Professional Documents
Culture Documents
New Doc 2021-05-10
New Doc 2021-05-10
DEPARTMENT OF ELECTRITICAL
NA]Wf IDNO
SubmtSSlOnDate: is/10/2
011 E.C
Scanned by CamScanner
HERTFICATz
1. FURTUNA BERHANE
2. HAREGEWEYNI G/KID
3. NIRAYA GIDEY
t t for
the aWard of
Under our guidance and supervision, for the fulfillment of the requ@ + °
partial
the
degree of Bachelor of Science in Computer science Engineering.
Project Advisor:
Head of the department:
Mr.
Signature: Signature: -
Signature:
Examiners
Name Signature
Scanned by CamScanner
ACKNOWLEDGEMENT
First of all, we would like to thank God for his blessing, and we also Sgnse of
express our deep
gratitude to our adviser Mr Lelti Tsegay for encouraging us ect kRd
Jt3rk O 1 thls Proj
tO
d eepest
jeCt. EUF
providing her support and guidance throughout the implem fltation of the pr who gave US this
t
Engineering departmen
appreciation also goes out to Electrical & Computer
strugg I lg
project that helps us to and practices what we knew in theory, find our friends who
with us exploring this scope. Finally, thank you to all those iR+ fldireGt1y
€1VC. d directly and i .A
helping us out during our design & simulation which we c£tfl t One of them
St lte €"lt Every doi g
e ill fl
special expression of l eran ce £tIld p ltienc
gratitude is extended to everyone for their to
the Project.
Scanned by CamScanner
Scanned by CamScanner
ABSTRACT times
The tremendous loss of lives and properties that may be attflbll
Ud
tO Griminalar alS i8 décent that
ming CâU
has Gpt2 to the
worldwide has become a source of worry to all. The sitUatiOn ys
mating it W i t hou
the authority has sought for the immediate means of check t delay. ° t‘d
a
video
a cts.
thèse otipiRal
security is most important issue arising due to the increase Of reqLlire
areas WhiGh
e is an importilRt application that helps iR pitprjng ¡ t e i*1
different V t}t
pt which plays
£t
Surveillanc E CH
very imp O<ilnt conce
high security , thus video surveillance is a
{1g$£tfld tÜackingany
used in detecting, ân8tJy•]need
safety and security. Video surveillance system is Si c
urity e
e ank
and other highly d freaSlik b
unusual aCtiVity centers on the desig
also it is used for public safety On of äH
home surveillance etc. Th is work Rd ;jjpleIT1ent t' remote
i
lockers, syI
Protocol (IP) based home video su rveillance security tem. It i»• f
pOp£ttes
}}jäl and
Internet uSC'.r Using
video feeds
e
viewing
afld IP camera and storage of live also alerting the s th S
Scanned by CamScanner
Op IiASE IJ OME Paige ii
3ETW RK SURVEILLANCE
Scanned by CamScanner
Table of content
page
Content
AC
ABST
Table
List
List of Acronyms and Abbreviatio
CHAPTE
INTRODUCTIO
t. \ Genera1 Overvie
1.2 Problem Stat
1.3 Objective of the Projec
1.3.1 General Objectiu
I .3.2 Specific Objectiu
1.4 Material requir
1.5 Significance of the proje
1.6 Scope of the projec
1.7 OrganizatiOfl Of the
projec
CHAPTE
AND LITERATURE REVIE
BACKGROUND
2. l Baek@OU
2.2 ON
2.3 Related W 10
CPi APTER TH 10
METHEDOLOG 10
ethodOlog
3.1
Desci‘btion of M
StU
3 I , j ViS ial
er‘
,. I .4 OZEKl Carri
N
PLEMENTATIO
DESI GN AND IM
SURVEILLANCE
BA Page iii
Scanned by CamScanner
Scanned by CamScanner
ADULTS AND
DISCUSSIONS
s $q --------- -... .... .. . ... ......... ......... ... ........ ..... . ....... .---------°'
"*""’ng*°dule -- -------- -.... .. ............ . .................... ............. .. .. ........ .....-----23
