SlideShare a Scribd company logo
1 of 3
Download to read offline
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Electronic
Gauri Phadtare,
Bharti Vidyapeeth's Institute of Management and
ABSTRACT
There have been research on the CCTV (closed circuit
television) for safety purpose as an investigative tool.
Using CCTV was associated with very significantly
increased chance of crime have been solved for all
crime types. Evidences like images are most likely
used to catch the person who did the crime, the
usefulness of CCTV is limited by several factors
,mostly the public areas are not covered .This research
paper is on all about how CCTV has been useful for
humans for secure and safety purpose. Electronic
Surveillance features of society globally , this paper
also focus on healthcare context. This paper is based
on what I have researched while searching topic on
Electronics Surveillance.
Keywords: Surveillance Studies, Electronics,
Information Technology, Surveillance.
I. INTRODUCTION
These system consist of cameras with monitors and
video recorders. The cameras may be fixed range or
less pixel of quality. But nowadays
been developing quality like now they have pan, tilt,
zoom which can use as per need of persons. Image
and video captured and stored and also retrieved
anytime in future. The quality of the equipment used
is a chief determinant of outcomes. The positioning is
also important for maximum security for covering
large area and comes under safety. All these factors
need to be taken care while installing the CCTV
surveillance system at that particular place.[1]
If you want to keep your home safe, electronic
surveillance can monitor what is happening in your
home even while you are away. The same applies to a
place of business. A combination of video and audio
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Electronic Surveillance
Gauri Phadtare, Anushree Goud
Bharti Vidyapeeth's Institute of Management and Information Technology
Mumbai, Maharashtra, India
on the CCTV (closed circuit
as an investigative tool.
was associated with very significantly
increased chance of crime have been solved for all
crime types. Evidences like images are most likely
who did the crime, the
usefulness of CCTV is limited by several factors
c areas are not covered .This research
been useful for
humans for secure and safety purpose. Electronic
Surveillance features of society globally , this paper
also focus on healthcare context. This paper is based
I have researched while searching topic on
Surveillance Studies, Electronics,
consist of cameras with monitors and
video recorders. The cameras may be fixed range or
cameras have
been developing quality like now they have pan, tilt,
zoom which can use as per need of persons. Image
captured and stored and also retrieved
anytime in future. The quality of the equipment used
The positioning is
also important for maximum security for covering
large area and comes under safety. All these factors
care while installing the CCTV
surveillance system at that particular place.[1]
If you want to keep your home safe, electronic
surveillance can monitor what is happening in your
home even while you are away. The same applies to a
s. A combination of video and audio
surveillance gives you the most complete picture of
what is happening at a specific place and time
a way to oversee behavior, activity, and information
for the purpose of protecti
influencing a certain location.
Surveillance is used by governments for intelligence
gathering, prevention of crime, the protection of a
process, person, group or object, or the investigation
of crime. It is also used by criminal organizat
plan and commit crimes, such as robbery and
kidnapping, by businesses to gather intelligence.
A criminal investigation can be think as serious
question like; what happen exactly behind them and
who was involved in the crime, where did it happen,
when did it took place ,and anyone get harmed or not.
It plays the important role to catch any incident
happen in absence of that person.[1][2]
While researching on this topic “Electronic
Surveillance” I got to known that surveillance is not
limited to watch over on any one or any place under
surveillance of cameras but it is also the meaning
any observant that if any thing related to health can be
detected by perfect observation on that particular
place or area.
There are some example on it one of them
below:
EXAMPLE:
Every one know that electronic surveillance may use
as technology to gather data the purposes of that
surveillance, but here case is different; Internet search
engines are mostly used for searching some sort of
related data, like if somebody had any type of illness
Jun 2018 Page: 1623
www.ijtsrd.com | Volume - 2 | Issue – 4
Scientific
(IJTSRD)
International Open Access Journal
Information Technology (BVMIT)
surveillance gives you the most complete picture of
what is happening at a specific place and time.[2] It is
a way to oversee behavior, activity, and information
for the purpose of protecting, managing, or
is used by governments for intelligence
gathering, prevention of crime, the protection of a
process, person, group or object, or the investigation
of crime. It is also used by criminal organizations to
plan and commit crimes, such as robbery and
kidnapping, by businesses to gather intelligence.
criminal investigation can be think as serious
question like; what happen exactly behind them and
who was involved in the crime, where did it happen,
en did it took place ,and anyone get harmed or not.
