72
ABSTRACT. Surveillance system is a deliberate system geared towards keeping a close watch on the behaviors or activities of persons, groups, organizations and institutions suspected of doing something illegal or warehousing information capable of causing a breach of security. In today’s world of insecurity of lives and properties, there is need to fathom ways on how to bring about harmony and peaceful co existence between students on one hand and the institution on the other. It is on this basis that this project introduces how a surveillance software can be used as tools for information gathering and security management in computer science department 500 capacity, Federal Polytechnic Nekede. In this project we describe a framework for design, and deployment of a software for surveillance system for the department of computer science 500 capacity, Federal Polytechnic Nekede, Owerri. This project focuses on using Visual Basic Programming Language in combination with top down design methodology to develop a software to manage a surveillance system for Computer Science Department, Federal Polytechnic Nekede which contributes to ICT by providing a means by which students can perform more research on programming with different programming languages to enhance this project. 1

Automated Surveillance system

  • Upload
    edwin

  • View
    229

  • Download
    0

Embed Size (px)

DESCRIPTION

Design and implementation of a software which is capable of managing surveillance in schools. this software has a high security and only records images in motion.

Citation preview

ABSTRACT.Surveillance system is a deliberate system geared towards keeping a close watch on the behaviors or activities of persons, groups, organizations and institutions suspected of doing something illegal or warehousing information capable of causing a breach of security. In todays world of insecurity of lives and properties, there is need to fathom ways on how to bring about harmony and peaceful co existence between students on one hand and the institution on the other. It is on this basis that this project introduces how a surveillance software can be used as tools for information gathering and security management in computer science department 500 capacity, Federal Polytechnic Nekede. In this project we describe a framework for design, and deployment of a software for surveillance system for the department of computer science 500 capacity, Federal Polytechnic Nekede, Owerri. This project focuses on using Visual Basic Programming Language in combination with top down design methodology to develop a software to manage a surveillance system for Computer Science Department, Federal Polytechnic Nekede which contributes to ICT by providing a means by which students can perform more research on programming with different programming languages to enhance this project.

CHAPTER ONEINTRODUCTION1.1 BACKGROUND OF STUDYThe emergence of new Information and Communication Technologies has revolutionalized every aspect of human Endeavour. In todays world of insecurity of lives and property, there is need to fathom ways on how to bring about harmony and peaceful co-existence between individuals on one hand and among nations on the other. It is on this basis that this project examines how surveillance, information and communication technologies can be used as tools for information gathering and security management. Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. The use of surveillance systems has been rising over the past decade. Most recently, the need to improve public safety and the concerns about terrorist and cult activities have contributed to a dramatic increase in the demand for surveillance systems. The presence of these systems is very common in airports, subways, metropolitan areas, seaports, and in areas with large crowds. Modern video surveillance systems consist of networks of cameras connected to a control room that includes collection of monitors. Typical control rooms have a much smaller number of monitors than cameras and far fewer operators than monitors. The monitors either cycle automatically through the cameras, or operators can manually choose any camera from the network and display it on a selected monitor.Crime prevention through environmental design facilitates and enhances school safety and security by ensuring that the physical layout and organization of the school encourage positive student behavior. The principles of surveillance center on three areas: controlling access, improving natural surveillance, and increasing definition of school boundaries. These principles can easily and effectively be applied to schools. For example, safe and secure schools I. Can control unauthorized access to buildings and grounds bya. having a single access point of entrance for visitors.b. screening visitors and requiring them to wear ID tags.c. monitoring entry to the school from a singlepoint.d. reducing the number of secondary entries around the perimeter and to buildings.II. Improve natural surveillance of the school buildings and grounds bya. ensuring clear lines of sight by removing unnecessary obstacles and trimming vegetation.b. limiting hiding places by raising signs off the ground, lowering bushes, etc.c. improving lighting, limiting shadows, or installing convex mirrors in dark or secluded areas.III. Enhance school boundaries for better control bya. clearly defining the edges of school property with tree plantings or fences to reinforce the fact that the school is not a public-access space.b. individualizing areas of the school to promote boundaries or ownership and pride in the school as well as to make it easier to identify unauthorized individuals. keeping up good maintenance a clean, well-cared-for school fosters school pride and orderliness.

We are mainly interested in video surveillance applications. Typically, much moreVideo than operators can observe is available. In addition, this video is unedited, and more importantly, not focused on any agent in the scene. In particular, our method offers the following contributions:

I. a variable size cropping window which results in a smooth zoom in/out effect,II. Multiple cropping windows to cover more agents in the scene, only a relatively short video segment needs to be processed at a time not the complete video which makes the algorithm.III. We show empirically that by stitching together results from short segments of a video, we get a result identical to the globally optimal one, given the entire video.

