SlideShare a Scribd company logo
1
AN ESSAY ON THE INSTALLATION OF CLOSED CIRCUIT TELEVISION CAMERA
(CCTV) IN THE INSTITUTE FOR HUMAN DEVELOPMENT & INFORMATION
TECHNOLOGY (IHDIT) KANO, NIGERIA.
Prepared by;
Ibrahim Zubairu Abubakar
October, 2017.
2
Acknowledgement
All praise be to Allah, the most beneficent, the most merciful, peace and
blessing of Allah be upon his last messenger. It is necessary to praise the
Almighty for his bounties to us in particular, and enabling this work to be
successfully.
3
Contents
Members ...............................................................................................Error! Bookmark not defined.
Acknowledgement..............................................................................................................................2
History of IHDIT..................................................................................................................................4
Major Target......................................................................................................................................4
Aims..................................................................................................................................................4
Sustainable Strategy...........................................................................................................................5
Achievement......................................................................................................................................5
History of CCTV Camera......................................................................................................................6
Technological Development of CCTV....................................................................................................6
Components of a CCTV System............................................................................................................7
Types of CCTV Security Cameras..........................................................................................................9
Fixed..................................................................................................................................................9
PTZ....................................................................................................................................................9
Understanding CCTV Image Resolution................................................................................................9
Usages of Cameras .............................................................................................................................9
Video surveillance and terrorism.......................................................................................................11
Privacy.............................................................................................................................................11
Video Content Analysis (VCA)............................................................................................................11
Kind of Cameras ...............................................................................................................................12
Analogue Camera.............................................................................................................................13
IP cameras (Internet protocol cameras) .............................................................................................13
Wireless security cameras.................................................................................................................14
Retention, storage and preservation..................................................................................................14
Integrated systems...........................................................................................................................15
Factor to consider in camerasinstallation plan...................................................................................15
Equipment Needed for Camera Installation........................................................................................16
Steps to Install Cameras(CCTV).........................................................................................................17
Soft Ware Configuring of DVR............................................................................................................19
DVR main Menu ...............................................................................................................................20
Factors affecting security cameras installation ...................................................................................22
Budgetfor the installation of Cameras at the IHDIT ............................................................................22
Conclusion .......................................................................................................................................23
References.......................................................................................................................................24
4
History of IHDIT
Institute for Human Development and Information Technology (IHDIT) is a
non-Governmental Organization, established in August 2005, at Malam Jamo
House, last floor, opposite Government Secondary School Tarauni Kano State.
Furthermore, this organization empowering people through Skills Acquisition
Programs., Building Capacity through Training, Workshops, Seminars,
Strategic meeting, Advocacy visitory, Media Campaigns, Drama/Theater
Performance, Public Enlightenment and Awareness Campaigns, Design,
Production and Distribution of IECs Material and Promoting
Entrepreneurship Training in the Society as initiative aims raising a new class
of Entrepreneur who can compete globally and succeed in managing
Micro/Small and Medium Enterprises as well as provide channel for future
Industrialization within the Community and Society at large.
Major Target
To develop the people at grass root level, from the inception of this institution
to August 2017, they have successful train and graduated over thirty eight
thousand (38,000) people as beneficiaries of training programmes. It is also
become as open door programme policy that allow it to work with
government, individuals, domestic and international organization that
promote human development especially in the area of skills acquisition
programmes and awareness campaign for the development of humanity.
Aims
 Promoting human development through coordination ideas, toward
efficient and effective provision of skills acquisition programmes to the
society for self-sustenance and development.
 Providing measures in discouraging corruption, child abuse, human
trafficking with particular interest on disaster prevention, accident and
emergency rescue assistance
 Promotingeducation, budget monitoringand tracking and volunteerism
to the society.
 Empowering youths especially women and child in the society in order
to become self-reliance
5
 Transforming hopeless-ness into hope and through human resource
developmental activities
Sustainable Strategy
Paymentof some token fee by client/trainees, complementary resources from
partners, financial support from yahaya Danjuma yusif founder and the
president/CEO IHDIT as well as sourcing for sponsor to finance or support a
project where and when the need arises.
Achievement
From the inception of IHDIT in August 2005 to August 2014. Institute for
human Development and information Technology (IHDIT) has carried out
several training programmes with the following achievements;
 Establishments of skills acquisition training centre at Tarauni, Kano
state.
 Training of Academic and Staff of Kano state college of art. Science and
remedial studies (CAS) Kano.
 Training of staff and students at el-imam group of group of schools,
Zaria city, Kaduna state
 Trainingof medical and health workersof Gwagwarwaclinic Nassarawa
local Government Kano.
 Recipient of 2007 state literacy award during the international literacy
day hosted in Kano state agency for mass education
 Conducted seminars in collaboration with FEDERAL COLLEGE OF
AGRICULTURAL PRODUCE TECHNOLOGY KANO, Themes: importance,
principaland practice of food preservation and storage in the year 2011
 Training of people from different client in Kano state in collaboration
with AMERICAN CORNER on intensive computer maintenance and
networking courses.
 Training of almost one hundred member of Nurse and midwifery’s of
Mallam Aminu Kano Teaching hospital (FFHINAM) AKTH Kano.
 Conducted Arabic computer literacy training for 600 people in
collaboration with yakubu H. Sabo togo Hon councilor hotoro ward
Nassarawa local government Kano in 2010
 Organized training tagged. Global community Empowerments project,
partnership with Ministry of Education, Science technology and
6
innovation Kano state with vision of training.66000 people across 44
local government of Kano state and extend the project to 774 local
government Across Nigeria in future.
History of CCTV Camera
Home and business security is important for many society. Many believe
that, they need only home while other business security is important
especially when individual own a lot of expensive items, but this is not
entirely true. Anyone who owns a home or a business can benefit from CCTV
(Closed Circuit Television) Cameras.
It was estimated that, there is about 350 million surveillance cameras
installed worldwide as of 2016 compared to the 160 million 2012. However,
65% of these cameras are installed in Asia and growth of CCTV has been
slowing in recent years.
Furthermore, Closed circuit Television, allowsyou to video tape a specific area
inside or outside the home. In many cases, these cameras can be linked to
warning systems inside the home or alert the police or other emergency
contacts. This video tape can be watched at the time of the taping, or it can be
watched later, in case there was a problem.
Closed circuit Television is a TV system in which signals are not publicly
distributed but are monitored, primary for surveillanceand security purposes
Rouse, (2012).
The first CCTV system was installed by Siemens AG at Test Stand 7 in
Peenemünde, Nazi Germany in 1942, for observing the launch of V-2 rockets.
The German engineer Walter Bruch was in charge for the designed,
technological and installation of the system. In United State of America the
first commercial closed-circuit television system became available in 1949,
called Vericon. Very little is known about Vericon except it was advertised as
not requiring a government permit.
Technological Development of CCTV
The earliest video surveillance systems involved constant monitoring because
it was not record and store information. The development of reel-to-reel
media enabled the recording of surveillance footage. The system required
magnetic tapes changed manually, which was a time consuming, expensive
7
and unreliable process, with the operator having to manually thread the tape
from the tape reel through the recorder onto an empty take-up reel. Because
of the shortcomings, video surveillance was not widespread. VCR technology
became available in the 1970s, making it easier to record and erase
information, and video surveillance became more common.
During1990s, digitalmultiplexingwasdeveloped, allowingseveralcameras to
record at once, as well as time lapse and motion-only recording. This
increased savings of time and money which then led to an increase in the use
of CCTV.
