WO2017085755A1 - An advanced security system, an advanced security method and an advanced security program - Google Patents

An advanced security system, an advanced security method and an advanced security program Download PDF

Info

Publication number
WO2017085755A1
WO2017085755A1 PCT/JP2015/005784 JP2015005784W WO2017085755A1 WO 2017085755 A1 WO2017085755 A1 WO 2017085755A1 JP 2015005784 W JP2015005784 W JP 2015005784W WO 2017085755 A1 WO2017085755 A1 WO 2017085755A1
Authority
WO
WIPO (PCT)
Prior art keywords
suspect
advanced security
security system
thresholded
armed
Prior art date
Application number
PCT/JP2015/005784
Other languages
French (fr)
Inventor
Taras Kushta
Original Assignee
Nec Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nec Corporation filed Critical Nec Corporation
Priority to PCT/JP2015/005784 priority Critical patent/WO2017085755A1/en
Publication of WO2017085755A1 publication Critical patent/WO2017085755A1/en

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/86Combinations of radar systems with non-radar systems, e.g. sonar, direction finder
    • G01S13/867Combination of radar systems with cameras
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/887Radar or analogous systems specially adapted for specific applications for detection of concealed objects, e.g. contraband or weapons
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/89Radar or analogous systems specially adapted for specific applications for mapping or imaging
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V8/00Prospecting or detecting by optical means
    • G01V8/005Prospecting or detecting by optical means operating with millimetre waves, e.g. measuring the black losey radiation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V8/00Prospecting or detecting by optical means
    • G01V8/10Detecting, e.g. by using light barriers
    • G01V8/12Detecting, e.g. by using light barriers using one transmitter and one receiver
    • G01V8/14Detecting, e.g. by using light barriers using one transmitter and one receiver using reflectors

