activity recognition was carried out, the program first detected humans with the YOLO (You Only Look Once) algorithm and tracking it with the SORT (Simple Online and Realtime Tracking) algorithm. The results obtained from the human activity recognition is class labels on human objects that are tracked.
APA, Harvard, Vancouver, ISO, and other styles
17

Hawari, Alaa, Mazen Alamin, Firas Alkadour, Mohamed Elmasry, and Tarek Zayed. "Automated defect detection tool for closed circuit television (cctv) inspected sewer pipelines." Automation in Construction 89 (May 2018): 99–109. http://dx.doi.org/10.1016/j.autcon.2018.01.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lauer, Thomas W., and Albert J. Meehan. "Closed Circuit Television Systems on University Campuses: Unexamined Implications for the Expectation of Privacy and Academic Freedom." International Journal of Law and Public Administration 2, no. 2 (August 13, 2019): 1. http://dx.doi.org/10.11114/ijlpa.v2i2.4311.

Full text
Abstract:
Since 9/11 and particularly since the massacre at Virginia Tech University in 2007, many universities in the United States have begun installation of Closed Circuit Television (CCTV) systems on their campuses. What sorts of claims are being made about the use of these systems and what justifications are there for installing them? How might the pervasive use of monitoring technology affect traditional values associated with university life such as freedom of speech, freedom of assembly, privacy, and the freedom to explore? What policies are in place to ensure that whatever benefits associated with these systems justify both tangible and intangible costs?Our analysis is partially derived from a study of university policies in the United States concerning the installation and operation of CCTV systems with the aim of gaining insight into these questions. In addition, we used a coding instrument for analyzing the corpus of policies in order to understand how the policies addressed such issues as: rationale or justification for CCTV usage, relevant personnel roles, public awareness, accountability measures, information security and data handling, routine operations of usage, and any relevant limiting measures. One aspect of our study is to interpret the corpus of policies through the lens of Nissenbaum’s contextual integrity framework which is concerned with examining the effects of new technological practices (such as the installation of CCTV systems) on one’s expectation of privacy.
APA, Harvard, Vancouver, ISO, and other styles
19

Nurhopipah, Ade, and Agus Harjoko. "Motion Detection and Face Recognition for CCTV Surveillance System." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 12, no. 2 (July 31, 2018): 107. http://dx.doi.org/10.22146/ijccs.18198.

Full text
Abstract:
Closed Circuit Television (CCTV) is currently used in daily life for a variety purpose. Development of the use of CCTV has transformed from a simple passive surveillance into an integrated intelligent control system. In this research, motion detection and facial recognation in CCTV video is done to be a base for decision making to produce automated, effective and efficient integrated system. This CCTV video processing provides three outputs, a motion detection information, a face detection information and a face identification information. Accumulative Differences Images (ADI) used for motion detection, and Haar Classifiers Cascade used for facial segmentation. Feature extraction is done with Speeded-Up Robust Features (SURF) and Principal Component Analysis (PCA). The features was trained by Counter-Propagation Network (CPN). Offline tests performed on 45 CCTV video. The test results obtained a motion detection success rate of 92,655%, a face detection success rate of 76%, and a face detection success rate of 60%. The results concluded that the process of faces identification through CCTV video with natural background have not been able to obtain optimal results. The motion detection process is ideal to be applied to real-time conditions. But in combination with face recognition process, there is a significant delay time.
APA, Harvard, Vancouver, ISO, and other styles
20

Muranaka, Yoshio, Nobuko Furuta, Shigeyoshi Aoki, and Kazuko Gohke. "Use of the Simplified Color Video Magnifier by Young Children with Severely Impaired Vision." Journal of Visual Impairment & Blindness 79, no. 9 (November 1985): 391–95. http://dx.doi.org/10.1177/0145482x8507900902.

Full text
Abstract:
A new image magnifier system that enlarges color picture images for visually impaired children, consists of components of home video systems following the closed–circuit television (CCTV) model. Results of experimental use of the system are positive, and children involved show far greater interest in seeing pictures and objects than they did previously. This technique seems especially effective in enriching visual experience of chidlren with severely impaired vision and in bridging the interest development gap between picture appreciation and character reading/writing stages. Other advantages of the system are discussed.
APA, Harvard, Vancouver, ISO, and other styles
21

Rohrschneider, Klaus, Britta Riede, and Anita Blankenagel. "Influence of image frequency of closed-circuit television systems (CCTV) on reading comfort." Der Ophthalmologe 95, no. 2 (February 19, 1998): 110–13. http://dx.doi.org/10.1007/s003470050246.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Liedka, Raymond V., Albert J. Meehan, and Thomas W. Lauer. "CCTV and Campus Crime: Challenging a Technological “Fix”." Criminal Justice Policy Review 30, no. 2 (September 1, 2016): 316–38. http://dx.doi.org/10.1177/0887403416664947.

Full text
Abstract:
Universities using closed circuit television (CCTV) systems often tout its deterrent role when justifying the use of this technology. Using a sample of 336 U.S. universities, we examine the relationship between CCTV and reported crime rates using Clery Act crime data to discern whether CCTV has a deterrent impact on campus crime, controlling for other variables. We find that CCTV appears to have little to no impact. Rather, crime rates are associated with location (suburban, urban, rural), institutional control (public, private), student population density, level of tuition and fees, student-body demographics (e.g., gender, race), and crime control practices other than CCTV (e.g., scheduled security patrols, student transportation/escort services). These relationships differ by type of crime (e.g., property vs. violent). Implications for policy and future research are discussed.
APA, Harvard, Vancouver, ISO, and other styles
23

Vachon, François, Benoît R. Vallières, Joel Suss, Jean-Denis Thériault, and Sébastien Tremblay. "The CSSS Microworld." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 60, no. 1 (September 2016): 265–69. http://dx.doi.org/10.1177/1541931213601061.

