Latest

whatsapp (+234)07060722008
email sales@graciousnaija.com

Monday 12 March 2018

NETWORK BASE SECURITY SURVEILLANCE SYSTEM

NETWORK BASE SECURITY SURVEILLANCE SYSTEM
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF STUDY
Information system occupies a vital and unique position in any organization by virtue of the data and information, which it contains. Security of information is of great importance to any given organization this makes the information reliable since information stored can be referenced whenever necessary access by unauthorized persons. This project “NETWORK BASE SECURITY SURVEILLANCE SYSTEM” is so design to help security information system especially for the management of the present porous security system in the campuses. Presently the polytechnic is not armed with modern data processing and security information system. To help wake it up from its stagnation, my solution is to transform the existing age-long manual information system and embrace latest technology that will avert loss of information, insecurity and delay in data processing. The management and security unite is responsible for security of live and property and as a result keeps record of vital information given to them by any informant so as to enable them arrest activities or scenes unpleasant to people residing in a particular district.Therefore, for effective administration and management, the provision of computer based information security for every source station is certainly inevitable, since it will take care of all the problems and inadequacies of the manual system. As a result, CCTV (Close-Circuit Television) security cameras will be mounted around the polytechnic premises during the course of project implementation to enhance high security for the compound and its communities.

The alarming crime rate in various homes and offices around the globe has necessitated the installation of surveillance security systems in most establishments. The security threats ranging from armed robbery, kidnapping and recently bomb blasts has kept the entire regions on their toes to the extent that no one can be sure of his/her security in the next moment. Surveillance is the systematic investigation or monitoring of the actions or communications of one or more persons in a place [1]. Surveillance security systems monitor the activities that go on in areas of the establishment with the use of surveillance cameras. The cameras may be stationary or it may rotate in different directions to achieve more coverage of activities in an area. Such rotation of cameras is achieved with the use of DC motors or stepper motors. Currently, emergence of personal computers made security operatives to be efficient and equal to the task in keeping the entire populace to abreast with the latest security challenges in the course of discharging their duties. The PCs replace the close circuit television which had been in use prior to the emergence of IP-based surveillance system. So with this development in the security monitoring system, it is becoming apparent that acquisition of PCs by individuals is becoming mandatory if one should meet up with security challenges around his vicinity. With flexibility of surveillance security systems being a major consideration, this work focuses on the software designs and implementation of a system that enables a remote personal computer (PC) which is connected to a wireless local area network to view the activities captured by a surveillance camera. The PC also controls the direction of rotation of the camera remotely, with the use of a pair of wireless transceivers. Due to its wireless nature and its use of IP (Internet Protocol) data packets, this system provides remote access and greater flexibility compared to other visual surveillance systems, as the system can be hosted on the internet and thus made accessible from anywhere in the world.

NETWORK BASE SECURITY SURVEILLANCE SYSTEM

Format: MS Word
Chapters: 1 - 5, Abstract, References
Delivery: Email
Number of Pages: 94

Price: 3000 NGN
In Stock

No comments:

Post a Comment

Add Comment