You are on page 1of 32

Chapter II

CONCEPTUAL FRAMEWORK

This Chapter includes different local and foreign literature and studies that have direct support to

the research study. This particular research study gives the gist of the relevant readings done by

researcher, which related to the present research study. The foreign and local literature and studies would

serve as a guide and support in the interpretation and analysis of the data gathered.

Review of Related Literature and Studies

One of the most important steps in a research project is studying the review of literature. Having

this, readers will have the point of view about the importance of research. The study includes a choice of

reviewed studies that will encourage the researcher to come up this idea.

Foreign Literature

CCTV Security Cameras

In the Article IP CCTV - The Next Generation's Surveillance Technology by Emily Robinson published on

July 06, 2011 that came from the website, stated that CCTV cameras are used only in high profile events.

9
Indeed, this may be the fact in the days to come. They are made compulsory by government as to avoid

any miscreant's problems and untowardly incidents. These modern-day tools if properly put into use can do

wonders in the area of security. This article is related to the present study because the researchers believe

that CCTV is a very useful tool to solve problems in the society because it serves as credible evidence. In

May 22, 2009, Mr. Andy J. Thompson wrote an article entitled “CCTV Security Cameras – do they help fight

crime” where stated that “The UK has more CCTV camera coverage than any other country.

Lester J. Hester’s article “CCTV System- The Advantages and Disadvantages” published in Ezine Articles

stated that CCTV is highly useful for crime prevention as it increases the chance of the perpetrator being

caught, aiding police investigations, preventing theft from the till, proving innocence by sense of protecting

and defending the people in any accusations, but CCTV does not always work improper system. It could

not display every single square of your office, banks, stores, and other areas. Although you set the location

of the system in a very careful way, you still cannot get total guarantee of security level.

Synthesis: Installing CCTV Camera in some places like schools, houses and buildings. It helps the

community to lessen the possible crime activities that may happened in the area by the use of cctv

cameras. It has also the objectives of securing the protection of the company and also the

people/employee on that places.

10
3-D Body Scanner

3-D body scanners have a growing number of applications in today’s society, creating a marketplace with a

large variety of scanners and technologies. The apparel industry is one of the most notable users of this

new and forthcoming technology. These scanners provide the ability to produce tailor-fit clothes without the

time or labor to perform traditional measurements. For instance, in the future, this technology has the

potential to enable a customer to ―try on‖ virtual clothing to determine the suit with the best fit. Along with

creating the potential for easily obtaining custom-fit clothing, 3-D body scanners may also change the way

clothing is mass produced. By using large amounts of anthropometric data gathered from the 3-D scans,

the clothing industry will be able to determine ways to make clothing that fits more people, leading to a

larger portion of their customer base liking the way their clothes look on them. Other industries have also

found important uses for body scanners.

The airline, tractor, and automobile industries are using 3-D scans to create better seating that sit pilots and

drivers more comfortably. 2 3-D scanners can be classified into two types: active and passive. Passive

methods, such as binocular stereo and depth from defocus, are not commonly used in applications such as

3-D body scanning due to the density and accuracy of the data required. Instead, active methods, such as

structured light and time of flight, are used. The most common type of structured light scanner is the laser

scanner, which typically consists of four or eight cameras and four lasers that move synchronously together

on four poles in such a way that creates a single laser plane. With the positions of both the lasers and

cameras known, the scanner uses triangulation to extract 3-D information from the scene. Figure 1.1 shows

an example of a 4-pole laser range scanner. White light body scanners are also available which cast a

11
series of light stripes on the body from which measurements are extracted. Sixteen non-moving white light

scanner heads are used.

Synthesis: In this modern times where devices and technologies are more updated and evolved, life to

death situations mostly happens. in line with this are the upgraded versions of devices that uses to commit

crimes most specially in the public areas that people commonly go, such as government facilities like

municipalities. right now we're experiencing a lot of bomb threats, massacres and other crimes which put

people's life in danger. Honestly, Criminals are getting more smarter in planning strategies that kill people.

that's why we come to an idea of evolving a security system that may help to lessen the crimes in our

country most specially in the municipality where a VIP persons usually go. This 3D body scanner helps to

determine if there is any hazardous things that will going to enter in a building, this upgraded version of 3D

body scanner will alarmed the security personnel in such buildings if there is any suspicious thing that is

going to enter. it will be a big help to lessen the crime rates in our country and also secured the lives of our

loveones. this project may help everyone to feel safe and secured in entering facilities that usually crimes

committed.

12
Colorimetric characterization of scanned media using spectral scanner and media models

According to Reyes , Eric (2007) The computer system looks for media coordinates in a colorant space

corresponding to the sample. Media coordinates correspond to an estimated spectrum in a media model.

The estimated spectrum generates approximate digital values through a forward scanner model. The

estimated digital values are compared to the target digital values created by the scanner to calculate an

error value. The computer system repeats this process until the desired stopping criteria or criteria are met.

