SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
International Journal of Engineering Inventions
e-ISSN: 2278-7461, p-ISSN: 2319-6491
Volume 3, Issue 2 (September 2013) PP: 47-49
www.ijeijournal.com Page | 47
Real Time Video Prosecution Unit
*Aru Okereke Eze, **Opara F.K.
*Department of Computer Engineering Michael Okpara University of Agriculture, Umudike, Umuahia, Abia
State, Nigeria
**Department of Electrical/Electronics Engineering Federal University of Technology, Owerri, Imo State,
Nigeria
ABSTRACT: There is an alarming increase in crime rate all over the world. Considering this increase in
general social problems, security has become more vital for every nation of the world, and for this reason, new
security ideas are born on daily basis to solve this world menace.
Real Time Video Prosecution Unit consists of a DVR System embedded to the WTMD main board, the camera
assembly, camera and the SD Card storage media as well as the TC Out video connection sockets. Alarmed
visitors images/video are automatically captured with a time-stamp and saved on 2 GB SD Card, up to ~30 000
images. System allows recording of all Visitors/Alarmed Visitors only with a time-stamp and queue number.
Keywords: Video, Security, DVR, Camera, Storage Media, etc
I. INTRODUCTION
The world has grown advanced enough to monitor crime at the instance it is being committed without
allowing for any human witness to testify either for or against the accused, and also without giving the criminal
any chance to escape after his criminal activities.
The Real Time Video Prosecution Unit works in such a way that it can follow a committer from the point of
entering its target environment, records his activities and stores in real time, capable of dating back to it when
the need arises.
With this technology being on 24/7 basis, the work of the human police is really minimized and well
supplemented. Again, it is believed that some security authorities compromise sometimes, setting a guilty man
free or punishing an innocent person. With this technology providing excellent evidence, only the right thing
will be done in terms of punishing or setting a criminal free.
Another important motivation of this work is the idea of down-tracking people who travel far away
from their cities to commit crimes in another area, believing there is no way to identify them. This technology
has come to prove these set of people wrong as they will be caught at the instance of the action, and if for any
reason escape, their video record will be used to track them down as it will be sent across to police in every
junctions. With this technology, it will be very difficult for some prohibited or arms to be taken into some
security conscious areas. The system will automatically detect it and sends signals for an action to be taken
immediately.
II. APPLICATION
SIIE AMH1000 is an 18 detection zone high security walk-through arm detector with camera with
picture & video capture function, when people pass through it, it can detect any small mass metal from head to
toes, manually we can adjust its sensitivities for high sensitivity or low sensitivity to detect a small metal or a
big metal. It is used widely in loss prevention and security inspection, such as: used in airports, courts, prisons,
customhouse, gym places, plating factory, exhibition sites, electronic factory, hardware factory, amusement
place, casino, seaports, military bases, embassies, and so on. It inspects persons, hand-held luggages & parcels,
and can locate a small metal, IED-device, weapons, parts of weapons, bomb, etc., can also detect drugs packed
with Tin Foil paper.
2.1 Connect a camera and a computer system:
SIIE Model No. AMH1000 is a long-distance surveillance body and metal detector with a camera, it
has high-precision detection, and it has eighteen detection zones in metal detection, it is complete security
detection & multi-zone alarm display, its output signal will connect to a computer, the system can achieve
remote video surveillance and photos, and be on-site, may not need staff on duty.
Real Time Video Prosecution Unit
www.ijeijournal.com Page | 48
2.1 Alarm Ways of the System
When the illegal metal on body is detected, its alarm voice and LED light show position will be given
out, its camera can photograph immediately automatically, the human picture can be watched, captured and
saved in the hard disc of this computer. Image storing: real time to store any image & process it in operational
status. Image archiving: minimum 20000 images, installation standard hard disk: 500GB. Optional: a computer
and hard disc capacity. Optional: Backup power supply: uninterruptible power supply (UPS) for two ~ three
hours work.
III. FEATURE
1. Complete security detection, multi-zone warning display position, very high discrimination and detection
speed, high immunity to external interferences. High reliability with double LED position alert. Alarm zones
from head to toe are displayed in two sides of this door. Overall gate sensitivity adjustment for 100 grades, and
each zone can also be individual adjustment sensitivity for 100 grades. Highly visible double display: Provide
multiple location of weapons in transit.
2. Automatic calculating passer number and alarm number functions show on its top front operational panel,
LED show digits. It has induction to all metals and has intelligentized recognising processing functions.
