KR20170010930A - Smart safety helper service method by cctv - Google Patents

Smart safety helper service method by cctv Download PDF

Info

Publication number
KR20170010930A
KR20170010930A KR1020150102269A KR20150102269A KR20170010930A KR 20170010930 A KR20170010930 A KR 20170010930A KR 1020150102269 A KR1020150102269 A KR 1020150102269A KR 20150102269 A KR20150102269 A KR 20150102269A KR 20170010930 A KR20170010930 A KR 20170010930A
Authority
KR
South Korea
Prior art keywords
safety
cctv
information
data
crime
Prior art date
Application number
KR1020150102269A
Other languages
Korean (ko)
Inventor
송완영
정운희
김성재
Original Assignee
대원항업 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 대원항업 주식회사 filed Critical 대원항업 주식회사
Priority to KR1020150102269A priority Critical patent/KR20170010930A/en
Publication of KR20170010930A publication Critical patent/KR20170010930A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras

Abstract

The present invention relates to a smart safety helper service method utilizing a CCTV which can provide efficient information for crime prevention compared to the existing method by assigning CCTV related data to public safety information. The smart safety helper service method utilizing a CCTV comprises the steps of: collecting the existing data and the CCTV related data; designing a safety vulnerable analysis model reflecting CCTV information; manufacturing a public safety map; and providing a safety helper service to a user by the manufactured map.

Description

TECHNICAL FIELD [0001] The present invention relates to a smart safety helper service method using CCTV,

The present invention relates to a method of providing a smart safety helper service using CCTV, and it is possible to provide CCTV-related data to police information, thereby providing more effective information on range prevention than before.

In the daily life of modern society, there are still situations in which the safety of people is threatened from various crime factors such as violence, robbery, and rape.

In order to safeguard citizens from these crime factors, various police safety guidance techniques are proposed.

For example, a technique of sorting out the number of occurrences and types in a specific place and providing it as map information has been introduced.

However, this conventional technology has a problem in that it can not utilize CCTV according to recent technology development.

That is, in recent years, CCTV that can acquire various information is used, and there is also a control center that supervises the CCTV, and a lot of information that is useful for crime prevention is being produced.

However, in the case of the related art as described above, such information can not be utilized, thereby failing to provide sufficient information for preventing crime.

In the meantime, the safety guidance related technology as described above is described in detail in the following prior art documents, and a description thereof will be omitted.

Japanese Patent Laid-Open No. 2006-053838 Japanese Patent Laid-Open No. 2009-064278 Japanese Patent Laid-Open No. 2006-092311 Korean Patent Publication No. 10-2011-0069415 Korean Patent No. 10-1441664 Korean Patent No. 10-1523211

SUMMARY OF THE INVENTION Accordingly, the present invention has been made keeping in mind the above problems occurring in the prior art, and an object of the present invention is to provide a smart safety helper service method using CCTV, which can provide effective information on range prevention by adding CCTV related data to security information.

According to another aspect of the present invention, there is provided a method of deriving safety information by adding CCTV information to existing safety information, comprising the steps of collecting existing data and CCTV related data, A step of producing a security safety map, and a step of providing a safety helper service to the user by the map generated.

At this time, the step of collecting the existing data and the CCTV related data includes collecting the GIS DB for disaster prevention and the GIS DB for spatial information as existing data, and the CCTV visible distance GIS DB and the CCTV point It is also possible to include a step of collecting the crime related GIS DB occurring in the predetermined radius.

The step of designing the security vulnerability analysis model reflecting the CCTV information may include a step of selecting a safety type, a step of evaluating a safety factor and a risk factor, a step of selecting a basic level, a step of calculating a weight on a basic level, Performing a standard scoring on the weighted basic diagram and performing grading on the basic diagram on which the standard scoring is performed.

Also, the safety factor may include at least one of a police zone, a fire station, a child safety guard, and a CCTV, and adds a predetermined safety score when the security factor falls within a specific radius from the safety factor, It is also possible to add a predetermined risk score when it belongs to a specific radius and to add a predetermined risk score when it deviates from a CCTV to a specific radius and then calculate the basic degree of the safety factor by adding the safety score and the risk score .

