Chapter 1 5 apllied research ko sad
description
Transcript of Chapter 1 5 apllied research ko sad
INTRODUCTION
Security plays a vital role for the safekeeping of lives and
properties. Whether inside or outside the house, in the mall, or almost
everywhere there is a security threat. The researcher wishes to elaborate
on the situation happended in a certain school in Cheachnea, Russia in
1991. There are some chaechnean rebels who hostage the entire school
and lead all the students to the gymnasium and what happended? They
burned the entire gymnasium where all the students inside.
The point of the researcher is that, security a campus, school,
university, and almost every entity needs security or a security system.
This is where the poroposal of the researcher comes in.
Security system computing a system that enforces boundaries
between computers networks an electrical device that sets off an alarm
when someone tries to break in. A professionally installed system
designed to detect intrusion or other hazard, including sensors, an alarm-
sounding device and communication device that reports conditions to an
alarm monitoring service.
Eulogio “Amang” Rodriguez Institute of Science and Technology
(EARIST) is one among the State College in the Philippines which is
situated in the heart of its capital, Manila. It has an estimated student
population of 10,000 students and 600 faculties and employees. As the
school population increases every year, the demand for more security is
imperative.
1
The security level risk in a school such as Eulogio “Amang” Rodriguez
Institute of Science and Technology (EARIST) is very high. The
instrument used for the protection of the institution is composed of only a
recording CCTV camera and security personnel’s. The institution is still
exposed to other stimulated complication such as outsiders – students
from other schools or universities and out of school youth and visitors,
fire and intruders. Improving the system should be the number one
priority of the school to protect each persons and properties coming in
and out and of the school premises.
This research about the Eulogio “Amang” Rodriguez Institute of
Science and Technology Security System Project is an improvement of
the school’s existing security system. Whereas it uses a digital security
system with voice feature which can monitor room temperature, smoke,
motion, windows and doors. This research aim is too developed mainly
to respond to security issues at real time.
2
BACKGROUND OF STUDY
Original house, school and office alarms worked by signaling a
‘local’ alarm when the system was triggered. This worked well so long as
people hearing the alarm responded to it. As security systems became
more common, the number of false alarms increased to such as degree
that many ‘local’ alarms began to go unnoticed and unreported. Intruders
also learnt how to disarm the system so could quickly and easily stop the
alarm. If you were relying on this for the safety of your property you
could be in trouble. Nowadays, many people use external alarm
monitoring centers to protect their property. Here, not only does a ‘local’
alarm sound but the alarm is also picked up by staff at the monitoring
center who will then respond accordingly.
When first invented, house, school and office alarms were
triggered by the release of a pressure button fitted into a door or window
frame. This basic alarm was fundamentally flawed as the entire intruder
needed to do to silence the alarm was to close the door or window.
Nowadays there are various systems on the market ranging from
inexpensive DIY alarms to highly sophisticated systems requiring
professional installation. All modern alarms are based on the same
foundation, the electric circuit which is completed either when the door is
opened or closed depending on the system you choose. The alarm is
triggered when the circuit is altered and will not be silenced until a code
is punched into the control panel. The most expensive and complicated
alarm systems might also involve a combination of motion sensors and
3
pressure pads to ensure even the most cunning intruder doesn’t get his
hands on your treasures.
Unsurprisingly, house, school and office alarms have changed a lot over
the last century and no doubt will continue to improve as technological
knowledge expands. The market is filled with a wide range of systems
and companies offering a variety of deals. So whatever you want to
protect, and however much you have to spend there will be an alarm out
there to suit your needs.
The Eulogio “Amang” Rodriguez Institute of Science and
Technology was established after the liberation Manila in 1945. Eulogio
“Amang” Rodriguez Institute of Science and Technology (EARIST)
started as a Vocational High School with only a room at the second floor
of the Mapa High School, nine teachers, a clerk and 147 students. Only
July 1, 1946 , Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST) acquired its present site at Nagtahan Sampaloc,
Manila. Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST) is composed of only recording CCTV camera.
This kind of security system only records of what it is happening. But it
cannot aid or give solution if there is something wrong in the area.
The researcher proposed a newly security system that will improve
the security system Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST). This is a digital security system with voice
feature which can monitor room temperature, smoke, motion, and
windows and doors. The system is fully digital and also fully customized.
4
It incorporated a 16x2 LCD display with a 4x4 keypad. Each sensor can
be enabled and disabled, and alarm frequency and skim can also be
chosen by users. It has also equipped a voice playback chip, and it will
speak which sensor has gone.
OBJECTIVE
The proponents, based on the initial research, have come up with
objectives to further study the situation.
A. General Objectives
The general objectives of this research are to develop and
construct a security system that will serve as a proposal to
improve the old security system of Eulogio “Amang”
Rodriguez Institute of Science and Technology (EARIST).
B. Specific Objectives
To provide a much effective security system that would
help them to secure the safetiness of every student and
employee.
To be able to determined if there is a hazardous accident.
To be able to create a effective security system that
would help them to monitor if there is a intruders.
To be able to protect each persons and properties coming
in and out of the school premises.
5
CONCEPTUAL FRAMEWORK
FIGURE1. CONCEPTUAL PARADIGM
The figure presents the conceptual framework of the study. This
input will assist the researcher to gather some data regarding the research.
6
INPUT
Submit the
created
permission
letter with
regards to
project
design.
Give them a
copy of
questionnai
re to be
answer.
Visualize
the area of
the school.
PROCESS
Analyze and
interpret all
the data
gathered and
the answer to
the
questionnaire
.
Check the
school floor
plan.
OUTPUT
Improve the
security system
of EULOGIO
“AMANG”
RODRIGUEZ
INSTITUTE OF
SCIENCE ABD
TECHNOLOGY
(EARIST).
Acceptance of
the design.
It will lead the researcher in additional knowledge about the proposed
research. This input will have the basic knowledge regarding the security
system.
In the process, this were the researcher analyze and interpret the
data and knowledge that the researcher attain.
The output of this research will be the acceptance of the design
after formulating the new security system of EULOGIO “AMANG”
RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY
(EARIST). The design will be highly recommended to applied and
enhance the security level of EULOGIO “AMANG” RODRIGUEZ
INSTITUTE OF SCIENCE AND TECHNOLOGY (EARIST).
STATEMENT OF THE PROBLEM
This research under taken to analyze and interpret the proposed
security system for Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST). Specifically the aims to answer the following
question.
1. What is the current assessment of the old Eulogio
“Amang” Rodriguez Institute of Science and Technology
(EARIST) security system?
2. How will this research help the school to improve their
security system?
3. What are he benefits of the newly proposed security
system?
7
4. Is the newly proposed security is effective to secure the
protection of the school?
5. Is there any significant difference between the old
Eulogio “Amang” Rodriguez Institute of Science and
Technology (EARIST) security system and the newly
proposed security system?
SCOPE AND DELIMITATION
The newly proposed security system is an enhancement of an
existing security system of Eulogio “Amang” Rodriguez Institute of
Science and Technology (EARIST).
The proposed security system is system for monitoring the whole
school. It can monitor if there is a movement or an intruder in a room or
someone is trying to break-in. It can also detect smoke that may cause
fire that will cause a lot of damage in the school properties and lives of
every person in the school. This security system cans etec5t if there is
sudden change in temperature. It extremely simple design and
construction and adapted to pre-design for use in school, business or
house. This could be used as basis for similar studies that would be
conducted by other researcher.
Limitations of the Study
The proposed research is only focused in Eulogio “Amang”
Rodriguez Institute of Science and Technology (EARIST) for improving
their security system.
8
SIGNIFICANCE OF THE STUDY
The researcher proposing a security system that will enhance the
old security system of Eulogio “Amang” Rodriguez Institute of Science
and Technology (EARIST); it will give significance particularly to the
following:
This research will benefit every student and employee in Eulogio
“Amang” Rodriguez Institute of Science and Technology (EARIST).
STUDENTS. They will be assured of their protection from hazardous
accidents, intruders; outsiders that will only cause them harm and
trouble.
SCHOOL AND EMPLOYEE. The proposed security system will help
them to monitor the school easily that will lessen their work and
save time.The proposed security system will assured that the
school will be safe from damage caused by hazardous accidents.
RESEARCHER. The researchers have developed their writing, analysis
and interpretation skills needed to make a good research about
security system.
FUTURE RESEARCHER. This will benefits other researcher who
wish to have similar studies as they can get background
information from the result of this study which will serve as
template to modify their research.
