WEEK 6
2nd BRIEFING OF FINAL YEAR PROJECT
Today is the 6th week for this FYP 1. The briefing was conducted in TTL 1 and the attendance of all FYP 1 students is compulsory. The briefing was conducted by Dr Imran Bin Mohammad Sofi and Dr. Jawad Bin Ali Shah.
Date: 08 September 2017
Venue: TTL 1
Time: 3pm - 5pm
In this briefing, the FYP committees have briefed us about:
- Introduction and Literature Review (identify the project).
- Technical proposal writing.
- Chapter 1 (Introduction) and Chapter 2 (Literature Review).
LITERATURE REVIEW
JOURNAL 1
CCTV
Closed-Circuit Television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point to point (P2P), point to multipoint (P2MP), or mesh wired or wireless links. Though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that may need monitoring such as banks, stores, and other areas where security is needed. Though Videotelephony is seldom called "CCTV" one exception is the use of video in distance education, where it is an important tool.
In industrial plants, CCTV equipment may be used to observe parts of a process from a central control room, for example when the environment is not suitable for humans. CCTV systems may operate continuously or only as required to monitor a particular event. A more advanced form of CCTV, utilizing digital video recorders (DVRs), provides recording for possibly many years, with a variety of quality and performance options and extra features (such as motion detection and email alerts). More recently, decentralized IP cameras, some equipped with megapixel sensors, support recording directly to network-attached storage devices, or internal flash for completely stand-alone operation.
- Crime prevention
- Body worn
- Industrial processes
- Traffic monitoring
- Transport safety
- Sporting events
- Monitor employees
- Use in schools
- Criminal use
- Home security
Credit to : Kumar, V., Mahala, P., Kumar, N., Sharma, N., & Rathora, P. (2017). Smart Home Automation Security System Based On IoT
Comments
Post a Comment