KR20170010930A - Smart safety helper service method by cctv - Google Patents
Smart safety helper service method by cctv Download PDFInfo
- Publication number
- KR20170010930A KR20170010930A KR1020150102269A KR20150102269A KR20170010930A KR 20170010930 A KR20170010930 A KR 20170010930A KR 1020150102269 A KR1020150102269 A KR 1020150102269A KR 20150102269 A KR20150102269 A KR 20150102269A KR 20170010930 A KR20170010930 A KR 20170010930A
- Authority
- KR
- South Korea
- Prior art keywords
- safety
- cctv
- information
- data
- crime
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 230000002265 prevention Effects 0.000 claims abstract description 17
- 238000010586 diagram Methods 0.000 claims description 23
- 238000012038 vulnerability analysis Methods 0.000 claims description 17
- 231100000817 safety factor Toxicity 0.000 claims description 16
- 238000004458 analytical method Methods 0.000 abstract description 23
- 238000004519 manufacturing process Methods 0.000 abstract description 9
- 230000000694 effects Effects 0.000 description 18
- 238000009434 installation Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 10
- 238000012546 transfer Methods 0.000 description 9
- 230000003247 decreasing effect Effects 0.000 description 7
- 230000000007 visual effect Effects 0.000 description 7
- 230000006399 behavior Effects 0.000 description 5
- 239000003086 colorant Substances 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000012552 review Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000010276 construction Methods 0.000 description 3
- 239000000872 buffer Substances 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 238000012732 spatial analysis Methods 0.000 description 2
- 238000011179 visual inspection Methods 0.000 description 2
- XYIPZQCDLAFBSX-CMPLNLGQSA-N (4ar,9br)-8-methyl-2,3,4,4a,5,9b-hexahydro-1h-pyrido[4,3-b]indole Chemical compound C1CNC[C@H]2C3=CC(C)=CC=C3N[C@@H]21 XYIPZQCDLAFBSX-CMPLNLGQSA-N 0.000 description 1
- 241000282376 Panthera tigris Species 0.000 description 1
- 238000000692 Student's t-test Methods 0.000 description 1
- 238000010219 correlation analysis Methods 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000000611 regression analysis Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000012353 t test Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S19/00—Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
- G01S19/01—Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Computer Networks & Wireless Communication (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
The present invention relates to a method of providing a smart safety helper service using CCTV, and it is possible to provide CCTV-related data to police information, thereby providing more effective information on range prevention than before.
In the daily life of modern society, there are still situations in which the safety of people is threatened from various crime factors such as violence, robbery, and rape.
In order to safeguard citizens from these crime factors, various police safety guidance techniques are proposed.
For example, a technique of sorting out the number of occurrences and types in a specific place and providing it as map information has been introduced.
However, this conventional technology has a problem in that it can not utilize CCTV according to recent technology development.
That is, in recent years, CCTV that can acquire various information is used, and there is also a control center that supervises the CCTV, and a lot of information that is useful for crime prevention is being produced.
However, in the case of the related art as described above, such information can not be utilized, thereby failing to provide sufficient information for preventing crime.
In the meantime, the safety guidance related technology as described above is described in detail in the following prior art documents, and a description thereof will be omitted.
SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a smart safety helper service method using CCTV, which can provide effective information on range prevention by adding CCTV related data to security information.
According to another aspect of the present invention, there is provided a method of deriving safety information by adding CCTV information to existing safety information, comprising the steps of collecting existing data and CCTV related data, A step of producing a security safety map, and a step of providing a safety helper service to the user by the map generated.
At this time, the step of collecting the existing data and the CCTV related data includes collecting the GIS DB for disaster prevention and the GIS DB for spatial information as existing data, and the CCTV visible distance GIS DB and the CCTV point It is also possible to include a step of collecting the crime related GIS DB occurring in the predetermined radius.
The step of designing the security vulnerability analysis model reflecting the CCTV information may include a step of selecting a safety type, a step of evaluating a safety factor and a risk factor, a step of selecting a basic level, a step of calculating a weight on a basic level, Performing a standard scoring on the weighted basic diagram and performing grading on the basic diagram on which the standard scoring is performed.
