Professional Documents
Culture Documents
By
Mark Jizon B. Diapolet
Benjo R. Gadia
John Paul B. Rosario
BSIT 3A
2016
CHAPTER I
The Problem & its Background
1.1 Introduction
Private home security and surveillance has had a rich and long history and plays
an important part in everyones life. The industry has grown to become an over one
hundred billion industry since its inception in 1851, with many technology firms also
entering the market. Private security technology is changing the perceptions of
security and surveillance as many engineers and programmers advancing their
skills in both hardware and software.
Currently, security and surveillance is given high priority by home and business
owners who want to ensure that their loved ones as well as assets are protected.
The focus of this thesis will be to describe, design and implement a reliable, user
friendly and user installable home security system.
Nowadays, home security systems are important and crucial to our lives. The issue
now days are that home security systems that exist in the market have monthly
fee, some are non-user friendly to many individuals. As a team we came together
to create an integrated system, which is efficient and cost effective and accessible
to every individual that requires one, also unlike any Home Security System.
viewed; monthly expenses are paid any potential untrue alarms can result
considerable increase value fee of the system.
On the other hand unmonitored home security systems lack overseeing but utilize
comparable house alarms that will scare the compelled entry of a burglar. These
systems will simply create a loud audio since alerting the owner, neighbors, and
any person who lives nearby the house. Like the monitored system several
sensors motion, cameras are disposed all over the house and when an event likely
happens a loud siren is triggered.
This noise alerts the owner and neighbors that something is not right hence
solving the situation. These systems dont require for the person to spend monthly
fees on monitoring or screening like monitored systems. However the downside is
that if the situation is big the owner has to make a call to the enforcement and wait
for them to get at the scene.
1.2 Project Context
The proponents proposed the system because many unwanted visitors, intruders
or burglars come to anyones house, for them to get anything or something that
may affect to home owners will be no longer a problem. Proponents make a hard
decision to strongly propose the system so that they have the chance to develop
such very important Security type system in your house.
The system will potentially benefit those people who will use the proponents Home
Security System. Because this may help them for securing there house. Also it can
protect their love ones and even their very important property.
The Home Security System fit together with other systems because its a user
friendly.
Problem Statement
1. Many case of house intrusion.
2. Gadgets, Devices, Equipment and Appliances that get by the burglar are
impossible to recover.
3. Home person may get harm if they try to stop or get caught the burglar in
operation.
4. Life treat may the cause of intrusion.
5. No security personnel or system are sometimes the main reason of house
6.
7.
8.
9.
intrusion.
Monthly salary of security personnel are costly compare to security system.
Intruders depend on the vicinity of the house.
Outages are the most prone scenario from burglar intrusion.
Theres no proof of caught in act for intruders if they are not video
recorded in there operation.
To create a Home Security System that will lock and unlock the door lock without
the use of key but by texting the GSM of the system.
Specific Objectives:
1.
2.
3.
4.
5.
Limitations
1.
2.
3.
4.
5.
6.
Theres nothing more better place to live than your security is the first
responsibility. Home persons can sleep well and travel without worry because their
house was secured.
LCD - is a flat-panel display or other electronic visual display that uses the lightmodulating properties of liquid crystals.
GSM - A GSM modem is a specialized type of modem which accepts a SIM card,
and operates over a subscription to a mobile operator, just like a mobile phone.
Servo Motor - is a rotary actuator or linear actuator that allows for precise control
of angular or linear position, velocity and acceleration.
IP Camera Electronic device connected to a television that allows an individual
to record various programs. The DVR acts similar to a standard video recording
device without the need of inserting some form of blank media to transfer the
program onto. A DVR has an internal hard drive with a specific memory capacity.
Users can set program to record every time they come on or every time that there
is a new episode. TIVO is one of the most popular brands of DVRs.
Deadbolt - A dead bolt, deadbolt or dead lock is a locking mechanism distinct
from a spring bolt lock because a deadbolt cannot be moved to the open position
except by rotating the lock cylinder with the key.
Intruders individuals go into place where they are not wanted or welcome.
CHAPTER II
Review of Related Literature
Figure 1
Theory of Security by Ron Kurtus
The Figure on previous page explains that according to Ron Kurtus, You must
protect yourself and provide security against a threat. You must be aware of
possible threats, establish awareness, know the motivations of criminally-minded
people and check your vulnerabilities to those motives.
There are criminally-minded people who may attempt to attack individuals,
property or organizations. An attack on an individual can be to cause physical or
emotional harm. It may also be intended to harm a person's reputation or to injure
the person financially. A physical attack may be meant to injure or even to kill the
person. Property and buildings can be damaged or even destroyed in an attack.
Another type of attack on property is theft. Companies, organizations, governments
and countries may come under attack. The effort here is to destroy the structure of
the organization or perhaps take it over by force or subterfuge.
The reasons a criminal would want to attack another person, property or an
organization include for financial gain, to get personal revenge, to promote a
cause, or simply for kicks or thrills. By relating the motives of criminal-mined
people to your own situation, you can often determine the real threat to your
security.
