This document provides an overview of installing closed-circuit television (CCTV) cameras at the Institute for Human Development & Information Technology (IHDIT) in Kano, Nigeria. It discusses the history and achievements of IHDIT, the importance of security cameras, different types of cameras and their components. The author proposes installing CCTV cameras to improve security and monitoring at IHDIT facilities, and provides a budget and plan for the camera installation project.
This is the background of oneVillage Foundation with innovative approach to deliver the power of technology and information to people in Internet-deprived regions, giving them valuable tools for building better lives. OVF is founded by Joy Tang, who is active in sustainable education and development, promotion of indigenous culture heritage, creation of ecotourism as social enterprise and designing appropriate information and communication technology (ICT) devices and solutions to facilitate collaboration and learning.
Focus Group Discussion on UC Browser Bangladesh TVCShagufta Rahman
A report on the results acquired from focus group discussion regarding a Bangladesh TV Commercial, UC Browser. And analysis of the consumer behavior regarding the service/product.
GAETSS Gamification and Enabling Technologies August 2014 NewsletterDavid Wortley
In GAETSS August Newsletter
• UKTI Digital Gaming International Festival - Liverpool
• The CRe-AM Creative Industries Community Project
• propels Diabetes Study – Education and Exercise Tracking
• APAN Healthcare Webcast on Enabling Technologies to Empower the Disabled
• i-CREATe 2014 Singapore Conference on Assistive Technologies
• Global Health Education TimeTag TV Portal
• BBC Radio Leicester Interview on Lifestyle Technology and Gamification Institute
• PERA LEAP Programme for Funding Innovation
• World Innovation Summit on Education (WISE) Accelerator Initiative
• BankTech Asia 2014
• IFTTT Applications and the Internet of Things
• Upcoming Conferences and Seminars Listing
• Slideshare Archives
Innovation as a National Capability: Intellectual Capital and the Accelerati...Chinenye Mba-Uzoukwu
I raise the critical role of human capital as the obvious but largely de-emphasised aspect of the rhetoric in Nigeria on accelerating economic growth in the Digital Age. There is a disconnect between the politics of our national aspirations and concerted sustained policy initiatives over the past 3 decades that questions the commitment of our leadership - political and business alike - to bringing about this change. Ther is adequate literature to show that "for an economy competing at the global frontier, an innovation-based growth strategy requires a well-developed technological infrastructure, a set of capabilities-focused technology policies, as well as an institutional environment that stimulates innovation and entrepreneurship." (Koh, Winston T.H. and Wong, Poh Kam) We must across Africa, and in particular its pivots of Nigeria, Egypt and South Africa (Morroco, Kenya and Cote d'voire also) anchor innovation-led growth on human capital primarily.
This is the background of oneVillage Foundation with innovative approach to deliver the power of technology and information to people in Internet-deprived regions, giving them valuable tools for building better lives. OVF is founded by Joy Tang, who is active in sustainable education and development, promotion of indigenous culture heritage, creation of ecotourism as social enterprise and designing appropriate information and communication technology (ICT) devices and solutions to facilitate collaboration and learning.
Focus Group Discussion on UC Browser Bangladesh TVCShagufta Rahman
A report on the results acquired from focus group discussion regarding a Bangladesh TV Commercial, UC Browser. And analysis of the consumer behavior regarding the service/product.
GAETSS Gamification and Enabling Technologies August 2014 NewsletterDavid Wortley
In GAETSS August Newsletter
• UKTI Digital Gaming International Festival - Liverpool
• The CRe-AM Creative Industries Community Project
• propels Diabetes Study – Education and Exercise Tracking
• APAN Healthcare Webcast on Enabling Technologies to Empower the Disabled
• i-CREATe 2014 Singapore Conference on Assistive Technologies
• Global Health Education TimeTag TV Portal
• BBC Radio Leicester Interview on Lifestyle Technology and Gamification Institute
• PERA LEAP Programme for Funding Innovation
• World Innovation Summit on Education (WISE) Accelerator Initiative
• BankTech Asia 2014
• IFTTT Applications and the Internet of Things
• Upcoming Conferences and Seminars Listing
• Slideshare Archives
Innovation as a National Capability: Intellectual Capital and the Accelerati...Chinenye Mba-Uzoukwu
I raise the critical role of human capital as the obvious but largely de-emphasised aspect of the rhetoric in Nigeria on accelerating economic growth in the Digital Age. There is a disconnect between the politics of our national aspirations and concerted sustained policy initiatives over the past 3 decades that questions the commitment of our leadership - political and business alike - to bringing about this change. Ther is adequate literature to show that "for an economy competing at the global frontier, an innovation-based growth strategy requires a well-developed technological infrastructure, a set of capabilities-focused technology policies, as well as an institutional environment that stimulates innovation and entrepreneurship." (Koh, Winston T.H. and Wong, Poh Kam) We must across Africa, and in particular its pivots of Nigeria, Egypt and South Africa (Morroco, Kenya and Cote d'voire also) anchor innovation-led growth on human capital primarily.