Full text
Abstract:
The CSSS microworld simulates the task of a closed-circuit television (CCTV) operator responsible for monitoring multiple CCTV feeds in the context of security surveillance. Operators must manage the display of multiple CCTV feeds, monitor the feeds for critical incidents, and then report detected incidents. The microworld can be used for human factors research, interface design, training and personnel selection, and systems engineering. We present a use case of the CSSS microworld to identify the best predictors of CCTV performance. Our results show that the Automated Operation Span and inattentional blindness tests can predict both CSSS detection rate and false alarms, suggesting that these instruments have the potential for quickly assessing the surveillance competency of candidates. This use case illustrates how the CSSS platform may prove to be useful in the selection of personnel for CCTV operator roles.
APA, Harvard, Vancouver, ISO, and other styles
24

Hong, J.-H., and Y.-T. Shi. "A METADATA-BASED APPROACH FOR USING CCTV TO FACILITATE EMERGENCY RESPONSE." ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIV-3/W1-2020 (November 18, 2020): 51–57. http://dx.doi.org/10.5194/isprs-archives-xliv-3-w1-2020-51-2020.

Full text
Abstract:
Abstract. The installation of closed-circuit television monitors (CCTV) has been rapidly increasing ever since the September 11 attacks and has become one of the most widely used types of sensors for the tasks that require instantaneous and long-term monitoring. With the distinguished characteristics of direct visual inspection of the subject of interests, the availability of CCTVs offers the EOC commanders a quick way to validate and access the reported disaster incidents during emergency response. However, the heterogeneity of CCTV systems and the lack of appropriate descriptions precludes the optimized use of CCTV and causes immense difficulties in effectively coordinating or appraising the use of CCTV systems. By arguing standardized metadata plays the most crucial role in quickly and precisely finding the needed CCTV during emergency response, regardless of its specifications, suppliers, or locations, we propose an integrated operational framework based on the CCTV metadata specifically designed for emergency response in this paper. This framework standardizes the metadata to unify the descriptions for heterogeneous CCTV systems and fulfill the requirements for searching and selecting CCTV. Instead of the 2D point-based location or sector-based CCTV FOV coverage, we also propose to extend the FOV from 2D to 3D to precisely describe the area and even the features that can be monitored by the CCTV. This not only improves the precision and efficiency of selecting CCTV but also increase the commander’s ability to make quick and accurate responses to disasters. The advantages of integrating heterogeneous CCTV systems can tremendously improve the possibility of monitoring and updating the real-time status caused by hazards.
APA, Harvard, Vancouver, ISO, and other styles
25

Son, Ngo Tung, Bui Ngoc Anh, Tran Quy Ban, Le Phuong Chi, Bui Dinh Chien, Duong Xuan Hoa, Le Van Thanh, Tran Quang Huy, Le Dinh Duy, and Muhammad Hassan Raza Khan. "Implementing CCTV-Based Attendance Taking Support System Using Deep Face Recognition: A Case Study at FPT Polytechnic College." Symmetry 12, no. 2 (February 21, 2020): 307. http://dx.doi.org/10.3390/sym12020307.

Full text
Abstract:
Face recognition (FR) has received considerable attention in the field of security, especially in the use of closed-circuit television (CCTV) cameras in security monitoring. Although significant advances in the field of computer vision are made, advanced face recognition systems provide satisfactory performance only in controlled conditions. They deteriorate significantly in the face of real-world scenarios such as lighting conditions, motion blur, camera resolution, etc. This article shows how we design, implement, and conduct the empirical comparisons of machine learning open libraries in building attendance taking (AT) support systems using indoor security cameras called ATSS. Our trial system was deployed to record the appearances of 120 students in five classes who study on the third floor of FPT Polytechnic College building. Our design allows for flexible system scaling, and it is not only usable for a school but a generic attendance system with CCTV. The measurement results show that the accuracy is suitable for many different environments.
APA, Harvard, Vancouver, ISO, and other styles
26

Beheshti, M., and S. Sægrov. "Detection of extraneous water ingress into the sewer system using tandem methods – a case study in Trondheim city." Water Science and Technology 79, no. 2 (January 15, 2019): 231–39. http://dx.doi.org/10.2166/wst.2019.057.

Full text
Abstract:
Abstract Infiltration and inflow (I/I) of extraneous water in separate sewer systems are serious concerns in urban water management for their environmental, social and economic consequences. Effective reduction of I/I requires knowing where excess water ingress and illicit connections are located. The present study focuses on I/I detection in the foul sewer network of a catchment in Trondheim, Norway, during a period without snowmelt or groundwater infiltration. Fiber-optic distributed temperature sensing (DTS) was used for the first time in Norway to detect I/I sources in tandem with closed-circuit television inspection (CCTV) and smoke testing. DTS was an accurate and feasible method for I/I detection, though it cannot identify exact types of failure and sources of I/I. Therefore, other complementary methods must be used, e.g. CCTV or smoke testing. However, CCTV was not completely useful in confirming the DTS results. This study provides practical insights for the rehabilitation and repair of sewer networks that suffer from the undesirable I/I of extraneous water.
APA, Harvard, Vancouver, ISO, and other styles
27

Maslan, Maslan, and Hendri Hendri. "Analisis Kelayakan Sistem Monitoring dan Kontrol Lampu Menggunakan Web Server Berbasis Raspberry Pi." Jurnal Nasional Teknologi dan Sistem Informasi 3, no. 2 (September 24, 2017): 285–90. http://dx.doi.org/10.25077/teknosi.v3i2.2017.285-290.

