Download presentation
Presentation is loading. Please wait.
Published byChristine Parrish Modified over 8 years ago
1
RESEARCH PROPOSAL A MULTI-AGENT SENSOR BASED MODEL TO IMPROVE PHYSICAL PERIMETER PROTECTION FOR UTM MENARA RAZAK BUILDING Maryam Var Naseri (MAN151001) Lecturer: Assoc Prof Hafiza Abas
2
Agenda Introduction Literature Review Methodology Result Recommendation Conclusion
3
Introduction-Research Problem The CCTV is a video surveillance process to provide a safe and secure environment by monitoring students and staff activities followed by gather evidences in case of crime conducted. For instance a CCTV has been installed in the classrooms at levels 3 and 4 to monitor activities of students during working hours. However it brings number of benefits and safety, but it might rises some issues in terms of privacy which makes the people uncomfortable at classrooms. In addition, installing a CCTV is not cost effective as its maintenance expenses are high. It is also not a solution to prevent the crime and finally, it is vulnerable to be access, hacked or disable/disconnect from their power source.
4
Introduction-Research Problem Time Consuming Process: long videos must be carefully investigated to find any clue or evidence. In fact that it is a long process, it is also suffering from the lack of theft protection. Human Power Dependency: the CCTV technology is highly depended on human based observation and monitoring. Human Error Based Failures: No doubt as the CCTV is heavily rely on human observation, it is also suffering from human error based failures. Lighting problems: Finally the efficiency of CCTV has a direct link with the environment lighting as the level of darkness can heavily effect the quality of captured videos.
5
Introduction-Scope This research is conducted to concentrate on the Menara Razak Building as it consists of 17 floors, however the scope of this research is limited to levels 3, 4 and 5 as mostly classes and presentations are conducted and IT security team is located at these levels.
6
Introduction-Objective The main aim of this research is to propose a multi agent sensor based model to improve the physical security. The objectives of this research can be defined as follows: To investigate the Current Physical security models To identify the shortcomings of existing models To propose a new model using multi agent sensor approach
7
Introduction-Questions There are some questions that are needed to be answered in order to conduct this research as follows: 1- Which type of sensors is needed to form a multi agent sensor based protection model? 2- Which deployment model should be used to propose a new physical security model? 3- How to evaluate the proposed model and compare it with current existing solutions?
8
Literature Review MethodologyHW/SW A multi-view tracking system to support and observe real- time routine activities of the users over the site using PTZ cameras. Off-shelf standard in single dual-quad core PC is required. Different modules are involved in this model such as Multi-View Tracking, Blind Spot Coverage, Articulated Motion Analysis, Complex Event Analysis, Normalcy Analysis and Object Recognition automated wireless alarm system proposed to overcome fence-based systems. It provides a real-time evaluation to track unwanted intruders. Automatic cued camera, two antennas, one interface box (IF), and a PC based control room are interacting. The ED model provides Emergency operation mode to support data transmission between ED and access control. This model is comprised of several modules such as microcontroller, access app server, database access DB, admin client, user client, syslog app server and database syslog DB server Mechanical locks Smart cards scanners RFID technology Infrared Motion Sensors Audio and Light signals Data transmission channel via Ethernet Data exchange via HTTP, HTTPS, SOAP Java, C++, Python written applications A new fencing approach based on several components such as Physical perimeter fences, Isolation zone, Intrusion detection sensors, Clear zones, and Assessment which can be only applied in surrounding area and totally not sufficient the secure indoor assets.
9
MethodologyHW/SW Han et al proposed an intelligent substation physical security monitoring system called ISPSM which employs multi-agent system along with the distributed Kalman filtering (DKF) algorithm. Motion detection sensors Video streams Network Interface Cellular network Radar Sensors One-site Database PCs The model is employed facial information acquired from a CCTV system to propose facial recognition for CCTV Radar sensors Camera Portable devices CCTV analysis applications Analysis Applications Cardinali et al proposed a new track fusion in which a CCTV can automatically detect metallic and non-metallic objects without the subjects’ collaboration. Several physical characteristics of moving objects (in this case they focused don airport passengers), is collected using several types of sensors to use for decision making. Motion detection sensors Camera PCS CCTV analysis applications Szustakowski et. al. proposed a physical composite fence with high level sensors. microwave barriers and radars Digital Signage Virtualized network and storage platform
10
Methodology Survey questionnaire is choose for this research. The reason that the Survey is choose for this research proposal is it allows the researcher to gather a huge amount of data within short period of time as well as it can be created quickly and easily administered. Accordingly, the survey questions has been conducted during this research to obtain desired data from staff and students in UTM via Email and feedbacks are visualized through Microsoft Excel.
11
Result Based on the collected feedback the result analysis for staff depicts in the figure below. 51% yes 49& n0 51% yes 49& n0 52% yes 38% n0 Others 10% 52% yes 38% n0 Others 10%
12
Result most of the participants believed that the CCTVs are not efficiently covered all parts of classrooms and corridors the images which are taken by CCTV it’s not clear enough to help the authorities in detection of any intruders. CCTV Operation
13
Result The UTM students are provided with ID card, however the results indicates that the students are not required to show their card and validate their identity to enter the building and classrooms ID-Card Based Authentication Doors and Locks by 40% of participant the doors are not efficiently secured by using proper locks. Figure 12 depicts the response from participants
14
Current Issues and Weaknesses The aforementioned responses indicate that the current state of physical security is not adequate in UTM campus. The students are not required to validate their identity upon the entrance which significantly increases the risk of unauthorized access especially when the doors are not equipped with proper locks. On the other hands, The CCTV is used, but it suffering from lack of proper coverage. Moreover, the quality of CCTV images is not sufficient enough. Therefore, the CCTV alone is not sufficient enough to protect the UTM campus, thus, a multi sensor physical security model will be proposed in next section to overcome the above mentioned issues.
15
Recommendation In general there are several types of sensors as follows: Environmental Sensors (e.g. temperature) Intrusion Detection Sensors (e.g. motion detectors ) Radio Sensors such as RFID Smart Cameras (e.g. CCTV) The aforementioned sensors provide wide range of data in different type and formats that can be used to propose an integrated security model.
16
Recommendation
17
Multi Sensors : One the key modules of proposed model is the type of sensors that are used to collect environmental information. There are three types of sensors employed in this paper such as Smart CCTV Motion Detector, and Temperature Sensors. Sensor Data Collector: A sensor collector is a client server application that collect heterogeneous data of several sensors over network and store them m in cloud based central database. The cloud infrastructure is selected to implement the centralized security solution as it has significant advantages as follows: Ease Implementation, Ease of Maintenance, Reliability, Scalability, Guaranteed levels of services, Total cost of ownership (TCO) Data preparation and filtering: Different data filtering approached is applied on collected data to remove unwanted data as the volume of data has direct connection with complexity and cost of data analysis.
18
Recommendation Feature Preprocessing : t he feature preprocessing extracts different parameters from collected sensor data which are divided in different groups. The selected feature is used both for training and classification. Decision tree based Classifier: f inally, the C4.5 classification tress is employed to create a decision maker model for propose framework. The main aim of the proposed decision maker model is to analyze the collected data based on explored set of rules to look for any evidence of unauthorized access to physical perimeter. Figure 14 depicts the pseudo code of C4.5 algorithm.
19
Conclusion By rapid development of the campus protecting of organizations’ assets such as information, students, staff and technical equipment from any potential threat plays an important role in the study and management of the daily work of schools and other educational organizations. For instance CCTV is installed in the classes at levels 3, 4, and 5 to provide a secure and safe environment. This research was discussed research problems, scope and research objective in section one and literature review and methodology which was conducted the research was survey questions for both staff and students followed by result and recommendation chapters respectively. However, the collected feedback in analysis section indicates that staff and students are satisfied with the security control, but an intelligent system is required to provide high secure environment for the respondents at levels 3, 4, and 5 of Menara Razak building. The recommended intelligent system is a multi-agent model which is consists of different modules such as multiple-sensors, sensor data collector, data preparation and filtering, feature processing and decision tree based classifier.
20
Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.