5.2 Video recording module............... .
,, ..................................24
’‘3 A""‘ ‘°du e:- ... ............. .. ....... . .. ............ .. .. ..... 24
3-'"e°•" a a'=' a- -- -............................. ..... . ..... .. . ...... .......................-24
5.4 Motion detection module .................... . .. . ........... . ............................................................24
HA TER I.....................................................................................................26
CONCLUSION AND RECOMMENDATION........................................... ..........,.,...................................26
6.1 Conclusion....................................................................................................................................26
6.2 Recommendation..................................................................................................................................26
REFERENCE..........................................................................................................................................27
AppEjqDj E .............,............................................:....... ........ .. ..... ... ....... .. .. ........ .. 2g
Scanned by CamScanner
Figure 2 DVR-based analog CCTV systems
Figure 3 Network DVR-based analog CCTV systems ..... -- -- ----
10
Figure 4 Video encoder-based network video systems....-------- ----'
Figure S Diagram of network based home security system ... -- ---
23
Figure 6 Block comparison pixel by pixel............. ..- -- - -- ----
25
Figure 7 Sample of captured image while streaming .....- - --- --- ‘”“”“””“” ““
Figure 8
Scanned by CamScanner
List of Acronyms and Abbreviations
API. ..........-- - .. ......... Application Programming Interface
SSOci ati o n
ECMA. .. ...................... European Computer Manufacturers A
ironme nt
IDE. . .....-- .... . .. ... ... Integrated Development Env
. Internet ProtoGOl
Power over
Ethernet
D HO E S RVEILLANCE
NF.TJOnK BASE Page Vt
Scanned by CamScanner
’
Scanned by CamScanner
RTSP............................. Real Time Stream
ing Protocol
TTS................................Text-To-Speech
Scanned by CamScanner
8HAPTER ONE
INTRODUCTION
The current securitysystem, specifically, the well-known CCTV, consumes a lot of resources
such as memory, due to nonstop recording. Verily, they are efficient but it takes a while
before one gets back to locate the precise time
where an event happened in the area under
surveilJance.
One has to rewind and fast forward, going back and forth to search a particu)ar scene and that
takes a lot of time and effort. Furthermore, time is needed to keep watch of the activities
going on via the screen. Something may be happen rig but due to negligence and human errors it
may pass by without been noticed, until something happens. Then the search begins without any
idea of where to start searching with lots of videos to go through. As such, much attention
and concentration is required to avoid missing important and significant activities.
Ethiopia is currently attemptinga broad expansion of lietwork access throughoutthe country, and
many individuals and organizationasre now subscribed to a broadband service.
Scanned by CamScanner
1.2Problem Statement
expensive
Current security system consumes a lot of resources. CCTV enhances security but is for £t
ring and searching
from the installation up to the maintenance and analysis. MonitO gh
a f d focus, going throu
particular event or a clip is labor intensive as it requises concentration l
eps
hours, or even days, of recordings. Moreover, as the recorded scènesare
continuoUS, it ke
consuming space, which increases the cost of maintenance, cost Of gp or storage {})ed UŸ 9
t e
has happened.
R £t
technician labor fee, and so on. Another issue is identifyingwhere the Scene
be
place whereby a subject moving or conducting an act iS far from the camera, the place can
spotted, but then not clear.
This project aims to utilize th OlTl unications viable, off the shelf
npleiuented as a
for home security using an IP Camera. The system is ii
consumer product.
Scanned by CamScanner
° J’
.4 aterial require "
p r a f a st
Smits delta Ov
e
1.6 Scope of the project amera syste {Ïj. Th•‹ efor the
automate sed hoinl security c
We have developed fully hO
broad band internet access.
to
scope of the project is limited U
Page 3
BASED HOME SURVEILLANCE
NETWORK
Scanned by CamScanner
Scanned by CamScanner
CHAPTER TWO
LITERATURE REVIEW
2.1 Background
n beings
banks, supermarkets, and environments which are
azardo r ina ccessi bl e for huma
h us O
S
(for example, in environments which with poisonous gases, Of ver y } or high te>Pe'atU'e )‘
;qpp} jc£ttion s are
w rk based
Since computers and network are widespread, many new ni t O
on of
home surveillanc e system s are u sed in it small fracti
appearing in our homes. Although more
creasing £tS more and
number of people deploying such systems is gradually in
homes, the
y systems provided only entry
functions are implemented by such a system. While initiall such
depai’tlTle ).