Surveillance systems work to deter criminal activity.We'veseen countless examples where the rate of reported incidents has dropped significantly, in schools for instance, simply by the presence of surveillance systems. In many cases, strategically placed surveillance cameras will make potential offenders think twice about acting out, which of course leads to a safer environment overall.In terms of risk management, surveillance systems help to eliminate the threat of false claims and frivolous lawsuits. For most businesses, such scenarios often prove extremely costly. Video surveillance provides the necessary visual proof to confirm facts and address legitimate cases while refuting false ones.Its important to note that security cameras can deliver much more than video images for post-event analysis. Todays video surveillance systems can provide users with the tools for efficient real-time monitoring, advanced motion detection, integration with external security systems, and other intelligent features that increase the chances of catching potential threats as they happen.In the end, the role of video surveillance is different for each user. How can a video surveillance system help you? Answering that question is the first step in determining what type of surveillance setup best meets your needs.

1.2STATEMENT OF THE PROBLEM

I. Non-violent and violent crime continues to be prevalent in many educational institutions around the world, signaling the need for more security. In the Nigeria, for example, a substantial number of students experience some type of violence and related consequences in their University career. II. In the Campus, too many security officials are needed for security and there is no guarantee that they would remain at their station all through their duration.III. In the case of a trial there is always the lack of forensic evidence, which leads to long trials.IV. Slow response to emergencies due to the fact that there is no watching eye.V. No great sense of security for students, staff and campus investors

1.3 OBJECTIVES OF THE STUDY.This project is geared towards achieving the objectives of the existing system efficiently and at the same time conquering most disadvantages of the existing system. The objectives include;1) Monitoring the activities going on around the 500 capacity building, department of computer science.2) Detecting any abnormal behavior of any person or persons around the environment 24 hours a day.3) Providing an undeniable evidence of events that took place around the environment.4) Preventing people from taking place in criminal activities around the environment.5) Encouraging external investors because of a secured environment.

In detection one can be determined within the field of view of the camera, but even the identification of a person cannot be determined. 1.4SCOPE OF THE STUDYThe scope of the study covers the creation of a video surveillance system software.I. It is only applicable to the department of Computer Science, Federal Polytechnic nekede.II. This study does not involve the hardware installation of the video surveillance camera.1.5SIGNIFICANCE OF THE STUDYThis study has its significance that after implementation the following will take place;I. Stretches security budgets by enabling coverage of more locations with less security personnel. II. Prevents crime because the presence of a watching eye can stop many would-be criminals in their tracks. III. Provides undeniable evidence because when students or teachers are brought into a school office and see a video showing them committing an illegal or unacceptable act, they will usually admit to the incident. If the incident requires legal action, a recorded video can be invaluable in securing a conviction and may help avoid a lengthy and expensive trial. IV. Enables faster response to crimes, emergencies and other situations by catching it as it happens. V. Provides a greater sense of security because students, parents and faculty feel safer when doing everything from remaining in buildings after class hours to using parking lots.VI. Whenever a violent crime at a school makes national news, parents immediately start thinking of the safety of the institutions they are considering for their children or their children are attending. Being able to assure parents you provide a secure environment is a strong marketing advantage and becoming a necessary standard in public education. Colleges, in particular, that fail to take measures to secure their Campus will gradually see reduced enrollment and a loss of reputation. VII. Surveillance videos provide excellent protection against fraudulent liability claims, ensuring that testimony regarding an incident does not consist solely of hearsay.

1.6 LIMITATIONS OF THE STUDYIn the case of this study, there where many limitations which include;I. There is limited finance for the course of this studyII. After implementation, there is need for a steady communication between law enforcement and system managers but Communication in transmission is expensive.III. Power was another problem because there was no steady supply of light.IV. Lack of expert persons to implement and maintain the system.

