KEMBAR78
Bisola Chapter 1 To 5 Project Correction | PDF | Security | Computer Security
0% found this document useful (0 votes)
15 views38 pages

Bisola Chapter 1 To 5 Project Correction

The document discusses the need for advanced multichannel video surveillance systems in large environments due to the limitations of traditional single-channel systems. It outlines the design and implementation of a tailored multichannel surveillance system for the Computer Engineering Laboratory, emphasizing real-time monitoring, enhanced situational awareness, and proactive security measures. The study highlights the significance of integrating advanced technologies such as machine learning and high-resolution cameras to improve security effectiveness and response times.

Uploaded by

ODEWAYE MAYOMI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views38 pages

Bisola Chapter 1 To 5 Project Correction

The document discusses the need for advanced multichannel video surveillance systems in large environments due to the limitations of traditional single-channel systems. It outlines the design and implementation of a tailored multichannel surveillance system for the Computer Engineering Laboratory, emphasizing real-time monitoring, enhanced situational awareness, and proactive security measures. The study highlights the significance of integrating advanced technologies such as machine learning and high-resolution cameras to improve security effectiveness and response times.

Uploaded by

ODEWAYE MAYOMI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 38

CHAPTER ONE

1.0 INTRODUCTION

In recent years, the need for advanced video surveillance systems has become more critical,

particularly in large-scale environments like campuses, industrial sites, and public spaces.

Traditional single-channel video surveillance systems, which focus on monitoring one camera

feed at a time, are insufficient in such settings due to their limited coverage and inability to

provide a comprehensive view of various areas simultaneously. This limitation often results in

delayed incident detection, reduced situational awareness, and a slower response to potential

threats. As security threats grow in complexity, so does the demand for more robust, scalable,

and efficient surveillance systems that can monitor multiple locations in real time.

The design and implementation of multichannel video surveillance systems aim to address this

problem by enabling the simultaneous monitoring of video feeds from multiple cameras. Such

systems allow security personnel to track several areas in real-time, significantly improving

incident detection and response times. The integration of multiple video channels into a single

interface provides an efficient way for security officers to gain a holistic view of the

environment, which is crucial for enhancing security in sensitive areas such as educational

institutions, hospitals, or research facilities (Jones & Li, 2020).

As technology continues to evolve, advancements in video processing, network infrastructure,

and machine learning algorithms have contributed to the development of more powerful

multichannel systems. Modern video surveillance solutions now incorporate features like motion

detection, facial recognition, and real-time alert systems, making them proactive rather than

reactive in preventing security breaches. Furthermore, the increasing availability of high-

1
resolution cameras, such as 4K, enhances the clarity and accuracy of the monitoring process,

offering even greater levels of detail in recorded footage (Markovic et al., 2016).

In the context of the Computer Engineering Laboratory, where various activities are constantly

occurring across different zones, traditional single-camera systems are inadequate. This research

focuses on the design and implementation of a multichannel video surveillance and monitoring

system tailored to the specific needs of the laboratory environment. By providing

comprehensive, real-time video feeds from multiple cameras, this system aims to enhance

security measures, improve situational awareness, and ensure the safety of both personnel and

equipment.

1.1 Background of the Study

The importance of video surveillance has grown significantly in recent years due to rising

concerns over security and the protection of assets. Video surveillance systems have become

integral in monitoring public spaces, critical infrastructure, and private establishments to enhance

security, deter criminal activity, and improve response times in case of emergencies (Smith,

2021; Johnson, 2019). Traditional single-channel surveillance systems, however, are limited in

scope as they can only monitor one camera feed at a time, making them unsuitable for large or

complex environments where multiple viewpoints are necessary (Adams et al., 2018).

The advancement in digital technology and video processing has led to the development of

multichannel video surveillance systems, which are designed to monitor multiple camera feeds

simultaneously. These systems are particularly effective in environments such as shopping malls,

transportation hubs, and educational institutions, where comprehensive, real-time surveillance is

2
essential (Jones & Li, 2020; Carter et al., 2019). Multichannel systems offer several advantages,

including increased coverage, real-time monitoring capabilities, and the integration of video

feeds into a single interface. This consolidation enables security personnel to observe different

locations concurrently and make quicker decisions in response to potential security breaches

(Ahmed et al., 2019; Williams, 2020).

Moreover, advancements in data compression, video analytics, and network bandwidth have

enhanced the functionality and affordability of multichannel systems. Research has shown that

features like motion detection, facial recognition, and automated alerts can significantly improve

the effectiveness of surveillance systems, shifting the focus from reactive to proactive security

measures (Lee et al., 2021; Chandra et al., 2020). The integration of machine learning and

artificial intelligence in video analysis has further enabled automated detection of unusual

activities, enhancing situational awareness and reducing the need for constant human monitoring

(Patel & Ramesh, 2022; Zhao & Wang, 2021).