Automatic checking and recovery function. It has 18 detecting areas, when carrying any small mass metal
passes through it, it can detect this metal, its alarm will be given out, you can get an accurate warning location.
Objective location alarm lights are displayed in two sides of this door. Outer adjustment sensitivity by hand.
3. Operating parameters can be set freely by remote control, (Optional). The parameters can be set for protection
by the password, allows only responsible managing personnel to operate, to prevent unauthorized people from
changing the parameters, no periodic calibration, no maintenance.
IV. TECHNICAL DATA
Sensitivity: 100 grade adjustment. Power supply: 100V ~ 240V (±10%), 50 / 60Hz. Power: 35W. Net
weight: about 85kgs. Work environment: -20℃ ~ 55℃. Overall exterior gate dimension: 2220 (H) * 830 (W) *
600 or 700 (depth) mm. Gate passageway interior dimension: 2000 (H) * 700 (W) * 600 or 700 (depth) mm
through input rate 60 detection per minute.
Sensitivity adjustment program: adjustable from 100 steps. Fault Indication is automatic fault diagnostic.
Calibration is internal automatic adjustment, outer manual adjustment.
Safety: High safety, good applicability, high sensitivity, and no harm to cardiac pace-maker carrier,
pregnant women, floppy disc, film, video tape etc.. Storage image and data can be stored more than 10000
photos.
Programs: Five (5) independent programs designed to meet all installation. Indicator lights:
International symbols located at entrance, all zones will be displayed with two independent columns of LED
located on exit side. Interface rejection will be immune from external radio interference noise should have the
provision for compensation of adjacent static metal. Alarms are Sound & light Archive features: AMH1000
WTMD has provision to interfacing systems for Real –Time video prosecution unit enabling recording Alarmed
visitors' pictures / all visitors' pictures or video with time stamp to SD card and/or remote PC control system for
sending / receiving change setting of audio visual alarms and for logging into hard disk. Number of detection
zone will be multi zone with 18 Detection zones ( consisting of both vertical and horizontal zones).
4.1 Technical standards:
1. Conform to EN 60950-1:2006+A11:2009 product safety international standard. Conform to EN 55011:2009
and EN 61326-1:2006 product safety international standards. Conform to EN61000-3-2:2006+A2:2009 and
EN61000-3-3:2008 product safety international standards.
2. Conform to EN 61000-6-1:2007 product immunity international standard and radiation conforms to EN
61000-6-3:2007 product emission international standard. Be harmless to pregnant women and magnetic storage
media.
3. Conform to existing walk-through metal detector GB15210-2003 standard. Conform to FAA 3 - gun testing
standards & NILECJ-0601-00 safety standards.
4. European CE & EMC international security standard certificates.
Real Time Video Prosecution Unit
www.ijeijournal.com Page | 49
V. WHERE TO USE
-Airports, seaports and public transportations
-Banks and financial institutions
-Schools and sports stadiums
-Churches and lecture halls
-Hospital ER and MRI room
-Hotels, conference centers and casinos
-Courthouses, police facilities and government
-Prisons and jails
-Embassies and broadcast studios
-Power plant and research center
-Military bases
REFERENCES
[1.] www.elektral.com.tr/EN/Elektral_news.html
[2.] David C. Rapoport. "Terrorism and Weapons of the Apocalypse". In James M. Ludes, Henry Sokolski (eds.), Twenty-First
Century Weapons Proliferation: Are We Ready? Routledge, 2001. pp. 19, 29
[3.] Khabarovsk War Crime Trials. Materials on the Trial of Former Servicemen of the Japanese Army Charged with Manufacturing
and Employing Biological Weapons, Moscow: Foreign Languages Publishing House, 1950. p. 117
[4.] Harris, Sheldon H. (1994). Factories of Death: Japanese Biological Warfare 1932-45 and the American Cover-Up. California
State University, Northridge: Routledge. pp. 26–33. ISBN 0-415-93214-9. "Page 26: Zhong Ma Prison Camp's creation; Page 33:
Pingfang site's creation."
[5.] Daniel Barenblat, A plague upon humanity, 2004, p.37.
[6.] Video adapted from "Biological Warfare & Terrorism: The Military and Public Health Response", Centers for Disease Control
and Prevention. Retrieved October 21, 2007
[7.] Neuman, William Lawrence (2008). Understanding Research. Pearson/Allyn and Bacon, p. 65. ISBN 0205471536
[8.] "The Nanjing Massacre and Unit 731". Advocacy & Intelligence Index For POWs-MIAs Archives. 2001. Archived from the
original on 17 October 2007. Retrieved 28 September 2010.
[9.] Sheldon Harris, Factories of Death (London, Routledge, 1994)
Aru Okereke Eze is a lecturer in the Department of Computer Engineering, Michael Okpara University of
Agriculture, Umuahia, Abia State, Nigeria. His research Interests is in Computational Intelligence, Computer
Organization, Security system design, Artificial Intelligence and Expert systems, Design of Microcontroller and
Microprocessor based system and digital systems design.
Dr. Opara F.K. is the Head, Department of Electrical/Electronics Engineering, Federal University of
Technology, Owerri, Imo State, Nigeria. His research interests include Computer Hardware design and
maintenance, Electronic and Communication Systems, Electronic Security system designs etc.