1.7CONTRIBUTIONS TO ICTICTs play an enormous role in every day of human life. It involves in different services in the modern era such as it receives and manipulates information, store it, retrieve it and transmit it in digital form when require such as TV, Personal Computer, emails, robots and others digital technologies.Surveillance is a deliberate system of keeping a close watch on the behaviours or activities of persons, groups, organizations and institutions suspected of doing something illegal or warehousing information capable of causing a breach of security by governments security agencies.This could be done electronically with Closed Circuit Television cameras or interception of electronically transmitted information such as Internet traffic or phone calls or by means of low-technology methods such as human intelligence agents and postal interception.Other means include: surveillance cameras, social network analysis, biometric surveillance, data mining and profiling, corporate surveillance, satellite imagery, radio-frequency identification and geo-location devices to mount surveillance on suspected targets.In surveillance, Intelligence gathering helps security agencies to keep tabs on the activities of suspected groups, organizations or persons likely to breach the peace. Today, such ICT tools as the internet, mobile telephony system, social media networks and the media have become veritable platforms for intelligence gathering efforts of our security agencies, so long as they observe the ethics of using these technologies for intelligence gathering purposes.Intercepting communication between terror groups and enhancing intelligence sharing and other collaborative measures between security agencies is now absolutely possible through ICT. We now have electronic devices and gadgets with in-built unique identification numbers that makes them electronically traceable regardless of location. So its no longer impossible to track communication devices or gadgets used by criminal gangs or groups.Information and Communication Technology is a vital tool for tracking, tracing and investigating suspected financial transactions funneled to criminal activities. With the recent introduction of cash-less society, transactions will be done on electronic platforms where suspicious cash movements can be identified and questioned. This would go a long way in curbing the financing of activities that constitute a threat to national security because no terrorist group or gang can operate without funding.Security agencies can minimize duplication of efforts, guard against the mishandling of information as well as enhance information sharing among them for a better management of our national security through ICT. This involves pulling the nations data into a coordinated and centralized database as a proactive means of combating insecurity.1.8 DEFINITION OF TECHNICAL TERMS1. ControlRoom:is aroomserving as a central space where a large physical facility or physically dispersed facilities has a centralized control.2. Controlling access:Access control refers to security features that control who can access resources in the operating system. Applications call access control functions to set who can access specific resources or control access to resources provided by the application.3. Crime prevention: this is the attempt to reduce and detercrimeand criminals. It is applied specifically to efforts made by governments to reducecrime, enforce the law, and maintaincriminaljustice.4. Frivolous: Unworthy of serious attention.5. Law suit:comprehensive term for any proceeding in a court of law whereby an individual seeks a legal remedy. 6. Monitors: To check by means of an electronic receiver for significant content, such as military, political, or illegal activities in an environment.7. Network: Acomputer networkor datanetworkis a telecommunicationsnetwork that allowscomputersto exchange data. Incomputer networks, networkedcomputingdevices pass data to each other along data connections. The connections between nodes are established using either cable media or wireless media.8. Secure Environment:is any system or environment which implements the controlled storage and use of information. In the event of computing data loss, asecure environmentis used toprotectpersonal and/or confidential data. Often,secure environmentsemploy cryptography as a meanstoprotectinformation.9. Surveillance:Thesystematicobservationofaerospace,surface,orsubsurfacearea,places,persons,orthingsbyvisual,aural,electronic,photographic,orothermeans.10. System: A set ofdetailedmethods,proceduresandroutinescreated to carry out a specificactivity, perform aduty, or solve aproblem.11. Unauthorized Access:is an act of illegally gainingaccessinto any environment without permission.

1.9ORGANIZATION OF CHAPTERSChapter One contains the introduction to the project, problem definition and the importance of the project.Chapter Two contains the review of every literature used in the course of this project.Chapter three contains the research methods, the investigation of the existing system and how we intend to design the new system.Chapter four contains the system design and implementation of the new system and the maintenance schedule.Chapter five contains the summary, conclusion and recommendation of the project.

CHAPTER TWOLITERATURE REVIEW2.1BACKGROUND OF SURVEILLANCE.In todays fast paced world, it is imperative for security personnel and journalists to be armed with proper and efficient tools to respond to ever changing and unpredictable situations they encounter in performing their duties. Considering contemporary developments in technological world, surveillance serves as a valuable and essential tool for information gathering in combating criminal activities and security management. The word surveillance means keeping close watch over someone or something. In other words, surveillance involves gathering and reporting news of happenings in the community, and it is sometimes done in a surreptitious manner. However, surveillance is a French word for watching over. It may be applied to observation from a distance by means of electronic equipment. or interceptions of electronically transmitted information. It may also refer to simple, relatively no-or-low-technology methods such as human intelligence agents, investigative/journalistic reportage or postal interceptions. Police and intelligence services are paying more attention to the need of surveillance and control, especially in respect of potential trans-border crime, child pornography, terrorism, domestic disaffection. Plus many new kinds of cyber crime. Conventionally, within any society or country, information gathering and surveillance mechanisms exist for the purpose of security of lives and property. In time past, there was a significant time lag separating in time an event, incident or a crime is committed, and the time such happening or event may be publicly made available. But the emergence of new information and communication technologies has revolutionalized every aspect of human endeavors. Today, Information and Communication Technologies promise a whole new and interesting horizon characterized by boundless possibilities and opportunities. With regards to information and communication technologies, communication technologies are the nervous system of contemporary society, transmitting and distributing seasons and control information and interconnectivity, a myriad of independent units. Operationally Information and Communication Technologies, comprise digital devices either notifies of the hardware or software for transferring information. It includes low-cost means of communication, like radio, GSM/mobile phones, and digital television-not leaving out the internet. Information and Communication Technologies is the set of technology used in accomplishing one or two way communication without face-to-face meeting. The set of technology is what we see as electronic machines devices and their application that have both computing and communication capabilities. Information and Communication Technology facilitates the creation, storage, management and dissemination of information by electronic means. This draws attention to the fact that with Information and Communication Technologies in place, news gathering and information dissemination with regards to security management has been made easier. The telephone has shortened the time between the reporter and the source, reporter and editor, saving costs such as travel logistics. He added: With the advent of mobile phone, media enterprises have ensured that reporters on the ground, correspondents and stringers are only a call-away and that they are now closer to sources who are miles away. However, it is presumed that the radical changes brought in the realm of information gathering and security management through information and communication technologies revolution has affected immensely, the management of security. By and large, it is apparent that with the aid of technology, security agents and journalists can gather information without stress. For instance, security agent can use surveillance cameras to capture peoples or criminal activities without their knowledge. The devices are small enough not to be noticed. In the same vein. The usage of closed circuit television, in banks, airports, hotels, supermarkets etc seems to have discouraged theft and other criminal activities, and it has also eased or curtailed security threat.