In recent times CCTV technology has been enhanced with a shift toward
Internet-based products and systems, and other technological developments.
Components of a CCTV System
Cameras get most of the attention in the beginning, you also have other
concerns, such as viewing, recording, and archiving the video footage, and the
equipment required for carrying out those tasks. Here’s a look at the basic
components of a typical CCTV system.
Cameras
Security cameras are the starting point for most CCTV systems. There are
endless possibilities when choosing CCTV cameras and lenses – everything
from fixed models designed for monitoring very specific locations, to
day/night cameras, and powerful PTZ domes for patrolling large areas.
Monitor
In a traditional CCTV setup, operators view footage from a central location on
a monitor very much like a TV, but with higher lines of resolution for better
picturequality. Monitorscan be dedicated (meaning they display video from a
single camera), or call-up (meaning operators can access multiple cameras at
the same time).
8
Cable
With an analogue system, coaxial cable is required for transmitting video
footage from the cameras. This is one of the drawbacks of analogue CCTV, as
the cable can be expensive and difficult to install, especially for larger camera
networks, and those were cameras must be positioned in difficult locations.
DVR
Most modern CCTV systems incorporate DVRs (digital video recorders) which
enable operators to reap some of the benefits of a network-based surveillance
setup. DVRs convert the analogue footage to digital, which helps to extend
storage capacity, makes it much easier to search archived footage, and also
allows usersto stream video over a network for remote viewingfrom multiple
locations.
9
Types of CCTV Security Cameras
Fixed
Fixed CCTV cameras point in a single direction, which makes them perfect for
monitoring very specific areas of interest. For this reason, fixed cameras are
quite effective not only for capturingfootage of suspiciousactivity, but also for
deterring criminals and vandals from carrying out their acts in the first place.
PTZ
PTZ cameras are ideal for wide-area surveillance. They give operators the
ability to remotely control pan, tilt, and zoom functions to follow activity and
to zoom in for detailed monitoring. This is an area where analogue CCTV
cameras fall behind their IP camera counterparts. With IP cameras, the
pan/tilt/zoom functions are controlled manually or automatically and
delivered over a single network cable, while analogue cameras require
additional wiring to perform similar functionality.
Understanding CCTV Image Resolution
The image detail of an analogue CCTV camera is usually conveyed in a form of
measurement called TVL (or TV Lines). Think of the video picture as being
composed of active horizontal lines. These lines are delivered to a monitor or
recording device in two off-set fields.
One field contains even-numbered lines while the other contains odd-
numbered lines. The viewer sees a complete picture because the lines are
interlaced. Since the picture has a 3×4 aspect ratio, the amount of detail you
can measure in 3/4 of the picture’s width determines the horizontal TVL
resolution. Generally, most standard CCTV cameras offer a TVL resolution of
around 380, while high-resolution cameras will deliver something closer to
540 TVL.
Usages of Cameras
However, an important feature of some CCTV systems is the ability to take
high resolution images of the camera scene, e.g. on a time lapse or motion-
detection basis. Images taken with a digital still camera often have higher
10
resolution than those taken with some video cameras. Increasingly, low-cost
high-resolution digital still cameras can also be used for CCTV purposes
Wikipedia & Rouse, (2012) identified some relevance of CCTV
Surveillance systems were most effective in parking lots, where their use
resulted in a 51% decrease in crime; Public transportation areas saw a 23%
decrease in crimes;
 Crime prevention
 Industrial processes that take place under conditions dangerous for
humans are now supervised by CCTV.
 Traffic monitoring using closed circuit television to detect congestion
and notice accidents
 Many sporting events are now use CCTV inside the venue for fans to see
the action while they are away from their seats
 CCTV widely using at schools to stop bullying, vandalism, monitoring
visitors and maintaining a record of evidence in the event of a crime
 Cameras are generally acceptable in hallways, parking lots, front offices
where students, employees, and parents come and go, gymnasiums,
cafeterias, supply rooms and classrooms. The installation of cameras in
classrooms may be objected to by some teachers
 Organizationsuse CCTVto monitor actions of workers. Actions which an
employer may wish to monitor could include:
• Scanning, selection of goods, introduction of price and quantity;
• Input and output operators in the system when entering passwords;
• Deleting operations and modifying existing documents;
• Implementation of certain operations, such as financial statements or
operations with cash;
• Moving goods, revaluation scrapping and counting;
• Control in the kitchen of fast food restaurants;
• Change of settings, reports and other official functions.
On the other hand, criminals may use surveillance cameras to monitor the
public. For example, a hidden camera at an ATM can capture people's PINs as
they are entered, without their knowledge. The devices are small enough not
11
to be noticed, and are placed where they can monitor the keypad of the
machine. Images transmitted wirelessly to the criminal.
Video surveillance and terrorism
Material collected by surveillance cameras has been used as a tool in post-
event forensics to identify tactics, techniques and perpetrators of terrorist
attacks. Furthermore, there are various projects − such as INDECT − that aim
to detect suspicious behaviours of individuals and crowds. It has been argued
that terrorists won't be deterred by cameras, that terror attacks aren't really
the subject of the current use of video surveillance and that terrorists might
even see it as an extra channel for propaganda and publication of their acts.
Privacy
Civil liberties campaign groups, academics and consultants have been
published research papers into CCTV systems. Opponents of CCTV point out
the loss of privacy of people under surveillance, and the negative impact of
surveillance on civil liberties. Furthermore, they argue that CCTV displaces
crime, rather than reducing it. Critics often dub CCTV as "Big Brother
surveillance", a reference to George Orwell's novel Nineteen Eighty-Four,
which featured a two-way telescreen in every home through which The Party
would monitor the populace.
Proponentsof CCTV cameras argue that cameras are effective at deterring and
solving crime, and appropriate regulation and legal restrictions on
surveillance of public spaces can provide sufficient protections so that an
individual's right to privacy can reasonably be weighed against the benefits of
surveillance.
Video Content Analysis (VCA)
Is the capability of automatically analyzing video to detect and determine
temporal events not based on a single image, as such, it can be seen as the
automated equivalent of the biological visual cortex.
The system using VCA recognize changes in the environment and even
identify and compare objects in the database usingsize, speed, and sometimes
colour. The camera's actions can be programmed based on what it is "seeing".
For example; an alarm can be issued if an object has moved in a certain area,
or if a painting is missing from a wall, or if a smoke or fire is detected, or if
12
running people are detected, or if fallen people are detected and if someone
has spray painted the lens, as well as video loss, lens cover, defocus and other
so called camera tampering events. Facial recognition system is a computer
application for automatically identifying or verifying a person from a digital
image or a video frame from a video source. One of the ways to do this is by
comparing selected facial features from the image and a facial database.
Kind of Cameras
There are several CCTV cameras on the market and it is important to get the
one that will work best for your situation.
In camera settings there are different connectivity choices, including wired,
wireless, closed system and IP or Network. Closed systems will use a DVR and
can only be accessed with the monitor. IP/network connectivity can allow you
to view the video footage online, so you can view it at home or on the go. You
can also search by color or brand.
Kind of Cameras Why It Is Used
Wireless Camera  There are fewer wires to be installed and hidden.
 Criminals cannot easily cut wires to stop the
videotaping and transmission.
 They are easier install than wired cameras.
Night Vision Cameras  Crime does not stop at the end of the day; night
vision makes it easier to see intruder.
 Using a camera that will switch itself between
night and day visions is even better, as this
automatically ensures the best picture.
Indoor/Outdoor
Cameras
 Indoor cameras detect intruders already inside
the house.
 Indoor cameras can also ensure that family
members are where they are supposed to be.
 Outdoor cameras are used to keep control of
possible intruders before they get inside the
home.
 Outdoor and Indoor cameras can protect against
fire and other damage.
13
Motion Detection
Cameras
 These cameras are not always recording. They
only start recording when there is motion
outside or inside.
 Because it does not record 24/7, it can save
money and time because it will not waste tape.
Analogue Camera
Most analogue cameras systems today use a DVR as the recording medium.
This allows the analogue signals to be digitized for recording and for delivery
over the network. While a DVR solution is a cost-effective alternative to IP
video, and provides users with valuable benefits such as digital storage and
remote accessibility, there are drawbacks. One is a slight drop-off in image
quality.
Simply put, it’s harder to retain image quality in this type of setup because of
the various analogue-to-digital conversions that take place from the camera to
the recorder. Cabling distance also plays a role, as the further the video signals
travel, the weaker they become. Still, a DVR-based solution is a very good
option for users looking to reap some of the benefits of digital IP surveillance
while using lower-cost CCTV cameras.
IP cameras (Internet protocol cameras)
It is estimated that 2014 was the first year that IP cameras outsold analog
cameras. IP cameras use the Internet Protocol (IP) used by most Local Area
Networks (LANs) to transmit video across data networks in digital form. IP
14
optionally transmitted across the public internet, allowing users to view their
cameras through any internet connection available over a computer or phone,
this is considered remote access. For professional or public infrastructure
security applications, IP video is restricted within a private network or VPN,
or can be recorded onto a remote server.
Wireless security cameras
Several consumers are turning to wireless security cameras for home
surveillance. Wireless cameras do require a video cable for video/audio
transmission, simply a cable for power. Wireless cameras are also easy and
inexpensive to install, but lack reliability of hard-wired cameras. Previous
generations of wireless security cameras relied on analog technology; modern
wireless cameras depend on digital technology which give crisper audio,
