SlideShare a Scribd company logo
1 of 10
Republic of the Philippines



(Formerly Eulogio ‘Amang’ Rodriguez Institute of Science and Technology)
               Nagtahan, Sampaloc, Manila 1008

                          COLLEGE OF ARTS AND SCIENCES




           Proposed Class Monitoring
           System using Surveillance
                          Camera for CAS,
                                               ESC




                                             Presented by:

                                         Raymart A. Aborque

                                         Rodolfo B. Delorino

                                         Joemary A. Olanka

                                       Mark Bryan F. Ramirez

                                        Ron Nikko T. Socorro
CHAPTER 1


Introduction


       Monitoring is the regular observation and recording of activities taking place in a

project or programmed. It is a process of routinely gathering information on all aspects

of the project, supervising activities in progress to ensure they are on-course and on-

schedule in meeting the objectives and performance targets. To monitor is to check on

how project activities are progressing. It is observation; ─ systematic and purposeful

observation.


       Monitoring also involves giving feedback about the progress of the project to the

donors, implementers and beneficiaries of the project. Reporting enables the gathered

information to be used in making decisions for improving project performance. To

observe, supervise, or keep under review; to measure or test at intervals,

especially for the purpose of regulation or control, or to check or regulate the technical

quality of something.


       On the other hand, Surveillance is a process of close monitoring of behavior.

Ongoing close observation and collection of data or evidence, for a specified purpose or

confined to a narrow sector. In comparison, environmental scanning is broad and

includes all associated external factors.
"Sur-Veillance" is French for to "watch from above". Note the all seeing "eye-in-

the-sky" in this London Transport poster. Although the word surveillance literally means

(in French) "to watch from above" (i.e. a God's-eye view looking down from on-high) the

term is often used for all forms of observation, not just visual observation. However, the

all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to

describe observation from a distance by means of electronic equipment or other

technological means.


       Surveillance is the art of watching over the activities of persons or groups from a

position of higher authority. Surveillance may be covert (without their knowledge) or

overt (perhaps with frequent reminders such as "we are watching over you").

Surveillance has been an intrinsic part of human history. Sun Tzu's The Art of War,

written 2,500 years ago, discusses how spies should be used against a person's

enemies. But modern electronic and computer technology have given surveillance a

whole new means of operation. Surveillance can be automated using computers, and

people leave extensive records that describe their activities.


       Counter surveillance is the practice of avoiding surveillance or making it difficult.

Before computer networks, counter surveillance involved avoiding agents and

communicating secretly. With recent development of the Internet and computer

databases counter surveillance has grown. Now counter surveillance involves

everything from knowing how to delete a file on a computer to avoiding becoming the

target of direct advertising agencies.
Inverse surveillance is the practice of reversalism on surveillance, e.g. citizens

photographing police, shoppers photographing shopkeepers, and passengers

photographing cab drivers who usually have surveillance cameras in their cabs. A well-

known example is George Haliday's recording of the Rodney King beating. Inverse

surveillance attempts to subvert the panoptic gaze of surveillance, and often attempts to

subvert the secrecy of surveillance through making the inverse surveillance recordings

widely available (in contrast to the usually secret surveillance tapes).
Background of the Study


       CCTV was first utilized by the United States Military in the 1940s. Closed circuit

cameras were set up during the testing of the V2 missile in order to safely monitor the

tests. By using CCTV, officials were able to monitor the testing at close range without

danger, watching out for defects and other problems that might have otherwise gone

undetected.


       In the 1960s, officials in the UK began installing CCTV systems in public places

to monitor crowds during rallies and appearances of public figures. Installation of

cameras became more popular, both in public spaces and retail stores, as the

technology developed. Today in Britain, CCTV cameras monitor roads, sidewalks and

squares in city centers, public rail stations and buses, as well as in retail shops and

other businesses. In 1996, government spending on CCTV technology accounted for

three quarters of the crime prevention budget in the UK.