2.2APPLICATIONS OF SURVEILLANCE SYSTEM SOFTWARESurveillance system software have swept the world with powerful force, thereby affecting the society in various ways. In this regard, we should note that technology is not merely equipment but is also an interaction between equipment and their users. In the past few decades Surveillance system software have transformed all spheres of life. Its potential for reducing manual operation in fostering the media has increased rapidly. The role of Surveillance system software has also been stressed in security management which points that, to nip any evil plan in the bud, information about such intent must be available so as to map out strategies to prevent the occurrence. That, even when these crisis, disasters or chaos occurred in the society, accurate and timely information always help to profer solution to ameliorate the situation.When it comes to information, the internet has it all. That, there is more information on computers and other Surveillance system software than one could ever possibly digest. The greatest thing about the Surveillance system is that you can use it to keep in touch with changes in the field and groups that make these changes happen. By using their search capability, you can even learn about the history itself or about a piece of equipment introduced into your office. He concluded that in this modern world everybody has to be Information and Communication Technologies compliance so as to help in providing information and constructive suggestions on how to combat terrorism and other security challenges that threaten the existence of our society.On the other hand, surveillance is a well established craft involving technique and Information and Communication Technologies gadgets which aid information gathering and security management. However, most surveillance has physical and electronic aspects and is preceded by extra caution and not infrequently by surreptitious entry.Today, in addition to anticrime advertising, case processing using media technology, and police surveillance systems based on the older technologies of audio- and videotaping, there is an abundance of newer media technologies capable of both facilitating and constraining communication, interaction and realization of fluid identities.Moreover, the digitized, computerized, and networked information and communication technologies exemplified by the Surveillance system software have created virtual worlds with their own changing norms, value and codes of practice. Altering the ways in which people engage in time and space.However, the idea of using surveillance for the purpose of information gathering and security management received a boost with the advent of internet computer. These technological transformations have created new opportunities and risks for crime and victimization, and for surveillance and crime control. For example, close circuit television cameras, information gathering, and data processing have transformed how people perceive and negotiate their social worlds with caution and reserve.In addition to improving the quick delivery of information and security management, computer and telecommunication technology can improve both the quality and quantity of information reported. Technology enables the existing news industry and security agencies to deliver its news and findings in real time, and largely increased the quantity of information that can be made available.In a related view, most media imagery and video are recorded from a perspective on or near the earth, recent years have seen the growth of imagery and video of the earth but observed from hundreds of miles above the ground. Remote- censoring satellite imagery has since the end of the cold war, grown dramatically to become an almost daily path of media content. On the Web; members of the public can type their address and see a satellite image taken of their neighborhood.Satellite imagery not only plays an important role in security and military operation, it can also be invaluable for journalists covering story on the environment or the influence of development on farm land, for example. Looking at weather patterns over time can also provide vital information and help people to prepare for severe weather.2.3COST EFFECTIVENESS AND USESInformation and communication technologies boast of wide ranging uses and benefits. These include:i. To ease generation and processing of informationii. To enhance speedy utilization or dissemination of informationiii. To simplify work and reduce costs in modern business or organizational management.iv. To facilitate the process of quality decision-making.