Full text
Abstract:
As technology develops progressively over time, system developers continue to strive to create more efficient monitoring systems. The problem that often happens is the control room and light control is currently not utilize an integrated system based web server. Room control systems still utilize large equipment such as televisions and large computers, so that every problem occurs in the room is difficult to control. From these problems then the purpose of this study to create an efficient control system that utilizes super mini-based Raspberry Pi. To create a system based on Raspberry P microcontroller then required an initial observation to perform the feasibility test on the system to be developed. The feasibility test system is the successful monitoring of the room using CCTV (Closed Circuit Television) equipment and control the lamp automatically by using prototyping method. The CCTV feasibility test is viewed from the resolution while the control of room light control is seen from the success of controlling the life of the lights on the test. Based on the testing concluded that the monitoring of the room using Raspberry Pi-based web server is feasible to use, seen the test results when the light control goes smoothly, because the lights controlled through the webserver managed to live and die. Similarly, when monitoring the room with live CCTV also runs well. And while conducting Room monitoring experiments with Webcam at 800 x 600 resolution there is a lot of variation value of frame rate sometimes up and down. The up and down frame is caused by an unstable network connection.
APA, Harvard, Vancouver, ISO, and other styles
28

Agrawal, Priyanka. "Smart Surveillance System using Face Tracking." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 25, 2021): 2613–17. http://dx.doi.org/10.22214/ijraset.2021.35567.

Full text
Abstract:
The face is seen as a key component of the human body, and humans utilise it to identify one another. Face detection in video refers to the process of detecting a person's face from a video sequence, while face tracking refers to the process of tracking the person's face throughout the video. Face detection and tracking has become a widely researched issue due to applications such as video surveillance systems and identifying criminal activity. However, working with videos is tough due to problems such as bad illumination, low resolution, and atypical posture, among others. It is critical to produce a fair analysis of various tracking and detection strategies in order to fulfil the goal of video tracking and detection. Closed-circuit television (CCTV) technology had a significant impact on how crimes were investigated and solved. The material used to review crime scenes was CCTV footage. CCTV systems, on the other hand, just offer footage and do not have the ability to analyse it. In this research, we propose a system that can be integrated with the CCTV footage or any other video input like webcam to detect, recognise, and track a person of interest. Our system will follow people as they move through a space and will be able to detect and recognise human faces. It enables video analytics, allowing existing cameras to be combined with a system that will recognise individuals and track their activities over time. It may be used for remote surveillance and can be integrated into video analytics software and CCTV security solutions as a component. It may be used on college campuses, in offices, and in shopping malls, among other places.
APA, Harvard, Vancouver, ISO, and other styles
29

Saluky, Saluky. "Moving Object Detection on CCTV Surveillance Using the Frame Difference Method." ITEJ (Information Technology Engineering Journals) 4, no. 2 (December 31, 2019): 114–22. http://dx.doi.org/10.24235/itej.v4i2.52.

Full text
Abstract:
In today's computer vision research, many build systems for observing humans and understanding their appearance, activities, and behaviour that provide sophisticated interfaces for interacting with humans, and create plausible human models for various purposes. This paper presents a simple algorithm for detecting moving objects from a static background based on frame differences. First, the first frame is captured via a static camera such as Closed Circuit Television (CCTV) after which a sequence of frames is taken periodically. Second, the absolute difference is calculated between successive frames and the difference in images is stored in the system. Third, the difference image is converted into a grey image and then translated into a binary image. Finally, morphological filtering is carried out to remove noise. In the last process, moving objects can be detected in conditions that do not change much apart from moving objects.
APA, Harvard, Vancouver, ISO, and other styles
30

Sagala, Jockie P., Ika Candradewi, and Agus Harjoko. "Penggunaan Deteksi Gerak untuk Pengurangan Ukuran Data Rekaman Video Kamera CCTV." IJEIS (Indonesian Journal of Electronics and Instrumentation Systems) 10, no. 1 (April 30, 2020): 99. http://dx.doi.org/10.22146/ijeis.35983.

Full text
Abstract:
Some cases the recording data of Closed Circuit Television (CCTV) is stored for future use. In the long term usage, the files size will grow larger and requiring large storage devices. In some cases, the recorded data not only image with the desired object but also the background images that may be recorded for long periods of time. This cases make data storage device usage to be less effective. So this research will design a system of CCTV devices that capable to select images to reduce the size of stored images data by image processing.The images selection of this system is based on based on adaptive median algorithm. When any object get detected, the images data to be saved is current input frame. Otherwise, the data to be saved is background model image. Background model on this system is adapted with the change visual data of background image.The results obtained from this research in the form of a CCTV system that are able to select recording data to be stored with image processing. The background model will be kept adapting with background visual data changes.
APA, Harvard, Vancouver, ISO, and other styles
31

Khan, Prince, Yung-Cheol Byun, and Namje Park. "A Data Verification System for CCTV Surveillance Cameras Using Blockchain Technology in Smart Cities." Electronics 9, no. 3 (March 15, 2020): 484. http://dx.doi.org/10.3390/electronics9030484.

