INSTRUCTION MANYUAL A Security Camera Software authorized by The Society for the e-jikei Network Dairi EYE Simple version 1.0



Similar documents
INSTRUCTION MANUAL A Security Camera Software authorized by The Society for the e-jikei Network Dairi EYE Standard

Residential District Security Using Home Computers

Medford Public Schools Medford, Massachusetts. Software Policy Approved by School Committee

2» 10» 18» 26» PD »

Airtel PC Secure Trouble Shooting Guide

CamGuard Security System CamGuard Security System Manual

Procedure for updating Firmware of EZ4 W or ICC50 W

SUBSCRIBER PRIVACY NOTICE

HOW TO TRANSFER FILES BETWEEN EEN IDL7000 PVR AND USB2 DEVICE

Watch Your Garden Grow

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

NEW WAVE PRIVACY NOTICE

Infrared Digital Scouting Camera. User s Manual Pocket Camera

2. The project INDECT been criticized from many sides. It appears mainly from the fear of total surveillance of the EU population.

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista

Attendance Management Software User Manual Version: 1.8 Date: May 2011

8 Digital Photo Frame Instructional Manual

St Bernadette s Catholic Primary School. E-Safety Policy

Pacesetter BES Lettering Installation Guide

ASTROW HR. Installation & Operation & Programming MANUAL

Information Security

RDC-7 Windows XP Installation Guide

HP MediaSmart Server Software Upgrade from v.2 to v.3

Digital Photo Bank / Portable HDD Pan Ocean E350 User Manual

ZTE V790 WCDMA Mobile Phone After-sales Service Manual (Level 1) Version 1.0

Install / Users Guide

Windows 95 Revision B Installation Instructions

15 Digital Photo Frame Instructional Manual

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

KViewCenter Software User Manual 2012 / 04 / 20 Version

Mobile CRM Solution for Recruiters

EaseUS Todo Backup Central Management. Console Instruction Manual

Addendum Advanced POS Printer Drivers

Eldy User's Manual. Contents

Nexio Backup and Recovery

Please check for updates to make sure you install the most recent version of our software.

PRACTICAL VIDEO SOLUTIONS. ipulse Manager Software. Installation Guide. Software Version 1.0

Mini Video Speaker. Model: MVS01. User s Manual

Customer Support Tool. User s Manual XE-A207 XE-A23S. Before reading this file, please read Instruction Manual of XE-A207 and XE-A23S.

Mobile Device Management Platform Operation Manual V1.4 RECODA

HP Operations Orchestration Software

Chapter I Model801, Model802 Functions and Features

How to purchase and download

List of some usual things to test in an application

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

KRC-3AD Wireless Controller Instruction Manual. Translated By:

ivms-4200 Client Software Quick Start Guide

Office 365 Training. Contents

This help document will demonstrate the usage of the website.

Know your rights. Q: What If police, FBI, or immigration agents contact me? Do I have to answer questions?

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

Lizard Standalone Mode Guide Version 1.0:

MANUAL FOR RX700 LR and NR

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Active Directory Extension User Guide. Version 1.0

Congratulations for making the decision to become one of the many proud KT-X robot owners.

SOFTWARE GUIDE PM1405 DATA PROCESSING SOFTWARE

Table of Content. Introduction. Software Install and Uninstall. Software Features and GUI. Quick Getting Started Guide. Frequently Asked Questions

MJPEG Camera Client User Manual

Moving Rockwell Software Activation Keys to the VersaView 200R Industrial Computer

Massachusetts Major City Chiefs. Best Practices in Eyewitness Identification and the Recording of Suspect Interviews

reflecta Super 8 Scanner

Working with the Federal Government on Cybersecurity

Symantec Endpoint Encryption Full Disk

MetaXpress High Content Image Acquisition & Analysis Software

Element. Payment Processing. Integration of Element. using N-Site Applications 7/12/2011

Using the enclosed installation diagram, drill three holes in the wall with the lower hole 1150mm from the floor.

Auslogics BoostSpeed 5 Manual

Using the owncloud Android App

Time Attendance V1.0

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

Central Management Software CV3-M1024

Installation Instructions for 9555 USB Driver

1 Axis camera configuration IP configuration Setting up date and time Installing an IPS Analytics Application...

Medina County Policy Manual

WC002 Sweex USB Webcam 100K with Microphone. If one of the above parts is missing, please contact the retail outlet where you purchased the device.

