skip to main content
10.1145/3343147.3343158acmotherconferencesArticle/Chapter ViewAbstractPublication PagesieccConference Proceedingsconference-collections
research-article

IoT-based "All-Round 3D Technology Security Circle" in New Taipei City Police Department

Authors Info & Claims
Published:07 July 2019Publication History

ABSTRACT

New Taipei City is a metropolitan area in Taiwan, with a prosperous economy and a large population. Many parades and public assemblies are held within the jurisdiction and they might have unintended consequences such as traffic, overcrowding, or even serious risks and mishaps. Many cities around the world face similar problems and threats, such as domestic violence in Turkey and the Boston Marathon bombing. Combating new types of public safety threats has become a primary task. Setting up a complete surveillance system at an event site would give a command center access to the site and allow them to respond to an incident in real time. The system's digital records would help track a crime scene, as well as providing insight into how criminals commit crimes. The New Taipei City Police Department has established an "All-Round 3D Technology Security Circle" equipped with various cameras that transmit images back to a command center based on an Internet of Things connection. Innovative technology combined with smart equipment gives three-dimensional coverage of an area to ensure public safety.

References

  1. Guan Cheng-Che (2000). Functions and Development of Fusion Center. 7th International Proceedings on Terrorism and Homeland Security, pp. 1--20.Google ScholarGoogle Scholar
  2. Mollah, M. B., Islam, K. R., & Islam, S. S. (2012, April). E-police system for improved e-government services of developing countries. In Electrical & Computer Engineering (CCECE), 2012 25th IEEE Canadian Conference, pp. 1--6.Google ScholarGoogle Scholar
  3. Manali R. Bhosale, K. P. Paradeshi. (2018). IoT Based Smart Police Station, International Journal of Electrical Electronics & Computer Science Engineering, Volume 5, Issue 2, pp. 90--93.Google ScholarGoogle Scholar
  4. Atzori, L., Iera, A., Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), pp. 2787--2805. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), pp. 1645--1660. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Pan, J., McElhannon, J. (2018). Future edge cloud and edge computing for internet of things applications. IEEE Internet of Things Journal, 5(1), pp. 439--449.Google ScholarGoogle ScholarCross RefCross Ref
  7. Raja, A. A., Naveedha, R., Niranjanadevi, G., Roobini, V. (2016). AN internet of things (IoT) based security alert system using raspberry pi. Asia pacific international journal of engineering science, 2(01), pp. 37--41.Google ScholarGoogle Scholar
  8. Shah, S. H., & Yaqoob, I. (2016). A survey: Internet of Things (IOT) technologies, applications and challenges. In Smart Energy Grid Engineering (SEGE), IEEE, pp. 381--385.Google ScholarGoogle ScholarCross RefCross Ref
  9. Allio, L. (2014). Design thinking for public service excellence. UNDP Global Centre for Public Service Excellence.Google ScholarGoogle Scholar
  10. Luma Institute. (2012). Innovating for people: Handbook of human-centered design methods. LUMA Institute, pp. 1--89.Google ScholarGoogle Scholar

Index Terms

  1. IoT-based "All-Round 3D Technology Security Circle" in New Taipei City Police Department

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      IECC '19: Proceedings of the 1st International Electronics Communication Conference
      July 2019
      163 pages
      ISBN:9781450371773
      DOI:10.1145/3343147

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 July 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader