
functioning of such a system is recommended to 
meet the standards and requirements of the system. 
Wireless networks are easy to achieve compared 
with wired networks, but require greater attention in 
terms of transmission and security. Any security and 
any network system are not entirely sure. Any 
system connected to the Internet can become a target 
for a potential attack.  
A VSaMS is a great way to monitor an area or 
activity in an area in real time or to view records 
accessing the system.  
Standards are varied so it is recommended to 
choose standard and the standards that will adapt 
best to the area concerned and to give maximum 
performance of the system.  
Optimal choice depends on many factors, 
depends on financial factors, geographical area, the 
existing technologies, customer needs, the impact of 
the system. No need to use an expensive system that 
is not used to its maximum performance.  
The system must match the customer needs and 
demands and provide more in terms of safety and 
security. Access via IP allows viewing of live 
images so we do not have to be present in that place, 
travel costs are eliminated. 
Also, the Internet connection is very important 
because the connection will guarantee proper 
functioning of the system and via IP access to the 
system. 
ACKNOWLEDGEMENTS 
This work was supported by Romanian National 
Authority for Scientific Research under the grant no. 
PN2 92-100/2008 SICOMAP and Investing in 
people! PhD scholarship, Project co-financed by the 
SECTORAL OPERATIONAL PROGRAMME 
HUMAN RESOURCES DEVELOPMENT 2007 - 
2013, Priority Axis 1 "Education and training in 
support for growth and development of a knowledge 
based society", Key area of intervention 1.5: 
Doctoral and post-doctoral programmes in support 
of research, Contract POSDRU 6/1.5/S/3 – 
„DOCTORAL STUDIES: THROUGH SCIENCE 
TOWARDS SOCIETY", Babeş-Bolyai University, 
Cluj-Napoca, Romania 
REFERENCES 
Benta, D. (2009). WiFi technologies for video 
surveillance, Knowledge Engineering: Principles And 
Techniques Proceedings of the International 
Conference on Knowledge Engineering, Principles and 
Techniques, Volume III, Studia Universitatis Babes-
Bolyai, Cluj-Napoca: Cluj University Press. 
Casaca, A., Silva, T., Grilo, A., Nunes, M., Presutto, F. 
and Rebelo. I. (2007). The use of wireless networks for 
the surveillance and control of cooperative vehicles in 
an airport, Telecommun Syst 36: 141–151, Springer 
Science+Business Media. 
Haering, N., Venetianer, P. L. and Lipton, A. (2008). The 
evolution of video surveillance: an overview, Machine 
Vision and Applications 19:279–290, Springer-Verlag 
Kruegle, H. (2007). CCTV surveillance: analog and 
digital video practices and technology, Elsevier Inc., 
ISBN-13: 978-0-7506-7768-4. 
Micheloni, C., Lestuzzi, M. and Foresti, G. L. (2008). 
Adaptive video communication for an intelligent 
distributed system: Tuning sensors parameters for 
surveillance purposes, Machine Vision and 
Applications 19:359–373, Springer-Verlag. 
Pechacek, P. (2005). Use of non-stop video surveillance to 
monitor breeding activity of primary cavity nesters in 
remote areas, Acta Ethol 8: 1–4, Springer-Verlag and 
ISPA. 
Tian, Y., Brown, L., Hampapur, A., Lu, M., Senior, A. and 
Shu, F. (2008). IBM smart surveillance system (S3): 
event based video surveillance system with an open 
and extensible framework, Machine Vision and 
Applications 19:315–327, Springer-Verlag. 
IEEE (2010), Retrieved January 15, 2010, from 
http://standards.ieee.org/reading/ieee/interp/802.11g-
2003.html. 
NTSC (2010), Retrieved January 15, 2010, from 
http://ro.wikipedia.org/wiki/NTSC. 
PAL (2010), Retrieved January 15, 2010, from 
http://ro.wikipedia.org/wiki/PAL. 
SECAM (2010), Retrieved January 15, 2010, from 
http://ro.wikipedia.org/wiki/SECAM. 
A VIDEO SURVEILLANCE MODEL INTEGRATION IN SMALL AND MEDIUM ENTERPRISES
9