       In the United States, the first CCTV system set up in a public building was in

1969 in the New York City Municipal building. This practice quickly spread to other cities

and was soon widely implemented. Unlike the UK, CCTV in public spaces in the United

States is rarely used. However, in the 1970s and 80s, CCTV use became more

common in establishments prone to security threats, like banks, convenience stores,

and gas stations. Security cameras were installed in the World Trade Center as a

preventative after the terrorist attack in 1993. By the mid-90s, ATMs across the country

were commonly equipped with CCTV cameras, and many retail stores used CCTV to

prevent theft.
Personal use of CCTV technology has become more widespread as the

technology has become much easier to acquire. Many utilize CCTV systems in their

own homes to catch cheating spouses, or to monitor the care of their children in

"Nannycams."
Conceptual Framework




                                                                        Output
             Input
                                            Process
                                                                Proposed          Class
  Video Footages taken
                                  Gathering             and     Monitoring       System
  at   a     certain   room
                                  recording     of     taken    using CCTV Camera
  provided by the CCTV
                                  videos.                       at CAS, ESC Manila.
  camera.




                                            Feedback

Figure 1.1    The Input – Process – Output Diagram that shows the flow of data and
                    footages from each of the rooms in CAS and how it processes.
Statement of the Problem


   1. What the said Monitoring System may contribute and how will it meet the

       College’ needs particularly to:

       a. Security and Awareness,

       b. Attendance Checking, and

       c. Classroom Surveillance?



   2. How this Class Monitoring System can be operated by the user in terms of:

       a. Accessibility,

       b. User Friendliness, and

       c. User Interface?



Assumption

       The researchers assumed that this study is much of need in each of the

classrooms in College of Arts and Sciences in order to keep orderliness in a certain

room that when observed, armchairs were in an improper arrangement and the

classrooms left unclean. In CAS Department, they used to check each of the rooms

manually to ensure if every professor is attending their classes. Instead of walking along

corridors, it will be a much of help for the checkers find out every professors’ behavior,

and it will be easy for them to record as well as their attendance.
Significance of the Study


       Monitoring provides information that will be useful in:


   •   Analyzing the situation in the community and its project;

   •   Determining whether the inputs in the project are well utilized;

   •   Identifying problems facing the community or project and finding solutions;

   •   Ensuring all activities are carried out properly by the right people and in time;

   •   Using lessons from one project experience on to another; and

   •   Determining whether the way the project was planned is the most appropriate

       way of solving the problem at hand.


Scope and Limitation

       The study is limited to College of Arts and Sciences’ classroom’s including all

students, professors and employees of the said college.

       Mainly, the study was focused on monitoring and checking of each room as well

as the security of CAS at ESC, Manila. The system can also provide the attendance of

the professor whether he/she is in or not.
Definition of Terms

Monitoring            –   the act of observing something (and sometimes

                                keeping a record of it).

Camera                –   equipment for taking photographs.

Surveillance Camera   –   "Surveillance" comes from a French word that means

                                "to watch over;" camera surveillance uses

                                       photography to watch over people in

public spaces.


CCTV                  –   Closed-circuit television (CCTV) is the use of video

                                cameras to transmit a signal to a specific

place.

More Related Content

What's hot

Police administrative disciplinary machinery
Police administrative disciplinary machineryPolice administrative disciplinary machinery
Police administrative disciplinary machineryayyel
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtrootJohanes Tayam
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012armaexen
 
Technical English 1
Technical English 1Technical English 1
Technical English 1EdselOplas1
 
Drug courier problem as of 02 feb
Drug courier problem as of 02 febDrug courier problem as of 02 feb
Drug courier problem as of 02 febpiabohol
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of SecurityDM_GS
 
Polce organization and administration (presented by Crmnlgst. Dominic Guiao)
Polce organization and administration (presented by  Crmnlgst. Dominic Guiao)Polce organization and administration (presented by  Crmnlgst. Dominic Guiao)
Polce organization and administration (presented by Crmnlgst. Dominic Guiao)Dominic Guiao
 
Compilation of previous board examination questions
Compilation of previous board examination questionsCompilation of previous board examination questions
Compilation of previous board examination questionsRhem Rick Corpuz
 
