You are on page 1of 34

PAMANTASAN NG LUNGSOD NG VALENZUELA

Tongco St., Maysan Road, Malinta, Valenzuela City

VEHICLE RECOGNITION SYSTEM USING PLATE NUMBER FOR


HOMEOWNERS OF PAG-ASA 2 SUBDIVISION, KARUHATAN, VALENZUELA
CITY

A System Development Study Presented to the Faculty of Information Technology


College of Engineering and Information Technology
Pamantasan ng Lungsod ng Valenzuela,
Maysan Road, Valenzuela City

In Partial Fulfillment of the Requirements for the Degree of


Bachelor of Science in Information Technology

By
Leandro Y. Lacson
Jan Andrei V. Lopez
Kent Russel C. Payumo
Michael Alexander Sean D. Pabica

Date (MM-YYYY)
APPROVAL SHEET

This thesis entitled “Vehicle Recognition System using Plate Number for
Homeowner’s of PAG-ASA 2 Subdivision, Karuhatan, Valenzuela City” prepared and
submitted by Leandro Y Lacson, Jan Andrei V. Lopez, Michael Alexander Sean D.
Pabica, and Kent Russel C. Payumo in partial fulfillment of the requirements for the
degree of Bachelor of Science in Information Technology has been examined and
commended for acceptance and approval for oral defense.

DR. RONALDO S. TINIO Mr. Rommel Apostol, MIT


Lecturer Technical Adviser

THESIS REVIEW PANEL

Approved by the Committee on Oral Examination

__________________ _____________________
Member Member

______________________
Chairman

Accepted and approved in partial fulfillment of the requirements for the degree of
Bachelor of Science in Information Technology.

Engr.
Dean

Date of Final Defense: January 6, 2023


Grade: ___________
ACKNOWLEDGEMENTS

This page contains the writer’s expression of appreciation for the assistance and
motivation extended during the processes of research accomplishment
TABLE OF CONTENTS

Title Page

Approval Sheet

Acknowledgments

List of Tables

List of Figures

Chapter 1 PROBLEM AND ITS BACKGROUND

Introduction

Theoretical/Conceptual Framework

Statement of the Problem

Hypothesis

Significance of the Study

Scope and Limitations

Definition of Terms

Chapter 2 REVIEW OF RELATED LITERATURE AND STUDIES

Foreign Literature

Local Literature

Foreign Studies

Local Studies

Synthesis

Chapter 3 METHODOLOGY USED

Research Design

Methods Used
Description of Respondents

Population Frame and Sampling Scheme

Sampling Techniques

Instrument Used

Data Gathering Procedure

Statistical Treatment of Data

Ethical Considerations
Chapter 1

PROBLEM AND ITS BACKGROUND

Introduction

Everyone uses a vehicle to commute to work, go to school, go to a certain place, and do

daily errands. According to Statista Research Department (2022), The average daily traffic

volume of motor carriers or motor vehicles in Metro Manila, Philippines was over 1.4 million

vehicles in 2021. Then came vehicles with a total traffic volume of around 1.4 million. The

overall traffic volume of all types of vehicles was around 3.2 million that year. Also, according to

them, roughly 536 thousand private automobiles were registered in 2021. In addition to the

growing volume of cars, the safety issues of vehicles and their owners and users also grow.

According to the Car Guide Ph. (n.d.) Philippine National Police (PNP) statistics, around 2.7

four-wheeled vehicles are stolen per day. It reached 3.18 per day. Vehicles are also used by

criminals to do their crimes, and more of these vehicles are stolen.