In addition, the step of producing the safety safety map may display the safety map in a specific color according to the calculated basic degree score.

In addition, in the step of providing the safety helper service to the user, it is also possible to allow the user to obtain the related information from the web service or the mobile service by making the map information be a web service or a mobile service.

According to the present invention, CCTV-related data can be added to police information, thereby providing more effective information on range prevention than before.

BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a method according to one embodiment of the present invention,
FIG. 2 is a conceptual diagram illustrating a DB property link review process as a method according to an embodiment of the present invention;
3 is a method according to an embodiment of the present invention, which includes a table showing an example of a large capacity ASCII file (TXT, DAT, CSV)
FIG. 4 is a conceptual diagram showing a gdb structure obtained by ArcCatalog and a window searcher according to an embodiment of the present invention.
Figure 5 is a method according to an embodiment of the present invention, which is a conceptual diagram showing point creation through visual inspection,
FIG. 6 is a conceptual diagram illustrating a life safety progress service of a safety dream, according to an embodiment of the present invention;
7 is a conceptual diagram illustrating a smart safe home mobile service, according to one embodiment of the present invention,
FIG. 8 is a conceptual diagram showing a smart safe return home service map service according to an embodiment of the present invention; FIG.
9 is a conceptual diagram illustrating a crime MAPPING service, according to an embodiment of the present invention,
FIG. 10 is a schematic diagram illustrating a concept for vulnerable stable analysis, according to one embodiment of the present invention,
11 is a conceptual diagram illustrating a model builder interface, according to an embodiment of the present invention,
FIG. 12 is a conceptual diagram showing a model builder for producing a safety safety map, according to an embodiment of the present invention;
FIG. 13 is a photograph for illustrating the produced safety map of the safety as a method according to an embodiment of the present invention. FIG.

The smart safety helper service method using the CCTV of the present invention first carries out the step of collecting the existing data and the CCTV related data. The step of collecting the existing data and the CCTV related data includes a step of collecting the GIS DB for disaster prevention and the GIS DB for spatial information as existing data,

And collecting the crime related GIS DB occurring in a certain radius of the CCTV visible distance GIS DB and the CCTV point as the CCTV related data.

In other words, it is necessary to link various safety-related GIS data in order to quickly and effectively produce a safety map reflecting safety vulnerability analysis and model. However, the management agencies such as frequency of occurrence of the 5 major crime, police station location, child safety guard facilities, etc. related to major safety vulnerabilities are diversified into central ministries, municipalities and public institutions. Therefore, GIS data is constructed by different data formats and systems for each organization, making it difficult to link the organizations together. In this study, we collected DBs about safety vulnerability analysis and mapping - related factors in cooperation with the central government agencies including Seocho - gu Office.

The collected data are reviewed with consideration of the purpose of disaster prevention activity (selection of attributes to be used: roads of digital topographic map for safety vulnerability analysis and map production activities), spatial information review (coordinate unification, data format unification, Missing check, etc.) and corrects the error. In addition, for the topics that are not built up in the national spatial information and related materials (CCTV viewing distance, crime related data), DB was newly constructed in accordance with the basic guidelines for building national spatial information data.

Safety Map The GIS DB consists of vector shape files, and 1 million objects form geometry with polygons, lines, and points. NDMS data creation, conversion, and editing process involve the possibility of geometry errors.

These errors not only cause errors in area calculation and volume calculation but also have a great influence on the analysis result and cumulative analysis result when performing the analysis processing as the disaster prevention basic diagram, and it is necessary to correct the error beforehand. Therefore, in this study, the error of GIS DB required for safety map production was checked, and the intersection error, polygon closure error and null value error of the object were corrected and corrected. (See Fig. 1)

The integrated GIS DB built on the data has the connectivity of the mutual attributes of the layers. In order to examine the flawlessness of this property connectivity, a single house (same DB structure as the building layer of the road name address), small road (road name, The same DB structure as the layer of the real address of the address).

