RESIDENTIAL BUILDING SECURITY SYSTEM
Acknowledgement The developer takes this opportunity to express her gratitude and deep regards to her supervisor Mr. Sivananthan Chelliah for his exemplary guidance, monitoring and constant encouragement throughout preparing this project paper on Residential Building Security System. The guidance given by him time to time shall carry the developer a long way in the journey of life on which the developer about to embark. He has contributed a lot to the developer by giving valuable advices and useful guides throughout the project. Besides that, he has also taught the developer in other aspect that is out of the project scope such as communicating skills and he has also shared his experienced with the developer. The developer is very grateful of what Mr. Siva has done for him and very thankful to have him as a supervisor. Last but not least, I would like to thank Asia Pacific University in developing such a great and challenging project for me to improve myself. I also would like to thank all the previous lecturers who have taught me before this semester. Without the knowledge that they shared, I won’t be able to complete this project.
DINESH PRABAKAR|TP025822 P a g e 1 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Table of Contents Acknowledgement....................................................................................................... 1 Chapter 1: Introduction................................................................................................. 5 1.1.
Background to the Project................................................................................. 5
1.2.
Problem Context............................................................................................ 6
1.3.
Rationale...................................................................................................... 7
1.4 Potential Benefits................................................................................................ 8 1.4.1 Tangible Benefits........................................................................................... 8 1.4.2 Intangible benefits......................................................................................... 9 1.5.
Target Users.................................................................................................. 9
1.6.
Scope and Objectives.................................................................................... 11
1.6.1 Aim.......................................................................................................... 11 1.6.2 Objectives.................................................................................................. 11 1.6.3 Deliverables............................................................................................... 12 1.6.4 Nature of Challenge..................................................................................... 13 1.7.
Project Overview and Plan..............................................................................14
Chapter 2: Literature Review........................................................................................ 18 2.1 Literature Review.............................................................................................. 18 2.2 Domain Research.............................................................................................. 19 2.3 Technical Research............................................................................................ 24 Chapter 3: The Chosen Methodology.............................................................................. 29 3.1.
SSADM..................................................................................................... 30
3.1.1.
Justification of the selection......................................................................31
3.1.2.
Overview of the diagram associated with SSADM..........................................33
3.1.3.
Overview on how the proposed system will proceed........................................33
3.2.
RUP methodology........................................................................................ 36
3.2.1.
Overview of the diagram associated............................................................36
3.2.2.
Phases of RUP....................................................................................... 37
Chapter 4: Primary Research........................................................................................ 39 4.1.
Introduction................................................................................................ 39
4.1.1.
Questionnaire........................................................................................ 39
4.1.2.
Interview............................................................................................. 42
Chapter 5: Requirement Validation................................................................................ 44 5.1.
Analysis of data........................................................................................... 45
5.1.1.
Analysis of data through questionnaire.........................................................45
5.1.2.
Analysis collected through interview method.................................................52
DINESH PRABAKAR|TP025822 P a g e 2 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
5.1.3.
Interview Conclusion..............................................................................58
Chapter 6: System Architecture..................................................................................... 59 6.1.
Introduction................................................................................................ 59
6.2.
Abstract Architecture..................................................................................... 60
6.2.1. 6.2.1.1.
Use case diagram............................................................................. 60
6.2.1.2.
Use Case Diagram Specifications.........................................................61
6.2.1.3.
Activity Diagram............................................................................. 64
6.2.1.4.
Sequence Diagram........................................................................... 70
6.2.2.
Database Design.................................................................................... 72
6.2.2.1.
Entity Relationship Diagram (ERD)......................................................72
6.2.2.2.
Class Diagram................................................................................. 73
6.2.2.3.
Database table structure.....................................................................74
6.2.3. 6.3.
System Design...................................................................................... 60
Interface Design..................................................................................... 77
Development/Deployment.............................................................................. 83
6.3.1.
Programming Language Chosen.................................................................83
6.3.2.
IDE Chosen.......................................................................................... 85
6.3.3.
Database Management System Chosen........................................................86
6.3.4.
Operating System Chosen.........................................................................87
Chapter 7: Project Plan............................................................................................... 89 7.1.
Release Plan................................................................................................ 89
7.2.
Test plan for Unit Testing................................................................................90
Chapter 8: System Implementation................................................................................ 96 8.1.
Screenshot.................................................................................................. 96
8.1.1.
Homepage/Login................................................................................... 96
8.1.2.
Admin Panel......................................................................................... 97
8.1.3.
Security Staff Dashboard..........................................................................97
8.1.4.
Tenants Panel........................................................................................ 98
8.1.5.
Visitor Entry Form (Security staff)..............................................................98
8.1.6.
Visitor Report (Security Staff)...................................................................99
8.1.7.
User Attendance Logs..............................................................................99
8.1.8.
Holiday Management............................................................................100
8.1.9.
Holiday Report.................................................................................... 100
8.2.
Sample Codes............................................................................................ 101
8.2.1.
Sample codes for Sign-up Feature.............................................................101
8.2.2.
Sample Codes for Login Feature..............................................................102
DINESH PRABAKAR|TP025822 P a g e 3 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
8.2.3.
Sample Codes for Extracting User Logs Feature...........................................103
Chapter 9: System Validation..................................................................................... 104 9.1.1.
Login into the System............................................................................104
9.1.2.
Visitor Management (Security Staff)..........................................................104
9.1.3.
Fingerprint Access................................................................................ 105
9.1.4.
Holiday Management............................................................................105
9.1.5.
Monitoring Records (Security Staff)..........................................................106
9.2.
User Acceptance Test...................................................................................106
Chapter 10: Conclusions and Reflections.......................................................................110 10.1.
Critical Evaluation................................................................................... 110
10.2.
System Benefits...................................................................................... 110
10.3.
Conclusion and Recommendations...............................................................111
10.4.
Limitations and Future Enhancement............................................................111
10.5.
Conclusion............................................................................................ 113
REFERENCES....................................................................................................... 114 APPENDIX........................................................................................................... 117 Gantt Chart........................................................................................................ 117
DINESH PRABAKAR|TP025822 P a g e 4 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Chapter 1: Introduction 1.1. Background to the Project In today’s world building is an essential part of life. Building are in various form in today’s generation. As an example building can be an individual’s home, workplace, or even shopping complex where one spends their leisure time. It is very important to ensure security in the building as many people are evolved around the building. Besides that, it’s very important for the security management of a building to keep tracks of the people who are accessing into the building and also the reason they are in the building to make sure the building is always secured and safe. In the current environment it’s a challenge to keep track of all the activities of people around the building as it is all done manually and it doesn’t provide appropriate security level to the building. The building system are facing high risk because they are dealing with crucial data of people who stay in the building, data that they deal with are as personal information, birth date, house address, office address, tenant id and etc. As all of this are recorded manually it can be easily lost and also misplaced. Besides that, the security executive have to manually take rounds to ensure there are no crimes happening in the building which is also increasing the labour force in a building. Creating a new developed system into to replace the old existing system for most of the security firms will be a challenge because it will be hard to adopt the new developed system as the users might face a little bit of a complication since they are too used to the old manual system and also because the new system is developed using different platform and techniques. Besides that, it can be stated that most of the building are still under a system with poor security implementation. The building security management staff are concerned in increasing effort in tracking the records of the people in the building and monitoring their activities. Since there are many types of building out there, the developer here will be focusing on developing a new system for residential building to protect the tenants from crimes and unauthorized access into the residential building. The new system which is proposed will be developed using the fingerprint recognition which will be implemented into the residential building security system.
DINESH PRABAKAR|TP025822 P a g e 5 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
1.2. Problem Context Residential buildings are usually exposed to all kind of security threats such as crime, vandalism, robbery and also disturbance. Residential buildings security system crimes can be categorized into various threats such as unauthorized access (intruders), forgery (acting to be someone else), and breaking in. Crimes such as theft, and burglary happens in the car parks, corridor or even the lift. Besides that, vandalism is also a regular issue that happens in a building. Tenants who are outstation or vacation might be affected by robbery or theft as it makes the work of a thief or robber easier to break into tenant’s respective units to steal valuables. Normally situation like this happens because the units of tenants who are outstation are not monitored and isolated. Units like this are the main target of the robbers and thief’s. People who are involved in vandalism normally damages the property around the building, smashing car in the car parks, or even graffiti drawing in the walls of the building and also they also can do damage to the property. Besides crimes like this, personal offense is also an important crime that should be included because it causes a lot of problem to individuals. Example of personal offense can be elevator assault, car park assault, raping and many more. Besides that, unsecured residential building can lead to drug dealing and also people can take bad decision to suicide in the building which we have to be concerned about. Visitor access are also one of the unauthorized access that should be taken under consideration because people might just sneak in as visitor and create nuisance in a building. This is because normally thieves or robbers get access into a building by transforming as contractors, visitors or even sales person. This also may cause by the fact where the visitors are not monitored by the security staff which allows them to sneak into the building easily. This people normally gets into the building more than one time so the guards wouldn’t suspect them and also for the thieves to sharpen their plan on stealing or robbing people. Besides that, emergency cases are also one of the problem occurs in a building, even this sounds normal but It has to be taken into consideration. Risks that people might face have to be taken into consideration to make sure the surrounding of the building is always safe and sound. Human caused problems and also natural disasters are the emergency case that normally occurs. Humans caused problems consist of explosion of gas, water leaking, and DINESH PRABAKAR|TP025822 P a g e 6 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
short circuit are problems caused by the carelessness of people. Besides that, natural disaster is such as, earthquake, landslide, floods and many more which can’t be avoided by human force. This kind of problems may cause loss to the building and even natural disaster can collapse the building itself.
1.3. Rationale Attempting to solve the problems which are faced by buildings, the developer has decided to develop a web-based residential building security system, where this system allows the security staff related task to be reduced. The new web-based system is more recommended method to solve the issues faced by the manual system as the new system is offering more competitive advantage. All the data related to the building such as the tenants list, security staff list, and the visitors who are in the building are stored in the database and kept secured, always updated and backed up. The data is centralized in the residential building security system and accessible over the web from anytime. Besides that, as mentioned earlier the manual building security system could not handle the visitor access in the building, as the security force are only writing down the information of the visitors and the visitors are free to do whatever they one in the building which might lead to serious crimes. This residential building security system is capable of handling extensive amount of visitors and also recording full profile of them into the system and monitoring their movement in the building. On the other hand, problems which is faced by the manual system is the human error. As everybody is aware when the error comes to the management side in the building, the tenants won’t be easily forgiving the human error made by the security staff or the management because the error which is caused by them threatens the safety of the tenants in the building. As everybody is aware the manual recorded data may expose to human technical error such as misplacing the data, or missing data and etc. Based on the problems listed above the residential building security system is developed to perform actions which assist the staff to ensure the security of the building is tighten. The biometric authentication is the main technology which is implemented in the system in order to ensure that it would not be an easy job for people to break into the building. The security team will be able to tighten the security which the implemented technology and also saving DINESH PRABAKAR|TP025822 P a g e 7 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
the man power in the building. The system will take responsibility on most of the manual workload with computerized system so the security team has more energy to concentrate and focus on the monitoring and other jobs 1.4 Potential Benefits 1.4.1 Tangible Benefits
Greener Environment The usage of paper will be reduced as most of the manual recordings and paperwork will be done by the system itself. Records are stored in the system’s database which doesn’t needed to be printed which reduces the paper usage in the building.
Security Staff’s burden reduced The residential building system allows the staffs to monitor the in and out logs of the people who are in the building using the system and without having to patrol around to ensure the security of the building.
Reduces cost on workmen force The residential building security system assist in most of the monitoring around the building. This system assists the management in saving their money and effort, this is because with this system there is no need to hire more security staff to patrol the building.
Reduce allocated space for security staffs This system also helps the management in saving up space as they can reduce the allocation of spaces for the security staffs who are brought from abroad to guard the building.
Visitor time saving This system also reduces the visitor registration time, as visitors do not have to manually fill-up their data, and it is all converted into a computerized system which converts their Identification card entry into the system.
DINESH PRABAKAR|TP025822 P a g e 8 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
1.4.2 Intangible benefits
Guaranteeing security The residents will be guaranteed with more security as they will be under the protection of the system, where not everyone can simply get access into the system. Only registered authorized personnel can get access to the system.
Protecting Privacy Users privacy will be protected where their details in the database will be encrypted, where it would not be possible for any hacker or crackers to obtain the information of the users in the system.
Reducing Crime around the Building The residential building system assist in monitoring the movement of each and everybody in the building, which helps the security staff to track down the criminal
easily if there is any happening around the building. Controlled Visitor Access The visitor access in the building is controlled as each and every visitor are granted start date and time with expiry date and time where visitors are monitored in the building in where some case there are some criminals who acts to be visitors to commit crime around the building can be overcome.
1.5. Target Users The computerized residential building security system is targeted mainly to the security firms to provide security to the residential building which is still running under the old manual system. Therefore, this system is mainly targeted to the residential building security management. There will be users as, tenants, security staff, and, system admin in the residential building security system. This system is focused on securing, protecting, reducing crimes, and also providing easy access to the people who lives inside the building. As this system will help the security to monitor the movements around the building easily and also helps in keeping safe the private information of the people who are staying in the building. By implementing this system to the building there is no need to be afraid of intruders and crimes around the building. Target Users Administrator
Roles Add, Delete, Modify users into the system
DINESH PRABAKAR|TP025822 P a g e 9 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Security Staffs
Assign task to security staffs Access logs of system user in order to monitor
movement in the system Has full access to the system
Can register visitors into the system Monitors the user logs, and also last seen of the user
around the building Holiday management access is granted, where staff can register users who are out on holidays and monitor their
Tenants
Visitor
unit in the building. Monitors the visitor’s expiry date and time Update or modify personal information Check of last access into their home Register visitors in the system with an expiry date and
time Register themselves if they are out on a holiday to ensure
that their unit is monitored by the security staffs. Consists of contractors, home visitors and etc Can only be registered by the tenants or security staff
only Each visitor is assigned an expiry date and time to ensure
the security of the building. Visitor’s full profile information from the identification card is extracted into the system for security purposes.
1.6. Scope and Objectives 1.6.1 Aim To develop a building security system for building which monitors the movement and activities around the building and also prohibiting access to unauthorized personnel. The major aim is to provide security and protection towards the building and tenants. DINESH PRABAKAR|TP025822 P a g e 10 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
1.6.2 Objectives •
To provide enhanced security to people in the building
•
To protect the building from security breach such as unauthorized access
•
To implement bio-metric device (fingerprint)
•
To develop a user-friendly system for all type of users
•
To reduce labour force in relation of security of the building
1.6.3 Deliverables The residential building security system is developed to design and develop a registration portal and integrate the web portal with biometric device. Besides that, this system defines user class and their level of access to the building. This system protects the confidentiality, integrity and availability of the people in the building. This system is developed for to
DINESH PRABAKAR|TP025822 P a g e 11 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
enhance the security level of the current system. The building security system will provide features as below:
Biometric authentication implementation (fingerprint) – Authorized tenants, security staff, administrator registered are able to access the building through their registered fingerprint.
Visitor management system – Tenants and security are able to register visitor into the system with an expiry date and time with their full information extracted from the identity card. Besides that, camera will be used to capture their face for security purposes.
Holiday management system- Each user can register themselves if they are leaving the building for outstation. Users can register the date they are leaving and when they will be back in order for the security staffs to keep an eye on their unit.
Monitoring movement of users- Each and every user who are logged into the system can be monitored using their logs, what time their accessed last to ensure that security staff knows exactly what time is the user in and out. If time allows, the developer will add the features below to the system,
CCTV - 24 hours fully functioning CCTV to monitor every corner of the building surroundings including car park, lifts, and so on.
Extension Phone – Each unit is allocated with extensions which helps tenants in specially for requesting help urgently. Once it is lifted, it directly connects to the security room whereby the user is not required to dial any number.
Register Access Card (RFID) – Only residents, security staff are able to use the lift in the building through their registered access card.
1.6.4 Nature of Challenge The challenges during the development phase of this residential building security system is to replace the manual system and how widely will this computerized system will be accepted by all to replace the current manual system. Besides that, implementing the biometric device will DINESH PRABAKAR|TP025822 P a g e 12 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
be another major challenge as it has to be properly researched before programming it into the system. It will take some time to be familiar with the fingerprint devices and to be programmed as needed. Choosing the suitable platform for this system would be another challenge faced because it is hard to decide between the C# and ASP.net. Implementing this system into a full-functioning building security system would be a challenge since the developer is a security student therefore programming will take most of the time in developing the system. Creating a web-based pages for the security logs will also be a challenge faced by the developer since the system contains many component, implementing everything properly in order and in time will be a challenging issue. Besides implementation of the SQL plays a major role to the system, where the developers should research and implement a way to make a connection between the platform used and SQL to store the database. Besides that, the acceptance of the system is also a major challenge faced by the developer since people too used to the current manual system. Security is the main criteria focused on this system where a high level security is implemented into this system by using the biometric fingerprint recognition method to secure the building from threats.
DINESH PRABAKAR|TP025822 P a g e 13 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
1.5. Project Overview and Plan The development and system takes time to achieve its main goal to fulfill the whole building security system in complete. Implementation of the biometric fingerprint authorization into the system for the security enhancement will increase the security level of the building. This is to protect the privacy and also the safety of people who are in the building. By implementing biometric fingerprint authorization, security executive can prohibit access to the unauthorized user personnel into the building. Besides the security features in the system, features that are available to be used in the system will be helpful to the security who are always securing the building. Project Plan Task ID
Task name
Start date
End date
Chapter1:
INTRODUCTION
15th Nov 15
26th Nov 15
1.1
Project Background
16th Nov 15
16th Nov 15
1.2
Problem Context
17th Nov 15
17th Nov 15
1.3
Rationale
17th Nov 15
17th Nov 15
1.4
Potential Benefits
18th Nov 15
18th Nov 15
1.4.1
Tangible Benefits
18th Nov 15
18th Nov 15
1.4.2
Intangible Benefits
19th Nov 15
19th Nov 15
1.5
Target Users
20th Nov 15
20th Nov 15
1.6
Scope and Objectives
21th Nov 15
21th Nov 15
1.6.1
Aims
22th Nov 15
22th Nov 15
1.6.2
Objectives
23th Nov 15
23th Nov 15
1.6.3
Deliverables -
24th Nov 15
24th Nov 15
1.6.4
proposed system Nature of Challenge
25th Nov 15
25th Nov 15
1.7
Overview of this Report
26th Nov 15
26th Nov 15
Functionality
of
the
& Project plan
DINESH PRABAKAR|TP025822 P a g e 14 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Chapter 2:
LITERATURE REVIEW
27th Nov 15
DINESH PRABAKAR|TP025822 P a g e 15 | 119
27th Dec 15
RESIDENTIAL BUILDING SECURITY SYSTEM
2.1
Introduction
27th Nov 15
28th Nov 15
2.2
Domain research
29th Nov 15
8th Dec 15
2.3
Technical research
9th Dec 15
19th Dec 15
2.3.1
Similar System
20th Dec 15
24th Dec 15
2.3.2
Architecture
25th Dec 15
26nd Dec 15
2.4
Conclusion
27th Dec 15
27th Dec 15
Chapter 3:
Development
28th Dec 15
9th Jan 16
3.1
Methodology System Methodology
28th Dec 15
31th Dec 15
3.2
Chosen Justification of Selected
1st Jan 16
4th Jan 16
3.3
Methodology Implementation
5th Jan 16
9th Jan 16
Chapter 4:
Primary Research
9th Jan 16
21 Jan 16
4.1
Introduction
9rd Jan 16
11th Jan 16
4.2
Design
12th Feb 16
21th Feb 16
Chapter 5:
Requirement Validation
11th May 16
30th May 16
5.1.1
Analysis of Data Collected 12th May
22nd May 16
5.1.2
Through Questionnaire Analysis of Data Collected 23rd May 16
30th May 16
Chapter 6:
Through Interview System Architecture
22th Feb 16
25th Feb 16
6.1
Introduction
22th Feb 16
23th Feb 16
6.2
Abstract Architecture
24th Feb 16
24th Feb 16
6.2.1
System Design
25th Jan 16
25th Jan 16
6.2.1.1
Use Case Diagram
26th Feb 16
27th Feb 16
6.2.1.2
Use Case Diagram
7th Mar 16
9th Mar 16
6.2.1.4
Specification Activity Diagram
10th Mar 16
13th Mar 16
6.2.1.5
Sequence Diagram
10th Mar 16
13th Mar 16
6.2.2
Database Design
13th Mar 16
16th Mar 16
6.2.2.1
Entity Relationship
13th Mar 16
16th Mar 16
Diagram DINESH PRABAKAR|TP025822 P a g e 16 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
6.2.1.3
Class Diagram
10th Mar 16
13th Mar 16
6.2.2.2
Database Table Structure
13th Mar 16
16th Mar 16
6.2.3
Interface Design
17th Mar 16
19th Mar 16
6.3
Development/Deployment 19th Mar 16
19th Mar 16
6.3.1
Programming Language
19th Mar 16
19th Mar 16
6.3.2
Chosen IDE Chosen
19th Mar 16
19th Mar 16
6.3.3
Database Management
20th Mar 16
20th Mar 16
6.3.4
System Chosen Operating System Chosen
20th Mar 16
20th Mar 16
Chapter 7:
Project Plan
21st Mar 16
21th Mar 16
7.1
Release Plan
21st Mar 16
21st Mar 16
7.2
Test Plan
22nd Mar 16
23rd Mar 16
Chapter 8:
System Implementation
1st June 16
11th July 16
8.1.1
Homepage/Login
1st June 16
3rd June 16
8.1.2
Admin Panel
3rd June 16
5th June 16
8.1.3
Security Staff Dashboard
5th June 16
7th June 16
8.1.4
Tenants Panel
7th June 16
11th June 16
8.1.5
Visitor Entry Form
12th June 16
15th June 16
8.1.6
Visitor Report
17th June 16
20th June 16
8.1.7
User Attendance Logs
21st June 16
23rd June 16
8.1.8
Holiday Management
24th June 16
27th June 16
8.1.9
Holiday Report
30th June 16
3rd July 16
8.2
Sample Codes
3rd July
11th July 16
8.2.1
Sample Codes for Sign-Up 3rd July 16
7th July 16
8.2.2
feature Sample Codes for Log-in 7th July 16
9th July 16
8.2.3
feature Sample codes for
9th July 16
11th July 16
Chapter 9:
extracting user logs System Validation
12th July 16
15th July 16
DINESH PRABAKAR|TP025822 P a g e 17 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
9.1.1
Login into the system
12th July 16
12th July 16
9.1.2 9.1.3
Visitor Management Fingerprint Access
13th July 16 13th July 16
13th July 16 13th July 16
9.1.4
Holiday Management
13th July 16
13th July 16
9.1.5
Monitoring Records
14th July 16
14th July 16
9.2
User Acceptance Test
14th July 16
15th July 16
Chapter 10:
Conclusion and
15th July 16
16th July 16
Reflections 10.1
Critical Evaluation
15th July 16
17th July 16
10.2
System Benefits
15th July 16
15th July 16
10.3
Conclusion and
15th July 16
15th July 16
10.4
Recommendation Limitations and Future
16th July 16
17th July 16
10.5
Enhancement Conclusion
16th July 16
17th July 16
Chapter 2: Literature Review 2.1 Literature Review A literature review surveys books, articles, journals and also various sources relevant to a specific issue, research area or even theory. This method provides the proper description, summary and also critical evaluation on the area of the problem which is being investigated. The literature review produces and overview of sources that developer have explored in
DINESH PRABAKAR|TP025822 P a g e 18 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
investigating a specific topic and also proofs how the research fits within a larger field of study (California, 2016). Literature is very crucial in a project because it helps the developer to breakdown the summary of the area of research and determining the strength and weakness in the previous similar project which was done by different developers. Basically the literature review helps developers in their own project by eliminating the weakness which can be known by the mistakes done by the previous developers, and bringing in more strength to the project which is being developed (Anon., 2014). Besides that, the literature review also assists the developer as such:
Plan each work in the context of its contribution to the end-users and understand the
problem which is being studied precisely Provides description of the relationship of each work to the others under consideration Determines new ways to interpret earlier research Overcomes the issues which was discovered in the previous studies Located developers research within the context of the existing literature (California, 2016)
There will be two section will be focused on this are which are the domain research and also technical research. Domain research explains about the language which will be picked by the developer to develop the building security system. Technical research explains about the similar system which is already out and it’s compared to the system which is being developed by the developer.
2.2 Domain Research In today’s world as everybody is concern security and safety towards a building is very crucial. Building security is not just about installing the latest electronic device and software bundle. Nor is it just a thought for building types with exceptionally particular occupancy considerations. Progressively, buildings of all sorts are possibilities for the sort of careful security planning that proceeds hand-in-hand with the architectural design process. Guaranteeing an appropriate and cost-effective level of security, architects need to familiarize DINESH PRABAKAR|TP025822 P a g e 19 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
themselves with the range of security factors that influence the design (DeGrazio, 2016). The developer hereby would like to conclude that, each and every plan that to be taken in the development of this project have to be precise and properly planned for a crucially secured security system. In general, one question which always pops up on people’s mind is what is a security system in a building designed to protect? The answer for this question is obviously the duty of the security is to protect the people who utilizes the building. Apart from that, actually the security considerations are far from just securing the people in the building. The security system supposed to be concern who and who may not enter a building, monitoring the controlling the specific people permitted access to specific areas within the building. Level of access control may vary for different reason depending on building types (DeGrazio, 2016). Besides that, sometime the most reliable organizations are also not secured, where two security researches recently found that they could easily hack the building management system for the corporate giant’s wharf 7 office overlooking the water in the Pyrmont section of Sydney, Australia (Zetter, 2013). The Google Australia’s building management system is built on the Tridium Niagara AX Platform, these platforms have shown serious vulnerabilities. The patch for this system have been released by the Tridium but te Google’s control system could not be patched where the researchers could still obtain the administrative password for it (Zetter, 2013). This articles states that not every building security is safe and there are still many buildings that are exposed to threat as such. The developer would like to conclude that every building has its weakness and vulnerabilities exposed, and have to ensure that the project which is being developed by the developer have to be aware about vulnerabilities like this. Moreover, referring to building’s security in Malaysia it is clearly explained that there are no proper security service in high-rise residential complexes in Malaysia. A survey shows that 78.1% of the high-rise residential building in Penang are provided with security guards (Ta, 2004). The number of guards assigned to the building ranges from one to 14 personnel. Certain buildings are accommodated with multiple layer of security which includes the guardhouse, automated gates, CCTV and perimeter fencing (Ta, 2004). Equipped with various security features but the level of security in these buildings are still highly questionable as the number of crime occurrence is still quite high. Depending on the DINESH PRABAKAR|TP025822 P a g e 20 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
studies that have been done in Penang, a percentage of 85.2% of the buildings have the issues of crime occurrence around and in their premises (Ta, 2004). This states that the various security measures which have been implemented are still weak and inefficient (Ta, 2004). Normally the security services in Malaysian residential complexes are normally outsourced from private companies and a very few residential complexes management provide their own security (Ta, 2004). Most of the security guards hired are foreigners and the guards normally appear with no proper training on mitigating the threat occurs. Besides that, most of the hired security guards are old retirees, according to the security firms it is very hard to get young people to join the security force. Besides that, due to the increasing demand for security guards the building management tend to fulfil the manpower in security, here the advantage is played by the security firm to hire anyone as the security guard to fulfil the manpower regardless of the background and qualification of the person hired (Ta, 2004). Besides that, according to Telekom Malaysia Payphones (Putrajaya and Petaling Jaya), vandalism against the Telekom’s payphones is high even in strictly guarded buildings. Below shows the table of faulty payphones due to vandalisms in buildings in Selangor.