This is where closed-circuit television or also known as CCTV cameras comes in; these

cameras are used to capture images or video footage of a certain event that will help to solve an

issue. A very good example is the CCTV footage for stolen vehicles in subdivisions, which is

very helpful to solve car napping cases. But manually retrieving and viewing CCTV footage 24/7

can be difficult for a security guard at a subdivision. When the monitoring of the footage is

automatic and has a database instead of manually viewing the footage and writing down the

plate numbers, it’s a big benefit for the guards, staff, and homeowners of a subdivision because

it can ensure that the ingoing and outgoing vehicles in their place are being monitored

automatically 24/7.
The purpose of this study is to upgrade the security measures and help the homeowners

of PAG-ASA 2 Subdivision in Barangay Karuhatan in Valenzuela City. The homeowners of the

subdivision have a problem with the security of their subdivision because they only have one

security guard monitoring the ingoing and outgoing vehicles in the subdivision. And there are

also outsiders going inside their subdivision without them noticing. The problem can be solved

by having a system that will systematically capture the plate numbers of each vehicle that will

enter and exits the premises and match the captured plate numbers to the homeowner’s

database. The database has the list of each homeowner, tenant, and factory worker with their

corresponding vehicles. The security guard will have more time to patrol the subdivision without

worrying about the vehicles that enter and exit the subdivision.

Apart from the homeowners, there are also factories and tenants in the subdivision. The

Homeowners Association classifies them in three colors: green for the homeowners, red for the

tenants, and blue for the factory workers. They will also be listed in the database with their

corresponding vehicles.

The researchers will make a system called a "vehicle recognition system" using plate

numbers that will be connected to a CCTV and a computer that has a database. This way, they

can check the database for information about a certain vehicle and get a copy of it. If a vehicle's

captured license plate number does not match any in the database, it will be classified as a

stranger or not a homeowner, tenant, or factory worker.

This study will help security guards, homeowners, workers, and tenants of the PAG-ASA

2 subdivision in Barangay Karuhatan regarding their safety and security issues.

Theoretical/Conceptual Framework
The Software Development Life Cycle (SDLC) is an approach for generating high-quality

software that includes well-defined procedures. The SDLC technique focuses on the following

phases of software development in detail: Analysis, Planning, Software, Designing, Developing,

Testing, and Deployment (Jevtic,2019).

The researchers will use the Prototyping SDLC model. This model will help the

researchers conduct the project development. The system will undergo a process of gathering

the requirements, designing the system, building the prototype, finalizing the prototype, and

deploying the prototype. The system will be implemented when it is fully functional and ready to

go.

Conceptual Framework

The IPO paradigm stands for input-process-output. A system is represented by the IPO

model in three stages: input, processing, and output. Inputs are represented as consumables

and efforts introduced to a system at the start of its lifespan. Outputs are modeled as the

system's outcome.
Figure 1.0 IPO Diagram

The figure above shows the planning, designing, prototyping, testing, and developing of

the vehicle recognition system using plate numbers for homeowners of the PAG-ASA 2

subdivision in barangay Karuhatan in Valenzuela City. The input tab consists of steps necessary

for building the idea of the system, which includes brainstorming, problem analysis, surveys,

user requirements, and a review of related systems. The process tab consists of the technical

process for building the vehicle recognition system which is designing, prototyping, testing, and

deploying the system.

Statement of the Problem

Due to the lack of security measures in the subdivision, it is difficult to monitor the

volume of vehicles that enter and exit, which may result in unintended crimes and incidents. The

list of information about the vehicles that entered and exited is then disorganized. Finally, the

watchmen's heavy workload slows down the pace of vehicle tracking.

General problem: The study's goal is to monitor and record the vehicles that enter the

homeowners' neighborhood in PAG-ASA 2 for their security. The researchers will focus on the

following questions:

1. How can a vehicle recognition system help the current security system of

homeowners in the subdivision?

2. How will the plate number recognition system work inside the subdivision?

3. Does the system will help homeowners with their parking problems?

4. Does the system will lessen the number of outsiders that goes into the subdivision?
Hypothesis

If the vehicle recognition system using the plate number is installed in the security

system of Pag-Asa 2 Subdivision, then their security would be further developed. The vehicle

recognition system using plate numbers captures and records the plate numbers and other

personal information of vehicles going in and out of the subdivision and adds it to the database.

There is a significant difference between the current security system compared to the proposed

system by the researchers.

Significance of the Study

The Vehicle Recognition System Using Plate Number is being developed to improve the

security of the PAG-ASA 2 Subdivision; furthermore, the system will also provide access to

important information. It will also benefit the following:

Homeowners. The residents of PAG-ASA 2 Subdivision will be further guaranteed the

protection of their families at home. They will have access to the system so they can monitor the

entry and exit times of each member of their family from the neighborhood.