alarms (to deter theft) or smoke & fire illarms (to automatically summon the fire
later systems incorporated temperature etc. These
measuiements, detectors for water leaks,
enable the
, provide improved security, and
systems help people manage their homes more easily
around their home.
home owner to know What happens inside or
t. As a i esrllt, horne owners can both mow itor theii’ horses and control
fi rewall) to the interne
t Ot P e k
devices in the ii‘ liOll4 *' ' e '°'er'°e "'' ' e'’' ' C' '
t
ystems based Ol1 JP net\\ oi ks have becoille mainsticaiza )›i oducts ill i“ccent }’cat s.
s irveil lance s
f i aild other fot ills of data can be ti ansoJ itted in i eLtl time throu •l the
£tges
Ly g, rtu›vbc‹s
;yt -¿t// oi- intei net. MO/“e vCi, the sui”vcilIance systcm IiaS gr¿tdUItI y cvol ved fi-one only the
•1t\2! igf2 1‹ i anageizzent system conzpai cd to
1S I2
Traditi0i1al sccur ity izaC! !" !1 *Ll!^C!iC" ' * ' ^eC C•’
Scanned by CamScanner
analog surveillaflCe system,
ä *et+Oi
ked su>eiIlance system is more reliable, flexible £tnd lO wer
in cost. B ecause of the il
ppliCation centric , few
design Of these networked surveillance systems
Software and hardware Y£tD be easj
ly added accordingly to the user's specific needs.
Benefits of ONVtr:
• Flexibility: The end-users and integiators can create a system with differentproducts Of
different manufacturers.Currently there are more tlian 2500 products Compatible wÎth
ONVIF Standards.
• Future-proof: Products from different compan ies can communicate with each other,
therefore you can use the products even if the manufacturer closes their productiOIJ.
• Quality: There is a qualitv standard that pi oves that youi product is li ig)i-qualit and cale
be trusted.
Scanned by CamScanner
• IP configuration
• Device discovery
• Device management
• Media configuration
• Real time viewing
• Alarm handling
• PTZ control
• Video analytics
• Security
Scanned by CamScanner
The drawbacks of OCR-Based Aflalog CcTV
Systems include:
x• Limitations in scalability
•• The need to maintain VCRS and
manually change tapes.
•I• The quality of the recordings
deteriorated over time.
•. The cameras, for a long time, were also black and white. Today, mOSt
ana/Og
cameras are in color.
March,20l5)
Scanned by CamScanner
Although the ability to monitor the video remotely via a PC was a great benefit, the actUal
functionality was not extremely useful because
DVR systems in use today enable the monitoring of both live and recorded video, whereas
SOm*J allow the monitoring a
of only recorded video. Furthe1'more, some systems require
specia
d Web browSer; the
Windows client to monitor the video, whereas others use a standar
latter
makes remote monitoring more flexible.( Raghu Raja Kalia, Preeti Abrol, 1EEE, (2014))
downsides.
tasks such as the digitization of video front all
•:• The DVR was burdened with irany
on, recoi'ding, and networking.
carnelas, video coirpressi
•;• J w£1s a "black box" solution, that is, proprietary hardware with pret oaded
t
$ ftu‹ai‘e, Which often foi'ced the end usei to soui ce spare paris fi om one
Scanned by CamScanner
The first step into £t fl etw€irked
Video system based on an open platform came with the
introduction of the video encoder, whiCh IS
also often called a video server.
A video encoder connects to a
nalog Cameras and digitizes and compresses the video. It then
Se>d3 the Vide 3 t3ver an IP network Vjä m8!8l8!
II network switch to a PC server that runs video
gemeflt Softwarefor monitoring the
£lndrecording. This is a true network video system because
Vid o is Coflsistentlysent
over an IP fletwork. In essence, the tasks previously p rformedby
the DVR are now divided up - with
the digitization and compression being done by the video
encoder and the recordingby the PC
server - thus providing better scalability .( Touaibia.1, AZ2ag•E,
Narjes.OlEEE, 2D14.)
:\nalo3
0*i t Cabl iris
Use of standard network and PC server hardware for video recording and
management Scalability in steps of one camera at a time
Possibility to record off site
F uture-proof because the system is expanded easily by incorporating network cameras
Scanned by CamScanner
CHAPTER THREE
METHEDOLOGY
records a video and notify the user using email and sound alarin.
Î
$,gg ¿ p¡dgrani of netnvork based liomc seCurity system
SUHV LLANCE
Page 10
Scanned by CamScanner
Scanned by CamScanner
3.1.1 IP Camera
IP camera is a networked digital Vide came
o rathat transmits data over a fast Ethernet link.
G
"'•er-S• ly
be •C'•itC'°t2d *ill any web
brow$et, . GamT a signal on web network.
¡.e I P available
They receive, send and transfer the piCtur
e (video signal) directly via IP networks, thus
enabling t
he £luthorized viewers to see, save £tnd m ag
£t n e the video through standard
The following are the list of important feattiies of C# and widely used in our impleme!•tation:
â• Standard Library
â• Properties and Events
•.• Easy-to-use Genei‘ics
•:• Indexers
•.• Conditional Coisipi Jo IO
ü• Simple Multitliieading
•l• Integi‘ation Wlth WindowS
Scanned by CamScanner
3.1.3 V:avalStudio
oft ViSUal Studio is an integrated development environment (IQE) Microsoft. It iB
ÛOicros
M
b Sites, web
Used to develop computer programs for Microsoft WindOWS, aS will as w
applications and web services.
uilt-
degrees) nearly any programming language, provided a language-specific service exists. B
in languages include C, C++ and
C++/CLI (via Visual C++), VB.NET (via Visual Basic
.QT),
and C# (via Visual C#). Support for other languages such as Python, Ruby, Node.js, and M
among otlaers is available via language services iiistalled separately
Scanned by CamScanner
Scanned by CamScanner
outsta lding fuflCtÍORalities of OZEKI camera SDK
U
rO
following examples demonstrate how yCtu can use
OZEKi
The camera SDK ÍO P -eyO '
solutiorl like these [12)'
monitoring system by building some useful IP camera or IP camera £t
Fld
camera, RTSP camera
3• Video camera viewer: How to connect to a USB
view their image, play their audio, etc.
ly)
Of!8Oçtt£tÍ 9 tilt •ertical
•:• PTZ camera motion control: How to adjust the angle (pafl h
or limit movement of an IP camera, plus more possibilities. buffer based
nt circul ar
‹t• Network video recorder: How to take a snapshot, or impleme
video recording, etc.
adjUSt mOt O ' detection
â• IP camera motion detection and alarms: How to set up and
os/phOtOSto art FTP
s eflSi tivity, handle alarms and in case of an alarm hOw tO uplOad vide
server or send them as and e-mail, etc.
NVIF II C£tmera from a SIP
IP camera's stream to SIP Video call: How to call an O
of the IP
video plione, or lnake an alariu call to it and broadcast the image
G£tm er à
FT O x ASE H E RvrILLANCE
Page 13
Scanned by CamScanner
Scanned by CamScanner
CHAPTER FOUR
d £1 b£tGk Of CCTV Camera by providing remi3 e access (real time streaming ) and recording the
t
video if some intruders inter into the
camera view. This system mainly focuses on motion
detection to m j{ljlT1iZlng the st
orage cost. lt iS b tSed on IP (internet protocol) cameras that tlJlTl
the analog camera image and audio into
digital data then transmit this data over LAN or through
the I lterFlet.
This video surveillance softw£tre is an enhanced version of home security system
that COntiriuously monitors and remotely
views but only records unusual changes in the home.
Thèse unusual changes may include theft detection or fire detection in offices or home. The
software application acquises, analyze and record images taken from the security cairera. This
software analyzes consecutive video fraises sent from the cainera and detett any changes
occurring witliin the viewing frame of the camera. When a change is detected, the software is
then save the acquired image securely to a folder on the computer with an appropriate time
stanap as soon as the system catches any unusual activity it takes steps and informs the usei by:
W Lending an image Of the activity to the users so that lie may check the problem seriousness
and i eact accordingly. The nain advantage of the system is that it instantly alerts the user
about bill y susplCIOUs activity at the place and iequires much less oi no storage space as
coinpared to th traditionäl sdf ’*ei›»;jCi SySlelii. The finislied product must be ab1 lo opeiate
é
with an £lhvays
ppl jntelnet con laection YPiC£tl EthiopianliOire owFler, using a cont mercially available
fo1,’
O e b* eC ><£l 3$d hS•ll friendly. The sotte ai e iS
broadband paCkoSt
1
°"S ""e " 1
d, as in thé UCrue USTVlS ›‹Ot '*e de£l ›oith the software once it iS
ti £1f1spi3 C lt rend automate
¡nstallcd.
Scanned by CamScanner
4.2 video strea ming
is content sent in compressed form ed by the
over the Internet £l nd display t
Stream‹»g video flOt have tO
ai
n real time. With streaming video or streaming media, a Web user does d ata af1d 'S
vieweri
Of
a file to play it. Instead, the media is sent iR a continuoiis StreaiTi
to download ssed äRd
og that uncompre
iS ä S ecial l ents äf}d
p}gyed aS it arrives. The user needs a player, which e statem methOdS Of
data to the display and audio data to speakers. Som
sends video (l the
i r the imag °
e
help of this vi qwe123")• th'S
video streaming are: videoViewerWF 1.Start (): with the tiser ,
.112.109:8080" "
cUI is displayed. Camera=new IP Camera ("192.168
The
er of the class.
as a private memb
has been declared
method initializes the camera device thatwe evice,
used arguments are the following: first,
then need the lP address of the d the necessary
JlÏh
Provider):
camera.VideoChannel, i g•
ä
Scanned by CamScanner
Scanned by CamScanner
of
PfOtOGOl (UDP) belongs to Suite that is a set
jjjjp: The User DatagfälT1 the lnternet ProtoGol
ssages.
rs to send me
network i"O tOCOISfor the Internet. UDP makes it possible
for the compUte
Se S ¡ vé application s
{y 1 t
p sup ri not necessary. Tim e-
poses that error checking nd correction is of Waiting
foi
tS instead
ystem that prefers droppif s paCk
e
often employ UDP as real-time s
delayed ones.
+t O"
sur: The Session DeSC'i"iption Protocol (SDP) conveys ÎnfOfffl ! Op StreamS in
mC'.dia
ate in the
scriptio n to @ * G
multimedia sessions in order to allow recipients of a Session de k
ces in other rietwor
also describe conferen
session. It is mainly used in inter-network but it can
ndalone form I -
environments. SDP is often used together with RTP, SIP or as a Sta
and video. Sources of data can include both live data feeds and stored eli S.
that is applied for
RTP: Real-time Transport Protocol specifies a standardized packet format
the
ensures
transmission of multimedia data such as audio and video over the Internet. RTP
end-to that
end multimedia data delivery with real-time characteristics.Pi-actically it means
With the
implementation of RTP it is possible to deliver interactive video or audio data.
RTCP: The Real-Time Transport Control Protocol (RTCP) is a companion protocol of the
Real time Transport ProtoCr›l (RTP) the one used to send and receive roost media over IP
these days. RTCP gathers statistics for a media connection and infoi iaaation. RTCP gives
information on transmitted octet and packet counts, lost packet counts, jitter, and round-trip
delay time.
H323 Protocol: H.323 is an ITU VOIP protocol. It provides a foundatiola for audio, video,
and data coirmunications across IP-based networks, including the Inter net. It is irnpleiaaented
by voice and video conferencing equipmcnt naanufacturers, real-tilTle applicatÍOl3S ãl3d is
deployed worldwide by sei-vice providers and enterprises for both voice and video services
over 1P
nets orks.
Scanned by CamScanner
Scanned by CamScanner
I
Comparison of Frames: This stage is for checking if there is motion from the live feed
captured. To do so, the system compares the frames obtained through the WC with one another
in order to detect variation in the frames and sequentially exert the presence of motion. On
confirming presence of motion, it is time for the next step to carry on.
Storing the frames: If motion is detected the next action expected of the system is to store this
kind motion for the client viewing later. This h'elps the user in that he cart provide a legitimate
confirmation in case of any inappropi iate action, since the video footage can be utilized as
Q£ty w lit to be told instantly of an intrusion or suspicious irioveinent detected iii the premises
Li nder sui’vei1lance,
and thus, a CilUtion on system is added to the system. The alarm s
stent iflstantly triggei's an MP3 foi mat audio file alert signal once notion is detected,
and th1s
wi
Scanned by CamScanner
4.3 {{i if the
Video Motion Detection jp works aneOuslyit judges
s Hot t area simult
and monitors the high priority targe
TheSystemworks24X7 ce Gä Lised by hUm8
G Î !t
' ’
The
ftviron e disturban
rri nt change or any other
changé 'S C
ber O each blOGk’ S
place by dividing the image frame into N num f bl Gk . Then
adjaeent pixels are compared with the lOCks.