9
HYPOTHESIS
The purpose of this research is to develop and create a security system
for Eulogio “Amang” Rodriguez Institute of Science and Technology
(EARIST) that could help them to monitor the school easily and to
determined whether there is any problem and intruders within the school
compound. Using a security system in the school, business, and
laboratory are very much useful to monitor and to aid easily if there is a
problem in the area. And it is also help to save much time and works.
Providing an effective security system will help to avoid hazardous
accidents and to protect the school from every person coming in and out
of the school.
Security system will benefit not only the employee/ employer of
the Eulogio “Amang” Rodriguez Institute of Science and Technology
(EARIST) but also the student.
Finally, the researcher found out that there is no significant
difference between the old security system of Eulogio “Amang”
Rodriguez Institute of Science and Technology (EARIST) and the newly
proposed security system.
10
DEFINITION OF TERMS
Sensor - is a device that measures a physical quantity and converts it into
a signal which can be read by an observer or by an instrument.
Alarm - gives an audible or visual warning about a problem or condition.
Alarms have the capability of causing a fight-or-flight response in
humans; a person under this mindset will panic and either flee the
perceived danger or attempt to eliminate it, often ignoring rational
thought in either case. We can characterize a person in such a state as
"alarmed".
Digital - system is a data technology that uses discrete (discontinuous)
values. By contrast, non-digital (or analog) systems use a continuous
range of values to represent information. Although digital representations
are discrete, the information represented can be either discrete, such as
numbers, letters or icons, or continuous, such as sounds, images, and
other measurements of continuous systems.
The word digital comes from the same source as the word digit and
digitus (the Latin word for finger), as fingers are used for discrete
counting.
The word digital is most commonly used in computing and electronics,
especially where real-world information is converted to binary numeric
form as in digital audio and digital photography.
11
Motion detector - is a device that contains a physical mechanism or
electronic sensor that quantifies motion that can be either integrated with
or connected to other devices that alert the user of the presence of a
moving object within the field of view. They form a vital component of
comprehensive security systems, for both homes and businesses.
Smoke detector - is a device that detects smoke, typically as an indicator
of fire. Commercial, industrial, and mass residential devices issue a
signal to a fire alarm system, while household detectors, known as smoke
alarms, generally issue a local audible and/or visual alarm from the
detector itself.
Smoke detectors are typically housed in a disk-shaped plastic enclosure
about 150 millimetres (6 in) in diameter and 25 millimetres (1 in) thick,
but the shape can vary by manufacturer or product line. Most smoke
detectors work either by optical detection (photoelectric) or by physical
process (ionization), while others use both detection methods to increase
sensitivity to smoke. Smoke detectors in large commercial, industrial,
and residential buildings are usually powered by a central fire alarm
system, which is powered by the building power with a battery backup.
However, in many single family detached and smaller multiple family
housings, a smoke alarm is often powered only by a single disposable
battery.
12
Magnetic switch - A switching device consisting of three metallic
layers (a paramagnetic layer between two ferromagnetic layers), whose
action is based on electron spin and is controlled by a small magnetic
field. Also known as bipolar spin device; bipolar spin switch; magnetic
spin transistor; spin transistor; spin valve.
Temperature sensor - a thermometer (from the Greek '' (thermo)
meaning "warm" and meter'', "to measure") is a device that measures
temperature or temperature gradient using a variety of different
principles. A sensor that make it possible to measure temperature.
System - is a collection of elements or components that are organized for
a common purpose. The word sometimes describes the organization or
plan itself (and is similar in meaning to method, as in "I have my own
little system") and sometimes describes the parts in the system (as in
"computer system").
A computer system consists of hardware components that have been
carefully chosen so that they work well together and software
components or programs that run in the computer.
Flame detector - is a detector that uses optical sensors to detect flames.
Alarm Monitoring - Central-Station is a common term used to refer to a
company that provides services to monitor burglar, fire and residential
alarm systems. The central-station may also provide watchman and
supervisory services.
13
Related Literature
Home security has become one of the top things people look for in
a property. Along with lot size, square footage, and location, the kind of
home security system a house has in place is now truly a deciding factor
for buyers. Due to this trend, having a security alarm is not only
important when living in a house, but when selling one, as well.
Security Alarm System Overkill
The demand for security alarm systems is increasing, and more and more
options are becoming available for residential use. While having more
options is certainly good news for homeowners, it can, at times, make it
difficult to find the right setup for your household.
When installing a security alarm system that is meant to protect your
family and possessions, it's easy to go overboard and end up with a
system that is intrusive (and, in turn, might not get used at all). Most
people do not require a fingerprint identification lock, but other forms of
keyless home entry might be a perfect fit. The best option for your home
should be a system that provides a significant amount of protection, but
doesn't interfere with the day-to-day life of your family.
14
The Basic Security Alarm
A standard home security alarm is often a good fit for most households.
These systems generally include sensors on all the entry doors, some
motion activated outdoor lighting, sensors on windows that are
particularly easy to access, and, most importantly, a direct link to a
monitoring service. This type of security alarm system will be an
excellent deterrent for any would be intruders, but, at the same time, is
generally fairly easy for a family to adapt to.
Make sure you feel safe in your home! Use this link to
Install Security System
Security Alarm Benefits
Most would say that the biggest benefit of having a home security alarm
is the peace-of-mind that comes with it. When something goes wrong
(whether you are home or thousands of miles away on vacation),
knowing that a system is already in place and that your house has a direct
link to the proper authorities is very reassuring.
There may be immediate monetary benefits, as well. Having a security
alarm that is connected to a monitoring service can, in some situations,
lower homeowner's insurance payments up to 20%. Many monitoring
services will also offer a plan to monitor your home for fire, which some
insurance companies will also take into account when deducing your
premium. In every case, it will decrease the likelihood of losing money
due to burglary.
15
Increase your Home's Resale Value
Along with presenting a clean home, there are many improvements that
can be made to a property that will increase its resale value. Adding on a
garage, finishing a basement, and remodeling a kitchen, while all good
ideas, can be rather costly endeavors. Landscaping a yard for security,
installing a home security alarm, and putting in outdoor lighting are much
less expensive projects. Despite the lower initial cost, prospective buyers
still look upon these kinds of home improvements as important additions
to the property they are viewing.
Wireless Home Security Alarm Systems – Advantages and
disadvantages
There is no doubt that wireless home alarm security systems are
becoming the preferred choice when it comes to alarms in the house. One
of the best advantages of this type of system is that it is very easy for do-
it-yourself installer. This is because you do not have the wiring all the
different components of the home security system to run. With a
wireless security system, there are few components, each of these
Components is very easy to install.
But that does not mean that these types of security systems are not
without flaws. For example, if you carefully plan it out, it is likely that
there are few places in the house that are not protected by the system to
be. The reason is simple – because the signals received by a primary
control unit if they are sent to a component that is out of reach, that
16
component will not be good signals. Therefore, there is a greater
likelihood that your house will not be as safe as you might like.
There will, however, with the proper positioning of wireless sensor at
home, your home wireless network security alert system is as safe as –
if not more – as a system disk.
Some people think that the next is an advantage or a disadvantage.
Wireless systems are running on battery, no electricity. It can be seen as
an advantage, because If your electricity is cut you are sure that your
security system will continue to work. But if you forgot the batteries to
replace so your system is virtually useless.
The last advantage is wireless, and perhaps the most preferred by
consumers. In general, a wireless security system home alarm system is
less expensive than one that is difficult. If you are on a tight budget and
want to install by yourself, then a wireless system is probably the way
too. E 'preferable, especially in apartments or rental properties, because it
is easy to transport when you move.
In any case, it is important to understand both the advantages and
disadvantages of wireless security and home difficult. Use this question
in this article as a starting point for further research to make the right
choice for your home.
17
Foreign Study
Houston Home Security: Make Installing a Home Alarm Your New
Year Resolution!
Everyone knows the tradition of making New Year Resolutions.
We all make plans for improving ourselves; but no matter how great our
intentions, we more than likely will fall short of our goals. Most of these
plan are for worthy, but perhaps a bit superficial ideals like losing weight,
becoming organized or learning a new language. There is one resolution,
however, that can make a real difference in the safety of your family:
assessing your Houston home security. Installing a home alarm in your
Houston home may mean protecting your property and your loved ones
against dangerous intruders. A security systems company in Houston
should be able to help you plan out the following steps towards reaching
a goal of a safer home in the new year:1.Do your own safety assessment.
