Download - Chapter 1 5 apllied research ko sad

Transcript
Page 1: Chapter 1 5 apllied research ko sad

INTRODUCTION

Security plays a vital role for the safekeeping of lives and

properties. Whether inside or outside the house, in the mall, or almost

everywhere there is a security threat. The researcher wishes to elaborate

on the situation happended in a certain school in Cheachnea, Russia in

1991. There are some chaechnean rebels who hostage the entire school

and lead all the students to the gymnasium and what happended? They

burned the entire gymnasium where all the students inside.

The point of the researcher is that, security a campus, school,

university, and almost every entity needs security or a security system.

This is where the poroposal of the researcher comes in.

Security system computing a system that enforces boundaries

between computers networks an electrical device that sets off an alarm

when someone tries to break in. A professionally installed system

designed to detect intrusion or other hazard, including sensors, an alarm-

sounding device and communication device that reports conditions to an

alarm monitoring service.

Eulogio “Amang” Rodriguez Institute of Science and Technology

(EARIST) is one among the State College in the Philippines which is

situated in the heart of its capital, Manila. It has an estimated student

population of 10,000 students and 600 faculties and employees. As the

school population increases every year, the demand for more security is

imperative.

1

Page 2: Chapter 1 5 apllied research ko sad

The security level risk in a school such as Eulogio “Amang” Rodriguez

Institute of Science and Technology (EARIST) is very high. The

instrument used for the protection of the institution is composed of only a

recording CCTV camera and security personnel’s. The institution is still

exposed to other stimulated complication such as outsiders – students

from other schools or universities and out of school youth and visitors,

fire and intruders. Improving the system should be the number one

priority of the school to protect each persons and properties coming in

and out and of the school premises.

This research about the Eulogio “Amang” Rodriguez Institute of

Science and Technology Security System Project is an improvement of

the school’s existing security system. Whereas it uses a digital security

system with voice feature which can monitor room temperature, smoke,

motion, windows and doors. This research aim is too developed mainly

to respond to security issues at real time.

2

Page 3: Chapter 1 5 apllied research ko sad

BACKGROUND OF STUDY

Original house, school and office alarms worked by signaling a

‘local’ alarm when the system was triggered. This worked well so long as

people hearing the alarm responded to it. As security systems became

more common, the number of false alarms increased to such as degree

that many ‘local’ alarms began to go unnoticed and unreported. Intruders

also learnt how to disarm the system so could quickly and easily stop the

alarm. If you were relying on this for the safety of your property you

could be in trouble. Nowadays, many people use external alarm

monitoring centers to protect their property. Here, not only does a ‘local’

alarm sound but the alarm is also picked up by staff at the monitoring

center who will then respond accordingly.

When first invented, house, school and office alarms were

triggered by the release of a pressure button fitted into a door or window

frame. This basic alarm was fundamentally flawed as the entire intruder

needed to do to silence the alarm was to close the door or window.

Nowadays there are various systems on the market ranging from

inexpensive DIY alarms to highly sophisticated systems requiring

professional installation. All modern alarms are based on the same

foundation, the electric circuit which is completed either when the door is

opened or closed depending on the system you choose. The alarm is

triggered when the circuit is altered and will not be silenced until a code

is punched into the control panel. The most expensive and complicated

alarm systems might also involve a combination of motion sensors and

3

Page 4: Chapter 1 5 apllied research ko sad

pressure pads to ensure even the most cunning intruder doesn’t get his

hands on your treasures.

Unsurprisingly, house, school and office alarms have changed a lot over

the last century and no doubt will continue to improve as technological

knowledge expands. The market is filled with a wide range of systems

and companies offering a variety of deals. So whatever you want to

protect, and however much you have to spend there will be an alarm out

there to suit your needs.

The Eulogio “Amang” Rodriguez Institute of Science and

Technology was established after the liberation Manila in 1945. Eulogio

“Amang” Rodriguez Institute of Science and Technology (EARIST)

started as a Vocational High School with only a room at the second floor

of the Mapa High School, nine teachers, a clerk and 147 students. Only

July 1, 1946 , Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST) acquired its present site at Nagtahan Sampaloc,

Manila. Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST) is composed of only recording CCTV camera.

This kind of security system only records of what it is happening. But it

cannot aid or give solution if there is something wrong in the area.

The researcher proposed a newly security system that will improve

the security system Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST). This is a digital security system with voice

feature which can monitor room temperature, smoke, motion, and

windows and doors. The system is fully digital and also fully customized.

4

Page 5: Chapter 1 5 apllied research ko sad

It incorporated a 16x2 LCD display with a 4x4 keypad. Each sensor can

be enabled and disabled, and alarm frequency and skim can also be

chosen by users. It has also equipped a voice playback chip, and it will

speak which sensor has gone.

OBJECTIVE

The proponents, based on the initial research, have come up with

objectives to further study the situation.

A. General Objectives

The general objectives of this research are to develop and

construct a security system that will serve as a proposal to

improve the old security system of Eulogio “Amang”

Rodriguez Institute of Science and Technology (EARIST).

B. Specific Objectives

To provide a much effective security system that would

help them to secure the safetiness of every student and

employee.

To be able to determined if there is a hazardous accident.

To be able to create a effective security system that

would help them to monitor if there is a intruders.

To be able to protect each persons and properties coming

in and out of the school premises.

5

Page 6: Chapter 1 5 apllied research ko sad

CONCEPTUAL FRAMEWORK

FIGURE1. CONCEPTUAL PARADIGM

The figure presents the conceptual framework of the study. This

input will assist the researcher to gather some data regarding the research.

6

INPUT

Submit the

created

permission

letter with

regards to

project

design.

Give them a

copy of

questionnai

re to be

answer.

Visualize

the area of

the school.

PROCESS

Analyze and

interpret all

the data

gathered and

the answer to

the

questionnaire

.

Check the

school floor

plan.

OUTPUT

Improve the

security system

of EULOGIO

“AMANG”

RODRIGUEZ

INSTITUTE OF

SCIENCE ABD

TECHNOLOGY

(EARIST).

Acceptance of

the design.

Page 7: Chapter 1 5 apllied research ko sad

It will lead the researcher in additional knowledge about the proposed

research. This input will have the basic knowledge regarding the security

system.

In the process, this were the researcher analyze and interpret the

data and knowledge that the researcher attain.

The output of this research will be the acceptance of the design

after formulating the new security system of EULOGIO “AMANG”

RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY

(EARIST). The design will be highly recommended to applied and

enhance the security level of EULOGIO “AMANG” RODRIGUEZ

INSTITUTE OF SCIENCE AND TECHNOLOGY (EARIST).

STATEMENT OF THE PROBLEM

This research under taken to analyze and interpret the proposed

security system for Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST). Specifically the aims to answer the following

question.

1. What is the current assessment of the old Eulogio

“Amang” Rodriguez Institute of Science and Technology

(EARIST) security system?

2. How will this research help the school to improve their

security system?

3. What are he benefits of the newly proposed security

system?

7

Page 8: Chapter 1 5 apllied research ko sad

4. Is the newly proposed security is effective to secure the

protection of the school?

5. Is there any significant difference between the old

Eulogio “Amang” Rodriguez Institute of Science and

Technology (EARIST) security system and the newly

proposed security system?

SCOPE AND DELIMITATION

The newly proposed security system is an enhancement of an

existing security system of Eulogio “Amang” Rodriguez Institute of

Science and Technology (EARIST).

The proposed security system is system for monitoring the whole

school. It can monitor if there is a movement or an intruder in a room or

someone is trying to break-in. It can also detect smoke that may cause

fire that will cause a lot of damage in the school properties and lives of

every person in the school. This security system cans etec5t if there is

sudden change in temperature. It extremely simple design and

construction and adapted to pre-design for use in school, business or

house. This could be used as basis for similar studies that would be

conducted by other researcher.

Limitations of the Study

The proposed research is only focused in Eulogio “Amang”

Rodriguez Institute of Science and Technology (EARIST) for improving

their security system.

8

Page 9: Chapter 1 5 apllied research ko sad

SIGNIFICANCE OF THE STUDY

The researcher proposing a security system that will enhance the

old security system of Eulogio “Amang” Rodriguez Institute of Science

and Technology (EARIST); it will give significance particularly to the

following:

This research will benefit every student and employee in Eulogio

“Amang” Rodriguez Institute of Science and Technology (EARIST).

STUDENTS. They will be assured of their protection from hazardous

accidents, intruders; outsiders that will only cause them harm and

trouble.

SCHOOL AND EMPLOYEE. The proposed security system will help

them to monitor the school easily that will lessen their work and

save time.The proposed security system will assured that the

school will be safe from damage caused by hazardous accidents.

RESEARCHER. The researchers have developed their writing, analysis

and interpretation skills needed to make a good research about

security system.

FUTURE RESEARCHER. This will benefits other researcher who

wish to have similar studies as they can get background

information from the result of this study which will serve as

template to modify their research.

9

Page 10: Chapter 1 5 apllied research ko sad

HYPOTHESIS

The purpose of this research is to develop and create a security system

for Eulogio “Amang” Rodriguez Institute of Science and Technology

(EARIST) that could help them to monitor the school easily and to

determined whether there is any problem and intruders within the school

compound. Using a security system in the school, business, and

laboratory are very much useful to monitor and to aid easily if there is a

problem in the area. And it is also help to save much time and works.

Providing an effective security system will help to avoid hazardous

accidents and to protect the school from every person coming in and out

of the school.

Security system will benefit not only the employee/ employer of

the Eulogio “Amang” Rodriguez Institute of Science and Technology

(EARIST) but also the student.

Finally, the researcher found out that there is no significant

difference between the old security system of Eulogio “Amang”

Rodriguez Institute of Science and Technology (EARIST) and the newly

proposed security system.

10

Page 11: Chapter 1 5 apllied research ko sad

DEFINITION OF TERMS

Sensor - is a device that measures a physical quantity and converts it into

a signal which can be read by an observer or by an instrument.

Alarm - gives an audible or visual warning about a problem or condition.

Alarms have the capability of causing a fight-or-flight response in

humans; a person under this mindset will panic and either flee the

perceived danger or attempt to eliminate it, often ignoring rational

thought in either case. We can characterize a person in such a state as

"alarmed".

Digital - system is a data technology that uses discrete (discontinuous)

values. By contrast, non-digital (or analog) systems use a continuous

range of values to represent information. Although digital representations

are discrete, the information represented can be either discrete, such as

numbers, letters or icons, or continuous, such as sounds, images, and

other measurements of continuous systems.

The word digital comes from the same source as the word digit and

digitus (the Latin word for finger), as fingers are used for discrete

counting.

The word digital is most commonly used in computing and electronics,

especially where real-world information is converted to binary numeric

form as in digital audio and digital photography.

11

Page 12: Chapter 1 5 apllied research ko sad

Motion detector - is a device that contains a physical mechanism or

electronic sensor that quantifies motion that can be either integrated with

or connected to other devices that alert the user of the presence of a

moving object within the field of view. They form a vital component of

comprehensive security systems, for both homes and businesses.

Smoke detector - is a device that detects smoke, typically as an indicator

of fire. Commercial, industrial, and mass residential devices issue a

signal to a fire alarm system, while household detectors, known as smoke

alarms, generally issue a local audible and/or visual alarm from the

detector itself.

Smoke detectors are typically housed in a disk-shaped plastic enclosure

about 150 millimetres (6 in) in diameter and 25 millimetres (1 in) thick,

but the shape can vary by manufacturer or product line. Most smoke

detectors work either by optical detection (photoelectric) or by physical

process (ionization), while others use both detection methods to increase

sensitivity to smoke. Smoke detectors in large commercial, industrial,

and residential buildings are usually powered by a central fire alarm

system, which is powered by the building power with a battery backup.

However, in many single family detached and smaller multiple family

housings, a smoke alarm is often powered only by a single disposable

battery.

12

Page 13: Chapter 1 5 apllied research ko sad

Magnetic switch - A switching device consisting of three metallic

layers (a paramagnetic layer between two ferromagnetic layers), whose

action is based on electron spin and is controlled by a small magnetic

field. Also known as bipolar spin device; bipolar spin switch; magnetic

spin transistor; spin transistor; spin valve.

Temperature sensor - a thermometer (from the Greek '' (thermo)

meaning "warm" and meter'', "to measure") is a device that measures

temperature or temperature gradient using a variety of different

principles. A sensor that make it possible to measure temperature.

System - is a collection of elements or components that are organized for

a common purpose. The word sometimes describes the organization or

plan itself (and is similar in meaning to method, as in "I have my own

little system") and sometimes describes the parts in the system (as in

"computer system").

A computer system consists of hardware components that have been

carefully chosen so that they work well together and software

components or programs that run in the computer.

Flame detector - is a detector that uses optical sensors to detect flames.

Alarm Monitoring - Central-Station is a common term used to refer to a

company that provides services to monitor burglar, fire and residential

alarm systems. The central-station may also provide watchman and

supervisory services.

13

Page 14: Chapter 1 5 apllied research ko sad

Related Literature

Home security has become one of the top things people look for in

a property. Along with lot size, square footage, and location, the kind of

home security system a house has in place is now truly a deciding factor

for buyers. Due to this trend, having a security alarm is not only

important when living in a house, but when selling one, as well.

Security Alarm System Overkill

The demand for security alarm systems is increasing, and more and more

options are becoming available for residential use. While having more

options is certainly good news for homeowners, it can, at times, make it

difficult to find the right setup for your household.

When installing a security alarm system that is meant to protect your

family and possessions, it's easy to go overboard and end up with a

system that is intrusive (and, in turn, might not get used at all). Most

people do not require a fingerprint identification lock, but other forms of

keyless home entry might be a perfect fit. The best option for your home

should be a system that provides a significant amount of protection, but

doesn't interfere with the day-to-day life of your family.

14

Page 15: Chapter 1 5 apllied research ko sad

The Basic Security Alarm

A standard home security alarm is often a good fit for most households.

These systems generally include sensors on all the entry doors, some

motion activated outdoor lighting, sensors on windows that are

particularly easy to access, and, most importantly, a direct link to a

monitoring service. This type of security alarm system will be an

excellent deterrent for any would be intruders, but, at the same time, is

generally fairly easy for a family to adapt to.

Make sure you feel safe in your home! Use this link to

Install Security System

Security Alarm Benefits

Most would say that the biggest benefit of having a home security alarm

is the peace-of-mind that comes with it. When something goes wrong

(whether you are home or thousands of miles away on vacation),

knowing that a system is already in place and that your house has a direct

link to the proper authorities is very reassuring.

There may be immediate monetary benefits, as well. Having a security

alarm that is connected to a monitoring service can, in some situations,

lower homeowner's insurance payments up to 20%. Many monitoring

services will also offer a plan to monitor your home for fire, which some

insurance companies will also take into account when deducing your

premium. In every case, it will decrease the likelihood of losing money

due to burglary.

15

Page 16: Chapter 1 5 apllied research ko sad

Increase your Home's Resale Value

Along with presenting a clean home, there are many improvements that

can be made to a property that will increase its resale value. Adding on a

garage, finishing a basement, and remodeling a kitchen, while all good

ideas, can be rather costly endeavors. Landscaping a yard for security,

installing a home security alarm, and putting in outdoor lighting are much

less expensive projects. Despite the lower initial cost, prospective buyers

still look upon these kinds of home improvements as important additions

to the property they are viewing.

Wireless Home Security Alarm Systems – Advantages and

disadvantages

There is no doubt that wireless home alarm security systems are

becoming the preferred choice when it comes to alarms in the house. One

of the best advantages of this type of system is that it is very easy for do-

it-yourself installer. This is because you do not have the wiring all the

different components of the home security system to run. With a

wireless security system, there are few components, each of these

Components is very easy to install.

But that does not mean that these types of security systems are not

without flaws. For example, if you carefully plan it out, it is likely that

there are few places in the house that are not protected by the system to

be. The reason is simple – because the signals received by a primary

control unit if they are sent to a component that is out of reach, that

16

Page 17: Chapter 1 5 apllied research ko sad

component will not be good signals. Therefore, there is a greater

likelihood that your house will not be as safe as you might like.

There will, however, with the proper positioning of wireless sensor at

home, your home wireless network security alert system is as safe as –

if not more – as a system disk.

Some people think that the next is an advantage or a disadvantage.

Wireless systems are running on battery, no electricity. It can be seen as

an advantage, because If your electricity is cut you are sure that your

security system will continue to work. But if you forgot the batteries to

replace so your system is virtually useless.

The last advantage is wireless, and perhaps the most preferred by

consumers. In general, a wireless security system home alarm system is

less expensive than one that is difficult. If you are on a tight budget and

want to install by yourself, then a wireless system is probably the way

too. E 'preferable, especially in apartments or rental properties, because it

is easy to transport when you move.

In any case, it is important to understand both the advantages and

disadvantages of wireless security and home difficult. Use this question

in this article as a starting point for further research to make the right

choice for your home.

17

Page 18: Chapter 1 5 apllied research ko sad

Foreign Study

Houston Home Security: Make Installing a Home Alarm Your New

Year Resolution!

Everyone knows the tradition of making New Year Resolutions.

We all make plans for improving ourselves; but no matter how great our

intentions, we more than likely will fall short of our goals. Most of these

plan are for worthy, but perhaps a bit superficial ideals like losing weight,

becoming organized or learning a new language. There is one resolution,

however, that can make a real difference in the safety of your family:

assessing your Houston home security. Installing a home alarm in your

Houston home may mean protecting your property and your loved ones

against dangerous intruders. A security systems company in Houston

should be able to help you plan out the following steps towards reaching

a goal of a safer home in the new year:1.Do your own safety assessment.

It doesn’t take a professional to notice aspects of your property that could

use more attention to security. Do you have bushes that hide your doors

and windows? Are your exterior doors solid? Do all of your windows

lock? Is your property well-lighted? Some of these problems can be

addressed on your own, prior to contacting a Houston home alarm

company. Once the security professionals come to your home, they may

18

Page 19: Chapter 1 5 apllied research ko sad

also have additional suggestions for improving the security of the

property. 2. Contact a Houston home security firm. Your next New Year

Resolution should be to develop a business relationship with a Houston

security systems company, preferably a firm that has a solid history of

customer satisfaction. Let the staff at that company know that you are

looking to make some real changes to your home security and that you

are open to learning about all of the products and services they have to

offer. Do not hesitate to let them know exactly what you are looking for

and how much you are willing to spend on your Houston home alarm. A

quality company should provide such benefits as free professional

installation and additional alarm keypads.3.Invest in a monitored alarm

system. Your home alarm is only as good as the quality of the

monitoring. It is best to look for a company that provides round the clock

monitoring at a monthly rate, because you don’t want to have gaps in

your coverage. Ask your alarm company if they also offer such security

features as fire monitoring, because the convenience of adding that to

your system makes it worthwhile to do so. Finally, do due diligence in

your research as you locate a Houston home security that offers you as

much value as it does quality. Safeguard Home Security offers our

customers excellent customer service by experienced, licensed home

alarm professionals.

You wish to keep your family safe from accidents, fires, and other

difficulties, and then ADT security systems will be an outstanding

choice. Real residential security begins with a proper security set-up,

19

Page 20: Chapter 1 5 apllied research ko sad

which is precisely what ADT offers. Protection services that families get

the best home security possible and ADT security up a wide array of

home security.

Perhaps the single most popular service offered by ADT security

system is their home preservation service. ADT Security Systems alerts

homeowners of intruders using cutting edge technology.

Unlike its competitors, ADT security systems services don’t utilize

any wires in their alarm systems. The ADT security systems have also

added one other cutting-edge feature to their home security system, these

are heat sensors. The security system sensors by ADT are extremely

advanced, as they have the capability to differentiate between a stray

animal entering the house and a thief.

That keeps families completely safe and secure aside from the

above features, ADT security systems also offer additional services.

Their fire and carbon monoxide sensors are extremely vital services that

can be counted upon in case fire-related problems occur. These sensors

easily detect an intruder so the family can escape to safety while the ADT

Security Systems calls the authorities.

ADT security systems do even more. ADT security systems can

also deliver security while on the road besides providing hone security.

People at home can easily locate relatives who are running late via the

GPS devices. Whether they’re at home or away from it, with ADT

security systems, people are assured of safety.

20

Page 21: Chapter 1 5 apllied research ko sad

Security System

Problem:     There was a need in the self storage industry to be able to

monitor when a particular unit was open. Since most self storage units do

not allow access to the owner/management for installing new

wiring/equipment, the system to be developed needed to be able to be

deployed without adding any new wiring to the facility and had to be

capable or being installed without entering the individual units.

Solution:     Group Alpha developed a unique door sensor that would

sensor the relative position of a particular door and send back that door's

position via a RF link to a controller that would send out alerts to a PC

application based on changes in state.The sensors needed to be very low

powered since they are battery powered and had to be very low cost

because the number of doors within a particular installation could reach

several thousand. A set of gateway/repeaters were also developed. These

units are distributed throughout the storage facility allowing the RF

signals to be relayed via power line communications to the main

controller. This allows the entire system to be installed within any

proprietary wiring except the single cable that connects the main

controller to the PC. This system illustrates the diverse communications

technologies that Group Alpha can bring to bear to solve a particular

engineering problem.

When considering different home security systems, it would pay to

know the home security system ratings for different ones and one such

21

Page 22: Chapter 1 5 apllied research ko sad

one is Brinks Security which has a number of advantages and also a few

disadvantages. To begin with, you should learn more about what the

company is all about if you want to be able to evaluate the home security

system ratings for it and after much looking about you may find that

Brinks began operation in 1859 when it began to provide different

security services for various companies and which has since expanded to

cater to as many as a million customers in the US thanks to the trust that

it has built into its product name.

Various Aspects That Need To Be Considered

There are various aspects to the Brinks home security systems

including its monitoring capabilities, price, installation and also handling

of problems that you would want to know more about and thus may need

to view the home security system ratings for this company in each of

these regards. The first piece of information that you need to consider is

what the whole package is going to cost you and this will play an

important part in how you evaluate the home security system ratings for

Brinks Security home security systems, which with all the bells and

whistles may total up to three hundred and twenty dollars plus taxes,

which according to user’s home security system ratings amounted to just

fair and no more.

Another aspect of the Brinks Security home security system that

readers will want to know about and for which home security system

ratings are required includes the monitoring abilities of this system,

22

Page 23: Chapter 1 5 apllied research ko sad

which it must be said are good and thus deserve high home security

system ratings. You can be sure that the monitoring response in case of a

break in is very good and even though you will need to pay an extra

thirty odd dollars for the monitoring service, it is money well spent and

this is reflected in its high home security system ratings given to this

product.

Next, you will need to find what the home security system ratings

as far as installing the system are and you may be surprised to learn just

how many technicians can be involved in the whole exercise and how

long it can take to complete all the drilling, wiring and cabling of the

home. Despite all these inconveniencies the Brinks Security gets good

home security system ratings for installation and the staff was friendly

and was able to answer all questions satisfactorily.

Once you have got the home security system ratings for the

different aspects to using Brinks Security systems, you should be able to

decide whether to go ahead and use it or not.

Local Study

I have a very special reason for starting this article, its simple It

became abundantly clear during my last visit that security is one of the

major considerations when living full time in the Philippines.

I have to say in all the visits I have ever made to the Philippines I have

yet to become the victim of a crime, that is not to say that crime doesnt

23

Page 24: Chapter 1 5 apllied research ko sad

happen in my home country, wow, it happens everywhere in the world,

why some areas of London, I would never drive around with my doors

not locked, secondly, I have friend who drive around certain districts

with a cost in their car, (Iron bar resembling a steel baton) interestingly,

they don’t drive around with a hand gun, I will come onto this later.

( Handguns represent a mandatory 5 year prison term if caught with

them).

I want to share some of my recent experiences with you all, and as

usual I am very much interested in your own experiences including your

views on some of my writings.

So here goes, I was under the impression, that it was mainly

foreigners who were very security conscious, hmmm that was a totally

wrong assertion, I had the good fortune to visit the son of my wife former

employer, he lives in a security gated compound within a sub division,

the gates are locked at all times, they have 7 foot high barbed wire, or

walls with casual glass pieces stuck into the cement, these it appears are

to prevent people scaling the walls to gain entry.

I spoke to my friend about security for me in the Philippines, his

replies kind of shocked me, remembering whilst I might have a house in

the Philippines, and the house does have high walls with security bars, I

have never had to live in a house with the level of security my friend was

suggesting was required.

24

Page 25: Chapter 1 5 apllied research ko sad

He told me firstly, in your home you should have personal

protection, so I butted in and suggested perhaps a mace or chemical spray

maybe an intruder alarm system, such as we have back here in UK,

maybe an alarm over the telephone system, connected to Police HQ, that

brought a few laughs from him.

“No he said, you need a good weapon in the house, or 2 or 3 if you can,”

I was a little startled by this, since I was trained in certain weapons but

had not fired a shot since the 80′s, I know in certain States in the U.S.A.

its quite acceptable to have a gun at home, and in certain states, my

experience of this was when I was in Nevada, its acceptable to shoot an

intruder on your property.

Sadly, we cannot do that in the UK, in fact if you shot the intruder, you

would be the one most likely charged with armed assault, and if the

intruder died, charged with murder, yes the rules for intruders in our

country are hard for some to understand, you may be accused of violating

his civil rights amongst a string of other things, so shooting someone in

your house is not a good idea.

Going back to my freind – he told me that its acceptable if you have a

permit to own a hand gun, or rifle, or automatic rifle in your home,

provided its for home protection, he even went on to say that he is

allowed to transport the weapons, and that he can fire them under

controlled conditions, what he didnt tell me, that when we arrived at our

destination at his Fathers mountain resort, is that he was actually carrying

25

Page 26: Chapter 1 5 apllied research ko sad

a loaded weapon in his pocket, I have to say at first sight I was shocked

to find that he had a Berreta handgun, with 13 rounds of ammo in a

magazine in his pocket.

I questioned my freind further, “Why do you have this semi

automatic pistol in your pocket I asked” well Pete its really for our

protection, we don’t know who we will encounter up here, the

Philippines is very poor, there are some desperate people here, and its

better to have protection than not all”, I also went on to say that I did not

believe in having guns in the house, I saw no need for it, my friend said ”

I suggest you obtain one in your wife name, keep it in your house, you

can draw it if required, as long as someone is breaking into your lot or

house, you have a right to shoot them to prevent them if your life is

threatened.”

I asked my wife about this, since it had never been discussed

before, my wife confirmed what my friend had said, although she did not

like the idea of a weapon in the house any more than I did.

He also then went on to show me the holes in the side of the house

walls, they were placed there to put the barrel of their guns through

should armed intruders attack the house, was I in dreamland?? is this the

Philippines, why had I not seen any violence of this type, I see guards all

the time at the banks, they all have 12 bore shotguns, some with M16

automatic rifles, on the Ferry to Ilo Ilo, I see guards with weapons,

automatic rifles, and yet it hadn’t really sunk in.

26

Page 27: Chapter 1 5 apllied research ko sad

The 2nd experience was at the Husband of my wife’s Doctor

friend, I discussed the level of personal security in the Philippines with

him, his reply astounded me even further, ” Yes I have a gun, actually I

have about 20 different guns, would you like to come and see them ?”

I asked why there was a need for so many guns. he said, that even

for Filipinos its dangerous in this country, you need lots of protection, he

said, in my house and lot, I have over 20 dogs in the grounds, naturally

he had a big lot, but about 20 dogs, i have 3 Akita Japanese guard dogs,

and 4 German Shepherds, the rest are a selection of other dogs, why so

many I asked?

Keep out undesirables he said, at night, I let all the dogs out, they

keep a visible prescience at night, after that, I have 3 boys in the lot,

looking after the dogs, and keeping an eye on things, after that, I have 2

semi automatic rifles at strategic points, and 2 handguns at others,…..is

this the Philippines ?

Wake me up somebody because I felt that hearing the 2

experiences led me to believe that this is over stretching personal security

a little bit, or is it? remembering I am a foreigner, these people are natural

born Filipinos living in their own country, who knows the situation better

than they do, and yet I have not heard any experiences about security

issues involving foreigners, I know that Bob has remarked very often that

Davao City is a very safe city, and he has always said how safe he feels

27

Page 28: Chapter 1 5 apllied research ko sad

there, I have no reason to disbelieve him, or any other reader who says

they feel safe in their city of occupation.

I can only now refer to my final experience, a couple of weeks ago,

I accompanied my wife to the downtown plaza area of Bacolod City, she

wanted to have some photos developed, in the car I was driving, my wife

said to me ‘Now empty your pockets honey, give me your wallet, and

where is your credit cards, give them to me, do you have any money, oh

yes, fine give that to me too.

Make sure your pockets are empty, when you come with me, you

are a target for snatchers, and robbers, when we arrived in the plaza mart,

I remarked to the cashier about the security problem in the area, the

young lady said, Sir its quite safe here for you, my wife over heard the

conversation and said in English, don’t tell me husband that, you know

its not safe, there are pickpockets, thieves and robbers here, she said I

myself was robbed the last time I was down here, so don’t tell him that,

he has to know its not safe here, and with that we paid and promptly left.

So how about personal security, some of you will tell me you have

never felt unsafe, maybe there are some of you who have had bad

experiences, I know all will be different, what about guns ? How do you

feel about owning and keeping one?

Recently I was taken to a firing range in Negros and given light

weapons training on the Biretta hand gun, the Browning Automatic and

M14 and M16 Semi Automatic Weapons, I had a great day out with some

28

Page 29: Chapter 1 5 apllied research ko sad

friends, but it also brought home to me and reminded me just how

dangerous guns are.

Some of you won’t feel comfortable with it, and if you had to draw

your gun to defend yourself, could you do it? What if there was a

discharge enquiry by the Police if your discharged your gun in such an

incident, how would it go down for you if you are a foreigner?

These and many other questions need to be discussed, I hope to hear all

your viewpoints on this, and look forward to reading your replies.

29

Page 30: Chapter 1 5 apllied research ko sad

Research Methodology

A. Research Design

What is Descriptive Research?

This research is the most commonly used and the basic reason for

carrying out descriptive research is to identify the cause of something

that is happening.  For instance, this research could be use in order to find

out what age group is buying a particular brand of cola, whether a

company’s market share differs between geographical regions or to

discover how many competitors a company has in their marketplace.

Descriptive research, also known as statistical research, describes

data and characteristic about the population or phenomenon being

studied. Descriptive research answers the questions who, what, where,

when and how.

This type of research is also a grouping that includes many

particular research methodologies and procedures, such as observations,

surveys, self-reports, and tests. The four parameters of research will help

30

Page 31: Chapter 1 5 apllied research ko sad

us understand how descriptive research in general is similar to, and

different from, other types of research.

Descriptive research is use to obtain information concerning the

current status of the phenomena to describe "what exists" with respect to

variables or conditions in a situation. The methods involved range from

the survey which describes the status quo, the correlation study which

investigates the relationship between variables, to developmental studies

which seek to determine changes over time.

B. Research Locale

Eulogio "Amang" Rodriguez Institute of Science and Technology

(EARIST) was established after the liberation of Manila in 1945.

EARIST traces back its development from that of a vocational high

school with only a room at the second floor of the Mapa High School,

nine teachers, a clerk, and 147 students under Mr. Pantaleon Regala, its

principal. Its former name was Eulogio Rodriguez Vocational High

School (ERVHS). EARIST growth and development were made possible

via three Republic Acts and Presidential Decree, to wit: Republic Act

4072, jointly sponsored by Congressman Ramon D. Bagatsing and Salih

Ututalum in 1964, authorized the establishment of the Technical

Education Department without changing the name of the school. It was

headed by a Vocational Director. Republic Act 5088, sponsored by

Congressman Sergio Loyola in 1967, authorized the renaming of ERVHS

31

Page 32: Chapter 1 5 apllied research ko sad

to Eulogio "Amang" Rodriguez Memorial School of Arts and Trades

(EARMSAT) and signaled its separation from the Division of City

Schools, Manila. It was headed by a Superintendent Republic Act 6595,

sponsored by Congressman Joaquin R. Roces in 1972, converted

EARMSAT to EARIST with a President as its head. This made EARIST

into a full-pledged college and authorized the establishment of

vocational-technical school branches in each congressional district of

Manila. Presidential Decree 1524, signed by President Ferdinand E.

Marcos on June 11, 1978, converted EARIST into a chartered state

college with a Board of Trustees as its governing body and Dr. Hilario G.

Nudas, as its first College President. Eulogio "Amang" Rodriguez

Institute of Science and Technology.

C. Samples and Sampling Technique Used

EARIST employs almost a thousand of employees including faculties.

The researcher have confined the research to 50 sampling sized only to

be distributed with the following colleges and offices: College of

Engineering, College of Business and Public Administration, College of

Education, College of Arts and Sciences, College of International and

Hospitality Management, College of Industrial Technology, and College

of Architecture and Fine Arts. Administrative Office, Registrar’s Office,

Office of the President and Vice President for Academic Affairs, Office

of the Director for Research and Instruction and Office of the Director for

Extension. The reason why the researcher uses the 50 sampling size is

32

Page 33: Chapter 1 5 apllied research ko sad

because the researcher will just distribute the survey questionnaires to

member of the faculty and every student in the school.

D. Instruments

The instrument that the researcher will be using in conducting and

developing this research is Survey Questionnaire. As par as this

instrument is concern, it’s very easy for the researcher to get the pulse,

views, ideals, and reactions of EARIST population.

SURVEY QUESTIONNAIRES

Name________________________________________Course_________________ Department_________________Position_______________________

Part 1 ProfileAge: 16-20 years old Gender:

21-25years old Male:

26-30 years old Female:

31-35 years old

36 and up

Knowledge in Security system:

Advance

Moderate

Knowledgeable

New

Part 2 Improvement of the old security system of EULOGIO”AMANG” RODRIGUEZ INSTITUTE OF SCIENCE AND TECHNOLOGY:

Check the appropriate box, which you believe applicable to the given variables.

Rate Verbal Interpretation Range

33

Page 34: Chapter 1 5 apllied research ko sad

5 Strongly Agree 4.6 – 5.0

4 Agree 3.6 – 4.5

3 Uncertain 2.6 – 3.5

2 Disagree 1.6 – 2.5

1 Strongly Disagree 1.0 – 1.5

A. The current assessment of the EARIST security system. 5 4 3 2 11. The security system the EARIST has a loop hole2. It only uses CCTV Camera3. The system only records in-coming and out-coming people4. Check on all the vehicles going in-out of the institution5. Cannot determine actual incidents inside or outside school properties B. Improvement of the school security system. 5 4 3 2 11. Knowledge in improving the security system2. Appropriate security system is needed3. On the spot monitoring of all activities inside the school premises4. Awareness about the safety guidelines5. Knowledge in terms of possible event if the security system is not effective C. The Benefits of newly proposed security system. 5 4 3 2 11. Digital security system2. Save work and time3. Give convenience in monitoring the whole school4. On the report5. Real –time events D. Effectiveness in terms of protecting the school. 5 4 3 2 11. Monitor accidents/ incidents2. Monitor all the students coming in-out of the school3. Monitor employees and faculty4. Monitor the school designated area5. Valuable things inside the school will be properly monitored E. There is no significant difference between the old and new system.

34

Page 35: Chapter 1 5 apllied research ko sad

_______________ Signature

E. Statistical Treatment of DataThe information gathered were tabulated and processed manually

and with the aid of computer to determine the precise interpretation of the

results. Matrix tables were made to organize, summarize, and analyze the

data gathered for easy determination of its difference from each other.

Data were collated, tabulated, and analyzed. The following

statistical tools were used in the analysis of data:

1. Percentage

The measure of dominant quantity was utilized to determine

the most probable scenario. The formula of percentage is as

follows:

F

P = -------

N

Where P = Percentage (%)

F = Frequency

N = Total Number of Population

35

Page 36: Chapter 1 5 apllied research ko sad

2. The responses to questions in the given variables were scaled using

the “five-point-scale” or Likert Scale system and given weight as

follows:

Rate Verbal Interpretation Range

5 Strongly Agree 4.6 – 5.0

4 Agree 3.6 – 4.5

3 Moderately Agree 2.6 – 3.5

2 Disagree 1.6 – 2.5

1 Strongly Disagree 1.0 – 1.5

3. The process of finding the “Weighted Mean,” which is referred to

as the central tendency was used, The formula is given below:

(wx)

= ------

N

Where: X = weighted mean

w = weighted factor

= sum of

N = total number of respondents

x = score

36

Page 37: Chapter 1 5 apllied research ko sad

To test the level of significance between the assessments of the

respondents the Chi-Square were employed to determine the relationship

of factors as given.

The formula of chi-square is presented as follows:

2

(fo ) - ( fe )

X2 = --------------

fe

Where: X = Chi – Square

fo = Observed Frequency

fe = Expected Frequency

4. Degree of Freedom

Estimates of statistical parameters can be based upon different

amounts of information or data. The number of independent pieces of

information that go into the estimate of a parameter is called the

degrees of freedom (df). In general, the degrees of freedom of an

estimate is equal to the number of independent scores that go into the

estimate minus the number of parameters estimated as intermediate

steps in the estimation of the parameter itself (which, in sample

variance, is one, since the sample mean is the only intermediate step).

Df = (r-1) (c-1)

Where: df = degrees of freedom

37

Page 38: Chapter 1 5 apllied research ko sad

R = row

C = coloumn

PRESENTATION, ANALYSIS AND

INTERPRETATION OF DATA

Table 1.1 Frequencies and Percentage Distribution on the Age of the RespondentsOptions Frequency Percent Rank16-20 years old 13 26% Rank 3rd

21-25 years old 22 44% Rank 1st

26-30 years old 15 30% Rank 2nd

31-35 years old 0 0%

36yrs. and above 0 0%

Total 50 100%

Table 1.1 presents the frequency and percentage distribution on

the age of the respondents. 13 or 26% of the respondents aged 18-20

years old, 22 or 44% of the respondents aged 21-25 years old, 15 or

30% of the respondents aged 26-30 years old, 0 of the respondents aged

31-35 years old and lastly 0 of the respondent aged 36 years and above.

Table 1.2 Frequencies and Percentage Distribution on the Gender of the Respondents.Options Frequency Percent Rank

Male 19 38% Rank 2nd

Female 31 62% Rank 1st

Total 50 100%

38

Page 39: Chapter 1 5 apllied research ko sad

Table 1.2 represents the frequency and percentage distribution on

the gender of the respondents. 19 or 38% respondents are male while 31

or 62% are female.

Table 1.3 Frequencies and Percentage Distribution on the familiarity in security ststem.Options Frequency Percent Rank

Advance 7 14% Rank 3rd

Moderate 22 44% Rank 1st

Knowledgeable 12 24% Rank 2nd

New 9 18% Rank 4th

Total 50 100%

Table 1.3 represents the frequency and percentage distribution on

the familiarity in security system. 7 or 14% respondents is advance in

familiarity in security system, 22 or 44% respondents is moderate in

familiarity of security system, 12 or 24% respondents is knowledgeable

in familiarity of security system, 9 or 18% respondents is new in

familiarity of security system.

39

Rate Verbal Interpretation Range

5 Strongly Agree 4.6 –5.0

4 Agree 3.6 –4.5

3 Moderately Agree 2.6 –3.5

2 Disagree 1.6 –2.5

1 Strongly Disagree 1.0 –1.5

Page 40: Chapter 1 5 apllied research ko sad

Table 2.1 Frequency and Percentage Distribution the current assessment of the EARIST security system.

2.1.1 The security system the EARIST has a loop hole.Options Frequency Percent Rank

5(strongly agree) 17 34% Rank 2nd

4(agree) 23 46% Rank 1st

3(uncertain) 9 18% Rank 3rd

2(disagree) 1 2% Rank 4th

Total 50 100%

Table 2.1.1 represents the frequency and percentage distribution.

17 or 34% stated that they are strongly agreed that the security system

of EARIST has a loop hole. 23 or 46% agree, 9 or 18% stated that they

are uncertain, 1 or 2% stated they are disagree and none (0) respondent

is strongly disagree.

2.1.2 It only uses CCTV Camera.Options Frequency Percent Rank

5(strongly agree) 15 30% Rank 2nd

4(agree) 19 38% Rank 1st

3(uncertain) 13 26% Rank 3rd

2(disagree) 2 4% Rank 4th

1(strongly disagree) 1 2% Rank 5th

Total 50 100%

40

Page 41: Chapter 1 5 apllied research ko sad

Table 2.1.2 represents the frequency and percentage distribution

on that the EARIST only uses CCTV camera. 15 or 30% stated that they

are strongly agreed. 19 or 38% stated agreeing. 13 or 26% stated that

they are uncertain affected, 2 or 4% are disagreeing and 1 or 2%

respondent stated that they strongly disagree.

2.1.3. The system only records in-coming and out-coming people.Options Frequency Percent Rank

5(strongly agree) 19 38 Rank 2nd

4(agree) 22 44% Rank 1st

3(uncertain) 9 18% Rank 3rd

Total 50 100%

Table 2.1.3 represents the frequency and percentage distribution

on the system only records in-coming and out-coming people. 19or 38%

stated that they are strongly agreed. 22 or 44% stated are agreeing. 9 or

18% stated that they are uncertain affected, none respondents stated

agree strongly disagree.

2.1.4 Check on all the vehicles going in-out of the institution.Options Frequency Percent Rank

5(strongly agree) 25 50% Rank 1st

4(agree) 17 34% Rank 2nd

3(uncertain) 7 14% Rank 3rd

2(disagree) 1 2% Rank 4th

Total 50 100%

Table 2.1.4 represents the frequency and percentage distribution

on checking on all the vehicles going in-out of the institution .25 or 50%

stated that they are strongly agreed. 17 or 34% respondents are

41

Page 42: Chapter 1 5 apllied research ko sad

agreeing. 7 or 14 stated that they are uncertain affected, 1 or 2% stated

disagree and none (0) respondent stated that they are strongly disagree.

2.1.5 Cannot determine actual incidents inside or outside school properties.Options Frequency Percent W.M Rank5(strongly agree) 20 40% 4.42 Rank 2nd

4(agree) 22 44% 4.2 Rank 1st

3(uncertain) 6 12% 4.4 Rank 3rd

2(disagree) 2 4% 4.24 Rank 4th

1(strongly disagree) 0 0 4.34

Total 50 100%

Table 2.1.5 represents the frequency and percentage distribution

on cannot determine actual incidents inside or outside school

properties.20 or 40% stated that they are strongly agreed. 22 or 44%

are stated agree. 6 or 12% stated that they are uncertain affected and 2

or 4% are stated disagree. And none (0) respondents stated in strongly

disagree.

Table 2.2 Improvement of the school security system.

2.2.1. Knowledge in improving the security systemOptions Frequency Percent Rank

5(strongly agree) 17 34% Rank 2nd

4(agree) 27 54% Rank 1st

3(uncertain) 6 12% Rank 3rd

Total 50 100%

Table 2.2.1 represents the frequency and percentage distribution.

17 or 34% stated that they are strongly agreed to trap mice

automatically. 27 or 54% respondents agree, 6 or 12% stated that they

42

Page 43: Chapter 1 5 apllied research ko sad

are uncertain, and none respondents stated that they are disagree and

strongly disagree.

2.2.2 Appropriate security system is needed.Options Frequency Percent Rank

5(strongly agree) 27 54% Rank 1st

4(agree) 14 28% Rank 2nd

3(uncertain) 8 16% Rank 3rd

Total 50 100%

Table 2.2.2 represents the frequency and percentage distribution.

27 or 54% stated that they are strongly agreed.14 or 28% agree, 8 or

16% stated that they are uncertain and none (0) respondent is

disagreeing and strongly disagree.

2.2.3 On the spot monitoring of all activities inside the school premises.Options Frequency Percent Rank

5(strongly agree) 28 56% Rank 1st

4(agree) 19 38% Rank 2nd

3(uncertain) 3 6% Rank 3rd

Total 50 100%

Table 2.2.3 represents the frequency and percentage distribution.

28 or 56% stated that they are strongly agreed that it can monitor all

activities inside the school premises. 19 or 38% stated agree and 3 or

6% sated uncertain and none respondents disagree and strongly

disagree.

2.2.4 Awareness about the safety guidelines.Options Frequency Percent Rank5(strongly agree) 32 64% Rank 1st

4(agree) 15 30% Rank 2nd

43

Page 44: Chapter 1 5 apllied research ko sad

3(uncertain) 3 6% Rank 3rd

Total 50 100%

Table 2.2.4 represents the frequency and percentage distribution.

32 or 64% stated that they are strongly agreed that it should be aware

about the safety guidelines. 15 or 30% agree, 3 or 6% stated that they

are uncertain, and none (0) respondent is disagree and strongly agree.

2.2.5 Knowledge in terms of possible event if the security system is not effective.Options Frequency Percent Rank

5(strongly agree) 29 58% Rank 1st

4(agree) 14 28% Rank 2nd

3(uncertain) 6 12% Rank 3rd

1 (disagree) 1 2% Rank 4th

Total 50 100%

Table 2.2.5 represents the frequency and percentage distribution.

29or 58% stated that they are strongly agreed that it is effective in

terms of possible events if the security system is not effective. 14 or 28%

agree, 6 or 12% stated that they are uncertain, 1 or 2% disagree and

none (0) respondent stated strongly disagree.

Table 2.3 The Benefits of newly proposed security system.

2.3.1 Digital security systemOptions Frequency Percent Rank

5(strongly agree) 28 56% Rank 1st

4(agree) 17 34% Rank 2nd

3(uncertain) 4 8% Rank 3rd

1(strongly agree) 1 2% Rank 4th

44

Page 45: Chapter 1 5 apllied research ko sad

Total 50 100%

Table 2.3.1 represents the frequency and percentage distribution.

28 or 56% stated that they are strongly agreed that one of the benefits

of the newly proposed security system is digital security system. 17 or

34% stated agree, 4 or 8% stated that they are uncertain and 1 or 2%

stated that they are strongly agreed and none (0) stated that they are

strongly disagreeing.

2.3.2 Save work and time.Options Frequency Percent Rank

5(strongly agree) 20 40% Rank 2nd

4(agree) 21 42% Rank 1st

3(uncertain) 8 16% Rank 3rd

2(disagree) 1 2% Rank 4th

Total 50 100%

Table 2.3.2 represents the frequency and percentage distribution.

20 or 40% stated that they are strongly agreed that it can save work and

time. 21 or 42% agree, 8 or 16% stated that they are uncertain, 1 or

2% stated that they are disagree and none (0) stated that they are

strongly disagree.

2.3.3 Give convenience in monitoring the whole schoolOptions Frequency Percent Rank

5(strongly agree) 26 52% Rank 1st

4(agree) 19 38% Rank 2nd

3(uncertain) 4 8% Rank 3rd

2(disagree) 1 2% Rank 4th

45

Page 46: Chapter 1 5 apllied research ko sad

Total 50 100%

Table 2.3.3 represents the frequency and percentage distribution.

26 or 52% stated that they are strongly agreed that it can give

convenience in monitoring the whole school. 19 or 38% agree, 4 or 8%

respondent stated uncertain, 1 or 2% disagree and none (0) stated that

they are strongly disagreeing.

2.3.4 On the report.Options Frequency Percent Rank

5(strongly agree) 24 48% Rank 1st

4(agree) 17 34% Rank 2nd

3(uncertain) 7 14% Rank 3rd

2(disagree) 1 2% Rank 4th

1(strongly disagree) 1 2% Rank 4th

Total 50 100%

Table 2.3.4 represents the frequency and percentage distribution.

24 or 48% stated that they are strongly agreed that it is on the report of

what it is happening in the school. 17 or 34% agree, 7 or 14% stated

that they are uncertain, 1 or 2% stated that they are disagree and 1 or

2% stated that they are strongly disagree.

2.3.5 Real –time events.Options Frequency Percent Rank

5(strongly agree) 27 54% Rank 1st

4(agree) 16 32% Rank 2nd

3(uncertain) 5 10 Rank 3rd

2(disagree) 1 2% Rank 4th

1(strongly disagree) 1 2% Rank 4th

Total 50 100%

46

Page 47: Chapter 1 5 apllied research ko sad

Table 2.3.5 represents the frequency and percentage distribution.

27 or 54% stated that they are strongly agreed that it is real time

monitoring of events. 16 or 32% agree, 5 or 10% stated that they are

uncertain, 1or 2% respondent stated disagree, 1 or 2% respondents

stated that they are strongly disagree.

Table 2.4 Effectiveness in terms of protecting the school.

2.4.1 Monitor accidents/ incidentsOptions Frequency Percent Rank

5(strongly agree) 25 50% Rank 1st

4(agree) 17 34% Rank 2nd

3(uncertain) 4 8% Rank 3rd

2(disagree) 2 4% Rank 4th

1(strongly disagree) 2 4% Rank 4th

Total 50 100%

Table 2.4.1 represents the frequency and percentage distribution.

25 or 50% stated that they are strongly agreed that it can monitor

accidents or incidents. 17 or 34% agree, 4 or 8% stated that they are

uncertain, 2 or 4% stated that they are disagree and strongly disagree.

2.4.2 Monitor all the students coming in-out of the schoolOptions Frequency Percent Rank

5(strongly agree) 26 52% Rank 1st

4(agree) 15 30% Rank 2nd

3(uncertain) 8 16% Rank 3rd

2(disagree) 1 2% Rank 4th

Total 50 100%

47

Page 48: Chapter 1 5 apllied research ko sad

Table 2.4.2 represents the frequency and percentage distribution.

26 or 52% stated that they are strongly agreed that it can monitor all the

students coming in-out of the school. 15 or 30% agree, 8 or 16% stated

that they are uncertain, 1 or 2% stated that they are disagree and none

(0) stated that they are strongly disagree.

2.4.3 Monitor employees and faculty.Options Frequency Percent Rank

5(strongly agree) 26 56% Rank 1st

4(agree) 19 38% Rank 2nd

3(uncertain) 2 4% Rank 3rd

2(disagree) 1 2% Rank 4th

Total 50 100%

Table 2.4.3 represents the frequency and percentage distribution.

26 or 56% stated that they are strongly agreed that it can monitor

employees and faculty. 19 or 38% agree, 2 or 4% stated that they are

uncertain, 1 or 2% respondent stated disagree and none (0) stated

strongly disagree.

2.4.4 Monitor the school designated area.Options Frequency Percent Rank

5(strongly agree) 23 46% Rank 1st

4(agree) 19 38% Rank 2nd

3(uncertain) 8 16% Rank 3rd

Total 50 100%

Table 2.4.4 represents the frequency and percentage distribution.

23 or 46% stated that they are strongly agreed that it can monitor

designated area. 19 or 38% agree, 8 or 16% stated that they are

48

Page 49: Chapter 1 5 apllied research ko sad

uncertain and none (0) stated that they are either disagreeing or

strongly disagree.

2.4.5 Valuable things inside the school will be properly monitoredOptions Frequency Percent Rank

5(strongly agree) 28 56% Rank 1st

4(agree) 14 28% Rank 2nd

3(uncertain) 7 14% Rank 3rd

2( disagree) 1 2% Rank 4th

Total 50 100%

Table 2.4.5 represents the frequency and percentage distribution.

28 or 56% stated that they are strongly agreed that it properly

monitored the entire valuable thing inside the school. 14 or 28% agree, 7

or 6% stated that they are uncertain, 1 or 2% respondent stated

disagree and none (0) respondent stated strongly disagree.

49

Page 50: Chapter 1 5 apllied research ko sad

Table 3.1 Univariate Matrix on the Eulogio “Amang” Rodriguez Institute of Science and Technology Security System.OPTIONS5 4 3 2 1 X Descriptive Interpretation

2.1.1 The security system the EARIST has a loop hole 17 23 9 1 0 4.12 Agree2.1.2 It only uses CCTV Camera 15 19 13 2 1 3.88 Agree2.1.3 The system only records in-coming and out-coming people 19 22 9 0 0 4.2 Agree2.1.4 Check on all the vehicles going in-out of the institution 25 17 7 1 0 4.32 Agree2.1.5 Cannot determine actual incidents inside or outside school properties 20 22 6 2 0 4.2 Agree2.2.1 Knowledge in improving the security system 17 27 6 0 0 4.22 Agree2.2.2 Appropriate security system is needed 27 15 8 0 1 4.38 Agree2.2.3 On the spot monitoring of all activities inside the school premises 28 19 3 0 0 4.5 Agree2.2.4 Awareness about the safety guidelines 32 15 3 0 0 4.58 Strongly Agree2.2.5 Knowledge in terms of possible event if the security system is not effective

29 14 6 0 14.38

Agree

2.3.1 Digital security system 28 17 4 0 1 4.42 Agree2.3.2 Save work and time 20 21 8 1 0 4.16 Agree2.3.3 Give convenience in monitoring the whole school 26 19 4 1 0 4.36 Agree2.3.4 On the report 24 17 7 1 1 4.2 Agree2.3.5 Real –time events 27 16 5 1 1 4.3 Agree2.4.1 Monitor accidents/ incidents 25 17 4 2 2 4.22 Agree2.4.2 Monitor all the students coming in-out of the school 26 15 8 1 0 4.32 Agree2.4.3 Monitor employees and faculty 28 19 2 1 0 4.48 Agree2.4.4 Monitor the school designated area 23 19 8 0 0 4.3 Agree2.4.5 Valuable things inside the school will be properly monitored 28 14 7 1 0 4.38 AgreeTOTAL 484 367 127 15 6 85.95

Based on the foregoing results, as showed in table 3.1, the automated mouse / mice trap range only to strongly agree with a mean of 85.95.

50

Page 51: Chapter 1 5 apllied research ko sad

Table of Chi-square Statistics

Df= (r-1) (c-1)

= (5-1) (5-1)

= 16

F- Statistics with other values; p= 0.05│p= 0.01 │p=0.001df P= 0.05 P= 0.01 P= 0.0011 3.84 6.64 10.832 5.99 9.21 13.823 7.82 11.35 16.274 9.49 13.28 18.475 11.07 15.09 20.526 12.59 16.81 22.467 14.07 18.48 24.328 15.51 20.09 26.139 16.92 21.67 27.8810 18.31 23.21 29.5911 19.68 24.73 31.2612 21.03 26.22 32.9113 22.36 27.69 34.5314 23.69 29.40 36.1215 25.00 30.58 37.7016 26.30 32.00 39.2517 27.59 33.41 40.7918 28.87 34.81 42.3119 30.14 36.19 43.8220 31.41 37.57 45.3221 32.67 38.93 46.8022 33.92 40.29 48.8723 35.17 41.64 49.7324 36.42 42.98 51.1825 37.65 44.31 37.6526 38.89 45.64 54.0527 40.11 46.96 55.4828 41.34 48.28 56.8929 42.56 49.59 58.3030 43.77 50.89 59.7031 44.99 52.19 61.1032 46.19 53.99 62.4933 47.40 54.78 63.8734 48.60 56.06 64.2535 49.80 57.34 66.6236 51.00 61.16 70.7137 52.19 58.89 69.3538 53.38 61.16 70.7139 54.57 62.43 72.0640 55.76 63.69 73.4141 56.94 64.95 74.7542 58.12 66.21 76.0943 59.30 67.46 77.42

51

Page 52: Chapter 1 5 apllied research ko sad

44 60.48 68.71 78.7545 61.66 69.96 80.0846 62.83 71.20 81.4047 64.00 72.44 82.7248 65.17 73.68 84.0349 66.34 74.92 85.3550 67.51 76.15 86.6651 68.67 77.39 87.9752 69.83 78.62 89.2753 70.99 79.84 90.5754 72.15 81.07 91.8855 73.31 82.29 93.1756 74.47 83.73 95.7557 75.62 84.73 95.7558 76.78 85.95 97.0359 77.93 87.17 98.3460 79.08 88.38 99.6261 80.23 89.59 100.8862 81.38 90.18 102.1563 82.53 92.01 103.4664 83.68 93.22 104.7265 84.82 94.42 105.9766 85.97 95.63 107.2667 87.11 96.83 108.5468 88.25 98.03 109.7969 89.39 99.23 111.0670 90.53 104.42 112.3171 91.67 101.62 113.5672 92.81 102.82 114.8473 93.95 104.01 116.0874 95.08 105.20 117.3575 96.22 106.39 118.6076 97.35 107.58 119.8577 98.49 108.77 121.1178 99.62 109.96 112.3679 100.75 111.15 123.6080 101.88 112.33 124.8481 103.01 113.51 126.0982 104.14 114.70 127.3383 105.27 115.88 128.2784 106.40 117.06 129.8085 107.52 118.24 131.0486 108.65 119.41 132.2887 109.77 120.59 133.5188 110.90 121.77 134.7489 112.02 122.94 135.9690 113.15 124.12 137.1991 114.27 125.29 138.4592 115.39 136.46 139.6693 116.51 127.63 140.9094 117.63 128.80 142.1295 118.75 129.97 143.3296 119.87 131.14 144.5597 120.99 132.31 145.7898 122.11 133.47 146.99

52

Page 53: Chapter 1 5 apllied research ko sad

99 123..23 134.64 148.21100 124.34 135.81 149.88

Rate Verbal Interpretation Range

5 Strongly Agree 4.6 –5.0

4 Agree 3.6 –4.5

3 Moderately Agree 2.6 –3.5

2 Disagree 1.6 –2.5

1 Strongly Disagree 1.0 –1.5

Table 1.1 1Responses to Socialization Skills Survey 

A. The current assessment of the EARIST security system.

Strongly

Agree

Agree Moderatel

y Agree

Disagree Strongly

Disagre

e

W.M Chi

  5 4 3 2 1 X2

1. The security system of the EARIST has a loop hole

17(19.2) 23(20.6) 9(8.8) 1(1.2) 0(0.2) 4.120.57

2. It only uses CCTV Camera 15(19.2) 19(20.6) 13(8.8) 2(1.2) 1(0.2) 3.88 3.583. The system only records in-coming and out-coming people 19(19.2) 22(20.6) 9(8.8) 0(1.2) 0(0.2) 4.2 1.304. Check on all the vehicles going in-out of the institution 25(19.2) 17(20.6) 7(8.8) 1(1.2) 0(0.2) 4.32 2.78

53

Page 54: Chapter 1 5 apllied research ko sad

5.Cannot determine actual incidents inside or outside school properties

20(19.2) 22(20.6) 6(8.8) 2(1.2) 0(0.2) 4.2 1.55

TOTAL Chi-Square: 9.79

The Security system of EARIST has a loop hole with a mean of

4.12 and a verbal interpretation of Agree; it only uses CCTV camera

with a mean of 3.88 and a verbal interpretation of Agree; the system only

records in-coming and out-coming people with a mean of 4.2 and a

verbal interpretation of Agree; check on all the vehicle going in-out of

the institution with a mean of 4.32 and a verbal interpretation of Agree;

and cannot determine actual incidents inside or outside school properties

with a mean of 4.2 and a verbal interpretation of Agree.

The overall computed weighted mean has a verbal interpretation of

Agree.

It is clearly evidence that the chi-square value from the chi-square

value of Table 1.1 is 9.79 which is less than the value from the chi-square

table which is 26.30, the null hypothesis is accepted.

Table 2B. Improvement of the school security system

Strongly

Agree

 Agree Moderately

Agree 

 Disagre

e

Strongly

Disagre

e

W.M Chi

  5 4 3 2 1 X2

1. Knowledge in improving the security system

17(26.6) 27(18) 6(5.2) 0(0.2) 0(0) 4.228.29

2. Appropriate security system is needed

27(26.6) 15(18) 8(5.2) 0(0.2) 0(0) 4.382.21

54

Page 55: Chapter 1 5 apllied research ko sad

3. On the spot monitoring of all activities inside the school premises

28(26.6) 19(18) 3(5.2) 0(0.2) 0(0) 4.5

1.26

4. Awareness about the safety guidelines

32(26.6) 15(18) 3(5.2) 0(0.2) 0(0) 4.582.73

5. Knowledge in terms of possible event if the security system is not effective

29(26.6) 14(18) 6(5.2) 1(0.2) 0(0) 4.38

4.43

TOTAL Chi- square: 18.92

Knowledge in improving the security system with a mean of 4.22

and a verbal interpretation of Agree; appropriate security system is

needed with a mean of 4.38 and a verbal interpretation of Agree; on the

spot monitoring of all activities inside the school premises with a mean of

4.5 and a verbal interpretation of Agree; awareness about the safety

guidelines with a mean of 4.58 and a verbal interpretation of Agree; and

knowledge in terms of possible event if the security system is not effective

with a mean of 4.38 and a verbal interpretation of Agree.

The overall computed weighted mean has a verbal interpretation of

Agree.

It is clearly evidence that the chi-square value from the chi-square

value of Table 1.2 is 18.92 which is less than the value from the chi-

square table which is 26.30, the null hypothesis is accepted.

Table 3C The Benefits of newly proposed security system.

Strongly

Agree

 Agree Moderately

Agree 

DISAGREE Strongly

Disagree

W.M Chi

5 4 3 2 1 X2

55

Page 56: Chapter 1 5 apllied research ko sad

1. Digital security system

28(25) 17(18) 4(5.6) 0(0.8) 1(0.6) 4.42

1.94

2. Save work and time 20(25) 21(18) 18(5.6) 1(0.8) 0(0.6) 4.16 3.18

3 Give convenience in monitoring the whole school

26(25) 19(18) 4(5.6) 1(0.8) 0(0.6) 4.36

1.20

4. On the report 24(25) 17(18) 7(5.6) 1(0.8) 1(0.6) 4.2 0.76

5 Real –time events 27(25) 16(18) 5(5.6) 1(0.8) 1(0.6) 4.3 0.76

TOTAL: Chi-Square 7.85

Digital security system with a mean of 4.42 and a verbal interpretation of

Agree; save work and time with a mean of 4.16 and a verbal

interpretation of Agree; Give convenience in monitoring the whole

school with a mean of 4.36 and a verbal interpretation of Agree; on the

report with a mean of 4.2 and a verbal interpretation of Agree; real –time

events with a mean of 4.3 and a verbal interpretation of Agree.

The overall computed weighted mean has a verbal interpretation of

Agree.

It is clearly evidence that the chi-square value from the chi-square

value of Table 1.3 is 7.85 which is less than the value from the chi-square

table which is 26.30, the null hypothesis is accepted.

Table 4D. Effectiveness in terms of protecting the school

Strongly

Agree

Agree Moderatel

y Agree

Disagree Strongly

Disagre

e

W.M Chi

5 4 3 2 1 X2

1. Monitor accidents/ incidents25(26) 17(16.8) 4(5.8) 2(1) 2(0.4) 4.22 8

2. Monitor all the students coming in-out of the school

26(26) 15(16.8) 8(5.8) 1(1) 0(0.4) 4.321.43

3. Monitor employees and faculty28(26) 19(16.8) 2(5.8) 1(1) 0(0.4) 4.48 3.33

56

Page 57: Chapter 1 5 apllied research ko sad

4. Monitor the school designated area 23(26) 19(16.8) 8(5.8) 0(1) 0(0.4) 4.3

2.87

5. Valuable things inside the school will be properly monitored

28(26) 14(16.8) 7(5.8) 1(1) 0(0.4) 4.38

1.27

TOTAL: Chi-Square 16.90

Monitor accidents/ incidents with a mean of 4.22 and a verbal

interpretation of Agree; monitor all the students coming in-out of the

school with a mean of 4.32 and a verbal interpretation of Agree; monitor

employees and faculty with a mean of 4.48 and a verbal interpretation of

Agree; monitor the school designated area with a mean of 4.3 and a

verbal interpretation of Agree; valuable things inside the school will be

properly monitored with a mean of 4.38 and a verbal interpretation of

Agree.

The overall computed weighted mean has a verbal interpretation of

Agree.

It is clearly evidence that the chi-square value from the chi-square

value of Table 1.4 is 16.90 which is less than the value from the chi-

square table which is 26.30, the null hypothesis is accepted.

57

Page 58: Chapter 1 5 apllied research ko sad

Summary

The research EULOGIO “A MANG” RODRIGUEZ INSTITUTE

OF SCIENCE AND TECHNOLOGY (EARIST) security system was

proposed to the EULOGIO “A MANG” RODRIGUEZ INSTITUTE OF

SCIENCE AND TECHNOLOGY (EARIST) and the other school who

wants to improve their security system. This research was conducted for

the purpose of determining the problems encountered in the protection of

the school. And based from such problems the following objectives are

formulated: 1) To provide a much effective security system that would

help them to secure the safetiness of every student and employee; 2) To

be able to determined if there is a hazardous accident; 3) To be able to

create a effective security system that would help them to monitor if there

is a intruders; 4) To be able to protect each persons and properties

coming in and out of the school premises.

58

Page 59: Chapter 1 5 apllied research ko sad

Furthermore, to achieve the objectives, the proponents, used the

Descriptive Method to develop the proposed system. The researcher also

conducted an evaluation to the respondents in order to gather all the

information needed to complete the study with the use of the Likerts

Scale; the respondent evaluated the digital project to determine the

performance of the system.

SUMMARY OF FINDINGS

Based in the proponent’s objectives in data gatherings were

determined.

1. Based on the proposed security system was interpreted “VERY

GOOD” in the criteria of Efficiency because it provides

convenience to the school and to the employees.

2. . Based on the proposed security system was interpreted “VERY

GOOD” in the criteria of Accuracy because its digitalized is 100

percent in protecting the school.

3. . Based on the proposed security system was interpreted “VERY

GOOD” in the criteria of Reliability it can use anytime.

4. . Based on the proposed security system was interpreted

“EXCELLENT” in the criteria of User-friendly because it is easy

to use, understand and operate.

59

Page 60: Chapter 1 5 apllied research ko sad

5. Based on the proposed security system was interpreted

“EXCELLENT” in the criteria of Simplicity because of the

projects clearness of design.

CONCLUSION

Based on the proponent objective and data gathered and have some

findings determined by the proponent. The proposed design helps to

protect the student, employee and school properties. The proposed

project is very good in terms of detecting intruders and hazardous

accidents. Since the proposed research is digitalized; it helps the

security guard and employee to monitor the whole school.

RECOMMENDATION

Therefore, the proponents would like to recommend the proposed

research to be initiated and give enough attention by the administration of

Eulogio “Amang” Rodriguez Institute of Science and Technology

regarding on the benefits of the research specifically on health, security

and environment and environmental aspects of life so that it will be

60

Page 61: Chapter 1 5 apllied research ko sad

initiated for the school and other universities on a long term plan project

that could benefits all of us.

Bibliography

www.alarmsystemreviews.com

www.medialab.tfe.umu.se/...thesis/.../intelligent_home_security_system.pdf

innovexpo.itee.uq.edu.au/2001/projects/s804258/thesis.pdf

www.datanumeric.com/thesis/thesis.pdf

www.datanumeric.com/thesis/thesis.pdf

www.datanumeric.com/thesis/thesis.pdf

www.cs.virginia.edu/~jck/publications/Weatherwax_MS_Thesis.pdf

Capacitive Position/Displacement Sensor Theory/Tutorial

Capacitive Position/Displacement Overview

Comparing Capacitive and Eddy-Current Sensors

M. Kretschmar and S. Welsby (2005), Capacitive and Inductive Displacement

Sensors, in Sensor Technology Handbook, J. Wilson editor, Newnes:

Burlington, MA.

61

Page 62: Chapter 1 5 apllied research ko sad

C. A. Grimes, E. C. Dickey, and M. V. Pishko (2006), Encyclopedia of

Sensors (10-Volume Set), American Scientific Publishers. ISBN 1-58883-

056-X

Sensors - Open access journal of MDPI

M. Pohanka, O. Pavlis, and P. Skladal. Rapid Characterization of Monoclonal

Antibodies using the Piezoelectric Immunosensor. Sensors 2007, 7, 341-353

SensEdu; how sensors work

Clifford K. Ho, Alex Robinson, David R. Miller and Mary J. Davis. Overview

of Sensors and Needs for Environmental Monitoring. Sensors 2005, 5, 4-37

Wireless hydrogen sensor

Sensors and Actuators - Elsevier journal

Automated Deformation Monitoring system

Droid's Sensors -adware for droidsensors

Trimmer, H.William (1981). Understanding and Servicing Alarm Systems.

Stoneham: Butterworth.

Weber, Thad L. (1985). Alarm Systems and Theft Protection (2d ed.). Stoneham,

MA: Butterworth.

Walker, Philip (1985). Electronic Security Systems. Cambridge, UK: University

Press

Ramsey, Anthony Home Security.

Schatz, David A., et al. Video safety curtain. U.S. Patent No. 6,297,844, Issued

Oct. 2, 2001.

Atss, R.Nandakumar.

Aii, N.Clifton. "Broadband CSV, XML Alarm data Standards" Auckland NZ,

(2002

en.wikipedia.org/wiki/Sensor

en.wikipedia.org/wiki/Alarm

akyqowe.prv.pl/durationundergraduatedegree.html - Cached

62

Page 63: Chapter 1 5 apllied research ko sad

Read more: http://www.servicemagic.com/article.show.Home-Security-

Alarms-For-Safety-and-Resale.15413.html#ixzz12C6tDaNH

2010 Home Security Blog | Entries (RSS) | Comments (RSS)

Dictionary. The American Heritage® Dictionary of the English Language, Fourth

Edition Copyright © 2007, 2000 by Houghton Mifflin Company. Updated in 2009.

Published by Houghton Mifflin Company. All rights reserved.  Read more

Word Tutor. Copyright © 2004-present by eSpindle Learning, a 501(c) nonprofit

organization. All rights reserved.

eSpindle provides personalized spelling and vocabulary tutoring online; sign up free. 

Read more

WordNet. WordNet 1.7.1 Copyright © 2001 by Princeton University. All rights

reserved.  Read more

Niña Christea P. OrillaAddress: #705 T. Anzures St. Sampaloc Manila Mobile #: 09091029270Email Address: [email protected]

ObjectiveTo partake and actualize learned ideas and skills to the company and equip the

right working attitude for attainment of future professional goals.________________________________________________________________________________________Educational BackgroundTertiary Eulogio “Amang” Rodriguez Institute of Science and Technology 2010- present Bachelor of Science in Computer Engineering 5th yr levelSecondary Marinduque National High School 2002-2006 Primary Don Luis Hidalgo Memorial School 1996-2002

Seminars or Training AttendedSYSTEMATIC ASIA

Sensor Technology: 1sth Step to MECHATRONICS 27 h Day of August 2009

Integrated Circuits: Assembly Process 17 th Day of July 2009

PLC ProgrammingHitachi Global Storage Technologies, Phils. Corp.

Fabrication process of hard diskPCOS Training Center Astron bldg.

63

Page 64: Chapter 1 5 apllied research ko sad

Skills

Computer skills (MS Word, Excel, Power Point) Willing to work on graveyard shifts Computer troubleshooting Knowledgeable in electronics Knowledgeable in pneumatics

Personal Background

Date of Birth : November 19, 1989Place : Isok Boac MarinduqueCivil Status : SingleCitizenship : FilipinoAge : 20Height : 5’3’Religion : Roman CatholicCharacter ReferencesEng’r. Percival Macapagal Professor 09151174572

This document was made and personally filled, in full honesty to the best of my knowledge.

Niña Christea P. Orilla Applicant’s Signature

64