The estimated spectrum corresponding to the final estimated digital values represents the mirror image of

the scanner-scanned sample. Modeling the stunning features of an image capture device. In one

embodiment, a computer system predicts the reflection of displaying or transferring a sample scanned by

an image acquisition device, such as a state-of-the-art scanner, through device modeling. The sample was

scanned by a scanner.

Synthesis: Based on the study, image capture by digital scanner must ensure image capture order. The

computer system repeats this process until the desired image or image is rejected as standard. The

estimated spectrum corresponding to the final estimated digital value represents the mirror image of the

scanner-scanned sample. Modeling the stunning features of an image capture device in one embodiment,

a computer system predicts the reflection or display of a scan by an image capture device, such as a state

scanner, by device modeling. The sample was scanned by a scanner. It might work to facilitate and speed

up the scanning of something in a person's body.

Body Cavity Screening for Criminal Justice

13
Body scanners are used to screen for contraband in a variety of places. Airports, schools, government

buildings, and corrections facilities are examples of the types of places that have employed body scanners.

Different types of body scanners have different capabilities based on the imaging technologies used and

the sophistication of the internal system analysis. Metal detection was one of the first technologies

developed to identify metallic objects on a person, but contraband can take many other forms, such as

powders (e.g., drugs), paper (e.g., money), and even ceramic or plastic weapons. Correctional facilities in

particular are faced with various forms of contraband, and with elaborate methods of evading detection

employed by the local population. Manufacturers have responded by producing scanners that are able to

detect nonmetallic contraband, as well as systems that can detect contraband inside body cavities. This

report identifies commercially available body scanners and discusses the technologies used by these

products. Technological limitations pertaining to the type of materials detected and/or the ability to detect

contraband inside body cavities are discussed. Body scanners have been in use for the detection of

contraband in many different scenarios where there is a heightened risk of individuals attempting to pass

contraband materials into a controlled environment. Environments such as airports, corrections facilities,

government buildings, and schools are some examples where contraband screening has been

incorporated.

A large number of weapons are constructed (at least in part) out of metal. Metal detectors have been used

for this purpose for many years, but they do not detect non-metallic objects, such as drugs, explosives, or

plastic weapons. Pat-downs are effective at finding items concealed on a person, but these are time

consuming, and have heightened scrutiny with respect to privacy and appropriate officer conduct. Body

scanners may help reduce the burden of manually searching for contraband, however there are

technological limitations. Ideally, a body scanner would be able to detect metallic as well as non-metallic
14
contraband that is hidden underneath clothing as well as detect contraband hidden inside body cavities.

The ideal scanner would also perform these tasks without the possibility of harmful effects (short or long

term) to the subject or the operator(s) of the scanner, and maintain the privacy of individuals to the fullest

extent possible.

Synthesis: There are only devices can detect metallic and nonmetallic contraband hidden underneath

clothing as well as contraband hidden inside body cavities. Metal detection has the capability to detect

metallic objects hidden both on a person and inside body cavities. However, metal detection based

technologies do not have the ability to detect non-metallic contraband. There are devices are able to detect

metallic and non-metallic contraband hidden on a person (underneath clothing). They would not be able to

detect contraband hidden inside body cavities.

15
Attendance Management System using Biometrics

In many institutions, and academic organizations, attendance is a very important criteria which is used for

various purposes. These purposes include record keeping, assessment of students, and promotion of

optimal and consistent attendance in class. In developing countries, a minimum percentage of class

attendance is required in most institutions and this policy has not been adhered to, because of the various

challenges the present method of taking attendance presents.

This traditional method involves the use of sheets of paper or books in taking student attendance. This

method could easily allow for impersonation and the attendance sheet could be stolen or lost. Taking of

attendance is time consuming and it is difficult to ascertain the number of students that have made the

minimum percentage and thus eligible for exam. Thus, there is a need for a system that would eliminate all

of these trouble spots. An automatic attendance management system using biometrics would provide the

needed solution. An attendance management system is a software developed for daily student attendance

in schools and institutions. It facilitates access to the attendance of a particular student in a particular class.

This system will also help in generating reports and evaluating the attendance eligibility of a student. Rather

than signing an attendance sheet, individuals will pass their thumb over the fingerprint scanner, the finger

print is compared against a list of pre-registered users, and once a match is made, the individual will be

registered as having attended that lecture.

The paper discusses related works in the problem domain; highlights the general overview of the proposed

system; details design considerations of the system, both at the hardware and software level; discusses the

16
operation and how the system was tested in conformity to system design and functional objectives;

concludes the observations made; and makes recommendations for future improvement.