It doesn’t take a professional to notice aspects of your property that could
use more attention to security. Do you have bushes that hide your doors
and windows? Are your exterior doors solid? Do all of your windows
lock? Is your property well-lighted? Some of these problems can be
addressed on your own, prior to contacting a Houston home alarm
company. Once the security professionals come to your home, they may
18
also have additional suggestions for improving the security of the
property. 2. Contact a Houston home security firm. Your next New Year
Resolution should be to develop a business relationship with a Houston
security systems company, preferably a firm that has a solid history of
customer satisfaction. Let the staff at that company know that you are
looking to make some real changes to your home security and that you
are open to learning about all of the products and services they have to
offer. Do not hesitate to let them know exactly what you are looking for
and how much you are willing to spend on your Houston home alarm. A
quality company should provide such benefits as free professional
installation and additional alarm keypads.3.Invest in a monitored alarm
system. Your home alarm is only as good as the quality of the
monitoring. It is best to look for a company that provides round the clock
monitoring at a monthly rate, because you don’t want to have gaps in
your coverage. Ask your alarm company if they also offer such security
features as fire monitoring, because the convenience of adding that to
your system makes it worthwhile to do so. Finally, do due diligence in
your research as you locate a Houston home security that offers you as
much value as it does quality. Safeguard Home Security offers our
customers excellent customer service by experienced, licensed home
alarm professionals.
You wish to keep your family safe from accidents, fires, and other
difficulties, and then ADT security systems will be an outstanding
choice. Real residential security begins with a proper security set-up,
19
which is precisely what ADT offers. Protection services that families get
the best home security possible and ADT security up a wide array of
home security.
Perhaps the single most popular service offered by ADT security
system is their home preservation service. ADT Security Systems alerts
homeowners of intruders using cutting edge technology.
Unlike its competitors, ADT security systems services don’t utilize
any wires in their alarm systems. The ADT security systems have also
added one other cutting-edge feature to their home security system, these
are heat sensors. The security system sensors by ADT are extremely
advanced, as they have the capability to differentiate between a stray
animal entering the house and a thief.
That keeps families completely safe and secure aside from the
above features, ADT security systems also offer additional services.
Their fire and carbon monoxide sensors are extremely vital services that
can be counted upon in case fire-related problems occur. These sensors
easily detect an intruder so the family can escape to safety while the ADT
Security Systems calls the authorities.
ADT security systems do even more. ADT security systems can
also deliver security while on the road besides providing hone security.
People at home can easily locate relatives who are running late via the
GPS devices. Whether they’re at home or away from it, with ADT
security systems, people are assured of safety.
20
Security System
Problem: There was a need in the self storage industry to be able to
monitor when a particular unit was open. Since most self storage units do
not allow access to the owner/management for installing new
wiring/equipment, the system to be developed needed to be able to be
deployed without adding any new wiring to the facility and had to be
capable or being installed without entering the individual units.
Solution: Group Alpha developed a unique door sensor that would
sensor the relative position of a particular door and send back that door's
position via a RF link to a controller that would send out alerts to a PC
application based on changes in state.The sensors needed to be very low
powered since they are battery powered and had to be very low cost
because the number of doors within a particular installation could reach
several thousand. A set of gateway/repeaters were also developed. These
units are distributed throughout the storage facility allowing the RF
signals to be relayed via power line communications to the main
controller. This allows the entire system to be installed within any
proprietary wiring except the single cable that connects the main
controller to the PC. This system illustrates the diverse communications
technologies that Group Alpha can bring to bear to solve a particular
engineering problem.
When considering different home security systems, it would pay to
know the home security system ratings for different ones and one such
21
one is Brinks Security which has a number of advantages and also a few
disadvantages. To begin with, you should learn more about what the
company is all about if you want to be able to evaluate the home security
system ratings for it and after much looking about you may find that
Brinks began operation in 1859 when it began to provide different
security services for various companies and which has since expanded to
cater to as many as a million customers in the US thanks to the trust that
it has built into its product name.
Various Aspects That Need To Be Considered
There are various aspects to the Brinks home security systems
including its monitoring capabilities, price, installation and also handling
of problems that you would want to know more about and thus may need
to view the home security system ratings for this company in each of
these regards. The first piece of information that you need to consider is
what the whole package is going to cost you and this will play an
important part in how you evaluate the home security system ratings for
Brinks Security home security systems, which with all the bells and
whistles may total up to three hundred and twenty dollars plus taxes,
which according to user’s home security system ratings amounted to just
fair and no more.
Another aspect of the Brinks Security home security system that
readers will want to know about and for which home security system
ratings are required includes the monitoring abilities of this system,
22
which it must be said are good and thus deserve high home security
system ratings. You can be sure that the monitoring response in case of a
break in is very good and even though you will need to pay an extra
thirty odd dollars for the monitoring service, it is money well spent and
this is reflected in its high home security system ratings given to this
product.
Next, you will need to find what the home security system ratings
as far as installing the system are and you may be surprised to learn just
how many technicians can be involved in the whole exercise and how
long it can take to complete all the drilling, wiring and cabling of the
home. Despite all these inconveniencies the Brinks Security gets good
home security system ratings for installation and the staff was friendly
and was able to answer all questions satisfactorily.
Once you have got the home security system ratings for the
different aspects to using Brinks Security systems, you should be able to
decide whether to go ahead and use it or not.
Local Study
I have a very special reason for starting this article, its simple It
became abundantly clear during my last visit that security is one of the
major considerations when living full time in the Philippines.
I have to say in all the visits I have ever made to the Philippines I have
yet to become the victim of a crime, that is not to say that crime doesnt
23
happen in my home country, wow, it happens everywhere in the world,
why some areas of London, I would never drive around with my doors
not locked, secondly, I have friend who drive around certain districts
with a cost in their car, (Iron bar resembling a steel baton) interestingly,
they don’t drive around with a hand gun, I will come onto this later.
( Handguns represent a mandatory 5 year prison term if caught with
them).
I want to share some of my recent experiences with you all, and as
usual I am very much interested in your own experiences including your
views on some of my writings.
So here goes, I was under the impression, that it was mainly
foreigners who were very security conscious, hmmm that was a totally
wrong assertion, I had the good fortune to visit the son of my wife former
employer, he lives in a security gated compound within a sub division,
the gates are locked at all times, they have 7 foot high barbed wire, or
walls with casual glass pieces stuck into the cement, these it appears are
to prevent people scaling the walls to gain entry.
I spoke to my friend about security for me in the Philippines, his
replies kind of shocked me, remembering whilst I might have a house in
the Philippines, and the house does have high walls with security bars, I
have never had to live in a house with the level of security my friend was
suggesting was required.
24
He told me firstly, in your home you should have personal
protection, so I butted in and suggested perhaps a mace or chemical spray
maybe an intruder alarm system, such as we have back here in UK,
maybe an alarm over the telephone system, connected to Police HQ, that
brought a few laughs from him.
“No he said, you need a good weapon in the house, or 2 or 3 if you can,”
I was a little startled by this, since I was trained in certain weapons but
had not fired a shot since the 80′s, I know in certain States in the U.S.A.
its quite acceptable to have a gun at home, and in certain states, my
experience of this was when I was in Nevada, its acceptable to shoot an
intruder on your property.
Sadly, we cannot do that in the UK, in fact if you shot the intruder, you
would be the one most likely charged with armed assault, and if the
intruder died, charged with murder, yes the rules for intruders in our
country are hard for some to understand, you may be accused of violating
his civil rights amongst a string of other things, so shooting someone in
your house is not a good idea.
Going back to my freind – he told me that its acceptable if you have a
permit to own a hand gun, or rifle, or automatic rifle in your home,
provided its for home protection, he even went on to say that he is
allowed to transport the weapons, and that he can fire them under
controlled conditions, what he didnt tell me, that when we arrived at our
destination at his Fathers mountain resort, is that he was actually carrying
25
a loaded weapon in his pocket, I have to say at first sight I was shocked
to find that he had a Berreta handgun, with 13 rounds of ammo in a
magazine in his pocket.
I questioned my freind further, “Why do you have this semi
automatic pistol in your pocket I asked” well Pete its really for our
protection, we don’t know who we will encounter up here, the
Philippines is very poor, there are some desperate people here, and its
better to have protection than not all”, I also went on to say that I did not
believe in having guns in the house, I saw no need for it, my friend said ”
I suggest you obtain one in your wife name, keep it in your house, you
can draw it if required, as long as someone is breaking into your lot or
house, you have a right to shoot them to prevent them if your life is
threatened.”
I asked my wife about this, since it had never been discussed
before, my wife confirmed what my friend had said, although she did not
like the idea of a weapon in the house any more than I did.
He also then went on to show me the holes in the side of the house
walls, they were placed there to put the barrel of their guns through
should armed intruders attack the house, was I in dreamland?? is this the
Philippines, why had I not seen any violence of this type, I see guards all
the time at the banks, they all have 12 bore shotguns, some with M16
automatic rifles, on the Ferry to Ilo Ilo, I see guards with weapons,
automatic rifles, and yet it hadn’t really sunk in.
26
The 2nd experience was at the Husband of my wife’s Doctor
friend, I discussed the level of personal security in the Philippines with
him, his reply astounded me even further, ” Yes I have a gun, actually I
have about 20 different guns, would you like to come and see them ?”
I asked why there was a need for so many guns. he said, that even
for Filipinos its dangerous in this country, you need lots of protection, he
said, in my house and lot, I have over 20 dogs in the grounds, naturally
he had a big lot, but about 20 dogs, i have 3 Akita Japanese guard dogs,
and 4 German Shepherds, the rest are a selection of other dogs, why so
many I asked?
Keep out undesirables he said, at night, I let all the dogs out, they
keep a visible prescience at night, after that, I have 3 boys in the lot,
looking after the dogs, and keeping an eye on things, after that, I have 2
semi automatic rifles at strategic points, and 2 handguns at others,…..is
this the Philippines ?
Wake me up somebody because I felt that hearing the 2
experiences led me to believe that this is over stretching personal security
a little bit, or is it? remembering I am a foreigner, these people are natural
born Filipinos living in their own country, who knows the situation better
than they do, and yet I have not heard any experiences about security
issues involving foreigners, I know that Bob has remarked very often that
Davao City is a very safe city, and he has always said how safe he feels
27
there, I have no reason to disbelieve him, or any other reader who says
they feel safe in their city of occupation.
I can only now refer to my final experience, a couple of weeks ago,
I accompanied my wife to the downtown plaza area of Bacolod City, she
wanted to have some photos developed, in the car I was driving, my wife
said to me ‘Now empty your pockets honey, give me your wallet, and
where is your credit cards, give them to me, do you have any money, oh
yes, fine give that to me too.
Make sure your pockets are empty, when you come with me, you
are a target for snatchers, and robbers, when we arrived in the plaza mart,
I remarked to the cashier about the security problem in the area, the
young lady said, Sir its quite safe here for you, my wife over heard the
conversation and said in English, don’t tell me husband that, you know
its not safe, there are pickpockets, thieves and robbers here, she said I
myself was robbed the last time I was down here, so don’t tell him that,
he has to know its not safe here, and with that we paid and promptly left.
So how about personal security, some of you will tell me you have
never felt unsafe, maybe there are some of you who have had bad
experiences, I know all will be different, what about guns ? How do you
feel about owning and keeping one?
Recently I was taken to a firing range in Negros and given light
weapons training on the Biretta hand gun, the Browning Automatic and
M14 and M16 Semi Automatic Weapons, I had a great day out with some
28
friends, but it also brought home to me and reminded me just how
dangerous guns are.
Some of you won’t feel comfortable with it, and if you had to draw
your gun to defend yourself, could you do it? What if there was a
discharge enquiry by the Police if your discharged your gun in such an
incident, how would it go down for you if you are a foreigner?
These and many other questions need to be discussed, I hope to hear all
your viewpoints on this, and look forward to reading your replies.
29
Research Methodology
A. Research Design
What is Descriptive Research?
This research is the most commonly used and the basic reason for
carrying out descriptive research is to identify the cause of something
that is happening. For instance, this research could be use in order to find
out what age group is buying a particular brand of cola, whether a
company’s market share differs between geographical regions or to
discover how many competitors a company has in their marketplace.
Descriptive research, also known as statistical research, describes
data and characteristic about the population or phenomenon being
studied. Descriptive research answers the questions who, what, where,
when and how.
This type of research is also a grouping that includes many
particular research methodologies and procedures, such as observations,
surveys, self-reports, and tests. The four parameters of research will help
30
us understand how descriptive research in general is similar to, and
different from, other types of research.
Descriptive research is use to obtain information concerning the
current status of the phenomena to describe "what exists" with respect to
variables or conditions in a situation. The methods involved range from
the survey which describes the status quo, the correlation study which
investigates the relationship between variables, to developmental studies
which seek to determine changes over time.
B. Research Locale
Eulogio "Amang" Rodriguez Institute of Science and Technology
(EARIST) was established after the liberation of Manila in 1945.
EARIST traces back its development from that of a vocational high
school with only a room at the second floor of the Mapa High School,
nine teachers, a clerk, and 147 students under Mr. Pantaleon Regala, its
principal. Its former name was Eulogio Rodriguez Vocational High
School (ERVHS). EARIST growth and development were made possible
via three Republic Acts and Presidential Decree, to wit: Republic Act
4072, jointly sponsored by Congressman Ramon D. Bagatsing and Salih
Ututalum in 1964, authorized the establishment of the Technical
Education Department without changing the name of the school. It was
headed by a Vocational Director. Republic Act 5088, sponsored by
Congressman Sergio Loyola in 1967, authorized the renaming of ERVHS
31
to Eulogio "Amang" Rodriguez Memorial School of Arts and Trades
(EARMSAT) and signaled its separation from the Division of City
Schools, Manila. It was headed by a Superintendent Republic Act 6595,
sponsored by Congressman Joaquin R. Roces in 1972, converted
EARMSAT to EARIST with a President as its head. This made EARIST
into a full-pledged college and authorized the establishment of
vocational-technical school branches in each congressional district of
Manila. Presidential Decree 1524, signed by President Ferdinand E.
Marcos on June 11, 1978, converted EARIST into a chartered state
college with a Board of Trustees as its governing body and Dr. Hilario G.
Nudas, as its first College President. Eulogio "Amang" Rodriguez
Institute of Science and Technology.
C. Samples and Sampling Technique Used
EARIST employs almost a thousand of employees including faculties.
The researcher have confined the research to 50 sampling sized only to
be distributed with the following colleges and offices: College of
Engineering, College of Business and Public Administration, College of
Education, College of Arts and Sciences, College of International and
Hospitality Management, College of Industrial Technology, and College
of Architecture and Fine Arts. Administrative Office, Registrar’s Office,
Office of the President and Vice President for Academic Affairs, Office
of the Director for Research and Instruction and Office of the Director for
Extension. The reason why the researcher uses the 50 sampling size is
32
because the researcher will just distribute the survey questionnaires to
member of the faculty and every student in the school.
D. Instruments
The instrument that the researcher will be using in conducting and
developing this research is Survey Questionnaire. As par as this
instrument is concern, it’s very easy for the researcher to get the pulse,
views, ideals, and reactions of EARIST population.
SURVEY QUESTIONNAIRES
Name________________________________________Course_________________ Department_________________Position_______________________
Part 1 ProfileAge: 16-20 years old Gender:
21-25years old Male:
26-30 years old Female:
31-35 years old
36 and up
Knowledge in Security system:
Advance
Moderate
Knowledgeable
New
Part 2 Improvement of the old security system of EULOGIO”AMANG” RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY:
Check the appropriate box, which you believe applicable to the given variables.
Rate Verbal Interpretation Range
33
5 Strongly Agree 4.6 – 5.0
4 Agree 3.6 – 4.5
3 Uncertain 2.6 – 3.5
2 Disagree 1.6 – 2.5
1 Strongly Disagree 1.0 – 1.5
A. The current assessment of the EARIST security system. 5 4 3 2 11. The security system the EARIST has a loop hole2. It only uses CCTV Camera3. The system only records in-coming and out-coming people4. Check on all the vehicles going in-out of the institution5. Cannot determine actual incidents inside or outside school properties B. Improvement of the school security system. 5 4 3 2 11. Knowledge in improving the security system2. Appropriate security system is needed3. On the spot monitoring of all activities inside the school premises4. Awareness about the safety guidelines5. Knowledge in terms of possible event if the security system is not effective C. The Benefits of newly proposed security system. 5 4 3 2 11. Digital security system2. Save work and time3. Give convenience in monitoring the whole school4. On the report5. Real –time events D. Effectiveness in terms of protecting the school. 5 4 3 2 11. Monitor accidents/ incidents2. Monitor all the students coming in-out of the school3. Monitor employees and faculty4. Monitor the school designated area5. Valuable things inside the school will be properly monitored E. There is no significant difference between the old and new system.
34
_______________ Signature
E. Statistical Treatment of DataThe information gathered were tabulated and processed manually
and with the aid of computer to determine the precise interpretation of the
results. Matrix tables were made to organize, summarize, and analyze the
data gathered for easy determination of its difference from each other.
Data were collated, tabulated, and analyzed. The following
statistical tools were used in the analysis of data:
1. Percentage
The measure of dominant quantity was utilized to determine
the most probable scenario. The formula of percentage is as
follows:
F
P = -------
N
Where P = Percentage (%)
F = Frequency
N = Total Number of Population
35
2. The responses to questions in the given variables were scaled using
the “five-point-scale” or Likert Scale system and given weight as
follows:
Rate Verbal Interpretation Range
5 Strongly Agree 4.6 – 5.0
4 Agree 3.6 – 4.5
3 Moderately Agree 2.6 – 3.5
2 Disagree 1.6 – 2.5
1 Strongly Disagree 1.0 – 1.5
3. The process of finding the “Weighted Mean,” which is referred to
as the central tendency was used, The formula is given below:
(wx)
= ------
N
Where: X = weighted mean
w = weighted factor
= sum of
N = total number of respondents
x = score
36
To test the level of significance between the assessments of the
respondents the Chi-Square were employed to determine the relationship
of factors as given.
The formula of chi-square is presented as follows:
2
(fo ) - ( fe )
X2 = --------------
fe
Where: X = Chi – Square
fo = Observed Frequency
fe = Expected Frequency
4. Degree of Freedom
Estimates of statistical parameters can be based upon different
amounts of information or data. The number of independent pieces of
information that go into the estimate of a parameter is called the
degrees of freedom (df). In general, the degrees of freedom of an
estimate is equal to the number of independent scores that go into the
estimate minus the number of parameters estimated as intermediate
steps in the estimation of the parameter itself (which, in sample
variance, is one, since the sample mean is the only intermediate step).
Df = (r-1) (c-1)
Where: df = degrees of freedom
37
R = row
C = coloumn
PRESENTATION, ANALYSIS AND
INTERPRETATION OF DATA
Table 1.1 Frequencies and Percentage Distribution on the Age of the RespondentsOptions Frequency Percent Rank16-20 years old 13 26% Rank 3rd
21-25 years old 22 44% Rank 1st
26-30 years old 15 30% Rank 2nd
31-35 years old 0 0%
36yrs. and above 0 0%
Total 50 100%
Table 1.1 presents the frequency and percentage distribution on
the age of the respondents. 13 or 26% of the respondents aged 18-20
years old, 22 or 44% of the respondents aged 21-25 years old, 15 or
30% of the respondents aged 26-30 years old, 0 of the respondents aged
31-35 years old and lastly 0 of the respondent aged 36 years and above.
Table 1.2 Frequencies and Percentage Distribution on the Gender of the Respondents.Options Frequency Percent Rank
Male 19 38% Rank 2nd
Female 31 62% Rank 1st
Total 50 100%
38
Table 1.2 represents the frequency and percentage distribution on
the gender of the respondents. 19 or 38% respondents are male while 31
or 62% are female.
Table 1.3 Frequencies and Percentage Distribution on the familiarity in security ststem.Options Frequency Percent Rank
Advance 7 14% Rank 3rd
Moderate 22 44% Rank 1st
Knowledgeable 12 24% Rank 2nd
New 9 18% Rank 4th
Total 50 100%
Table 1.3 represents the frequency and percentage distribution on
the familiarity in security system. 7 or 14% respondents is advance in
familiarity in security system, 22 or 44% respondents is moderate in
familiarity of security system, 12 or 24% respondents is knowledgeable
in familiarity of security system, 9 or 18% respondents is new in
familiarity of security system.
39
Rate Verbal Interpretation Range
5 Strongly Agree 4.6 –5.0
4 Agree 3.6 –4.5
3 Moderately Agree 2.6 –3.5
2 Disagree 1.6 –2.5
1 Strongly Disagree 1.0 –1.5
Table 2.1 Frequency and Percentage Distribution the current assessment of the EARIST security system.
2.1.1 The security system the EARIST has a loop hole.Options Frequency Percent Rank
5(strongly agree) 17 34% Rank 2nd
4(agree) 23 46% Rank 1st
3(uncertain) 9 18% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
Table 2.1.1 represents the frequency and percentage distribution.
17 or 34% stated that they are strongly agreed that the security system
of EARIST has a loop hole. 23 or 46% agree, 9 or 18% stated that they
are uncertain, 1 or 2% stated they are disagree and none (0) respondent
is strongly disagree.
2.1.2 It only uses CCTV Camera.Options Frequency Percent Rank
5(strongly agree) 15 30% Rank 2nd
4(agree) 19 38% Rank 1st
3(uncertain) 13 26% Rank 3rd
2(disagree) 2 4% Rank 4th
1(strongly disagree) 1 2% Rank 5th
Total 50 100%
40
Table 2.1.2 represents the frequency and percentage distribution
on that the EARIST only uses CCTV camera. 15 or 30% stated that they
are strongly agreed. 19 or 38% stated agreeing. 13 or 26% stated that
they are uncertain affected, 2 or 4% are disagreeing and 1 or 2%
respondent stated that they strongly disagree.
2.1.3. The system only records in-coming and out-coming people.Options Frequency Percent Rank
5(strongly agree) 19 38 Rank 2nd
4(agree) 22 44% Rank 1st
3(uncertain) 9 18% Rank 3rd
Total 50 100%
Table 2.1.3 represents the frequency and percentage distribution
on the system only records in-coming and out-coming people. 19or 38%
stated that they are strongly agreed. 22 or 44% stated are agreeing. 9 or
18% stated that they are uncertain affected, none respondents stated
agree strongly disagree.
2.1.4 Check on all the vehicles going in-out of the institution.Options Frequency Percent Rank
5(strongly agree) 25 50% Rank 1st
4(agree) 17 34% Rank 2nd
3(uncertain) 7 14% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
Table 2.1.4 represents the frequency and percentage distribution
on checking on all the vehicles going in-out of the institution .25 or 50%
stated that they are strongly agreed. 17 or 34% respondents are
41
agreeing. 7 or 14 stated that they are uncertain affected, 1 or 2% stated
disagree and none (0) respondent stated that they are strongly disagree.
2.1.5 Cannot determine actual incidents inside or outside school properties.Options Frequency Percent W.M Rank5(strongly agree) 20 40% 4.42 Rank 2nd
4(agree) 22 44% 4.2 Rank 1st
3(uncertain) 6 12% 4.4 Rank 3rd
2(disagree) 2 4% 4.24 Rank 4th
1(strongly disagree) 0 0 4.34
Total 50 100%
Table 2.1.5 represents the frequency and percentage distribution
on cannot determine actual incidents inside or outside school
properties.20 or 40% stated that they are strongly agreed. 22 or 44%
are stated agree. 6 or 12% stated that they are uncertain affected and 2
or 4% are stated disagree. And none (0) respondents stated in strongly
disagree.
Table 2.2 Improvement of the school security system.
2.2.1. Knowledge in improving the security systemOptions Frequency Percent Rank
5(strongly agree) 17 34% Rank 2nd
4(agree) 27 54% Rank 1st
3(uncertain) 6 12% Rank 3rd
Total 50 100%
Table 2.2.1 represents the frequency and percentage distribution.
17 or 34% stated that they are strongly agreed to trap mice
automatically. 27 or 54% respondents agree, 6 or 12% stated that they
42
are uncertain, and none respondents stated that they are disagree and
strongly disagree.
2.2.2 Appropriate security system is needed.Options Frequency Percent Rank
5(strongly agree) 27 54% Rank 1st
4(agree) 14 28% Rank 2nd
3(uncertain) 8 16% Rank 3rd
Total 50 100%
Table 2.2.2 represents the frequency and percentage distribution.
27 or 54% stated that they are strongly agreed.14 or 28% agree, 8 or
16% stated that they are uncertain and none (0) respondent is
disagreeing and strongly disagree.
2.2.3 On the spot monitoring of all activities inside the school premises.Options Frequency Percent Rank
5(strongly agree) 28 56% Rank 1st
4(agree) 19 38% Rank 2nd
3(uncertain) 3 6% Rank 3rd
Total 50 100%
Table 2.2.3 represents the frequency and percentage distribution.
28 or 56% stated that they are strongly agreed that it can monitor all
activities inside the school premises. 19 or 38% stated agree and 3 or
6% sated uncertain and none respondents disagree and strongly
disagree.
2.2.4 Awareness about the safety guidelines.Options Frequency Percent Rank5(strongly agree) 32 64% Rank 1st
4(agree) 15 30% Rank 2nd
43
3(uncertain) 3 6% Rank 3rd
Total 50 100%
Table 2.2.4 represents the frequency and percentage distribution.
32 or 64% stated that they are strongly agreed that it should be aware
about the safety guidelines. 15 or 30% agree, 3 or 6% stated that they
are uncertain, and none (0) respondent is disagree and strongly agree.
