Академический Документы
Профессиональный Документы
Культура Документы
CHAPTER ONE
INTRODUCTION
1.1
BACKGROUND OF STUDY
operators can manually choose any camera from the network and display it on a
selected monitor.
Crime prevention through environmental design facilitates and enhances school
safety and security by ensuring that the physical layout and organization of the
school encourage positive student behavior. The principles of surveillance
center on three areas: controlling access, improving natural surveillance, and
increasing definition of school boundaries. These principles can easily and
effectively be applied to schools. For example, safe and secure schools
I.
II.
III.
to promote boundaries or
I.
II.
in/out effect,
Multiple cropping windows to cover more agents in the scene, only a
relatively short video segment needs to be processed at a time not the
III.
think twice about acting out, which of course leads to a safer environment
overall.
In terms of risk management, surveillance systems help to eliminate the threat
of false claims and frivolous lawsuits. For most businesses, such scenarios often
prove extremely costly. Video surveillance provides the necessary visual proof
to confirm facts and address legitimate cases while refuting false ones.
Its important to note that security cameras can deliver much more than video
images for post-event analysis. Todays video surveillance systems can provide
users with the tools for efficient real-time monitoring, advanced motion
detection, integration with external security systems, and other intelligent
features that increase the chances of catching potential threats as they happen.
In the end, the role of video surveillance is different for each user. How can a
video surveillance system help you? Answering that question is the first step in
determining what type of surveillance setup best meets your needs.
1.2
II.
IV.
V.
eye.
No great sense of security for students, staff and campus investors
I.3
In detection one can be determined within the field of view of the camera,
but even the identification of a person cannot be determined.
1.4
The scope of the study covers the creation of a video surveillance system
software.
I.
II.
Polytechnic nekede.
This study does not involve the hardware installation of the video
surveillance camera.
1.5
This study has its significance that after implementation the following will take
place;
I.
II.
III.
securing a conviction and may help avoid a lengthy and expensive trial.
Enables faster response to crimes, emergencies and other situations by
V.
catching it as it happens.
Provides a greater sense of security because students, parents and faculty
feel safer when doing everything from remaining in buildings after class
hours to using parking lots.
Whenever a violent crime at a school makes national news, parents
VI.
VII.
In the case of this study, there where many limitations which include;
I.
II.
1.7
III.
IV.
light.
Lack of expert persons to implement and maintain the system.
CONTRIBUTIONS TO ICT
ICTs play an enormous role in every day of human life. It involves in different
services in the modern era such as it receives and manipulates information, store
it, retrieve it and transmit it in digital form when require such as TV, Personal
Computer, emails, robots and others digital technologies.
Surveillance is a deliberate system of keeping a close watch on the behaviours
or activities of persons, groups, organizations and institutions suspected of
doing something illegal or warehousing information capable of causing a breach
of security by governments security agencies.
This could be done electronically with Closed Circuit Television cameras or
interception of electronically transmitted information such as Internet traffic or
phone calls or by means of low-technology methods such as human intelligence
agents and postal interception.
Other means include: surveillance cameras, social network analysis, biometric
surveillance, data mining and profiling, corporate surveillance, satellite imagery,
radio-frequency identification and geo-location devices to mount surveillance
on suspected targets.
10
1.9
ORGANIZATION OF CHAPTERS
Chapter One contains the introduction to the project, problem definition and the
importance of the project.
Chapter Two contains the review of every literature used in the course of this
project.
Chapter three contains the research methods, the investigation of the existing
system and how we intend to design the new system.
12
Chapter four contains the system design and implementation of the new system
and the maintenance schedule.
Chapter five contains the summary, conclusion and recommendation of the
project.
13
CHAPTER TWO
LITERATURE REVIEW
2.1
BACKGROUND OF SURVEILLANCE.
trans-border
crime,
child
pornography,
terrorism,
domestic
disaffection. Plus many new kinds of cyber crime. Conventionally, within any
society or country, information gathering and surveillance mechanisms exist for
the purpose of security of lives and property. In time past, there was a
significant time lag separating in time an event, incident or a crime is
committed, and the time such happening or event may be publicly made
available. But the emergence of new information and communication
technologies has revolutionalized every aspect of human endeavors. Today,
14
units.