It plays the important role to catch any incident
son.[1][2]
While researching on this topic “Electronic
Surveillance” I got to known that surveillance is not
over on any one or any place under
surveillance of cameras but it is also the meaning that
thing related to health can be
detected by perfect observation on that particular
There are some example on it one of them are listed
Every one know that electronic surveillance may use
as technology to gather data the purposes of that
surveillance, but here case is different; Internet search
engines are mostly used for searching some sort of
if somebody had any type of illness
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 1624
rather to go doctor they first search on GOOGLE for
the remedy so they can use and have some temporary
relief on that illness.[3]
When some people gets the symptoms of illness the
first thing they do is search the remedy on GOOGLE.
[3]GOOGLE has masses of up to date data of their
visitors. The medication and information for specific
illness searching, by analyzing the terms that person
use for relevant specific symptoms, like some
particular area at particular time then it can find that
some sort of illness in that area and by tracking their
performance healthcare can be provided before any
thing serious can happen.
Such kind of partice can use for tracking dengue, HIV
or some kind of major illness spreading in that area.
The advantage of this type is that it allows for rapid
detection and prediction of illness in area so
precaution can be provided at that time
II Scope
The main objective of this document is to make
people aware that what is the technique they are using
and what are methods which are behind to the logic
and what does make CCTV help in the real life. These
Consist of great technology along with the some
algorithms which make it so very much useful in the
market and also very demanding these days.
Many times the cameras are assumed to do job of
everything that can be recorded and particular
incidents can be viewed based on the offences that
just happened when that person is not around in area.
If person wants to see what happens behind him/her
on that particular location then he/she can put the
CCTV and for some time they can rely on the CCTV
and then after they can retrieved the images or videos
of what happen in absences.[1][3]
III Literature Survey
The survey has been seen that some time CCTV
cannot be so helpful as people think, it can be used as
the purpose to keep watch on particular person at any
time and from any where.
The problem like;
Any person can keep camera or any video device just
to watch that person to what doing or what activity
they do at their place.
Cyber crime any video device including CCTV can be
hack or can be destroyed by using some device which
can stop that recording or make some disturbance
while recording the any particular incident.[4]
Some kind of people can use such device just to earn
some money by using their personal video and by
blackmailing them.
As per the device is used their maintains cost also
increases, some people can’t afford such highly
technique device and adjust on affordable device and
then device cant capture properly image or images can
get blur while zoom in.
Such problems can arises while we uses the CCTV.
IV Existing system
The system nowadays are used in places are highly
developed and used for avoiding or catching the
anyone who does some action on their absence. Now
the system have moving face monitor like in front of
them person moves from left to right them monitor or
camera also move with them, so camera moves so the
range also gets wider and camera can see a lot more
than still cameras.
They have zoom in movement also where it can zoom
in at that particular place and capture the image ,lot of
high techniques are develop in this field.
Existing system can save the place from crime and
lots of incident can be avoided if many of public or
private place have CCTV at their place.
It can be better proof for investigation purpose, and
using better quality of device can give lots of benefits
for safety.[3][4]
V Working
The working of CCTV is very simple but in care-full
way[4];
1.First think or search such a place from where large
area can get under the eye of camera and then set the
CCTV over there, stores them in the data.
2. Second think see how much the camera can catch
the range and quality of camera so after the incident
or ant thing happened that time image and video can
be see clearly.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 1625
3. Keep the CCTV for safety purpose only not for any
illegal reason.
4. Keep CCTV always on and recording mode cause
some people think just keeping CCTV on standby
mode criminal can get scare and they can’t do
anything, but some people can be smart also.
5. Major think keep CCTV camera in such a place so
no one can catch the CCTV and you can catch them
easily.
VI Conclusion
In conclusion most of public places or private places
must have CCTV for there safety perspective. They
must have security if their local areas are not good, so
to avoid the crimes like kidnapping, robbery, murders,
etc can reduce at least ground level.
VII Reference
1. The Effect Of CCTV on Public safety:
Research roundup.
2. The Role of CCTV Surveillance Systems in
Reducing Crime in Town Centers.
3. https://research-
paper.essayempire.com/examples/argumentati
ve/electronic-surveillance-research-paper/
4. The Value of CCTV Surveillance Cameras as
an Investigative Tool: An Empirical Analysis.