SA-9600 Surface Area Software Manual

CS SoftDent Practice Management Software Installation Guide for Client/Server Configurations

How To Connect A300 To A300 Time Clock On A Pc Or Mac Computer

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

USER MANUAL TOUGH DRIVE CUSTOM EXTERNAL MOBILE HARD DRIVE / 2.5" / USB 2.0. Rev. 848

Also you need the C-MOR ISO file. This file you will find following this link:

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

USB Edition TM-STD30 User Guide

XMEye Android Mobile Monitoring Client English Manual

Ubiquity getting started

Policing requirements for Closed Circuit Television

Mark Corcoran interviews Timothy Pilgrim Australian Privacy Commissioner.

Data Protection Division Guidance Note Number 10/08

Windows XP Home Edition / Windows XP Professional

MiCJIN. Software Systems and Services Available. Michigan Criminal Justice Information Network

Specifications. What s Inside The box

Install USB drivers on Windows

London Borough of Brent Joint Regulatory Services ENFORCEMENT POLICY

Orange Apps UserLogonUSB V1.0

3 ½ Floppy to USB Flash Reader

AppleShare Client User s Manual

SMS Remote Software User Manual. Pro Series & Contender Series DVRs

If you are familiar with these matters, then you can use this manual as a work of reference.

Transcription:

INSTRUCTION MANYUAL A Security Camera Software authorized by The Society for the e-jikei Network Dairi EYE Simple version 1.0 Thank you for this software's having the concern. Please use this software only when "Use permission condition of software" distributed with this "Manual" and this program can be read, and understanding and the agreement be gotten from all notes and provisos. CONTENTS 1. Introduction 2. How to use 3. Edit of configuration file 4. Inspection of preservation image 5. Use of two cameras or more 1. Introduction This program is an image insertion corresponding to Video for Windows such as USB cameras and the capture boards. It is the one to preserve the image on the hard disk when the image is continuously taken from the power device, and there is a change in the image. ** This program is one basically specification to the camera. However, it is also possible to use two cameras or more. In that case, please refer to "Use of 5.2 cameras or more". [CONCEPT OF e-jikei NETWORK ] A community with many residents keeping occasional watch around their houses has the potential to inhibit crime. In days gone by, there were many communities like this. However, in our times, when individualism and selfishness become increasingly common, there are very few communities like this. This often results in a lack of eyewitnesses of crimes in our modern communities. On the other hand, security camera systems are now widely used and have an important role in reducing crime and identifying suspects. As for the typical usage of the security cameras systems, many problems seem to arise from the fact that they are introduced only for the benefit of the owners. One problem is that it is expensive to obtain a complete surveillance of an owner s property. A second problem is that a typical system usually keeps watch only inside the owner s property, so it cannot help with the safety of the community. A third problem is that it sometimes gives the pleasant feeling to the neighbors in case the system watches outside the owner s property. The authors argue that these problems can be solved if the camera systems are introduced within an altruistic community-minded framework. We contend that a community will have a strong ability to prevent crime if many residents keep watch on what happens around their houses with the aid of their own home computers, commercially available cheap cameras, and free-software. If the system of security cameras connected to computers and to the Internet spreads nationwide, it could result in a very powerful and flexible social structure. In addition, the software installed in each system could be easily upgraded. This means that this social structure could lead to very interesting subjects and applications for researchers and companies. In the near future, more intelligent functions could be achieved, such as the detection of doubtful motion, the sending of danger messages to the police, and facial comparison with the photos of wanted persons. Real-time chasing of suspected persons will be possible if the crime is very bad and most of the citizens give the police permission to access their own surveillance system. A country with many local communities having this facility will obtain good homeland security. However, privacy protection is still one of the most important and delicate issues in promoting the concept. We have generated user guidelines as a part of the conditions of use of the software, in which a careful consideration of privacy issues is required. The users of the software are asked not to watch the obtained pictures without appropriate reasons, so as to prevent them from knowing unnecessary information of neighbors behaviors. When the concept becomes more widely spread across the nation, new laws will be required for defining the rights of and constraints on the owner of each system including large amount of the obtained information. [SOFTWARE USE AGREEMENT] [Software Use Agreement] If you use the software of e-jikei Network Project Term, then you have to agree to the following four terms. (1)Do not make bad use of the software. You can make bad use of anything. This software is implemented and distributed for crime prevention; however, you can make bad use of the software, for example, for sneaking pictures. Security camera usage guideline, which is stated elsewhere, is a part of this software use agreement. Read this guideline and do not use the software against this guideline. Although Security camera usage guideline is written in stiff style, in brief, this guideline asks you not to make bad use of the software. Since this software has ability, you would invade other s privacy as a result even if you do not would like to. To prevent such troubles, we strictly provide what you must not do in Security camera usage guideline. For example, when you use the picture obtained by this software for the purposes except criminal investigation of

police, you have to give careful caution. When police asks you to provide the picture obtained by the software, it depends on your decision and responsibility whether you comply with such a request. (2)There is no warranty for this software. We hope but do not warrant that the software works rightly and usefully for crime prevention. We do not take responsibility for the effectiveness such as loss or damage that you can obtain by using the software. (3)We hold the copyright of this software. We can use the software freely as long as you agree the four terms. However, the copyright of this software belongs to us. (4)Do not redistribute this software. You have to keep the serial number. Only registration users can use this software. Do not redistribute this software and serial number. ARTICLE 6 Security camera system users must not leak the secrets of others that the users know by the picture of security camera system. (Limitation of software distribution) ARTICLE 7 No one must provide this software to those who would use security camera system against this guideline. (Interview and confirm of security camera system usage) ARTICLE 8 Section 1: e-jikei Network Project Team have the right to send out questionnaires to the security camera system users about security camera system usage situation by e-mail and so on. Section 2: Security camera system users must reply the questionnaires as much as possible, however, the users have the right to deny the questionnaires. [Security camera usage guideline] (Introduction) Security camera systems including the free software distributed by e-jikei Network Project Team is developed for those who feel that they would like to contribute local area security with the mind of mutual help. We do not hope that the people without this mind use this security camera system. The system has much ability and we think that if we use it rightly, then we can improve local area security. However, because of this ability, it is feared that if you make bad use of this system, you would cause the social big issues. It is also feared that if you innocently reveal information obtained by this security camera system, then you would cause serious results such as invasion of other s privacy. We make the following strict terms a part of usage agreement so that e-jikei Network Project Team Software contributes social security which is our purpose. (Object) ARTICLE 1 The object of this guideline is to provide the teams that security camera system administrator must obey. We mean that security camera system is the system which consists of e-jikei Network Project Team software, computer in which the software is installed, equipment displaying or storing the picture taken by camera. (Primary principle) ARTICLE 2 You must use security camera system for realizing the secure and peaceful local community and preventing crime and accident. (Prevention of the illegal invasion of other s rights) ARTICLE 3 Security camera system users must prevent the illegal invasion of other s privacy or rights in the usage of the system. (Safekeeping of pictures) ARTICLE 4 Security camera system users must safely keep the pictures obtained by the security camera system and the storage media of the pictures and prevent leak of the pictures. (Limitation of providing the pictures) ARTICLE 5 Security camera system users may reveal the pictures obtained by security camera system only for criminal investigation or social common idea or legal reasons. However, in any cases, decision of revealing the pictures obtained by security camera systems depends on the user who owns the pictures. (Duty of confidentially) 2. How to use Start method The initialization screen like the under appears when this software is started. Here, it explains the display of the initialization screen. DRIVE : The drive of the disk where the watch preservation is done is specified. Threshold : It distinguishes when there was movement in the image when "Size of the movement of the image (difference value)" exceeds this value and the image is preserved. **It becomes the smaller this value is, the more sensitive to movement. Please set this value between 0 to 255. Camname : The name is set to the observed camera. This camera name becomes the name of the preservation folder. Sound : It is judged that there is someone in front of the camera when the image is continuously preserved when setting it to "ON", and sounds the warning sound from PC. OK :The initialization screen is shut and it moves to the watch screen.