sharper video, a secure and interference-free signal.
Retention, storage and preservation
Most CCTV systems may record and store digital video and images to a digital
video recorder (DVR) or, in the case of IP cameras, directly to a server, either
on-site or offsite.
There is a cost in the retention of the images produced by CCTV systems. The
amount and quality of data stored on storage media is subject to compression
ratios, images stored per second, image size and is effected by the retention
period of the videos or images. DVRs store images in a variety of proprietary
file formats. Recordings may be retained for a preset sum of time and
15
automatically archived, overwritten or deleted, the period being determined
by the organisation that generated them.
However, an important feature of some CCTV systems is the ability to take
high resolution images of the camera scene, e.g. on a time lapse or motion-
detection basis. Images taken with a digital still camera often have higher
resolution than those taken with some video cameras. Increasingly, low-cost
high-resolution digital still cameras can also be used for CCTV purposes.
Integrated systems
Integrated systems allow different security systems, like CCTV, access control,
intruder alarms and intercoms to operate together. For example, when an
intruder alarm is activated, CCTV cameras covering the intrusion area are
recorded at a higher frame rate and transmitted to an Alarm Receiving Centre.
Factor to consider in cameras installation plan
In camera installation, there is a number of factor to consider when someone
planned to install or purchase the packages. Here is a list of things to consider
when shopping for and planning to install a video surveillance system.
 How to estimate how many cameras need? Most cameras provide
a 90 degree viewing angle. Such as HD dome cameras provide
video coverage for an entire small to medium sized room when
ceiling mounted in the corner of a room. Varifocal dome cameras
like these allow you to adjust the angle of view/zoom level using
dials on the lens during installation. 180 degree fish-eye cameras
go even wider, but are not going to be as clear in the distance.
 Where will I store the DVR and power supplies for the cameras?
All of your cables will be run from each camera back to your DVR
and power supply location. Customers typically place their DVR
and power supply(s) in a data closet or in an office that will be
used to manage the system.
 How far will the cameras be located from the DVR and power
supply? Mostof our surveillance systems include a 100 foot CCTV
cable for each camera. However, longer and shorter premade
cables are available and you can also use a spool of RG59 cable
which allows you to cut the cable lengths to an exact length.
16
 Do you want to access your cameras remotely? Almost all
customers want this feature. iDVR-PRO systems support it and
also the ability to search and playback recorded video
surveillance footage. Apps for iOS, Android, Windows, and Mac
are included. If you want to access your system remotely, you
must have an Internet connection at the location of your DVR.
Your DVR will be hard wired to your network router using a CAT-
5 cable.
 Do I Need a Professional Installer? Connecting CCTV cameras to a
DVR is a lot like setting up a TV and stereo system. Here is what
we tell them. If you are able to mount your own cameras and run
cables to all of the camera locations, you can probably handle the
installation yourself.
Equipment Needed for Camera Installation
Before you install your CCTV camera, you must have correct equipment for
installation. When searching for a camera to purchase, look at all the items
included with the CCTV camera. For instance, most packages may possibly
contain the camera and cords. While others may includesome sort of player to
view the tapes, added cords, or even a remote control. If the camera you
purchase does not come with cords, you should purchase a standard CCTV
installation cord or RG59 Siamese Cables. Other equipment needed can
include a screwdriver, drill, screws, and more others.
17
Steps to Install Cameras (CCTV)
In many cases people tend to have a camera that can do everything. The night
vision cameras are extremely popular because they are able to produce clear
video no matter the hour. For those who want added security without all the
added fuss, motion detection cameras can be a great choice; however, the
decision will ultimately lie with you and your family.
Beforebuyingcameras, it is importantto understand how camera will be used
and the type of budget allowed for the camera.
Firstly, step to install camera is to ensure that everything you need possibly
came within the camera packages. This may include a DVR, camera or
cameras, and cords.
Secondly, find the best place for the camera or cameras. This depend on where
you need coverage. Many peoplefind it best to place cameras close to the front
and back doors so that they can see if someone is entering their home or
business. Camera should still be placed in an area that allows a full scan of the
home entrance, as well as the lawn or walkway.
18
Most people tend to place their camera where the roof meets the house walls,
at the corner. This allows the camera to view a nice sized area, but it probably
give shelter to the camera from rain, sun, snow or wind. This help prevent
vandalism of the camera.
When you have an idea of where you want the camera placed, it is time to
start installation after considering the following;
 Testing your cameras before installation
 Confirm cameras are working properly before mounting
 Test all the cables if you are using premade CCTV cables
 Configure video inputs on DVR for SD/HD cameras
If you are usinga hard-wired CCTVcamera, you will need to run cord from the
camera into the home. If you have an attic, this is a great place to put all your
lines; however, if you do not have an attic, just try to run the cord into an area
that will be easy to get to.
After runningthecords, you will want to designate a place for the monitor and
DVR to be placed. This can be anywhere in the home, and most people choose
to place it in a home office or bedroom.
Once you have chosen the room that will be the monitoring station, you will
have to run all the cords into that room from the attic or other area, then
connect the connectors to the DVR.
Install the cameras by drilling holes into the area designated. Then, put the
camera in place by screwing the screws into the holes provided. Please read
the manufacturer's installation guide before doing this.
Once connected, the cameras will need to be plugged into the power supply.
You have two options here. Plug each camera into an outlet separately using
pig-tails, or use an AC/DC power pack to plug all the camera lines into one box
and connect one AC line from the box to the outlet
If the DC power of your home is not sufficient for the cameras, you can cause
damage to the cameras or the home, so check to ensure that the DC power
required is sufficient before plugging the cameras into the power supply.
Before turning on the power to the cameras, connect your monitor to your
DVR.
19
Once everything is hooked up and ready to go, it is important to start taping
immediately so you can check to ensure everything is working properly. This
is also the time to learn more about the system.
Soft Ware Configuring of DVR
After you unpack your new DVR, Connect the power supply included with
your DVR to the power input on the back of the DVR, then to a power source
(wall outlet). The DVR will boot up. Then locate the USB mouse that is
included. Connect the mouse to the USB port on the front or back of the DVR
(there are two). The USB mouse is the easiest way to navigate the user
interface of the DVR. You can also use the IR remote control if you prefer.
There are a few things we will need to tweak to make sure we get accurate
recordings. You can do this using the Setup Wizard as well as doing it
manually.
Login to the DVR by right clicking on your mouse and select Main Menu. A
prompt for your username and password will appear.
You can usethe 888888or the admin to configureyour DVR and the password
will be the same as the users’ name. After you have logged in the MAIN MENU
window will appear.
20
DVR main Menu
Next click on SETTINGS then GENERAL.
Under the GENERAL settings make sure the system time is set correctly based
on your Time Zone. Make sure you click “SAVE” after changing the time. Next
you can change the Date Format to MM/DD/YYYY. You can also set the Time
Format to 12H or 24H if you like. Here is a screenshot of the general settings
21
Next we can see the schedule of how your DVR will be recording. Under the
SETTINGS page click on SCHEDULE then the following window will appear:
Next setting to configureand one of the most importantones is the ENCODING
(CameraResolution). Under SETTINGS click on ENCODE and the next window
will appear:
Lastly you can configure the sensitivity of the camera by going to SETTING
and select DETECT.
22
Factors affecting security cameras installation
Cost is one among other factors, the specific type of camera being used has the
most significant impact on its cost. The average cost of two digital cameras
packaged with an LCD monitor is expensive. Different brands can also have
different prices. The type of technology used has an impact of security camera
installation cost and specific type of software being used has a role to play on
its price. Wireless camera systems are generally more expensive than their
wired counterparts.
Budget for the installation of Cameras at the IHDIT
Item Description Qty Price (₦)
indoor AHD Camera Analogue HD camera (720p) for indoor 3 30,000
outdoor AHD Camera
Analogue HD camera Bullet (720p) for
outdoor
4
72,000
DVR
iCloud enabled Digital Video recorder
(DVR) – 8 channel
1
42,000
Power supply DC Power supply box (9 channel) 1 15,000
HDD SATA hard disk (500GB) 1 15,000
CCTV cable CCTV RG59 Cable with power (300m) 1 9,000
BNC plug BNC video plug 15 1500
Power Plug male Power plug 15 1500
23
Workmanship
Installation/free by the student
All
00
Total
186,000
Schematic Diagram of CCTV IHDIT Installation
Conclusion
A CCTV camera is another way we use a devices to protect our important
belonging, including family and items in our home or business and there are
many options available, it will take some time to decide which camera to use.
It can also take time to install the camera correctly; however, once the camera
is installed, it willbe available to help uskeep your home, business, and family
safe.
IndoorCameras
ca
OutdoorCameras
DVR
POWER
R
Monitor
Main power
24
References
 CCTV CAMERA PROs (2017). CCTV DVR SET
https://www.cctvcamerapros.com/CCTV-DVR-Setup-s/934.htm
 Security Camera Kings (2016). How to Install a CCTV Analog Camera System)
https://www.securitycameraking.com/securityinfo/how-to-install-a-cctv-analog-
camera-system/
 Fang Security Infrastructure (2014). Intro to Analogue CCTV Surveillance
http://www.fang.co.za/?page_id=528
 Ebay shop (2017). how to install a CCTV camera
http://www.ebay.com/gds/How-to-Install-a-CCTV-Camera-
/10000000178258780/g.html
 CCTV Camera Pros (2017). How-to Install a Security Camera System DIY
Installation guide for iDVR-PRO CCTV & HD Security Camera Systems
https://www.cctvcamerapros.com/How-to-Install-Security-Camera-System-
s/1020.htm
 Rouse M. (2012). CCTV Closed Circuit Television. Tech Target
 Wikipedia (2017) Closed circuit television https://en.wikipedia.org/wiki/Closed-
circuit_television