COMPARATIVE MODEL POLICING SYSTEMpptx
COMPARATIVE MODEL POLICING SYSTEMpptxCOMPARATIVE MODEL POLICING SYSTEMpptx
COMPARATIVE MODEL POLICING SYSTEMpptxNioAbaoCasyao
 
Law enforcement in thailand july15 2010
Law enforcement in thailand july15 2010Law enforcement in thailand july15 2010
Law enforcement in thailand july15 2010bigdog Loo
 
Introduction to Criminology and Psychology of Crimes
Introduction to Criminology and Psychology of CrimesIntroduction to Criminology and Psychology of Crimes
Introduction to Criminology and Psychology of CrimesNoemi Domingo-Cafirma
 
RA 9163 and ROTC
RA 9163 and ROTCRA 9163 and ROTC
RA 9163 and ROTCnstp1uerm
 

What's hot (20)

Police administrative disciplinary machinery
Police administrative disciplinary machineryPolice administrative disciplinary machinery
Police administrative disciplinary machinery
 
Pnp operational procedure
Pnp operational procedurePnp operational procedure
Pnp operational procedure
 
3 handcuffing foxtroot
3 handcuffing foxtroot3 handcuffing foxtroot
3 handcuffing foxtroot
 
Basic intelligence
Basic intelligenceBasic intelligence
Basic intelligence
 
Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012Republic Act 10175 - Cyber Crime Prevention Act of 2012
Republic Act 10175 - Cyber Crime Prevention Act of 2012
 
Technical English 1
Technical English 1Technical English 1
Technical English 1
 
MANUAL ON BARANGAY PEACEKEEPING OPERATIONS - BPAT
MANUAL ON BARANGAY PEACEKEEPING OPERATIONS - BPATMANUAL ON BARANGAY PEACEKEEPING OPERATIONS - BPAT
MANUAL ON BARANGAY PEACEKEEPING OPERATIONS - BPAT
 
Drug courier problem as of 02 feb
Drug courier problem as of 02 febDrug courier problem as of 02 feb
Drug courier problem as of 02 feb
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of Security
 
ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)
 
Polce organization and administration (presented by Crmnlgst. Dominic Guiao)
Polce organization and administration (presented by  Crmnlgst. Dominic Guiao)Polce organization and administration (presented by  Crmnlgst. Dominic Guiao)
Polce organization and administration (presented by Crmnlgst. Dominic Guiao)
 
A REVIEW OF BPAT
A REVIEW OF BPATA REVIEW OF BPAT
A REVIEW OF BPAT
 
Compilation of previous board examination questions
Compilation of previous board examination questionsCompilation of previous board examination questions
Compilation of previous board examination questions
 
Ncbts vs. code of ethics
Ncbts  vs. code of ethicsNcbts  vs. code of ethics
Ncbts vs. code of ethics
 
COMPARATIVE MODEL POLICING SYSTEMpptx
COMPARATIVE MODEL POLICING SYSTEMpptxCOMPARATIVE MODEL POLICING SYSTEMpptx
COMPARATIVE MODEL POLICING SYSTEMpptx
 
K-12 Curriculum (about)
K-12 Curriculum (about)K-12 Curriculum (about)
K-12 Curriculum (about)
 
Law enforcement in thailand july15 2010
Law enforcement in thailand july15 2010Law enforcement in thailand july15 2010
Law enforcement in thailand july15 2010
 
Introduction to Criminology and Psychology of Crimes
Introduction to Criminology and Psychology of CrimesIntroduction to Criminology and Psychology of Crimes
Introduction to Criminology and Psychology of Crimes
 
RA 9163 and ROTC
RA 9163 and ROTCRA 9163 and ROTC
RA 9163 and ROTC
 
Qde reviewer
Qde reviewerQde reviewer
Qde reviewer
 

Viewers also liked

Problem Statement 06 BENEFICIARY - Who exactly will benefit from the proposal
Problem Statement 06 BENEFICIARY - Who exactly will benefit from the proposalProblem Statement 06 BENEFICIARY - Who exactly will benefit from the proposal
Problem Statement 06 BENEFICIARY - Who exactly will benefit from the proposalJaime Alfredo Cabrera
 