Full text
Abstract:
The video created by a surveillance cameras plays a crucial role in crime prevention and examinations in smart cities. The closed-circuit television camera (CCTV) is essential for a range of public uses in a smart city; combined with Internet of Things (IoT) technologies they can turn into smart sensors that help to ensure safety and security. However, the authenticity of the camera itself raises issues of building up integrity and suitability of data. In this paper, we present a blockchain-based system to guarantee the trustworthiness of the stored recordings, allowing authorities to validate whether or not a video has been altered. It helps to discriminate fake videos from original ones and to make sure that surveillance cameras are authentic. Since the distributed ledger of the blockchain records the metadata of the CCTV video as well, it is obstructing the chance of forgery of the data. This immutable ledger diminishes the risk of copyright encroachment for law enforcement agencies and clients users by securing possession and identity.
APA, Harvard, Vancouver, ISO, and other styles
32

Hong, Jung-Hong, and Yi-Tin Shi. "3D Perspective towards the Development of a Metadata-Driven Sharing Mechanism for Heterogeneous CCTV Systems." ISPRS International Journal of Geo-Information 10, no. 8 (August 15, 2021): 550. http://dx.doi.org/10.3390/ijgi10080550.

Full text
Abstract:
The installation of closed-circuit television monitors (CCTV) has rapidly increased in number ever since the 11 September attacks. With the advantages of direct visual inspection, CCTV systems are widely used on various occasions that require instantaneous and long-term monitoring. Especially for emergency response tasks, the prompt availability of CCTV offers EOC (Emergency Operation Center) commanders much better action reference about the reported incidents. However, the heterogeneity among the CCTV systems impedes the effective and efficient use and sharing of CCTV services hosted by different stakeholders, making individual CCTV systems often operate on their own and restrict the possibility of taking the best advantages of the huge number of existing CCTV systems. This research proposes a metadata-driven approach to facilitate a cross-domain sharing mechanism for heterogeneous CCTV systems. The CCTV metadata includes a set of enriched description information based on the analysis from the aspects of Who, When, Where, What, Why and How (5W1H) for CCTV. Sharing mechanisms based on standardised CCTV metadata can then suffice the need for querying and selecting CCTV across heterogeneous systems according to the task at hand. One distinguished design is the modelling of the field of view (FOV) of CCTV from the 3D perspective. By integrating with the 3D feature-based city model data, the 3D FOV information not only provides better visualisation about the spatial coverage of the CCTV systems but also enables the 3D visibility analysis of CCTV based on individual features, such that the selection decision can be further improved with the indexing of CCTV and features. As the number and variety of CCTV systems continuously grows, the proposed mechanism has a great potential to serve as a solid collaborated foundation for integrating heterogeneous CCTV systems for applications that demand comprehensive and instantaneous understanding about the dynamically changing world, e.g., smart cities, disaster management, criminal investigation, etc.
APA, Harvard, Vancouver, ISO, and other styles
33

Ratcliffe, Jerry H., and Elizabeth R. Groff. "A Longitudinal Quasi-Experimental Study of Violence and Disorder Impacts of Urban CCTV Camera Clusters." Criminal Justice Review 44, no. 2 (December 3, 2018): 148–64. http://dx.doi.org/10.1177/0734016818811917.

Full text
Abstract:
Methodological challenges have hampered a number of previous studies into the crime reduction effectiveness of closed-circuit television (CCTV) surveillance systems. These have included the use of arbitrary fixed distances to represent estimated camera deterrence areas and a lack of control for camera sites with overlapping surveillance areas. The current article overcomes the first of these challenges by using camera view areas individually constructed by researchers viewing and manipulating cameras to determine precise camera viewsheds. The second challenge is addressed by grouping cameras into clusters of combined viewshed areas. The longitudinal crime and disorder reduction effectiveness of these clusters of overlapping CCTV cameras is tested in Philadelphia, PA. Multilevel mixed-effects models with time-varying covariates and measures from a noncomparable control area are applied to 10 years of crime data (2003–2012) within the viewsheds of 86 CCTV cameras grouped into 13 clusters. Models applied across violent street felonies and disorder incidents find no significant impact associated with the introduction of CCTV surveillance. Potential reasons for this are discussed.
APA, Harvard, Vancouver, ISO, and other styles
34

Jung, Sunghun, Yonghyeon Jo, and Young-Joon Kim. "Aerial Surveillance with Low-Altitude Long-Endurance Tethered Multirotor UAVs Using Photovoltaic Power Management System." Energies 12, no. 7 (April 6, 2019): 1323. http://dx.doi.org/10.3390/en12071323.

Full text
Abstract:
For a continuous surveillance mission using a swarm of multiple tethered low-altitude long-endurance (LALE) multirotor-type unmanned aerial vehicles (UAVs), we developed a 500 W class photovoltaic power management system (PPMS) which monitors voltage and current flows of photovoltaic (PV) panels, battery pack, and UAV and controls power flows to support UAV flight operation. In contract to a fixed-wing UAV, a tethered multirotor UAV can generate continuously varying closed-circuit television (CCTV) like ground map images by stitching incoming images though the operation range is limited. With an indoor flight experiment, we demonstrated the usefulness of the PPMS and proved operation integrity. According to the results, a total of six multirotor UAVs were required to continuously perform a surveillance mission for 5 h 46 min from 11:04 to 16:50.
APA, Harvard, Vancouver, ISO, and other styles
35

Cheoi, Kyung Joo. "Temporal Saliency-Based Suspicious Behavior Pattern Detection." Applied Sciences 10, no. 3 (February 4, 2020): 1020. http://dx.doi.org/10.3390/app10031020.