Location Abadi
No. Of Payphones Indah 12
No. Of Faults* 2
Revenue (RM)** 145
2
145
Condominium University Tower 2 Country Heights 6 Subang Perdana 21
Once in two months 1 15
130 155 260
Flats Sri Selangor
Once in two months
135
26
250
Condominium Mont’Kiara
9
Golf 2
Club SS15 Subang Jaya
85
Note *Average per month
DINESH PRABAKAR|TP025822 P a g e 21 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
**Average revenue per month per unit Source: Telekom Malaysia Payphones Putrajaya ( (Ta, 2004)) Besides that, when it comes to buildings, the security continues to be the most questionable to the residents. A number of property management companies complains that the resident doesn’t want to agree over the security cost, where the cost actually leads to dispute board members, unit owners and tenants does not want to pay extra money for the security guards, software systems and the CCTV operations (ICC, 2015). High-rise buildings are known for higher crime rates, including drugs, theft and burglary. How could this take place? According to a professor from the University of Victoria Robert Grifford, crime and the fear of crime increases with the height of a building (ICC, 2015). This statement given by him is supported by few reasons such as, management cannot afford enough security, strangers are able to roam around the building freely, visibility around the high rise building are lower compared to other building (ICC, 2015). Besides that, security experts also explained that luxurious high-rise buildings are going to invite high-end burglars (ICC, 2015).
Biometric Authentication (Fingerprint Scanner) Biometrics are automated techniques for perceiving a person based on a physiological or behavioral trademark. Among the components measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric information are isolated and distinct from individual data. Biometric formats cannot be figured out to reproduce individual data and they can't be stolen and used to get to individual data (Clocking, 2016). Utilizing an exceptional, physical characteristic of the client’s body, for example, their unique mark or iris, to easily recognize and confirm that they are who they claim to be, is the best and simplest arrangement in the business sector today. That is the basic truth and force of Biometrics Technology today. In spite of the fact that biometric innovation has been around for a long time, cutting edge progresses in this developing innovation, combined with huge DINESH PRABAKAR|TP025822 P a g e 22 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
diminishments in cost, now make biometrics promptly accessible and moderate to buyers, little entrepreneur, bigger organizations and open area offices alike (Clocking, 2016). A fingerprint scanner system has two basic tasks, where it needs to get an image of your finger, and it needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images (Clocking, 2016). The unique thing about the fingerprint is where only specific characteristics are filtered and saved as encrypted bio metric key (Clocking, 2016). Actually the image of the fingerprint which has been scanned would not be saved but it will be saved as a series of numbers which will be used for verification. The numbers cannot be reconverted into image hence, it makes it harder for intruders to duplicate it.
Figure 1 shows the overview of finger print system Image source: (Clocking, 2016)
Advantages of Fingerprint System Actually in an electronic time clock system such as the biometric authentication, RFID and also the verification system it’s actually divided into three parts as such:
What users have What users know What users are
By utilizing the “what users have system” the users need some sort of identity such as the identity card with a magnetic strip to get pass the system. A “what users know” system is where users have to enter their password to get through the system and finally a “what users are” system is where the system looks for a physical evidence that who are the users to get through the system (Clocking, 2016). DINESH PRABAKAR|TP025822 P a g e 23 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
“What users are” system is the system that the fingerprint authentication utilizes and have loads of advantages over the system such as below:
Fingerprints are almost impossible to fake compared to other methods such as identity
card and password. Fingerprint pattern cannot be guesses compared to password Fingerprint cannot be misplaced compared to access card Fingerprint cannot be forgotten compared to password.
2.3 Technical Research
Figure 2 shows an overview of Building Security System Image Source: (Strategies, 2014) DINESH PRABAKAR|TP025822 P a g e 24 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
The above image of building security system provided by Integrated Building System is dedicated within the best price of regular and modernized surveillance systems along its installation. The integrated building security system instated and actively works to install into the right security system as per the budget constraints and customized security needs (Strategies, 2014). This is one system which is chosen by the developer for the comparison purpose. The system above provides more security towards the energy saving and also natural disaster such as the lightning. This system cost more in the implementation of the devices but it is not exactly secured from problem such as, threat, robberies and breakthrough. This is because the system above does not provide any authentication access, security features that will provide safety towards the tenants and also surroundings. Besides that, the system above is time consuming since there are too many devices that are needed to be installed in-order to provide safety which is just inner safety and the outside surrounding of the building is vulnerable and exposed. The developer has decided to provide a well secure user authentication in such a way that biometric authentication implementation into the system. As to know recently biometric authentication is becoming more popular as it relies on a physical unique to the person trying to authenticate. The biometric authentication that has been decided by the developer to implement is the fingerprint recognition.
DINESH PRABAKAR|TP025822 P a g e 25 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Figure 3 shows Vertex Security and Technology solutions Image source: (Technology, 2016) The above system is from the Vertex Security and Technology solutions for building security system (Technology, 2016). This system is compared by developer to ensure that the system that will be developed will be enhanced in security features and also the safety of building. As shown above the security system provided by the Vertex security are as card reader, electric door strike, and keypad door lock. All this locks are not easily breakable but still if its broken it cost a lot and besides that, sometimes human error such as forgetting the access card, forgetting the pin and etc are the issues that might be faced by Vertex security. Besides that, the access card nowadays can be easily faked using the magnetic strip encoder where it steals the information in the original access card and places it in the fake ones where it will work exactly like the original card (CaptainWow, 2015). Each and every weakness which is found in the system will be used as an information to create a very safe system in the future with enhanced features and guaranteeing satisfaction to the people who are connected to the building.
DINESH PRABAKAR|TP025822 P a g e 26 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Figure 4 shows INETSOFT Systems Image source: (PVT., 2015) The above system is from INETSOFT Systems. The weakness of the system is the access card, and badging. This is because as spoke on earlier cases the access card and the badging can be easily faked and the robbers or intruders can easily gain to access to the building and this might lead to stealing of data information and also expensive assets. This system also makes the developer more interested on the elevator control and mobile alerts which is a very good security features which will improve the security quality of the building security system which is being created by the developer. Implementing the mobile alerts and the elevator control will be implemented by the developer if the time allows.
DINESH PRABAKAR|TP025822 P a g e 27 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Architecture
Figure 5 shows the building security system architecture
Building security system architecture The building security system which have been proposed will be peer to peer based architecture. Peer-to-peer architecture is a regularly utilized PC organizing engineering as a part of which every workstation, or hub, has the same abilities and obligations. It is regularly compared to the exemplary client/server design, in which a few computers are committed to serving others.
DINESH PRABAKAR|TP025822 P a g e 28 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Conclusion After completing the similar system comparison to the proposed system, the developer has learnt that certain security issues can cause a high level of danger and decided to implement some security features towards the proposed system to protect the safety of the people and building. The security implementation which will be implemented in the proposed by the developer will be the biometric authentication which is the fingerprint scanner. The fingerprint scanner employs the use the biological data in the form of signature scans. Finally, this project is to assist in increasing the security level and the privacy of residents around the building. Normally the security management would not be concerned on how safe is the security around the building until incidents like robbery or theft happens, by implementing security features is like taking precautions before incidents occur.
DINESH PRABAKAR|TP025822 P a g e 29 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Chapter 3: The Chosen Methodology The system development methodology in the information technology is the framework that is utilized to plan, structure and control the process of developing a specific system (Portal, 2016). Methodology can be explained as principles or rule which proceeds with specific methods or procedures that may be derived to overcome different issues within the scope of a particular set of rules. Methodology is not an algorithm, where it is not a set of formula but set of practices (Dictionary, 2013). There are many types of methodologies such as the Rapid application development, Spiral and etc. The discussed methodology for the building security system is the Structured System Analysis and Design Method (SSADM) and RUP Methodology. The SSADM is basically a set of standards which was developed long time ago during the 1980's which was widely utilized by the government computing projects in the United Kingdom. The SSADM uses the mixture of text and diagrams throughout the entire life cycle of a system design (Beal, 2016).
DINESH PRABAKAR|TP025822 P a g e 30 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
3.1. SSADM
Title
SSADM
Involvement
Clients are involved for presentation
Person in charge
System analyst decide the overall design of the system
Interaction with users
Ideas are to be presented to user from stage to stage
Project types
Large and long term projects
Disadvantages
Time and cost consuming, require very detailed steps
DINESH PRABAKAR|TP025822 P a g e 31 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
3.1.1.
Justification of the selection
SSADM is discussed by the developer is because this methodology is a traditional methodology which comes with detailed documents and also guidelines which should be taken in order to achieve the aim of the project. Besides that, using SSADM also gives importance to the end users, because it puts the priority on ensuring the system is user friendly so that the users with or without the knowledge of computing will be able to utilize the system. The building security system is a long term project where if the system is implemented in the building it will remain as the security of the building for the next few years where this is also one of the reason the SSADM is discussed. This is because the SSADM is most suitable for long term project. On the other hand, SSADM also contains its disadvantages where it takes a great deal of time. When the project take so much of time to be completed it might bring the risk of not completing the project on time. There is a large delay between the inception of the project and the delivery of the system (Cohen, 2016). By utilizing SSADM in this project the steps required are very detailed and specific and usually determined by expert or professional to ensure that the righteous way are taken in the target of achieving the objective of the building security system. Questionnaires and interview will be conducted to the security management of the building to ensure that their ideas and answers are the main key to develop the building security system. Describing the system development technology One of the main features of SSADM is the crucial user involvement in the requirement analysis stage. Here, the users are made to complete stage by stage as they are sure that the requirements have been met. SSADM breaks up a development project into stages where the
DINESH PRABAKAR|TP025822 P a g e 32 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
project will be done step by step. The techniques used in SSADM are logical data modelling, data flow modelling and entity behaviour modelling.
Logical data modelling
Involves
the
process
of
identifying,
modelling and documenting data as a part of system requirements gathering. The data are classified Data Flow modelling
further
into
entities
and
relationships. Involves tracking the data flow in an information system. It clearly analyses the processes, data stores, external entities and
Entity behaviour modelling
data movement. Involves identifying and documenting the events influencing each entity and the sequence in which these events happen.
DINESH PRABAKAR|TP025822 P a g e 33 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
3.1.2. Overview of the diagram associated with SSADM
Figure 6 shows the stages of SSADM Image source: (mmu.ac.uk, 2014)
3.1.3.
Overview on how the proposed system will proceed
According to the image above the SSADM goes through 7 stages (0-6) where the developer will be relating on what will be done in each stage in developing the proposed system. Stage 0- Feasibility study In this stage of the methodology the developer has to design the planning on the areas of the project. Here in this stage the developer choses the programming language which will be used, the software’s and also hardware’s which suits the project. Besides that, the financial analysis before the kick off the project have to be considered by the developer to ensure that it’s within budget to develop the system. The system which is being developed have to suit in DINESH PRABAKAR|TP025822 P a g e 34 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
today’s practice as in the system which is being developed by the developer should be compatible. Finally, in this stage the developer has to analyse whether the impact of the new system will be widely acceptable by people Stage 1- Investigate current system In this stage the developer should fully study the current security system. Here the developer should use the information gathering method to collect data to ensure the problems that the people facing can be solved in the proposed system. The developer uses the interview and questionnaire method to collect the information from the people. Besides that, developer can also conduct research on type of security which is being offered in large firms which can be implemented in the propose system. Stage 2- Business system options The design of the overall proposed system will be decided by the developer. The developer has to develop a set of business system option referring to the previous stage. The design might be modification to current system or even a total new system to be implemented. In this stage the developer should brainstorm for ideas to turn the system into a wonderful system. Things that the developer should take into consideration at this stage is the new system’s impact, cost, limitations and etc. Stage 3- Requirements Definition This is one of the problematic stage in the SSADM. In this stage the developer should develop a full functioning logical specification of what the developed proposed system will do. Here there are many diagrams are put to use to produce the logical requirement, the diagrams that is done are the data flow diagrams (DFDs) and logical data model (LDM). In this stage the complete document of the updated requirements, user roles and function definitions are finalized. Stage 4- Technical System Option This stage is focused more towards the physical implementation of the proposed system. A variety of options for the implementation of the new security are created. The developer here chooses the hardware architectures for the system, software which is needed, the implementation cost, and security expert’s review. Besides that the developer should consider the physical of space where how much space the system occupies. DINESH PRABAKAR|TP025822 P a g e 35 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Stage 5- Logical design This stage emphasis on the human command interface (HCI). This stage particularly determines the primary procedures of interaction in term of the graphical user interface which will guarantee the ease of use of the end-users. This stage consists of the data required, logical process model and logical data structure. Stage 6 – Physical design This stage is where the real system is created. Specifications of the security system is converted to real hardware and software. This stage is very mandatory where a simple overview design of the proposed system is required to be presented. The logical data here is refurbished on term of database structures and the exact structure of the functions and their execution is determined. The physical data structure is enhancing to meet the performance requirements.
DINESH PRABAKAR|TP025822 P a g e 36 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
3.2. RUP methodology
3.2.1.
Overview of the diagram associated
Figure 7 shows the RUP Phase Model Image Source (mindcrafts, 2009)
The RUP when compared to SSADM, it emphasises on accurate documentation more than SSADM. The project will be divided into 4 phases according to the RUP model. The stages are as shown in the image above which are Inception, Elaboration, Construction and Transition. Hereby, the time take for the development is lessen due to the re-usability of the components (Pirzada, 2009).
DINESH PRABAKAR|TP025822 P a g e 37 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
3.2.2.
Phases of RUP
Inception In this stage the developer has to consider the project before the start whether it is worth it or not. Developer have to formulate the scope of the project and confirms what are the resources needed in order to complete the project.
Elaboration In this stage the architectural element is defined. Here the developer have to create logical design with the Unified Modelling Language (UML) diagrams which are the use-case diagrams, entity relationship diagram (ERD), class diagram and other diagrams which are relate to the building security system. Besides diagrams, the data mining method such as the interview and questionnaire is used to gather the requirement of the system.
Construction In this phase the development of the project is completed, where the developer should complete codes and the design. Besides that, in this stage the developer has to test the system to ensure the goals of the system from the inception phase are met.
Transition This is the final phase of the RUP where the project has to be delivered to the end-users where the developer will hand over the system to the security management staff to test the system’s function and to evaluate their feedbacks. Concluding that, RUP methodology provides all the structure that is needed to guide the developer through the phases in order to complete the project successfully. Besides that, RUP also helps the system to be accurate and effective and also helps the developer to complete the project on time and budget.
DINESH PRABAKAR|TP025822 P a g e 38 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Besides SSADM that was discussed above, the Rational Unified Process (RUP) model will also be implemented in the system. The RUP is chosen after in depth research, and why it is chosen is simply because it provides a better solution in the implementation of the system. The RUP is the best practice in the modern software development and suits a variety range of projects (UCAR, 2016). Upon careful research, the developer has insisted to choose RUP Methodology due to several efficient purposes. RUP is known to be an ideal methodology when it comes to the stage of development and implementation based on the findings above. Work Breakdown Of The Project Using RUP
DINESH PRABAKAR|TP025822 P a g e 39 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Chapter 4: Primary Research 4.1. Introduction In this chapter as discussed earlier the developer is firm with the decisions in utilizing the interview and also the questionnaire method. 4.1.1. Questionnaire Questionnaire is a data mining method which consists of a series of questions which works in-order to gather information from the respondents. The questionnaire is designed to extract particular information where it serves the four purposes (BusinessDictionary, 2016).
Collection of appropriate data Data comparable to analysis Minimize Bias in formulation and asking question Make questions engaging and varied.
Advantages of Questionnaire (llibweb, 2016) Huge amount of information can be collected from the specific amount of people in short period of time Can be completed by the analyst or by any number of individuals with restricted effect to its validity and reliability After effects of the questionnaires can as a rule be rapidly and effortlessly measured by the developer easily using tools Can be analysed more 'scientifically' and objectively than other forms of research At the point when information has been evaluated, it can be utilized to thoroughly analyse other research and might be utilized to quantify change Disadvantages of questionnaires (llibweb, 2016)
Lacks of validation Cannot guarantee that the respondent is being truthful Cannot guarantee how much of thought the respondent have put in Respondent might just simply answer it and do not take it seriously
Expected finding DINESH PRABAKAR|TP025822 P a g e 40 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Questionnaire will be distributed to all type of people who are aware of the importance of building security. Questionnaire will be focusing on people from various age, gender, and occupations to ensure that opinions are not only collected from selected people, but it is collected from people from all field. The inquiry will be made utilizing 'Google Forms' which is a automated tool that empowers programmed information classification in view of the response of the survey. The distribution of questionnaire will be done online whereby the link will be shared and made open on social networks. This diminishes paper cost and genuinely helpful for both the specialist and respondents. Questionnaire design Questions 1. Gender
Objectives To make sure whether the participants are
male or female. 2. Age To know the age of the participants. 3. What type of building you are To gain information on what type of living at? building the participants are living in. 4. How important is security in To know the importance of security in the residential building? residential building. 5. In a scale 1-5 how important do To know how important is it to implement you think it is to have a proper a proper security system in the residential security system? building. 6. In a scale of 1-5 how useful will To ensure the importance of the proposed the proposed system will be to system
in
overcoming
the
security
overcome security breaching by breaching by intruders. unauthorized personnel? 7. On a scale of 1-5, how useful will To ensure how important the system will it be for the tenants, security staff be towards the users in the residential and administrator staff if the building. proposed
system
residential
security system is developed? 8. On a scale of 1-5, how would you To make sure how happy are the like to rate the expectations of the participants on the functionalities of the proposed system in the terms of proposed system. functionalities and reliability? 9. By implementing proposed To know the perception of the participants security system, do you think that on how secured they think they building DINESH PRABAKAR|TP025822 P a g e 41 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
the surrounding of the building will be with the implementation of the will be secure enough? proposed system. 10. Do you think the proposed system To ensure that the system can really could reduce the money spent on reduce money spent on the labour force. the security force to guard the building? 11. Do you think is it necessary to To ensure the importance of implementing implement
the
bio-metric the fingerprint authentication to the
(fingerprint) authentication in the proposed system. residential
building
security
system?
4.1.2. Interview Interviews are used to collect data from a small group of subjects on a broad range of topics. Developer can use structured or unstructured interviews. Structured interviews are comparable to a questionnaire, with the same questions in the same order for each subject and with multiple choice answers. For unstructured interviews questions can differ per subject and can depend on answers given on previous questions, there is no fixed set of possible answers (Twente, 2016).
DINESH PRABAKAR|TP025822 P a g e 42 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Advantages of interview
Easy correction of speech Development of relationship Time saving Less Costly In depth analysis
Based on the above explanation on interview, the interview question are designed by the developer to extract information on the current system to be enhanced in the future building security system. Interview Design The following interview question is prepared by the developer to be answered by the existing system users. For example, security head, management staff, tenants who currently lives in residential apartment. Name of Interviewee:
Position:
Date of Interview:
Time from:
Location:
Mode of Interview:
Question 1
Time to:
Do you think that by implementing full operational system, the threats such as crime, vandalism and robbery can be overcome? Answer:
Objective
To investigate people’s opinion on the implementation of the full
Question 2
operational security system to replace the current system. What are the advantages that you have found by using the current building security system?
Objectives Question 3
Answer: To ensure the good features in the current system. What is the weakness that you have found by using the current building security system?
Objective
Answer: To investigate the weakness of the current system and to enhanced it in the
Question 4
proposed system. What are the possible issues that can be faced by the building management based on the disadvantages that have been mentioned above? Answer:
DINESH PRABAKAR|TP025822 P a g e 43 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Objective
To investigate the issues that are faced by the management regarding the
Question 5
disadvantage of the current system. What is most important thing to look at in order to provide the best residential building security system?
Objective
Answer: To understand what is the most important factor that leads the project to
Question 6
success so developer can develop the security system according to it. Based on the issues mentioned above, what are the precautions that will be taken in order to prevent the risk that will be faced by the building
Objective Question 7
management in future? Answer: To ensure the steps taken to prevent the threats in the current system. Have you experienced before such a situation where criminals who tend to claim themselves as a visitor to get access into the building?
Objective Question 8
Answer: To know the tenants side of opinion on facing criminals in the building What do you think about biometric authentication implementation into the system? Will it provide a secure environment?
Objective
Answer: To study people’s opinion on the implementation of the biometric
Question 9
authentication.
What will be the tools and techniques that you use for the development of the system?
Answer: Objective
Objectives: For developer to select the suitable tools and technique that
Question 10
will help to increase the efficiency and effectiveness of the project. What functionality do you expect to have in the residential building security system? Answer:
Objective
Objectives: To make sure this project carries all the basic functions required.
Chapter 5: Requirement Validation Requirement validation is an iterative procedure which happens all through the life cycle of the project. Amid elicitation, examination and detail developer should continually be DINESH PRABAKAR|TP025822 P a g e 44 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
addressing and clearing up the information given to you keeping in mind the end goal to check its legitimacy (School, 2010). One of the most crucial steps to be taken in completing a project is the data gathering, where the developer gets to collect the needs of the user, perception and also feedback towards the system which is being developed. Developer choose the questionnaire and interview method in order to collect data because it can be done under a cheaper cost and it is very responsive in collection of data.
5.1. Analysis of data
5.1.1. Analysis of data through questionnaire Question
1
: Result :
Analysis :
The figure above shows the amount of respondents who participated in the questionnaire, where it cleary states that, most the majority who submited the questionnaire are guys. The bar chart above explains that out of 34 respondents 20 of them are male and 14 of them are female. From the
DINESH PRABAKAR|TP025822 P a g e 45 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
results above the developer concludes that, the survey is participated by nearly fair amount of male and female.
Question
2
: Result :
Analysis :
According to the results above, it states that most of the respondents age’s are 20-25, which can be said as the most people who filled up the survey are the people who are aware of what is security and the importance of it. The results above shows that out of 34 respondents, 26 of them are in the age range of 20-25, 1 respondent from under 20 and 7 respondent whose age are above 25-30 and there were no respondent whose age is above 30.
Question
3
: Result :
Analysis :
The question above is to summarize the type of building respondents are staying at. This question is asked in-order to ensure that respondents are familiar with the topic they are about to answer about. As a summary from the above results it is shown that respondents from both terrace and condominium are in the same amount which is 35.3 percentage each, and
DINESH PRABAKAR|TP025822 P a g e 46 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
the others are 26.5 percentage of them from apartment and the other 2.9 percentage are from other type of residential building. This shows that people who are filling up the questionnaire are all from different types of residential building which helps the developer to gain information and feedbacks of their thought about the system which is being developed by the developer.
Question
4
: Result :
Analysis :
The above graph shows how much important is security in a residential building from the participants perception. Out of the 34 respondents 24 of them thinks that security is the main factor in a residential building by ticking the annswer very important and that occupies 70.6% of the total respondents. Besides that 9 out of the 34 respondents who thinks that security is important in the residential building, which occupies 26.5 percentage and only 1 respondent is neutral to the importance of security in
DINESH PRABAKAR|TP025822 P a g e 47 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
the residential building which occupies 2.9%. The results above explains that the respondents thinks that security is crucial in a residential building, where it motivates the developer with the importance of security in a residential building and to develop a secured system. Question
5
: Result :
Analysis :
The above results shows the importance of having a proper security system in a residential based on the mind set of the respondents. 19 out of the 34 where majority respondents thinks that its is very important for a residential building to have a proper security system which occupies 55.9% of the total number of respondent. Besides that aroun 14 respondents (41.2%) of them also thinks that its important to have a proper security system in the residential building, and only 1 of them thinks neutrally about the having a proper security system in a residential building. This question explains why a proper and secured system needed to be developed by developer because according to the respondents a proper security system is extremely important in residential building. Besides that, throught the results of this question it can be seen that respondents are demanding for a well structured and secured system in order to improve their security and privacy around the building.
Question
6
:
DINESH PRABAKAR|TP025822 P a g e 48 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Result :
Analysis :
Question 6 explains how useful will the proposed system will be to overcome unauthorized access from the respondents view. As can be seen in the bar chart above, 19 out of the 34 (55.9%) respondents thinks that the proposed system will be useful in overcoming security breaching by intruders or unauthorized personnel. Besides that, 13 out of 34 (38.2%) are the respondents who thinks that the proposed system will be crucially useful to overcome security breaching by intruders and 2 out 34 respondents (5.9%) who are quite neutral about how useful the proposed system would be. It can be seen that majority of the respondents thinks that the proposed system will be very useful in overcoming such security breaches and also to avoid unauthorized access inside the residential building.
Question
7
: Result :
Analysis :
The above question explains how will the proposed system will be useful to the tenants, security staffs and also the administrator in the resiential buidling security system. As shown in the above responds from the
DINESH PRABAKAR|TP025822 P a g e 49 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
respondents it can be seen that 16 out of 34 (47.1%) respondents who have stated that it is very important for the admin, security staff and tenants to utilize the proposed system. Besides that a similar number of respondents also thinks that proposed system will be useful and important to the staff, admin and tenants inside the residential building and only 2 out of 34 (5.9%) respondents who are neutral to this question. This explains the importance of developing the proposed system in-order for the admin, security staff and tenants to utilize it. Question
8
: Result :
Analysis :
Question 8 shows the expectations of the respondents in terms of the functionalites and reliability of the proposed system. It shows that majority of them which is 22 out of 34 respondents (64.7%) has high expectations and 12 out of 34 (35.3%) has very high expectations towards the functionality and reliability of the system which is a challenge to the developer to develop a well function and highly reliable system for the residential building. Its can be seen that the participants knows how important is it to have a higly reliable system with good functionalites system in the residential building to protect them. In-order to full-fill their needs the developer has to work even harder to create system to their expectations.
Question
9
:
DINESH PRABAKAR|TP025822 P a g e 50 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Result :
Analysis :
Question 9 explains that how the respondent thinks whether the surrounding of the building will be secured with the implementation of the proposed system. As can be seen in the results majority of the respondent 19 out of 34 (55.9%) agrees and 13 out of 34 (38.2%) strongly agrees that with the implementation of the proposed system by the developer that the building will be more secured which means the proposed system implementation can increase the confident in the people who are investing in residential building that they are much safer with the implementation of the system.
Question
10
: Result :
Analysis :
Question 10 is the comparison between the security system and the security force which is questioned to the respondents whether they think that the system can reduce the number of the security guard in a residential building. As can be seen in the above feedbacks that majority of the respondents 17 out of 34 (50%) of them are not agreeing with the question and remains neutral. Where 1 out of 34 of the respondents thinks it is not applicable that the system can replace the security force in the building. 11 out of 34 (32.4%) agrees and 5 out of 34 (14.7%) strongly agrees that this systems can reduce the money spent on the hiring of security force in residential
DINESH PRABAKAR|TP025822 P a g e 51 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
building. This means that in the perception of the respondents they think that even with the implmentation of the system security force is still needed to guard the building.
