Preview

Apartment - title

Powerful Essays
Open Document
Open Document
10765 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Apartment - title
CHAPTER 1

INTRODUCTION

Rationale Every individual has the desire to live in a peaceful manner and in a secured way. Apartment is one of the most profitable establishments here in Cebu City for the number of people came from provinces keeps on increasing. Living in an uncertain world, apartment’s owners want to maintain safety measures in their firms and occupants might as well want to be secured. Encroachment is an issue nowadays. It is an act of illegal entry without any permission from the owners/occupants to a specified area. Furthermore, it often resulted to theft, burglary and intrusion. To get rid of this issue, the group proposes this system which is to maintain the security of the apartments via biometrics. With this system, encroachment issue will be avoided for without the presence of the occupants, no one can enter the apartment.

Theoretical Background

According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode. It is very important to make our place secured in many aspects to prevent from encroachment issues.

According to statistics, more than 30% of the burglars have gained access into apartments, through an open door or window. (http://www.buzzle.com/articles/security-alarm-systems-for-apartments.html). Flordelis, Timothy Jake B. et. al. (2005) confirmed that there are problems that occupants and owners experienced these are theft, intrusion, and burglary, which considered being encroachment.

Lao, Excio Erving Jr. A. et. al. (2003) explained that by using home automation system, one can make several or all of the systems and devices in home work automatically to provide more security, safety, and convenience. It inspires the group to make this Apartment Security System via Biometrics that will enhance the existing one in securing the Apartments.

In



Bibliography: “PIC-BASED APARTMENT DOORKEEPER: A SOLUTION TO ENCROACHMENT.” Unpublished Bachelor of Science in Computer Engineering thesis, University of Cebu, Cebu City, 2005. Lao, Excio Erving Jr. A., Rez Ronald R. Amaya. “Automated Security System: A Solution to Robbery in Apartment Type Residencies.” Unpublished Bachelor of Science in Computer Engineering thesis, University of Cebu, Cebu City, 2003. New York: The McGrawl-Hall Companies, Inc., 2004. New Jersey: Pearson Education Asia Pte Ltd., 2004. Date: August 25, 2010 To: APARTMENT OWNERS and OCCUPANTS

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It is important to know the information about accessing a client’s home. For instance do we ring the bell or are there a key safe or any risks when entering the property.…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Access Control Simulation

    • 698 Words
    • 3 Pages

    Upon entry the door was locked and a key card was required for this single point of entry. There were security cameras outside of the building. There was a dumpster outside that was not secured, which could allow anyone access to sensitive information. Locking the dumpster or placing it in a secured location would mitigate this risk. The receptionist did not ask me to verify my identity. The receptionist should be required to verify the identity of everyone entering building to prevent a person from entering the building that isn’t authorized. There was a security room with security personnel viewing the monitors. Office 1-1 had a post it note taped to computer monitor with names that could be passwords. Increased password security should be implemented to reduce the risk of someone hacking into a system. Both office 1-1 and 1-2 had fingerprint scanners, which increases access control. In office 1-2 there was an unattended paper shredder, which should be secured due to sensitive information. In the hallway there was a security camera and a utility box but the wire cabinet was not locked. As such, anyone can access the hardware inside. A lock should be installed to prevent unauthorized access to the hardware. Also in the hallway there was an Ethernet jack which allowed access to the internet. Controls should be put in place to require security access to logon to the network.…

    • 698 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    With this system in place throughout your building, it will allow your techs to be able to monitor the air condition units, the water flow throughout the building, the fire alarm system, the lighting throughout the building and your employees will be able to have keycards that will allow them to enter into the elevators, different floors and departments and to be able to come in and out of the parking garage, and it will give them access to enter the building as well. This programming will allow you to place a time when the doors and elevator will lock down, and they will have to use their keycard to enter and operate the elevators. The system will also lock down the parking garage, and they will only need their keycard to enter the garage but to exit the garage their vehicle will send a single to the sensor and allow the doors to open up. These sensors will be able to notice body movement when someone is close to the door leaving out of the building. With this system in place, anyone that works in the building will be assigned a keycard with an identification number on it along with their picture. These keycards will allow them access in and out of the building and on the floor of the departments within the building. Clients that you may have coming into the building for meetings will need to sign for a loaner card to be able to get access to the floors of the building. The advantages of having this system within your building is that everything is wireless and that it stores a limited amount of energy that there is no hassle with cable cords, and it can work efficiently under harsh conditions, and the development is up to a large scale. The radio transmission technology optimized for harsh industrial environment and monitoring the software that is designed to match your needs and blend into your IT infrastructure and it also allows your real time monitoring…

    • 1360 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Home and business user alike are using biometric security. Through a biometric identifier, such as a fingerprint biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Case Project

    • 650 Words
    • 3 Pages

    Recommending the use of fingerprint scanners is not plausible because they are not a hundred percent accurate. Why even use a standard biometric device at a main entrance to a building. The best method of securing an entrance to a building is the old fashion way. By using manpower to man the entry control points to the building to check personnel to ensure they have access to the building.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit HSC 2007

    • 10139 Words
    • 57 Pages

    5.2 Different risks to home security that may need to be addressed People whom you support may be vulnerable and at risk of intruders. We o en hear of bogus people entering houses and stealing from the trusting people who live there. Some people also are of the generation that le their doors unlocked without fear of burglars or intruders. Sadly, nowadays we need to be vigilant and prevent unwanted visitors from entering premises.…

    • 10139 Words
    • 57 Pages
    Good Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Rose Gold Tone Watch

    • 739 Words
    • 3 Pages

    With this Home security kit, you can assign codes to your loved ones for them to easily access and enter. You can also get notified of who is entering your home and leaving as well. You can also set it to automatically switch on the lights at home to make it appear that someone is actually there. You can operate, manage and monitor every move from your office computer or even while you are on the go, on your smart phone and…

    • 739 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Biometric identifications have been associated with very costly top secure applications. Today the cost of such applications is going down due to the evolving technologies. Biometric identification has become a now cost effective, reliable, and highly accurate way to obtain a persons identity.…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and which new hairstyles (Allensmith, n.d.).…

    • 325 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    To better understand how to effectively implement security measures on the three basic levels of protection, there must be a clear distinction between the outer, inner and interior perimeter security. The outer perimeter of a property is usually defined by the property lines. The facility’s outer perimeter is fenced with a distinctive access point of entry, such as gate. The main purpose of establishing the outer perimeter security is to control all the traffic entering and leaving the property, meaning only authorized personnel and visitors should be granted the access pass the entrance gate. For an organization to decide which type of outer perimeter security is the most suitable one for its purposes, it needs to weigh the pros, cons and the cost of an intruder entering the property versus the physical security available.…

    • 1927 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Duplicating Patterns

    • 517 Words
    • 3 Pages

    Many locksmith service providers are now offering security system installations to small offices, schools, shops, and even large corporations. In essence, a comprehensive commercial locksmith service works for any institution, building, or property, regardless of size and coverage. For these commercial services, professional locksmiths typically provide complex security systems, which involve security cameras and other advanced tools. The system for commercial properties can also be modified to establish different clearance levels among all members of the institution or the company. For this, the usual security features include biometric- or fingerprint-based…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    With IT, security aspects are also improvised. Security cameras are used in many places such as shopping centre, office and many more. By using security cameras, the police are able to crack a criminal case much more easily. Electronically managed doors are also common now; password and security card are required to gain access to the office in order to prevent any unauthorised people from entering. Some companies with advanced technology will even use biometrics technology to keep their company safe.…

    • 495 Words
    • 2 Pages
    Good Essays

Related Topics