SlideShare une entreprise Scribd logo
1  sur  10
Republic of the Philippines



(Formerly Eulogio ‘Amang’ Rodriguez Institute of Science and Technology)
               Nagtahan, Sampaloc, Manila 1008

                          COLLEGE OF ARTS AND SCIENCES




           Proposed Class Monitoring
           System using Surveillance
                          Camera for CAS,
                                               ESC




                                             Presented by:

                                         Raymart A. Aborque

                                         Rodolfo B. Delorino

                                         Joemary A. Olanka

                                       Mark Bryan F. Ramirez

                                        Ron Nikko T. Socorro
CHAPTER 1


Introduction


       Monitoring is the regular observation and recording of activities taking place in a

project or programmed. It is a process of routinely gathering information on all aspects

of the project, supervising activities in progress to ensure they are on-course and on-

schedule in meeting the objectives and performance targets. To monitor is to check on

how project activities are progressing. It is observation; ─ systematic and purposeful

observation.


       Monitoring also involves giving feedback about the progress of the project to the

donors, implementers and beneficiaries of the project. Reporting enables the gathered

information to be used in making decisions for improving project performance. To

observe, supervise, or keep under review; to measure or test at intervals,

especially for the purpose of regulation or control, or to check or regulate the technical

quality of something.


       On the other hand, Surveillance is a process of close monitoring of behavior.

Ongoing close observation and collection of data or evidence, for a specified purpose or

confined to a narrow sector. In comparison, environmental scanning is broad and

includes all associated external factors.
"Sur-Veillance" is French for to "watch from above". Note the all seeing "eye-in-

the-sky" in this London Transport poster. Although the word surveillance literally means

(in French) "to watch from above" (i.e. a God's-eye view looking down from on-high) the

term is often used for all forms of observation, not just visual observation. However, the

all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to

describe observation from a distance by means of electronic equipment or other

technological means.


       Surveillance is the art of watching over the activities of persons or groups from a

position of higher authority. Surveillance may be covert (without their knowledge) or

overt (perhaps with frequent reminders such as "we are watching over you").

Surveillance has been an intrinsic part of human history. Sun Tzu's The Art of War,

written 2,500 years ago, discusses how spies should be used against a person's

enemies. But modern electronic and computer technology have given surveillance a

whole new means of operation. Surveillance can be automated using computers, and

people leave extensive records that describe their activities.


       Counter surveillance is the practice of avoiding surveillance or making it difficult.

Before computer networks, counter surveillance involved avoiding agents and

communicating secretly. With recent development of the Internet and computer

databases counter surveillance has grown. Now counter surveillance involves

everything from knowing how to delete a file on a computer to avoiding becoming the

target of direct advertising agencies.
Inverse surveillance is the practice of reversalism on surveillance, e.g. citizens

photographing police, shoppers photographing shopkeepers, and passengers

photographing cab drivers who usually have surveillance cameras in their cabs. A well-

known example is George Haliday's recording of the Rodney King beating. Inverse

surveillance attempts to subvert the panoptic gaze of surveillance, and often attempts to

subvert the secrecy of surveillance through making the inverse surveillance recordings

widely available (in contrast to the usually secret surveillance tapes).
Background of the Study


       CCTV was first utilized by the United States Military in the 1940s. Closed circuit

cameras were set up during the testing of the V2 missile in order to safely monitor the

tests. By using CCTV, officials were able to monitor the testing at close range without

danger, watching out for defects and other problems that might have otherwise gone

undetected.


       In the 1960s, officials in the UK began installing CCTV systems in public places

to monitor crowds during rallies and appearances of public figures. Installation of

cameras became more popular, both in public spaces and retail stores, as the

technology developed. Today in Britain, CCTV cameras monitor roads, sidewalks and

squares in city centers, public rail stations and buses, as well as in retail shops and

other businesses. In 1996, government spending on CCTV technology accounted for

three quarters of the crime prevention budget in the UK.