Contenu connexe

Tendances

Emdedded projects 2015
Emdedded projects 2015Emdedded projects 2015
Emdedded projects 2015musthafa01
 
15539537293230
1553953729323015539537293230
15539537293230Paul Huynh
 
Biometric access control
Biometric access controlBiometric access control
Biometric access controlPragya Tripathi
 
400 Hornet Hot Cathode Bayard-Alpert Miniature-Ionization Vacuum Gauge
400 Hornet Hot Cathode Bayard-Alpert Miniature-Ionization Vacuum Gauge400 Hornet Hot Cathode Bayard-Alpert Miniature-Ionization Vacuum Gauge
400 Hornet Hot Cathode Bayard-Alpert Miniature-Ionization Vacuum GaugeInstruTech, Inc.
 
IEEE PROJECTS 2010
IEEE PROJECTS 2010IEEE PROJECTS 2010
IEEE PROJECTS 2010dhanapalgold
 
Sonim ENDURO Manual / User Guide
Sonim ENDURO Manual / User GuideSonim ENDURO Manual / User Guide
Sonim ENDURO Manual / User Guidemanualsheet
 
Identica Vascular Biometrics
Identica Vascular BiometricsIdentica Vascular Biometrics
Identica Vascular Biometricsatmaiv64
 
How WPI's microinjection system Micro-ePORE works?
How WPI's microinjection system Micro-ePORE works?How WPI's microinjection system Micro-ePORE works?
How WPI's microinjection system Micro-ePORE works?raj_chandra
 
ATEX Mobile Phones - Hazardous Area (Zone 1 Zone 21) & Intrinsically Safe - ...
ATEX Mobile Phones - Hazardous Area (Zone 1  Zone 21) & Intrinsically Safe - ...ATEX Mobile Phones - Hazardous Area (Zone 1  Zone 21) & Intrinsically Safe - ...
ATEX Mobile Phones - Hazardous Area (Zone 1 Zone 21) & Intrinsically Safe - ...Thorne & Derrick International
 
Ecom EX Handy 06 ATEX Certified Hazardous Area Mobile Phone
Ecom EX Handy 06 ATEX Certified Hazardous Area Mobile PhoneEcom EX Handy 06 ATEX Certified Hazardous Area Mobile Phone
Ecom EX Handy 06 ATEX Certified Hazardous Area Mobile PhoneThorne & Derrick International
 
Paradigm Tech Solutions Pvt Ltd
Paradigm Tech Solutions Pvt LtdParadigm Tech Solutions Pvt Ltd
Paradigm Tech Solutions Pvt LtdMayur Merai
 
