Computerized Prison Monitoring Application Based on Knowledge Engineering

Dimalka HeshanDepartment of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri LankaNimna ThiranjayaDepartment of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri LankaRavindu SandeepanaDepartment of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri LankaHasith DemindaDepartment of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri LankaGeethanjali WimalaratneDepartment of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri LankaDidula ChamaraDepartment of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka

Vol 7 No 10 (2023): Volume 7, Issue 10, October 2023 | Pages: 74-81

International Research Journal of Innovations in Engineering and Technology

OPEN ACCESS | Research Article | Published Date: 25-10-2023

doi Logo doi.org/10.47001/IRJIET/2023.710010

Abstract

This study is mostly about making and using advanced computer vision techniques and voice analysis algorithms to keep an eye on security threats in prisons and find them in real time. The main goal is to make correctional facilities safer and more secure by finding and stopping unauthorized ownership of equipment, suspicious behavior between prisoners and visitors, violent behavior between prisoners, and strange events and activities. With the help of computer vision technology and voice pattern analysis, the system aims to change the way prisons keep people safe by giving them more ways to be watched while still respecting their right to privacy. The study looks at how well these technologies work compared to traditional methods, with a focus on making detection and reaction faster and more accurate. The results and methods of this study add to the creation of a monitoring system that is reliable, efficient, and puts the safety of prisoners, visitors, and staff at correctional facilities first.

Keywords

Prison monitoring, Knowledge engineering, Security threats, Real-time monitoring, Advanced computer vision, Voice analysis algorithms, Unauthorized equipment detection, Suspicious behaviour detection, Violent behaviour detection, Abnormal events and activities, Privacy rights, Prison security, Visitor interactions, Facial recognition, Surveillance systems, Detection algorithms, Python, PyCharm, OpenCV, PyTorch, TensorFlow, Machine learning, Deep learning, Anomaly detection, Convolutional Neural Networks, Natural Language Processing, Facial expressions, Hate/offensive language patterns, Facial analysis, Unauthorized items, Weapons detection, Facial recognition technology, Violent behaviour identification, Prison safety


Citation of this Article

Dimalka Heshan, Nimna Thiranjaya, Ravindu Sandeepana, Hasith Deminda, Geethanjali Wimalaratne, Didula Chamara, “Computerized Prison Monitoring Application Based on Knowledge Engineering” Published in International Research Journal of Innovations in Engineering and Technology - IRJIET, Volume 7, Issue 10, pp 74-81, October 2023. Article DOI https://doi.org/10.47001/IRJIET/2023.710010

References

[1]

M. R. a. M. D. Levine, "A Deep Learning Method Based on Two-Stage CNN Framework for Recognition of Chinese Reservoirs with Sentinel-2 Images," vol. 117, pp. 1436-1452, 2013.

[2]

X. Z. &. J. C. Shaoci Xie, "Video crowd detection and abnormal behavior model detection based on machine learning method," vol. 31, no. 1, pp. 175-184, 01 January 2019.

[3]

D.-G. a. S. H.-I. a. P. S.-K. a. L. S.-W. Lee, "Motion Influence Map for Unusual Human Activity Detection and Localization in Crowded Scenes," IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, pp. 1612-1623, 2015.

[4]

C. a. H. M. a. V. S. Tiwari, "Suspicious Face Detection based on Eye and other facial features movement monitoring," 2015 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), pp. 1 - 8, 2015.

[5]

P. G. Rohit Rastogi, "Social Perspective of Suspicious Activity Detection in Facial Analysis," Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, p. 21, 2021.

[6]

H. a. V. A. a. M. a. K. A. a. J. A. Jain, "Weapon Detection using Artificial Intelligence and Deep Learning for Security Applications," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 193 - 198, 2020.

[7]

S. T. F. H. R. Olmos, "Automatic handgun detection alarm in videos using deep learning," ScienceDirect, pp. 66-72, 2018.

[8]

G. S. D. M. A. Sreenu, "Intelligent video surveillance: a review through deep learning techniques for crowd analysis," Journal of Big Data, vol. 6, no. 1, p. 48, 06 06 2019.

[9]

A. B. B. H. B. H. K. J. M. L. P. M. J. O. P. Bilski, "Development of CCTV-camera-based System for Detection of Anomalous Behaviors in Penitentiary Institutions," 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 2, pp. 1114 - 1119, 2021.

[10]

R. a. D. M. Jayaswal, "A Framework for Anomaly Classification Using Deep Transfer Learning Approach," Revue d'Intelligence Artificielle, vol. 35, pp. 255-263, 06 2021.