SlideShare a Scribd company logo
1 of 64
Download to read offline
INTRODUCTION

      Security plays a vital role for the safekeeping of lives and

properties. Whether inside or outside the house, in the mall, or almost

everywhere there is a security threat. The researcher wishes to elaborate

on the situation happended in a certain school in Cheachnea, Russia in

1991. There are some chaechnean rebels who hostage the entire school

and lead all the students to the gymnasium and what happended? They

burned the entire gymnasium where all the students inside.

      The point of the researcher is that, security a campus, school,

university, and almost every entity needs security or a security system.

This is where the poroposal of the researcher comes in.

       Security system computing a system that enforces boundaries

between computers networks an electrical device that sets off an alarm

when someone tries to break in. A professionally installed system

designed to detect intrusion or other hazard, including sensors, an alarm-

sounding device and communication device that reports conditions to an

alarm monitoring service.

      Eulogio “Amang” Rodriguez Institute of Science and Technology

(EARIST) is one among the State College in the Philippines which is

situated in the heart of its capital, Manila. It has an estimated student

population of 10,000 students and 600 faculties and employees. As the

school population increases every year, the demand for more security is

imperative.



                                    1
The security level risk in a school such as Eulogio “Amang” Rodriguez

Institute of Science and Technology (EARIST) is very high. The

instrument used for the protection of the institution is composed of only a

recording CCTV camera and security personnel’s. The institution is still

exposed to other stimulated complication such as outsiders – students

from other schools or universities and out of school youth and visitors,

fire and intruders. Improving the system should be the number one

priority of the school to protect each persons and properties coming in

and out and of the school premises.

      This research about the Eulogio “Amang” Rodriguez Institute of

Science and Technology Security System Project is an improvement of

the school’s existing security system. Whereas it uses a digital security

system with voice feature which can monitor room temperature, smoke,

motion, windows and doors. This research aim is too developed mainly

to respond to security issues at real time.




                                      2
BACKGROUND OF STUDY

      Original house, school and office alarms worked by signaling a

‘local’ alarm when the system was triggered. This worked well so long as

people hearing the alarm responded to it. As security systems became

more common, the number of false alarms increased to such as degree

that many ‘local’ alarms began to go unnoticed and unreported. Intruders

also learnt how to disarm the system so could quickly and easily stop the

alarm. If you were relying on this for the safety of your property you

could be in trouble. Nowadays, many people use external alarm

monitoring centers to protect their property. Here, not only does a ‘local’

alarm sound but the alarm is also picked up by staff at the monitoring

center who will then respond accordingly.

      When first invented, house, school and office alarms were

triggered by the release of a pressure button fitted into a door or window

frame. This basic alarm was fundamentally flawed as the entire intruder

needed to do to silence the alarm was to close the door or window.

Nowadays there are various systems on the market ranging from

inexpensive DIY alarms to highly sophisticated systems requiring

professional installation. All modern alarms are based on the same

foundation, the electric circuit which is completed either when the door is

opened or closed depending on the system you choose. The alarm is

triggered when the circuit is altered and will not be silenced until a code

is punched into the control panel. The most expensive and complicated

alarm systems might also involve a combination of motion sensors and

                                    3
pressure pads to ensure even the most cunning intruder doesn’t get his

hands on your treasures.

Unsurprisingly, house, school and office alarms have changed a lot over

the last century and no doubt will continue to improve as technological

knowledge expands. The market is filled with a wide range of systems

and companies offering a variety of deals. So whatever you want to

protect, and however much you have to spend there will be an alarm out

there to suit your needs.

      The Eulogio “Amang” Rodriguez Institute of Science and

Technology was established after the liberation Manila in 1945. Eulogio

“Amang” Rodriguez Institute of Science and Technology (EARIST)

started as a Vocational High School with only a room at the second floor

of the Mapa High School, nine teachers, a clerk and 147 students. Only

July 1, 1946 , Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST) acquired its present site at Nagtahan Sampaloc,

Manila. Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST) is composed of only recording CCTV camera.

This kind of security system only records of what it is happening. But it

cannot aid or give solution if there is something wrong in the area.


      The researcher proposed a newly security system that will improve

the security system Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST). This is a digital security system with voice

feature which can monitor room temperature, smoke, motion, and

windows and doors. The system is fully digital and also fully customized.

                                     4
It incorporated a 16x2 LCD display with a 4x4 keypad. Each sensor can

be enabled and disabled, and alarm frequency and skim can also be

chosen by users. It has also equipped a voice playback chip, and it will

speak which sensor has gone.


OBJECTIVE

      The proponents, based on the initial research, have come up with

objectives to further study the situation.

      A. General Objectives

             The general objectives of this research are to develop and

             construct a security system that will serve as a proposal to

             improve the old security system of Eulogio “Amang”

             Rodriguez Institute of Science and Technology (EARIST).

      B. Specific Objectives

             • To provide a much effective security system that would

                help them to secure the safetiness of every student and

                employee.

             • To be able to determined if there is a hazardous accident.

             • To be able to create a effective security system that

                would help them to monitor if there is a intruders.

             • To be able to protect each persons and properties coming

                in and out of the school premises.




                                      5
CONCEPTUAL FRAMEWORK


     INPUT                      PROCESS                 OUTPUT

        • Submit the              • Analyze and          • Improve the

             created                interpret     all       security system

             permission             the         data        of EULOGIO

             letter      with       gathered and            “AMANG”

             regards       to       the answer to           RODRIGUEZ

             project                the                     INSTITUTE OF

             design.                questionnaire           SCIENCE ABD

                                    .                       TECHNOLOGY
        • Give them a
                                                            (EARIST).
             copy          of     • Check        the
                                                         • Acceptance of
             questionnai            school      floor
                                                            the design.
             re     to    be        plan.

             answer.

        • Visualize

             the area of

             the school.

        •




            FIGURE1. CONCEPTUAL PARADIGM

      The figure presents the conceptual framework of the study. This

input will assist the researcher to gather some data regarding the research.


                                        6
It will lead the researcher in additional knowledge about the proposed

research. This input will have the basic knowledge regarding the security

system.

      In the process, this were the researcher analyze and interpret the

data and knowledge that the researcher attain.

      The output of this research will be the acceptance of the design

after formulating the new security system of EULOGIO “AMANG”

RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY

(EARIST). The design will be highly recommended to applied and

enhance the security level of EULOGIO “AMANG” RODRIGUEZ

INSTITUTE OF SCIENCE AND TECHNOLOGY (EARIST).


STATEMENT OF THE PROBLEM

      This research under taken to analyze and interpret the proposed

security system for Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST). Specifically the aims to answer the following

question.

            1. What is the current assessment of the old Eulogio

                “Amang” Rodriguez Institute of Science and Technology

                (EARIST) security system?

            2. How will this research help the school to improve their

                security system?

            3. What are he benefits of the newly proposed security

                system?

                                    7
4. Is the newly proposed security is effective to secure the

                protection of the school?

             5. Is there any significant difference between the old

                Eulogio “Amang” Rodriguez Institute of Science and

                Technology (EARIST) security system and the newly

                proposed security system?


SCOPE AND DELIMITATION

      The newly proposed security system is an enhancement of an

existing security system of Eulogio “Amang” Rodriguez Institute of

Science and Technology (EARIST).

      The proposed security system is system for monitoring the whole

school. It can monitor if there is a movement or an intruder in a room or

someone is trying to break-in. It can also detect smoke that may cause

fire that will cause a lot of damage in the school properties and lives of

every person in the school. This security system cans etec5t if there is

sudden change in temperature. It extremely simple design and

construction and adapted to pre-design for use in school, business or

house. This could be used as basis for similar studies that would be

conducted by other researcher.

Limitations of the Study

      The proposed research is only focused in Eulogio “Amang”

Rodriguez Institute of Science and Technology (EARIST) for improving

their security system.

                                    8
SIGNIFICANCE OF THE STUDY

      The researcher proposing a security system that will enhance the

old security system of Eulogio “Amang” Rodriguez Institute of Science

and Technology (EARIST); it will give significance particularly to the

following:

      This research will benefit every student and employee in Eulogio

“Amang” Rodriguez Institute of Science and Technology (EARIST).

STUDENTS. They will be assured of their protection from hazardous

      accidents, intruders; outsiders that will only cause them harm and

      trouble.

SCHOOL AND EMPLOYEE. The proposed security system will help

      them to monitor the school easily that will lessen their work and

      save time.The proposed security system will assured that the

      school will be safe from damage caused by hazardous accidents.

RESEARCHER. The researchers have developed their writing, analysis

      and interpretation skills needed to make a good research about

      security system.

FUTURE RESEARCHER. This will benefits other researcher who

      wish to have similar studies as they can get background

      information from the result of this study which will serve as

      template to modify their research.




                                    9
HYPOTHESIS

The purpose of this research is to develop and create a security system

for Eulogio “Amang” Rodriguez Institute of Science and Technology

(EARIST) that could help them to monitor the school easily and to

determined whether there is any problem and intruders within the school

compound. Using a security system in the school, business, and

laboratory are very much useful to monitor and to aid easily if there is a

problem in the area. And it is also help to save much time and works.

      Providing an effective security system will help to avoid hazardous

accidents and to protect the school from every person coming in and out

of the school.

      Security system will benefit not only the employee/ employer of

the Eulogio “Amang” Rodriguez Institute of Science and Technology

(EARIST) but also the student.

      Finally, the researcher found out that there is no significant

difference between the old security system of Eulogio “Amang”

Rodriguez Institute of Science and Technology (EARIST) and the newly

proposed security system.




                                   10
DEFINITION OF TERMS

Sensor - is a device that measures a physical quantity and converts it into

a signal which can be read by an observer or by an instrument.

Alarm - gives an audible or visual warning about a problem or condition.

Alarms have the capability of causing a fight-or-flight response in

humans; a person under this mindset will panic and either flee the

perceived danger or attempt to eliminate it, often ignoring rational

thought in either case. We can characterize a person in such a state as

"alarmed".


Digital - system is a data technology that uses discrete (discontinuous)

values. By contrast, non-digital (or analog) systems use a continuous

range of values to represent information. Although digital representations

are discrete, the information represented can be either discrete, such as

numbers, letters or icons, or continuous, such as sounds, images, and

other measurements of continuous systems.


The word digital comes from the same source as the word digit and

digitus (the Latin word for finger), as fingers are used for discrete

counting.


The word digital is most commonly used in computing and electronics,

especially where real-world information is converted to binary numeric

form as in digital audio and digital photography.


                                    11
Motion detector - is a device that contains a physical mechanism or

electronic sensor that quantifies motion that can be either integrated with

or connected to other devices that alert the user of the presence of a

moving object within the field of view. They form a vital component of

comprehensive security systems, for both homes and businesses.


Smoke detector - is a device that detects smoke, typically as an indicator

of fire. Commercial, industrial, and mass residential devices issue a

signal to a fire alarm system, while household detectors, known as smoke

alarms, generally issue a local audible and/or visual alarm from the

detector itself.


Smoke detectors are typically housed in a disk-shaped plastic enclosure

about 150 millimetres (6 in) in diameter and 25 millimetres (1 in) thick,

but the shape can vary by manufacturer or product line. Most smoke

detectors work either by optical detection (photoelectric) or by physical

process (ionization), while others use both detection methods to increase

sensitivity to smoke. Smoke detectors in large commercial, industrial,

and residential buildings are usually powered by a central fire alarm

system, which is powered by the building power with a battery backup.

However, in many single family detached and smaller multiple family

housings, a smoke alarm is often powered only by a single disposable

battery.




                                    12
Magnetic switch - A switching device consisting of three metallic

layers (a paramagnetic layer between two ferromagnetic layers), whose

action is based on electron spin and is controlled by a small magnetic

field. Also known as bipolar spin device; bipolar spin switch; magnetic

spin transistor; spin transistor; spin valve.


Temperature sensor - a thermometer (from the Greek '' (thermo)

meaning "warm" and meter'', "to measure") is a device that measures

temperature or temperature gradient using a variety of different

principles. A sensor that make it possible to measure temperature.


System - is a collection of elements or components that are organized for

a common purpose. The word sometimes describes the organization or

plan itself (and is similar in meaning to method, as in "I have my own

little system") and sometimes describes the parts in the system (as in

"computer system").


A computer system consists of hardware components that have been

carefully chosen so that they work well together and software

components or programs that run in the computer.


Flame detector - is a detector that uses optical sensors to detect flames.


Alarm Monitoring - Central-Station is a common term used to refer to a

company that provides services to monitor burglar, fire and residential

alarm systems. The central-station may also provide watchman and

supervisory services.


                                      13
Related Literature

      Home security has become one of the top things people look for in

a property. Along with lot size, square footage, and location, the kind of

home security system a house has in place is now truly a deciding factor

for buyers. Due to this trend, having a security alarm is not only

important when living in a house, but when selling one, as well.


Security               Alarm                 System                Overkill

The demand for security alarm systems is increasing, and more and more

options are becoming available for residential use. While having more

options is certainly good news for homeowners, it can, at times, make it

difficult to find the right setup for your household.


When installing a security alarm system that is meant to protect your

family and possessions, it's easy to go overboard and end up with a

system that is intrusive (and, in turn, might not get used at all). Most

people do not require a fingerprint identification lock, but other forms of

keyless home entry might be a perfect fit. The best option for your home

should be a system that provides a significant amount of protection, but

doesn't interfere with the day-to-day life of your family.




                                     14
The                Basic           Security            Alarm

A standard home security alarm is often a good fit for most households.

These systems generally include sensors on all the entry doors, some

motion activated outdoor lighting, sensors on windows that are

particularly easy to access, and, most importantly, a direct link to a

monitoring service. This type of security alarm system will be an

excellent deterrent for any would be intruders, but, at the same time, is

generally fairly easy for a family to adapt to.


Make sure you feel safe in your home! Use this link to

Install Security System


Security                           Alarm                         Benefits

Most would say that the biggest benefit of having a home security alarm

is the peace-of-mind that comes with it. When something goes wrong

(whether you are home or thousands of miles away on vacation),

knowing that a system is already in place and that your house has a direct

link to the proper authorities is very reassuring.


There may be immediate monetary benefits, as well. Having a security

alarm that is connected to a monitoring service can, in some situations,

lower homeowner's insurance payments up to 20%. Many monitoring

services will also offer a plan to monitor your home for fire, which some

insurance companies will also take into account when deducing your

premium. In every case, it will decrease the likelihood of losing money

due to burglary.


                                     15
Increase           your             Home's           Resale           Value

Along with presenting a clean home, there are many improvements that

can be made to a property that will increase its resale value. Adding on a

garage, finishing a basement, and remodeling a kitchen, while all good

ideas, can be rather costly endeavors. Landscaping a yard for security,

installing a home security alarm, and putting in outdoor lighting are much

less expensive projects. Despite the lower initial cost, prospective buyers

still look upon these kinds of home improvements as important additions

to the property they are viewing.


Wireless Home Security Alarm Systems – Advantages and

disadvantages


      There is no doubt that wireless home alarm security systems are

becoming the preferred choice when it comes to alarms in the house. One

of the best advantages of this type of system is that it is very easy for do-

it-yourself installer. This is because you do not have the wiring all the

different components of the home security system to run. With a

wireless security system, there are few components, each of these

Components is very easy to install.


      But that does not mean that these types of security systems are not

without flaws. For example, if you carefully plan it out, it is likely that

there are few places in the house that are not protected by the system to

be. The reason is simple – because the signals received by a primary

control unit if they are sent to a component that is out of reach, that


                                      16
component will not be good signals. Therefore, there is a greater

likelihood that your house will not be as safe as you might like.


There will, however, with the proper positioning of wireless sensor at

home, your home wireless network security alert system is as safe as –

if not more – as a system disk.


Some people think that the next is an advantage or a disadvantage.

Wireless systems are running on battery, no electricity. It can be seen as

an advantage, because If your electricity is cut you are sure that your

security system will continue to work. But if you forgot the batteries to

replace so your system is virtually useless.


The last advantage is wireless, and perhaps the most preferred by

consumers. In general, a wireless security system home alarm system is

less expensive than one that is difficult. If you are on a tight budget and

want to install by yourself, then a wireless system is probably the way

too. E 'preferable, especially in apartments or rental properties, because it

is easy to transport when you move.


In any case, it is important to understand both the advantages and

disadvantages of wireless security and home difficult. Use this question

in this article as a starting point for further research to make the right

choice for your home.




                                     17
Foreign Study

Houston Home Security: Make Installing a Home Alarm Your New

Year Resolution!


      Everyone knows the tradition of making New Year Resolutions.

We all make plans for improving ourselves; but no matter how great our

intentions, we more than likely will fall short of our goals. Most of these

plan are for worthy, but perhaps a bit superficial ideals like losing weight,

becoming organized or learning a new language. There is one resolution,

however, that can make a real difference in the safety of your family:

assessing your Houston home security. Installing a home alarm in your

Houston home may mean protecting your property and your loved ones

against dangerous intruders. A security systems company in Houston

should be able to help you plan out the following steps towards reaching

a goal of a safer home in the new year:1.Do your own safety assessment.

It doesn’t take a professional to notice aspects of your property that could

use more attention to security. Do you have bushes that hide your doors

and windows? Are your exterior doors solid? Do all of your windows

lock? Is your property well-lighted? Some of these problems can be

addressed on your own, prior to contacting a Houston home alarm

company. Once the security professionals come to your home, they may


                                     18
also have additional suggestions for improving the security of the

property. 2. Contact a Houston home security firm. Your next New Year

Resolution should be to develop a business relationship with a Houston

security systems company, preferably a firm that has a solid history of

customer satisfaction. Let the staff at that company know that you are

looking to make some real changes to your home security and that you

are open to learning about all of the products and services they have to

offer. Do not hesitate to let them know exactly what you are looking for

and how much you are willing to spend on your Houston home alarm. A

quality company should provide such benefits as free professional

installation and additional alarm keypads.3.Invest in a monitored alarm

system. Your home alarm is only as good as the quality of the

monitoring. It is best to look for a company that provides round the clock

monitoring at a monthly rate, because you don’t want to have gaps in

your coverage. Ask your alarm company if they also offer such security

features as fire monitoring, because the convenience of adding that to

your system makes it worthwhile to do so. Finally, do due diligence in

your research as you locate a Houston home security that offers you as

much value as it does quality. Safeguard Home Security offers our

customers excellent customer service by experienced, licensed home

alarm professionals.


      You wish to keep your family safe from accidents, fires, and other

difficulties, and then ADT security systems will be an outstanding

choice. Real residential security begins with a proper security set-up,


                                   19
which is precisely what ADT offers. Protection services that families get

the best home security possible and ADT security up a wide array of

home security.


      Perhaps the single most popular service offered by ADT security

system is their home preservation service. ADT Security Systems alerts

homeowners of intruders using cutting edge technology.


      Unlike its competitors, ADT security systems services don’t utilize

any wires in their alarm systems. The ADT security systems have also

added one other cutting-edge feature to their home security system, these

are heat sensors. The security system sensors by ADT are extremely

advanced, as they have the capability to differentiate between a stray

animal entering the house and a thief.


      That keeps families completely safe and secure aside from the

above features, ADT security systems also offer additional services.

Their fire and carbon monoxide sensors are extremely vital services that

can be counted upon in case fire-related problems occur. These sensors

easily detect an intruder so the family can escape to safety while the ADT

Security Systems calls the authorities.


      ADT security systems do even more. ADT security systems can

also deliver security while on the road besides providing hone security.

People at home can easily locate relatives who are running late via the

GPS devices. Whether they’re at home or away from it, with ADT

security systems, people are assured of safety.

                                    20
Security System


Problem:      There was a need in the self storage industry to be able to

monitor when a particular unit was open. Since most self storage units do

not allow access to the owner/management for installing new

wiring/equipment, the system to be developed needed to be able to be

deployed without adding any new wiring to the facility and had to be

capable or being installed without entering the individual units.


Solution:     Group Alpha developed a unique door sensor that would

sensor the relative position of a particular door and send back that door's

position via a RF link to a controller that would send out alerts to a PC

application based on changes in state.The sensors needed to be very low

powered since they are battery powered and had to be very low cost

because the number of doors within a particular installation could reach

several thousand. A set of gateway/repeaters were also developed. These

units are distributed throughout the storage facility allowing the RF

signals to be relayed via power line communications to the main

controller. This allows the entire system to be installed within any

proprietary wiring except the single cable that connects the main

controller to the PC. This system illustrates the diverse communications

technologies that Group Alpha can bring to bear to solve a particular

engineering problem.


      When considering different home security systems, it would pay to

know the home security system ratings for different ones and one such


                                    21
one is Brinks Security which has a number of advantages and also a few

disadvantages. To begin with, you should learn more about what the

company is all about if you want to be able to evaluate the home security

system ratings for it and after much looking about you may find that

Brinks began operation in 1859 when it began to provide different

security services for various companies and which has since expanded to

cater to as many as a million customers in the US thanks to the trust that

it has built into its product name.


Various Aspects That Need To Be Considered


      There are various aspects to the Brinks home security systems

including its monitoring capabilities, price, installation and also handling

of problems that you would want to know more about and thus may need

to view the home security system ratings for this company in each of

these regards. The first piece of information that you need to consider is

what the whole package is going to cost you and this will play an

important part in how you evaluate the home security system ratings for

Brinks Security home security systems, which with all the bells and

whistles may total up to three hundred and twenty dollars plus taxes,

which according to user’s home security system ratings amounted to just

fair and no more.


      Another aspect of the Brinks Security home security system that

readers will want to know about and for which home security system

ratings are required includes the monitoring abilities of this system,


                                      22
which it must be said are good and thus deserve high home security

system ratings. You can be sure that the monitoring response in case of a

break in is very good and even though you will need to pay an extra

thirty odd dollars for the monitoring service, it is money well spent and

this is reflected in its high home security system ratings given to this

product.


      Next, you will need to find what the home security system ratings

as far as installing the system are and you may be surprised to learn just

how many technicians can be involved in the whole exercise and how

long it can take to complete all the drilling, wiring and cabling of the

home. Despite all these inconveniencies the Brinks Security gets good

home security system ratings for installation and the staff was friendly

and was able to answer all questions satisfactorily.


      Once you have got the home security system ratings for the

different aspects to using Brinks Security systems, you should be able to

decide whether to go ahead and use it or not.


Local Study

      I have a very special reason for starting this article, its simple It

became abundantly clear during my last visit that security is one of the

major considerations when living full time in the Philippines.


I have to say in all the visits I have ever made to the Philippines I have

yet to become the victim of a crime, that is not to say that crime doesnt

                                    23
happen in my home country, wow, it happens everywhere in the world,

why some areas of London, I would never drive around with my doors

not locked, secondly, I have friend who drive around certain districts

with a cost in their car, (Iron bar resembling a steel baton) interestingly,

they don’t drive around with a hand gun, I will come onto this later.

( Handguns represent a mandatory 5 year prison term if caught with

them).


      I want to share some of my recent experiences with you all, and as

usual I am very much interested in your own experiences including your

views on some of my writings.


      So here goes, I was under the impression, that it was mainly

foreigners who were very security conscious, hmmm that was a totally

wrong assertion, I had the good fortune to visit the son of my wife former

employer, he lives in a security gated compound within a sub division,

the gates are locked at all times, they have 7 foot high barbed wire, or

walls with casual glass pieces stuck into the cement, these it appears are

to prevent people scaling the walls to gain entry.


      I spoke to my friend about security for me in the Philippines, his

replies kind of shocked me, remembering whilst I might have a house in

the Philippines, and the house does have high walls with security bars, I

have never had to live in a house with the level of security my friend was

suggesting was required.




                                    24
He told me firstly, in your home you should have personal

protection, so I butted in and suggested perhaps a mace or chemical spray

maybe an intruder alarm system, such as we have back here in UK,

maybe an alarm over the telephone system, connected to Police HQ, that

brought a few laughs from him.


“No he said, you need a good weapon in the house, or 2 or 3 if you can,”

I was a little startled by this, since I was trained in certain weapons but

had not fired a shot since the 80′s, I know in certain States in the U.S.A.

its quite acceptable to have a gun at home, and in certain states, my

experience of this was when I was in Nevada, its acceptable to shoot an

intruder on your property.


Sadly, we cannot do that in the UK, in fact if you shot the intruder, you

would be the one most likely charged with armed assault, and if the

intruder died, charged with murder, yes the rules for intruders in our

country are hard for some to understand, you may be accused of violating

his civil rights amongst a string of other things, so shooting someone in

your house is not a good idea.


Going back to my freind – he told me that its acceptable if you have a

permit to own a hand gun, or rifle, or automatic rifle in your home,

provided its for home protection, he even went on to say that he is

allowed to transport the weapons, and that he can fire them under

controlled conditions, what he didnt tell me, that when we arrived at our

destination at his Fathers mountain resort, is that he was actually carrying


                                    25
a loaded weapon in his pocket, I have to say at first sight I was shocked

to find that he had a Berreta handgun, with 13 rounds of ammo in a

magazine in his pocket.


      I questioned my freind further, “Why do you have this semi

automatic pistol in your pocket I asked” well Pete its really for our

protection, we don’t know who we will encounter up here, the

Philippines is very poor, there are some desperate people here, and its

better to have protection than not all”, I also went on to say that I did not

believe in having guns in the house, I saw no need for it, my friend said ”

I suggest you obtain one in your wife name, keep it in your house, you

can draw it if required, as long as someone is breaking into your lot or

house, you have a right to shoot them to prevent them if your life is

threatened.”


      I asked my wife about this, since it had never been discussed

before, my wife confirmed what my friend had said, although she did not

like the idea of a weapon in the house any more than I did.


      He also then went on to show me the holes in the side of the house

walls, they were placed there to put the barrel of their guns through

should armed intruders attack the house, was I in dreamland?? is this the

Philippines, why had I not seen any violence of this type, I see guards all

the time at the banks, they all have 12 bore shotguns, some with M16

automatic rifles, on the Ferry to Ilo Ilo, I see guards with weapons,

automatic rifles, and yet it hadn’t really sunk in.


                                      26
The 2nd experience was at the Husband of my wife’s Doctor

friend, I discussed the level of personal security in the Philippines with

him, his reply astounded me even further, ” Yes I have a gun, actually I

have about 20 different guns, would you like to come and see them ?”


      I asked why there was a need for so many guns. he said, that even

for Filipinos its dangerous in this country, you need lots of protection, he

said, in my house and lot, I have over 20 dogs in the grounds, naturally

he had a big lot, but about 20 dogs, i have 3 Akita Japanese guard dogs,

and 4 German Shepherds, the rest are a selection of other dogs, why so

many I asked?


      Keep out undesirables he said, at night, I let all the dogs out, they

keep a visible prescience at night, after that, I have 3 boys in the lot,

looking after the dogs, and keeping an eye on things, after that, I have 2

semi automatic rifles at strategic points, and 2 handguns at others,…..is

this the Philippines ?


      Wake me up somebody because I felt that hearing the 2

experiences led me to believe that this is over stretching personal security

a little bit, or is it? remembering I am a foreigner, these people are natural

born Filipinos living in their own country, who knows the situation better

than they do, and yet I have not heard any experiences about security

issues involving foreigners, I know that Bob has remarked very often that

Davao City is a very safe city, and he has always said how safe he feels




                                     27
there, I have no reason to disbelieve him, or any other reader who says

they feel safe in their city of occupation.


      I can only now refer to my final experience, a couple of weeks ago,

I accompanied my wife to the downtown plaza area of Bacolod City, she

wanted to have some photos developed, in the car I was driving, my wife

said to me ‘Now empty your pockets honey, give me your wallet, and

where is your credit cards, give them to me, do you have any money, oh

yes, fine give that to me too.


      Make sure your pockets are empty, when you come with me, you

are a target for snatchers, and robbers, when we arrived in the plaza mart,

I remarked to the cashier about the security problem in the area, the

young lady said, Sir its quite safe here for you, my wife over heard the

conversation and said in English, don’t tell me husband that, you know

its not safe, there are pickpockets, thieves and robbers here, she said I

myself was robbed the last time I was down here, so don’t tell him that,

he has to know its not safe here, and with that we paid and promptly left.


      So how about personal security, some of you will tell me you have

never felt unsafe, maybe there are some of you who have had bad

experiences, I know all will be different, what about guns ? How do you

feel about owning and keeping one?


      Recently I was taken to a firing range in Negros and given light

weapons training on the Biretta hand gun, the Browning Automatic and

M14 and M16 Semi Automatic Weapons, I had a great day out with some

                                      28
friends, but it also brought home to me and reminded me just how

dangerous guns are.


      Some of you won’t feel comfortable with it, and if you had to draw

your gun to defend yourself, could you do it? What if there was a

discharge enquiry by the Police if your discharged your gun in such an

incident, how would it go down for you if you are a foreigner?


These and many other questions need to be discussed, I hope to hear all

your viewpoints on this, and look forward to reading your replies.




                                   29
Research Methodology


A. Research Design



   What is Descriptive Research?

      This research is the most commonly used and the basic reason for

carrying out descriptive research is to identify the cause of something

that is happening. For instance, this research could be use in order to find

out what age group is buying a particular brand of cola, whether a

company’s market share differs between geographical regions or to

discover how many competitors a company has in their marketplace.



      Descriptive research, also known as statistical research, describes

data and characteristic about the population or phenomenon being

studied. Descriptive research answers the questions who, what, where,

when and how.



      This type of research is also a grouping that includes many

particular research methodologies and procedures, such as observations,

surveys, self-reports, and tests. The four parameters of research will help


                                    30
us understand how descriptive research in general is similar to, and

different from, other types of research.



      Descriptive research is use to obtain information concerning the

current status of the phenomena to describe "what exists" with respect to

variables or conditions in a situation. The methods involved range from

the survey which describes the status quo, the correlation study which

investigates the relationship between variables, to developmental studies

which seek to determine changes over time.



B. Research Locale



   Eulogio "Amang" Rodriguez Institute of Science and Technology

(EARIST) was established after the liberation of Manila in 1945.

EARIST traces back its development from that of a vocational high

school with only a room at the second floor of the Mapa High School,

nine teachers, a clerk, and 147 students under Mr. Pantaleon Regala, its

principal. Its former name was Eulogio Rodriguez Vocational High

School (ERVHS). EARIST growth and development were made possible

via three Republic Acts and Presidential Decree, to wit: Republic Act

4072, jointly sponsored by Congressman Ramon D. Bagatsing and Salih

Ututalum in 1964, authorized the establishment of the Technical

Education Department without changing the name of the school. It was

headed by a Vocational Director. Republic Act 5088, sponsored by

Congressman Sergio Loyola in 1967, authorized the renaming of ERVHS
                                     31
to Eulogio "Amang" Rodriguez Memorial School of Arts and Trades

(EARMSAT) and signaled its separation from the Division of City

Schools, Manila. It was headed by a Superintendent Republic Act 6595,

sponsored by Congressman Joaquin R. Roces in 1972, converted

EARMSAT to EARIST with a President as its head. This made EARIST

into a full-pledged college and authorized the establishment of

vocational-technical school branches in each congressional district of

Manila. Presidential Decree 1524, signed by President Ferdinand E.

Marcos on June 11, 1978, converted EARIST into a chartered state

college with a Board of Trustees as its governing body and Dr. Hilario G.

Nudas, as its first College President. Eulogio "Amang" Rodriguez

Institute of Science and Technology.



C. Samples and Sampling Technique Used

 EARIST employs almost a thousand of employees including faculties.

The researcher have confined the research to 50 sampling sized only to

be distributed with the following colleges and offices: College of

Engineering, College of Business and Public Administration, College of

Education, College of Arts and Sciences, College of International and

Hospitality Management, College of Industrial Technology, and College

of Architecture and Fine Arts. Administrative Office, Registrar’s Office,

Office of the President and Vice President for Academic Affairs, Office

of the Director for Research and Instruction and Office of the Director for

Extension. The reason why the researcher uses the 50 sampling size is



                                    32
because the researcher will just distribute the survey questionnaires to

member of the faculty and every student in the school.




 D. Instruments

       The instrument that the researcher will be using in conducting and

developing this research is Survey Questionnaire. As par as this

instrument is concern, it’s very easy for the researcher to get the pulse,

views, ideals, and reactions of EARIST population.

SURVEY QUESTIONNAIRES
Name________________________________________
Course_________________         Department_________________
Position_______________________

Part 1 Profile
Age:
  16-20 years old                                Gender:
  21-25years old                                      Male:
  26-30 years old                                     Female:
   31-35 years old
   36 and up

Knowledge in Security system:
   Advance
   Moderate
   Knowledgeable
    New




Part 2 Improvement of the old security system of EULOGIO”AMANG”
RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY:

       Check the appropriate box, which you believe applicable to the given
variables.

                Rate     Verbal Interpretation             Range
                5        Strongly Agree                    4.6 – 5.0

                                     33
4         Agree                                  3.6 – 4.5

                 3         Uncertain                              2.6 – 3.5

                 2         Disagree                               1.6 – 2.5

                 1         Strongly Disagree                      1.0 – 1.5




A. The current assessment of the EARIST security system.     5       4        3   2   1
1. The security system the EARIST has a loop hole
2. It only uses CCTV Camera
3. The system only records in-coming and out-coming
people
4. Check on all the vehicles going in-out of the institution
5. Cannot determine actual incidents inside or outside
school properties


B. Improvement of the school security system.                 5      4        3   2   1
1. Knowledge in improving the security system
2. Appropriate security system is needed
3. On the spot monitoring of all activities inside the school
premises
4. Awareness about the safety guidelines
5. Knowledge in terms of possible event if the security
system is not effective


C. The Benefits of newly proposed security system.            5      4        3   2   1
1. Digital security system
2. Save work and time
3. Give convenience in monitoring the whole school
4. On the report
5. Real –time events


D. Effectiveness in terms of protecting the school.     5            4        3   2   1
1. Monitor accidents/ incidents
2. Monitor all the students coming in-out of the school
3. Monitor employees and faculty
4. Monitor the school designated area
5. Valuable things inside the school will be properly
monitored


E. There is no significant difference between the old and new system.




                                         34
_______________
                                                                Signature




E. Statistical Treatment of Data
      The information gathered were tabulated and processed manually

and with the aid of computer to determine the precise interpretation of the

results. Matrix tables were made to organize, summarize, and analyze the

data gathered for easy determination of its difference from each other.

      Data were collated, tabulated, and analyzed. The following

statistical tools were used in the analysis of data:

   1. Percentage

             The measure of dominant quantity was utilized to determine

      the most probable scenario.            The formula of percentage is as

      follows:



                                    F

                           P = -------

                                    N




                    Where P = Percentage (%)

                            F = Frequency


                                        35
N = Total Number of Population



2. The responses to questions in the given variables were scaled using

   the “five-point-scale” or Likert Scale system and given weight as

   follows:



        Rate        Verbal Interpretation        Range
        5           Strongly Agree               4.6 – 5.0
        4           Agree                        3.6 – 4.5
        3           Moderately Agree             2.6 – 3.5
        2           Disagree                     1.6 – 2.5
        1           Strongly Disagree            1.0 – 1.5


3. The process of finding the “Weighted Mean,” which is referred to

   as the central tendency was used, The formula is given below:



                               (wx)

                      Χ =Σ     ------

                                    N

               Where: X = weighted mean

                       w = weighted factor

                       Σ = sum of

                       N = total number of respondents

                        x = score




                                36
To test the level of significance between the assessments of the

respondents the Chi-Square were employed to determine the relationship

of factors as given.

      The formula of chi-square is presented as follows:



                                                   2

                                  (fo ) - ( fe )

                            X2 = --------------

                                     fe

                       Where: X = Chi – Square

                             fo = Observed Frequency

                              fe = Expected Frequency




   4. Degree of Freedom

      Estimates of statistical parameters can be based upon different

   amounts of information or data. The number of independent pieces of

   information that go into the estimate of a parameter is called the

   degrees of freedom (df). In general, the degrees of freedom of an

   estimate is equal to the number of independent scores that go into the

   estimate minus the number of parameters estimated as intermediate

   steps in the estimation of the parameter itself (which, in sample

   variance, is one, since the sample mean is the only intermediate step).

                             Df = (r-1) (c-1)


             Where: df = degrees of freedom

                                      37
R = row

                   C = coloumn




PRESENTATION,                          ANALYSIS                 AND
INTERPRETATION OF DATA
Table 1.1 Frequencies and Percentage Distribution on the Age of the
Respondents
Options          Frequency        Percent           Rank
16-20 years old 13                26%               Rank 3rd
21-25 years old 22                44%               Rank 1st
26-30 years old 15                30%               Rank 2nd
31-35 years old 0                 0%
36yrs. and above 0                0%
Total            50               100%


      Table 1.1 presents the frequency and percentage distribution on

the age of the respondents. 13 or 26% of the respondents aged 18-20

years old, 22 or 44% of the respondents aged 21-25 years old, 15 or

30% of the respondents aged 26-30 years old, 0 of the respondents aged

31-35 years old and lastly 0 of the respondent aged 36 years and above.

Table 1.2 Frequencies and Percentage Distribution on the Gender of the
Respondents.
Options          Frequency         Percent            Rank
Male             19                38%                Rank 2nd
Female           31                62%                Rank 1st
Total            50                100%


      Table 1.2 represents the frequency and percentage distribution on

the gender of the respondents. 19 or 38% respondents are male while 31

or 62% are female.



                                  38
Table 1.3 Frequencies and Percentage Distribution on the familiarity in
security ststem.
Options            Frequency         Percent           Rank
Advance            7                 14%               Rank 3rd
Moderate           22                44%               Rank 1st
Knowledgeable 12                     24%               Rank 2nd
New                9                 18%               Rank 4th
Total              50                100%
       Table 1.3 represents the frequency and percentage distribution on

the familiarity in security system. 7 or 14% respondents is advance in

familiarity in security system, 22 or 44% respondents is moderate in

familiarity of security system, 12 or 24% respondents is knowledgeable

in familiarity of security system, 9 or 18% respondents is new in

familiarity of security system.



     Rate     Verbal Interpretation          Range


     5        Strongly Agree                 4.6 –5.0


     4        Agree                          3.6 –4.5


     3        Moderately Agree               2.6 –3.5


     2        Disagree                       1.6 –2.5


     1        Strongly Disagree              1.0 –1.5




Table 2.1 Frequency and Percentage Distribution the current assessment
of the EARIST security system.

                                  39
2.1.1 The security system the EARIST has a loop hole.
Options                 Frequency Percent        Rank
5(strongly agree)       17          34%          Rank 2nd
4(agree)                23          46%          Rank 1st
3(uncertain)            9           18%          Rank 3rd
2(disagree)             1           2%           Rank 4th

Total                    50           100%


         Table 2.1.1 represents the frequency and percentage distribution.

 17 or 34% stated that they are strongly agreed that the security system

 of EARIST has a loop hole. 23 or 46% agree, 9 or 18% stated that they

 are uncertain, 1 or 2% stated they are disagree and none (0) respondent

 is strongly disagree.

 2.1.2 It only uses CCTV Camera.
 Options               Frequency          Percent        Rank
 5(strongly agree)       15               30%            Rank 2nd
 4(agree)                19               38%            Rank 1st
 3(uncertain)            13               26%            Rank 3rd
 2(disagree)             2                4%             Rank 4th
 1(strongly disagree) 1                   2%             Rank 5th
 Total                   50               100%



         Table 2.1.2 represents the frequency and percentage distribution

 on that the EARIST only uses CCTV camera. 15 or 30% stated that they

 are strongly agreed. 19 or 38% stated agreeing. 13 or 26% stated that

 they are uncertain affected, 2 or 4% are disagreeing and 1 or 2%

 respondent stated that they strongly disagree.

 2.1.3. The system only records in-coming and out-coming people.
 Options               Frequency        Percent        Rank
 5(strongly agree)       19               38              Rank 2nd

                                     40
4(agree)              22                 44%              Rank 1st
3(uncertain)          9                  18%              Rank 3rd
Total                 50                 100%



        Table 2.1.3 represents the frequency and percentage distribution

on the system only records in-coming and out-coming people. 19or 38%

stated that they are strongly agreed. 22 or 44% stated are agreeing. 9 or

18% stated that they are uncertain affected, none respondents stated

agree strongly disagree.

2.1.4 Check on all the vehicles going in-out of the institution.
Options                Frequency      Percent              Rank
5(strongly agree)      25             50%                  Rank 1st
4(agree)               17             34%                  Rank 2nd
3(uncertain)           7              14%                  Rank 3rd
2(disagree)            1              2%                   Rank 4th
Total                  50             100%


        Table 2.1.4 represents the frequency and percentage distribution

on checking on all the vehicles going in-out of the institution .25 or 50%

stated that they are strongly agreed. 17 or 34% respondents are

agreeing. 7 or 14 stated that they are uncertain affected, 1 or 2% stated

disagree and none (0) respondent stated that they are strongly disagree.

2.1.5 Cannot determine actual incidents inside or outside school
properties.
Options              Frequency Percent       W.M        Rank
5(strongly agree)    20           40%        4.42       Rank 2nd
4(agree)             22           44%        4.2        Rank 1st
3(uncertain)         6            12%        4.4        Rank 3rd
2(disagree)          2            4%         4.24       Rank 4th
1(strongly disagree) 0            0          4.34
Total                50           100%




                                    41
Table 2.1.5 represents the frequency and percentage distribution

on cannot determine actual incidents inside or outside school

properties.20 or 40% stated that they are strongly agreed. 22 or 44%

are stated agree. 6 or 12% stated that they are uncertain affected and 2

or 4% are stated disagree. And none (0) respondents stated in strongly

disagree.

Table 2.2 Improvement of the school security system.

2.2.1. Knowledge in improving the security system
Options               Frequency     Percent             Rank
5(strongly agree)     17            34%                 Rank 2nd
4(agree)              27            54%                 Rank 1st
3(uncertain)          6             12%                 Rank 3rd
Total                 50            100%


        Table 2.2.1 represents the frequency and percentage distribution.

17 or 34% stated that they are strongly agreed to trap mice

automatically. 27 or 54% respondents agree, 6 or 12% stated that they

are uncertain, and none respondents stated that they are disagree and

strongly disagree.

2.2.2 Appropriate security system is needed.
Options                Frequency       Percent            Rank
5(strongly agree)       27               54%              Rank 1st
4(agree)                14               28%              Rank 2nd
3(uncertain)            8                16%              Rank 3rd
Total                   50               100%



        Table 2.2.2 represents the frequency and percentage distribution.

27 or 54% stated that they are strongly agreed.14 or 28% agree, 8 or




                                    42
16% stated that they are uncertain and none (0) respondent is

disagreeing and strongly disagree.

2.2.3 On the spot monitoring of all activities inside the school premises.
Options               Frequency       Percent               Rank
5(strongly agree)     28              56%                   Rank 1st
4(agree)              19              38%                   Rank 2nd
3(uncertain)          3               6%                    Rank 3rd
Total                 50              100%


      Table 2.2.3 represents the frequency and percentage distribution.

28 or 56% stated that they are strongly agreed that it can monitor all

activities inside the school premises. 19 or 38% stated agree and 3 or

6% sated uncertain and none respondents disagree and strongly

disagree.

2.2.4 Awareness about the safety guidelines.
Options              Frequency       Percent              Rank
5(strongly agree)    32              64%                  Rank 1st
4(agree)             15              30%                  Rank 2nd
3(uncertain)         3               6%                   Rank 3rd
Total                50              100%


      Table 2.2.4 represents the frequency and percentage distribution.

32 or 64% stated that they are strongly agreed that it should be aware

about the safety guidelines. 15 or 30% agree, 3 or 6% stated that they

are uncertain, and none (0) respondent is disagree and strongly agree.



2.2.5 Knowledge in terms of possible event if the security system is not
effective.
Options              Frequency      Percent            Rank
5(strongly agree)    29             58%                Rank 1st
4(agree)             14             28%                Rank 2nd
3(uncertain)         6              12%                Rank 3rd
1 (disagree)         1              2%                 Rank 4th
Total                50             100%

                                    43
Table 2.2.5 represents the frequency and percentage distribution.

29or 58% stated that they are strongly agreed that it is effective in

terms of possible events if the security system is not effective. 14 or 28%

agree, 6 or 12% stated that they are uncertain, 1 or 2% disagree and

none (0) respondent stated strongly disagree.

Table 2.3 The Benefits of newly proposed security system.

2.3.1 Digital security system
Options             Frequency         Percent            Rank
5(strongly agree) 28                  56%                Rank 1st
4(agree)            17                34%                Rank 2nd
3(uncertain)        4                 8%                 Rank 3rd
1(strongly agree) 1                   2%                 Rank 4th
Total               50                100%


      Table 2.3.1 represents the frequency and percentage distribution.

28 or 56% stated that they are strongly agreed that one of the benefits

of the newly proposed security system is digital security system. 17 or

34% stated agree, 4 or 8% stated that they are uncertain and 1 or 2%

stated that they are strongly agreed and none (0) stated that they are

strongly disagreeing.

2.3.2 Save work and time.
Options           Frequency           Percent            Rank
5(strongly agree) 20                  40%                Rank 2nd
4(agree)          21                  42%                Rank 1st
3(uncertain)      8                   16%                Rank 3rd
2(disagree)       1                   2%                 Rank 4th
Total             50                  100%


      Table 2.3.2 represents the frequency and percentage distribution.

20 or 40% stated that they are strongly agreed that it can save work and


                                    44
time. 21 or 42% agree, 8 or 16% stated that they are uncertain, 1 or

2% stated that they are disagree and none (0) stated that they are

strongly disagree.

2.3.3 Give convenience in monitoring the whole school
Options           Frequency         Percent             Rank
5(strongly agree) 26                52%                 Rank 1st
4(agree)          19                38%                 Rank 2nd
3(uncertain)      4                 8%                  Rank 3rd
2(disagree)       1                 2%                  Rank 4th
Total             50                100%


      Table 2.3.3 represents the frequency and percentage distribution.

26 or 52% stated that they are strongly agreed that it can give

convenience in monitoring the whole school. 19 or 38% agree, 4 or 8%

respondent stated uncertain, 1 or 2% disagree and none (0) stated that

they are strongly disagreeing.

2.3.4 On the report.
Options                Frequency     Percent            Rank
5(strongly agree)      24            48%                Rank 1st
4(agree)               17            34%                Rank 2nd
3(uncertain)           7             14%                Rank 3rd
2(disagree)            1             2%                 Rank 4th
1(strongly disagree)   1             2%                 Rank 4th
Total                  50            100%


      Table 2.3.4 represents the frequency and percentage distribution.

24 or 48% stated that they are strongly agreed that it is on the report of

what it is happening in the school. 17 or 34% agree, 7 or 14% stated

that they are uncertain, 1 or 2% stated that they are disagree and 1 or

2% stated that they are strongly disagree.

2.3.5 Real –time events.
Options               Frequency      Percent            Rank
5(strongly agree)     27             54%                Rank 1st

                                   45
4(agree)               16             32%                Rank 2nd
3(uncertain)           5              10                 Rank 3rd
2(disagree)            1              2%                 Rank 4th
1(strongly disagree)   1              2%                 Rank 4th
Total                  50             100%


      Table 2.3.5 represents the frequency and percentage distribution.

27 or 54% stated that they are strongly agreed that it is real time

monitoring of events. 16 or 32% agree, 5 or 10% stated that they are

uncertain, 1or 2% respondent stated disagree, 1 or 2% respondents

stated that they are strongly disagree.

Table 2.4 Effectiveness in terms of protecting the school.

2.4.1 Monitor accidents/ incidents
Options                 Frequency     Percent            Rank
5(strongly agree)       25            50%                Rank 1st
4(agree)                17            34%                Rank 2nd
3(uncertain)            4             8%                 Rank 3rd
2(disagree)             2             4%                 Rank 4th
1(strongly disagree)    2             4%                 Rank 4th
Total                   50            100%


      Table 2.4.1 represents the frequency and percentage distribution.

25 or 50% stated that they are strongly agreed that it can monitor

accidents or incidents. 17 or 34% agree, 4 or 8% stated that they are

uncertain, 2 or 4% stated that they are disagree and strongly disagree.

2.4.2 Monitor all the students coming in-out of the school
Options             Frequency        Percent             Rank
5(strongly agree) 26                 52%                 Rank 1st
4(agree)            15               30%                 Rank 2nd
3(uncertain)        8                16%                 Rank 3rd
2(disagree)         1                2%                  Rank 4th
Total               50               100%




                                     46
Table 2.4.2 represents the frequency and percentage distribution.

26 or 52% stated that they are strongly agreed that it can monitor all the

students coming in-out of the school. 15 or 30% agree, 8 or 16% stated

that they are uncertain, 1 or 2% stated that they are disagree and none

(0) stated that they are strongly disagree.

2.4.3 Monitor employees and faculty.
Options              Frequency       Percent            Rank
5(strongly agree)    26              56%                Rank 1st
4(agree)             19              38%                Rank 2nd
3(uncertain)         2               4%                 Rank 3rd
2(disagree)          1               2%                 Rank 4th
Total                50              100%


      Table 2.4.3 represents the frequency and percentage distribution.

26 or 56% stated that they are strongly agreed that it can monitor

employees and faculty. 19 or 38% agree, 2 or 4% stated that they are

uncertain, 1 or 2% respondent stated disagree and none (0) stated

strongly disagree.

2.4.4 Monitor the school designated area.
Options            Frequency         Percent            Rank
5(strongly agree) 23                 46%                Rank 1st
4(agree)           19                38%                Rank 2nd
3(uncertain)       8                 16%                Rank 3rd
Total              50                100%


      Table 2.4.4 represents the frequency and percentage distribution.

23 or 46% stated that they are strongly agreed that it can monitor

designated area. 19 or 38% agree, 8 or 16% stated that they are

uncertain and none (0) stated that they are either disagreeing or

strongly disagree.

2.4.5 Valuable things inside the school will be properly monitored

                                    47
Options               Frequency      Percent            Rank
5(strongly agree)     28             56%                Rank 1st
4(agree)              14             28%                Rank 2nd
3(uncertain)          7              14%                Rank 3rd
2( disagree)          1              2%                 Rank 4th
Total                 50             100%


      Table 2.4.5 represents the frequency and percentage distribution.

28 or 56% stated that they are strongly agreed that it properly

monitored the entire valuable thing inside the school. 14 or 28% agree, 7

or 6% stated that they are uncertain, 1 or 2% respondent stated

disagree and none (0) respondent stated strongly disagree.




                                   48
Table 3.1 Univariate Matrix on the Eulogio “Amang” Rodriguez Institute of Science and Technology Security System.
                                                                            OPTIONS
                                                                            5     4         3          2        1        X          Descriptive Interpretation
2.1.1 The security system the EARIST has a loop hole                        17 23           9          1        0        4.12       Agree
2.1.2 It only uses CCTV Camera                                              15 19           13         2        1        3.88       Agree
2.1.3 The system only records in-coming and out-coming people               19 22           9          0        0        4.2        Agree
2.1.4 Check on all the vehicles going in-out of the institution             25 17           7          1        0        4.32       Agree
2.1.5 Cannot determine actual incidents inside or outside school properties 20 22           6          2        0        4.2        Agree
2.2.1 Knowledge in improving the security system                            17 27           6          0        0        4.22       Agree
2.2.2 Appropriate security system is needed                                 27 15           8          0        1        4.38       Agree
2.2.3 On the spot monitoring of all activities inside the school premises   28 19           3          0        0        4.5        Agree
2.2.4 Awareness about the safety guidelines                                 32 15           3          0        0        4.58       Strongly Agree
2.2.5 Knowledge in terms of possible event if the security system is not 29 14              6          0        1                   Agree
effective                                                                                                                4.38
2.3.1 Digital security system                                               28 17           4          0        1        4.42       Agree
2.3.2 Save work and time                                                    20 21           8          1        0        4.16       Agree
2.3.3 Give convenience in monitoring the whole school                       26 19           4          1        0        4.36       Agree
2.3.4 On the report                                                         24 17           7          1        1        4.2        Agree
2.3.5 Real –time events                                                     27 16           5          1        1        4.3        Agree
2.4.1 Monitor accidents/ incidents                                          25 17           4          2        2        4.22       Agree
2.4.2 Monitor all the students coming in-out of the school                  26 15           8          1        0        4.32       Agree
2.4.3 Monitor employees and faculty                                         28 19           2          1        0        4.48       Agree
2.4.4 Monitor the school designated area                                    23 19           8          0        0        4.3        Agree
2.4.5 Valuable things inside the school will be properly monitored          28 14           7          1        0        4.38       Agree
TOTAL                                                                       484 367         127        15       6        85.95

               Based on the foregoing results, as showed in table 3.1, the automated mouse / mice trap range only to strongly agree with a mean of 85.95.



                                                                              49
Table of Chi-square Statistics

Df= (r-1) (c-1)

     = (5-1) (5-1)

     = 16

F- Statistics with other values; p= 0.05│p= 0.01 │p=0.001
df               P= 0.05   P= 0.01         P= 0.001
1                3.84      6.64            10.83
2                5.99      9.21            13.82
3                7.82      11.35           16.27
4                9.49      13.28           18.47
5                11.07     15.09           20.52
6                12.59     16.81           22.46
7                14.07     18.48           24.32
8                15.51     20.09           26.13
9                16.92     21.67           27.88
10               18.31     23.21           29.59
11               19.68     24.73           31.26
12               21.03     26.22           32.91
13               22.36     27.69           34.53
14               23.69     29.40           36.12
15               25.00     30.58           37.70
16               26.30     32.00           39.25
17               27.59     33.41           40.79
18               28.87     34.81           42.31
19               30.14     36.19           43.82
20               31.41     37.57           45.32
21               32.67     38.93           46.80
22               33.92     40.29           48.87
23               35.17     41.64           49.73
24               36.42     42.98           51.18
25               37.65     44.31           37.65
26               38.89     45.64           54.05
27               40.11     46.96           55.48
28               41.34     48.28           56.89
29               42.56     49.59           58.30
30               43.77     50.89           59.70


                             50
31   44.99   52.19   61.10
32   46.19   53.99   62.49
33   47.40   54.78   63.87
34   48.60   56.06   64.25
35   49.80   57.34   66.62
36   51.00   61.16   70.71
37   52.19   58.89   69.35
38   53.38   61.16   70.71
39   54.57   62.43   72.06
40   55.76   63.69   73.41
41   56.94   64.95   74.75
42   58.12   66.21   76.09
43   59.30   67.46   77.42
44   60.48   68.71   78.75
45   61.66   69.96   80.08
46   62.83   71.20   81.40
47   64.00   72.44   82.72
48   65.17   73.68   84.03
49   66.34   74.92   85.35
50   67.51   76.15   86.66
51   68.67   77.39   87.97
52   69.83   78.62   89.27
53   70.99   79.84   90.57
54   72.15   81.07   91.88
55   73.31   82.29   93.17
56   74.47   83.73   95.75
57   75.62   84.73   95.75
58   76.78   85.95   97.03
59   77.93   87.17   98.34
60   79.08   88.38   99.62
61   80.23   89.59   100.88
62   81.38   90.18   102.15
63   82.53   92.01   103.46
64   83.68   93.22   104.72
65   84.82   94.42   105.97
66   85.97   95.63   107.26
67   87.11   96.83   108.54
68   88.25   98.03   109.79
69   89.39   99.23   111.06


              51
70    90.53     104.42   112.31
71    91.67     101.62   113.56
72    92.81     102.82   114.84
73    93.95     104.01   116.08
74    95.08     105.20   117.35
75    96.22     106.39   118.60
76    97.35     107.58   119.85
77    98.49     108.77   121.11
78    99.62     109.96   112.36
79    100.75    111.15   123.60
80    101.88    112.33   124.84
81    103.01    113.51   126.09
82    104.14    114.70   127.33
83    105.27    115.88   128.27
84    106.40    117.06   129.80
85    107.52    118.24   131.04
86    108.65    119.41   132.28
87    109.77    120.59   133.51
88    110.90    121.77   134.74
89    112.02    122.94   135.96
90    113.15    124.12   137.19
91    114.27    125.29   138.45
92    115.39    136.46   139.66
93    116.51    127.63   140.90
94    117.63    128.80   142.12
95    118.75    129.97   143.32
96    119.87    131.14   144.55
97    120.99    132.31   145.78
98    122.11    133.47   146.99
99    123..23   134.64   148.21
100   124.34    135.81   149.88




                 52
Rate     Verbal Interpretation                  Range

                        5        Strongly Agree                         4.6 –5.0

                        4        Agree                                  3.6 –4.5

                        3        Moderately Agree                       2.6 –3.5

                        2        Disagree                               1.6 –2.5

                        1        Strongly Disagree                      1.0 –1.5


      Table                                    1.1                                              1
      Responses to Socialization Skills Survey
A. The current assessment    Strongly    Agree        Moderately   Disagree   Strongly   W.M Chi
of the EARIST security                                Agree
                             Agree                                            Disagree
system.
                             5           4            3            2          1                 X2

1. The security system of
the EARIST has a loop hole
                             17(19.2)    23(20.6) 9(8.8)           1(1.2)     0(0.2)     4.12   0.57
2. It only uses CCTV
Camera                       15(19.2)    19(20.6) 13(8.8)          2(1.2)     1(0.2)     3.88   3.58
3. The system only records
in-coming and out-coming
people                       19(19.2)    22(20.6) 9(8.8)           0(1.2)     0(0.2)     4.2    1.30
4. Check on all the vehicles
going      in-out  of    the
institution                  25(19.2)    17(20.6) 7(8.8)           1(1.2)     0(0.2)     4.32   2.78
5.Cannot determine actual
incidents inside or outside
school properties
                             20(19.2)    22(20.6) 6(8.8)           2(1.2)     0(0.2)     4.2    1.55

      TOTAL Chi-Square: 9.79

              The Security system of EARIST has a loop hole with a mean of

      4.12 and a verbal interpretation of Agree; it only uses CCTV camera

      with a mean of 3.88 and a verbal interpretation of Agree; the system only

      records in-coming and out-coming people with a mean of 4.2 and a

      verbal interpretation of Agree; check on all the vehicle going in-out of

      the institution with a mean of 4.32 and a verbal interpretation of Agree;
                                                 53
and cannot determine actual incidents inside or outside school properties

    with a mean of 4.2 and a verbal interpretation of Agree.

            The overall computed weighted mean has a verbal interpretation of

    Agree.

            It is clearly evidence that the chi-square value from the chi-square

    value of Table 1.1 is 9.79 which is less than the value from the chi-square

    table which is 26.30, the null hypothesis is accepted.


   Table 2
B. Improvement of           the    Strongly   Agree    Moderately   Disagree   Strongly   W.M Chi
school security system                                 Agree
                                   Agree                                       Disagree

                                   5          4        3            2          1                  X2



1. Knowledge in improving
the security system                                                                              8.29
                                   17(26.6)   27(18) 6(5.2)         0(0.2)     0(0)       4.22
2.   Appropriate       security
system is needed                                                                                 2.21
                                   27(26.6)   15(18) 8(5.2)         0(0.2)     0(0)       4.38
3. On the spot monitoring of
all activities inside the school                                                                 1.26
premises

                                   28(26.6)   19(18) 3(5.2)         0(0.2)     0(0)       4.5
4. Awareness about          the
safety guidelines                                                                                2.73
                                   32(26.6)   15(18) 3(5.2)         0(0.2)     0(0)       4.58
5. Knowledge in terms of
possible event if the security                                                                   4.43
system is not effective

                                   29(26.6)   14(18) 6(5.2)         1(0.2)     0(0)       4.38

    TOTAL Chi- square: 18.92

             Knowledge in improving the security system with a mean of 4.22

    and a verbal interpretation of Agree; appropriate security system is

    needed with a mean of 4.38 and a verbal interpretation of Agree; on the

    spot monitoring of all activities inside the school premises with a mean of

    4.5 and a verbal interpretation of Agree; awareness about the safety
                                                  54
guidelines with a mean of 4.58 and a verbal interpretation of Agree; and

        knowledge in terms of possible event if the security system is not effective

        with a mean of 4.38 and a verbal interpretation of Agree.

               The overall computed weighted mean has a verbal interpretation of

        Agree.


               It is clearly evidence that the chi-square value from the chi-square

        value of Table 1.2 is 18.92 which is less than the value from the chi-

        square table which is 26.30, the null hypothesis is accepted.


       Table 3
                             Strongly   Agree   Moderately              Strongly   W.M Chi
                                                             DISAGREE
C The Benefits of newly
proposed security system.                       Agree
                             Agree                                      Disagree


                             5          4       3            2          1                 X2


1. Digital security system                                                                1.94

                             28(25)     17(18) 4(5.6)        0(0.8)     1(0.6)     4.42
2. Save work and time 20(25)            21(18) 18(5.6)       1(0.8)     0(0.6)     4.16   3.18
3 Give convenience in                                                                     1.20
monitoring the whole
school
                             26(25)     19(18) 4(5.6)        1(0.8)     0(0.6)     4.36
4. On the report             24(25)     17(18) 7(5.6)        1(0.8)     1(0.6)     4.2    0.76
5 Real –time events          27(25)     16(18) 5(5.6)        1(0.8)     1(0.6)     4.3    0.76

        TOTAL: Chi-Square 7.85

        Digital security system with a mean of 4.42 and a verbal interpretation of

        Agree; save work and time with a mean of 4.16 and a verbal

        interpretation of Agree; Give convenience in monitoring the whole

        school with a mean of 4.36 and a verbal interpretation of Agree; on the

        report with a mean of 4.2 and a verbal interpretation of Agree; real –time

        events with a mean of 4.3 and a verbal interpretation of Agree.


                                                    55
The overall computed weighted mean has a verbal interpretation of

       Agree.

              It is clearly evidence that the chi-square value from the chi-square

       value of Table 1.3 is 7.85 which is less than the value from the chi-square

       table which is 26.30, the null hypothesis is accepted.


        Table 4
D. Effectiveness in terms of       Strongly   Agree    Moderately   Disagree   Strongly   W.M Chi
protecting the school                                  Agree
                                   Agree                                       Disagree

                                   5          4        3            2          1                 X2


1. Monitor accidents/ incidents
                                   25(26)     17(16.8) 4(5.8)       2(1)       2(0.4)     4.22   8
2. Monitor all the students
coming in-out of the school                                                                      1.43
                                   26(26)     15(16.8) 8(5.8)       1(1)       0(0.4)     4.32
3. Monitor employees and faculty
                                   28(26)     19(16.8) 2(5.8)       1(1)       0(0.4)     4.48   3.33
4. Monitor the school designated                                                                 2.87
area                              23(26)      19(16.8) 8(5.8)       0(1)       0(0.4)     4.3
5. Valuable things inside the
school will be properly monitored                                                                1.27

                                   28(26)     14(16.8) 7(5.8)       1(1)       0(0.4)     4.38

       TOTAL: Chi-Square 16.90

              Monitor accidents/ incidents with a mean of 4.22 and a verbal

       interpretation of Agree; monitor all the students coming in-out of the

       school with a mean of 4.32 and a verbal interpretation of Agree; monitor

       employees and faculty with a mean of 4.48 and a verbal interpretation of

       Agree; monitor the school designated area with a mean of 4.3 and a

       verbal interpretation of Agree; valuable things inside the school will be

       properly monitored with a mean of 4.38 and a verbal interpretation of

       Agree.




                                                  56
The overall computed weighted mean has a verbal interpretation of

Agree.


      It is clearly evidence that the chi-square value from the chi-square

value of Table 1.4 is 16.90 which is less than the value from the chi-

square table which is 26.30, the null hypothesis is accepted.




Summary


                                    57
The research EULOGIO “A MANG” RODRIGUEZ INSTITUTE

OF SCIENCE AND TECHNOLOGY (EARIST) security system was

proposed to the EULOGIO “A MANG” RODRIGUEZ INSTITUTE OF

SCIENCE AND TECHNOLOGY (EARIST) and the other school who

wants to improve their security system. This research was conducted for

the purpose of determining the problems encountered in the protection of

the school. And based from such problems the following objectives are

formulated: 1) To provide a much effective security system that would

help them to secure the safetiness of every student and employee; 2) To

be able to determined if there is a hazardous accident; 3) To be able to

create a effective security system that would help them to monitor if there

is a intruders; 4) To be able to protect each persons and properties

coming in and out of the school premises.

      Furthermore, to achieve the objectives, the proponents, used the

Descriptive Method to develop the proposed system. The researcher also

conducted an evaluation to the respondents in order to gather all the

information needed to complete the study with the use of the Likerts

Scale; the respondent evaluated the digital project to determine the

performance of the system.




SUMMARY OF FINDINGS
                                    58
Based in the proponent’s objectives in data gatherings were

determined.

  1. Based on the proposed security system was interpreted “VERY

     GOOD” in the criteria of Efficiency because it provides

     convenience to the school and to the employees.

  2. . Based on the proposed security system was interpreted “VERY

     GOOD” in the criteria of Accuracy because its digitalized is 100

     percent in protecting the school.

  3. . Based on the proposed security system was interpreted “VERY

     GOOD” in the criteria of Reliability it can use anytime.

  4. . Based on the proposed security system was interpreted

     “EXCELLENT” in the criteria of User-friendly because it is easy

     to use, understand and operate.

  5. Based on the proposed security system was interpreted

     “EXCELLENT” in the criteria of Simplicity because of the

     projects clearness of design.




  CONCLUSION

                                     59
Based on the proponent objective and data gathered and have some

   findings determined by the proponent. The proposed design helps to

   protect the student, employee and school properties. The proposed

   project is very good in terms of detecting intruders and hazardous

   accidents. Since the proposed research is digitalized; it helps the

   security guard and employee to monitor the whole school.




RECOMMENDATION

      Therefore, the proponents would like to recommend the proposed

research to be initiated and give enough attention by the administration of

Eulogio “Amang” Rodriguez Institute of Science and Technology

regarding on the benefits of the research specifically on health, security

and environment and environmental aspects of life so that it will be

initiated for the school and other universities on a long term plan project

that could benefits all of us.




Bibliography


                                    60
www.alarmsystemreviews.com

www.medialab.tfe.umu.se/...thesis/.../intelligent_home_security_system.pdf

innovexpo.itee.uq.edu.au/2001/projects/s804258/thesis.pdf

www.datanumeric.com/thesis/thesis.pdf

www.datanumeric.com/thesis/thesis.pdf

www.datanumeric.com/thesis/thesis.pdf

www.cs.virginia.edu/~jck/publications/Weatherwax_MS_Thesis.pdf


   •     Capacitive Position/Displacement Sensor Theory/Tutorial

   •     Capacitive Position/Displacement Overview

   •     Comparing Capacitive and Eddy-Current Sensors

   •     M. Kretschmar and S. Welsby (2005), Capacitive and Inductive Displacement

         Sensors, in Sensor Technology Handbook, J. Wilson editor, Newnes:

         Burlington, MA.

   •     C. A. Grimes, E. C. Dickey, and M. V. Pishko (2006), Encyclopedia of

         Sensors   (10-Volume       Set),   American   Scientific   Publishers.   ISBN

         1-58883-056-X

   •     Sensors - Open access journal of MDPI

   •     M. Pohanka, O. Pavlis, and P. Skladal. Rapid Characterization of Monoclonal

         Antibodies using the Piezoelectric Immunosensor. Sensors 2007, 7, 341-353

   •     SensEdu; how sensors work

   •     Clifford K. Ho, Alex Robinson, David R. Miller and Mary J. Davis. Overview

         of Sensors and Needs for Environmental Monitoring. Sensors 2005, 5, 4-37

   •     Wireless hydrogen sensor

   •     Sensors and Actuators - Elsevier journal

   •     Automated Deformation Monitoring system

   •     Droid's Sensors -adware for droidsensors


       Trimmer, H.William (1981). Understanding and Servicing Alarm Systems.

Stoneham: Butterworth.

                                            61
Weber, Thad L. (1985). Alarm Systems and Theft Protection (2d ed.). Stoneham,

MA: Butterworth.

M Walker, Philip (1985). Electronic Security Systems. Cambridge, UK: University

Press

P Ramsey, Anthony Home Security.

   Schatz, David A., et al. Video safety curtain. U.S. Patent No. 6,297,844, Issued

Oct. 2, 2001.

O Atss, R.Nandakumar.

O Aii, N.Clifton. "Broadband CSV, XML Alarm data Standards" Auckland NZ,

(2002

en.wikipedia.org/wiki/Sensor

en.wikipedia.org/wiki/Alarm

akyqowe.prv.pl/durationundergraduatedegree.html - Cached

Read more: http://www.servicemagic.com/article.show.Home-Security-

Alarms-For-Safety-and-Resale.15413.html#ixzz12C6tDaNH

2010 Home Security Blog | Entries (RSS) | Comments (RSS)

Dictionary. The American Heritage® Dictionary of the English Language, Fourth

Edition Copyright © 2007, 2000 by Houghton Mifflin Company. Updated in 2009.

Published by Houghton Mifflin Company. All rights reserved. Read more

Word Tutor. Copyright © 2004-present by eSpindle Learning, a 501(c) nonprofit

organization.                  All                  rights                  reserved.

eSpindle provides personalized spelling and vocabulary tutoring online; sign up free.

Read more

WordNet. WordNet 1.7.1 Copyright © 2001 by Princeton University. All rights

reserved. Read more




Niña Christea P. Orilla
Address: #705 T. Anzures St. Sampaloc Manila
Mobile #: 09091029270

                                         62
Email Address: thea_sakura@yahoo.com

Objective
        To partake and actualize learned ideas and skills to the company and equip the
right working attitude for attainment of future professional goals.
_______________________________________________________________________
_________________
Educational Background
Tertiary      Eulogio “Amang” Rodriguez Institute of Science and Technology
2010- present Bachelor of Science in Computer Engineering 5th yr level
Secondary            Marinduque National High School
2002-2006
Primary              Don Luis Hidalgo Memorial School
1996-2002


Seminars or Training Attended
SYSTEMATIC ASIA
         Sensor Technology: 1sth Step to MECHATRONICS               27h Day of August
2009
         Integrated Circuits: Assembly Process                      17th Day of July
2009
         PLC Programming
Hitachi Global Storage Technologies, Phils. Corp.
         Fabrication process of hard disk
PCOS Training Center Astron bldg.




Skills


    Computer skills (MS Word, Excel, Power Point)

    Willing to work on graveyard shifts

    Computer troubleshooting

    Knowledgeable in electronics

    Knowledgeable in pneumatics



Personal Background

Date of Birth          :             November 19, 1989
Place                  :             Isok Boac Marinduque
Civil Status           :             Single
Citizenship            :             Filipino
Age                    :             20
Height                 :             5’3’
Religion               :             Roman Catholic
Character References
Eng’r. Percival Macapagal            Professor                     09151174572



                                            63
This document was made and personally filled, in full honesty to the best of my
                              knowledge.




                                                         Niña Christea P. Orilla

                                                         Applicant’s Signature




                                      64

More Related Content

What's hot

Cognitive Develepment - Fundamentals of Psychology 2 - Lecture 2
Cognitive Develepment - Fundamentals of Psychology 2 - Lecture 2Cognitive Develepment - Fundamentals of Psychology 2 - Lecture 2
Cognitive Develepment - Fundamentals of Psychology 2 - Lecture 2Simon Bignell
 
Apple iPhone X – Infrared Dot Projector 2017 teardown reverse costing report ...
Apple iPhone X – Infrared Dot Projector 2017 teardown reverse costing report ...Apple iPhone X – Infrared Dot Projector 2017 teardown reverse costing report ...
Apple iPhone X – Infrared Dot Projector 2017 teardown reverse costing report ...system_plus
 
Fingerprint history0911
Fingerprint history0911Fingerprint history0911
Fingerprint history0911timr2700
 
Forensic photography
Forensic photographyForensic photography
Forensic photographydlamptey
 
Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Forensics of soil complete
Forensics of soil completeForensics of soil complete
Forensics of soil completekiran yadav
 

What's hot (7)

Cognitive Develepment - Fundamentals of Psychology 2 - Lecture 2
Cognitive Develepment - Fundamentals of Psychology 2 - Lecture 2Cognitive Develepment - Fundamentals of Psychology 2 - Lecture 2
Cognitive Develepment - Fundamentals of Psychology 2 - Lecture 2
 
2ridgeology
2ridgeology2ridgeology
2ridgeology
 
Apple iPhone X – Infrared Dot Projector 2017 teardown reverse costing report ...
Apple iPhone X – Infrared Dot Projector 2017 teardown reverse costing report ...Apple iPhone X – Infrared Dot Projector 2017 teardown reverse costing report ...
Apple iPhone X – Infrared Dot Projector 2017 teardown reverse costing report ...
 
Fingerprint history0911
Fingerprint history0911Fingerprint history0911
Fingerprint history0911
 
Forensic photography
Forensic photographyForensic photography
Forensic photography
 
Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Forensics of soil complete
Forensics of soil completeForensics of soil complete
Forensics of soil complete
 

Similar to Chapter 1 5 apllied research ko sad

IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 
Presentation-Slide-Template_MES_Capstone-Project-1.pptx
Presentation-Slide-Template_MES_Capstone-Project-1.pptxPresentation-Slide-Template_MES_Capstone-Project-1.pptx
Presentation-Slide-Template_MES_Capstone-Project-1.pptxAsifurRahman268068
 
Child Rescue System from Open Borewells
Child Rescue System from Open BorewellsChild Rescue System from Open Borewells
Child Rescue System from Open Borewellsijtsrd
 
OTGB - Student Symposium Poster
OTGB - Student Symposium PosterOTGB - Student Symposium Poster
OTGB - Student Symposium PosterPaulo Vasconcelos
 
My documentation
My documentationMy documentation
My documentationcas123
 
My documentation
My documentationMy documentation
My documentationcas123
 
Data is the new oil: Big data, data mining and bio - inspiring techniques
Data is the new oil: Big data, data mining and bio - inspiring techniquesData is the new oil: Big data, data mining and bio - inspiring techniques
Data is the new oil: Big data, data mining and bio - inspiring techniquesAboul Ella Hassanien
 
Data are the new oil: Big data, data mining and bio - inspiring techniques
Data are the new oil: Big data, data mining and bio - inspiring techniquesData are the new oil: Big data, data mining and bio - inspiring techniques
Data are the new oil: Big data, data mining and bio - inspiring techniquesAboul Ella Hassanien
 
Edited-Automated Door Lock with Realtime Surveilance Chapter 1 to 5.docx
Edited-Automated Door Lock with Realtime Surveilance Chapter 1 to 5.docxEdited-Automated Door Lock with Realtime Surveilance Chapter 1 to 5.docx
Edited-Automated Door Lock with Realtime Surveilance Chapter 1 to 5.docxAkmadAliAbdul1
 
Comparative-Assessment-between-PIR-and-Ultrasonic-sensor-for-Burglar-Alarm-Ap...
Comparative-Assessment-between-PIR-and-Ultrasonic-sensor-for-Burglar-Alarm-Ap...Comparative-Assessment-between-PIR-and-Ultrasonic-sensor-for-Burglar-Alarm-Ap...
Comparative-Assessment-between-PIR-and-Ultrasonic-sensor-for-Burglar-Alarm-Ap...HectorLyn
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentationcas123
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system96452128
 
intrusion detection
 intrusion detection intrusion detection
intrusion detectionasif usmani
 
Modified Child Rescue System against Open Borewell
Modified Child Rescue System against Open BorewellModified Child Rescue System against Open Borewell
Modified Child Rescue System against Open Borewellijtsrd
 
STRS Security
STRS SecuritySTRS Security
STRS Securityjdalton
 

Similar to Chapter 1 5 apllied research ko sad (20)

IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
Presentation-Slide-Template_MES_Capstone-Project-1.pptx
Presentation-Slide-Template_MES_Capstone-Project-1.pptxPresentation-Slide-Template_MES_Capstone-Project-1.pptx
Presentation-Slide-Template_MES_Capstone-Project-1.pptx
 
Child Rescue System from Open Borewells
Child Rescue System from Open BorewellsChild Rescue System from Open Borewells
Child Rescue System from Open Borewells
 
OTGB - Student Symposium Poster
OTGB - Student Symposium PosterOTGB - Student Symposium Poster
OTGB - Student Symposium Poster
 
My documentation
My documentationMy documentation
My documentation
 
My documentation
My documentationMy documentation
My documentation
 
Data is the new oil: Big data, data mining and bio - inspiring techniques
Data is the new oil: Big data, data mining and bio - inspiring techniquesData is the new oil: Big data, data mining and bio - inspiring techniques
Data is the new oil: Big data, data mining and bio - inspiring techniques
 
Data are the new oil: Big data, data mining and bio - inspiring techniques
Data are the new oil: Big data, data mining and bio - inspiring techniquesData are the new oil: Big data, data mining and bio - inspiring techniques
Data are the new oil: Big data, data mining and bio - inspiring techniques
 
Smart Sensors, Smart Attendance System IDM15
Smart Sensors, Smart Attendance System  IDM15Smart Sensors, Smart Attendance System  IDM15
Smart Sensors, Smart Attendance System IDM15
 
Edited-Automated Door Lock with Realtime Surveilance Chapter 1 to 5.docx
Edited-Automated Door Lock with Realtime Surveilance Chapter 1 to 5.docxEdited-Automated Door Lock with Realtime Surveilance Chapter 1 to 5.docx
Edited-Automated Door Lock with Realtime Surveilance Chapter 1 to 5.docx
 
Comparative-Assessment-between-PIR-and-Ultrasonic-sensor-for-Burglar-Alarm-Ap...
Comparative-Assessment-between-PIR-and-Ultrasonic-sensor-for-Burglar-Alarm-Ap...Comparative-Assessment-between-PIR-and-Ultrasonic-sensor-for-Burglar-Alarm-Ap...
Comparative-Assessment-between-PIR-and-Ultrasonic-sensor-for-Burglar-Alarm-Ap...
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Thesis my documentation
Thesis  my documentationThesis  my documentation
Thesis my documentation
 
Development of anti theft security system
Development of anti theft security systemDevelopment of anti theft security system
Development of anti theft security system
 
Trans studio5.20
Trans studio5.20Trans studio5.20
Trans studio5.20
 
intrusion detection
 intrusion detection intrusion detection
intrusion detection
 
Modified Child Rescue System against Open Borewell
Modified Child Rescue System against Open BorewellModified Child Rescue System against Open Borewell
Modified Child Rescue System against Open Borewell
 
STRS Security
STRS SecuritySTRS Security
STRS Security
 

More from cas123

ayan na
ayan naayan na
ayan nacas123
 
Scrnsht
ScrnshtScrnsht
Scrnshtcas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadcas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1cas123
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesiscas123
 
Thesis
ThesisThesis
Thesiscas123
 
Sad format
Sad formatSad format
Sad formatcas123
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2cas123
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123cas123
 

More from cas123 (20)

ayan na
ayan naayan na
ayan na
 
Scrnsht
ScrnshtScrnsht
Scrnsht
 
Print
PrintPrint
Print
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Chapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sadChapter 1 5 apllied research ko sad
Chapter 1 5 apllied research ko sad
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 
Former chaptr1
Former chaptr1Former chaptr1
Former chaptr1
 
Bckgrnd thesis
Bckgrnd thesisBckgrnd thesis
Bckgrnd thesis
 
Thesis
ThesisThesis
Thesis
 
Sad format
Sad formatSad format
Sad format
 
Sad chapter123 2
Sad chapter123 2Sad chapter123 2
Sad chapter123 2
 
Sad chapter123
Sad chapter123Sad chapter123
Sad chapter123
 

Chapter 1 5 apllied research ko sad

  • 1. INTRODUCTION Security plays a vital role for the safekeeping of lives and properties. Whether inside or outside the house, in the mall, or almost everywhere there is a security threat. The researcher wishes to elaborate on the situation happended in a certain school in Cheachnea, Russia in 1991. There are some chaechnean rebels who hostage the entire school and lead all the students to the gymnasium and what happended? They burned the entire gymnasium where all the students inside. The point of the researcher is that, security a campus, school, university, and almost every entity needs security or a security system. This is where the poroposal of the researcher comes in. Security system computing a system that enforces boundaries between computers networks an electrical device that sets off an alarm when someone tries to break in. A professionally installed system designed to detect intrusion or other hazard, including sensors, an alarm- sounding device and communication device that reports conditions to an alarm monitoring service. Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) is one among the State College in the Philippines which is situated in the heart of its capital, Manila. It has an estimated student population of 10,000 students and 600 faculties and employees. As the school population increases every year, the demand for more security is imperative. 1
  • 2. The security level risk in a school such as Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) is very high. The instrument used for the protection of the institution is composed of only a recording CCTV camera and security personnel’s. The institution is still exposed to other stimulated complication such as outsiders – students from other schools or universities and out of school youth and visitors, fire and intruders. Improving the system should be the number one priority of the school to protect each persons and properties coming in and out and of the school premises. This research about the Eulogio “Amang” Rodriguez Institute of Science and Technology Security System Project is an improvement of the school’s existing security system. Whereas it uses a digital security system with voice feature which can monitor room temperature, smoke, motion, windows and doors. This research aim is too developed mainly to respond to security issues at real time. 2
  • 3. BACKGROUND OF STUDY Original house, school and office alarms worked by signaling a ‘local’ alarm when the system was triggered. This worked well so long as people hearing the alarm responded to it. As security systems became more common, the number of false alarms increased to such as degree that many ‘local’ alarms began to go unnoticed and unreported. Intruders also learnt how to disarm the system so could quickly and easily stop the alarm. If you were relying on this for the safety of your property you could be in trouble. Nowadays, many people use external alarm monitoring centers to protect their property. Here, not only does a ‘local’ alarm sound but the alarm is also picked up by staff at the monitoring center who will then respond accordingly. When first invented, house, school and office alarms were triggered by the release of a pressure button fitted into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to close the door or window. Nowadays there are various systems on the market ranging from inexpensive DIY alarms to highly sophisticated systems requiring professional installation. All modern alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the system you choose. The alarm is triggered when the circuit is altered and will not be silenced until a code is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and 3
  • 4. pressure pads to ensure even the most cunning intruder doesn’t get his hands on your treasures. Unsurprisingly, house, school and office alarms have changed a lot over the last century and no doubt will continue to improve as technological knowledge expands. The market is filled with a wide range of systems and companies offering a variety of deals. So whatever you want to protect, and however much you have to spend there will be an alarm out there to suit your needs. The Eulogio “Amang” Rodriguez Institute of Science and Technology was established after the liberation Manila in 1945. Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) started as a Vocational High School with only a room at the second floor of the Mapa High School, nine teachers, a clerk and 147 students. Only July 1, 1946 , Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) acquired its present site at Nagtahan Sampaloc, Manila. Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) is composed of only recording CCTV camera. This kind of security system only records of what it is happening. But it cannot aid or give solution if there is something wrong in the area. The researcher proposed a newly security system that will improve the security system Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST). This is a digital security system with voice feature which can monitor room temperature, smoke, motion, and windows and doors. The system is fully digital and also fully customized. 4
  • 5. It incorporated a 16x2 LCD display with a 4x4 keypad. Each sensor can be enabled and disabled, and alarm frequency and skim can also be chosen by users. It has also equipped a voice playback chip, and it will speak which sensor has gone. OBJECTIVE The proponents, based on the initial research, have come up with objectives to further study the situation. A. General Objectives The general objectives of this research are to develop and construct a security system that will serve as a proposal to improve the old security system of Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST). B. Specific Objectives • To provide a much effective security system that would help them to secure the safetiness of every student and employee. • To be able to determined if there is a hazardous accident. • To be able to create a effective security system that would help them to monitor if there is a intruders. • To be able to protect each persons and properties coming in and out of the school premises. 5
  • 6. CONCEPTUAL FRAMEWORK INPUT PROCESS OUTPUT • Submit the • Analyze and • Improve the created interpret all security system permission the data of EULOGIO letter with gathered and “AMANG” regards to the answer to RODRIGUEZ project the INSTITUTE OF design. questionnaire SCIENCE ABD . TECHNOLOGY • Give them a (EARIST). copy of • Check the • Acceptance of questionnai school floor the design. re to be plan. answer. • Visualize the area of the school. • FIGURE1. CONCEPTUAL PARADIGM The figure presents the conceptual framework of the study. This input will assist the researcher to gather some data regarding the research. 6
  • 7. It will lead the researcher in additional knowledge about the proposed research. This input will have the basic knowledge regarding the security system. In the process, this were the researcher analyze and interpret the data and knowledge that the researcher attain. The output of this research will be the acceptance of the design after formulating the new security system of EULOGIO “AMANG” RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY (EARIST). The design will be highly recommended to applied and enhance the security level of EULOGIO “AMANG” RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY (EARIST). STATEMENT OF THE PROBLEM This research under taken to analyze and interpret the proposed security system for Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST). Specifically the aims to answer the following question. 1. What is the current assessment of the old Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) security system? 2. How will this research help the school to improve their security system? 3. What are he benefits of the newly proposed security system? 7
  • 8. 4. Is the newly proposed security is effective to secure the protection of the school? 5. Is there any significant difference between the old Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) security system and the newly proposed security system? SCOPE AND DELIMITATION The newly proposed security system is an enhancement of an existing security system of Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST). The proposed security system is system for monitoring the whole school. It can monitor if there is a movement or an intruder in a room or someone is trying to break-in. It can also detect smoke that may cause fire that will cause a lot of damage in the school properties and lives of every person in the school. This security system cans etec5t if there is sudden change in temperature. It extremely simple design and construction and adapted to pre-design for use in school, business or house. This could be used as basis for similar studies that would be conducted by other researcher. Limitations of the Study The proposed research is only focused in Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) for improving their security system. 8
  • 9. SIGNIFICANCE OF THE STUDY The researcher proposing a security system that will enhance the old security system of Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST); it will give significance particularly to the following: This research will benefit every student and employee in Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST). STUDENTS. They will be assured of their protection from hazardous accidents, intruders; outsiders that will only cause them harm and trouble. SCHOOL AND EMPLOYEE. The proposed security system will help them to monitor the school easily that will lessen their work and save time.The proposed security system will assured that the school will be safe from damage caused by hazardous accidents. RESEARCHER. The researchers have developed their writing, analysis and interpretation skills needed to make a good research about security system. FUTURE RESEARCHER. This will benefits other researcher who wish to have similar studies as they can get background information from the result of this study which will serve as template to modify their research. 9
  • 10. HYPOTHESIS The purpose of this research is to develop and create a security system for Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) that could help them to monitor the school easily and to determined whether there is any problem and intruders within the school compound. Using a security system in the school, business, and laboratory are very much useful to monitor and to aid easily if there is a problem in the area. And it is also help to save much time and works. Providing an effective security system will help to avoid hazardous accidents and to protect the school from every person coming in and out of the school. Security system will benefit not only the employee/ employer of the Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) but also the student. Finally, the researcher found out that there is no significant difference between the old security system of Eulogio “Amang” Rodriguez Institute of Science and Technology (EARIST) and the newly proposed security system. 10
  • 11. DEFINITION OF TERMS Sensor - is a device that measures a physical quantity and converts it into a signal which can be read by an observer or by an instrument. Alarm - gives an audible or visual warning about a problem or condition. Alarms have the capability of causing a fight-or-flight response in humans; a person under this mindset will panic and either flee the perceived danger or attempt to eliminate it, often ignoring rational thought in either case. We can characterize a person in such a state as "alarmed". Digital - system is a data technology that uses discrete (discontinuous) values. By contrast, non-digital (or analog) systems use a continuous range of values to represent information. Although digital representations are discrete, the information represented can be either discrete, such as numbers, letters or icons, or continuous, such as sounds, images, and other measurements of continuous systems. The word digital comes from the same source as the word digit and digitus (the Latin word for finger), as fingers are used for discrete counting. The word digital is most commonly used in computing and electronics, especially where real-world information is converted to binary numeric form as in digital audio and digital photography. 11
  • 12. Motion detector - is a device that contains a physical mechanism or electronic sensor that quantifies motion that can be either integrated with or connected to other devices that alert the user of the presence of a moving object within the field of view. They form a vital component of comprehensive security systems, for both homes and businesses. Smoke detector - is a device that detects smoke, typically as an indicator of fire. Commercial, industrial, and mass residential devices issue a signal to a fire alarm system, while household detectors, known as smoke alarms, generally issue a local audible and/or visual alarm from the detector itself. Smoke detectors are typically housed in a disk-shaped plastic enclosure about 150 millimetres (6 in) in diameter and 25 millimetres (1 in) thick, but the shape can vary by manufacturer or product line. Most smoke detectors work either by optical detection (photoelectric) or by physical process (ionization), while others use both detection methods to increase sensitivity to smoke. Smoke detectors in large commercial, industrial, and residential buildings are usually powered by a central fire alarm system, which is powered by the building power with a battery backup. However, in many single family detached and smaller multiple family housings, a smoke alarm is often powered only by a single disposable battery. 12
  • 13. Magnetic switch - A switching device consisting of three metallic layers (a paramagnetic layer between two ferromagnetic layers), whose action is based on electron spin and is controlled by a small magnetic field. Also known as bipolar spin device; bipolar spin switch; magnetic spin transistor; spin transistor; spin valve. Temperature sensor - a thermometer (from the Greek '' (thermo) meaning "warm" and meter'', "to measure") is a device that measures temperature or temperature gradient using a variety of different principles. A sensor that make it possible to measure temperature. System - is a collection of elements or components that are organized for a common purpose. The word sometimes describes the organization or plan itself (and is similar in meaning to method, as in "I have my own little system") and sometimes describes the parts in the system (as in "computer system"). A computer system consists of hardware components that have been carefully chosen so that they work well together and software components or programs that run in the computer. Flame detector - is a detector that uses optical sensors to detect flames. Alarm Monitoring - Central-Station is a common term used to refer to a company that provides services to monitor burglar, fire and residential alarm systems. The central-station may also provide watchman and supervisory services. 13
  • 14. Related Literature Home security has become one of the top things people look for in a property. Along with lot size, square footage, and location, the kind of home security system a house has in place is now truly a deciding factor for buyers. Due to this trend, having a security alarm is not only important when living in a house, but when selling one, as well. Security Alarm System Overkill The demand for security alarm systems is increasing, and more and more options are becoming available for residential use. While having more options is certainly good news for homeowners, it can, at times, make it difficult to find the right setup for your household. When installing a security alarm system that is meant to protect your family and possessions, it's easy to go overboard and end up with a system that is intrusive (and, in turn, might not get used at all). Most people do not require a fingerprint identification lock, but other forms of keyless home entry might be a perfect fit. The best option for your home should be a system that provides a significant amount of protection, but doesn't interfere with the day-to-day life of your family. 14
  • 15. The Basic Security Alarm A standard home security alarm is often a good fit for most households. These systems generally include sensors on all the entry doors, some motion activated outdoor lighting, sensors on windows that are particularly easy to access, and, most importantly, a direct link to a monitoring service. This type of security alarm system will be an excellent deterrent for any would be intruders, but, at the same time, is generally fairly easy for a family to adapt to. Make sure you feel safe in your home! Use this link to Install Security System Security Alarm Benefits Most would say that the biggest benefit of having a home security alarm is the peace-of-mind that comes with it. When something goes wrong (whether you are home or thousands of miles away on vacation), knowing that a system is already in place and that your house has a direct link to the proper authorities is very reassuring. There may be immediate monetary benefits, as well. Having a security alarm that is connected to a monitoring service can, in some situations, lower homeowner's insurance payments up to 20%. Many monitoring services will also offer a plan to monitor your home for fire, which some insurance companies will also take into account when deducing your premium. In every case, it will decrease the likelihood of losing money due to burglary. 15
  • 16. Increase your Home's Resale Value Along with presenting a clean home, there are many improvements that can be made to a property that will increase its resale value. Adding on a garage, finishing a basement, and remodeling a kitchen, while all good ideas, can be rather costly endeavors. Landscaping a yard for security, installing a home security alarm, and putting in outdoor lighting are much less expensive projects. Despite the lower initial cost, prospective buyers still look upon these kinds of home improvements as important additions to the property they are viewing. Wireless Home Security Alarm Systems – Advantages and disadvantages There is no doubt that wireless home alarm security systems are becoming the preferred choice when it comes to alarms in the house. One of the best advantages of this type of system is that it is very easy for do- it-yourself installer. This is because you do not have the wiring all the different components of the home security system to run. With a wireless security system, there are few components, each of these Components is very easy to install. But that does not mean that these types of security systems are not without flaws. For example, if you carefully plan it out, it is likely that there are few places in the house that are not protected by the system to be. The reason is simple – because the signals received by a primary control unit if they are sent to a component that is out of reach, that 16
  • 17. component will not be good signals. Therefore, there is a greater likelihood that your house will not be as safe as you might like. There will, however, with the proper positioning of wireless sensor at home, your home wireless network security alert system is as safe as – if not more – as a system disk. Some people think that the next is an advantage or a disadvantage. Wireless systems are running on battery, no electricity. It can be seen as an advantage, because If your electricity is cut you are sure that your security system will continue to work. But if you forgot the batteries to replace so your system is virtually useless. The last advantage is wireless, and perhaps the most preferred by consumers. In general, a wireless security system home alarm system is less expensive than one that is difficult. If you are on a tight budget and want to install by yourself, then a wireless system is probably the way too. E 'preferable, especially in apartments or rental properties, because it is easy to transport when you move. In any case, it is important to understand both the advantages and disadvantages of wireless security and home difficult. Use this question in this article as a starting point for further research to make the right choice for your home. 17
  • 18. Foreign Study Houston Home Security: Make Installing a Home Alarm Your New Year Resolution! Everyone knows the tradition of making New Year Resolutions. We all make plans for improving ourselves; but no matter how great our intentions, we more than likely will fall short of our goals. Most of these plan are for worthy, but perhaps a bit superficial ideals like losing weight, becoming organized or learning a new language. There is one resolution, however, that can make a real difference in the safety of your family: assessing your Houston home security. Installing a home alarm in your Houston home may mean protecting your property and your loved ones against dangerous intruders. A security systems company in Houston should be able to help you plan out the following steps towards reaching a goal of a safer home in the new year:1.Do your own safety assessment. It doesn’t take a professional to notice aspects of your property that could use more attention to security. Do you have bushes that hide your doors and windows? Are your exterior doors solid? Do all of your windows lock? Is your property well-lighted? Some of these problems can be addressed on your own, prior to contacting a Houston home alarm company. Once the security professionals come to your home, they may 18
  • 19. also have additional suggestions for improving the security of the property. 2. Contact a Houston home security firm. Your next New Year Resolution should be to develop a business relationship with a Houston security systems company, preferably a firm that has a solid history of customer satisfaction. Let the staff at that company know that you are looking to make some real changes to your home security and that you are open to learning about all of the products and services they have to offer. Do not hesitate to let them know exactly what you are looking for and how much you are willing to spend on your Houston home alarm. A quality company should provide such benefits as free professional installation and additional alarm keypads.3.Invest in a monitored alarm system. Your home alarm is only as good as the quality of the monitoring. It is best to look for a company that provides round the clock monitoring at a monthly rate, because you don’t want to have gaps in your coverage. Ask your alarm company if they also offer such security features as fire monitoring, because the convenience of adding that to your system makes it worthwhile to do so. Finally, do due diligence in your research as you locate a Houston home security that offers you as much value as it does quality. Safeguard Home Security offers our customers excellent customer service by experienced, licensed home alarm professionals. You wish to keep your family safe from accidents, fires, and other difficulties, and then ADT security systems will be an outstanding choice. Real residential security begins with a proper security set-up, 19
  • 20. which is precisely what ADT offers. Protection services that families get the best home security possible and ADT security up a wide array of home security. Perhaps the single most popular service offered by ADT security system is their home preservation service. ADT Security Systems alerts homeowners of intruders using cutting edge technology. Unlike its competitors, ADT security systems services don’t utilize any wires in their alarm systems. The ADT security systems have also added one other cutting-edge feature to their home security system, these are heat sensors. The security system sensors by ADT are extremely advanced, as they have the capability to differentiate between a stray animal entering the house and a thief. That keeps families completely safe and secure aside from the above features, ADT security systems also offer additional services. Their fire and carbon monoxide sensors are extremely vital services that can be counted upon in case fire-related problems occur. These sensors easily detect an intruder so the family can escape to safety while the ADT Security Systems calls the authorities. ADT security systems do even more. ADT security systems can also deliver security while on the road besides providing hone security. People at home can easily locate relatives who are running late via the GPS devices. Whether they’re at home or away from it, with ADT security systems, people are assured of safety. 20
  • 21. Security System Problem: There was a need in the self storage industry to be able to monitor when a particular unit was open. Since most self storage units do not allow access to the owner/management for installing new wiring/equipment, the system to be developed needed to be able to be deployed without adding any new wiring to the facility and had to be capable or being installed without entering the individual units. Solution: Group Alpha developed a unique door sensor that would sensor the relative position of a particular door and send back that door's position via a RF link to a controller that would send out alerts to a PC application based on changes in state.The sensors needed to be very low powered since they are battery powered and had to be very low cost because the number of doors within a particular installation could reach several thousand. A set of gateway/repeaters were also developed. These units are distributed throughout the storage facility allowing the RF signals to be relayed via power line communications to the main controller. This allows the entire system to be installed within any proprietary wiring except the single cable that connects the main controller to the PC. This system illustrates the diverse communications technologies that Group Alpha can bring to bear to solve a particular engineering problem. When considering different home security systems, it would pay to know the home security system ratings for different ones and one such 21
  • 22. one is Brinks Security which has a number of advantages and also a few disadvantages. To begin with, you should learn more about what the company is all about if you want to be able to evaluate the home security system ratings for it and after much looking about you may find that Brinks began operation in 1859 when it began to provide different security services for various companies and which has since expanded to cater to as many as a million customers in the US thanks to the trust that it has built into its product name. Various Aspects That Need To Be Considered There are various aspects to the Brinks home security systems including its monitoring capabilities, price, installation and also handling of problems that you would want to know more about and thus may need to view the home security system ratings for this company in each of these regards. The first piece of information that you need to consider is what the whole package is going to cost you and this will play an important part in how you evaluate the home security system ratings for Brinks Security home security systems, which with all the bells and whistles may total up to three hundred and twenty dollars plus taxes, which according to user’s home security system ratings amounted to just fair and no more. Another aspect of the Brinks Security home security system that readers will want to know about and for which home security system ratings are required includes the monitoring abilities of this system, 22
  • 23. which it must be said are good and thus deserve high home security system ratings. You can be sure that the monitoring response in case of a break in is very good and even though you will need to pay an extra thirty odd dollars for the monitoring service, it is money well spent and this is reflected in its high home security system ratings given to this product. Next, you will need to find what the home security system ratings as far as installing the system are and you may be surprised to learn just how many technicians can be involved in the whole exercise and how long it can take to complete all the drilling, wiring and cabling of the home. Despite all these inconveniencies the Brinks Security gets good home security system ratings for installation and the staff was friendly and was able to answer all questions satisfactorily. Once you have got the home security system ratings for the different aspects to using Brinks Security systems, you should be able to decide whether to go ahead and use it or not. Local Study I have a very special reason for starting this article, its simple It became abundantly clear during my last visit that security is one of the major considerations when living full time in the Philippines. I have to say in all the visits I have ever made to the Philippines I have yet to become the victim of a crime, that is not to say that crime doesnt 23
  • 24. happen in my home country, wow, it happens everywhere in the world, why some areas of London, I would never drive around with my doors not locked, secondly, I have friend who drive around certain districts with a cost in their car, (Iron bar resembling a steel baton) interestingly, they don’t drive around with a hand gun, I will come onto this later. ( Handguns represent a mandatory 5 year prison term if caught with them). I want to share some of my recent experiences with you all, and as usual I am very much interested in your own experiences including your views on some of my writings. So here goes, I was under the impression, that it was mainly foreigners who were very security conscious, hmmm that was a totally wrong assertion, I had the good fortune to visit the son of my wife former employer, he lives in a security gated compound within a sub division, the gates are locked at all times, they have 7 foot high barbed wire, or walls with casual glass pieces stuck into the cement, these it appears are to prevent people scaling the walls to gain entry. I spoke to my friend about security for me in the Philippines, his replies kind of shocked me, remembering whilst I might have a house in the Philippines, and the house does have high walls with security bars, I have never had to live in a house with the level of security my friend was suggesting was required. 24
  • 25. He told me firstly, in your home you should have personal protection, so I butted in and suggested perhaps a mace or chemical spray maybe an intruder alarm system, such as we have back here in UK, maybe an alarm over the telephone system, connected to Police HQ, that brought a few laughs from him. “No he said, you need a good weapon in the house, or 2 or 3 if you can,” I was a little startled by this, since I was trained in certain weapons but had not fired a shot since the 80′s, I know in certain States in the U.S.A. its quite acceptable to have a gun at home, and in certain states, my experience of this was when I was in Nevada, its acceptable to shoot an intruder on your property. Sadly, we cannot do that in the UK, in fact if you shot the intruder, you would be the one most likely charged with armed assault, and if the intruder died, charged with murder, yes the rules for intruders in our country are hard for some to understand, you may be accused of violating his civil rights amongst a string of other things, so shooting someone in your house is not a good idea. Going back to my freind – he told me that its acceptable if you have a permit to own a hand gun, or rifle, or automatic rifle in your home, provided its for home protection, he even went on to say that he is allowed to transport the weapons, and that he can fire them under controlled conditions, what he didnt tell me, that when we arrived at our destination at his Fathers mountain resort, is that he was actually carrying 25
  • 26. a loaded weapon in his pocket, I have to say at first sight I was shocked to find that he had a Berreta handgun, with 13 rounds of ammo in a magazine in his pocket. I questioned my freind further, “Why do you have this semi automatic pistol in your pocket I asked” well Pete its really for our protection, we don’t know who we will encounter up here, the Philippines is very poor, there are some desperate people here, and its better to have protection than not all”, I also went on to say that I did not believe in having guns in the house, I saw no need for it, my friend said ” I suggest you obtain one in your wife name, keep it in your house, you can draw it if required, as long as someone is breaking into your lot or house, you have a right to shoot them to prevent them if your life is threatened.” I asked my wife about this, since it had never been discussed before, my wife confirmed what my friend had said, although she did not like the idea of a weapon in the house any more than I did. He also then went on to show me the holes in the side of the house walls, they were placed there to put the barrel of their guns through should armed intruders attack the house, was I in dreamland?? is this the Philippines, why had I not seen any violence of this type, I see guards all the time at the banks, they all have 12 bore shotguns, some with M16 automatic rifles, on the Ferry to Ilo Ilo, I see guards with weapons, automatic rifles, and yet it hadn’t really sunk in. 26
  • 27. The 2nd experience was at the Husband of my wife’s Doctor friend, I discussed the level of personal security in the Philippines with him, his reply astounded me even further, ” Yes I have a gun, actually I have about 20 different guns, would you like to come and see them ?” I asked why there was a need for so many guns. he said, that even for Filipinos its dangerous in this country, you need lots of protection, he said, in my house and lot, I have over 20 dogs in the grounds, naturally he had a big lot, but about 20 dogs, i have 3 Akita Japanese guard dogs, and 4 German Shepherds, the rest are a selection of other dogs, why so many I asked? Keep out undesirables he said, at night, I let all the dogs out, they keep a visible prescience at night, after that, I have 3 boys in the lot, looking after the dogs, and keeping an eye on things, after that, I have 2 semi automatic rifles at strategic points, and 2 handguns at others,…..is this the Philippines ? Wake me up somebody because I felt that hearing the 2 experiences led me to believe that this is over stretching personal security a little bit, or is it? remembering I am a foreigner, these people are natural born Filipinos living in their own country, who knows the situation better than they do, and yet I have not heard any experiences about security issues involving foreigners, I know that Bob has remarked very often that Davao City is a very safe city, and he has always said how safe he feels 27
  • 28. there, I have no reason to disbelieve him, or any other reader who says they feel safe in their city of occupation. I can only now refer to my final experience, a couple of weeks ago, I accompanied my wife to the downtown plaza area of Bacolod City, she wanted to have some photos developed, in the car I was driving, my wife said to me ‘Now empty your pockets honey, give me your wallet, and where is your credit cards, give them to me, do you have any money, oh yes, fine give that to me too. Make sure your pockets are empty, when you come with me, you are a target for snatchers, and robbers, when we arrived in the plaza mart, I remarked to the cashier about the security problem in the area, the young lady said, Sir its quite safe here for you, my wife over heard the conversation and said in English, don’t tell me husband that, you know its not safe, there are pickpockets, thieves and robbers here, she said I myself was robbed the last time I was down here, so don’t tell him that, he has to know its not safe here, and with that we paid and promptly left. So how about personal security, some of you will tell me you have never felt unsafe, maybe there are some of you who have had bad experiences, I know all will be different, what about guns ? How do you feel about owning and keeping one? Recently I was taken to a firing range in Negros and given light weapons training on the Biretta hand gun, the Browning Automatic and M14 and M16 Semi Automatic Weapons, I had a great day out with some 28
  • 29. friends, but it also brought home to me and reminded me just how dangerous guns are. Some of you won’t feel comfortable with it, and if you had to draw your gun to defend yourself, could you do it? What if there was a discharge enquiry by the Police if your discharged your gun in such an incident, how would it go down for you if you are a foreigner? These and many other questions need to be discussed, I hope to hear all your viewpoints on this, and look forward to reading your replies. 29
  • 30. Research Methodology A. Research Design What is Descriptive Research? This research is the most commonly used and the basic reason for carrying out descriptive research is to identify the cause of something that is happening. For instance, this research could be use in order to find out what age group is buying a particular brand of cola, whether a company’s market share differs between geographical regions or to discover how many competitors a company has in their marketplace. Descriptive research, also known as statistical research, describes data and characteristic about the population or phenomenon being studied. Descriptive research answers the questions who, what, where, when and how. This type of research is also a grouping that includes many particular research methodologies and procedures, such as observations, surveys, self-reports, and tests. The four parameters of research will help 30
  • 31. us understand how descriptive research in general is similar to, and different from, other types of research. Descriptive research is use to obtain information concerning the current status of the phenomena to describe "what exists" with respect to variables or conditions in a situation. The methods involved range from the survey which describes the status quo, the correlation study which investigates the relationship between variables, to developmental studies which seek to determine changes over time. B. Research Locale Eulogio "Amang" Rodriguez Institute of Science and Technology (EARIST) was established after the liberation of Manila in 1945. EARIST traces back its development from that of a vocational high school with only a room at the second floor of the Mapa High School, nine teachers, a clerk, and 147 students under Mr. Pantaleon Regala, its principal. Its former name was Eulogio Rodriguez Vocational High School (ERVHS). EARIST growth and development were made possible via three Republic Acts and Presidential Decree, to wit: Republic Act 4072, jointly sponsored by Congressman Ramon D. Bagatsing and Salih Ututalum in 1964, authorized the establishment of the Technical Education Department without changing the name of the school. It was headed by a Vocational Director. Republic Act 5088, sponsored by Congressman Sergio Loyola in 1967, authorized the renaming of ERVHS 31
  • 32. to Eulogio "Amang" Rodriguez Memorial School of Arts and Trades (EARMSAT) and signaled its separation from the Division of City Schools, Manila. It was headed by a Superintendent Republic Act 6595, sponsored by Congressman Joaquin R. Roces in 1972, converted EARMSAT to EARIST with a President as its head. This made EARIST into a full-pledged college and authorized the establishment of vocational-technical school branches in each congressional district of Manila. Presidential Decree 1524, signed by President Ferdinand E. Marcos on June 11, 1978, converted EARIST into a chartered state college with a Board of Trustees as its governing body and Dr. Hilario G. Nudas, as its first College President. Eulogio "Amang" Rodriguez Institute of Science and Technology. C. Samples and Sampling Technique Used EARIST employs almost a thousand of employees including faculties. The researcher have confined the research to 50 sampling sized only to be distributed with the following colleges and offices: College of Engineering, College of Business and Public Administration, College of Education, College of Arts and Sciences, College of International and Hospitality Management, College of Industrial Technology, and College of Architecture and Fine Arts. Administrative Office, Registrar’s Office, Office of the President and Vice President for Academic Affairs, Office of the Director for Research and Instruction and Office of the Director for Extension. The reason why the researcher uses the 50 sampling size is 32
  • 33. because the researcher will just distribute the survey questionnaires to member of the faculty and every student in the school. D. Instruments The instrument that the researcher will be using in conducting and developing this research is Survey Questionnaire. As par as this instrument is concern, it’s very easy for the researcher to get the pulse, views, ideals, and reactions of EARIST population. SURVEY QUESTIONNAIRES Name________________________________________ Course_________________ Department_________________ Position_______________________ Part 1 Profile Age: 16-20 years old Gender: 21-25years old Male: 26-30 years old Female: 31-35 years old 36 and up Knowledge in Security system: Advance Moderate Knowledgeable New Part 2 Improvement of the old security system of EULOGIO”AMANG” RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY: Check the appropriate box, which you believe applicable to the given variables. Rate Verbal Interpretation Range 5 Strongly Agree 4.6 – 5.0 33
  • 34. 4 Agree 3.6 – 4.5 3 Uncertain 2.6 – 3.5 2 Disagree 1.6 – 2.5 1 Strongly Disagree 1.0 – 1.5 A. The current assessment of the EARIST security system. 5 4 3 2 1 1. The security system the EARIST has a loop hole 2. It only uses CCTV Camera 3. The system only records in-coming and out-coming people 4. Check on all the vehicles going in-out of the institution 5. Cannot determine actual incidents inside or outside school properties B. Improvement of the school security system. 5 4 3 2 1 1. Knowledge in improving the security system 2. Appropriate security system is needed 3. On the spot monitoring of all activities inside the school premises 4. Awareness about the safety guidelines 5. Knowledge in terms of possible event if the security system is not effective C. The Benefits of newly proposed security system. 5 4 3 2 1 1. Digital security system 2. Save work and time 3. Give convenience in monitoring the whole school 4. On the report 5. Real –time events D. Effectiveness in terms of protecting the school. 5 4 3 2 1 1. Monitor accidents/ incidents 2. Monitor all the students coming in-out of the school 3. Monitor employees and faculty 4. Monitor the school designated area 5. Valuable things inside the school will be properly monitored E. There is no significant difference between the old and new system. 34
  • 35. _______________ Signature E. Statistical Treatment of Data The information gathered were tabulated and processed manually and with the aid of computer to determine the precise interpretation of the results. Matrix tables were made to organize, summarize, and analyze the data gathered for easy determination of its difference from each other. Data were collated, tabulated, and analyzed. The following statistical tools were used in the analysis of data: 1. Percentage The measure of dominant quantity was utilized to determine the most probable scenario. The formula of percentage is as follows: F P = ------- N Where P = Percentage (%) F = Frequency 35
  • 36. N = Total Number of Population 2. The responses to questions in the given variables were scaled using the “five-point-scale” or Likert Scale system and given weight as follows: Rate Verbal Interpretation Range 5 Strongly Agree 4.6 – 5.0 4 Agree 3.6 – 4.5 3 Moderately Agree 2.6 – 3.5 2 Disagree 1.6 – 2.5 1 Strongly Disagree 1.0 – 1.5 3. The process of finding the “Weighted Mean,” which is referred to as the central tendency was used, The formula is given below: (wx) Χ =Σ ------ N Where: X = weighted mean w = weighted factor Σ = sum of N = total number of respondents x = score 36
  • 37. To test the level of significance between the assessments of the respondents the Chi-Square were employed to determine the relationship of factors as given. The formula of chi-square is presented as follows: 2 (fo ) - ( fe ) X2 = -------------- fe Where: X = Chi – Square fo = Observed Frequency fe = Expected Frequency 4. Degree of Freedom Estimates of statistical parameters can be based upon different amounts of information or data. The number of independent pieces of information that go into the estimate of a parameter is called the degrees of freedom (df). In general, the degrees of freedom of an estimate is equal to the number of independent scores that go into the estimate minus the number of parameters estimated as intermediate steps in the estimation of the parameter itself (which, in sample variance, is one, since the sample mean is the only intermediate step). Df = (r-1) (c-1) Where: df = degrees of freedom 37
  • 38. R = row C = coloumn PRESENTATION, ANALYSIS AND INTERPRETATION OF DATA Table 1.1 Frequencies and Percentage Distribution on the Age of the Respondents Options Frequency Percent Rank 16-20 years old 13 26% Rank 3rd 21-25 years old 22 44% Rank 1st 26-30 years old 15 30% Rank 2nd 31-35 years old 0 0% 36yrs. and above 0 0% Total 50 100% Table 1.1 presents the frequency and percentage distribution on the age of the respondents. 13 or 26% of the respondents aged 18-20 years old, 22 or 44% of the respondents aged 21-25 years old, 15 or 30% of the respondents aged 26-30 years old, 0 of the respondents aged 31-35 years old and lastly 0 of the respondent aged 36 years and above. Table 1.2 Frequencies and Percentage Distribution on the Gender of the Respondents. Options Frequency Percent Rank Male 19 38% Rank 2nd Female 31 62% Rank 1st Total 50 100% Table 1.2 represents the frequency and percentage distribution on the gender of the respondents. 19 or 38% respondents are male while 31 or 62% are female. 38
  • 39. Table 1.3 Frequencies and Percentage Distribution on the familiarity in security ststem. Options Frequency Percent Rank Advance 7 14% Rank 3rd Moderate 22 44% Rank 1st Knowledgeable 12 24% Rank 2nd New 9 18% Rank 4th Total 50 100% Table 1.3 represents the frequency and percentage distribution on the familiarity in security system. 7 or 14% respondents is advance in familiarity in security system, 22 or 44% respondents is moderate in familiarity of security system, 12 or 24% respondents is knowledgeable in familiarity of security system, 9 or 18% respondents is new in familiarity of security system. Rate Verbal Interpretation Range 5 Strongly Agree 4.6 –5.0 4 Agree 3.6 –4.5 3 Moderately Agree 2.6 –3.5 2 Disagree 1.6 –2.5 1 Strongly Disagree 1.0 –1.5 Table 2.1 Frequency and Percentage Distribution the current assessment of the EARIST security system. 39
  • 40. 2.1.1 The security system the EARIST has a loop hole. Options Frequency Percent Rank 5(strongly agree) 17 34% Rank 2nd 4(agree) 23 46% Rank 1st 3(uncertain) 9 18% Rank 3rd 2(disagree) 1 2% Rank 4th Total 50 100% Table 2.1.1 represents the frequency and percentage distribution. 17 or 34% stated that they are strongly agreed that the security system of EARIST has a loop hole. 23 or 46% agree, 9 or 18% stated that they are uncertain, 1 or 2% stated they are disagree and none (0) respondent is strongly disagree. 2.1.2 It only uses CCTV Camera. Options Frequency Percent Rank 5(strongly agree) 15 30% Rank 2nd 4(agree) 19 38% Rank 1st 3(uncertain) 13 26% Rank 3rd 2(disagree) 2 4% Rank 4th 1(strongly disagree) 1 2% Rank 5th Total 50 100% Table 2.1.2 represents the frequency and percentage distribution on that the EARIST only uses CCTV camera. 15 or 30% stated that they are strongly agreed. 19 or 38% stated agreeing. 13 or 26% stated that they are uncertain affected, 2 or 4% are disagreeing and 1 or 2% respondent stated that they strongly disagree. 2.1.3. The system only records in-coming and out-coming people. Options Frequency Percent Rank 5(strongly agree) 19 38 Rank 2nd 40
  • 41. 4(agree) 22 44% Rank 1st 3(uncertain) 9 18% Rank 3rd Total 50 100% Table 2.1.3 represents the frequency and percentage distribution on the system only records in-coming and out-coming people. 19or 38% stated that they are strongly agreed. 22 or 44% stated are agreeing. 9 or 18% stated that they are uncertain affected, none respondents stated agree strongly disagree. 2.1.4 Check on all the vehicles going in-out of the institution. Options Frequency Percent Rank 5(strongly agree) 25 50% Rank 1st 4(agree) 17 34% Rank 2nd 3(uncertain) 7 14% Rank 3rd 2(disagree) 1 2% Rank 4th Total 50 100% Table 2.1.4 represents the frequency and percentage distribution on checking on all the vehicles going in-out of the institution .25 or 50% stated that they are strongly agreed. 17 or 34% respondents are agreeing. 7 or 14 stated that they are uncertain affected, 1 or 2% stated disagree and none (0) respondent stated that they are strongly disagree. 2.1.5 Cannot determine actual incidents inside or outside school properties. Options Frequency Percent W.M Rank 5(strongly agree) 20 40% 4.42 Rank 2nd 4(agree) 22 44% 4.2 Rank 1st 3(uncertain) 6 12% 4.4 Rank 3rd 2(disagree) 2 4% 4.24 Rank 4th 1(strongly disagree) 0 0 4.34 Total 50 100% 41
  • 42. Table 2.1.5 represents the frequency and percentage distribution on cannot determine actual incidents inside or outside school properties.20 or 40% stated that they are strongly agreed. 22 or 44% are stated agree. 6 or 12% stated that they are uncertain affected and 2 or 4% are stated disagree. And none (0) respondents stated in strongly disagree. Table 2.2 Improvement of the school security system. 2.2.1. Knowledge in improving the security system Options Frequency Percent Rank 5(strongly agree) 17 34% Rank 2nd 4(agree) 27 54% Rank 1st 3(uncertain) 6 12% Rank 3rd Total 50 100% Table 2.2.1 represents the frequency and percentage distribution. 17 or 34% stated that they are strongly agreed to trap mice automatically. 27 or 54% respondents agree, 6 or 12% stated that they are uncertain, and none respondents stated that they are disagree and strongly disagree. 2.2.2 Appropriate security system is needed. Options Frequency Percent Rank 5(strongly agree) 27 54% Rank 1st 4(agree) 14 28% Rank 2nd 3(uncertain) 8 16% Rank 3rd Total 50 100% Table 2.2.2 represents the frequency and percentage distribution. 27 or 54% stated that they are strongly agreed.14 or 28% agree, 8 or 42
  • 43. 16% stated that they are uncertain and none (0) respondent is disagreeing and strongly disagree. 2.2.3 On the spot monitoring of all activities inside the school premises. Options Frequency Percent Rank 5(strongly agree) 28 56% Rank 1st 4(agree) 19 38% Rank 2nd 3(uncertain) 3 6% Rank 3rd Total 50 100% Table 2.2.3 represents the frequency and percentage distribution. 28 or 56% stated that they are strongly agreed that it can monitor all activities inside the school premises. 19 or 38% stated agree and 3 or 6% sated uncertain and none respondents disagree and strongly disagree. 2.2.4 Awareness about the safety guidelines. Options Frequency Percent Rank 5(strongly agree) 32 64% Rank 1st 4(agree) 15 30% Rank 2nd 3(uncertain) 3 6% Rank 3rd Total 50 100% Table 2.2.4 represents the frequency and percentage distribution. 32 or 64% stated that they are strongly agreed that it should be aware about the safety guidelines. 15 or 30% agree, 3 or 6% stated that they are uncertain, and none (0) respondent is disagree and strongly agree. 2.2.5 Knowledge in terms of possible event if the security system is not effective. Options Frequency Percent Rank 5(strongly agree) 29 58% Rank 1st 4(agree) 14 28% Rank 2nd 3(uncertain) 6 12% Rank 3rd 1 (disagree) 1 2% Rank 4th Total 50 100% 43
  • 44. Table 2.2.5 represents the frequency and percentage distribution. 29or 58% stated that they are strongly agreed that it is effective in terms of possible events if the security system is not effective. 14 or 28% agree, 6 or 12% stated that they are uncertain, 1 or 2% disagree and none (0) respondent stated strongly disagree. Table 2.3 The Benefits of newly proposed security system. 2.3.1 Digital security system Options Frequency Percent Rank 5(strongly agree) 28 56% Rank 1st 4(agree) 17 34% Rank 2nd 3(uncertain) 4 8% Rank 3rd 1(strongly agree) 1 2% Rank 4th Total 50 100% Table 2.3.1 represents the frequency and percentage distribution. 28 or 56% stated that they are strongly agreed that one of the benefits of the newly proposed security system is digital security system. 17 or 34% stated agree, 4 or 8% stated that they are uncertain and 1 or 2% stated that they are strongly agreed and none (0) stated that they are strongly disagreeing. 2.3.2 Save work and time. Options Frequency Percent Rank 5(strongly agree) 20 40% Rank 2nd 4(agree) 21 42% Rank 1st 3(uncertain) 8 16% Rank 3rd 2(disagree) 1 2% Rank 4th Total 50 100% Table 2.3.2 represents the frequency and percentage distribution. 20 or 40% stated that they are strongly agreed that it can save work and 44
  • 45. time. 21 or 42% agree, 8 or 16% stated that they are uncertain, 1 or 2% stated that they are disagree and none (0) stated that they are strongly disagree. 2.3.3 Give convenience in monitoring the whole school Options Frequency Percent Rank 5(strongly agree) 26 52% Rank 1st 4(agree) 19 38% Rank 2nd 3(uncertain) 4 8% Rank 3rd 2(disagree) 1 2% Rank 4th Total 50 100% Table 2.3.3 represents the frequency and percentage distribution. 26 or 52% stated that they are strongly agreed that it can give convenience in monitoring the whole school. 19 or 38% agree, 4 or 8% respondent stated uncertain, 1 or 2% disagree and none (0) stated that they are strongly disagreeing. 2.3.4 On the report. Options Frequency Percent Rank 5(strongly agree) 24 48% Rank 1st 4(agree) 17 34% Rank 2nd 3(uncertain) 7 14% Rank 3rd 2(disagree) 1 2% Rank 4th 1(strongly disagree) 1 2% Rank 4th Total 50 100% Table 2.3.4 represents the frequency and percentage distribution. 24 or 48% stated that they are strongly agreed that it is on the report of what it is happening in the school. 17 or 34% agree, 7 or 14% stated that they are uncertain, 1 or 2% stated that they are disagree and 1 or 2% stated that they are strongly disagree. 2.3.5 Real –time events. Options Frequency Percent Rank 5(strongly agree) 27 54% Rank 1st 45
  • 46. 4(agree) 16 32% Rank 2nd 3(uncertain) 5 10 Rank 3rd 2(disagree) 1 2% Rank 4th 1(strongly disagree) 1 2% Rank 4th Total 50 100% Table 2.3.5 represents the frequency and percentage distribution. 27 or 54% stated that they are strongly agreed that it is real time monitoring of events. 16 or 32% agree, 5 or 10% stated that they are uncertain, 1or 2% respondent stated disagree, 1 or 2% respondents stated that they are strongly disagree. Table 2.4 Effectiveness in terms of protecting the school. 2.4.1 Monitor accidents/ incidents Options Frequency Percent Rank 5(strongly agree) 25 50% Rank 1st 4(agree) 17 34% Rank 2nd 3(uncertain) 4 8% Rank 3rd 2(disagree) 2 4% Rank 4th 1(strongly disagree) 2 4% Rank 4th Total 50 100% Table 2.4.1 represents the frequency and percentage distribution. 25 or 50% stated that they are strongly agreed that it can monitor accidents or incidents. 17 or 34% agree, 4 or 8% stated that they are uncertain, 2 or 4% stated that they are disagree and strongly disagree. 2.4.2 Monitor all the students coming in-out of the school Options Frequency Percent Rank 5(strongly agree) 26 52% Rank 1st 4(agree) 15 30% Rank 2nd 3(uncertain) 8 16% Rank 3rd 2(disagree) 1 2% Rank 4th Total 50 100% 46
  • 47. Table 2.4.2 represents the frequency and percentage distribution. 26 or 52% stated that they are strongly agreed that it can monitor all the students coming in-out of the school. 15 or 30% agree, 8 or 16% stated that they are uncertain, 1 or 2% stated that they are disagree and none (0) stated that they are strongly disagree. 2.4.3 Monitor employees and faculty. Options Frequency Percent Rank 5(strongly agree) 26 56% Rank 1st 4(agree) 19 38% Rank 2nd 3(uncertain) 2 4% Rank 3rd 2(disagree) 1 2% Rank 4th Total 50 100% Table 2.4.3 represents the frequency and percentage distribution. 26 or 56% stated that they are strongly agreed that it can monitor employees and faculty. 19 or 38% agree, 2 or 4% stated that they are uncertain, 1 or 2% respondent stated disagree and none (0) stated strongly disagree. 2.4.4 Monitor the school designated area. Options Frequency Percent Rank 5(strongly agree) 23 46% Rank 1st 4(agree) 19 38% Rank 2nd 3(uncertain) 8 16% Rank 3rd Total 50 100% Table 2.4.4 represents the frequency and percentage distribution. 23 or 46% stated that they are strongly agreed that it can monitor designated area. 19 or 38% agree, 8 or 16% stated that they are uncertain and none (0) stated that they are either disagreeing or strongly disagree. 2.4.5 Valuable things inside the school will be properly monitored 47
  • 48. Options Frequency Percent Rank 5(strongly agree) 28 56% Rank 1st 4(agree) 14 28% Rank 2nd 3(uncertain) 7 14% Rank 3rd 2( disagree) 1 2% Rank 4th Total 50 100% Table 2.4.5 represents the frequency and percentage distribution. 28 or 56% stated that they are strongly agreed that it properly monitored the entire valuable thing inside the school. 14 or 28% agree, 7 or 6% stated that they are uncertain, 1 or 2% respondent stated disagree and none (0) respondent stated strongly disagree. 48
  • 49. Table 3.1 Univariate Matrix on the Eulogio “Amang” Rodriguez Institute of Science and Technology Security System. OPTIONS 5 4 3 2 1 X Descriptive Interpretation 2.1.1 The security system the EARIST has a loop hole 17 23 9 1 0 4.12 Agree 2.1.2 It only uses CCTV Camera 15 19 13 2 1 3.88 Agree 2.1.3 The system only records in-coming and out-coming people 19 22 9 0 0 4.2 Agree 2.1.4 Check on all the vehicles going in-out of the institution 25 17 7 1 0 4.32 Agree 2.1.5 Cannot determine actual incidents inside or outside school properties 20 22 6 2 0 4.2 Agree 2.2.1 Knowledge in improving the security system 17 27 6 0 0 4.22 Agree 2.2.2 Appropriate security system is needed 27 15 8 0 1 4.38 Agree 2.2.3 On the spot monitoring of all activities inside the school premises 28 19 3 0 0 4.5 Agree 2.2.4 Awareness about the safety guidelines 32 15 3 0 0 4.58 Strongly Agree 2.2.5 Knowledge in terms of possible event if the security system is not 29 14 6 0 1 Agree effective 4.38 2.3.1 Digital security system 28 17 4 0 1 4.42 Agree 2.3.2 Save work and time 20 21 8 1 0 4.16 Agree 2.3.3 Give convenience in monitoring the whole school 26 19 4 1 0 4.36 Agree 2.3.4 On the report 24 17 7 1 1 4.2 Agree 2.3.5 Real –time events 27 16 5 1 1 4.3 Agree 2.4.1 Monitor accidents/ incidents 25 17 4 2 2 4.22 Agree 2.4.2 Monitor all the students coming in-out of the school 26 15 8 1 0 4.32 Agree 2.4.3 Monitor employees and faculty 28 19 2 1 0 4.48 Agree 2.4.4 Monitor the school designated area 23 19 8 0 0 4.3 Agree 2.4.5 Valuable things inside the school will be properly monitored 28 14 7 1 0 4.38 Agree TOTAL 484 367 127 15 6 85.95 Based on the foregoing results, as showed in table 3.1, the automated mouse / mice trap range only to strongly agree with a mean of 85.95. 49
  • 50. Table of Chi-square Statistics Df= (r-1) (c-1) = (5-1) (5-1) = 16 F- Statistics with other values; p= 0.05│p= 0.01 │p=0.001 df P= 0.05 P= 0.01 P= 0.001 1 3.84 6.64 10.83 2 5.99 9.21 13.82 3 7.82 11.35 16.27 4 9.49 13.28 18.47 5 11.07 15.09 20.52 6 12.59 16.81 22.46 7 14.07 18.48 24.32 8 15.51 20.09 26.13 9 16.92 21.67 27.88 10 18.31 23.21 29.59 11 19.68 24.73 31.26 12 21.03 26.22 32.91 13 22.36 27.69 34.53 14 23.69 29.40 36.12 15 25.00 30.58 37.70 16 26.30 32.00 39.25 17 27.59 33.41 40.79 18 28.87 34.81 42.31 19 30.14 36.19 43.82 20 31.41 37.57 45.32 21 32.67 38.93 46.80 22 33.92 40.29 48.87 23 35.17 41.64 49.73 24 36.42 42.98 51.18 25 37.65 44.31 37.65 26 38.89 45.64 54.05 27 40.11 46.96 55.48 28 41.34 48.28 56.89 29 42.56 49.59 58.30 30 43.77 50.89 59.70 50
  • 51. 31 44.99 52.19 61.10 32 46.19 53.99 62.49 33 47.40 54.78 63.87 34 48.60 56.06 64.25 35 49.80 57.34 66.62 36 51.00 61.16 70.71 37 52.19 58.89 69.35 38 53.38 61.16 70.71 39 54.57 62.43 72.06 40 55.76 63.69 73.41 41 56.94 64.95 74.75 42 58.12 66.21 76.09 43 59.30 67.46 77.42 44 60.48 68.71 78.75 45 61.66 69.96 80.08 46 62.83 71.20 81.40 47 64.00 72.44 82.72 48 65.17 73.68 84.03 49 66.34 74.92 85.35 50 67.51 76.15 86.66 51 68.67 77.39 87.97 52 69.83 78.62 89.27 53 70.99 79.84 90.57 54 72.15 81.07 91.88 55 73.31 82.29 93.17 56 74.47 83.73 95.75 57 75.62 84.73 95.75 58 76.78 85.95 97.03 59 77.93 87.17 98.34 60 79.08 88.38 99.62 61 80.23 89.59 100.88 62 81.38 90.18 102.15 63 82.53 92.01 103.46 64 83.68 93.22 104.72 65 84.82 94.42 105.97 66 85.97 95.63 107.26 67 87.11 96.83 108.54 68 88.25 98.03 109.79 69 89.39 99.23 111.06 51
  • 52. 70 90.53 104.42 112.31 71 91.67 101.62 113.56 72 92.81 102.82 114.84 73 93.95 104.01 116.08 74 95.08 105.20 117.35 75 96.22 106.39 118.60 76 97.35 107.58 119.85 77 98.49 108.77 121.11 78 99.62 109.96 112.36 79 100.75 111.15 123.60 80 101.88 112.33 124.84 81 103.01 113.51 126.09 82 104.14 114.70 127.33 83 105.27 115.88 128.27 84 106.40 117.06 129.80 85 107.52 118.24 131.04 86 108.65 119.41 132.28 87 109.77 120.59 133.51 88 110.90 121.77 134.74 89 112.02 122.94 135.96 90 113.15 124.12 137.19 91 114.27 125.29 138.45 92 115.39 136.46 139.66 93 116.51 127.63 140.90 94 117.63 128.80 142.12 95 118.75 129.97 143.32 96 119.87 131.14 144.55 97 120.99 132.31 145.78 98 122.11 133.47 146.99 99 123..23 134.64 148.21 100 124.34 135.81 149.88 52
  • 53. Rate Verbal Interpretation Range 5 Strongly Agree 4.6 –5.0 4 Agree 3.6 –4.5 3 Moderately Agree 2.6 –3.5 2 Disagree 1.6 –2.5 1 Strongly Disagree 1.0 –1.5 Table 1.1 1 Responses to Socialization Skills Survey A. The current assessment Strongly Agree Moderately Disagree Strongly W.M Chi of the EARIST security Agree Agree Disagree system. 5 4 3 2 1 X2 1. The security system of the EARIST has a loop hole 17(19.2) 23(20.6) 9(8.8) 1(1.2) 0(0.2) 4.12 0.57 2. It only uses CCTV Camera 15(19.2) 19(20.6) 13(8.8) 2(1.2) 1(0.2) 3.88 3.58 3. The system only records in-coming and out-coming people 19(19.2) 22(20.6) 9(8.8) 0(1.2) 0(0.2) 4.2 1.30 4. Check on all the vehicles going in-out of the institution 25(19.2) 17(20.6) 7(8.8) 1(1.2) 0(0.2) 4.32 2.78 5.Cannot determine actual incidents inside or outside school properties 20(19.2) 22(20.6) 6(8.8) 2(1.2) 0(0.2) 4.2 1.55 TOTAL Chi-Square: 9.79 The Security system of EARIST has a loop hole with a mean of 4.12 and a verbal interpretation of Agree; it only uses CCTV camera with a mean of 3.88 and a verbal interpretation of Agree; the system only records in-coming and out-coming people with a mean of 4.2 and a verbal interpretation of Agree; check on all the vehicle going in-out of the institution with a mean of 4.32 and a verbal interpretation of Agree; 53
  • 54. and cannot determine actual incidents inside or outside school properties with a mean of 4.2 and a verbal interpretation of Agree. The overall computed weighted mean has a verbal interpretation of Agree. It is clearly evidence that the chi-square value from the chi-square value of Table 1.1 is 9.79 which is less than the value from the chi-square table which is 26.30, the null hypothesis is accepted. Table 2 B. Improvement of the Strongly Agree Moderately Disagree Strongly W.M Chi school security system Agree Agree Disagree 5 4 3 2 1 X2 1. Knowledge in improving the security system 8.29 17(26.6) 27(18) 6(5.2) 0(0.2) 0(0) 4.22 2. Appropriate security system is needed 2.21 27(26.6) 15(18) 8(5.2) 0(0.2) 0(0) 4.38 3. On the spot monitoring of all activities inside the school 1.26 premises 28(26.6) 19(18) 3(5.2) 0(0.2) 0(0) 4.5 4. Awareness about the safety guidelines 2.73 32(26.6) 15(18) 3(5.2) 0(0.2) 0(0) 4.58 5. Knowledge in terms of possible event if the security 4.43 system is not effective 29(26.6) 14(18) 6(5.2) 1(0.2) 0(0) 4.38 TOTAL Chi- square: 18.92 Knowledge in improving the security system with a mean of 4.22 and a verbal interpretation of Agree; appropriate security system is needed with a mean of 4.38 and a verbal interpretation of Agree; on the spot monitoring of all activities inside the school premises with a mean of 4.5 and a verbal interpretation of Agree; awareness about the safety 54
  • 55. guidelines with a mean of 4.58 and a verbal interpretation of Agree; and knowledge in terms of possible event if the security system is not effective with a mean of 4.38 and a verbal interpretation of Agree. The overall computed weighted mean has a verbal interpretation of Agree. It is clearly evidence that the chi-square value from the chi-square value of Table 1.2 is 18.92 which is less than the value from the chi- square table which is 26.30, the null hypothesis is accepted. Table 3 Strongly Agree Moderately Strongly W.M Chi DISAGREE C The Benefits of newly proposed security system. Agree Agree Disagree 5 4 3 2 1 X2 1. Digital security system 1.94 28(25) 17(18) 4(5.6) 0(0.8) 1(0.6) 4.42 2. Save work and time 20(25) 21(18) 18(5.6) 1(0.8) 0(0.6) 4.16 3.18 3 Give convenience in 1.20 monitoring the whole school 26(25) 19(18) 4(5.6) 1(0.8) 0(0.6) 4.36 4. On the report 24(25) 17(18) 7(5.6) 1(0.8) 1(0.6) 4.2 0.76 5 Real –time events 27(25) 16(18) 5(5.6) 1(0.8) 1(0.6) 4.3 0.76 TOTAL: Chi-Square 7.85 Digital security system with a mean of 4.42 and a verbal interpretation of Agree; save work and time with a mean of 4.16 and a verbal interpretation of Agree; Give convenience in monitoring the whole school with a mean of 4.36 and a verbal interpretation of Agree; on the report with a mean of 4.2 and a verbal interpretation of Agree; real –time events with a mean of 4.3 and a verbal interpretation of Agree. 55
  • 56. The overall computed weighted mean has a verbal interpretation of Agree. It is clearly evidence that the chi-square value from the chi-square value of Table 1.3 is 7.85 which is less than the value from the chi-square table which is 26.30, the null hypothesis is accepted. Table 4 D. Effectiveness in terms of Strongly Agree Moderately Disagree Strongly W.M Chi protecting the school Agree Agree Disagree 5 4 3 2 1 X2 1. Monitor accidents/ incidents 25(26) 17(16.8) 4(5.8) 2(1) 2(0.4) 4.22 8 2. Monitor all the students coming in-out of the school 1.43 26(26) 15(16.8) 8(5.8) 1(1) 0(0.4) 4.32 3. Monitor employees and faculty 28(26) 19(16.8) 2(5.8) 1(1) 0(0.4) 4.48 3.33 4. Monitor the school designated 2.87 area 23(26) 19(16.8) 8(5.8) 0(1) 0(0.4) 4.3 5. Valuable things inside the school will be properly monitored 1.27 28(26) 14(16.8) 7(5.8) 1(1) 0(0.4) 4.38 TOTAL: Chi-Square 16.90 Monitor accidents/ incidents with a mean of 4.22 and a verbal interpretation of Agree; monitor all the students coming in-out of the school with a mean of 4.32 and a verbal interpretation of Agree; monitor employees and faculty with a mean of 4.48 and a verbal interpretation of Agree; monitor the school designated area with a mean of 4.3 and a verbal interpretation of Agree; valuable things inside the school will be properly monitored with a mean of 4.38 and a verbal interpretation of Agree. 56
  • 57. The overall computed weighted mean has a verbal interpretation of Agree. It is clearly evidence that the chi-square value from the chi-square value of Table 1.4 is 16.90 which is less than the value from the chi- square table which is 26.30, the null hypothesis is accepted. Summary 57
  • 58. The research EULOGIO “A MANG” RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY (EARIST) security system was proposed to the EULOGIO “A MANG” RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY (EARIST) and the other school who wants to improve their security system. This research was conducted for the purpose of determining the problems encountered in the protection of the school. And based from such problems the following objectives are formulated: 1) To provide a much effective security system that would help them to secure the safetiness of every student and employee; 2) To be able to determined if there is a hazardous accident; 3) To be able to create a effective security system that would help them to monitor if there is a intruders; 4) To be able to protect each persons and properties coming in and out of the school premises. Furthermore, to achieve the objectives, the proponents, used the Descriptive Method to develop the proposed system. The researcher also conducted an evaluation to the respondents in order to gather all the information needed to complete the study with the use of the Likerts Scale; the respondent evaluated the digital project to determine the performance of the system. SUMMARY OF FINDINGS 58
  • 59. Based in the proponent’s objectives in data gatherings were determined. 1. Based on the proposed security system was interpreted “VERY GOOD” in the criteria of Efficiency because it provides convenience to the school and to the employees. 2. . Based on the proposed security system was interpreted “VERY GOOD” in the criteria of Accuracy because its digitalized is 100 percent in protecting the school. 3. . Based on the proposed security system was interpreted “VERY GOOD” in the criteria of Reliability it can use anytime. 4. . Based on the proposed security system was interpreted “EXCELLENT” in the criteria of User-friendly because it is easy to use, understand and operate. 5. Based on the proposed security system was interpreted “EXCELLENT” in the criteria of Simplicity because of the projects clearness of design. CONCLUSION 59
  • 60. Based on the proponent objective and data gathered and have some findings determined by the proponent. The proposed design helps to protect the student, employee and school properties. The proposed project is very good in terms of detecting intruders and hazardous accidents. Since the proposed research is digitalized; it helps the security guard and employee to monitor the whole school. RECOMMENDATION Therefore, the proponents would like to recommend the proposed research to be initiated and give enough attention by the administration of Eulogio “Amang” Rodriguez Institute of Science and Technology regarding on the benefits of the research specifically on health, security and environment and environmental aspects of life so that it will be initiated for the school and other universities on a long term plan project that could benefits all of us. Bibliography 60
  • 61. www.alarmsystemreviews.com www.medialab.tfe.umu.se/...thesis/.../intelligent_home_security_system.pdf innovexpo.itee.uq.edu.au/2001/projects/s804258/thesis.pdf www.datanumeric.com/thesis/thesis.pdf www.datanumeric.com/thesis/thesis.pdf www.datanumeric.com/thesis/thesis.pdf www.cs.virginia.edu/~jck/publications/Weatherwax_MS_Thesis.pdf • Capacitive Position/Displacement Sensor Theory/Tutorial • Capacitive Position/Displacement Overview • Comparing Capacitive and Eddy-Current Sensors • M. Kretschmar and S. Welsby (2005), Capacitive and Inductive Displacement Sensors, in Sensor Technology Handbook, J. Wilson editor, Newnes: Burlington, MA. • C. A. Grimes, E. C. Dickey, and M. V. Pishko (2006), Encyclopedia of Sensors (10-Volume Set), American Scientific Publishers. ISBN 1-58883-056-X • Sensors - Open access journal of MDPI • M. Pohanka, O. Pavlis, and P. Skladal. Rapid Characterization of Monoclonal Antibodies using the Piezoelectric Immunosensor. Sensors 2007, 7, 341-353 • SensEdu; how sensors work • Clifford K. Ho, Alex Robinson, David R. Miller and Mary J. Davis. Overview of Sensors and Needs for Environmental Monitoring. Sensors 2005, 5, 4-37 • Wireless hydrogen sensor • Sensors and Actuators - Elsevier journal • Automated Deformation Monitoring system • Droid's Sensors -adware for droidsensors Trimmer, H.William (1981). Understanding and Servicing Alarm Systems. Stoneham: Butterworth. 61
  • 62. Weber, Thad L. (1985). Alarm Systems and Theft Protection (2d ed.). Stoneham, MA: Butterworth. M Walker, Philip (1985). Electronic Security Systems. Cambridge, UK: University Press P Ramsey, Anthony Home Security. Schatz, David A., et al. Video safety curtain. U.S. Patent No. 6,297,844, Issued Oct. 2, 2001. O Atss, R.Nandakumar. O Aii, N.Clifton. "Broadband CSV, XML Alarm data Standards" Auckland NZ, (2002 en.wikipedia.org/wiki/Sensor en.wikipedia.org/wiki/Alarm akyqowe.prv.pl/durationundergraduatedegree.html - Cached Read more: http://www.servicemagic.com/article.show.Home-Security- Alarms-For-Safety-and-Resale.15413.html#ixzz12C6tDaNH 2010 Home Security Blog | Entries (RSS) | Comments (RSS) Dictionary. The American Heritage® Dictionary of the English Language, Fourth Edition Copyright © 2007, 2000 by Houghton Mifflin Company. Updated in 2009. Published by Houghton Mifflin Company. All rights reserved. Read more Word Tutor. Copyright © 2004-present by eSpindle Learning, a 501(c) nonprofit organization. All rights reserved. eSpindle provides personalized spelling and vocabulary tutoring online; sign up free. Read more WordNet. WordNet 1.7.1 Copyright © 2001 by Princeton University. All rights reserved. Read more Niña Christea P. Orilla Address: #705 T. Anzures St. Sampaloc Manila Mobile #: 09091029270 62
  • 63. Email Address: thea_sakura@yahoo.com Objective To partake and actualize learned ideas and skills to the company and equip the right working attitude for attainment of future professional goals. _______________________________________________________________________ _________________ Educational Background Tertiary Eulogio “Amang” Rodriguez Institute of Science and Technology 2010- present Bachelor of Science in Computer Engineering 5th yr level Secondary Marinduque National High School 2002-2006 Primary Don Luis Hidalgo Memorial School 1996-2002 Seminars or Training Attended SYSTEMATIC ASIA Sensor Technology: 1sth Step to MECHATRONICS 27h Day of August 2009 Integrated Circuits: Assembly Process 17th Day of July 2009 PLC Programming Hitachi Global Storage Technologies, Phils. Corp. Fabrication process of hard disk PCOS Training Center Astron bldg. Skills  Computer skills (MS Word, Excel, Power Point)  Willing to work on graveyard shifts  Computer troubleshooting  Knowledgeable in electronics  Knowledgeable in pneumatics Personal Background Date of Birth : November 19, 1989 Place : Isok Boac Marinduque Civil Status : Single Citizenship : Filipino Age : 20 Height : 5’3’ Religion : Roman Catholic Character References Eng’r. Percival Macapagal Professor 09151174572 63
  • 64. This document was made and personally filled, in full honesty to the best of my knowledge. Niña Christea P. Orilla Applicant’s Signature 64