Impact Factor (2025): 6.9
DOI Prefix: 10.47001/IRJIET
This study
is mostly about making and using advanced computer vision techniques and voice
analysis algorithms to keep an eye on security threats in prisons and find them
in real time. The main goal is to make correctional facilities safer and more
secure by finding and stopping unauthorized ownership of equipment, suspicious
behavior between prisoners and visitors, violent behavior between prisoners,
and strange events and activities. With the help of computer vision technology
and voice pattern analysis, the system aims to change the way prisons keep
people safe by giving them more ways to be watched while still respecting their
right to privacy. The study looks at how well these technologies work compared
to traditional methods, with a focus on making detection and reaction faster
and more accurate. The results and methods of this study add to the creation of
a monitoring system that is reliable, efficient, and puts the safety of
prisoners, visitors, and staff at correctional facilities first.
Country : Sri Lanka
IRJIET, Volume 7, Issue 10, October 2023 pp. 74-81
|
[1] |
M. R. a.
M. D. Levine, "A Deep Learning Method Based on Two-Stage CNN Framework
for Recognition of Chinese Reservoirs with Sentinel-2 Images," vol. 117,
pp. 1436-1452, 2013. |
|
[2] |
X. Z.
&. J. C. Shaoci Xie, "Video crowd detection and abnormal behavior
model detection based on machine learning method," vol. 31, no. 1, pp.
175-184, 01 January 2019. |
|
[3] |
D.-G. a.
S. H.-I. a. P. S.-K. a. L. S.-W. Lee, "Motion Influence Map for Unusual
Human Activity Detection and Localization in Crowded Scenes," IEEE
Transactions on Circuits and Systems for Video Technology, vol. 25, pp.
1612-1623, 2015. |
|
[4] |
C. a. H.
M. a. V. S. Tiwari, "Suspicious Face Detection based on Eye and other
facial features movement monitoring," 2015 IEEE Applied Imagery
Pattern Recognition Workshop (AIPR), pp. 1 - 8, 2015. |
|
[5] |
P. G.
Rohit Rastogi, "Social Perspective of Suspicious Activity Detection in
Facial Analysis," Artificial Intelligence Paradigms for Smart
Cyber-Physical Systems, p. 21, 2021. |
|
[6] |
H. a. V.
A. a. M. a. K. A. a. J. A. Jain, "Weapon Detection using Artificial
Intelligence and Deep Learning for Security Applications," 2020
International Conference on Electronics and Sustainable Communication Systems
(ICESC), pp. 193 - 198, 2020. |
|
[7] |
S. T. F.
H. R. Olmos, "Automatic handgun detection alarm in videos using deep
learning," ScienceDirect, pp. 66-72, 2018. |
|
[8] |
G. S. D. M.
A. Sreenu, "Intelligent video surveillance: a review through deep
learning techniques for crowd analysis," Journal of Big Data, vol.
6, no. 1, p. 48, 06 06 2019. |
|
[9] |
A. B. B.
H. B. H. K. J. M. L. P. M. J. O. P. Bilski, "Development of
CCTV-camera-based System for Detection of Anomalous Behaviors in Penitentiary
Institutions," 2021 11th IEEE International Conference on Intelligent
Data Acquisition and Advanced Computing Systems: Technology and Applications
(IDAACS), vol. 2, pp. 1114 - 1119, 2021. |
|
[10] |
R. a. D.
M. Jayaswal, "A Framework for Anomaly Classification Using Deep Transfer
Learning Approach," Revue d'Intelligence Artificielle, vol. 35,
pp. 255-263, 06 2021. |