The indispensability of information and communication technologies when he pointed out that they are being used by many government and business organizations as a strategic weapon for gaining competitive advantage, improving productivity, promoting effective and efficient performance, improved method or organizing, controlling, directing, coordinating, planning, communication and new business development. This explains why it has been widely accepted that information technology has become the new key to business, organizational and national survival and development. No serious organization will be able to operate successfully or effectively without it in one form or the other in the 21st century.Inspite of the numerous uses and benefits from Information and Communication Technologies and surveillance in information gathering and management, many factors still remain hindrance to their effective use. Some of the factors are:i. Policy structure of the government.ii. Political factoriii. Economic factoriv. Literacy barrierv. Inadequate human resources.Under human resources, it is not a matter about the vast population of Nigeria, rather about those who are Information and Communication Technology compliant.On the significance of information and communication technologies on information gathering and security management, Surveillance system software is seen as an electronic means of capturing, processing, storing and disseminating information. It is the convergence of micro electronic, computing and telecommunication, which has become a global phenomenon of great importance and concern in all spheres-labour, productivity, trade, commerce and others.Information and communication technologies are technologies such as computer, software, peripherals and internet connections and infrastructure required to support information processing and communication function.The above is real, because, information and communication technologies facilitate the creation, storage, management and dissemination of information by electronic means. This includes, radio, television, telephone, fax. Computer and the internet.Four characteristics describe these modern Surveillance system software include; i. Interactively: Surveillance system software are effective two-way communication technologiesii. Permanent Availability: the new Surveillance system software are available 24 hours a day.iii. Global Reach: geographical distances hardly matter any moreiv. Reduced Cost for Many: Relative costs of communication have shrunk to a fraction of previous values. For effective information gathering and security management, government agencies use computer for a wide range of purposes. These include but not limited to accounting, budgeting forecasting, storage of information on birth, death, social welfare, census of population data, voting registers, among others. Today, unprecedented information are being gathered through effective surveillance with the aid of satellite and other technological gadgets.Surveillance, when examined critically, has much in common with investigative reporting, this is because investigative reporting is a master detective work. He noted that investigating reporting can be described as the more aspect of reporting. Effective surveillance can bring out more aspects of an issue or event the same with investigative reporting. Specific words are used in investigating reporting.Revealing, uncovering, unearthing.It is a fact that the above will go a long way to enhance effective security management in any human organization. However, people who may involve in the act of information gathering and security management must indeed possess the following qualities. i. Sound event analysisii. Sense of public interestiii. Research, analytical and good communication skills iv. A mind for adventurev. Capacity to make sound and balanced socio-political judgments.vi. Couragevii. Ability to see the event behind the event viii. knowledge of photojournalism ix. Computer literate x. Above all, Information and Communication Technology compliance.Surveillance and Information and Communication Technology can be effectively used when the various information gathering and disseminating agencies work together in form of synergy.Security agencies make extensive use of telecommunication in receiving and transmitting their massages. All these agencies originate in nations where the press was highly developed, the agencies came into being between 1835 and 1918.Some of the agencies which employed Information and Communication Technology for information gathering and management include the following;Reuters, Associated Press, AgencyFrance Press United Press International Reuters:Reuter is a non- profit agency with operation costs derived from subscribing media. Its services are received in almost every country. Reuters is known for its reliable alert reporting.Associated Press: A cooperative agency owned by its member newspapers, provides news to subscribers in some 10 nations. It employs 2,500 news gatherers around the world, about 560 of them full timers working outside United States. AP has about 50 bureaux in foreign countries and has exchange agreements with agencies of about a dozen countries.Agency France Press; After France was liberated at the end of World War II, several interim war agencies were merged to form the Agencies France-Press which was set up in the old Havas headquarters and took over most of the pre-war agencys employees.AFP has a staff of some 3,000 and as many clients around the world. Transmission of news is mainly by wire, but radio is being used increasingly. The agencies has some 70 Bureaux abroad and about 20 in France. Nearly half of the AFPs daily transmission is world news. It has exchange agreements with agencies in some 30 nations and with the other big world agencies.United Press InternationalIn May 1958, the United Press International was formed in the United States, when the United States Press Association and the international news service were consolidated. The UPI is known for its lively and colourful writing over the years. However, these super-powers agencies today provide the bulk of the information which the society, government and its security agents work with.2.4LEGAL ISSUES OF SURVEILLANCE AND THE LAW OF INVASION OF PRIVACYDespite the fact that surveillance, information and communication technologies serve as tools for information gathering and security management, it is apparent that the employment of CCTV cameras seems to be a direct invasion of privacy. Though, it may be argued that surveillance is in public and government interest, and as well serves as the first step towards a submissive and controlled society, the fact that the general public has the right to privacy even in public area should not be undermined.In this view, it is asserted that video surveillance is analogous to mechanical police officer. It could be added that it does not intrude upon an individual sphere of privacy, but rather records events occurring in public space for which individuals do not have reasonable expectations of privacy. Surveillance systems have a mysterious knack for justifying themselves regardless of what happens to crime. Because, when crime goes up, the cameras get credit for detecting it, and when crime goes down, they get the credit for preventing it.However, the nagging questions are; i. Which condition may warrant public surveillance? ii. What are the association legal and constitutional implications? iii. And how effective are information and communication technologies for information gathering and security management? With regard to privacy right, section 37 of the 1999 constitution of the federal republic of Nigeria made provisions guaranteeing the privacy of the citizen of the country in his home, correspondence, telephone conversation and telegraphic communication. A lot of arguments have also been raised on the necessity of privacy laws, if information must be gathered and published for and in the interest of the public.