Synthesis: The ability to compute the attendance percentage becomes a major task as manual computation

produces errors, and also wastes a lot of time. For the stated reason, an attendance management system

using biometrics is designed. This system takes attendance electronically with the help of a finger print

device and the records of the attendance are stored in a database. The development of an attendance

management system using biometrics is aiming for efficient and effective managing attendance.

17
Detection of Threatening Objects in Baggage

The manual detection of suspicious artefacts carried out by human operators is a complex and arduous

task. The luggage usually consists of a large quantity of items, usually overlapped, which hampers the

detection of this kind of malicious objects. Also, the quantity of baggage that contain threatening objects

represents a very low percentage of the total, and the technological support provided to the operators is

very reduced. Therefore, at peak times, the worker must instantly decide whether or not a luggage can be

considered as suspicious. Since each operator must analyze several baggages, the human error level can

be very high even if they have been intensively trained. After the 11/9 tragedy, security has become a

national priority for governments around the world.

Consequently, high security measures have been imposed on both governmental and corporative facilities

to ensure the integrity of citizens. It is worth emphasizing the case of the airports, where only the U.S.

government generated an annual $700 million market (107-71 2001) in the deployment of Explosives

Detection Systems (EDS) (Murray & Riordan, 1995; Singh & Singh, 2003), which are based on X-ray

imaging for scanning baggage. For all of these reasons, the massive deployment of EDS has arisen the

interest of the scientific community. Several automatic detection techniques have been reported in the

literature (Mery, 2015a; Wells & Bradley, 2012), such as artificial neural networks (Liu & Wang, 2008; Singh

& Singh, 2004), support vector machines (SVM) (Franzel, Schmidt, & Roth, 2012; Nercessian, Panetta, &

Agaian, 2008) and novel multiple-view approaches (Mery, 2015b; Mery, Riffo, Zuccar, & Pieringer, 2017;

Uroukov & Speller, 2015). All these techniques, especially the multiple-view ones, have high detection rates

for processing all type of threatening artefacts such as guns, weapons, bombs and knifes, which represents

a beneficial contribution to protect the human life. However, these techniques are designed to be executed

in a single machine. Unfortunately, this solution provides a low performance, lacks of fault tolerance and it

is overexposed to risks such as computer attacks. During the last years, cloud computing systems are
18
increasing their role due to the wide adoption of new computer networks and the fast evolution of

computing technologies.

Cloud computing can be defined as a paradigm that provides access to a flexible and on-demand

computing infrastructure, by allowing the user to deploy virtual machines for a specific time slot giving the

illusion of unlimited resources. A very clear proof of this fact is that very important companies like Amazon,

Google, Dell, IBM, and Microsoft are investing billions of dollars in order to provide their own cloud

solutions. Currently, several factors motivate the interest of migrating and deploying systems in the cloud,

like the possibility of accessing to a flexible computing system with the possibility of varying the number of

CPUs and the memory size in runtime. The leap from private data-centers and local clusters to this new

paradigm has been imposed in many research areas, it being the main reason for the evolution of

computational needs. Also, the lack of infrastructure and administration duties results in ease off

management and overall cost reductions, where users are released from those tasks for managing physical

servers or storage devices.

Synthesis: Currently, security breaches in public places like airports and official buildings are a major

concern by both governmental and corporative organizations. Now there many devices that can scan a vast

amount of baggage in a short time frame. The scanners aim to recognize and detect a wide spectrum of

weapons like guns, knives and bombs suspicious.

19
Fingerprint-based Student Attendance Register

In this paper, the development of an attendance management system using biometrics is proposed.

Managing student attendance during lecture periods has become a difficult challenge. The ability to

compute the attendance percentage becomes a major task as manual computation produces errors, and

also wastes a lot of time. For the stated reason, an efficient attendance management system using

biometrics is designed. This system takes attendance electronically with the help of a finger print device

and the records of the attendance are stored in a database. Attendance is marked after student

identification. For student identification, a biometric (fingerprint) identification based system is used. This

process however, eliminates the need for stationary materials and personnel for the keeping of records.

Eighty candidates were used to test the system and success rate of 94% was recorded. The manual

attendance system average execution time for eighty students was 17.83 seconds while it was 3.79

seconds for the automatic attendance management system using biometrics. The results showed improved

performance over manual attendance management system. Attendance is marked after student

identification attendance in class. In developing countries, a minimum percentage of class attendance is

required in most institutions and this policy has not been adhered to, because of the various challenges the

present method of taking attendance presents. This traditional method involves the use of sheets of paper

or books in taking student attendance. This method could easily allow for impersonation and the

attendance sheet could be stolen or lost. Taking of attendance is time consuming and it is difficult to

ascertain the number of students that have made the minimum percentage and thus eligible for exam.

