Академический Документы
Профессиональный Документы
Культура Документы
CONCEPTUAL FRAMEWORK
This Chapter includes different local and foreign literature and studies that have direct support to
the research study. This particular research study gives the gist of the relevant readings done by
researcher, which related to the present research study. The foreign and local literature and studies would
serve as a guide and support in the interpretation and analysis of the data gathered.
One of the most important steps in a research project is studying the review of literature. Having
this, readers will have the point of view about the importance of research. The study includes a choice of
reviewed studies that will encourage the researcher to come up this idea.
Foreign Literature
In the Article IP CCTV - The Next Generation's Surveillance Technology by Emily Robinson published on
July 06, 2011 that came from the website, stated that CCTV cameras are used only in high profile events.
9
Indeed, this may be the fact in the days to come. They are made compulsory by government as to avoid
any miscreant's problems and untowardly incidents. These modern-day tools if properly put into use can do
wonders in the area of security. This article is related to the present study because the researchers believe
that CCTV is a very useful tool to solve problems in the society because it serves as credible evidence. In
May 22, 2009, Mr. Andy J. Thompson wrote an article entitled “CCTV Security Cameras – do they help fight
crime” where stated that “The UK has more CCTV camera coverage than any other country.
Lester J. Hester’s article “CCTV System- The Advantages and Disadvantages” published in Ezine Articles
stated that CCTV is highly useful for crime prevention as it increases the chance of the perpetrator being
caught, aiding police investigations, preventing theft from the till, proving innocence by sense of protecting
and defending the people in any accusations, but CCTV does not always work improper system. It could
not display every single square of your office, banks, stores, and other areas. Although you set the location
of the system in a very careful way, you still cannot get total guarantee of security level.
Synthesis: Installing CCTV Camera in some places like schools, houses and buildings. It helps the
community to lessen the possible crime activities that may happened in the area by the use of cctv
cameras. It has also the objectives of securing the protection of the company and also the
10
3-D Body Scanner
3-D body scanners have a growing number of applications in today’s society, creating a marketplace with a
large variety of scanners and technologies. The apparel industry is one of the most notable users of this
new and forthcoming technology. These scanners provide the ability to produce tailor-fit clothes without the
time or labor to perform traditional measurements. For instance, in the future, this technology has the
potential to enable a customer to ―try on‖ virtual clothing to determine the suit with the best fit. Along with
creating the potential for easily obtaining custom-fit clothing, 3-D body scanners may also change the way
clothing is mass produced. By using large amounts of anthropometric data gathered from the 3-D scans,
the clothing industry will be able to determine ways to make clothing that fits more people, leading to a
larger portion of their customer base liking the way their clothes look on them. Other industries have also
The airline, tractor, and automobile industries are using 3-D scans to create better seating that sit pilots and
drivers more comfortably. 2 3-D scanners can be classified into two types: active and passive. Passive
methods, such as binocular stereo and depth from defocus, are not commonly used in applications such as
3-D body scanning due to the density and accuracy of the data required. Instead, active methods, such as
structured light and time of flight, are used. The most common type of structured light scanner is the laser
scanner, which typically consists of four or eight cameras and four lasers that move synchronously together
on four poles in such a way that creates a single laser plane. With the positions of both the lasers and
cameras known, the scanner uses triangulation to extract 3-D information from the scene. Figure 1.1 shows
an example of a 4-pole laser range scanner. White light body scanners are also available which cast a
11
series of light stripes on the body from which measurements are extracted. Sixteen non-moving white light
Synthesis: In this modern times where devices and technologies are more updated and evolved, life to
death situations mostly happens. in line with this are the upgraded versions of devices that uses to commit
crimes most specially in the public areas that people commonly go, such as government facilities like
municipalities. right now we're experiencing a lot of bomb threats, massacres and other crimes which put
people's life in danger. Honestly, Criminals are getting more smarter in planning strategies that kill people.
that's why we come to an idea of evolving a security system that may help to lessen the crimes in our
country most specially in the municipality where a VIP persons usually go. This 3D body scanner helps to
determine if there is any hazardous things that will going to enter in a building, this upgraded version of 3D
body scanner will alarmed the security personnel in such buildings if there is any suspicious thing that is
going to enter. it will be a big help to lessen the crime rates in our country and also secured the lives of our
loveones. this project may help everyone to feel safe and secured in entering facilities that usually crimes
committed.
12
Colorimetric characterization of scanned media using spectral scanner and media models
According to Reyes , Eric (2007) The computer system looks for media coordinates in a colorant space
corresponding to the sample. Media coordinates correspond to an estimated spectrum in a media model.