CHAPTER THREE

RESEARCH METHODOLOGY

3.1METHODOLOGY ADOPTEDThe methodology used in this research is Structured Systems Analysis and Design Methodology. It is a set of standards for systems analysis and application design. It uses a formal methodical approach to the analysis and design of information systems. It was developed by Lear month Burchett Management Systems and the Central Computer Telecommunications Agency in 1980-1981 as a standard for developing British database projects. The Structured Systems Analysis and Design Methodology is an open methodology based on the waterfall model. It has been used by many commercial businesses, consultants, educational establishments and CASE tool developers. Thewaterfall modelis asequentialdesignprocess, often used insoftware development processes, in which progress is seen as flowing steadily downwards like awaterfall through the phases of Conception, Initiation, Analysis,Design, Construction,TestingandMaintenance. The techniques used in SSADM are logical data modeling, data flow modeling and entity behavior modeling.I. Logical Data Modeling: This involves the process of identifying, modeling and documenting data as a part of system requirements gathering. The data are classified further into entities and relationships.II. Data Flow Modeling: This involves tracking the data flow in an information system. It clearly analyzes the processes, data stores, external entities and data movement.III. Entity Behavior Modeling: This involves identifying and documenting the events influencing each entity and the sequence in which these events happen.In this project, we are going to develop a prototype software. The Prototyping Model is a systems development method in which aprototype is built, tested, and then reworked as necessary until an acceptable prototype is finally achieved from which the complete system or product can now be developed. This model works best in scenarios where not all of the project requirements are known in detail ahead of time. It is an iterative, trial-and-error process that takes place between the developers and the users.3.1.1EXPERT SYSTEMSInartificial intelligence, anexpert systemis a computer system that emulates the decision-making ability of a human expert. Expert systems are designed to solve complex problems byreasoningabout knowledge, represented primarily asrules rather than through conventionalprocedural code.The first expert systems were created in the 1970s and then proliferated in the 1980s. Expert systems were among the first truly successful forms ofAIsoftware. An expert system is divided into two sub-systems: theinference engineand theknowledge base. The knowledge base represents facts and rules. The inference engine applies the rules to the known facts to deduce new facts. Inference engines can also include explanation and debugging capabilities. 3.1.2OBJECT ORIENTED ANALYSIS AND DESIGNObject-oriented analysis and designMethod is a popular technical approach to analyzing, designing an application, system, by applying theobject-oriented paradigmand visual modeling throughout thedevelopment life cyclesto foster better stakeholder communication and product quality.3.2ANALYSIS OF THE PRESENT SYSTEMThe present system, involves the use of security guards who patrol around the school premises, on shifts. It has a centralized control with different subheads placed around the school premises. Then in 500 capacity there is no steady guard, they patrol from time to time and that does not provide a steady watch over the environment. From the interview conducted, 90 percent of the people interviewed supported the development of the software, because it will serve as a preventive measure while the remaining 10 percent did not support because they see it either as waste of resources, or another cause for unemployment. Good security management is about being proactive rather than reactive. The larger emphasis should be on prevention rather than detection. This should be borne in mind when planning school's security. The goals of the present system include: I. providing personal safety of staff, students and visitors to school premises II. Preventing Intruders and Unauthorized Visitors on school premises III. Preventing Kidnapping / Abductions / Custody Issues IV. Preventing assault / Sexual Assault V. Preventing Fire VI. Preventing Burglary and Theft VII. Preventing Vandalism

3.3ORGANIZATIONAL FLOW DIAGRAM OF THE PRESENT SYSTEM

FIG. 3.1 FLOW DIAGRAM OF THE PRESENT SYSTEM

In the flow diagram above, when an incident is suspected or reported, the appropriate team investigates. If they find it valid, its priority is determined otherwise the incident is suspended. After determination of its priority, further investigation is carried out, after which there is incident containment, eradication and control implementation. During this process there is no true picture of the incident except what witnesses say and there is high probability that their accounts will not be 100 percent true. Plenty time is spent before consideration of the priority.

3.3.1MANAGEMENT STRUCTURE OF THE PRESENT SYSTEM.

SCHOOL MANAGEMENTHEAD OF SECURITYSECURITY UNIT HEADLAYER 4SECURITY UNIT HEADLAYER 1SECURITY UNIT HEADLAYER 2SECURITY UNIT HEADLAYER 3SECURITY SYSTEMSPATROLEXTERNALPATROL INSIDE PROPERTY BOUNDARYPATROLINDIVIDUAL BUILDING

1. Layerone covers the external environment outside school environment, town and/or community, neighborhood. This layer is defined by the schools edge or the property boundary.2. Layertwo covers everything inside the school boundary school campus, fields, open grounds and groups of buildings.3. Layerthree covers individual buildings and their contents furniture, equipment, resources and students work.4. Layerfour covers security systems security alarms.3.4DEMOGRAPHIC VARIABLES OF THE NEW SYSTEMThese refer to different factors or variables to be considered when designing the program which include; I. Confusing Features: some features might be considered, especially when two names appear with different meaning.II. Inconsistent Layout design: inconsistent layout design delays users navigation.III. Human Factor: the program requires an expert user, the user must be trained on how to use the program before he or she can use it.IV. Standby Power: the program requires steady power, uninterrupted power supply and a standby power in case of power failure.3.5.ACHIEVEMENTS OF THE EXPECTED SYSTEMThe conclusions of the analysis are that the basic expectations of the new system are as follows: I. Public used areas and premises in school is to be protectedII. Reduction of Anti social behaviour and aggressiveness.III. Fear in crime participation. IV. Encourage better use of school facilities.V. The good security measure encourages continued investment in the premises.