Thus, there is a need for a system that would eliminate all of these trouble spots. An automatic attendance

management system using biometrics would provide the needed solution. An attendance management

system is software developed for daily student attendance in schools and institutions. It facilitates access to
20
the attendance of a particular student in a particular class. This system will also help in generating reports

and evaluating the attendance eligibility of a student. Rather than signing an attendance sheet, individuals

will pass their thumb over the fingerprint scanner, the finger print is compared against a list of pre-

registered users, and once a match is made, the individual will be registered as having attended that

lecture. The paper discusses related works in the problem domain; highlights the general overview of the

proposed system; details design considerations of the system, both at the hardware and software level;

discusses the operation and how the system was tested in conformity to system design and functional

objectives; concludes the observations made; and makes recommendations for future improvement.

Synthesis: Fingerprints aims to design a student attendance system which could effectively manage the

attendance. Because fingerprints are considered to be the best and fastest method for biometric

identification. And it s very helpful to people to keep track the activity and the attendace of student/

employee.

21
Fingerprint-based Student Attendance Register

In this paper, the development of an attendance management system using biometrics is proposed.

Managing student attendance during lecture periods has become a difficult challenge. The ability to

compute the attendance percentage becomes a major task as manual computation produces errors, and

also wastes a lot of time. For the stated reason, an efficient attendance management system using

biometrics is designed. This system takes attendance electronically with the help of a finger print device

and the records of the attendance are stored in a database. Attendance is marked after student

identification. For student identification, a biometric (fingerprint) identification based system is used. This

process however, eliminates the need for stationary materials and personnel for the keeping of records.

Eighty candidates were used to test the system and success rate of 94% was recorded. The manual

attendance system average execution time for eighty students was 17.83 seconds while it was 3.79

seconds for the automatic attendance management system using biometrics. The results showed improved

performance over manual attendance management system. Attendance is marked after student

identification attendance in class. In developing countries, a minimum percentage of class attendance is

required in most institutions and this policy has not been adhered to, because of the various challenges the

present method of taking attendance presents. This traditional method involves the use of sheets of paper

or books in taking student attendance. This method could easily allow for impersonation and the

attendance sheet could be stolen or lost. Taking of attendance is time consuming and it is difficult to

ascertain the number of students that have made the minimum percentage and thus eligible for exam.

Thus, there is a need for a system that would eliminate all of these trouble spots. An automatic attendance

management system using biometrics would provide the needed solution. An attendance management

system is software developed for daily student attendance in schools and institutions. It facilitates access to

22
the attendance of a particular student in a particular class. This system will also help in generating reports

and evaluating the attendance eligibility of a student. Rather than signing an attendance sheet, individuals

will pass their thumb over the fingerprint scanner, the finger print is compared against a list of pre-

registered users, and once a match is made, the individual will be registered as having attended that

lecture. The paper discusses related works in the problem domain; highlights the general overview of the

proposed system; details design considerations of the system, both at the hardware and software level;

discusses the operation and how the system was tested in conformity to system design and functional

objectives; concludes the observations made; and makes recommendations for future improvement.

Synthesis: Finger Print Scanner is an efficient system for attendance management. The system takes

attendance electronically with the help of a fingerprint sensor and all the records are saved on a computer

server. No need of all the stationary material and special personal for keeping the records. And we can say

that the automated system is better than the manual system.

23
Intruder alarm systems

In all Australian states and territories, the State Police Services or their representative, through

legislation, provide control of the security industry and their services. Some level of control is achieved

through licensing arrangements, based on technical understanding and quality of character (Commercial

Agents Unit, 2006). Intruder alarm systems form an integral part of security; however, it could be

suggested that consumers have limited awareness of the quality of installation and technical understanding

of such systems. Limited understanding may leave the consumer prone to poorly designed, installed,

commissioned and maintained intruder alarm systems, resulting in vulnerable security systems.

Vulnerabilities with poorly installed intruder alarm systems may include incorrectly located system

components, such as detectors, cabling and battery back-up that cannot meet system electrical demands,

and inappropriate maintenance. For example, an incorrectly positioned detector could result in excessive

false alarms, with a loss of system confidence and reduced alarm response. A poorly designed battery

back-up capacity could result in premature system failure when the primary power is lost, where AS2201.1

specifies a minimum capacity of 16 hours (2007). The application of legislation, licensing and standards

attempt to reduce such system failures.

Synthesis: Intruder alam is not just good for your houses but also for the entrance door of companies

because it has a loud/ buzz alarm produced to alert unauthorized entry. There is also an internal sounder

to alert any occupants of the building that there has been a detected event, and this also acts to deter the

intruder. And burglar alarms facilitate fast response by alerting people in the vicinity to compromised

security as soon as it occurs.

24
Metal Detector

According to SHANJEDUL HASSAN metal detector is a security base project to use in everywhere.

Home, Office, Shopping Mall and other place can use our technology. We mostly look at the detection

and the safety of places, like other security system but we do a reverse engineering on it. As like every

metal detector work the condition as, when the detector didn’t find any metal in the way then the get will

open. But we do reverse design what is, the door always be open and when the detector detects any

metal then the door will be close and give signal. By this way no innocent person will be herbage and the

victim will get caught. It can update by many ways as like taking picture wen detected and other way.

