SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Electronic
Gauri Phadtare,
Bharti Vidyapeeth's Institute of Management and
ABSTRACT
There have been research on the CCTV (closed circuit
television) for safety purpose as an investigative tool.
Using CCTV was associated with very significantly
increased chance of crime have been solved for all
crime types. Evidences like images are most likely
used to catch the person who did the crime, the
usefulness of CCTV is limited by several factors
,mostly the public areas are not covered .This research
paper is on all about how CCTV has been useful for
humans for secure and safety purpose. Electronic
Surveillance features of society globally , this paper
also focus on healthcare context. This paper is based
on what I have researched while searching topic on
Electronics Surveillance.
Keywords: Surveillance Studies, Electronics,
Information Technology, Surveillance.
I. INTRODUCTION
These system consist of cameras with monitors and
video recorders. The cameras may be fixed range or
less pixel of quality. But nowadays
been developing quality like now they have pan, tilt,
zoom which can use as per need of persons. Image
and video captured and stored and also retrieved
anytime in future. The quality of the equipment used
is a chief determinant of outcomes. The positioning is
also important for maximum security for covering
large area and comes under safety. All these factors
need to be taken care while installing the CCTV
surveillance system at that particular place.[1]
If you want to keep your home safe, electronic
surveillance can monitor what is happening in your
home even while you are away. The same applies to a
place of business. A combination of video and audio
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Electronic Surveillance
Gauri Phadtare, Anushree Goud
Bharti Vidyapeeth's Institute of Management and Information Technology
Mumbai, Maharashtra, India
on the CCTV (closed circuit
as an investigative tool.
was associated with very significantly
increased chance of crime have been solved for all
crime types. Evidences like images are most likely
who did the crime, the
usefulness of CCTV is limited by several factors
c areas are not covered .This research
been useful for
humans for secure and safety purpose. Electronic
Surveillance features of society globally , this paper
also focus on healthcare context. This paper is based
I have researched while searching topic on
Surveillance Studies, Electronics,
consist of cameras with monitors and
video recorders. The cameras may be fixed range or
cameras have
been developing quality like now they have pan, tilt,
zoom which can use as per need of persons. Image
captured and stored and also retrieved
anytime in future. The quality of the equipment used
The positioning is
also important for maximum security for covering
large area and comes under safety. All these factors
care while installing the CCTV
surveillance system at that particular place.[1]
If you want to keep your home safe, electronic
surveillance can monitor what is happening in your
home even while you are away. The same applies to a
s. A combination of video and audio
surveillance gives you the most complete picture of
what is happening at a specific place and time
a way to oversee behavior, activity, and information
for the purpose of protecti
influencing a certain location.
Surveillance is used by governments for intelligence
gathering, prevention of crime, the protection of a
process, person, group or object, or the investigation
of crime. It is also used by criminal organizat
plan and commit crimes, such as robbery and
kidnapping, by businesses to gather intelligence.
A criminal investigation can be think as serious
question like; what happen exactly behind them and
who was involved in the crime, where did it happen,
when did it took place ,and anyone get harmed or not.
It plays the important role to catch any incident
happen in absence of that person.[1][2]
While researching on this topic “Electronic
Surveillance” I got to known that surveillance is not
limited to watch over on any one or any place under
surveillance of cameras but it is also the meaning
any observant that if any thing related to health can be
detected by perfect observation on that particular
place or area.
There are some example on it one of them
below:
EXAMPLE:
Every one know that electronic surveillance may use
as technology to gather data the purposes of that
surveillance, but here case is different; Internet search
engines are mostly used for searching some sort of
related data, like if somebody had any type of illness
Jun 2018 Page: 1623
www.ijtsrd.com | Volume - 2 | Issue – 4
Scientific
(IJTSRD)
International Open Access Journal
Information Technology (BVMIT)
surveillance gives you the most complete picture of
what is happening at a specific place and time.[2] It is
a way to oversee behavior, activity, and information
for the purpose of protecting, managing, or
is used by governments for intelligence
gathering, prevention of crime, the protection of a
process, person, group or object, or the investigation
of crime. It is also used by criminal organizations to
plan and commit crimes, such as robbery and
kidnapping, by businesses to gather intelligence.
criminal investigation can be think as serious
question like; what happen exactly behind them and
who was involved in the crime, where did it happen,
en did it took place ,and anyone get harmed or not.
It plays the important role to catch any incident
son.[1][2]
While researching on this topic “Electronic
Surveillance” I got to known that surveillance is not
over on any one or any place under
surveillance of cameras but it is also the meaning that
thing related to health can be
detected by perfect observation on that particular
There are some example on it one of them are listed
Every one know that electronic surveillance may use
as technology to gather data the purposes of that
surveillance, but here case is different; Internet search
engines are mostly used for searching some sort of
if somebody had any type of illness
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 1624
rather to go doctor they first search on GOOGLE for
the remedy so they can use and have some temporary
relief on that illness.[3]
When some people gets the symptoms of illness the
first thing they do is search the remedy on GOOGLE.
[3]GOOGLE has masses of up to date data of their
visitors. The medication and information for specific
illness searching, by analyzing the terms that person
use for relevant specific symptoms, like some
particular area at particular time then it can find that
some sort of illness in that area and by tracking their
performance healthcare can be provided before any
thing serious can happen.
Such kind of partice can use for tracking dengue, HIV
or some kind of major illness spreading in that area.
The advantage of this type is that it allows for rapid
detection and prediction of illness in area so
precaution can be provided at that time
II Scope
The main objective of this document is to make
people aware that what is the technique they are using
and what are methods which are behind to the logic
and what does make CCTV help in the real life. These
Consist of great technology along with the some
algorithms which make it so very much useful in the
market and also very demanding these days.
Many times the cameras are assumed to do job of
everything that can be recorded and particular
incidents can be viewed based on the offences that
just happened when that person is not around in area.
If person wants to see what happens behind him/her
on that particular location then he/she can put the
CCTV and for some time they can rely on the CCTV
and then after they can retrieved the images or videos
of what happen in absences.[1][3]
III Literature Survey
The survey has been seen that some time CCTV
cannot be so helpful as people think, it can be used as
the purpose to keep watch on particular person at any
time and from any where.
The problem like;
Any person can keep camera or any video device just
to watch that person to what doing or what activity
they do at their place.
Cyber crime any video device including CCTV can be
hack or can be destroyed by using some device which
can stop that recording or make some disturbance
while recording the any particular incident.[4]
Some kind of people can use such device just to earn
some money by using their personal video and by
blackmailing them.
As per the device is used their maintains cost also
increases, some people can’t afford such highly
technique device and adjust on affordable device and
then device cant capture properly image or images can
get blur while zoom in.
Such problems can arises while we uses the CCTV.
IV Existing system
The system nowadays are used in places are highly
developed and used for avoiding or catching the
anyone who does some action on their absence. Now
the system have moving face monitor like in front of
them person moves from left to right them monitor or
camera also move with them, so camera moves so the
range also gets wider and camera can see a lot more
than still cameras.
They have zoom in movement also where it can zoom
in at that particular place and capture the image ,lot of
high techniques are develop in this field.
Existing system can save the place from crime and
lots of incident can be avoided if many of public or
private place have CCTV at their place.
It can be better proof for investigation purpose, and
using better quality of device can give lots of benefits
for safety.[3][4]
V Working
The working of CCTV is very simple but in care-full
way[4];
1.First think or search such a place from where large
area can get under the eye of camera and then set the
CCTV over there, stores them in the data.
2. Second think see how much the camera can catch
the range and quality of camera so after the incident
or ant thing happened that time image and video can
be see clearly.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 1625
3. Keep the CCTV for safety purpose only not for any
illegal reason.
4. Keep CCTV always on and recording mode cause
some people think just keeping CCTV on standby
mode criminal can get scare and they can’t do
anything, but some people can be smart also.
5. Major think keep CCTV camera in such a place so
no one can catch the CCTV and you can catch them
easily.
VI Conclusion
In conclusion most of public places or private places
must have CCTV for there safety perspective. They
must have security if their local areas are not good, so
to avoid the crimes like kidnapping, robbery, murders,
etc can reduce at least ground level.
VII Reference
1. The Effect Of CCTV on Public safety:
Research roundup.
2. The Role of CCTV Surveillance Systems in
Reducing Crime in Town Centers.
3. https://research-
paper.essayempire.com/examples/argumentati
ve/electronic-surveillance-research-paper/
4. The Value of CCTV Surveillance Cameras as
an Investigative Tool: An Empirical Analysis.

Weitere ähnliche Inhalte

Was ist angesagt?

SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET Journal
 
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...IRJET Journal
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionTech and Law Center
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET Journal
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...IJECEIAES
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationIRJET Journal
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...IJNSA Journal
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safetyiosrjce
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense TechnologyIRJET Journal
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesProofpoint
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorKhalizan Halid
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 

Was ist angesagt? (18)

SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
IRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women SafetyIRJET- IoT based Smart Foot Device for Women Safety
IRJET- IoT based Smart Foot Device for Women Safety
 
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...IRJET-  	  A Study on Improving the Effectiveness of Medical Emergency Servic...
IRJET- A Study on Improving the Effectiveness of Medical Emergency Servic...
 
SECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English versionSECURITY OF THE DIGITAL NATIVES - English version
SECURITY OF THE DIGITAL NATIVES - English version
 
IRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual DeviceIRJET- Modern Era and Security of Women: An Intellectual Device
IRJET- Modern Era and Security of Women: An Intellectual Device
 
GUL Network Infrastructure
GUL Network InfrastructureGUL Network Infrastructure
GUL Network Infrastructure
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...Conference Paper at International Conference on Enterprise Information System...
Conference Paper at International Conference on Enterprise Information System...
 
Developing technology
Developing technologyDeveloping technology
Developing technology
 
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
A STUDY ON LEA AND SEED ALGORITHMS FOR DATA PROTECTION OF SMARTPHONE BASED DI...
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Application for Women Safety
Application for Women SafetyApplication for Women Safety
Application for Women Safety
 
Sixth Sense Technology
Sixth Sense TechnologySixth Sense Technology
Sixth Sense Technology
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
Cybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditorCybersecurity environment in malaysia and the function of internal auditor
Cybersecurity environment in malaysia and the function of internal auditor
 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 

Ähnlich wie Electronic Surveillance

Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bagsijtsrd
 
Public Health Surveillance Systems
Public Health Surveillance SystemsPublic Health Surveillance Systems
Public Health Surveillance SystemsRochelle Schear
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Ann Johnson
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA EssayWinstina Kennedy
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1ehab_madda
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bagsijtsrd
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensicsijcsa
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...IRJET Journal
 
AI/ ML solutions to tackle COVID-19
AI/ ML solutions to tackle COVID-19AI/ ML solutions to tackle COVID-19
AI/ ML solutions to tackle COVID-19Vivek Raja P S
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET Journal
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxitzmerhuzieeee
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONIRJET Journal
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docxhyacinthshackley2629
 

Ähnlich wie Electronic Surveillance (20)

Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
Public Health Surveillance Systems
Public Health Surveillance SystemsPublic Health Surveillance Systems
Public Health Surveillance Systems
 
Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...Surveillance Systems And Studies That Should Be...
Surveillance Systems And Studies That Should Be...
 
Presentation eco.pptx
Presentation eco.pptxPresentation eco.pptx
Presentation eco.pptx
 
Public Surveillance In The USA Essay
Public Surveillance In The USA EssayPublic Surveillance In The USA Essay
Public Surveillance In The USA Essay
 
Biometric and cyber security 1
Biometric and cyber security 1Biometric and cyber security 1
Biometric and cyber security 1
 
Biometric Security Bags
Biometric Security BagsBiometric Security Bags
Biometric Security Bags
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
An insight view of digital forensics
An insight view of digital forensicsAn insight view of digital forensics
An insight view of digital forensics
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
Bibliometric Analysis on Computer Vision based Anomaly Detection using Deep L...
 
