Download View/Open - Repository Home

Transcript
a location based system that automatically alerts the user of a security breach and on the location of the
intrusion and also alerting the police automatically.
5.2 Features of the finished system
The system gives the user the ability to register and get an account on a website via a web browser. This
enables the person to securely log in into the web site and view live video feed from a server via the
Internet. The system can accommodate multiple cameras and gives the user ability to change from one
surveillance camera to the next on the web application. Users have restricted access to surveillance
footage, they can only view footage and this is also based on the access level provided. Users are able to
change their passwords, delete their accounts. Administrative access that offers data handling of all the
users’ records i.e. can view user’s profile, adds a user, delete a user, and change a user’s access level;
has been provided. The administrator can switch between all surveillance cameras present and view.
Users can securely log in into the mobile application and view a live stream. Recorded footages can be
viewed. They are identified by a camera ID, time and date of capture. Upon sight of an alarming
activity, the user can press a button and sound an alarm remotely to scare the intruder or alert the
security forces nearby.
5.3 Achievements
In the process of implementing the Mobile Video Surveillance System with SMS Alert, I succeeded in
the development of a prototype that demonstrates the most important capabilities of the surveillance
system. In particular, the prototype features include:
The real-time viewing of a restricted and secured area that is fitted with cameras has been achieved. The
user can flip from one camera to the next or choose to view all the live footages at the same time. The
application gives the user the power to start and stop a live footage remotely. Since the footage is being
recorded, the user may opt to switch off the live footage and only load it when intrusion has been
detected. Users are able to securely log in and out to end their sessions on the web application. Users
can change their password and even delete their account. The ability to view recorded footage even in
the archives by streaming on demand footage via web has been provided for review purposes. A script
that sounds the remote alarm is executed when the user clicks a button. In addition, I was successful in
developing an administrative side of the web application. The application can be thought of as providing
value added services. It links the client to the application and provides controls all the users present.
67