As a result, it is confirmed that the property connectivity between layers is disconnected, and it is judged that it is insufficient to utilize the property of safety map production. The layer is classified into reference data type, and a separate road name address data collection is carried out instead. (See Fig. 2)

DBs of related organizations can be distributed as texts of unstructured data or formatted large ASCII files (TXT, DAT, CSV) or distributed as Shape file type of space information or dBASE data archive file. Shared. In order to establish safety map production standards, a method of converting to safety map according to the file type of data distributed and shared is prepared and the conversion method is applied (refer to FIG. 3).

The utilization of the GIS DB is made into a working group by converting it into a file geodatabase (.gdb: Geodatabase). Because file geodatabases have no storage limitations, they can use an unlimited number of attribute tables, effectively and efficiently, for the management and analysis of national data.

If you are working with a property register (property master) and the overall status of the overall heading, heading, heading department, the total status of all buildings, and the entire property, Although it is impossible to work with the limitation of single Shape format, it is possible to perform analysis work beyond capacity and table number limit by processing file geodatabase, and it is possible to support large raster data. Also, because it uses 50% ~ 75% less disk space than the same data and the process performance improves, it is judged to be suitable for nationwide GIS management and analysis.

A geodatabase is a collection of geographic datasets that can be managed by including feature classes, raster data, and attribute tables, and enhances the relationship between data and data integrity. However, it is stored in binary form and can not be managed by Windows Explorer, but can only be managed by ArcCatalog (see Figure 4).

A geodatabase is a collection of geographic datasets that can be managed by including feature classes, raster data, and attribute tables, and enhances the relationship between data and data integrity. However, it can be stored in binary form and can not be managed by Windows Explorer, but can only be managed by ArcCatalog.

Through the above method, the collection and data processing of the raw data scattered in each institute, As well as the main DB for safety map production. Table 1 shows a list of DBs and collection agencies related to safety vulnerability analysis and map production.

In addition, CCTV visual distance and crime data were newly constructed through new construction and data processing. In the case of CCTV visible street, the ~ ~ ~ crime data from Seocho-gu Office integrated control center was obtained as an image form and constructed as GIS DB through point creation through visual inspection. (See Fig. 5)

Then, a step of designing a security vulnerability analysis model that reflects CCTV information is performed. This step includes a step of selecting a safety type, a step of evaluating a safety factor and a risk factor and selecting a basic level, a step of calculating a weight on the basic level, a step of performing a standard scoring on the weighted basic level And a step of classifying the basic diagram on which the standard scoring is performed.

At this time, the safety element selects at least one of the police zone, the fire station, the child safety guard, and the CCTV, and adds a predetermined safety score when the security element belongs to a certain radius from the safety element. A predetermined risk score is added in case of belonging to a specific radius, a predetermined risk score is added in case of deviating from a CCTV to a certain radius, and then the safety score and the risk score are added to calculate the basic factor of the safety factor.

In other words, safety vulnerability analysis model should be designed first in order to produce safety map. Prior to this, I analyzed crime and life safety related service cases. The National Police Agency has established the Missing Child Finding Center (formerly Missing Child Finding Center) and the 117 Center for Emergency Support for Victims of Prostitution and Victims of Women (117 centers) in order to receive reports of crimes and increase rescue activities that are taking place against increasing social disadvantages every year. It integrates the homepage and serves it under the name "Safety Dream".

FIG. 6 shows a screen of the life safety guidance service provided on the safety Dream homepage. As can be seen from FIG. 6, the life safety guidance service shows on the map the location of the support facilities for the child, the elderly, and the youth, and the location of the protection facilities and the school violence and victim support centers for victims of violence against women. Unusual is that information about life safety facilities can be downloaded as a Shape file.

In addition, in order to provide convenient and safe life for the people, the Security Administration provides life guidance service. Smart safety home service provides mobile service and web service at the same time. The mobile service is a location-based personalized service that provides a service that periodically sends movement and location information to the destination set by the user to SNS to prevent accidents. And provides information on safety facilities closely related to daily life (see FIG. 7).

Figure 8 shows the web service screen of the smart safety home service. Information on location information, operating hours, and phone numbers for each safety facility can be provided through the search of the living safety facilities.

