Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

UNIVERSITY OF BUEA

HIGHER TECHNICAL TEACHERS’ TRAINING COLLEGE [HTTTC]


KUMBA

DEPARTMENT OF ADMINISTRATIVE TECHNIQUES

TOPIC : CONCEPTION OF A REAL TIME SURVEILLANCE SYSTEM


FOR HIGHER TECHNICAL TEACHER TRAINING COLLEGE
BY
Abwe Nzime Junior Nkwelle
HT22P069

A project Submitted in Partail Fulfilment of the Requirement for the Award


of the Teacher’ Advanced Certificate of Education [DIPET II]
in Information Management and Communication [IMC]

Supervisor:
Mr Nshom Samuel

1
CHAPTER ONE
1.1 INTRODUCTION
This research is organized in five chapters. Chapter one represents the gencral Introduction of the study that
is made up p of the background of the study, statement of the res carch problem, the objectives of the study,
rescarch questions, hypothcsCs, And significance of the study, the scope/delimitation of the study, the
organization of the research and the definition of operational terms. Chapter two focuses on the review of
related literature, which is structured into conceptual, theoretical. And empirical review. Chapter three
conprises of the methodology used in the work. It features the research design, area of study, population of
the study, sample and Samplıng techniquc, research instruments, method of data analysis, system analysis
And ethical consideration. Chapter four consist of the presentation of data, data analysis, discussion of
findings, and implication of findings. Chapter five presents The discussion, conclusion and
recommendations bascd on the findings of the study and the limitations faced during the study.
1.2 BACKGROUND OF THE STUDY
During the past decade Video Surveillance Systems have revolved from simple video acquisition and
display systems to intelligent (semi)autonomous systems, capable of performing complex procedures.
Nowadays, a Video Surveillance System can integrate some of the most sophisticated, systems incorporating
various types of media (e.g. sound, image, video), employing image and video analysis algorithms such as
classification (e.g. neural networks or stochastic models), pattern recognition, decision making, image
enhancement and several others. Thus, a modern surveillance system comprises image and video acquisition
devices, data processing – analysis modules and storage units, components which are all crucial for the
system’s workflow[ref]. There are many variation of Video Surveillance Systems, each one trying to meet
the demand of a Specific market (e.g. indoor in an enterprise, public areas etc). Several categorizations can
be drawn. Hence, one can categorize Video Surveillance Systems based on the type of imaging modality
acquired, producing categories like “one camera systems”, “many camera systems”, “fixed camera
Systems”, “moving camera systems” and “hybrid camera systems”. Another categorization can be Based on
the applications which a Video Surveillance System can provide, such as object tracking, Object recognition,
ID Re-identification, customized event alerting, behavior analysis etc. Finally, Video Surveillance Systems
can be categorized based on architecture a system is built on, such as Stand-alone systems, cloud-aware
systems and distributed systems. For most of the time, surveillance systems have been passive and limited in
scope. In this context, fixed Cameras and other sensing devices such as security alarms have been used.
These systems are able to Track persons or to detect some kind of events (a person breaking the door or the
window), however, They have not been designed to predict abnormal behaviors for instance. During the last
years, there Was a huge progress in sensing devices, wireless broadband technologies, high-definition

2
cameras, and Data classification and analysis. Combining such technologies in an appropriate way will allow
to develop new solutions that extend the surveillance scope of the current systems and improve their
efficiency. Surveillance systems have to cope with several challenges, including, but not limited to,
algorithmic, Infrastructure, environmental, challenges. Thus, surveillance systems have to adapt with the
emerging Network and infrastructure technologies, such as cloud systems,….deep learning, video evolution
(4k, HDR) in order to provide more robust and reliable services. This trend will also demand the integration
Of different surveillance systems for extracting more useful knowledge. This integration will require New
communication protocols and data formats between surveillance agents, as well as new surveillance adapted
databases and query languages. Finally, more accurate algorithms are required, Especially in the context of
behavioral analysis and abnormal activities detection.