Watchmen. Every plate number entering and leaving the subdivision is recorded by the security

officers of Pag-Asa. With the system, the watchmen's jobs will be reduced, allowing them to

focus entirely on other very vital tasks.

Other Researchers. This research can be useful for other and future researchers that will make

a study related to the system proposed by the researchers. This paper can serve as one of their

related studies in the research they will conduct.


Scope and Limitation

The researchers focus on making an efficient way of monitoring the identity of the

drivers, the safety of homeowners, and storing the data gathered from the system, which

includes the basic information of the driver such as name, address, plate number, name of the

vehicle, type of vehicle, and contact number. This information can help as a surveillance camera

for those who enter and exit the said subdivision. 

This study is limited only to the residents of PAG-ASA 2 Subdivision. The system will

only use homeowners' information for data checking, and it won't carry out any other tasks

unrelated to the mentioned function of the system.

Definition of Terms

Vehicle - a vehicle with wheels and an engine that is used to transport people or goods,

typically on land

Plate number - a number that appears in the four borders of the printed sheet, at least once on

each pane, and is the serial number of the plate from which a sheet of postage stamps is

produced.

CCTV Camera - CCTV cameras are a type of surveillance that employs an external camera to

transfer footage or pictures to a recording device.

Database - an organized set of data stored in a computer, particularly one that can be accessed

in a variety of ways
Monitor - A computer monitor is an output device that displays information in the form of

images or text.

System - a group of linked components meant to perform a certain purpose

Computer - A computer is a digital electronic machine that may be programmed to

automatically perform arithmetic or logical operations (computation).

Raspberry pi - is a tiny computer about the size of a deck of cards.

Data - information that has been converted into an efficient form for transit or processing.

Open CV - is an open-source software library for computer vision and machine learning.

OpenCV was created to provide a common infrastructure for computer vision applications and

to speed up the incorporation of machine perception into commercial products.

OCR - is the electronic or mechanical conversion of images of typed, handwritten, or printed text

into machine-encoded text, whether from a scanned document, a document photo, a scene

photo, or subtitle text superimposed on an image.

ANPR - Automatic number-plate recognition is a technology that reads vehicle registration

plates using optical character recognition on images to generate vehicle location data. It can

use existing closed-circuit television, traffic enforcement cameras, or cameras designed

specifically for the task.

HOA - is an association of homeowners.

IoT - physical objects equipped with sensors, processing power, software, and other

technologies that communicate and exchange data with other devices and systems via the

Internet or other communication networks.


Chapter 2

REVIEW OF RELATED LITERATURE AND STUDIES

Foreign Literature

In today's world, Many Filipinos now reside in apartments and condos. Most tenants are

worried about the building's general security. Every business need security guards to protect its

assets and employees, especially in sensitive industries like real estate. Contrary to other

institutions, real estate is rarely fully filled, hence it is essential to have security personnel who

can protect the entire facility, especially the vacant areas. Additionally, it says that your entire

business needs to have video cameras installed from the front door to the parking lot. You can

keep tabs on who enters and leaves your place of business. Therefore, you can utilize the tape

to report a threat if it occurs. In the event of a threat, you can utilize the video to inform the

police of a crime. CCTVs and other cutting-edge security systems are operated with ease by a

security guard with proper training. To preserve the general safety of the establishment, security

guards deploy cameras and keep watch over your establishment. You can assign specific areas

for each patrol if your property requires more than one. Employing trained security guards has

the advantage that they are aware of how to manage problems without putting your tenants at

risk. They might alert the police and work with them as soon as the threat materializes because

of this. (While, 2020).