As an example, North American law enforcement authorities provide citizens with useful information about increasing crime each year, and provide information on crime in real-time as a real-time map service to support police departments. tiger

FIG. 9 shows a screen of the crime map service provided on the CRIME MAPPING homepage. As can be seen in Figure 2.9, the Crime Map Service provides users with various types of crime location and information by date, and it informs the public of useful information about criminal activity in the neighborhood, which greatly contributes to self-reliant police activities among members of the community. .

As we have seen in the case, although we provide security related services, it does not have any security related services because we understand human behavior in real time in connection with CCTV. In this study, safety map was produced through analysis of safety vulnerability specific to CCTV - related service provision.

For security vulnerability analysis, risk and safety factors were classified into two major categories. There are a myriad of risk factors and safety factors in security of security. However, since it is impossible to reflect all of these factors, this study can be constructed with GIS DB and analyzed by reflecting the existing related factors.

For the safety factor, the 100M radius was defined as the safety zone based on the police station, fire station, and child safety guard area. In addition, CCTV monitor of integrated control center classified the range of human behavior as safety zone. The extent to which a person's behavior is observed is highly subjective, and therefore the extent to which the movement is observed when the arm is moved from side to side in a white T-shirt is set to the range in which human behavior is observed.

The risk factors are images generated by the images of rape, robbery, theft, and violence received from the police department and they are generated as points and 100M buffers are generated and classified as dangerous areas.

The safety vulnerability analysis model was designed as follows to reflect the safety factors and the risk factors.

1. Choosing the type of safety to be created (safety guidance for safety and security)

2. Selection of the basic plan considering the vulnerability characteristics (Safety factor: police station, fire station, child safety guard, CCTV / risk factor: rape, robbery, theft, violence, entertainment, CCTV)

3. Weights are assigned to the basic diagrams (equally)

4. Perform standard scoring on the weighted basic diagram

5. Classification (Classification / Scoring Classification of Scoring Results)

6. Grade sum (sum of scoring grade and scored grade)

7. Deriving Results

As shown in FIG. 10, in order to implement an efficient vulnerability analysis model, this study utilized the model builder of ArcGIS. Most of the analysis tasks performed in ArcGIS are implemented with ArcToolbox's Geoprocessing commands. In general, GIS analysis has several steps through various commands and modules to reach the final result.

In order to require feedback or to change some of the evaluation conditions during the analysis process, it is often necessary to carry out a review process that requires an intermediate process or an analysis from the beginning.

In ArcGIS, Model Builder creates these diagrams in the form of diagrams (flowcharts), applies the datasets and variables to the geoprocessing tool, and generates the results in real time by creating new data and performing a complex spatial analysis model It has advantages. In addition, since it is possible to automate repetitive data operations, it is easy to adjust operations such as adjusting variables or changing files.

You can help to understand systematically the process of analysis that creates policing maps, and share feedback scenarios with others. The advantages of Model Builder are as follows.

Geoprocessing model is an advanced component of geographic information system / can interactively perform pre-discussed scenarios in ArcGIS / step-by-step process that can take a lot of time or errors in advance / build geoprocessing scenario model / once Re-use the model you used in other analysis models / Modify parameter values or apply other input data / Sharing work processes with others / Authenticate the process of spatial analysis (see Figure 11)

In this study, we developed a model builder prototype for safety safety map generation based on the relevant GIS DB (entertainment business, robbery, rape, theft, violence, earthquake, fire station, child safety guard, etc. Respectively.

Model builder for policing safety map generation ArcGIS 10 is used for prototyping, and it is possible to migrate to ArcGIS 9 version according to geoprocessing function and issue service as GP server to ArcGIS Server.

As a result, it has a lot of advantages in efficiency and work sharing in the creation of security safety map, so it has scalability to implement various functions according to the license of ArcGIS Server and the grade of geo database (see FIG. 1).

