Journal of Information Systems Engineering and Management

Research on Optimization of Boundary Detection and Dangerous Area Warning Algorithms Based on Deep Learning in Campus Security System
Baitong Zhong 1 2 * , Johan Bin Mohamad Sharif 1, Sah Salam 1, Chengke Ran 2, Yizhou Liang 3, Zijun Cheng 4
More Detail
1 Lecturer, College of Information Engineering, Universiti Teknologi Malaysia, Johor, Malaysia
2 Lecturer, College of Information Engineering, Hunan Mechanical Electrical Polytechnic, Changsha, China
3 Lecturer, School of Computer Science and Engineering, Central South University, Changsha, China
4 Lecturer, Changde City Economic Construction Investment Group Co., LTD, Changde, China
* Corresponding Author
Research Article

Journal of Information Systems Engineering and Management, 2023 - Volume 8 Issue 4, Article No: 22898
https://doi.org/10.55267/iadt.07.13844

Published Online: 24 Oct 2023

Views: 436 | Downloads: 266

How to cite this article
APA 6th edition
In-text citation: (Zhong et al., 2023)
Reference: Zhong, B., Sharif, J. B. M., Salam, S., Ran, C., Liang, Y., & Cheng, Z. (2023). Research on Optimization of Boundary Detection and Dangerous Area Warning Algorithms Based on Deep Learning in Campus Security System. Journal of Information Systems Engineering and Management, 8(4), 22898. https://doi.org/10.55267/iadt.07.13844
Vancouver
In-text citation: (1), (2), (3), etc.
Reference: Zhong B, Sharif JBM, Salam S, Ran C, Liang Y, Cheng Z. Research on Optimization of Boundary Detection and Dangerous Area Warning Algorithms Based on Deep Learning in Campus Security System. J INFORM SYSTEMS ENG. 2023;8(4):22898. https://doi.org/10.55267/iadt.07.13844
AMA 10th edition
In-text citation: (1), (2), (3), etc.
Reference: Zhong B, Sharif JBM, Salam S, Ran C, Liang Y, Cheng Z. Research on Optimization of Boundary Detection and Dangerous Area Warning Algorithms Based on Deep Learning in Campus Security System. J INFORM SYSTEMS ENG. 2023;8(4), 22898. https://doi.org/10.55267/iadt.07.13844
Chicago
In-text citation: (Zhong et al., 2023)
Reference: Zhong, Baitong, Johan Bin Mohamad Sharif, Sah Salam, Chengke Ran, Yizhou Liang, and Zijun Cheng. "Research on Optimization of Boundary Detection and Dangerous Area Warning Algorithms Based on Deep Learning in Campus Security System". Journal of Information Systems Engineering and Management 2023 8 no. 4 (2023): 22898. https://doi.org/10.55267/iadt.07.13844
Harvard
In-text citation: (Zhong et al., 2023)
Reference: Zhong, B., Sharif, J. B. M., Salam, S., Ran, C., Liang, Y., and Cheng, Z. (2023). Research on Optimization of Boundary Detection and Dangerous Area Warning Algorithms Based on Deep Learning in Campus Security System. Journal of Information Systems Engineering and Management, 8(4), 22898. https://doi.org/10.55267/iadt.07.13844
MLA
In-text citation: (Zhong et al., 2023)
Reference: Zhong, Baitong et al. "Research on Optimization of Boundary Detection and Dangerous Area Warning Algorithms Based on Deep Learning in Campus Security System". Journal of Information Systems Engineering and Management, vol. 8, no. 4, 2023, 22898. https://doi.org/10.55267/iadt.07.13844
ABSTRACT
This study designs and implements a boundary detection and dangerous area warning algorithm based on deep learning from the perspective of typified campus security situation resources such as data, information, and knowledge. Based on integrating multiple campus security factors, real-time perception and further prediction of campus security situation can be achieved. Through coordinated operation among various algorithm modules, object intrusion in specific areas can be accurately identified and early warning can be given. The research results show that when an object invades a specific area, the difference coefficient will increase, and the larger the change value in the intrusion area, the larger the corresponding difference coefficient. By using this feature, the threshold of the difference coefficient can be determined. When a region is invaded, the contour length of the foreground will sharply increase. Based on the statistical information of the contour length of the foreground, the threshold can be set to determine whether someone has invaded the region. The deep learning algorithm in this study accurately extracts the contour of moving targets and can identify foreground targets. The real-time performance of the algorithm is also guaranteed, and it has high practical value in intelligent video monitoring. This algorithm greatly improves the efficiency of intrusion detection by utilizing the joint constraints of two types of time-domain and scene-space transformations in monitoring images. This method is not affected by the brightness of the regional environment, nor will it cause misjudgment due to significant differences in brightness of the regional environment. The detection and inference time of deep learning-based detection methods is controlled within 2-3ms, and the FPS value of the detection method is always at a high level, which can quickly increase to over 350frames/s after transmission begins. The detection method based on deep learning has higher detection efficiency.
KEYWORDS
REFERENCES
  • Accattoli, S., Sernani, P., Falcionelli, N., Mekuria, D. N., & Dragoni, A. F. (2020). Violence detection in videos by combining 3D convolutional neural networks and support vector machines. Applied Artificial Intelligence, 34(4), 329-344. https://doi.org/10.1080/08839514.2020.1723876
  • Ahmed, T., Parvin, M. S., Haque, M. R., & Uddin, M. S. (2020). Lung cancer detection using CT image based on 3D convolutional neural network. Journal of Computer and Communications, 8(03), 35. https://doi.org/10.4236/jcc.2020.83004
  • Alahmadi, A., Hussain, M., Aboalsamh, H. A., & Zuair, M. (2020). PCAPooL: unsupervised feature learning for face recognition using PCA, LBP, and pyramid pooling. Pattern Analysis and Applications, 23, 673-682. https://doi.org/10.1007/s10044-019-00818-y
  • Arbeiter, M., Maier, T., & Spöck, G. (2021). A cyber-physical environment for detecting exceptional and dangerous human behavior in the home by sensors and its verification by computer simulation. Adaptive Behavior, 29(6), 579-600. https://doi.org/10.1177/1059712320930420
  • Benouareth, A. (2021). An efficient face recognition approach combining likelihood-based sufficient dimension reduction and LDA. Multimedia Tools and Applications, 80(1), 1457-1486. https://doi.org/10.1007/s11042-020-09527-9
  • Brandon, N., & Price, P. S. (2020). Calibrating an agent-based model of longitudinal human activity patterns using the Consolidated Human Activity Database. Journal of exposure science & environmental epidemiology, 30(1), 194-204. https://doi.org/10.1038/s41370-019-0156-z
  • Chen, W., & Shi, K. (2021). Multi-scale attention convolutional neural network for time series classification. Neural Networks, 136, 126-140. https://doi.org/10.1016/j.neunet.2021.01.001
  • Guo, W., Che, L., Shahidehpour, M., & Wan, X. (2021). Machine-Learning based methods in short-term load forecasting. The Electricity Journal, 34(1), 106884. https://doi.org/10.1016/j.tej.2020.106884
  • Hermawan, D., Putri, N. M. D. K., & Kartanto, L. (2022). Cyber Physical System Based Smart Healthcare System with Federated Deep Learning Architectures with Data Analytics. International Journal of Communication Networks and Information Security, 14(2), 222-233. https://doi.org/10.17762/ijcnis.v14i2.5513
  • Huang, C., Zhao, Y., Yan, W., Liu, Q., & Zhou, J. (2020). A new method for predicting crosstalk of random cable bundle based on BAS-BP neural network algorithm. IEEE Access, 8, 20224-20232. https://doi.org/10.1109/ACCESS.2020.2969221
  • Khan, M., Wang, H., Riaz, A., Elfatyany, A., & Karim, S. (2021). Bidirectional LSTM-RNN-based hybrid deep learning frameworks for univariate time series classification. The Journal of Supercomputing, 77, 7021-7045. https://doi.org/10.1007/s11227-020-03560-z
  • Kim, D. (2022). Research On Text Classification Based On Deep Neural Network. International Journal of Communication Networks and Information Security, 14(1s), 100-113. https://doi.org/10.17762/ijcnis.v14i1s.5618
  • Lei, Y., & Wu, Z. (2020). Time series classification based on statistical features. EURASIP Journal on Wireless Communications and Networking, 2020, 1-13. https://doi.org/10.1186/s13638-020-1661-4
  • Liu, Q. (2022). Aerobics posture recognition based on neural network and sensors. Neural Computing and Applications, 1-12. https://doi.org/10.1007/s00521-020-05632-w
  • Liu, Q., Zhao, Y., Yan, W., Huang, C., Mueed, A., & Meng, Z. (2020). A novel crosstalk estimation method for twist non-uniformity in twisted-wire pairs. IEEE Access, 8, 38318-38326. https://doi.org/10.1109/ACCESS.2020.2976136
  • Liu, Y., Liu, W., Shen, Y., Zhao, X., & Gao, S. (2021). Toward smart energy user: Real time non-intrusive load monitoring with simultaneous switching operations. Applied Energy, 287, 116616. https://doi.org/10.1016/j.apenergy.2021.116616
  • Liu, Z., Liu, G., Zhang, L., & Pu, J. (2020). Linear regression classification steered discriminative projection for dimension reduction. Multimedia Tools and Applications, 79, 11993-12005. https://doi.org/10.1007/s11042-019-08434-y
  • Liu, Z., Shi, K., Zhang, K., Ou, W., & Wang, L. (2020). Discriminative sparse embedding based on adaptive graph for dimension reduction. Engineering Applications of Artificial Intelligence, 94, 103758. https://doi.org/10.1016/j.engappai.2020.103758
  • Liu, Z., Xiang, L., Shi, K., Zhang, K., & Wu, Q. (2020). Robust manifold embedding for face recognition. IEEE Access, 8, 101224-101234. https://doi.org/10.1109/ACCESS.2020.2997953
  • Pan, H., Li, Y., & Zhao, D. (2021). Recognizing human behaviors from surveillance videos using the SSD algorithm. The Journal of Supercomputing, 77, 6852-6870. https://doi.org/10.1007/s11227-020-03578-3
  • Qin, Y. Y., Cao, J. T., & Ji, X. F. (2021). Fire detection method based on depthwise separable convolution and yolov3. International Journal of Automation and Computing, 18, 300-310. https://doi.org/10.1007/s11633-020-1269-5
  • Rafiq, H., Shi, X., Zhang, H., Li, H., Ochani, M. K., & Shah, A. A. (2021). Generalizability improvement of deep learning-based non-intrusive load monitoring system using data augmentation. IEEE Transactions on Smart Grid, 12(4), 3265-3277. https://doi.org/10.1109/TSG.2021.3082622
  • Rahmatov, N., Paul, A., Saeed, F., & Seo, H. (2021). Realtime fire detection using CNN and search space navigation. Journal of Real-Time Image Processing, 18, 1331-1340. https://doi.org/10.1007/s11554-021-01153-4
  • Shao, Z., Zhu, H., Tan, X., Hao, Y., & Ma, L. (2020). Deep multi-center learning for face alignment. Neurocomputing, 396, 477-486. https://doi.org/10.1016/j.neucom.2018.11.108
  • Tan, K. L., Sia, J. K. M., & Tang, K. H. D. (2022). Examining students’ behavior towards campus security preparedness exercise: The role of perceived risk within the theory of planned behavior. Current Psychology, 41(7), 4358-4367. https://doi.org/10.1007/s12144-020-00951-6
  • Teng, Q., Wang, K., Zhang, L., & He, J. (2020). The layer-wise training convolutional neural networks using local loss for sensor-based human activity recognition. IEEE Sensors Journal, 20(13), 7265-7274. https://doi.org/10.1109/JSEN.2020.2978772
  • Xiao, Z., Xu, X., Xing, H., Luo, S., Dai, P., & Zhan, D. (2021). RTFN: A robust temporal feature network for time series classification. Information sciences, 571, 65-86. https://doi.org/10.1016/j.ins.2021.04.053
  • Yang, Y., Rosni, N. A., Zainol, R. B., Yang , X., Hu, H., & Wang, T. (2023). Daily Activities of Elder Adults Using Optimized Deep Learning Model in China. International Journal of Communication Networks and Information Security (IJCNIS), 15(3), 273-292. https://doi.org/10.17762/ijcnis.v15i3.6270
  • Zahra, S. B., Khan, M. A., Abbas, S., Khan, K. M., Al-Ghamdi, M. A., & Almotiri, S. H. (2021). Marker-based and marker-less motion capturing video data: Person and activity identification comparison based on machine learning approaches. Computers, Materials & Continua, 66(2), 1269-1282. https://doi.org/10.32604/cmc.2020.012778
  • Zhang, L., Liu, J., Zhang, B., Zhang, D., & Zhu, C. (2019). Deep cascade model-based face recognition: When deep-layered learning meets small data. IEEE Transactions on Image Processing, 29, 1016-1029. https://doi.org/10.1109/TIP.2019.2938307
  • Zhang, Y., Xiao, X., Yang, L. X., Xiang, Y., & Zhong, S. (2019). Secure and efficient outsourcing of PCA-based face recognition. IEEE Transactions on Information Forensics and Security, 15, 1683-1695. https://doi.org/10.1109/TIFS.2019.2947872
  • Zhu, H., Zhang, J., Cui, H., Wang, K., & Tang, Q. (2022). TCRAN: Multivariate time series classification using residual channel attention networks with time correction. Applied Soft Computing, 114, 108117. https://doi.org/10.1016/j.asoc.2021.108117
LICENSE
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.