The estimated spectrum generates approximate digital values through a forward scanner model. The
estimated digital values are compared to the target digital values created by the scanner to calculate an
error value. The computer system repeats this process until the desired stopping criteria or criteria are met.
The estimated spectrum corresponding to the final estimated digital values represents the mirror image of
the scanner-scanned sample. Modeling the stunning features of an image capture device. In one
embodiment, a computer system predicts the reflection of displaying or transferring a sample scanned by
an image acquisition device, such as a state-of-the-art scanner, through device modeling. The sample was
scanned by a scanner.
Synthesis: Based on the study, image capture by digital scanner must ensure image capture order. The
computer system repeats this process until the desired image or image is rejected as standard. The
estimated spectrum corresponding to the final estimated digital value represents the mirror image of the
scanner-scanned sample. Modeling the stunning features of an image capture device in one embodiment,
a computer system predicts the reflection or display of a scan by an image capture device, such as a state
scanner, by device modeling. The sample was scanned by a scanner. It might work to facilitate and speed
13
Body scanners are used to screen for contraband in a variety of places. Airports, schools, government
buildings, and corrections facilities are examples of the types of places that have employed body scanners.
Different types of body scanners have different capabilities based on the imaging technologies used and
the sophistication of the internal system analysis. Metal detection was one of the first technologies
developed to identify metallic objects on a person, but contraband can take many other forms, such as
powders (e.g., drugs), paper (e.g., money), and even ceramic or plastic weapons. Correctional facilities in
particular are faced with various forms of contraband, and with elaborate methods of evading detection
employed by the local population. Manufacturers have responded by producing scanners that are able to
detect nonmetallic contraband, as well as systems that can detect contraband inside body cavities. This
report identifies commercially available body scanners and discusses the technologies used by these
products. Technological limitations pertaining to the type of materials detected and/or the ability to detect
contraband inside body cavities are discussed. Body scanners have been in use for the detection of
contraband in many different scenarios where there is a heightened risk of individuals attempting to pass
contraband materials into a controlled environment. Environments such as airports, corrections facilities,
government buildings, and schools are some examples where contraband screening has been
incorporated.
A large number of weapons are constructed (at least in part) out of metal. Metal detectors have been used
for this purpose for many years, but they do not detect non-metallic objects, such as drugs, explosives, or
plastic weapons. Pat-downs are effective at finding items concealed on a person, but these are time
consuming, and have heightened scrutiny with respect to privacy and appropriate officer conduct. Body
scanners may help reduce the burden of manually searching for contraband, however there are
technological limitations. Ideally, a body scanner would be able to detect metallic as well as non-metallic
14
contraband that is hidden underneath clothing as well as detect contraband hidden inside body cavities.
The ideal scanner would also perform these tasks without the possibility of harmful effects (short or long
term) to the subject or the operator(s) of the scanner, and maintain the privacy of individuals to the fullest
extent possible.
Synthesis: There are only devices can detect metallic and nonmetallic contraband hidden underneath
clothing as well as contraband hidden inside body cavities. Metal detection has the capability to detect
metallic objects hidden both on a person and inside body cavities. However, metal detection based
technologies do not have the ability to detect non-metallic contraband. There are devices are able to detect
metallic and non-metallic contraband hidden on a person (underneath clothing). They would not be able to
15
Attendance Management System using Biometrics
In many institutions, and academic organizations, attendance is a very important criteria which is used for
various purposes. These purposes include record keeping, assessment of students, and promotion of
optimal and consistent attendance in class. In developing countries, a minimum percentage of class
attendance is required in most institutions and this policy has not been adhered to, because of the various
This traditional method involves the use of sheets of paper or books in taking student attendance. This
method could easily allow for impersonation and the attendance sheet could be stolen or lost. Taking of
attendance is time consuming and it is difficult to ascertain the number of students that have made the
minimum percentage and thus eligible for exam. Thus, there is a need for a system that would eliminate all
of these trouble spots. An automatic attendance management system using biometrics would provide the
needed solution. An attendance management system is a software developed for daily student attendance
in schools and institutions. It facilitates access to the attendance of a particular student in a particular class.
This system will also help in generating reports and evaluating the attendance eligibility of a student. Rather
than signing an attendance sheet, individuals will pass their thumb over the fingerprint scanner, the finger
print is compared against a list of pre-registered users, and once a match is made, the individual will be
The paper discusses related works in the problem domain; highlights the general overview of the proposed
system; details design considerations of the system, both at the hardware and software level; discusses the
16
operation and how the system was tested in conformity to system design and functional objectives;
concludes the observations made; and makes recommendations for future improvement.
Synthesis: The ability to compute the attendance percentage becomes a major task as manual computation
produces errors, and also wastes a lot of time. For the stated reason, an attendance management system
using biometrics is designed. This system takes attendance electronically with the help of a finger print
device and the records of the attendance are stored in a database. The development of an attendance
management system using biometrics is aiming for efficient and effective managing attendance.
17
Detection of Threatening Objects in Baggage
The manual detection of suspicious artefacts carried out by human operators is a complex and arduous
task. The luggage usually consists of a large quantity of items, usually overlapped, which hampers the
detection of this kind of malicious objects. Also, the quantity of baggage that contain threatening objects
represents a very low percentage of the total, and the technological support provided to the operators is
very reduced. Therefore, at peak times, the worker must instantly decide whether or not a luggage can be
considered as suspicious. Since each operator must analyze several baggages, the human error level can
be very high even if they have been intensively trained. After the 11/9 tragedy, security has become a
Consequently, high security measures have been imposed on both governmental and corporative facilities
to ensure the integrity of citizens. It is worth emphasizing the case of the airports, where only the U.S.
government generated an annual $700 million market (107-71 2001) in the deployment of Explosives
Detection Systems (EDS) (Murray & Riordan, 1995; Singh & Singh, 2003), which are based on X-ray
imaging for scanning baggage. For all of these reasons, the massive deployment of EDS has arisen the
interest of the scientific community. Several automatic detection techniques have been reported in the
literature (Mery, 2015a; Wells & Bradley, 2012), such as artificial neural networks (Liu & Wang, 2008; Singh
& Singh, 2004), support vector machines (SVM) (Franzel, Schmidt, & Roth, 2012; Nercessian, Panetta, &
Agaian, 2008) and novel multiple-view approaches (Mery, 2015b; Mery, Riffo, Zuccar, & Pieringer, 2017;
Uroukov & Speller, 2015). All these techniques, especially the multiple-view ones, have high detection rates
for processing all type of threatening artefacts such as guns, weapons, bombs and knifes, which represents
a beneficial contribution to protect the human life. However, these techniques are designed to be executed
in a single machine. Unfortunately, this solution provides a low performance, lacks of fault tolerance and it
is overexposed to risks such as computer attacks. During the last years, cloud computing systems are
18
increasing their role due to the wide adoption of new computer networks and the fast evolution of
computing technologies.
Cloud computing can be defined as a paradigm that provides access to a flexible and on-demand
computing infrastructure, by allowing the user to deploy virtual machines for a specific time slot giving the
illusion of unlimited resources. A very clear proof of this fact is that very important companies like Amazon,
Google, Dell, IBM, and Microsoft are investing billions of dollars in order to provide their own cloud
solutions. Currently, several factors motivate the interest of migrating and deploying systems in the cloud,
like the possibility of accessing to a flexible computing system with the possibility of varying the number of
CPUs and the memory size in runtime. The leap from private data-centers and local clusters to this new
paradigm has been imposed in many research areas, it being the main reason for the evolution of
computational needs. Also, the lack of infrastructure and administration duties results in ease off
management and overall cost reductions, where users are released from those tasks for managing physical
Synthesis: Currently, security breaches in public places like airports and official buildings are a major
concern by both governmental and corporative organizations. Now there many devices that can scan a vast
amount of baggage in a short time frame. The scanners aim to recognize and detect a wide spectrum of
19
Fingerprint-based Student Attendance Register
In this paper, the development of an attendance management system using biometrics is proposed.
Managing student attendance during lecture periods has become a difficult challenge. The ability to
compute the attendance percentage becomes a major task as manual computation produces errors, and
also wastes a lot of time. For the stated reason, an efficient attendance management system using
biometrics is designed. This system takes attendance electronically with the help of a finger print device
and the records of the attendance are stored in a database. Attendance is marked after student
identification. For student identification, a biometric (fingerprint) identification based system is used. This
process however, eliminates the need for stationary materials and personnel for the keeping of records.
Eighty candidates were used to test the system and success rate of 94% was recorded. The manual
attendance system average execution time for eighty students was 17.83 seconds while it was 3.79
seconds for the automatic attendance management system using biometrics. The results showed improved
performance over manual attendance management system. Attendance is marked after student
required in most institutions and this policy has not been adhered to, because of the various challenges the
present method of taking attendance presents. This traditional method involves the use of sheets of paper
or books in taking student attendance. This method could easily allow for impersonation and the
attendance sheet could be stolen or lost. Taking of attendance is time consuming and it is difficult to
ascertain the number of students that have made the minimum percentage and thus eligible for exam.