Definitions

  • the present invention relates to an advanced security system, an advanced security method and an advanced security program.
  • Advanced security system in which radar imaging and optical imaging are used conjointly, has been proposed.
  • radar imaging is used and, after thresholding of obtained radar image at a predetermined level, a comparison of obtained thresholded image with database from a library of dangerous objects is provided. If such comparison gives a predetermined degree of coincidence, then a camera, used in the system, is focused on a suspect and the suspect detection is provided and, as result, an alarming signal is originating in the system and is transmitted to authorized personnel.
  • Typical solution which is used to create a criminal (or terror) free zone is based on the use of established checkpoint screening.
  • patent literature 1 discloses a technique of determining the presence or absence of a dangerous object, based on the luminance information.
  • patent literature 2 discloses a technique of detecting a non-metal weapon, based on the backscatter signal.
  • the present invention enables to provide a technique of solving the above-described problem.
  • One aspect of the present invention provides an advanced security system comprising: a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; a comparator for comparing said thresholded images with dangerous objects stored in a library; a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and a signal generator for generating an alarming signal on the detected suspect.
  • Another aspect of the present invention provides an advanced security method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
  • Still other aspect of the present invention provides an advanced security program for causing a computer to execute a method, comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
  • Fig. 1 is a block diagram showing the arrangement of an advanced security system according to the first embodiment of the present invention.
  • Fig. 2 is a block diagram showing the arrangement of an advanced security system according to the second embodiment of the present invention.
  • Fig. 3 is a schematic view showing thresholding process of a radar image from suspect according to the second embodiment of the present invention.
  • Fig. 4 is a library showing the dangerous object library used in the advanced security system according to the second embodiment of the present invention.
  • Fig. 5 is a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus.
  • Fig. 6 is a flowchart showing the sequence of processing in the advanced security system according to the second embodiment of the present invention.
  • Fig. 1 is a block diagram showing the arrangement of an advanced security system according to the first embodiment of the present invention.
  • Fig. 2 is a block diagram showing the arrangement of an advanced security system according to the second embodiment of the present invention.
  • Fig. 3 is
  • FIG. 7 is a block diagram showing the arrangement of an advanced security system according to the third embodiment of the present invention.
  • Fig. 8 is a flowchart showing the sequence of processing in the advanced security system according to the third embodiment of the present invention.
  • Fig. 9 is a block diagram showing the arrangement of an advanced security system according to the forth embodiment of the present invention.
  • Fig. 10 is a flowchart showing the sequence of processing in the advanced security system according to the forth embodiment of the present invention.
  • This object in the presented application is provided by a conjoint use of a radar and a camera which give radar and optical images of a person investigated. As result, after data processing of optical and radar signals, it makes possible both detection and identification of the person armed by hidden unauthorized object.
  • the advanced security system combines two functional parts providing both optical signal processing (camera) and electromagnetic signal processing (radar).
  • the system identifies a type of dangerous objects (as for an example, gun, knife, or so on) carried by the suspect.
  • microwave and millimeter-wave radars which can be compact and, as a result, can provide arrangement of radar and camera in public places and also as a hidden system.
  • Advanced security system 100 comprises radar 101, comparator 102, camera 103 and signal generator. Comparator 102 further comprises library 121.
  • radar 101 After illumination of a person by a radar signal using radar 101 and receiving a reflected radar signal, radar 101 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by radar 101. Obtained radar image is thresholded at a predetermined level (for example, at -10dB level, or -15dB level) in radar 101. Comparator 102 compares obtained thresholded image with database of dangerous objects kept in a library 121 of comparator 102. If thresholded image is matched with an object of library 121 with predetermined accuracy, advanced security system 100 fixes camera 103 on the person providing the suspect detection, and after that, signal generator 104 generates alarming signal.
  • a predetermined level for example, at -10dB level, or -15dB level
  • Advanced security system 200 comprises radar 201, comparator 202, camera 203 and signal generator 204.
  • Advanced security system 200 further comprises library 210 of dangerous objects and terminal device 220.
  • radar 201 has processor 211.
  • processor 211 of radar 201 After illumination of a person by a radar signal using radar 201 and receiving a reflected signal, processor 211 of radar 201 performs data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by processor 211 of radar 201. Obtained radar image is thresholded at a predetermined level by processor 211 of 201. Obtained thresholded image is compared with database of dangerous objects kept in library 210 by comparator 202.
  • advanced security system 200 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to terminal device 220 (as, for an example, a police monitor).
  • thresholding process of a radar image from a suspect is presented.
  • thresholding gives a possibility to remove human body effect and obtain a radar image of an unauthorized object which is well-suitable for comparison with database of dangerous objects in the library 210.
  • Library 210 stores name 401, shape 402 and size 403. And, shape 402 and size 403 is associated with name 401.
  • FIG. 5 a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus.
  • Advanced security system 200 includes CPU(Central Processing Unit) 510, ROM(Read Only Memory) 520, communication controller 530, RAM(Random Access Memory) 540 and Storage 550.
  • CPU 610 is a central processor and controls the entire cloud server 220 by executing various programs.
  • ROM 620 is a read-only memory and stores various kinds of parameters in addition to a boot program to be executed by CPU 610 first.
  • RAM 540 stores radar imaging 541, dangerous object image 542 and comparison result.
  • storage 650 stores library 551 and a program 552.
  • Communication controller 530 controls communication with another device via the network. The functions of modules accumulated in the program 552 will be described. Processing module 553 functions to process reflected signal. Comparison module 554 functions to compare thresholded image with dangerous objects.
  • step S601 radar 201 illuminates a radar signal for a person.
  • processor 211 of radar 201 performs data processing of reflected signal by a predetermined algorithm.
  • step S605 as a result of step S603, radar image is obtained.
  • step S607 obtained radar image is thresholded at a predetermined level.
  • comparator 202 compares thresholded image with database of dangerous objects stored in library 210.
  • step S611 comparator judges whether thresholded image matches with dangerous objects.
  • step S613 If thresholded image is matched with a dangerous object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), in step S613, camera 203 is fixed on the person providing dangerous object (camera focusing on suspect). In step S615, signal generator 204 generates alarming signal which is submitted to terminal device 220.
  • Advanced security system 700 comprises radar 701, comparator 202, camera 203 and signal generator 204. And, advanced security system 700 further comprises library 210 and terminal device 220.
  • processor 711 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm.
  • radar imaging is provided.
  • Obtained radar image is thresholded step-by-step in processor 711.
  • comparator 202 compares each obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 600 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to a terminal device 220.
  • step S801 the alarming signal is transmitted to terminal device 220 by advanced security system 700.
  • Advanced security system 900 comprises radar 701, comparator 202, camera 203 and signal generator 904. And, advanced security system 900 further comprises library 210 and terminal device 220.
  • processor 611 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm.
  • radar imaging is provided.
  • Obtained radar image is thresholded at a predetermined level.
  • comparator 202 compares obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 900 fixes camera 203 on the person providing the suspect detection and a photo of the suspect.
  • comparator 202 changes the level of thresholding by decreasing on predetermined level in DB.
  • person identification 14 is produced in signal generator 904. After suspect identification alarming signal providing simultaneously suspect personal information is submitted to a terminal device 220.
  • step S1001 if thresholding image is not matched with an objects kept in library 210, comparator 202 changes the level of thresholding by decreasing on predetermined level in DB. (Other Embodiments)
  • An advanced security system comprising: a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; a comparator for comparing said thresholded images with dangerous objects stored in a library; a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and a signal generator for generating an alarming signal on the detected suspect.
  • a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level
  • a comparator for comparing said thresholded images with dangerous objects stored in a library
  • a camera for focusing on a detected suspect armed by unauthorized object due to said comparison
  • a signal generator for generating an alarming signal on the detected suspect.
  • the advanced security system according to Claim 1 further comprising a terminal device, wherein said alarming signal is submitted to said terminal device.
  • An advanced security method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
  • An advanced security program for causing a computer to execute a method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.