Full text
Abstract:
The topic of suspicious behavior detection has been one of the most emergent research themes in computer vision, video analysis, and monitoring. Due to the huge number of CCTV (closed-circuit television) systems, it is not easy for people to manually identify CCTV for suspicious motion monitoring. This paper is concerned with an automatic suspicious behavior detection method using a CCTV video stream. Observers generally focus their attention on behaviors that vary in terms of magnitude or gradient of motion and behave differently in rules of motion with other objects. Based on these facts, the proposed method detected suspicious behavior with a temporal saliency map by combining the moving reactivity features of motion magnitude and gradient extracted by optical flow. It has been tested on various video clips that contain suspicious behavior. The experimental results show that the performance of the proposed method is good at detecting the six designated types of suspicious behavior examined: sudden running, colliding, falling, jumping, fighting, and slipping. The proposed method achieved an average accuracy of 93.89%, a precision of 96.21% and a recall of 94.90%.
APA, Harvard, Vancouver, ISO, and other styles
36

Lai, Yung-Lien, Chuen-Jim Sheu, and Yi-Fen Lu. "Does the Police-Monitored CCTV Scheme Really Matter on Crime Reduction? A Quasi-Experimental Test in Taiwan’s Taipei City." International Journal of Offender Therapy and Comparative Criminology 63, no. 1 (June 17, 2018): 101–34. http://dx.doi.org/10.1177/0306624x18780101.

Full text
Abstract:
Although numerous public closed-circuit television (CCTV) initiatives have been implemented at varying levels in Taiwan’s cities and counties, systematic evaluations of these crime reduction efforts have been largely overlooked. To address this void, a quasi-experimental evaluation research project was designed to assess the effect of police-monitored CCTV on crime reduction in Taipei City for a period of 54 months, including data for both before and after camera installation dates. A total of 40 viewsheds within a 100-m (328 feet) radius were selected as research sites to observe variations in four types of crime incidents that became known to police during the January 2008 to June 2012 period. While crime incidents occurring in both the target and control sites were reduced in frequency after CCTV installation, results derived from time-series analysis indicated that the monitoring had no significant effect on the reduction of property crime incidents with the sole exception of robbery. With respect to the effects of comparing target and control sites, the average Crime Reduction Quotient (CRQ) was 0.36, suggesting that CCTV has an overall marginal yet noteworthy influence. Viewed broadly, however, the police-installed CCTV system in Taipei City did not appear to be as efficient as one would expect. Conversely, cameras installed in some observation sites proved to be significantly more effective than cameras in other sites. As a recommendation, future researchers should identify how particular micro-level attributes may lead to CCTV cameras working more effectively, thereby optimizing location choices where monitoring will prove to be most productive.
APA, Harvard, Vancouver, ISO, and other styles
37

Dąbrowski, Adam, Piotr Matczak, Andrzej Wójtowicz, and Michael Leitner. "Identification of Experimental and Control Areas for CCTV Effectiveness Assessment—The Issue of Spatially Aggregated Data." ISPRS International Journal of Geo-Information 7, no. 12 (December 7, 2018): 471. http://dx.doi.org/10.3390/ijgi7120471.

Full text
Abstract:
Progress in surveillance technology has led to the development of Closed-Circuit Television (CCTV) systems in cities around the world. Cameras are considered instrumental in crime reduction, yet existing research does not unambiguously answer the question whether installing them affects the number of crimes committed. The quasi-experimental method usually applied to evaluate CCTV systems’ effectiveness faces difficulties with data quantity and quality. Data quantity has a bearing on the number of crimes that can be conclusively inferred using the experimental procedure. Data quality affects the level of crime data aggregation. The lack of the exact location of a crime incident in the form of a street address or geographic coordinates hinders the selection procedure of experimental and control areas. In this paper we propose an innovative method of dealing with data limitations in a quasi-experimental study on the effectiveness of CCTV systems in Poland. As police data on crime incidents are geocoded onto a neighborhood or a street, we designed a method to overcome this drawback by applying similarity measures to time series and landscape metrics. The method makes it possible to determine experimental (test) and control areas which are necessary to conduct the study.
APA, Harvard, Vancouver, ISO, and other styles
38

Park, Jisoo, Jingdao Chen, Yong K. Cho, Dae Y. Kang, and Byung J. Son. "CNN-Based Person Detection Using Infrared Images for Night-Time Intrusion Warning Systems." Sensors 20, no. 1 (December 19, 2019): 34. http://dx.doi.org/10.3390/s20010034.

Full text
Abstract:
Night-time surveillance is important for safety and security purposes. For this reason, several studies have attempted to automatically detect people intruding into restricted areas by using infrared cameras. However, detecting people from infrared CCTV (closed-circuit television) is challenging because they are usually installed in overhead locations and people only occupy small regions in the resulting image. Therefore, this study proposes an accurate and efficient method for detecting people in infrared CCTV images during the night-time. For this purpose, three different infrared image datasets were constructed; two obtained from an infrared CCTV installed on a public beach and another obtained from a forward looking infrared (FLIR) camera installed on a pedestrian bridge. Moreover, a convolution neural network (CNN)-based pixel-wise classifier for fine-grained person detection was implemented. The detection performance of the proposed method was compared against five conventional detection methods. The results demonstrate that the proposed CNN-based human detection approach outperforms conventional detection approaches in all datasets. Especially, the proposed method maintained F1 scores of above 80% in object-level detection for all datasets. By improving the performance of human detection from infrared images, we expect that this research will contribute to the safety and security of public areas during night-time.
APA, Harvard, Vancouver, ISO, and other styles
39

Schulz, N., R. Baur, and P. Krebs. "Integrated modelling for the evaluation of infiltration effects." Water Science and Technology 52, no. 5 (September 1, 2005): 215–23. http://dx.doi.org/10.2166/wst.2005.0136.