Detection and clearance are still being very often carried out in Humanitarian Demining using manual

methods as the primary procedure. When operating in this way the detection phase still relies heavily on

metal detectors, whereby each alarm needs to be carefully checked until it has been fully understood

and/or its source removed. This is normally done visually, and by prodding and/or excavating the ground.

Metal detectors are still to the best of our knowledge, apart from dogs, the only detectors really being

used in the field, and are probably going to remain in use for some time. Metal detectors cannot

unfortunately differentiate a mine or UXO (Unexploded Ordnance) from metallic debris. In most

battlefields, but not only there, the soil is contaminated by large quantities of shrapnel, metal scraps,

cartridge cases, etc., leading to between 100 and 1,000 false alarms for each real mine. Each alarm

means a waste of time and induces a loss of concentration. Note that when manual methods follow other

procedures, such as mechanical clearance, constraints on the need to check each alarm are often

somewhat relaxed. When looking at the actors dealing with metal detectors, we are confronted on the

one hand with a relatively small market in which mostly SMEs operate, on the other with a scientific

25
community which is not always aware of the practical problems linked to the actual production of

equipment and its operation under field conditions (e.g. the importance of ground signals). Manufacturers

do not tend to participate to scientific conferences and workshops, and rely mostly on patents, of which

the scientific community is not always aware, to protect their intellectual property. To increase cross -

fertilization opportunities interesting patents in fields other than humanitarian demining (e.g. security

applications or Non-Destructive Testing) have also been integrated whenever possible and appropriate.

Synthesis: Using metal detector can also reduce or prevent the crimes that might happen. Because before

passing the front door or any entrance door with their weapons, metal detector can detect it immediately.

So their plan will no longer to continue. Installing metal detector to your company, school and also in

buildings has a big impact in securing the people the employees the students and some important visitant.

It’s also the best equipment to use for high security and protection for safety places.

26
Local Literature

CCTV Cameras Installation In Crime Prevention

As nations develop and their economies grow bigger, social problems also intensify. One great concern

deals with peace and order as well as safety and security of the people. Various psychologists would

render different explanations to the cases of crimes but what is apparent even to the most innocent

individual is that crimes are everywhere. Anyone can be a victim of crime; which fosters fear to a lot of

people. Knowing its responsibility, the government of different nations have launched various innovations

on how to prevent crimes. One of these innovations is the use of CCTV.

A common goal of most CCTV systems has been the prevention of crime and disorder through deterrence.

Claims are also made that CCTV provides public reassurance and therefore reduces fear of crime, which

may, in turn, increase the use of public spaces (Bennett & Gelsthorpe, 2010). CCTV has popularly been

used worldwide. It can be found in large buildings, wide establishments or areas such as malls or park. It is

also need on streets for monitoring and supervising traffic flow. Its effectiveness to provide useful

information has been attested by many agencies and establishments. In California and neighboring states,

CCTV‘s were used of security measure such as identification of people specially before entering a highly

security facility such as pent house and executive offices.

In the Philippines, CCTV has been popular on stores, gasoline stations, streets, elevators, laboratory,

banks, condominiums, hallways and privately owned area. One of the most popular use of CCTV was the

27
case of It‘s Showtime Host, Vhong Navarro, against Cedric Lee and Deniece Cornejo where it proved

several points such as identification of people involved and time lapsed when incident happened. Also, the

case wherein Magaspac‘s identity was revealed; PO3 Magaspac a traffic police at Pasay who was caught

asking extra money to truck drivers passing the expressway. Batangas City, like many other cities in the

country leaps to progress by its growing number of facilities, establishments, and roadways. It has also

embraced the installation and use of CCTV in malls, educational institutions, banks, and intersections and

diversion roads to provide coverage on their area of responsibility. The resident however, is not anymore

surprised to its presence because of its popularity, its functional use and capability as security tool. LPU-B

for instance, encoded time of employees’ attendance, student behavior inside laboratory and classrooms

that evidence a query through CCTV footage supervised and monitored by MIS Department in cases of

property destruction or stealing. Police officers in Batangas City, Philippines use them to prevent crime and

catch lawbreakers in the act. The residents downtown of the same cities help the police officers to minimize

various criminal activities. -College of Criminal Justice, Lyceum of the Philippines.

Synthesis: Cctv cameras will lower and prevent the crime activities and increased safety. This can be

especially useful if there are no witnesses to a crime or if witnesses are unreliable sources, since a

camera records what actually happens. Because it can provide evidence needed to catch and convict

the criminal. It also help to monitor the surroundings if they might bad things happened to your

workplace.

28
Attendance Monitoring System Using Biometrics for Security Staff

Nowadays, industry is experiencing many technological advancement and changes in methods of learning.