Instruction Manual ARMASIGHT BIT 5X-10X NV Monocular | Optics Trade
Instruction Manual ARMASIGHT BIT 5X-10X NV Monocular | Optics TradeInstruction Manual ARMASIGHT BIT 5X-10X NV Monocular | Optics Trade
Instruction Manual ARMASIGHT BIT 5X-10X NV Monocular | Optics TradeOptics-Trade
 

Tendances (20)

Video door phone
Video door phoneVideo door phone
Video door phone
 
Sepam 20 2009
Sepam 20   2009Sepam 20   2009
Sepam 20 2009
 
Personal Securer
Personal SecurerPersonal Securer
Personal Securer
 
Emdedded projects 2015
Emdedded projects 2015Emdedded projects 2015
Emdedded projects 2015
 
Pic16 f676
Pic16 f676Pic16 f676
Pic16 f676
 
15539537293230
1553953729323015539537293230
15539537293230
 
Biometric access control
Biometric access controlBiometric access control
Biometric access control
 
400 Hornet Hot Cathode Bayard-Alpert Miniature-Ionization Vacuum Gauge
400 Hornet Hot Cathode Bayard-Alpert Miniature-Ionization Vacuum Gauge400 Hornet Hot Cathode Bayard-Alpert Miniature-Ionization Vacuum Gauge
400 Hornet Hot Cathode Bayard-Alpert Miniature-Ionization Vacuum Gauge
 
Bionet bm3 manual de servicio
Bionet bm3 manual de servicioBionet bm3 manual de servicio
Bionet bm3 manual de servicio
 
IEEE PROJECTS 2010
IEEE PROJECTS 2010IEEE PROJECTS 2010
IEEE PROJECTS 2010
 
Sonim ENDURO Manual / User Guide
Sonim ENDURO Manual / User GuideSonim ENDURO Manual / User Guide
Sonim ENDURO Manual / User Guide
 
Final year electronics projects list
Final year electronics projects listFinal year electronics projects list
Final year electronics projects list
 
Identica Vascular Biometrics
Identica Vascular BiometricsIdentica Vascular Biometrics
Identica Vascular Biometrics
 
How WPI's microinjection system Micro-ePORE works?
How WPI's microinjection system Micro-ePORE works?How WPI's microinjection system Micro-ePORE works?
How WPI's microinjection system Micro-ePORE works?
 
ATEX Mobile Phones - Hazardous Area (Zone 1 Zone 21) & Intrinsically Safe - ...
ATEX Mobile Phones - Hazardous Area (Zone 1  Zone 21) & Intrinsically Safe - ...ATEX Mobile Phones - Hazardous Area (Zone 1  Zone 21) & Intrinsically Safe - ...
ATEX Mobile Phones - Hazardous Area (Zone 1 Zone 21) & Intrinsically Safe - ...
 
Ecom EX Handy 06 ATEX Certified Hazardous Area Mobile Phone
Ecom EX Handy 06 ATEX Certified Hazardous Area Mobile PhoneEcom EX Handy 06 ATEX Certified Hazardous Area Mobile Phone
Ecom EX Handy 06 ATEX Certified Hazardous Area Mobile Phone
 
675
675675
675
 
Paradigm Tech Solutions Pvt Ltd
Paradigm Tech Solutions Pvt LtdParadigm Tech Solutions Pvt Ltd
Paradigm Tech Solutions Pvt Ltd
 
Instruction Manual ARMASIGHT BIT 5X-10X NV Monocular | Optics Trade
Instruction Manual ARMASIGHT BIT 5X-10X NV Monocular | Optics TradeInstruction Manual ARMASIGHT BIT 5X-10X NV Monocular | Optics Trade
Instruction Manual ARMASIGHT BIT 5X-10X NV Monocular | Optics Trade
 
Mikron
MikronMikron
Mikron
 

En vedette

En vedette (17)

International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Image Processing With Sampling and Noise Filtration in Image Reconigation Pr...
Image Processing With Sampling and Noise Filtration in Image  Reconigation Pr...Image Processing With Sampling and Noise Filtration in Image  Reconigation Pr...
Image Processing With Sampling and Noise Filtration in Image Reconigation Pr...
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
E – Waste Management through Regulations
E – Waste Management through RegulationsE – Waste Management through Regulations
E – Waste Management through Regulations
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Systematic Design of Hybrid Cascaded Multilevel Inverters with Simplified DC...
Systematic Design of Hybrid Cascaded Multilevel Inverters with  Simplified DC...Systematic Design of Hybrid Cascaded Multilevel Inverters with  Simplified DC...
Systematic Design of Hybrid Cascaded Multilevel Inverters with Simplified DC...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
F04123137
F04123137F04123137
F04123137
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
G04123844
G04123844G04123844
G04123844
 
