scholarly journals Automatic Detection of Crimes Captured in CCTV Images for Safety of Senior Citizens

Author(s):  
Baswaraju Swathi ◽  
Anitha B ◽  
Disha Singh ◽  
Divya Shree M ◽  
Kushala R

Closed circuit television systems (CCTV) are getting widely popular and are being deployed in many workspaces, housing estates and in most public spaces. Efficiency of CCTV surveillance can be improved by incorporation of image processing and object detection algorithm into monitoring process. In this project, we specialize in the task of automated detection and recognition of dangerous incidents for CCTV systems. We propose solutions that are able to alert the human operator when a weapon is visible in the image through e-mail. We have shown that it's possible to make a system that's capable of an early warning during a dangerous situation, which can cause faster and more effective response times and reduce in the number of potential victims. Face Detection and Face recognition of individuals is an intricate problem which has garnered much attention during recent years because of its ever-increasing applications in numerous fields. In this project the facial detection has been carried out using Viola Jones algorithm.

Author(s):  
T. H. Deepthi ◽  
R. Gaayathri ◽  
S. Shanthosh ◽  
A. Sahaya Gebin ◽  
R. Anitha Nithya

Closed circuit television systems (CCTV) are becoming more popular and are being deployed in many offices, housing estates and in the most public spaces. Monitoring systems have been implemented in many foreign cities. This makes for an enormous load for the CCTV operators, as the number of camera views a single operator can monitor is limited by the human factors. The projects focus on the task of automated detection and recognition of dangerous situations for CCTV systems. We propose algorithms that are able to alert the human operator when a firearm is visible in the image and also have focussed on limiting the number of false alarms, in order to allow a real life application of the system. Managed to propose a version of a firearm detection algorithm that offers a near zero rate of false alarms and have shown that it is possible to create a system that are capable of an early warning in a dangerous situation, which may lead to faster and more effective response times and a reduction in the number of potential victims.


1994 ◽  
Vol 37 (3) ◽  
Author(s):  
R. G. North ◽  
C. R. D. Woodgold

An algorithm for the automatic detection and association of surface waves has been developed and tested over an 18 month interval on broad band data from the Yellowknife array (YKA). The detection algorithm uses a conventional STA/LTA scheme on data that have been narrow band filtered at 20 s periods and a test is then applied to identify dispersion. An average of 9 surface waves are detected daily using this technique. Beamforming is applied to determine the arrival azimuth; at a nonarray station this could be provided by poIarization analysis. The detected surface waves are associated daily with the events located by the short period array at Yellowknife, and later with the events listed in the USGS NEIC Monthly Summaries. Association requires matching both arrival time and azimuth of the Rayleigh waves. Regional calibration of group velocity and azimuth is required. . Large variations in both group velocity and azimuth corrections were found, as an example, signals from events in Fiji Tonga arrive with apparent group velocities of 2.9 3.5 krn/s and azimuths from 5 to + 40 degrees clockwise from true (great circle) azimuth, whereas signals from Kuriles Kamchatka have velocities of 2.4 2.9 km/s and azimuths off by 35 to 0 degrees. After applying the regional corrections, surface waves are considered associated if the arrival time matches to within 0.25 km/s in apparent group velocity and the azimuth is within 30 degrees of the median expected. Over the 18 month period studied, 32% of the automatically detected surface waves were associated with events located by the Yellowknife short period array, and 34% (1591) with NEIC events; there is about 70% overlap between the two sets of events. Had the automatic detections been reported to the USGS, YKA would have ranked second (after LZH) in terms of numbers of associated surface waves for the study period of April 1991 to September 1992.