With the rise of globalization, it is becoming essential to find an easier and more effective system to help an

organization or company. In spite of this matter, there are still business establishments and schools that

use the old-fashioned way. In a certain way, one thing that is still in manual process is the recording of

attendance. This is one of the problems of the Security Staff of Taguig City University. Dealing with this

matter, the proponents thought of an easy way to do the checking of attendance. We come up with a

computerized attendance-monitoring system using biometrics. It serves as a timed log-in/ log-out system

that is set up as a computerized database. This system maintains a daily record of a person's arrival and

departure time from work. Aside from the records of time and date, our system features the name, position

and the assigned number of each staff. So it also serves as an identification profile system. The system

also protects the employees by providing the exact number of hours they worked, making it much more

difficult for employers to cheat them out of their wages. This thesis features all important facts about our

system as well as its importance.

Synthesis: When it comes in attendance monitoring we used to use the manual way or the old fashion way

in organizing and checking the attendance in school also in company. But with the use of new technology

and a system for using biometrics in monitoring the attendance. It helps the company to make the previous

process of attendance checking more efficient and easier. Less paper, less ink, less time in searching/

finding the names of the employee. High technology helps our life or what we do in life more easier.

29
Design and application of automated sales scanning and recording of apparel swing tags

According to Bryan Leonard O. David, Princess Mae D. Macatuno, Monika Louize C. Valdez and Edwin

Sybingco (2011). In this study, the researchers aim to improve the tracking of sales in the business industry

specifically to product companies. The group has implemented a system that automatically scans and

records Products, focusing on an easier and faster sales process using a conveyor system, barcode

scanners, sensors, microcontrollers, and a portable personal computer to access the database where the

swing tags were recorded. With this system, there will be an improvement in the sales tracking process as

apparel companies are able to identify which products are in demand. This system helps them earn higher

profits. Based on the results, the performance of the whole system was accurate because the values they

obtained were significantly high. Moreover, it can be concluded that the conveyor is reliable as the results

are highly considered as Different scenarios are considered. This will help our project to prevent loss of

products.

Synthesis: This Product style, It will help and increase knowledge to protect people in a company. This

project shows how important things are for our company to protect people inside and outside the company.

We cannot dismiss this project because of minor problems is growing, so this company plans to install a

scanner sensor to monitor and protect the important things in our company. We are not the only ones to

protect as well as our self, we may not know what our neighbor can do to us. This project is a reminder on

how to protect even simple things. Because everything has value it should not be neglected.

30
Colorimetric characterization of scanned media using spectral scanner and media models

According to Reyes , Eric (2007) The computer system looks for media coordinates in a colorant space

corresponding to the sample. Media coordinates correspond to an estimated spectrum in a media model.

The estimated spectrum generates approximate digital values through a forward scanner model. The

estimated digital values are compared to the target digital values created by the scanner to calculate an

error value. The computer system repeats this process until the desired stopping criteria or criteria are met.

The estimated spectrum corresponding to the final estimated digital values represents the mirror image of

the scanner-scanned sample. Modeling the stunning features of an image capture device. In one

embodiment, a computer system predicts the reflection of displaying or transferring a sample scanned by

an image acquisition device, such as a state-of-the-art scanner, through device modeling. The sample was

scanned by a scanner.

Synthesis: Based on the study, image capture by digital scanner must ensure image capture order. The

computer system repeats this process until the desired image or image is rejected as standard. The

estimated spectrum corresponding to the final estimated digital value represents the mirror image of the

scanner-scanned sample. Modeling the stunning features of an image capture device in one embodiment,

a computer system predicts the reflection or display of a scan by an image capture device, such as a state

scanner, by device modeling. The sample was scanned by a scanner. It might work to facilitate and speed

up the scanning of something in a person's body.

31
Barcode Scanner

The study aimed to develop a computerized user monitoring and report system for the College Library of

Colegio de San Juan de Letran Calamba. The system was designed to use barcode scanner for easy and

fast access of logging-in and out of patrons, monitor and identify frequent patrons, and generate necessary

reports. The features of the system covered organized information of patrons, security of records, and

receiving comments/messages from server for pending transactions.

The need assessment of the system was done by interviewing the Library Services Department staff. The

gathered data were used to identify the current process of monitoring patrons and printing out reports.

From these, the design of the system was conceptualized and developed; the testing phase followed next

where the chosen respondents evaluated the system to determine if it meets the standard they looked for

by answering the questionnaires given to them; finally, frequency and percentage were utilized to present

the results of the evaluation in tables.

Results showed that the respondents strongly agreed in the capability of the software. The system

performed effectively because it improved the process of monitoring and creating necessary reports of

patrons who have entered the library.

