You are on page 1of 60

Android Based Security System …

Android based Hacking Security System for Barangay Marulas ,Valenzuela City

Jose Rizal1, 2,4,5, Andres Bonifacio 1, 2,4,5 , Apolinario Mabini1, 2, 4,5,

Juan de la Cruz5, Walfredo G Santos6

1
Information Technology

2
College of Computer Studies

3
Research Development and Innovation Center
4
Our Lady of Fatima University

5
Research Adviser

6
Technical Adviser

December 2023

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Endorsement
This IT Capstone Project Entitled “Android based Hacking Security Sytem ” prepared by Jose G.
Rizal, Andres M. Bonifacio , Apolinario R. Mabini of BSIT 4Y2-3, in partial fulfillment of the
requirements for the degree of Bachelor of Science in Information Technology has been examined and
now recommended for Oral Examination.

Walfredo G. Santos, M.S.I.T, M.A.Ed Juan M. de la Cruz, MSCS ,


Research Adviser Technical Adviser

Approval Sheet
This is to certify that their IT Capstone Project Entitled “Android based Hacking Security Sytem” for
the possible use of contact tracing in 143 Rizal St. ,Malanday , Valenzuela City prepared and submitted
Andres M. Bonifacio , Apolinario R. Mabini of BSIT 4Y2-3 is recommended for Oral Examination.

Juana N. de la Cruz, MSIT, MAEd


Chairman

Juan de la Cruz , MSIT Juan de la Cruz, MIT


Member Member

Endorsed in partial fulfillment of the requirements for the degree Bachelor of Science in Information
Technology.

Prof. Raymond S. Macatangga, DIT, PhD, EdD, DSc, DPA


Dean, College of Computer Studies

Certificate of Originality

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

We hereby declare this Capstone Project is our own work and that, to the best of our knowledge and
belief, it contains no material previously published or written by another person nor material to which to a
substantial extent has been accepted for award of any other degree or diploma of a university or other
institute of higher learning, except where due acknowledgement is made in the text.
We also declare that the intellectual content of this capstone is the product of our work, even though we
may have received assistance from others on style, presentation and language expression.

Proponents

Juan de la Cruz
Principal Investigator

Members:

Juan de la Cruz2

Juana de Cruz 3

Walfredo G. Santos, MSIT, MAed


Research Adviser

Juan de la Cruz , MSCS


Technical Adviser

January 2022
Date Signed

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Acknowledgement
First and foremost, we honor and thank the Lord, the Almighty, for his showers of blessings
during our study work in order to successfully complete the research.
We would really like to express our deep and heartfelt appreciation to our Technical Adviser,
________________for giving us the opportunity to conduct research and provide useful assistance
throughout this study. We were profoundly motivated by his dynamism, vision, honesty and inspiration.
And to our Research Adviser, ___________________, who taught us the methods for performing
the study and presenting the research work as clearly as possible. Working and learning under his
guidance was a great privilege and honor. We are extremely appreciative of what he has given us.
We would like to thank them for their friendship, empathy and patience during the discussion that
we had with them on the preparation of research thesis.
We are deeply grateful to our parents for their devotion, care for prayers and sacrifices for
educating us and training us for our future.
We thank our brothers and sisters very much for their devotion, understanding, prayers and
continued support to successfully complete this research work

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Dedication
This study is wholeheartedly dedicated to our beloved parents who have been our constant source
of inspiration and gave us strength when we thought of giving up, who continually provide their moral,
spiritual, emotional and financial support They have given us the drive and discipline to tackle a task with
enthusiast and determination.
To our brothers, sisters, relatives, mentor, friends, and classmates who shared their words of
advice and encouragement to finish this study.
And lastly, we dedicated this research to the Almighty God, thank you for the guidance, strength,
power of mind, protection, skills and for giving us a healthy life. All of these, we offer to you.

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Executive Summary
Our IT Capstone Project Proposal aims to develop a Security System prototype to assist the
recipient to company security sytem, as we all know that hacking of system has been an ongoing threat in
the reliance of the society in the internet technology . The purpose of this study is to create a security
system prototype that can also help City Government of Valenzuela to secure its data that relies on the
internet technology.
The researchers conducted a survey at City Government of Valenzuela the respondents are 75%
aEnd-users and 25% IT Experts. Researchers used agile model methodology, in agile there is a constant
development sequence and testing .
The developed system was evaluated in terms of Functionality, Reliability, Usability, Efficiency,
Maintainability, Portability, Compatibility and Security. The overall result is 4.07 which means the rating
is Very Acceptable.
The proposed system entitled ”Android based Security System” will definitely improve the
security of confidential data.

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Table of Content
Page

Title Page …………………………………………………………….………..i


Endorsement………………………………………………….………………..ii
Certificate of Originality……………………………….……………………..iii
Acknowledgement……………………………….………………………...….iv
Dedication……………………………….………………………………….…v
Executive Summary……………….…………………………………………..vi
Table of Content………………………………………………………………vii - viii
List of Figures…………………………………………………………………ix
List of Tables……………………………………………………………….….x
List of Appendices……………………………………………………………..xi
1.0 Introduction………………………………………………………….……..1
1.1 Background of the Study…………………………………….……..1 - 2
1.2 Objectives of the Study……………………………………….……1
1.2.1 General Objective…………………………………...…2
1.2.2 Specific Objective……………………………………...2
1.3 Scope and Limitations of the System……………………………....2
1.4 Significance of the Study…………………………………………..3
2.0 Review of Related Literature and Studies………………………………....4
2.1 Related Literature……………………………………………….....4
2.1.1 Local Literature……………………………………...…4
2.1.2 Foreign Literature…………………………………...….10
2.2 Related Studies………………………………………………...…..15
2.2.1 Local Studies……………………………………...…...15
2.2.2 Foreign Studies…………………………………...……22
2.3 Definition of Terms…………………………………………...…...28
3.0 Research Design and Methodology…………………………………...…...30
3.1 Conceptual Framework……………………………………..……..30
3.2 Project Development Life Cycle…………………………..……....30
3.3 Requirement Documentation……………………………..………..33
3.3.1 System Architecture...………………………..….….....34
3.3.2 Use Case Diagram……………………………….……...35
3.3.3 Context Diagram………………………….…………….35
3.3.4 Data Flow Diagram………………………….………….36

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

3.3.5 Entity Relationship Diagram……………………………37


3.3.6 Context Diagram………………………………………..37
3.4 Population, Sampling and Research Locale………………………...38
3.5 Research Instrumentation…………………………………………...39
3.6 Evaluation Procedure and Ethical Section………………………......39
3.6.1 Risks and Benefits of the Research Study…………………......40
4.0 Results and Discussions………………………………………………….….41
4.1 Project Description…………………………………………….……41
4.2 System Requirements……………………………………….………41
4.3 Result…………………………………………………….………….42
4.4 Procedure for the Calculation of Data………………………………42
4.5 Presentation of Data………………………………………………...43
4.5.1 Respondents Role……………………………………………..43
4.6 Evaluation Assessment………………………………………….......43
5.0 Summary, Conclusion, Recommendation…………………………………..48
5.1 Summary………………………………………………………….…48
5.2 Conclusions………………………………………………………….48
5.3 Recommendation……………………………………………………49

Bibliography or References……………………………………………………..49-52
Appendices………………………………………………………………………54-75
Researcher’s Profile of Curriculum Vitae……………………………………….80-81

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

List of Figures
Page
Figure 1: Conceptual Framework 32
Figure 2: Agile Approach 32
Figure 3: System Architecture 33
Figure 4: Activity Diagram 34
Figure 5: Data Flow Diagram 35
Figure 6: Circuit Diagram 37
Figure 7: Entity Relationship Structure 37
Figure 8: Context Diagram 40

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

List of Tables
Page
Table 1: Role of Respondents 40
Table 2: Mean distribution of respondents rating according to Functionality 43
Table 3: Mean distribution of respondents rating according to Reliability 43
Table 4: Mean distribution of respondents rating according to Usability 44
Table 5: Mean distribution of respondents rating according to Efficiency 45
Table 6: Mean distribution of respondents rating according to Maintainability 45
Table 7: Mean distribution of respondents rating according to Portability 45
Table 8: Mean distribution of respondents rating according to Compatibility 46
Table 9: Mean distribution of respondents rating according to Security 47
Table 10: Summary of the weighted mean for Android based Security System

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

List of Appendices
Page
Appendix A: Technical Adviser Agreement Form 53
Appendix B: Letter of consent to conduct a survey and interview 54
Appendix C: Documentation Pictures during the interview to 56
Appendix D: Informed Consent Form 57-62
Appendix E: Survey Questionnaires 63-64
Appendix F: User Manual 65
Appendix G: Screenshots of the system 66
Appendix H: Documentation Pictures of Actual Testing of End-Use 66
Appendix I: Evaluation Form 68-69
Appendix J: Raw Data (Evaluation of IT Expert/End-Users) 70
Appendix K: IT Capstone Project Progress Report 71
Appendix L: User Acceptance Form 72
Appendix M: TURNITIN Result 75
Appendix N: Ethical Review Certificate

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

1.0 Introduction

In today world reliance in Computer technology is very much evident from


Education, Government Services, Transportation, Business, Entertainment, National
Security , Science and Technology……

The Agricultural Industry is encountering problems in the effects of pest in the


area of Region 3 (DA, 2022). Therefore the proponents are developing a system that
will help augment the on this problem by using an Arduino sensor that will detect the
propagation of pest, in which a pesticide will automatically activates with SMS
notification.

1.1 Background of the Study

The security breach that has happened to giant companies such as Google and Facebook
are one of the reason why this research was………….

1.2 Objectives of the Study


1.2.1 General Objective
To develop an Android based Security System
Specific Objective
 To create an Arduino sensor that will detect the insects that damage the
rice stalk in the area of Region 3.
 To send an SMS notification via an Android phone
 To store the information of the date & time of the activation of the system
using PHP/SQL

• To design an application program that can monitor the security system

• To create a detection of IP addresses that attacks the server system

• To use an Android based phone as the platform

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

• 1.3 Scope and Limitations

The scope of this project is to create a security system for the Area of City of
Valenzuela ………

1.3.1 Limitations of the Study

• The limitations of this project is it doesn’t run in IOS phone……..

1.4 Significance of the Study

• Technology is constantly evolving and it will remain constant. It will always bring new
mind blowing discoveries that people can think of especially for this study that will
benefit and be useful for the following.

City Government of Valenzuela

• This system will help the city government in its server system.

Future Researchers

• It will help another researcher to create a strong server system.

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

2.0 Review of Related Literatures and Studies

2.1 Related Literatures

2.1.1 Local Literature

As stated by DOLE (August 30, 2020) designing the QR code for COVID-19 health
checklist to inc lude the distribution of COVID-19, the regional office of the labor
department in the industry-rich Calabarzon has established a Fast Response (QR) code
that takes body temperature, writes contact information, and enables visitors and workers
to be easily tracked.