More Related Content

Similar to CCTV_INSTALLATION_docx.docx

Volume 2 issue 2
Volume 2 issue 2Volume 2 issue 2
Volume 2 issue 2
Indo Africa Times
 
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Angela Stubbs
 
Assignment 2
Assignment 2Assignment 2
Assignment 2alamdar
 
Keeping Gen Y Safe Online
Keeping Gen Y Safe OnlineKeeping Gen Y Safe Online
Keeping Gen Y Safe Online
Gideon For-mukwai, CEM
 
My report
My reportMy report
My report
MichaelEnoma
 
SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)
Stephen Ahiante
 
Opportunities for Startups in Union Budget 2022
Opportunities for Startups in Union Budget 2022Opportunities for Startups in Union Budget 2022
Opportunities for Startups in Union Budget 2022
Vinit Deo
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSR
Christofer Felix
 
Emirates NBD's 2016 Q3 CSR Newsletter
Emirates NBD's 2016 Q3 CSR NewsletterEmirates NBD's 2016 Q3 CSR Newsletter
Emirates NBD's 2016 Q3 CSR Newsletter
Erin Langs
 
TeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-Uzoukwu
TeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-UzoukwuTeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-Uzoukwu
TeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-Uzoukwu
Chinenye Mba-Uzoukwu
 
Achieving SDGs Through Technology-Driven Solutions
Achieving SDGs Through Technology-Driven SolutionsAchieving SDGs Through Technology-Driven Solutions
Achieving SDGs Through Technology-Driven Solutions
Civil Society Coalition on Sustainable Development
 
2014 e learning innovations conference keynote address cs, prof. jacob kaimen...
2014 e learning innovations conference keynote address cs, prof. jacob kaimen...2014 e learning innovations conference keynote address cs, prof. jacob kaimen...
2014 e learning innovations conference keynote address cs, prof. jacob kaimen...
eLearning Innovations Conference
 
Freelance-Strategy Primer.pdf
Freelance-Strategy Primer.pdfFreelance-Strategy Primer.pdf
Freelance-Strategy Primer.pdf
Fajar Baskoro
 
Uganda pig value chain scaling workshop: Summary and next steps
Uganda pig value chain scaling workshop: Summary and next stepsUganda pig value chain scaling workshop: Summary and next steps
Uganda pig value chain scaling workshop: Summary and next steps
ILRI
 
African union youth volunteer corps (au yvc) business plan (english)(1)
African union youth volunteer corps (au yvc) business plan (english)(1)African union youth volunteer corps (au yvc) business plan (english)(1)
African union youth volunteer corps (au yvc) business plan (english)(1)Dr Lendy Spires
 
The diffusion of information and communication technology in the informal sec...
The diffusion of information and communication technology in the informal sec...The diffusion of information and communication technology in the informal sec...
The diffusion of information and communication technology in the informal sec...Dr Lendy Spires
 
oneVillage Service and Learning Program 2009 Summary Report
oneVillage Service and Learning Program 2009 Summary ReportoneVillage Service and Learning Program 2009 Summary Report
oneVillage Service and Learning Program 2009 Summary ReportJoy Tang
 
Dec 2013 Gamification and Immersive Technology Strategies E newsletter
Dec 2013 Gamification and Immersive Technology Strategies E newsletterDec 2013 Gamification and Immersive Technology Strategies E newsletter
Dec 2013 Gamification and Immersive Technology Strategies E newsletter
David Wortley
 

Similar to CCTV_INSTALLATION_docx.docx (20)

Volume 2 issue 2
Volume 2 issue 2Volume 2 issue 2
Volume 2 issue 2
 
MORE INFO ON ICT-X[1]
MORE INFO ON ICT-X[1]MORE INFO ON ICT-X[1]
MORE INFO ON ICT-X[1]
 
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
Kingston Business Bulletin Nov 2013 (2) - latest information for Kingston bus...
 