Operationally
Information
and
Communication
small enough not to be noticed. In the same vein. The usage of closed circuit
television, in banks, airports, hotels, supermarkets etc seems to have
discouraged theft and other criminal activities, and it has also eased or curtailed
security threat.
2.2
Surveillance system software have swept the world with powerful force, thereby
affecting the society in various ways. In this regard, we should note that
technology is not merely equipment but is also an interaction between
equipment and their users.
In the past few decades Surveillance system software have transformed all
spheres of life. Its potential for reducing manual operation in fostering the
media has increased rapidly.
The role of Surveillance system software has also been stressed in security
management which points that, to nip any evil plan in the bud, information
about such intent must be available so as to map out strategies to prevent the
occurrence. That, even when these crisis, disasters or chaos occurred in the
society, accurate and timely information always help to profer solution to
ameliorate the situation.
When it comes to information, the internet has it all. That, there is more
information on computers and other Surveillance system software than one
16
could ever possibly digest. The greatest thing about the Surveillance system is
that you can use it to keep in touch with changes in the field and groups that
make these changes happen. By using their search capability, you can even learn
about the history itself or about a piece of equipment introduced into your
office. He concluded that in this modern world everybody has to be Information
and Communication Technologies compliance so as to help in providing
information and constructive suggestions on how to combat terrorism and other
security challenges that threaten the existence of our society.
On the other hand, surveillance is a well established craft involving technique
and Information and Communication Technologies gadgets which aid
information gathering and security management. However, most surveillance
has physical and electronic aspects and is preceded by extra caution and not
infrequently by surreptitious entry.
Today, in addition to anticrime advertising, case processing using media
technology, and police surveillance systems based on the older technologies of
audio- and videotaping, there is an abundance of newer media technologies
capable of both facilitating and constraining communication, interaction and
realization of fluid identities.
Moreover, the digitized, computerized, and networked information and
communication technologies exemplified by the Surveillance system software
17
have created virtual worlds with their own changing norms, value and codes of
practice. Altering the ways in which people engage in time and space.
However, the idea of using surveillance for the purpose of information gathering
and security management received a boost with the advent of internet computer.
These technological transformations have created new opportunities and risks
for crime and victimization, and for surveillance and crime control. For
example, close circuit television cameras, information gathering, and data
processing have transformed how people perceive and negotiate their social
worlds with caution and reserve.
In addition to improving the quick delivery of information and security
management, computer and telecommunication technology can improve both
the quality and quantity of information reported. Technology enables the
existing news industry and security agencies to deliver its news and findings in
real time, and largely increased the quantity of information that can be made
available.
In a related view, most media imagery and video are recorded from a
perspective on or near the earth, recent years have seen the growth of imagery
and video of the earth but observed from hundreds of miles above the ground.
Remote- censoring satellite imagery has since the end of the cold war, grown
dramatically to become an almost daily path of media content. On the Web;
18
members of the public can type their address and see a satellite image taken of
their neighborhood.
Satellite imagery not only plays an important role in security and military
operation, it can also be invaluable for journalists covering story on the
environment or the influence of development on farm land, for example.
Looking at weather patterns over time can also provide vital information and
help people to prepare for severe weather.
2.3
ii.
iii.
iv.
ii.
Political factor
iii.
Economic factor
iv.
Literacy barrier
v.
Under human resources, it is not a matter about the vast population of Nigeria,
rather about those who are Information and Communication Technology
compliant.
On the significance of information and communication technologies on
information gathering and security management, Surveillance system software
is seen as an electronic means of capturing, processing, storing and
disseminating information. It is the convergence of micro electronic, computing
20
technologies such as
ii.
communication technologies
Permanent Availability: the new Surveillance system software are
iii.
iv.
death, social welfare, census of population data, voting registers, among others.
