CFP last date
20 May 2024
Reseach Article

Prototype of Security System for Computing Department

by Fairuz Rauf, Ashri Abu Hassan, Khairul Annuar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 19
Year of Publication: 2021
Authors: Fairuz Rauf, Ashri Abu Hassan, Khairul Annuar
10.5120/ijca2021921544

Fairuz Rauf, Ashri Abu Hassan, Khairul Annuar . Prototype of Security System for Computing Department. International Journal of Computer Applications. 183, 19 ( Aug 2021), 43-45. DOI=10.5120/ijca2021921544

@article{ 10.5120/ijca2021921544,
author = { Fairuz Rauf, Ashri Abu Hassan, Khairul Annuar },
title = { Prototype of Security System for Computing Department },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2021 },
volume = { 183 },
number = { 19 },
month = { Aug },
year = { 2021 },
issn = { 0975-8887 },
pages = { 43-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number19/32036-2021921544/ },
doi = { 10.5120/ijca2021921544 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:17:17.356225+05:30
%A Fairuz Rauf
%A Ashri Abu Hassan
%A Khairul Annuar
%T Prototype of Security System for Computing Department
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 19
%P 43-45
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The project purpose is the enhancing the security in computing department Universiti Selangor (Unisel) Bestari Jaya by installing security system of Internet provider (IP) camera. The system can make the computing department on safe hand. This system will be control by the security officer. If the camera detect any movement and it will recorded the area using the camera during odd hour or midnight and store the file into the file repository. The system can only be access by the head of the security officer to get the file if there is any issues arise because of the admin is the head of security officer. This system also will ease the security officer on their daily working hour. The method that has been use to develop this project is Rational Unified Process (RUP). It is the best methodology for developing a system. From analysing the system within the project scope and identify all the entities to design and program the system until finalise and make a beta testing before the system done perfectly. In addition, data collection method had been done by interviewing the head of security officer and the questionnaire to the staff and student in the computing department. As the result of the data collection, many respondent want the system security been install in the computing department and the process of report continue to develop to the next chapter. Finally, the developer design from system design to create an activity design, use case design and sequence design. The database design to figure out each entities that been use in the system. The last design is interface design for completing the system. It must be user friendly for the security officer easy handle the system for their daily working routine.

References
  1. Puiu, T. (2014). ZME Science: not exactly rocket science. How IP cameras work: the basics of modern surveillance. Retrieved December 10, 2017, from http://www.zmescience.com/tech/how-ip-cameras-work-the-basics-of-modern-surveillance/
  2. KLGadgetGuy. (2015). Sharp Cloud Smarthome Security System Review: Sophisticated yet Simple! - KLGadgetGuy. [online] Available at: https://klgadgetguy.com/2015/04/23/sharp-cloud-smarthome-security-system-review-sophisticated-yet-simple/ [Accessed 4 Jan. 2018].
  3. Watson.z. (2017). Retrieved January 04, 2018, from https://www.gearbest.com/blog/reviews/xiaomi-smart-ip-camera-review-good-personal-security-guard-1368
  4. ADT(2007). Retrieved January 04, 2018, from http://www.adtmalaysia.com/en/index.aspx?page=24hr-sec-monitor
  5. Deisman, W. (2003). CCTV: Literature Review and Bibliography. Retrieved January 04, 2018, from https://www.academia.edu/357626/CCTV_Literature_Review_and_Bibliography
  6. R. (2014). Advantages and Disadvantages of Using Security Cameras. Retrieved January 04, 2018, from https://www.a1securitycameras.com/blog/advantages-disadvantages-using-security-cameras/
  7. Christensson, P. (2006). RUP Definition. Retrieved 2018, Jan 4, from https://techterms.com
  8. Broadsword Security (2017). Retrieved January 04, 2018, from https://broadswordsecurity.com/the-benefits-of-using-a-cctv-system/
Index Terms

Computer Science
Information Sciences

Keywords

Security system IP camera web based notification.