- Vulnerability analysis verification

The security vulnerability analysis used in this study is an analysis method in which the CCTV element is added to the existing analysis method. In this regard, we try to verify vulnerability analysis by analyzing the correlation between CCTV and crime. Prior to the analysis of the vulnerability, the correlation analysis between CCTV and crime has been studied from the past. The case of Kwak Moon-gum (2005) is based on August 2004 when 230 CCTVs were installed and from 2001 to 2004 We analyzed the crime trends in Gangnam - gu, Seoul. A survey of the number of crimes per month for four years showed that the average number of crimes decreased by 31% from September 2004 to December 2004 after the standard month. In addition, in order to judge the transfer of crime, the number of crimes occurred in neighboring police stations was also confirmed.

(2006) compared the rates of crime change between before and after the installation in 2002 and 2003, respectively. Compared with the incidence rate of crime in Gangnam police station, all other types of crimes except for murder and rape crimes decreased. In addition, the area surrounding the area also showed that the occurrence of crime decreased and the effect of crime transfer due to CCTV installation did not appear.

Ahn Kwon-kwon (2006) defined the month of August 2004 as the month, comparing the number of crimes incurred between two years before installation and one year after installation (2002 to 2005) monthly. As a result of the analysis, it was found that the installation and operation of CCTV for crime reduces the crime occurrence by 22%. It was found that the incidence of robbery, theft, and violent crime decreased, and especially the theft crime was reduced by 73%. In addition, there is no evidence of major crime transfer in comparison with the cases of Suseo, Seocho, and Songpa police stations in Gangnam police station.

Choi and Kim (2007) investigated whether there was a change in crime trends in five police officers' areas including the Gangnam Police Station in Seoul where CCTV was installed first in Korea. The results of this study are as follows: First, the police were compared with the five major crimes (murder, robbery, theft, and violence). In addition, the occurrence of the transitional effects of the crime transfer and the control gains was also detected. The jurisdiction of the Gangnam Police Station was set as the adjacent area of the four police stations, including the experimental area, the Suseo Police Station, and officially the police from 2001 to 2005 And the number of crime incidents. When we look at the trend of crime occurrence, we found functional transition phenomenon where the crime is changed by the robbery and the control profit is spread in the case of the theft crime.

Lim Min-hyeok (2007) conducted the effectiveness test on 51 districts in Seoul (27 districts with CCTV). If previous studies have analyzed only the t-test and the trend of crime increase / decrease by dividing CCTV installation area and non-installation area, this study performed multiple regression analysis to control the influence of other variables. The number of police officers per capita, the number of patrol cars per unit area, and so on were used as control variables, and CCTV was divided into number of installations and dummy variables. As a result, the crime rate increased as the number of CCTVs increased or increased. The researchers concluded that CCTV is more useful than crime prevention. In other words, it is seen that crime increases rather than capturing crimes not to be reported before CCTV installation.

(2008) analyzed the effects of CCTV for crime prevention using semi - structured in - depth interviews on 18 criminals detained in Cheonan Asan police station. As a result of the interview, CCTV was found to have some effect in preventing planned crime (intrusion theft, robbery). Interviews included questions about whether to move to nearby neighborhoods to stop crime. Interviews show that after the CCTV installation, criminals have moved to neighboring areas without equipment and committed crime (geographical transfer). Also, we found that the phenomenon of changing the object of crime (object transfer) or changing the crime method (tactical transfer) appears.

Kim, Yeon-su (2008) measured the crime transfer effect of CCTV installed in the jurisdiction of Suseo Police Station in Gangnam and Suseo Police using the WDQ used by Bower and Johnson (2003). Theft is crime data. Three buffer zones and two control zones were selected to generate a total of six WDQs, which showed a slight difference but all showed a larger effect of control gains than a crime transfer effect.

Lee, Min - Sik and Park, Hyun - ho (2008) analyzed the effect of CCTV introduced as one of the CPTED crime prevention programs conducted in Bucheon City. The number of incidents and the number of incidents in the CCTV installation area among the crimes collected at Bucheon Chungbu Police Station and Nambu Police Station were classified and classified according to the guideline. As a result of the analysis, it was found that the crime rate was lower than the increase trend (Central police station) or decreased (southern police station). The survey was conducted once before and after the implementation of the crime prevention program. The survey included crime damage, crime report, disorder, and fear of crime. Four types of crime investigated (intrusion theft, intrusion intensity, street strikes, street strikes) decreased significantly. In addition, the fear of crime and disorder in the neighboring area were also significantly decreased. In both domestic and foreign studies, the crime prevention effect was different according to the types of crime (planned crime and unplanned crime) and place (residential area, park, parking lot, etc.). On the other hand, some studies show that crime is not reduced or even increased.

