skip to main content
10.1145/3650400.3650645acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

Design and implementation of intelligent security monitoring system based on RPA+AI

Authors Info & Claims
Published:17 April 2024Publication History

ABSTRACT

RPA+AI is a combination of RPA technology and AI technology. Experts have long predicted that the relationship between RPA and AI is the same as the relationship between human hands and feet and brain, with RPA being the hands and feet associated with "hands" and AI being the brain associated with "thinking" and "learning." With the development of science and technology, surveillance cameras have been applied to every corner of life, especially in the construction of Hainan free trade port, the application of monitoring system is more and more extensive. However, the rapid development of surveillance cameras has also brought many problems, for example: the number of surveillance cameras in businesses or schools can reach hundreds. When there is a problem and you want to view the playback of the monitoring, it is not only time-consuming and laborious, but also easy to produce visual fatigue. There are many such application scenarios, all of which, to varying degrees, require manual handling of tedious process work. This paper focuses on the deployment of RPA robots in these application scenarios. By cooperating with artificial intelligence, replacing the repetitive and monotonous screening and search work in the monitoring system, human error can be reduced to a certain extent, operating efficiency can be improved, and operating costs can be reduced. This paper takes traditional camera intelligence as an example, based on RPA, AI and machine vision technology, studies how to apply machine vision technology to traditional surveillance cameras, transform traditional surveillance cameras into intelligent surveillance cameras, and make effective information retrieval more convenient.

References

  1. Zhao Dan. Research and Implementation of Regional Intrusion Detection Based on Opencv [Master dissertation]. Nanjing University of Posts and Telecommunications, Nanjing, 2014.Google ScholarGoogle Scholar
  2. Sun Jing. Research on facial emotion recognition and behavior analysis technology of prisoners. Shandong University, 2020.Google ScholarGoogle Scholar
  3. Li Yong, Tang Guoqin, Luo Langteng, Research on storage and retrieval of massive GPS and video surveillance data in Cloud environment [J]. Power Big Data, 2022, 25 (05) : 85-92.Google ScholarGoogle Scholar
  4. Wu Zejian, Wang Penghu, Yu Wei, Chen Xiaoqi. Research on Continuous Audit based on robot process Automation technology. China Internal Audit, 2021.Google ScholarGoogle Scholar
  5. Wang Jiaqiang. Design and implementation of elderly care System based on Fall Detection [Master's thesis]. Qingdao University, Qingdao, 2019.Google ScholarGoogle Scholar
  6. Analysis on the construction of banking RPA ecological service model [J]. China Credit Card, 2023, No.322(03) : 58-62.Google ScholarGoogle Scholar
  7. Liu Wenjing, Chen Zhipeng. Design of home security monitoring robot based on computer vision. Electronic Technology and Software Engineering, 2021.Google ScholarGoogle Scholar
  8. Song Leizhen, Li Xiaoxiao, Lin Xiang Visual Home Security Robot Based on OpenMv3 [J]. Heilongjiang Science and Technology Information, 2019.Google ScholarGoogle Scholar
  9. Geng Mengya, Zhang Guoping, Xu Hongbo Video Flame Recognition Method Based on Object Tracking and Deep Learning [J]. Computer Measurement and Control, 2019.Google ScholarGoogle Scholar
  10. Yang Weili. Analysis on the development status and trend of foreign artificial intelligence technology [J]. Unmanned Systems Technology, 2019, 2(04) : 54-58.Google ScholarGoogle Scholar
  11. Zhou Dongmeng. Research on the Development of RPA – taking Alibaba Cloud RPA as an example [J]. China Management Informatization, 2021.Google ScholarGoogle Scholar
  12. Li J. Fall Detection Algorithm and implementation for elderly people based on Deep Learning [D]. Hebei University of Technology, 2021.Google ScholarGoogle Scholar
  13. Yang Honglei. Research on Human Fall Detection Algorithm Based on Multi-dimensional Feature Fusion [D]. Yanshan University, 2022.Google ScholarGoogle Scholar
  14. Wang Yan. RPA: Process Automation leads digital labor Revolution [M]. Machine Industry Press, 2020.Google ScholarGoogle Scholar
  15. Jha; Govind Murari Upadhyay.Novel Approach for Robotic Process Automation with Increasing Productivity and Improving Product Quality using Machine Learning. International Journal of Engineering and Advanced Technology (IJEAT), 2021.Google ScholarGoogle Scholar
  16. Saldanha Villar; Nawaz Khan . Robotic process automation in banking industry: a case study on Deutsche Bank. Journal of Banking and Financial Technology, 2021.Google ScholarGoogle Scholar
  17. Huang Xiuhui. Vision Image Processing Technology of Intelligent Driving Vehicle [J]. Highway and Transportation Science and Technology (Applied Technology Edition), 2018.Google ScholarGoogle Scholar

Index Terms

  1. Design and implementation of intelligent security monitoring system based on RPA+AI

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EITCE '23: Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering
      October 2023
      1809 pages
      ISBN:9798400708305
      DOI:10.1145/3650400

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 April 2024

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate508of972submissions,52%
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format