Landscapes

  • Engineering & Computer Science (AREA)
  • Remote Sensing (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Electromagnetism (AREA)
  • Geophysics (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Alarm Systems (AREA)
  • Image Analysis (AREA)
  • Image Processing (AREA)

Abstract

It is an object of the present invention to provide an advanced security system which can provide simultaneously detection of a suspect armed by an unauthorized object and also identification of the suspect. An advanced security system comprising: a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; a comparator that compares said thresholded images with dangerous objects stored in a library; a camera which is fixed on a detected suspect armed by unauthorized object due to said comparison; and a signal generator for generating an alarming signal on the detected suspect.

Description

AN ADVANCED SECURITY SYSTEM, AN ADVANCED SECURITY METHOD AND AN ADVANCED SECURITY PROGRAM
The present invention relates to an advanced security system, an advanced security method and an advanced security program.
Advanced security system, in which radar imaging and optical imaging are used conjointly, has been proposed. In this system to define a hidden dangerous object, radar imaging is used and, after thresholding of obtained radar image at a predetermined level, a comparison of obtained thresholded image with database from a library of dangerous objects is provided. If such comparison gives a predetermined degree of coincidence, then a camera, used in the system, is focused on a suspect and the suspect detection is provided and, as result, an alarming signal is originating in the system and is transmitted to authorized personnel.
At the present time, risk of terror attack and criminal issues are main problems arising practically in each country (especially in big cities at airports, stadiums, banks, shopping centers and other crowd places). Solving and overcoming these problems are key targets in providing safety and security.
Typical solution which is used to create a criminal (or terror) free zone is based on the use of established checkpoint screening.
However, such approach suffers from several disadvantages such as: it has been provided with visible presence; it is not expected to catch a criminal; it provides public reassurance.
That is why, it is necessary to develop such system which can be characterized by following properties: It can detect weapons (or any unauthorized object) being carried without alerting suspect; It can give a possibility to intervene at time and location of police choosing (without risk of bystanders). Such system also should provide both suspect detection and suspect identification and it has to be flexible and gives a possibility for public place installation.
In the above technical field, patent literature 1 discloses a technique of determining the presence or absence of a dangerous object, based on the luminance information. And, patent literature 2 discloses a technique of detecting a non-metal weapon, based on the backscatter signal.
[PTL 1] JPA2009-222580
[PTL 2] JPA2002-514298
The present invention enables to provide a technique of solving the above-described problem.
One aspect of the present invention provides an advanced security system comprising:
a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
a comparator for comparing said thresholded images with dangerous objects stored in a library;
a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and
a signal generator for generating an alarming signal on the detected suspect.
Another aspect of the present invention provides an advanced security method comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
Still other aspect of the present invention provides an advanced security program for causing a computer to execute a method, comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
According to the present invention, it is possible to provide an advanced security system which can detect weapons being carried without altering suspect.
Fig. 1 is a block diagram showing the arrangement of an advanced security system according to the first embodiment of the present invention. Fig. 2 is a block diagram showing the arrangement of an advanced security system according to the second embodiment of the present invention. Fig. 3 is a schematic view showing thresholding process of a radar image from suspect according to the second embodiment of the present invention. Fig. 4 is a library showing the dangerous object library used in the advanced security system according to the second embodiment of the present invention. Fig. 5 is a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus. Fig. 6 is a flowchart showing the sequence of processing in the advanced security system according to the second embodiment of the present invention. Fig. 7 is a block diagram showing the arrangement of an advanced security system according to the third embodiment of the present invention. Fig. 8 is a flowchart showing the sequence of processing in the advanced security system according to the third embodiment of the present invention. Fig. 9 is a block diagram showing the arrangement of an advanced security system according to the forth embodiment of the present invention. Fig. 10 is a flowchart showing the sequence of processing in the advanced security system according to the forth embodiment of the present invention.
Preferred embodiments of the present invention will now be described in detail with reference to the drawings. It should be noted that the relative arrangement of the components, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless it is specifically stated otherwise.
It is an object of the present invention to provide an advanced security system which can provide simultaneously detection of a suspect armed by an unauthorized object and also identification of the suspect. This object in the presented application is provided by a conjoint use of a radar and a camera which give radar and optical images of a person investigated. As result, after data processing of optical and radar signals, it makes possible both detection and identification of the person armed by hidden unauthorized object.
Thus, the advanced security system combines two functional parts providing both optical signal processing (camera) and electromagnetic signal processing (radar).
In addition, the system identifies a type of dangerous objects (as for an example, gun, knife, or so on) carried by the suspect.
Moreover, the application of microwave and millimeter-wave radars, which can be compact and, as a result, can provide arrangement of radar and camera in public places and also as a hidden system.
It is important that such system can detect a criminal without alarming and also can provide catching the criminal in a place without bystanders.
Hereinafter, several types of advanced security systems according to the present invention will be described in details with reference to attached drawings. But, it would be well understood that this description should not be viewed as narrowing the appended claims.
(First Embodiment)
In fig. 1, an exemplary embodiment of an advanced security system is shown. In fig.1, schematic of advanced security system 100 is shown. Advanced security system 100 comprises radar 101, comparator 102, camera 103 and signal generator. Comparator 102 further comprises library 121.
After illumination of a person by a radar signal using radar 101 and receiving a reflected radar signal, radar 101 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by radar 101. Obtained radar image is thresholded at a predetermined level (for example, at -10dB level, or -15dB level) in radar 101. Comparator 102 compares obtained thresholded image with database of dangerous objects kept in a library 121 of comparator 102. If thresholded image is matched with an object of library 121 with predetermined accuracy, advanced security system 100 fixes camera 103 on the person providing the suspect detection, and after that, signal generator 104 generates alarming signal.
(Second Embodiment)
In figs. 2 to 6, another embodiment of the advanced security system is shown. In fig. 2, schematic of an advanced security system in another exemplary embodiment of the present invention is shown. Advanced security system 200 comprises radar 201, comparator 202, camera 203 and signal generator 204. Advanced security system 200 further comprises library 210 of dangerous objects and terminal device 220. Moreover, radar 201 has processor 211.
After illumination of a person by a radar signal using radar 201 and receiving a reflected signal, processor 211 of radar 201 performs data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by processor 211 of radar 201. Obtained radar image is thresholded at a predetermined level by processor 211 of 201. Obtained thresholded image is compared with database of dangerous objects kept in library 210 by comparator 202. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 200 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to terminal device 220 (as, for an example, a police monitor).
In fig. 3, thresholding process of a radar image from a suspect is presented. As follows from this figure thresholding gives a possibility to remove human body effect and obtain a radar image of an unauthorized object which is well-suitable for comparison with database of dangerous objects in the library 210.
In fig. 4, an example of the structure concerning library 210 of dangerous objects is shown. Library 210 stores name 401, shape 402 and size 403. And, shape 402 and size 403 is associated with name 401.
In fig. 5, a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus.
Advanced security system 200 includes CPU(Central Processing Unit) 510, ROM(Read Only Memory) 520, communication controller 530, RAM(Random Access Memory) 540 and Storage 550. CPU 610 is a central processor and controls the entire cloud server 220 by executing various programs. ROM 620 is a read-only memory and stores various kinds of parameters in addition to a boot program to be executed by CPU 610 first. RAM 540 stores radar imaging 541, dangerous object image 542 and comparison result.
On the other hand, storage 650 stores library 551 and a program 552. Communication controller 530 controls communication with another device via the network. The functions of modules accumulated in the program 552 will be described. Processing module 553 functions to process reflected signal. Comparison module 554 functions to compare thresholded image with dangerous objects.
In fig. 6, a flowchart for explaining the sequence of processing in advanced security system 200. In step S601, radar 201 illuminates a radar signal for a person. In step S603, processor 211 of radar 201 performs data processing of reflected signal by a predetermined algorithm. In step S605, as a result of step S603, radar image is obtained. In step S607, obtained radar image is thresholded at a predetermined level. In step S609, comparator 202 compares thresholded image with database of dangerous objects stored in library 210. In step S611, comparator judges whether thresholded image matches with dangerous objects. If thresholded image is matched with a dangerous object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), in step S613, camera 203 is fixed on the person providing dangerous object (camera focusing on suspect). In step S615, signal generator 204 generates alarming signal which is submitted to terminal device 220.
(Third Embodiment)
In fig. 7, another embodiment of the advanced security system is shown. In fig. 7, schematic of an advanced security system in another exemplary embodiment of the present invention is shown. Advanced security system 700 comprises radar 701, comparator 202, camera 203 and signal generator 204. And, advanced security system 700 further comprises library 210 and terminal device 220.
After illumination of a person by a radar signal using radar 701 and receiving a reflected signal, processor 711 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided. Obtained radar image is thresholded step-by-step in processor 711. And then, comparator 202 compares each obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 600 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to a terminal device 220.
In fig. 8, a flowchart for explaining the sequence of processing in advanced security system 700. Steps S601 to S615 are the same as the processing of the second embodiment described in fig. 6, so a description thereof will not be repeated, and step S801 will be explained. In step S801, the alarming signal is transmitted to terminal device 220 by advanced security system 700.
(Forth Embodiment)
In fig. 9, another embodiment of the advanced security system is shown. In fig. 8, schematic of an advanced security system in another exemplary embodiment of the present invention is shown. Advanced security system 900 comprises radar 701, comparator 202, camera 203 and signal generator 904. And, advanced security system 900 further comprises library 210 and terminal device 220.
After illumination of a person by a radar signal using radar 701 and receiving a reflected signal, processor 611 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided. Obtained radar image is thresholded at a predetermined level. And then, comparator 202 compares obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 900 fixes camera 203 on the person providing the suspect detection and a photo of the suspect. By contrast, if thresholding image is not matched with an objects kept in library 210, comparator 202 changes the level of thresholding by decreasing on predetermined level in DB. Using the suspect photo and a predetermined algorithm, person identification 14 is produced in signal generator 904. After suspect identification alarming signal providing simultaneously suspect personal information is submitted to a terminal device 220.
In fig. 10, a flowchart for explaining the sequence of processing in advanced security system 900. Steps S601 to S615 and S801 are the same as the processing of the third embodiment described in fig. 8, so a description thereof will not be repeated, and step S1001 will be explained. In step S1001, if thresholding image is not matched with an objects kept in library 210, comparator 202 changes the level of thresholding by decreasing on predetermined level in DB.
(Other Embodiments)
While the present invention has been described in relation to some exemplary embodiments, it is to be understood that these exemplary embodiments are for the purpose of description by example, and not of limitation. While it will be obvious to those skilled in the art upon reading the present specification that various changes and substitutions may be easily made by equal components and art, it is obvious that such changes and substitutions lie within the true scope and spirit of the presented invention as defined by the claims.
(Other exemplaryer embodiments)
Some or all of the above-described embodiments can also be described as in the following further exemplary embodiments, but are not limited to the followings.
(Further exemplary embodiment 1)
An advanced security system comprising:
a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
a comparator for comparing said thresholded images with dangerous objects stored in a library;
a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and
a signal generator for generating an alarming signal on the detected suspect.
(Further exemplary embodiment 2)
The advanced security system according to Claim 1, further comprising a terminal device, wherein said alarming signal is submitted to said terminal device.
(Further exemplary embodiment 3)
The advanced security system according to Claim 1 or 2, wherein said images are thresholded step-by-step on a predetermined level.
(Further exemplary embodiment 4)
The advanced security system according to any one of Claims 1 to 3, wherein said camera comprising a photo producer for producing a photo of the suspect and an identifier generator for generating the suspect identifier based on a predetermined algorithm using said photo.
(Further exemplary embodiment 5)
The advanced security system according to any one of Claims 1 to 4, wherein said alarming signal includes suspect personal information.
(Further exemplary embodiment 6)
An advanced security method comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
(Further exemplary embodiment 7)
An advanced security program for causing a computer to execute a method, comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.