Indo Africa Times, a weekly newspaper has its key intend to create extensive awareness amongst people about Africa and India concerning different sectors like economy, politics, culture, fashion, sports and many more. It is our sincere endeavor to bridge the information gap between Africa and India by endowing our readers with updated and latest developments occurring in both the countries.
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...Angela Stubbs
Connect with the latest business information and services with Kingston Council's November issue of the Business Bulletin and visit our new business website at www.kingston.vic.gov.au/business. Our free online Business Directory helps customers and suppliers find what they need, so register on our website.
Students' Industrial Work Experience Scheme (SIWES) is a scheme developed for Undergraduates in NIGERIA to gain experience in the industry before graduating.
Opportunities for Startups in Union Budget 2022Vinit Deo
Posiview Ventures along with Centre for Innovation Incubation and Enterprise(CIIE), SPPU (Pune University) is glad to present its
Knowledge Capsule on Union Budget 22-23 : Opportunities for Start-ups.
We hope you find it useful.
Dr. Apoorva Palkar
Director - Innovation, Incubation & Linkages
Savitribai Phule Pune University
CA Vinit Deo
CA Prajakta Shetye-Deo
Posiview Ventures
mdoffice@posiview.in
#sppu #ciie #posiviewventures #languageofgrowth #budget22 #startups #innovation #startupindia #venturecapital
This issue of Connect: Our Social Agenda highlights some of the awesome activities and initiatives launched across the Bank throughout the third quarter.
With only one quarter left in the year, we can reflect back at our achievements so far, while looking forward to those yet to come. Kicking off the summer, our KSA offices focused on sustainability through the introduction of a paper recycling program. Back in the UAE, we introduced a lactation room for new mothers’ in August, followed by parking for expectant mothers’ in September. Closing out the quarter, our volunteers took the spotlight at the Exchanger Summit where they were recognized for their ongoing efforts and dedication.
Looking ahead, we will be focusing on health and wellness with an emphasis on breast cancer awareness and men’s health. We will also be wrapping up preparations for our first ever sustainability report, to be publicly released in 2017 Q1.
Read about these and our other exciting initiatives in the pages to come.
TeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-UzoukwuChinenye Mba-Uzoukwu
Putting the teachers first is critical to transforming education especially in the Digital Age. The world-over, countries like Nigeria struggling with broken public education systems and a huge deficit in education infrastructure - human and physical. Generations are slipping, falling through the yawning chasms in our countries and we must "act with the urgency of now" to save our Tomorrow. This action must be massive and decisive in scale. I argue that at a minimum this should focus on a country-scale deployment of education technology to close the this gap but must also make a similar massive effort in retooling and re-orienting the teachers for blended learning, classroom and school management in reconfigured, minimalized, entry-level technology enabled learning environments.
In January 2017, the Business and Sustainable Development Commission highlighted the huge economic opportunity inherent in meeting the UN 2030 Sustainable Development Goals (the Global Goals).
Dec 2013 Gamification and Immersive Technology Strategies E newsletterDavid Wortley
This document is the Gamification and Immersive Technology Strategies December 2013 E-Newsletters with updated information on Gamification, Recent Events, New models and theories and Upcoming events
Indo Africa Times, a weekly newspaper has its key intend to create extensive awareness amongst people about Africa and India concerning different sectors like economy, politics, culture, fashion, sports and many more. It is our sincere endeavor to bridge the information gap between Africa and India by endowing our readers with updated and latest developments occurring in both the countries.
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...Angela Stubbs
Connect with the latest business information and services with Kingston Council's November issue of the Business Bulletin and visit our new business website at www.kingston.vic.gov.au/business. Our free online Business Directory helps customers and suppliers find what they need, so register on our website.
Students' Industrial Work Experience Scheme (SIWES) is a scheme developed for Undergraduates in NIGERIA to gain experience in the industry before graduating.
Opportunities for Startups in Union Budget 2022Vinit Deo
Posiview Ventures along with Centre for Innovation Incubation and Enterprise(CIIE), SPPU (Pune University) is glad to present its
Knowledge Capsule on Union Budget 22-23 : Opportunities for Start-ups.
We hope you find it useful.
Dr. Apoorva Palkar
Director - Innovation, Incubation & Linkages
Savitribai Phule Pune University
CA Vinit Deo
CA Prajakta Shetye-Deo
Posiview Ventures
mdoffice@posiview.in
#sppu #ciie #posiviewventures #languageofgrowth #budget22 #startups #innovation #startupindia #venturecapital
This issue of Connect: Our Social Agenda highlights some of the awesome activities and initiatives launched across the Bank throughout the third quarter.