The safety of the neighborhood is undoubtedly one of the top concerns of buyers when it

comes to choosing an ideal property, according to Property Source Ph. (2021). Like any other

nation, the Philippines experiences its fair share of criminal activity, including theft, home

invasions, and burglaries. Fortunately, gated communities have a lot of security personnel and
equipment patrolling the area, protecting your home from potential thieves. Additionally, they

claimed that because security personnel control entry into the community, there is less traffic

because the only vehicles allowed are those belonging to residents or visitors who have been

permitted to enter and exit. The community's wide, well-kept roads also reduce traffic

congestion. For residents to easily enter and exit most private communities, automobile stickers

are required. Unauthorized visitors will be subjected to stringent identity checks, and their

purpose for visiting must be approved by a resident.

In terms of security, did you realize that Automatic Number Plate Recognition (ANPR)

systems may identify illegal activity on private property? Because the cameras can detect

license plates automatically, stolen vehicles may be reported to the appropriate authorities for

monitoring. If one of these cars enters the same gate to create additional problems, the

perpetrators can be apprehended and reported to the authorities.

Furthermore, the existence of this device will prevent possible trespassers. They would

go back and never return if they had any idea of the technology's powers. These are also

connected to the major security systems for further security. Aside from that, ANPR is also

found on numerous roadways. Some are paired with speeding detection systems to identify

automobiles speeding on expressways. The owner of the vehicle with the recorded license plate

will be required to pay a fine because the cameras provide clear evidence of a violation (5 uses

of Automatic Number Plate Recognition Systems, 2021).

Foreign Literature and Studies

The existence of neighborhood security systems can dissuade thieves from targeting the

community in the first place. This is because a community with an efficient security camera
system prioritizes the protection and safety of all inhabitants and their families. According to

Delcoro (2019), Neighborhood security systems are becoming more common in HOA and gated

communities. A community's residents want to feel secure in their homes and with their families

at all hours of the day and night. Security and privacy are a couple of the main reasons why

homeowners choose to live in gated communities. The safety of all residents, whether they are

at home or out for a walk in the neighborhood, must be protected by an HOA. Modern security

camera systems provide customers with a host of advantages due to their new features and

constantly improving technology. However, installing security systems inside a community has

never been more affordable. Gated neighborhoods and communities have unique security

concerns.

Connie et al. (2018) stated that it could help law enforcement officials quickly identify

stolen cars or gather vehicle information from those who disobey traffic laws by extracting

license plate information from a recorded photo or video frame from a video sequence utilizing

ALPR. It is also extensively utilized as a kind of electronic toll and parking payment. To make

the most of the PC's processing power while processing high-resolution cameras' high-quality

images, ALPR is frequently implemented on a PC-based platform.

According to Baskaran et al. (2018) In the modern world, Raspberry Pi is one of the best

partners, whether you're a kid or a highly educated adult. Depending on the user's needs, this

credit card-sized microprocessor may carry out a wide range of tasks, and the advantages are

endless. Therefore, in the realm of the Internet of Things (IoT) and big data analytics, obtaining

and exploiting such data from the environment and building energy usage to develop a better

monitoring system will always be a challenge. To make automated, adaptive decisions for better

energy use in the future, it is crucial to implement an effective and affordable building monitoring

system. This will allow you to learn more about the building environment and energy

consumption.
Synthesis

The number one concern of an owner who buys a property will always be their safety;

knowing that they are safe makes them more comfortable living in that community. When it

comes to the crime rate here in the Philippines, there are struggles in managing the number of

accidents that happen, especially in an open community like Property Source Ph. (2021).

However, with the help of the patrol guards, security towers, and cameras that are spread all

over the community, whether there are a lot of people in that area or those places that are

visited occasionally by the residents, they are covered. Considering all of this, some of the

benefits of having CCTV cameras around have made a difference in making the community

safe. A well-trained security guard understands how to operate CCTVs and other high-tech

security systems. These are also connected to the major security systems for further security.

This is because a community with an efficient security camera system prioritizes the protection

and safety of all inhabitants and their families.

CCTVs should be installed from the entrance to the parking lot. A security guard

understands how to operate CCTVs and other high-tech security systems. The benefit of

employing qualified security guards is that they know how to handle situations in a way that

does not endanger your tenants. The existence of neighborhood security systems can dissuade

thieves from targeting the community in the first place. Automatic Number Plate Recognition

(ANPR) systems may identify illegal activity on private property.