Proposal writing fms research seminar series
Proposal writing   fms research seminar seriesProposal writing   fms research seminar series
Proposal writing fms research seminar seriesShameem Ali
 
Research Proposal 4 - Sample Thesis Statement and Proposal Summary
Research Proposal 4 - Sample Thesis Statement and Proposal SummaryResearch Proposal 4 - Sample Thesis Statement and Proposal Summary
Research Proposal 4 - Sample Thesis Statement and Proposal SummaryJaime Alfredo Cabrera
 
Identifying the inquiry and stating the problem(Practical Research)
Identifying the inquiry and stating the problem(Practical Research)Identifying the inquiry and stating the problem(Practical Research)
Identifying the inquiry and stating the problem(Practical Research)majoydrew
 
Significance of research - Research Methodology - Manu Melwin Joy
Significance of research - Research Methodology - Manu Melwin JoySignificance of research - Research Methodology - Manu Melwin Joy
Significance of research - Research Methodology - Manu Melwin Joymanumelwin
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposalguest349908
 

Viewers also liked (7)

Problem Statement 06 BENEFICIARY - Who exactly will benefit from the proposal
Problem Statement 06 BENEFICIARY - Who exactly will benefit from the proposalProblem Statement 06 BENEFICIARY - Who exactly will benefit from the proposal
Problem Statement 06 BENEFICIARY - Who exactly will benefit from the proposal
 
Proposal writing fms research seminar series
Proposal writing   fms research seminar seriesProposal writing   fms research seminar series
Proposal writing fms research seminar series
 
Writing a successful research funding bid
Writing a successful research funding bidWriting a successful research funding bid
Writing a successful research funding bid
 
Research Proposal 4 - Sample Thesis Statement and Proposal Summary
Research Proposal 4 - Sample Thesis Statement and Proposal SummaryResearch Proposal 4 - Sample Thesis Statement and Proposal Summary
Research Proposal 4 - Sample Thesis Statement and Proposal Summary
 
Identifying the inquiry and stating the problem(Practical Research)
Identifying the inquiry and stating the problem(Practical Research)Identifying the inquiry and stating the problem(Practical Research)
Identifying the inquiry and stating the problem(Practical Research)
 
Significance of research - Research Methodology - Manu Melwin Joy
Significance of research - Research Methodology - Manu Melwin JoySignificance of research - Research Methodology - Manu Melwin Joy
Significance of research - Research Methodology - Manu Melwin Joy
 
The Research Proposal
The Research ProposalThe Research Proposal
The Research Proposal
 

Similar to Thesis

Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Electronic Surveillance by Kamal
Electronic Surveillance by KamalElectronic Surveillance by Kamal
Electronic Surveillance by KamalJotham Brad
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET Journal
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...IJECEIAES
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesTELKOMNIKA JOURNAL
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningIRJET Journal
 
Camera surveilance presentation 150812044730-lva1-app6891
Camera surveilance presentation 150812044730-lva1-app6891Camera surveilance presentation 150812044730-lva1-app6891
Camera surveilance presentation 150812044730-lva1-app6891Rameez Raja
 
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVAdvanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVIRJET Journal
 
Implementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemImplementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemCemal Ardil
 
cctv projectors teleforence ppt.pptx radio p.pptx
cctv projectors teleforence ppt.pptx radio p.pptxcctv projectors teleforence ppt.pptx radio p.pptx
cctv projectors teleforence ppt.pptx radio p.pptxMANJUNATHMP7
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsIRJET Journal
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET Journal
 

Similar to Thesis (20)

403 10
403 10403 10
403 10
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
SECURITYHIGHEND CSPL
SECURITYHIGHEND CSPLSECURITYHIGHEND CSPL
SECURITYHIGHEND CSPL
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Developing technology
Developing technologyDeveloping technology
Developing technology
 