2.2.5 Knowledge in terms of possible event if the security system is not effective.Options Frequency Percent Rank
5(strongly agree) 29 58% Rank 1st
4(agree) 14 28% Rank 2nd
3(uncertain) 6 12% Rank 3rd
1 (disagree) 1 2% Rank 4th
Total 50 100%
Table 2.2.5 represents the frequency and percentage distribution.
29or 58% stated that they are strongly agreed that it is effective in
terms of possible events if the security system is not effective. 14 or 28%
agree, 6 or 12% stated that they are uncertain, 1 or 2% disagree and
none (0) respondent stated strongly disagree.
Table 2.3 The Benefits of newly proposed security system.
2.3.1 Digital security systemOptions Frequency Percent Rank
5(strongly agree) 28 56% Rank 1st
4(agree) 17 34% Rank 2nd
3(uncertain) 4 8% Rank 3rd
1(strongly agree) 1 2% Rank 4th
44
Total 50 100%
Table 2.3.1 represents the frequency and percentage distribution.
28 or 56% stated that they are strongly agreed that one of the benefits
of the newly proposed security system is digital security system. 17 or
34% stated agree, 4 or 8% stated that they are uncertain and 1 or 2%
stated that they are strongly agreed and none (0) stated that they are
strongly disagreeing.
2.3.2 Save work and time.Options Frequency Percent Rank
5(strongly agree) 20 40% Rank 2nd
4(agree) 21 42% Rank 1st
3(uncertain) 8 16% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
Table 2.3.2 represents the frequency and percentage distribution.
20 or 40% stated that they are strongly agreed that it can save work and
time. 21 or 42% agree, 8 or 16% stated that they are uncertain, 1 or
2% stated that they are disagree and none (0) stated that they are
strongly disagree.
2.3.3 Give convenience in monitoring the whole schoolOptions Frequency Percent Rank
5(strongly agree) 26 52% Rank 1st
4(agree) 19 38% Rank 2nd
3(uncertain) 4 8% Rank 3rd
2(disagree) 1 2% Rank 4th
45
Total 50 100%
Table 2.3.3 represents the frequency and percentage distribution.
26 or 52% stated that they are strongly agreed that it can give
convenience in monitoring the whole school. 19 or 38% agree, 4 or 8%
respondent stated uncertain, 1 or 2% disagree and none (0) stated that
they are strongly disagreeing.
2.3.4 On the report.Options Frequency Percent Rank
5(strongly agree) 24 48% Rank 1st
4(agree) 17 34% Rank 2nd
3(uncertain) 7 14% Rank 3rd
2(disagree) 1 2% Rank 4th
1(strongly disagree) 1 2% Rank 4th
Total 50 100%
Table 2.3.4 represents the frequency and percentage distribution.
24 or 48% stated that they are strongly agreed that it is on the report of
what it is happening in the school. 17 or 34% agree, 7 or 14% stated
that they are uncertain, 1 or 2% stated that they are disagree and 1 or
2% stated that they are strongly disagree.
2.3.5 Real –time events.Options Frequency Percent Rank
5(strongly agree) 27 54% Rank 1st
4(agree) 16 32% Rank 2nd
3(uncertain) 5 10 Rank 3rd
2(disagree) 1 2% Rank 4th
1(strongly disagree) 1 2% Rank 4th
Total 50 100%
46
Table 2.3.5 represents the frequency and percentage distribution.
27 or 54% stated that they are strongly agreed that it is real time
monitoring of events. 16 or 32% agree, 5 or 10% stated that they are
uncertain, 1or 2% respondent stated disagree, 1 or 2% respondents
stated that they are strongly disagree.
Table 2.4 Effectiveness in terms of protecting the school.
2.4.1 Monitor accidents/ incidentsOptions Frequency Percent Rank
5(strongly agree) 25 50% Rank 1st
4(agree) 17 34% Rank 2nd
3(uncertain) 4 8% Rank 3rd
2(disagree) 2 4% Rank 4th
1(strongly disagree) 2 4% Rank 4th
Total 50 100%
Table 2.4.1 represents the frequency and percentage distribution.
25 or 50% stated that they are strongly agreed that it can monitor
accidents or incidents. 17 or 34% agree, 4 or 8% stated that they are
uncertain, 2 or 4% stated that they are disagree and strongly disagree.
2.4.2 Monitor all the students coming in-out of the schoolOptions Frequency Percent Rank
5(strongly agree) 26 52% Rank 1st
4(agree) 15 30% Rank 2nd
3(uncertain) 8 16% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
47
Table 2.4.2 represents the frequency and percentage distribution.
26 or 52% stated that they are strongly agreed that it can monitor all the
students coming in-out of the school. 15 or 30% agree, 8 or 16% stated
that they are uncertain, 1 or 2% stated that they are disagree and none
(0) stated that they are strongly disagree.
2.4.3 Monitor employees and faculty.Options Frequency Percent Rank
5(strongly agree) 26 56% Rank 1st
4(agree) 19 38% Rank 2nd
3(uncertain) 2 4% Rank 3rd
2(disagree) 1 2% Rank 4th
Total 50 100%
Table 2.4.3 represents the frequency and percentage distribution.
26 or 56% stated that they are strongly agreed that it can monitor
employees and faculty. 19 or 38% agree, 2 or 4% stated that they are
uncertain, 1 or 2% respondent stated disagree and none (0) stated
strongly disagree.
2.4.4 Monitor the school designated area.Options Frequency Percent Rank
5(strongly agree) 23 46% Rank 1st
4(agree) 19 38% Rank 2nd
3(uncertain) 8 16% Rank 3rd
Total 50 100%
Table 2.4.4 represents the frequency and percentage distribution.
23 or 46% stated that they are strongly agreed that it can monitor
designated area. 19 or 38% agree, 8 or 16% stated that they are
48
uncertain and none (0) stated that they are either disagreeing or
strongly disagree.
2.4.5 Valuable things inside the school will be properly monitoredOptions Frequency Percent Rank
5(strongly agree) 28 56% Rank 1st
4(agree) 14 28% Rank 2nd
3(uncertain) 7 14% Rank 3rd
2( disagree) 1 2% Rank 4th
Total 50 100%
Table 2.4.5 represents the frequency and percentage distribution.
28 or 56% stated that they are strongly agreed that it properly
monitored the entire valuable thing inside the school. 14 or 28% agree, 7
or 6% stated that they are uncertain, 1 or 2% respondent stated
disagree and none (0) respondent stated strongly disagree.
49
Table 3.1 Univariate Matrix on the Eulogio “Amang” Rodriguez Institute of Science and Technology Security System.OPTIONS5 4 3 2 1 X Descriptive Interpretation
2.1.1 The security system the EARIST has a loop hole 17 23 9 1 0 4.12 Agree2.1.2 It only uses CCTV Camera 15 19 13 2 1 3.88 Agree2.1.3 The system only records in-coming and out-coming people 19 22 9 0 0 4.2 Agree2.1.4 Check on all the vehicles going in-out of the institution 25 17 7 1 0 4.32 Agree2.1.5 Cannot determine actual incidents inside or outside school properties 20 22 6 2 0 4.2 Agree2.2.1 Knowledge in improving the security system 17 27 6 0 0 4.22 Agree2.2.2 Appropriate security system is needed 27 15 8 0 1 4.38 Agree2.2.3 On the spot monitoring of all activities inside the school premises 28 19 3 0 0 4.5 Agree2.2.4 Awareness about the safety guidelines 32 15 3 0 0 4.58 Strongly Agree2.2.5 Knowledge in terms of possible event if the security system is not effective
29 14 6 0 14.38
Agree
2.3.1 Digital security system 28 17 4 0 1 4.42 Agree2.3.2 Save work and time 20 21 8 1 0 4.16 Agree2.3.3 Give convenience in monitoring the whole school 26 19 4 1 0 4.36 Agree2.3.4 On the report 24 17 7 1 1 4.2 Agree2.3.5 Real –time events 27 16 5 1 1 4.3 Agree2.4.1 Monitor accidents/ incidents 25 17 4 2 2 4.22 Agree2.4.2 Monitor all the students coming in-out of the school 26 15 8 1 0 4.32 Agree2.4.3 Monitor employees and faculty 28 19 2 1 0 4.48 Agree2.4.4 Monitor the school designated area 23 19 8 0 0 4.3 Agree2.4.5 Valuable things inside the school will be properly monitored 28 14 7 1 0 4.38 AgreeTOTAL 484 367 127 15 6 85.95
Based on the foregoing results, as showed in table 3.1, the automated mouse / mice trap range only to strongly agree with a mean of 85.95.