H04124548
H04124548H04124548
H04124548
 

Similaire à Real Time Video Prosecution Unit

An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemZac Darcy
 
Electronic security system
Electronic security systemElectronic security system
Electronic security systemAtharva Chavan
 
EMERGENCY RESCUE ROBOT FOR HUMAN DETECTION DURING DISASTERS
EMERGENCY RESCUE ROBOT FOR HUMAN DETECTION DURING DISASTERSEMERGENCY RESCUE ROBOT FOR HUMAN DETECTION DURING DISASTERS
EMERGENCY RESCUE ROBOT FOR HUMAN DETECTION DURING DISASTERSHariniChaganti1
 
Sensor Based Efficient Security System
Sensor Based Efficient Security SystemSensor Based Efficient Security System
Sensor Based Efficient Security Systemiosrjce
 
Raspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityRaspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityIRJET Journal
 
IRJET- PC Controlled Wireless Robot for Detecting Human Presence
IRJET-  	  PC Controlled Wireless Robot for Detecting Human PresenceIRJET-  	  PC Controlled Wireless Robot for Detecting Human Presence
IRJET- PC Controlled Wireless Robot for Detecting Human PresenceIRJET Journal
 
Wireless robot ppt
Wireless robot pptWireless robot ppt
Wireless robot pptVarun B P
 
Forest fire detection & alarm thermal imaging camera
Forest fire detection & alarm thermal imaging camera  Forest fire detection & alarm thermal imaging camera
Forest fire detection & alarm thermal imaging camera Elsa Wang
 
A Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security SystemA Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security SystemIJNSA Journal
 
Integrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of AppliancesIntegrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of AppliancesIRJET Journal
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Visionmarshallbutler
 
Bluetooth controller Human detection car.
Bluetooth controller Human detection car.Bluetooth controller Human detection car.
Bluetooth controller Human detection car.Md Mintu Pk
 
safety helmet.pptx
safety helmet.pptxsafety helmet.pptx
safety helmet.pptxRoohiShifa
 
IRJET- Review: Autonomous Detection and Shooting of Moving Objects at Borders...
IRJET- Review: Autonomous Detection and Shooting of Moving Objects at Borders...IRJET- Review: Autonomous Detection and Shooting of Moving Objects at Borders...
IRJET- Review: Autonomous Detection and Shooting of Moving Objects at Borders...IRJET Journal
 
IRJET- Unmanned Ground Vehicle for Military Assistance
IRJET-  	  Unmanned Ground Vehicle for Military AssistanceIRJET-  	  Unmanned Ground Vehicle for Military Assistance
IRJET- Unmanned Ground Vehicle for Military AssistanceIRJET Journal
 

Similaire à Real Time Video Prosecution Unit (20)

An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
EMERGENCY RESCUE ROBOT FOR HUMAN DETECTION DURING DISASTERS
EMERGENCY RESCUE ROBOT FOR HUMAN DETECTION DURING DISASTERSEMERGENCY RESCUE ROBOT FOR HUMAN DETECTION DURING DISASTERS
EMERGENCY RESCUE ROBOT FOR HUMAN DETECTION DURING DISASTERS
 
Smart safety jacket
Smart safety jacketSmart safety jacket
Smart safety jacket
 
F010612830
F010612830F010612830
F010612830
 
Sensor Based Efficient Security System
Sensor Based Efficient Security SystemSensor Based Efficient Security System
Sensor Based Efficient Security System
 
Hasco english
Hasco englishHasco english
Hasco english
 
Raspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityRaspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home Security
 
IRJET- PC Controlled Wireless Robot for Detecting Human Presence
IRJET-  	  PC Controlled Wireless Robot for Detecting Human PresenceIRJET-  	  PC Controlled Wireless Robot for Detecting Human Presence
IRJET- PC Controlled Wireless Robot for Detecting Human Presence
 