Full text
Abstract:
The objective of the present study is the estimation of the potential benefits of sewer pipe rehabilitation for the performance of the drainage system and the wastewater treatment plant (WWTP) as well as for the receiving water quality. The relation of sewer system status and the infiltration rate is assessed based on statistical analysis of 470 km of CCTV (Closed Circuit Television) inspected sewers of the city of Dresden. The potential reduction of infiltration rates and the consequent performance improvements of the urban wastewater system are simulated as a function of rehabilitation activities in the network. The integrated model is applied to an artificial system with input from a real sewer network. In this paper, the general design of the integrated model and its data requirements are presented. For an exemplary study, the consequences of the simulations are discussed with respect to the prioritisation of rehabilitation activities in the network.
APA, Harvard, Vancouver, ISO, and other styles
40

Juliansyah, Akbar, Ramlah Ramlah, and Dewi Nadiani. "Sistem Pendeteksi Gerak Menggunakan Sensor PIR dan Raspberry Pi." JTIM : Jurnal Teknologi Informasi dan Multimedia 2, no. 4 (February 6, 2021): 199–205. http://dx.doi.org/10.35746/jtim.v2i4.113.

Full text
Abstract:
Digital security and monitoring systems are entering a new era. Every industry is busy developing security systems according to their individual needs. What can be done is by providing a security perimeter around the assets to prevent unwanted things. There are currently many CCTV (Closed Circuit Television) based security systems; CCTV security systems also have less effective because they require more devices and large enough storage memory. Also, there are other solutions, namely systems that are built using PIR sensors and Raspberry Pi. The PIR sensor is used to detect infrared emissions from humans, so the target object is a human. The PIR sensor also receives heat radiation from humans, so when humans move, this sensor will receive changes in radiation emitted by humans. The purpose of this study is to simulate a solution to the problem of infrastructure design for the development of a physical asset security system using a Wireless Sensor Network and to find out how the security system works using a PIR sensor and Raspberry Pi Model B. The research method used is the Network Development Life Cycle (NDLC) approach. This study illustrates that the Raspberry Pi with hardware capabilities and Rasbian OS and the Python programming language support building a security system. The HC-SR501 PIR sensor can also detect moving objects from the right, left, and front. Email and SMS can be well integrated to produce reports according to the sensor's movement.
APA, Harvard, Vancouver, ISO, and other styles
41

Lidyawati, Lita, Lucia Jambola, Arsyad Ramadhan Darlis, Lisa Kristiana, and Ratna Susana. "Security and Watering System Counseling Based on Internet of Things (IoT) in Pondok Hijau Indah Residential Area." REKA ELKOMIKA: Jurnal Pengabdian kepada Masyarakat 1, no. 2 (December 5, 2020): 66–74. http://dx.doi.org/10.26760/rekaelkomika.v1i2.65-74.

Full text
Abstract:
Nowadays, security and gardening systems in densely populated residential areas are generally done manually. The security system in housing sometimes places security posts at street corners that are some distance from citizen’s homes thus they cannot be monitored at all times. Whereas other problem of watering system in citizen’s homes, someone has to water the plants one by one that it is not efficient in energy, time and water availability thus that it can reduce the quality of the plants. Internet of Things (IoT) is a concept and method for remote control, monitoring, and various tasks. IoT is connected to a network that it can be accessed anywhere which can make things easier. IoT can be used to solve various problems. One of them is security issues and gardening activities. By using smart home technology, the security system is carried out by placing CCTV (Closed Circuit Television) which can be accessed by the home owner, anytime and anywhere the home owner is located. On the other hand, gardening is one of the most popular hobbies. In this field, IoT can be used to monitor and regulate various things to support gardening activities. In this community service activity, we are proposed a simple automatic gardening system for watering some plants programmatically in Pondok Hijau Indah residence. The system also allows manual human intervention either locally or remotely via the internet to control CCTV and water pumps. To build this smart Home system we will use the Xiaomi Home application from Google Play. In this application, we can set a program to control CCTV and water the plants every day at a certain time periodically, in this case, we set every 7 hours to watering the plants.
APA, Harvard, Vancouver, ISO, and other styles
42

Usmankhujaev, Saidasul, Shokhrukh Baydadaev, and Kwon Jang Woo. "Real-Time, Deep Learning Based Wrong Direction Detection." Applied Sciences 10, no. 7 (April 3, 2020): 2453. http://dx.doi.org/10.3390/app10072453.

Full text
Abstract:
In this paper, we develop a real-time intelligent transportation system (ITS) to detect vehicles traveling the wrong way on the road. The concept of this wrong-way system is to detect such vehicles as soon as they enter an area covered by a single closed-circuit television (CCTV) camera. After detection, the program alerts the monitoring center and triggers a warning signal to the drivers. The developed system is based on video imaging and covers three aspects: detection, tracking, and validation. To locate a car in a video frame, we use a deep learning method known as you only look once version 3 (YOLOv3). Therefore, we use a custom dataset for training to create a deep learning model. After estimating a car’s position, we implement linear quadratic estimation (also known as Kalman filtering) to track the detected vehicle during a certain period. Lastly, we apply an “entry-exit” algorithm to identify the car’s trajectory, achieving 91.98% accuracy in wrong-way driver detection.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhu, Li, Fei Wang, and Hongli Zhao. "QoS-Aware Resource Allocation for Network Virtualization in an Integrated Train Ground Communication System." Wireless Communications and Mobile Computing 2018 (2018): 1–12. http://dx.doi.org/10.1155/2018/2653405.

Full text
Abstract:
Urban rail transit plays an increasingly important role in urbanization processes. Communications-Based Train Control (CBTC) Systems, Passenger Information Systems (PIS), and Closed Circuit Television (CCTV) are key applications of urban rail transit to ensure its normal operation. In existing urban rail transit systems, different applications are deployed with independent train ground communication systems. When the train ground communication systems are built repeatedly, limited wireless spectrum will be wasted, and the maintenance work will also become complicated. In this paper, we design a network virtualization based integrated train ground communication system, in which all the applications in urban rail transit can share the same physical infrastructure. In order to better satisfy the Quality of Service (QoS) requirement of each application, this paper proposes a virtual resource allocation algorithm based on QoS guarantee, base station load balance, and application station fairness. Moreover, with the latest achievement of distributed convex optimization, we exploit a novel distributed optimization method based on alternating direction method of multipliers (ADMM) to solve the virtual resource allocation problem. Extensive simulation results indicate that the QoS of the designed integrated train ground communication system can be improved significantly using the proposed algorithm.
APA, Harvard, Vancouver, ISO, and other styles
44

Moylan, Emily, Sai Chand, and S. Travis Waller. "Framework for Estimating the Impact of Camera-Based Intelligent Transportation Systems (ITS) Technology on Incident Duration." Transportation Research Record: Journal of the Transportation Research Board 2672, no. 19 (May 22, 2018): 25–33. http://dx.doi.org/10.1177/0361198118775870.

Full text
Abstract:
Safety is a major motivator of intelligent transportation systems (ITS) projects, and most efforts have addressed the potential to avoid incidents. Managing and reducing the duration of incidents is another key application for ITS despite challenges in distinguishing the true versus the reported duration of an incident. This paper presents a framework for modeling the impact of camera-based (closed-circuit television or CCTV) ITS technology on incident duration including an increase in the reported duration and a reduction in the true duration. The framework is validated against a data set of 121,793 accidents in New South Wales, Australia, covering 4.5 years. The results demonstrate that the use of CCTVs for incident duration contributes a 4.5 min reduction in average duration (as earlier detection can lead to more efficient clearance) and a 9% reduction in variance in the duration (as a uniform detection method supports standardized response procedures). These impacts are only visible when the 8.5 min median detection delay (the difference between the recorded duration and the true duration) is modeled and accounted for. These results offer a quantitative support tool for decision makers wishing to assess the value of incident-detection ITS projects.
APA, Harvard, Vancouver, ISO, and other styles
45

Birnhack, Michael, and Lotem Perry-Hazan. "School Surveillance in Context: High School Students’ Perspectives on CCTV, Privacy, and Security." Youth & Society 52, no. 7 (May 27, 2020): 1312–30. http://dx.doi.org/10.1177/0044118x20916617.

Full text
Abstract:
This study examines high school students’ perceptions of school closed-circuit television systems (CCTVs). It draws on interviews conducted with 83 adolescents recruited from 10th- to 12th-grade classes at 39 Israeli schools. The findings indicate that students’ perceptions of CCTVs are embedded in their overall opinions about their school, particularly concerning relationships and trust between students and educators. The various metaphors that students used to describe their relational position regarding school CCTVs highlight that surveillance has become part of the organizational–educational experience. The findings also show that students’ scrutiny of school CCTVs reflects a conflict between privacy and security concerns. Students resolve this conflict by resorting to various balances, which echo general constitutional principles but were also anchored in the students’ personal schooling experiences. While building on Nissenbaum’s framework of contextual integrity for assessing privacy violations, we challenge its assumption of a uniform set of informational norms within a given context.
APA, Harvard, Vancouver, ISO, and other styles
46

Cygert, Sebastian, and Andrzej Czyżewski. "Vehicle Detection with Self-Training for Adaptative Video Processing Embedded Platform." Applied Sciences 10, no. 17 (August 20, 2020): 5763. http://dx.doi.org/10.3390/app10175763.

Full text
Abstract:
Traffic monitoring from closed-circuit television (CCTV) cameras on embedded systems is the subject of the performed experiments. Solving this problem encounters difficulties related to the hardware limitations, and possible camera placement in various positions which affects the system performance. To satisfy the hardware requirements, vehicle detection is performed using a lightweight Convolutional Neural Network (CNN), named SqueezeDet, while, for tracking, the Simple Online and Realtime Tracking (SORT) algorithm is applied, allowing for real-time processing on an NVIDIA Jetson Tx2. To allow for adaptation of the system to the deployment environment, a procedure was implemented leading to generating labels in an unsupervised manner with the help of background modelling and the tracking algorithm. The acquired labels are further used for fine-tuning the model, resulting in a meaningful increase in the traffic estimation accuracy, and moreover, adding only minimal human effort to the process allows for further accuracy improvement. The proposed methods, and the results of experiments organised under real-world test conditions are presented in the paper.
APA, Harvard, Vancouver, ISO, and other styles
47

Han Keat, Lee, and Chuah Chai Wen. "Smart Indoor Home Surveillance Monitoring System Using Raspberry Pi." JOIV : International Journal on Informatics Visualization 2, no. 4-2 (September 10, 2018): 299. http://dx.doi.org/10.30630/joiv.2.4-2.172.