       In the United States, the first CCTV system set up in a public building was in

1969 in the New York City Municipal building. This practice quickly spread to other cities

and was soon widely implemented. Unlike the UK, CCTV in public spaces in the United

States is rarely used. However, in the 1970s and 80s, CCTV use became more

common in establishments prone to security threats, like banks, convenience stores,

and gas stations. Security cameras were installed in the World Trade Center as a

preventative after the terrorist attack in 1993. By the mid-90s, ATMs across the country

were commonly equipped with CCTV cameras, and many retail stores used CCTV to

prevent theft.
Personal use of CCTV technology has become more widespread as the

technology has become much easier to acquire. Many utilize CCTV systems in their

own homes to catch cheating spouses, or to monitor the care of their children in

"Nannycams."
Conceptual Framework




                                                                        Output
             Input
                                            Process
                                                                Proposed          Class
  Video Footages taken
                                  Gathering             and     Monitoring       System
  at   a     certain   room
                                  recording     of     taken    using CCTV Camera
  provided by the CCTV
                                  videos.                       at CAS, ESC Manila.
  camera.




                                            Feedback

Figure 1.1    The Input – Process – Output Diagram that shows the flow of data and
                    footages from each of the rooms in CAS and how it processes.
Statement of the Problem


   1. What the said Monitoring System may contribute and how will it meet the

       College’ needs particularly to:

       a. Security and Awareness,

       b. Attendance Checking, and

       c. Classroom Surveillance?



   2. How this Class Monitoring System can be operated by the user in terms of:

       a. Accessibility,

       b. User Friendliness, and

       c. User Interface?



Assumption

       The researchers assumed that this study is much of need in each of the

classrooms in College of Arts and Sciences in order to keep orderliness in a certain

room that when observed, armchairs were in an improper arrangement and the

classrooms left unclean. In CAS Department, they used to check each of the rooms

manually to ensure if every professor is attending their classes. Instead of walking along

corridors, it will be a much of help for the checkers find out every professors’ behavior,

and it will be easy for them to record as well as their attendance.
Significance of the Study


       Monitoring provides information that will be useful in:


   •   Analyzing the situation in the community and its project;

   •   Determining whether the inputs in the project are well utilized;

   •   Identifying problems facing the community or project and finding solutions;

   •   Ensuring all activities are carried out properly by the right people and in time;

   •   Using lessons from one project experience on to another; and

   •   Determining whether the way the project was planned is the most appropriate

       way of solving the problem at hand.


Scope and Limitation

       The study is limited to College of Arts and Sciences’ classroom’s including all

students, professors and employees of the said college.

       Mainly, the study was focused on monitoring and checking of each room as well

as the security of CAS at ESC, Manila. The system can also provide the attendance of

the professor whether he/she is in or not.
Definition of Terms

Monitoring            –   the act of observing something (and sometimes

                                keeping a record of it).

Camera                –   equipment for taking photographs.

Surveillance Camera   –   "Surveillance" comes from a French word that means

                                "to watch over;" camera surveillance uses

                                       photography to watch over people in

public spaces.


CCTV                  –   Closed-circuit television (CCTV) is the use of video

                                cameras to transmit a signal to a specific

place.

Contenu connexe

Similaire à Thesis

Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET Journal
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...IJECEIAES
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesTELKOMNIKA JOURNAL
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningIRJET Journal
 
Camera surveilance presentation 150812044730-lva1-app6891
Camera surveilance presentation 150812044730-lva1-app6891Camera surveilance presentation 150812044730-lva1-app6891
Camera surveilance presentation 150812044730-lva1-app6891Rameez Raja
 
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVAdvanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVIRJET Journal
 
Implementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemImplementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemCemal Ardil
 
cctv projectors teleforence ppt.pptx radio p.pptx
cctv projectors teleforence ppt.pptx radio p.pptxcctv projectors teleforence ppt.pptx radio p.pptx
cctv projectors teleforence ppt.pptx radio p.pptxMANJUNATHMP7
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsIRJET Journal
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET Journal
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoringijtsrd
 

Similaire à Thesis (20)

403 10
403 10403 10
403 10
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
SECURITYHIGHEND CSPL
SECURITYHIGHEND CSPLSECURITYHIGHEND CSPL
SECURITYHIGHEND CSPL
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Developing technology
Developing technologyDeveloping technology
Developing technology
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action Recognition
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenes
 