AI/ ML solutions to tackle COVID-19
AI/ ML solutions to tackle COVID-19AI/ ML solutions to tackle COVID-19
AI/ ML solutions to tackle COVID-19
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
Surveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptxSurveillance-undercover-and-operationNaing_104858.pptx
Surveillance-undercover-and-operationNaing_104858.pptx
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTION
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Kürzlich hochgeladen (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

Electronic Surveillance

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research Electronic Gauri Phadtare, Bharti Vidyapeeth's Institute of Management and ABSTRACT There have been research on the CCTV (closed circuit television) for safety purpose as an investigative tool. Using CCTV was associated with very significantly increased chance of crime have been solved for all crime types. Evidences like images are most likely used to catch the person who did the crime, the usefulness of CCTV is limited by several factors ,mostly the public areas are not covered .This research paper is on all about how CCTV has been useful for humans for secure and safety purpose. Electronic Surveillance features of society globally , this paper also focus on healthcare context. This paper is based on what I have researched while searching topic on Electronics Surveillance. Keywords: Surveillance Studies, Electronics, Information Technology, Surveillance. I. INTRODUCTION These system consist of cameras with monitors and video recorders. The cameras may be fixed range or less pixel of quality. But nowadays been developing quality like now they have pan, tilt, zoom which can use as per need of persons. Image and video captured and stored and also retrieved anytime in future. The quality of the equipment used is a chief determinant of outcomes. The positioning is also important for maximum security for covering large area and comes under safety. All these factors need to be taken care while installing the CCTV surveillance system at that particular place.[1] If you want to keep your home safe, electronic surveillance can monitor what is happening in your home even while you are away. The same applies to a place of business. A combination of video and audio @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Electronic Surveillance Gauri Phadtare, Anushree Goud Bharti Vidyapeeth's Institute of Management and Information Technology Mumbai, Maharashtra, India on the CCTV (closed circuit as an investigative tool. was associated with very significantly increased chance of crime have been solved for all crime types. Evidences like images are most likely who did the crime, the usefulness of CCTV is limited by several factors c areas are not covered .This research been useful for humans for secure and safety purpose. Electronic Surveillance features of society globally , this paper also focus on healthcare context. This paper is based I have researched while searching topic on Surveillance Studies, Electronics, consist of cameras with monitors and video recorders. The cameras may be fixed range or cameras have been developing quality like now they have pan, tilt, zoom which can use as per need of persons. Image captured and stored and also retrieved anytime in future. The quality of the equipment used The positioning is also important for maximum security for covering large area and comes under safety. All these factors care while installing the CCTV surveillance system at that particular place.[1] If you want to keep your home safe, electronic surveillance can monitor what is happening in your home even while you are away. The same applies to a s. A combination of video and audio surveillance gives you the most complete picture of what is happening at a specific place and time a way to oversee behavior, activity, and information for the purpose of protecti influencing a certain location. Surveillance is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizat plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence. A criminal investigation can be think as serious question like; what happen exactly behind them and who was involved in the crime, where did it happen, when did it took place ,and anyone get harmed or not. It plays the important role to catch any incident happen in absence of that person.[1][2] While researching on this topic “Electronic Surveillance” I got to known that surveillance is not limited to watch over on any one or any place under surveillance of cameras but it is also the meaning any observant that if any thing related to health can be detected by perfect observation on that particular place or area. There are some example on it one of them below: EXAMPLE: Every one know that electronic surveillance may use as technology to gather data the purposes of that surveillance, but here case is different; Internet search engines are mostly used for searching some sort of related data, like if somebody had any type of illness Jun 2018 Page: 1623 www.ijtsrd.com | Volume - 2 | Issue – 4 Scientific (IJTSRD) International Open Access Journal Information Technology (BVMIT) surveillance gives you the most complete picture of what is happening at a specific place and time.[2] It is a way to oversee behavior, activity, and information for the purpose of protecting, managing, or is used by governments for intelligence gathering, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, such as robbery and kidnapping, by businesses to gather intelligence. criminal investigation can be think as serious question like; what happen exactly behind them and who was involved in the crime, where did it happen, en did it took place ,and anyone get harmed or not. It plays the important role to catch any incident son.[1][2] While researching on this topic “Electronic Surveillance” I got to known that surveillance is not over on any one or any place under surveillance of cameras but it is also the meaning that thing related to health can be detected by perfect observation on that particular There are some example on it one of them are listed Every one know that electronic surveillance may use as technology to gather data the purposes of that surveillance, but here case is different; Internet search engines are mostly used for searching some sort of if somebody had any type of illness