Also, the safety factor may include at least one of a police zone, a fire station, a child safety guard, and a CCTV, and adds a predetermined safety score when the security factor falls within a specific radius from the safety factor, It is also possible to add a predetermined risk score when it belongs to a specific radius and to add a predetermined risk score when it deviates from a CCTV to a specific radius and then calculate the basic degree of the safety factor by adding the safety score and the risk score .
In addition, the step of producing the safety safety map may display the safety map in a specific color according to the calculated basic degree score.
In addition, in the step of providing the safety helper service to the user, it is also possible to allow the user to obtain the related information from the web service or the mobile service by making the map information be a web service or a mobile service.
According to the present invention, CCTV-related data can be added to police information, thereby providing more effective information on range prevention than before.
BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a method according to one embodiment of the present invention,
FIG. 2 is a conceptual diagram illustrating a DB property link review process as a method according to an embodiment of the present invention;
3 is a method according to an embodiment of the present invention, which includes a table showing an example of a large capacity ASCII file (TXT, DAT, CSV)
FIG. 4 is a conceptual diagram showing a gdb structure obtained by ArcCatalog and a window searcher according to an embodiment of the present invention.
Figure 5 is a method according to an embodiment of the present invention, which is a conceptual diagram showing point creation through visual inspection,
FIG. 6 is a conceptual diagram illustrating a life safety progress service of a safety dream, according to an embodiment of the present invention;
7 is a conceptual diagram illustrating a smart safe home mobile service, according to one embodiment of the present invention,
FIG. 8 is a conceptual diagram showing a smart safe return home service map service according to an embodiment of the present invention; FIG.
9 is a conceptual diagram illustrating a crime MAPPING service, according to an embodiment of the present invention,
FIG. 10 is a schematic diagram illustrating a concept for vulnerable stable analysis, according to one embodiment of the present invention,
11 is a conceptual diagram illustrating a model builder interface, according to an embodiment of the present invention,
FIG. 12 is a conceptual diagram showing a model builder for producing a safety safety map, according to an embodiment of the present invention;
FIG. 13 is a photograph for illustrating the produced safety map of the safety as a method according to an embodiment of the present invention. FIG.
The smart safety helper service method using the CCTV of the present invention first carries out the step of collecting the existing data and the CCTV related data. The step of collecting the existing data and the CCTV related data includes a step of collecting the GIS DB for disaster prevention and the GIS DB for spatial information as existing data,
And collecting the crime related GIS DB occurring in a certain radius of the CCTV visible distance GIS DB and the CCTV point as the CCTV related data.
In other words, it is necessary to link various safety-related GIS data in order to quickly and effectively produce a safety map reflecting safety vulnerability analysis and model. However, the management agencies such as frequency of occurrence of the 5 major crime, police station location, child safety guard facilities, etc. related to major safety vulnerabilities are diversified into central ministries, municipalities and public institutions. Therefore, GIS data is constructed by different data formats and systems for each organization, making it difficult to link the organizations together. In this study, we collected DBs about safety vulnerability analysis and mapping - related factors in cooperation with the central government agencies including Seocho - gu Office.
The collected data are reviewed with consideration of the purpose of disaster prevention activity (selection of attributes to be used: roads of digital topographic map for safety vulnerability analysis and map production activities), spatial information review (coordinate unification, data format unification, Missing check, etc.) and corrects the error. In addition, for the topics that are not built up in the national spatial information and related materials (CCTV viewing distance, crime related data), DB was newly constructed in accordance with the basic guidelines for building national spatial information data.
Safety Map The GIS DB consists of vector shape files, and 1 million objects form geometry with polygons, lines, and points. NDMS data creation, conversion, and editing process involve the possibility of geometry errors.
These errors not only cause errors in area calculation and volume calculation but also have a great influence on the analysis result and cumulative analysis result when performing the analysis processing as the disaster prevention basic diagram, and it is necessary to correct the error beforehand. Therefore, in this study, the error of GIS DB required for safety map production was checked, and the intersection error, polygon closure error and null value error of the object were corrected and corrected. (See Fig. 1)
The integrated GIS DB built on the data has the connectivity of the mutual attributes of the layers. In order to examine the flawlessness of this property connectivity, a single house (same DB structure as the building layer of the road name address), small road (road name, The same DB structure as the layer of the real address of the address).