With only one quarter left in the year, we can reflect back at our achievements so far, while looking forward to those yet to come. Kicking off the summer, our KSA offices focused on sustainability through the introduction of a paper recycling program. Back in the UAE, we introduced a lactation room for new mothers’ in August, followed by parking for expectant mothers’ in September. Closing out the quarter, our volunteers took the spotlight at the Exchanger Summit where they were recognized for their ongoing efforts and dedication.
Looking ahead, we will be focusing on health and wellness with an emphasis on breast cancer awareness and men’s health. We will also be wrapping up preparations for our first ever sustainability report, to be publicly released in 2017 Q1.
Read about these and our other exciting initiatives in the pages to come.
TeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-UzoukwuChinenye Mba-Uzoukwu
Putting the teachers first is critical to transforming education especially in the Digital Age. The world-over, countries like Nigeria struggling with broken public education systems and a huge deficit in education infrastructure - human and physical. Generations are slipping, falling through the yawning chasms in our countries and we must "act with the urgency of now" to save our Tomorrow. This action must be massive and decisive in scale. I argue that at a minimum this should focus on a country-scale deployment of education technology to close the this gap but must also make a similar massive effort in retooling and re-orienting the teachers for blended learning, classroom and school management in reconfigured, minimalized, entry-level technology enabled learning environments.
In January 2017, the Business and Sustainable Development Commission highlighted the huge economic opportunity inherent in meeting the UN 2030 Sustainable Development Goals (the Global Goals).
Dec 2013 Gamification and Immersive Technology Strategies E newsletterDavid Wortley
This document is the Gamification and Immersive Technology Strategies December 2013 E-Newsletters with updated information on Gamification, Recent Events, New models and theories and Upcoming events
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
CCTV_INSTALLATION_docx.docx
1. 1
AN ESSAY ON THE INSTALLATION OF CLOSED CIRCUIT TELEVISION CAMERA
(CCTV) IN THE INSTITUTE FOR HUMAN DEVELOPMENT & INFORMATION
TECHNOLOGY (IHDIT) KANO, NIGERIA.
Prepared by;
Ibrahim Zubairu Abubakar
October, 2017.
2. 2
Acknowledgement
All praise be to Allah, the most beneficent, the most merciful, peace and
blessing of Allah be upon his last messenger. It is necessary to praise the
Almighty for his bounties to us in particular, and enabling this work to be
successfully.
3. 3
Contents
Members ...............................................................................................Error! Bookmark not defined.
Acknowledgement..............................................................................................................................2
History of IHDIT..................................................................................................................................4
Major Target......................................................................................................................................4
Aims..................................................................................................................................................4
Sustainable Strategy...........................................................................................................................5
Achievement......................................................................................................................................5
History of CCTV Camera......................................................................................................................6
Technological Development of CCTV....................................................................................................6
Components of a CCTV System............................................................................................................7
Types of CCTV Security Cameras..........................................................................................................9
Fixed..................................................................................................................................................9
PTZ....................................................................................................................................................9
Understanding CCTV Image Resolution................................................................................................9
Usages of Cameras .............................................................................................................................9
Video surveillance and terrorism.......................................................................................................11
Privacy.............................................................................................................................................11
Video Content Analysis (VCA)............................................................................................................11
Kind of Cameras ...............................................................................................................................12
Analogue Camera.............................................................................................................................13
IP cameras (Internet protocol cameras) .............................................................................................13
Wireless security cameras.................................................................................................................14
Retention, storage and preservation..................................................................................................14
Integrated systems...........................................................................................................................15
Factor to consider in camerasinstallation plan...................................................................................15
Equipment Needed for Camera Installation........................................................................................16
Steps to Install Cameras(CCTV).........................................................................................................17
Soft Ware Configuring of DVR............................................................................................................19
DVR main Menu ...............................................................................................................................20
Factors affecting security cameras installation ...................................................................................22
Budgetfor the installation of Cameras at the IHDIT ............................................................................22
Conclusion .......................................................................................................................................23
References.......................................................................................................................................24
4. 4
History of IHDIT
Institute for Human Development and Information Technology (IHDIT) is a
non-Governmental Organization, established in August 2005, at Malam Jamo
House, last floor, opposite Government Secondary School Tarauni Kano State.
Furthermore, this organization empowering people through Skills Acquisition
Programs., Building Capacity through Training, Workshops, Seminars,
Strategic meeting, Advocacy visitory, Media Campaigns, Drama/Theater
Performance, Public Enlightenment and Awareness Campaigns, Design,
Production and Distribution of IECs Material and Promoting
Entrepreneurship Training in the Society as initiative aims raising a new class
of Entrepreneur who can compete globally and succeed in managing
Micro/Small and Medium Enterprises as well as provide channel for future
Industrialization within the Community and Society at large.
Major Target
To develop the people at grass root level, from the inception of this institution
to August 2017, they have successful train and graduated over thirty eight
thousand (38,000) people as beneficiaries of training programmes. It is also
become as open door programme policy that allow it to work with
government, individuals, domestic and international organization that
promote human development especially in the area of skills acquisition
programmes and awareness campaign for the development of humanity.
Aims
Promoting human development through coordination ideas, toward
efficient and effective provision of skills acquisition programmes to the
society for self-sustenance and development.
Providing measures in discouraging corruption, child abuse, human
trafficking with particular interest on disaster prevention, accident and
emergency rescue assistance
Promotingeducation, budget monitoringand tracking and volunteerism
to the society.
Empowering youths especially women and child in the society in order
to become self-reliance
5. 5
Transforming hopeless-ness into hope and through human resource
developmental activities
Sustainable Strategy
Paymentof some token fee by client/trainees, complementary resources from
partners, financial support from yahaya Danjuma yusif founder and the
president/CEO IHDIT as well as sourcing for sponsor to finance or support a
project where and when the need arises.
Achievement
From the inception of IHDIT in August 2005 to August 2014. Institute for
human Development and information Technology (IHDIT) has carried out
several training programmes with the following achievements;
Establishments of skills acquisition training centre at Tarauni, Kano
state.
Training of Academic and Staff of Kano state college of art. Science and
remedial studies (CAS) Kano.
Training of staff and students at el-imam group of group of schools,
Zaria city, Kaduna state
Trainingof medical and health workersof Gwagwarwaclinic Nassarawa
local Government Kano.
Recipient of 2007 state literacy award during the international literacy
day hosted in Kano state agency for mass education
Conducted seminars in collaboration with FEDERAL COLLEGE OF
AGRICULTURAL PRODUCE TECHNOLOGY KANO, Themes: importance,
principaland practice of food preservation and storage in the year 2011
Training of people from different client in Kano state in collaboration
with AMERICAN CORNER on intensive computer maintenance and
networking courses.
Training of almost one hundred member of Nurse and midwifery’s of
Mallam Aminu Kano Teaching hospital (FFHINAM) AKTH Kano.
Conducted Arabic computer literacy training for 600 people in
collaboration with yakubu H. Sabo togo Hon councilor hotoro ward
Nassarawa local government Kano in 2010
Organized training tagged. Global community Empowerments project,
partnership with Ministry of Education, Science technology and
6. 6
innovation Kano state with vision of training.66000 people across 44
local government of Kano state and extend the project to 774 local
government Across Nigeria in future.
History of CCTV Camera
Home and business security is important for many society. Many believe
that, they need only home while other business security is important
especially when individual own a lot of expensive items, but this is not
entirely true. Anyone who owns a home or a business can benefit from CCTV
(Closed Circuit Television) Cameras.
It was estimated that, there is about 350 million surveillance cameras
installed worldwide as of 2016 compared to the 160 million 2012. However,
65% of these cameras are installed in Asia and growth of CCTV has been
slowing in recent years.
Furthermore, Closed circuit Television, allowsyou to video tape a specific area
inside or outside the home. In many cases, these cameras can be linked to
warning systems inside the home or alert the police or other emergency
contacts. This video tape can be watched at the time of the taping, or it can be
watched later, in case there was a problem.
Closed circuit Television is a TV system in which signals are not publicly
distributed but are monitored, primary for surveillanceand security purposes
Rouse, (2012).
The first CCTV system was installed by Siemens AG at Test Stand 7 in
Peenemünde, Nazi Germany in 1942, for observing the launch of V-2 rockets.
The German engineer Walter Bruch was in charge for the designed,
technological and installation of the system. In United State of America the
first commercial closed-circuit television system became available in 1949,
called Vericon. Very little is known about Vericon except it was advertised as
not requiring a government permit.
Technological Development of CCTV
The earliest video surveillance systems involved constant monitoring because
it was not record and store information. The development of reel-to-reel
media enabled the recording of surveillance footage. The system required
magnetic tapes changed manually, which was a time consuming, expensive
7. 7
and unreliable process, with the operator having to manually thread the tape
from the tape reel through the recorder onto an empty take-up reel. Because
of the shortcomings, video surveillance was not widespread. VCR technology
became available in the 1970s, making it easier to record and erase
information, and video surveillance became more common.
During1990s, digitalmultiplexingwasdeveloped, allowingseveralcameras to
record at once, as well as time lapse and motion-only recording. This
increased savings of time and money which then led to an increase in the use
of CCTV.
In recent times CCTV technology has been enhanced with a shift toward
Internet-based products and systems, and other technological developments.
Components of a CCTV System
Cameras get most of the attention in the beginning, you also have other
concerns, such as viewing, recording, and archiving the video footage, and the
equipment required for carrying out those tasks. Here’s a look at the basic
components of a typical CCTV system.