There are situations in which you or your property can be vulnerable to attack. By
knowing the possible motivations and using common sense, you can examine the
areas in which you may be vulnerable. Obviously, Keeping things out of sight and
keeping locked are good security measures. Property within a company building
can be easily damaged or stolen. A robber can break into a building through doors
and windows. Since those are vulnerable areas, they should be made secure.
You can defend against an attack by having protective mechanisms or security
measures in place. Rapid response to an attack is also important. In some cases,
a preemptive attack on suspected threats is an appropriate measure. The first line
of defense against an attack is to make it difficult for your enemies or the criminalmined person to make the attack. A thief will find a lock on a door enough to
discourage breaking into the building to steal equipment.
A thief will not seek to break into a building that is protected by armed security
guards. An alarm system in a building or on a car is meant to alert the police to
come an arrest the thief. Sometimes you can attack your enemies before they get
an opportunity to attack you.
potentially spend several hundred dollars to get started. Factor in the added cost of
a monthly fee for a service to actively monitor your house and it may feel quite
expensive. However, the bulk of security equipment sold by monitoring services
comes with a lifetime warranty, meaning youll rarely have to pay full price for
replacements. The monthly service fee is a guarantee that someone will always be
in a position to check on you and your homes safety and even call emergency
responders if needed.
Thousands of homes are invaded every week. Although the cost of installing and
maintaining a security system may give you reason to pause, the proven history of
success relating to these systems demonstrates that there is no question a home
security system is worth it. It keeps prospective criminals from your property and
provides the added comfort of knowing someone is watching over your house,
even if youre away on vacation.
According to Joe Proveys Home Security 101 (2014), Home security systems
can give you peace of mind in other ways, too. Whether youre home or away, they
can inform you of hazards like fire, elevated carbon monoxide levels, and power
outages. They can alert you if someone is tampering with a safe, a locked tool
chest, or a medicine or gun cabinet. You might even use it to check on the safe
arrival of a child returning home from school. Or, if you lose sleep wondering
whether the water heater is flooding your basement, you can have your system set
up to alert you of that as well.
With interactive systems come other benefits as well. Prefer not to hand out house
keys to housekeepers, or other service providers. You can unlock a door for them
from wherever you are, whether youre at work or on a trip, with systems such as
Kwiksets SmartCode.
You can also use the system to program your homes temperature so you dont
waste energy heating or cooling your home unnecessarily. During cool seasons, it
can automatically lower settings when youre sleeping or awayand raise them
just before you wake or return home.
When choosing a Home Security system, always keep in mind the needs of your
house and family. An effective system protects everything you hold dear, helps you
feel safe and offers peace of mind. Strong support features and effortless
interaction with the security company are surefire ways to help you feel a greater
sense of security at home and while youre away.
According to J. Curtis (2014), keeping your home safe with a security system
makes sense it's the ideal way to protect your belongings and your family from
intruders. But shopping for a security system can leave you scratching your head,
thanks to the vast number of brands, features and pricing available for different
systems. Before you begin your search, make sure you understand just what
different systems have to offer and how they'll protect your home and family before
deciding which the right one for your property is.
Not all security systems are created equally. The best home alarm systems use a
variety of devices and features to offer your home the highest level of protection.
From motion-sensor lights to video cameras and alarms, you get to choose the
level of security you want based on the devices used in the initial setup. New
features like 24/7 online video monitoring so you can check in remotely make
home security systems much more sophisticated than their traditional alarm-only
counterparts. The devices you choose will depend heavily on the size and type of
property you need to protect.
John Carlsen (2014), explain that most people recognize that some things are
nearly impossible to predict: the weather, the future and the price of gasoline. It's
also difficult to predict the actions of would-be intruders who may target your home.
However, it is possible to detect and even deter these trespassers using a security
system equipped with motion sensors.
As is common with many technologies, motion sensors have roots in warfare. The
principles for motion detection by electronic means came with the development of
radar during World War II. This revolutionized warfare by allowing military forces to
detect enemy ships and aircraft beyond the visible horizon. After the war, the
science behind radar technology outgrew its militaristic origins to transform
meteorology and security.
Safewise Company (2015) tells that a home security system is an investment,
and as with any investment it's important to determine the return you're likely to
receive. While it can be simple to tally the up-front and monthly costs associated
with a security system and alarm monitoring, attaching a price tag to peace of mind
is a difficult thing to do, especially if you have children or teens in the house.
Security systems can do more than deter burglars. The right system can keep you
linked to your home no matter where you are. It will also let you know when doors
are opened and closed and if attempts are made to access sensitive areas like gun
and liquor cabinets. There are also other, hidden benefits that you may be able to
take advantage of, such as discounts on home owners or renters insurance.
your energy bill. If your budget is limited, you can even buy simple do-it-yourself
kits to install these systems yourself.
For a simple entry point into the world of tech and home security, check out mobile
apps like the AtHome Camera. This app allows you to monitor video of your home
remotely, with capability to watch live updates via 3G/4G or WiFi. Other technology
such as SmartThings lets users see whats going on at home when theyre out and
about by tracking sensors, locks, light switches and more.
Imagine a smart home security system that tracks motion, temperature, air quality
and even sound using a HD video camera and safety sensors. A device controlled
from your smartphone that you can check from absolutely anywhere, via a mobile
app.
Trace Alarm & Security System, Inc. (2011) was established in 1997 by a group
of Filipino entrepreneurs to cater to the needs of the fast growing Philippine
economy and to meet the increasing demand in the industry. As one of the leading
electronic security providers in the Philippines, the company has continued to
deliver unparalleled security solutions to its clients since its incorporation. Our
company has started in providing simple alarm security solutions to homes and
businesses and since then, we have now expanded to provide the latest IT
solutions that will cater to the specific needs of our clients.
At present, we have a nationwide coverage for our alarm security services. Some
of our major clients include Bank of the Philippine Islands, Philippine National Bank
and Union Bank of the Philippines to name a few. Our clients come from all over
the country. Wherever you are, we will always find ways to serve you better and to
make
your
life
and
properties
more
secured.
A good home security system does more than just guard the perimeter of your
house and ward off intruders. Todays modern technology allows alarm systems to
not only detect a problem but also contact the proper authorities even if you are not
home. This is because most systems have components like sensors, alarms, and a
direct connection to emergency personnel.
Although somewhat costly, knowing that your home is protected is one of the
biggest benefits of having a home security system. After all, you cannot put a price
tag on your familys safety.
With a security system in your home, you and your family are provided with a level
of protection. But before investing in one, it is important to know which kind you are
likely to benefit from.
There are mainly two classes categorized for motion detection, i.e. pixel-based
motion detection and region-based motion based algorithm. The pixel-based
motion detection is based on binary difference by employing local model of
intensity used in real time applications. The latter is based on the spatial
dependencies of neighboring pixel colors to provide result is more robust to false
alarm. The region based motion detection algorithm include special point detection,
block matching algorithm etc.
most of the time people began to neglect even a real intrusion. Intruders got to
know how to overcome those systems and made them useless. Today home
security systems are far more advanced and inexpensive compared to the old
days.
Home security systems are also named home burglar alarm systems. It is
electronic equipment that is connected with sensors that sense and report any
unwanted activity. The most commonly used burglar alarm systems are Passive
Infrared Detectors (PIR), Ultrasonic Detectors, Photo electric beams and Glass
Break Detectors. These advanced technology sensors are used in places where
the criminal activities are expected. Those systems are mainly named as indoor
security systems. Outdoor security systems such as Vibration Sensors, Microwave
Barriers, and Taut wire fence systems are also available in the market.
The next generation home burglar alarm systems are based on the wireless
technology and they do not need to be connected to any power supply. They work
from the battery power and can sense any unwanted movement near the house.
The installation of a wireless alarm system is very easy when compared to the
previous models. It is far better in operations and working methodology. Their
prefect working technology makes them the best product in the market. The
problem is those systems are much more expensive.
All the alarm systems operate with the help of motion sensors and heat sensors.
Those sensors allow detection of any intrusion near the installed area. The passive
According to Arun Cyril Jose et al. Smart Home Automation Security (2015),
The tasks of a modern security system include identifying an intruder trying to
gain access to the home, alerting the homeowner about the intrusion or intrusion
attempt, preventing the intruder from gaining access to the home, and gathering or
collecting evidence regarding the intrusion so that the perpetuators can be brought
to justice.
implementing
sophisticated
cameras,
feeds from different parts of their home. They can also be aware of different
environmental factors inside and outside their home, like humidity, temperature,
and light intensity. In a Wireless Sensor Actor Network, sensors gather information
about the physical world or environment around them. Actors perform the
appropriate actions on the environment as directed by the user or any other party.
Improvements in Wireless Sensor Actor Networks are certainly a contributing factor
in the popularity of smart homes. Combining Ubiquitous Computing, Wireless
Sensor Actor Networks and the popularity of the Internet has allowed designers,
engineers, and researchers to come up with efficient methods to allow home
inhabitants to access and control each and every aspect of their home, including
the environment.
Alex Colon (2015), According to his research The Best IP Cameras for Home
Surveillance, One of the biggest benefits of a smart home is being able to know
what's going on when you're not actually there. Whether you're checking in on your
kids, pets, or an exotic jewel collection, a home surveillance camera is a great tool
for keeping an eye on things from afar.
Although capabilities vary from device to device, home surveillance cameras allow
you to monitor what's going on in your home through live or recorded video. But
not all cameras are created equally. Some have alarms or can send you
notifications when they detect activity, some offer two-way audio, some are meant
to monitor your baby, and some even double as full-on home automation hubs.
We've tested lots of home surveillance cameras over the last few years, so we
know what's important to look for. For instance, you want a camera that's simple to
set up and use. Additionally, one of the very first qualities we notice is an attractive
though discreetdesign. It's important that the camera looks like something you
actually want in your home, but depending on your needs, you may not want it to
stand out too much.
Device support is critical as well. Our favorite cameras allow you to check in from
anywhere, whether it's an app on your phone or a Web browser. Additional
features vary from camera to camera, and each of our top picks offer just enough
variety to set them apart from the rest of the competition.
Smart homes obviously have the ability to make life easier and more convenient.
Home networking can also provide peace of mind. Whether you're at work or on
vacation, the smart home will alert you to what's going on, and security systems
can be built to provide an immense amount of help in an emergency. For example,
not only would a resident be woken with notification of a fire alarm, the smart home
would also unlock doors, dial the fire department and light the path to safety.
Smart homes also provide some energy efficiency savings. Because systems like
Z-Wave and ZigBee put some devices at a reduced level of functionality, they can
go to "sleep" and wake up when commands are given. Electric bills go down when
lights are automatically turned off when a person leaves the room, and rooms can
be heated or cooled based on who's there at any given moment. One smart
homeowner boasted her heating bill was about one third less than a same-sized
normal home. Some devices can track how much energy each appliance is using
and command it to use less.
Smart home technology promises tremendous benefits for an elderly person living
alone.
Smart homes could notify the resident when it was time to take medicine, alert the
hospital if the resident fell and track how much the resident was eating. If the
elderly person was a little forgetful, the smart home would perform tasks such as
shutting off the water before a tub overflowed or turning off the oven if the cook
had wandered away. It also allows adult children who might live elsewhere to
participate in the care of their aging parent. Easy-to control automated systems
would provide similar benefits to those with disabilities or a limited range of
movement.
CHAPTER Ill
Knowledge requirements:
a. Existing Home Security System
b. Home Security Tutorial
Technical
c. GSM based Home Security
Tutorial
d. Arduino
Tutorial of the Project
3.1
Technicality
Software requirements:
a.INPUT
Arduino 1.6.7
b. Notepad/Notepad++
Hardware requirements:
a. Arduino Mega 2560
b. Computer/Laptop
c. Camera/OV5642
d. Motion Sensor
e. Reed Switch
f. Servo Motor
g. LCD
h. Pin Connector
i. Resistors
j. 12 Key Membrane Switch Keypad
k. LED
l. Buzzer
m. Breadboard
n. LCD.
Background
PROCESS
System
Methodology
a. Development and
Design Interface
b. Developing a
Module
c. System
Development
d. Testing and
Evaluation
e. Implementation
OUTPUT
Home
Security
System
Feedback
Figure 2
Conceptual Model
Figure 2 Conceptual Model on the previous page explains the Technicality of the
Project. Knowledge Requirements are the keys on how does the proponents will
make the system. There are some tutorials on the internet that shows on how to
make the system like the proponents proposed. Existing Home Security System
will helps the proponents a lot. At first it exists and possible to build, there are
many ideas to get by researching, reading and interviewing such person in field of
Home Security.
In the field of Technology and Electronics, Arduino are the brain of the system.
Because it is programmable and whatever you want to be functioned just make the
right code and voila its a smart living like things.
Software Requirements are very important in the system. Without software its
useless and nonsense system. The proponents used Notepad and Arduino 1.6.7 in
The Mega 2560 has a resettable polyfuse that protects your computer's USB ports
from shorts and overcurrent. Although most computers provide their own internal
protection, the fuse provides an extra layer of protection. If more than 500 mA is
applied to the USB port, the fuse will automatically break the connection until the
short or overload is removed.
The Mega 2560 can be powered via the USB connection or with an external power
supply. The power source is selected automatically.
External (non-USB) power can come either from an AC-to-DC adapter (wall-wart)
or battery. The adapter can be connected by plugging a 2.1mm center-positive
plug into the board's power jack. Leads from a battery can be inserted in the GND
and Vin pin headers of the POWER connector.
The board can operate on an external supply of 6 to 20 volts. If supplied with less
than 7V, however, the 5V pin may supply less than five volts and the board may
become unstable. If using more than 12V, the voltage regulator may overheat and
damage the board. The recommended range is 7 to 12 volts.
Motion/PIR Sensor
(Passive InfraRed sensor) A device used to detect motion by receiving infrared
radiation. When a person walks past the sensor, it detects a rapid change of
infrared energy and sends a signal. PIR sensors are used for applications such as
automatically turning on lights when someone enters a room or causing a video
camera to begin operating.
Reed Switch
The reed switch is an electrical switch operated by an applied magnetic field. It
was invented at Bell Telephone Laboratories in 1936 by W. B. Ellwood. It consists
of a pair of contacts on ferrous metal reeds in a hermetically sealed glass
envelope.
The basic reed switch consists of two ferromagnetic nickel-iron wires and a glass
capsule. The two wires are formed into "reeds" by flattening one end. The reed
ends are carefully aligned with a small overlap and then permanently sealed inside
the glass capsule. The overlap or contact area of the reeds is coated with special
metals such as ruthenium. The nickel-iron leads are tin plated so that they can be
soldered.
The two reeds act as magnetic flux conductors when exposed to an external
magnetic field from either a permanent magnet or an electromagnetic coil. Poles of
opposite polarity are created at the contact gap and the contacts close when the
magnetic force exceeds the spring force of the reeds. The contacts open when the
external magnetic field is reduced so that the magnetic attractive force between the
reeds is less than the restoring spring force of the reeds.
The basic reed switch is a Single Pole Single Throw Normally Open switch, also
known as a SPST-NO or Form A switch. By adding an additional nonmagnetic
contact that is electrically closed with no magnetic field present, a Single Pole
Double Throw switch can be made. This is also known as a changeover switch or
a SPDT switch. This is a break-before-make switch in that the closed contact
opens before the open contact closes.
The electrical contacts in a reed switch are hermetically sealed. That is, airtight
glass-to-metal seals prevent the contacts from being exposed to the environment.
Hamlin reed switches are sealed with an inert nitrogen atmosphere inside the
switch. The Hamlin MDRR-6, MRPR-8, DRR-DTH, and DRT-DTH reed switches
are sealed with a higher-than-atmospheric pressure. This increases the breakdown
voltage and makes these switches particularly well suited to 240 VAC mains
switching applications. The Hamlin MARR-5 reed switch has a vacuum inside the
switch capsule. Since there is no gas to ionize and arc, this switch has very high
voltage switching capability.
Reed switches can operate for billions of operations on low voltage logic loads. Life
is typically in the millions of operations at higher loads such as 10 to 120 V AC/DC
and 10 to 250 mA. However, for extreme loads, end of life may be reached in less
than a million operations. See application notes below for further information on
capacitive loads and incandescent lamp loads. Contact Hamlin with the load
voltage, current, type (AC or DC, inductive or capacitive or resistive), required life,
and application for recommendations on the best switch type to use.
Reed switches are the major component in reed sensors as well as reed relays.
Since Hamlin manufactures both standard and custom reed sensors and relays,
applications can very often benefit from Hamlins engineering expertise, production
capabilites, and quality systems to provide parts in a cost-effective and timely
manner. Options include standard surface mount reed switches, custom cropping
& forming of leads, modifications to existing standard product, and full custom
product. Contact Hamlin to discuss your application needs.
Servo Motor
A servomotor is a rotary actuator or linear actuator that allows for precise control
of angular or linear position, velocity and acceleration. [1] It consists of a suitable
motor coupled to a sensor for position feedback. It also requires a relatively
sophisticated controller, often a dedicated module designed specifically for use
with servomotors.
Servomotors are not a specific class of motor although the term servomotor is
often used to refer to a motor suitable for use in a closed-loop control system.
Servomotors are used in applications such as robotics, CNC machinery or
automated manufacturing.
Camera
Is an optical instrument for recording images, which may be stored locally,
transmitted to another location, or both. The images may be individual still
photographs or sequences of images constituting videos or movies.
Breadboard
A breadboard is a construction base for prototyping of electronics. Originally it was
literally a bread board, a polished piece of wood used for slicing bread. In the
1970s the solderless breadboard (AKA plugboard, a terminal array board)
became available and nowadays the term "breadboard" is commonly used to refer
to these. "Breadboard" is also a synonym for "prototype".
Because the solderless breadboard does not require soldering, it is reusable. This
makes it easy to use for creating temporary prototypes and experimenting with
circuit design. For this reason, solderless breadboards are also extremely popular
with students and in technological education. Older breadboard types did not have
this property. A stripboard (veroboard) and similar prototyping printed circuit
boards, which are used to build semi-permanent soldered prototypes or one-offs,
LCD
A liquid-crystal display (LCD) is a flat-panel display or other electronic visual
display that uses the light-modulating properties of liquid crystals. Liquid crystals
do not emit light directly.[1]
LCDs are available to display arbitrary images (as in a general-purpose computer
display) or fixed images with low information content, which can be displayed or
hidden, such as preset words, digits, and 7-segment displays as in a digital clock.
They use the same basic technology, except that arbitrary images are made up of
a large number of small pixels, while other displays have larger elements.
LCDs are used in a wide range of applications including computer monitors,
televisions, instrument panels, aircraft cockpit displays, and signage. They are
common in consumer devices such as DVD players, gaming devices, clocks,
watches, calculators, and telephones, and have replaced cathode ray tube (CRT)
displays in nearly all applications. They are available in a wider range of screen
sizes than CRT and plasma displays, and since they do not use phosphors, they
do not suffer image burn-in. LCDs are, however, susceptible to image persistence.
[2]
The LCD screen is more energy-efficient and can be disposed of more safely than
a CRT. Its low electrical power consumption enables it to be used in batterypowered electronic equipment more efficiently than CRTs. It is an electronically
modulated optical device made up of any number of segments controlling a layer
of liquid crystals and arrayed in front of a light source (backlight) or reflector to
produce images in color or monochrome. Liquid crystals were first discovered in
1888.[3] By 2008, annual sales of televisions with LCD screens exceeded sales of
CRT units worldwide, and the CRT became obsolete for most purposes.
Figure 3
How the project will work
For Security Mechanism, it shows how it works for the intruders or burglar to be
aware and alarmed because the house is Security Present.
At first, whenever the system has been activated the IP Camera will
automatically record video that saves on SD Card; also the camera has the
capability to detect motion and still record video if the place is in the dark
because of Night Vision. IP Camera can save up to 32G or higher, it depends on
you on how large of storage you are preferred to use.
Second is the Motion Sensor that can detect Motion form things that emit
Infrared. If the motion is detected, buzzer connected to it will sound loudly
enough for the Intruder or Burglar to be alarmed and stop their activity.
Third is the Vibration Sensor that can detect vibration even the very small
vibration cause by someone or by natural cause. Vibration has been installed in
the door for the Intruder or Burglar to know that they are really serious for their
intension to rub the house by entering the door or because of other things that
needed to pass by the door. If the sensor detects vibration higher than the slight
vibration, it will send SMS to the home owner to alarm it because of someone is
trying to enter the house and the buzzer also that connected to it will sound
loudly enough for Intruder or Burglar to grab their second chance. Since the
Intruder or Burglar has already alerted by the buzzer of motion sensor and still
they continue the operation, it is better is the system has the capability to text
someone that there are Intruder or Burglar in the house.
And the last for Security Mechanism is the Door Contacts that are connected in
the edge of the upper right part of the door and the wall itself. When the two
Magnetic Door Contacts has been separated, the buzzer connected to it will
make a loud noise enough for the Intruder or Burglar to stop what they are doing
for the third chance of informing them that the house was Security Secured.
Every time the motion sensor detected motion in its parameter, it will trigger its
buzzer to make a loud alerting noise for someone. Also motion sensor can
detect motion 7 meters away, 180 degree up and down. Better to install Motion
Sensor allowing detecting motion widely. Theres no way for Intruder or Burglar
to hide them from this sensor.
For Door Lock Texting Mechanism, it shows how GSM and Servo Motor work
together for the Door to Lock and Unlock. GSM shield sim900 is connected to
Arduino so that it can be coded for function you want for it to do. We code the
GSM and Servo Motor to communicate if it receive text message from home
owner whether to lock it or Unlock. If the GSM receive LOCK the servo will turn
180 degrees and it turn the Door Lock to Lock and if it is already lock, the GSM
will reply The Door Was Locked. Same as for unlocking it, the home owner will
just text UNLOCK to make the servo motor turn 90 degrees and it means that
the door lock is now unlock and the door is ready to open, the it will reply again
as The Door is now Unlocked.
The GSM is not just accepting any kind of text message and from any cellphone
number. It will only communicate from the number of simcard that you input in
the code, and the text message must be the exact form of letters and
capitalization from what you input in the code before you upload it to the
Arduino. If you text the wrong text to the GSM it will reply to you the INVALID
COMMAND.
But make sure that you loaded the simcard for you to make it a reply and make
it work properly. Regular load or Register load is up to you. Better to register the
GSM for long term registration of unlimited text, for you if you are not at home
for a week.
CHAPTER IV
Methodology
Description
Version
Specification
Arduino
Arduino 1.6.7
Software
Description
Version
Specification
Microsoft Windows
ARDUINO
Operating System
The open-source
Windows 7
ARDUINO 1.6.7
Arduino Software
(IDE) makes it easy to
write code and upload
it to the board. It runs
on Windows, Mac OS
X, and Linux. The
environment is written
in Java and based on
Processing and other
open-source software.
Hardware
Description
Version
Specification
HP Laptop- Intel Core
The Laptop/Computer
HP Compaq 6710b
2.00GB, 32-bit
using.
Operating System
Arduino Uno
Servo Motor
Arduino Uno
SM7637
camera.
Use to detect Motion.
GH-718C Mini
Motion Sensor(PIR)
Vibration Sensor
Door Contacts
Camera
GSM
Buzzer
Door
Environme
People
Life Treat
Personal
Motive
Midnigh
t
House
Vicinity
House
Structure
Summer
Successf
House
Intrusion
of
Burglars
Early Morning
Rich
Christmas
season
Time
Season
Welfare
Figure 4
Fishbone Diagram
The Fishbone Diagram shows the different category of cause for someone to
make a house intrusion. Many reasons why there are people commit intrusion
and get rub the house or do such bad things or intension to home owner or
whos at home.
We did five categories that make a cause of house intrusion. We have people,
Environment, Time, Season and Welfare.
Person or individual are the one who do such bad intension to someone. Under
the people category theres a life treat and personal motive. If there is someone
who hates who the most and they wanted to kill you and they dont have a place
for you to get killed, well its already a choice for them to kill you at your house
where in you are resting at night and sleeping tight. Second is the personal
motive, if someone wants something from you like material things or information
that only at your house can be getting by them.
For environment there is house vicinity and house structure. If your house was
built in the place where in only few people lives, it is reason for some to choose
because theres a very small of chances to get caught. Also the house structure
plays a big role in it, if your house was not such that hard to enter its already a
reason for burglar or intruder to do an operation.
Time is one of the most reasons to consider if you want to rub a house. There is
midnight and early morning where in intruder do their operation. Midnight is
already a night and a dark hour of the day where in most of people are already
sleep, this is the time to do such bad work. But some intruder chooses early
morning to operate because all of the people in this dead hour were deeply
dreaming and no one will notice the hell happening.
Seasons also burglars and intruders will never forget to think and to choose.
They attack if there is no one at home at it will happen only like vacations and
holidays. Summer vacation where in some or most of the family will go outing or
travel far away from home. The same as the Christmas Season where in lots of
greetings and presents are there to give to someone you love; examples are
brand new gadgets or bags, shoes etc.
Welfare or life status is at the top of the reasons to consider and to look of most
of the intruders and burglars. If you are Successful or Rich, youre the apple of
the eye. Burglars or intruders are more likely to hit a jackpot if they do dirty job
because of the consequences they will be face if they are get caught.
Figure 5
Functional Decomposition Diagram
If the intruder or burglar still continue the operation and up to the door without
hesitating of the presence of buzzer by the motion sensor that still doing the
loud noise, it will send a text message to the home owner if it is detected above
the normal vibration. Also it will make the same noise as the motion buzzer does
because it has buzzer too.
The last for intruder or burglar is the Door Contacts that when separated and still
its powered by the system it will make a loud noise as long as the door was
open.
4.2.2 Technical Feasibility
Figure 6
Compatibility Testing
Figure 7
Gantt chart for Capstone 1st Semester
Gantt Chart Figure 7 shows how the proponents make the capstone 1 in the
whole semester. Doing such a hard project must have a list of activity or a chart of
day where work must be do or finish. Proponents start the project by planning it at
the month of December followed by multiple researches of files that can help
along the making of project. The title project is not easy as its say, this will be the
bases of the look and idea of other and professors about what proponents was
doing.
Proponents make the chapter 1 for the whole month of January. Several
researches have been done in the internet and books; even journal was used in
documenting the past or history of home security projects. What its important in
the life of individual.
Chapter 2 was start doing in the second week of January till the third week of
February. In this part of capstone, it is all about the different literature from all over
the world. Many ideas were gathered by the proponents on how the project must
be done and the components needed to finish it.
Planning the components that will be used is not easy because of the price and
how really it must be present in the project. Many components that the proponents
proposed but some of them were not that important.
Chapter 3 is all about the project and how it will work. There are researches about
the technology used for the projects. The importance of components the step by
step it must be done.
The hardest part of doing such project is the communication of software from
hardware. The software we used is the Arduino studio and the GSM library. There
is much hardware we used, there are sensors, camera, door contact, wires,
breadboard, servo motor etc. also we make a special door for the project that cost
much.
On our 1st defense, many things that must be remake and renew. Our panelist
makes a big decision to make our system new and easy to do. They tell us what
we really need to focus.
Figure 8
Gantt chart for Summer Revision 60%
For figure 8 of Gantt chart for Summer Revision 60%, since 1 st defense was
successful yet many things to make over, especially in hardware of the system.
There is little hardware that will be added and some are lessen. Even though it
is summer and the time for us to get vacation and relax, weve decided to still
continue doing the system as what our professors and adviser told us.
Revisions system is not easy, software and hardware needs a minor to major
make over for the new system that we are heading. We have two months to do it
and luckily we did, not fully 60% has done but what systems focus is
successfully did.
Chapter 1 to 2 is not a big revision for us, unlike chapter 3 needs a big
modification. Making the software is really a headache for us due to it is more on
coding and logical. Hardware for us was not that big deal aside from the door
that also takes a big roll on the system.
Chapter 4 was also a large make over for us because of almost the systems was
change. Lots of new diagram was made.
Components /
Electronic Hardware
Item Price
Item /
Hardware
Count
Multiplied Price
Gizduino
1300php
1300php
Breadboard
50php
50php
Solid wires
5php
25
125php
Connector
100php
100php
GSM
2000php
2000php
Servo Motor
600php
600php
Motion Sensor
400php
400php
Vibration Sensor
300php
300php
Door Contacts
180php
180php
Buzzer
30php
60php
Simcard
40php
40php
Adapter
200php
200php
Battery
80php
80php
IP Camera
00000
00000
00000
5 435.00php
Total Electronics
Transportation Cost
250php
Door (E-Gismo)
Item
150php
(SM
Hardwar
Price
Megamall)
e
Plywood
Food Cost
Communication Cost
Item 300php
/
Total Price
150php
Hardware
Count
In Addition Cost
300php
1
Door
Lock
80php
2
Total Cost
160php
650php
650php
1180.00php
300php
Good
270php
3
810php
Other Cost Including Libraries and
Lumber
Computer Researches
Stopper
180php
300php
500.00php
2400.00php
1600.00ph
Figure 9
Hierarchy, Input, Process, Output
The HIPO (Hierarchy, Input, Process, and Output) figure shows how the system
affects the problem of house intrusion and what was needed to avoid such
intrusion in the house.
Input shows how to start the solution by powering the system, the Arduino as the
brain of the system where in all components was depend on it because they are
coded. Without the power, system is useless due to it is a technology.
Process is what was happening when the system has been powered and
activated. Process starts at IP Camera that will automatically record video
directly save to SD Card the video, then at the same time while recording the
video sensors are waiting for their different function, first to be trigger is the
motion sensor followed by the vibration sensor and the door contacts, all those
three was connected to buzzer. So when triggered, they will make a noise. Last
for the process is the home owner that will communicate to the GSM and Servo
motor for the door whether to lock or unlock.
Lastly, the output is the completely secure of the house because of the intruders
that did not continue what they are intended to do. Accomplishment and proper
work of the system will result to the zero intrusion record which is the problem
that the system stands for.
Figure 10
Context Diagram
The figure above shows how the system works in a very easy to understand way.
Context diagram explains the whole system in one diagram in such a very simple
manner. There is only two individual needed to see how the project works, the
home owner who owned a house that intruded by the burglar or just an intruder
only.
Home owner simply need to power the system to activate it. After that he can text
the GSM whether to lock or unlock the door lock connected to servo motor. Every
time the GSM receive a text message that is on the code it will send a specific text
depends on what you text. Invalid message will not be consider by the GSM.
For Intruders or Burglar, simply they were just trigger the sensors and be alerted by
the buzzer. If they trigger the vibration sensor, it will send a text message to the
home owner that someone is trying to unlock the door which is completely
secured.
In this diagram you will surely understand on how our system works.
Figure 11
Data Flow Diagram Level 0
Figure 11 as you shown above is the Data Flow Diagram level 0, these explain on
how the data of the system work pertaining to the text message. The circle in the
center is the home security system which is surrounded by the data makers that
send and receive data.
Home owner must start to power the system to power the GSM. If the GSM was
ready to do its job, it will just wait for the text of the home owner to receive. Then
after receiving text message it will make a reply to the home owner depend on
what it sends.
At the same time, not just the GSM is related on the data flow. There is vibration
sensor that also communicates to the GSM when powered. Vibration will wait for
any vibration above from the normal vibration to text the home owner.
Figure 12
Data Flow Diagram Level 1
Data Flow Diagram Figure 12 shows how the data was transmitted by the home
owner and the GSM after it was powered.
GSM will wait for the home owner to receive its text. If the sender sends the word
LOCK, the GSM will communicate to the servo motor to lock the door lock. Also,
it will make a reply to the sender like this The door was Locked. The same
scenario if the sender sends UNLOCK.
Vibration also makes the GSM to send SMS if it is detected any vibration above
from normal vibration.
Figure 13
Program Flowchart
Program Flowchart
Figure 14
Program Flowchart
Program Flowchart
Figure 15
Program Flowchart
Used Case Diagram
Figure 16
Used Case Diagram
Figure 17
Used Case Diagram
Figure 18
Software Risk Assessment
Figure 19
Software Risk Assessment
Functionalities
IP Camera
Why needed
To capture video on the place near the door and capture Intruder or
Burglar on the act of doing intrusion and save it directly on SD Card
Location of
Components
Must place in the area where it can capture a good shoot of video. Must
not be place in the area where water are present and direct sunlight
Function
INPUT
Power, SD Card
Can capture video and saves directly on the SD Card when powered
and view the Video on your PC, Smartphones or IPhone
Performance
Functionalities
Motion Sensor
Why needed
Location of
Must place in the perimeter of the house that away from the heat of the
Components sun,
also place in the angle that covers Door and Windows so it c an detect
someone closing to the Door or Window.
Function
Motion Sensor can detect motion from infrared that emits from person
INPUT
When motion or infrared are present and once detected, motion sensor
communicate to Arduino to sounds its buzzer enough to alert the person
in the perimeter of the house.
Functionalities
Vibration Sensor
Why needed
Because Burglars often oscillated the door when they are trying to
forcibly open the door with or without the use of tools or something.
Location of
Components
Must place in Front Door or Main Door because obviously it is the best
way to escape with something they get big or small. And doors are the
Function
INPUT
Performance
When vibration once detected even its just a little shake or vibrate, the
vibration sensor sounds the buzzer and send a text message to the home
owner to report that someone is trying to open the door because it
already dont mind the buzzer of motion sensor that already detected
them.
Vibration Sensor already doing some of its function on the system
Functionalities
Door Contacts
Why
needed
they are really up on the operation. As long as the door was open it
will not stop to sounds its buzzer.
Location of
Component
s
Must place in the Front Door or Main Door, upper right of the edge of
the door and one on the wall horizontal or vertically face each other
Door Contact.
Function
Connects the path of current to flow when each Door Contacts was
separated by the means of magnetic
INPUT
Functionalities
The Focus of our system, GSM can communicate to Arduino with our
sensors. GSM will be used for the Door Lock to make it unlock or Lock
through the use of Servo Motor.
Location of
Component
s
Function
INPUT
Performanc
e
GSM Shield Sim900d already doing some of its function on the system
Door
Why needed
Must place in the area where water and sunlight are not present, place it
in the corridor or inside room.
Function
INPUT
Actual and Real things that Intruder or Burglar will be executed. Good
place for Components, Sensors, Hardware to install
Functionalities
Servo Motor
Why needed
Location of
Component
s
Function
To Rotate the Door Lock that depend on the GSM once it was Receives
SMS
INPUT
Performanc
e