The development of this project is motivated by these technological advancements and the

increasing demand for scalable, multichannel systems that provide comprehensive coverage in a

cost-effective manner. Implementing such a system aligns with modern security frameworks, as

it facilitates real-time, high-resolution monitoring across various channels, which is critical in

both public and private sectors (Garcia & Singh, 2023; Thompson, 2022).

1.2 Statement of the problem

Existing video surveillance systems often lack the ability to monitor multiple areas concurrently,

resulting in security gaps, especially in large and complex environments. This limitation hinders

3
the effectiveness of traditional surveillance systems, causing inadequate situational awareness,

delayed incident response times, and an overall reactive approach to security management.

In environments such as the Computer Engineering Laboratory, where various activities occur

across different zones, the lack of a unified monitoring system increases the risk of missed

security events. Consequently, the security personnel are unable to oversee all critical areas

simultaneously, leading to potential security breaches or mishandling of incidents.

The primary objective of this research is to address these challenges by designing and

implementing a multichannel video surveillance and monitoring system. This system will enable

real-time monitoring of multiple locations within the laboratory, significantly improving

situational awareness. By incorporating advanced analytics and automated alerts, the system will

facilitate quicker response times and offer a proactive approach to security, thus enhancing

overall safety and efficiency.

1.3 Significance of the study

The implementation of a multichannel video surveillance system significantly increases security

levels by providing real-time monitoring capabilities. This system allows for continuous

observation of multiple locations, enabling swift responses to potential threats or incidents.

By integrating advanced video management software, organizations can streamline their security

operations. By facilitating remote monitoring and automate civilian task.

1.4. Scope of the Study

4
The scope of this study encompasses the design, development, and testing of a multichannel

video surveillance and monitoring system. The aim is to implement a system capable of

capturing, recording, and displaying video feeds from multiple cameras simultaneously, with the

goal of enhancing security and monitoring efficiency.

The scope of this study encompasses the design, development, and testing of a multichannel

video surveillance and monitoring system, implemented within the Computer Engineering

Laboratory. The primary goal is to create a system capable of capturing, recording, and

displaying video feeds from multiple cameras simultaneously to enhance security and monitoring

efficiency.

The system utilizes high-definition IP cameras, each with a resolution of 1080p, providing clear

and detailed video feeds. The cameras are strategically positioned to cover distances of up to 30

meters within the laboratory, ensuring comprehensive monitoring of all critical areas.

Key features of the system include:

1. Multichannel Support: The system supports simultaneous video feeds from up to four

cameras, allowing for efficient surveillance of multiple zones within the laboratory.

2. Real-Time Monitoring and Recording: The video feeds are displayed live on a central

monitor and stored on a dedicated server for future review.

3. User Interface: A user-friendly interface enables operators to switch between camera

views, zoom in on specific areas, and review recorded footage efficiently.

4. Scalability: The system is designed to accommodate additional cameras if the need

arises, making it adaptable for future expansions.

5
This study is confined to the Computer Engineering Laboratory, focusing on ensuring optimal

coverage and system performance within the specified environment. The findings and results

from this implementation can serve as a blueprint for deploying similar systems in other

educational or professional settings.

6
CHAPTER TWO

2.0 LITERATURE REVIEW

The processes required to create a video surveillance system are outlined in this document. A

thorough virtual design, the philosophy of video surveillance types and components, and the

selection of the best equipment are all covered. Introduction In the introduction following the

introduction to video surveillance systems, a thorough examination of design concerns and

design verification is presented. A bank floor is intended to be monitored by the system, which

shows the intended output from a simulated system implementation (Abdulhamid & Murungi,

2019).

Each channel video could be shown steadily in 4K format, and the multi-channel independent

video could be processed simultaneously to guarantee real-time display. Furthermore, the input,

video reconstruction, and output processes are all managed by the Xilinx Spartan-6 FPGA

module, which serves as the main hardware. To guarantee the effective cache of video data and

the integrity of video signals, high-frequency printed circuit boards (PCBs) with ten-layer

architectures, high-speed memory chips, and double data rate type three synchronous dynamic

random-access memory (DDR3-SDRAM) are utilised. This FPGA-based real-time UHD

solution can be utilised for office meetings, video surveillance, and other purposes in addition to

contemporary surgery, patient monitoring, and diagnostics (Guo et al., 2017).

Zhang, T., Chowdhery, A., Bahl, P. (victor), Jamieson, K., & Banerjee, S. The design and

implementation of a wireless video surveillance system. This paper introduces Vigil, a real-time,

distributed wireless surveillance system that uses edge computing to enhance tracking and

7
monitoring in enterprise campuses, retail spaces, and smart cities. Vigil optimises video

processing by dividing tasks between edge nodes located near cameras and the cloud, reducing

the load on wireless networks and allowing more capacity for Wi-Fi hotspots, which helps lower

operational costs. Advanced algorithms for video frame prioritisation and traffic scheduling

further improve Vigil’s bandwidth efficiency. Deployed across three locations using both

whitespace and Wi-Fi networks, Vigil demonstrates significant performance advantages.

Experimental results reveal that, depending on scene activity, Vigil enables surveillance

coverage of areas five to 200 times larger than traditional wireless video streaming methods. For

a fixed coverage area and bandwidth, Vigil also surpasses Wi-Fi’s standard equal throughput

approach, delivering up to 25% more objects relevant to user queries.(Zhang et al., 2015)

Ghosh, S. R., Pemmaiah, A. B., Bharti, S., Gopika, D., & Joshy, N. Intelligent automated

monitoring system using video surveillance based recognition. Video surveillance is essential for

security monitoring in banks, stores, highways, and crowded areas. With advancing technology

and rising demand, surveillance has become a key research area, particularly focusing on

maximising technology use. Deep learning has brought object detection to the forefront, as it

enables systems to learn and identify features more effectively than traditional methods. This

proposed system uses CCTV cameras and a deep learning-based automated monitoring platform

to reduce human intervention. Leveraging CNN models for real-time object detection, it aims to

automate tasks like door or gate opening when a recognised object is detected, enhancing

security and efficiency (Ghosh et al., 2022).

8
Xu, W., & Zhai, Y. Design and implementation of home video surveillance systems based on

IoT location service. Advances in computer technology, internet, video processing, and wireless

networks like 5G and WiFi have expanded wireless coverage and revolutionized data

transmission and processing. Video surveillance has evolved from wired systems to mobile,

wireless-based monitoring. This paper focuses on designing a home video monitoring system

that uses IoT location services. By integrating traditional network video surveillance with smart

mobile devices, the system allows users to monitor home conditions anytime, anywhere.

Additionally, it compares this IoT-based system to traditional internet surveillance, analyzing

sensitivity, accuracy, capture intervals, and energy consumption to assess performance

improvements (Xu & Zhai, 2023).

Wang, J., Yan, W. Q., Kankanhalli, M. S., Jain, R., & Reinders, M. J. (2003). Adaptive

monitoring for video surveillance. An adaptive surveillance system that modifies camera settings

in response to feedback from experiential sampling of video footage is presented in this research.

A proportional feedback control method is used to analyse and modify the camera settings after

moving objects are first identified in the video. With the use of this adaptive technique, a fixed

camera can dynamically panning, zooming, and framing the target object to maximise video

quality. In order to record moving objects, the system employs experiential sampling, which

takes into account both previous experiences and the current environmental conditions. By

continuously adjusting to shifting surveillance requirements, this approach improves adaptability

and is appropriate for a variety of monitoring scenarios (Wang et al., 2003)

9
CHAPTER THREE

3.0 METHODOLGY

Power Source

TV Screen

Power
Supply

Video/HDMI cable

DVR

Plate 1: Operational diagram of Multichannel Video Surveillance and Monitoring

System

3.1 DESIGN ANALYSIS


10
Computer Lab security cameras need to be tailored for appropriate integration in a manner the

ensures safety, performance, and equity concerns. A Conversation will never happen without

audio recording also built in for conversations or sounds that could lead to an event. This

includes choosing the necessary equipment, the installation of the camera and integration into the

installed system.

3.1.1 CAMERA AND AUDIO EQUIPMENT SELECTION

Selection of certain equipment is necessary for a quality survey as well as quality and analysis.

Audio cameras, which combine video and audio, making installation easy, and cost-efficient on

the network compared to standalone audio equipment, is perfect for this type of installation. In

security or law enforcement situations where analysis of footage is required, the camera offers

HD video along with high-quality audio to record precise audio and video details.

It is also crucial to have a good quality microphone. Since in most jobs, computer systems tend

to get noisy, a noise-canceling microphone can help reduce background noise and provide focus

on distracting sounds like conversations or a special audio event. Microphones can be directly

placed on the most frequently used areas or mics can also be built where audio quality is assured

through a channel camera.

3.1.2 PLACEMENT OF AUDIO-ENABLED CAMERAS

The location of the audio camera needs to be in a point where balance in between privacy and

security is maintained. Placement of cameras and microphones should look at vehicles of bulk,

11
high risk areas (i.e. entry and exit points) and valuable assets. This need for caution also applies

to the installation of video cameras, especially in the context of interpersonal relations. Cameras

should be installed in a way that crucial security aspects can be captured while not violating the

privacy of the user.