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 1624 rather to go doctor they first search on GOOGLE for the remedy so they can use and have some temporary relief on that illness.[3] When some people gets the symptoms of illness the first thing they do is search the remedy on GOOGLE. [3]GOOGLE has masses of up to date data of their visitors. The medication and information for specific illness searching, by analyzing the terms that person use for relevant specific symptoms, like some particular area at particular time then it can find that some sort of illness in that area and by tracking their performance healthcare can be provided before any thing serious can happen. Such kind of partice can use for tracking dengue, HIV or some kind of major illness spreading in that area. The advantage of this type is that it allows for rapid detection and prediction of illness in area so precaution can be provided at that time II Scope The main objective of this document is to make people aware that what is the technique they are using and what are methods which are behind to the logic and what does make CCTV help in the real life. These Consist of great technology along with the some algorithms which make it so very much useful in the market and also very demanding these days. Many times the cameras are assumed to do job of everything that can be recorded and particular incidents can be viewed based on the offences that just happened when that person is not around in area. If person wants to see what happens behind him/her on that particular location then he/she can put the CCTV and for some time they can rely on the CCTV and then after they can retrieved the images or videos of what happen in absences.[1][3] III Literature Survey The survey has been seen that some time CCTV cannot be so helpful as people think, it can be used as the purpose to keep watch on particular person at any time and from any where. The problem like; Any person can keep camera or any video device just to watch that person to what doing or what activity they do at their place. Cyber crime any video device including CCTV can be hack or can be destroyed by using some device which can stop that recording or make some disturbance while recording the any particular incident.[4] Some kind of people can use such device just to earn some money by using their personal video and by blackmailing them. As per the device is used their maintains cost also increases, some people can’t afford such highly technique device and adjust on affordable device and then device cant capture properly image or images can get blur while zoom in. Such problems can arises while we uses the CCTV. IV Existing system The system nowadays are used in places are highly developed and used for avoiding or catching the anyone who does some action on their absence. Now the system have moving face monitor like in front of them person moves from left to right them monitor or camera also move with them, so camera moves so the range also gets wider and camera can see a lot more than still cameras. They have zoom in movement also where it can zoom in at that particular place and capture the image ,lot of high techniques are develop in this field. Existing system can save the place from crime and lots of incident can be avoided if many of public or private place have CCTV at their place. It can be better proof for investigation purpose, and using better quality of device can give lots of benefits for safety.[3][4] V Working The working of CCTV is very simple but in care-full way[4]; 1.First think or search such a place from where large area can get under the eye of camera and then set the CCTV over there, stores them in the data. 2. Second think see how much the camera can catch the range and quality of camera so after the incident or ant thing happened that time image and video can be see clearly.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 1625 3. Keep the CCTV for safety purpose only not for any illegal reason. 4. Keep CCTV always on and recording mode cause some people think just keeping CCTV on standby mode criminal can get scare and they can’t do anything, but some people can be smart also. 5. Major think keep CCTV camera in such a place so no one can catch the CCTV and you can catch them easily. VI Conclusion In conclusion most of public places or private places must have CCTV for there safety perspective. They must have security if their local areas are not good, so to avoid the crimes like kidnapping, robbery, murders, etc can reduce at least ground level. VII Reference 1. The Effect Of CCTV on Public safety: Research roundup. 2. The Role of CCTV Surveillance Systems in Reducing Crime in Town Centers. 3. https://research- paper.essayempire.com/examples/argumentati ve/electronic-surveillance-research-paper/ 4. The Value of CCTV Surveillance Cameras as an Investigative Tool: An Empirical Analysis.