As a result, it is confirmed that the property connectivity between layers is disconnected, and it is judged that it is insufficient to utilize the property of safety map production. The layer is classified into reference data type, and a separate road name address data collection is carried out instead. (See Fig. 2)
DBs of related organizations can be distributed as texts of unstructured data or formatted large ASCII files (TXT, DAT, CSV) or distributed as Shape file type of space information or dBASE data archive file. Shared. In order to establish safety map production standards, a method of converting to safety map according to the file type of data distributed and shared is prepared and the conversion method is applied (refer to FIG. 3).
The utilization of the GIS DB is made into a working group by converting it into a file geodatabase (.gdb: Geodatabase). Because file geodatabases have no storage limitations, they can use an unlimited number of attribute tables, effectively and efficiently, for the management and analysis of national data.
If you are working with a property register (property master) and the overall status of the overall heading, heading, heading department, the total status of all buildings, and the entire property, Although it is impossible to work with the limitation of single Shape format, it is possible to perform analysis work beyond capacity and table number limit by processing file geodatabase, and it is possible to support large raster data. Also, because it uses 50% ~ 75% less disk space than the same data and the process performance improves, it is judged to be suitable for nationwide GIS management and analysis.
A geodatabase is a collection of geographic datasets that can be managed by including feature classes, raster data, and attribute tables, and enhances the relationship between data and data integrity. However, it is stored in binary form and can not be managed by Windows Explorer, but can only be managed by ArcCatalog (see Figure 4).
A geodatabase is a collection of geographic datasets that can be managed by including feature classes, raster data, and attribute tables, and enhances the relationship between data and data integrity. However, it can be stored in binary form and can not be managed by Windows Explorer, but can only be managed by ArcCatalog.
Through the above method, the collection and data processing of the raw data scattered in each institute, As well as the main DB for safety map production. Table 1 shows a list of DBs and collection agencies related to safety vulnerability analysis and map production.
In addition, CCTV visual distance and crime data were newly constructed through new construction and data processing. In the case of CCTV visible street, the ~ ~ ~ crime data from Seocho-gu Office integrated control center was obtained as an image form and constructed as GIS DB through point creation through visual inspection. (See Fig. 5)
Then, a step of designing a security vulnerability analysis model that reflects CCTV information is performed. This step includes a step of selecting a safety type, a step of evaluating a safety factor and a risk factor and selecting a basic level, a step of calculating a weight on the basic level, a step of performing a standard scoring on the weighted basic level And a step of classifying the basic diagram on which the standard scoring is performed.
At this time, the safety element selects at least one of the police zone, the fire station, the child safety guard, and the CCTV, and adds a predetermined safety score when the security element belongs to a certain radius from the safety element. A predetermined risk score is added in case of belonging to a specific radius, a predetermined risk score is added in case of deviating from a CCTV to a certain radius, and then the safety score and the risk score are added to calculate the basic factor of the safety factor.
In other words, safety vulnerability analysis model should be designed first in order to produce safety map. Prior to this, I analyzed crime and life safety related service cases. The National Police Agency has established the Missing Child Finding Center (formerly Missing Child Finding Center) and the 117 Center for Emergency Support for Victims of Prostitution and Victims of Women (117 centers) in order to receive reports of crimes and increase rescue activities that are taking place against increasing social disadvantages every year. It integrates the homepage and serves it under the name "Safety Dream".
FIG. 6 shows a screen of the life safety guidance service provided on the safety Dream homepage. As can be seen from FIG. 6, the life safety guidance service shows on the map the location of the support facilities for the child, the elderly, and the youth, and the location of the protection facilities and the school violence and victim support centers for victims of violence against women. Unusual is that information about life safety facilities can be downloaded as a Shape file.
In addition, in order to provide convenient and safe life for the people, the Security Administration provides life guidance service. Smart safety home service provides mobile service and web service at the same time. The mobile service is a location-based personalized service that provides a service that periodically sends movement and location information to the destination set by the user to SNS to prevent accidents. And provides information on safety facilities closely related to daily life (see FIG. 7).