In the meantime, asymptomatic patients who have not displayed symptoms in isolation
after 14 days will still be deemed to have recovered after not having another PCR
examination. Before being accepted to return to their families, they would only require a
doctor 's degree.

According to (De Vera ,2020) …………………………

According to Robert D Arcayena profile imageRobert D. Arcayena, Alessis D Ballarta


profile imageAlessis D. Ballarta, Kendall N Claros profile imageKendall N. Claros,
Rodrigo S Pangantihon

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

institutions and make use of essential products and services. The Actions registration of
institutions takes place from 28-29 July, while the issuing of QR codes begins on 30 July,
the local government said.

2.1.2 Foreign Literatures

According to Mckinsey and Company (October 7,2020) Implication for business, As the
effects of the pandemic intensify gender inequality,

, with supply chain disruptions being less of a factor. On average, since January, firms
have recorded a decrease in their active workforce of 39 percent.

2.2 Related Studies

2.2.1 Local Studies

According to Jeson Jacinto improvement; Thus, the Quick Response Code Scan
Attendance Manager program is beneficial not only by supplying teachers with ease, but
also by

to the participants after bug checking was completed.

According to Michael Angelo C. Maleriado

. This is where an instructor would usually call the students' names separately and wait
for them to lift their hands. Although this may seem effective, it may take a lot of time
and repetition, which may destroy the students ' confidence or willingness to come to
class (Rizal et al., 2016). Indeed, it takes time and consumes a lot of papers and cash to
audit the attendance in the classroom historically. QR codes are typically used to connect
to the website, promotional items, price, online menus, and sign-up pages of the contest
to businesses (Singh, 2016).

2.2.2 Foreign Studies

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

According to Eun-bin Park, Seyed Jamaleddin Mostafavi Yazdi, and Jong-Ha


Lee, during cellular oxidative metabolism

of

2.3 Definition of Terms

Android An Operating System ……

Database – an electronic system that allows data to be easily accessed

3.1 Conceptual Framework (IPO Model)

INPUT PROCESS OUTPUT

Requirements
1. Knowledge Requirements
- Related Literature
- Local and Foreign Design
Literature
- Open Source
2. System Requirements Development “Andorid Based
2.1 Hardware Requirements
- Desktop Computer Security
- Raspberry Pi 3 B Quality
- System”
- LED screen Assurance
- Mobile phone
2.2 Software Requirements
-
User
- PHP
- Health Assessment Docs
Forms Acceptance
-
- MySQL

EVALUATION

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Figure 1: Conceptual Framework of “Contact Tracing and Monitoring System


Using QR Code and Temperature Scanner”

Figure 1 shows the input-process-output (IPO) model, or input-process-output


pattern, is a widely used approach in systems analysis and software engineering for
describing the structure of an information processing program. …………..

3.2 Project Development Life Cycle (Agile Approach)


This chapter the proponents gather a data base on clients' needs and determine the
user’s expectation for a new or modified system.

Requirements
Here, in this organize, the prerequisites, which those projects may be setting off to
fulfill are recorded. ……….

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

The Agile methodology is a way to manage a project by breaking it up into several


phases. It involves constant collaboration with stakeholders and continuous improvement at
every stage. Once the work begins, teams cycle through a process of planning, executing, and
evaluating.

Design
The proponents design……...
Development
The coding procedure starts at this stage. ………..
Quality Assurance
The programmer is in charge of debugging ………..
User Acceptance Testing
The proponents will conduct a test to determine …………

3.3 Requirement Documentation


This chapter consists of system architecture, activity diagram, data flow diagram.

3.3.1 System Architecture of “Android based Security System”

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Figure 3: System Architecture of “Android based Security System”


The figure 3 shows the system architecture of the application, what the user can
do and the flow of the application upon…

A system architecture is the conceptual model that defines the structure, behavior, and
more views of a system. An architecture description is a formal description and representation
of a system, organized in a way that supports reasoning about the structures and behaviors of
the system.

3.3.2 Activity Diagram of “ Android Security System”

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

An activity diagram is a behavioral diagram i.e. it depicts the behavior of a system. An


activity diagram portrays the control flow from a start point to a finish point showing the various
decision paths that exist while the activity is being executed

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

3.3.3 Data Flow Diagram of “Contact Tracing and Monitoring System Using
QR Code and Temperature Scanner”

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Figure 5 above shows the data flow diagram of Android Based Security System The user must
scan first the ………

A data flow diagram (DFD) maps out the flow of information for any process or system. It
uses defined symbols like rectangles, circles and arrows, plus short text labels, to show data
inputs, outputs, storage points and the routes between each destination.

3.3.5 Entity Relationship Diagram of…

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

An entity–relationship model (or ER model) describes interrelated things of interest in a specific


domain of knowledge. A basic ER model is composed of entity types (which classify the things of
interest) and specifies relationships that can exist between entities (instances of those entity types).

Figure 3

The Entity relationship diagram(ERD) explains the flow of the system with regards to registration the first
table1 is the main system (home page) then it communicates with the branch 1 and branch 2

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Figure 4

The Use case diagram explains the manager checking the purchase of the customer

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

A use case diagram is a graphical depiction of a user's possible interactions with a system. A use
case diagram shows various use cases and different types of users the system has and will often be
accompanied by other types of diagrams as well. The use cases are represented by either circles or
ellipses.

White-box testing (also known as clear box testing, glass box testing, transparent box testing,
and structural testing) is a method of software testing that tests internal structures or workings of
an application, as opposed to its functionality (i.e. black-box testing). In white-box testing an internal
perspective of the system, as well as programming skills, are used to design test cases.

Black-box testing is a method of software testing that examines the functionality of an application
without peering into its internal structures or workings. This method of test can be applied virtually to
every level of software testing: unit, integration, system and acceptance. It is sometimes referred to
as specification-based testing

Gray-box testing (International English spelling: grey-box testing) is a combination of white-box


testing and black-box testing. The aim of this testing is to search for the defects, if any, due to
improper structure or improper usage of applications.

3.4 Testing and Evaluation’

3.4.1 Respondents (Data Gathering Procedures)

The proponents chose Fifteen (15) people from a population of ten (10) students, two (2) Deans,
and three (3) information technology specialists as contributors, and entered the criteria from our
performed study. Respondents were notified about the study using an online form (Google Forms), which
provided them with enough information about the system. As it went by, following the briefing, we
distributed the questionnaires to each respondent by sending them on social media (Facebook). The
research takes place over the course of two years (Capstones 1 and 2). During that time, communication
with respondents will take place through social media platforms such as Facebook or email for the
purpose of conducting interviews. Each interview will take place at least once every one to two months,
and it will last between 15 and 30 minutes, depending on how much time the respondent is available. The
inclusions of this study are the following: Teachers, Dean and students. The chosen participants must be a
resident or residing at the location of Brgy. Pag-ASa, Valenzuela City. And the exclusions are the
proponents will not entertain respondents that are outside of the vicinity of Pag-asa,

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

3.4.1.1 Research Design

The researchers utilized a quantitative design in the research entitled “Android Security System”
in Brgy. Pag-asa, Valenzuela City. Quantitative research is described as event-based study that use
measurable statistics and data, as well as statistical and numerical tools. To obtain information about
present and future customers, the quantitative system necessitates the use of data collecting methods such
as survey responses, polls, enquiries, and other types of data gathering with numerical conclusions. After
having a complete understanding of these figures, you can forecast every outcome so that we can make
appropriate adjustments. A descriptive study goal was to determine the current state of a known samples.
The objective of these studies is to give precise proof and data. The researcher will more likely construct
a hypothesis after accumulating data, rather than starting with one. The information will be analyzed and
compiled to answer the study question. The careful selection
3.4.1.2 Sampling and Population

Population refers to the entire elements with common characteristics. The proponents intend to
conduct a survey of experts involved in the development of information systems. Ten (10) teachers from
Pag-asa, Valenzuela, two (2)Deans , and three (3) information technology specialists will take part in this
research. A total of fifteen (15) replies were received. . Sampling is the process whereby a small portion
or subgroup is selected for analysis. The proponents will utilize non- probability sampling, which means
that participants will not be chosen at random, and purposive sampling, which means that a non-random
sample will be chosen because they fulfill the study criteria. To compute the overall value of the data, the
proponents additionally incorporated the Weighted arithmetic mean; Weighted average = sum of
variables (weights) / total weights.
3. 4.1.3 Research Locale

All of the participants in our study are locals of Brgy. Pag-asa in Valenzuela City. Outsiders or
those who are not inside the stated area will not be acknowledged or entertained by the proponents.

3.4.1.4 Data Gathering Procedure

The proponents chose Ten (10) Students , Two (2) Deans, and Three (3) IT Professionals who reside in
Brgy.Pag-asa , Valenzuela City serves as a sample that participated and supported the study.
The proponents briefed the respondents about the study through an online form (google forms) that gave
them enough knowledge about the study that the researchers are conducting and to also safeguard each
respondent during these times of a pandemic. After the briefing process, the researchers disseminate the
questionnaires through Facebook, Messenger, and Google, an online platform to each respondent.

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

The questionnaires include the different views about delivery services and how familiar they are with this
kind of an application. After gathering the data, the proponents tallied the scores then proceeded to use
the WAM as a tool to analyze the data using the weighted mean formula to figure out what statistical
modifications are done to the survey data after it's been gathered to increase the survey estimates
accuracy. All information received will be keep in strict confidence and used only for academic
purposes. All of your information will be keep private, and only our group (proponents) will be aware of
your answer. The information provided to the proponents by the respondents will not be shared with
anyone outside of the research group, and nothing will be attributed to you by name.

3.4.1.5 Ethical Consideration

The proponents will provide an informed consent form that contains name of participants, Information
sheet, that includes Introduction, Purpose, Participant’s selections that giving a basic info of the form. We
include also the Procedures, Duration, Risk, Benefits of the corresponding users specially rider
community. Confidentiality will be the one that priors the system and information and most
importantly It will be used for academic purposes only. The results will be collected to offer findings to
the research, and participation will be fully voluntary, with willing target respondents receiving a Letter
of Consent. This will enable both parties to accept the research, and all information on the
respondents will be shared in strict confidence and kept private.
3.4.1.5 Ethical Consideration

3.4.1.6 Research Instrument (Survey Form)

3.4.1.6 Research Instruments

The tools utilized is a survey questionnaire and an informed consent form, one
in each of the English and Filipino languages, were supplied to each respondent to
ensure that they were comfortable completing the questionnaire. It would take roughly

15 to 30 minutes to complete the task using the social networking platform. Your
personal information will be keep private, and only proponents will be aware of your
responses to our inquiry. In addition, a Virtual Meeting may be organized to assist them
understand the research better.

