Automated entry and exit system for subdivisions

With the rising statistics of criminality here in the Philippines, especially cases of theft and robbery in all degrees and manners specifically in our homes, paying extra attention in security measures is a must. Having yourself a good security system in your own home does not ensures safety for yo...

Full description

Saved in:
Bibliographic Details
Main Authors: Asistores, Ronald Kenneth S., Castillo, Paul Stephen H., Esguerra, Jan Vincent O., Reyes, Michael Ricardo B.
Format: text
Published: Animo Repository 2014
Online Access:https://animorepository.dlsu.edu.ph/etd_bachelors/11001
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Description
Summary:With the rising statistics of criminality here in the Philippines, especially cases of theft and robbery in all degrees and manners specifically in our homes, paying extra attention in security measures is a must. Having yourself a good security system in your own home does not ensures safety for your whole household. It must start at least from the entrance of your subdivision. This study implemented a way to scrutinize and filter people coming in of a subdivision through a call using the GSM network with the resident he/she wants to visit and the resident would confirm the entry of the visitor through a press of a button in his/her module. We also added features like information on who were coming in and out of the subdivision through a database. This database would be viewable only by the residents of the subdivision. QR codes were used as gate passes since it has an advance feature of tolerating errors on the code not like the ordinary barcodes in the supermarket. After implementing the system, results show that it has been reliable as long as the network works and there is electricity. The system (GUI) responded correctly to every reply by the resident through an SMS, Survey results show that the program was made to meet satisfactory expectations. It contained all needed information in the database and appropriate users could manipulate the database with ease.