Assignment 2
Assignment 2Assignment 2
Assignment 2
 
Keeping Gen Y Safe Online
Keeping Gen Y Safe OnlineKeeping Gen Y Safe Online
Keeping Gen Y Safe Online
 
My report
My reportMy report
My report
 
SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)SIWES Industrial Training report (NIGERIA)
SIWES Industrial Training report (NIGERIA)
 
Opportunities for Startups in Union Budget 2022
Opportunities for Startups in Union Budget 2022Opportunities for Startups in Union Budget 2022
Opportunities for Startups in Union Budget 2022
 
CSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSRCSR Plan for National Celular Operator - Award Winning CSR
CSR Plan for National Celular Operator - Award Winning CSR
 
Emirates NBD's 2016 Q3 CSR Newsletter
Emirates NBD's 2016 Q3 CSR NewsletterEmirates NBD's 2016 Q3 CSR Newsletter
Emirates NBD's 2016 Q3 CSR Newsletter
 
TeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-Uzoukwu
TeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-UzoukwuTeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-Uzoukwu
TeachersFirst - an Edutech Presentation at TEDx Lagos by Chinenye Mba-Uzoukwu
 
Achieving SDGs Through Technology-Driven Solutions
Achieving SDGs Through Technology-Driven SolutionsAchieving SDGs Through Technology-Driven Solutions
Achieving SDGs Through Technology-Driven Solutions
 
2014 e learning innovations conference keynote address cs, prof. jacob kaimen...
2014 e learning innovations conference keynote address cs, prof. jacob kaimen...2014 e learning innovations conference keynote address cs, prof. jacob kaimen...
2014 e learning innovations conference keynote address cs, prof. jacob kaimen...
 
FLIP Project Plan..
FLIP Project Plan..FLIP Project Plan..
FLIP Project Plan..
 
Freelance-Strategy Primer.pdf
Freelance-Strategy Primer.pdfFreelance-Strategy Primer.pdf
Freelance-Strategy Primer.pdf
 
Uganda pig value chain scaling workshop: Summary and next steps
Uganda pig value chain scaling workshop: Summary and next stepsUganda pig value chain scaling workshop: Summary and next steps
Uganda pig value chain scaling workshop: Summary and next steps
 
African union youth volunteer corps (au yvc) business plan (english)(1)
African union youth volunteer corps (au yvc) business plan (english)(1)African union youth volunteer corps (au yvc) business plan (english)(1)
African union youth volunteer corps (au yvc) business plan (english)(1)
 
The diffusion of information and communication technology in the informal sec...
The diffusion of information and communication technology in the informal sec...The diffusion of information and communication technology in the informal sec...
The diffusion of information and communication technology in the informal sec...
 
oneVillage Service and Learning Program 2009 Summary Report
oneVillage Service and Learning Program 2009 Summary ReportoneVillage Service and Learning Program 2009 Summary Report
oneVillage Service and Learning Program 2009 Summary Report
 
Dec 2013 Gamification and Immersive Technology Strategies E newsletter
Dec 2013 Gamification and Immersive Technology Strategies E newsletterDec 2013 Gamification and Immersive Technology Strategies E newsletter
Dec 2013 Gamification and Immersive Technology Strategies E newsletter
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