Thus, there is a need for a system that would eliminate all of these trouble spots. An automatic attendance
management system using biometrics would provide the needed solution. An attendance management
system is software developed for daily student attendance in schools and institutions. It facilitates access to
20
the attendance of a particular student in a particular class. This system will also help in generating reports
and evaluating the attendance eligibility of a student. Rather than signing an attendance sheet, individuals
will pass their thumb over the fingerprint scanner, the finger print is compared against a list of pre-
registered users, and once a match is made, the individual will be registered as having attended that
lecture. The paper discusses related works in the problem domain; highlights the general overview of the
proposed system; details design considerations of the system, both at the hardware and software level;
discusses the operation and how the system was tested in conformity to system design and functional
objectives; concludes the observations made; and makes recommendations for future improvement.
Synthesis: Fingerprints aims to design a student attendance system which could effectively manage the
attendance. Because fingerprints are considered to be the best and fastest method for biometric
identification. And it s very helpful to people to keep track the activity and the attendace of student/
employee.
21
Fingerprint-based Student Attendance Register
In this paper, the development of an attendance management system using biometrics is proposed.
Managing student attendance during lecture periods has become a difficult challenge. The ability to
compute the attendance percentage becomes a major task as manual computation produces errors, and
also wastes a lot of time. For the stated reason, an efficient attendance management system using
biometrics is designed. This system takes attendance electronically with the help of a finger print device
and the records of the attendance are stored in a database. Attendance is marked after student
identification. For student identification, a biometric (fingerprint) identification based system is used. This
process however, eliminates the need for stationary materials and personnel for the keeping of records.
Eighty candidates were used to test the system and success rate of 94% was recorded. The manual
attendance system average execution time for eighty students was 17.83 seconds while it was 3.79
seconds for the automatic attendance management system using biometrics. The results showed improved
performance over manual attendance management system. Attendance is marked after student
required in most institutions and this policy has not been adhered to, because of the various challenges the
present method of taking attendance presents. This traditional method involves the use of sheets of paper
or books in taking student attendance. This method could easily allow for impersonation and the
attendance sheet could be stolen or lost. Taking of attendance is time consuming and it is difficult to
ascertain the number of students that have made the minimum percentage and thus eligible for exam.
Thus, there is a need for a system that would eliminate all of these trouble spots. An automatic attendance
management system using biometrics would provide the needed solution. An attendance management
system is software developed for daily student attendance in schools and institutions. It facilitates access to
22
the attendance of a particular student in a particular class. This system will also help in generating reports
and evaluating the attendance eligibility of a student. Rather than signing an attendance sheet, individuals
will pass their thumb over the fingerprint scanner, the finger print is compared against a list of pre-
registered users, and once a match is made, the individual will be registered as having attended that
lecture. The paper discusses related works in the problem domain; highlights the general overview of the
proposed system; details design considerations of the system, both at the hardware and software level;
discusses the operation and how the system was tested in conformity to system design and functional
objectives; concludes the observations made; and makes recommendations for future improvement.
Synthesis: Finger Print Scanner is an efficient system for attendance management. The system takes
attendance electronically with the help of a fingerprint sensor and all the records are saved on a computer
server. No need of all the stationary material and special personal for keeping the records. And we can say
23
Intruder alarm systems
In all Australian states and territories, the State Police Services or their representative, through
legislation, provide control of the security industry and their services. Some level of control is achieved
through licensing arrangements, based on technical understanding and quality of character (Commercial
Agents Unit, 2006). Intruder alarm systems form an integral part of security; however, it could be
suggested that consumers have limited awareness of the quality of installation and technical understanding
of such systems. Limited understanding may leave the consumer prone to poorly designed, installed,
commissioned and maintained intruder alarm systems, resulting in vulnerable security systems.
Vulnerabilities with poorly installed intruder alarm systems may include incorrectly located system
components, such as detectors, cabling and battery back-up that cannot meet system electrical demands,
and inappropriate maintenance. For example, an incorrectly positioned detector could result in excessive
false alarms, with a loss of system confidence and reduced alarm response. A poorly designed battery
back-up capacity could result in premature system failure when the primary power is lost, where AS2201.1
specifies a minimum capacity of 16 hours (2007). The application of legislation, licensing and standards
Synthesis: Intruder alam is not just good for your houses but also for the entrance door of companies
because it has a loud/ buzz alarm produced to alert unauthorized entry. There is also an internal sounder
to alert any occupants of the building that there has been a detected event, and this also acts to deter the
intruder. And burglar alarms facilitate fast response by alerting people in the vicinity to compromised
24
Metal Detector
According to SHANJEDUL HASSAN metal detector is a security base project to use in everywhere.
