Intelligent Imaging Technology Implementation as Terrorism Prevention in Retail Sectors in 21st Century

Authors

  • Bob Foster Universitas Bisnis & Informatika Bandung, Indonesia
  • Muhamad Deni Johansyah Departemen Matematika, Fakultas MIPA,Universitas Padjajaran, Indonesia

DOI:

https://doi.org/10.21107/kursor.v10i2.188

Keywords:

Terrorism, Computer vision, Intelligent Imaging, Viola Jones, SVM Algorithm

Abstract

Terrorism is a very dangerous thing and has become a threat both on a national and international scale. Understanding terrorism seeks to instill the seeds of hostility towards a group, government agencies and even the state. Before entering the 21st century terror attacks are blatant in the business sector by sabotaging and damaging public facilities and vital objects. These physical attacks can be prevented by recording personal identities or conducting regular security patrols and placing a large number of security personnel in places of business and places that are considered strategic. However, this is still not optimal where the level of security and the number of personnel are limited in monitoring the place for a long time and are sustainable. The terrorist attacks in the 21st century are different and require different handling. Attacks can be physical or non-physical. On non-physical objects attacks are usually carried out by hacking networks that can damage internet network connections in one area and even one country. Ways to prevent attacks that are physical in nature by utilizing computer vision technology capabilities that are used to record all civil society. An additional feature in this technology lies in the face recognition and pattern matching techniques where a person's face will be searched for unique features. Then from these data will be biometric data, namely data that will not change and disappear. Computer vision algorithms can detect a person's face or object even though it has been modified or changed in physical and color conditions. The advantages of these algorithms are effectively used to record visitor identities and are optimal in recognizing an object with an accuracy of up to 90%. This system is able to help and improve a security feature of a business and tourist area.

Downloads

Download data is not yet available.

References

[1] E T Pratiwi1, L O D Abdullah; R Abdullah ; Wardana ; R Muhammad, "Impact of criminal act of terrorism on economy," Earth and Environmental Science235 (2019), 2019.
[2] Malik Shahzad Shabbir, "Impact of Terrorism on Exclusive Indian Economy," Journal of Indian Studies, vol. 5, no. 1, pp. 29-45, 2019.
[3] Mathias Humenberger, "Dynamics and root causes of recent major terrorist attacks in Europe," https://www.researchgate.net/publication/ 323856159, 2019.
[4] Dominique Vanneste, Petronela Tudorache; Flavia Teodoroiu ; Thérèse Steenberghen, "The impact of the 2016 terrorist attacks in Brussels on tourism," National Committee of Geography of Belgium, Société Royale Belge de Géographie, 2017.
[5] Sei-Youen Oh, "A ComparativeStudy on AI-based Anti-terror Crime System," international Journal of Innovative Technology and Exploring Engineering (IJITEE)ISSN: 2278-3075, vol. 8, no. 8S2, 2019.
[6] "Artificial Intelligence -A European approach to excellence and trust," Law and Political Sciences Conferences, Brussels, 2020.
[7] Boaz Ganor, "Artificial or Human: A New Era of Counterterrorism Intelligence?," Download citation
https://doi.org/10.1080/1057610X.2019.1 568815 , 2019.
[8] Ahmad F. Al Musawi, "Computer Science Approaches for Counterterrorism," International Journal of Innovative Engineering and Emerging Technology (IJIEET), vol. 2, no. 4, pp. 19-25, 2016.
[9] Deepa; SP.Chokkalingam, "Deep Convolutional Neural Networks (CNN) for Medical Image Analysis," International Journal of Engineering and Advanced Technology (IJEAT), vol. 8, no. 3, 2019.
[10] Sunghyuck Hong;JungsooHan; Guijung Kim, "Security Issues Related to Biometric Security," International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 6, no. 1, 2019.
[11] Akanksha;Harjeet Singh, "Face detection and Recognition: A review," International Conference on Advancements in Engineering & Technology (ICAET- 2018), pp. 23-24, 2018.
[12] Savitha , Keerthi , "Video based Face Recognition using Image Processing Techniques," International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056, vol. 6, no. 1, 2019.
[13] S.Sandhya; M.Senthil Kumar ; L.Karthikeyan, "A Hybrid Fusion of Multimodal Medical Images for the Enhancement of Visual Quality in Medical Diagnsis," Springer, 2019.
[14] Shakir F. Kak; Firas Mahmood Mustafa ; Pedro Valente;, "A Review of Person Recognition Based on Face Model," Eurasian Journal of Science & Engineering ISSN 2414-5629 (Print), ISSN 2414-5602 (Online), vol. 4, no. 1, 2018.
[15] Zafaruddin, G. M., ; Fadewar, D. H., "Face Recognition: A Holistic Approach Review," International Conference on Contemporary Computing and Informatics Mysore, India: IEEE, pp. 175-178, 2014.
[16] Liu, Z., Lv, L., ; Yong, W., "Development of face Recognition System Based on peA and LBP for Intelligent Anti-Theft Doors," International Conference on Computer and Communications Chengdu, China: IEEE., pp. 341-346, 2016.
[17] Phaneemdra, P., Ramachandran, V., & Reddy, E. S., "Human Face Detection and Recognition using PCA and DCT in HMM," International Journal of Scientific Engineering and Technology Research, 4(35), 7080-7085, 2015.
[18] Alaa Tharwat, "AdaBoost classifier: an overview," Research Gate, p. 12, 2018.
[19] Abdul Mohsen Abdul Hossen; Raheem Abd Alsaheb Ogla; Maitham Mahmood Ali, "Face Detection by Using OpenCV's Viola-Jones Algorithm based on coding," Iraqi Journal of Science, vol. 58, no. 2, pp. 735-745, 2017.
[20] EUROPIAN COMMISION, "REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL," EUROPIAN COMMISION, Brussels, 2018.
[21] ann LeCun;Yoshua Bengio;Geoffrey Hinton, "Deep learning," NATURE, vol. 521, p. 436, 2015.
[22] Umer, S., B.C.Dhara ; B.Chanda,, "Biometric recognition system for challenging faces Paper presented at the Computer Vision, Pattern Recognition," Image Processing and Graphics (NCVPRIPG),2015 Fifth National Conference on, 2015.
[23] Shah, D.H., D.J.Shah ; D.T.V.Shah,, "The Exploration of Face Recognition Techniques," International Journal of Application or Innovation in Engg And Management (IJAIEM), vol. 3, no. 1, 2014.
[24] Ahmad F. Al Musawi, "Computer Science Approaches for Counterterrorism," International Journal of Innovative Engineering and Emerging Technology (IJIEET), vol. 2, no. 4, pp. 19-25, 2016.

Additional Files

Published

2019-12-09

Issue

Section

Articles

Citation Check