Question
11
: Result :
Analysis :
This question is to ensure how much agreeable are the respondents on the implementation of biometric device (fingerprint) authentication. The results above states that majority of the repsondents 22 out of 34 (64.7%) agrees and 9 out of 34 (26.5%) strongly agrees on the implementation of the fingerprint authentication in the residential building is neccesary where there are very little respondent 3 out of 34 (8.8%) of them who stays neutral with the implementation of the fingerprint autentication. The graph aboves shows that most of the respondents prefers the implementation of the fingerprint authentication in order to create a highly secured security system for the residential building.
5.1.2. Analysis collected through interview method Number:
1
Target:
Head of Security Vista Komanvel A
Question:
Do you think that by implementing full operational system, the threats such as crime, vandalism and robbery can be overcome?
Answer:
Yes. The proposed system has good security layers to be monitored. We
DINESH PRABAKAR|TP025822 P a g e 52 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
couldn’t overcome such problems completely but I believe we can drastically reduce such threats. Analysis:
The answer shows that it is very important to implement the full operational building security system in order to increase the security level around the building. The answer also explains that, the crime problems cannot be overcome completely but with the implementation of the full operational system it can be reduced drastically. A proper system should be developed by the developer to ensure that it can really control the crime rate in the building.
Number:
2
Target:
Head of Security Vista Komanvel A
Question:
What are the advantages that you have found by using the current building security system?
Answer:
The current system has less advantages compared to the proposed system, but I would say that the current system is easier for the foreign security guards to handle. Besides that, there are several guards at the entrances of each block in the apartment 24 hours
Analysis:
The above answer shows that a replacement for the current manual system is needed, but at the same point the manual system are much more user friendly to the foreign security staff to access. This explains that most of the foreign security staff are not familiar with the usage of computerized system. On the other hand, the answer also explains that with the current system there are several security guards at the entrance of the building to enhance the security of the building. The answer also helps the developer to keep in mind that the system which is being developed should be simple and easy to be adopt by the security staffs.
Number:
3
Target:
Head of Security Vista Komanvel A
Question:
What is the weakness that you have found by using the current building
DINESH PRABAKAR|TP025822 P a g e 53 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
security system? Answer:
Since most of the operations are manual, there is always mistakes in data recording which will affect the safety of the apartment. Besides that, the security is unable to cover the entire units of the apartment and monitor the units condition all the time.
Analysis:
The above answer states that manual operations lead to the miss placing of data around the building, where the security head also insists that the miss placing and loss of data will affect the safety of the building. On the other hand, it can also be analysed that the security guards are unable to cover and monitor the entire building. This means with the new system, workmen can be reduced and entire building can be monitored with the implementation of the system.
Number:
4
Target:
Management Staff Vista Komanvel A
Question:
What are the possible issues that can be faced by the building management based on the disadvantages that have been mentioned above?
Answer:
Strangers in disguise of visitors (E.g.: Relatives, friends) walks in the apartment. Unknown theft and vandalism of property are done. Uncontrolled movement of non-residents in and out throughout the day.
Analysis:
The above condition shows that, developer concludes that the management are facing serious problem as anyone can sneak into the building claiming themselves as visitor, relatives and etc. This however endangers the surroundings causing vandalism theft and other crime activity.
Number:
5
Target:
Management Staff Vista Komanvel A
Question:
Based on the issues mentioned above, what are the precautions that will be taken in order to prevent the risk that will be faced by the building
DINESH PRABAKAR|TP025822 P a g e 54 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
management in future? Answer:
Monitor the non-residents activities around the apartment. Take security measures such as getting identification cards, and approval from residents to enter to their unit. We should implement a more secure system to monitor in and out of tenants and visitors. Everything should be recorded properly.
Analysis:
The above answer explains that the management staff’s already have security measures that needed to be taken to increase the level of security around the building to ensure that people cannot easily enter the building without proper verification. This reminds the developer to create a system to ensure that the visitor and the outsiders who are let into the building should be monitored by the system. This increases the level of security in the building.
Number:
6
Target:
Head of Security Vista Komanvel A and Management Staff Vista Komanvel A
Question:
Have you experienced before such a situation where criminals who tend to claim themselves as a visitor to get access into the building?
Answer:
There are many cases whereby students who are residents bring their friends over and walk in without any notice. There was once a robbery in a resident’s house and the only thing that we able to provide to police was his photo from cctv camera because the details of the person was not recorded in the main guard house.
Analysis:
The answer above shows that this is one of the most important problem that should be overcome by the system which is being developed by the developer since there are many trespassers who are the behind many crimes which is happening in the building. In the developer’s mind visitor access has to be monitored through the proposed system in-order to create a safer environment around the building.
DINESH PRABAKAR|TP025822 P a g e 55 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Number:
7
Target:
Tenants
Question:
What do you think about biometric authentication implementation into the system? Will it provide a secure environment?
Answer:
Yes. Residents would feel much secured and protective whereby the securities are aware on who are visiting the residents. Obviously yes because, this system will help security guards to monitor all the residents and visitors entrance to the apartment.
Analysis:
The above answer explains the importance of implementing the fingerprint authentication in the proposed system. It can be seen that the users are interested and aware that with the implementation of the fingerprint authentication that the resident of the building can be tracked and the visitor movement can be controlled. In developers view it is important to implement the fingerprint authentication in the proposed system to enhance the security level.
Number:
8
Target: Number: Question:
Information System Security Specialist
Target:
9 What will be the tools and techniques that you use for the development Information System Security Specialist of the system?
Question: Answer:
What most and important thing at in reader. order to provide can the best The is easiest basic tool to to uselook is RFID Beginners try to residential building security system? use LF (low frequency) which is really simple to use, just scan and the
Answer:
One of the factors look intoVisual is the Studio maintenance serial codemost willimportant appear. I will use to Microsoft 2013 toofdothethe system. system not well taken cared ofI orchoose have backup sourceWhen code aand the is programming language will bepower Visual
Analysis: Analysis:
supply, Basic. it can’t be ensured that it will be working 24/7 and therefore can’t provide enough safety for answer the residents. As can be seen in the above the IT expert is suggesting on the The result the developer not only featureslevel of the are usage of tells the RFID reader tothat enhance thethe security of system the building important, the maintenance power supply are also RFID extremely security. This explains thatand thebackup developer should implement in the important because consistency the system, no matter how proposedtoo system. Thewithout developer takes theofsuggestion from the IT expert good it has,it itinwon’t be able carry it out. and the willfeature implement the system if to time allows.
DINESH PRABAKAR|TP025822 P a g e 56 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Number:
10
Target:
Tenants
Question:
What functionality do you expect to have in the residential building security system?
Answer:
Record the entrance and exit of people through the main entrance. Record proper details of each and every visitor pass through the entrance. Information to the securities on who are the visitors and visiting duration. In case of any unwanted incidents, securities are able to trace back on occurred events.
Analysis:
The above answer states what kind of functionalities that the tenants want, and it can be seen that the tenants are aware that the security of the building can be enhanced by knowing who is in and out of the building. Besides that, visitors access can be controlled by tracking the movement of the visitors in the building. Developer has to create visitor profile management in order to ensure that the visitor movement in the building can be monitored.
5.1.3. Interview Conclusion To conclude on analysis of data collected through Questionnaire and Interview are the responses obtain from the questionnaire enable the developer to have a better understanding of what are the needs of the end-user from the system which is proposed by developer. Based on the analysis of the questionnaire result, the developer will prioritize the system features, do(s) and don’t(s) base on the end user DINESH PRABAKAR|TP025822 P a g e 57 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
response that have been collected. End user needs towards the Residential building security system should meets end-user’s satisfaction and needs. Furthermore, the interview analysis also helps the developer to analyse the overall system availability, reliability and performance that the final users can tolerate based on the results collected. Lastly, this chapter serves as a guide for the developer in developing the system.
Chapter 6: System Architecture
6.1. Introduction The responsibility of the developer is to develop the residential building security system. This security system is targeted on residential building such as apartments, condominiums and etc. Implementing the residential building security system is very important to ensure the safety DINESH PRABAKAR|TP025822 P a g e 58 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
and also the security of the tenants in the building. Let it be office or even apartment the security management are responsible of the people who evolves around the building, ensuring that they are safe from threats, natural disaster and etc. This proposed system allows three types of user to access the system who are the tenants, security management, and administrator. The core features and the proposed system functions as below:
Three types of users can login into the system Admin can register the type of users into the system The administrator more control and power over the system Tenants can register their unit if they are leaving out of town, where security guard
will have the unit monitored. Tenants can check their access logs for security purposes Security Management get to access the tenants last access. Users can only access to the system using their fingerprint authentication. Security can register visitors in the system with confirmation from the tenants. Tenants can register their visitors with a start date, time and expiry date and time. Tenants can edit the personal information
The above functionality improves the building security system compared to the current system. The proposed system ensures safety and also security in the building as it uses the biometric authentication to allow access to the building which makes hard for intruders to break through and also cuts down the possibilities of several types of threat. The proposed system ensures the safety of the people in the building.
DINESH PRABAKAR|TP025822 P a g e 59 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
6.2. Abstract Architecture 6.2.1. System Design 6.2.1.1. Use case diagram
Diagram 1: Use Case For Residential Building Security System
DINESH PRABAKAR|TP025822 P a g e 60 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
6.2.1.2. Use Case Diagram Specifications Name:
Add User
Brief Description:
Registering
Actors:
authentication and personal details Administrator
Flow of Events:
Fingerprint Identification Registry
user
into
the
system
with
their
fingerprint
Personal Details Entry Special Requirements:
Original individual required for fingerprint pattern
Preconditions:
Fingerprint required to be registered using a device
Post-conditions:
Text are required to be filled up None
Name:
Check Logs
Brief Description:
Check the in and out entry of the building users
Actors:
Admin Security/Staff
Flow of Events:
Monitoring the users last in and out of the buildings
Special Requirements:
Check the logs based on the events saved on the database
Preconditions:
User must be registered user of the system
Post-conditions:
None
DINESH PRABAKAR|TP025822 P a g e 61 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Name:
Register Visitor
Brief Description:
Registering Visitor Access
Actors:
Security/Staff, Tenants
Flow of Events:
Registering visitors, contractor, internet officers and etc
Special Requirements:
Visitors have to fill up full details of themselves and their picture
Preconditions:
will be captured into the system Tenants must approve the stay of their visitors
Post-conditions:
None
Name:
Check User Reports
Brief Description:
Monitoring the reports of the system users
Actors:
Security/Staff
Flow of Events:
Manage the user reports in the system
Special Requirements:
Original security staff can access to the user reports
Preconditions:
None
Post-conditions:
None
Name:
Monitor Holiday Profile
Brief Description:
Monitoring the units which tenants left for outstation
Actors:
Security/Staff
Flow of Events:
Logs in and checks the holiday management portal
Special Requirements:
Start date and expiry date is mandatory
Preconditions:
Holiday profile is only available if tenants registered for holiday
DINESH PRABAKAR|TP025822 P a g e 62 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Post-conditions:
None
Name:
Approve Visitor
Brief Description:
A full profile of the visitor with the picture and sensitive information recorded by the security/staff is emailed to the tenants
Actors:
for approval Tenants
Flow of Events:
Approve the profile of the visitor sent to the tenants if it is really their visitor, if rejected visitor would not be allowed into the
Special Requirements:
building Visitors Identification Card information
Preconditions:
Text box are required to be filled up, visitor have to use the
Post-conditions:
building’s camera to capture their face for confirmation None
Name:
Register Holiday Entry
Brief Description:
Registering into the holiday entry with a start date and expiry date
Actors:
if the tenants will be away from home Tenants
Flow of Events:
Register details and the date leaving and the date tenants will be back.
Special Requirements:
Tenants
Preconditions:
Only tenants are applicable to register the holiday profile entry
Post-conditions:
None
DINESH PRABAKAR|TP025822 P a g e 63 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
6.2.1.3.
Activity Diagram
Diagram 2 : Activity Diagram for User Registration According to the image above it explains that the administrator is authorized to register the type of users into the system with their fingerprint information. Once the administrator logs into the system they have to select register user and then register users determining them on the type of users and their limitation towards the system. Once the users are registered with their fingerprint the administrator can log out of the system.
DINESH PRABAKAR|TP025822 P a g e 64 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 3: Activity Diagram for Updating User Information The above diagram explains the personal information function. This function can be accessed by two types of users which are the administrator and tenants where once the admin or staff login the system will identify the type of users who logs into the system and allows them to edit the information according their level of power. As shown in the diagram the administrator is able to edit the information of any users who are using the system but the tenants are only allowed to update their own information.
DINESH PRABAKAR|TP025822 P a g e 65 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 4: Activity Diagram for Visitor Registration The above diagram explains the visitor registration function which is accessible by the security management and tenants. The above diagram shows that if the tenants wants visitor at their place they should input the visitor information to the system with the expiry date and time. If the visitor comes straight to the building, the security will record the information according to the visitor’s identification card and also capture the visitor face and send it to the tenants for confirmation.
DINESH PRABAKAR|TP025822 P a g e 66 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 5: Activity Diagram for User Logs The above diagram explains the check logs function which is also accessible by the security management and the tenants. Once the tenants or security management logs in the system the and selects the “check logs” function the system verifies types of user and if the user is tenants they can keep track of who last checked in and out. On the other hand, the security management can keep track and also edit the record if there is any suspected activity.
DINESH PRABAKAR|TP025822 P a g e 67 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 6: Activity Diagram for Fingerprint Verification The above diagram shows the fingerprint access function which can be accessed by all three users. Once the user’s logs in the system for this particular function the system will verify the type of users and leads them to the functionality based on their power towards the system. As can be seen above the administrator updates the registered fingerprint into the system by approving it, the security management can check their limitations towards the system and also their fingerprint is registered as security and the tenants fingerprint is registered as tenants.
DINESH PRABAKAR|TP025822 P a g e 68 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 7: Activity Diagram for User Functionality The above diagram explains the functionality of each user after they log in into the system. The diagrams explain the systems accessibility of each and every user who are using the system. The diagram also explains that users fingerprint is saved based on their functionalities.
DINESH PRABAKAR|TP025822 P a g e 69 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
6.2.1.4. Sequence Diagram
(Fingerprint Authentication)
Diagram 8: Sequence Diagram for Fingerprint Authentication The above sequence diagram shows how the biometric authentication works in the proposed residential building security system. It explains above that when the users enter the ID the scanner verifies the information of the user and once verified the system requests for the biometric authentication and then it verifies the biometric authentication from the database and if it is verified then it allows the access for users.
DINESH PRABAKAR|TP025822 P a g e 70 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Sequence Diagram (User Registration)
Diagram 9: Sequence Diagram for User Registration The above sequence diagram shows the sequence on how users are registered into the residential building security system. The administrator is responsible to ensure users are registered into the system such as the security management and tenants. Once the user’s details are saved it will be updated in the system and then the system will be updated with the new users. The information of the users can be searched.
DINESH PRABAKAR|TP025822 P a g e 71 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
6.2.2. Database Design 6.2.2.1.
Entity Relationship Diagram (ERD)
Diagram 10: ERD for Residential Building Security System The above ERD represents the residential building security system, in this system the security staff records the information of the visitor in the building with their image. Once the information is input, the visitor profile will be emailed to the tenants for approval. Besides that, only admin has the authorized rights to register user into the system.
DINESH PRABAKAR|TP025822 P a g e 72 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
6.2.2.2.
Class Diagram
Diagram 11: Class Diagram for Residential Building Security System Figure above shows the class diagram of the building security system. The users who utilizes the system will have to register into the system using their personal information where it will be verified by the administrator. Besides that, the registered identification will be verified by the security management where they will be monitoring the users to ensure security and safety. On the other hand, the users can also check and monitor the records of their respective units and upon the registered records it will be reviewed by the security management to make sure there is nothing suspicious suspected. Besides that, visitor will be registered by the security staff with their respective identification number and information to make sure they gain access to visit the tenants, visitor’s registered profile will be emailed to tenants in order
DINESH PRABAKAR|TP025822 P a g e 73 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
to make sure that the visitor is legitimate. The stay of the visitors in the building is approved by the tenants.
6.2.2.3.
Database table structure
Admin Name AdminID
Type INT
Null No
Default No
Comment Primary Key. Admin has a unique ID.
UserName
VARCHAR(50)
No
No
Admin username.
Contact No
VARCHAR(20)
No
No
Admin’s contact no.
Address
VARCHAR(500)
No
No
Admin’s address.
Email
VARCHAR(50)
Yes
No
Admin’s E-Mail Address.
CreatedDate
DATETIME
No
No
System
Yes
No
Current Date Information Updated Date
Null No
Default No
UpdatedDate
DATETIME
Automatically
Takes
Holiday Management Name ID
Type INT
Comment Primary Key.
Unique
ID
cannot be repeated by others. Username
NVARCHAR(50)
No
No
Holiday
Management
Applicant Username FromDate
DATETIME
No
No
Start
EndDate
DATETIME
No
No
Holiday. End Date of the Holiday
Reason
VARCHAR(500)
NO
NO
Reason Leaving the Building
DINESH PRABAKAR|TP025822 P a g e 74 | 119
Date
and
Time
of
RESIDENTIAL BUILDING SECURITY SYSTEM
Roles Name RoleID
Type INT
Null No
Default No
Comment Unique identifier, identify the roles of the users
Name
VARCHAR(50)
No
No
User’s Name
Description
VARCHAR(200)
No
No
User’s descriptiom
Schedule (Device last access report) Name ID
Type INT
Null No
Default No
Comment Primary Key. Each profile has
Name
NVARCHAR(5)
Yes
No
unique ID Profile Name
Email
VARCHAR(20)
No
No
Profile Email.
Last Access
DATETIME
No
No
Profile’s last access.
Active
INT
No
No
Profile Active State
Visitor Name VisitorID
Type INT
Null No
Default No
Comment Primary Key. unique identifier
VisitorName
VARCHAR(20)
No
No
Visitor’s Name
IDNumber
VARCHAR(50)
No
No
Visitor ID
FromDate StartTime EndDate EndTime
DATETIME DATETIME DATETIME DATETIME
No No No No
No No No No
Visitor Start Date Visitor Start Time Visitor End Date Visitor End Time
DINESH PRABAKAR|TP025822 P a g e 75 | 119
Visitor’s
RESIDENTIAL BUILDING SECURITY SYSTEM
VisitPurpose RelatedTenantNm Status ApprovedBy ImgName
VARCHAR(MAX) NVARCHAR(50) NVARCHAR(50) NVARCHAR (50) VARCHAR(MAX)
No No No No No
No No No No No
Reason of visiting Whom Visitors are visiting Visitor Status Approval By Tenants Visitor Image Name
Type INT
Null No
Default No
Comment Primary Key. User’s unique
User Registration Name UserID
identifier UserName
VARCHAR(20)
No
No
User’s Name
ContactNo
VARCHAR(50)
No
No
User’s Contact Number
Address Email CreatedDate UpdatedDate
VARCHAR(500) VARCHAR(50) DATETIME DATETIME
No No No No
No No No No
User’s Address User’s Email Profile Created Date Profile Altered Date
6.2.3. Interface Design Actor: Admin, Security Staff and Tenants Description: This is the Login page of the residential building security system; the user both Security staff or tenants with authorized username, password and fingerprint are only able to utilize the system efficiently.
Header Residential Building Security System
DINESH PRABAKAR|TP025822 Page 76 |Fingerprint 119 Please Insert for User: Pass:
Verification Footer
2015-2016 © Residential Building Security System. UserLogin Login
RESIDENTIAL BUILDING SECURITY SYSTEM
Actor: Admin Description: This page allows the admin to register users such as the tenants and security staff into the system. This page is design as registration form and required all field to fill up in order to add the users.
Header Residential Building Security System Navigation Menu
Logout
Register Users
User Name
:
Password
:
Contact Number
:
Address
:
Occupation
:
User Type (Role Led)
:
Intake Code
[Security Staff] [Tenants]
:
Add
Reset
Cancel
Footer 2015-2016 © Residential Building Security System
DINESH PRABAKAR|TP025822 P a g e 77 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Actor: Admin/Tenants Description: This page allows the admin and the tenants to perform activities such as modify the details or delete the details from the system. Tenants are allowed only to update their own information where the admin can also update the security staff details.
Header Residential Building System Security
Navigation Menu
Logout
Tenants Panel
Edit Student Details
Update
Cancel
Footer 2015-2016 © Residential Building Security System.
DINESH PRABAKAR|TP025822 P a g e 78 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Actor: Security Staff Description: This page allows the security staffs to register visitor into the building. This page is design as registration form and required all field to fill up in order to register visitor
Header Residential Building Security System Logout Register Visitor Visitor Name
:
Visitor IC
:
Reason of Visit
:
Contact Number
:
Address
:
Image
:
Module ID
:
Visitor Role
:
[Label]
[Label]
Take Picture
[Start Date] [Start Time] [End Date] [End Time] [Label]
Add
Submit
Cancel
Footer 2015-2016 © Residential Building Security System
DINESH PRABAKAR|TP025822 P a g e 79 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Actor: Tenants Description: This page allows the tenants to register for holidays if they are leaving the building for out station or for work purpose. Once the tenants register the holiday profile, security staff will keep an eye on the respective units of the tenants.
Header Residential Building Security System Navigation Menu
Logout
Holiday Management
Panel Holiday Management Tenants Start Date
[Label]
End Date
[Label]
Reason
Submit
Cancel
Footer 2015-2016 © Residential Building Security System.
DINESH PRABAKAR|TP025822 P a g e 80 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Actor: Security Staff Description: This page security staff to monitor the records of the visitor, holiday profile and tenants.
Header Residential Building Security System Navigation Menu
Logout
View Records:
Searc Records Display
Footer 2015-2016 © Residential Building Security System
DINESH PRABAKAR|TP025822 P a g e 81 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
6.3. Development/Deployment 6.3.1. Programming Language Chosen There are various types of programming language for software development. As for webbased application system, there few well-known and commonly use programming languages are VB.NET, PHP and C#. The developer uses C# programming language to develop the building security system. C# The C# is an object oriented language which is originated for C++ which also adopts the simplicity of programming from Visual Basic. At first it was the language C that was widely accepted and used and then it came to adding object orientation and it evolved into C++. C++ was used for writing the infrastructure and low level application whereby Visual Basic (VB) is utilized for business purposes (Utley, 2004). C# brings the fast improvement worldview of VB to the universe of C++ designers, with a few clear changes. C# exploits the .NET Framework, which implies you have admittance to an intense structures motor, much the same as VB developers have had for years. New data type have been included, for example, the decimal data for calculations (TutorialsPoint, 2016). C# is intended to work with Microsoft's .Net platform. Microsoft's point is to support the exchanging of data and administration over the Web, and to engage architects to manufacture extremely flexible applications. C# enhances programming through its use of Extensible Mark-up Language (XML) and Simple Object Access Protocol (SOAP) which allow access to a programming object or technique without requiring the programmer to form additional code for each step. Since programmers can develop existing code, instead of more than once replicating it, C# is relied upon to make it speedier and less costly to get new items and administrations to the market.
DINESH PRABAKAR|TP025822 P a g e 82 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Advantages of C# (Krishnamraju, 2010)
C# gets ideas from Java and C++, receiving just the great bits from those languages and eliminates out excessively confusing and mistake inclined elements, which are the
major source of bugs in a code. C# supports effective and reusable components. C# is more secure to run. Subsequent to C# framework is accumulated into a transitional language, the OS can just check it to see that no pernicious code talks
reality. C# implies the current programming idea of Object Oriented Programming which empowers the designer to deliver secure information driven applications and take the
user to the following level of experience. Due to their high portability, C# are utilized for web programming and with new data sharing ideas like web administrations, they convey circulated data sharing to the very
desktop of the client and all that the client needs is a PC and a program. Cost of maintenance for C# is without a doubt much lower than that of C++. This is a positive response of C# offering programmers some assistance to make program that is as bug free as would be judicious.
Disadvantages of C# (Krishnamraju, 2010)
All however portability is the element that with C# was created, C# projects are to a great extent for Microsoft Windows Environment which in spite of the fact that happens to be the most generally utilized Operating framework over the globe, yet with Open Source advancements, particularly stages like Linux catching up, C# still
needs to long approach to go. This is one major disadvantage of C#. C# is less adaptable than C++. C# depends altogether on .NET structure, anything that is not found in the .NET framework will be difficult to actualize
DINESH PRABAKAR|TP025822 P a g e 83 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
In conclusion, although C# is newly introduced programming language at its late 2000 but it is many developers choice. Since, C# derived from C, C++, and Java, developer being to sensation that C# offered with powerful capabilities from C++. C# has simplified many complexities features in C++ which make the syntax consistent and logical to the developer. Microsoft Visual Studio will be used to develop this system as it provides a lot of basic functions and advanced functions that allow programmers to create a working security system for building. In order to complete, every programming language has its pros and cons, the choice of language is based on the preference of the developer based on their interest and capabilities on developing the system. Besides that, the C# allows the implementation of fingerprint authentication in the platform (Gonzalez, 2015). The strict sort of checking in C#, both at incorporate and run times, results in the dominant part of commonplace programming mistake being as countered as early as possible and they and their areas pinpointed precisely. This can spare the C# developer a great deal of time, contrasted with finding the reason for confusing mistakes which can happen long after the offending operation happens in languages which are more liberal with their implementation of security (Ryder, 2016). 6.3.2. IDE Chosen The integrated development environment (IDE) chosen will be the Microsoft Visual Studio 2015 IDE, this is because the Visual Studio 2015, an integrated suite of developer productivity tools, cloud services, and extensions that enable you and your team to create great apps and games for the web, for Windows Store, for the desktop, for Android, and for iOS (Microsoft, 2015). The new compiler which is known as "Roslyn" which is made especially made for the C# and Visual Basic language will save time in compiling and provides code analysis application programming interface. By utilizing the all new compiler the Visual Studio 2015 provides more refactoring including rename, analysers and quick fixes (Microsoft, 2016). The new Roslyn compiler for C# and Visual Basic not only saves the compilation times it additionally empowers totally new situations, for example, live code analysis, which give rich and adaptable criticism and recommendations specifically inside the code editor as developer types. In Visual Studio 2015, lights show in the left edge (when utilizing the keyboard) or a device tip (when hovering over a blunder with the mouse). The light tells continuously that the compiler potentially utilizing a custom rule set has recognized an issue in developer’s DINESH PRABAKAR|TP025822 P a g e 84 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
code furthermore has a proposal for how to settle the issue. When developer see a light, tap on it for recommendations to fix the issue (Microsoft, 2016).