Wireless robot ppt
Wireless robot pptWireless robot ppt
Wireless robot ppt
 
Forest fire detection & alarm thermal imaging camera
Forest fire detection & alarm thermal imaging camera  Forest fire detection & alarm thermal imaging camera
Forest fire detection & alarm thermal imaging camera
 
A Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security SystemA Simple and Reliable Touch Sensitive Security System
A Simple and Reliable Touch Sensitive Security System
 
Integrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of AppliancesIntegrated Security System With Remot Controlling Of Appliances
Integrated Security System With Remot Controlling Of Appliances
 
Sintis e-brochure 2015
Sintis e-brochure 2015Sintis e-brochure 2015
Sintis e-brochure 2015
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Vision
 
Bluetooth controller Human detection car.
Bluetooth controller Human detection car.Bluetooth controller Human detection car.
Bluetooth controller Human detection car.
 
safety helmet.pptx
safety helmet.pptxsafety helmet.pptx
safety helmet.pptx
 
IRJET- Review: Autonomous Detection and Shooting of Moving Objects at Borders...
IRJET- Review: Autonomous Detection and Shooting of Moving Objects at Borders...IRJET- Review: Autonomous Detection and Shooting of Moving Objects at Borders...
IRJET- Review: Autonomous Detection and Shooting of Moving Objects at Borders...
 
IRJET- Unmanned Ground Vehicle for Military Assistance
IRJET-  	  Unmanned Ground Vehicle for Military AssistanceIRJET-  	  Unmanned Ground Vehicle for Military Assistance
IRJET- Unmanned Ground Vehicle for Military Assistance
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 

Plus de International Journal of Engineering Inventions www.ijeijournal.com

Plus de International Journal of Engineering Inventions www.ijeijournal.com (20)

E04122330
E04122330E04122330
E04122330
 
C04121115
C04121115C04121115
C04121115
 
B04120610
B04120610B04120610
B04120610
 
A04120105
A04120105A04120105
A04120105
 
F04113640
F04113640F04113640
F04113640
 
E04112135
E04112135E04112135
E04112135
 
D04111520
D04111520D04111520
D04111520
 
C04111114
C04111114C04111114
C04111114
 
B04110710
B04110710B04110710
B04110710
 
A04110106
A04110106A04110106
A04110106
 
I04105358
I04105358I04105358
I04105358
 
H04104952
H04104952H04104952
H04104952
 
G04103948
G04103948G04103948
G04103948
 
F04103138
F04103138F04103138
F04103138
 
E04102330
E04102330E04102330
E04102330
 
D04101822
D04101822D04101822
D04101822
 
C04101217
C04101217C04101217
C04101217
 
B04100611
B04100611B04100611
B04100611
 
A04100105
A04100105A04100105
A04100105
 
D0494146
D0494146D0494146
D0494146
 

Dernier

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Dernier (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Real Time Video Prosecution Unit

