Ook Lee
September 2008
Review of Business Research;2008, Vol. 8 Issue 4, p88
Academic Journal
This paper presents a motion detection system that uses more advanced mechanism so that the supervisor of a security monitoring system does not have to pay attention to it constantly. In current days, when a security camera is installed, an human being has to be on alert all the time while the camera is on since any little movement can require attention of the supervisor. But most of small objects do not need the supervisor's attention since they could be birds, cats, dogs etc.. In this new system the system only report the unusual change to the supervisor by calculating the motion and size of objects in the screen. Thus the supervisor can be liberated from the 24-hour concentration duty; instead he/she can be only alerted when the real security threat such as a big moving object like an human intruder appears. The utility of this system can be proved either by conducting a laboratory experiment or as in this paper, mathematically proved by using the concept of entropy. In other words, big objects like human intruders increase the entropy of the screen images significantly therefore the supervisor must be alerted. Thus by proving its utility of the system theoretically, we can claim that our new motion detection system is superior to others which do not use our technique.


Related Articles

  • Passive Infrared. R. H. // Popular Science;Oct2015, Vol. 287 Issue 4, p67 

    The article offers tips for using a Passive Infrared (PIR) sensor, which detects motion by observing the difference in radiation, for uses including opening doors for pets to automating security cameras.

  • Integrating a Camera System. Hauk, Darrel // Residential Systems;Jun2013, Vol. 14 Issue 6, p10 

    The article offers tips on how to integrate camera systems in a residential environment. It suggests to turn on every relevant lights, select a camera that provides the option to use the built-in motion detection on the camera chip, and use activation closure from a dual-detection fence-type...

  • Cameras with the Eye of the Tiger. HAUK, DARREL // Residential Systems;Oct2013, Vol. 14 Issue 10, p14 

    The article offers the author's insights regarding the addition of infrared (IR) illuminator in surveillance cameras to be able to see at night. The author discusses the fundamentals of light spectrum and its relation to the basic fundamentals of camera. He characterized integrated IR, 940...

  • Webcam Home Security System. SHARMA, HIMANSHU // Electronics For You;Aug2013, Vol. 2 Issue 4, p126 

    The article provides a webcam interface program for home security application, which may be used as a motion detector in commercial setups. A Visual C# is used in writing the software that also enables user to do high-end task, such as enable camera and do the image processing over Visual...

  • A Study on Surveillance System of Object's Abnormal Behavior by Blob Composition Analysis. Young-Bin Shim; Hwa-Jin Park; Yong-Ik Yoon // International Journal of Security & Its Applications;2014, Vol. 8 Issue 2, p333 

    Studied in this paper is an advanced detection system which activates emergency alert system to prevent the actual incidence, after computerized evaluation of danger-associated behavior captured in CCTV images. The detection of potential danger involves the ability to discern several steps that...

  • 7 Signs it's Time to Upgrade Your Video System. Mesenbrink, John // Security: Solutions for Enterprise Security Leaders;Mar/Apr2002, Vol. 39 Issue 3/4, p16 

    Focuses on the modification of closed-circuit television (CCTV) system. Impact of security market growth on CCTV technology; Considerations in CCTV enhancement; Factors influencing preference for CCTV technology.

  • Big Brother cares. Horne, Fiona Russell // Builders Merchants Journal;Jan2002, p3 

    Comments on the Data Protection Act 1998 concerning the use of closed-circuit television (CCTV) systems in Great Britain for security purposes. Provisions of the act regarding the privacy and respect of an individual; Factors to consider in implementing CCTV systems; Sanctions for unlawful use...

  • Notes on CCTV. O'Mara, Deborah L. // Security: Solutions for Enterprise Security Leaders;Aug2000, Vol. 37 Issue 8, p39 

    Focuses on the scalability of closed-circuit television (CCTV) surveillance systems in the United States. Digitization of traditional security; Details on remote monitoring and control of CCTV; Advantages of digital video management and scalability; Impact of scalability on dealers and end-users.

  • Video Marches Around the Perimeter. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Nov2008, Vol. 45 Issue 11, p90 

    The article focuses on security video as a perimeter protection solution. A solution for using security video on the perimeter include integrated electro-optical surveillance and long-range thermal imaging video cameras. The IT network technology and hardwired and wireless IP networked video...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics