Computer Science Project Topics

Development of an Online Visitor Gatepass Management System (a Case Study of OGITECH Security Gate, Igbesa)

Development of an Online Visitor Gatepass Management System (a Case Study of OGITECH Security Gate, Igbesa)

Development of an Online Visitor Gatepass Management System (a Case Study of OGITECH Security Gate, Igbesa)

Chapter One

Aim and Objectives of Gate Pass Management System

The aim of this project is to analyze, design and implement a web based system visitor gate pass Management system for Ogun state institute of technology, security unit.

The objective are:

  1. To provide student’s safety and
  2. To allow the students to upload their personal
  3. To provide easy access of searching and
  4. To generate overall
  5. To send notifications for the users
  6. To generate SMS alert and instant mailing and

CHAPTER TWO

LITERATURE REVIEW

What is the Gate Pass System?

Gate Pass System is a desktop application software for visitor management to the organization’s premises. It helps organizations manage the daily visitors to their premises by providing a simple interface and easy to use drop down menu driven software that can be easily used by anyone.

Why Choose Gate Pass System?

Any organization that has visitors in its premises be it in the industrial or manufacturing area or a corporate office, must keep proper track of the visitors and ensure the visitors carry proper id tags and visitor passes. A manual entry process is cumbersome and tends to be prone to errors. Gate Pass System helps standardize the process and dashboard functionality even provides the count of visitors in at any point of time and the total visitors for each day. The Gate pass system is a must have for all small, medium and large organizations that wish to keep record of visitors for compliance and reporting as well. There are varieties similar systems available in the market when you search visitor management system in any of search engine available. Those systems come with various features to offer to their customer with different price range.

Domain Research

The Visitor Management system by applying the model of UTAUT was discussed by Norizan Anwar, Mohamad Noorman Masrek, Yanty Rahayu Rambli in year 2012. They proposed the system by adopting technology model (UTAUT) to determine the user acceptance of visitor application system. The main motto of this system was “Handling your visitor at your fingertips”.
Another system for Visitor Pass was discussed in the paper by Prof. Abhay Gaidhani, Suraj Sahijwani, Parag Jain, Shantanu Jadhav, Ankush Jain in year 2015. This paper aims to develop a system for Gate pass using Raspberry Pi. The main aim was
to save paper with the help of Internet Connectivity to send SMS and Email for verification of user. Digital Visitor Information Management System (VIMS) Application and Design. This application enables capturing new visiting record by auto-clock in/out, and assignment of visitor pass. Visitor information are recorded in a centralized database server, which provides data management and manipulation through searching and report generating.

E-VIMS able to record visitor information during visitor registration by using visitor’s Malaysia Government Multipurpose Card (MyKad). On the other hand, the decision to develop a visitor system may depend on the needs of an organization so in this review
paper we have discussed a Visitor Gate Pass Management System to enhance level of security and manage visitor in any organization. Organizations need to take care of security measures concerning visitors management and tracking. Corporate offices will get too many number of visitors every day for many reasons such as interviews, parcel deliveries.
By introducing a visitor management system that allows organizations to track visitors on daily basis by introducing procedures such as ID registration, visitor approvals , process management , pass or badge and record keeping.

History
since September 11, 2001, many companies and government agencies enhanced building security by including access control and documenting visitors. The most defining event illustrating the need to enhance school security worldwide occurred in Beslan, Russia on September 1, 2004. A group of mostly Chechen terrorists took over a school and held more than 1,100 hostages for three days until Russian security forces stormed the building. A severe firefight ensued and ultimately over 350 people died, including 184 children. There are varieties similar systems available in the market when you search visitor management system in any of search engine available. Those systems come with various features to offer to their customer with different price range.

The Visitor Management system by applying the model of UTAUT was discussed by Norizan Anwar, Mohamad Noorman Masrek, Yanty Rahayu Rambli in year 2012. They proposed the system by adopting technology model (UTAUT) to determine the user acceptance of visitor application system. The main motto of this system was “Handling your visitor at your fingertips”.

Another system for Visitor Pass was discussed in the paper by Prof. Abhay Gaidhani, Suraj Sahijwani, Parag Jain, Shantanu Jadhav, Ankush Jain in year 2015. This paper aims to develop a system for Gate pass using Raspberry Pi. The main aim was to save paper with the help of Internet Connectivity to send SMS and Email for verification of user.

Digital Visitor Information Management System (VIMS) Application and Design. This application enables capturing new visiting record by auto-clock in/out, and assignment of visitor pass. Visitor information are recorded in a centralized database server, which provides data management and manipulation through searching and report generating. E-VIMS able to record visitor information during visitor registration by using visitor’s Malaysia Government Multipurpose Card (MyKad).

 

CHAPTER THREE

RESEARCH METHODOLOGY

DATA MODEL USED:

System Development Life Cycle (SDLC) Model

In this study, the development model of VGMS application software there are five phases involved: Planning, Analysis, Detailed System Design, Implementation and Maintenance. Figure 2 illustrate SDLC model that have been used in VGMS development.

The first phase of SDLC is planning in which the team is required to conduct meetings, initial information and feasibility study. Meanwhile in the second phase, which is analysis, user requirement is to be studied properly because it helps in overall SDLC. Evaluation of existing system and conduct logical system design need to be done. Furthermore, under the third phase
detailed system design is carried out by team mates based on the first and second phase input. After the completion of first three phases the team members proceed with system coding, testing and debugging of the system. To ensure that the system works according to the requirement of the user and suitability of the environment installation of the system is performed. The last phase is the maintenance phase in which the system is observed and maintained. If any additional requirements are demanded by the end user then according changes are performed over system in this last phase.

CHAPTER FOUR

SYSTEM TESTING AND IMPLEMENTATION

Introduction

System implementation is the stage of a project during which every theory is turned to practice.  During this phase, the developed software is loaded on a dedicated server.

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

SUMMARY

Information in its most restricted technical sense is an ordered sequence of symbols that record or transmit a message. It can be recorded as signs, or conveyed as signals by waves. Information is any kind of event that affects the state of a dynamic system. As a concept,

However, information has numerous meanings.

Moreover, the concept on information is closely related to motions of constraint, communication, control, data,  form,  instruction, knowledge,   meaning,   mental   stimulus,   pattern,   perception, representation, and especially entropy.

RECOMMENDATION

CONCLUSION

The computer becomes important equipment to the organization to store the data and to process the data for any purpose. It also can be used to access and process any data and information needed easily and less in time. Therefore, it is hope that VGMS application system able to solve the problem according to these scopes:

  • ByusingVGMS, the organizations have an option in increasing the level of security enforced in their premises.
  • VGMSenablesfree, secured, fast and easy visitor registration.
  • Computerized recordsgive better management and manipulation of data, through searching and report generation.
  • Itsinstallationis easy and hence does not require professionals for the same.
  • The VGMS system is easy to maintain and use.
  • Itgives reliable and efficient security protection on which one can rely.
  • Unauthenticated and unwanted users cannot enter the commercial space.
  • Biometric functions can be coupled with the existing system to gain extra security.

Hence we can conclude that this system would prove to be an efficient system to obtain a Gate Pass in any organization. Using this system the usage of paper decreases drastically and gate pass can be obtained through SMS that proves to be more secure and easy process which also saves time in obtaining gate pass and thus makes procedure easy. Also higher authority can generate report directly from database rather than maintaining record of gate pass taken by each visitor „n ‟ times.

REFERENCES

  • Christopher M.H & Chris F.K., (Sept. 1994); MIS Quarterly, vol. 18 n.3, p-251 – 275, Computerized Loan Organization Systems; An Industry Ease Study of the Electronic Markets Hypothesis.
  • Duncan D.J. & Whetstone J. (1996), p. 25-36, Is On-Line Bookshopping Ready for the Internet? Information Systems Management.
  • Guisbery M.J. (1981) p. 459-478, Diagnosis of MIS Implementation Failures; Promising Results & Unanswered Questions, Management Science.
  • Han. K.S., & Noh, M.H. Journal of MIS Research (1998) p. 103-124. An Analysis of Major Failure Factors to Reduce th Dysfunction of On-line Shopping.
  • Ives B., & Olson M. (1984), User Involvement & MIS Success. A  Review of Research Management Science 30, 586-603.
  • Kalokota R. & Whinston A.B. (1996), Using Client Server Broker Architecture For Intranet Decision Support p. 171-192
  • Kiely T., (1997), The Internet”; Fear & Shopping Cyberspace. Harvar Business Review p.13-14
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!