Electronic Surveillance by Kamal
Electronic Surveillance by KamalElectronic Surveillance by Kamal
Electronic Surveillance by Kamal
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action Recognition
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenes
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learning
 
Camera surveilance presentation 150812044730-lva1-app6891
Camera surveilance presentation 150812044730-lva1-app6891Camera surveilance presentation 150812044730-lva1-app6891
Camera surveilance presentation 150812044730-lva1-app6891
 
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVAdvanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
 
ZONeSEC_newsletter_issue_5
ZONeSEC_newsletter_issue_5ZONeSEC_newsletter_issue_5
ZONeSEC_newsletter_issue_5
 
Implementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemImplementation of-a-motion-detection-system
Implementation of-a-motion-detection-system
 
cctv projectors teleforence ppt.pptx radio p.pptx
cctv projectors teleforence ppt.pptx radio p.pptxcctv projectors teleforence ppt.pptx radio p.pptx
cctv projectors teleforence ppt.pptx radio p.pptx
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled Regions
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
 
Smart Sensors, Smart Attendance System IDM15
Smart Sensors, Smart Attendance System  IDM15Smart Sensors, Smart Attendance System  IDM15
Smart Sensors, Smart Attendance System IDM15
 

More from cas123

ayan na
ayan naayan na
ayan nacas123
 
Scrnsht
ScrnshtScrnsht
Scrnshtcas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadcas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 

More from cas123 (20)

ayan na
ayan naayan na
ayan na
 
Scrnsht
ScrnshtScrnsht
Scrnsht
 
Print
PrintPrint
Print
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sad
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 

Recently uploaded

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 

Recently uploaded (20)

