Beruflich Dokumente
Kultur Dokumente
Contents
Introduction iwatch surveillance Access control system GPS overview RFID Conclusion Scope of the work
References
Introduction
Electronic security pertains to leveraging technology in safeguarding assets by preventing unauthorized access to people and property. The government has been a traditional and major consumer of such security services. The commercial segment also uses such devices for their employees and critical data infrastructure. Electronics Security Systems consists of following type of systems Video Surveillance/CCTV system GPS based tracking systems Access control system RFID based applications
iWATCH surveillance
iWATCH DVR based surveillance system is the most advanced video surveillance system which is capable of not only recording and live monitoring, this system comes inbuilt with advanced video analytic and alarm notification functionalities. iWATCH CCTV Surveillance provides three type of CCTV solutions for any scenario. 1. Standalone Monitoring Solution 2. Remote monitoring Solution 3. Multi Location Remote Solution
iWATCH DVR
Embedded operating system,1 SATA HDD supports max 2000 GB, Live display at D1 resolution, Real-time recording at CIF resolution, VGA and Video OUT, USB for data backup. Model: IW E9004 (4 channel video DVR) Embedded operating system,2 SATA HDD supports max 2000 GB each, Live display at D1 resolution, Real-time recording at CIF resolution, VGA and Video OUT, USB for data backup, Supports Alarm and PTZ, Remote view thru inbuilt web server and CMS. Model: IW A9004/08/16 (4 channel video DVR 2 Channel Audio )
Video Compression
MJPEG, MPEG-4 and H.264 are three major video compression technologies used by the IP surveillance industry. Each technology has a different compression ratio and is intended for different applications and purposes.
MPEG-4
Compressed file size of MJPEG, MPEG-4 and H.264 Department of Electronics and Communication Engineering, MIT, Manipal
2. Recording
2. Video Playback
3. E-map
4. Auto back up
5. Failure report
System Design
Before deploying an IP surveillance system, having a layout map of the site at hand to identify the shooting purposes of each network camera is necessary and useful. The map gives you an overview of the installation site and helps you have an in-depth discussion with your customers. Viewing Considerations : direction, distance, angle, object Environmental considerations: day/night,light, outdoor, indoor, mounting, power outlet, Audio, bandwidth, storage System planning: Camera considerations - Indoor or outdoor, compression formats, cabling, resolution. Hardware considerations - PC, wireless access point, NVR Software considerations- central management software, browser, other s/w
Department of Electronics and Communication Engineering, MIT, Manipal
Video content analysis in centralized architecture Department of Electronics and Communication Engineering, MIT, Manipal
Tamper detection
Loitering Detection
People Counting License Plate Recognition Department of Electronics and Communication Engineering, MIT, Manipal
Solution provided
We propose Fingerprint and Mifare card based system as an alternative. This system uses fingerprint of the user to
fingerprint reader.
The system consists of Mifare Card
Magnetic Lock
Access Reports
Department of Electronics and Communication Engineering, MIT, Manipal
GPS Overview
Hardware Section: The main function of this system is to keep a track of the position of a particular asset and its speed. The information regarding position and the speed will be provided by the GPS module.
Block Diagram:
89S52
Two protocols which we will be using RMC protocol Multicast communication by means of the RMC protocol involves three key entities: the sending and receiving applications, the RMC protocol itself, and an underlying best effort multicast service, such as IP multicast. RMC is a NAK-based protocol. VTG protocol VTGCourse Over Ground and Ground Speed among the two we will prefer the VTG protocol for the simple reason that it provides with the speed in km/hr as well as in knots. Whereas RMC protocol provides us with speed only in knots.
Software: TRAX
TraX incorporates state-of-the-art GPS-based tracking, GIS based real time monitoring, an easy-to-use two way communication facility and new-age security alarm feature. It also fuses powerful reporting capabilities, enabling cost-effective maintenance.
SGP-20
Key Features: Frequency: or 850/1900 Platform: Standby Platform GPS: Screen: 128x160 176x220 (opt) Dimension: mm Battery: Talk Time: Standby Time: Antenna: GPS/GSM Quick Keys: GPS GSM 900/1800 NXP Long SiRF III Chipset 1.8 65K TFT 2.2 65K TFT 106x46x15.5 1500 MAH 5-6 Hrs >1000 hrs Internal One key for One key for
ST-X200
On Route Replay
RFID System
RFID System Tags consists of antenna and a microchip Readers consists of a transmitter, receiver, and one or more antennas Management system Communication protocol Computer Networks
RFID TAG Tag is a device used to transmit information such as a serial number to the reader in a contact less manner. Classified as : Passive Active Semi-passive
RFID Reader
Also known an interrogator Reader powers the tag by sending it RF energy Can be handheld or stationary Consists of: Transmitter Receiver Antenna Microprocessor Memory Controller or Firmware Communication channels Power
Department of Electronics and Communication Engineering, MIT, Manipal
conclusion
Surveillance is, quite simply, observations conducted to gain information. This simple definition includes a plethora of techniques and methods that can be considered a form of surveillance. Many of these are recognizable through common knowledge produced by popular culture. The most well known methods include stationary surveillance, technical surveillance (typically covert video or audio recordings), electronic surveillance (digital observations, keystroke counting), and many more. .One of the most desired high end security system features is integrating video surveillance and electronic access control systems. Increasing penetration of the Internet and the development of innovative technologies have encouraged rapid growth of the IP surveillance industry, driving changes in the video surveillance market. It is expected that IP surveillance will be dominating the video surveillance market in the near future, with network cameras and video servers being major trends.
References
[1] Sehgal, V.K. , "An Embedded Interface for GSM Based Car Security System Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference . [2] Sedky, M.H. Moniri, M. ; Chibelushi, C.C. , Classification of smart video surveillance systems for commercial applications, IEEE International Conference on Advanced Video and Signal based Surveillance
END