Plate 2: Placement of audio-enabled cameras

3.1.3 NETWORK, STORAGE, AND AUDIO DATA MANAGEMENT

Storage and Network capacity are also factors. The integration of the monitoring system with the

present laboratory is crucial for the storage of data as well as real time monitoring. Real time

data can be processed continuously without affecting the network performance if the data is

stored on a centrally located server and has sufficient storage capacity.

12
Plate 3: Hard Disk Drive (HDD) Plate 4: Router for Network

3.1.4 USER ACCESS AND CONTROL

Preserving surveillance video means taking absolute care of user access and control. Security

credential, log access, and limit the role of the users are the best thing to prevent unauthorized

access.

3.1.5 MAINTENANCE AND TECHNICAL SUPPORT

Services and services are structured in a way so that there are no service issues and are resolved

in time. There are plans for maintenance plans, daily software updates and support to keep the

system running properly. This evaluation design is to create a fair, secure, and ethical evaluation.

Moreover, the laboratory should become safer, as well as encourage responsible use and ensure

client privacy. Sound monitoring systems are very much supported and maintained daily. To

make sure the op does safely, recording integrity, storage, and sound quality must be checked

often to prevent the problem caused by operation.

3.2 SELECTION OF MATERIALS

Material selection for the camera surveillance and audio recording system for a computer lab

must account for conditions of the environment, ease of maintenance, compatibility with existing

hardware, as well as financial constraints to achieve reliability, durability and effectiveness. The

essential components of a well-designed surveillance system are listed below:

13
a. Cameras

Plate 5: Internet Protocol (IP) Camera

High-resolution IP cameras with audio recording capabilities form the foundation of the

surveillance system. These cameras ought to have:

i. The ability to see clearly, specifically for facial recognition, and incident identification at

HD resolution.

ii. To support a large variety of lab specific lighting conditions allowing video quality to

remain high even under low light and glare conditions.

iii. Microphones built in for clear audio recording.

iv. Weatherproof casings that guard cameras against environmental and other possible

tampering hazards if cameras are near such things as windows or other exposed areas.

b. Microphones

If certain areas have to be more or other microphones, then directional high quality microphones

are picked if they have to be separated microphones. Some essential characteristics of a

microphone are:

14
i. No cancel out the noise to screen out background noise during monitoring incidents.

ii. Reliability, durability, effectiveness, and all of the above such that they are compatible

with existing infrastructure, for aesthetic consistency and reducing risk of tampering, and

for financial constraints so they are reliable, durable, and effective.

c. Storage System

Plate 6: Digital Video Recorder (DVR) Plate 7: Hard Disk Drive (HDD)

To respond to the demands of continuous video and audio recording, the data demands require a

centralized DVR server system. Consider the following key characteristics:

i. Large video and audio file storage expansion options for high-capacity hard drives.

ii. Some features like RAID configurations for data redundancy to prevent data lose.

iii. To ensure smooth information move and access, high velocity network that enable

constant looking and productive information recovery.

15
d. Networking and Connectivity Components

Plate 8: Network Connections & Cables

A solid network infrastructure is required for components of Networking and Connectivity since

surveillance system’s frequent sending of high-quality audio and video data heavily. These

essential elements include:

i. Unsurprisingly, power over Ethernet (PoE) switches help you connect IP cameras' data

and power, minimizing additional cabling.

ii. At least that you have a rapid Ethernet link of Cat6 or higher to ensure your information

goes on a stable, almost free path.

16
e. Mounting and Installation of Hardware

Plate 9: Mounting Materials

Hardware Installation and Mounting Materials are valuable for getting the cameras and

microphones place securely. These are some:

i. Allow the use of wall or ceiling mount with ability to position the camera for best

coverage and angles.

ii. When the camera is at places adjacent to hot areas, screws and fasteners are designed to

protect the contents for safety and durability.

iii. There are pipes, clamps and tubes that form cable management equipment that keeps

cables in good condition, from accidents and interference.

f. Power Supply and Backup Systems

17
Plate 10: Solar Inverter backup system

For continuous and reliable operation, a dedicated power supply and solar inverter system

backup should be included in the system:

i. PoE injector or PoE-enabled switch can power the camera faster.

ii. Solar inverter system with battery backup for continuous recording without data loss

during power outages.

g. Software and Monitoring Tools

What it requires: admins and user rights, video & audio recording management. The software

must include: It includes real time monitoring, video playback, and video recording in:

i. Such Video Management Software (VMS) which will be included are HIK-Connect, for

instance.

ii. Encryption and information on user access control and provision of access to a limited

range of those authorized personnel.

h. Material for Compliance and Documentation

Finally, the information required to support data protection compliance:

i. User System Administration Policy and Documentation.

ii. This data storage system can watch how much time data stays in storage and make

certain of regulatory compliance.

18
To be useful computer monitoring equipment has to strike a balance between durability and

performance as well as transparency to users. With high resolution cameras, noise canceling

microphones secured network infrastructure, secured storage systems and privacy practices. The

setup is designed to ensure security, accountability, and user friendliness of an electronic testing

environment that also has clear control process and compliance records.

3.3 CONSTRUCTION PROCEDURE

Programming installation of audio and video monitoring systems for computer laboratories;

The quality of analysis can be improved by many computer laboratories, which require an

integrated recording system. Among several steps on construction process planning, installation,

testing and maintenance part. Below are detailed, step by step instructions of how to use the

system.

a) Phase 1: Planning and Design

i. Assessment and Consultation: Work with laboratory leaders to learn about individual

laboratory needs and challenges. This process includes identifying high risk areas (for

example, entrances, places with valuable equipment, and the places with high client

traffic), and specific security rules in the laboratory.

ii. Detailed Site Survey: Make measurements and create great details maps of all clinical

places, entrance/exits, windows, useful tools and conversations and significant

activity in common places. Examine each laboratory carefully and study room

dimensions, lighting (natural and artificial) and acoustics to see what relationship

19
there is between camera image and audio functioning. The It integrates with existing

system monitoring systems, like power lines, utility lines and network access points.

iii. System Design Blueprint: Research into best location based on plan depending upon

what the camera can view. Identify map cable usage and associated network

integration points with power requirements. Find cameras with recording and low

light features specifically designed for each clinical environment that are high

resolution.

b) Phase 2: Procurement of Equipment

i. Equipment, Camera Selection and Sales: For audio selection and noise reduction,

choose high resolution IP cameras with built in microphones.

ii. Accessories: Many accessories that help you manage power include power adapters,

network switches, PoE injectors, security mounts, cable management tools, and

optional battery backups for power redundancy.

c) Phase 3: Pre-Installation Setup

i. Network Pre-Configuration: When all cameras are installed, make sure they all are in

a locked down network environment where any IP communicated with the camera is

encrypted. Cameras should be assigned an IP address 1st so they can be installed

easily and identified and managed easily.

ii. Initial Camera Configuration: Change the resolution, frame rate, motion sensitivity

and audio volume for each camera separately. Use a sandbox to prove the

20
visualization works. Label all cameras, connections and links as per design criteria for

ease of use.

d) Phase 4: Audio Configuration and Placement Testing

i. Measure Sounds and Adjust Microphone Position: Once the camera will be mounted,

the specific settings will then adjust the microphone gain and direction to capture

sound as clearly as possible from the location with limited background noise. Call

settings: It always backfired in the senses of only capturing relevant sounds without

disturbing unnecessary sounds and prediction in the count of different sounds at

different times of the day.

e) Phase 5: Network Integration and Storage Setup

i. Local network and settings Compact and share: Guarantee safety and stability Secure

all cameras to local network When using PoE, ensure all cameras are powered and the

network switch is not overloaded. Evaluate bandwidth consumption to be sure

network can function get data and abide video in real move speed.

ii. Storage: Reserve the storage for audio VO and video files and give a repeatable

storage duration

f) Phase 6: Testing and Calibration

21
Plate 11: Monitor displaying testing mode

i. System-Wide Testing: After installing audio recording and evaluate the quality of

audio and video with comprehensive post installation tests on all four labs. Run

events like unauthorized access and motion, if the system reacts correctly and records

events as required.

ii. Motion sensor adjustment: Adjust the motion sensitivity so much data is not taken

from daily movement. For each motion detection camera and field of view, the

calibration is made to suit the lab it covers.

iii. Check network stability and bandwidth: It helps you check the performance of the

frame vis-à-vis the lab standards and ensure the network strength. Change the

network settings or stream quality in order to resolve network latency.

As a construction process, the entire Computer Engineering Laboratory is concluded with the

completion of a camera monitoring system. It guarantees privacy and rights and is secure and of

good quality. This design concept will make machines as safe and efficient as possible to create a

safer and manageable control point.

22
23
CHAPTER FOUR

RESULT AND DISCUSSION

4.1 PERFORMANCE TESTING FOR SURVEILLANCE SYSTEM IN COMPUTER

ENGINEERING LABS

Well, this has elaborated information covering every part of the monitoring process so that the

technology can be adjusted for lab usage and user experience so that user experience can be

organized for effective security and management activities.

The following are step wise instructions to execute performance tests:

a) Video Quality and Resolution Testing

i. Resolution Assessment: The device then brings each camera to maximum resolution and

tests on-device accuracy in identifying faces, objects, and labels. Such checks will

especially be required in high risk areas. We capture sample images at different angles

and lighting for each camera to ensure we get consistent images.

ii. Color Accuracy and Contrast Testing: Make sure your camera even in an overcrowded

location can capture colors and contrast in all types of lighting correctly

b) Testing Audio Performance

i. Comprehensive Assessment of Audio Clarity: Record dialogues at various distances and

loudness levels to observe how each camera's audio performs. Test audio reproduction to

measure audio accuracy such that speech can be heard in moderate noise.

24
ii. Environmental Noise Adjustment: Filter ambient noise while capturing correct audio

during peak usage and test the system. It’s critical to have clear audio while on the road,

and to protect audio data from outside noise.

c) Motion Detection and Sensitivity Calibration

i. Specific Sensitivity Tuning: We set up sample scenarios in which people enter and leave

different camera zones to calibrate motion detection sensitivity. The system’s sensitivity

can be fine-tuned so that it reliably captures important events such as unauthorized

access, or fast movements around sensitive equipment, while avoiding being triggered by

nothing.

d) Privacy and Security Testing

i. Access Control Rigor: Simulate unauthorized access attempts to test the mechanism for

user authentication, then test log access settings. Ensure that footage can only be viewed

by people who are authorized to do so, and that access logs are properly kept, and

automatic so that access logs update every time someone logs in.

ii. Encryption and Secure Data Handling: Video and audio data streams are run through

encryption tests to try and reach data from multiple devices. Make sure your sensitive

information is end to end encrypted, both in storage and during transmission.

4.2 PRESENTATION OF RESULTS

25
Plate 12: TV Screen displaying images from
cameras

Below is a bit more info about the performance testing results in each of the performance

categories. In this deeper analysis, specific metrics, technical changes and ongoing

recommendations will be made to help the surveillance system remain capable of meeting

security and operational standards.

a) Video Quality and Resolution Testing

i. High-Resolution Quality Metrics: We set all cameras to 1080p. The Test performance of

object recognition functionality was carried out at different distances (5, 10, and 15 feet

from the camera) and it was found that especially the identification of individuals and
26
objects from fine details like small text on the labels, was clear and high accurate. A

slight contrast increase was made to better the contrast and yet not take color accuracy

away.

ii. Field of View: The field of view of each of the cameras was tested and averaged 90 – 120

degrees according to its place in the lab. This level of coverage was sufficient to monitor

entrances, and equipment storage areas. For Lab 4, a wider field of view camera that

covered a larger area was chosen to be positioned by the main entryway.

b) Audio Quality and Microphone Sensitivity

i. Directional Microphone Calibration: The microphones could pick up audio from other

areas, and tests found audio could be from a wide field. To this end, in Labs 3 and 4,

microphone selection was optimized in Labs 3 and 4 to minimize overlapping captures

from surrounding spaces.

ii. Noise Reduction Testing Built in noise suppression settings reduced background noise,

such as typing and equipment fans. By placing it in this way, it provided a better balance

in audio quality and allows clear capture of the necessary sounds and the background

noise is removed.

c) Motion Detection and Sensitivity Calibration

i. Motion Detection Effectiveness: In testing, people came and went into camera range at

different speeds. The system was also able to differentiate significant movements from

minor movements. Changing sensitivity settings reduced false alarms especially in low

activity labs.

27
ii. Detection Range Accuracy: The recordings were triggered accurately, within a 20-foot

range, where they were available, meaning that with almost any activity close to

important locations such as (doors, storage for equipment) one would be caught. In Lab 2

we tested with rapid movements and all cameras had effective response time, starting to

record within 0.5 seconds.

d) Data Transfer Analysis

i. Data Storage and Access Speed: Data write speed for each camera was tested. With

storage configurations that enable real time access to video recordings, the average write

delay was under 1 second. Random access retrieval was also tested as fast response, good

for playback and review.

e) Privacy and Security Compliance

i. Access Control Verification: Access logs were confirmed to update automatically to

record times with login and end user details and holds that only authorized personnel

could access camera feeds. We have successfully realized password protected account

and two factor authentication to reduce the risk of viewing by unauthorized person.

ii. Encryption and Data Security: Both storage and transmission of video and audio feeds

was tested to prove they were protected by encryption protocols. Each video feed was

AES-256 encrypted to prevent external access to stored, or live, footage unless proper

authorization was given.

f) Long-Term Reliability and Maintenance

28
i. Extended Uptime Testing Results: The cameras proved to survive the test, running

continuously over three days without overheating, crashing, or loosing quality. This

stability promises minimal hardware/software stability needs for the continuous running

periods of the tunnel.

ii. Backup and Recovery Testing: We tested the automated backup feature in the system and

found that the required data could be restored if needed. This guarantees that your

security of surveillance footage doesn’t suffer in the event that you make any accidental

data deletion.