Claims (7)

  1. An advanced security system comprising:
    a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
    a comparator for comparing said thresholded images with dangerous objects stored in a library;
    a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and
    a signal generator for generating an alarming signal on the detected suspect.
  2. The advanced security system according to Claim 1, further comprising a terminal device, wherein said alarming signal is submitted to said terminal device.
  3. The advanced security system according to Claim 1 or 2, wherein said images are thresholded step-by-step on a predetermined level.
  4. The advanced security system according to any one of Claims 1 to 3, wherein said camera comprising a photo producer for producing a photo of the suspect and an identifier generator for generating the suspect identifier based on a predetermined algorithm using said photo.
  5. The advanced security system according to any one of Claims 1 to 4, wherein said alarming signal includes suspect personal information.
  6. An advanced security method comprising:
    producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
    comparing said thresholded images with dangerous objects stored in a library;
    fixing on a detected suspect armed by unauthorized object due to said comparison; and
    generating an alarming signal on the detected suspect.
  7. An advanced security program for causing a computer to execute a method, comprising:
    producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
    comparing said thresholded images with dangerous objects stored in a library;
    fixing on a detected suspect armed by unauthorized object due to said comparison; and
    generating an alarming signal on the detected suspect.
PCT/JP2015/005784 2015-11-19 2015-11-19 An advanced security system, an advanced security method and an advanced security program WO2017085755A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2015/005784 WO2017085755A1 (en) 2015-11-19 2015-11-19 An advanced security system, an advanced security method and an advanced security program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2015/005784 WO2017085755A1 (en) 2015-11-19 2015-11-19 An advanced security system, an advanced security method and an advanced security program

Publications (1)

Publication Number Publication Date
WO2017085755A1 true WO2017085755A1 (en) 2017-05-26

Family

ID=58718491

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2015/005784 WO2017085755A1 (en) 2015-11-19 2015-11-19 An advanced security system, an advanced security method and an advanced security program

Country Status (1)

Country Link
WO (1) WO2017085755A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2021135268A (en) * 2020-02-28 2021-09-13 株式会社東芝 Monitoring method and monitoring device
WO2022044187A1 (en) * 2020-08-27 2022-03-03 日本電気株式会社 Data processing device, data processing method, and program
US20220299631A1 (en) * 2021-03-19 2022-09-22 Nec Corporation Inspection system and inspection method
EP4050891A4 (en) * 2019-10-25 2022-10-19 NEC Corporation Processing device, processing method, and program
EP4109379A4 (en) * 2020-02-20 2023-04-12 NEC Corporation Processing system, processing method, and program

