Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ICT Profile of Don Mariano Marcos Memorial State University, Mid-La Union
Campus
Mariano Marcos Memorial State University, Mid-La Union Campus are gathered through
a survey checklist categorized into five areas consisting of hardware, software, support
technologies (ICTs) include tools, devices, and resources used to communicate and to
create, manage, and share information. This includes hardware (computers, modems,
mobile phones), software (computer programs, mobile phone applications) and networks
As a support from the statement above, Salami (2013) stated that there exists
close connections between ICT and national security, which plays an important role in
securing the necessary level of national safety and defense of the nation. ICT is very
important to the national security. It is a bridge between the present day and the future.
Hardware
Table 2 shows the hardware resources of DMMMSU MLUC. The available ICT
resources in DMMMSU MLUC in terms of hardware are as follows: 768 computer units,
768 storage medias, CCTV camera, 82 printers, and 702 power supplies which were the
28
basic requirement for the developed system. In addition, according to the MIS Staff of
DMMMSU MLUC, they have computer units, storage media, printer, keypad, power
supply and LCD in Finance Unit Building, Administrative Office and Guard House
which they are using in their operations. This implied that some needed hardware is
present and some are not present in the organization that can support the developed
system.
collective term. Hardware includes not only the computer proper but also the cables,
connectors, power supply units, and peripheral devices such as the keyboard, mouse
system.
29
Table 2. Hardware
Printer Present 82
Software
The ICT resources that are present in DMMMSU MLUC are shown in Table 3.
The available ICT resources in DMMMSU MLUC in terms of software are as follows:
the Operating Systems that are installed are Windows 7 and Windows 8. Software
productivity tools were also installed such as Microsoft Office, Utility software such as
As stated by Barnes (2012) cited by Gamboa et.al (2015), software includes all
the various forms and roles that digitally stored data may have and play in a computer (or
similar system), regardless of whether the data is used as code for a CPU or other
implementation specially in using the webpage of the security system. Thus, software is
really a very important component in terms of computer hardware useful and turns data
Table 3. Software
Operating System
Windows 7 Present
Windows 8 Present
Windows 10 Not Present
Microsoft Office Present
Web Browser Present
Anti-Virus Present
Support Facilities
Table 4. Based from the results of profiling, DMMMSU MLUC has the following
support facilities: Guard House, Desk Space, Administrative Room and Finance Building
resources. It includes not only the physical property, such as the building, host computers,
and utilities, but also the supporting documentation needed for the development and
support. A software development facility and a software support facility are virtually
identical since the same software and hardware tools are required for both. The facility
for the implementation of a system or project that will secure the establishments and
Connectivity
connectivity as shown in Table 5. The result shows that Internet Connection, Wireless
Fidelity (Wi-Fi), Local Area Network and Telephone Connection are present in
DMMMSU MLUC. This can be used in activating and deactivating the intrusion system,
real time surveillance, sending of intrusion alerts from the Finance and Administrative
Office to the Guard House and can be also used in sharing of files such as documents in
the school.
identified as a group of computers that are interconnected for sharing data between them
or their users. There is a wide variety networks and their advantages mainly depend on
organization or business because it makes easier for employees to share information and
collaborate on work. Carrying papers from office to office, manual monitoring of rooms
storing and communicating information on a centralized server for access by all who are
Table 5. Connectivity
profiling, DMMMSU MLUC has ICT personnel namely the MIS Personnel, Security
Personnel and Administrative Staff. They are responsible for using the system to monitor
rooms, process information about intrusions on rooms, generate reports and software and
hardware maintenance.
According to Starkschall and Siochi (2013) cited by Balaso (2015), two groups
are identified representing the peopleware at different stages of a system cycle: the users,
and the developers. Peopleware refers to all the aspects related to the role of people as
necessary to maintain the quality of the Arduino based intrusion detection system. These
are the end-users of the developed system, information providers and the people who
Security Tool for Arduino Based Intrusion Detection System for Don Mariano
Marcos Memorial State University Mid-La Union Campus
researches came up with the idea of making an Arduino Based Intrusion Detection
System for Don Mariano Marcos Memorial State University Mid-La Union Campus
having a PIR motion sensor, IP camera with a servo motor, magnetic reed switch,
Ethernet shield, keypad, power supply, alarm, LCD sand Global System for Mobile
Communication (GSM) SIM900 module integrated to a single Arduino Mega r3, and a
portal which will serve as the communication between the user and the system.
Portal Features
The portal for the Arduino Based Intrusion Detection System for DMMMSU will
User Authentication
As cited by Malempati and Mogalla (2014) user authentication is the first line of
defense in a system. This feature restricts the unregistered users from logging in to the
system. Having the concept of user id and password is an efficient method of safe
keeping of the important records and processes that should only be accessed by a
registered user.
37
User Management
The user management feature covers the creation and deletion of user accounts
Reports Management
should be recorded on system for documentation purposes, and the said activity will be
done by the guard. This feature also covers the printing of different reports such as the
incident and log report which will solely be for the admin.
The live footage can be monitored by any user of the system using the IP camera
attached to the servo motor mounted on the ceiling. Changing the position of the camera
and turning the alarm and lights on and off can also be done in the portal.
great help in remotely monitoring a controlled environment. Thus, having a live stream
feature integrated on the portal for the motoring the happenings on the vicinity can
The system box consisting of all the hardware connected to the microcontroller
Automatic Activation/Deactivation
This system was preset to be activated from 8:00 P.M. to 5:00 P.M. The said time
frame was chosen by the researchers as this is the time where the institution is vulnerable
to possible threats.
Manual Activation/Deactivation
The system can also be activated or deactivated manually through the dedicated
keypad; this feature can be used especially on times that the security system will be
Intrusion Detection
Intrusion will be detected with the use of the PIR motion sensor and the reed
switch. As stated by Mohan and Gopakumar (2013) PIR motion sensors can be triggered
when a there was a change on the constant infrared light radiating its field of view. With
the PIR sensor intruders inside the vicinity could be known; and reed switch can be used
With that the researchers came up with an intrusion detection feature. When the
PIR motion sensor detects any motion within its range or the reed switch which was
attached to the door frame got separated the lights will be turned on and the alarm will be
triggered; the servo motor will turn the IP camera to where the intrusion took place and
an SMS message will be sent to the user notifying that an intrusion happened.
SMS Notification
modem which accepts SIM card, and operates over a subscription to mobile operators.
When the GSM modem and computer are interconnected, there is communication over
the mobile network. Though these GSM modems are most frequently used to provide
mobile internet connectivity, most of them can also be used for sending and receiving
With the use of the GSM module an SMS message will be sent to notify the user
whenever someone attempts to login more than 3 times, when the system gets
In developing the Arduino Based Intrusion Detection System, the researchers used
the Design Science Research Process (DSRP) developed for by Peffers, Tuunanen,
Gengler, Rossi, Hui,Virtanen and Bragge (2006). This model was a refinement of the
different research designs employed in Information Systems (IS) literature from the time
of the emerging design science (Hevener et al.,2004) that translates to a working design
science model.
The DSRP model consists of six activities in formal (but not rigid) sequence: (1)
problem identification and motivation; (2) objectives of a solution; (3) design and
development; (4) demonstration; (5) evaluation; and (6) communication (Peffers et al.,
2006).
from the administrative unit headed by Mrs. Perla Garcia, for many decade that
encounters different security problems and crimes like room intrusions and burglar
crimes. At present, the university has an existing security measures like installation of
CCTVs and parameter fencing since it was hard to monitor the people going in and out of
the campus. According also to the information gathered in the interview, the university
41
wants to adapt modern security systems that can supply their needs and can help the
institution to protect their properties as well as the people and individuals in it. We are
now in the modern era, with some of the emerging variety of ways offered by security
system manufacturers and alarm monitoring services to monitor homes, institutions and
other entities with this, we can conceptualize and develop modern security systems which
solution for the security problem which was stated above. The researchers visited
different libraries and surfed different journals on the internet to suffice their knowledge
in security problems and to know how to deal with them in order to develop and build an
artifact that can aid the security problems in the university. Based on the related literature
stated in the study by Omorogiuwa Eseosa1, Elechi Promise (2014) in todays age of
digital technology and intelligent systems, home automation has become one of the
fastest developing application based technologies in the world. The idea of comfortable
living in homes has since changed for the past decade as digital and wireless
technologies, are integrated into it. Intelligent home security systems such as controlled
requires automated and controlled system both near and at a distance of control.
Intelligent home security systems play important roles in providing an extra layer of
security through user authentication to prevent break-ins at entry points and also to track
illegal intrusions or activities within the vicinity of the home system, it also involves
automation of homes or household activities such as security locks of gates and doors.
There are many researches done in the design of various types of intelligent home
42
security system like sensor-based system that reply and contact-based systems such as
finger-print and palm-print scan that requires substantial amount with an input device.
The study helped and motivated the researchers to internalize different concepts
of security systems for them to develop a competitive security system integrated with
phase the university has an existing security measures but these are not sufficient enough
to secure the whole population of the university in the potential security threats that may
happen around the clock. It is clear that the university needs a tighter security to avoid
intrusions and burglar crimes that may affect the students and staff of the university. In
this phase the researchers searched and surfed for the related literatures in the internet
that can help them to strengthen their knowledge and wisdom which can support their
The study presented by Sharma, Fatnani, Katara, and Shankar (2014) was a home
security system was implemented using the microcontroller. The system used Global
System for Mobile (GSM) using Short Messaging System (SMS) in order to activate and
deactivate the systems as well as sending and receiving messages. It uses Passive Infrared
(PIR) motion sensor to detect any motion and a camera to capture images. The Modular
Home Security System has been tested and succeed detect human movement.
system. The system has the security of a locking system and it can be enhanced with the
43
help of Radio Frequency (RF) and GSM wireless technology by using a 4 digit password
which provides the authentication. The system has a RF receiver and RF transmitter. The
system was designed in a way that the digital keypad is interfaced to the controller, on the
transmitter side. When you enter the password through the keypad it will compare the
passcode you enter from the pre-set password through the RF transmitter which was also
Lastly, a home security device which send fast information to user GSM mobile
device using SMS and also use to activate - deactivate system. This Home Security
System make expandable their capability by add more sensors on the system. The
hardware of this system has been designed using microcontroller AT Mega 328, PIR
motion sensor as the primary sensor for motion detection, camera for capturing images,
GSM module for sending and receiving SMS and buzzer for alarm. For software this
system using Arduino Integrated Development Environment (IDE) for Arduino and Putty
Through the information gathered by the researchers on the related literatures and
on the current status of the security measures of DMMMSU MLUC, the researchers came
with the idea to design a low cost and efficient security system having a PIR motion
sensor, IP camera with a servo motor, magnetic reed switch, Ethernet shield, keypad,
power supply, alarm, LCD sand Global System for Mobile Communication (GSM)
SIM900 module integrated to a single Arduino Mega r3 packaged in the system box.
System for Don Mariano Marcos Memorial State University Mid-La Union Campus. The
44
researchers only limited the scope of the study to be implemented in the administrative
and financial department of the university since it is where the most valuable things are
kept.
The software component is the webpage and has the following features:
The moment that the user entered their respective username and password to the
system they are now able to access and operate the system according to their specific task
Another module of the webpage is the provision for adding and updating the
employee information. The admin will be the one to input all the personal information of
Through the webpage the viewing the real time event of the room is possible by
controlling the servo motor up to 180 o through the webpage so that the user can monitor
if any intrusion has occurred. Controlling the lights within the building is also included in
An additional feature of the webpage is the ability to record all the transactions
happened during the user accessed the system through the log module. The system has
also the capability to generate reports of incidents like intrusions happened in the
building.
The hardware component is the system box and has the following features:
45
The user will enter the password with a maximum of 3 attempts to input the
activation/deactivation pin using the keypad and the LCD screen will display messages
clock strikes at 8 in the evening the system is automatically activated and at 5 in the
Software Component
detection system. The system provides user access controls which allow each user the
Authentication Module. This module restricts the user that can access the
system. The system will employ and interface asking for the users username and
password.
Registration Module. This module grants the administrator to register the users
who may be in need of using the system. Only the administrator can access this module
46
Security Monitoring Module. This grants the users to change the angle position
Hardware Requirements
Software Requirements
Development:
Implementation:
47
Server
Client
There are 2 main users of the system, the administrator and the guard.
The head for the security of the university will act as the administrator for the
developed system. The administrator has the overall privilege on the different
functional system components. He/ she manage user accounts, turn the lights
on/off, change the angle position of the camera, change passwords for user
Figure 3 illustrates the interaction of the actors, the Guard and the Administrator,
Servo Motor, PIR Motion Sensor, GSM Module and Relay on the Arduino Based
Figure 4 illustrates the class diagram for the webpage for the Arduino Based
Figure 7: Activity Diagram for Manage User Accounts (Edit User Info)
54
Figure 15: Activity Diagram for Activating the Security System Manually
63
64
Figure 16: Activity Diagram for Deactivating the Security System Manually
65
Figure 18: Sequence Diagram for Manage User Accounts (Add User)
66
Figure 19: Sequence Diagram for Manage User Accounts (Edit User Information)
Figure 20: Sequence Diagram for Manage User Accounts (Delete User)
67
Figure 27: Sequence Diagram for Activating the Security System Manually
72
Figure 28: Sequence Diagram for Deactivating the Security System Manually
73
The login form is where the Administrator and the Guard will fill their respective
Plate 2 illutrates the Controller Interface for the Arduino Based Intrusion Detection
Plate 3 illustrates the Report Creation Interface for the Arduino Based Intrusion Detection
Plate 4 illustrates the Controller Interface for the Arduino Based Intrusion Detection
Plate 5 illustrates the User Interface for the Arduino Based Intrusion Detection System.
This interface is for viewing, creating, editing, and deleting of the users of the system.
79
Plate 6 illustrates the Logs Interface for the Arduino Based Intrusion Detection System.
This interface is for viewing, and printing of the log session of the users.
80
Plate 7 illustrates the Report Interface for the Arduino Based Intrusion Detection System.
Plate 7 illustrates the Activity Interface for the Arduino Based Intrusion Detection
System. This interface is for viewing, and printing of all the activities done by users.
Hardware Component
The hardware component of the Arduino Based Security System is the system box
which comprises of the Arduino Mega from which the different sensors are connected
The Arduino Mega was programmed using the Arduino IDE using C++ so that the
different component of the system box would function to the intended task.
The above figure shows that the Ethernet shield connected to a router that serves
as the intermediary between the server and the system box which enables the server and
the system box to communicate wirelessly and function its specified task. The server
which is the portal is used to control the lights and the camera angle and the Arduino
mega r3 is where the different sensors: magnetic reed switch and motion sensor were
83
connected. The keypad and LCD screen is used to activate/deactivate the system in case
that the user wants to activate/deactivate the system during the times not included in the
automatic activation/deactivation feature of the system. The LED lights serves as the
indicator: green light when activated, yellow light when deactivated and red when the
intrusion has been detected. And if the sensors are triggered the Arduino mega r3 will
send a message through the use of the GSM module. The alarm will also be activated to
a text message is sent to a desired number and the activation of the alarm to take
necessary measures. Cameras are embedded with the security system that allow live
streaming and monitoring on the building controlled by a servo motor to identify the
desired angle
84
The above figure shows the surveillance camera can be controlled and accessed
directly though the server via the internet. The camera can be directed at any angle
through the servo motor which has been specified by the user
85
The above figure shows that the user can on or off the light to the building
In building the hardware component of the security system the researchers used
the development process Generate-Test Cycle. The researcher first assembled the led,
motion sensor, reed switch and alarm into the Arduino board to test the peripherals
respectively to guarantee that all of it are working. After testing the first batch of
peripherals, the LCD and keypad is added and was tested if the keypad is functioning and
if the LCD screen displays the programmed output message on the screen. Then the GSM
module is combined and has been tested to see if the GSM Module would send SMS
Notification. After which the Ethernet shield is combined to the other components and
was tested with the website design to see if the portal could communicate and transfer
86
instructions to the hardware component of the system like controlling the lights in the
room. Programming of the portal and testing of the CCTV camera follows. On the portal
the researchers had tested if it can control the direction of the CCTV camera.
After testing all the functionalities of the different components, the researchers
have designed the PCB and also the system box of the hardware component which will
be the housing of the security system. After finalizing the design, the researchers have
assembled the system box then followed by the re-testing and re-configuring of the
system for which will be installed in the constructed model for the demonstration using
Table 7 presents the complete peripherals with the quantities and the overall
Demonstration
system which is the Arduino based security system. The researchers had undergone a
simulation process in order to determine the efficacy of the develop system and provided
Upon the activation of the security system the researchers made an intrusion in
which they open the door and passed in the windows of the model that made the magnetic
reed switch to separate with each other, the system responded quickly by activating the
alarm and sending a simultaneous SMS message to the user until the system is
deactivated. This means that the magnetic reed switch, the alarm and the SMS
notification is working in case an intrusion like this occurred. The researchers also tested
the PIR motion sensor together with the alarm and the SMS alert, the system responded
quickly by activating the alarm and sending a simultaneous SMS message to the user
until the system is deactivated when the motion sensor detected a movement inside the
building. The IP camera is also operating effectively by directing its lens to where the
Plate 9 shows the actual model used for the black box testing in which the
researchers made the model similar to the cashier building of the institution where the
Plate 10 shows the system box where the Arduino mega r3 with the keypad,
Through the simulation process the researchers had found several errors and as
quantified in the generate test cycle these errors were used by the researchers to improve
the develop system and to solve the errors that has been found.
One of the errors that the researchers encountered was the simultaneous sending
of SMS message until the system is deactivated to the user. This feature was not practical
since the user will be spending too much for the load of the sim card of the system, thats
why the researchers only limited the text message into five SMS message when there was
an intrusion occurred. There are some instances that SMS messages were delayed and
some were not really sent to the receiver which make the researchers not settled in
sending only one SMS message. Therefore, five SMS message is not that costly than
simultaneous sending of messages and it is a great help to avoid instances like delaying
Another error was met by the researchers because there was no alarm activation
unknown user. It is stated in the study that there is five SMS message sent to the user
when this attempts happened but the researchers considered when there are times that
telecommunications are having trouble with their networks resulting to down their
system. Adding the activation of the alarm notifies the users of the system if there will we
The researchers also considered the place where the sim is located so that the user
will not have a hard time in taking off the sim card in case they need to subscribe it in any
telecommunication promos.
From the errors collected the researchers had re-testing and re-configuring both
the software and the hardware component of the system to come up at least a competent
security system.
Evaluation
After the simulation process, in this phase the researchers iterate back to step 3
and used the results in improving the system until the errors were fixed and come up a
demonstrate the efficacy of a design can provide strong evidence when used to show that
a design works as intended, is useful for its intended purpose, or has the potential to
Then the developed Arduino based security system is then presented to the
proponents of the system which were the accounting staffs, administrative staffs and
security guards. Together with evaluators, the researchers presented the different
simulations with different scenarios that would demonstrate the functionalities of the
security system.
questionnaire for the evaluation of the system. The proponents were ask to answer the
questionnaire to assess the level of acceptability of the develop Arduino based security
91
system which covers the six indicators such as functionality, reliability, usability,
To determine the level of acceptability of the security system, the data gathered
for from the survey were quantified using frequency count and mean and was interpreted
The developed system was evaluated using the test cases to determine if the actual
executed automatically.
5 System deactivation was System will be deactivated System was deactivated
predefined to be on the specified time. on the specified time.
executed automatically.
6 The reed switch got The alarm will be turned The alarm will be turned
separated. on, Red LED will lit, light on, Red LED will lit,
bulb will be lit, and an light bulb will be lit, and
SMS alert will be sent to an SMS alert will be
the user sent to the user
7 The motion sensor The alarm will be turned The alarm was turned
detected a motion on, Red LED will lit, light on, Red LED was lit,
bulb will be lit, and an light bulb was lit, and an
SMS alert will be sent to SMS alert was be sent to
the user the user
The proponents were also ask for their feedback from which the researchers
decided whether to iterate back to step 3 to try to improve the effectiveness of the artifact
projects.
intrusion occurred during working hours or during the times that the system is not
activated. The researchers proposed that the IP camera will change its camera angle in
every specified time that is programmed to the system but the proponent suggested that
since the IP camera have a servo motor it would be better to program the system to
change the angle of the IP camera with the servo motor in 180 o continuously so that the
After analyzing the feedbacks and suggestions from the proponents the
researchers decided to iterate back to step 3 and improved the effectiveness of the artifact
Communication
need to inform people .It is also important that you raise awareness by explaining what
you do and how this project helps citizens and solve security issues. Disseminating your
project outputs also helps you to guarantee the durability of the projects results.
In this phase, from the findings that had been found, the researchers then decide to
communicate the problem on security measures and its importance which is significant to
95
be addressed. The artifact, its utility and novelty including the capabilities of the
developed system. The rigor of its design as well as the process of development of the
different components of the security system, both the hardware and the software how it
functions and its effectiveness to researchers and other relevant audiences, such as
practicing professionals.
The result of the research was relayed and communicated to the management of
enabled them to know the artifact, considered its benefits to the organization and assess
their options. The researcher presented the materials needed together with allocated
budget for implementation of the security system. A plan to conduct series of training
program for the admin and security guards in order to be skilled and have knowledge to
This phase was done after the final defense of the researchers and after the
Level of Acceptability of the Arduino Based Intrusion Detection System for Don
The acceptability of the Arduino Based Intrusion Detection System for Don
Mariano Marcos Memorial State University Mid-La Union Campus was determined
through the use of ISO/IEC 9126. The researchers administered the survey questionnaire
respondents consisting of one (1) MIS Staff, two (2) Administrative Staff, sixteen (16)
Rating Interpretation
1. The system does what was 4.37 Excellent Very Highly
proposed correctly. Acceptable
Acceptable
and data from unauthorized user.
The Level of Acceptability of the Arduino Based Intrusion Detection System for
Don Mariano Marcos Memorial State University Mid-La Union Campus in terms of
Functionality, as shown in the table 8 has a mean rating of 4.51 indicating a descriptive
rating of Excellent and interpreted as Very Highly Acceptable. This implies that the
developed system has the capability to provide functions which meet the stated and
implies needs of users under specified conditions of usage. The indicator The system is
precise in executing its functions. got the highest mean rating of 4.65 and interpreted as
highly acceptable. On the other hand, the indicator The system does what was proposed
correctly. got the lowest mean rating of 4.37 which still describes the system as highly
98
acceptable. This means that the developed systems accurateness to connect with the
should provide a useful, time saving, and acceptably accurate solution to a specified task
or problem. It should be tested with a wide range of datasets with several trial users and
2. The system can always maintain the 4.43 Excellent Very Highly
specified level of performance in Acceptable
requesting and printing documents.
Detection System for Don Mariano Marcos Memorial State University Mid-La Union
Campus in terms of reliability which has a mean rating of 4.51 that describes the system
as excellent and interpreted as highly acceptable. The result entails that the developed
system maintain its level of performance under stated conditions for a stated period of
time.
The highest mean of 4.57 indicates that The system can provide correct output
all the time in all requested information. which describes the system as excellent and is
interpreted as very highly acceptable. While the lowest mean of 4.43 indicates The
system can always maintain the specified level of performance in requesting and printing
documents. which also describes the system as excellent and is interpreted as highly
acceptable. This denotes that the system should maintain its performance anytime in case
attributes for measuring software quality. It is defined as the probability of failure free
System for Don Mariano Marcos Memorial State University Mid-La Union Campus in
terms of usability. Overall, the respondents very strongly agreed that the developed
system is highly acceptable as justified by its mean rating of 4.59. This means that the
The highest mean of 4.71 which indicates The system can be used as a tool in
providing information to the user. and interpreted as very highly acceptable. This
101
implies that the respondents are guided very well in using the developed system. On the
other hand, the lowest mean of 4.51 indicates The system can be accepted to use as a
tool in communications. which still the respondents strongly agreed that the system is
excellent and is interpreted as highly acceptable. This implies that the system is
important aspects for the success of any technological product. It is related to the ease of
provides mechanisms that are hard to understand, then the application is expected to fail.
This concept can be applied to any technological interface that allows interaction between
Detection System for Don Mariano Marcos Memorial State University Mid-La Union
Campus in terms of efficiency which has a mean rating of 4.48 that indicating a
descriptive rating excellent and interpreted as very highly acceptable. This means that the
developed system has the capability to provide desired performance, relative to the
amount of resources
performing function. gathered the highest mean value of 4.6 and interpreted as very
highly acceptable. On the other hand, the indicator The system is effective in providing
information and precise records. gathered the lowest mean value of 4.57 and interpreted
as highly acceptable. This connotes that the developed system is very useful, complete
and interactive.
103
As shown in the table 12, level of acceptability of the Arduino Based Intrusion
Detection System for Don Mariano Marcos Memorial State University Mid-La Union
104
Campus in terms of maintainability which has a mean rating of 4.44 that indicates a
descriptive rating of excellent and interpreted as highly acceptable. This means that the
developed system has the capability to be modified which may include corrections,
The indicator The system can easily diagnose a problem or fault. got the highest
mean rating of 4.54 which respondents gave a descriptive rating of excellent and
interpreted as very highly acceptable. On the other hand, the indicator which The system
can be easily modified. got the lowest mean rating of 4.31 which has a descriptive rating
excellent and interpreted as highly acceptable. This implies that the developed system can
perform a successful repair action within a given time to replace faulty components.
As cited by Tiwari (2012) the ease with which a software system or component
changed environment is maintainability. It can evolve from its current state to its future
desired state. It is termed as the most difficult and costliest activity due to its inherently
Detection System for Don Mariano Marcos Memorial State University Mid-La Union
Campus in terms of profitability which has a mean rating of 4.52 and interpreted as
highly acceptable. The highest mean rating 4.62 indicates The software can be moved
acceptable while the indicator The system can be installed easily gathered the lowest
mean rating of 4.48 and interpreted as very highly acceptable. This denotes that the
developed system has the capability to transfer from one environment to another and the
process of testing the ease with which a computer software component or application
can be moved from one environment to another. Being able to move software from one
System for Don Mariano Marcos Memorial State University Mid-La Union Campus
Table 16. Summary of the Level of Acceptability of the Arduino Based Intrusion
Detection System for Don Mariano Marcos Memorial State University Mid-La
Union Campus.
Table 14 shows the overall of the level of acceptability of the Arduino Based
Intrusion Detection System for Don Mariano Marcos Memorial State University Mid-La
Union Campus indicating that the developed system was highly acceptable a in terms of
with a grand mean rating of 4.51. The highest mean rating is reflected in the systems
107
usability with the mean rating of 4.59 describe as excellent and interpreted as very highly
acceptable. On the other hand, the systems maintainability got lowest mean rating of
4.44 described as excellent and interpreted as highly acceptable. This implies that the
acceptability of the system recognized the quality characteristics of the ISO/IEC namely
to address software quality issues. It specifies software product quality characteristics and
characteristics: a) functionality, concerned with what the software does to fulfil user
performance, c) usability, assessing how understandable and usable the software is, d)
efficiency, evaluating the capability of the software to exhibit the required performance
with regards to the amount of resources needed, e) maintainability, concerned with the
This instrument was used to evaluate the level of acceptability of the system in