PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Emerging Trends and Technologies: Business, People,
Advertisements

Communications Systems
Smart Cards Kyle Dion. What is a Smart Card? Definition: defined as any pocket-sized card with embedded integrated circuits which can process information.
UNIVERSAL Presents. Creating a Secure Logistics Industry with Universal Asset Tracking System.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
Using Technology to Track Marine Animals Lesson 4.
Tecnología en comercio exterior Autonomous University of the State of Hidalgo Economic And Administrative School International Commerce Computer Science.
R.F.I.D.. What is RFID RFID: Radio Frequency Identification is about the size of a grain of sand and sends out a small radio signal. Originally designed.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
Research overview: Mobile Phones, RFID and TV. Mobile phones + RFID Mobile phones with embedded RFID + camera – Lead to interesting Pervasive applications.
10/23/06 Bell Work Reading/Writing What are RFIDsWhat are RFIDs Mathematics If a RFID receivers can read tags every second. How many tags can you.
Your Interactive Guide to the Digital World Discovering Computers 2012.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
Navigational Aids Know the theory and operation of modern air navigational aids.
CURRENT TRENDS IN DIGITAL ELECTRONICS– AN OVERVIEW
Alternative Input Devices. Digital Camcorder View recordings on a regular TV or copy them to VHS tape Send MPEG video clips by way of to a mobile.
By : Injeong Lee 9CC. 1. Creator of this Presentation   2. What is Digital Security?   3. Why is Digital Security important?   4. How does Digital.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
Surveillance Society. Definition The monitoring of the behavior, activities, or other changing information, usually for the purpose of influencing, managing,
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Hardware & Software Developments Freedom of Speech & Movement.
GCSE ICT Computer applications. Computers are being used more and more in both the home and the workplace. The use of ICT and the application of computers.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
IofT 1910 W Fall 2006 Week 4 Plan for today:  discuss questions asked in writeup  talk about approaches to building intelligence  talk about the lab.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
IT’s private. Ofcom report 80% of UK homes have access to the Internet 76% of UK homes have broadband 40% of UK adults use a smartphone Image by: VEER/Corina.
[1] INSTITUTE OF ADVANCED COMPUTER AND RESEARCH TECHNICAL SEMINAR PRESENTED BY- A SEMINAR PRESENTATION ON AUTOMATIC VEHICLE LOCATER NIWEDITA BURNWAL.
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
A questionnaire is a effective way of gaining information quickly and directly from an audience, and the results from a questionnaire can be displayed.
By Shubham GOEL ECE-III year xyz. Introduction Automatic Vehicle Locator (AVL) is a computer – based vehicle tracking system The actual real –time position.
Virtual Searches Christopher Slobogin Stephen C. O’Connell Professor of Law University of Florida Fredric G. Levin College of Law.
DNA DNA contains information of genetic make up and is often used to solve cases. The information of DNA made public may lead to genetic discrimination.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Police 3.6 Politics and Government. DNA Data Collection.
Computer applications
 Designed to monitor the movement of people in given area.  Used video cameras to transmit a signal to a specific place on a limited set of monitors.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
CS 6v Privacy The end of Privacy ?? Dr.Murat Kantarcioglu.
© McGraw-Hill Companies, Inc., McGraw-Hill/Irwin Chapter 9 Emerging Trends and Technologies.
Bus Detection Device For The Passenger Using GPS And Gsm Application Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Describe direct data entry and associated devices, e. g
BETTER SAFE THAN SORRY Unit 6. Which item do you think is the most/least useful? How often do you/your parents use these items? What other pieces of equipment.
APPLICATION TO SPECIFIC SCENARIOS An Overview of Strand 2.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Radio Frequency Identification (RFID)
Where in the world is my PSP? RFID Triangulation Stuart Lenz North Star High School.
Review Future Technology. Definition Biometrics refers to technologies used to detect and recognize human physical characteristics.
Describe direct data entry and associated devices, e. g
Social effects of information systems.  Many of the old boring jobs can now be done by a computer, which leaves workers to do more interesting tasks.
The Use of Remote Sensing in Animal Agriculture Cody Massey SOIL/BAE
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
Maps are Made of…. Maps are made up of satellites and aerial photographs Mapmakers can store, process, and display map data electronically. This is all.
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
Charlottesville Area Transit ITSVA Annual Conference Omni Richmond Hotel May 19, 2016 John Jones, Transit Manager.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
RFID (RADIO FREQUENCY IDENTIFICATION) Presented by Sreenesh Shenoy GM RFID & Software Stallion Systems and Solutions P Ltd.
Communications Systems
Implications of Digital Technology for Business and Customers
Communications Systems
RFID Technology & It’s Uses
سیستم های محافظتی و مکان یابی الکترونیکی
Biometric technology.
Makes Life Easier for Business Owners by Using GPS Vehicle Tracking.
CAR PARKING PROBLEM IN MUMBAI.
Presentation transcript:

PRESENTATION In a modern society there are different types of surveillance systems from cctv cameras to biometric readers. In this power point presentation We have studied some of the most used alarm and surveillance systems.

Modern technology is able to keep people under surveillance in many different ways.

Biometric readers: Identification of people throught DNA, fingerprints, eye strycture or facial feactures.

CCTV cameras (closed circuit TV): 24 hour observation of people in streets, shops and public buildings; images are stored.

Credit cards: Records of what people have bought, how much they spent, when and where they were.

GPS (global positioning system): Vital data for navigation systems but can also be used for tracking vehicles or people.

Hidden cameras and listening devices (called bugs): Information from traditional spying tecnhogy, now minaturised and harder than ever to detect.

Mobile phones: Records of calls made, who to, where and when.

Public transport travelcards: Records of passengers journeys: times, arrivals, destinations.

RFID tags (radio frequency identification): Identification and tracking of products in shops and warehouses; can also be incorporated into identity cards and even injected into animals and people.

Satellite photography: High-resolution images from above of land and buildings.

Vehicle recognition/speed cameras: Identification of passing cards; used for automatic payment on motorwayes, in carparks etc.