Home, Office, Shopping Mall and other place can use our technology. We mostly look at the detection
and the safety of places, like other security system but we do a reverse engineering on it. As like every
metal detector work the condition as, when the detector didn’t find any metal in the way then the get will
open. But we do reverse design what is, the door always be open and when the detector detects any
metal then the door will be close and give signal. By this way no innocent person will be herbage and the
victim will get caught. It can update by many ways as like taking picture wen detected and other way.
Detection and clearance are still being very often carried out in Humanitarian Demining using manual
methods as the primary procedure. When operating in this way the detection phase still relies heavily on
metal detectors, whereby each alarm needs to be carefully checked until it has been fully understood
and/or its source removed. This is normally done visually, and by prodding and/or excavating the ground.
Metal detectors are still to the best of our knowledge, apart from dogs, the only detectors really being
used in the field, and are probably going to remain in use for some time. Metal detectors cannot
unfortunately differentiate a mine or UXO (Unexploded Ordnance) from metallic debris. In most
battlefields, but not only there, the soil is contaminated by large quantities of shrapnel, metal scraps,
cartridge cases, etc., leading to between 100 and 1,000 false alarms for each real mine. Each alarm
means a waste of time and induces a loss of concentration. Note that when manual methods follow other
procedures, such as mechanical clearance, constraints on the need to check each alarm are often
somewhat relaxed. When looking at the actors dealing with metal detectors, we are confronted on the
one hand with a relatively small market in which mostly SMEs operate, on the other with a scientific
25
community which is not always aware of the practical problems linked to the actual production of
equipment and its operation under field conditions (e.g. the importance of ground signals). Manufacturers
do not tend to participate to scientific conferences and workshops, and rely mostly on patents, of which
the scientific community is not always aware, to protect their intellectual property. To increase cross -
fertilization opportunities interesting patents in fields other than humanitarian demining (e.g. security
applications or Non-Destructive Testing) have also been integrated whenever possible and appropriate.
Synthesis: Using metal detector can also reduce or prevent the crimes that might happen. Because before
passing the front door or any entrance door with their weapons, metal detector can detect it immediately.
So their plan will no longer to continue. Installing metal detector to your company, school and also in
buildings has a big impact in securing the people the employees the students and some important visitant.
It’s also the best equipment to use for high security and protection for safety places.
26
Local Literature
As nations develop and their economies grow bigger, social problems also intensify. One great concern
deals with peace and order as well as safety and security of the people. Various psychologists would
render different explanations to the cases of crimes but what is apparent even to the most innocent
individual is that crimes are everywhere. Anyone can be a victim of crime; which fosters fear to a lot of
people. Knowing its responsibility, the government of different nations have launched various innovations
A common goal of most CCTV systems has been the prevention of crime and disorder through deterrence.
Claims are also made that CCTV provides public reassurance and therefore reduces fear of crime, which
may, in turn, increase the use of public spaces (Bennett & Gelsthorpe, 2010). CCTV has popularly been
used worldwide. It can be found in large buildings, wide establishments or areas such as malls or park. It is
also need on streets for monitoring and supervising traffic flow. Its effectiveness to provide useful
information has been attested by many agencies and establishments. In California and neighboring states,
CCTV‘s were used of security measure such as identification of people specially before entering a highly
In the Philippines, CCTV has been popular on stores, gasoline stations, streets, elevators, laboratory,
banks, condominiums, hallways and privately owned area. One of the most popular use of CCTV was the
27
case of It‘s Showtime Host, Vhong Navarro, against Cedric Lee and Deniece Cornejo where it proved
several points such as identification of people involved and time lapsed when incident happened. Also, the
case wherein Magaspac‘s identity was revealed; PO3 Magaspac a traffic police at Pasay who was caught
asking extra money to truck drivers passing the expressway. Batangas City, like many other cities in the
country leaps to progress by its growing number of facilities, establishments, and roadways. It has also
embraced the installation and use of CCTV in malls, educational institutions, banks, and intersections and
diversion roads to provide coverage on their area of responsibility. The resident however, is not anymore
surprised to its presence because of its popularity, its functional use and capability as security tool. LPU-B
for instance, encoded time of employees’ attendance, student behavior inside laboratory and classrooms
that evidence a query through CCTV footage supervised and monitored by MIS Department in cases of
property destruction or stealing. Police officers in Batangas City, Philippines use them to prevent crime and
catch lawbreakers in the act. The residents downtown of the same cities help the police officers to minimize
Synthesis: Cctv cameras will lower and prevent the crime activities and increased safety. This can be
especially useful if there are no witnesses to a crime or if witnesses are unreliable sources, since a
camera records what actually happens. Because it can provide evidence needed to catch and convict
the criminal. It also help to monitor the surroundings if they might bad things happened to your
workplace.
28
Attendance Monitoring System Using Biometrics for Security Staff
Nowadays, industry is experiencing many technological advancement and changes in methods of learning.
With the rise of globalization, it is becoming essential to find an easier and more effective system to help an
organization or company. In spite of this matter, there are still business establishments and schools that
use the old-fashioned way. In a certain way, one thing that is still in manual process is the recording of
attendance. This is one of the problems of the Security Staff of Taguig City University. Dealing with this
matter, the proponents thought of an easy way to do the checking of attendance. We come up with a
computerized attendance-monitoring system using biometrics. It serves as a timed log-in/ log-out system
that is set up as a computerized database. This system maintains a daily record of a person's arrival and
departure time from work. Aside from the records of time and date, our system features the name, position
and the assigned number of each staff. So it also serves as an identification profile system. The system
also protects the employees by providing the exact number of hours they worked, making it much more
difficult for employers to cheat them out of their wages. This thesis features all important facts about our
Synthesis: When it comes in attendance monitoring we used to use the manual way or the old fashion way
in organizing and checking the attendance in school also in company. But with the use of new technology
and a system for using biometrics in monitoring the attendance. It helps the company to make the previous
process of attendance checking more efficient and easier. Less paper, less ink, less time in searching/
finding the names of the employee. High technology helps our life or what we do in life more easier.
29
Design and application of automated sales scanning and recording of apparel swing tags
According to Bryan Leonard O. David, Princess Mae D. Macatuno, Monika Louize C. Valdez and Edwin
Sybingco (2011). In this study, the researchers aim to improve the tracking of sales in the business industry
specifically to product companies. The group has implemented a system that automatically scans and
records Products, focusing on an easier and faster sales process using a conveyor system, barcode
scanners, sensors, microcontrollers, and a portable personal computer to access the database where the
swing tags were recorded. With this system, there will be an improvement in the sales tracking process as
apparel companies are able to identify which products are in demand. This system helps them earn higher
profits. Based on the results, the performance of the whole system was accurate because the values they
obtained were significantly high. Moreover, it can be concluded that the conveyor is reliable as the results
are highly considered as Different scenarios are considered. This will help our project to prevent loss of
products.
Synthesis: This Product style, It will help and increase knowledge to protect people in a company. This
project shows how important things are for our company to protect people inside and outside the company.
We cannot dismiss this project because of minor problems is growing, so this company plans to install a
scanner sensor to monitor and protect the important things in our company. We are not the only ones to
protect as well as our self, we may not know what our neighbor can do to us. This project is a reminder on
how to protect even simple things. Because everything has value it should not be neglected.
30
Colorimetric characterization of scanned media using spectral scanner and media models
According to Reyes , Eric (2007) The computer system looks for media coordinates in a colorant space
corresponding to the sample. Media coordinates correspond to an estimated spectrum in a media model.
The estimated spectrum generates approximate digital values through a forward scanner model. The
estimated digital values are compared to the target digital values created by the scanner to calculate an
error value. The computer system repeats this process until the desired stopping criteria or criteria are met.
The estimated spectrum corresponding to the final estimated digital values represents the mirror image of
the scanner-scanned sample. Modeling the stunning features of an image capture device. In one
embodiment, a computer system predicts the reflection of displaying or transferring a sample scanned by
an image acquisition device, such as a state-of-the-art scanner, through device modeling. The sample was
scanned by a scanner.
Synthesis: Based on the study, image capture by digital scanner must ensure image capture order. The
computer system repeats this process until the desired image or image is rejected as standard. The
estimated spectrum corresponding to the final estimated digital value represents the mirror image of the
scanner-scanned sample. Modeling the stunning features of an image capture device in one embodiment,
a computer system predicts the reflection or display of a scan by an image capture device, such as a state
scanner, by device modeling. The sample was scanned by a scanner. It might work to facilitate and speed
31
Barcode Scanner
The study aimed to develop a computerized user monitoring and report system for the College Library of
Colegio de San Juan de Letran Calamba. The system was designed to use barcode scanner for easy and
fast access of logging-in and out of patrons, monitor and identify frequent patrons, and generate necessary
reports. The features of the system covered organized information of patrons, security of records, and
The need assessment of the system was done by interviewing the Library Services Department staff. The
gathered data were used to identify the current process of monitoring patrons and printing out reports.
From these, the design of the system was conceptualized and developed; the testing phase followed next
where the chosen respondents evaluated the system to determine if it meets the standard they looked for
by answering the questionnaires given to them; finally, frequency and percentage were utilized to present
Results showed that the respondents strongly agreed in the capability of the software. The system
performed effectively because it improved the process of monitoring and creating necessary reports of
32
Attendance Monitoring Using Keycard System
Aquilan (2004) made a comparable thesis on the automation of time attendance that records the time in
and time out of every employee using Key card system. It tends to eliminate the manual recording system
of time and attendance and also include salary computation of each employee based on the time and
attendance reports. Ramon Faloran (2005) wrote in the article “The Computer Edge of the New
Employment and Opportunities “in the Philippine Daily Inquirer. He stated that computer gives you a
different feeling about what is happening in the company. Business will be highly competitive and
innovative because the computer provides instant information. Study by Cantoma (2004) in her thesis
entitled “Computer Library System for St. James Academy” stated that, in manual system in retrieving,
maintaining security and piling records take place because of the years gone by. Furthermore, these files
Synthesis: Using an attendance management eliminates the need for manual attendance which is a long
and cumbersome process. Thus it saves extra effort and time that would usually go into marking
attendance manually. This system is faster and more accurate system, avoids incorrect data entry,
duplication and helps reduce mundane paperwork. In short, it enhances the speed and accuracy of the
attendance records.
33
Smart Farm Security System with Alarm Mechanism using Image Processing
This section means to talk about the inspiration and achievements of the research. It states the problem
that leads the proponents with this study as well as its background. The goals and extensions of the task
are expressed with its significance. This area would set as a support in characterizing the acceptability of
Agriculture provides us food and raw material as well as employment chances to a massive extent of
population in our country. For decades, agriculture had been connected with the generation of fundamental
nourishment yields and farming was synonymous so long as farming was not marketed. In any case, as the
procedure of financial advancement quickened, numerous more different occupations partnered to farming
came to be perceived as a piece of agriculture. Furthermore technology has assumed a major part in
building up the farming business and has changed the agricultural industry by substituting human labor with
machines that are activated or controlled by people or other machines. Smart farming is commonly used by
agriculturist to make the quality and also quantity of agricultural production using detecting technology to
make farms better and more intelligent. This sort of technology is also called precision agriculture or also
known as smart farming where the idea is about how will observe, measure and react to inter and intra-field
variability of crops.
Nowadays, security is becoming an significant matter for farmers, despite that the threat of a violence on
farm is marginal, we must consider our liability to criminal deeds such as robbery of farm equipment or
bioengineered plants, common vandalism. Acts of terrorism have elevated our consciousness of the
requirement for increased personal and farm security. Unauthorized access to farm chemicals and
application equipment are greatest security danger to farms, nurseries and greenhouses where plants are
34
developed. And as an adult we know that insecticides should be stored away from children. In addition,
insecticides should be protected from trespassers, vandals, intruders, and thieves who may accidentally, or
intentionally, use these chemicals to damage other individuals, crop or noncrop lands, the environment or
even themselves. Be responsible for the safety of yourself, your family, representatives, and your group.
Set up your farm to endure the pressure of unauthorized activity. Thus this study aims for the solution for
the problem. This system will help to secure and monitor the particular area to lessen the time and effort of
farmers. In due course, the proponents design and implemented a system that utilizing a sensor and CCTV
which the advocate will use to identify the trespasser inside the secured area and produce a yield. This
yield is a security system that has an alarm which will trigger when a movement recognized. So with this,
the proponents’ think of a system which is security with alert mechanism which includes recognition of
undesirable individual, creature or an item in an ensured range, so at whatever point there's a suspicious
intruders it will be identify and set off the caution. In this case, the authorized personnel in a particular area
35
Video Surveillance
Nowadays, Closed Circuit Television Camera (CCTV) systems are rapidly being deployed in public spaces
to help strengthen public safety and deter crime (Anderson & McAtamney, 2011). CCTV collects images
which are then transferred to a monitorrecording device, to be monitored and stored. A CCTV control room
acts as a central hub, where security activities are regulated and coordinated by CCTV operators. The
operators are usually responsible for monitoring and reacting to events acquiring attention, which they
observe on real-time CCTV videos displayed on the screen displays. By far, the human vision and
perception are highly effective at skimming through large quantity of video sequences and providing high-
level semantic interpretation of the scene. However, difficulties arise due to the sheer amount of information
and growing number of CCTV to be monitored. Fig. 1.1 illustrates a typical setting in a CCTV control room
in Malaysia, where the camera to operator ratio is generally low (approximately 25- 30 cameras per
operator). In such situation, it is almost impossible to scan and/or follow moving people or objects from
camera to camera, thus leading to the risk of missing vital information (Keval & Sasse, 2006). Moreover,
the attention span of human has been shown to deteriorate after 20 minutes, while manual monitoring task
requires demanding, prolonged cognitive attention (N.-H. Liu, Chiang, & Chu, 2013). Therefore, over the
last few decades, the computer vision community has endeavoured to bring about similar perceptual
capabilities to artificial visual sensors (Gong, Loy, & Xiang, 2011). Substantial research efforts have been
made towards developing video analytics solutions which are capable to automatically process and analyse
the video streams. Generally, video analytics applications can perform a variety of tasks, ranging 1 from
real-time analysis of video for immediate detection of events of interest, to analysis of pre-recorded video
There has been an accelerated growth in the deployment of CCTV in public places such as communal
areas (e.g. parks, pedestrianised streets and parking), public transport infrastructures (e.g. airport, subway
36
and bus stations), sport arenas, recreational centres and shopping malls (Ratcliffe, 2006). Amongst the
direct benefits of implementing CCTV in public areas include triggering a perceptual mechanism in a
potential offender, reducing fear of crime, assisting the authority in the detection and arrest of offenders,
provision of medical assistance, and information gathering for investigations or analysis. However, one of
the most difficult and expensive aspects of video surveillance has always been the need to have people
monitor these cameras (Fullerton & Kannov, 2008). There would be no opportunity for immediate
intervention and action without someone watching and interpreting what the cameras are recording.