CCTV_INSTALLATION_docx.docx

  • 1. 1 AN ESSAY ON THE INSTALLATION OF CLOSED CIRCUIT TELEVISION CAMERA (CCTV) IN THE INSTITUTE FOR HUMAN DEVELOPMENT & INFORMATION TECHNOLOGY (IHDIT) KANO, NIGERIA. Prepared by; Ibrahim Zubairu Abubakar October, 2017.
  • 2. 2 Acknowledgement All praise be to Allah, the most beneficent, the most merciful, peace and blessing of Allah be upon his last messenger. It is necessary to praise the Almighty for his bounties to us in particular, and enabling this work to be successfully.
  • 3. 3 Contents Members ...............................................................................................Error! Bookmark not defined. Acknowledgement..............................................................................................................................2 History of IHDIT..................................................................................................................................4 Major Target......................................................................................................................................4 Aims..................................................................................................................................................4 Sustainable Strategy...........................................................................................................................5 Achievement......................................................................................................................................5 History of CCTV Camera......................................................................................................................6 Technological Development of CCTV....................................................................................................6 Components of a CCTV System............................................................................................................7 Types of CCTV Security Cameras..........................................................................................................9 Fixed..................................................................................................................................................9 PTZ....................................................................................................................................................9 Understanding CCTV Image Resolution................................................................................................9 Usages of Cameras .............................................................................................................................9 Video surveillance and terrorism.......................................................................................................11 Privacy.............................................................................................................................................11 Video Content Analysis (VCA)............................................................................................................11 Kind of Cameras ...............................................................................................................................12 Analogue Camera.............................................................................................................................13 IP cameras (Internet protocol cameras) .............................................................................................13 Wireless security cameras.................................................................................................................14 Retention, storage and preservation..................................................................................................14 Integrated systems...........................................................................................................................15 Factor to consider in camerasinstallation plan...................................................................................15 Equipment Needed for Camera Installation........................................................................................16 Steps to Install Cameras(CCTV).........................................................................................................17 Soft Ware Configuring of DVR............................................................................................................19 DVR main Menu ...............................................................................................................................20 Factors affecting security cameras installation ...................................................................................22 Budgetfor the installation of Cameras at the IHDIT ............................................................................22 Conclusion .......................................................................................................................................23 References.......................................................................................................................................24
  • 4. 4 History of IHDIT Institute for Human Development and Information Technology (IHDIT) is a non-Governmental Organization, established in August 2005, at Malam Jamo House, last floor, opposite Government Secondary School Tarauni Kano State. Furthermore, this organization empowering people through Skills Acquisition Programs., Building Capacity through Training, Workshops, Seminars, Strategic meeting, Advocacy visitory, Media Campaigns, Drama/Theater Performance, Public Enlightenment and Awareness Campaigns, Design, Production and Distribution of IECs Material and Promoting Entrepreneurship Training in the Society as initiative aims raising a new class of Entrepreneur who can compete globally and succeed in managing Micro/Small and Medium Enterprises as well as provide channel for future Industrialization within the Community and Society at large. Major Target To develop the people at grass root level, from the inception of this institution to August 2017, they have successful train and graduated over thirty eight thousand (38,000) people as beneficiaries of training programmes. It is also become as open door programme policy that allow it to work with government, individuals, domestic and international organization that promote human development especially in the area of skills acquisition programmes and awareness campaign for the development of humanity. Aims  Promoting human development through coordination ideas, toward efficient and effective provision of skills acquisition programmes to the society for self-sustenance and development.  Providing measures in discouraging corruption, child abuse, human trafficking with particular interest on disaster prevention, accident and emergency rescue assistance  Promotingeducation, budget monitoringand tracking and volunteerism to the society.  Empowering youths especially women and child in the society in order to become self-reliance
  • 5. 5  Transforming hopeless-ness into hope and through human resource developmental activities Sustainable Strategy Paymentof some token fee by client/trainees, complementary resources from partners, financial support from yahaya Danjuma yusif founder and the president/CEO IHDIT as well as sourcing for sponsor to finance or support a project where and when the need arises. Achievement From the inception of IHDIT in August 2005 to August 2014. Institute for human Development and information Technology (IHDIT) has carried out several training programmes with the following achievements;  Establishments of skills acquisition training centre at Tarauni, Kano state.  Training of Academic and Staff of Kano state college of art. Science and remedial studies (CAS) Kano.  Training of staff and students at el-imam group of group of schools, Zaria city, Kaduna state  Trainingof medical and health workersof Gwagwarwaclinic Nassarawa local Government Kano.  Recipient of 2007 state literacy award during the international literacy day hosted in Kano state agency for mass education  Conducted seminars in collaboration with FEDERAL COLLEGE OF AGRICULTURAL PRODUCE TECHNOLOGY KANO, Themes: importance, principaland practice of food preservation and storage in the year 2011  Training of people from different client in Kano state in collaboration with AMERICAN CORNER on intensive computer maintenance and networking courses.  Training of almost one hundred member of Nurse and midwifery’s of Mallam Aminu Kano Teaching hospital (FFHINAM) AKTH Kano.  Conducted Arabic computer literacy training for 600 people in collaboration with yakubu H. Sabo togo Hon councilor hotoro ward Nassarawa local government Kano in 2010  Organized training tagged. Global community Empowerments project, partnership with Ministry of Education, Science technology and
  • 6. 6 innovation Kano state with vision of training.66000 people across 44 local government of Kano state and extend the project to 774 local government Across Nigeria in future. History of CCTV Camera Home and business security is important for many society. Many believe that, they need only home while other business security is important especially when individual own a lot of expensive items, but this is not entirely true. Anyone who owns a home or a business can benefit from CCTV (Closed Circuit Television) Cameras. It was estimated that, there is about 350 million surveillance cameras installed worldwide as of 2016 compared to the 160 million 2012. However, 65% of these cameras are installed in Asia and growth of CCTV has been slowing in recent years. Furthermore, Closed circuit Television, allowsyou to video tape a specific area inside or outside the home. In many cases, these cameras can be linked to warning systems inside the home or alert the police or other emergency contacts. This video tape can be watched at the time of the taping, or it can be watched later, in case there was a problem. Closed circuit Television is a TV system in which signals are not publicly distributed but are monitored, primary for surveillanceand security purposes Rouse, (2012). The first CCTV system was installed by Siemens AG at Test Stand 7 in Peenemünde, Nazi Germany in 1942, for observing the launch of V-2 rockets. The German engineer Walter Bruch was in charge for the designed, technological and installation of the system. In United State of America the first commercial closed-circuit television system became available in 1949, called Vericon. Very little is known about Vericon except it was advertised as not requiring a government permit. Technological Development of CCTV The earliest video surveillance systems involved constant monitoring because it was not record and store information. The development of reel-to-reel media enabled the recording of surveillance footage. The system required magnetic tapes changed manually, which was a time consuming, expensive