50
Table of Chi-square Statistics
Df= (r-1) (c-1)
= (5-1) (5-1)
= 16
F- Statistics with other values; p= 0.05│p= 0.01 │p=0.001df P= 0.05 P= 0.01 P= 0.0011 3.84 6.64 10.832 5.99 9.21 13.823 7.82 11.35 16.274 9.49 13.28 18.475 11.07 15.09 20.526 12.59 16.81 22.467 14.07 18.48 24.328 15.51 20.09 26.139 16.92 21.67 27.8810 18.31 23.21 29.5911 19.68 24.73 31.2612 21.03 26.22 32.9113 22.36 27.69 34.5314 23.69 29.40 36.1215 25.00 30.58 37.7016 26.30 32.00 39.2517 27.59 33.41 40.7918 28.87 34.81 42.3119 30.14 36.19 43.8220 31.41 37.57 45.3221 32.67 38.93 46.8022 33.92 40.29 48.8723 35.17 41.64 49.7324 36.42 42.98 51.1825 37.65 44.31 37.6526 38.89 45.64 54.0527 40.11 46.96 55.4828 41.34 48.28 56.8929 42.56 49.59 58.3030 43.77 50.89 59.7031 44.99 52.19 61.1032 46.19 53.99 62.4933 47.40 54.78 63.8734 48.60 56.06 64.2535 49.80 57.34 66.6236 51.00 61.16 70.7137 52.19 58.89 69.3538 53.38 61.16 70.7139 54.57 62.43 72.0640 55.76 63.69 73.4141 56.94 64.95 74.7542 58.12 66.21 76.0943 59.30 67.46 77.42
51
44 60.48 68.71 78.7545 61.66 69.96 80.0846 62.83 71.20 81.4047 64.00 72.44 82.7248 65.17 73.68 84.0349 66.34 74.92 85.3550 67.51 76.15 86.6651 68.67 77.39 87.9752 69.83 78.62 89.2753 70.99 79.84 90.5754 72.15 81.07 91.8855 73.31 82.29 93.1756 74.47 83.73 95.7557 75.62 84.73 95.7558 76.78 85.95 97.0359 77.93 87.17 98.3460 79.08 88.38 99.6261 80.23 89.59 100.8862 81.38 90.18 102.1563 82.53 92.01 103.4664 83.68 93.22 104.7265 84.82 94.42 105.9766 85.97 95.63 107.2667 87.11 96.83 108.5468 88.25 98.03 109.7969 89.39 99.23 111.0670 90.53 104.42 112.3171 91.67 101.62 113.5672 92.81 102.82 114.8473 93.95 104.01 116.0874 95.08 105.20 117.3575 96.22 106.39 118.6076 97.35 107.58 119.8577 98.49 108.77 121.1178 99.62 109.96 112.3679 100.75 111.15 123.6080 101.88 112.33 124.8481 103.01 113.51 126.0982 104.14 114.70 127.3383 105.27 115.88 128.2784 106.40 117.06 129.8085 107.52 118.24 131.0486 108.65 119.41 132.2887 109.77 120.59 133.5188 110.90 121.77 134.7489 112.02 122.94 135.9690 113.15 124.12 137.1991 114.27 125.29 138.4592 115.39 136.46 139.6693 116.51 127.63 140.9094 117.63 128.80 142.1295 118.75 129.97 143.3296 119.87 131.14 144.5597 120.99 132.31 145.7898 122.11 133.47 146.99
52
99 123..23 134.64 148.21100 124.34 135.81 149.88
Rate Verbal Interpretation Range
5 Strongly Agree 4.6 –5.0
4 Agree 3.6 –4.5
3 Moderately Agree 2.6 –3.5
2 Disagree 1.6 –2.5
1 Strongly Disagree 1.0 –1.5
Table 1.1 1Responses to Socialization Skills Survey
A. The current assessment of the EARIST security system.
Strongly
Agree
Agree Moderatel
y Agree
Disagree Strongly
Disagre
e
W.M Chi
5 4 3 2 1 X2
1. The security system of the EARIST has a loop hole
17(19.2) 23(20.6) 9(8.8) 1(1.2) 0(0.2) 4.120.57
2. It only uses CCTV Camera 15(19.2) 19(20.6) 13(8.8) 2(1.2) 1(0.2) 3.88 3.583. The system only records in-coming and out-coming people 19(19.2) 22(20.6) 9(8.8) 0(1.2) 0(0.2) 4.2 1.304. Check on all the vehicles going in-out of the institution 25(19.2) 17(20.6) 7(8.8) 1(1.2) 0(0.2) 4.32 2.78
53
5.Cannot determine actual incidents inside or outside school properties
20(19.2) 22(20.6) 6(8.8) 2(1.2) 0(0.2) 4.2 1.55
TOTAL Chi-Square: 9.79
The Security system of EARIST has a loop hole with a mean of
4.12 and a verbal interpretation of Agree; it only uses CCTV camera
with a mean of 3.88 and a verbal interpretation of Agree; the system only
records in-coming and out-coming people with a mean of 4.2 and a
verbal interpretation of Agree; check on all the vehicle going in-out of
the institution with a mean of 4.32 and a verbal interpretation of Agree;
and cannot determine actual incidents inside or outside school properties
with a mean of 4.2 and a verbal interpretation of Agree.
The overall computed weighted mean has a verbal interpretation of
Agree.
It is clearly evidence that the chi-square value from the chi-square
value of Table 1.1 is 9.79 which is less than the value from the chi-square
table which is 26.30, the null hypothesis is accepted.
Table 2B. Improvement of the school security system
Strongly
Agree
Agree Moderately
Agree
Disagre
e
Strongly
Disagre
e
W.M Chi
5 4 3 2 1 X2
1. Knowledge in improving the security system
17(26.6) 27(18) 6(5.2) 0(0.2) 0(0) 4.228.29
2. Appropriate security system is needed
27(26.6) 15(18) 8(5.2) 0(0.2) 0(0) 4.382.21
54
3. On the spot monitoring of all activities inside the school premises
28(26.6) 19(18) 3(5.2) 0(0.2) 0(0) 4.5
1.26
4. Awareness about the safety guidelines
32(26.6) 15(18) 3(5.2) 0(0.2) 0(0) 4.582.73
5. Knowledge in terms of possible event if the security system is not effective
29(26.6) 14(18) 6(5.2) 1(0.2) 0(0) 4.38
4.43
TOTAL Chi- square: 18.92
Knowledge in improving the security system with a mean of 4.22
and a verbal interpretation of Agree; appropriate security system is
needed with a mean of 4.38 and a verbal interpretation of Agree; on the
spot monitoring of all activities inside the school premises with a mean of
4.5 and a verbal interpretation of Agree; awareness about the safety
guidelines with a mean of 4.58 and a verbal interpretation of Agree; and
knowledge in terms of possible event if the security system is not effective
with a mean of 4.38 and a verbal interpretation of Agree.
The overall computed weighted mean has a verbal interpretation of
Agree.
It is clearly evidence that the chi-square value from the chi-square
value of Table 1.2 is 18.92 which is less than the value from the chi-
square table which is 26.30, the null hypothesis is accepted.
Table 3C The Benefits of newly proposed security system.
Strongly
Agree
Agree Moderately
Agree
DISAGREE Strongly
Disagree
W.M Chi
5 4 3 2 1 X2
55
1. Digital security system
28(25) 17(18) 4(5.6) 0(0.8) 1(0.6) 4.42
1.94
2. Save work and time 20(25) 21(18) 18(5.6) 1(0.8) 0(0.6) 4.16 3.18
3 Give convenience in monitoring the whole school
26(25) 19(18) 4(5.6) 1(0.8) 0(0.6) 4.36
1.20
4. On the report 24(25) 17(18) 7(5.6) 1(0.8) 1(0.6) 4.2 0.76
5 Real –time events 27(25) 16(18) 5(5.6) 1(0.8) 1(0.6) 4.3 0.76
TOTAL: Chi-Square 7.85
Digital security system with a mean of 4.42 and a verbal interpretation of
Agree; save work and time with a mean of 4.16 and a verbal
interpretation of Agree; Give convenience in monitoring the whole
school with a mean of 4.36 and a verbal interpretation of Agree; on the
report with a mean of 4.2 and a verbal interpretation of Agree; real –time
events with a mean of 4.3 and a verbal interpretation of Agree.
The overall computed weighted mean has a verbal interpretation of
Agree.
It is clearly evidence that the chi-square value from the chi-square
value of Table 1.3 is 7.85 which is less than the value from the chi-square
table which is 26.30, the null hypothesis is accepted.