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10282247A (en) * 1997-04-10 1998-10-23 Mitsubishi Electric Corp Metal detecting device
US20050110672A1 (en) * 2003-10-10 2005-05-26 L-3 Communications Security And Detection Systems, Inc. Mmw contraband screening system
JP2007213291A (en) * 2006-02-09 2007-08-23 Fujitsu General Ltd Emergency notification system
US20080129581A1 (en) * 2004-10-22 2008-06-05 Douglass Robert J System and Method For Standoff Detection of Human Carried Explosives
WO2009157551A1 (en) * 2008-06-27 2009-12-30 マスプロ電工株式会社 Millimeter wave image pickup device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10282247A (en) * 1997-04-10 1998-10-23 Mitsubishi Electric Corp Metal detecting device
US20050110672A1 (en) * 2003-10-10 2005-05-26 L-3 Communications Security And Detection Systems, Inc. Mmw contraband screening system
US20080129581A1 (en) * 2004-10-22 2008-06-05 Douglass Robert J System and Method For Standoff Detection of Human Carried Explosives
JP2007213291A (en) * 2006-02-09 2007-08-23 Fujitsu General Ltd Emergency notification system
WO2009157551A1 (en) * 2008-06-27 2009-12-30 マスプロ電工株式会社 Millimeter wave image pickup device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4050891A4 (en) * 2019-10-25 2022-10-19 NEC Corporation Processing device, processing method, and program
EP4109379A4 (en) * 2020-02-20 2023-04-12 NEC Corporation Processing system, processing method, and program
JP2021135268A (en) * 2020-02-28 2021-09-13 株式会社東芝 Monitoring method and monitoring device
JP7414587B2 (en) 2020-02-28 2024-01-16 株式会社東芝 Monitoring method and device
WO2022044187A1 (en) * 2020-08-27 2022-03-03 日本電気株式会社 Data processing device, data processing method, and program
US20220299631A1 (en) * 2021-03-19 2022-09-22 Nec Corporation Inspection system and inspection method

Similar Documents

Publication Publication Date Title
WO2017085755A1 (en) An advanced security system, an advanced security method and an advanced security program
CN109799544B (en) Intelligent detection method and device applied to millimeter wave security check instrument and storage device
US20180308321A1 (en) Detection of unauthorized devices on atms
US8890745B2 (en) RF gun barrel detection system
WO2017062078A2 (en) Combined intensity and coherent change detection in images
CA2640884A1 (en) Methods and systems for use in security screening, with parallel processing capability
Wang et al. Data-driven probability hypothesis density filter for visual tracking
Sadjadi et al. Remote sensing using passive infrared Stokes parameters
CN111724558B (en) Monitoring method, monitoring device and intrusion alarm system
CN105095769A (en) Information service software vulnerability detection method
CN103023889A (en) Safety margin risk quantification method
Belloni et al. SAR image dataset of military ground targets with multiple poses for ATR
Gao et al. Modified log-ratio operator for change detection of synthetic aperture radar targets in forest concealment
CN109613562A (en) Anemometry laser radar effectively detects recognition methods and the device on boundary
CN116434161B (en) Method and system for judging whether parking behavior based on high-order video is credible
KR102664000B1 (en) Method and apparatus for managing address of vulnerable wallet within blockchain network
Gardezi et al. Enhanced target recognition employing spatial correlation filters and affine scale invariant feature transform
Dowdy et al. Voxel-space radar signal processing for side attack explosive ballistic detection
US8102305B2 (en) Filtering sensor data to provide estimates of structures
WO2015128939A1 (en) Security evaluation system, security evaluation device, and security evaluation method
Pietkiewicz et al. Fusion of identification information from ELINT-ESM sensors
Zhang et al. Synthetic aperture radar ship detection in complex scenes based on multifeature fusion network
CN114445669A (en) Smoke and fire alarm method and device, electronic equipment and storage medium
Simonyan et al. Detection and ignorance method of false targets during object detection
Zhuge et al. Automatic target recognition in ultra-wideband 3-D images for concealed weapon detection

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15908695

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15908695

Country of ref document: EP

Kind code of ref document: A1