An adaptive normalcy decision for video surveillance security system

Author(s):  
MiYoung Nam ◽  
HakChul Shin ◽  
YongZhe Xu ◽  
PhillKyu Rhee
2013 ◽  
Vol 411-414 ◽  
pp. 1505-1509
Author(s):  
Long Chen ◽  
Shuan Chen ◽  
Yu Qing He ◽  
Jian Guo Wei ◽  
Jian Wu Dang

In this paper, we proposed a mobile security system based on IP camera network video surveillance by improving the traditional monitoring methods. This system includes three parts: Android mobile client, cloud server, IP camera monitoring terminals. By setting IP cameras at 24 fps but only sending one frame each second, we can infer the situation by analyzing of the single image and reduce the amount of data transmission. User can check the live scenes and send control commands to monitoring terminal or receive the push information from the server to freely give alarm signal to users anytime, anywhere. And users can also select any regions or any specific objects to monitor, the server will real-time monitor each scene according to the specific requirements by using the algorithms of image contrast and depth estimation. The experiment results show that the system can greatly improve the accuracy of the alarm.


2020 ◽  
pp. 3-5
Author(s):  
Anzor Babunashvili ◽  
Nona Kukhianidze

Security systems are the guarantee of stable functioning of the organization, company, office, industry, housing and other types of buildings. For entire security, complex control devices are set on the building which has to be protected, like fire and burglar alarms, video-audio controls and access systems. Intelligent Security Management System is built on Atmel’s microcontrollers. This allows the system to be flexible and to modify it easily if needed. The reliability of the security system depends on its uniqueness. This given security system is easily modified and hence its reliability is high. The system can be easily integrated into a variety of external modules, which can further increase the factor of reliability. It’s also easy to adopt it to various security management systems. Many of the security and video surveillance systems allow to control the situation of the object from a large distance. From any point of the planet, we can track and manage the security system modes and make easy changes in them, which enable adequate reaction.Digital complexes of video surveillance are one of the variants of defense organization. The main areas of their use are the most important objects and large areas where buildings are located far from each other.


Doklady BGUIR ◽  
2021 ◽  
Vol 19 (3) ◽  
pp. 96-103
Author(s):  
L. L. Utin ◽  
A. V. Pavlovsky ◽  
A. A. Olkhovik ◽  
A. V. Makatserchyk

In recent years, technical means of perimeter security are becoming more widespread, which is due to their increasing efficiency of protection from unauthorized access by intruders to protected facilities. The high competition  of  manufacturers  of  such  means  has  led  to  the  emergence  of  a  variety  of  technical  solutions  for detection means (hereinafter referred to as DT) operating on different physical principles and designed to solve specific problems. The main purpose of the DT is to ensure the detection of the facts of intruders' penetration through  the  guarded  obstacle.  Considering  that  the  methods  of  intruders'  penetration  are  varied  (destruction of fences, climbing over the fence, digging under the fence, etc.), the creation of an effective security system using only one type of DT is a problematic task. At the same time, the autonomous use of many types of DT leads to the fact that there will be a large number of technical means in the duty room, which increase not only the  time  and  financial  costs  for  their  maintenance,  but  also  increase  the  requirements  for  the  competence  of the duty personnel. Research Institute of Electronic Computers has developed the complex VM 8018, designed to automate the process of protecting extended perimeters of objects for various purposes, including sections of the state border, perimeters and premises of outposts, extendedperimeters of industrial and military facilities, as well as controlling executive devices (electric drives for gates and gates, lighting etc.), video surveillance.


2011 ◽  
Vol 403-408 ◽  
pp. 4968-4973
Author(s):  
Rajendra Kachhava ◽  
Vivek Srivastava ◽  
Rajkumar Jain ◽  
Ekta Chaturvedi

In this paper we propose multiple cameras using real time tracking for surveillance and security system. It is extensively used in the research field of computer vision applications, like that video surveillance, authentication systems, robotics, pre-stage of MPEG4 image compression and user inter faces by gestures. The key components of tracking for surveillance system are extracting the feature, background subtraction and identification of extracted object. Video surveillance, object detection and tracking have drawn a successful increased interest in recent years. A object tracking can be understood as the problem of finding the path (i.e. trajectory) and it can be defined as a procedure to identify the different positions of the object in each frame of a video. Based on the previous work on single detection using single stationary camera, we extend the concept to enable the tracking of multiple object detection under multiple camera and also maintain a security based system by multiple camera to track person in indoor environment, to identify by my proposal system which consist of multiple camera to monitor a person. Present study mainly aims to provide security and detect the moving object in real time video sequences and live video streaming. Based on a robust algorithm for human body detection and tracking in videos created with support of multiple cameras.


2015 ◽  
Vol 734 ◽  
pp. 3-7 ◽  
Author(s):  
Qing Hui Yuan ◽  
Xiu Jun Nie ◽  
Guo Fang Feng

A new visualized fiber fence alarm system was put forward in this paper, which was used Sagnac interferometric sensor of optical fiber fence on the surrounding invasion of signal detection and positioning, and sent alarm information and video monitoring system linkage, in order that the monitoring equipment switch to intrusion scene view timely. Finally the video record the intrusion events. This visualized alarm system makes full use of advantages of optical fiber detection and video surveillance, which improved the level of intelligence of security system and the security performance of the system.


Sign in / Sign up

Export Citation Format

Share Document