Figure 8 shows the web service screen of the smart safety home service. Information on location information, operating hours, and phone numbers for each safety facility can be provided through the search of the living safety facilities.
As an example, North American law enforcement authorities provide citizens with useful information about increasing crime each year, and provide information on crime in real-time as a real-time map service to support police departments. tiger
FIG. 9 shows a screen of the crime map service provided on the CRIME MAPPING homepage. As can be seen in Figure 2.9, the Crime Map Service provides users with various types of crime location and information by date, and it informs the public of useful information about criminal activity in the neighborhood, which greatly contributes to self-reliant police activities among members of the community. .
As we have seen in the case, although we provide security related services, it does not have any security related services because we understand human behavior in real time in connection with CCTV. In this study, safety map was produced through analysis of safety vulnerability specific to CCTV - related service provision.
For security vulnerability analysis, risk and safety factors were classified into two major categories. There are a myriad of risk factors and safety factors in security of security. However, since it is impossible to reflect all of these factors, this study can be constructed with GIS DB and analyzed by reflecting the existing related factors.
For the safety factor, the 100M radius was defined as the safety zone based on the police station, fire station, and child safety guard area. In addition, CCTV monitor of integrated control center classified the range of human behavior as safety zone. The extent to which a person's behavior is observed is highly subjective, and therefore the extent to which the movement is observed when the arm is moved from side to side in a white T-shirt is set to the range in which human behavior is observed.
The risk factors are images generated by the images of rape, robbery, theft, and violence received from the police department and they are generated as points and 100M buffers are generated and classified as dangerous areas.
The safety vulnerability analysis model was designed as follows to reflect the safety factors and the risk factors.
1. Choosing the type of safety to be created (safety guidance for safety and security)
2. Selection of the basic plan considering the vulnerability characteristics (Safety factor: police station, fire station, child safety guard, CCTV / risk factor: rape, robbery, theft, violence, entertainment, CCTV)
3. Weights are assigned to the basic diagrams (equally)
4. Perform standard scoring on the weighted basic diagram
5. Classification (Classification / Scoring Classification of Scoring Results)
6. Grade sum (sum of scoring grade and scored grade)
7. Deriving Results
As shown in FIG. 10, in order to implement an efficient vulnerability analysis model, this study utilized the model builder of ArcGIS. Most of the analysis tasks performed in ArcGIS are implemented with ArcToolbox's Geoprocessing commands. In general, GIS analysis has several steps through various commands and modules to reach the final result.
In order to require feedback or to change some of the evaluation conditions during the analysis process, it is often necessary to carry out a review process that requires an intermediate process or an analysis from the beginning.
In ArcGIS, Model Builder creates these diagrams in the form of diagrams (flowcharts), applies the datasets and variables to the geoprocessing tool, and generates the results in real time by creating new data and performing a complex spatial analysis model It has advantages. In addition, since it is possible to automate repetitive data operations, it is easy to adjust operations such as adjusting variables or changing files.
You can help to understand systematically the process of analysis that creates policing maps, and share feedback scenarios with others. The advantages of Model Builder are as follows.
Geoprocessing model is an advanced component of geographic information system / can interactively perform pre-discussed scenarios in ArcGIS / step-by-step process that can take a lot of time or errors in advance / build geoprocessing scenario model / once Re-use the model you used in other analysis models / Modify parameter values or apply other input data / Sharing work processes with others / Authenticate the process of spatial analysis (see Figure 11)
In this study, we developed a model builder prototype for safety safety map generation based on the relevant GIS DB (entertainment business, robbery, rape, theft, violence, earthquake, fire station, child safety guard, etc. Respectively.
Model builder for policing safety
As a result, it has a lot of advantages in efficiency and work sharing in the creation of security safety map, so it has scalability to implement various functions according to the license of ArcGIS Server and the grade of geo database (see FIG. 1).