  • 7. 7 and unreliable process, with the operator having to manually thread the tape from the tape reel through the recorder onto an empty take-up reel. Because of the shortcomings, video surveillance was not widespread. VCR technology became available in the 1970s, making it easier to record and erase information, and video surveillance became more common. During1990s, digitalmultiplexingwasdeveloped, allowingseveralcameras to record at once, as well as time lapse and motion-only recording. This increased savings of time and money which then led to an increase in the use of CCTV. In recent times CCTV technology has been enhanced with a shift toward Internet-based products and systems, and other technological developments. Components of a CCTV System Cameras get most of the attention in the beginning, you also have other concerns, such as viewing, recording, and archiving the video footage, and the equipment required for carrying out those tasks. Here’s a look at the basic components of a typical CCTV system. Cameras Security cameras are the starting point for most CCTV systems. There are endless possibilities when choosing CCTV cameras and lenses – everything from fixed models designed for monitoring very specific locations, to day/night cameras, and powerful PTZ domes for patrolling large areas. Monitor In a traditional CCTV setup, operators view footage from a central location on a monitor very much like a TV, but with higher lines of resolution for better picturequality. Monitorscan be dedicated (meaning they display video from a single camera), or call-up (meaning operators can access multiple cameras at the same time).
  • 8. 8 Cable With an analogue system, coaxial cable is required for transmitting video footage from the cameras. This is one of the drawbacks of analogue CCTV, as the cable can be expensive and difficult to install, especially for larger camera networks, and those were cameras must be positioned in difficult locations. DVR Most modern CCTV systems incorporate DVRs (digital video recorders) which enable operators to reap some of the benefits of a network-based surveillance setup. DVRs convert the analogue footage to digital, which helps to extend storage capacity, makes it much easier to search archived footage, and also allows usersto stream video over a network for remote viewingfrom multiple locations.
  • 9. 9 Types of CCTV Security Cameras Fixed Fixed CCTV cameras point in a single direction, which makes them perfect for monitoring very specific areas of interest. For this reason, fixed cameras are quite effective not only for capturingfootage of suspiciousactivity, but also for deterring criminals and vandals from carrying out their acts in the first place. PTZ PTZ cameras are ideal for wide-area surveillance. They give operators the ability to remotely control pan, tilt, and zoom functions to follow activity and to zoom in for detailed monitoring. This is an area where analogue CCTV cameras fall behind their IP camera counterparts. With IP cameras, the pan/tilt/zoom functions are controlled manually or automatically and delivered over a single network cable, while analogue cameras require additional wiring to perform similar functionality. Understanding CCTV Image Resolution The image detail of an analogue CCTV camera is usually conveyed in a form of measurement called TVL (or TV Lines). Think of the video picture as being composed of active horizontal lines. These lines are delivered to a monitor or recording device in two off-set fields. One field contains even-numbered lines while the other contains odd- numbered lines. The viewer sees a complete picture because the lines are interlaced. Since the picture has a 3×4 aspect ratio, the amount of detail you can measure in 3/4 of the picture’s width determines the horizontal TVL resolution. Generally, most standard CCTV cameras offer a TVL resolution of around 380, while high-resolution cameras will deliver something closer to 540 TVL. Usages of Cameras However, an important feature of some CCTV systems is the ability to take high resolution images of the camera scene, e.g. on a time lapse or motion- detection basis. Images taken with a digital still camera often have higher
  • 10. 10 resolution than those taken with some video cameras. Increasingly, low-cost high-resolution digital still cameras can also be used for CCTV purposes Wikipedia & Rouse, (2012) identified some relevance of CCTV Surveillance systems were most effective in parking lots, where their use resulted in a 51% decrease in crime; Public transportation areas saw a 23% decrease in crimes;  Crime prevention  Industrial processes that take place under conditions dangerous for humans are now supervised by CCTV.  Traffic monitoring using closed circuit television to detect congestion and notice accidents  Many sporting events are now use CCTV inside the venue for fans to see the action while they are away from their seats  CCTV widely using at schools to stop bullying, vandalism, monitoring visitors and maintaining a record of evidence in the event of a crime  Cameras are generally acceptable in hallways, parking lots, front offices where students, employees, and parents come and go, gymnasiums, cafeterias, supply rooms and classrooms. The installation of cameras in classrooms may be objected to by some teachers  Organizationsuse CCTVto monitor actions of workers. Actions which an employer may wish to monitor could include: • Scanning, selection of goods, introduction of price and quantity; • Input and output operators in the system when entering passwords; • Deleting operations and modifying existing documents; • Implementation of certain operations, such as financial statements or operations with cash; • Moving goods, revaluation scrapping and counting; • Control in the kitchen of fast food restaurants; • Change of settings, reports and other official functions. On the other hand, criminals may use surveillance cameras to monitor the public. For example, a hidden camera at an ATM can capture people's PINs as they are entered, without their knowledge. The devices are small enough not
  • 11. 11 to be noticed, and are placed where they can monitor the keypad of the machine. Images transmitted wirelessly to the criminal. Video surveillance and terrorism Material collected by surveillance cameras has been used as a tool in post- event forensics to identify tactics, techniques and perpetrators of terrorist attacks. Furthermore, there are various projects − such as INDECT − that aim to detect suspicious behaviours of individuals and crowds. It has been argued that terrorists won't be deterred by cameras, that terror attacks aren't really the subject of the current use of video surveillance and that terrorists might even see it as an extra channel for propaganda and publication of their acts. Privacy Civil liberties campaign groups, academics and consultants have been published research papers into CCTV systems. Opponents of CCTV point out the loss of privacy of people under surveillance, and the negative impact of surveillance on civil liberties. Furthermore, they argue that CCTV displaces crime, rather than reducing it. Critics often dub CCTV as "Big Brother surveillance", a reference to George Orwell's novel Nineteen Eighty-Four, which featured a two-way telescreen in every home through which The Party would monitor the populace. Proponentsof CCTV cameras argue that cameras are effective at deterring and solving crime, and appropriate regulation and legal restrictions on surveillance of public spaces can provide sufficient protections so that an individual's right to privacy can reasonably be weighed against the benefits of surveillance. Video Content Analysis (VCA) Is the capability of automatically analyzing video to detect and determine temporal events not based on a single image, as such, it can be seen as the automated equivalent of the biological visual cortex. The system using VCA recognize changes in the environment and even identify and compare objects in the database usingsize, speed, and sometimes colour. The camera's actions can be programmed based on what it is "seeing". For example; an alarm can be issued if an object has moved in a certain area, or if a painting is missing from a wall, or if a smoke or fire is detected, or if
  • 12. 12 running people are detected, or if fallen people are detected and if someone has spray painted the lens, as well as video loss, lens cover, defocus and other so called camera tampering events. Facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database. Kind of Cameras There are several CCTV cameras on the market and it is important to get the one that will work best for your situation. In camera settings there are different connectivity choices, including wired, wireless, closed system and IP or Network. Closed systems will use a DVR and can only be accessed with the monitor. IP/network connectivity can allow you to view the video footage online, so you can view it at home or on the go. You can also search by color or brand. Kind of Cameras Why It Is Used Wireless Camera  There are fewer wires to be installed and hidden.  Criminals cannot easily cut wires to stop the videotaping and transmission.  They are easier install than wired cameras. Night Vision Cameras  Crime does not stop at the end of the day; night vision makes it easier to see intruder.  Using a camera that will switch itself between night and day visions is even better, as this automatically ensures the best picture. Indoor/Outdoor Cameras  Indoor cameras detect intruders already inside the house.  Indoor cameras can also ensure that family members are where they are supposed to be.  Outdoor cameras are used to keep control of possible intruders before they get inside the home.  Outdoor and Indoor cameras can protect against fire and other damage.
  • 13. 13 Motion Detection Cameras  These cameras are not always recording. They only start recording when there is motion outside or inside.  Because it does not record 24/7, it can save money and time because it will not waste tape. Analogue Camera Most analogue cameras systems today use a DVR as the recording medium. This allows the analogue signals to be digitized for recording and for delivery over the network. While a DVR solution is a cost-effective alternative to IP video, and provides users with valuable benefits such as digital storage and remote accessibility, there are drawbacks. One is a slight drop-off in image quality. Simply put, it’s harder to retain image quality in this type of setup because of the various analogue-to-digital conversions that take place from the camera to the recorder. Cabling distance also plays a role, as the further the video signals travel, the weaker they become. Still, a DVR-based solution is a very good option for users looking to reap some of the benefits of digital IP surveillance while using lower-cost CCTV cameras. IP cameras (Internet protocol cameras) It is estimated that 2014 was the first year that IP cameras outsold analog cameras. IP cameras use the Internet Protocol (IP) used by most Local Area Networks (LANs) to transmit video across data networks in digital form. IP
  • 14. 14 optionally transmitted across the public internet, allowing users to view their cameras through any internet connection available over a computer or phone, this is considered remote access. For professional or public infrastructure security applications, IP video is restricted within a private network or VPN, or can be recorded onto a remote server. Wireless security cameras Several consumers are turning to wireless security cameras for home surveillance. Wireless cameras do require a video cable for video/audio transmission, simply a cable for power. Wireless cameras are also easy and inexpensive to install, but lack reliability of hard-wired cameras. Previous generations of wireless security cameras relied on analog technology; modern wireless cameras depend on digital technology which give crisper audio, sharper video, a secure and interference-free signal. Retention, storage and preservation Most CCTV systems may record and store digital video and images to a digital video recorder (DVR) or, in the case of IP cameras, directly to a server, either on-site or offsite. There is a cost in the retention of the images produced by CCTV systems. The amount and quality of data stored on storage media is subject to compression ratios, images stored per second, image size and is effected by the retention period of the videos or images. DVRs store images in a variety of proprietary file formats. Recordings may be retained for a preset sum of time and
  • 15. 15 automatically archived, overwritten or deleted, the period being determined by the organisation that generated them. However, an important feature of some CCTV systems is the ability to take high resolution images of the camera scene, e.g. on a time lapse or motion- detection basis. Images taken with a digital still camera often have higher resolution than those taken with some video cameras. Increasingly, low-cost high-resolution digital still cameras can also be used for CCTV purposes. Integrated systems Integrated systems allow different security systems, like CCTV, access control, intruder alarms and intercoms to operate together. For example, when an intruder alarm is activated, CCTV cameras covering the intrusion area are recorded at a higher frame rate and transmitted to an Alarm Receiving Centre. Factor to consider in cameras installation plan In camera installation, there is a number of factor to consider when someone planned to install or purchase the packages. Here is a list of things to consider when shopping for and planning to install a video surveillance system.  How to estimate how many cameras need? Most cameras provide a 90 degree viewing angle. Such as HD dome cameras provide video coverage for an entire small to medium sized room when ceiling mounted in the corner of a room. Varifocal dome cameras like these allow you to adjust the angle of view/zoom level using dials on the lens during installation. 180 degree fish-eye cameras go even wider, but are not going to be as clear in the distance.  Where will I store the DVR and power supplies for the cameras? All of your cables will be run from each camera back to your DVR and power supply location. Customers typically place their DVR and power supply(s) in a data closet or in an office that will be used to manage the system.  How far will the cameras be located from the DVR and power supply? Mostof our surveillance systems include a 100 foot CCTV cable for each camera. However, longer and shorter premade cables are available and you can also use a spool of RG59 cable which allows you to cut the cable lengths to an exact length.
  • 16. 16  Do you want to access your cameras remotely? Almost all customers want this feature. iDVR-PRO systems support it and also the ability to search and playback recorded video surveillance footage. Apps for iOS, Android, Windows, and Mac are included. If you want to access your system remotely, you must have an Internet connection at the location of your DVR. Your DVR will be hard wired to your network router using a CAT- 5 cable.  Do I Need a Professional Installer? Connecting CCTV cameras to a DVR is a lot like setting up a TV and stereo system. Here is what we tell them. If you are able to mount your own cameras and run cables to all of the camera locations, you can probably handle the installation yourself. Equipment Needed for Camera Installation Before you install your CCTV camera, you must have correct equipment for installation. When searching for a camera to purchase, look at all the items included with the CCTV camera. For instance, most packages may possibly contain the camera and cords. While others may includesome sort of player to view the tapes, added cords, or even a remote control. If the camera you purchase does not come with cords, you should purchase a standard CCTV installation cord or RG59 Siamese Cables. Other equipment needed can include a screwdriver, drill, screws, and more others.
  • 17. 17 Steps to Install Cameras (CCTV) In many cases people tend to have a camera that can do everything. The night vision cameras are extremely popular because they are able to produce clear video no matter the hour. For those who want added security without all the added fuss, motion detection cameras can be a great choice; however, the decision will ultimately lie with you and your family. Beforebuyingcameras, it is importantto understand how camera will be used and the type of budget allowed for the camera. Firstly, step to install camera is to ensure that everything you need possibly came within the camera packages. This may include a DVR, camera or cameras, and cords. Secondly, find the best place for the camera or cameras. This depend on where you need coverage. Many peoplefind it best to place cameras close to the front and back doors so that they can see if someone is entering their home or business. Camera should still be placed in an area that allows a full scan of the home entrance, as well as the lawn or walkway.
  • 18. 18 Most people tend to place their camera where the roof meets the house walls, at the corner. This allows the camera to view a nice sized area, but it probably give shelter to the camera from rain, sun, snow or wind. This help prevent vandalism of the camera. When you have an idea of where you want the camera placed, it is time to start installation after considering the following;  Testing your cameras before installation  Confirm cameras are working properly before mounting  Test all the cables if you are using premade CCTV cables  Configure video inputs on DVR for SD/HD cameras If you are usinga hard-wired CCTVcamera, you will need to run cord from the camera into the home. If you have an attic, this is a great place to put all your lines; however, if you do not have an attic, just try to run the cord into an area that will be easy to get to. After runningthecords, you will want to designate a place for the monitor and DVR to be placed. This can be anywhere in the home, and most people choose to place it in a home office or bedroom. Once you have chosen the room that will be the monitoring station, you will have to run all the cords into that room from the attic or other area, then connect the connectors to the DVR. Install the cameras by drilling holes into the area designated. Then, put the camera in place by screwing the screws into the holes provided. Please read the manufacturer's installation guide before doing this. Once connected, the cameras will need to be plugged into the power supply. You have two options here. Plug each camera into an outlet separately using pig-tails, or use an AC/DC power pack to plug all the camera lines into one box and connect one AC line from the box to the outlet If the DC power of your home is not sufficient for the cameras, you can cause damage to the cameras or the home, so check to ensure that the DC power required is sufficient before plugging the cameras into the power supply. Before turning on the power to the cameras, connect your monitor to your DVR.
  • 19. 19 Once everything is hooked up and ready to go, it is important to start taping immediately so you can check to ensure everything is working properly. This is also the time to learn more about the system. Soft Ware Configuring of DVR After you unpack your new DVR, Connect the power supply included with your DVR to the power input on the back of the DVR, then to a power source (wall outlet). The DVR will boot up. Then locate the USB mouse that is included. Connect the mouse to the USB port on the front or back of the DVR (there are two). The USB mouse is the easiest way to navigate the user interface of the DVR. You can also use the IR remote control if you prefer. There are a few things we will need to tweak to make sure we get accurate recordings. You can do this using the Setup Wizard as well as doing it manually. Login to the DVR by right clicking on your mouse and select Main Menu. A prompt for your username and password will appear. You can usethe 888888or the admin to configureyour DVR and the password will be the same as the users’ name. After you have logged in the MAIN MENU window will appear.
  • 20. 20 DVR main Menu Next click on SETTINGS then GENERAL. Under the GENERAL settings make sure the system time is set correctly based on your Time Zone. Make sure you click “SAVE” after changing the time. Next you can change the Date Format to MM/DD/YYYY. You can also set the Time Format to 12H or 24H if you like. Here is a screenshot of the general settings
  • 21. 21 Next we can see the schedule of how your DVR will be recording. Under the SETTINGS page click on SCHEDULE then the following window will appear: Next setting to configureand one of the most importantones is the ENCODING (CameraResolution). Under SETTINGS click on ENCODE and the next window will appear: Lastly you can configure the sensitivity of the camera by going to SETTING and select DETECT.
  • 22. 22 Factors affecting security cameras installation Cost is one among other factors, the specific type of camera being used has the most significant impact on its cost. The average cost of two digital cameras packaged with an LCD monitor is expensive. Different brands can also have different prices. The type of technology used has an impact of security camera installation cost and specific type of software being used has a role to play on its price. Wireless camera systems are generally more expensive than their wired counterparts. Budget for the installation of Cameras at the IHDIT Item Description Qty Price (₦) indoor AHD Camera Analogue HD camera (720p) for indoor 3 30,000 outdoor AHD Camera Analogue HD camera Bullet (720p) for outdoor 4 72,000 DVR iCloud enabled Digital Video recorder (DVR) – 8 channel 1 42,000 Power supply DC Power supply box (9 channel) 1 15,000 HDD SATA hard disk (500GB) 1 15,000 CCTV cable CCTV RG59 Cable with power (300m) 1 9,000 BNC plug BNC video plug 15 1500 Power Plug male Power plug 15 1500
  • 23. 23 Workmanship Installation/free by the student All 00 Total 186,000 Schematic Diagram of CCTV IHDIT Installation Conclusion A CCTV camera is another way we use a devices to protect our important belonging, including family and items in our home or business and there are many options available, it will take some time to decide which camera to use. It can also take time to install the camera correctly; however, once the camera is installed, it willbe available to help uskeep your home, business, and family safe. IndoorCameras ca OutdoorCameras DVR POWER R Monitor Main power
  • 24. 24 References  CCTV CAMERA PROs (2017). CCTV DVR SET https://www.cctvcamerapros.com/CCTV-DVR-Setup-s/934.htm  Security Camera Kings (2016). How to Install a CCTV Analog Camera System) https://www.securitycameraking.com/securityinfo/how-to-install-a-cctv-analog- camera-system/  Fang Security Infrastructure (2014). Intro to Analogue CCTV Surveillance http://www.fang.co.za/?page_id=528  Ebay shop (2017). how to install a CCTV camera http://www.ebay.com/gds/How-to-Install-a-CCTV-Camera- /10000000178258780/g.html  CCTV Camera Pros (2017). How-to Install a Security Camera System DIY Installation guide for iDVR-PRO CCTV & HD Security Camera Systems https://www.cctvcamerapros.com/How-to-Install-Security-Camera-System- s/1020.htm  Rouse M. (2012). CCTV Closed Circuit Television. Tech Target  Wikipedia (2017) Closed circuit television https://en.wikipedia.org/wiki/Closed- circuit_television