Full text
Abstract:
Internet of Things (IoTs) are internet computing devices which are connected to everyday objects that can receive and transmit data intelligently. IoTs allow human to interact and control everyday objects wirelessly to provide more convenience in their lifestyle. The Raspberry Pi is a small, lightweight and cheap single board computer that can fit on human’s palm. Security plays a big role in a home. People concern about security by preventing any intruders to enter their home. This is to prevent loss of privacy and assets. The closed-circuit television (CCTV) is one of the device used to monitor the secured area for any intruders. The use of traditional CCTV to monitor the secured area have three limitations, which are requiring a huge volume of storage to store all the videos regardless there are intruders or not, does not notify the users immediately when there are motions detected, and users must always check the CCTV recorded videos regularly to identity any intruders. Therefore, a smart surveillance monitoring system is proposed to solve this problem by detecting intruders and capturing image of the intruder. Notifications will also be sent to the user immediately when motions are detected. This smart surveillance monitoring system only store the images of the intruders that triggered the motion sensor, making this system uses significantly less storage space. The proposed Raspberry Pi is connected with a passive infrared (PIR) motion sensor, a webcam and internet connection, the whole device can be configured to carry out the surveillance tasks. The objectives of this project are to design, implement and test the surveillance system using the Raspberry Pi. This proposed surveillance system provides the user with live stream of video feed for the user. Whenever a motion is detected by the PIR motion sensor, the web camera may capture an image of the intruder and alert the users (owners) through Short Message Service (SMS) and email notifications. The methodology used to develop this system is by using the object-oriented analysis and design (OOAD) model.
APA, Harvard, Vancouver, ISO, and other styles
48

Park, Jaesoung, Suhan Lee, Dong-Ik Kim, Young-You Kim, Samsoo Kim, Han-Jung Kim, and Yoonkap Kim. "Evaporation-Rate Control of Water Droplets on Flexible Transparent Heater for Sensor Application." Sensors 19, no. 22 (November 12, 2019): 4918. http://dx.doi.org/10.3390/s19224918.

Full text
Abstract:
To develop high-performance de- or anti-frosting/icing devices based on transparent heaters, it is necessary to study the evaporation-rate control of droplets on heater surfaces. However, almost no research has been done on the evaporation-rate control of liquid droplets on transparent heaters. In this study, we investigate the evaporation characteristics of water droplets on transparent heater surfaces and determine that they depend upon the surface wettability, by modifying which, the complete evaporation time can be controlled. In addition, we study the defrosting and deicing performances through the surface wettability, by placing the flexible transparent heater on a webcam. The obtained results can be used as fundamental data for the transparent defrosting and deicing systems of closed-circuit television (CCTV) camera lenses, smart windows, vehicle backup cameras, aircraft windows, and sensor applications.
APA, Harvard, Vancouver, ISO, and other styles
49

Hsu, Shih-Yen, Tai-Been Chen, Wei-Chang Du, Jyh-Horng Wu, and Shih-Chieh Chen. "Integrate Weather Radar and Monitoring Devices for Urban Flooding Surveillance." Sensors 19, no. 4 (February 17, 2019): 825. http://dx.doi.org/10.3390/s19040825.

Full text
Abstract:
With the increase of extreme weather events, the frequency and severity of urban flood events in the world are increasing drastically. Therefore, this study develops ARMT (automatic combined ground weather radar and CCTV (Closed Circuit Television System) images for real-time flood monitoring), which integrates real-time ground radar echo images and automatically estimates a rainfall hotspot according to the cloud intensity. Furthermore, ARMT combines CCTV image capturing, analysis, and Fourier processing, identification, water level estimation, and data transmission to provide real-time warning information. Furthermore, the hydrograph data can serve as references for relevant disaster prevention, and response personnel may take advantage of them and make judgements based on them. The ARMT was tested through historical data input, which showed its reliability to be between 83% to 92%. In addition, when applied to real-time monitoring and analysis (e.g., typhoon), it had a reliability of 79% to 93%. With the technology providing information about both images and quantified water levels in flood monitoring, decision makers can quickly better understand the on-site situation so as to make an evacuation decision before the flood disaster occurs as well as discuss appropriate mitigation measures after the disaster to reduce the adverse effects that flooding poses on urban areas.
APA, Harvard, Vancouver, ISO, and other styles
50

Ahmad Ridzuan, Syahmi Syahiran, Zaid Omar, and Usman Ullah Sheikh. "A Review of Content-Based Video Retrieval Techniques for Person Identification." ELEKTRIKA- Journal of Electrical Engineering 18, no. 3 (December 19, 2019): 49–56. http://dx.doi.org/10.11113/elektrika.v18n3.196.

Full text
Abstract:
The rise of technology spurs the advancement in the surveillance field. Many commercial spaces reduced the patrol guard in favor of Closed-Circuit Television (CCTV) installation and even some countries already used surveillance drone which has greater mobility. In recent years, the CCTV Footage have also been used for crime investigation by law enforcement such as in Boston Bombing 2013 incident. However, this led us into producing huge unmanageable footage collection, the common issue of Big Data era. While there is more information to identify a potential suspect, the massive size of data needed to go over manually is a very laborious task. Therefore, some researchers proposed using Content-Based Video Retrieval (CBVR) method to enable to query a specific feature of an object or a human. Due to the limitations like visibility and quality of video footage, only certain features are selected for recognition based on Chicago Police Department guidelines. This paper presents the comprehensive reviews on CBVR techniques used for clothing, gender and ethnic recognition of the person of interest and how can it be applied in crime investigation. From the findings, the three recognition types can be combined to create a Content-Based Video Retrieval system for person identification.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography