Please wait a minute...
New Technology of Library and Information Service  2011, Vol. 27 Issue (6): 95-100    DOI: 10.11925/infotech.1003-3513.2011.06.16
Current Issue | Archive | Adv Search |
Design and Implementation of Unattended Library Security Program Based on Camera Images
Zhu Yuqiang
Library of Shandong Normal University, Jinan 250014, China
Download: PDF(918 KB)   HTML  
Export: BibTeX | EndNote (RIS)      
Abstract  Compared with highly-costed traditional attended monitor mode, this article designs a program based on camera images, with which unattended mode to secure the silent area of library can be carried out. Video and images captured by the camera can also be examined from the program's log . This program can lower library's, especially middle medium library's investment on security monitor.
Key wordsCamera      Unattended operation      Library security     
Received: 11 May 2011      Published: 15 August 2011
: 

TP311.1

 

Cite this article:

Zhu Yuqiang. Design and Implementation of Unattended Library Security Program Based on Camera Images. New Technology of Library and Information Service, 2011, 27(6): 95-100.

URL:

http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.1003-3513.2011.06.16     OR     http://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2011/V27/I6/95

[1] 刘增祥.闭路电视监控系统视频数字化解决方案[J].电气时代,2009(2):88-89.

[2] 董婉静,汤巧英,吴凯.远程无人值守站点通信监控系统[J].中国人民警官大学学报,1996(2):31-34.

[3] 李玉岩,孙中伟.基于JPEG2000无人值守变电站的图像监控[J].现代电力,2008,25(6):81-85.

[4] Regazzoni C, Ramesh V, Foresti G L.Special Issue on Video Com-munications, Processing, and Understanding for Third Generation Surveillance Systems[J].Proceedings of the IEEE,2001,89(10):1355-1367.

[5] Video Surveillance and Monitoring[EB/OL]. [2011-05-30].http://www.cs.cmu.edu/~vsam/.

[6] University of Maryland Institute for Advanced Computer Studies[EB/OL]. [2011-05-30]. http://www.umiacs.umd.edu/.

[7] Pfinder[EB/OL]. [2011-05-30].http://vismod.media.mit.edu/vismod/demos/pfinder/.

[8] Vovsis-Intelligent Video Monitor System and Application on Blackfin Processor[EB/OL]. [2011-05-30]. http://my.opera.com/vovsis/blog/show.dml/11981482.

[9] 2011 图书馆监控系统招标[EB/OL]. [2011-05-30].http://www.baidu.com/s?bs=2011+%CD%BC%CA%E9%B9%DD%BC%E0%BF%D8%CF%B5%CD%B3%D5%D0%B1%EA+site%3Aedu.cn&f=8&wd=2011+%CD%BC%CA%E9%B9%DD%BC%E0%BF%D8%CF%B5%CD%B3%D5%D0%B1%EA&inputT=2630.

[10] 易语言汉语编程-产品介绍[EB/OL]. [2011-03-26]. http://www.eyuyan.com/prc.htm.

[11] 摄像头.监控.录像-开源易语言汉语编程官方论坛[EB/OL]. [2011-03-26]. http://bbs.eyuyan.com/read.php?tid=259039.

[12] 易语言汉语编程官方论坛[EB/OL]. [2011-03-26]. http://bbs.eyuyan.com/read.php?tid=258045.

[13] Ms.messaging.fetion.api [EB/OL]. [2011-05-31]. http://labs.chinamobile.com/mblog/42903_19441.
[1] Peng Chen,Jin Qi . The Development and Application of Web Hyperlink Analyzer[J]. 现代图书情报技术, 2008, 24(8): 76-78.
[2] Yan Qinghong,Peng Yuxing. A New Image Retrieval Algorithm in Digital Library[J]. 现代图书情报技术, 2005, 21(12): 30-33.
[3] Li Yu,Liu Yi,Shao Jing. A WebPAC-based United Library Catalog Retrieval System[J]. 现代图书情报技术, 2005, 21(11): 53-56.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn