Security with the 360 degrees television-intrusion detection surveillance system

被引:0
作者
Feldman, S
Barton, GG
机构
来源
SECURITY SYSTEMS AND NONLETHAL TECHNOLOGIES FOR LAW ENFORCEMENT | 1997年 / 2934卷
关键词
360 degrees Television; intrusion detection; security; surveillance system; cost effective;
D O I
10.1117/12.265411
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
A unique, versatile, non-mechanical, non-rotating 360 degrees imaging system has been developed and field-tested successively with conventional black and white, color television, 35-mm, motion picture cameras to prove that intruders, vehicles, radiation can be detected and recognized from any direction using one camera. The system consists of a low-cost, unique first surface reflective conical mirror with special computer programmed aspheric surfaces in operation with conventional narrow field of view (FOV) cameras and objective lenses. The cameras are converted to the 360 degrees horizontal FOV and flexibility in conical mirror design provides variable elevation FOV to fit the security application. The wide, efficient spectral reflectance of the conical mirror means that UV, LLLTV, far infrared thermal TV cameras can be converted, as well, to 360 degrees imaging. The TV real-time (30 frames/sec) 360 degrees circular image can be processed electronically and presented on the TV monitor as a typical linear undistorted 360 degrees rectangular scene or stacked rectangular scenes (2-180 degrees, 3-120 degrees, 4-90 degrees, etc.) and also processed to provide analog to digital real-time motion detection and audible alarm to alert security personnel. For the 360 degrees imaging system or any television system, the motion detection electronics has been designed to function effectively with image digital memory requirements reduced by magnitudes, thereby, increasing computer speed, but reducing computer costs. The 360 degrees TV real-time intruder detection system can operate in internal and external locations. For external locations, optical filtering and electronic processing has been designed to minimize motion detection false alarms caused by the changing illumination, cloud motion, sun glitter, etc. of the outdoor land or marine environment. The versatile 360 degrees TV imaging system objectives are to replace several narrow FOV cameras for an instantaneous 360 degrees sweep, accordingly to reduce number of motion detection accessories, to operate with off-the-shelf camera equipment, and, thus to provide a highly cost effective technique for intruder detection in governmental, industrial, commercial, residential, security applications.
引用
收藏
页码:166 / 177
页数:12
相关论文
共 50 条
  • [41] An Adaptive Automatically Tuning Intrusion Detection System
    Yu, Zhenwei
    Tsai, Jeffrey J. P.
    Weigert, Thomas
    ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2008, 3 (03)
  • [42] An intrusion detection system for wireless sensor networks
    Onat, I
    Miri, A
    WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 253 - 259
  • [43] Car surveillance Security System
    Jacob, Aleesha Susan
    Chaurasiya, Vandita
    Sharda, Vagmayee
    Dixit, Shubhra
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 1, 2017, : 735 - 739
  • [44] Epigenetic Algorithm for Performing Intrusion Detection System
    Ezzarii, Mehdi
    Elghazi, Hamid
    El Ghazi, Hassan
    Sadiki, Tayeb
    2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION SYSTEMS AND INFORMATION SECURITY (ACOSIS), 2016, : 227 - 232
  • [45] Grid-based intrusion detection system
    Choon, OT
    Samsudin, A
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1028 - 1032
  • [46] Framework for Cloud Intrusion Detection System Service
    Aljurayban, Nouf Saleh
    Emam, Ahmed
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [47] Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)
    Tlili, Fadhila
    Ayed, Samiha
    Fourati, Lamia Chaari
    COMPUTERS & SECURITY, 2024, 142
  • [48] Application of hospital information security intrusion detection system based on the new NPRIM algorithm
    Li, Xingshan
    Xu, Min
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 445 - 449
  • [49] The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology
    Huang, Xin
    Wan, Rongze
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 185 - 196
  • [50] Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System
    Alrayes, Fatma S.
    Zakariah, Mohammed
    Amin, Syed Umar
    Khan, Zafar Iqbal
    Alqurni, Jehad Saad
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 1457 - 1490