You are on page 1of 119

RESIDENTIAL BUILDING SECURITY SYSTEM

Acknowledgement

The developer takes this opportunity to express her gratitude and deep regards to her
supervisor Mr. Sivananthan Chelliah for his exemplary guidance, monitoring and
constant encouragement throughout preparing this project paper on Residential
Building Security System. The guidance given by him time to time shall carry the
developer a long way in the journey of life on which the developer about to embark.
He has contributed a lot to the developer by giving valuable advices and useful guides
throughout the project. Besides that, he has also taught the developer in other aspect
that is out of the project scope such as communicating skills and he has also shared
his experienced with the developer. The developer is very grateful of what Mr. Siva
has done for him and very thankful to have him as a supervisor.

Last but not least, I would like to thank Asia Pacific University in developing such a great
and challenging project for me to improve myself. I also would like to thank all the previous
lecturers who have taught me before this semester. Without the knowledge that they shared, I
wont be able to complete this project.

DINESH PRABAKAR|TP025822
P a g e 1 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Table of Contents
Acknowledgement....................................................................................................... 1
Chapter 1: Introduction................................................................................................. 5
1.1. Background to the Project................................................................................. 5
1.2. Problem Context............................................................................................ 6
1.3. Rationale...................................................................................................... 7
1.4 Potential Benefits................................................................................................ 8
1.4.1 Tangible Benefits........................................................................................... 8
1.4.2 Intangible benefits......................................................................................... 9
1.5. Target Users.................................................................................................. 9
1.6. Scope and Objectives.................................................................................... 11
1.6.1 Aim.......................................................................................................... 11
1.6.2 Objectives.................................................................................................. 11
1.6.3 Deliverables............................................................................................... 12
1.6.4 Nature of Challenge..................................................................................... 13
1.7. Project Overview and Plan..............................................................................14
Chapter 2: Literature Review........................................................................................ 18
2.1 Literature Review.............................................................................................. 18
2.2 Domain Research.............................................................................................. 19
2.3 Technical Research............................................................................................ 24
Chapter 3: The Chosen Methodology.............................................................................. 29
3.1. SSADM..................................................................................................... 30
3.1.1. Justification of the selection......................................................................31
3.1.2. Overview of the diagram associated with SSADM..........................................33
3.1.3. Overview on how the proposed system will proceed........................................33
3.2. RUP methodology........................................................................................ 36
3.2.1. Overview of the diagram associated............................................................36
3.2.2. Phases of RUP....................................................................................... 37
Chapter 4: Primary Research........................................................................................ 39
4.1. Introduction................................................................................................ 39
4.1.1. Questionnaire........................................................................................ 39
4.1.2. Interview............................................................................................. 42
Chapter 5: Requirement Validation................................................................................ 44
5.1. Analysis of data........................................................................................... 45
5.1.1. Analysis of data through questionnaire.........................................................45
5.1.2. Analysis collected through interview method.................................................52

DINESH PRABAKAR|TP025822
P a g e 2 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

5.1.3. Interview Conclusion..............................................................................58


Chapter 6: System Architecture..................................................................................... 59
6.1. Introduction................................................................................................ 59
6.2. Abstract Architecture..................................................................................... 60
6.2.1. System Design...................................................................................... 60
6.2.1.1. Use case diagram............................................................................. 60
6.2.1.2. Use Case Diagram Specifications.........................................................61
6.2.1.3. Activity Diagram............................................................................. 64
6.2.1.4. Sequence Diagram........................................................................... 70
6.2.2. Database Design.................................................................................... 72
6.2.2.1. Entity Relationship Diagram (ERD)......................................................72
6.2.2.2. Class Diagram................................................................................. 73
6.2.2.3. Database table structure.....................................................................74
6.2.3. Interface Design..................................................................................... 77
6.3. Development/Deployment.............................................................................. 83
6.3.1. Programming Language Chosen.................................................................83
6.3.2. IDE Chosen.......................................................................................... 85
6.3.3. Database Management System Chosen........................................................86
6.3.4. Operating System Chosen.........................................................................87
Chapter 7: Project Plan............................................................................................... 89
7.1. Release Plan................................................................................................ 89
7.2. Test plan for Unit Testing................................................................................90
Chapter 8: System Implementation................................................................................ 96
8.1. Screenshot.................................................................................................. 96
8.1.1. Homepage/Login................................................................................... 96
8.1.2. Admin Panel......................................................................................... 97
8.1.3. Security Staff Dashboard..........................................................................97
8.1.4. Tenants Panel........................................................................................ 98
8.1.5. Visitor Entry Form (Security staff)..............................................................98
8.1.6. Visitor Report (Security Staff)...................................................................99
8.1.7. User Attendance Logs..............................................................................99
8.1.8. Holiday Management............................................................................100
8.1.9. Holiday Report.................................................................................... 100
8.2. Sample Codes............................................................................................ 101
8.2.1. Sample codes for Sign-up Feature.............................................................101
8.2.2. Sample Codes for Login Feature..............................................................102

DINESH PRABAKAR|TP025822
P a g e 3 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

8.2.3. Sample Codes for Extracting User Logs Feature...........................................103


Chapter 9: System Validation..................................................................................... 104
9.1.1. Login into the System............................................................................104
9.1.2. Visitor Management (Security Staff)..........................................................104
9.1.3. Fingerprint Access................................................................................ 105
9.1.4. Holiday Management............................................................................105
9.1.5. Monitoring Records (Security Staff)..........................................................106
9.2. User Acceptance Test...................................................................................106
Chapter 10: Conclusions and Reflections.......................................................................110
10.1. Critical Evaluation................................................................................... 110
10.2. System Benefits...................................................................................... 110
10.3. Conclusion and Recommendations...............................................................111
10.4. Limitations and Future Enhancement............................................................111
10.5. Conclusion............................................................................................ 113
REFERENCES....................................................................................................... 114
APPENDIX........................................................................................................... 117
Gantt Chart........................................................................................................ 117

DINESH PRABAKAR|TP025822
P a g e 4 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Chapter 1: Introduction
1.1. Background to the Project
In todays world building is an essential part of life. Building are in various form in todays
generation. As an example building can be an individuals home, workplace, or even
shopping complex where one spends their leisure time. It is very important to ensure security
in the building as many people are evolved around the building. Besides that, its very
important for the security management of a building to keep tracks of the people who are
accessing into the building and also the reason they are in the building to make sure the
building is always secured and safe.

In the current environment its a challenge to keep track of all the activities of people around
the building as it is all done manually and it doesnt provide appropriate security level to the
building. The building system are facing high risk because they are dealing with crucial data
of people who stay in the building, data that they deal with are as personal information, birth
date, house address, office address, tenant id and etc. As all of this are recorded manually it
can be easily lost and also misplaced. Besides that, the security executive have to manually
take rounds to ensure there are no crimes happening in the building which is also increasing
the labour force in a building.

Creating a new developed system into to replace the old existing system for most of the
security firms will be a challenge because it will be hard to adopt the new developed system
as the users might face a little bit of a complication since they are too used to the old manual
system and also because the new system is developed using different platform and
techniques. Besides that, it can be stated that most of the building are still under a system
with poor security implementation. The building security management staff are concerned in
increasing effort in tracking the records of the people in the building and monitoring their
activities.

Since there are many types of building out there, the developer here will be focusing on
developing a new system for residential building to protect the tenants from crimes and
unauthorized access into the residential building. The new system which is proposed will be
developed using the fingerprint recognition which will be implemented into the residential
building security system.

DINESH PRABAKAR|TP025822
P a g e 5 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

1.2. Problem Context


Residential buildings are usually exposed to all kind of security threats such as crime,
vandalism, robbery and also disturbance. Residential buildings security system crimes can be
categorized into various threats such as unauthorized access (intruders), forgery (acting to be
someone else), and breaking in. Crimes such as theft, and burglary happens in the car parks,
corridor or even the lift. Besides that, vandalism is also a regular issue that happens in a
building.

Tenants who are outstation or vacation might be affected by robbery or theft as it makes the
work of a thief or robber easier to break into tenants respective units to steal valuables.
Normally situation like this happens because the units of tenants who are outstation are not
monitored and isolated. Units like this are the main target of the robbers and thiefs.

People who are involved in vandalism normally damages the property around the building,
smashing car in the car parks, or even graffiti drawing in the walls of the building and also
they also can do damage to the property. Besides crimes like this, personal offense is also an
important crime that should be included because it causes a lot of problem to individuals.
Example of personal offense can be elevator assault, car park assault, raping and many more.
Besides that, unsecured residential building can lead to drug dealing and also people can take
bad decision to suicide in the building which we have to be concerned about.

Visitor access are also one of the unauthorized access that should be taken under
consideration because people might just sneak in as visitor and create nuisance in a building.
This is because normally thieves or robbers get access into a building by transforming as
contractors, visitors or even sales person. This also may cause by the fact where the visitors
are not monitored by the security staff which allows them to sneak into the building easily.
This people normally gets into the building more than one time so the guards wouldnt
suspect them and also for the thieves to sharpen their plan on stealing or robbing people.

Besides that, emergency cases are also one of the problem occurs in a building, even this
sounds normal but It has to be taken into consideration. Risks that people might face have to
be taken into consideration to make sure the surrounding of the building is always safe and
sound. Human caused problems and also natural disasters are the emergency case that
normally occurs. Humans caused problems consist of explosion of gas, water leaking, and

DINESH PRABAKAR|TP025822
P a g e 6 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

short circuit are problems caused by the carelessness of people. Besides that, natural disaster
is such as, earthquake, landslide, floods and many more which cant be avoided by human
force. This kind of problems may cause loss to the building and even natural disaster can
collapse the building itself.

1.3. Rationale
Attempting to solve the problems which are faced by buildings, the developer has decided to
develop a web-based residential building security system, where this system allows the
security staff related task to be reduced. The new web-based system is more recommended
method to solve the issues faced by the manual system as the new system is offering more
competitive advantage. All the data related to the building such as the tenants list, security
staff list, and the visitors who are in the building are stored in the database and kept secured,
always updated and backed up. The data is centralized in the residential building security
system and accessible over the web from anytime.

Besides that, as mentioned earlier the manual building security system could not handle the
visitor access in the building, as the security force are only writing down the information of
the visitors and the visitors are free to do whatever they one in the building which might lead
to serious crimes. This residential building security system is capable of handling extensive
amount of visitors and also recording full profile of them into the system and monitoring their
movement in the building.

On the other hand, problems which is faced by the manual system is the human error. As
everybody is aware when the error comes to the management side in the building, the tenants
wont be easily forgiving the human error made by the security staff or the management
because the error which is caused by them threatens the safety of the tenants in the building.
As everybody is aware the manual recorded data may expose to human technical error such
as misplacing the data, or missing data and etc.

Based on the problems listed above the residential building security system is developed to
perform actions which assist the staff to ensure the security of the building is tighten. The
biometric authentication is the main technology which is implemented in the system in order
to ensure that it would not be an easy job for people to break into the building. The security
team will be able to tighten the security which the implemented technology and also saving

DINESH PRABAKAR|TP025822
P a g e 7 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

the man power in the building. The system will take responsibility on most of the manual
workload with computerized system so the security team has more energy to concentrate and
focus on the monitoring and other jobs

1.4 Potential Benefits


1.4.1 Tangible Benefits
Greener Environment
The usage of paper will be reduced as most of the manual recordings and paperwork
will be done by the system itself. Records are stored in the systems database which
doesnt needed to be printed which reduces the paper usage in the building.

Security Staffs burden reduced


The residential building system allows the staffs to monitor the in and out logs of the
people who are in the building using the system and without having to patrol around
to ensure the security of the building.

Reduces cost on workmen force


The residential building security system assist in most of the monitoring around the
building. This system assists the management in saving their money and effort, this is
because with this system there is no need to hire more security staff to patrol the
building.

Reduce allocated space for security staffs


This system also helps the management in saving up space as they can reduce the
allocation of spaces for the security staffs who are brought from abroad to guard the
building.

Visitor time saving


This system also reduces the visitor registration time, as visitors do not have to
manually fill-up their data, and it is all converted into a computerized system which
converts their Identification card entry into the system.

DINESH PRABAKAR|TP025822
P a g e 8 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

1.4.2 Intangible benefits


Guaranteeing security
The residents will be guaranteed with more security as they will be under the
protection of the system, where not everyone can simply get access into the system.
Only registered authorized personnel can get access to the system.

Protecting Privacy
Users privacy will be protected where their details in the database will be encrypted,
where it would not be possible for any hacker or crackers to obtain the information of
the users in the system.

Reducing Crime around the Building


The residential building system assist in monitoring the movement of each and
everybody in the building, which helps the security staff to track down the criminal
easily if there is any happening around the building.
Controlled Visitor Access
The visitor access in the building is controlled as each and every visitor are granted
start date and time with expiry date and time where visitors are monitored in the
building in where some case there are some criminals who acts to be visitors to
commit crime around the building can be overcome.

1.5. Target Users


The computerized residential building security system is targeted mainly to the security firms
to provide security to the residential building which is still running under the old manual
system. Therefore, this system is mainly targeted to the residential building security
management. There will be users as, tenants, security staff, and, system admin in the
residential building security system. This system is focused on securing, protecting, reducing
crimes, and also providing easy access to the people who lives inside the building.

As this system will help the security to monitor the movements around the building easily
and also helps in keeping safe the private information of the people who are staying in the
building. By implementing this system to the building there is no need to be afraid of
intruders and crimes around the building.

Target Users Roles


Administrator Add, Delete, Modify users into the system

DINESH PRABAKAR|TP025822
P a g e 9 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Assign task to security staffs


Access logs of system user in order to monitor
movement in the system
Has full access to the system

Security Staffs Can register visitors into the system


Monitors the user logs, and also last seen of the user
around the building
Holiday management access is granted, where staff can
register users who are out on holidays and monitor their
unit in the building.
Monitors the visitors expiry date and time
Tenants Update or modify personal information
Check of last access into their home
Register visitors in the system with an expiry date and
time
Register themselves if they are out on a holiday to ensure
that their unit is monitored by the security staffs.
Visitor Consists of contractors, home visitors and etc
Can only be registered by the tenants or security staff
only
Each visitor is assigned an expiry date and time to ensure
the security of the building.
Visitors full profile information from the identification
card is extracted into the system for security purposes.

1.6. Scope and Objectives


1.6.1 Aim
To develop a building security system for building which monitors the movement and
activities around the building and also prohibiting access to unauthorized personnel. The
major aim is to provide security and protection towards the building and tenants.

DINESH PRABAKAR|TP025822
P a g e 10 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

1.6.2 Objectives
To provide enhanced security to people in the building

To protect the building from security breach such as unauthorized access

To implement bio-metric device (fingerprint)

To develop a user-friendly system for all type of users

To reduce labour force in relation of security of the building

1.6.3 Deliverables
The residential building security system is developed to design and develop a registration
portal and integrate the web portal with biometric device. Besides that, this system defines
user class and their level of access to the building. This system protects the confidentiality,
integrity and availability of the people in the building. This system is developed for to

DINESH PRABAKAR|TP025822
P a g e 11 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

enhance the security level of the current system. The building security system will provide
features as below:

Biometric authentication implementation (fingerprint) Authorized tenants, security


staff, administrator registered are able to access the building through their registered
fingerprint.
Visitor management system Tenants and security are able to register visitor into the
system with an expiry date and time with their full information extracted from the
identity card. Besides that, camera will be used to capture their face for security
purposes.
Holiday management system- Each user can register themselves if they are leaving the
building for outstation. Users can register the date they are leaving and when they will
be back in order for the security staffs to keep an eye on their unit.
Monitoring movement of users- Each and every user who are logged into the system
can be monitored using their logs, what time their accessed last to ensure that security
staff knows exactly what time is the user in and out.

If time allows, the developer will add the features below to the system,
CCTV - 24 hours fully functioning CCTV to monitor every corner of the building
surroundings including car park, lifts, and so on.
Extension Phone Each unit is allocated with extensions which helps tenants in
specially for requesting help urgently. Once it is lifted, it directly connects to the
security room whereby the user is not required to dial any number.
Register Access Card (RFID) Only residents, security staff are able to use the lift in
the building through their registered access card.

1.6.4 Nature of Challenge


The challenges during the development phase of this residential building security system is to
replace the manual system and how widely will this computerized system will be accepted by
all to replace the current manual system. Besides that, implementing the biometric device will

DINESH PRABAKAR|TP025822
P a g e 12 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

be another major challenge as it has to be properly researched before programming it into the
system. It will take some time to be familiar with the fingerprint devices and to be
programmed as needed. Choosing the suitable platform for this system would be another
challenge faced because it is hard to decide between the C# and ASP.net. Implementing this
system into a full-functioning building security system would be a challenge since the
developer is a security student therefore programming will take most of the time in
developing the system. Creating a web-based pages for the security logs will also be a
challenge faced by the developer since the system contains many component, implementing
everything properly in order and in time will be a challenging issue. Besides implementation
of the SQL plays a major role to the system, where the developers should research and
implement a way to make a connection between the platform used and SQL to store the
database.

Besides that, the acceptance of the system is also a major challenge faced by the developer
since people too used to the current manual system. Security is the main criteria focused on
this system where a high level security is implemented into this system by using the
biometric fingerprint recognition method to secure the building from threats.

DINESH PRABAKAR|TP025822
P a g e 13 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

1.5. Project Overview and Plan


The development and system takes time to achieve its main goal to fulfill the whole building
security system in complete. Implementation of the biometric fingerprint authorization into
the system for the security enhancement will increase the security level of the building. This
is to protect the privacy and also the safety of people who are in the building. By
implementing biometric fingerprint authorization, security executive can prohibit access to
the unauthorized user personnel into the building. Besides the security features in the system,
features that are available to be used in the system will be helpful to the security who are
always securing the building.

Project Plan

Task ID Task name Start date End date


Chapter1: INTRODUCTION 15th Nov 15 26th Nov 15
1.1 Project Background 16th Nov 15 16th Nov 15
1.2 Problem Context 17th Nov 15 17th Nov 15
1.3 Rationale 17th Nov 15 17th Nov 15
1.4 Potential Benefits 18th Nov 15 18th Nov 15
1.4.1 Tangible Benefits 18th Nov 15 18th Nov 15
1.4.2 Intangible Benefits 19th Nov 15 19th Nov 15
1.5 Target Users 20th Nov 15 20th Nov 15
1.6 Scope and Objectives 21th Nov 15 21th Nov 15
1.6.1 Aims 22th Nov 15 22th Nov 15
1.6.2 Objectives 23th Nov 15 23th Nov 15
1.6.3 Deliverables - 24th Nov 15 24th Nov 15

Functionality of the
proposed system
1.6.4 Nature of Challenge 25th Nov 15 25th Nov 15
1.7 Overview of this Report 26th Nov 15 26th Nov 15

& Project plan

DINESH PRABAKAR|TP025822
P a g e 14 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Chapter 2: LITERATURE REVIEW 27th Nov 15 27th Dec 15

DINESH PRABAKAR|TP025822
P a g e 15 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

2.1 Introduction 27th Nov 15 28th Nov 15


2.2 Domain research 29th Nov 15 8th Dec 15
2.3 Technical research 9th Dec 15 19th Dec 15
2.3.1 Similar System 20th Dec 15 24th Dec 15
2.3.2 Architecture 25th Dec 15 26nd Dec 15
2.4 Conclusion 27th Dec 15 27th Dec 15
Chapter 3: Development 28th Dec 15 9th Jan 16

Methodology
3.1 System Methodology 28th Dec 15 31th Dec 15

Chosen
3.2 Justification of Selected 1st Jan 16 4th Jan 16

Methodology
3.3 Implementation 5th Jan 16 9th Jan 16
Chapter 4: Primary Research 9th Jan 16 21 Jan 16
4.1 Introduction 9rd Jan 16 11th Jan 16
4.2 Design 12th Feb 16 21th Feb 16
Chapter 5: Requirement Validation 11th May 16 30th May 16
5.1.1 Analysis of Data Collected 12th May 22nd May 16
Through Questionnaire
5.1.2 Analysis of Data Collected 23rd May 16 30th May 16
Through Interview
Chapter 6: System Architecture 22th Feb 16 25th Feb 16
6.1 Introduction 22th Feb 16 23th Feb 16
6.2 Abstract Architecture 24th Feb 16 24th Feb 16
6.2.1 System Design 25th Jan 16 25th Jan 16
6.2.1.1 Use Case Diagram 26th Feb 16 27th Feb 16
6.2.1.2 Use Case Diagram 7th Mar 16 9th Mar 16

Specification
6.2.1.4 Activity Diagram 10th Mar 16 13th Mar 16
6.2.1.5 Sequence Diagram 10th Mar 16 13th Mar 16
6.2.2 Database Design 13th Mar 16 16th Mar 16
6.2.2.1 Entity Relationship 13th Mar 16 16th Mar 16

Diagram

DINESH PRABAKAR|TP025822
P a g e 16 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

6.2.1.3 Class Diagram 10th Mar 16 13th Mar 16


6.2.2.2 Database Table Structure 13th Mar 16 16th Mar 16
6.2.3 Interface Design 17th Mar 16 19th Mar 16
6.3 Development/Deployment 19th Mar 16 19th Mar 16
6.3.1 Programming Language 19th Mar 16 19th Mar 16

Chosen
6.3.2 IDE Chosen 19th Mar 16 19th Mar 16
6.3.3 Database Management 20th Mar 16 20th Mar 16

System Chosen
6.3.4 Operating System Chosen 20th Mar 16 20th Mar 16
Chapter 7: Project Plan 21st Mar 16 21th Mar 16
7.1 Release Plan 21st Mar 16 21st Mar 16
7.2 Test Plan 22nd Mar 16 23rd Mar 16
Chapter 8: System Implementation 1st June 16 11th July 16

8.1.1 Homepage/Login 1st June 16 3rd June 16

8.1.2 Admin Panel 3rd June 16 5th June 16


8.1.3 Security Staff Dashboard 5th June 16 7th June 16
8.1.4 Tenants Panel 7th June 16 11th June 16
8.1.5 Visitor Entry Form 12th June 16 15th June 16
8.1.6 Visitor Report 17th June 16 20th June 16
8.1.7 User Attendance Logs 21st June 16 23rd June 16
8.1.8 Holiday Management 24th June 16 27th June 16
8.1.9 Holiday Report 30th June 16 3rd July 16
8.2 Sample Codes 3rd July 11th July 16
8.2.1 Sample Codes for Sign-Up 3rd July 16 7th July 16
feature
8.2.2 Sample Codes for Log-in 7th July 16 9th July 16
feature
8.2.3 Sample codes for 9th July 16 11th July 16
extracting user logs
Chapter 9: System Validation 12th July 16 15th July 16

DINESH PRABAKAR|TP025822
P a g e 17 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

9.1.1 Login into the system 12th July 16 12th July 16

9.1.2 Visitor Management 13th July 16 13th July 16


9.1.3 Fingerprint Access 13th July 16 13th July 16
9.1.4 Holiday Management 13th July 16 13th July 16
9.1.5 Monitoring Records 14th July 16 14th July 16
9.2 User Acceptance Test 14th July 16 15th July 16
Chapter 10: Conclusion and 15th July 16 16th July 16
Reflections
10.1 Critical Evaluation 15th July 16 17th July 16

10.2 System Benefits 15th July 16 15th July 16

10.3 Conclusion and 15th July 16 15th July 16


Recommendation
10.4 Limitations and Future 16th July 16 17th July 16
Enhancement
10.5 Conclusion 16th July 16 17th July 16

Chapter 2: Literature Review


2.1 Literature Review
A literature review surveys books, articles, journals and also various sources relevant to a
specific issue, research area or even theory. This method provides the proper description,
summary and also critical evaluation on the area of the problem which is being investigated.
The literature review produces and overview of sources that developer have explored in

DINESH PRABAKAR|TP025822
P a g e 18 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

investigating a specific topic and also proofs how the research fits within a larger field of
study (California, 2016).

Literature is very crucial in a project because it helps the developer to breakdown the
summary of the area of research and determining the strength and weakness in the previous
similar project which was done by different developers. Basically the literature review helps
developers in their own project by eliminating the weakness which can be known by the
mistakes done by the previous developers, and bringing in more strength to the project which
is being developed (Anon., 2014).

Besides that, the literature review also assists the developer as such:

Plan each work in the context of its contribution to the end-users and understand the
problem which is being studied precisely
Provides description of the relationship of each work to the others under consideration
Determines new ways to interpret earlier research
Overcomes the issues which was discovered in the previous studies
Located developers research within the context of the existing literature (California,
2016)

There will be two section will be focused on this are which are the domain research and also
technical research. Domain research explains about the language which will be picked by the
developer to develop the building security system. Technical research explains about the
similar system which is already out and its compared to the system which is being developed
by the developer.

2.2 Domain Research


In todays world as everybody is concern security and safety towards a building is very
crucial. Building security is not just about installing the latest electronic device and software
bundle. Nor is it just a thought for building types with exceptionally particular occupancy
considerations. Progressively, buildings of all sorts are possibilities for the sort of careful
security planning that proceeds hand-in-hand with the architectural design process.
Guaranteeing an appropriate and cost-effective level of security, architects need to familiarize

DINESH PRABAKAR|TP025822
P a g e 19 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

themselves with the range of security factors that influence the design (DeGrazio, 2016). The
developer hereby would like to conclude that, each and every plan that to be taken in the
development of this project have to be precise and properly planned for a crucially secured
security system.

In general, one question which always pops up on peoples mind is what is a security system
in a building designed to protect? The answer for this question is obviously the duty of the
security is to protect the people who utilizes the building. Apart from that, actually the
security considerations are far from just securing the people in the building. The security
system supposed to be concern who and who may not enter a building, monitoring the
controlling the specific people permitted access to specific areas within the building. Level of
access control may vary for different reason depending on building types (DeGrazio, 2016).

Besides that, sometime the most reliable organizations are also not secured, where two
security researches recently found that they could easily hack the building management
system for the corporate giants wharf 7 office overlooking the water in the Pyrmont section
of Sydney, Australia (Zetter, 2013). The Google Australias building management system is
built on the Tridium Niagara AX Platform, these platforms have shown serious
vulnerabilities. The patch for this system have been released by the Tridium but te Googles
control system could not be patched where the researchers could still obtain the
administrative password for it (Zetter, 2013). This articles states that not every building
security is safe and there are still many buildings that are exposed to threat as such. The
developer would like to conclude that every building has its weakness and vulnerabilities
exposed, and have to ensure that the project which is being developed by the developer have
to be aware about vulnerabilities like this.

Moreover, referring to buildings security in Malaysia it is clearly explained that there are no
proper security service in high-rise residential complexes in Malaysia. A survey shows that
78.1% of the high-rise residential building in Penang are provided with security guards (Ta,
2004). The number of guards assigned to the building ranges from one to 14 personnel.
Certain buildings are accommodated with multiple layer of security which includes the
guardhouse, automated gates, CCTV and perimeter fencing (Ta, 2004).

Equipped with various security features but the level of security in these buildings are still
highly questionable as the number of crime occurrence is still quite high. Depending on the

DINESH PRABAKAR|TP025822
P a g e 20 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

studies that have been done in Penang, a percentage of 85.2% of the buildings have the issues
of crime occurrence around and in their premises (Ta, 2004). This states that the various
security measures which have been implemented are still weak and inefficient (Ta, 2004).

Normally the security services in Malaysian residential complexes are normally outsourced
from private companies and a very few residential complexes management provide their own
security (Ta, 2004). Most of the security guards hired are foreigners and the guards normally
appear with no proper training on mitigating the threat occurs. Besides that, most of the hired
security guards are old retirees, according to the security firms it is very hard to get young
people to join the security force. Besides that, due to the increasing demand for security
guards the building management tend to fulfil the manpower in security, here the advantage is
played by the security firm to hire anyone as the security guard to fulfil the manpower
regardless of the background and qualification of the person hired (Ta, 2004).

Besides that, according to Telekom Malaysia Payphones (Putrajaya and Petaling Jaya),
vandalism against the Telekoms payphones is high even in strictly guarded buildings. Below
shows the table of faulty payphones due to vandalisms in buildings in Selangor.

Location No. Of Payphones No. Of Faults* Revenue (RM)**


Abadi Indah 12 2 145
Condominium
MontKiara 9 2 145
Condominium
University Tower 2 Once in two months 130
Country Heights 6 1 155
Subang Perdana 21 15 260
Flats
Sri Selangor Golf 2 Once in two months 135
Club
SS15 Subang Jaya 85 26 250

Note *Average per month

DINESH PRABAKAR|TP025822
P a g e 21 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

**Average revenue per month per unit

Source: Telekom Malaysia Payphones Putrajaya ( (Ta, 2004))

Besides that, when it comes to buildings, the security continues to be the most questionable to
the residents. A number of property management companies complains that the resident
doesnt want to agree over the security cost, where the cost actually leads to dispute board
members, unit owners and tenants does not want to pay extra money for the security guards,
software systems and the CCTV operations (ICC, 2015).

High-rise buildings are known for higher crime rates, including drugs, theft and burglary.
How could this take place? According to a professor from the University of Victoria Robert
Grifford, crime and the fear of crime increases with the height of a building (ICC, 2015). This
statement given by him is supported by few reasons such as, management cannot afford
enough security, strangers are able to roam around the building freely, visibility around the
high rise building are lower compared to other building (ICC, 2015). Besides that, security
experts also explained that luxurious high-rise buildings are going to invite high-end burglars
(ICC, 2015).

Biometric Authentication (Fingerprint Scanner)

Biometrics are automated techniques for perceiving a person based on a physiological or


behavioral trademark. Among the components measured are face, fingerprints, hand
geometry, handwriting, iris, retinal, vein, and voice. Biometric information are isolated and
distinct from individual data. Biometric formats cannot be figured out to reproduce individual
data and they can't be stolen and used to get to individual data (Clocking, 2016).

Utilizing an exceptional, physical characteristic of the clients body, for example, their unique
mark or iris, to easily recognize and confirm that they are who they claim to be, is the best
and simplest arrangement in the business sector today. That is the basic truth and force of
Biometrics Technology today. In spite of the fact that biometric innovation has been around
for a long time, cutting edge progresses in this developing innovation, combined with huge

DINESH PRABAKAR|TP025822
P a g e 22 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

diminishments in cost, now make biometrics promptly accessible and moderate to buyers,
little entrepreneur, bigger organizations and open area offices alike (Clocking, 2016).

A fingerprint scanner system has two basic tasks, where it needs to get an image of your
finger, and it needs to determine whether the pattern of ridges and valleys in this image
matches the pattern of ridges and valleys in pre-scanned images (Clocking, 2016).

The unique thing about the fingerprint is where only specific characteristics are filtered and
saved as encrypted bio metric key (Clocking, 2016). Actually the image of the fingerprint
which has been scanned would not be saved but it will be saved as a series of numbers which
will be used for verification. The numbers cannot be reconverted into image hence, it makes
it harder for intruders to duplicate it.

Figure 1 shows the overview of finger print system

Image source: (Clocking, 2016)

Advantages of Fingerprint System

Actually in an electronic time clock system such as the biometric authentication, RFID and
also the verification system its actually divided into three parts as such:

What users have


What users know
What users are

By utilizing the what users have system the users need some sort of identity such as the
identity card with a magnetic strip to get pass the system. A what users know system is
where users have to enter their password to get through the system and finally a what users
are system is where the system looks for a physical evidence that who are the users to get
through the system (Clocking, 2016).

DINESH PRABAKAR|TP025822
P a g e 23 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

What users are system is the system that the fingerprint authentication utilizes and have
loads of advantages over the system such as below:

Fingerprints are almost impossible to fake compared to other methods such as identity
card and password.
Fingerprint pattern cannot be guesses compared to password
Fingerprint cannot be misplaced compared to access card
Fingerprint cannot be forgotten compared to password.

2.3 Technical Research

Figure 2 shows an overview of Building Security System

Image Source: (Strategies, 2014)

DINESH PRABAKAR|TP025822
P a g e 24 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

The above image of building security system provided by Integrated Building System is
dedicated within the best price of regular and modernized surveillance systems along its
installation. The integrated building security system instated and actively works to install into
the right security system as per the budget constraints and customized security needs
(Strategies, 2014).

This is one system which is chosen by the developer for the comparison purpose. The system
above provides more security towards the energy saving and also natural disaster such as the
lightning. This system cost more in the implementation of the devices but it is not exactly
secured from problem such as, threat, robberies and breakthrough. This is because the system
above does not provide any authentication access, security features that will provide safety
towards the tenants and also surroundings. Besides that, the system above is time consuming
since there are too many devices that are needed to be installed in-order to provide safety
which is just inner safety and the outside surrounding of the building is vulnerable and
exposed.

The developer has decided to provide a well secure user authentication in such a way that
biometric authentication implementation into the system. As to know recently biometric
authentication is becoming more popular as it relies on a physical unique to the person trying
to authenticate. The biometric authentication that has been decided by the developer to
implement is the fingerprint recognition.

DINESH PRABAKAR|TP025822
P a g e 25 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Figure 3 shows Vertex Security and Technology solutions

Image source: (Technology, 2016)

The above system is from the Vertex Security and Technology solutions for building security
system (Technology, 2016). This system is compared by developer to ensure that the system
that will be developed will be enhanced in security features and also the safety of building.

As shown above the security system provided by the Vertex security are as card reader,
electric door strike, and keypad door lock. All this locks are not easily breakable but still if its
broken it cost a lot and besides that, sometimes human error such as forgetting the access
card, forgetting the pin and etc are the issues that might be faced by Vertex security. Besides
that, the access card nowadays can be easily faked using the magnetic strip encoder where it
steals the information in the original access card and places it in the fake ones where it will
work exactly like the original card (CaptainWow, 2015).

Each and every weakness which is found in the system will be used as an information to
create a very safe system in the future with enhanced features and guaranteeing satisfaction to
the people who are connected to the building.

DINESH PRABAKAR|TP025822
P a g e 26 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Figure 4 shows INETSOFT Systems

Image source: (PVT., 2015)

The above system is from INETSOFT Systems. The weakness of the system is the access
card, and badging. This is because as spoke on earlier cases the access card and the badging
can be easily faked and the robbers or intruders can easily gain to access to the building and
this might lead to stealing of data information and also expensive assets.

This system also makes the developer more interested on the elevator control and mobile
alerts which is a very good security features which will improve the security quality of the
building security system which is being created by the developer. Implementing the mobile
alerts and the elevator control will be implemented by the developer if the time allows.

DINESH PRABAKAR|TP025822
P a g e 27 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Architecture

Figure 5 shows the building security system architecture

Building security system architecture

The building security system which have been proposed will be peer to peer based
architecture. Peer-to-peer architecture is a regularly utilized PC organizing engineering as a
part of which every workstation, or hub, has the same abilities and obligations. It is regularly
compared to the exemplary client/server design, in which a few computers are committed to
serving others.

DINESH PRABAKAR|TP025822
P a g e 28 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Conclusion

After completing the similar system comparison to the proposed system, the developer has
learnt that certain security issues can cause a high level of danger and decided to implement
some security features towards the proposed system to protect the safety of the people and
building.

The security implementation which will be implemented in the proposed by the developer
will be the biometric authentication which is the fingerprint scanner. The fingerprint scanner
employs the use the biological data in the form of signature scans.

Finally, this project is to assist in increasing the security level and the privacy of residents
around the building. Normally the security management would not be concerned on how safe
is the security around the building until incidents like robbery or theft happens, by
implementing security features is like taking precautions before incidents occur.

DINESH PRABAKAR|TP025822
P a g e 29 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Chapter 3: The Chosen Methodology


The system development methodology in the information technology is the framework that is
utilized to plan, structure and control the process of developing a specific system (Portal,
2016).

Methodology can be explained as principles or rule which proceeds with specific methods or
procedures that may be derived to overcome different issues within the scope of a particular
set of rules. Methodology is not an algorithm, where it is not a set of formula but set of
practices (Dictionary, 2013).

There are many types of methodologies such as the Rapid application development, Spiral
and etc. The discussed methodology for the building security system is the Structured System
Analysis and Design Method (SSADM) and RUP Methodology.

The SSADM is basically a set of standards which was developed long time ago during the
1980's which was widely utilized by the government computing projects in the United
Kingdom. The SSADM uses the mixture of text and diagrams throughout the entire life cycle
of a system design (Beal, 2016).

DINESH PRABAKAR|TP025822
P a g e 30 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

3.1. SSADM

Title SSADM

Involvement Clients are involved for presentation

Person in charge System analyst decide the overall design of the system

Interaction with users Ideas are to be presented to user from stage to stage

Project types Large and long term projects

Disadvantages Time and cost consuming, require very detailed steps

DINESH PRABAKAR|TP025822
P a g e 31 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

3.1.1. Justification of the selection

SSADM is discussed by the developer is because this methodology is a traditional


methodology which comes with detailed documents and also guidelines which should be
taken in order to achieve the aim of the project. Besides that, using SSADM also gives
importance to the end users, because it puts the priority on ensuring the system is user
friendly so that the users with or without the knowledge of computing will be able to utilize
the system.

The building security system is a long term project where if the system is implemented in the
building it will remain as the security of the building for the next few years where this is also
one of the reason the SSADM is discussed. This is because the SSADM is most suitable for
long term project.

On the other hand, SSADM also contains its disadvantages where it takes a great deal of
time. When the project take so much of time to be completed it might bring the risk of not
completing the project on time. There is a large delay between the inception of the project
and the delivery of the system (Cohen, 2016). By utilizing SSADM in this project the steps
required are very detailed and specific and usually determined by expert or professional to
ensure that the righteous way are taken in the target of achieving the objective of the building
security system.

Questionnaires and interview will be conducted to the security management of the building to
ensure that their ideas and answers are the main key to develop the building security system.

Describing the system development technology

One of the main features of SSADM is the crucial user involvement in the requirement
analysis stage. Here, the users are made to complete stage by stage as they are sure that the
requirements have been met. SSADM breaks up a development project into stages where the

DINESH PRABAKAR|TP025822
P a g e 32 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

project will be done step by step. The techniques used in SSADM are logical data modelling,
data flow modelling and entity behaviour modelling.

Logical data modelling Involves the process of identifying,


modelling and documenting data as a part of
system requirements gathering. The data are
classified further into entities and
relationships.
Data Flow modelling Involves tracking the data flow in an
information system. It clearly analyses the
processes, data stores, external entities and
data movement.
Entity behaviour modelling Involves identifying and documenting the
events influencing each entity and the
sequence in which these events happen.

DINESH PRABAKAR|TP025822
P a g e 33 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

3.1.2. Overview of the diagram associated with SSADM

Figure 6 shows the stages of SSADM

Image source: (mmu.ac.uk, 2014)

3.1.3. Overview on how the proposed system will proceed

According to the image above the SSADM goes through 7 stages (0-6) where the developer
will be relating on what will be done in each stage in developing the proposed system.

Stage 0- Feasibility study

In this stage of the methodology the developer has to design the planning on the areas of the
project. Here in this stage the developer choses the programming language which will be
used, the softwares and also hardwares which suits the project. Besides that, the financial
analysis before the kick off the project have to be considered by the developer to ensure that
its within budget to develop the system. The system which is being developed have to suit in

DINESH PRABAKAR|TP025822
P a g e 34 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

todays practice as in the system which is being developed by the developer should be
compatible. Finally, in this stage the developer has to analyse whether the impact of the new
system will be widely acceptable by people

Stage 1- Investigate current system

In this stage the developer should fully study the current security system. Here the developer
should use the information gathering method to collect data to ensure the problems that the
people facing can be solved in the proposed system. The developer uses the interview and
questionnaire method to collect the information from the people. Besides that, developer can
also conduct research on type of security which is being offered in large firms which can be
implemented in the propose system.

Stage 2- Business system options

The design of the overall proposed system will be decided by the developer. The developer
has to develop a set of business system option referring to the previous stage. The design
might be modification to current system or even a total new system to be implemented. In
this stage the developer should brainstorm for ideas to turn the system into a wonderful
system. Things that the developer should take into consideration at this stage is the new
systems impact, cost, limitations and etc.

Stage 3- Requirements Definition

This is one of the problematic stage in the SSADM. In this stage the developer should
develop a full functioning logical specification of what the developed proposed system will
do. Here there are many diagrams are put to use to produce the logical requirement, the
diagrams that is done are the data flow diagrams (DFDs) and logical data model (LDM). In
this stage the complete document of the updated requirements, user roles and function
definitions are finalized.

Stage 4- Technical System Option

This stage is focused more towards the physical implementation of the proposed system. A
variety of options for the implementation of the new security are created. The developer here
chooses the hardware architectures for the system, software which is needed, the
implementation cost, and security experts review. Besides that the developer should consider
the physical of space where how much space the system occupies.

DINESH PRABAKAR|TP025822
P a g e 35 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Stage 5- Logical design

This stage emphasis on the human command interface (HCI). This stage particularly
determines the primary procedures of interaction in term of the graphical user interface which
will guarantee the ease of use of the end-users. This stage consists of the data required,
logical process model and logical data structure.

Stage 6 Physical design

This stage is where the real system is created. Specifications of the security system is
converted to real hardware and software. This stage is very mandatory where a simple
overview design of the proposed system is required to be presented. The logical data here is
refurbished on term of database structures and the exact structure of the functions and their
execution is determined. The physical data structure is enhancing to meet the performance
requirements.

DINESH PRABAKAR|TP025822
P a g e 36 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

3.2. RUP methodology

3.2.1. Overview of the diagram associated

Figure 7 shows the RUP Phase Model

Image Source (mindcrafts, 2009)

The RUP when compared to SSADM, it emphasises on accurate documentation more than
SSADM. The project will be divided into 4 phases according to the RUP model. The stages
are as shown in the image above which are Inception, Elaboration, Construction and
Transition. Hereby, the time take for the development is lessen due to the re-usability of the
components (Pirzada, 2009).

DINESH PRABAKAR|TP025822
P a g e 37 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

3.2.2. Phases of RUP


Inception

In this stage the developer has to consider the project before the start whether it is worth it or
not. Developer have to formulate the scope of the project and confirms what are the resources
needed in order to complete the project.

Elaboration

In this stage the architectural element is defined. Here the developer have to create logical
design with the Unified Modelling Language (UML) diagrams which are the use-case
diagrams, entity relationship diagram (ERD), class diagram and other diagrams which are
relate to the building security system. Besides diagrams, the data mining method such as the
interview and questionnaire is used to gather the requirement of the system.

Construction

In this phase the development of the project is completed, where the developer should
complete codes and the design. Besides that, in this stage the developer has to test the system
to ensure the goals of the system from the inception phase are met.

Transition

This is the final phase of the RUP where the project has to be delivered to the end-users
where the developer will hand over the system to the security management staff to test the
systems function and to evaluate their feedbacks.

Concluding that, RUP methodology provides all the structure that is needed to guide the
developer through the phases in order to complete the project successfully. Besides that, RUP
also helps the system to be accurate and effective and also helps the developer to complete
the project on time and budget.

DINESH PRABAKAR|TP025822
P a g e 38 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Besides SSADM that was discussed above, the Rational Unified Process (RUP) model will
also be implemented in the system. The RUP is chosen after in depth research, and why it is
chosen is simply because it provides a better solution in the implementation of the system.
The RUP is the best practice in the modern software development and suits a variety range of
projects (UCAR, 2016).

Upon careful research, the developer has insisted to choose RUP Methodology due to several
efficient purposes. RUP is known to be an ideal methodology when it comes to the stage of
development and implementation based on the findings above.

Work Breakdown Of The Project Using RUP

DINESH PRABAKAR|TP025822
P a g e 39 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Chapter 4: Primary Research


4.1. Introduction
In this chapter as discussed earlier the developer is firm with the decisions in utilizing the
interview and also the questionnaire method.

4.1.1. Questionnaire
Questionnaire is a data mining method which consists of a series of questions which works
in-order to gather information from the respondents. The questionnaire is designed to extract
particular information where it serves the four purposes (BusinessDictionary, 2016).

Collection of appropriate data


Data comparable to analysis
Minimize Bias in formulation and asking question
Make questions engaging and varied.

Advantages of Questionnaire (llibweb, 2016)

Huge amount of information can be collected from the specific amount of people in
short period of time
Can be completed by the analyst or by any number of individuals with restricted
effect to its validity and reliability
After effects of the questionnaires can as a rule be rapidly and effortlessly measured
by the developer easily using tools
Can be analysed more 'scientifically' and objectively than other forms of research
At the point when information has been evaluated, it can be utilized to thoroughly
analyse other research and might be utilized to quantify change

Disadvantages of questionnaires (llibweb, 2016)

Lacks of validation
Cannot guarantee that the respondent is being truthful
Cannot guarantee how much of thought the respondent have put in
Respondent might just simply answer it and do not take it seriously

Expected finding

DINESH PRABAKAR|TP025822
P a g e 40 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Questionnaire will be distributed to all type of people who are aware of the importance of
building security. Questionnaire will be focusing on people from various age, gender, and
occupations to ensure that opinions are not only collected from selected people, but it is
collected from people from all field. The inquiry will be made utilizing 'Google Forms'
which is a automated tool that empowers programmed information classification in view
of the response of the survey. The distribution of questionnaire will be done online
whereby the link will be shared and made open on social networks. This diminishes paper
cost and genuinely helpful for both the specialist and respondents.

Questionnaire design

Questions Objectives
1. Gender To make sure whether the participants are
male or female.
2. Age To know the age of the participants.
3. What type of building you are To gain information on what type of
living at? building the participants are living in.
4. How important is security in To know the importance of security in the
residential building? residential building.
5. In a scale 1-5 how important do To know how important is it to implement
you think it is to have a proper a proper security system in the residential
security system? building.
6. In a scale of 1-5 how useful will To ensure the importance of the proposed
the proposed system will be to system in overcoming the security
overcome security breaching by breaching by intruders.
unauthorized personnel?
7. On a scale of 1-5, how useful will To ensure how important the system will
it be for the tenants, security staff be towards the users in the residential
and administrator staff if the building.
proposed system residential
security system is developed?
8. On a scale of 1-5, how would you To make sure how happy are the
like to rate the expectations of the participants on the functionalities of the
proposed system in the terms of proposed system.
functionalities and reliability?
9. By implementing proposed To know the perception of the participants
security system, do you think that on how secured they think they building

DINESH PRABAKAR|TP025822
P a g e 41 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

the surrounding of the building will be with the implementation of the


will be secure enough? proposed system.
10. Do you think the proposed system To ensure that the system can really
could reduce the money spent on reduce money spent on the labour force.
the security force to guard the
building?
11. Do you think is it necessary to To ensure the importance of implementing
implement the bio-metric the fingerprint authentication to the
(fingerprint) authentication in the proposed system.
residential building security
system?

4.1.2. Interview
Interviews are used to collect data from a small group of subjects on a broad range of topics.
Developer can use structured or unstructured interviews. Structured interviews are
comparable to a questionnaire, with the same questions in the same order for each subject and
with multiple choice answers. For unstructured interviews questions can differ per subject
and can depend on answers given on previous questions, there is no fixed set of possible
answers (Twente, 2016).

DINESH PRABAKAR|TP025822
P a g e 42 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Advantages of interview

Easy correction of speech


Development of relationship
Time saving
Less Costly
In depth analysis

Based on the above explanation on interview, the interview question are designed by the
developer to extract information on the current system to be enhanced in the future building
security system.

Interview Design

The following interview question is prepared by the developer to be answered by the existing
system users. For example, security head, management staff, tenants who currently lives in
residential apartment.

Name of Interviewee: Position:


Date of Interview: Time from: Time to:
Location: Mode of Interview:

Question 1 Do you think that by implementing full operational system, the threats
such as crime, vandalism and robbery can be overcome?
Answer:
Objective To investigate peoples opinion on the implementation of the full
operational security system to replace the current system.
Question 2 What are the advantages that you have found by using the current building
security system?
Answer:
Objectives To ensure the good features in the current system.
Question 3 What is the weakness that you have found by using the current building
security system?
Answer:
Objective To investigate the weakness of the current system and to enhanced it in the
proposed system.
Question 4 What are the possible issues that can be faced by the building management
based on the disadvantages that have been mentioned above?
Answer:

DINESH PRABAKAR|TP025822
P a g e 43 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Objective To investigate the issues that are faced by the management regarding the
disadvantage of the current system.
Question 5 What is most important thing to look at in order to provide the best
residential building security system?
Answer:
Objective To understand what is the most important factor that leads the project to
success so developer can develop the security system according to it.
Question 6 Based on the issues mentioned above, what are the precautions that will be
taken in order to prevent the risk that will be faced by the building
management in future?
Answer:
Objective To ensure the steps taken to prevent the threats in the current system.
Question 7 Have you experienced before such a situation where criminals who tend to
claim themselves as a visitor to get access into the building?
Answer:
Objective To know the tenants side of opinion on facing criminals in the building
Question 8 What do you think about biometric authentication implementation into the
system? Will it provide a secure environment?
Answer:
Objective To study peoples opinion on the implementation of the biometric
authentication.
Question 9 What will be the tools and techniques that
you use for the development of the system?
Answer:
Objective Objectives: For developer to select the suitable tools and technique that
will help to increase the efficiency and effectiveness of the project.
Question 10 What functionality do you expect to have in the residential building
security system?
Answer:
Objective Objectives: To make sure this project carries all the basic functions
required.

Chapter 5: Requirement Validation


Requirement validation is an iterative procedure which happens all through the life cycle of
the project. Amid elicitation, examination and detail developer should continually be

DINESH PRABAKAR|TP025822
P a g e 44 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

addressing and clearing up the information given to you keeping in mind the end goal to
check its legitimacy (School, 2010).
One of the most crucial steps to be taken in completing a project is the data gathering, where
the developer gets to collect the needs of the user, perception and also feedback towards the
system which is being developed. Developer choose the questionnaire and interview method
in order to collect data because it can be done under a cheaper cost and it is very responsive
in collection of data.

5.1. Analysis of data

5.1.1. Analysis of data through questionnaire


Question 1
:
Result :

Analysis : The figure above shows the amount of respondents who participated in the
questionnaire, where it cleary states that, most the majority who submited
the questionnaire are guys. The bar chart above explains that out of 34
respondents 20 of them are male and 14 of them are female. From the

DINESH PRABAKAR|TP025822
P a g e 45 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

results above the developer concludes that, the survey is participated by


nearly fair amount of male and female.

Question 2
:
Result :

Analysis : According to the results above, it states that most of the respondents ages
are 20-25, which can be said as the most people who filled up the survey are
the people who are aware of what is security and the importance of it. The
results above shows that out of 34 respondents, 26 of them are in the age
range of 20-25, 1 respondent from under 20 and 7 respondent whose age are
above 25-30 and there were no respondent whose age is above 30.

Question 3
:
Result :

Analysis : The question above is to summarize the type of building respondents are
staying at. This question is asked in-order to ensure that respondents are
familiar with the topic they are about to answer about. As a summary from
the above results it is shown that respondents from both terrace and
condominium are in the same amount which is 35.3 percentage each, and

DINESH PRABAKAR|TP025822
P a g e 46 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

the others are 26.5 percentage of them from apartment and the other 2.9
percentage are from other type of residential building. This shows that
people who are filling up the questionnaire are all from different types of
residential building which helps the developer to gain information and
feedbacks of their thought about the system which is being developed by the
developer.

Question 4
:
Result :

Analysis : The above graph shows how much important is security in a residential
building from the participants perception. Out of the 34 respondents 24 of
them thinks that security is the main factor in a residential building by
ticking the annswer very important and that occupies 70.6% of the total
respondents. Besides that 9 out of the 34 respondents who thinks that
security is important in the residential building, which occupies 26.5
percentage and only 1 respondent is neutral to the importance of security in

DINESH PRABAKAR|TP025822
P a g e 47 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

the residential building which occupies 2.9%. The results above explains
that the respondents thinks that security is crucial in a residential building,
where it motivates the developer with the importance of security in a
residential building and to develop a secured system.

Question 5
:
Result :

Analysis : The above results shows the importance of having a proper security system
in a residential based on the mind set of the respondents. 19 out of the 34
where majority respondents thinks that its is very important for a residential
building to have a proper security system which occupies 55.9% of the total
number of respondent. Besides that aroun 14 respondents (41.2%) of them
also thinks that its important to have a proper security system in the
residential building, and only 1 of them thinks neutrally about the having a
proper security system in a residential building. This question explains why
a proper and secured system needed to be developed by developer because
according to the respondents a proper security system is extremely
important in residential building. Besides that, throught the results of this
question it can be seen that respondents are demanding for a well structured
and secured system in order to improve their security and privacy around
the building.

Question 6
:

DINESH PRABAKAR|TP025822
P a g e 48 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Result :

Analysis : Question 6 explains how useful will the proposed system will be to
overcome unauthorized access from the respondents view. As can be seen in
the bar chart above, 19 out of the 34 (55.9%) respondents thinks that the
proposed system will be useful in overcoming security breaching by
intruders or unauthorized personnel. Besides that, 13 out of 34 (38.2%) are
the respondents who thinks that the proposed system will be crucially useful
to overcome security breaching by intruders and 2 out 34 respondents
(5.9%) who are quite neutral about how useful the proposed system would
be. It can be seen that majority of the respondents thinks that the proposed
system will be very useful in overcoming such security breaches and also to
avoid unauthorized access inside the residential building.

Question 7
:
Result :

Analysis : The above question explains how will the proposed system will be useful to
the tenants, security staffs and also the administrator in the resiential
buidling security system. As shown in the above responds from the

DINESH PRABAKAR|TP025822
P a g e 49 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

respondents it can be seen that 16 out of 34 (47.1%) respondents who have


stated that it is very important for the admin, security staff and tenants to
utilize the proposed system. Besides that a similar number of respondents
also thinks that proposed system will be useful and important to the staff,
admin and tenants inside the residential building and only 2 out of 34
(5.9%) respondents who are neutral to this question. This explains the
importance of developing the proposed system in-order for the admin,
security staff and tenants to utilize it.

Question 8
:
Result :

Analysis : Question 8 shows the expectations of the respondents in terms of the


functionalites and reliability of the proposed system. It shows that majority
of them which is 22 out of 34 respondents (64.7%) has high expectations
and 12 out of 34 (35.3%) has very high expectations towards the
functionality and reliability of the system which is a challenge to the
developer to develop a well function and highly reliable system for the
residential building. Its can be seen that the participants knows how
important is it to have a higly reliable system with good functionalites
system in the residential building to protect them. In-order to full-fill their
needs the developer has to work even harder to create system to their
expectations.

Question 9
:

DINESH PRABAKAR|TP025822
P a g e 50 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Result :

Analysis : Question 9 explains that how the respondent thinks whether the surrounding
of the building will be secured with the implementation of the proposed
system. As can be seen in the results majority of the respondent 19 out of 34
(55.9%) agrees and 13 out of 34 (38.2%) strongly agrees that with the
implementation of the proposed system by the developer that the building
will be more secured which means the proposed system implementation can
increase the confident in the people who are investing in residential building
that they are much safer with the implementation of the system.

Question 10
:
Result :

Analysis : Question 10 is the comparison between the security system and the security
force which is questioned to the respondents whether they think that the
system can reduce the number of the security guard in a residential building.
As can be seen in the above feedbacks that majority of the respondents 17
out of 34 (50%) of them are not agreeing with the question and remains
neutral. Where 1 out of 34 of the respondents thinks it is not applicable that
the system can replace the security force in the building. 11 out of 34
(32.4%) agrees and 5 out of 34 (14.7%) strongly agrees that this systems
can reduce the money spent on the hiring of security force in residential

DINESH PRABAKAR|TP025822
P a g e 51 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

building. This means that in the perception of the respondents they think
that even with the implmentation of the system security force is still needed
to guard the building.

Question 11
:
Result :

Analysis : This question is to ensure how much agreeable are the respondents on the
implementation of biometric device (fingerprint) authentication. The results
above states that majority of the repsondents 22 out of 34 (64.7%) agrees
and 9 out of 34 (26.5%) strongly agrees on the implementation of the
fingerprint authentication in the residential building is neccesary where
there are very little respondent 3 out of 34 (8.8%) of them who stays neutral
with the implementation of the fingerprint autentication. The graph aboves
shows that most of the respondents prefers the implementation of the
fingerprint authentication in order to create a highly secured security system
for the residential building.

5.1.2. Analysis collected through interview method


Number: 1
Target: Head of Security Vista Komanvel A
Question: Do you think that by implementing full operational system, the threats
such as crime, vandalism and robbery can be overcome?
Answer: Yes. The proposed system has good security layers to be monitored. We

DINESH PRABAKAR|TP025822
P a g e 52 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

couldnt overcome such problems completely but I believe we can


drastically reduce such threats.
Analysis: The answer shows that it is very important to implement the full
operational building security system in order to increase the security
level around the building. The answer also explains that, the crime
problems cannot be overcome completely but with the implementation
of the full operational system it can be reduced drastically. A proper
system should be developed by the developer to ensure that it can really
control the crime rate in the building.

Number: 2
Target: Head of Security Vista Komanvel A
Question: What are the advantages that you have found by using the current
building security system?
Answer: The current system has less advantages compared to the proposed
system, but I would say that the current system is easier for the foreign
security guards to handle. Besides that, there are several guards at the
entrances of each block in the apartment 24 hours
Analysis: The above answer shows that a replacement for the current manual
system is needed, but at the same point the manual system are much
more user friendly to the foreign security staff to access. This explains
that most of the foreign security staff are not familiar with the usage of
computerized system. On the other hand, the answer also explains that
with the current system there are several security guards at the entrance
of the building to enhance the security of the building. The answer also
helps the developer to keep in mind that the system which is being
developed should be simple and easy to be adopt by the security staffs.

Number: 3
Target: Head of Security Vista Komanvel A
Question: What is the weakness that you have found by using the current building

DINESH PRABAKAR|TP025822
P a g e 53 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

security system?
Answer: Since most of the operations are manual, there is always mistakes in
data recording which will affect the safety of the apartment. Besides
that, the security is unable to cover the entire units of the apartment and
monitor the units condition all the time.
Analysis: The above answer states that manual operations lead to the miss placing
of data around the building, where the security head also insists that the
miss placing and loss of data will affect the safety of the building. On
the other hand, it can also be analysed that the security guards are unable
to cover and monitor the entire building. This means with the new
system, workmen can be reduced and entire building can be monitored
with the implementation of the system.

Number: 4
Target: Management Staff Vista Komanvel A
Question: What are the possible issues that can be faced by the building
management based on the disadvantages that have been mentioned
above?
Answer: Strangers in disguise of visitors (E.g.: Relatives, friends) walks in the
apartment. Unknown theft and vandalism of property are done.
Uncontrolled movement of non-residents in and out throughout the day.
Analysis: The above condition shows that, developer concludes that the
management are facing serious problem as anyone can sneak into the
building claiming themselves as visitor, relatives and etc. This however
endangers the surroundings causing vandalism theft and other crime
activity.

Number: 5
Target: Management Staff Vista Komanvel A
Question: Based on the issues mentioned above, what are the precautions that will
be taken in order to prevent the risk that will be faced by the building

DINESH PRABAKAR|TP025822
P a g e 54 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

management in future?
Answer: Monitor the non-residents activities around the apartment. Take security
measures such as getting identification cards, and approval from
residents to enter to their unit. We should implement a more secure
system to monitor in and out of tenants and visitors. Everything should
be recorded properly.
Analysis: The above answer explains that the management staffs already have
security measures that needed to be taken to increase the level of
security around the building to ensure that people cannot easily enter the
building without proper verification. This reminds the developer to
create a system to ensure that the visitor and the outsiders who are let
into the building should be monitored by the system. This increases the
level of security in the building.

Number: 6
Target: Head of Security Vista Komanvel A and Management Staff Vista
Komanvel A
Question: Have you experienced before such a situation where criminals who tend
to claim themselves as a visitor to get access into the building?
Answer: There are many cases whereby students who are residents bring their
friends over and walk in without any notice. There was once a robbery
in a residents house and the only thing that we able to provide to police
was his photo from cctv camera because the details of the person was
not recorded in the main guard house.
Analysis: The answer above shows that this is one of the most important problem
that should be overcome by the system which is being developed by the
developer since there are many trespassers who are the behind many
crimes which is happening in the building. In the developers mind
visitor access has to be monitored through the proposed system in-order
to create a safer environment around the building.

DINESH PRABAKAR|TP025822
P a g e 55 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Number: 7
Target: Tenants
Question: What do you think about biometric authentication implementation into
the system? Will it provide a secure environment?
Answer: Yes. Residents would feel much secured and protective whereby the
securities are aware on who are visiting the residents. Obviously yes
because, this system will help security guards to monitor all the
residents and visitors entrance to the apartment.
Analysis: The above answer explains the importance of implementing the
fingerprint authentication in the proposed system. It can be seen that the
users are interested and aware that with the implementation of the
fingerprint authentication that the resident of the building can be tracked
and the visitor movement can be controlled. In developers view it is
important to implement the fingerprint authentication in the proposed
system to enhance the security level.

Number: 8
Target: Information System Security Specialist
Number:
Question: 9 What will be the tools and techniques that you use for the development
Target: Information System Security Specialist
of the system?
Question:
Answer: What
The is most and
easiest important thing
basic tool to to
uselook at in reader.
is RFID order to provide can
Beginners the best
try to
residential building
use LF (low security
frequency) system?
which is really simple to use, just scan and the
Answer: One of the
serial codemost
willimportant factors
appear. I will use to look intoVisual
Microsoft is the Studio
maintenance
2013 toofdothethe
system.
sourceWhen
code aand
system
the is not well taken
programming cared ofI orchoose
language have backup
will bepower
Visual
supply,
Basic. it cant be ensured that it will be working 24/7 and therefore
Analysis: cant provide
As can enough
be seen safety
in the for answer
above the residents.
the IT expert is suggesting on the
Analysis: The result
usage of tells the developer
the RFID reader tothat not only
enhance thethe featureslevel
security of the
of system are
the building
important, the maintenance
security. This explains thatand
thebackup power
developer supply
should are also RFID
implement extremely
in the
important
proposedtoo because
system. Thewithout consistency
developer takes theofsuggestion
the system, no matter
from how
the IT expert
good
and the
willfeature it has,it itinwont
implement be able
the system if to carry
time it out.
allows.

DINESH PRABAKAR|TP025822
P a g e 56 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Number: 10

Target: Tenants

Question: What functionality do you expect to have in the residential building


security system?

Answer: Record the entrance and exit of people through the main entrance. Record
proper details of each and every visitor pass through the entrance.
Information to the securities on who are the visitors and visiting duration.
In case of any unwanted incidents, securities are able to trace back on
occurred events.

Analysis: The above answer states what kind of functionalities that the tenants want,
and it can be seen that the tenants are aware that the security of the
building can be enhanced by knowing who is in and out of the building.
Besides that, visitors access can be controlled by tracking the movement
of the visitors in the building. Developer has to create visitor profile
management in order to ensure that the visitor movement in the building
can be monitored.

5.1.3. Interview Conclusion


To conclude on analysis of data collected through Questionnaire and Interview are the
responses obtain from the questionnaire enable the developer to have a better
understanding of what are the needs of the end-user from the system which is
proposed by developer. Based on the analysis of the questionnaire result, the
developer will prioritize the system features, do(s) and dont(s) base on the end user

DINESH PRABAKAR|TP025822
P a g e 57 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

response that have been collected. End user needs towards the Residential building
security system should meets end-users satisfaction and needs.

Furthermore, the interview analysis also helps the developer to analyse the overall
system availability, reliability and performance that the final users can tolerate based
on the results collected. Lastly, this chapter serves as a guide for the developer in
developing the system.

Chapter 6: System Architecture

6.1. Introduction
The responsibility of the developer is to develop the residential building security system. This
security system is targeted on residential building such as apartments, condominiums and etc.
Implementing the residential building security system is very important to ensure the safety

DINESH PRABAKAR|TP025822
P a g e 58 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

and also the security of the tenants in the building. Let it be office or even apartment the
security management are responsible of the people who evolves around the building, ensuring
that they are safe from threats, natural disaster and etc. This proposed system allows three
types of user to access the system who are the tenants, security management, and
administrator. The core features and the proposed system functions as below:

Three types of users can login into the system


Admin can register the type of users into the system
The administrator more control and power over the system
Tenants can register their unit if they are leaving out of town, where security guard
will have the unit monitored.
Tenants can check their access logs for security purposes
Security Management get to access the tenants last access.
Users can only access to the system using their fingerprint authentication.
Security can register visitors in the system with confirmation from the tenants.
Tenants can register their visitors with a start date, time and expiry date and time.
Tenants can edit the personal information

The above functionality improves the building security system compared to the current
system. The proposed system ensures safety and also security in the building as it uses the
biometric authentication to allow access to the building which makes hard for intruders to
break through and also cuts down the possibilities of several types of threat. The proposed
system ensures the safety of the people in the building.

DINESH PRABAKAR|TP025822
P a g e 59 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

6.2. Abstract Architecture


6.2.1. System Design
6.2.1.1. Use case diagram

Diagram 1: Use Case For Residential Building Security System

DINESH PRABAKAR|TP025822
P a g e 60 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

6.2.1.2. Use Case Diagram Specifications


Name: Add User

Brief Description: Registering user into the system with their fingerprint
authentication and personal details
Actors: Administrator

Flow of Events: Fingerprint Identification Registry

Personal Details Entry


Special Requirements: Original individual required for fingerprint pattern

Preconditions: Fingerprint required to be registered using a device


Text are required to be filled up
Post-conditions: None

Name: Check Logs

Brief Description: Check the in and out entry of the building users

Actors: Admin Security/Staff

Flow of Events: Monitoring the users last in and out of the buildings

Special Requirements: Check the logs based on the events saved on the database

Preconditions: User must be registered user of the system

Post-conditions: None

DINESH PRABAKAR|TP025822
P a g e 61 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Name: Register Visitor

Brief Description: Registering Visitor Access

Actors: Security/Staff, Tenants

Flow of Events: Registering visitors, contractor, internet officers and etc

Special Requirements: Visitors have to fill up full details of themselves and their picture
will be captured into the system
Preconditions: Tenants must approve the stay of their visitors

Post-conditions: None

Name: Check User Reports

Brief Description: Monitoring the reports of the system users

Actors: Security/Staff

Flow of Events: Manage the user reports in the system

Special Requirements: Original security staff can access to the user reports

Preconditions: None

Post-conditions: None

Name: Monitor Holiday Profile

Brief Description: Monitoring the units which tenants left for outstation

Actors: Security/Staff

Flow of Events: Logs in and checks the holiday management portal

Special Requirements: Start date and expiry date is mandatory

Preconditions: Holiday profile is only available if tenants registered for holiday

DINESH PRABAKAR|TP025822
P a g e 62 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Post-conditions: None

Name: Approve Visitor

Brief Description: A full profile of the visitor with the picture and sensitive
information recorded by the security/staff is emailed to the tenants
for approval
Actors: Tenants

Flow of Events: Approve the profile of the visitor sent to the tenants if it is really
their visitor, if rejected visitor would not be allowed into the
building
Special Requirements: Visitors Identification Card information

Preconditions: Text box are required to be filled up, visitor have to use the
buildings camera to capture their face for confirmation
Post-conditions: None

Name: Register Holiday Entry

Brief Description: Registering into the holiday entry with a start date and expiry date
if the tenants will be away from home
Actors: Tenants

Flow of Events: Register details and the date leaving and the date tenants will be
back.

Special Requirements: Tenants

Preconditions: Only tenants are applicable to register the holiday profile entry

Post-conditions: None

DINESH PRABAKAR|TP025822
P a g e 63 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

6.2.1.3. Activity Diagram

Diagram 2 : Activity Diagram for User Registration

According to the image above it explains that the administrator is authorized to register the
type of users into the system with their fingerprint information. Once the administrator logs
into the system they have to select register user and then register users determining them on
the type of users and their limitation towards the system. Once the users are registered with
their fingerprint the administrator can log out of the system.

DINESH PRABAKAR|TP025822
P a g e 64 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 3: Activity Diagram for Updating User Information

The above diagram explains the personal information function. This function can be accessed
by two types of users which are the administrator and tenants where once the admin or staff
login the system will identify the type of users who logs into the system and allows them to
edit the information according their level of power. As shown in the diagram the
administrator is able to edit the information of any users who are using the system but the
tenants are only allowed to update their own information.

DINESH PRABAKAR|TP025822
P a g e 65 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 4: Activity Diagram for Visitor Registration

The above diagram explains the visitor registration function which is accessible by the
security management and tenants. The above diagram shows that if the tenants wants visitor
at their place they should input the visitor information to the system with the expiry date and
time. If the visitor comes straight to the building, the security will record the information
according to the visitors identification card and also capture the visitor face and send it to the
tenants for confirmation.

DINESH PRABAKAR|TP025822
P a g e 66 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 5: Activity Diagram for User Logs

The above diagram explains the check logs function which is also accessible by the security
management and the tenants. Once the tenants or security management logs in the system the
and selects the check logs function the system verifies types of user and if the user is
tenants they can keep track of who last checked in and out. On the other hand, the security
management can keep track and also edit the record if there is any suspected activity.

DINESH PRABAKAR|TP025822
P a g e 67 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 6: Activity Diagram for Fingerprint Verification

The above diagram shows the fingerprint access function which can be accessed by all three
users. Once the users logs in the system for this particular function the system will verify the
type of users and leads them to the functionality based on their power towards the system. As
can be seen above the administrator updates the registered fingerprint into the system by
approving it, the security management can check their limitations towards the system and
also their fingerprint is registered as security and the tenants fingerprint is registered as
tenants.

DINESH PRABAKAR|TP025822
P a g e 68 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 7: Activity Diagram for User Functionality

The above diagram explains the functionality of each user after they log in into the system.
The diagrams explain the systems accessibility of each and every user who are using the
system. The diagram also explains that users fingerprint is saved based on their
functionalities.

DINESH PRABAKAR|TP025822
P a g e 69 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

6.2.1.4. Sequence Diagram

(Fingerprint Authentication)

Diagram 8: Sequence Diagram for Fingerprint Authentication

The above sequence diagram shows how the biometric authentication works in the proposed
residential building security system. It explains above that when the users enter the ID the
scanner verifies the information of the user and once verified the system requests for the
biometric authentication and then it verifies the biometric authentication from the database
and if it is verified then it allows the access for users.

DINESH PRABAKAR|TP025822
P a g e 70 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Sequence Diagram (User Registration)

Diagram 9: Sequence Diagram for User Registration

The above sequence diagram shows the sequence on how users are registered into the
residential building security system. The administrator is responsible to ensure users are
registered into the system such as the security management and tenants. Once the users
details are saved it will be updated in the system and then the system will be updated with the
new users. The information of the users can be searched.

DINESH PRABAKAR|TP025822
P a g e 71 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

6.2.2. Database Design


6.2.2.1. Entity Relationship Diagram (ERD)

Diagram 10: ERD for Residential Building Security System

The above ERD represents the residential building security system, in this system the security
staff records the information of the visitor in the building with their image. Once the
information is input, the visitor profile will be emailed to the tenants for approval. Besides
that, only admin has the authorized rights to register user into the system.

DINESH PRABAKAR|TP025822
P a g e 72 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

6.2.2.2. Class Diagram

Diagram 11: Class Diagram for Residential Building Security System

Figure above shows the class diagram of the building security system. The users who utilizes
the system will have to register into the system using their personal information where it will
be verified by the administrator. Besides that, the registered identification will be verified by
the security management where they will be monitoring the users to ensure security and
safety. On the other hand, the users can also check and monitor the records of their respective
units and upon the registered records it will be reviewed by the security management to make
sure there is nothing suspicious suspected. Besides that, visitor will be registered by the
security staff with their respective identification number and information to make sure they
gain access to visit the tenants, visitors registered profile will be emailed to tenants in order

DINESH PRABAKAR|TP025822
P a g e 73 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

to make sure that the visitor is legitimate. The stay of the visitors in the building is approved
by the tenants.

6.2.2.3. Database table structure


Admin

Name Type Null Default Comment


AdminID INT No No Primary Key. Admin has a
unique ID.

UserName VARCHAR(50) No No Admin username.

Contact No VARCHAR(20) No No Admins contact no.

Address VARCHAR(500) No No Admins address.

Email VARCHAR(50) Yes No Admins E-Mail Address.

CreatedDate DATETIME No No System Automatically Takes


Current Date
UpdatedDate DATETIME Yes No Information Updated Date

Holiday Management

Name Type Null Default Comment


ID INT No No Primary Key. Unique ID
cannot be repeated by others.

Username NVARCHAR(50) No No Holiday Management


Applicant Username

FromDate DATETIME No No Start Date and Time of


Holiday.
EndDate DATETIME No No End Date of the Holiday

Reason VARCHAR(500) NO NO Reason Leaving the Building

DINESH PRABAKAR|TP025822
P a g e 74 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Roles

Name Type Null Default Comment


RoleID INT No No Unique identifier, identify the
roles of the users

Name VARCHAR(50) No No Users Name

Description VARCHAR(200) No No Users descriptiom

Schedule (Device last access report)

Name Type Null Default Comment


ID INT No No Primary Key. Each profile has
unique ID
Name NVARCHAR(5) Yes No Profile Name

Email VARCHAR(20) No No Profile Email.

Last Access DATETIME No No Profiles last access.

Active INT No No Profile Active State

Visitor

Name Type Null Default Comment


VisitorID INT No No Primary Key. Visitors
unique identifier

VisitorName VARCHAR(20) No No Visitors Name

IDNumber VARCHAR(50) No No Visitor ID

FromDate DATETIME No No Visitor Start Date


StartTime DATETIME No No Visitor Start Time
EndDate DATETIME No No Visitor End Date
EndTime DATETIME No No Visitor End Time

DINESH PRABAKAR|TP025822
P a g e 75 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

VisitPurpose VARCHAR(MAX) No No Reason of visiting


RelatedTenantNm NVARCHAR(50) No No Whom Visitors are visiting
Status NVARCHAR(50) No No Visitor Status
ApprovedBy NVARCHAR (50) No No Approval By Tenants
ImgName VARCHAR(MAX) No No Visitor Image Name

User Registration

Name Type Null Default Comment


UserID INT No No Primary Key. Users unique
identifier

UserName VARCHAR(20) No No Users Name

ContactNo VARCHAR(50) No No Users Contact Number

Address VARCHAR(500) No No Users Address


Email VARCHAR(50) No No Users Email
CreatedDate DATETIME No No Profile Created Date
UpdatedDate DATETIME No No Profile Altered Date

6.2.3. Interface Design


Actor: Admin, Security Staff and Tenants

Description: This is the Login page of the residential building security system; the user both
Security staff or tenants with authorized username, password and fingerprint are only able to
utilize the system efficiently.

Header
Residential Building Security System

DINESH PRABAKAR|TP025822
Page
Please 76 |Fingerprint
Insert 119 for
User:
Pass: Verification
Footer
2015-2016 Residential Building Security System.
UserLogin
Login
RESIDENTIAL BUILDING SECURITY SYSTEM

Actor: Admin

Description: This page allows the admin to register users such as the tenants and security
staff into the system. This page is design as registration form and required all field to fill up
in order to add the users.

Header
Residential Building Security System

Navigation Menu Logout

Register Users

User Name :

Password :

Contact :
Number

Address :

Occupation :

User Type : [Security Staff]


(Role Led) [Tenants]

Intake :
Code

Add Reset Cancel

Footer
2015-2016 Residential Building Security System

DINESH PRABAKAR|TP025822
P a g e 77 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Actor: Admin/Tenants

Description: This page allows the admin and the tenants to perform activities such as modify
the details or delete the details from the system. Tenants are allowed only to update their own
information where the admin can also update the security staff details.

Header
Residential Building System Security

Navigation Menu
Logout

Tenants Panel

Edit Student Details

Update Cancel

Footer
2015-2016 Residential Building Security System.

DINESH PRABAKAR|TP025822
P a g e 78 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Actor: Security Staff

Description: This page allows the security staffs to register visitor into the building. This
page is design as registration form and required all field to fill up in order to register visitor

Header
Residential Building Security System

Logout

Register Visitor

Visitor Name : [Label]

Visitor IC :
[Label]
Reason of Visit :

Contact :
Number

Address :

Image :
Take Picture
Module ID : [Start Date]
[Start Time]
[End Date]
[End Time]
Visitor Role :
[Label]

Add Submit Cancel

Footer
2015-2016 Residential Building Security System

DINESH PRABAKAR|TP025822
P a g e 79 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Actor: Tenants

Description: This page allows the tenants to register for holidays if they are leaving the
building for out station or for work purpose. Once the tenants register the holiday profile,
security staff will keep an eye on the respective units of the tenants.

Header
Residential Building Security System

Navigation Menu Logout

Holiday Management

Panel
Holiday Management

Tenants

Start Date [Label]

End Date [Label]

Reason

Submit Cancel

Footer
2015-2016 Residential Building Security System.

DINESH PRABAKAR|TP025822
P a g e 80 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Actor: Security Staff

Description: This page security staff to monitor the records of the visitor, holiday profile and
tenants.

Header
Residential Building Security System

Navigation Menu Logout

View Records: Searc

Records Display

Footer
2015-2016 Residential Building Security System

DINESH PRABAKAR|TP025822
P a g e 81 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

6.3. Development/Deployment
6.3.1. Programming Language Chosen
There are various types of programming language for software development. As for web-
based application system, there few well-known and commonly use programming languages
are VB.NET, PHP and C#. The developer uses C# programming language to develop the
building security system.

C#

The C# is an object oriented language which is originated for C++ which also adopts the
simplicity of programming from Visual Basic. At first it was the language C that was widely
accepted and used and then it came to adding object orientation and it evolved into C++. C++
was used for writing the infrastructure and low level application whereby Visual Basic (VB)
is utilized for business purposes (Utley, 2004).

C# brings the fast improvement worldview of VB to the universe of C++ designers, with a
few clear changes. C# exploits the .NET Framework, which implies you have admittance to
an intense structures motor, much the same as VB developers have had for years. New data
type have been included, for example, the decimal data for calculations (TutorialsPoint,
2016).

C# is intended to work with Microsoft's .Net platform. Microsoft's point is to support the
exchanging of data and administration over the Web, and to engage architects to manufacture
extremely flexible applications. C# enhances programming through its use of Extensible
Mark-up Language (XML) and Simple Object Access Protocol (SOAP) which allow access
to a programming object or technique without requiring the programmer to form additional
code for each step. Since programmers can develop existing code, instead of more than once
replicating it, C# is relied upon to make it speedier and less costly to get new items and
administrations to the market.

DINESH PRABAKAR|TP025822
P a g e 82 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Advantages of C# (Krishnamraju, 2010)

C# gets ideas from Java and C++, receiving just the great bits from those languages
and eliminates out excessively confusing and mistake inclined elements, which are the
major source of bugs in a code.
C# supports effective and reusable components.
C# is more secure to run. Subsequent to C# framework is accumulated into a
transitional language, the OS can just check it to see that no pernicious code talks
reality.
C# implies the current programming idea of Object Oriented Programming which
empowers the designer to deliver secure information driven applications and take the
user to the following level of experience.
Due to their high portability, C# are utilized for web programming and with new data
sharing ideas like web administrations, they convey circulated data sharing to the very
desktop of the client and all that the client needs is a PC and a program.
Cost of maintenance for C# is without a doubt much lower than that of C++. This is a
positive response of C# offering programmers some assistance to make program that
is as bug free as would be judicious.

Disadvantages of C# (Krishnamraju, 2010)

All however portability is the element that with C# was created, C# projects are to a
great extent for Microsoft Windows Environment which in spite of the fact that
happens to be the most generally utilized Operating framework over the globe, yet
with Open Source advancements, particularly stages like Linux catching up, C# still
needs to long approach to go. This is one major disadvantage of C#.
C# is less adaptable than C++. C# depends altogether on .NET structure, anything that
is not found in the .NET framework will be difficult to actualize

DINESH PRABAKAR|TP025822
P a g e 83 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

In conclusion, although C# is newly introduced programming language at its late 2000 but it
is many developers choice. Since, C# derived from C, C++, and Java, developer being to
sensation that C# offered with powerful capabilities from C++. C# has simplified many
complexities features in C++ which make the syntax consistent and logical to the developer.
Microsoft Visual Studio will be used to develop this system as it provides a lot of basic
functions and advanced functions that allow programmers to create a working security system
for building. In order to complete, every programming language has its pros and cons, the
choice of language is based on the preference of the developer based on their interest and
capabilities on developing the system. Besides that, the C# allows the implementation of
fingerprint authentication in the platform (Gonzalez, 2015). The strict sort of checking in C#,
both at incorporate and run times, results in the dominant part of commonplace programming
mistake being as countered as early as possible and they and their areas pinpointed precisely.
This can spare the C# developer a great deal of time, contrasted with finding the reason for
confusing mistakes which can happen long after the offending operation happens in
languages which are more liberal with their implementation of security (Ryder, 2016).

6.3.2. IDE Chosen


The integrated development environment (IDE) chosen will be the Microsoft Visual Studio
2015 IDE, this is because the Visual Studio 2015, an integrated suite of developer
productivity tools, cloud services, and extensions that enable you and your team to create
great apps and games for the web, for Windows Store, for the desktop, for Android, and for
iOS (Microsoft, 2015). The new compiler which is known as "Roslyn" which is made
especially made for the C# and Visual Basic language will save time in compiling and
provides code analysis application programming interface. By utilizing the all new compiler
the Visual Studio 2015 provides more refactoring including rename, analysers and quick fixes
(Microsoft, 2016).

The new Roslyn compiler for C# and Visual Basic not only saves the compilation times it
additionally empowers totally new situations, for example, live code analysis, which give rich
and adaptable criticism and recommendations specifically inside the code editor as developer
types. In Visual Studio 2015, lights show in the left edge (when utilizing the keyboard) or a
device tip (when hovering over a blunder with the mouse). The light tells continuously that
the compiler potentially utilizing a custom rule set has recognized an issue in developers

DINESH PRABAKAR|TP025822
P a g e 84 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

code furthermore has a proposal for how to settle the issue. When developer see a light, tap
on it for recommendations to fix the issue (Microsoft, 2016).

Diagram 12 shows the all new Roslyn compiler.

Source: (Microsoft, 2016)

Library Chosen

The chosen library in the system is data encryption library. This library is to encrypt data
recorded such as the, passwords. This library is the security features which can be
implemented to the system to prevent intruders to gain information from the system.

6.3.3. Database Management System Chosen


Database management system (DBMS) is the system software for managing and creating
databases. DMBS shows assist the users in creating, updating, retrieving and managing
databases (Rouse, 2016). The DBMS basically serves as an interface between the database
and end clients or application programs, guaranteeing that information is reliably sorted out
and remains easily available. The DBMS oversees three essential things: the information, the
database engine that permits information to be gotten to, modified and changed and the
database schema, which characterizes the database's intelligent structure. These three
foundational components give concurrency, security, information respectability and uniform
administration techniques (Rouse, 2016).

The main aim of a DBMS is delivering ways to store and recover database information which
will be well organized and easily accessible. The DBMS helps the developer in storing the

DINESH PRABAKAR|TP025822
P a g e 85 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

sensitive data that has implicit importance such as the tenants id, fingerprint id, address,
office address contact number and so on. The database system guarantees the integrity of the
data stored from the system crashes or attempts at unauthorized access.

The DBMS chosen for the building security system is the Microsoft SQL Server 2008 R2.
This database management system will store all the information such as the basic information
and also the sensitive information of the occupants in the building will be stored. Basic
information are as occupants personal information, example: - contact, gender, age
occupations and etc. Sensitive information will be such as the fingerprint ID, username, user
id and passwords.

Microsoft SQL Server 2008 R2 is a database administration framework that created by


Microsoft. Its essential capacity is to store and recover information as asked for by other
programming applications. There are more than 12 unique versions of Microsoft SQL Server
accessible that objectives distinctive sorts of clients and extent from little single-machine
applications to huge system applications with numerous clients. SQL Server 2008 R2 has an
expert information administration framework marked as Master Data Services, to manage
master data entities and hierarchies (DatabaseJournal, 2016).

Besides that, the SQL server management studio function allows the developers to access,
manage, configuring, and monitoring the components in the system which is created.
Moreover, the management studio also adds up the graphical tools where it is designed to
create and monitor database projects. Other services such as the command prompt,
Integration services and reporting services (DatabaseJournal, 2016).

6.3.4. Operating System Chosen


The chosen operating system will be the Microsoft Windows. This operating system is chosen
because this is the most common operating system which is used in the world. Besides that,
developer have been using the Microsoft Windows for a long time and very familiar to the
operating system. Besides that the Microsoft Windows 10 is the latest operating system which
is release by Microsoft and suits all the tools and components that will be implemented into
the building security system by the developer. Microsoft Windows will suit the proposed
project in an excellent way.

DINESH PRABAKAR|TP025822
P a g e 86 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Web Server Chosen

The web server chosen for this project is the Internet Information Server (IIS). IIS is a
Microsofts entry to compete in the web server market which are compete by Apache, Sun
microsystems and others. Microsoft includes sets of programs to build and administer web
sites, search engines and supports for writing web-based application that access database
(WhatIs.com, 2016). The proposed building security system is a client-server architecture
where the occupants in the building are the clients. Clients who request changes or any other
tasks will be directed to the security management or administrator. Web hosting is not
required here but a web server is mandatory to in-order to sustain the communication
between the client and server.

DINESH PRABAKAR|TP025822
P a g e 87 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Chapter 7: Project Plan


7.1. Release Plan

No. Core Features Priority Justification


1 Fingerprint High Guaranteeing that
the fingerprint is
secured and unique
where only users
with that particular
fingerprint are
allowed to access.
2 Monitoring Records Medium Some users wont be
bothered to check
security log of their
unit because they are
aware on the security
management who are
always keeping an
eye on the CCTV of
the building.
3. Login Low Some users dont
think the login is as
secured the
fingerprint
authentication.

DINESH PRABAKAR|TP025822
P a g e 88 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

7.2. Test plan for Unit Testing

Unit testing

Unit testing is known as the software development process in where the smallest testable of
an application in this test there are independently examined for proper functions. The unit
testing is normally automated, but can be done manually too. Mode of this testing is a
component which falls under the Extreme Programming (XP), a useful method of software
development, where builds product by continual testing and revision (Rouse, 2016).

In this unit testing the developer have to choose a testable unit from the system and to be
tested in order to determine if it meets the requirement of the project. In this phase there will
be each units to be tested independently and in sequence. Units that are put into test are the
features that are implemented into the system and will be done step by step.

Login Function

Test Case Input Outcome

1 No Fingerprint Please scan your


authentication fingerprint
2 Unauthorized Verification
fingerprint failure, please
verification scan again.
3 Authorized Verification
fingerprint successful
verification

DINESH PRABAKAR|TP025822
P a g e 89 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Personal Information

Test Case Input Outcome

1 Fill in all the Information


required area to saved
save personal
information.
2 Empty area left Please fill in the
area left*
3 Completed all Saved
area with successfully to
information. the database

Monitor Records

Test Case Input Output

1 Select monitor Verifies user


records. type.
2 User type View logs of
(tenants) registered unit
3 User type View record of
(security entire database.
management)

DINESH PRABAKAR|TP025822
P a g e 90 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Visitor Management

Test Case Input Output

1 Fills in visitor Verifies user


information type (Security
Management)
2 Webcam is used Visitor Profile is
to capture the saved
picture of visitor
3 Sent to tenants Waiting for
for approval approval from
tenants.

The above shows some the examples of the unit testing which will be done in order to ensure
the system is working well and fine before delivering it to the end user. Testing is helpful
where if there is no testing phase the developer would not aware if there is any fault in the
system and it will bring in difficulties later.

DINESH PRABAKAR|TP025822
P a g e 91 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Integration Testing

Integration testing, also known as integration and test, is a software development process that
unit program combined and tested as a group in a variety of ways. In this context, unit tested
is defined as the smallest part of the application. Integration testing can reveal problems with
the interface between the programs before problems occur in real-world implementation of
the program. Component integration testing is Extreme Programming (XP) , a pragmatic
method of software development that takes meticulous approach to building products through
continuous testing and review (Rouse, 2016).

DINESH PRABAKAR|TP025822
P a g e 92 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Integration testing for building security system

Test name:

Date:

Position

Module Functions Results (Circle the answer) 1-poor

ID 5excellent
1 Biometric Authentication 1 2 3 4 5
2 System Login 1 2 3 4 5
3 Records Monitoring 1 2 3 4 5
4 Visitor Management 1 2 3 4 5
5 Information Updating 1 2 3 4 5
6 Visitor Registering 1 2 3 4 5
7 User Registration 1 2 3 4 5
8 Holiday Management 1 2 3 4 5

Comment from user:

Action taken by the developer:

DINESH PRABAKAR|TP025822
P a g e 93 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

User Acceptance Test


The user acceptance testing which is also known as the beta testing, application testing and
end user testing. This user acceptance test to make sure the satisfactory of the end-users
towards the building security system. UAT can be done by in-house testing or pay individuals
to test the software, uploading over the net and many more ways. The experience of the end-
users towards the building security system are forwarded back to the developer, where the
final changes can be made and altered.

The user acceptance test is as below

Name:
Date:
Occupation:
Activities: 1 Very 2 - Poor 3 - Moderate 4 - Good 5 Very
Poor Good
Login page/
Fingerprint
Monitor
Records
Visitor
Management
Holiday
Management
Comment from user:

Action taken by the developer:

DINESH PRABAKAR|TP025822
P a g e 94 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Chapter 8: System Implementation


8.1. Screenshot
8.1.1. Homepage/Login

Diagram 13: The user login interface of the system

The above figure shows the home page that appears in the residential building security
system, and as shown in the image above there are two boxes where the users have to insert
their username and password to gain access into the system.

Diagram 14: The user login interface of the system

DINESH PRABAKAR|TP025822
P a g e 95 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Based on the image above, once the username and password of the user is inserted, the user
still are prohibited from getting access into the system as the system requires fingerprint of
the user to ensure that only valid users are available to access into the system.

8.1.2. Admin Panel

Diagram 15: The interface of the Admin Panel

The above image shows that once the Admin type of user logs into the system, admin will be
lead to the admin panel. In the admin panel, the admin is allowed to create new type of users
into the system such as the security staff and tenants. Besides that, the admin can also modify
the information of the users of the system. Admin also monitors the user entries into the
system and the holiday management reports.

8.1.3. Security Staff Dashboard

Diagram 16: The interface of the security staff dashboard

DINESH PRABAKAR|TP025822
P a g e 96 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

The above image shows that once the user type Security staff logs into the system, security
staff will be lead to their dashboard where the security staff are responsible of the visitor
entry, monitoring the visitors list who are in the building, checking the entry logs of the
tenants and also monitoring the units where the tenants left for holidays.

8.1.4. Tenants Panel

Diagram 17: The interface of the tenants panel

The above diagram shows the tenants panel, where the user type tenants are lead to once they
log into the system. Here it shows that the tenants can access to the holiday entry, approve
and disapprove their visitors, and also check their last log into their units.

8.1.5. Visitor Entry Form (Security staff)

Diagram 17: Visitor entry form of the system

DINESH PRABAKAR|TP025822
P a g e 97 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

The above image shows the visitor entry form which will be filled up by the security staff to
ensure that the visitor profile can be monitored. The above visitor form requires all the
information of the visitor including their, identification number and picture. Once this form is
filled, it will be sent to tenants for approval.

8.1.6. Visitor Report (Security Staff)

Diagram 18: Visitor report of the system

The above image shows the visitor report which can be accessed by the security staff to
monitor the movement of the visitors in the building. The above image also shows the
visitors identification number and the start and end time of them in the building and their
purpose of their visit. Besides that, it also shows the status of visitor in the building whether
they are being approved or rejected by the tenants.

8.1.7. User Attendance Logs

DINESH PRABAKAR|TP025822
P a g e 98 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 18: User attendance logs of the system

The above image shows the user entries, the last access of the users into the system, which
makes the security staff and also the tenants to keep an eye if there is any un-authorized
entryin the building. The above information is extracted from the fingerprint device which
records the user attendance.

8.1.8. Holiday Management

Diagram 19: Holiday management interface of the system

The above diagram shows the Holiday management entry which can be filled by the tenants
to let the security staff know the dates that they wont be available in the building to make
sure that the security staff keeps an eye on the tenants respective units.

8.1.9. Holiday Report

Diagram 20: The holiday report of the system

DINESH PRABAKAR|TP025822
P a g e 99 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

The above diagram shows that the security staff can monitor the respective tenants who are
not in the building. The above report displays the users username who left the building and
the start date and end date of their holiday from the building and the reason they left the
building.

8.2. Sample Codes


8.2.1. Sample codes for Sign-up Feature

DINESH PRABAKAR|TP025822
P a g e 100 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 21: The sample codes for the sign-up function of the system

8.2.2. Sample Codes for Login Feature

DINESH PRABAKAR|TP025822
P a g e 101 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 22: The sample codes for user login feature

8.2.3. Sample Codes for Extracting User Logs Feature

DINESH PRABAKAR|TP025822
P a g e 102 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Diagram 23: The sample codes for user logs

Chapter 9: System Validation


9.1.1. Login into the System
No. Test Expected Result Actual

DINESH PRABAKAR|TP025822
P a g e 103 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Result
Enter the invalid username and invalid
1. Access denied As Expected
password
2. Enter the invalid username and valid password Access denied As Expected
Enter the invalid username and invalid
3. Access denied As Expected
password
4. Enter the valid username and valid password Access granted As Expected

9.1.2. Visitor Management (Security Staff)


No. Test Expected Result Actual Result
Submit a visitor entry form without Please fill in the required
1. As Expected
filling anything blank area
Submit a form without entering expiry Please fill in the required
2. As Expected
time and expiry date blank area
Submit a visitor profile form with Please fill in the required
3. As Expected
expiry date and without expiry time blank area
Visitor profile sent to
Submit a full completed visitor profile
4. tenants and waiting for As Expected
without snapping picture
approval.
Visitor profile sent to
Submit a fully filled visitor profile
5. tenants and waiting for As Expected
with picture
approval.

DINESH PRABAKAR|TP025822
P a g e 104 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

9.1.3. Fingerprint Access


Actual
No. Test Expected Result
Result
Enter Username and Password for Access denied pls place
1. As Expected
Tenants to login fingerprint for verification
Enter Username and Password for Access denied pls place
2. As Expected
security staff to login fingerprint for verification
Enter Username, Password and
3. Welcome to Security Panel As Expected
fingerprint for security staff to login
Enter Username, Password and
4. Welcome to Tenants Panel As Expected
fingerprint for tenants to login

9.1.4. Holiday Management


No. Test Expected Result Actual Result
1. Submit a form without filling anything Access Denied As Expected
Saved information
2. Submit a form without filling anything As Expected
displays nothing
Saved records dont
Leave the start date and end date
3. display the exact time As Expected
empty
and date
Saved records display
4. Submit with just the start date As Expected
only start date
Submit holiday entry form with only Certain information
3. As Expected
certain information entered submitted
Save a holiday entry form with only
4. Access Denied As Expected
certain information entered
Submit a fully filled holiday entry Submission Done, can be
5. As Expected
form monitored in database

9.1.5. Monitoring Records (Security Staff)


No. Test Expected Result Actual

DINESH PRABAKAR|TP025822
P a g e 105 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Result
Tenants/Holiday/Visitor
1. Select monitor records. As Expected
records to be selected
Displays the unit which the
2. Selects Holiday Records tenants left for Holiday As Expected
with expiry date
Displays the visitors who
is in the building, also logs
3. Selects Visitor List As Expected
of who has left the
building
Displays tenants last check
in and check out which is
4. Selects User logs As Expected
extracted from the
fingerprint device.

9.2. User Acceptance Test

The use acceptance test is as below

DINESH PRABAKAR|TP025822
P a g e 106 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Name:
Date:
Occupation:
Activities: 1 Very 2 - Poor 3 - Moderate 4 - Good 5 Very
Poor Good
Login page/
Fingerprint
Access
Monitoring
Records
Visitor
Management
Holiday
Management

Comment from user:

Action taken by the developer:

DINESH PRABAKAR|TP025822
P a g e 107 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Name:
Date:
Occupation:
Activities: 1 Very 2 - Poor 3 - Moderate 4 - Good 5 Very
Poor Good
Login page/
Fingerprint
Access
Monitor
Records
Visitor
Management
Holiday
Management

Comment from user:

Action taken by the developer:

DINESH PRABAKAR|TP025822
P a g e 108 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Name:
Date:
Occupation:
Activities: 1 Very 2 - Poor 3 - Moderate 4 - Good 5 Very
Poor Good
Login page/
Fingerprint
Monitor
Records
Visitor
Management
Holiday
Management

Comment from user:

Action taken by the developer:

Chapter 10: Conclusions and Reflections


10.1. Critical Evaluation
In the final stage of the Residential Building Security System development the critical
evaluation is performed to estimate the success of the Residential Building Security System

DINESH PRABAKAR|TP025822
P a g e 109 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

based on the mentioned requirement. The completeness of the systems functionalities is one
of the main criteria to be focused on in the Residential Building Security System in order to
full fill the end user needs. Based on the user acceptance test which was conducted, the
system can be evaluated as a success. This is because the Residential Building Security
System managed to full-fill the satisfaction of majority testers.

10.2. System Benefits


There are many beneficial results can be obtained by the users of the building security
system. For instance, the number of security staff in the building can be reduced where the
security staff does not have to guard each and every area of the building and can focus on
monitoring the movement of the users through the system. The current manual system is not
as efficient as the residential building security system, where this system knows who exactly
is using the system, also monitors the visit of the visitors in the building. Besides that, for the
user's usage of the system, needs a little training as they are not familiar with the new system.
According to the user acceptance test majority of the tester accept the system functionality
after the utilization of the system.

Besides that, the residential building security system have been designed in a way where
when the for the visitors to get access to the building, the security staff takes down their
details including the picture of the visitors who is entering the building and the taken down
information is customized into a visitor profile and sent to the tenants as confirmation. The
visitors get into the building only if the tenants approve the visitors stay and all the
information of the visitors is stored in the database where, the security staff can always
monitor it for security purpose where here the integrity level of the building is increased.
Besides that, the performance of this system can measured by checking the time taken for the
visitor profile to be notified to tenants for approval.

On the other hand, the benefit of the residential building security system can also said that
with the system, security staff can also monitor the tenants unit who is outstation or not
staying in the building at the moment by the holiday management profile. All the tenants who
are leaving the building for outstation, work purpose and other reason can register themselves
under the holiday management profile with the start date and end date of their absence and
the security staff will monitor their respective unit. This makes the tenants feels safe during
their time away from the building and eases the job of the security staff to always keep an eye
on the empty units to make sure it is secured.

DINESH PRABAKAR|TP025822
P a g e 110 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Moreover, the user interface of the system are user friendliness and the usability is well
defined as mentioned at the starting phase. The flow of steps in multistep interfaces which is
known as the navigation menu of the system will allow the user to choose the menu item that
they want to go for next. Moreover, the workflow of the system is in appropriate flow where
lead the user utilizes the system efficiently. In other hand, it means that residential building
security system's user interface has design for leading the user to able to utilize the system
comfortably.

The usage of the fingerprint implementation is another benefit in the system. The fingerprint
implementation increases the security and integrity of the building as the fingerprint
implementation avoids the unauthorized access into the system and makes the building a
safer space for the people.

10.3. Conclusion and Recommendations


Briefly, the residential building security system provides a web-based platform for the tenants
and security staff to perform their workload related to the building and the security of the
building. In achieving the aim of the system, where the system aimed to allow the security
staff to register visitor into the building, monitoring the visitor's access into the building,
monitoring the users last in and out and also monitoring the empty units where the tenants left
for holiday. In the conclusion the developer will discuss on the limitation of the developed
system and future enhancement. Besides that, the developer's learning experience would also
be explained during the project development.

10.4. Limitations and Future Enhancement


The residential building security system has limitation, where based on the suggestions form
the respondents which is gathered from the interview, questionnaire and the user acceptance
testing. Crucial improvement that can be implemented into the system is by implementing the
CCTV function. The CCTV implementation in the system would actually make the system
more complete and also increase the security of the surroundings. Besides that, this function
will also help the security force to guard the surrounding of the building from one place.
Through the implementation of the CCTV also helps the security staff to monitor if there is
crime happening and many more other activities around the building can be monitored. If
there are professional crimes happening around the building, the implementation of CCTV
can reduce such crimes.

DINESH PRABAKAR|TP025822
P a g e 111 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Besides that, one of the important feature that the developer did not manage to implement
into the residential building security system is the lift access card with the RFID
implementation. In today's world there are many assault, robbery and molest happening in the
lift, as if the victim stuck in the lift they have nowhere to move and criminals can easily
commit crime. Lift is one of the most vulnerable spot for crimes to take place. With the
implementation of the lift card access, each tenants can only access the lift to their floor by
scanning their card, which means ordinary person cannot get access to the lift. Each lift
access card can only access to the registered unit level, facility level, and car park.

Besides that, another crucial implementation which would have increased the security and
also integrity of the system is the extension phone from the tenants unit to the guardhouse.
The implementation of the extension phone would connect the tenants directly to the
guardhouse. This means in the case where there is emergency the tenants are only supposed
to pick up the phones which is installed in their respective units and the security staff will
exactly know from where the call is coming and can take immediate action towards the
emergency. The extension phone function improves and also upgrades the residential building
security system.

DINESH PRABAKAR|TP025822
P a g e 112 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

10.5. Conclusion
The process of brainstorming, planning and finally implementing a final year projects takes a
lot of time and effort. This is because a developer cannot simply start programming a system
without a proper planning, research, preparation and effort, with all these elements put
together the aim of the project can be achieved. In-order to complete the system, the
developer had to adopt a new programming language which the developer has no vast
knowledge in it which is the C#. The programming language is learnt by the programmer by
researching online sites such as the stack overflow, YouTube and other tutorial resources in
order to learn how the .Net framework works.

Besides the research done on the C# programming language, developer have also made
research on residential buildings, where many residential buildings are facing more issues
day by day. Each day there are different type of threats that brings the insecure and threatened
feeling to the tenants and people who are occupying the building. This shows that without a
proper system, the people who lives in the building can only pray for their safety.

Besides that, by collecting information by the data collection method, which is the interview
and questionnaire method assist the developer on what are really needed to complete the
system in order to full fill the user needs. Moreover, the developer has learnt several
processes for requirements planning, which was useful for the developer by getting know that
during requirements planning phase few notable features were overlooked in that phase.

To wrap things up, all the emphasis has been arranged according to specified in the final
documentation as it could enhance the system's quality. The developer takes all the learnt
experience as the support to enhance the developer's ability and procedure to much better to
securing new information in future.

DINESH PRABAKAR|TP025822
P a g e 113 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

REFERENCES
Anon., 2014. WHY ARE LITERATURE REVIEWS IMPORTANT?. [Online]
Available at:
http://www.researchproposalsforhealthprofessionals.com/why_are_literature_revi
ews_impor.htm
[Accessed 5 March 2016].
Beal, V., 2016. SSADM - Structured Systems Analysis and Design Method.
[Online]
Available at: http://www.webopedia.com/TERM/S/SSADM.html
[Accessed 3 March 2016].
BusinessDictionary, 2016. questionnaire. [Online]
Available at: http://www.businessdictionary.com/definition/questionnaire.html
[Accessed 10 March 2016].
California, U. o. S., 2016. Organizing Your Social Sciences Research Paper: 5. The
Literature Review. [Online]
Available at: http://libguides.usc.edu/writingguide/literaturereview
[Accessed 5 March 2016].
CaptainWow, 2015. How to create a fake ID - copy and modify your card. [Online]

Available at: http://www.instructables.com/id/How-to-create-a-novelty-ID-copy-


and-modify-your-/
[Accessed 5 March 2016].
Clocking, E., 2016. What is Biometrics?. [Online]
Available at: http://www.bioelectronix.com/what_is_biometrics.html
[Accessed 5 March 2016].
Cohen, B., 2016. Advantages and Disadvantages of SSADM. [Online]
Available at: http://www.ehow.com/list_6781448_advantages-disadvantages-
ssadm.html#close
[Accessed 3 March 2016].
DatabaseJournal, 2016. Database Journal. [Online]
Available at:
http://www.databasejournal.com/features/mssql/article.php/3857466/Top-10-
Features-of-SQL-2008-R2.htm
[Accessed 15 March 2016].
DeGrazio, W. C. a. R., 2016. Building Security: An Architect's Guide. [Online]
Available at: http://cryptome.org/archsec.htm
[Accessed 5 March 2016].
Dictionary, B., 2013. methodology. [Online]
Available at: http://www.businessdictionary.com/definition/methodology.html
[Accessed 3 March 2016].
Gonzalez, O. L., 2015. Code Project. [Online]
Available at: http://www.codeproject.com/Articles/97590/A-Framework-in-C-for-

DINESH PRABAKAR|TP025822
P a g e 114 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Fingerprint-Verification
[Accessed 15 March 2016].
ICC, 2015. THE CHALLENGES OF MANAGING A HIGH-RISE BUILDING: WHAT
EVERY PROPERTY MANAGER NEEDS TO KNOW. [Online]
Available at: http://www.iccpropertymanagement.com/the-challenges-of-
managing-a-high-rise-building-what-every-property-manager-needs-to-know/
[Accessed 1 July 2016].
Krishnamraju, 2010. Advantages VS Disadvantages of C#. [Online]
Available at: http://krishnamraju.jimdo.com/c-sharp/advantages-and-
disadvantages/
[Accessed 27 February 2016].
llibweb, 2016. Introduction to Research. [Online]
Available at: http://libweb.surrey.ac.uk/library/skills/Introduction%20to
%20Research%20and%20Managing%20Information%20Leicester/page_51.htm
[Accessed 10 March 2016].
Microsoft, 2015. What's New in Visual Studio 2015. [Online]
Available at: https://msdn.microsoft.com/en-us/library/bb386063.aspx
[Accessed 15 March 2016].
Microsoft, 2016. What's New in Visual Studio 2015. [Online]
Available at: https://msdn.microsoft.com/en-us/library/bb386063.aspx
[Accessed 15 March 2016].
mindcrafts, 2009. Rational Unified Process Models. [Online]
Available at: http://www.mindcrafts.ch/dwcs4/english/IPMMethodologiesE.html
[Accessed March 10 2016].
mmu.ac.uk, 2014. Information Systems. [Online]
Available at:
http://www2.docm.mmu.ac.uk/STAFF/M.Stanton/SAD/Tutorials/Lecture1.html
[Accessed 6 March 2016].
Pirzada, U. T., 2009. Rational Unified Process. [Online]
Available at: http://ovais.khan.tripod.com/papers/Rational_Unified_Process.pdf
[Accessed 10 March 2016].
Portal, I. K., 2016. Software Development Methodologies. [Online]
Available at: http://www.itinfo.am/eng/software-development-methodologies/
[Accessed 3 March 2016].
PVT., L. S., 2015. Building Management System. [Online]
Available at: http://www.inetsyt.com/SecurityAndSafety.aspx
[Accessed 5 March 2016].
Rouse, M., 2016. database management system (DBMS). [Online]
Available at: http://searchsqlserver.techtarget.com/definition/database-
management-system
[Accessed 15 March 2016].

DINESH PRABAKAR|TP025822
P a g e 115 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Rouse, M., 2016. searchsoftwarequality. [Online]


Available at: http://searchsoftwarequality.techtarget.com/definition/unit-testing
[Accessed 15 March 2016].
Rouse, M., 2016. searchsoftwarequality. [Online]
Available at: http://searchsoftwarequality.techtarget.com/definition/integration-
testing
[Accessed 16 March 2016].
Ryder, P., 2016. Buggy C# Code: The 10 Most Common Mistakes That C#
Developers Make. [Online]
Available at: https://www.toptal.com/c-sharp/top-10-mistakes-that-c-sharp-
programmers-make
[Accessed 15 March 2016].
School, R. M., 2010. Requirements Management School. [Online]
Available at:
http://www.requirementsmanagementschool.com/w1/Requirements_Validation
[Accessed 5 July 2016].
Strategies, C., 2014. Make Life easier with Integrated Building System. [Online]
Available at: http://www.creative-strategies.be/make-life-easier-integrated-
building-system/
[Accessed 5 March 2016].
Ta, D. T. L., 2004. ANAGING HIGH-RISE RESIDENTIAL BUILDING IN MALAYSIA.
[Online]
Available at: http://www.inspen.gov.my/inspen/v2/naprec/naprec6.pdf
[Accessed 5 March 2016].
Technology, V. S. a., 2016. INTEGRATED SECURITY SYSTEMS (ISS). [Online]
Available at: http://www.vertexsecurity.com/Integrated_Security_Systems/
[Accessed 5 March 2016].
TutorialsPoint, 2016. Tutorials Point. [Online]
Available at: http://www.tutorialspoint.com/csharp/
[Accessed 5 March 2016].
Twente, U. o., 2016. Data Collection Methods. [Online]
Available at: https://www.utwente.nl/igs/datalab/datacollection/methods/
[Accessed 10 March 2016].
UCAR, 2016. Software Engineering Assembly. [Online]
Available at: https://sea.ucar.edu/best-practices/rup
[Accessed 10 March 2016].
Utley, C., 2004. TechRepublic. [Online]
Available at: http://www.techrepublic.com/article/why-you-should-move-to-c/
[Accessed 27 February 2016].
WhatIs.com, 2016. Search Window Server. [Online]
Available at: http://searchwindowsserver.techtarget.com/definition/IIS
[Accessed 15 March 2016].

DINESH PRABAKAR|TP025822
P a g e 116 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

Zetter, K., 2013. Researchers Hack Building Control System At Google Australia
Office. [Online]
Available at: http://www.wired.com/2013/05/googles-control-system-hacked/
[Accessed 5 March 2016].

APPENDIX

Gantt Chart

DINESH PRABAKAR|TP025822
P a g e 117 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

DINESH PRABAKAR|TP025822
P a g e 118 | 119
RESIDENTIAL BUILDING SECURITY SYSTEM

DINESH PRABAKAR|TP025822
P a g e 119 | 119

You might also like