2007 ◽  
Vol 2 (2) ◽  
pp. 97
Author(s):  
Wendy Furlan

A review of: Shachaf, Pnina, and Sarah Horowitz. "Are Virtual Reference Services Color Blind?" Library & Information Science Research 28.4 (Sept. 2006): 501-20. Abstract Objective – To examine whether librarians provide equitable virtual reference services to diverse user groups. Design – Unobtrusive method of defined scenarios submitted via e-mail. Setting – Twenty-three Association of Research Libraries (ARL) member libraries from across the United States. All ARL member libraries were invited to participate, with the 23 acceptances providing 19% participation. Subjects – Anonymous librarians from the 23 participating libraries’ virtual e-mail reference services. Up to 6 librarians from each library may have been involved. Six fictitious personas were developed to represent particular ethnic or religious groups, whereby the ethnic or religious affiliation was only indicated by the name chosen for each user and the corresponding e-mail address. Names were selected from lists of names or baby names available online: Latoya Johnson (African-American), Rosa Manuz (Hispanic), Chang Su (Asian - Chinese), Mary Anderson (Caucasian/Christian), Ahmed Ibrahim (Muslim), and Moshe Cohen (Caucasian/Jewish). These personas were used to submit reference queries via e-mail to the virtual reference services taking part in the study. Methods – Five different types of reference queries were developed for use in this study. Three were based on prior published research as they were deemed to be answerable by the majority of libraries. They included a dissertation query, a sports team query, and a population query all designed to be tailored to the target institution. The other 2 queries were developed with participating institutions’ virtual reference guidelines in mind, and were thought to not be answered by the target institutions when submitted by unaffiliated users. They consisted of a subject query on a special collection topic that asked for copies of relevant articles to be sent out, and an article query requesting that a copy of a specific article be e-mailed to the patron. The study was conducted over a 6 week period beginning the second week of September, 2005. Each week, 1 fictitious persona was used to e-mail a reference query to the virtual reference service of each of the 23 participating institutions. Five of each type of query were sent by each persona. During September and October 2005, a total of 138 queries were sent. Each institution received a different query for each of the first 5 weeks, and in the sixth week they received a repeat of a previous request with details of title or years altered. All other text in every request sent was kept consistent. Each institution only received 1 request from each persona during the study. In order to eliminate any study bias caused by an informed decision regarding the order in which personas were used, they were randomly arranged (alphabetically by surname). Furthermore, to avoid suspicions from responding librarians, queries were e-mailed on different days of the week at different times. This created some limitations in interpretating response times as some queries were submitted on weekends. All queries were analysed by Nvivo software in order to identify attributes and patterns to aid qualitative analysis. Each transaction (a single query and any related responses) was classified according to 12 attributes and 59 categories based on various associations’ digital reference guidelines. Transactions were coded and then 10% re-coded by a different coder. This led to the clarification and refinement of the coding scheme, resulting in the number of categories used being reduced to 23. Coding was then performed in 3 iterations until 90% agreement between the 2 coders was reached. The final inter-coder reliability was 92%. The study did not support cross tabulation among user groups on most content categories due to the small sample size. Main results – Response times varied greatly between users. Moshe (Caucasian/Jewish) received an average turn-around of less than a day. At the other end of the spectrum, Ahmed’s (Muslim) responses took an average of 3.5 days. Both Ahmed and Latoya (African-American) sent queries which took over 18 days to receive a response. The length (number of words) of replies also indicated a differing level of service with Mary (Caucasian/Christian) and Moshe receiving far lengthier responses than the other 4 personas. Number of replies (including automatic replies) was examined in comparison with the number of replies which answered the question, and again indicated Mary and Moshe were receiving a better level of service. The way in which the user was addressed by the librarian was examined as another measure of service, i.e. first name, full name, honorific. This again mirrored the low level of service received by Ahmed. The professional endings used by librarians in their replies also reinforced the high quality of service received by Moshe across other categories. Results for Rosa (Latino) and Chang (Asian - Chinese) were average for most categories presented. Conclusion – In this study, a discriminatory pattern was clearly evident, with the African-American and Muslim users receiving poor levels of service from virtual reference librarians across all dimensions of quality evaluated. The Caucasian (Christian and Jewish) users also noticeably received the best level of service. It is noted, however, that the sample size of the study is not large enough for generalisations to be drawn and that future, more statistically significant studies are warranted. Many other questions are raised by the study for possible future research into racism exhibited by library staff and services.


2007 ◽  
Vol 59 (6) ◽  
pp. 489-511 ◽  
Author(s):  
Ian Rowlands ◽  
David Nicholas ◽  
Hamid R. Jamali ◽  
Paul Huntington

PurposeThe purpose of this article is to report on a large‐scale survey that was carried out to assess academic users' awareness, perceptions and existing levels of use of e‐books. The survey also seeks to find out about the purposes to which electronic books were put, and to obtain an understanding of the most effective library marketing and communication channels.Design/methodology/approachAn e‐mail invitation to participate in the survey was distributed to all UCL staff and students (approximately 27,000) in November 2006, and 1,818 completions were received, an effective response rate of at least 6.7 per cent. Statistical analyses were carried out on the data using Software Package for Social Sciences (SPSS).FindingsThe survey findings point to various ways in which user uptake and acceptance of e‐books may be encouraged. Book discovery behaviour, a key issue for publishers and librarians in both print and electronic environments, emerges as a critical focus for service delivery and enhancement.Originality/valueThe survey is part of an action research project, CIBER's SuperBook, that will further investigate the issues raised in this initial benchmarking survey using deep log analysis and qualitative methods. The paper partly fills the gap in the literature on e‐books which has mainly focused on usage and not the users.


Sign in / Sign up

Export Citation Format

Share Document