CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF STUDY
National security threat has been a major issue for the government of Nigeria in recent years. Recently, Nigeria has been characterized with different turmoil ranging from human abduction, political mayhem, terrorism and bomb attacks, examination malpractice, etc. Governments have tried several methods in order to curb these menaces but all of them have been proved abortive. Due to this, the government has resolved to adopt the use of computer based video surveillance cameras in public places to monitor and record events that takes place in a particular location. Monitoring is the regular observation and recording of activities taking place in a project or event. Hence the introduction of campus security camera system popularly known as CCTV system.
Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer(Nye, 2014). There are many different types of CCTV systems available—analogue and digital, wired and wireless and their modes of operation vary; however, the basic components are more or less the same: a camera, a lens, a monitor, and (for wired systems) cables that carry the signal from one place to another. Many systems also use video recorders to record the video footage. The camera picks up the signal from the area being monitored via the lens (which determines how far and how much the camera can see, and which is often bought separately) and can be either wired or wireless. In a wired system, the camera sends the signals through a cable to the monitor; in wireless systems, no cable is needed, and the camera broadcasts the signal straight to the monitor. The monitor can be either a simple television set (without tuning capacity) or a PC or laptop. Most wired analogue systems use television monitors, while digital and wireless systems tend to use computers as monitors for which remote viewing is possible, often via the internet. For recording purposes, the monitor is accompanied by a video recorder—a VCR for analogue systems, or a DVR (digital video recorder), or NVR (Network Video Recorder) for digital systems. A DVR can actually replace the monitor as the receiving device, since many DVRs are stand-alone units that do everything a computer would do: receive, record, and store the information for later viewing. CCTV (Closed Circuit Television) refers to a system of surveillance cameras that sends signals to a specific location—a monitor, or PC. CCTV systems are commonly used to monitor banks, shopping malls, and government facilities—and these days, as CCTV technology becomes more affordable and easier to use, more and more people are installing CCTV cameras in their homes and businesses.
Sur·veil·lance „sər váylənss‟ is French for to “watch from above “. Although the word surveillance literally means (in French) “to watch from above” (i.e. a God’s-eye view looking down from on high) the term is often used for all forms of observation, not just visual observation. However, the all-seeing eye-in-the-sky is still an icon of surveillance in general. It is commonly used to describe observation from a distance by means of electronic equipment or other technological means. Surveillance is the art of watching over the activities of persons or groups from a position of higher authority. Modern electronic and computer have given surveillance a whole new means of operation. Surveillance can be automated using computers, and people leave extensive records that describe their activities. Counter surveillance is the practice of avoiding surveillance or making it difficult, before computer networks, counter surveillance involved avoiding agents and communicating secretly (California Fourth District Court Of Appeal, 2014). With recent development of the internet and computer databases counter surveillance has grown. Now counter surveillance involves everything from knowing how to delete a file on a computer to avoiding becoming the target of direct surveillance. Inverse surveillance is the practice of reversals on surveillance. E.g. citizens photographing police, shoppers photographing shopkeepers, and passengers photographing cab drivers. Surveillance camera are often connected to a recording device, IP network, and /or watched by a security personnel/law enforcement officer. These cameras may include features like pan, tilt and zoom; may be placed in indoor or outdoor locations; and may include infrared recording options. Most cameras are used with recording systems, either VCR‟S or digital recorders. Using a digital recorder is the preferred option for easy storage, easy recall, and easy viewing over different monitors. College campuses pose many unique challenges when it comes to security. A video surveillance system must be carefully planned out in order to keep watch over the diverse assortment of facilities that comprise a typical campus community. From hostels and libraries to sports complexes and general campus layout, there’s a lot to look after. A system of properly installed campus security cameras will go a long way in ensuring the safety of students, faculty, and facilities on campus.
1.2 STATEMENT OF THE PROBLEM
The present system used to check for examination malpractice in Federal polytechnic Oko could be referred to as the manual or traditional system where students are called into their halls respectively according to their registration numbers and departments and are allocated supervisors or invigilators to watch over them as they write. In this system, many deficiencies occur where;
- A student is wrongly accused due to supervisor’s intuition. A single supervisor fails to oversee the whole activities of the students.
- There is the case of inadequate facilities to contain a large number of students.
- There is no proper check for forgery and impersonation.
- The problem intended to solve is Examination monitoring lapses in Federal polytechnic Okousing CCTV.
