This site uses cookies. By continuing to use this site you agree to our use of cookies. To find out more, see our Privacy and Cookies policy.
Brought to you by:
Paper The following article is Open access

Create a wealth of security CCTV cameras

, and

Published under licence by IOP Publishing Ltd
, , Citation Kamran Yeganegi et al 2020 J. Phys.: Conf. Ser. 1530 012110 DOI 10.1088/1742-6596/1530/1/012110

1742-6596/1530/1/012110

Abstract

The use of CCTV is so widespread today that it is widely used in almost every part of the city, public places, homes, shops, passages and even roads outside the city. These cameras are used for specific purposes, but most of them have in common the use of the camera as a tool for continuous surveillance and recording of surrounding events for future use. However, each of them is an independent network. It has been seen and there is no common point and no joint exploitation of this huge investment From a macro perspective, it seems that the existence of continuous networks of CCTVs in the long run will not be cost effective for the economy and the initial investment cost and maintenance costs will be significant. It turns out that field surveys indicate that most of the large networks of CCTV are in government-affiliated institutions, of which their funding is required from public spending. One of the country's major institutions, There are municipalities that have one of the largest CCTV networks in the country today The major use of this network is mainly for security purposes to secure and control public safety, as well as to monitor and control traffic and to commit possible offenses against offending drivers. Despite the large investment made on this network and a very good context Images are provided for transfer but no other operation.The purpose of this article is to create wealth and add value to the network of security CCTVs. It is clear, however, that surplus operations on the core task of the network should not disrupt the core mission of the network and, in addition, provide different access to the network. This network will also require compliance with network information security.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.
10.1088/1742-6596/1530/1/012110