Centre and its {jjp[9U im£!ge (Ti) b
corresponding t g different lumi £t I
ce
S havin
pparing the image frames we count the number of iX
e
All, C
value.
Sumination(C) of pixels having gl’CàtCi luiaiinaNce value of each blocl‹ is done and is conapai ed
with the thi eshold (òt) value. If threslaold value IS lOSS than the val die of |aixels that describe the
claange ili the lurninance of the image fi anae (òt < C) then it shows that the intrusion iS
OCCui'red
or any unauthorized object is dctccted in the target area. Else t
if hreshold value is greater
than tlaC
v£tlue of pixels descri bing the change in the lum inam ce of frame (Al > C) mien the
backgrOu;,d
image is updated After dCteCtÎ log äU ilJtl‘USIOlâ or any disturbance in tai get QNC£t
tire syston noti
the user/admin istrator via SMS and action is taken by them accoi fi es
d iljg] The user can access the
y
NETWORK BASED HOME SURVEILLANCE
Scanned by CamScanner
Scanned by CamScanner
System remot
inistrator can take
ly and view the area by real time streami
t2 Then user/Adfn
required action by
performing operations such as p }ym e
4 3.2 Moti Oti Detection 0
Motion detection algorithrnlgoritb ms cedure in which t
he S
refers to thWapproaeh or pro l detectiofl i
actua
made, how the Motion other words can be said
system verifies the presence of rnOtiOn, which in variety in
to be the steps in which an extensive
motion is been detected. They are the sUpp rt for
C puter vision such as Objects and clamping
visual surveillance, recognition arid ti tcking
streams. If it is faulty, the ain objective not achieved.
whole system is not run well arid the m
e to
Thresholding: ThÎS Compares the current frame with the pl0vious fram . It JS adaptiv
force
moving eamera appJications as distinctive protests and movements give diverse qualities of
that are not constant on the whole image. The verification is done separately on every pixel or on
minor hinders of pixels to detect the presence of motion. lt is easy to implement value, though it
has some limitation as it produces false alarm, caused as a result of false detection due to noise
Thresholding itself is subdivided into six main sections based on the information they exploit:
•• Histogram Shape-based: case the tops, valleys and arches of the smoothed
histogram are dissected
n• Clustering-based: here the dull-level specimens are bunched in two sections as
background and foreground object
•.• Entropy-based: This algorithm use enti'opy of the moving object and backgi'ound
locales, and so forth
fi• Object attribute-based: Mcasures the similitude between the gi ey sc£t1e And the
iepi escalations, such as fuzzy shape sirn ilat ity, edp•e foftU itous event, and so on.
•?• Local: where it adapts the edge esteern old cvei'y pjye| tO é C
tir n ärby to the local
image charactei istics.
Scanned by CamScanner
form13la•
using
Gray Scale
input image nto
Step 2: Convert the
G(x,y)=0.299*Fr(x,y)+0.587*Fg(x,y)+0.l44*Fb(x,y) he Souare blOCk With
the
ited iflt t
y sc ale a l S*& C
Dn(x,y)= l, |Wn(x,y)-Bn(x,y)>tT
0,otherwise
R(n)-1, therwise
of R(14) eSS th£ln ‘-1 ’, the backgi‘OUl2d image of the block is updated.
Step 9: If the value
4.3.3 Uses of D
Rel ieve operators fi orn Evoi l‹ load of watching ovei ounzerous camet as that way not
update foi a long pei iod
as of the pi ogi and
••• Monitol all tlic scencs h on camel
•:• kcacting to any suspiCiOUsactivity in the scene
+ i‹ed ‹i›e"' ‹°a° ,›* • °° '• d
Page 20
Scanned by CamScanner
4.4 Video Recording
i d ar
t
a1g orithM• Th r eflt
differREG
țypes
-4,
n de t ection -2,
This software records a video according to motio -1, JvfPE G
Thos e are j tPEG, jvfPEG e£t
p d from
of digital video formats for recording a video. g hOVide. S• C''
vide
jGti8> b
the IP camera on the server device.