Diagram 12 shows the all new “Roslyn” compiler. Source: (Microsoft, 2016)
Library Chosen The chosen library in the system is data encryption library. This library is to encrypt data recorded such as the, passwords. This library is the security features which can be implemented to the system to prevent intruders to gain information from the system. 6.3.3. Database Management System Chosen Database management system (DBMS) is the system software for managing and creating databases. DMBS shows assist the users in creating, updating, retrieving and managing databases (Rouse, 2016). The DBMS basically serves as an interface between the database and end clients or application programs, guaranteeing that information is reliably sorted out and remains easily available. The DBMS oversees three essential things: the information, the database engine that permits information to be gotten to, modified and changed and the database schema, which characterizes the database's intelligent structure. These three foundational components give concurrency, security, information respectability and uniform administration techniques (Rouse, 2016). The main aim of a DBMS is delivering ways to store and recover database information which will be well organized and easily accessible. The DBMS helps the developer in storing the DINESH PRABAKAR|TP025822 P a g e 85 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
sensitive data that has implicit importance such as the tenant’s id, fingerprint id, address, office address contact number and so on. The database system guarantees the integrity of the data stored from the system crashes or attempts at unauthorized access. The DBMS chosen for the building security system is the Microsoft SQL Server 2008 R2. This database management system will store all the information such as the basic information and also the sensitive information of the occupants in the building will be stored. Basic information are as occupants personal information, example: - contact, gender, age occupations and etc. Sensitive information will be such as the fingerprint ID, username, user id and passwords. Microsoft SQL Server 2008 R2 is a database administration framework that created by Microsoft. Its essential capacity is to store and recover information as asked for by other programming applications. There are more than 12 unique versions of Microsoft SQL Server accessible that objectives distinctive sorts of clients and extent from little single-machine applications to huge system applications with numerous clients. SQL Server 2008 R2 has an expert information administration framework marked as Master Data Services, to manage master data entities and hierarchies (DatabaseJournal, 2016). Besides that, the SQL server management studio function allows the developers to access, manage, configuring, and monitoring the components in the system which is created. Moreover, the management studio also adds up the graphical tools where it is designed to create and monitor database projects. Other services such as the command prompt, Integration services and reporting services (DatabaseJournal, 2016). 6.3.4. Operating System Chosen The chosen operating system will be the Microsoft Windows. This operating system is chosen because this is the most common operating system which is used in the world. Besides that, developer have been using the Microsoft Windows for a long time and very familiar to the operating system. Besides that the Microsoft Windows 10 is the latest operating system which is release by Microsoft and suits all the tools and components that will be implemented into the building security system by the developer. Microsoft Windows will suit the proposed project in an excellent way.
DINESH PRABAKAR|TP025822 P a g e 86 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Web Server Chosen The web server chosen for this project is the Internet Information Server (IIS). IIS is a Microsoft’s entry to compete in the web server market which are compete by Apache, Sun microsystems and others. Microsoft includes sets of programs to build and administer web sites, search engines and supports for writing web-based application that access database (WhatIs.com, 2016). The proposed building security system is a client-server architecture where the occupants in the building are the clients. Clients who request changes or any other tasks will be directed to the security management or administrator. Web hosting is not required here but a web server is mandatory to in-order to sustain the communication between the client and server.
DINESH PRABAKAR|TP025822 P a g e 87 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Chapter 7: Project Plan 7.1. Release Plan
No. 1
Core Features Fingerprint
Priority High
Justification Guaranteeing the
that
fingerprint
is
secured and unique where
only
users
with that particular fingerprint 2
Monitoring Records
Medium
are
allowed to access. Some users won’t be bothered to check security log of their unit because they are aware on the security management who are always keeping an eye on the CCTV of
3.
Login
Low
the building. Some users
don’t
think the login is as secured fingerprint authentication.
DINESH PRABAKAR|TP025822 P a g e 88 | 119
the
RESIDENTIAL BUILDING SECURITY SYSTEM
7.2. Test plan for Unit Testing
Unit testing Unit testing is known as the software development process in where the smallest testable of an application in this test there are independently examined for proper functions. The unit testing is normally automated, but can be done manually too. Mode of this testing is a component which falls under the Extreme Programming (XP), a useful method of software development, where builds product by continual testing and revision (Rouse, 2016). In this unit testing the developer have to choose a testable unit from the system and to be tested in order to determine if it meets the requirement of the project. In this phase there will be each units to be tested independently and in sequence. Units that are put into test are the features that are implemented into the system and will be done step by step.
Login Function Test Case
Input
1
No
2
3
Outcome Fingerprint Please scan your
authentication
fingerprint
Unauthorized
Verification
fingerprint
failure,
verification Authorized
scan again. Verification
fingerprint
successful
please
verification
DINESH PRABAKAR|TP025822 P a g e 89 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Personal Information Test Case
Input
Outcome
1
Fill in all the Information required area to saved save
2
personal
information. Empty area left
Please fill in the area left*
3
Completed area
all Saved with successfully
information.
the database
Test Case
Input
Output
1
Select
to
Monitor Records
monitor Verifies
records. 2
User
type. type View
(tenants) 3
User
user logs
of
registered unit type View record of
(security
entire database.
management)
DINESH PRABAKAR|TP025822 P a g e 90 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Visitor Management Test Case
Input
1
Fills in visitor Verifies information
2
type
user (Security
Management) Webcam is used Visitor Profile is to
3
Output
capture
the saved
picture of visitor Sent to tenants Waiting for approval
approval
for from
tenants. The above shows some the examples of the unit testing which will be done in order to ensure the system is working well and fine before delivering it to the end user. Testing is helpful where if there is no testing phase the developer would not aware if there is any fault in the system and it will bring in difficulties later.
DINESH PRABAKAR|TP025822 P a g e 91 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Integration Testing Integration testing, also known as integration and test, is a software development process that unit program combined and tested as a group in a variety of ways. In this context, unit tested is defined as the smallest part of the application. Integration testing can reveal problems with the interface between the programs before problems occur in real-world implementation of the program. Component integration testing is Extreme Programming (XP) , a pragmatic method of software development that takes meticulous approach to building products through continuous testing and review (Rouse, 2016).
DINESH PRABAKAR|TP025822 P a g e 92 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Integration testing for building security system Test name: Date: Position Module
Functions
Results (Circle the answer) 1-poor 5excellent
ID 1
Biometric Authentication
1
2
3
4
5
2
System Login
1
2
3
4
5
3
Records Monitoring
1
2
3
4
5
4
Visitor Management
1
2
3
4
5
5
Information Updating
1
2
3
4
5
6
Visitor Registering
1
2
3
4
5
7
User Registration
1
2
3
4
5
8
Holiday Management
1
2
3
4
5
Comment from user:
Action taken by the developer:
DINESH PRABAKAR|TP025822 P a g e 93 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
User Acceptance Test The user acceptance testing which is also known as the beta testing, application testing and end user testing. This user acceptance test to make sure the satisfactory of the end-users towards the building security system. UAT can be done by in-house testing or pay individuals to test the software, uploading over the net and many more ways. The experience of the endusers towards the building security system are forwarded back to the developer, where the final changes can be made and altered. The user acceptance test is as below
Name: Date: Occupation: Activities:
1 – Very 2 - Poor
3 - Moderate
Poor Login
page/
Fingerprint Monitor Records Visitor Management Holiday Management Comment from user:
Action taken by the developer:
DINESH PRABAKAR|TP025822 P a g e 94 | 119
4 - Good
5
–
Good
Very
RESIDENTIAL BUILDING SECURITY SYSTEM
Chapter 8: System Implementation 8.1. Screenshot 8.1.1. Homepage/Login
Diagram 13: The user login interface of the system The above figure shows the home page that appears in the residential building security system, and as shown in the image above there are two boxes where the users have to insert their username and password to gain access into the system.
Diagram 14: The user login interface of the system
DINESH PRABAKAR|TP025822 P a g e 95 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Based on the image above, once the username and password of the user is inserted, the user still are prohibited from getting access into the system as the system requires fingerprint of the user to ensure that only valid users are available to access into the system.
8.1.2. Admin Panel
Diagram 15: The interface of the Admin Panel The above image shows that once the Admin type of user logs into the system, admin will be lead to the admin panel. In the admin panel, the admin is allowed to create new type of users into the system such as the security staff and tenants. Besides that, the admin can also modify the information of the users of the system. Admin also monitors the user entries into the system and the holiday management reports.
8.1.3. Security Staff Dashboard
Diagram 16: The interface of the security staff dashboard
DINESH PRABAKAR|TP025822 P a g e 96 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
The above image shows that once the user type Security staff logs into the system, security staff will be lead to their dashboard where the security staff are responsible of the visitor entry, monitoring the visitors list who are in the building, checking the entry logs of the tenants and also monitoring the units where the tenants left for holidays.
8.1.4. Tenants Panel
Diagram 17: The interface of the tenants panel The above diagram shows the tenants panel, where the user type tenants are lead to once they log into the system. Here it shows that the tenants can access to the holiday entry, approve and disapprove their visitors, and also check their last log into their units.
8.1.5.
Visitor Entry Form (Security staff)
Diagram 17: Visitor entry form of the system
DINESH PRABAKAR|TP025822 P a g e 97 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
The above image shows the visitor entry form which will be filled up by the security staff to ensure that the visitor profile can be monitored. The above visitor form requires all the information of the visitor including their, identification number and picture. Once this form is filled, it will be sent to tenants for approval.
8.1.6. Visitor Report (Security Staff)
Diagram 18: Visitor report of the system The above image shows the visitor report which can be accessed by the security staff to monitor the movement of the visitor’s in the building. The above image also shows the visitors identification number and the start and end time of them in the building and their purpose of their visit. Besides that, it also shows the status of visitor in the building whether they are being approved or rejected by the tenants.
8.1.7. User Attendance Logs
DINESH PRABAKAR|TP025822 P a g e 98 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 18: User attendance logs of the system The above image shows the user entries, the last access of the users into the system, which makes the security staff and also the tenants to keep an eye if there is any un-authorized entryin the building. The above information is extracted from the fingerprint device which records the user attendance. 8.1.8. Holiday Management
Diagram 19: Holiday management interface of the system The above diagram shows the Holiday management entry which can be filled by the tenants to let the security staff know the dates that they wont be available in the building to make sure that the security staff keeps an eye on the tenants respective units.
8.1.9.
Holiday Report
Diagram 20: The holiday report of the system
DINESH PRABAKAR|TP025822 P a g e 99 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
The above diagram shows that the security staff can monitor the respective tenants who are not in the building. The above report displays the user’s username who left the building and the start date and end date of their holiday from the building and the reason they left the building.
8.2. Sample Codes 8.2.1. Sample codes for Sign-up Feature
DINESH PRABAKAR|TP025822 P a g e 100 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 21: The sample codes for the sign-up function of the system
8.2.2. Sample Codes for Login Feature
DINESH PRABAKAR|TP025822 P a g e 101 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 22: The sample codes for user login feature
8.2.3. Sample Codes for Extracting User Logs Feature
DINESH PRABAKAR|TP025822 P a g e 102 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Diagram 23: The sample codes for user logs Chapter 9: System Validation 9.1.1. Login into the System No.
Test
DINESH PRABAKAR|TP025822 P a g e 103 | 119
Expected Result
Actual
RESIDENTIAL BUILDING SECURITY SYSTEM
Result 1. 2. 3. 4.
Enter
the invalid
username and
invalid
password Enter the invalid username and valid password Enter
the invalid
username and
invalid
password Enter the valid username and valid password
Access denied
As Expected
Access denied
As Expected
Access denied
As Expected
Access granted
As Expected
9.1.2. Visitor Management (Security Staff) No. 1. 2. 3.
4.
5.
Test
Expected Result
Submit a visitor entry form without Please fill in the required filling anything
blank area
Submit a form without entering expiry Please fill in the required time and expiry date
blank area
Submit a visitor profile form with Please fill in the required expiry date and without expiry time Submit a full completed visitor profile without snapping picture Submit a fully filled visitor profile with picture
blank area
Actual Result As Expected As Expected As Expected
Visitor profile sent to tenants and waiting for As Expected approval. Visitor profile sent to tenants and waiting for As Expected approval.
DINESH PRABAKAR|TP025822 P a g e 104 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
9.1.3. Fingerprint Access No. 1. 2. 3. 4.
Test
Actual
Expected Result
Result
Enter Username and Password for Access denied pls place Tenants to login
fingerprint for verification
Enter Username and Password for Access denied pls place security staff to login Enter
Username,
fingerprint for verification Password
and
fingerprint for security staff to login Enter
Username,
Password
and
fingerprint for tenants to login
As Expected As Expected
Welcome to Security Panel As Expected Welcome to Tenants Panel
As Expected
9.1.4. Holiday Management No.
Test
Expected Result
Actual Result
1.
Submit a form without filling anything
Access Denied
As Expected
2.
Submit a form without filling anything
3.
4. 3. 4. 5.
Leave the start date and end date empty
Saved
information
displays nothing Saved
records
don’t
display the exact time As Expected and date Saved
Submit with just the start date
records
display
only start date
Submit holiday entry form with only Certain certain information entered
information
submitted
Save a holiday entry form with only certain information entered
Access Denied
Submit a fully filled holiday entry Submission Done, can be form
As Expected
monitored in database
As Expected As Expected As Expected As Expected
9.1.5. Monitoring Records (Security Staff) No.
Test
Expected Result
DINESH PRABAKAR|TP025822 P a g e 105 | 119
Actual
RESIDENTIAL BUILDING SECURITY SYSTEM
Result 1.
Select monitor records.
Tenants/Holiday/Visitor
As Expected
records to be selected Displays the unit which the
2.
Selects Holiday Records
tenants left for Holiday As Expected with expiry date Displays the visitors who
3.
Selects Visitor List
is in the building, also logs of
who
has
left
the
As Expected
building Displays tenants last check 4.
Selects User logs
in and check out which is extracted
from
fingerprint device.