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 

Thesis

  • 1. Republic of the Philippines (Formerly Eulogio ‘Amang’ Rodriguez Institute of Science and Technology) Nagtahan, Sampaloc, Manila 1008 COLLEGE OF ARTS AND SCIENCES Proposed Class Monitoring System using Surveillance Camera for CAS, ESC Presented by: Raymart A. Aborque Rodolfo B. Delorino Joemary A. Olanka Mark Bryan F. Ramirez Ron Nikko T. Socorro
  • 2. CHAPTER 1 Introduction Monitoring is the regular observation and recording of activities taking place in a project or programmed. It is a process of routinely gathering information on all aspects of the project, supervising activities in progress to ensure they are on-course and on- schedule in meeting the objectives and performance targets. To monitor is to check on how project activities are progressing. It is observation; ─ systematic and purposeful observation. Monitoring also involves giving feedback about the progress of the project to the donors, implementers and beneficiaries of the project. Reporting enables the gathered information to be used in making decisions for improving project performance. To observe, supervise, or keep under review; to measure or test at intervals, especially for the purpose of regulation or control, or to check or regulate the technical quality of something. On the other hand, Surveillance is a process of close monitoring of behavior. Ongoing close observation and collection of data or evidence, for a specified purpose or confined to a narrow sector. In comparison, environmental scanning is broad and includes all associated external factors.
  • 3. "Sur-Veillance" is French for to "watch from above". Note the all seeing "eye-in- the-sky" in this London Transport poster. Although the word surveillance literally means (in French) "to watch from above" (i.e. a God's-eye view looking down from on-high) the term is often used for all forms of observation, not just visual observation. However, the all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to describe observation from a distance by means of electronic equipment or other technological means. Surveillance is the art of watching over the activities of persons or groups from a position of higher authority. Surveillance may be covert (without their knowledge) or overt (perhaps with frequent reminders such as "we are watching over you"). Surveillance has been an intrinsic part of human history. Sun Tzu's The Art of War, written 2,500 years ago, discusses how spies should be used against a person's enemies. But modern electronic and computer technology have given surveillance a whole new means of operation. Surveillance can be automated using computers, and people leave extensive records that describe their activities. Counter surveillance is the practice of avoiding surveillance or making it difficult. Before computer networks, counter surveillance involved avoiding agents and communicating secretly. With recent development of the Internet and computer databases counter surveillance has grown. Now counter surveillance involves everything from knowing how to delete a file on a computer to avoiding becoming the target of direct advertising agencies.
  • 4. Inverse surveillance is the practice of reversalism on surveillance, e.g. citizens photographing police, shoppers photographing shopkeepers, and passengers photographing cab drivers who usually have surveillance cameras in their cabs. A well- known example is George Haliday's recording of the Rodney King beating. Inverse surveillance attempts to subvert the panoptic gaze of surveillance, and often attempts to subvert the secrecy of surveillance through making the inverse surveillance recordings widely available (in contrast to the usually secret surveillance tapes).
  • 5. Background of the Study CCTV was first utilized by the United States Military in the 1940s. Closed circuit cameras were set up during the testing of the V2 missile in order to safely monitor the tests. By using CCTV, officials were able to monitor the testing at close range without danger, watching out for defects and other problems that might have otherwise gone undetected. In the 1960s, officials in the UK began installing CCTV systems in public places to monitor crowds during rallies and appearances of public figures. Installation of cameras became more popular, both in public spaces and retail stores, as the technology developed. Today in Britain, CCTV cameras monitor roads, sidewalks and squares in city centers, public rail stations and buses, as well as in retail shops and other businesses. In 1996, government spending on CCTV technology accounted for three quarters of the crime prevention budget in the UK. In the United States, the first CCTV system set up in a public building was in 1969 in the New York City Municipal building. This practice quickly spread to other cities and was soon widely implemented. Unlike the UK, CCTV in public spaces in the United States is rarely used. However, in the 1970s and 80s, CCTV use became more common in establishments prone to security threats, like banks, convenience stores, and gas stations. Security cameras were installed in the World Trade Center as a preventative after the terrorist attack in 1993. By the mid-90s, ATMs across the country were commonly equipped with CCTV cameras, and many retail stores used CCTV to prevent theft.
  • 6. Personal use of CCTV technology has become more widespread as the technology has become much easier to acquire. Many utilize CCTV systems in their own homes to catch cheating spouses, or to monitor the care of their children in "Nannycams."
  • 7. Conceptual Framework Output Input Process Proposed Class Video Footages taken Gathering and Monitoring System at a certain room recording of taken using CCTV Camera provided by the CCTV videos. at CAS, ESC Manila. camera. Feedback Figure 1.1 The Input – Process – Output Diagram that shows the flow of data and footages from each of the rooms in CAS and how it processes.
  • 8. Statement of the Problem 1. What the said Monitoring System may contribute and how will it meet the College’ needs particularly to: a. Security and Awareness, b. Attendance Checking, and c. Classroom Surveillance? 2. How this Class Monitoring System can be operated by the user in terms of: a. Accessibility, b. User Friendliness, and c. User Interface? Assumption The researchers assumed that this study is much of need in each of the classrooms in College of Arts and Sciences in order to keep orderliness in a certain room that when observed, armchairs were in an improper arrangement and the classrooms left unclean. In CAS Department, they used to check each of the rooms manually to ensure if every professor is attending their classes. Instead of walking along corridors, it will be a much of help for the checkers find out every professors’ behavior, and it will be easy for them to record as well as their attendance.
  • 9. Significance of the Study Monitoring provides information that will be useful in: • Analyzing the situation in the community and its project; • Determining whether the inputs in the project are well utilized; • Identifying problems facing the community or project and finding solutions; • Ensuring all activities are carried out properly by the right people and in time; • Using lessons from one project experience on to another; and • Determining whether the way the project was planned is the most appropriate way of solving the problem at hand. Scope and Limitation The study is limited to College of Arts and Sciences’ classroom’s including all students, professors and employees of the said college. Mainly, the study was focused on monitoring and checking of each room as well as the security of CAS at ESC, Manila. The system can also provide the attendance of the professor whether he/she is in or not.
  • 10. Definition of Terms Monitoring – the act of observing something (and sometimes keeping a record of it). Camera – equipment for taking photographs. Surveillance Camera – "Surveillance" comes from a French word that means "to watch over;" camera surveillance uses photography to watch over people in public spaces. CCTV – Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place.