Today, unprecedented information are being gathered through effective
surveillance with the aid of satellite and other technological gadgets.
Surveillance, when examined critically, has much in common with investigative
reporting, this is because investigative reporting is a master detective work. He
noted that investigating reporting can be described as the more aspect of
reporting. Effective surveillance can bring out more aspects of an issue or event
the same with investigative reporting. Specific words are used in investigating
reporting.
Revealing, uncovering, unearthing.
It is a fact that the above will go a long way to enhance effective security
management in any human organization. However, people who may involve in
the act of information gathering and security management must indeed possess
the following qualities.
i.
ii.
iii.
iv.
v.
vi.
Courage
22
vii.
viii.
knowledge of photojournalism
ix.
Computer literate
x.
Above
all,
Information
and
Communication
Technology
compliance.
Surveillance and Information and Communication Technology can be
effectively used when the various information gathering and disseminating
agencies work together in form of synergy.
Security agencies make extensive use of telecommunication in receiving and
transmitting their massages. All these agencies originate in nations where the
press was highly developed, the agencies came into being between 1835 and
1918.
Some of the agencies which employed Information and Communication
Technology for information gathering and management include the following;
Reuters, Associated Press, Agency
France Press
United Press International
Reuters:
subscribing media. Its services are received in almost every country. Reuters is
known for its reliable alert reporting.
23
24
2.4
INVASION OF PRIVACY
Despite the fact that surveillance, information and communication technologies
serve as tools for information gathering and security management, it is apparent
that the employment of CCTV cameras seems to be a direct invasion of privacy.
Though, it may be argued that surveillance is in public and government interest,
and as well serves as the first step towards a submissive and controlled society,
the fact that the general public has the right to privacy even in public area
should not be undermined.
In this view, it is asserted that video surveillance is analogous to mechanical
police officer. It could be added that it does not intrude upon an individual
sphere of privacy, but rather records events occurring in public space for which
individuals do not have reasonable expectations of privacy.
Surveillance systems have a mysterious knack for justifying themselves
regardless of what happens to crime. Because, when crime goes up, the cameras
get credit for detecting it, and when crime goes down, they get the credit for
preventing it.
However, the nagging questions are;
i.
ii.
25
iii.
With regard to privacy right, section 37 of the 1999 constitution of the federal
republic of Nigeria made provisions guaranteeing the privacy of the citizen of
the country in his home, correspondence, telephone conversation and
telegraphic communication. A lot of arguments have also been raised on the
necessity of privacy laws, if information must be gathered and published for and
in the interest of the public.
26
CHAPTER THREE
RESEARCH METHODOLOGY
3.1
METHODOLOGY ADOPTED
educational
establishments
and
CASE
tool
developers.
of
Conception,
Initiation,
Analysis, Design,
SSADM are logical data modeling, data flow modeling and entity behavior
modeling.
27
I.
II.
III.
systems were created in the 1970s and then proliferated in the 1980s. Expert
systems were among the first truly successful forms of AI software. An expert
system is divided into two sub-systems: the inference engine and the knowledge
base. The knowledge base represents facts and rules. The inference engine
applies the rules to the known facts to deduce new facts. Inference engines can
also include explanation and debugging capabilities.
3.1.2 OBJECT ORIENTED ANALYSIS AND DESIGN
Object-oriented analysis and design Method is a popular technical approach to
analyzing, designing an application, system, by applying the object-oriented
paradigm and visual modeling throughout the development life cycles to foster
better stakeholder communication and product quality.
3.2 ANALYSIS OF THE PRESENT SYSTEM
The present system, involves the use of security guards who patrol around the
school premises, on shifts. It has a centralized control with different subheads
placed around the school premises. Then in 500 capacity there is no steady
guard, they patrol from time to time and that does not provide a steady watch
over the environment. From the interview conducted, 90 percent of the people
interviewed supported the development of the software, because it will serve as
a preventive measure while the remaining 10 percent did not support because
they see it either as waste of resources, or another cause for unemployment.