More Related Content

What's hot

SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
sandhibhide
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
Muhammad Zeeshan
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
Malasta Hill
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
Malaysia University of Science and Technology (MUST)
 

What's hot (18)

SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
 
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual Device
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
Developing technology
Developing technologyDeveloping technology
Developing technology
 
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 

Similar to Electronic Surveillance

Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...
Ann Johnson
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptx
itzmerhuzieeee
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 

Similar to Electronic Surveillance (20)

Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
Public Health Surveillance Systems
Public Health Surveillance SystemsPublic Health Surveillance Systems
Public Health Surveillance Systems
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...
 
Presentation eco.pptx
Presentation eco.pptxPresentation eco.pptx
Presentation eco.pptx
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA Essay
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
 
AI/ ML solutions to tackle COVID-19
AI/ ML solutions to tackle COVID-19AI/ ML solutions to tackle COVID-19
AI/ ML solutions to tackle COVID-19
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptx
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTION
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Electronic Surveillance

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research Electronic Gauri Phadtare, Bharti Vidyapeeth's Institute of Management and ABSTRACT There have been research on the CCTV (closed circuit television) for safety purpose as an investigative tool. Using CCTV was associated with very significantly increased chance of crime have been solved for all crime types. Evidences like images are most likely used to catch the person who did the crime, the usefulness of CCTV is limited by several factors ,mostly the public areas are not covered .This research paper is on all about how CCTV has been useful for humans for secure and safety purpose. Electronic Surveillance features of society globally , this paper also focus on healthcare context. This paper is based on what I have researched while searching topic on Electronics Surveillance. Keywords: Surveillance Studies, Electronics, Information Technology, Surveillance. I. INTRODUCTION These system consist of cameras with monitors and video recorders. The cameras may be fixed range or less pixel of quality. But nowadays been developing quality like now they have pan, tilt, zoom which can use as per need of persons. Image and video captured and stored and also retrieved anytime in future. The quality of the equipment used is a chief determinant of outcomes. The positioning is also important for maximum security for covering large area and comes under safety. All these factors need to be taken care while installing the CCTV surveillance system at that particular place.[1] If you want to keep your home safe, electronic surveillance can monitor what is happening in your home even while you are away. The same applies to a place of business. A combination of video and audio @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Electronic Surveillance Gauri Phadtare, Anushree Goud Bharti Vidyapeeth's Institute of Management and Information Technology Mumbai, Maharashtra, India on the CCTV (closed circuit as an investigative tool. was associated with very significantly increased chance of crime have been solved for all crime types. Evidences like images are most likely who did the crime, the usefulness of CCTV is limited by several factors c areas are not covered .This research been useful for humans for secure and safety purpose. Electronic Surveillance features of society globally , this paper also focus on healthcare context. This paper is based I have researched while searching topic on Surveillance Studies, Electronics, consist of cameras with monitors and video recorders. The cameras may be fixed range or cameras have been developing quality like now they have pan, tilt, zoom which can use as per need of persons. Image captured and stored and also retrieved anytime in future. The quality of the equipment used The positioning is also important for maximum security for covering large area and comes under safety. All these factors care while installing the CCTV surveillance system at that particular place.[1] If you want to keep your home safe, electronic surveillance can monitor what is happening in your home even while you are away. The same applies to a s. A combination of video and audio surveillance gives you the most complete picture of what is happening at a specific place and time a way to oversee behavior, activity, and information for the purpose of protecti influencing a certain location. Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizat plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence. A criminal investigation can be think as serious question like; what happen exactly behind them and who was involved in the crime, where did it happen, when did it took place ,and anyone get harmed or not. It plays the important role to catch any incident happen in absence of that person.[1][2] While researching on this topic “Electronic Surveillance” I got to known that surveillance is not limited to watch over on any one or any place under surveillance of cameras but it is also the meaning any observant that if any thing related to health can be detected by perfect observation on that particular place or area. There are some example on it one of them below: EXAMPLE: Every one know that electronic surveillance may use as technology to gather data the purposes of that surveillance, but here case is different; Internet search engines are mostly used for searching some sort of related data, like if somebody had any type of illness Jun 2018 Page: 1623 www.ijtsrd.com | Volume - 2 | Issue – 4 Scientific (IJTSRD) International Open Access Journal Information Technology (BVMIT) surveillance gives you the most complete picture of what is happening at a specific place and time.