32
Attendance Monitoring Using Keycard System

Aquilan (2004) made a comparable thesis on the automation of time attendance that records the time in

and time out of every employee using Key card system. It tends to eliminate the manual recording system

of time and attendance and also include salary computation of each employee based on the time and

attendance reports. Ramon Faloran (2005) wrote in the article “The Computer Edge of the New

Employment and Opportunities “in the Philippine Daily Inquirer. He stated that computer gives you a

different feeling about what is happening in the company. Business will be highly competitive and

innovative because the computer provides instant information. Study by Cantoma (2004) in her thesis

entitled “Computer Library System for St. James Academy” stated that, in manual system in retrieving,

maintaining security and piling records take place because of the years gone by. Furthermore, these files

were only kept in envelopes and folders in wooden rocks.

Synthesis: Using an attendance management eliminates the need for manual attendance which is a long

and cumbersome process. Thus it saves extra effort and time that would usually go into marking

attendance manually. This system is faster and more accurate system, avoids incorrect data entry,

duplication and helps reduce mundane paperwork. In short, it enhances the speed and accuracy of the

attendance records.

33
Smart Farm Security System with Alarm Mechanism using Image Processing

This section means to talk about the inspiration and achievements of the research. It states the problem

that leads the proponents with this study as well as its background. The goals and extensions of the task

are expressed with its significance. This area would set as a support in characterizing the acceptability of

the study. Agriculture plays an important part in an economy.

Agriculture provides us food and raw material as well as employment chances to a massive extent of

population in our country. For decades, agriculture had been connected with the generation of fundamental

nourishment yields and farming was synonymous so long as farming was not marketed. In any case, as the

procedure of financial advancement quickened, numerous more different occupations partnered to farming

came to be perceived as a piece of agriculture. Furthermore technology has assumed a major part in

building up the farming business and has changed the agricultural industry by substituting human labor with

machines that are activated or controlled by people or other machines. Smart farming is commonly used by

agriculturist to make the quality and also quantity of agricultural production using detecting technology to

make farms better and more intelligent. This sort of technology is also called precision agriculture or also

known as smart farming where the idea is about how will observe, measure and react to inter and intra-field

variability of crops.

Nowadays, security is becoming an significant matter for farmers, despite that the threat of a violence on

farm is marginal, we must consider our liability to criminal deeds such as robbery of farm equipment or

chemicals, criminal disruption involving unsecured equipment and machinery, destruction of

bioengineered plants, common vandalism. Acts of terrorism have elevated our consciousness of the

requirement for increased personal and farm security. Unauthorized access to farm chemicals and

application equipment are greatest security danger to farms, nurseries and greenhouses where plants are
34
developed. And as an adult we know that insecticides should be stored away from children. In addition,

insecticides should be protected from trespassers, vandals, intruders, and thieves who may accidentally, or

intentionally, use these chemicals to damage other individuals, crop or noncrop lands, the environment or

even themselves. Be responsible for the safety of yourself, your family, representatives, and your group.

Set up your farm to endure the pressure of unauthorized activity. Thus this study aims for the solution for

the problem. This system will help to secure and monitor the particular area to lessen the time and effort of

farmers. In due course, the proponents design and implemented a system that utilizing a sensor and CCTV

which the advocate will use to identify the trespasser inside the secured area and produce a yield. This

yield is a security system that has an alarm which will trigger when a movement recognized. So with this,

the proponents’ think of a system which is security with alert mechanism which includes recognition of

undesirable individual, creature or an item in an ensured range, so at whatever point there's a suspicious

intruders it will be identify and set off the caution. In this case, the authorized personnel in a particular area

will be frightened that there is intruder distinguished.

35
Video Surveillance

Nowadays, Closed Circuit Television Camera (CCTV) systems are rapidly being deployed in public spaces

to help strengthen public safety and deter crime (Anderson & McAtamney, 2011). CCTV collects images

which are then transferred to a monitorrecording device, to be monitored and stored. A CCTV control room

acts as a central hub, where security activities are regulated and coordinated by CCTV operators. The

operators are usually responsible for monitoring and reacting to events acquiring attention, which they

observe on real-time CCTV videos displayed on the screen displays. By far, the human vision and

perception are highly effective at skimming through large quantity of video sequences and providing high-

level semantic interpretation of the scene. However, difficulties arise due to the sheer amount of information

and growing number of CCTV to be monitored. Fig. 1.1 illustrates a typical setting in a CCTV control room

in Malaysia, where the camera to operator ratio is generally low (approximately 25- 30 cameras per

operator). In such situation, it is almost impossible to scan and/or follow moving people or objects from

camera to camera, thus leading to the risk of missing vital information (Keval & Sasse, 2006). Moreover,

the attention span of human has been shown to deteriorate after 20 minutes, while manual monitoring task

requires demanding, prolonged cognitive attention (N.-H. Liu, Chiang, & Chu, 2013). Therefore, over the

last few decades, the computer vision community has endeavoured to bring about similar perceptual

capabilities to artificial visual sensors (Gong, Loy, & Xiang, 2011). Substantial research efforts have been

made towards developing video analytics solutions which are capable to automatically process and analyse

the video streams. Generally, video analytics applications can perform a variety of tasks, ranging 1 from

real-time analysis of video for immediate detection of events of interest, to analysis of pre-recorded video

for the purpose of extracting events for post-mortem analysis.