Good security management is about being proactive rather than reactive. The
29
30
out,
after
which
there
is
incident
containment,
31
3.3.1
SYSTEM.
SCHOOL MANAGEMENT
HEAD OF SECURITY
PATROL
PATROL INSIDE PROPERTY BOUNDARY
PATROL
EXTERNAL
INDIVIDUAL BUILDING
SECURITY SYSTEMS
II.
III.
navigation.
Human Factor: the program requires an expert user, the user must be
IV.
trained on how to use the program before he or she can use it.
Standby Power: the program requires steady power, uninterrupted
power supply and a standby power in case of power failure.
3.5.
The conclusions of the analysis are that the basic expectations of the new
system are as follows:
I.
II.
III.
IV.
V.
3.6
The diagram below shows how data flows in the new system.
This is a preliminary step used to create an overview of the
system which will later be elaborated.
34
FIG 3.2
3.7
reliability,
availability,
maintainability,
and
system safety. The below procedure shows how the system will
run.
USER LOG IN
USER SELECTION
ANALYSIS
ANOMALY DETECTION
INTERPRETATION
35
CHAPTER FOUR
SYSTEM DESIGN AND IMPLEMENTATION
II.
III.
IV.
36
37
OF
SOFTWARE
&
HARDWARE
REQUIREMENT
Hardware Requirements
The software designed needed the following hardware for an effective operation
of the newly designed system.
1. Minimum of Pentium IV System.
Enhanced keyboard.
Software Requirements
The software requirements includes:I.
II.
38
Video/motion
2.
audio
IV.4.1INPUT SPECIFICATION
The inputs are designs generally based on the necessary data that needs to be
recorded into the system. The data are captured through surveillance cameras
and a microphone which are stored in a magnetic disk in an access database.
39
START
Perform Operation
Select log?
Camera selected
Back to menu
Specify no of windows
Specify no of windows
V.
Capturing inputs.
STOP
40
Video
Video CaptureBlock memory matrix
INPUT IMAGE
VI.
Encoder
Block memory
Transmitter
7u7687677yuyujg7t67yuyggghgygu
VGA monitor
Block memory matrix
Video
Receiver
41
Definition
For security cameras, this refers to the
View
Audio
narrower.
To record the sound, your recording device
needs to support audio (must have at least one
audio input).
Compression Refers to taking an incoming signal or image,
which can be analog or digital, and
compressing the data so it can be stored or
transmitted faster and using less resources.
There are many different algorithms and
Covert
Day/Night
Camera
Camera
mode
Log in
zoom
Storage
lens on an object
This tab gives the user access to stored files
in the system
assigned a unique address by the programmer, the camera video feed can be
displayed by the application. The Camera Motion Control application
controls the direction in which the camera faces. It is equipped with a usercontrol mode and an auto-control mode.
44
CHAPTER FIVE
5.1
SUMMARY
5.2
CONCLUSION
45
5.3
RECOMMENDATION
Based on a careful and in depth study undertaken in the course of this research,
some setbacks were observed in the existing method of surveillance in 500
capacities, Department of Computer Science Federal Polytechnic Nekede.
Which this research work is aimed at improving/correcting.
46
School systems has been on without this new system but I recommend that
Schools should try and adopt this new system, which according to research is
more beneficiary, compared to the existing system in terms of efficient security
services. In so many developed countries computer system are being used in
almost every aspect of technology and it has been as a mark of advancement
therefore, I recommend that the government and school management should
nature this project by providing the necessary needs for its implementation in
order to make it available for every department in Federal Polytechnic Nekede.
School systems have unique challenges in protection of students life and
properties and a good surveillance system play a legitimate role in contributing
to operator safety, particularly in the detection of crime.
As part of the critical infrastructure of modern societies, school environments
are viewed as desirable targets for terrorists therefore It is feasible to
successfully implement this project in school due to the fast response to
irregular activities seen on camera.
This project is still open for further research because of the rapid changes in the
computer world and even the software industry will bring much improvement
on the expert system.
47
48