Typically, the monitoring personnel have all the requisite knowledge and skills for the task, but difficulties
arise as the number of cameras grows. Often, many events were unnoticed due to the inherent limitations
37
Fire Detection and Intelligent Alarm System
The Philippines is considered as one of the most hazards prone countries in the world brought about by
man-made and natural disasters due to its geographic circumstance which is exposed to catastrophic
earthquakes, volcanic eruptions, tropical cyclones, floods droughts and fires. Based on the reports;
devastations of these natural hazards and disasters including fires have increased in recent years of about
50 per year in the early 1970’5 to 400 per year in 2005. The risk of fire occurrence is high especially during
In the Philippines where house fires are prevalent, it has effect to derail the economic growth, destroyed
social and physical capital including infrastructures, which resort to reallocation of ongoing programs to
finance relief operations to fatalities and inhabitants and reconstruction efforts which diverts funds to social
services. Fires are considered natural and manmade hazards. In fire prevention and fire suppression; it
requires the adoption of uniform fire safety standards, the incorporation of fire safety, construction and
provision of protective and safety devices in buildings and structures. In compliance to the same
presidential declaration, a strategic plan for safety and security was defined as one of the best available
concept, design, material, system and technology to provide a responsive, effective and supportive
intelligent environment for achieving the occupants’ objectives over the full life-span of the building and
properties. Compared with traditional or conventional fire alarm system, this design reduces energy
consumption, reduction of maintenance and service operation costs, improved security services, and
increase the satisfaction of building occupants. Other benefits include adaptability to changing uses and
technology, and the dimensional change in environmental performance. This study aimed to design and
develop fire detection and intelligent alarm system for educational facilities under bureau of fire protection
classification.
38
The design revealed the effectiveness of the practical application and development of fire alarm system for
an educational facility. Hence, it is recommended that system developers/designers should make use of the
same methodologies and materials and that further studies be done by conducting experimental validation
on the materials and empirical investigation of the processes involved in the design and development .
Further studies may include designs for vertical and horizontal structures which includes duct detector,
elevator recall, use of heat detectors, infrared and ultraviolet flame detectors for oil refineries,
manufacturing industries, carbon monoxide detectors, and gas detectors embedded in a special purpose or
39
PIR-Motion Sensor Security System
Security has been one of the major concerns of today’s daily living. Home and business industry’s security
issues become a major concerns since everyone in home or industry wants to protect their investments
from any form of destruction or loss. In terms of security, technology has its own contribution in developing
equipment with a better degree of providing security and monitoring a given area or establishment that
requires security.
Security systems consist of alarms and sensors which are being installed in the houses for effective and
efficient way of protecting home properties. Security and protection system are any of various means or
devices designed to guard persons and property against a broad range of hazards, including crime,
accidents, sabotage and attacks. An example of alarm system is a car alarm, this device can make a loud
noise if anyone tries to break into the vehicle. With these act, an attempt for theft is immediately
discouraged.
Most of the buildings and houses installed closed circuit television surveillance system to monitor and
record inside the building. In the proponents view, this type of system is not enough to give a real time
security to avoid damages of properties and intruders alerts because the incident will be noticed only after
the incident happened or after the video records were reviewed. Most of the building incidents like burglary
are mostly being done in the presence of security systems is because the criminal knows that the system is
not a real time and just recording happenings. Therefore, these people can plan on what they will do to be
unnoticed. Because of this observation, the proponents that come up with the idea of developing a project
entitled “Arduino PIR-motion sensor Security System” to enhance the level of security, and personal
protection.
40