3.4.2 Testing Procedure

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Alpha Testing
The proponents employed alpha testing, a kind of acceptance testing, to uncover all
possible flaws and weaknesses before releasing the final framework to end users. Alpha testing is
carried out by members of the group's own team of testers. The main goal is to describe and test
the tasks that would be performed by a typical user.
To summarize it as simply as possible, alpha testing is referred to as such since it occurs
before beta testing in the software development process. The purpose of alpha is to emply black box and
white box appproach
3.4 Evaluation Procedure

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

4.0 Result and Discussion


This section presents the basic descriptive about the evaluation assessment.
4.1 Project Description
As the Covid-19 spreads, researchers created…….
, PHP, and Python.
4.2 System Requirements
The system will run with a minimum requirement of an android smartphone of at
least 2 GB of RAM and a 200 MB of free internal phone storage and Marshmallow as a
lowest version of Android Operating System

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Hardware Requirements………………………
4.3 Result
This chapter illustrate the data gathered from IT expert and customers. The result
of the software evaluation were discussed by the researchers, from 30 respondents.

4.4 Procedure for the Calculation of Data


The weighted mean of the data set provided by x1, x2, x3 ... xn may be regarded to
be the total data multiplied by the corresponding weight or frequency.

Where: wi = the weight of the frequency


xi = the given data w = sum of weights or frequencies
4.5 Presentation of Data
Tabular data is one of the popular used for presenting big amount of data its easy
to create and readable.
Table 1.0 Role of Respondents
Respondent Role Frequency Percentage
Owner 1 5%
Representative of Valtrace 1 5%
IT Expert 3 15%
Customer 25 75%
Total 30 100%

4.5.1 Respondents Role

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

The 30 participants are divided into four (4) different categories, the owner,
Valtrace representative, IT expert and the customer. The table indicates 5 percent
by the maker, 5 percent by the Valtrace representative, 15 percent by the IT specialist
and 75 percent by the client this mean the proponents prioritize the convenience for the
customers.

4.6 Evaluation Assessment


This section present the analysis and interpretation of the data gathered from the
respondent of the study. The proponents administered a evaluation form wherein the
respondents have to rate the proposed system. The evaluation measured by the
functionality, reliability, usability, efficiency, maintainability and portability of the
software.

Table 2.0 The assessment of the respondent on the Functionality of Contact Tracing
and Monitoring System Using QR Code
Functionality Mean Interpretation
The system has suitable but appropriate set of 4.23 Very Acceptable
Function in accordance with its system
objectives.

The system provides accurate result. 4.17 Very Acceptable

The system addresses the defined set of needs 3.90 Very Acceptable
Overall Weighted Mean 4.10 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable

Table 2.0 shows the functionality


Table 3.0 The assessment of the respondent on the Reliability of Contact Tracing and
Monitoring System Using QR Code
Reliability Mean Interpretation
It has ability to maintain a specified level of 4.03 Very Acceptable
performance in case of software faults or of
infringement of its specified interface.

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

It has capability to re-establish its level of 3.80 Very Acceptable


performance and recover the data directly
affected in case of a failure and on time and
effort needed for it.
Overall Weighted Mean 3.92 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable

Table 3.0 shows the reliability assessment of the Contact Tracing and
Monitoring System Using QR Code that had been evaluated by the respondents. The respondent’s
feedback is very acceptable in terms of the system reliability. This implies that the respondents
accepted the reliability of the system.

Table 4.0 The assessment of the respondent on the Usability of Contact Tracing and
Monitoring System Using QR Code
Usability Mean Interpretation
It is easy for the users to recognize its logical 3.80 Very Acceptable
concept and applicability.

It is easy for the user to learn its application. 3.80 Very Acceptable

The system and the hardware are easy to 3.83 Very Acceptable
operate.
Overall Weighted Mean 3.81 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable
Table 4.0 shows the usability assessment
Table 5.0 The assessment of the respondent on the Efficiency of Contact Tracing and
Monitoring System Using QR Code
Efficiency Mean Interpretation
It has acceptable response and processing time 4.17 Very Acceptable
throughout the rates.

It consistently uses enough computing 3.93 Very Acceptable


resources (memory space) for all its function.
Overall Weighted Mean 4.05 Very Acceptable

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable

Table 5.0 shows the efficiency assessment of the Contact Tracing and
Monitoring System Using QR Code that had been evaluated by the respondents. The
respondent’s feedback is very acceptable in terms of the system usability. This implies that the
respondents accepted the usability of the system.

Table 6.0 The assessment of the respondent on the


Maintainability Mean Interpretation
It is relatively easy to modify the software or 3.63 Very Acceptable
remove faults.

It is deemed stable when modified. 3.67 Very Acceptable

It is easy to validate any modification made. 3.97 Very Acceptable


Overall Weighted Mean 3.76 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable

Table 6.0 shows the maintainability

Table 7.0 The assessment of the respondent on the Portability of Contact Tracing
and Monitoring System Using QR Code
Portability Mean Interpretation
It could adapt to different specified 4.07 Very Acceptable
environments without applying other actions or
means that those provided for this purpose for
the software considered.

It is easy to install the software in specified 4.10 Very Acceptable


environment.
Overall Weighted Mean 4.08 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable

Table 7.0 shows the portability

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Table 8.0 The assessment of the respondent on the


Compatibility Mean Interpretation
Two or more systems, products or components 4.10 Very Acceptable
can exchange information that has been
exchanged.
Overall Weighted Mean 4.10 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable

Table 8.0 shows the compatibility

Table 9.0 The assessment of the respondent on


Security Mean Interpretation
The prototype ensures that the data are 3.90 Very Acceptable
accessible only to those authorized to access.