However, in Korea, most of the studies on the crime prevention effect of CCTV are limited to the area of Gangnam - gu, and it seems that they are doing the same analysis with the same data. In addition, there are studies that do not simply set up experimental area and control area, but only analysis of trend analysis. Even if we analyze area separately, we did not control factors affecting crime, so CCTV alone could not measure correct effect. This is because, unlike foreign countries, CCTVs for crime prevention have recently been introduced, and the accumulated data are insufficient and access to crime data is relatively difficult. In recent years, research methods such as questionnaires and interviews have emerged to solve data access problems and the problem of male and female crimes.

After performing the steps described above, a step of producing a safety safety map is performed. At this time, in the step of producing the safety safety map, it is possible to display the safety safety map in a specific color according to the calculated basic degree score.

The step of providing the safety helper service to the user by the produced map may include providing the generated map information to the web service or the mobile service, It is also possible to acquire information from a web service or a mobile service.

In order to produce a safety map, the standardization and appropriateness of map should be considered first. The definition of spatial information belongs to spatial information such as location information about natural or artificial objects existing in space such as ground, underground, water, underwater, And the information necessary for the decision (National Space Information Act, Chapter 1 General Provision 2: 2010).

However, standards related to the production, management, and use of spatial information are rarely defined. As such, production activities of spatial information can affect the standard state of the standardization target, so the activity should also be standardized. For example, standard spatial information must be produced in a standardized way among various basic spatial information producers so that a standardized result can be produced. In addition, it must be provided in a standardized way so that the user can use the standardized spatial information.

ISO / TC 211, an internationally recognized official standard organization, provides a framework and reference model for spatial information standards, data model and operators, geographic information services, data administration, And profile & functional standards.

 Since safety guidance is also a result of combining spatial information and information technology, it should be constructed with reference to these five types of spatial information standards, and the appropriateness examination should be made with reference to these standards. However, the standards and contents to be developed and developed may differ depending on the standardization target. Therefore, in this study, the adequacy of the contents that should be basically constructed in the construction of the safety guidance for the public safety was examined.

In this study, we conducted the appropriateness examination through selection of safety guideline according to the standardization type in consideration of establishing the standardization plan in conducting the appropriateness examination of security guideline construction.

There are five types of spatial information standards (base standards, data standards, service standards, quality standards, and profile standards) that should be considered in the appropriateness examination when constructing safety guidance. The safety instruction items to be constructed in consideration of these five types are the names of the safety and security basic diagram, the data used, the source of data, the coordinate system, the data type and format, the data modification, Information on information distribution center disclosure is necessary.

Map display plan

After reviewing the map standardization and appropriateness, you should review how to construct the map. Visual variables, a method of symbolizing map data, are symbolized by considering the characteristics of data. Design basic map symbols by carefully considering these concepts in mapping data, whether they are distributed along a line or within a plane, whether data is qualitative or quantitative, and visual variables are data.

Certain time variables can represent important characteristics of the data. If the data you are trying to express is qualitative as shown in Table 3.8, it is better to choose visual variables that show qualitative differences such as shape or color hue. If the data you want to represent is quantitative, it is a good idea to choose a visual variable that shows a quantitative difference, such as size or color value. Visual variables such as texture may be used to show qualitative or quantitative differences. The data of this project were selected by using visual variables showing quantitative difference by using quantitative data.