Real Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learningReal Time Social Distance Detector using Deep learning
Real Time Social Distance Detector using Deep learning
 
Camera surveilance presentation 150812044730-lva1-app6891
Camera surveilance presentation 150812044730-lva1-app6891Camera surveilance presentation 150812044730-lva1-app6891
Camera surveilance presentation 150812044730-lva1-app6891
 
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVAdvanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
 
ZONeSEC_newsletter_issue_5
ZONeSEC_newsletter_issue_5ZONeSEC_newsletter_issue_5
ZONeSEC_newsletter_issue_5
 
Implementation of-a-motion-detection-system
Implementation of-a-motion-detection-systemImplementation of-a-motion-detection-system
Implementation of-a-motion-detection-system
 
cctv projectors teleforence ppt.pptx radio p.pptx
cctv projectors teleforence ppt.pptx radio p.pptxcctv projectors teleforence ppt.pptx radio p.pptx
cctv projectors teleforence ppt.pptx radio p.pptx
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled Regions
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
 
Smart Sensors, Smart Attendance System IDM15
Smart Sensors, Smart Attendance System  IDM15Smart Sensors, Smart Attendance System  IDM15
Smart Sensors, Smart Attendance System IDM15
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
 

Plus de cas123

ayan na
ayan naayan na
ayan nacas123
 
Scrnsht
ScrnshtScrnsht
Scrnshtcas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
My documentation
My documentationMy documentation
My documentationcas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadcas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 

Plus de cas123 (20)

ayan na
ayan naayan na
ayan na
 
Scrnsht
ScrnshtScrnsht
Scrnsht
 
Print
PrintPrint
Print
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
My documentation
My documentationMy documentation
My documentation
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sad
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 

Dernier

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 

Dernier (20)

Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 

Thesis

  • 1. Republic of the Philippines (Formerly Eulogio ‘Amang’ Rodriguez Institute of Science and Technology) Nagtahan, Sampaloc, Manila 1008 COLLEGE OF ARTS AND SCIENCES Proposed Class Monitoring System using Surveillance Camera for CAS, ESC Presented by: Raymart A. Aborque Rodolfo B. Delorino Joemary A. Olanka Mark Bryan F. Ramirez Ron Nikko T. Socorro
  • 2. CHAPTER 1 Introduction Monitoring is the regular observation and recording of activities taking place in a project or programmed. It is a process of routinely gathering information on all aspects of the project, supervising activities in progress to ensure they are on-course and on- schedule in meeting the objectives and performance targets. To monitor is to check on how project activities are progressing. It is observation; ─ systematic and purposeful observation. Monitoring also involves giving feedback about the progress of the project to the donors, implementers and beneficiaries of the project. Reporting enables the gathered information to be used in making decisions for improving project performance. To observe, supervise, or keep under review; to measure or test at intervals, especially for the purpose of regulation or control, or to check or regulate the technical quality of something. On the other hand, Surveillance is a process of close monitoring of behavior. Ongoing close observation and collection of data or evidence, for a specified purpose or confined to a narrow sector. In comparison, environmental scanning is broad and includes all associated external factors.
  • 3. "Sur-Veillance" is French for to "watch from above". Note the all seeing "eye-in- the-sky" in this London Transport poster. Although the word surveillance literally means (in French) "to watch from above" (i.e. a God's-eye view looking down from on-high) the term is often used for all forms of observation, not just visual observation. However, the all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to describe observation from a distance by means of electronic equipment or other technological means. Surveillance is the art of watching over the activities of persons or groups from a position of higher authority. Surveillance may be covert (without their knowledge) or overt (perhaps with frequent reminders such as "we are watching over you"). Surveillance has been an intrinsic part of human history. Sun Tzu's The Art of War, written 2,500 years ago, discusses how spies should be used against a person's enemies. But modern electronic and computer technology have given surveillance a whole new means of operation. Surveillance can be automated using computers, and people leave extensive records that describe their activities. Counter surveillance is the practice of avoiding surveillance or making it difficult. Before computer networks, counter surveillance involved avoiding agents and communicating secretly. With recent development of the Internet and computer databases counter surveillance has grown. Now counter surveillance involves everything from knowing how to delete a file on a computer to avoiding becoming the target of direct advertising agencies.
  • 4. Inverse surveillance is the practice of reversalism on surveillance, e.g. citizens photographing police, shoppers photographing shopkeepers, and passengers photographing cab drivers who usually have surveillance cameras in their cabs. A well- known example is George Haliday's recording of the Rodney King beating. Inverse surveillance attempts to subvert the panoptic gaze of surveillance, and often attempts to subvert the secrecy of surveillance through making the inverse surveillance recordings widely available (in contrast to the usually secret surveillance tapes).
  • 5. Background of the Study CCTV was first utilized by the United States Military in the 1940s. Closed circuit cameras were set up during the testing of the V2 missile in order to safely monitor the tests. By using CCTV, officials were able to monitor the testing at close range without danger, watching out for defects and other problems that might have otherwise gone undetected. In the 1960s, officials in the UK began installing CCTV systems in public places to monitor crowds during rallies and appearances of public figures. Installation of cameras became more popular, both in public spaces and retail stores, as the technology developed. Today in Britain, CCTV cameras monitor roads, sidewalks and squares in city centers, public rail stations and buses, as well as in retail shops and other businesses. In 1996, government spending on CCTV technology accounted for three quarters of the crime prevention budget in the UK. In the United States, the first CCTV system set up in a public building was in 1969 in the New York City Municipal building. This practice quickly spread to other cities and was soon widely implemented. Unlike the UK, CCTV in public spaces in the United States is rarely used. However, in the 1970s and 80s, CCTV use became more common in establishments prone to security threats, like banks, convenience stores, and gas stations. Security cameras were installed in the World Trade Center as a preventative after the terrorist attack in 1993. By the mid-90s, ATMs across the country were commonly equipped with CCTV cameras, and many retail stores used CCTV to prevent theft.
  • 6. Personal use of CCTV technology has become more widespread as the technology has become much easier to acquire. Many utilize CCTV systems in their own homes to catch cheating spouses, or to monitor the care of their children in "Nannycams."
  • 7. Conceptual Framework Output Input Process Proposed Class Video Footages taken Gathering and Monitoring System at a certain room recording of taken using CCTV Camera provided by the CCTV videos. at CAS, ESC Manila. camera. Feedback Figure 1.1 The Input – Process – Output Diagram that shows the flow of data and footages from each of the rooms in CAS and how it processes.
  • 8. Statement of the Problem 1. What the said Monitoring System may contribute and how will it meet the College’ needs particularly to: a. Security and Awareness, b. Attendance Checking, and c. Classroom Surveillance? 2. How this Class Monitoring System can be operated by the user in terms of: a. Accessibility, b. User Friendliness, and c. User Interface? Assumption The researchers assumed that this study is much of need in each of the classrooms in College of Arts and Sciences in order to keep orderliness in a certain room that when observed, armchairs were in an improper arrangement and the classrooms left unclean. In CAS Department, they used to check each of the rooms manually to ensure if every professor is attending their classes. Instead of walking along corridors, it will be a much of help for the checkers find out every professors’ behavior, and it will be easy for them to record as well as their attendance.
  • 9. Significance of the Study Monitoring provides information that will be useful in: • Analyzing the situation in the community and its project; • Determining whether the inputs in the project are well utilized; • Identifying problems facing the community or project and finding solutions; • Ensuring all activities are carried out properly by the right people and in time; • Using lessons from one project experience on to another; and • Determining whether the way the project was planned is the most appropriate way of solving the problem at hand. Scope and Limitation The study is limited to College of Arts and Sciences’ classroom’s including all students, professors and employees of the said college. Mainly, the study was focused on monitoring and checking of each room as well as the security of CAS at ESC, Manila. The system can also provide the attendance of the professor whether he/she is in or not.
  • 10. Definition of Terms Monitoring – the act of observing something (and sometimes keeping a record of it). Camera – equipment for taking photographs. Surveillance Camera – "Surveillance" comes from a French word that means "to watch over;" camera surveillance uses photography to watch over people in public spaces. CCTV – Closed-circuit television (CCTV) is the use of video cameras to transmit a signal to a specific place.