Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Facilitating security is one of the essential tasks to be completed when planning building an accommodation (Ungar 36). Therefore, designing a college dormitory, one must take account of the existing opportunities for installing a proper security management system and reducing the rate of possible threats to a minimum (Demkin 22). In order to create an entirely safe environment, one will have to install the ACS system, which presupposes the use of pivoting cameras and, thus, allows for tracking down even minor reasons for concern (Norman 27).
The process of installing the above-mentioned system will require that several tasks should be completed. As the charts above (Fig. 1, Fig. 2) shows, the identification of the key areas that cannot be reached by usual cameras and, therefore, pose a threat to the wellbeing of the residents, as malefactors may be lurking there, is the first step towards installing the system (Honey 202).
For these purposes, a detailed plan of the building will have to be created. In addition, the analysis of the key elements of the building in terms of illumination, the possibility to view specific elements of the premises, etc. must be carried out. The next step will presuppose purchasing the ACS equipment and installing it in the designated areas so that a full overview of the floor could be provided and that every visitor should be seen clearly with the help of the devices in question.
The specified goal will be completed in two steps, i.e., the location of the local retailer and the outbound logistics processes management, i.e., the delivery and retrieval of the cameras. Afterwards, the devices will need to be tested; therefore, evaluation of the quality and efficacy of the cameras will be conducted (Bonnin 237).
A twofold test will be applied to either validate the use of the cameras or to search for other options in security management; specifically, the analysis of the properties of the cameras must be conducted. The first part of the analysis will be carried out to identify the possible flaws in the use of the electronic proximity reader. Specifically, a series of tests will be run to figure out whether the locks in question can possibly be opened in any way other than the use of the corresponding security card.
For instance, the possibility of creating a false security card will be considered and tested to make sure that the doors to the dormitories cannot be opened in any manner that does not require the use of the cards in question. The second part of the test will help figure out whether the system under analysis may possibly backfire and trigger major issues with opening the doors to the dorms. For example, thorough checks regarding the use of cards that have been scratched or slightly damaged in any other way will be conducted.
The fourth step will be aimed at testing the flaws in the design of ACS and will be performed in two stages as well. First, a careful analysis of the technical properties of the security devices in question will be analyzed thoroughly (Newman 351). Afterwards, the usability of the cameras will be tested and evaluated on the scale of one to ten in terms of the collection, retrieval and analysis of data.
Finally, the fifth stage of the experiment will allow for making sure that the cameras mentioned above capture every single square foot and that there is no way that the people approaching the dorm can cover their face. As the system diagram provided below (Fig. 3) shows, the equipment for transportation and installation of the ACS tools is the key requirement in the specified scenario.
Creating the environment, in which students will be able to feel secure, is essential for any educational institution. Therefore, the local authorities must take the required measures to enhance the security system and preventing accidents from occurring on the campus area. Despite the fact that precaution measures will be required in addition to the ACS system, the latter will reduce the likelihood of accidents once the necessary tests are run properly.
Works Cited
Bonnin, Jean-Marie. Mobile Wireless Middleware: Operating Systems and Applications. Proceedings. New York City, New York: Springer Science & Business Media, 2009. Print.
Demkin, Joseph A. Security Planning and Design: A Guide for Architects and Building Design Professionals. New York City, New York: John Wiley & Sons, 2004. Print.
Honey, George. Electronic Access Control. Burlington, MA: Newnes, 2002. Print.
Newman, Robert. Security and Access Control Using Biometric Technologies. Stamford, Connecticut: Cengage Learning, 2009. Print.
Norman, Thomas L. Electronic Access Control. New York City, New York: Elsevier, 2012. Print.
Ungar, Bernard L. Building Security: Security Responsibilities for Federally Owned and Leased Facilities. Collingdale, Philadelphia: DIANE Publishing, 2002. Print.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.