- Vulnerability analysis verification
The security vulnerability analysis used in this study is an analysis method in which the CCTV element is added to the existing analysis method. In this regard, we try to verify vulnerability analysis by analyzing the correlation between CCTV and crime. Prior to the analysis of the vulnerability, the correlation analysis between CCTV and crime has been studied from the past. The case of Kwak Moon-gum (2005) is based on August 2004 when 230 CCTVs were installed and from 2001 to 2004 We analyzed the crime trends in Gangnam - gu, Seoul. A survey of the number of crimes per month for four years showed that the average number of crimes decreased by 31% from September 2004 to December 2004 after the standard month. In addition, in order to judge the transfer of crime, the number of crimes occurred in neighboring police stations was also confirmed.
(2006) compared the rates of crime change between before and after the installation in 2002 and 2003, respectively. Compared with the incidence rate of crime in Gangnam police station, all other types of crimes except for murder and rape crimes decreased. In addition, the area surrounding the area also showed that the occurrence of crime decreased and the effect of crime transfer due to CCTV installation did not appear.
Ahn Kwon-kwon (2006) defined the month of August 2004 as the month, comparing the number of crimes incurred between two years before installation and one year after installation (2002 to 2005) monthly. As a result of the analysis, it was found that the installation and operation of CCTV for crime reduces the crime occurrence by 22%. It was found that the incidence of robbery, theft, and violent crime decreased, and especially the theft crime was reduced by 73%. In addition, there is no evidence of major crime transfer in comparison with the cases of Suseo, Seocho, and Songpa police stations in Gangnam police station.
Choi and Kim (2007) investigated whether there was a change in crime trends in five police officers' areas including the Gangnam Police Station in Seoul where CCTV was installed first in Korea. The results of this study are as follows: First, the police were compared with the five major crimes (murder, robbery, theft, and violence). In addition, the occurrence of the transitional effects of the crime transfer and the control gains was also detected. The jurisdiction of the Gangnam Police Station was set as the adjacent area of the four police stations, including the experimental area, the Suseo Police Station, and officially the police from 2001 to 2005 And the number of crime incidents. When we look at the trend of crime occurrence, we found functional transition phenomenon where the crime is changed by the robbery and the control profit is spread in the case of the theft crime.
Lim Min-hyeok (2007) conducted the effectiveness test on 51 districts in Seoul (27 districts with CCTV). If previous studies have analyzed only the t-test and the trend of crime increase / decrease by dividing CCTV installation area and non-installation area, this study performed multiple regression analysis to control the influence of other variables. The number of police officers per capita, the number of patrol cars per unit area, and so on were used as control variables, and CCTV was divided into number of installations and dummy variables. As a result, the crime rate increased as the number of CCTVs increased or increased. The researchers concluded that CCTV is more useful than crime prevention. In other words, it is seen that crime increases rather than capturing crimes not to be reported before CCTV installation.
(2008) analyzed the effects of CCTV for crime prevention using semi - structured in - depth interviews on 18 criminals detained in Cheonan Asan police station. As a result of the interview, CCTV was found to have some effect in preventing planned crime (intrusion theft, robbery). Interviews included questions about whether to move to nearby neighborhoods to stop crime. Interviews show that after the CCTV installation, criminals have moved to neighboring areas without equipment and committed crime (geographical transfer). Also, we found that the phenomenon of changing the object of crime (object transfer) or changing the crime method (tactical transfer) appears.
Kim, Yeon-su (2008) measured the crime transfer effect of CCTV installed in the jurisdiction of Suseo Police Station in Gangnam and Suseo Police using the WDQ used by Bower and Johnson (2003). Theft is crime data. Three buffer zones and two control zones were selected to generate a total of six WDQs, which showed a slight difference but all showed a larger effect of control gains than a crime transfer effect.
Lee, Min - Sik and Park, Hyun - ho (2008) analyzed the effect of CCTV introduced as one of the CPTED crime prevention programs conducted in Bucheon City. The number of incidents and the number of incidents in the CCTV installation area among the crimes collected at Bucheon Chungbu Police Station and Nambu Police Station were classified and classified according to the guideline. As a result of the analysis, it was found that the crime rate was lower than the increase trend (Central police station) or decreased (southern police station). The survey was conducted once before and after the implementation of the crime prevention program. The survey included crime damage, crime report, disorder, and fear of crime. Four types of crime investigated (intrusion theft, intrusion intensity, street strikes, street strikes) decreased significantly. In addition, the fear of crime and disorder in the neighboring area were also significantly decreased. In both domestic and foreign studies, the crime prevention effect was different according to the types of crime (planned crime and unplanned crime) and place (residential area, park, parking lot, etc.). On the other hand, some studies show that crime is not reduced or even increased.