9.2. User Acceptance Test The use acceptance test is as below DINESH PRABAKAR|TP025822 P a g e 106 | 119
the
As Expected
RESIDENTIAL BUILDING SECURITY SYSTEM
Name: Date: Occupation: Activities:
1 – Very 2 - Poor
3 - Moderate
Poor Login
page/
Fingerprint Access Monitoring Records Visitor Management Holiday Management Comment from user:
Action taken by the developer:
DINESH PRABAKAR|TP025822 P a g e 107 | 119
4 - Good
5
–
Good
Very
RESIDENTIAL BUILDING SECURITY SYSTEM
Name: Date: Occupation: Activities:
1 – Very 2 - Poor
3 - Moderate
Poor Login
page/
Fingerprint Access Monitor Records Visitor Management Holiday Management
Comment from user:
Action taken by the developer:
DINESH PRABAKAR|TP025822 P a g e 108 | 119
4 - Good
5
–
Good
Very
RESIDENTIAL BUILDING SECURITY SYSTEM
Name: Date: Occupation: Activities:
1 – Very 2 - Poor
3 - Moderate
Poor Login
4 - Good
5
–
Very
Good
page/
Fingerprint Monitor Records Visitor Management Holiday Management
Comment from user:
Action taken by the developer:
Chapter 10: Conclusions and Reflections 10.1. Critical Evaluation In the final stage of the Residential Building Security System development the critical evaluation is performed to estimate the success of the Residential Building Security System DINESH PRABAKAR|TP025822 P a g e 109 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
based on the mentioned requirement. The completeness of the systems functionalities is one of the main criteria to be focused on in the Residential Building Security System in order to full fill the end user needs. Based on the user acceptance test which was conducted, the system can be evaluated as a success. This is because the Residential Building Security System managed to full-fill the satisfaction of majority testers. 10.2. System Benefits There are many beneficial results can be obtained by the users of the building security system. For instance, the number of security staff in the building can be reduced where the security staff does not have to guard each and every area of the building and can focus on monitoring the movement of the users through the system. The current manual system is not as efficient as the residential building security system, where this system knows who exactly is using the system, also monitors the visit of the visitors in the building. Besides that, for the user's usage of the system, needs a little training as they are not familiar with the new system. According to the user acceptance test majority of the tester accept the system functionality after the utilization of the system. Besides that, the residential building security system have been designed in a way where when the for the visitors to get access to the building, the security staff takes down their details including the picture of the visitors who is entering the building and the taken down information is customized into a visitor profile and sent to the tenants as confirmation. The visitors get into the building only if the tenants approve the visitors stay and all the information of the visitors is stored in the database where, the security staff can always monitor it for security purpose where here the integrity level of the building is increased. Besides that, the performance of this system can measured by checking the time taken for the visitor profile to be notified to tenants for approval. On the other hand, the benefit of the residential building security system can also said that with the system, security staff can also monitor the tenants unit who is outstation or not staying in the building at the moment by the holiday management profile. All the tenants who are leaving the building for outstation, work purpose and other reason can register themselves under the holiday management profile with the start date and end date of their absence and the security staff will monitor their respective unit. This makes the tenants feels safe during their time away from the building and eases the job of the security staff to always keep an eye on the empty units to make sure it is secured. DINESH PRABAKAR|TP025822 P a g e 110 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Moreover, the user interface of the system are user friendliness and the usability is well defined as mentioned at the starting phase. The flow of steps in multistep interfaces which is known as the navigation menu of the system will allow the user to choose the menu item that they want to go for next. Moreover, the workflow of the system is in appropriate flow where lead the user utilizes the system efficiently. In other hand, it means that residential building security system's user interface has design for leading the user to able to utilize the system comfortably. The usage of the fingerprint implementation is another benefit in the system. The fingerprint implementation increases the security and integrity of the building as the fingerprint implementation avoids the unauthorized access into the system and makes the building a safer space for the people. 10.3. Conclusion and Recommendations Briefly, the residential building security system provides a web-based platform for the tenants and security staff to perform their workload related to the building and the security of the building. In achieving the aim of the system, where the system aimed to allow the security staff to register visitor into the building, monitoring the visitor's access into the building, monitoring the users last in and out and also monitoring the empty units where the tenants left for holiday. In the conclusion the developer will discuss on the limitation of the developed system and future enhancement. Besides that, the developer's learning experience would also be explained during the project development. 10.4. Limitations and Future Enhancement The residential building security system has limitation, where based on the suggestions form the respondents which is gathered from the interview, questionnaire and the user acceptance testing. Crucial improvement that can be implemented into the system is by implementing the CCTV function. The CCTV implementation in the system would actually make the system more complete and also increase the security of the surroundings. Besides that, this function will also help the security force to guard the surrounding of the building from one place. Through the implementation of the CCTV also helps the security staff to monitor if there is crime happening and many more other activities around the building can be monitored. If there are professional crimes happening around the building, the implementation of CCTV can reduce such crimes.
DINESH PRABAKAR|TP025822 P a g e 111 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Besides that, one of the important feature that the developer did not manage to implement into the residential building security system is the lift access card with the RFID implementation. In today's world there are many assault, robbery and molest happening in the lift, as if the victim stuck in the lift they have nowhere to move and criminals can easily commit crime. Lift is one of the most vulnerable spot for crimes to take place. With the implementation of the lift card access, each tenants can only access the lift to their floor by scanning their card, which means ordinary person cannot get access to the lift. Each lift access card can only access to the registered unit level, facility level, and car park. Besides that, another crucial implementation which would have increased the security and also integrity of the system is the extension phone from the tenants unit to the guardhouse. The implementation of the extension phone would connect the tenants directly to the guardhouse. This means in the case where there is emergency the tenants are only supposed to pick up the phones which is installed in their respective units and the security staff will exactly know from where the call is coming and can take immediate action towards the emergency. The extension phone function improves and also upgrades the residential building security system.
DINESH PRABAKAR|TP025822 P a g e 112 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
10.5. Conclusion The process of brainstorming, planning and finally implementing a final year projects takes a lot of time and effort. This is because a developer cannot simply start programming a system without a proper planning, research, preparation and effort, with all these elements put together the aim of the project can be achieved. In-order to complete the system, the developer had to adopt a new programming language which the developer has no vast knowledge in it which is the C#. The programming language is learnt by the programmer by researching online sites such as the stack overflow, YouTube and other tutorial resources in order to learn how the .Net framework works. Besides the research done on the C# programming language, developer have also made research on residential buildings, where many residential buildings are facing more issues day by day. Each day there are different type of threats that brings the insecure and threatened feeling to the tenants and people who are occupying the building. This shows that without a proper system, the people who lives in the building can only pray for their safety. Besides that, by collecting information by the data collection method, which is the interview and questionnaire method assist the developer on what are really needed to complete the system in order to full fill the user needs. Moreover, the developer has learnt several processes for requirements planning, which was useful for the developer by getting know that during requirements planning phase few notable features were overlooked in that phase. To wrap things up, all the emphasis has been arranged according to specified in the final documentation as it could enhance the system's quality. The developer takes all the learnt experience as the support to enhance the developer's ability and procedure to much better to securing new information in future.
DINESH PRABAKAR|TP025822 P a g e 113 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
REFERENCES Anon., 2014. WHY ARE LITERATURE REVIEWS IMPORTANT?. [Online] Available at: http://www.researchproposalsforhealthprofessionals.com/why_are_literature_revi ews_impor.htm [Accessed 5 March 2016]. Beal, V., 2016. SSADM - Structured Systems Analysis and Design Method. [Online] Available at: http://www.webopedia.com/TERM/S/SSADM.html [Accessed 3 March 2016]. BusinessDictionary, 2016. questionnaire. [Online] Available at: http://www.businessdictionary.com/definition/questionnaire.html [Accessed 10 March 2016]. California, U. o. S., 2016. Organizing Your Social Sciences Research Paper: 5. The Literature Review. [Online] Available at: http://libguides.usc.edu/writingguide/literaturereview [Accessed 5 March 2016]. CaptainWow, 2015. How to create a fake ID - copy and modify your card. [Online] Available at: http://www.instructables.com/id/How-to-create-a-novelty-ID-copyand-modify-your-/ [Accessed 5 March 2016]. Clocking, E., 2016. What is Biometrics?. [Online] Available at: http://www.bioelectronix.com/what_is_biometrics.html [Accessed 5 March 2016]. Cohen, B., 2016. Advantages and Disadvantages of SSADM. [Online] Available at: http://www.ehow.com/list_6781448_advantages-disadvantagesssadm.html#close [Accessed 3 March 2016]. DatabaseJournal, 2016. Database Journal. [Online] Available at: http://www.databasejournal.com/features/mssql/article.php/3857466/Top-10Features-of-SQL-2008-R2.htm [Accessed 15 March 2016]. DeGrazio, W. C. a. R., 2016. Building Security: An Architect's Guide. [Online] Available at: http://cryptome.org/archsec.htm [Accessed 5 March 2016]. Dictionary, B., 2013. methodology. [Online] Available at: http://www.businessdictionary.com/definition/methodology.html [Accessed 3 March 2016]. Gonzalez, O. L., 2015. Code Project. [Online] Available at: http://www.codeproject.com/Articles/97590/A-Framework-in-C-for-
DINESH PRABAKAR|TP025822 P a g e 114 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Fingerprint-Verification [Accessed 15 March 2016]. ICC, 2015. THE CHALLENGES OF MANAGING A HIGH-RISE BUILDING: WHAT EVERY PROPERTY MANAGER NEEDS TO KNOW. [Online] Available at: http://www.iccpropertymanagement.com/the-challenges-ofmanaging-a-high-rise-building-what-every-property-manager-needs-to-know/ [Accessed 1 July 2016]. Krishnamraju, 2010. Advantages VS Disadvantages of C#. [Online] Available at: http://krishnamraju.jimdo.com/c-sharp/advantages-anddisadvantages/ [Accessed 27 February 2016]. llibweb, 2016. Introduction to Research. [Online] Available at: http://libweb.surrey.ac.uk/library/skills/Introduction%20to %20Research%20and%20Managing%20Information%20Leicester/page_51.htm [Accessed 10 March 2016]. Microsoft, 2015. What's New in Visual Studio 2015. [Online] Available at: https://msdn.microsoft.com/en-us/library/bb386063.aspx [Accessed 15 March 2016]. Microsoft, 2016. What's New in Visual Studio 2015. [Online] Available at: https://msdn.microsoft.com/en-us/library/bb386063.aspx [Accessed 15 March 2016]. mindcrafts, 2009. Rational Unified Process Models. [Online] Available at: http://www.mindcrafts.ch/dwcs4/english/IPMMethodologiesE.html [Accessed March 10 2016]. mmu.ac.uk, 2014. Information Systems. [Online] Available at: http://www2.docm.mmu.ac.uk/STAFF/M.Stanton/SAD/Tutorials/Lecture1.html [Accessed 6 March 2016]. Pirzada, U. T., 2009. Rational Unified Process. [Online] Available at: http://ovais.khan.tripod.com/papers/Rational_Unified_Process.pdf [Accessed 10 March 2016]. Portal, I. K., 2016. Software Development Methodologies. [Online] Available at: http://www.itinfo.am/eng/software-development-methodologies/ [Accessed 3 March 2016]. PVT., L. S., 2015. Building Management System. [Online] Available at: http://www.inetsyt.com/SecurityAndSafety.aspx [Accessed 5 March 2016]. Rouse, M., 2016. database management system (DBMS). [Online] Available at: http://searchsqlserver.techtarget.com/definition/databasemanagement-system [Accessed 15 March 2016].
DINESH PRABAKAR|TP025822 P a g e 115 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Rouse, M., 2016. searchsoftwarequality. [Online] Available at: http://searchsoftwarequality.techtarget.com/definition/unit-testing [Accessed 15 March 2016]. Rouse, M., 2016. searchsoftwarequality. [Online] Available at: http://searchsoftwarequality.techtarget.com/definition/integrationtesting [Accessed 16 March 2016]. Ryder, P., 2016. Buggy C# Code: The 10 Most Common Mistakes That C# Developers Make. [Online] Available at: https://www.toptal.com/c-sharp/top-10-mistakes-that-c-sharpprogrammers-make [Accessed 15 March 2016]. School, R. M., 2010. Requirements Management School. [Online] Available at: http://www.requirementsmanagementschool.com/w1/Requirements_Validation [Accessed 5 July 2016]. Strategies, C., 2014. Make Life easier with Integrated Building System. [Online] Available at: http://www.creative-strategies.be/make-life-easier-integratedbuilding-system/ [Accessed 5 March 2016]. Ta, D. T. L., 2004. ANAGING HIGH-RISE RESIDENTIAL BUILDING IN MALAYSIA. [Online] Available at: http://www.inspen.gov.my/inspen/v2/naprec/naprec6.pdf [Accessed 5 March 2016]. Technology, V. S. a., 2016. INTEGRATED SECURITY SYSTEMS (ISS). [Online] Available at: http://www.vertexsecurity.com/Integrated_Security_Systems/ [Accessed 5 March 2016]. TutorialsPoint, 2016. Tutorials Point. [Online] Available at: http://www.tutorialspoint.com/csharp/ [Accessed 5 March 2016]. Twente, U. o., 2016. Data Collection Methods. [Online] Available at: https://www.utwente.nl/igs/datalab/datacollection/methods/ [Accessed 10 March 2016]. UCAR, 2016. Software Engineering Assembly. [Online] Available at: https://sea.ucar.edu/best-practices/rup [Accessed 10 March 2016]. Utley, C., 2004. TechRepublic. [Online] Available at: http://www.techrepublic.com/article/why-you-should-move-to-c/ [Accessed 27 February 2016]. WhatIs.com, 2016. Search Window Server. [Online] Available at: http://searchwindowsserver.techtarget.com/definition/IIS [Accessed 15 March 2016].
DINESH PRABAKAR|TP025822 P a g e 116 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
Zetter, K., 2013. Researchers Hack Building Control System At Google Australia Office. [Online] Available at: http://www.wired.com/2013/05/googles-control-system-hacked/ [Accessed 5 March 2016].
APPENDIX Gantt Chart
DINESH PRABAKAR|TP025822 P a g e 117 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
DINESH PRABAKAR|TP025822 P a g e 118 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM
DINESH PRABAKAR|TP025822 P a g e 119 | 119