There has been an accelerated growth in the deployment of CCTV in public places such as communal

areas (e.g. parks, pedestrianised streets and parking), public transport infrastructures (e.g. airport, subway
36
and bus stations), sport arenas, recreational centres and shopping malls (Ratcliffe, 2006). Amongst the

direct benefits of implementing CCTV in public areas include triggering a perceptual mechanism in a

potential offender, reducing fear of crime, assisting the authority in the detection and arrest of offenders,

provision of medical assistance, and information gathering for investigations or analysis. However, one of

the most difficult and expensive aspects of video surveillance has always been the need to have people

monitor these cameras (Fullerton & Kannov, 2008). There would be no opportunity for immediate

intervention and action without someone watching and interpreting what the cameras are recording.

Typically, the monitoring personnel have all the requisite knowledge and skills for the task, but difficulties

arise as the number of cameras grows. Often, many events were unnoticed due to the inherent limitations

from depending solely on human monitoring

37
Fire Detection and Intelligent Alarm System

The Philippines is considered as one of the most hazards prone countries in the world brought about by

man-made and natural disasters due to its geographic circumstance which is exposed to catastrophic

earthquakes, volcanic eruptions, tropical cyclones, floods droughts and fires. Based on the reports;

devastations of these natural hazards and disasters including fires have increased in recent years of about

50 per year in the early 1970’5 to 400 per year in 2005. The risk of fire occurrence is high especially during

summer Christmas and New Year celebration due to firecrackers.

In the Philippines where house fires are prevalent, it has effect to derail the economic growth, destroyed

social and physical capital including infrastructures, which resort to reallocation of ongoing programs to

finance relief operations to fatalities and inhabitants and reconstruction efforts which diverts funds to social

services. Fires are considered natural and manmade hazards. In fire prevention and fire suppression; it

requires the adoption of uniform fire safety standards, the incorporation of fire safety, construction and

provision of protective and safety devices in buildings and structures. In compliance to the same

presidential declaration, a strategic plan for safety and security was defined as one of the best available

concept, design, material, system and technology to provide a responsive, effective and supportive

intelligent environment for achieving the occupants’ objectives over the full life-span of the building and

properties. Compared with traditional or conventional fire alarm system, this design reduces energy

consumption, reduction of maintenance and service operation costs, improved security services, and

increase the satisfaction of building occupants. Other benefits include adaptability to changing uses and

technology, and the dimensional change in environmental performance. This study aimed to design and

develop fire detection and intelligent alarm system for educational facilities under bureau of fire protection

classification.

38
The design revealed the effectiveness of the practical application and development of fire alarm system for

an educational facility. Hence, it is recommended that system developers/designers should make use of the

same methodologies and materials and that further studies be done by conducting experimental validation

on the materials and empirical investigation of the processes involved in the design and development .

Further studies may include designs for vertical and horizontal structures which includes duct detector,

elevator recall, use of heat detectors, infrared and ultraviolet flame detectors for oil refineries,

manufacturing industries, carbon monoxide detectors, and gas detectors embedded in a special purpose or

general -purpose intelligent fire alarm system.

39
PIR-Motion Sensor Security System

Security has been one of the major concerns of today’s daily living. Home and business industry’s security

issues become a major concerns since everyone in home or industry wants to protect their investments

from any form of destruction or loss. In terms of security, technology has its own contribution in developing

equipment with a better degree of providing security and monitoring a given area or establishment that

requires security.

Security systems consist of alarms and sensors which are being installed in the houses for effective and

efficient way of protecting home properties. Security and protection system are any of various means or

devices designed to guard persons and property against a broad range of hazards, including crime,

accidents, sabotage and attacks. An example of alarm system is a car alarm, this device can make a loud

noise if anyone tries to break into the vehicle. With these act, an attempt for theft is immediately

discouraged.

Most of the buildings and houses installed closed circuit television surveillance system to monitor and

record inside the building. In the proponents view, this type of system is not enough to give a real time

security to avoid damages of properties and intruders alerts because the incident will be noticed only after

the incident happened or after the video records were reviewed. Most of the building incidents like burglary

are mostly being done in the presence of security systems is because the criminal knows that the system is

not a real time and just recording happenings. Therefore, these people can plan on what they will do to be

unnoticed. Because of this observation, the proponents that come up with the idea of developing a project

entitled “Arduino PIR-motion sensor Security System” to enhance the level of security, and personal

protection.

40

You might also like