Table 4D. Effectiveness in terms of protecting the school
Strongly
Agree
Agree Moderatel
y Agree
Disagree Strongly
Disagre
e
W.M Chi
5 4 3 2 1 X2
1. Monitor accidents/ incidents25(26) 17(16.8) 4(5.8) 2(1) 2(0.4) 4.22 8
2. Monitor all the students coming in-out of the school
26(26) 15(16.8) 8(5.8) 1(1) 0(0.4) 4.321.43
3. Monitor employees and faculty28(26) 19(16.8) 2(5.8) 1(1) 0(0.4) 4.48 3.33
56
4. Monitor the school designated area 23(26) 19(16.8) 8(5.8) 0(1) 0(0.4) 4.3
2.87
5. Valuable things inside the school will be properly monitored
28(26) 14(16.8) 7(5.8) 1(1) 0(0.4) 4.38
1.27
TOTAL: Chi-Square 16.90
Monitor accidents/ incidents with a mean of 4.22 and a verbal
interpretation of Agree; monitor all the students coming in-out of the
school with a mean of 4.32 and a verbal interpretation of Agree; monitor
employees and faculty with a mean of 4.48 and a verbal interpretation of
Agree; monitor the school designated area with a mean of 4.3 and a
verbal interpretation of Agree; valuable things inside the school will be
properly monitored with a mean of 4.38 and a verbal interpretation of
Agree.
The overall computed weighted mean has a verbal interpretation of
Agree.
It is clearly evidence that the chi-square value from the chi-square
value of Table 1.4 is 16.90 which is less than the value from the chi-
square table which is 26.30, the null hypothesis is accepted.
57
Summary
The research EULOGIO “A MANG” RODRIGUEZ INSTITUTE
OF SCIENCE AND TECHNOLOGY (EARIST) security system was
proposed to the EULOGIO “A MANG” RODRIGUEZ INSTITUTE OF
SCIENCE AND TECHNOLOGY (EARIST) and the other school who
wants to improve their security system. This research was conducted for
the purpose of determining the problems encountered in the protection of
the school. And based from such problems the following objectives are
formulated: 1) To provide a much effective security system that would
help them to secure the safetiness of every student and employee; 2) To
be able to determined if there is a hazardous accident; 3) To be able to
create a effective security system that would help them to monitor if there
is a intruders; 4) To be able to protect each persons and properties
coming in and out of the school premises.
58
Furthermore, to achieve the objectives, the proponents, used the
Descriptive Method to develop the proposed system. The researcher also
conducted an evaluation to the respondents in order to gather all the
information needed to complete the study with the use of the Likerts
Scale; the respondent evaluated the digital project to determine the
performance of the system.
SUMMARY OF FINDINGS
Based in the proponent’s objectives in data gatherings were
determined.
1. Based on the proposed security system was interpreted “VERY
GOOD” in the criteria of Efficiency because it provides
convenience to the school and to the employees.
2. . Based on the proposed security system was interpreted “VERY
GOOD” in the criteria of Accuracy because its digitalized is 100
percent in protecting the school.
3. . Based on the proposed security system was interpreted “VERY
GOOD” in the criteria of Reliability it can use anytime.
4. . Based on the proposed security system was interpreted
“EXCELLENT” in the criteria of User-friendly because it is easy
to use, understand and operate.
59
5. Based on the proposed security system was interpreted
“EXCELLENT” in the criteria of Simplicity because of the
projects clearness of design.
CONCLUSION
Based on the proponent objective and data gathered and have some
findings determined by the proponent. The proposed design helps to
protect the student, employee and school properties. The proposed
project is very good in terms of detecting intruders and hazardous
accidents. Since the proposed research is digitalized; it helps the
security guard and employee to monitor the whole school.
RECOMMENDATION
Therefore, the proponents would like to recommend the proposed
research to be initiated and give enough attention by the administration of
Eulogio “Amang” Rodriguez Institute of Science and Technology
regarding on the benefits of the research specifically on health, security
and environment and environmental aspects of life so that it will be
60
initiated for the school and other universities on a long term plan project
that could benefits all of us.
Bibliography
www.alarmsystemreviews.com
www.medialab.tfe.umu.se/...thesis/.../intelligent_home_security_system.pdf
innovexpo.itee.uq.edu.au/2001/projects/s804258/thesis.pdf
www.datanumeric.com/thesis/thesis.pdf
www.datanumeric.com/thesis/thesis.pdf
www.datanumeric.com/thesis/thesis.pdf
www.cs.virginia.edu/~jck/publications/Weatherwax_MS_Thesis.pdf
Capacitive Position/Displacement Sensor Theory/Tutorial
Capacitive Position/Displacement Overview
Comparing Capacitive and Eddy-Current Sensors
M. Kretschmar and S. Welsby (2005), Capacitive and Inductive Displacement
Sensors, in Sensor Technology Handbook, J. Wilson editor, Newnes:
Burlington, MA.
61
C. A. Grimes, E. C. Dickey, and M. V. Pishko (2006), Encyclopedia of
Sensors (10-Volume Set), American Scientific Publishers. ISBN 1-58883-
056-X
Sensors - Open access journal of MDPI
M. Pohanka, O. Pavlis, and P. Skladal. Rapid Characterization of Monoclonal
Antibodies using the Piezoelectric Immunosensor. Sensors 2007, 7, 341-353
SensEdu; how sensors work
Clifford K. Ho, Alex Robinson, David R. Miller and Mary J. Davis. Overview
of Sensors and Needs for Environmental Monitoring. Sensors 2005, 5, 4-37
Wireless hydrogen sensor
Sensors and Actuators - Elsevier journal
Automated Deformation Monitoring system
Droid's Sensors -adware for droidsensors
Trimmer, H.William (1981). Understanding and Servicing Alarm Systems.
Stoneham: Butterworth.
Weber, Thad L. (1985). Alarm Systems and Theft Protection (2d ed.). Stoneham,
MA: Butterworth.
Walker, Philip (1985). Electronic Security Systems. Cambridge, UK: University
Press
Ramsey, Anthony Home Security.
Schatz, David A., et al. Video safety curtain. U.S. Patent No. 6,297,844, Issued
Oct. 2, 2001.
Atss, R.Nandakumar.
Aii, N.Clifton. "Broadband CSV, XML Alarm data Standards" Auckland NZ,
(2002
en.wikipedia.org/wiki/Sensor
en.wikipedia.org/wiki/Alarm
akyqowe.prv.pl/durationundergraduatedegree.html - Cached
62
Read more: http://www.servicemagic.com/article.show.Home-Security-
Alarms-For-Safety-and-Resale.15413.html#ixzz12C6tDaNH
2010 Home Security Blog | Entries (RSS) | Comments (RSS)
Dictionary. The American Heritage® Dictionary of the English Language, Fourth
Edition Copyright © 2007, 2000 by Houghton Mifflin Company. Updated in 2009.
Published by Houghton Mifflin Company. All rights reserved. Read more
Word Tutor. Copyright © 2004-present by eSpindle Learning, a 501(c) nonprofit
organization. All rights reserved.
eSpindle provides personalized spelling and vocabulary tutoring online; sign up free.
Read more
WordNet. WordNet 1.7.1 Copyright © 2001 by Princeton University. All rights
reserved. Read more
Niña Christea P. OrillaAddress: #705 T. Anzures St. Sampaloc Manila Mobile #: 09091029270Email Address: [email protected]
ObjectiveTo partake and actualize learned ideas and skills to the company and equip the
right working attitude for attainment of future professional goals.________________________________________________________________________________________Educational BackgroundTertiary Eulogio “Amang” Rodriguez Institute of Science and Technology 2010- present Bachelor of Science in Computer Engineering 5th yr levelSecondary Marinduque National High School 2002-2006 Primary Don Luis Hidalgo Memorial School 1996-2002
Seminars or Training AttendedSYSTEMATIC ASIA
Sensor Technology: 1sth Step to MECHATRONICS 27 h Day of August 2009
Integrated Circuits: Assembly Process 17 th Day of July 2009
PLC ProgrammingHitachi Global Storage Technologies, Phils. Corp.
Fabrication process of hard diskPCOS Training Center Astron bldg.
63
Skills
Computer skills (MS Word, Excel, Power Point) Willing to work on graveyard shifts Computer troubleshooting Knowledgeable in electronics Knowledgeable in pneumatics
Personal Background
Date of Birth : November 19, 1989Place : Isok Boac MarinduqueCivil Status : SingleCitizenship : FilipinoAge : 20Height : 5’3’Religion : Roman CatholicCharacter ReferencesEng’r. Percival Macapagal Professor 09151174572
This document was made and personally filled, in full honesty to the best of my knowledge.
Niña Christea P. Orilla Applicant’s Signature
64