Computerized Prison Monitoring Application Based on Knowledge Engineering

Abstract

This study is mostly about making and using advanced computer vision techniques and voice analysis algorithms to keep an eye on security threats in prisons and find them in real time. The main goal is to make correctional facilities safer and more secure by finding and stopping unauthorized ownership of equipment, suspicious behavior between prisoners and visitors, violent behavior between prisoners, and strange events and activities. With the help of computer vision technology and voice pattern analysis, the system aims to change the way prisons keep people safe by giving them more ways to be watched while still respecting their right to privacy. The study looks at how well these technologies work compared to traditional methods, with a focus on making detection and reaction faster and more accurate. The results and methods of this study add to the creation of a monitoring system that is reliable, efficient, and puts the safety of prisoners, visitors, and staff at correctional facilities first.

Country : Sri Lanka

1 Dimalka Heshan2 Nimna Thiranjaya3 Ravindu Sandeepana4 Hasith Deminda5 Geethanjali Wimalaratne6 Didula Chamara

  1. Department of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  2. Department of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  3. Department of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  4. Department of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  5. Department of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  6. Department of Software Engineering, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka

IRJIET, Volume 7, Issue 10, October 2023 pp. 74-81

doi.org/10.47001/IRJIET/2023.710010

References

[1]

M. R. a. M. D. Levine, "A Deep Learning Method Based on Two-Stage CNN Framework for Recognition of Chinese Reservoirs with Sentinel-2 Images," vol. 117, pp. 1436-1452, 2013.

[2]

X. Z. &. J. C. Shaoci Xie, "Video crowd detection and abnormal behavior model detection based on machine learning method," vol. 31, no. 1, pp. 175-184, 01 January 2019.

[3]

D.-G. a. S. H.-I. a. P. S.-K. a. L. S.-W. Lee, "Motion Influence Map for Unusual Human Activity Detection and Localization in Crowded Scenes," IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, pp. 1612-1623, 2015.

[4]

C. a. H. M. a. V. S. Tiwari, "Suspicious Face Detection based on Eye and other facial features movement monitoring," 2015 IEEE Applied Imagery Pattern Recognition Workshop (AIPR), pp. 1 - 8, 2015.

[5]

P. G. Rohit Rastogi, "Social Perspective of Suspicious Activity Detection in Facial Analysis," Artificial Intelligence Paradigms for Smart Cyber-Physical Systems, p. 21, 2021.

[6]

H. a. V. A. a. M. a. K. A. a. J. A. Jain, "Weapon Detection using Artificial Intelligence and Deep Learning for Security Applications," 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), pp. 193 - 198, 2020.

[7]

S. T. F. H. R. Olmos, "Automatic handgun detection alarm in videos using deep learning," ScienceDirect, pp. 66-72, 2018.

[8]

G. S. D. M. A. Sreenu, "Intelligent video surveillance: a review through deep learning techniques for crowd analysis," Journal of Big Data, vol. 6, no. 1, p. 48, 06 06 2019.

[9]

A. B. B. H. B. H. K. J. M. L. P. M. J. O. P. Bilski, "Development of CCTV-camera-based System for Detection of Anomalous Behaviors in Penitentiary Institutions," 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), vol. 2, pp. 1114 - 1119, 2021.

[10]

R. a. D. M. Jayaswal, "A Framework for Anomaly Classification Using Deep Transfer Learning Approach," Revue d'Intelligence Artificielle, vol. 35, pp. 255-263, 06 2021.