A Homeowner’s Association must take precautions to protect the safety of all residents,

whether they are at home or out walking in the neighborhood. The Raspberry Pi is one of the

finest partners in today's contemporary world, for everyone from a child to a highly qualified

professional. As a result, acquiring and utilizing data from the environment and building energy
consumption will always be problems in the field of the Internet of Things (IoT) and big data

analytics. It is critical to deploy an efficient and low-cost building monitoring system to learn

more about the building environment and energy consumption.

As supporting details, Wazile (2022) states that having skilled guards that know how to

handle and control the security system is a good asset in observing the events in the area so

that they can cooperate with the authority as soon as possible to prevent any major damage

and disturbance. Nothing compares to the ease and satisfaction when the residents see the

results of hiring an authority that knows how to maintain peace and order in the community and

knows how the security system works. About the 5 uses of automatic number plate recognition

systems in 2021, considering the other four benefits of this system, the automatic number plate

recognition system (ANPR) not only can manage the workload of managing the problem of who

enters and exits the establishment, but it also gives information to the authority of the said

vehicle is a resident or not. The system also gives the proper information the security guard

needs to be able to know the possible anomaly that is happening depending on the situation.

With the help of this system, the response will be faster than a regular or manual check. Most of

the renters are concerned about the overall safety of the property. It is also stated that from the

entrance to the parking lot, your entire organization should have video cameras installed.

According to Property Source Ph. (2021), when it comes to selecting an ideal property, the

safety of the neighborhood is surely one of the top concerns of purchasers. In terms of security,

did you realize that Automatic Number Plate Recognition (ANPR) systems may identify illegal

activity on private property? Because the cameras can detect license plates automatically,

stolen vehicles may be reported to the appropriate authorities for monitoring. If one of these

cars enters the same gate to create additional problems, the perpetrators can be apprehended

and reported to the authorities.


  Furthermore, the existence of this device will prevent possible trespassers. The

existence of neighborhood security systems can dissuade thieves from targeting the community

in the first place. Some of the primary reasons that homeowners prefer to reside in a gated

community are security and privacy (Connie et al., 2018). Baskarana et al. (2018) found that

ALPR is often implemented on a PC-based platform to take advantage of its processing

capacity while processing high-quality images.


Chapter 3

METHODOLOGY USED

Research Design

This study will be using quantitative research technique. The researcher attempted to
find solutions to the issue to support and fulfill the study's goals. Additionally, it tried to
understand the various influences on their way of life.

As stated by Sis International Research (2018), quantitative research is a structured


method of gathering and examining data obtained from various sources. To generate results,
quantitative research employs mathematical, statistical, and computational techniques. It is
conclusive in its intent because it seeks results that can be concluded for a larger population to
quantify the issue and understand how prevalent it is.
 

Methods Used

This study will use SDLC’s Prototype model to build the proposed system of vehicle
recognition using plate numbers. The prototype model refers to the process of creating software
application prototypes that demonstrate the capabilities of the product under development but
may not have the exact logic of the original software.

According to Martin (2019), the prototyping model is a software development model in


which a prototype is developed, tested, and changed until it is acceptable. It also builds the
foundation for the final system or program. It works best when the project's needs are not fully
understood. It is an iterative, trial-and-error process used by both the developer and the
customer.
 This study will run through 6 different phases: Requirement gathering, Quick Design,
Building Prototype, Customer Evaluation, Refining Prototype, and Implementation.
Figure 4. Prototype Model

Phase 1 will be the requirement gathering, where the researchers will collect all the
materials required to successfully build and implement the system. Phase 2 will be the quick
design using the updated minimum requirements. These features are used in a quick design, so
the final software product may not function the same way. However, the overall appearance and
feel would be identical to the initially planned product. Phase 3: Building the Prototype. In this
phase, the researchers will start building the prototype following the previous phase. Phase 4:
Customer Feedback Once the prototype is built, the researchers will consult with the client for
their feedback before proceeding to the next phase.
Phase 5: Refining Prototype after getting the feedback from the client, if there are
evaluations and improvement suggestions, the development team must go back to the Design
Phase, but if there are none, the researchers must proceed to the last step. Phase 6:
Engineering the Product, where the system will be compiled, built in compliance with the client’s
wishes, and fully functional to allow for its implementation.

