N. Custance, P. Golton, T. Ellis, Paul L. Rosin, P. Moukas
{"title":"利用IKBS技术设计、开发和实现了CCTY序列自动报警解释成像系统","authors":"N. Custance, P. Golton, T. Ellis, Paul L. Rosin, P. Moukas","doi":"10.1109/CCST.1989.751983","DOIUrl":null,"url":null,"abstract":"The assessment of alarm cause from a perimeter intrusion detection system is manpower intensive. Work by the Home Office has shown considerable benefits can accrue from the use of digital storage, replay and analysis of image sequences from surveillance CCTV. The design of the system is heavily dependent upon the number of cameras on site, the need (or otherwise) for pre-alarm triggering, the probable speed of movement of objects within the scene, and the likelihood of near simultaneous alarms occurring. The techniques used to classify the cause of an alarm are described in a further paper to be presented at the conference.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"The design, development and implementation of an imaging system for the automatic alarm interpretation of CCTY sequences using IKBS techniques\",\"authors\":\"N. Custance, P. Golton, T. Ellis, Paul L. Rosin, P. Moukas\",\"doi\":\"10.1109/CCST.1989.751983\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The assessment of alarm cause from a perimeter intrusion detection system is manpower intensive. Work by the Home Office has shown considerable benefits can accrue from the use of digital storage, replay and analysis of image sequences from surveillance CCTV. The design of the system is heavily dependent upon the number of cameras on site, the need (or otherwise) for pre-alarm triggering, the probable speed of movement of objects within the scene, and the likelihood of near simultaneous alarms occurring. The techniques used to classify the cause of an alarm are described in a further paper to be presented at the conference.\",\"PeriodicalId\":288105,\"journal\":{\"name\":\"Proceedings. International Carnahan Conference on Security Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-10-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings. International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1989.751983\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1989.751983","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The design, development and implementation of an imaging system for the automatic alarm interpretation of CCTY sequences using IKBS techniques
The assessment of alarm cause from a perimeter intrusion detection system is manpower intensive. Work by the Home Office has shown considerable benefits can accrue from the use of digital storage, replay and analysis of image sequences from surveillance CCTV. The design of the system is heavily dependent upon the number of cameras on site, the need (or otherwise) for pre-alarm triggering, the probable speed of movement of objects within the scene, and the likelihood of near simultaneous alarms occurring. The techniques used to classify the cause of an alarm are described in a further paper to be presented at the conference.