Colors represent various colors such as red and green. The various colors mean qualitative differences. It means that different kinds of colors are not big or small. Using color, people are aware of safety and risk. As shown in Figure 3.11, the information is expressed in red, yellow, and green by dividing into three categories: vulnerable (dangerous), normal, and good (safe)

Creation of Safety Safety Map using Safety Vulnerability Analysis Model

Safety elements and safety guidance for building security guidance should be derived from CCTV linkage, which was not available in existing maps. We extract the national basic spatial information and the life safety basic spatial information from the relevant institutional public data and draw the analytical map that incorporates detailed life safety information through the fusion of data between the ministries.

In particular, we analyzed the risk and safety factors of the whole life of the people comprehensively by the field of life safety, and produced a safety map in the form of unified raster and grid polygonal mesh vector layers. Using the safety vulnerability analysis model, the safety survey map of the 1/2-bay security zone in Seocho-gu, Seoul, is shown in Fig.

Big Data Integration Plan for Safety Map

Big data refers to large-scale data that is generated in a digital environment, is large in size, has a short generation cycle, and includes not only numeric data but also text and image data. Big data environment has more data than previous ones, and it can analyze and predict opinions and opinions through SNS as well as people's behaviors.

Claims (6)

As a method for deriving safety information by adding CCTV information to existing safety information,
Collecting existing data and CCTV related data,
Designing a security vulnerability analysis model that reflects CCTV information,
A step of producing a security safety map,
And providing a safety helper service to the user based on the created map.
The method according to claim 1,
The step of collecting the existing data and the CCTV related data includes a step of collecting the GIS DB for disaster prevention and the GIS DB for spatial information as existing data,
A method of smart safety helper service using CCTV including a step of collecting a crime related GIS DB occurring in a certain radius of a CCTV visible distance GIS DB and a CCTV point as the CCTV related data.
The method according to claim 1,
The step of designing the security vulnerability analysis model reflecting the CCTV information comprises:
Selecting a safety type,
Evaluating the safety factors and the risk factors and selecting the basic diagram,
Calculating a weight for the basic diagram,
Performing standard scoring on the weighted basis diagram;
A step of classifying the basic diagram in which the standard scoring is performed.
The method of claim 3,
The safety factor may include at least one of police station, fire station, child safety guard, CCTV
Adding a predetermined safety score when belonging to a specific radius from the safety factor,
The risk factor adds a predetermined risk score when it belongs to a certain radius from a nightlife business or a crime scene, adds a predetermined risk score when it deviates from a CCTV to a specific radius,
And calculating the basic degree of the safety factor by summing up the safety score and the risk score.
The method according to claim 1,
Wherein the step of producing the security safety map includes displaying the security score in a specific color according to the calculated basic degree score.
The method according to claim 1,
The step of providing a safety helper service to the user may include providing the generated map information to a web service or a mobile service,
A method of smart safety helper service using CCTV which enables a user to acquire relevant information from a web service or a mobile service.
KR1020150102269A 2015-07-20 2015-07-20 Smart safety helper service method by cctv KR20170010930A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150102269A KR20170010930A (en) 2015-07-20 2015-07-20 Smart safety helper service method by cctv

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150102269A KR20170010930A (en) 2015-07-20 2015-07-20 Smart safety helper service method by cctv

Publications (1)

Publication Number Publication Date
KR20170010930A true KR20170010930A (en) 2017-02-02

Family

ID=58151303

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150102269A KR20170010930A (en) 2015-07-20 2015-07-20 Smart safety helper service method by cctv

Country Status (1)

Country Link
KR (1) KR20170010930A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647791A (en) * 2018-03-30 2018-10-12 中国标准化研究院 A kind of processing method of multi-source automotive safety information, apparatus and system
KR101975969B1 (en) * 2017-12-05 2019-05-07 주식회사 이엠따블유 System and method for assessing crime risk
KR20220120311A (en) 2021-02-23 2022-08-30 주식회사 알투 Smart video surveillance system using camera