However, in Korea, most of the studies on the crime prevention effect of CCTV are limited to the area of Gangnam - gu, and it seems that they are doing the same analysis with the same data. In addition, there are studies that do not simply set up experimental area and control area, but only analysis of trend analysis. Even if we analyze area separately, we did not control factors affecting crime, so CCTV alone could not measure correct effect. This is because, unlike foreign countries, CCTVs for crime prevention have recently been introduced, and the accumulated data are insufficient and access to crime data is relatively difficult. In recent years, research methods such as questionnaires and interviews have emerged to solve data access problems and the problem of male and female crimes.
After performing the steps described above, a step of producing a safety safety map is performed. At this time, in the step of producing the safety safety map, it is possible to display the safety safety map in a specific color according to the calculated basic degree score.
The step of providing the safety helper service to the user by the produced map may include providing the generated map information to the web service or the mobile service, It is also possible to acquire information from a web service or a mobile service.
In order to produce a safety map, the standardization and appropriateness of map should be considered first. The definition of spatial information belongs to spatial information such as location information about natural or artificial objects existing in space such as ground, underground, water, underwater, And the information necessary for the decision (National Space Information Act, Chapter 1 General Provision 2: 2010).
However, standards related to the production, management, and use of spatial information are rarely defined. As such, production activities of spatial information can affect the standard state of the standardization target, so the activity should also be standardized. For example, standard spatial information must be produced in a standardized way among various basic spatial information producers so that a standardized result can be produced. In addition, it must be provided in a standardized way so that the user can use the standardized spatial information.
ISO / TC 211, an internationally recognized official standard organization, provides a framework and reference model for spatial information standards, data model and operators, geographic information services, data administration, And profile & functional standards.
Since safety guidance is also a result of combining spatial information and information technology, it should be constructed with reference to these five types of spatial information standards, and the appropriateness examination should be made with reference to these standards. However, the standards and contents to be developed and developed may differ depending on the standardization target. Therefore, in this study, the adequacy of the contents that should be basically constructed in the construction of the safety guidance for the public safety was examined.
In this study, we conducted the appropriateness examination through selection of safety guideline according to the standardization type in consideration of establishing the standardization plan in conducting the appropriateness examination of security guideline construction.
There are five types of spatial information standards (base standards, data standards, service standards, quality standards, and profile standards) that should be considered in the appropriateness examination when constructing safety guidance. The safety instruction items to be constructed in consideration of these five types are the names of the safety and security basic diagram, the data used, the source of data, the coordinate system, the data type and format, the data modification, Information on information distribution center disclosure is necessary.
Map display plan
After reviewing the map standardization and appropriateness, you should review how to construct the map. Visual variables, a method of symbolizing map data, are symbolized by considering the characteristics of data. Design basic map symbols by carefully considering these concepts in mapping data, whether they are distributed along a line or within a plane, whether data is qualitative or quantitative, and visual variables are data.
Certain time variables can represent important characteristics of the data. If the data you are trying to express is qualitative as shown in Table 3.8, it is better to choose visual variables that show qualitative differences such as shape or color hue. If the data you want to represent is quantitative, it is a good idea to choose a visual variable that shows a quantitative difference, such as size or color value. Visual variables such as texture may be used to show qualitative or quantitative differences. The data of this project were selected by using visual variables showing quantitative difference by using quantitative data.
Colors represent various colors such as red and green. The various colors mean qualitative differences. It means that different kinds of colors are not big or small. Using color, people are aware of safety and risk. As shown in Figure 3.11, the information is expressed in red, yellow, and green by dividing into three categories: vulnerable (dangerous), normal, and good (safe)
Creation of Safety Safety Map using Safety Vulnerability Analysis Model
Safety elements and safety guidance for building security guidance should be derived from CCTV linkage, which was not available in existing maps. We extract the national basic spatial information and the life safety basic spatial information from the relevant institutional public data and draw the analytical map that incorporates detailed life safety information through the fusion of data between the ministries.