 
 Description of Respondents

The study will be conducted in PAG-ASA 2 Subdivision, Karuhatan in Valenzuela City,


Philippines. The chosen respondents will be the residents of Pag-Asa Subdivision 2
Homeowner’s Association. The researchers will be asking the respondents chosen by the
president of the homeowner’s association Mr. Ivan Padrinao within the establishment only if
they are one of the owners that live in the said subdivision. The respondents will be interviewed
using a survey questionnaire.
Population Frame and Sampling Scheme

The researchers will be selecting twenty people (20) out of two hundred (200) families
in the PAG-ASA 2 Subdivision with the help of Mr. Ivan Padrinao, the president of the
Homeowner’s association. The Subdivision has an estimated 200 families and most of the
family has vehicles. The selected 20 respondents in the study own a vehicle.

According to Mark (2021), Purposive sampling is a type of non-probability sampling in


which researchers use their discretion in selecting members of the population to participate in
their surveys. Also, according to him, researchers use purposive sampling when they want to
access a particular subset of people, as all participants of a survey are selected because they fit
a particular profile. Purposive sampling occurs when researchers carefully consider how they
will create a sample population, even if it is not statistically representative of the larger
population. Researchers went to this community on purpose, as the name implies, because they
believe these people fit the profile of the people they need to reach.

Purposive sampling will be used in this study. The respondents of this study will be the
selected twenty (20) people that reside in Pag-Asa 2 Subdivision at present. The respondents to
this study will be purposefully selected by the researchers based on the vehicle they have. The
respondents selected by the researchers will be most likely to benefit from the study the
researchers are conducting.
 

Instrumentation Used

Instrumentation in research is the use of measuring tools (such as questionnaires or


interviews) to collect data from research subjects on a certain topic. CINAHL Plus comprises
research instrument records, research instrument validation records, and research instrument
use information (Battle, 2021).
The researchers interviewed the president of the homeowner’s association using an in-
depth interview, also known as an unstructured interview. According to Question Pro (2021),
unstructured interviews are often defined as talks undertaken to gather data for a research
project. These interviews contain the fewest questions since they are more like a typical
discussion with an underlying subject. The major goal of most researchers who use
unstructured interviews is to establish a relationship with the respondents, which increases the
likelihood that the respondents will be completely genuine with their replies.
Based on the software attributes of ISO 25010, the researchers will provide a survey
questionnaire that will consist of questions about the current and proposed systems in the PAG-
ASA 2 Subdivision.
The Likert scale will be used to determine the corresponding answer that is scaled from
1 to 5, which are: strongly disagrees, 2 disagrees, 3 is neutral, 4 is agreed, and 5 strongly
agrees.
 

Data Gathering Procedure

A letter of request to conduct the study was prepared. The researcher constructed a
questionnaire checklist, validated by the professor of the subject then the questionnaire
checklists are distributed. The researchers will conduct the study in Pag-Asa, Valenzuela
through a survey, because of the advantages of the survey method. The researchers will
explain to the respondents the importance of their response to the study. Terminologies that
may not seem familiar to the respondents will be explained so that they will answer with full
knowledge and responsibility.

Figure 3.0 Flowchart

The researchers will request the correspondents to answer with all honesty to get
unbiased data. In this study, since the researcher’s goal is to provide security in the Pag-Asa
Village, the researchers believe that this method is the most appropriate in choosing the sample
for the study. After the respondents answered the questionnaire, the researchers will collect and
tally the data for interpretation. The researcher asks a statistician to help in determining the
appropriate statistical tools to be used and in interpreting the data. Based on the data the
researcher comes up with a conclusion and recommendations for this study.
Statistical Treatment of Data

The statistical treatment for the data that will be collected from the survey questionnaire
is spearman’s rank correlation coefficient to determine whether there is a significant difference
between the current security of the PAG-ASA 2 Subdivision and the proposed vehicle
recognition system using plate numbers of the researchers, where:

p = Spearman's rank correlation coefficient


d = difference between the two ranks of each observation
n = number of observations