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006053838A (en) 2004-08-16 2006-02-23 Sofmac Systems Co Ltd Crime information notifying device
JP2006092311A (en) 2004-09-24 2006-04-06 Takenaka Komuten Co Ltd Criminal risk evaluation device, criminal risk evaluation method and criminal risk evaluation program
JP2009064278A (en) 2007-09-06 2009-03-26 Takenaka Komuten Co Ltd Arrangement plan creation device, arrangement plan creation method, and arrangement plan creation program
KR20110069415A (en) 2009-12-17 2011-06-23 성균관대학교산학협력단 Method of providing crime rate map based on positon information and system thereof
KR101441664B1 (en) 2012-11-16 2014-09-29 목원대학교 산학협력단 Crime map server using active data collection and crime risk area notification service methodes
KR101523211B1 (en) 2013-11-07 2015-05-28 남서울대학교 산학협력단 Method and apparatus for identifying crime vulnerable road using digital map

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006053838A (en) 2004-08-16 2006-02-23 Sofmac Systems Co Ltd Crime information notifying device
JP2006092311A (en) 2004-09-24 2006-04-06 Takenaka Komuten Co Ltd Criminal risk evaluation device, criminal risk evaluation method and criminal risk evaluation program
JP2009064278A (en) 2007-09-06 2009-03-26 Takenaka Komuten Co Ltd Arrangement plan creation device, arrangement plan creation method, and arrangement plan creation program
KR20110069415A (en) 2009-12-17 2011-06-23 성균관대학교산학협력단 Method of providing crime rate map based on positon information and system thereof
KR101441664B1 (en) 2012-11-16 2014-09-29 목원대학교 산학협력단 Crime map server using active data collection and crime risk area notification service methodes
KR101523211B1 (en) 2013-11-07 2015-05-28 남서울대학교 산학협력단 Method and apparatus for identifying crime vulnerable road using digital map

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101975969B1 (en) * 2017-12-05 2019-05-07 주식회사 이엠따블유 System and method for assessing crime risk
CN108647791A (en) * 2018-03-30 2018-10-12 中国标准化研究院 A kind of processing method of multi-source automotive safety information, apparatus and system
KR20220120311A (en) 2021-02-23 2022-08-30 주식회사 알투 Smart video surveillance system using camera

Similar Documents

Publication Publication Date Title
Haas et al. A national approach for integrating wildfire simulation modeling into Wildland Urban Interface risk assessments within the United States
CN113313387B (en) Intelligent management and control method and system for major security risk classification of enterprise
CN110009185A (en) AI dispatch control plateform system
Ghajari et al. Urban vulnerability under various blast loading scenarios: Analysis using GIS-based multi-criteria decision analysis techniques
Rajabifard et al. An intelligent disaster decision support system for increasing the sustainability of transport networks
KR20170010930A (en) Smart safety helper service method by cctv
CN114841662A (en) Infrastructure construction project management and control method and device, computer equipment and storage medium
Lu et al. Using cased based reasoning for automated safety risk management in construction industry
Yi et al. Development of the public safety system and a security-guaranteed society
Elvas et al. Data fusion and visualization towards city disaster management: Lisbon case study
CN115239144A (en) Dual prevention mechanism information system based on regional risk management
Sun Smart prisons
Balahadia et al. Application of spatiotemporal analysis and knowledge discovery for databases in the bureau of fire protection as incident report system: tool for improving fire services
Duff et al. Gaining benefits from adversity: The need for systems and frameworks to maximise the data obtained from wildfires
Goergen et al. Identifying abnormal patterns in cellular communication flows
Balahadia et al. Development of Fire Report Management Portal with Mapping of Fire Hotspot, Data Mining, and Prescriptions of Fire Prevention Activities
Mishra et al. Role of predictive data analytics to assess long term impacts of disaster
Junyoung et al. Spatial Big Data Strategy for Smart Safer City in Connection with Citizen Participation
KR102400062B1 (en) A method to visualize a disaster situation based on a grid system
Shaytura et al. Site security system with 3d imaging
Hu et al. Intelligent Engineering Construction Management: On-Site Construction Management
Zhang et al. Police resource distribution in China: spatial decision making based on PGIS-MCDA method
Hassanzadeh et al. Identification of earthquake disaster hot spots with crowd sourced data
KR102623123B1 (en) Grid-based multi-dimensional visualization expression method for each disaster management situatation
Wang et al. Applying AHP to evaluate the decision priority of typhoon disaster preparedness and emergency response