3.6DATA FLOW DIAGRAM OF THE EXPECTED SYSTEMThe diagram below shows how data flows in the new system. This is a preliminary step used to create an overview of the system which will later be elaborated.

FIG 3.2DATA FLOW DIAGRAM OF EXPECTED SYSTEM

3.7HIGH LEVEL MODEL OF THE EXPECTED SYSTEM.

In this project, the high-level models deal with areas such as performance, reliability, availability, maintainability, and system safety. The below procedure shows how the system will run.

FIG 3.3 HIGH LEVEL MODEL OF THE EXPECTED SYSTEM.The above flowchart shows how the system run, the user of the system should be an expert analyst. After the login, it is left for the user to detect any abnormal behavior among students or people being observed.

USER LOG INUSER SELECTIONUSER VIEWS DIFFERENT SCREENANALYSISANOMALY DETECTIONINTERPRETATION

CHAPTER FOURSYSTEM DESIGN AND IMPLEMENTATION

4.1 OBJECTIVES OF THE DESIGNThe design and implementation of this work is entirely software based which gives the interrelationship between the camera and the personal computers that may be attached to the system. It therefore involves proper interfacing of the camera in motion and the PC for proper monitoring and documentation so that the security system will be effective and efficient. Interfacing is also between the PC and the DC motor which shows the angle at which the camera is to be moved for proper surveillance. The design of this system has the following objectives.I. Monitoring: In monitoring an observer can only determine the number, direction and speed of movement of people.II. Detection: In detection one can be determined within the field of view of the camera, but even the identification of a person cannot be determined. III. Recognition: A person can recognize an individual that he/she has previously seen but cannot use in court to identify a perpetrator unless confirmed by another person. IV. Identification: The quality of a picture and all details should be sufficient to enable the identification of a subject. This kind of identification can be used in court to identify a perpetrator without eye witness support, but automatic face recognition may not be possible.4.2 CONTROL CENTERAs stated earlier in this work, the entire system is software-based design. It comprises of two major parts: (a) PC based control of camera rotation, and(b) Remote viewing of video feeds from camera. However, these two parts are achieved respectively using; (i) Computer interfacing by means of serial communication, and (ii) Streaming of digital video feeds across a network. Computer interfacing can be defined as the art of connecting computers and peripherals together, so that both devices can communicate with each other. From the block diagram, figure 4.1, it is seen that it is microcontroller (B) that drives the external device which in this case is the DC motor contained in the camera holder. Thus the actual interfacing is between the PC and microcontroller (B). To achieve interfacing between the PC and microcontroller (B), microcontrollers (A and B) are both programmed with instructions which they execute. The microcontrollers perform their various functions by executing the instructions programmed into them. A camera motion control application is developed and installed on the PC. This application establishes connection between the PC and the external circuit, and sends serial data to the external circuit through the serial port4.3 SPECIFICATION OF SOFTWARE & HARDWARE REQUIREMENTHardware Requirements The software designed needed the following hardware for an effective operation of the newly designed system. 1. Minimum of Pentium IV System.2. The Random access memory (RAM) should be at least 1GB memory.3. Enhanced keyboard.4. At least 1TB hard disk.5. E.G.A/V.G.A, a colored monitor.6. Surveillance Camera7. Network Cables

Software RequirementsThe software requirements includes:- I. A window xp or higher version for faster processingII. Visual Basic Version 6.0.

4.4 OUTPUT FOR THE NEW SYSTEMThe output design was based on the inputs. The information generated gives a meaningful report to the management. The system designed will generated the following outputs.1. Video/motion 2. audioThese outputs can only be generated as softcopy or printed in hard copy as pictures while the audio can only be in audio format.

4.4.1 INPUT SPECIFICATIONThe inputs are designs generally based on the necessary data that needs to be recorded into the system. The data are captured through surveillance cameras and a microphone which are stored in a magnetic disk in an access database.

4.5 ALGORITHM OF A PROPOSED SYSTEMFIG 4.1 ALGORITHM OF A PROPOSED SYSTEM

Select menuSTARTENTER LOGIN DETAILSSelect log?Perform OperationAuto mode selected displayedSelect direction of motionSelect direction in which motion startsSpecify no of windowsUser mode selectedMode selectSpecify no of windowsCamera selectedBack to menuCapturing inputs.STOP

V.

