WO2017085755A1 - An advanced security system, an advanced security method and an advanced security program - Google Patents
An advanced security system, an advanced security method and an advanced security program Download PDFInfo
- Publication number
- WO2017085755A1 WO2017085755A1 PCT/JP2015/005784 JP2015005784W WO2017085755A1 WO 2017085755 A1 WO2017085755 A1 WO 2017085755A1 JP 2015005784 W JP2015005784 W JP 2015005784W WO 2017085755 A1 WO2017085755 A1 WO 2017085755A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- suspect
- advanced security
- security system
- thresholded
- armed
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/86—Combinations of radar systems with non-radar systems, e.g. sonar, direction finder
- G01S13/867—Combination of radar systems with cameras
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/88—Radar or analogous systems specially adapted for specific applications
- G01S13/887—Radar or analogous systems specially adapted for specific applications for detection of concealed objects, e.g. contraband or weapons
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S13/00—Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
- G01S13/88—Radar or analogous systems specially adapted for specific applications
- G01S13/89—Radar or analogous systems specially adapted for specific applications for mapping or imaging
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01V—GEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
- G01V8/00—Prospecting or detecting by optical means
- G01V8/005—Prospecting or detecting by optical means operating with millimetre waves, e.g. measuring the black losey radiation
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01V—GEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
- G01V8/00—Prospecting or detecting by optical means
- G01V8/10—Detecting, e.g. by using light barriers
- G01V8/12—Detecting, e.g. by using light barriers using one transmitter and one receiver
- G01V8/14—Detecting, e.g. by using light barriers using one transmitter and one receiver using reflectors
Definitions
- the present invention relates to an advanced security system, an advanced security method and an advanced security program.
- Advanced security system in which radar imaging and optical imaging are used conjointly, has been proposed.
- radar imaging is used and, after thresholding of obtained radar image at a predetermined level, a comparison of obtained thresholded image with database from a library of dangerous objects is provided. If such comparison gives a predetermined degree of coincidence, then a camera, used in the system, is focused on a suspect and the suspect detection is provided and, as result, an alarming signal is originating in the system and is transmitted to authorized personnel.
- Typical solution which is used to create a criminal (or terror) free zone is based on the use of established checkpoint screening.
- patent literature 1 discloses a technique of determining the presence or absence of a dangerous object, based on the luminance information.
- patent literature 2 discloses a technique of detecting a non-metal weapon, based on the backscatter signal.
- the present invention enables to provide a technique of solving the above-described problem.
- One aspect of the present invention provides an advanced security system comprising: a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; a comparator for comparing said thresholded images with dangerous objects stored in a library; a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and a signal generator for generating an alarming signal on the detected suspect.
- Another aspect of the present invention provides an advanced security method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
- Still other aspect of the present invention provides an advanced security program for causing a computer to execute a method, comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
- Fig. 1 is a block diagram showing the arrangement of an advanced security system according to the first embodiment of the present invention.
- Fig. 2 is a block diagram showing the arrangement of an advanced security system according to the second embodiment of the present invention.
- Fig. 3 is a schematic view showing thresholding process of a radar image from suspect according to the second embodiment of the present invention.
- Fig. 4 is a library showing the dangerous object library used in the advanced security system according to the second embodiment of the present invention.
- Fig. 5 is a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus.
- Fig. 6 is a flowchart showing the sequence of processing in the advanced security system according to the second embodiment of the present invention.
- Fig. 1 is a block diagram showing the arrangement of an advanced security system according to the first embodiment of the present invention.
- Fig. 2 is a block diagram showing the arrangement of an advanced security system according to the second embodiment of the present invention.
- Fig. 3 is
- FIG. 7 is a block diagram showing the arrangement of an advanced security system according to the third embodiment of the present invention.
- Fig. 8 is a flowchart showing the sequence of processing in the advanced security system according to the third embodiment of the present invention.
- Fig. 9 is a block diagram showing the arrangement of an advanced security system according to the forth embodiment of the present invention.
- Fig. 10 is a flowchart showing the sequence of processing in the advanced security system according to the forth embodiment of the present invention.
- This object in the presented application is provided by a conjoint use of a radar and a camera which give radar and optical images of a person investigated. As result, after data processing of optical and radar signals, it makes possible both detection and identification of the person armed by hidden unauthorized object.
- the advanced security system combines two functional parts providing both optical signal processing (camera) and electromagnetic signal processing (radar).
- the system identifies a type of dangerous objects (as for an example, gun, knife, or so on) carried by the suspect.
- microwave and millimeter-wave radars which can be compact and, as a result, can provide arrangement of radar and camera in public places and also as a hidden system.
- Advanced security system 100 comprises radar 101, comparator 102, camera 103 and signal generator. Comparator 102 further comprises library 121.
- radar 101 After illumination of a person by a radar signal using radar 101 and receiving a reflected radar signal, radar 101 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by radar 101. Obtained radar image is thresholded at a predetermined level (for example, at -10dB level, or -15dB level) in radar 101. Comparator 102 compares obtained thresholded image with database of dangerous objects kept in a library 121 of comparator 102. If thresholded image is matched with an object of library 121 with predetermined accuracy, advanced security system 100 fixes camera 103 on the person providing the suspect detection, and after that, signal generator 104 generates alarming signal.
- a predetermined level for example, at -10dB level, or -15dB level
- Advanced security system 200 comprises radar 201, comparator 202, camera 203 and signal generator 204.
- Advanced security system 200 further comprises library 210 of dangerous objects and terminal device 220.
- radar 201 has processor 211.
- processor 211 of radar 201 After illumination of a person by a radar signal using radar 201 and receiving a reflected signal, processor 211 of radar 201 performs data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by processor 211 of radar 201. Obtained radar image is thresholded at a predetermined level by processor 211 of 201. Obtained thresholded image is compared with database of dangerous objects kept in library 210 by comparator 202.
- advanced security system 200 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to terminal device 220 (as, for an example, a police monitor).
- thresholding process of a radar image from a suspect is presented.
- thresholding gives a possibility to remove human body effect and obtain a radar image of an unauthorized object which is well-suitable for comparison with database of dangerous objects in the library 210.
- Library 210 stores name 401, shape 402 and size 403. And, shape 402 and size 403 is associated with name 401.
- FIG. 5 a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus.
- Advanced security system 200 includes CPU(Central Processing Unit) 510, ROM(Read Only Memory) 520, communication controller 530, RAM(Random Access Memory) 540 and Storage 550.
- CPU 610 is a central processor and controls the entire cloud server 220 by executing various programs.
- ROM 620 is a read-only memory and stores various kinds of parameters in addition to a boot program to be executed by CPU 610 first.
- RAM 540 stores radar imaging 541, dangerous object image 542 and comparison result.
- storage 650 stores library 551 and a program 552.
- Communication controller 530 controls communication with another device via the network. The functions of modules accumulated in the program 552 will be described. Processing module 553 functions to process reflected signal. Comparison module 554 functions to compare thresholded image with dangerous objects.
- step S601 radar 201 illuminates a radar signal for a person.
- processor 211 of radar 201 performs data processing of reflected signal by a predetermined algorithm.
- step S605 as a result of step S603, radar image is obtained.
- step S607 obtained radar image is thresholded at a predetermined level.
- comparator 202 compares thresholded image with database of dangerous objects stored in library 210.
- step S611 comparator judges whether thresholded image matches with dangerous objects.
- step S613 If thresholded image is matched with a dangerous object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), in step S613, camera 203 is fixed on the person providing dangerous object (camera focusing on suspect). In step S615, signal generator 204 generates alarming signal which is submitted to terminal device 220.
- Advanced security system 700 comprises radar 701, comparator 202, camera 203 and signal generator 204. And, advanced security system 700 further comprises library 210 and terminal device 220.
- processor 711 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm.
- radar imaging is provided.
- Obtained radar image is thresholded step-by-step in processor 711.
- comparator 202 compares each obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 600 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to a terminal device 220.
- step S801 the alarming signal is transmitted to terminal device 220 by advanced security system 700.
- Advanced security system 900 comprises radar 701, comparator 202, camera 203 and signal generator 904. And, advanced security system 900 further comprises library 210 and terminal device 220.
- processor 611 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm.
- radar imaging is provided.
- Obtained radar image is thresholded at a predetermined level.
- comparator 202 compares obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 900 fixes camera 203 on the person providing the suspect detection and a photo of the suspect.
- comparator 202 changes the level of thresholding by decreasing on predetermined level in DB.
- person identification 14 is produced in signal generator 904. After suspect identification alarming signal providing simultaneously suspect personal information is submitted to a terminal device 220.
- step S1001 if thresholding image is not matched with an objects kept in library 210, comparator 202 changes the level of thresholding by decreasing on predetermined level in DB. (Other Embodiments)
- An advanced security system comprising: a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; a comparator for comparing said thresholded images with dangerous objects stored in a library; a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and a signal generator for generating an alarming signal on the detected suspect.
- a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level
- a comparator for comparing said thresholded images with dangerous objects stored in a library
- a camera for focusing on a detected suspect armed by unauthorized object due to said comparison
- a signal generator for generating an alarming signal on the detected suspect.
- the advanced security system according to Claim 1 further comprising a terminal device, wherein said alarming signal is submitted to said terminal device.
- An advanced security method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
- An advanced security program for causing a computer to execute a method comprising: producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; comparing said thresholded images with dangerous objects stored in a library; fixing on a detected suspect armed by unauthorized object due to said comparison; and generating an alarming signal on the detected suspect.
Landscapes
- Engineering & Computer Science (AREA)
- Remote Sensing (AREA)
- Radar, Positioning & Navigation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Electromagnetism (AREA)
- Geophysics (AREA)
- General Life Sciences & Earth Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Alarm Systems (AREA)
- Image Analysis (AREA)
- Image Processing (AREA)
Abstract
It is an object of the present invention to provide an advanced security system which can provide simultaneously detection of a suspect armed by an unauthorized object and also identification of the suspect. An advanced security system comprising: a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level; a comparator that compares said thresholded images with dangerous objects stored in a library; a camera which is fixed on a detected suspect armed by unauthorized object due to said comparison; and a signal generator for generating an alarming signal on the detected suspect.
Description
The present invention relates to an advanced security system, an advanced security method and an advanced security program.
Advanced security system, in which radar imaging and optical imaging are used conjointly, has been proposed. In this system to define a hidden dangerous object, radar imaging is used and, after thresholding of obtained radar image at a predetermined level, a comparison of obtained thresholded image with database from a library of dangerous objects is provided. If such comparison gives a predetermined degree of coincidence, then a camera, used in the system, is focused on a suspect and the suspect detection is provided and, as result, an alarming signal is originating in the system and is transmitted to authorized personnel.
At the present time, risk of terror attack and criminal issues are main problems arising practically in each country (especially in big cities at airports, stadiums, banks, shopping centers and other crowd places). Solving and overcoming these problems are key targets in providing safety and security.
Typical solution which is used to create a criminal (or terror) free zone is based on the use of established checkpoint screening.
However, such approach suffers from several disadvantages such as: it has been provided with visible presence; it is not expected to catch a criminal; it provides public reassurance.
That is why, it is necessary to develop such system which can be characterized by following properties: It can detect weapons (or any unauthorized object) being carried without alerting suspect; It can give a possibility to intervene at time and location of police choosing (without risk of bystanders). Such system also should provide both suspect detection and suspect identification and it has to be flexible and gives a possibility for public place installation.
In the above technical field, patent literature 1 discloses a technique of determining the presence or absence of a dangerous object, based on the luminance information. And, patent literature 2 discloses a technique of detecting a non-metal weapon, based on the backscatter signal.
[PTL 1] JPA2009-222580
[PTL 2] JPA2002-514298
[PTL 2] JPA2002-514298
The present invention enables to provide a technique of solving the above-described problem.
One aspect of the present invention provides an advanced security system comprising:
a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
a comparator for comparing said thresholded images with dangerous objects stored in a library;
a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and
a signal generator for generating an alarming signal on the detected suspect.
a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
a comparator for comparing said thresholded images with dangerous objects stored in a library;
a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and
a signal generator for generating an alarming signal on the detected suspect.
Another aspect of the present invention provides an advanced security method comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
Still other aspect of the present invention provides an advanced security program for causing a computer to execute a method, comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
According to the present invention, it is possible to provide an advanced security system which can detect weapons being carried without altering suspect.
