Academic Papers

Here are some relevant papers. I hope you like it! 😊

Door2Dorm: A Website Application for Dormitory Management System with Implemented Facial Recognition Biometric Security
Vladimir Beduya, Francheska Navarro, Cloyd Secuya

Background of the Study:

Physiological biometrics are identified as unique characteristics of an individual, such as the face, iris, and fingerprint, which are their biological features. Along with this, security measures that involve biometric features also include typing, strut, and voice, which are said to be Behavioral biometrics [4].

A problem lies with the need to track and gather information about individuals and their whereabouts, which may include the following scenarios [4]:

  1. Unauthorized entries of individuals to a private establishment (e.g., offices or work locations)
  2. Entries of workers at home
  3. Security violations in a public place
  4. Thief identification

With all that in mind, facial recognition is one of the tools for security purposes, and it is a biometric technique that can identify and verify individuals [1]. Furthermore, this feature can be used at different locations such as residences, offices, manufacturing centers, banks, and airports and can be applied for identifying thefts and surveillance [4].

Fingerprint recognition involves using a fingerprint sensor where a user places their finger to acquire a fingerprint snapshot. Unique features from the captured image are extracted and translated into data. [60]. Furthermore, fingerprint biometrics are included in many security systems for civilian and military applications. They also discussed its usefulness for the consumer market for suitable applications such as door locks, surveillance systems, automotive, and especially mobile devices. Fingerprint recognition as a biometric technology has spread in many people's lives as a more secure authentication method. Lastly, biometric traits such as fingerprints cannot be stolen, revoked, or compromised [60]. The fingerprint is a biometric modality that has an application for access control. It can also grant and deny permits, user authentication, and privileges to a system and resources [9].

Leveraging the use of the Internet of Technologies (IoT) through the combinations and usage of sensors to establish a relationship between a user and a controlled device. Furthermore, one of IoT's basic principles involves using and connecting devices to make lives easier [30]. Implementing a facial recognition feature to a dormitory management system was done to find an efficient and fast way to handle operations in a dormitory while keeping the demand for system performance low [61]. Their study also explained that their implementation has the following modules: (1) Face recognition; (2) Database; (3) User interface. They found out that implementing a dormitory information management system based on facial recognition can provide economical and effective management for the dormitory's traditional operations that focus on manual management.

Utilizing a centralized management system for dormitory administrative operations should consider the personal security and safety of its tenants to ensure they can be protected from any forms of danger, such as crime and violence. It is also important to note that there are territorial rights between occupants (residents) and the staff. Hence, both sides should comply with enforced rules which should have been agreed upon. These rules should also introduce responsibility and accountability to tenants and administrators while staying on the premises [26]. It is why direct communication between dormitory administrators and tenants be established. One study has found that landlords are said to be greedy and unconcerned about the conditions and well-being of their tenants, but this is inaccurate due to stereotypes [56]. There will be some cases that communication between a dormitory administrator and a tenant can have difficulties communicating with tenants due to the following reasons: (1) problematic behaviors of tenants; (2) disruptive actions from visitors; (3) conflicts with tenants; (4) nuisance behaviors [2].

The safety and security of tenants can also be a concern. As mentioned in an article by Nesslar and Starling [2014], intrusions and troubles can arise from tenants or visitors engaging in criminal activities such as irresponsible intoxication, knifing, threats, and assaults. As such, incidents like this can demote the satisfaction of tenants inside the premises because they feel not secure enough, and their well-being might be in danger.

All in all, this study is about centralizing direct communication between dormitory admin(s) and their tenants; and improving the security of dormitory premises and tenant units by using IoT-based technologies for facial recognition using Convolution Neural Network techniques (CNN) by utilizing an affordable webcam, and fingerprint recognition using a programmable fingerprint sensor with Arduino.

To be more specific, this study aims to propose a Dormitory Management System (DMS) website application, implement a facial recognition feature and fingerprint recognition feature capable of doing the following:

  1. Establish direct communication between admin and tenants for issues, reports, and payment acknowledgment
  2. Establish security logging for both authorized and unauthorized detected faces
  3. Establish fingerprint recognition as a counterchecking when facial recognition has a false negative output

Read more... (opens in a new tab)


Enhancing Dormitory Security and Management through Biometric Recognition in an IoT-based System: A Case Study of Door2Dorm
Dr. Mary Jane Samonte, Vladimir Beduya, Francheska Navarro, Cloyd Secuya

Abstract:

The study presents Door2Dorm, an IoT-based Dormitory Management System (DMS) that integrates facial and fingerprint recognition biometrics. The system enhances dormitory security and management by providing robust identity verification and access control. Through functionality testing, cross-browser testing, usability testing, user acceptance testing, and user experience testing, the study demonstrates the effectiveness of Door2Dorm. The conclusion confirms the successful development of the management system with facial recognition and fingerprint security features. It highlights additional key features such as records management, payment management, direct messaging, and security logging for administrators, tenants, and visitors. The integration of the Silent-Face-Anti-Spoofing library enhances system security. The study's results show high user satisfaction, making Door2Dorm an efficient and credible solution for dormitory management with biometric security measures.

Read more.. (opens in a new tab)


Towards a Dynamic and Improved LRMC Fare Matrix, Train Route, and Operating Hours Web Page
Philip Domondon, Deanne Nivera, Jona Eliza Quirimit, Ron Andrew Relayo, John Ray Rivera, Cloyd Van Secuya

Abstract:

The lack of interactive and dynamic design in LRMC.ph can easily dissuade users from interacting with the site in the first place since navigating railway information websites would be engaging if the user has the ability to control the information that they would like to receive. Hence, the researchers aim to improve the existing website. Through the use of UEQ with pre-testing and post-testing to compare and identify if the prototype made using Proto.io by the researchers is an improvement compared to the original design. The results of UEQ shows that five (5) of six (6) scales were improved, namely Attractiveness, Efficiency, Dependability, Stimulation, and Novelty. Therefore, the researchers conclude that making a site dynamic and interactive improves the user experience.

Read more.. (opens in a new tab)


Smart Garbage Bin 101: Waste Level Monitoring, Fire Detection, Temperature and Humidity Monitor, and Alarm-Response Systems
Rey San Juan and Cloyd Secuya

Introduction:

Solid waste management has been the biggest issue many societies and developing cities are facing and has become a challenging task to provide a better solution to. Due to the increase of population; there has been an increase to the waste production, since, trashes have become rampant, hence, many municipalities fail to take an action due to lack of budget, negligence, and the lack of discipline in the field of segregating and proper management of solid wastes (Abdel-Shafy and Monsour, 2018).

Hence, the researchers have come up an idea about a trash bin that can be easily monitored and may contain necessary features which will be helpful in the solid waste management. The Smart Garbage Bin monitors the garbage fill level, once, it has reached its full capacity it sends off an alarm that indicates the waste or garbage fill must be thrown away for segregation purposes. It works by using an ultrasonic sensor that sends sound waves simultaneously, then, it is being calculated using the distance formula of D = VT derived from the calculation of velocity.

On the other hand, The Smart Garbage Bin also comes up with another beneficial feature which will be for the safety precautionary and hazard measures. A fire detection system has been installed that can easily detect if there is fire involved inside the trash bin.

The Department of Environmental Protection in Montgomery County (2020) shares that, fire hazards can be significant to any trash bin once there has been an improper placement or segregation of materials this as well increases the risk of flammable materials being exposed to high temperatures, thus, it has a higher chance of creating a fire that may become a major problem in an urban or rural area. In addition to, this feature works by using a fire sensor module which has also been installed to The Smart Garbage Bin.

Read more.. (opens in a new tab)