[2] It is a way to oversee behavior, activity, and information for the purpose of protecting, managing, or is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence. criminal investigation can be think as serious question like; what happen exactly behind them and who was involved in the crime, where did it happen, en did it took place ,and anyone get harmed or not. It plays the important role to catch any incident son.[1][2] While researching on this topic “Electronic Surveillance” I got to known that surveillance is not over on any one or any place under surveillance of cameras but it is also the meaning that thing related to health can be detected by perfect observation on that particular There are some example on it one of them are listed Every one know that electronic surveillance may use as technology to gather data the purposes of that surveillance, but here case is different; Internet search engines are mostly used for searching some sort of if somebody had any type of illness
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 1624 rather to go doctor they first search on GOOGLE for the remedy so they can use and have some temporary relief on that illness.[3] When some people gets the symptoms of illness the first thing they do is search the remedy on GOOGLE. [3]GOOGLE has masses of up to date data of their visitors. The medication and information for specific illness searching, by analyzing the terms that person use for relevant specific symptoms, like some particular area at particular time then it can find that some sort of illness in that area and by tracking their performance healthcare can be provided before any thing serious can happen. Such kind of partice can use for tracking dengue, HIV or some kind of major illness spreading in that area. The advantage of this type is that it allows for rapid detection and prediction of illness in area so precaution can be provided at that time II Scope The main objective of this document is to make people aware that what is the technique they are using and what are methods which are behind to the logic and what does make CCTV help in the real life. These Consist of great technology along with the some algorithms which make it so very much useful in the market and also very demanding these days. Many times the cameras are assumed to do job of everything that can be recorded and particular incidents can be viewed based on the offences that just happened when that person is not around in area. If person wants to see what happens behind him/her on that particular location then he/she can put the CCTV and for some time they can rely on the CCTV and then after they can retrieved the images or videos of what happen in absences.[1][3] III Literature Survey The survey has been seen that some time CCTV cannot be so helpful as people think, it can be used as the purpose to keep watch on particular person at any time and from any where. The problem like; Any person can keep camera or any video device just to watch that person to what doing or what activity they do at their place. Cyber crime any video device including CCTV can be hack or can be destroyed by using some device which can stop that recording or make some disturbance while recording the any particular incident.[4] Some kind of people can use such device just to earn some money by using their personal video and by blackmailing them. As per the device is used their maintains cost also increases, some people can’t afford such highly technique device and adjust on affordable device and then device cant capture properly image or images can get blur while zoom in. Such problems can arises while we uses the CCTV. IV Existing system The system nowadays are used in places are highly developed and used for avoiding or catching the anyone who does some action on their absence. Now the system have moving face monitor like in front of them person moves from left to right them monitor or camera also move with them, so camera moves so the range also gets wider and camera can see a lot more than still cameras. They have zoom in movement also where it can zoom in at that particular place and capture the image ,lot of high techniques are develop in this field. Existing system can save the place from crime and lots of incident can be avoided if many of public or private place have CCTV at their place. It can be better proof for investigation purpose, and using better quality of device can give lots of benefits for safety.[3][4] V Working The working of CCTV is very simple but in care-full way[4]; 1.First think or search such a place from where large area can get under the eye of camera and then set the CCTV over there, stores them in the data. 2. Second think see how much the camera can catch the range and quality of camera so after the incident or ant thing happened that time image and video can be see clearly.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 1625 3. Keep the CCTV for safety purpose only not for any illegal reason. 4. Keep CCTV always on and recording mode cause some people think just keeping CCTV on standby mode criminal can get scare and they can’t do anything, but some people can be smart also. 5. Major think keep CCTV camera in such a place so no one can catch the CCTV and you can catch them easily. VI Conclusion In conclusion most of public places or private places must have CCTV for there safety perspective. They must have security if their local areas are not good, so to avoid the crimes like kidnapping, robbery, murders, etc can reduce at least ground level. VII Reference 1. The Effect Of CCTV on Public safety: Research roundup. 2. The Role of CCTV Surveillance Systems in Reducing Crime in Town Centers. 3. https://research- paper.essayempire.com/examples/argumentati ve/electronic-surveillance-research-paper/ 4. The Value of CCTV Surveillance Cameras as an Investigative Tool: An Empirical Analysis.