Figure 4.0 Spearman’s rank correlation coefficient formula

According to Nagwa (n.d.) Spearman's rank correlation coefficient abbreviated as r is a


numerical number such that 1 r 1. It calculates the probability of one variable growing as the
other rises (a direct relationship) or decreasing as the other increases (an inverse association).
Positive numbers suggest direct relationships, whereas negative values show inverse
associations. A value of 0 indicates that there is no relationship. The stronger the relationship,
the closer r is to 1 or 1, and the weaker the relationship, the closer it is to 0. Rank correlation
coefficient values of 1 or 1 indicate that the ranks either completely agree (r = 1) or are direct
opposites (r = 1).

Ethical Considerations
According to Macnish in his Handbook of Research Ethics (2020), information relating
to the private sphere of a person that they do not want to be shared with others is to be
considered ‘confidential.’ This information would be opposite from ‘public information,’ which
anyone has the right to access. The right of research participants to not share specific
information and to maintain control over their privacy has increasingly been accepted inside and
outside of academics and has become subject to extensive legislation. In research ethics, the
important principle of confidentiality follows an obligation on the part of the researcher to ensure
that any use of information obtained from or shared by human participants respects the dignity
and autonomy of the participant and does not violate the interests of individuals or communities.
The right to confidentiality in research is known in international bio-ethical guidelines, such as
the ‘Helsinki Declaration’ (last updated in 2013), and the European General Data Protection
Regulation (GDPR, effective 2018).

In practice, safeguarding confidentiality entails that the researcher observes the

following restrictions:

• Research participants remain anonymous by default

• Researchers do not obtain private data unless there is good reason to

• Participants must be briefed on the goal or purpose of the research, its means of

investigation, and who has access to the data

• Participants must give active consent, are not coerced to participate, and retain

the right to withdraw their cooperation at any moment (even after the study has

been completed)

• Participants must be provided with an opportunity to review their data and correct any
mistakes they perceive
Informed Consent

Consent should be given freely (voluntarily), subjects must understand what is required
of them, and the parties involved must be empowered to give consent (2). That is, to participate
in a research study, participants must be well-informed about the study, understand the
information, and have the authority to choose whether to participate (3). Participants' consent to
participate in this study was obtained only after a full explanation of the research process. All
participants were required to provide written information indicating their consent. Potential
participants were approached individually and explained the study objectives and data collection
process.

             They were given plenty of time to ask questions and address any concerns. They were
required to sign an informed consent form before the interview to indicate their consent to
participate in the study, and this signature was confirmed before the interview session. Potential
participants were informed of their right to discontinue the study at any time, even after signing
the informed consent form. Permission was also requested to record the interview. The
patient/participant information sheet and informed consent form are available in her two
languages:

Anonymity and Confidentiality

Anonymity and confidentiality of participants were protected by not disclosing their


information, name, or identity in data collection, analysis, or reporting of research results.

 
Appendices
Letter of Intent
Interview Guide Questions
Questionnaire: On the scale of 1-5, tell us how you feel about the following:

Questions
Put a check on the boxes to your
corresponding asnwer
1 2 3 4 5
Functionality
1. The automation of the
subdivision’s security
2. Manual recording of entering and
exiting vehicles on the subdivision
3. Does your current security
system satisfy you
Reliability
1. I feel safe and secure with the
current security system of our
subdivision
2. Does the current manual record
provides correct data about the
vehicles
3. Does the current system have a
backup incase of data loss
Usability
1. Is the system available for
homeowners to access
2. Is the current system record easy
to navigate
3. Is the current system can be
easily operated by new watchmens
Maintainability
1. Can the current system maintain
high accuracy for long period of
time
2. Can the watchmen maintain the
functionality of the system
3. Will the current system function
without a personnel or administrator
Efficiency
1. Does the watchmen perform with
high efficiency
2. Does the new system provide
innovation compared to the
previous one?
3. Does the current system make
the watchmen more productive?
Portability
1. Is the system portable enough to
be transported to another place if
needed?
2. Does the system fit physically in
the security guard office?
3. Does the system is operable in
other devices such as
smartphones?