Cameras
Security cameras are the starting point for most CCTV systems. There are
endless possibilities when choosing CCTV cameras and lenses – everything
from fixed models designed for monitoring very specific locations, to
day/night cameras, and powerful PTZ domes for patrolling large areas.
Monitor
In a traditional CCTV setup, operators view footage from a central location on
a monitor very much like a TV, but with higher lines of resolution for better
picturequality. Monitorscan be dedicated (meaning they display video from a
single camera), or call-up (meaning operators can access multiple cameras at
the same time).
8. 8
Cable
With an analogue system, coaxial cable is required for transmitting video
footage from the cameras. This is one of the drawbacks of analogue CCTV, as
the cable can be expensive and difficult to install, especially for larger camera
networks, and those were cameras must be positioned in difficult locations.
DVR
Most modern CCTV systems incorporate DVRs (digital video recorders) which
enable operators to reap some of the benefits of a network-based surveillance
setup. DVRs convert the analogue footage to digital, which helps to extend
storage capacity, makes it much easier to search archived footage, and also
allows usersto stream video over a network for remote viewingfrom multiple
locations.
9. 9
Types of CCTV Security Cameras
Fixed
Fixed CCTV cameras point in a single direction, which makes them perfect for
monitoring very specific areas of interest. For this reason, fixed cameras are
quite effective not only for capturingfootage of suspiciousactivity, but also for
deterring criminals and vandals from carrying out their acts in the first place.
PTZ
PTZ cameras are ideal for wide-area surveillance. They give operators the
ability to remotely control pan, tilt, and zoom functions to follow activity and
to zoom in for detailed monitoring. This is an area where analogue CCTV
cameras fall behind their IP camera counterparts. With IP cameras, the
pan/tilt/zoom functions are controlled manually or automatically and
delivered over a single network cable, while analogue cameras require
additional wiring to perform similar functionality.
Understanding CCTV Image Resolution
The image detail of an analogue CCTV camera is usually conveyed in a form of
measurement called TVL (or TV Lines). Think of the video picture as being
composed of active horizontal lines. These lines are delivered to a monitor or
recording device in two off-set fields.
One field contains even-numbered lines while the other contains odd-
numbered lines. The viewer sees a complete picture because the lines are
interlaced. Since the picture has a 3×4 aspect ratio, the amount of detail you
can measure in 3/4 of the picture’s width determines the horizontal TVL
resolution. Generally, most standard CCTV cameras offer a TVL resolution of
around 380, while high-resolution cameras will deliver something closer to
540 TVL.
Usages of Cameras
However, an important feature of some CCTV systems is the ability to take
high resolution images of the camera scene, e.g. on a time lapse or motion-
detection basis. Images taken with a digital still camera often have higher
10. 10
resolution than those taken with some video cameras. Increasingly, low-cost
high-resolution digital still cameras can also be used for CCTV purposes
Wikipedia & Rouse, (2012) identified some relevance of CCTV
Surveillance systems were most effective in parking lots, where their use
resulted in a 51% decrease in crime; Public transportation areas saw a 23%
decrease in crimes;
Crime prevention
Industrial processes that take place under conditions dangerous for
humans are now supervised by CCTV.
Traffic monitoring using closed circuit television to detect congestion
and notice accidents
Many sporting events are now use CCTV inside the venue for fans to see
the action while they are away from their seats
CCTV widely using at schools to stop bullying, vandalism, monitoring
visitors and maintaining a record of evidence in the event of a crime
Cameras are generally acceptable in hallways, parking lots, front offices
where students, employees, and parents come and go, gymnasiums,
cafeterias, supply rooms and classrooms. The installation of cameras in
classrooms may be objected to by some teachers
Organizationsuse CCTVto monitor actions of workers. Actions which an
employer may wish to monitor could include:
• Scanning, selection of goods, introduction of price and quantity;
• Input and output operators in the system when entering passwords;
• Deleting operations and modifying existing documents;
• Implementation of certain operations, such as financial statements or
operations with cash;
• Moving goods, revaluation scrapping and counting;
• Control in the kitchen of fast food restaurants;
• Change of settings, reports and other official functions.
On the other hand, criminals may use surveillance cameras to monitor the
public. For example, a hidden camera at an ATM can capture people's PINs as
they are entered, without their knowledge. The devices are small enough not
11. 11
to be noticed, and are placed where they can monitor the keypad of the
machine. Images transmitted wirelessly to the criminal.
Video surveillance and terrorism
Material collected by surveillance cameras has been used as a tool in post-
event forensics to identify tactics, techniques and perpetrators of terrorist
attacks. Furthermore, there are various projects − such as INDECT − that aim
to detect suspicious behaviours of individuals and crowds. It has been argued
that terrorists won't be deterred by cameras, that terror attacks aren't really
the subject of the current use of video surveillance and that terrorists might
even see it as an extra channel for propaganda and publication of their acts.