FIG 4.2 OVERALL DATA FLOW

VGA monitorBlock memory matrix Video DecoderBlock memory ReceiverBlock memory matrix Video EncoderBlock memoryTransmitterINPUT IMAGEVideo CaptureVI. 7u7687677yuyujg7t67yuyggghgygu

4.6. DATA DICTIONARYTermDefinition

Angle of ViewFor security cameras, this refers to the angular range in degrees that you can focus the camera on without distorting the image. When focusing close up, you can generally see a wide angle of view. If the focus is distant, the angle of view is smaller or narrower.

AudioTo record the sound, your recording device needs to support audio (must have at least one audio input).

CompressionRefers to taking an incoming signal or image, which can be analog or digital, and compressing the data so it can be stored or transmitted faster and using less resources. There are many different algorithms and techniques that are used to compress data.

CovertA covert application refers to a situation where you don't want the person to know that they are being watched or recorded. Also known as 'hidden' cameras.

Day/Night Camera"Day/Night Cameras" are regular cameras with an especially sensitive CCD chip that allows a good image to be captured in very low ambient lighting (regular lighting - not infrared). Do not confuse these cameras with "Night Vision" cameras which is another name for infrared cameras.

Select CameraThis button allows the user to specify the particular camera to use

modeThis allows the user to either select the video option or the picture capture option

Log inThis interface makes the application to be accessed by authorized personnel only by providing the user name and password lock

zoomThis interface enables the user to magnify the lens on an object

Storage This tab gives the user access to stored files in the system

4.7 CHOICE AND JUSTIFICATION OF PROGRAMMING LANGUAGEBoth user interface applications are developed using Visual Basic programming language. The applications developed are implemented to enable the user to view video feeds from the camera as well as to record video footage of events and save the recorded footage on the PC. The developed system also has playback capability which can play saved video footage whenever the user wishes to do so. There is no limit to the number of cameras that this application can accommodate. As long as the cameras are assigned a unique address by the programmer, the camera video feed can be displayed by the application. The Camera Motion Control application controls the direction in which the camera faces. It is equipped with a user-control mode and an auto-control mode.

CHAPTER FIVE5.1SUMMARYFederal Polytechnic Nekede should have appropriate security measures in place. Security is not just about choosing the right control measures; it is an attitude of mind. To ensure the support of staff, they should be involved in the planning of security measures. All school staff, teaching and non-teaching should be familiar with security procedures. Please remember, security is everyones responsibility. Security and personal safety should be dealt with from a Risk Management point of view (i.e. taking steps to reduce the likelihood of loss or damage to the school or injury to staff and pupils). It could be included within a combined Safety and Security Plan/Policy for the school and be an agenda item for Schools Board meetings, even if it is not intended to discuss specific security issues. Information and communication system is one of the best choices for crime control and monitoring, especially in the high institutions, where huge budget is spent on security, therefore this system is proposed for 500 capacity, Federal Polytechnic Nekede where crime rate is increasing day by day, and law enforcement agencies requires latest technology to overcome such situations.

5.2CONCLUSIONSurveillance as a tool for information gathering and security management remain a vital aspect of our life. It is important to note that at the federal, state, high institutions such as Federal Polytechnic Nekede Owerri and even in remote areas, security management has become an issue of great concern. The contribution of surveillance in security management goes beyond the comprehension of the ordinary man on the street. However, at this critical stage of our Campus life, where insecurity of lives and properties remain as issue of worry and where staff and students now live with uncertainty and fear, where they are forced to sleep with one eye open, the employment of surveillance seems vital.If surveillance is properly managed in Federal Polytechnic Nekede, the current problems of cultism and harassment of students can be reduced drastically. This will be achieved with the usage of effective ICT and employment of well trained personnel to enhance their effective use.

5.3RECOMMENDATIONBased on a careful and in depth study undertaken in the course of this research, some setbacks were observed in the existing method of surveillance in 500 capacities, Department of Computer Science Federal Polytechnic Nekede. Which this research work is aimed at improving/correcting.School systems has been on without this new system but I recommend that Schools should try and adopt this new system, which according to research is more beneficiary, compared to the existing system in terms of efficient security services. In so many developed countries computer system are being used in almost every aspect of technology and it has been as a mark of advancement therefore, I recommend that the government and school management should nature this project by providing the necessary needs for its implementation in order to make it available for every department in Federal Polytechnic Nekede.School systems have unique challenges in protection of students life and properties and a good surveillance system play a legitimate role in contributing to operator safety, particularly in the detection of crime.As part of the critical infrastructure of modern societies, school environments are viewed as desirable targets for terrorists therefore It is feasible to successfully implement this project in school due to the fast response to irregular activities seen on camera.This project is still open for further research because of the rapid changes in the computer world and even the software industry will bring much improvement on the expert system.

1