Preview

Apartment - title

Powerful Essays
Open Document
Open Document
10765 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Apartment - title
CHAPTER 1

INTRODUCTION

Rationale Every individual has the desire to live in a peaceful manner and in a secured way. Apartment is one of the most profitable establishments here in Cebu City for the number of people came from provinces keeps on increasing. Living in an uncertain world, apartment’s owners want to maintain safety measures in their firms and occupants might as well want to be secured. Encroachment is an issue nowadays. It is an act of illegal entry without any permission from the owners/occupants to a specified area. Furthermore, it often resulted to theft, burglary and intrusion. To get rid of this issue, the group proposes this system which is to maintain the security of the apartments via biometrics. With this system, encroachment issue will be avoided for without the presence of the occupants, no one can enter the apartment.

Theoretical Background

According to Harbron (1988), one way of attaining security of a certain area is by means of biometrics. Jain et. al. (1999) identified that biometric system can operate verification and identification mode. It is very important to make our place secured in many aspects to prevent from encroachment issues.

According to statistics, more than 30% of the burglars have gained access into apartments, through an open door or window. (http://www.buzzle.com/articles/security-alarm-systems-for-apartments.html). Flordelis, Timothy Jake B. et. al. (2005) confirmed that there are problems that occupants and owners experienced these are theft, intrusion, and burglary, which considered being encroachment.

Lao, Excio Erving Jr. A. et. al. (2003) explained that by using home automation system, one can make several or all of the systems and devices in home work automatically to provide more security, safety, and convenience. It inspires the group to make this Apartment Security System via Biometrics that will enhance the existing one in securing the Apartments.

In



Bibliography: “PIC-BASED APARTMENT DOORKEEPER: A SOLUTION TO ENCROACHMENT.” Unpublished Bachelor of Science in Computer Engineering thesis, University of Cebu, Cebu City, 2005. Lao, Excio Erving Jr. A., Rez Ronald R. Amaya. “Automated Security System: A Solution to Robbery in Apartment Type Residencies.” Unpublished Bachelor of Science in Computer Engineering thesis, University of Cebu, Cebu City, 2003. New York: The McGrawl-Hall Companies, Inc., 2004. New Jersey: Pearson Education Asia Pte Ltd., 2004. Date: August 25, 2010 To: APARTMENT OWNERS and OCCUPANTS

You May Also Find These Documents Helpful

  • Good Essays

    I would gain entry to the clients’ home in the way agreed at the initial assessment.…

    • 832 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    It is important to know the information about accessing a client’s home. For instance do we ring the bell or are there a key safe or any risks when entering the property.…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    A six foot fence secures the outer perimeter. Video surveillance is active on the north fence and inactive on the south. A manned guard station permits entrance into the outer perimeter from the west; an unmanned and unlocked gate permits entrance from the east. No Trespassing signs are posted at intervals upon the perimeter fence; Employees Only is posted on the gate. Visitors must obtain a pass at the guard station.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Good Essays

    According to law enforcement, there is important data supporting the idea that “ no two fingerprints are alike”, and biometrics serves as an accurate method to determine an individuals uniqueness. There are many unique advantages, while keys, smart cards, photo identifications cards can be lost, stolen, duplicated or left at home. Biometrics creates accurate, fast, user-friendly system based upon a distinguishable human trait. Whether the system facilitates accessing individuals by fingerprints, face, recognition, speak recognition, signature verification, iris, recognition, or hand and finger geometry it serves as an accurate authentication purpose.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Home and business user alike are using biometric security. Through a biometric identifier, such as a fingerprint biometric devices can deny or grant access to programs, devices, computers, rooms, and other locations. Biometric devices are an effective security technology.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Business Law

    • 261 Words
    • 2 Pages

    I would consider hiring a security staff to ensure that the apartments are safe. I would also install security cameras and make sure that a member of the security staff is always monitoring the cameras. Lastly, I would buy better locks for all of the ground floor sliding doors as well as the entire building.…

    • 261 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    A regular, non-automated home offers little protection against burglars. Aside from a barking dog, a normal house…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and which new hairstyles (Allensmith, n.d.).…

    • 325 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Physical perimeter boundaries is a clear delineation between public property and restricted locations is often required to isolated project areas. The use of fences, wire entanglements, concrete bollards, beams, signs and cleared land ( for observation purposes) ensures that private property is clearly identified and access by all but the most determined intruder is prevented or deterred. This method will avoid the accidental intrusion and provides a psychological barrier against intrusion (Deutsch).…

    • 1927 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    CJs 250 Criminal Justice

    • 513 Words
    • 4 Pages

    Axia College Material Appendix D The Three Models of Physical Security Directions: Read and study the description of an office building’s physical layout and its ...…

    • 513 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    With IT, security aspects are also improvised. Security cameras are used in many places such as shopping centre, office and many more. By using security cameras, the police are able to crack a criminal case much more easily. Electronically managed doors are also common now; password and security card are required to gain access to the office in order to prevent any unauthorised people from entering. Some companies with advanced technology will even use biometrics technology to keep their company safe.…

    • 495 Words
    • 2 Pages
    Good Essays

Related Topics