Privacy
Civil liberties campaign groups, academics and consultants have been
published research papers into CCTV systems. Opponents of CCTV point out
the loss of privacy of people under surveillance, and the negative impact of
surveillance on civil liberties. Furthermore, they argue that CCTV displaces
crime, rather than reducing it. Critics often dub CCTV as "Big Brother
surveillance", a reference to George Orwell's novel Nineteen Eighty-Four,
which featured a two-way telescreen in every home through which The Party
would monitor the populace.
Proponentsof CCTV cameras argue that cameras are effective at deterring and
solving crime, and appropriate regulation and legal restrictions on
surveillance of public spaces can provide sufficient protections so that an
individual's right to privacy can reasonably be weighed against the benefits of
surveillance.
Video Content Analysis (VCA)
Is the capability of automatically analyzing video to detect and determine
temporal events not based on a single image, as such, it can be seen as the
automated equivalent of the biological visual cortex.
The system using VCA recognize changes in the environment and even
identify and compare objects in the database usingsize, speed, and sometimes
colour. The camera's actions can be programmed based on what it is "seeing".
For example; an alarm can be issued if an object has moved in a certain area,
or if a painting is missing from a wall, or if a smoke or fire is detected, or if
12. 12
running people are detected, or if fallen people are detected and if someone
has spray painted the lens, as well as video loss, lens cover, defocus and other
so called camera tampering events. Facial recognition system is a computer
application for automatically identifying or verifying a person from a digital
image or a video frame from a video source. One of the ways to do this is by
comparing selected facial features from the image and a facial database.
Kind of Cameras
There are several CCTV cameras on the market and it is important to get the
one that will work best for your situation.
In camera settings there are different connectivity choices, including wired,
wireless, closed system and IP or Network. Closed systems will use a DVR and
can only be accessed with the monitor. IP/network connectivity can allow you
to view the video footage online, so you can view it at home or on the go. You
can also search by color or brand.
Kind of Cameras Why It Is Used
Wireless Camera There are fewer wires to be installed and hidden.
Criminals cannot easily cut wires to stop the
videotaping and transmission.
They are easier install than wired cameras.
Night Vision Cameras Crime does not stop at the end of the day; night
vision makes it easier to see intruder.
Using a camera that will switch itself between
night and day visions is even better, as this
automatically ensures the best picture.
Indoor/Outdoor
Cameras
Indoor cameras detect intruders already inside
the house.
Indoor cameras can also ensure that family
members are where they are supposed to be.
Outdoor cameras are used to keep control of
possible intruders before they get inside the
home.
Outdoor and Indoor cameras can protect against
fire and other damage.
13. 13
Motion Detection
Cameras
These cameras are not always recording. They
only start recording when there is motion
outside or inside.
Because it does not record 24/7, it can save
money and time because it will not waste tape.
Analogue Camera
Most analogue cameras systems today use a DVR as the recording medium.
This allows the analogue signals to be digitized for recording and for delivery
over the network. While a DVR solution is a cost-effective alternative to IP
video, and provides users with valuable benefits such as digital storage and
remote accessibility, there are drawbacks. One is a slight drop-off in image
quality.
Simply put, it’s harder to retain image quality in this type of setup because of
the various analogue-to-digital conversions that take place from the camera to
the recorder. Cabling distance also plays a role, as the further the video signals
travel, the weaker they become. Still, a DVR-based solution is a very good
option for users looking to reap some of the benefits of digital IP surveillance
while using lower-cost CCTV cameras.
IP cameras (Internet protocol cameras)
It is estimated that 2014 was the first year that IP cameras outsold analog
cameras. IP cameras use the Internet Protocol (IP) used by most Local Area
Networks (LANs) to transmit video across data networks in digital form. IP
14. 14
optionally transmitted across the public internet, allowing users to view their
cameras through any internet connection available over a computer or phone,
this is considered remote access. For professional or public infrastructure
security applications, IP video is restricted within a private network or VPN,
or can be recorded onto a remote server.
Wireless security cameras
Several consumers are turning to wireless security cameras for home
surveillance. Wireless cameras do require a video cable for video/audio
transmission, simply a cable for power. Wireless cameras are also easy and
inexpensive to install, but lack reliability of hard-wired cameras. Previous
generations of wireless security cameras relied on analog technology; modern
wireless cameras depend on digital technology which give crisper audio,
sharper video, a secure and interference-free signal.
Retention, storage and preservation
Most CCTV systems may record and store digital video and images to a digital
video recorder (DVR) or, in the case of IP cameras, directly to a server, either
on-site or offsite.