W C motion pred
object-based encoding, '
handles a e e
-
relative to network bandwidth and storage requir ard defi 1 t'° 1
l
Stand
for
USQd
ifl onti»Qi tO be
IP video surveillance. MPEG-4 may c
cameras.
Mpeg4Recorder object.
the
rder_Mu1tiplexFi nished (): Terminãt S £t connections and Closes
ü• Mpeg4Reco
recorder object. the connections
method and termin£tteS
Stop Video Capture(): Calls a multiplexing
alarm.
to speech sound
How tO convert text string
Ut Id P*OdUC*S >UdlO St*’* ** US OUt9Ut- S9eeCl*
ch syntliesizer takes text as iiâ9
I in
SpeC
as text-to-speech(TTS).
Syljtliesis iS also referied to
Scanned by CamScanner
A
NETWOIIIJ $ E HOME S RVEILLANCE Page 21
Scanned by CamScanner
Text Anaiysn
The front end s
analyzes a string
g gUage rules. lt
pecializes in the analysisof text natur al1 '}i h, bUt Ü t easy in
usin
Of charactersto determine to dO il Eng S
where the words are (which is easy like
languages such as Chinesean ijtnmatical deta
Îls
d Japanese). This front es (j
O t pC;ufls, numbers, ilHd SO
end also figur
rop er
For instance, which wordsare p
functions and parts of speech.
an
fOfth; where sentences begin nor £t statement; d whether
and end; whether a phrase is a questio
a statementiS past, present, or
future tense.
All of th
se elements are critical to the selection Of appr opriate p ronunCiations a8 d intonations
è
a rising
for words, phrases, and sentences. Consider that in English, a question osualJy ends W3th
tense.
pitCh, or that the word ”read” is pronounced very differently depending on its Clearly,
text fntO
understanding how a word or phrase is being used is a Gritical aspectof interpreting
S
sound. To further complicate matters, the rules are slightly different for each language. S8, >
you can imagine, the front end must do some very sophisticatedanalysis.
Sound Generation
The back end has quite a different task. It takes the analysis done by the front end and,
through some non-trivial anaJysis of its own, generates the appropriate sounds for the input
text. Older synthesizers (and today's synthesizers with the smallest footprints) generate the
individual sounds algorithnaicaJJy, resulting in a very robotic sound. Modern synthesizers,
such as the one in Windows Vista and Windows 7, Windows 8&8.1 use a database'of sound
segments bui It fi-orri
hours and hours of recorded speech. The effectiveness of the back end depends on how good it is
at seJecting the appropriate sound segments for any given input and smooth ly sp licing them
together.
Scanned by CamScanner
CHAPTER FIVE
age z3
Scanned by CamScanner
5•2 VIdeo recording m p
ThlS lS tht second m d e
Odule of this
project which records a vide o ilb t Ct th
at StartS
if there is an ) ion until the
<Ot' n £tl ound the view of the IP ting f Ot
c£tmera. It records a video frO< the star
motion ends.
S• Nearby alarming
•• Remote alarming
Scanned by CamScanner
Scanned by CamScanner
CHAPTER SIX
CONCLUSION
AND RECOMMENDATION
6.1 Conclusion
The result of the i ould require
mpleinentation that the network based home surveillance system c
eSS reSource
s for it tO WOrk as ex principl . The system
pected because of the motion detectiofl
only record when it detec d air" clips.
ts motion, thereby, avoiding storage of unnecessary “dea
This system is alSÇt ¿t1 e of a
*t*lTl Ind notifies the operator of motion so thilt he is awar
at tlJÎ S
t *e Site being Se
cured. The system is SLlccessfully and comp1e |y ijJjplem (lted. Therefore,
stage the systems is ready for the current
the end users to stan operating. In comparison With
application of ielated features, such as era
the Spy Cam, baby cam, Level 2 multi cam
appliCation, camera Bison, and tilrlds a chance in
even with the most populat’ CCTV, this system S
the market, as it is more flexible, and gives a better management opportunity than the cuirent
market applications. Its features, like the video compression, and detecting motion before it starts
i ecording footage, put it at a better leveiage than other systeiiis. Another advantage is that,
stoi agc iiiedia, time and energy are saved all in one simple package. This application thei efoi e,
sustains that the system is an iirpioveinent and achievement added to security.