The system prevents unauthorized access to, or 4.07 Very Acceptable


modification of computer programs or data.

The action of an entity can be traced uniquely 3.83 Very Acceptable


to the entity.

The identity of a subject or resource can be 3.90 Very Acceptable


proved to be the one claimed.
Overall Weighted Mean 3.93 Very Acceptable
5.00-4.51 Highly Acceptable, 4.50-3.51 Very Acceptable, 3.50-2.51 Acceptable, 2.50-1.51 Moderately
Acceptable and 1.50-1.00 Unacceptable

Table 9.0 shows the security assessment


Table 10 Summary of the weighted average of Contact Tracing and Monitoring System
Using QR Code
Criteria Mean Interpretation
Functionality 4.10 Very Acceptable

Reliability 3.92 Very Acceptable

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Usability 3.81 Very Acceptable

Efficiency 4.05 Very Acceptable

Maintainability 3.76 Very Acceptable

Portability 4.08 Very Acceptable

Compatibility 4.10 Very Acceptable

Security 3.93 Very Acceptable


Overall Weighted Mean 3.97 Very Acceptable

Table 10 shows the overall weighted mean for IT Experts and End Users. Overall
the systems performance evaluation is 3.97 or Very Acceptable.

5.0 Summary, Conclusion, and Recommendation


This chapter illustrate the ………..

5.1 Summary
Health professionals and Government inform …………………..
5.2 Conclusion
The proponents conclude that ……..
5.3 Recommendation
By thorough examining of the ……………………

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

REFERENCES

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Local Literature

Minka Klaudia Tiangco(2020), “Valenzuela to comply with new method of classifying


COVID-19 recoveries” retrieved from https://mb.com.ph/2020/08/02/valenzuela-to-
comply-with-new-method-of-classifying-covid-19-recoveries/

Department of Labor and Employment (August 30, 2020), DOLE develops QR code for
COVID-19 health checklist retrieved from

https://www.dole.gov.ph/news/dole-develops-qr-code-for-covid-19-health-checklist/

Analou De Vera (2020), Philippines breaches 30,000 COVID-19 cases, after 653 new
infections retrieved from
https://mb.com.ph/2020/06/21/philippines-breaches-30000-covid-19-cases-after-653-
new-infections/
Robert D Arcayena profile imageRobert D. Arcayena, Alessis D Ballarta profile
imageAlessis D. Ballarta, Kendall N Claros profile imageKendall N. Claros, Rodrigo S
Pangantihon profile imageRodrigo S. Pangantihon 2019 6th International Conference on
Bioinformatics Research and Applications (December 2019), Development of Arduino
Microcontroller-based Safety Monitoring Prototype in the Hard Hat retrieved from
https://dl.acm.org/doi/10.1145/3383783.3383790
Gerico Sabalza (August 7, 2020), S. Leyte town registers 218 firms in digital tracing
system retrieved from
https://www.pna.gov.ph/articles/1111549
Mckinsey and Company (October 7,2020), COVID-19 and the great reset: Briefing note
#32, November 18, 2020 retrieved from
https://www.mckinsey.com/business-functions/risk/our-insights/covid-19-implications-
for-business#

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDICES

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX A: TECHNICAL ADVISER AGREEMENT FORM

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX B: LETTER OF CONSENT TO CONDUCT A SURVEY AND INTERVIEW

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX C: DOCUMENTATION PICTURES DURING THE INTERVIEW TO

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX D: INFORMED CONSENT FORM

Informed Consent Form for


This informed consent form is fo………
[Name of Investigator]: J
[Name of Co-investigators]: ……………..
[Name of Organization]: Our Lady of Fatima University, College of Computer Studies
[Name of Project]: “Security Systemr"

Information Sheet
Introduction
I am _____________and on behalf of my members, a thesis researcher of Our Lady of Fatima University, College
of Computer Studies. We are doing a research that is all about …….
Purpose of the research
Having the knowledge nowadays to know how the virus is being transmitted from one person to another and
following the health safety protocols in Valenzuela City to ………..
Type of Research Intervention
As the evaluators, you will be given a System/Software Evaluation Form to fill in for this research. This will be
implying your participation in a 30 minutes evaluation.

Participant Selection
You are being invited to take this part of this research because we feel that you’re a potential participant, or as a
responsible citizen can contribute much to our understanding and knowledge of Contact Tracing in the Philippines.

Voluntary Participant
Your Participation in this study is voluntary. You have the right not to participate at all or to leave the study at any
time. Deciding not to participate or choosing to leave the study will not result in any penalty or loss of benefits to
which you are entitled, and it will not harm your relationship with your family and friends as well.

Procedures
We are asking you to help us to learn more about Contact Tracing and monitoring possible carriers of the virus . We
are inviting you to take part in this research project. If you accept, you will be asked the important information about
the Road Rules and Regulation in the Philippines.

(For Software Evaluation Form)


These are the steps that we will do during the evaluation:

Step 1: I or another member of the researcher will sit down with you in a comfortable place and you will fill out an
evaluation form which will be provided by the research group and collected by the member
Step 2: You may answer the questionnaire yourself, or it can be read to you and you can say out loud the answer you
want me to write down. If you do not wish to answer any of the questions included in the evaluation form, you may
skip them and move on to the next question

Step 3: No one else but the researcher will be present unless you would like someone else to be there.

Step 4: Once you are finished filling out the evaluation form, the entire information that will be collected in the form
including your name will treat as a highly confidential matter, and no one else except me and the other member of
the research group will have access to your evaluation.

Duration

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

The research takes place over 1 day in total. During that time, we will ask you for the Evaluation and each
evaluation will last about 30 minutes

Risks
If the evaluation is on sensitive, confidential and personal issues e.g. personal habits, "We are asking you to share
with us some very personal and confidential information, and you may feel uncomfortable talking about some of the
topics. You do not have to answer any question or take part in the evaluation if you don't wish to do so, and that is
also fine. You do not have to give us any reason for not responding to any question or for refusing to take part in the
evaluation".

Benefits
We can't guarantee that you will personally experience benefits from participating in this study. Others may benefit
in the future from the information we find in this study.

Reimbursements
You will not be provided any incentive to take part in the research. However, there will be no payments or
reimbursement for this study.

Confidentiality
The information in this study will be kept confidential. The data we gather will be kept securely and will be made
available only to persons conducting this research unless evaluators give permission in writing to do otherwise. It
will not be shared with or given to anyone except to the researchers.

Sharing the Results


Nothing that you tell us today will be shared with anybody outside the research team, and nothing will be attributed
to you by name. The knowledge that we get from this research will be shared with you before it is made widely
available to the public. Each participant will receive a summary of the results. We will publish the results so that
other interested people may learn from the research.

Right to Refuse or Withdraw


For safety purposes, if you feel any doubt in giving confidential information, you may immediately inform us and
you have the right to decline we will stop right away the process and not proceed anymore. You do not have to take
part in this research if you do not wish to do so, and choosing to participate will not affect your job or job-related
evaluations in any way. You may stop participating in the evaluation at any time that you wish without your job
being

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Informed Consent Form for City Government of Valenzuela City


This informed consent form is for City Government of Valenzuela City
[Name of Investigator]: Jean A. Andal
[Name of Co-investigators]: Rima Anne M. Austria, Marwin Hans Peralta
[Name of Organization]: Our Lady of Fatima University, College of Computer Studies
[Name of Project]: “Contact Tracing and Monitoring System Using QR Code and Temperature Scanner"

Information Sheet
Introduction
I am Jean A. Andal and on behalf of my members Rima Anne M. Austria and Marwin Hans Peralta, a thesis
researcher of Our Lady of Fatima University, College of Computer Studies. We are doing a research that is all about
Contact Tracing and Monitoring System Using QR Code and Temperature Scanner which is an Monitoring System
for possible Covid Patient to help the City Government tract down possible carrier of the virus We are going to give
you information and you are invited to join us and to be a part of this research study. Please take whatever time you
need to discuss the study with anyone you feel comfortable. The decision to join, or not to join, is up to you. In this
research study, we are evaluating. If you have questions, you can ask me or of another researcher.

Purpose of the research


Having the knowledge nowadays to know how the virus is being transmitted from one person to another and
following the health safety protocols in Valenzuela City to reduce the risks by having physical contact with other
people in any establishments, by creating the system Contact Tracing and Monitoring System Using QR Code and
Temperature Scanner the user will informed by Valenzuela City Government if they have encountered a PUI. The
purpose of this research is to develop a web based system that can monitor customers' temperature and easily
distinguish if the user has a high temperature.

Type of Research Intervention


As the evaluators, you will be given a System/Software Evaluation Form to fill in for this research. This will be
implying your participation in a 30 minutes evaluation.

Participant Selection
You are being invited to take this part of this research because we feel that you’re a potential participant, or as a
responsible citizen can contribute much to our understanding and knowledge of Contact Tracing in the Philippines.

Voluntary Participant
Your Participation in this study is voluntary. You have the right not to participate at all or to leave the study at any
time. Deciding not to participate or choosing to leave the study will not result in any penalty or loss of benefits to
which you are entitled, and it will not harm your relationship with your family and friends as well.

Procedures
We are asking you to help us to learn more about Contact Tracing and monitoring possible carriers of the virus . We
are inviting you to take part in this research project. If you accept, you will be asked the important information about
the Road Rules and Regulation in the Philippines.

(For Software Evaluation Form)


These are the steps that we will do during the evaluation:

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

Step 1: I or another member of the researcher will sit down with you in a comfortable place and you will fill out an
evaluation form which will be provided by the research group and collected by the member
Step 2: You may answer the questionnaire yourself, or it can be read to you and you can say out loud the answer you
want me to write down. If you do not wish to answer any of the questions included in the evaluation form, you may
skip them and move on to the next question

Step 3: No one else but the researcher will be present unless you would like someone else to be there.

Step 4: Once you are finished filling out the evaluation form, the entire information that will be collected in the form
including your name will treat as a highly confidential matter, and no one else except me and the other member of
the research group will have access to your evaluation.

Duration
The research takes place over 1 day in total. During that time, we will ask you for the Evaluation and each
evaluation will last about 30 minutes

Risks
If the evaluation is on sensitive, confidential and personal issues e.g. personal habits, "We are asking you to share
with us some very personal and confidential information, and you may feel uncomfortable talking about some of the
topics. You do not have to answer any question or take part in the evaluation if you don't wish to do so, and that is
also fine. You do not have to give us any reason for not responding to any question or for refusing to take part in the
evaluation".

Benefits
We can't guarantee that you will personally experience benefits from participating in this study. Others may benefit
in the future from the information we find in this study.

Reimbursements
You will not be provided any incentive to take part in the research. However, there will be no payments or
reimbursement for this study.

Confidentiality
The information in this study will be kept confidential. The data we gather will be kept securely and will be made
available only to persons conducting this research unless evaluators give permission in writing to do otherwise. It
will not be shared with or given to anyone except to the researchers.

Sharing the Results


Nothing that you tell us today will be shared with anybody outside the research team, and nothing will be attributed
to you by name. The knowledge that we get from this research will be shared with you before it is made widely
available to the public. Each participant will receive a summary of the results. We will publish the results so that
other interested people may learn from the research.

Right to Refuse or Withdraw


For safety purposes, if you feel any doubt in giving confidential information, you may immediately inform us and
you have the right to decline we will stop right away the process and not proceed anymore. You do not have to take
part in this research if you do not wish to do so, and choosing to participate will not affect your job or job-related
evaluations in any way. You may stop participating in the evaluation at any time that you wish without your job
being

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX E: SURVEY QUESTIONNAIRES


Name (Optional): _______________________________ Date: ______________

SURVEY QUESTIONNAIRE

We are students taking BS IT at Our Lady of Fatima University and we are conducting this
survey for our Capstone Project. In compliance with the Data Privacy Act (2012), all gathered
information will be kept strictly confidential for the duration of the research project. Please
answer the following:

1. Have you heard of the Corona virus (COVID-19) outbreak?


a. Yes
b. No

Approximately, when did you first hear about the COVID-19 outbreak?
__________________________________________
2. What is your main source o……….?
a. Newspaper and Television news
b. Social media
c. Government official websites
d. Public health banners
e. Friends and family
f. From your doctors
g. Others (Please specify) ______________
3. What do you think are the main s? (Check all that apply)

Cold Nausea

Fever Stomach pain

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX F: USER MANUAL

How to Power On/Off the Temperature Scanner box.


1. Plug in the micro usb …….
2. Select the terminal.
3. Press the……………………...
4. Once entering press again the ………nd enter.
5. After that place your hand on the sensor to activate the system and scan again to get your
temperature.

How to use The Temperature Scanner……..


1. Go to our website …..
2. Scan your ……
4. Answer the Health Assessment Form.

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX G: SCREENSHOTS OF THE SYSTEM

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX H: DOCUMENTATION PICTURES OF ACTUAL TESTING OF END-


USER

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX I: EVALUATION FORM


OUR LADY OF FATIMA UNIVERSITY
Tamaraw Hills, Valenzuela City

COLLEGE OF COMPUTER STUDIES


SOFTWARE/SYSTEM EVALUATION FORM

Android based Security System

Group Member’s Name: Jose Rizal…..

Dear Respondent,
This survey will serve as an instrument to assess the level of acceptability of the developed system. Your
cooperation by completing this form will make an important contribution in gathering a reliable and accurate data
needed in the evaluation of the developed system. Rest assured that the information you give would be treated with
utmost confidentiality as necessary.
- Proponents
Instruction: Please evaluate the developed system by using the given scale and placing a check mark ( ) under the
corresponding numerical rating:

Numerical Rating Equivalent


5 - Highly Acceptable
4 - Very Acceptable
3 - Acceptable
2 - Moderately Acceptable
1 - Unacceptable
Characteristics Sub-characteristics Description 5 4 3 2 1
The software has suitable but
Suitability appropriate set of functions in
accordance to its system objectives.
Functionality Accuracy The software provides accurate results.

Compliance The software addresses the defined set


of needs.

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

It has ability to maintain a specified


level of performance in case of
Fault Tolerance
software faults or of infringement of its
specified interface.
It has the capability to re-establish its
Reliability
level of performance and recover the
Recoverability data directly affected in case of a
failure and on the time and effort
needed for it.
It is easy for the users to recognize its
Understandability
logical concept and applicability.
It is easy for the users to learn its
Usability Learnability
application.
Operability The software is easy to operate.
It has acceptable response and
Time Behavior
processing time throughout rates.
It consistently uses enough computing
Efficiency
Resource Behavior resources (memory space) for all its
functions.
It is relatively easy to modify the
Changeability
software or remove faults.
Maintainability Stability It is deemed stable when modified.

It is easy to validate any modification


Testability
made.
It could adapt to different specified
environments without applying other
Adaptability actions or means that those provided
Portability for this purpose for the software
considered.
It is easy to install the software in
Installability
specified environment.
Two or more systems, products or
Compatibility Interoperability components can exchange information
that has been exchanged
Security The prototype ensures that data are
Confidentiality accessible only to those authorized to
have access.
The system prevents unauthorized
Integrity access to, or modification of, computer
programs or data.
The actions of an entity can be traced
Accountability
uniquely to the entity.
Authenticity The identity of a subject or resource

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

can be proved to be the one claimed.


Instructions: Please fill up all the fields with * as required, optional otherwise.
Please confirm your response by signing. Thank you very much for your time and insights.

Respondent’s Name:

End User (Students / Teachers / Engineers)


*Type of Respondent:
IT Experts (Software Developer / Programmer / Professionals)

Bachelor’s Degree:

Year Graduated:

*Signature:

APPENDIX J: RAW DATA (EVALUATION OF IT EXPERT/END-USERS)

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX K: IT CAPSTONE PROGRESS REPORT

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

APPENDIX L: USER ACCEPTANCE FORM

College of Computer Studies Our Lady of Fatima University


Android Based Security System …

College of Computer Studies Our Lady of Fatima University

You might also like