Survey Tool
Curriculum Vitae
Curriculum Vitae
References:

Published by Statista Research Department, & 5, J. (2022, July 5). Philippines:


Average daily traffic metro manila by Vehicle Type 2021. Statista. Retrieved
from https://www.statista.com/statistics/1262359/philippines-average-daily-
traffic-metro-manila-by-vehicle-type/

7 things you should do when your car is stolen. CarGuide.PH | Philippine Car
News, Car Reviews, Car Prices. (n.d.). Retrieved from
https://www.carguide.ph/2017/02/7-things-you-should-do-when-your-car-
is.html?m=1

Velimirovic, A. (2022, November 17). What is SDLC? understand the software


development life cycle. phoenixNAP Blog. Retrieved from
https://phoenixnap.com/blog/software-development-life-cycle

www.wazile.com, W. T. S.-, & Wazile. (2020, July 24). Benefits of hiring security
guard in real estate in the Philippines. Corinthians Group of Companies.
Retrieved from https://www.corinthiansgroup.com/benefits-of-hiring-security-
guard-in-real-estate-in-the-philippines/

Blog-manager. (2021, March 22). 7 benefits of living in gated communities.


Property Source PH. Retrieved from https://propertysourceph.com/benefits-
living-gated-communities/?
fbclid=IwAR2v7KSbkjLmiXniudL6tMGUBnK7aKuNdccZ544cnvPp1Q70E4kf_
QxD4Lg

Blog-manager. (2021, April 15). 5 uses of Automatic Number Plate Recognition


Systems. ELID Technology Intl., Inc. Retrieved from
https://elid.com.ph/blog/uses-automatic-number-plate-recognition-system/

Delcoro, D. (2019, October 11). Benefits of installing Neighborhood Security


Systems. Security Camera King. Retrieved from
https://www.securitycameraking.com/securityinfo/benefits-of-installing-
neighborhood-security-systems/
Connie, L., On, C. K., & Patricia, A. (n.d.). A review of Automatic License Plate
Recognition System in mobile based platform. Journal of Telecommunication,
Electronic and Computer Engineering (JTEC). Retrieved December 11, 2022,
from https://jtec.utem.edu.my/jtec/article/view/4715?
fbclid=IwAR0JpH5oi1DKLHiY3KtGGf0aHiszcbjL-Q6ZIn3Q-
HX5FKk7FTJRp5VpnmE

International, S. I. S. (2018, December 18). What is quantitative research? SIS


International Market Research. Retrieved from
https://www.sisinternational.com/what-is-quantitative-research/

Martin, M. (2022, November 19). Prototype model in software engineering.


Guru99. Retrieved December 11, 2022, from
https://www.guru99.com/software-engineering-prototyping-model.html

Nagwa. (n.d.). Lesson Explainer: Spearman's rank correlation coefficient


mathematics. Nagwa. Retrieved December 11, 2022, from
https://www.nagwa.com/en/explainers/412129796494/#:~:text=Formula%3A
%20Spearman%27s%20Rank%20Correlation%20Coefficient,points%20in
%20the%20data%20set

Jordan, M. (2021, August 26). Purposive sampling 101: Alchemer blog. Alchemer.
Retrieved December 11, 2022, from
https://www.alchemer.com/resources/blog/purposive-sampling-101/#:~:text=
What%20is%20Purposive%20Sampling%3F,to%20participate%20in%20their
%20surveys

K. Macnish, Privacy in research ethics, in: R. Iphofen (Ed.), Handbook of Research

Ethics and Scientific Integrity, Springer International Publishing, 2020.

Venkat Subramanian Arumuga Perumal, Krishnamoorthy Baskaran, Suleman Khalid


Rai,IMPLEMENTATION OF EFFECTIVE AND LOW-COST BUILDING MONITORING
SYSTEM(BMS) USING RASPBERRY PI,Energy Procedia,Volume 143,2017,Pages179-
185,ISSN1876-6102, https://doi.org/10.1016/j.egypro.2017.12.668.

You might also like