Video Surveillance System Applications

Video Surveillance System Applications

Copyright: © 2014 |Pages: 23
ISBN13: 9781466648968|ISBN10: 1466648961|EISBN13: 9781466648975
DOI: 10.4018/978-1-4666-4896-8.ch024
Cite Chapter Cite Chapter

MLA

Vesna Zeljkovic. "Video Surveillance System Applications." Video Surveillance Techniques and Technologies, IGI Global, 2014, pp.311-333. https://doi.org/10.4018/978-1-4666-4896-8.ch024

APA

V. Zeljkovic (2014). Video Surveillance System Applications. IGI Global. https://doi.org/10.4018/978-1-4666-4896-8.ch024

Chicago

Vesna Zeljkovic. "Video Surveillance System Applications." In Video Surveillance Techniques and Technologies. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-4896-8.ch024

Export Reference

Mendeley
Favorite

Abstract

The fact that video surveillance is such an effective system especially when one thinks of its widespread use attests to its low investment cost. This chapter contains information about design guidelines, hardware information, specific examples, and necessary parameters to be addressed while designing representative security video surveillance system applications: protection of all assets and personnel, calculation of the overall cost of the video system, surveillance target (assets and/or personnel), surveillance timing schedule, type and number of cameras needed, camera placement, field of view required, console room monitoring equipment, number and types of monitors, number of displays per monitor, number and type of recorders, digital recording technology needed, type of video switchers, type of video printer, if additional lighting is required, if intensified or thermal IR cameras are required, if sensors at doors, windows, and perimeters that are integrated with video signals are needed, digital video motion detectors placement, IP cameras, type of signal and video transmission, type of digital transmission, type of 802.11 protocol, type of compression (MPEG-4 or H.264), and the necessity of encryption or scrambling.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.