In particular, we analyzed the risk and safety factors of the whole life of the people comprehensively by the field of life safety, and produced a safety map in the form of unified raster and grid polygonal mesh vector layers. Using the safety vulnerability analysis model, the safety survey map of the 1/2-bay security zone in Seocho-gu, Seoul, is shown in Fig.
Big Data Integration Plan for Safety Map
Big data refers to large-scale data that is generated in a digital environment, is large in size, has a short generation cycle, and includes not only numeric data but also text and image data. Big data environment has more data than previous ones, and it can analyze and predict opinions and opinions through SNS as well as people's behaviors.
Claims (6)
Collecting existing data and CCTV related data,
Designing a security vulnerability analysis model that reflects CCTV information,
A step of producing a security safety map,
And providing a safety helper service to the user based on the created map.
The step of collecting the existing data and the CCTV related data includes a step of collecting the GIS DB for disaster prevention and the GIS DB for spatial information as existing data,
A method of smart safety helper service using CCTV including a step of collecting a crime related GIS DB occurring in a certain radius of a CCTV visible distance GIS DB and a CCTV point as the CCTV related data.
The step of designing the security vulnerability analysis model reflecting the CCTV information comprises:
Selecting a safety type,
Evaluating the safety factors and the risk factors and selecting the basic diagram,
Calculating a weight for the basic diagram,
Performing standard scoring on the weighted basis diagram;
A step of classifying the basic diagram in which the standard scoring is performed.
The safety factor may include at least one of police station, fire station, child safety guard, CCTV
Adding a predetermined safety score when belonging to a specific radius from the safety factor,
The risk factor adds a predetermined risk score when it belongs to a certain radius from a nightlife business or a crime scene, adds a predetermined risk score when it deviates from a CCTV to a specific radius,
And calculating the basic degree of the safety factor by summing up the safety score and the risk score.
Wherein the step of producing the security safety map includes displaying the security score in a specific color according to the calculated basic degree score.
The step of providing a safety helper service to the user may include providing the generated map information to a web service or a mobile service,
A method of smart safety helper service using CCTV which enables a user to acquire relevant information from a web service or a mobile service.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150102269A KR20170010930A (en) | 2015-07-20 | 2015-07-20 | Smart safety helper service method by cctv |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150102269A KR20170010930A (en) | 2015-07-20 | 2015-07-20 | Smart safety helper service method by cctv |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20170010930A true KR20170010930A (en) | 2017-02-02 |
Family
ID=58151303
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150102269A KR20170010930A (en) | 2015-07-20 | 2015-07-20 | Smart safety helper service method by cctv |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20170010930A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108647791A (en) * | 2018-03-30 | 2018-10-12 | 中国标准化研究院 | A kind of processing method of multi-source automotive safety information, apparatus and system |
KR101975969B1 (en) * | 2017-12-05 | 2019-05-07 | 주식회사 이엠따블유 | System and method for assessing crime risk |
KR20220120311A (en) | 2021-02-23 | 2022-08-30 | 주식회사 알투 | Smart video surveillance system using camera |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006053838A (en) | 2004-08-16 | 2006-02-23 | Sofmac Systems Co Ltd | Crime information notifying device |
JP2006092311A (en) | 2004-09-24 | 2006-04-06 | Takenaka Komuten Co Ltd | Criminal risk evaluation device, criminal risk evaluation method and criminal risk evaluation program |
JP2009064278A (en) | 2007-09-06 | 2009-03-26 | Takenaka Komuten Co Ltd | Arrangement plan creation device, arrangement plan creation method, and arrangement plan creation program |
KR20110069415A (en) | 2009-12-17 | 2011-06-23 | 성균관대학교산학협력단 | Method of providing crime rate map based on positon information and system thereof |