Next, the watch screen like the under appears when the OK button is pushed. The image that is reflected in the camera as of now is displayed on the watch screen. Here, it explains the display of the watch screen. Directory : The place where the image is preserved is shown. **It is shown as "C: e-jikei Simple " that the image is preserved in the folder named Simple in the folder named e-jikei in C drive as for this in the example above though it is. This name of Simple becomes a camera name set on the previous initialization screen. Threshold : Initialization screen and agreement Camname : Initialization screen and agreement Figure in display image :The size of the movement of a present image (difference value) is shown. When the threshold that this value set is exceeded, the image is preserved. **We will recommend the threshold to be set referring to this value. START : When this button is pushed, the watch is begun. **If this button is not pushed, the watch is not begun. Display under screen : When preserved, the file name of the image is displayed. The file name of the image becomes"year_month_day_hour_minute_sec ond_number_difference". Next, it explains the menu prepared for in both the initialization screen and the watch screen. Watch [Watch] [Quit] The watch is ended, and the window is shut. Setting [Setting] [Initialization] It returns to the initialization screen. [Setting] [Preview] ON OFF of the preview function of the watch screen is switched. [Setting] [Camera setting] The camera is set. Please set only confident one to the setting of the camera. **The setting of "Setting" "Camera setting" is different depending on the specification of various cameras. There might not be response even if it selects it. folder [folder] [opens up folder] The folder where the image is preserved is opened. When you use two cameras or more Please change in the camera name on the initialization screen when you use two cameras or more. If the camera name is not changed, it is likely not to operate normally. 3. Edit of configuration file Here, it explains "e-jikei.ini" enclosed with this software. Even if the configuration file is not edited, this software can be used. On an initial screen, the person who wants to use this software easily can set it without editing the installation file. **Please input it by normal-width when you edit configuration file "e-jikei.ini". Moreover, please do not

change excluding the part specified as shown in the under. ("=" Please edit only the right side.) This software might not operate normally when I will do a wrong edit. The screen like the under appears when "e-jikei.ini" is opened. [MAIN] part The [MAIN] is a necessary part for basic use. The details are shown as follows. DRIVE=C The drive is set preservation ahead. When it is this example, C drive is specified. CAMNAME=Simple The camera name is set. When it is this example, it is set as Simple. GETTIME=300 The acquisition time of the image is set (The unit becomes a millisecond). When it is this example, the image is acquired at frequency of about three a second. SIKII=200 The threshold is set. When the size of the movement of the image exceeds this value, the image is preserved. It becomes the smaller this value is, the more sensitive to movement. SOUND=0 ON OFF of the warning sound is set. If it is "0", it turns off, and if it is "1", turning on. SOUNDFILE=sound.wav The warning sound is selected. When the warning sound enclosed with this software is used, it is not necessary to edit it. **Please put the file of the warning sound on the same place as the execution file when oneself sets the warning sound. STARTUP=0 Whether the initialization screen is used is set. It is not done that the initialization screen is done if it is "0", and if it is "1", uses it. **The watch screen appears at once when this software is started when the initialization screen is not used. [DATA] part The [DATA] recommends oneself who is well versed in PC to edit it it is. The [DATA] is set when there is a place that wants to give priority to the watch further usually when the area that doesn't want to be observed is excluded. NUM=0 This shows the number of rectangular areas where it wants to do the weight putting to the movement detection. In this example, a present special area setting number becomes 0 places. R : Weight for addition to set concerned, area. For instance, an area concerned is assumed to be "-1.0" in case of "Disregard". If it is "0.0", the weight for the addition is 0, and the area setting becomes meaningless. The area concerned sensitivity increases by a factor of 11.0 if it is "10.0". x0: Width of screen(the unit is mm. ) x1: Length from screen left end to the vicinity at the left of specified rectangular area x2: Length from screen left end to the vicinity at the right of specified rectangular area y0: Height of screen(the unit is mm. ) y1: Length under screen to the vicinity lower in specified rectangular area. y2: Length under screen to the vicinity upper in specified rectangular area. It tries to specify the area enclosed with the dotted line with a red figure below for "Special area". In this example, it is set to disregard "Tree right that blinks automatically at nighttime".

4. Inspection of preservation image The image can be inspected by selecting "Folder" "The folder is opened preservation ahead" of the menu of the screen as described by "2. the start method" when the preservation image is inspected. Moreover, it is also possible to inspect the image by opening the folder of "e-jikei" in the drive specified in addition. The preserved file name is preserved by "year month_day_hour_minute_second_number_difference". It is also possible to inspect the image with this software started. 5. Use of two cameras or more Here, it explains use when two cameras or more are used. We will recommend this to a little well versed in the personal computer. First of all, there are two methods when two or more cameras are used. One first of all increases the execution file and the configuration file, and please copy and increase only the amount of the camera used. Please make it for a mutually different place (folder) when you increase these. Please change the item of "NAME" of configuration file "e-jikei.ini" when it is possible to increase it by copying it. The program doesn't move normally when two or more cameras are set to the same name. The second is a method of changing the camera name at the initialization screen. This program is started by the method of "2.an easy usage", and the second in this method is started. Please change "Camera name" on the initialization screen when the second is started.