There is a cost in the retention of the images produced by CCTV systems. The
amount and quality of data stored on storage media is subject to compression
ratios, images stored per second, image size and is effected by the retention
period of the videos or images. DVRs store images in a variety of proprietary
file formats. Recordings may be retained for a preset sum of time and
15. 15
automatically archived, overwritten or deleted, the period being determined
by the organisation that generated them.
However, an important feature of some CCTV systems is the ability to take
high resolution images of the camera scene, e.g. on a time lapse or motion-
detection basis. Images taken with a digital still camera often have higher
resolution than those taken with some video cameras. Increasingly, low-cost
high-resolution digital still cameras can also be used for CCTV purposes.
Integrated systems
Integrated systems allow different security systems, like CCTV, access control,
intruder alarms and intercoms to operate together. For example, when an
intruder alarm is activated, CCTV cameras covering the intrusion area are
recorded at a higher frame rate and transmitted to an Alarm Receiving Centre.
Factor to consider in cameras installation plan
In camera installation, there is a number of factor to consider when someone
planned to install or purchase the packages. Here is a list of things to consider
when shopping for and planning to install a video surveillance system.
How to estimate how many cameras need? Most cameras provide
a 90 degree viewing angle. Such as HD dome cameras provide
video coverage for an entire small to medium sized room when
ceiling mounted in the corner of a room. Varifocal dome cameras
like these allow you to adjust the angle of view/zoom level using
dials on the lens during installation. 180 degree fish-eye cameras
go even wider, but are not going to be as clear in the distance.
Where will I store the DVR and power supplies for the cameras?
All of your cables will be run from each camera back to your DVR
and power supply location. Customers typically place their DVR
and power supply(s) in a data closet or in an office that will be
used to manage the system.
How far will the cameras be located from the DVR and power
supply? Mostof our surveillance systems include a 100 foot CCTV
cable for each camera. However, longer and shorter premade
cables are available and you can also use a spool of RG59 cable
which allows you to cut the cable lengths to an exact length.
16. 16
Do you want to access your cameras remotely? Almost all
customers want this feature. iDVR-PRO systems support it and
also the ability to search and playback recorded video
surveillance footage. Apps for iOS, Android, Windows, and Mac
are included. If you want to access your system remotely, you
must have an Internet connection at the location of your DVR.
Your DVR will be hard wired to your network router using a CAT-
5 cable.
Do I Need a Professional Installer? Connecting CCTV cameras to a
DVR is a lot like setting up a TV and stereo system. Here is what
we tell them. If you are able to mount your own cameras and run
cables to all of the camera locations, you can probably handle the
installation yourself.
Equipment Needed for Camera Installation
Before you install your CCTV camera, you must have correct equipment for
installation. When searching for a camera to purchase, look at all the items
included with the CCTV camera. For instance, most packages may possibly
contain the camera and cords. While others may includesome sort of player to
view the tapes, added cords, or even a remote control. If the camera you
purchase does not come with cords, you should purchase a standard CCTV
installation cord or RG59 Siamese Cables. Other equipment needed can
include a screwdriver, drill, screws, and more others.
17. 17
Steps to Install Cameras (CCTV)
In many cases people tend to have a camera that can do everything. The night
vision cameras are extremely popular because they are able to produce clear
video no matter the hour. For those who want added security without all the
added fuss, motion detection cameras can be a great choice; however, the
decision will ultimately lie with you and your family.
Beforebuyingcameras, it is importantto understand how camera will be used
and the type of budget allowed for the camera.
Firstly, step to install camera is to ensure that everything you need possibly
came within the camera packages. This may include a DVR, camera or
cameras, and cords.
Secondly, find the best place for the camera or cameras. This depend on where
you need coverage. Many peoplefind it best to place cameras close to the front
and back doors so that they can see if someone is entering their home or
business. Camera should still be placed in an area that allows a full scan of the
home entrance, as well as the lawn or walkway.
18. 18
Most people tend to place their camera where the roof meets the house walls,
at the corner. This allows the camera to view a nice sized area, but it probably
give shelter to the camera from rain, sun, snow or wind. This help prevent
vandalism of the camera.
When you have an idea of where you want the camera placed, it is time to
start installation after considering the following;
Testing your cameras before installation
Confirm cameras are working properly before mounting
Test all the cables if you are using premade CCTV cables
Configure video inputs on DVR for SD/HD cameras
If you are usinga hard-wired CCTVcamera, you will need to run cord from the
camera into the home. If you have an attic, this is a great place to put all your
lines; however, if you do not have an attic, just try to run the cord into an area
that will be easy to get to.
After runningthecords, you will want to designate a place for the monitor and
DVR to be placed. This can be anywhere in the home, and most people choose
to place it in a home office or bedroom.
Once you have chosen the room that will be the monitoring station, you will
have to run all the cords into that room from the attic or other area, then
connect the connectors to the DVR.