KR101441664B1 (en) | 2012-11-16 | 2014-09-29 | 목원대학교 산학협력단 | Crime map server using active data collection and crime risk area notification service methodes |
KR101523211B1 (en) | 2013-11-07 | 2015-05-28 | 남서울대학교 산학협력단 | Method and apparatus for identifying crime vulnerable road using digital map |
-
2015
- 2015-07-20 KR KR1020150102269A patent/KR20170010930A/en unknown
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006053838A (en) | 2004-08-16 | 2006-02-23 | Sofmac Systems Co Ltd | Crime information notifying device |
JP2006092311A (en) | 2004-09-24 | 2006-04-06 | Takenaka Komuten Co Ltd | Criminal risk evaluation device, criminal risk evaluation method and criminal risk evaluation program |
JP2009064278A (en) | 2007-09-06 | 2009-03-26 | Takenaka Komuten Co Ltd | Arrangement plan creation device, arrangement plan creation method, and arrangement plan creation program |
KR20110069415A (en) | 2009-12-17 | 2011-06-23 | 성균관대학교산학협력단 | Method of providing crime rate map based on positon information and system thereof |
KR101441664B1 (en) | 2012-11-16 | 2014-09-29 | 목원대학교 산학협력단 | Crime map server using active data collection and crime risk area notification service methodes |
KR101523211B1 (en) | 2013-11-07 | 2015-05-28 | 남서울대학교 산학협력단 | Method and apparatus for identifying crime vulnerable road using digital map |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101975969B1 (en) * | 2017-12-05 | 2019-05-07 | 주식회사 이엠따블유 | System and method for assessing crime risk |
CN108647791A (en) * | 2018-03-30 | 2018-10-12 | 中国标准化研究院 | A kind of processing method of multi-source automotive safety information, apparatus and system |
KR20220120311A (en) | 2021-02-23 | 2022-08-30 | 주식회사 알투 | Smart video surveillance system using camera |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Haas et al. | A national approach for integrating wildfire simulation modeling into Wildland Urban Interface risk assessments within the United States | |
CN113313387B (en) | Intelligent management and control method and system for major security risk classification of enterprise | |
CN110009185A (en) | AI dispatch control plateform system | |
Ghajari et al. | Urban vulnerability under various blast loading scenarios: Analysis using GIS-based multi-criteria decision analysis techniques | |
Li et al. | [Retracted] Construction of Urban Flood Disaster Emergency Management System Using Scenario Construction Technology | |
Rajabifard et al. | An intelligent disaster decision support system for increasing the sustainability of transport networks | |
CN114841662A (en) | Infrastructure construction project management and control method and device, computer equipment and storage medium | |
KR20170010930A (en) | Smart safety helper service method by cctv | |
CN116205504A (en) | Digital emergency plan management method and system | |
CN115239144A (en) | Dual prevention mechanism information system based on regional risk management | |
Lu et al. | Using cased based reasoning for automated safety risk management in construction industry | |
Yang et al. | [Retracted] Measures and Suggestions for Smart Community Development Based on Urban Renewal | |
Mansourian et al. | SDI conceptual modeling for disaster management | |
Elvas et al. | Data fusion and visualization towards city disaster management: Lisbon case study | |
Sun | Smart prisons | |
Balahadia et al. | Application of spatiotemporal analysis and knowledge discovery for databases in the bureau of fire protection as incident report system: tool for improving fire services | |
Zhang et al. | Police resource distribution in China: spatial decision making based on PGIS-MCDA method | |
Goergen et al. | Identifying abnormal patterns in cellular communication flows | |
Mishra et al. | Role of predictive data analytics to assess long term impacts of disaster | |
Balahadia et al. | Development of Fire Report Management Portal with Mapping of Fire Hotspot, Data Mining, and Prescriptions of Fire Prevention Activities | |
Halúsková | Digital Twin in Smart City | |
Qian | Evaluation on sustainable development of fire safety management policies in smart cities based on big data | |
Junyoung et al. | Spatial Big Data Strategy for Smart Safer City in Connection with Citizen Participation | |
KR102400062B1 (en) | A method to visualize a disaster situation based on a grid system | |
KR102623123B1 (en) | Grid-based multi-dimensional visualization expression method for each disaster management situatation |