6.2 Recommendation
The IP carnei a technology allows that anyone can connect to as inany as lie want IP cameras but
on l y lie can see maximtim of one IP carver as in parallel on the camei a viewei tab of his
application. Th is project is developed only to see one IP causera at a time. Our system is
irnp leiiiented mid tested lis ing USB Cfi!J1ei as due to the availabil ity pi oblens of IP camera. Btlt to
V ¡p,p y qt- hotel i ernotcly tis img liCtwoi k,
lP cansei a iiiust be available. The system eve have
devel oped conmainstlJC bnsic lèattii es of the survei1lance. S ince the field of video sul vC lllanCC IS
VCJ•y bi’Oad. FOI’ the 1tittiie wc ivill add some intelligent featri es like iuulticaireia viewin 3. Cloud
Scanned by CamScanner
REFERENCE S
r S
[1] Williams, M. (2002). Microsoft Visual C# (core M GrOSOÛ ‘ ’
reference)-
&o
[2] Ohaneme, C. 0., Eke, J., Azubogu, A. C., IfeagwU,E• N., . 012).DeS W
hanem L. C (2,l£ti › Um£ll of
t1O
Surveillan ce SyStem
Computer Science Issues, 9(5), 393. b '
ne].A>ili £t
[3] M.Mitrovic, “IP Video Surveillance” , March 2008 .[Onli e
t Ind effiGient
foregroUHd a» lysis
[6] Tian, Â’. L., Lu, M., & Hampapur, A. (2005, June). R ObUS
and PatternRecog
nlti on, 2005. CVPR
for real-time video surveillance. ln ComputerVision
1182-1 l 87)• IEEE’
2005. IEEE Computei Society Conference on (Vol. 1, pp.
vidco surveillance
(2008). Intellige nt network video: Understanding modern
[7] Ni lsson,
F.
systems. CRC Press.
VCR-Based Analog
B. I., Ci uz. M. T. D., & E g t|j£tt}j£tpl, U.
g A mi flu, S., A bb£t, i. M.,- Dodo,
CCTV Systems
[9] iP Video Surveillance Design Guide” ,August 1 8, 2009.[
lait W. K ing, CiSCO
VR-Based Analog CCTV Systems”,March,2015
[10] Plof. Rtl})ali Dalvi “D
Preeti AbfOl, IEEE, (2014)), Net votk DVR-Based Analog CCTV Systciias
j ]J RdghLJ Raja Kalia,
Scanned by CamScanner
Appendix
Sample of code for video
streaming(Camera connection)
private void button Com
pose Click(object sender, EventArgs e)
{
var result = myCameraUrlBuilder.ShowDialog();
_camera.CameraStateChanged-=camera_CameraStateChanged;
_camera.Disconnect();
connector.Disconnect(_camera.VideoChannel,_processedImageProvider);
connector.Disconnect(_camera.VideoChannel,_originalImageProvider);.
_camera. Dispose();
_camera= null;
}
Scanned by CamScanner
);
_camera = new OzekiCamera(_myCameraUrlBuilder.CameraURL
d;
_camera.CameraStateChanged += _camera CameraStateChang
e
b u t t o n _ C o n n e c t .Enabled = false;
ConnectCam();
Start();
}
try
MediaTypeNames.Application.Octet);
R ETWORVK LLANCE
N Page 29
BASE DEOMEIS
Scanned by CamScanner
if (attachmentFilename != null)
OS t ls
ContentDispositiondisposition=attachment.ContentDÎS]9
e
lt l C.
disposition.CreationDate=File.GetCreationTim (attaché
e l
disposition.ModificationDate —
File.GetLastWriteTime(attachmentFilename);
e
tachée t i e'l
disposition.ReadDate—File.GetLastAccessTime(at
e).Length;
disposition.Size=newFileInfo(attachmentFiÏenam
Host = "smtp.grnail.COIT1",
port = 587,
EnableSsl = true,
eliveryMethod.Netivoik,
Delivei’yMethOd = SiutpD
üseDefaultCi edentials = false,
fioi,zrasswoid)
NETWOBK nAsr-u
HOM s r LLA E Pag 3
Scanned by CamScanner
using (var message = new MailMessage(fromAddress, toAddress)
Subject = subject,
Body = body
message.Attachments.Add(attachment);
smtp.Send(message);
Scanned by CamScanner