4.3 DISCUSSION OF RESULTS

Testing the deployment and testing the surveillance system across the four computer engineering

labs showed us what it's good for. This discussion covers the specific achievements, challenges,

and future recommendations based on results across several critical areas: The attributes include

video quality, audio clarity, motion detection, data management, network performance, user

privacy and system reliability. Results for each area show that the system improves lab security

and resource management and suggest future improvements that would further strengthen the

system’s accomplishments.

a) Video Quality and Coverage Analysis

29
The cameras were found to provide good definition both for viewing individual images and for

monitoring lab procedures. Average field of view (field of view) of between 90 – 120 degrees,

and locations of cameras were chosen to cover key areas, including entrances, workstations and

areas storing equipment. Overall, this coverage worked well, but there was a small amount of

overexposure in one lab adjacent to windows. This was largely solved by adjusting exposure

levels, which allowed me to get clear footage without losing color fidelity.

But infrared (IR) capabilities automatically activated in low light scenarios to provide a view

among darkened labs. Testing with infrared showed the cameras were able to see to 20 feet,

which should be enough to keep tabs on lab perimeters and key zones when they aren't being

monitored. But to ensure long term performance, periodic recalibration of camera settings is

desirable, in particular for the camera settings as the lighting conditions change with lab use or

layout updates.

b) Audio Quality and Microphone Sensitivity

The audio part was to capture sound straight and so far away from all the noises and noise.

Microphones captured conversations clearly within a 15-foot radius, and this proved useful in

testing in cases of disputes or unauthorized activity. Noise suppression settings effectively

reduced background noise such as typing and ventilation, but certain high traffic labs were still

occasionally noisy due to noise bleed from nearby conversations, or HVAC systems.

To tackle this, we optimized microphone gain in select labs in selected zones to avoid the

overlapping audio capture.

30
c) Motion Detection Sensitivity and Responsiveness

Accuracy, sensitivity and speed of response of the motion detection component were tested.

False positives were lowered by calibrating where sensitivity should be high (to small paper

movements), and sensitivity should be lower (to passing shadows, for example). With a 0.5sec

trigger window, the system was able to capture relevant movements including someone entering

or leaving a lab successfully. Through this responsiveness, we maintain real time documentation

of incidents without flooding storage with unneeded footage.

Also, optimized settings for sensitivity reduced the amount of stored data while recording only

significant movements. To reduce reliance on data storage for motion triggers to only relevant

events, adjustments in labs with lower activity were made such that motion triggers only activate

when an event occurs.

d) Data Storage, Access, and Encryption

Tests on network and data transfer proved that the system's data requirements could be presented

with the lab's current network infrastructure and multiple cameras operating at the same time. On

video compression settings, we optimized the settings to prevent excessive bandwidth usage

without degrading image quality, doing so to support reliable monitoring even at peak lab times.

All video and audio feeds were data encrypted to facilitate secure transmission, as well as secure

storage that complies with institutional policies. Footage access was only allowed to those people

authorized to view it.

31
e) System Reliability and Long-Term Maintenance

The surveillance system was extended ongoing uptime tested to prove robustness showing

operation without performance issues or overheating for continuous uptime. Environmental

stress testing which involves simulating minor temperature shifts and dust exposure proved that

the system remained durable under typical lab conditions. We found that lens cleaning and

automated backups safeguard camera footage integrity and preserve camera clarity, respectively .

4.3.1 POSSIBLE PROBLEM AND TROUBLESHOOTING

S/N LIKELY PROBLEMS TROUBLESHOOTING

1 If the video refuses to play Disconnect the wire, make sure your camera is

switched on, examine the data connections,

look for damage, and replace the camera.

2 If there are bright spots/areas Adjust the Lights or the Camera's Position

in the complete picture

3 Blue Screen Broken or split video or coaxial line, a dead

camera, no power to the camera, a pulled-back

coaxial center pin, and restart

4 Digital Video Recorder (DVR) Verify your DVR and Multichannel Video

isn't recording Surveillance settings, make sure recording is turned

32
on, make sure you have enough storage space, and

remove any unnecessary photos.

5 The camera displays a black Verify the camera and lens for damage, and make

screen. sure there are no obstructions in the optical path.

Table 2: Explains the several issues that might arise with a Multichannel Video Surveillance

and how to fix them.

4.4 OVERALL DISCUSSION AND FUTURE RECOMMENDATIONS

The results show that the system accomplishes the requirements of the study: it is improving

security, accountability and resource management in the computer labs. Secure data storage and

access controls protect privacy, and high quality video, audio recording and responsive motion

detection result in accurate monitoring. Minor privacy concerns about audio recording aside, user

feedback suggests a strong general acceptance of the system, reflecting the utility as a means of

promoting such a safer lab environment.

33
CHAPTER FIVE

CONCLUSION AND RECOMMENDATION

5.0 CONCLUSION

This project conducted extensive research on video surveillance using IoT location data, and it

completed hardware and system integration and verification work to design and develop the

system, realize the majority of its functions, and accomplish its predetermined goals. It was

shown by the video network occupied bandwidth test that greater frame and network rates

correspond with better video resolution. The network rate is therefore more affected by the video

resolution than by the frame rate. Furthermore, the study highlights the technologies needed for

system construction, including the picture similarity algorithm, capture interval, and capture

sensitivity design.

Additionally, the initial experimental outcomes of using the system for real-world monitoring

are showcased. The system's ability to precisely collect dynamic picture information in a basic

background and satisfy real-time monitoring requirements for home use is demonstrated by the

testing findings. However, the function is really straightforward, and the current system merely

gathers videos because of time and energy constraints. The system can also be equipped with

sensors for temperature, humidity, and other variables to track these and other aspects of the

house, making it more complete.

5.1 RECOMMENDATION

Future enhancements to the system's effectiveness and usability might include utilising artificial

intelligence to detect threats instantaneously and adding extra high-resolution channels. The

technology's potential applications could be increased by allowing remote monitoring via mobile

34
access. It is advised to implement maintenance procedures including routine server and camera

inspections to guarantee long-term operational dependability.

35
REFERENCES

Abdulhamid, M., & Murungi, M. (2019). System design of video surveillance. System Research

and Information Technologies, 0(4), 49–58. https://doi.org/10.20535/srit.2308-

8893.2019.4.05

Ghosh, S. R., Pemmaiah, A. B., Bharti, S., Gopika, D., & Joshy, N. (2022). Intelligent automated

monitoring system using video surveillance based recognition. International Journal of

Health Sciences (IJHS), 1978–1989. https://doi.org/10.53730/ijhs.v6ns6.10098

Guo, X., Wei, X., & Liu, Y. (2017). An FPGA implementation of multi-channel video

processing and 4K real-time display system. 2017 10th International Congress on Image

and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI).

Kanade, T., Collins, R., Lipton, A., Anandan, P., & Burt, P. (1997). Cooperative multisensor

video surveillance. Proceedings of the 1997 DARPA Image Understanding Workshop, 1,

3–10.

Markovic, D. R., Gavrovska, A. M., & Reljin, I. S. (2016). 4K video traffic analysis using

seasonal autoregressive model for traffic prediction. 2016 24th Telecommunications

Forum (TELFOR).

Tang, P., Jin, W., & Liu, J. (2016). Railway inspection oriented foreground objects detection and

occlusion reasoning for locomotive-mounted camera video. 2016 35th Chinese Control

Conference (CCC).

36
Wang, J., Yan, W. Q., Kankanhalli, M. S., Jain, R., & Reinders, M. J. (2003). Adaptive

monitoring for video surveillance. In Fourth International Conference on Information,

Communications and Signal Processing, 2003 and the Fourth Pacific Rim Conference on

Multimedia. Proceedings of the 2003 Joint (Vol. 2, pp. 1139–1143). IEEE.

Xu, W., & Zhai, Y. (2023). Design and implementation of home video surveillance systems

based on IoT location service. International journal of information technologies and

systems approach, 16(2), 1–18. https://doi.org/10.4018/ijitsa.318658

Zhang, T., Chowdhery, A., Bahl, P. (victor), Jamieson, K., & Banerjee, S. (2015). The design

and implementation of a wireless video surveillance system. Proceedings of the 21st

Annual International Conference on Mobile Computing and Networking.

Johnson, A. (2019). The evolution of security systems: The role of video surveillance in modern

environments. Journal of Security Technologies, 12(3), 45-58.

Adams, R., Thomas, P., & Williams, S. (2018). Challenges in single-channel video surveillance

systems and the need for multichannel solutions. International Journal of Surveillance and

Monitoring, 8(2), 102-114.

Carter, L., Brown, T., & Kim, J. (2019). Multichannel surveillance in public spaces: Benefits

and implementation strategies. Security Engineering Journal, 14(1), 89-101.

Williams, M. (2020). Improving real-time monitoring through multichannel surveillance.

Advanced Security Systems, 9(4), 200-212.

37
Chandra, V., Gupta, R., & Mehta, A. (2020). Smart video surveillance: Integrating motion

detection and facial recognition. Journal of Security and Privacy, 16(2), 60-73.

Zhao, F., & Wang, Q. (2021). Artificial intelligence in video surveillance: A review of its

applications and challenges. International Journal of AI and Video Processing, 5(1), 15-

29.

Thompson, J. (2022). Cost-effective solutions in video surveillance for public and private

sectors. Journal of Public Safety, 13(5), 85-98.

38

You might also like