ANDROID-BASED GUARD MONITORING AND SITE SURVEILLANCE SYSTEM

Authors

  • Mariel U. Ondos Davao Del sur State College
  • Domingo V. Origines Jr Davao Del sur State College

DOI:

https://doi.org/10.47701/4r140f21

Keywords:

Surveillance System, Security Guards, Security Operations, Guard Monitoring

Abstract

The System is designed to enhance security operations and ensure accountability among security personnel by integrating mobile technology with real-time data collection, the system improves the efficiency, transparency, and reliability of monitoring activities across designated locations. Developed using the Agile Development Model, the system incorporates key features such as monitoring via QR codes and a timestamp camera that enables guards to take and submit pictures. The software also makes it easier for guards to report incidents, enabling them to document any anomalies they come across while on patrol. Evaluation of the system was conducted using the ISO 25010 Software Quality Framework, with fourteen (14) evaluators including administrators, advisory committee members, and IT experts. The results indicated strong performance: the QR code generation feature scored 4.7, while the user module for real-time incident capture and visited site reporting earned 4.8. Overall, the system achieved a 4.5 rating for functional suitability, 4.3 for both performance efficiency and compatibility, and 4.2 for usability and reliability. Aligned with Sustainable Development Goal (SDG) 9: Industry, Innovation, and Infrastructure, the system promotes innovation in security management and strengthens institutional infrastructure. Upon implementation at the Davao del Sur State College General Services Office (GSO), it is expected to significantly improve patrol compliance, incident documentation, and overall operational performance.

References

Alhudhud, G., Alsaeed, D. H., Al-Baity, H., Al-Humaimeedy, A. S., & Al-Turaiki, I. (2019). iGuard: Mobile security guard system with infrared biosensor and google glass. Bioscience Biotechnology Research Communications 12(2), 333-547. https://doi.org/10.21786/BBRC/12.2/16

Ahamed, M. S., & Mustafa, H. A. (2019). A secure QR code system for sharing personal confidential information. In 2019 International Conference on Computer, Communication, Chemical, Materials and Electronic Engineering (IC4ME2) (pp. 1-4). IEEE. https://doi.org/10.1109/IC4ME247184.2019.9036521

Ariyani, S., Sudarma, M., & Wicaksana, P. A. (2021). Analysis of functional suitability and usability in sales order procedure to determine management information system quality. INTENSIF Jurnal Ilmiah Penelitian Dan Penerapan Teknologi Sistem Informasi, 5(2), 234–248. https://doi.org/10.29407/intensif.v5i2.15537

Bao, S., Lin, J. H., Howard, N., & Lee, W. (2023). Development of Janitors’ workload calculator. In Proceedings of the human factors and ergonomics society annual meeting (Vol. 67, No. 1, pp. 1043-1048). SAGE Publications. https://doi.org/10.1177/21695067231192623

Darie, T., R Aprodu, C. (2024). Aspecte particulare ale politicii de personal în servicii [Particular aspects of staff policy in the services]. Lucrări ştiinţifice ale Simpozionului Ştiinţific al Tinerilor Cercetători 1, 174-177. https://doi.org/10.53486/sstc.v1

Fang, C., Song, S., & Mei, Y. (2022). On repairing timestamps for regular interval time series. Proceedings of the VLDB Endowment 15(9), 1848-1860. https://doi.org/10.14778/3538598.3538607

Gannapathy, V. R., Narayanamurthy, V., Subramaniam, S. K., Ibrahim, A. F. B. T., Isa, I. S. M., & Rajkumar, S. (2023). A mobile and web-based security guard patrolling, monitoring and reporting system to maintain safe and secure environment at premises. International Journal of Interactive Mobile Technologies, 17(11). https://doi.org/10.3991/ijim.v17i11.35483

Goel, N., Sharma, A., & Goswami, S. (2017). A way to secure a QR code: SQR. In 2017 International Conference on Computing, Communication and Automation (ICCCA) (pp. 494-497). IEEE. https://doi.org/10.1109/CCAA.2017.8229850

Gokasar, I., & Karaman, O. (2023). Integration of personnel services with public transportation modes: A case study of Bogazici University. Journal of Soft Computing and Decision Analytics, 1(1), 1-17. https://doi.org/10.31181/jscda1120231

Hasanah, N.A., Atikah, L., & Rochimah, S. (2020). Functional Suitability Measurement Based on ISO/IEC 25010 for e-Commerce Website. In 2020 7th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE) (pp 70-75). IEEE. https://doi.org/10.1109/icitacee50144.2020.9239194

Imanullah, M., & Reswan, Y. (2022). Randomized QR-code scanning for a low-cost secured attendance system. International Journal of Electrical and Computer Engineering, 12(4), 3762-3769. https://doi.org/10.26623/transformatika.v17i1.1471

Jung, J. Yoo, S. La, W. G. Lee, D. R., Bae, M. & Kim, H. (2018). Airborne video surveillance system. Sensors, 18(6), 1939. https://doi.org/10.3390/s18061939

Kempecova, D., & Kozlovska, M. (2023). Sensing technologies for construction productivity monitoring. MATEC Web of Conferences 385, Article 01032. https://doi.org/10.1051/matecconf/202338501032

Kim, J., Ham, Y., Chung, Y., & Chi, S. (2019). Systematic camera placement framework for operation-level visual monitoring on construction jobsites. Journal of Construction Engineering and Management, 145(4), 04019019. https://doi.org/10.1061/(ASCE)CO.1943-7862.000163

Lee, J. L. (2024). Security guard monitoring system [Doctoral dissertation, university tuknu abdul rahman]. UTAR Institutional Respiratory. http://eprints.utar.edu.my/id/eprint/6650

Llaguno-Munitxa, M. (2023). Site-surveying: Architecture and it's local ecology. Lieuxdits, (23), 14-21. https://doi.org/10.14428/ld.vi23.76823

Mulyawan, M. D., Swamardika, I. B. A., & Saputra, K. O. (2021). Analisis Kesesuaian Fungsional Dan Usability Pada Sistem Informasi Karma Simanis Berdasarkan Iso/Iec 25010 [Analysis of functional suitability and usability in the karma simanis information system based on]. JURTEKSI (Jurnal Teknologi dan Sistem Informasi), 7(3), 293-302. https://doi.org/10.33330/JURTEKSI.V%VI%I.1139

Ni, J., Zhu, W., Huang, J., Niu, L., & Wang, L. (2019). Fall guard: Fall monitoring application for the elderly based on android platform. In ACM international conference proceeding series (pp. 128–135). Association for Computing Machinery. https://doi.org/10.1145/3354031.3354055

Nuakoh, E. B., & Coffie, I. (2018). MonitR: A mobile application for monitoring online accounts' security. In SoutheastCon 2018 (pp. 1-9). IEEE https://doi.org/10.1109/SECON.2018.8478857

Paudel, N., & Neupane, R. C. (2019). A general architecture for a real-time monitoring system based on the internet of things. In Proceedings of the 2019 3rd international symposium on computer science and intelligent control (pp. 1-12). https://doi.org/10.1145/3386164.3387295

Poornima, E. Kumar, R. P. R. Katukam, S. Pericherla, V. V. & Birelli, S. K. (2023). A real-time IoT-based model to detect and alert security guards’ drowsiness. E3S Web of Conferences, 391, Article 01151. https://doi.org/10.1051/e3sconf/202339101151

Putra, I. G. E. P., Jati, A. N., & Saputra, R. E. (2017). Monitor and control panel of building security system integrated to Android smart phone. In 2017 International Conference on Robotics, Biomimetics, and Intelligent Computational Systems (Robionetics) (pp. 29-33). IEEE https://doi.org/10.1109/ROBIONETICS.2017.8203432

Rao, A. S., Radanovic, M., Liu, Y., Hu, S., Fang, Y., Khoshelham, K., Palaniswami, M., & Ngo, T. (2022). Real-time monitoring of construction sites: Sensors, methods, and applications. Automation in Construction, 136, 104099. https://doi.org/10.1016/j.autcon.2021.104099

Salem, T., Hwang, J., & Padilha, R. (2022). Timestamp estimation from outdoor scenes. Embry-Riddle Aeronautical University. https://commons.erau.edu/adfsl

Saidkhodjaev, T., Voas, J.M., Kuhn, R., Defranco, J., & Laplante, P.A. (2020). Aggregating Atomic Clocks for Time-Stamping. In 2020 IEEE International Conference on Service Oriented Systems Engineering (SOSE), 1-6. https://doi.org/10.1109/SOSE49046.2020.00008

Somavanshi, S. R., Bhand, S. J., Lende, S. D., & Pansare, P. Android Application for: Secure employee track vision. International Journal of Advanced Research in Science, Communication and Technology, 4(2). https://doi.org/10.48175/ijarsct-22181

Sapundzhi, F., & Mladenov, M. (2022). An android-based mobile application giving information for weather in real-time [Special issue]. Bulgarian Chemical Communications, 54, (B1), 89-91. https://doi.org/10.34049%2Fbcc.54.B1.0455

Setiawan, A. (2019). Evaluasi kinerja karyawan level pelaksana satuan pengamanan pada perguruan tinggi menggunakan metode simple addictive weighting [The method used for performance evaluation the security unit is simple additive weighting]. Jurnal Transformatika, 17(1), 26-33. https://doi.org/10.26623/TRANSFORMATIKA.V17I1.1471

Sykes, E. R. (2020). A context-aware system using mobile applications and beacons for on-premise security environments. Journal of Ambient Intelligence and Humanized Computing, 11(11), 5487–5511. https://doi.org/10.1007/s12652-020-01906-2

Stone, K., & Horney, J. A. (2018). Methods: Surveillance. In Disaster epidemiology (pp. 11-23). Academic Press. https://doi.org/10.1016/B978-0-12-809318-4.00002-2

Triantafyllou, D., & Krinidis, S. (2018). A real-time, multi-space incident detection. Safety and Security Studies, 8(2), 266-275. https://doi.org/10.2495/SAFE-V8-N2-266-275

Villaseñor-Ramírez, M.A., Carrillo-Hernández, D., Blanco-Miranda, A.D., & García-Cervantes, H. (2024). Implementation of mobile monitoring technology for industrial safety. Journal-Economic Development Technological Chance and Growth. 8(14), 1-18. https://doi.org/10.35429/jedt.2024.8.14.4.8

Wu, Q., Han, Z., Mohiuddin, G., & Ren, Y. (2023). Distributed timestamp mechanism based on verifiable delay functions. Computer Systems Science & Engineering, 44(2). https://doi.org/10.32604/csse.2023.030646

Yusuf, I., & Leidiyana, H. (2021). Android based employee attendance app using QR code Scanning and location-based service. Journal of Informatic and Information Security, 2(1), 35-44. https://doi.org/10.31599/jiforty.v2i1.569

Downloads

Published

2025-09-25