Preferred embodiments of the present invention will now be described in detail with reference to the drawings. It should be noted that the relative arrangement of the components, the numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless it is specifically stated otherwise.
It is an object of the present invention to provide an advanced security system which can provide simultaneously detection of a suspect armed by an unauthorized object and also identification of the suspect. This object in the presented application is provided by a conjoint use of a radar and a camera which give radar and optical images of a person investigated. As result, after data processing of optical and radar signals, it makes possible both detection and identification of the person armed by hidden unauthorized object.
Thus, the advanced security system combines two functional parts providing both optical signal processing (camera) and electromagnetic signal processing (radar).
In addition, the system identifies a type of dangerous objects (as for an example, gun, knife, or so on) carried by the suspect.
Moreover, the application of microwave and millimeter-wave radars, which can be compact and, as a result, can provide arrangement of radar and camera in public places and also as a hidden system.
It is important that such system can detect a criminal without alarming and also can provide catching the criminal in a place without bystanders.
Hereinafter, several types of advanced security systems according to the present invention will be described in details with reference to attached drawings. But, it would be well understood that this description should not be viewed as narrowing the appended claims.
(First Embodiment)
In fig. 1, an exemplary embodiment of an advanced security system is shown. In fig.1, schematic ofadvanced security system 100 is shown. Advanced security system 100 comprises radar 101, comparator 102, camera 103 and signal generator. Comparator 102 further comprises library 121.
In fig. 1, an exemplary embodiment of an advanced security system is shown. In fig.1, schematic of
After illumination of a person by a radar signal using radar 101 and receiving a reflected radar signal, radar 101 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by radar 101. Obtained radar image is thresholded at a predetermined level (for example, at -10dB level, or -15dB level) in radar 101. Comparator 102 compares obtained thresholded image with database of dangerous objects kept in a library 121 of comparator 102. If thresholded image is matched with an object of library 121 with predetermined accuracy, advanced security system 100 fixes camera 103 on the person providing the suspect detection, and after that, signal generator 104 generates alarming signal.
(Second Embodiment)
In figs. 2 to 6, another embodiment of the advanced security system is shown. In fig. 2, schematic of an advanced security system in another exemplary embodiment of the present invention is shown.Advanced security system 200 comprises radar 201, comparator 202, camera 203 and signal generator 204. Advanced security system 200 further comprises library 210 of dangerous objects and terminal device 220. Moreover, radar 201 has processor 211.
In figs. 2 to 6, another embodiment of the advanced security system is shown. In fig. 2, schematic of an advanced security system in another exemplary embodiment of the present invention is shown.
After illumination of a person by a radar signal using radar 201 and receiving a reflected signal, processor 211 of radar 201 performs data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided by processor 211 of radar 201. Obtained radar image is thresholded at a predetermined level by processor 211 of 201. Obtained thresholded image is compared with database of dangerous objects kept in library 210 by comparator 202. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 200 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to terminal device 220 (as, for an example, a police monitor).
In fig. 3, thresholding process of a radar image from a suspect is presented. As follows from this figure thresholding gives a possibility to remove human body effect and obtain a radar image of an unauthorized object which is well-suitable for comparison with database of dangerous objects in the library 210.
In fig. 4, an example of the structure concerning library 210 of dangerous objects is shown. Library 210 stores name 401, shape 402 and size 403. And, shape 402 and size 403 is associated with name 401.
In fig. 5, a block diagram showing the hardware arrangement of the advanced security system 200 according to this embodiment, in the case of expressing the system in one apparatus.
On the other hand, storage 650 stores library 551 and a program 552. Communication controller 530 controls communication with another device via the network. The functions of modules accumulated in the program 552 will be described. Processing module 553 functions to process reflected signal. Comparison module 554 functions to compare thresholded image with dangerous objects.
In fig. 6, a flowchart for explaining the sequence of processing in advanced security system 200. In step S601, radar 201 illuminates a radar signal for a person. In step S603, processor 211 of radar 201 performs data processing of reflected signal by a predetermined algorithm. In step S605, as a result of step S603, radar image is obtained. In step S607, obtained radar image is thresholded at a predetermined level. In step S609, comparator 202 compares thresholded image with database of dangerous objects stored in library 210. In step S611, comparator judges whether thresholded image matches with dangerous objects. If thresholded image is matched with a dangerous object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), in step S613, camera 203 is fixed on the person providing dangerous object (camera focusing on suspect). In step S615, signal generator 204 generates alarming signal which is submitted to terminal device 220.
(Third Embodiment)
In fig. 7, another embodiment of the advanced security system is shown. In fig. 7, schematic of an advanced security system in another exemplary embodiment of the present invention is shown.Advanced security system 700 comprises radar 701, comparator 202, camera 203 and signal generator 204. And, advanced security system 700 further comprises library 210 and terminal device 220.
In fig. 7, another embodiment of the advanced security system is shown. In fig. 7, schematic of an advanced security system in another exemplary embodiment of the present invention is shown.
After illumination of a person by a radar signal using radar 701 and receiving a reflected signal, processor 711 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided. Obtained radar image is thresholded step-by-step in processor 711. And then, comparator 202 compares each obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 600 fixes camera 203 on the person providing the suspect detection, and after that, signal generator 204 generates alarming signal which is submitted to a terminal device 220.
In fig. 8, a flowchart for explaining the sequence of processing in advanced security system 700. Steps S601 to S615 are the same as the processing of the second embodiment described in fig. 6, so a description thereof will not be repeated, and step S801 will be explained. In step S801, the alarming signal is transmitted to terminal device 220 by advanced security system 700.
(Forth Embodiment)
In fig. 9, another embodiment of the advanced security system is shown. In fig. 8, schematic of an advanced security system in another exemplary embodiment of the present invention is shown.Advanced security system 900 comprises radar 701, comparator 202, camera 203 and signal generator 904. And, advanced security system 900 further comprises library 210 and terminal device 220.
In fig. 9, another embodiment of the advanced security system is shown. In fig. 8, schematic of an advanced security system in another exemplary embodiment of the present invention is shown.
After illumination of a person by a radar signal using radar 701 and receiving a reflected signal, processor 611 of radar 701 executes data processing of the reflected signal, and the processing is made by a predetermined algorithm. As a result, radar imaging is provided. Obtained radar image is thresholded at a predetermined level. And then, comparator 202 compares obtained thresholded image with database of dangerous objects kept in library 210. If thresholded image is matched with an object of library 210 with predetermined accuracy (predetermined degree of coincidence in %), advanced security system 900 fixes camera 203 on the person providing the suspect detection and a photo of the suspect. By contrast, if thresholding image is not matched with an objects kept in library 210, comparator 202 changes the level of thresholding by decreasing on predetermined level in DB. Using the suspect photo and a predetermined algorithm, person identification 14 is produced in signal generator 904. After suspect identification alarming signal providing simultaneously suspect personal information is submitted to a terminal device 220.
In fig. 10, a flowchart for explaining the sequence of processing in advanced security system 900. Steps S601 to S615 and S801 are the same as the processing of the third embodiment described in fig. 8, so a description thereof will not be repeated, and step S1001 will be explained. In step S1001, if thresholding image is not matched with an objects kept in library 210, comparator 202 changes the level of thresholding by decreasing on predetermined level in DB.
(Other Embodiments)
(Other Embodiments)
While the present invention has been described in relation to some exemplary embodiments, it is to be understood that these exemplary embodiments are for the purpose of description by example, and not of limitation. While it will be obvious to those skilled in the art upon reading the present specification that various changes and substitutions may be easily made by equal components and art, it is obvious that such changes and substitutions lie within the true scope and spirit of the presented invention as defined by the claims.
(Other exemplaryer embodiments)
(Other exemplaryer embodiments)
Some or all of the above-described embodiments can also be described as in the following further exemplary embodiments, but are not limited to the followings.
(Further exemplary embodiment 1)
An advanced security system comprising:
a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
a comparator for comparing said thresholded images with dangerous objects stored in a library;
a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and
a signal generator for generating an alarming signal on the detected suspect.
(Further exemplary embodiment 2)
The advanced security system according to Claim 1, further comprising a terminal device, wherein said alarming signal is submitted to said terminal device.
(Further exemplary embodiment 3)
The advanced security system according to Claim 1 or 2, wherein said images are thresholded step-by-step on a predetermined level.
(Further exemplary embodiment 4)
The advanced security system according to any one of Claims 1 to 3, wherein said camera comprising a photo producer for producing a photo of the suspect and an identifier generator for generating the suspect identifier based on a predetermined algorithm using said photo.
(Further exemplary embodiment 5)
The advanced security system according to any one of Claims 1 to 4, wherein said alarming signal includes suspect personal information.
(Further exemplary embodiment 6)
An advanced security method comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
(Further exemplary embodiment 7)
An advanced security program for causing a computer to execute a method, comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
(Further exemplary embodiment 1)
An advanced security system comprising:
a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
a comparator for comparing said thresholded images with dangerous objects stored in a library;
a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and
a signal generator for generating an alarming signal on the detected suspect.
(Further exemplary embodiment 2)
The advanced security system according to Claim 1, further comprising a terminal device, wherein said alarming signal is submitted to said terminal device.
(Further exemplary embodiment 3)
The advanced security system according to Claim 1 or 2, wherein said images are thresholded step-by-step on a predetermined level.
(Further exemplary embodiment 4)
The advanced security system according to any one of Claims 1 to 3, wherein said camera comprising a photo producer for producing a photo of the suspect and an identifier generator for generating the suspect identifier based on a predetermined algorithm using said photo.
(Further exemplary embodiment 5)
The advanced security system according to any one of Claims 1 to 4, wherein said alarming signal includes suspect personal information.
(Further exemplary embodiment 6)
An advanced security method comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
(Further exemplary embodiment 7)
An advanced security program for causing a computer to execute a method, comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
Claims (7)
- An advanced security system comprising:
a radar for producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
a comparator for comparing said thresholded images with dangerous objects stored in a library;
a camera for focusing on a detected suspect armed by unauthorized object due to said comparison; and
a signal generator for generating an alarming signal on the detected suspect. - The advanced security system according to Claim 1, further comprising a terminal device, wherein said alarming signal is submitted to said terminal device.
- The advanced security system according to Claim 1 or 2, wherein said images are thresholded step-by-step on a predetermined level.
- The advanced security system according to any one of Claims 1 to 3, wherein said camera comprising a photo producer for producing a photo of the suspect and an identifier generator for generating the suspect identifier based on a predetermined algorithm using said photo.
- The advanced security system according to any one of Claims 1 to 4, wherein said alarming signal includes suspect personal information.
- An advanced security method comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect. - An advanced security program for causing a computer to execute a method, comprising:
producing images which are used to detect a suspect armed an unauthorized object and are thresholded at a predetermined level;
comparing said thresholded images with dangerous objects stored in a library;
fixing on a detected suspect armed by unauthorized object due to said comparison; and
generating an alarming signal on the detected suspect.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2015/005784 WO2017085755A1 (en) | 2015-11-19 | 2015-11-19 | An advanced security system, an advanced security method and an advanced security program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2015/005784 WO2017085755A1 (en) | 2015-11-19 | 2015-11-19 | An advanced security system, an advanced security method and an advanced security program |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017085755A1 true WO2017085755A1 (en) | 2017-05-26 |
Family
ID=58718491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2015/005784 WO2017085755A1 (en) | 2015-11-19 | 2015-11-19 | An advanced security system, an advanced security method and an advanced security program |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2017085755A1 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2021135268A (en) * | 2020-02-28 | 2021-09-13 | 株式会社東芝 | Monitoring method and monitoring device |
WO2022044187A1 (en) * | 2020-08-27 | 2022-03-03 | 日本電気株式会社 | Data processing device, data processing method, and program |
US20220299631A1 (en) * | 2021-03-19 | 2022-09-22 | Nec Corporation | Inspection system and inspection method |
EP4050891A4 (en) * | 2019-10-25 | 2022-10-19 | NEC Corporation | Processing device, processing method, and program |
EP4109379A4 (en) * | 2020-02-20 | 2023-04-12 | NEC Corporation | Processing system, processing method, and program |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10282247A (en) * | 1997-04-10 | 1998-10-23 | Mitsubishi Electric Corp | Metal detecting device |
US20050110672A1 (en) * | 2003-10-10 | 2005-05-26 | L-3 Communications Security And Detection Systems, Inc. | Mmw contraband screening system |
JP2007213291A (en) * | 2006-02-09 | 2007-08-23 | Fujitsu General Ltd | Emergency notification system |
US20080129581A1 (en) * | 2004-10-22 | 2008-06-05 | Douglass Robert J | System and Method For Standoff Detection of Human Carried Explosives |
WO2009157551A1 (en) * | 2008-06-27 | 2009-12-30 | マスプロ電工株式会社 | Millimeter wave image pickup device |
-
2015
- 2015-11-19 WO PCT/JP2015/005784 patent/WO2017085755A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10282247A (en) * | 1997-04-10 | 1998-10-23 | Mitsubishi Electric Corp | Metal detecting device |
US20050110672A1 (en) * | 2003-10-10 | 2005-05-26 | L-3 Communications Security And Detection Systems, Inc. | Mmw contraband screening system |
US20080129581A1 (en) * | 2004-10-22 | 2008-06-05 | Douglass Robert J | System and Method For Standoff Detection of Human Carried Explosives |
JP2007213291A (en) * | 2006-02-09 | 2007-08-23 | Fujitsu General Ltd | Emergency notification system |
WO2009157551A1 (en) * | 2008-06-27 | 2009-12-30 | マスプロ電工株式会社 | Millimeter wave image pickup device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP4050891A4 (en) * | 2019-10-25 | 2022-10-19 | NEC Corporation | Processing device, processing method, and program |
EP4109379A4 (en) * | 2020-02-20 | 2023-04-12 | NEC Corporation | Processing system, processing method, and program |
JP2021135268A (en) * | 2020-02-28 | 2021-09-13 | 株式会社東芝 | Monitoring method and monitoring device |
JP7414587B2 (en) | 2020-02-28 | 2024-01-16 | 株式会社東芝 | Monitoring method and device |
WO2022044187A1 (en) * | 2020-08-27 | 2022-03-03 | 日本電気株式会社 | Data processing device, data processing method, and program |
US20220299631A1 (en) * | 2021-03-19 | 2022-09-22 | Nec Corporation | Inspection system and inspection method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017085755A1 (en) | An advanced security system, an advanced security method and an advanced security program | |
CN109799544B (en) | Intelligent detection method and device applied to millimeter wave security check instrument and storage device | |
US20180308321A1 (en) | Detection of unauthorized devices on atms | |
US8890745B2 (en) | RF gun barrel detection system | |
WO2017062078A2 (en) | Combined intensity and coherent change detection in images | |
CA2640884A1 (en) | Methods and systems for use in security screening, with parallel processing capability | |
Wang et al. | Data-driven probability hypothesis density filter for visual tracking | |
Sadjadi et al. | Remote sensing using passive infrared Stokes parameters | |
CN111724558B (en) | Monitoring method, monitoring device and intrusion alarm system | |
CN105095769A (en) | Information service software vulnerability detection method | |
CN103023889A (en) | Safety margin risk quantification method | |
Belloni et al. | SAR image dataset of military ground targets with multiple poses for ATR | |
Gao et al. | Modified log-ratio operator for change detection of synthetic aperture radar targets in forest concealment | |
CN109613562A (en) | Anemometry laser radar effectively detects recognition methods and the device on boundary | |
CN116434161B (en) | Method and system for judging whether parking behavior based on high-order video is credible | |
KR102664000B1 (en) | Method and apparatus for managing address of vulnerable wallet within blockchain network | |
Gardezi et al. | Enhanced target recognition employing spatial correlation filters and affine scale invariant feature transform | |
Dowdy et al. | Voxel-space radar signal processing for side attack explosive ballistic detection | |
US8102305B2 (en) | Filtering sensor data to provide estimates of structures | |
WO2015128939A1 (en) | Security evaluation system, security evaluation device, and security evaluation method | |
Pietkiewicz et al. | Fusion of identification information from ELINT-ESM sensors | |
Zhang et al. | Synthetic aperture radar ship detection in complex scenes based on multifeature fusion network | |
CN114445669A (en) | Smoke and fire alarm method and device, electronic equipment and storage medium | |
Simonyan et al. | Detection and ignorance method of false targets during object detection | |
Zhuge et al. | Automatic target recognition in ultra-wideband 3-D images for concealed weapon detection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15908695 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15908695 Country of ref document: EP Kind code of ref document: A1 |