Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Prototype of Security System for Computing Department

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Fairuz Rauf, Ashri Abu Hassan, Khairul Annuar

Fairuz Rauf, Ashri Abu Hassan and Khairul Annuar. Prototype of Security System for Computing Department. International Journal of Computer Applications 183(19):43-45, August 2021. BibTeX

	author = {Fairuz Rauf and Ashri Abu Hassan and Khairul Annuar},
	title = {Prototype of Security System for Computing Department},
	journal = {International Journal of Computer Applications},
	issue_date = {August 2021},
	volume = {183},
	number = {19},
	month = {Aug},
	year = {2021},
	issn = {0975-8887},
	pages = {43-45},
	numpages = {3},
	url = {},
	doi = {10.5120/ijca2021921544},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The project purpose is the enhancing the security in computing department Universiti Selangor (Unisel) Bestari Jaya by installing security system of Internet provider (IP) camera. The system can make the computing department on safe hand. This system will be control by the security officer. If the camera detect any movement and it will recorded the area using the camera during odd hour or midnight and store the file into the file repository. The system can only be access by the head of the security officer to get the file if there is any issues arise because of the admin is the head of security officer. This system also will ease the security officer on their daily working hour. The method that has been use to develop this project is Rational Unified Process (RUP). It is the best methodology for developing a system. From analysing the system within the project scope and identify all the entities to design and program the system until finalise and make a beta testing before the system done perfectly. In addition, data collection method had been done by interviewing the head of security officer and the questionnaire to the staff and student in the computing department. As the result of the data collection, many respondent want the system security been install in the computing department and the process of report continue to develop to the next chapter. Finally, the developer design from system design to create an activity design, use case design and sequence design. The database design to figure out each entities that been use in the system. The last design is interface design for completing the system. It must be user friendly for the security officer easy handle the system for their daily working routine.


  1. Puiu, T. (2014). ZME Science: not exactly rocket science. How IP cameras work: the basics of modern surveillance. Retrieved December 10, 2017, from
  2. KLGadgetGuy. (2015). Sharp Cloud Smarthome Security System Review: Sophisticated yet Simple! - KLGadgetGuy. [online] Available at: [Accessed 4 Jan. 2018].
  3. Watson.z. (2017). Retrieved January 04, 2018, from
  4. ADT(2007). Retrieved January 04, 2018, from
  5. Deisman, W. (2003). CCTV: Literature Review and Bibliography. Retrieved January 04, 2018, from
  6. R. (2014). Advantages and Disadvantages of Using Security Cameras. Retrieved January 04, 2018, from
  7. Christensson, P. (2006). RUP Definition. Retrieved 2018, Jan 4, from
  8. Broadsword Security (2017). Retrieved January 04, 2018, from


Security system, IP camera, web based, notification.