In this research, infrared surveillance cameras would be used as excellent examples of both passive and
active sensors, to be automatically activated for video capture and storage from a remote location. During a
bright sunny day, enough sunlight illuminates the targets which reflect toward the camera lens such that the
camera simply records the radiation from sunlight which is reflected by the sensed object (passive mode).
On a cloudy day or inside a room, there is often not enough sunlight for the camera to record the targets
adequately. Instead, it uses its own infrared energy source - a flash - to illuminate the targets and record the
radiation reflected from the targets (active mode).
Surveillance systems have been a key component of many organization‘s safety and security group for
decades. As an application, video surveillance has demonstrated its value and benefits countless times by
providing real-time monitoring of a facility‘s environment, people, and assets, recording events for
subsequent investigation, proof of compliance and audit purpose. Interestingly, criminal activities have
tremendously increased especially at places of high national security all over the world. There is also
increased threat from armed robbers and hoodlums who invade locations of both public and private interest
even in broad daylight and at night. Security consciousness has consequently risen among all the nations
especially since after the tragic incident of September 11, 2001 attacks on the world trade center in New
York City. The attacks killed 2,996 people, injured over 6000 others, and caused at least $10billion in
property and infrastructure damage (Morgan, 2009). These incidents of crime often occur without anybody
being able to trace the perpetrators. There is therefore no reason to wait until it happens to one. The
prevention or resolution of just one crime would be enough to pay for video surveillance system many times
over.
As security concerns increase, the need to visually monitor and record events in an organization‘s
environment has become even more important. Moreover, the value of video surveillance has grown
significantly with the introduction of motion, heat, and sound detection sensors as well as sophisticated

3
video analytics. As a result, many nontraditional groups have also found value in video monitoring and
recording. In transportation, video surveillance systems monitor traffic congestion. In retail shops, video can
be helpful in identifying customer movement throughout a store, or serve to alert management when the
number of checkout lines should be changed. Some video analytics packages even offer the ability to
identify a liquid spill and generate an alert enabling faster response by custodial services, thus avoiding a
slip and fall situation. Product and package shipment operations can use recorded video to help track and
validate the movement of cargo and help to locate lost packages. Additionally, video surveillance can be
integrated to complement access control policies, providing video evidence of access credential use. Video
surveillance has evolved not only in its application, but also in its deployment.
This evolution of video surveillance, includes the emergence of the fourth generation of video surveillance
systems which is known for being network-centric. These systems are realized through an open, standards-
based, internet protocol functional and management architecture.
Essentially, this work introduces an on-demand cloud based model which would be activated by GSM only,
for migration of traffic capture onto a converged infrastructure, such as server cluster mainframe computer
storage.

4
The adoption of a network-centric system architecture that meets the extensive requirements for a
real time video surveillance will offer remedial alternatives to security challenges in mission critical
environments. A cloud computing based IP video surveillance architecture could provide several
benefits such as;
i. Increased reliability
ii. Higher system availability
iii. Greater utility (any surveillance camera to any monitoring or recording device
for any application, anywhere)
iv. Increased accessibility and mobility
v. Multivendor video surveillance system i.e. interoperability.
1.3 STATEMENT OF THE PROBLEM
it is necessary to make use of automatic video analysis technologies for the conception of real time
surveillance system which can aid the human operator in both detecting and reacting to potentail
threats. The internet and wireless broadband infrastruture is becoming robust enough to permit
excellent remote video surveillance. With advances in hardware and software technology, and the
emergence of ubiquitous internet infrastructure and wireless networks with broadband capability
system that can do an excellent job of remote video supervision from anywhere and at anytime. The
requirment of a video surveillance system differs in important ways from CCTV, NVRs, and DVRs.
Real Time Surveillance provides video baased object analysis capabilities. The developed RTSS
provides a wide range of features in order to solve the following problems in surveillance areas;
1. Detecting objects.
2. Face detection.
3. Sending prompt messages in case of intruder.
4. Internet Of Things IOT
5. AI Assistant
1.4 OBJECTIVES OF THE STUDY
The main objectives of the study
The main focus of this study is to design a real time surveliance system for Higher Technical
Teachers’ Training College Kumba
Specific objective of the study
Specifically, this piece of work intends to;
1. Access possible intrusion arears into Higher Technical Teachers College Kumba.
2. Design the GUI for user usage for real – time monitoring in Higher Technical Teachers
Training College Kumba.