1.3 AIM AND OBJECTIVES OF THE STUDY
The aim of this research is to design and implement an examination security system. The objectives of this study are to enhance the idea and conception of using computerized surveillance systems on campus. In a situation where the examination halls are well equipped with CCTV cameras and full conduction of biometric mechanism, examination malpractice if not fully eliminated, it can be controlled to a great rate. Also this study will help provide a platform for the university security to have enough background knowledge on events worth investigating. Having this mechanism in operation in Federal polytechnic Oko, objectives to be achieved will be;
- Exploring to the fullest the different activities of examination malpractice.
- Investigating crimes strictly with seen proofs or evidences rather than personal intuition.
- Extending security to the classroom reach and maintaining student’s integrity.
- Catching culprits immediately and tendering appropriate judgments.
1.4 SIGNIFICANCE OF THE STUDY
With the increase in crime in the nation and diverse sectors of life, it is necessary that stronghold strategies be applied to curb them. If the use of surveillance systems is implemented in examination halls, hostels, gates, stores and other campus facilities.
- Integrity of certificates will be restored to the students.
- True test of knowledge will be achieved among individuals.
- Students will take caution to avoid expulsion.
- Hard work of students will be sufficed in terms of the outcome of their results.
- Malpractice will be greatly minimized in the society.
- This will also promote technology literacy of all students involved in the society.
- Appropriate investigation of crimes and decisive judgments will be achieved.
- Usage of surveillance systems is necessary in project to study further, different behavioral patterns of students under examination conditions.
- More job opportunities will be created in the society.
1.5 SCOPE OF THE STUDY
The surveillance systems can be implemented in examination halls, hostels, gates, stores and other campus facilities of tertiary and secondary schools. It can also be implemented inwarehouses, garage of banks, supermarket, hospitals. This work is focused on the security, examination monitoring, attendance and behavior of the staffs and students in the department by having a monitoring system using video surveillance.
1.6 LIMITATIONS OF THE STUDY
This project has the interest of implementing a monitoring system on every aspect of the university student’s, staffs and facilities. However, the constraints such as:
- Financial constraints
- Time constraints to carry out enough investigations.
- Difficulty in getting relevant information from the institution.
1.7 DEFINITION OF TERMS
Remote Access – A video surveillance system operating with IP network technology enables video streams to be sent over the internet for remote monitoring. Footage from cameras throughout the campus can be viewed online from any computer with an internet connection and access to the network.
CCTV (Closed Circuit Television) – is a valuable management and security tool generally intended to prevent or detect crime. CCTV can be very effective in maintaining security.
IP: Internet protocol
HTTP: Hyper Text Transfer Protocol
CCTV Camera: A video camera employed in a CCTV system.
Digital Camera: A device that records a digital image or stream of images in a digital format.
Digital Video Recorder (DVR): An electronic device that records video images and stores them to a computer storage device, such as a hard drive.
Thermal Camera: A camera that creates an image from the thermal IR radiation emitted by objects. The IR energy radiated from objects depends on the objects’ temperatures and is displayed as different colors or shades of gray.
Video Monitor: An electronic device for displaying video output that may be digital or analog.
Video Motion Detection (VMD): When the current image changes beyond a threshold value,
Video Analytics: A technology that uses software to analyze the video image stream.
DISCLAIMER: All project works, files and documents posted on this website, eProjectTopics.com are the property/copyright of their respective owners. They are for research reference/guidance purposes only and some of the works may be crowd-sourced. Please don’t submit someone’s work as your own to avoid plagiarism and its consequences. Use it as a reference/citation/guidance purpose only and not copy the work word for word (verbatim). The paper should be used as a guide or framework for your own paper. The contents of this paper should be able to help you in generating new ideas and thoughts for your own study. eProjectTopics.com is a repository of research works where works are uploaded for research guidance. Our aim of providing this work is to help you eradicate the stress of going from one school library to another in search of research materials. This is a legal service because all tertiary institutions permit their students to read previous works, projects, books, articles, journals or papers while developing their own works. This is where the need for literature review comes in. “What a good artist understands is that nothing comes from nowhere. The paid subscription on eProjectTopics.com is a means by which the website is maintained to support Open Education. If you see your work posted here by any means, and you want it to be removed/credited, please contact us with the web address link to the work. We will reply to and honour every request. Please notice it may take up to 24 – 48 hours to process your request.