  • 1. International Journal of Engineering Inventions e-ISSN: 2278-7461, p-ISSN: 2319-6491 Volume 3, Issue 2 (September 2013) PP: 47-49 www.ijeijournal.com Page | 47 Real Time Video Prosecution Unit *Aru Okereke Eze, **Opara F.K. *Department of Computer Engineering Michael Okpara University of Agriculture, Umudike, Umuahia, Abia State, Nigeria **Department of Electrical/Electronics Engineering Federal University of Technology, Owerri, Imo State, Nigeria ABSTRACT: There is an alarming increase in crime rate all over the world. Considering this increase in general social problems, security has become more vital for every nation of the world, and for this reason, new security ideas are born on daily basis to solve this world menace. Real Time Video Prosecution Unit consists of a DVR System embedded to the WTMD main board, the camera assembly, camera and the SD Card storage media as well as the TC Out video connection sockets. Alarmed visitors images/video are automatically captured with a time-stamp and saved on 2 GB SD Card, up to ~30 000 images. System allows recording of all Visitors/Alarmed Visitors only with a time-stamp and queue number. Keywords: Video, Security, DVR, Camera, Storage Media, etc I. INTRODUCTION The world has grown advanced enough to monitor crime at the instance it is being committed without allowing for any human witness to testify either for or against the accused, and also without giving the criminal any chance to escape after his criminal activities. The Real Time Video Prosecution Unit works in such a way that it can follow a committer from the point of entering its target environment, records his activities and stores in real time, capable of dating back to it when the need arises. With this technology being on 24/7 basis, the work of the human police is really minimized and well supplemented. Again, it is believed that some security authorities compromise sometimes, setting a guilty man free or punishing an innocent person. With this technology providing excellent evidence, only the right thing will be done in terms of punishing or setting a criminal free. Another important motivation of this work is the idea of down-tracking people who travel far away from their cities to commit crimes in another area, believing there is no way to identify them. This technology has come to prove these set of people wrong as they will be caught at the instance of the action, and if for any reason escape, their video record will be used to track them down as it will be sent across to police in every junctions. With this technology, it will be very difficult for some prohibited or arms to be taken into some security conscious areas. The system will automatically detect it and sends signals for an action to be taken immediately. II. APPLICATION SIIE AMH1000 is an 18 detection zone high security walk-through arm detector with camera with picture & video capture function, when people pass through it, it can detect any small mass metal from head to toes, manually we can adjust its sensitivities for high sensitivity or low sensitivity to detect a small metal or a big metal. It is used widely in loss prevention and security inspection, such as: used in airports, courts, prisons, customhouse, gym places, plating factory, exhibition sites, electronic factory, hardware factory, amusement place, casino, seaports, military bases, embassies, and so on. It inspects persons, hand-held luggages & parcels, and can locate a small metal, IED-device, weapons, parts of weapons, bomb, etc., can also detect drugs packed with Tin Foil paper. 2.1 Connect a camera and a computer system: SIIE Model No. AMH1000 is a long-distance surveillance body and metal detector with a camera, it has high-precision detection, and it has eighteen detection zones in metal detection, it is complete security detection & multi-zone alarm display, its output signal will connect to a computer, the system can achieve remote video surveillance and photos, and be on-site, may not need staff on duty.
  • 2. Real Time Video Prosecution Unit www.ijeijournal.com Page | 48 2.1 Alarm Ways of the System When the illegal metal on body is detected, its alarm voice and LED light show position will be given out, its camera can photograph immediately automatically, the human picture can be watched, captured and saved in the hard disc of this computer. Image storing: real time to store any image & process it in operational status. Image archiving: minimum 20000 images, installation standard hard disk: 500GB. Optional: a computer and hard disc capacity. Optional: Backup power supply: uninterruptible power supply (UPS) for two ~ three hours work. III. FEATURE 1. Complete security detection, multi-zone warning display position, very high discrimination and detection speed, high immunity to external interferences. High reliability with double LED position alert. Alarm zones from head to toe are displayed in two sides of this door. Overall gate sensitivity adjustment for 100 grades, and each zone can also be individual adjustment sensitivity for 100 grades. Highly visible double display: Provide multiple location of weapons in transit. 