5
3. Simulate a real time surveilance system for Higher Technical Teacher Training College
Kumba using CCTV cameras.

1.5 Research Questions


General Research Question
How to design a real time surveliance in HTTTC Kumba?
Specific Research Questions
1. What are the ways to simulate a real time surveilance system for HTTTC Kumba?
2. How can we do to access possible intrusion areas into HTTTC Kumba?
3. To what extend does the GUI for user usage for real time surveillance system helps in
HTTTC Kumba?
1.6 Hypothesis of the study
H⁰ Real time surveillance system simulate HTTTC Kumba
H¹ Real time surveillance system does not simulate.
H⁰ Real time surveillance system access possible intrusion areas in HTTTC Kumba
H¹ Real time surveillance system does not access possible intrusion areas
H⁰ Real time surveillance system GUI helps HTTTC Kumba
H¹ Real time surveillance system GUI does not help
1.7 Significance of the study
1. The study will be significant to the stakeholders cpncerned and especially to HTTTC Kumba,
lecturesrs,students and government.
2. To the students they will feel safer on campus knowing thst there is a real time surveillance
system in place to monitor and respond to any potentail threats.
3. To the lecturers knowing that there is a real time surveillance system in place can provide
them with peace of mind. Allowing them to focus on teaching without worrying about their
personal safety or the safety of their students.
4. To the Government. A real time surveillance system can aid in the detection and investigation
of criminal avtivities.
1.8 Scope of the study
The study is concerned with the conception and implimentation of real time surveillance system in
HTTTC Kumba. Due to the broad nature of the topic, it is necessary to specific what exactly has to
be covered in this study. It is limited in context. Geographical coverage, and time frame.

6
Content wise, the study is limited to the conception and implimentation of a real time surveillance
system in HTTTC Kumba. In this context, it has to do with the kind of surveillance HTTTC Kumba
uses.

In the geographical scope, this study is limited to HTTTC Kumba. worthy of note is that Kumba is
the administrative headquarter of the Meme Division of the South West Region of Cameroon. The
city is the business hub of South West Region of Cameroon with major lines of trade being general
provision trade farm, products trade and some tourism and leisure. This study on conception and
implimentation of a real time surveillance system located within Kumba Municipality.

In line with time, the study is limited to the period between January 2021 and May 2021 which is the
period within which the data is collected and processed.

The scope of this may be broad but a single study of this nature cannot properly cover all that is
suggested by this topic. The study will not ddirectly cover all that is related to the school and
conception and implementation of real time surveillance due to the high need for objectivity and time
constraints.

1.9 Definition of terms


Surveillance system
It is the purposeful, routine, systematic and focused attention paid to personal details, for the sake of
control, entiitlement, management, influence or protection Lyon 2007

Real time monitoring


Monitoring is the regular observation and recording of activities taking place in a project or
programme. It is a process of routinely gathering information on all aspects of the project.
To monitor is to check on how project activities are progressing. It is observation; ─ systematic and
purposeful observation.

Close Circuit Television (CCTV)


CCTV is a surveillance system in which one or more cameras are connected through a closed circuit.
The footage taken by the cameras is sent to a television monitor and/or recorder. CCTV systems
consist of cameras, monitors, recorders, interconnecting hardware and support infrastructure.

Chapter summary.
7
This chapter has achieved its obiectives by establishing the background of the study, the statement of
the problem, obiectives, research questions, rescarch hypothesis, the significance of the study, the
scope of the study, the operational definitions of terms and the organisation of the entire study.
Surveillance systems have been a key component of many organization‘s safety and security group
for decades. As an application, video surveillance has demonstrated its value and benefits countless
times by providing real-time monitoring of a facility‘s environment, people, and assets, recording
events for subsequent investigation, proof of compliance and audit purpose

CHAPTER TWO

LITERATURE REVIEW

2.1 INTRODUCTION

This chapter presents a review of literature review on the conception of a real time surveillance
system. The main purpose for this literature review is to establish the academic and research areas
that are relevant to the subject under investigation. On the above basis, this chapter is structured into
three sections namely; conceptual, theoretical and empirical reviews.

2.2 Conceptual Framework

This section contains a review of the related concepts drawing from the topic under study, the
concepts to be reviewed include amongst others; surveillance system, real time monitoring and close
circuit television CCTV. These major concepts and other related ones will be reviewed below.

The concepts of surveillance system

The concept of surveillance as a social practice may be defined as “the focused, systematic and
routine attention to personal details for the purposes of influence, management, protection or
direction” (Lyon, 2007, p. 14). The concept points to both practices and purposes. Many
qualifications are needed to fill out this definition, and part of the aim of this article is to attend to
such nuances of concept-expansion. For example, this definition refers to “attention to personal
details”, thus allowing a stretch from “watching” to listening and other kinds of “attention”, including
those enabled by electronic means. See below, where this is developed further.

The mention of “electronic means” also hints that the simple “watching over” of, say, a worker by
her employer, is today much more subtle. Surveillance now “makes visible” (Taylor, 2017, p. 4)
through many means, especially by data collection, analysis, interpretation and action. Moreover, the
“making visible” achieved by surveillance might occur without any deliberate operator attention
8 to,
or awareness on the part of, particular people. Personal profiles may be constructed from disparate
data, gleaned from consumer behaviour and from a myriad of other apparently random sources. But
surveillance may also occur in other more arcane ways, attending to human population groups, as
well as to non-human creatures such as birds or viruses (Haggerty & Trottier, 2013).

Surveillance, then, is a modern concept, used in English since the nineteenth century as a loan-word
from the French; sur- ‘over’ and veiller ‘watch’, which both come from the Latin, vigilare, to keep
watch. Spanish reflects this in la vigilancia, and Überwachung gives the same sense in German.
Surveillance may be viewed as appropriate vigilance, to protect society from risks of attack, disease,
crime or corruption. Indeed, it may be considered as protective of freedom and liberty, as much as it
is about care as control (Rule, 1974; Lyon, 1994; Taylor, 2020).

The use of the concept of surveillance, including its adverse aspects since the nineteenth century, is
no accident. This was a period when industrial capitalism came into its own, involving new modes of
organisation and governance, both within emerging national and colonial governments and in new
forms of economic life, like in production and consumption (e.g. Dandeker, 1994). From the first
such usage, while direct perception was never abandoned, the technologies of surveillance were also
important, entailing as they do, ways of enhancing first vision, then hearing and eventually, memory
(Lauer, 2011). For example, improved lighting on the streets of Paris, to enhance visibility, was a
policing priority in 1668 (Tucker, 2017). In the 1890s, San Francisco newspapers complained about
telephone operators listening-in on conversations (Lauer, 2011, p. 577), a practice soon followed by
others rather than just operators. And while Thomas Edison promoted the surveillance use of his
phonograph as a way of enhancing memory, in the 1880s, Edward Higgs notes that in Europe the
state collection and thus “memory” of citizen data – not only for “control” – can be traced to the
1500s (Higgs, 2004).

However, from the mid-twentieth century on, surveillance itself was increasingly construed as a
threat to freedom and liberty, not only when it was used to buttress Nazism and authoritarian
communism but also – especially in the writings of George Orwell (1949) – in Western democracies.
This negative connotation of the concept, including the control of the watched by watchers, is the
source of much social criticism. However, some argue, the latter is not a necessary connotation (e.g.
Andrejevic & Selwyn, 2022; Lyon, 2007). Nonetheless, the ongoing excessive, unauthorised and
often concealed uses of surveillance in government, the workplace and the marketplace, seen
especially from the late twentieth century onwards (see e.g. Marx, 1985; Gandy Jr., 1989; Mitchell,
1991; Zureik, 2003), continue to make the concept of surveillance politically contentious.

The above definition of surveillance may be used to understand the historical development of the
term, its conventional and more controversial uses as a concept and its ongoing critical capacities.
9
Historically, “surveillance” practices may be said to antedate the introduction of the concept of
“surveillance”, meaning that the concept may be applied to, for example, military intelligence,
workplace supervision and public “policing” – also avant la lettre – occurring from ancient times.

Increasingly, from the nineteenth century, it is the technologies used for surveillance that help to
define the inherent changes in the modes of surveillance, that in turn require constant rethinking of
the concept itself. Those technologies, themselves products of desires for improved communication,
industrial production or military prowess, became merged in the later twentieth century, in
“information technology,” and latterly, in the internet, social media and other platform companies.
Most recently, algorithmic analysis of extremely large datasets, artificial intelligence and machine
learning underlie many “smart” surveillance activities, from fitness wearables to smart homes and
cities (e.g. Sewell, 2021; Kitchin, 2014).

This is why the concept of surveillance is not only required for but central to the digital context; the
former has developed symbiotically with the latter. However, like its context, the digital, the
practices of surveillance are means to other ends, rather than representing a human purpose in their
own right. This may be demonstrated in each context where surveillance as social practices appear,
which is why the practices are frequently controversial and the concept itself is contested. Here, the
chosen window into the concept of surveillance is the burgeoning field of surveillance studies, which
for the past two decades has provided a meeting place for those concerned with exploring
surveillance practices and clarifying the concept.

The political-economic context and its accompanying technological features have always been
significant aspects of whatever surveillance is practised; to neglect them is to misunderstand both the
phenomenon and the concept. Today, the digital context, dependent on the internet and on complex
algorithms, is central to surveillance. Data, in other words, is the means whereby human beings, in
their many activities, are made visible, represented and treated (Taylor, 2017). But although the
concept of surveillance is rightly related to an infrastructural feature of contemporary societies, and is
highly automated (Andrejevic, 2007) it also still refers to a set of social practices (Finn, 2011; Marx,
2016).

The concept of Real Time Monitoring

Real-time video surveillance goes far beyond installing video surveillance cameras: it is a cutting-
edge technology that includes video content analytics (VCA) and can automatically analyze video
content, detect objects and events based on predefined algorithms. Considering that video cameras
generate endless quantities of footage, it is impossible for security staff or operators to permanently

10
view each camera and detect suspicious behavior. Therefore, most often incidents are investigated
once they are detected. It is time-consuming, tedious, and doesn’t provide data-driven results.

To enhance traditional remote video surveillance utility, real-time video monitoring technology,
objects and people tracking technologies, and asset tracking solutions come into play to easily and
quickly identify items and analyze them in mere minutes. Based on object attributes, movement and
behavior, face recognition patterns, suspicious persons, the sudden burst of flames, or any other signs
can be detected. Therefore, real-time monitoring can deter criminal activities before they occur.

Smart video analysis technology helps improve situational awareness through customized real-time
alerts. They are triggered once the unusual activity is identified. Based on specific pre-defined
criteria, video surveillance operators set up alerts.

Video surveillance alert criteria

The software criteria for video analytics include:

 Object appearance similarity. Based on these criteria, alerts are triggered, for example,
when there are objects (bikes, cars, etc.) or persons who are not supposed to be in a
certain location, or when someone is dwelling in the area. Alerts can be triggered even
based on color clothing criteria. For instance, if there is a closed area only for private
employees in uniforms, other persons wearing clothing of different colors will be tracked
and notified as suspicious ones. With this functionality, if more people than expected are
dwelling or loitering, for example, near the store inventory, the camera will trigger alerts
to make security staff respond quickly.

 Count-based alerts. Alerts that are based on the count of the number of objects in certain
areas can help control traffic or crowd. For example, if long queues are detected in the
store or the airport check-ins, managers can quickly address this issue thanks to real-time

11
video monitoring. Moreover, with occupancy detection functionality, lights can be
switched off if there is no one in the room.

 Face-recognition alert. Based on digital images extracted from video records, security
staff can easily pinpoint suspects in real time.

2.3 Theoretical Review

This section present a review of relevant theories related to this study. The theoretical review paves
the way into an understanding of the philosophical of the topic under study. The theories here
include; Surveillance Capitalism, Panopticism theory and Orwellian theory.

Surveillance Capitalism by Shoshana Zuboff 2015

This framework can be called ‘surveillance capitalism’, a term possibly first used by Bellamy and
McChesney (2014), but more thoroughly developed and disseminated by Zuboff (2015, 2016).
Although surveillance capitalism is not yet fully developed as a theory, Zuboff (2015) is laying a
foundation for a new ‘all-encompassing theory’9 at a ‘civilizational scale’, attempting to explain a
new type of social relations and economic-political system that produce their own conceptions and
uses of authority and power. Such an overarching theory is needed, because ‘[t]oday’s surveillance
complex aligned with an economic base en- thralled with the prospects of metadata appears too
strong for meaningful reforms without significant shifts in larger economic foundations’ (Price
2014).

Surveillance capitalism is a new subspecies of (information) capitalism that has gradually constituted
itself during the last decade, in which ‘profits derive from the unilateral surveillance and
modification of human behavior’ (Zuboff 2016). This new type of capitalism is said to have been
hijacked by surveillance, which now has a wholly new logic of accumulation fitting a networked
world—aiming to predict and modify human behaviour as a means to produce revenue and market
12
control (Zuboff 2015). Zuboff’s surveillance capitalism thus signals a new era of capitalism with a
new dominant logic of accumulation, claiming that the contemporary, very lucrative surveillance project
subverts and corrupts the normal evolutionary mechanisms of capitalism—the unity of supply and
demand that, however imperfectly, catered to the genuine needs of populations and societies and enabled
the fruitful expansion of market democracy (Zuboff 2016). In contrast, surveillance-based
capitalism no longer has any connection or interest in the needs of populations, societies or states.

What is called big data is the foundational component of this new economic logic, which is based
on prediction and its monetization—selling access to the real-time flow of people’s daily life in order to
directly influence and modify their behaviour for profit. The pervasive and ubiquitous recording of all
daily transactions also means that the market is no longer unknowable as it still is in classical liberalism;
rather, it is becoming transparent and knowable in new ways (Zuboff 2015; Varian 2014). It comes
as no surprise that Google is seen as the ideal type of the new economic logic and commercial
model.

Zuboff identifies four key features of the emerging logic of capital accumulation, in which she
explicitly follows the four new ‘uses’ emanating from computer-mediated transactions identified
by Google’s Chief Economist, Hal Varian (Varian 2014). First, the insatiable appetite for data
extraction and analysis (data mining), commonly known as big data, illustrates the two possibly
most crucial features of surveillance capitalism: formal indifference and functional (or structural)
independence. Formal indifference represents the asymmetric nature of data extraction, which
occurs in the absence of dialogue or (freely given and informed) consent. Functional independence
breaks with the twentieth-century corporation model, since there are no structural reciprocities
between the firm and its primary populations (durable careers for employees, long- term
relationships with customers, Zuboff 2015). Instead, firms like Google rely on algorithms to
manage their core services and on relationships with third parties (adver- tisers and intermediaries)
for their revenue. The infrastructure of surveillance capitalism, built on big data with its goal of
prediction and behaviour modification, eliminates the need for—or possibility of—feedback loops
between the firm and its users.

Second, surveillance capitalism involves real-time monitoring of contractual perfor- mance along
with real-time, technology-enabled enforcement of the contract (Zuboff 2015). In a world where
such a system of contractual monitoring and enforcement is the norm, ‘habitats inside and outside the
human body are saturated with data and produce radically distributed opportunities for observation,
interpretation, communication, in- fluence, prediction and ultimately modification of the totality of
action’, establishing a new architecture from which there is no escape, making the Panopticon
seem prosaic. Where power was previously identified with ownership of means of production, it is
now constituted by ownership of means of behavioural modification (Zuboff 2015, 82). Third,
13 services
are personalised and customised, telling you what you want or need to know (‘even before you
know it yourself’). This feature produces substantial new asymmetries of knowledge and power
(Zuboff 2015, 83). Fourth, the technological infrastructure allows for and requires continual
experimentation and intervention into users’ lives. Since big data analysis yields only correlations,
continual experimentation should attempt to tease out causality. A textbook example is Facebook’s
experiment to secretly influence its users’ mood. Thus, ‘behaviour is subjugated to
commodification and monetisation’ (Zuboff 2015, 85), which is the dominating logic of twenty-
first- century market dynamics.

Zuboff would be first to admit that these contours of surveillance capitalism require further
theorisation and development. Nevertheless, what she tries to show is that surveillance as a key
part of the new logic of accumulation goes well-beyond privacy considerations. She tries to show
that it threatens democracy itself, because it does away with the political canon of the modern
liberal order, which was defined by the foundational principles of self-determination—in
individuals’ private life and social relations, politics and governance.

The Panopticism Theory by Michel Foucault 1975

Michel Foucault wrote about the theory of surveillance in his influential work “ Discipline and
Punish: The Birth of the Prison,” which was published in 1975. This book outlines his ideas on
disciplinary power and the role of surveillance in shaping social control and regulation. Foucault’s
theory of surveillance has since had a significant impact on critical studies of power, knowledge, and
social control.Michel Foucault’s theory of surveillance is based on the idea that power is not only
exercised through direct control and coercion, but also through constant observation and monitoring.
He argued that modern societies have developed sophisticated systems of surveillance, such as
institutions like schools, hospitals, prisons, and workplaces, which are designed to keep individuals
under constant watch and discipline.

Foucault identified two main types of surveillance: disciplinary and control.

Disciplinary surveillance involves the constant monitoring and regulation of individuals’ behavior,
shaping them into docile and obedient subjects. This is achieved through mechanisms of control such
as hierarchical observation, normalizing judgment, and examination.

Control surveillance, on the other hand, operates through the collection and organization of
information about individuals, allowing for the regulation and manipulation of their actions and
choices. Foucault argued that modern societies are characterized by a proliferation of surveillance

14
technologies and practices, such as data collection, biometric identification, and social media
monitoring, which enable the exercise of power through surveillance.

Foucault’s theory of surveillance has been influential in understanding the ways in which power
operates in contemporary societies. It has also provided a framework for analyzing the implications
of surveillance on individual autonomy, privacy, and resistance to dominant power structures.
According to Foucault, the Panopticon is not limited to physiscal structures like prisons. It can be
seen in various socail institutions and mechanisims, such as schools, hospotals, and even modern
forms of surveillance like CCTV cameras and online monitoring. The idea is that teh constant
possibility of being obsevered leads to self policing and disciplinary behavior.

The Orwellian Theory by George Orwell 1984

George Orwell, in his novel "1984," wrote about the concept of real-time surveillance in the form of
the "telescreens" installed in every home and public space, through which the government could
monitor and control the thoughts and actions of the citizens. Orwell's theory on real-time surveillance
was based on the idea that constant monitoring and observation of individuals by those in power
leads to a stifling of freedom and individual expression, as people become fearful of expressing
themselves or engaging in any form of dissent.

Orwell's theory also highlights the potential for abuse of power and the erosion of privacy that comes
with real-time surveillance. He warned about the dangers of a society in which the government or
other powerful entities have the ability to constantly monitor and control the thoughts and actions of
the people, leading to a state of constant fear, mistrust, and oppression.

In today's world, with the advancement of technology and the widespread use of surveillance
cameras, social media, and data collection, Orwell's theory on real-time surveillance remains highly
relevant. The novel "1984" serves as a cautionary tale about the potential consequences of unchecked
surveillance and the importance of protecting individual privacy and freedom in the face of such
threats.

2.4 Emperical Review

This section reviews the empirecal literature which consist of the works of other researchers related
to the topic under study. The review is done in relation to the objectives of the study.

Access possible intrusion areas

Sangeeta oswal and CV Ritu Ramesh carried a research work on –‘Real Time Surveillance System’.
The aim of this study is for surveillance in analysing and thud monitoring of remote ares 15
for safety
purpose is what real time video surveillance is all about One of the reasons for icreasing crime is thr
lack of security and various negligence that has results to such incident For example: suppose a
CCTV camera was setup in a jewellery sgop robbery takes place by the time it comes to the notice of
thr owner action taken against theft and collecting all evidence will be delayed Hence th reason for
such incident is the instability that are happening all around Therefore there is a need for smart
intelligence system for monitoring which captures the real time videos and transmit the videos
directly to your phone where you can easily monitor The researchers used the Quasi experimental
method to gain information for the systems results The result shows that after the the Real Time
Ssurveillance system is installed it will detects the instrusion and send notification to the authorized
person so that necessary action can be taken in respone to the instrusion and Moreover it will save
memory as well as memory wastage would be avoided

Design the GUI for user usage for real-time monitoring

Victor Quiros-Gonzalez, Paz Rodriquez-Perez, Ana M Haro-Perez, M Mar Jimenez-Rodriguez, Jose


Angel Maderuelo-Fernandez and Jose M Eiro carried a research work on Real-Time Surveillance
System; Applicability for the control of influenza in acute care. The objective of this study was to
determine the impact of the implemetation of a real time surveillance system similar to that used in
the monitoring of multidrug-resistant microorganism, on nosocominal transmission of influenza
viruses as evaluated by the nosocomial infection rate. To accomplish this objectives, the researchers
used a method of Quasi-experimental before and after the study comparing the influenza case
detected in hospitalized adults during the 2016\2017 season [264] with those detected atfer the
implementation of a real-time surveillance system in the 2017\2018 season [519 patients]. The
improvements included early microbiological diagnosis, periodic surveillance of rhe adequacy of
preventive measures and constant updating of patient information. The collected data were entered to
the computer through the Statistical Package for Social Science [SPSS]. The result shows that after
the implementation of the real time influenza surveillance system, nosocomial virus transmission was
reduced significantly by 7.8, from 17.0 in S1617 to 9.2 in S1718.

Simulate a real-time surveillance system

This thesis introduces cloud based visual surveillance system related to VSaaS. Cloud computing is
an enhanced technology to run a business. Applications are runing on a multi-agent cloud system
instead of on a LAN or PC. Cloud computing is set as shared commodities that are scalable whose
computing resources are scattered all over the world and available on a network when needed
(Begum & Khan, 2011). VSaaS is a web hosted wireless security system that allows the users to
remotely storage, manage, record, play and monitor surveillance videos, all these are possible on the
cloud platform.
16
Secondly, this thesis presents a whole framework for cloud based visual surveillance system
(web and database). The overall objective of this thesis is to develop a cloud based system
which is to implement key four functions, (a) video streaming input, (b) intelligent visual
surveillance (IVS), (c) video transcoding and storage in real time, (d) message push
notification and streaming media output. Figure 1.1 shows the whole structure of cloud based
intelligent surveillance system.

17
We use Boehm’s spiral methodology to implement the development process. This model is suitable for our
project since it allows flexibility and does not require us to define the entire system from the beginning,
because we do not have previous iterations to get a part of the development process, this model relies on
prototyping and client interactions. Our current system has been developed through cycles of this model
(Boehm & Hansen, 2000).

software Requirement

In the development and conception of this system, some software tools are put into use. The tools include database
systems, programming language, servers, and operting systems.

i. MySQL; It an open source server-based rational DBMS suitable for building both desktop and web-based
databased. It Source and available; it is suitable for web applications and it can automatically generate PHP codes
for its SQL. It is easy to connect to web pages.
ii. PHP; PHP standards for Hyperyext Processor. It is an opensource server-based programming langauge which can
design very dynamic web pages and interacts with the MySQL database from the backend. PHP can access
MySQL database from backstage. It requires no compilation [rather interpreted]. It is flexible within other codes
like HTML and JavaScript.
iii. JavaScript; A dynamic programming language used as part of web browsers, whose implementation allow
client-side scripts to interact with the user, control the brower, communicate asynchronously, and alter the
document content that is displayed. It is suitable for developing a
iv. n interactive and-friendly interface. It is flexxible within other codes like HTML and PHP.
v. Hypertext Markup Language [HTML]. Used to create web pages. HTML allows images and objects to be
embedded and can be used to create interactive forms. It provides a means to create as headings, paragraphs, lists,
links, qoutes, and other iterms. It allowns other codes like PHP and JavaScriot codes to be embedded within its
codes.
vi. Cascading Stlye Sheet [CSS]. Cascading Style Sheet id used to look and layput of text and other materials within
HTML Code. It is easy to link with web pages .
vii. Server; A server is a software package which can provide local hosting of a web application. The ideal servers
include LAMP [Linux, Apachce, MySQL, and Perl\PHP\Python] or WAMP [Windows, Apache, MySQL,
Perl/PHP/Python] which are open source servers. It provides software such as MySQL. PHP, and Apache in one
packahe and it host the application locally.
viii. Network Operating System [NOS] Network Operating System, minimum Windows XP, Linus etc. Allows the
application to run on network.
ix. NetBeans. It is a free intergrated Development Enviroment which will be used to code and edit the different pages
of the application. It would also provide a framework for modelling the sysytem.
21

You might also like