Install the cameras by drilling holes into the area designated. Then, put the
camera in place by screwing the screws into the holes provided. Please read
the manufacturer's installation guide before doing this.
Once connected, the cameras will need to be plugged into the power supply.
You have two options here. Plug each camera into an outlet separately using
pig-tails, or use an AC/DC power pack to plug all the camera lines into one box
and connect one AC line from the box to the outlet
If the DC power of your home is not sufficient for the cameras, you can cause
damage to the cameras or the home, so check to ensure that the DC power
required is sufficient before plugging the cameras into the power supply.
Before turning on the power to the cameras, connect your monitor to your
DVR.
19. 19
Once everything is hooked up and ready to go, it is important to start taping
immediately so you can check to ensure everything is working properly. This
is also the time to learn more about the system.
Soft Ware Configuring of DVR
After you unpack your new DVR, Connect the power supply included with
your DVR to the power input on the back of the DVR, then to a power source
(wall outlet). The DVR will boot up. Then locate the USB mouse that is
included. Connect the mouse to the USB port on the front or back of the DVR
(there are two). The USB mouse is the easiest way to navigate the user
interface of the DVR. You can also use the IR remote control if you prefer.
There are a few things we will need to tweak to make sure we get accurate
recordings. You can do this using the Setup Wizard as well as doing it
manually.
Login to the DVR by right clicking on your mouse and select Main Menu. A
prompt for your username and password will appear.
You can usethe 888888or the admin to configureyour DVR and the password
will be the same as the users’ name. After you have logged in the MAIN MENU
window will appear.
20. 20
DVR main Menu
Next click on SETTINGS then GENERAL.
Under the GENERAL settings make sure the system time is set correctly based
on your Time Zone. Make sure you click “SAVE” after changing the time. Next
you can change the Date Format to MM/DD/YYYY. You can also set the Time
Format to 12H or 24H if you like. Here is a screenshot of the general settings
21. 21
Next we can see the schedule of how your DVR will be recording. Under the
SETTINGS page click on SCHEDULE then the following window will appear:
Next setting to configureand one of the most importantones is the ENCODING
(CameraResolution). Under SETTINGS click on ENCODE and the next window
will appear:
Lastly you can configure the sensitivity of the camera by going to SETTING
and select DETECT.
22. 22
Factors affecting security cameras installation
Cost is one among other factors, the specific type of camera being used has the
most significant impact on its cost. The average cost of two digital cameras
packaged with an LCD monitor is expensive. Different brands can also have
different prices. The type of technology used has an impact of security camera
installation cost and specific type of software being used has a role to play on
its price. Wireless camera systems are generally more expensive than their
wired counterparts.
Budget for the installation of Cameras at the IHDIT
Item Description Qty Price (₦)
indoor AHD Camera Analogue HD camera (720p) for indoor 3 30,000
outdoor AHD Camera
Analogue HD camera Bullet (720p) for
outdoor
4
72,000
DVR
iCloud enabled Digital Video recorder
(DVR) – 8 channel
1
42,000
Power supply DC Power supply box (9 channel) 1 15,000
HDD SATA hard disk (500GB) 1 15,000
CCTV cable CCTV RG59 Cable with power (300m) 1 9,000
BNC plug BNC video plug 15 1500
Power Plug male Power plug 15 1500
23. 23
Workmanship
Installation/free by the student
All
00
Total
186,000
Schematic Diagram of CCTV IHDIT Installation
Conclusion
A CCTV camera is another way we use a devices to protect our important
belonging, including family and items in our home or business and there are
many options available, it will take some time to decide which camera to use.
It can also take time to install the camera correctly; however, once the camera
is installed, it willbe available to help uskeep your home, business, and family
safe.
IndoorCameras
ca
OutdoorCameras
DVR
POWER
R
Monitor
Main power
24. 24
References
CCTV CAMERA PROs (2017). CCTV DVR SET
https://www.cctvcamerapros.com/CCTV-DVR-Setup-s/934.htm
Security Camera Kings (2016). How to Install a CCTV Analog Camera System)
https://www.securitycameraking.com/securityinfo/how-to-install-a-cctv-analog-
camera-system/
Fang Security Infrastructure (2014). Intro to Analogue CCTV Surveillance
http://www.fang.co.za/?page_id=528
Ebay shop (2017). how to install a CCTV camera
http://www.ebay.com/gds/How-to-Install-a-CCTV-Camera-
/10000000178258780/g.html
CCTV Camera Pros (2017). How-to Install a Security Camera System DIY
Installation guide for iDVR-PRO CCTV & HD Security Camera Systems
https://www.cctvcamerapros.com/How-to-Install-Security-Camera-System-
s/1020.htm
Rouse M. (2012). CCTV Closed Circuit Television. Tech Target
Wikipedia (2017) Closed circuit television https://en.wikipedia.org/wiki/Closed-
circuit_television