2. Automatic calculating passer number and alarm number functions show on its top front operational panel, LED show digits. It has induction to all metals and has intelligentized recognising processing functions. Automatic checking and recovery function. It has 18 detecting areas, when carrying any small mass metal passes through it, it can detect this metal, its alarm will be given out, you can get an accurate warning location. Objective location alarm lights are displayed in two sides of this door. Outer adjustment sensitivity by hand. 3. Operating parameters can be set freely by remote control, (Optional). The parameters can be set for protection by the password, allows only responsible managing personnel to operate, to prevent unauthorized people from changing the parameters, no periodic calibration, no maintenance. IV. TECHNICAL DATA Sensitivity: 100 grade adjustment. Power supply: 100V ~ 240V (±10%), 50 / 60Hz. Power: 35W. Net weight: about 85kgs. Work environment: -20℃ ~ 55℃. Overall exterior gate dimension: 2220 (H) * 830 (W) * 600 or 700 (depth) mm. Gate passageway interior dimension: 2000 (H) * 700 (W) * 600 or 700 (depth) mm through input rate 60 detection per minute. Sensitivity adjustment program: adjustable from 100 steps. Fault Indication is automatic fault diagnostic. Calibration is internal automatic adjustment, outer manual adjustment. Safety: High safety, good applicability, high sensitivity, and no harm to cardiac pace-maker carrier, pregnant women, floppy disc, film, video tape etc.. Storage image and data can be stored more than 10000 photos. Programs: Five (5) independent programs designed to meet all installation. Indicator lights: International symbols located at entrance, all zones will be displayed with two independent columns of LED located on exit side. Interface rejection will be immune from external radio interference noise should have the provision for compensation of adjacent static metal. Alarms are Sound & light Archive features: AMH1000 WTMD has provision to interfacing systems for Real –Time video prosecution unit enabling recording Alarmed visitors' pictures / all visitors' pictures or video with time stamp to SD card and/or remote PC control system for sending / receiving change setting of audio visual alarms and for logging into hard disk. Number of detection zone will be multi zone with 18 Detection zones ( consisting of both vertical and horizontal zones). 4.1 Technical standards: 1. Conform to EN 60950-1:2006+A11:2009 product safety international standard. Conform to EN 55011:2009 and EN 61326-1:2006 product safety international standards. Conform to EN61000-3-2:2006+A2:2009 and EN61000-3-3:2008 product safety international standards. 2. Conform to EN 61000-6-1:2007 product immunity international standard and radiation conforms to EN 61000-6-3:2007 product emission international standard. Be harmless to pregnant women and magnetic storage media. 3. Conform to existing walk-through metal detector GB15210-2003 standard. Conform to FAA 3 - gun testing standards & NILECJ-0601-00 safety standards. 4. European CE & EMC international security standard certificates.
  • 3. Real Time Video Prosecution Unit www.ijeijournal.com Page | 49 V. WHERE TO USE -Airports, seaports and public transportations -Banks and financial institutions -Schools and sports stadiums -Churches and lecture halls -Hospital ER and MRI room -Hotels, conference centers and casinos -Courthouses, police facilities and government -Prisons and jails -Embassies and broadcast studios -Power plant and research center -Military bases REFERENCES [1.] www.elektral.com.tr/EN/Elektral_news.html [2.] David C. Rapoport. "Terrorism and Weapons of the Apocalypse". In James M. Ludes, Henry Sokolski (eds.), Twenty-First Century Weapons Proliferation: Are We Ready? Routledge, 2001. pp. 19, 29 [3.] Khabarovsk War Crime Trials. Materials on the Trial of Former Servicemen of the Japanese Army Charged with Manufacturing and Employing Biological Weapons, Moscow: Foreign Languages Publishing House, 1950. p. 117 [4.] Harris, Sheldon H. (1994). Factories of Death: Japanese Biological Warfare 1932-45 and the American Cover-Up. California State University, Northridge: Routledge. pp. 26–33. ISBN 0-415-93214-9. "Page 26: Zhong Ma Prison Camp's creation; Page 33: Pingfang site's creation." [5.] Daniel Barenblat, A plague upon humanity, 2004, p.37. [6.] Video adapted from "Biological Warfare & Terrorism: The Military and Public Health Response", Centers for Disease Control and Prevention. Retrieved October 21, 2007 [7.] Neuman, William Lawrence (2008). Understanding Research. Pearson/Allyn and Bacon, p. 65. ISBN 0205471536 [8.] "The Nanjing Massacre and Unit 731". Advocacy & Intelligence Index For POWs-MIAs Archives. 2001. Archived from the original on 17 October 2007. Retrieved 28 September 2010. [9.] Sheldon Harris, Factories of Death (London, Routledge, 1994) Aru Okereke Eze is a lecturer in the Department of Computer Engineering, Michael Okpara University of Agriculture, Umuahia, Abia State, Nigeria. His research Interests is in Computational Intelligence, Computer Organization, Security system design, Artificial Intelligence and Expert systems, Design of Microcontroller and Microprocessor based system and digital systems design. Dr. Opara F.K. is the Head, Department of Electrical/Electronics Engineering, Federal University of Technology, Owerri, Imo State, Nigeria. His research interests include Computer Hardware design and maintenance, Electronic and Communication Systems, Electronic Security system designs etc.