You are on page 1of 97

Pateros Technological College

College St. Sto.RosarioKanluran, Pateros, Metro Manila

GSM Based Home Security System


Using Arduino, IP Camera, PIR (Motion) Sensor,
Vibration Sensor, Door Contact And Servo Motor.

In partial fulfillment of the requirements


for the subject of Capstone 1

By
Mark Jizon B. Diapolet
Benjo R. Gadia
John Paul B. Rosario

BSIT 3A

2016

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

CHAPTER I
The Problem & its Background

1.1 Introduction

Private home security and surveillance has had a rich and long history and plays
an important part in everyones life. The industry has grown to become an over one
hundred billion industry since its inception in 1851, with many technology firms also
entering the market. Private security technology is changing the perceptions of
security and surveillance as many engineers and programmers advancing their
skills in both hardware and software.

Currently, security and surveillance is given high priority by home and business
owners who want to ensure that their loved ones as well as assets are protected.
The focus of this thesis will be to describe, design and implement a reliable, user
friendly and user installable home security system.

Nowadays, home security systems are important and crucial to our lives. The issue
now days are that home security systems that exist in the market have monthly
fee, some are non-user friendly to many individuals. As a team we came together
to create an integrated system, which is efficient and cost effective and accessible
to every individual that requires one, also unlike any Home Security System.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Some Home security is computerized system that denies unauthorized access to


facilities for unwanted visitors. This is done by creating layers that will make it
increasingly difficult for criminals to break in and steal things or harm you or your
family. This layer is user defined and is usually by modern technology equipment
such as cameras, sensors, and etc. There are two types of home security systems
that exist in the market today monitored and unmonitored systems. Monitored
Home Security Systems are trustworthy, powerful systems that mesh out of the
artwork security technological innovation with trusted checking services.
The systems that will protect your home form intruders all year long 24 hours 7
days a week. They will operate under the management of the companys central
main monitoring office so if a hazardous event likely happens for instance burglary
tries to step into house through the window/door a built in siren will be trigged
hence alerting the office hence professional authorities will be notified to deal with
the predicament. As in the case of fake alarm the office will still inaugurate to notify
authorities to go and check out the neighborhood.
Even though this system sounds/looks outstanding it has its fall backs. The alarms
are skillfully wired into your home resulting in a large consider self-monitored
alarm system that just even before signing that expensive office monitoring
charges contract. In addition to these charges the fact that your property is been

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

viewed; monthly expenses are paid any potential untrue alarms can result
considerable increase value fee of the system.
On the other hand unmonitored home security systems lack overseeing but utilize
comparable house alarms that will scare the compelled entry of a burglar. These
systems will simply create a loud audio since alerting the owner, neighbors, and
any person who lives nearby the house. Like the monitored system several
sensors motion, cameras are disposed all over the house and when an event likely
happens a loud siren is triggered.
This noise alerts the owner and neighbors that something is not right hence
solving the situation. These systems dont require for the person to spend monthly
fees on monitoring or screening like monitored systems. However the downside is
that if the situation is big the owner has to make a call to the enforcement and wait
for them to get at the scene.
1.2 Project Context
The proponents proposed the system because many unwanted visitors, intruders
or burglars come to anyones house, for them to get anything or something that
may affect to home owners will be no longer a problem. Proponents make a hard
decision to strongly propose the system so that they have the chance to develop
such very important Security type system in your house.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

The system will potentially benefit those people who will use the proponents Home
Security System. Because this may help them for securing there house. Also it can
protect their love ones and even their very important property.
The Home Security System fit together with other systems because its a user
friendly.

Problem Statement
1. Many case of house intrusion.
2. Gadgets, Devices, Equipment and Appliances that get by the burglar are
impossible to recover.
3. Home person may get harm if they try to stop or get caught the burglar in
operation.
4. Life treat may the cause of intrusion.
5. No security personnel or system are sometimes the main reason of house
6.
7.
8.
9.

intrusion.
Monthly salary of security personnel are costly compare to security system.
Intruders depend on the vicinity of the house.
Outages are the most prone scenario from burglar intrusion.
Theres no proof of caught in act for intruders if they are not video
recorded in there operation.

1.3 Purpose and Description


1.3.1 Objectives of the Study
General Objective:

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

To create a Home Security System that will lock and unlock the door lock without
the use of key but by texting the GSM of the system.
Specific Objectives:
1.
2.
3.
4.
5.

To create a system that can capture video on the area.


To create a system that can detect motion on the area.
To create a system that can detect door intrusion.
To create a system that can be activate and deactivate.
To create a system that will send a message of the specific sensors triggered.

1.3.2 Scope and Delimitation of the Study


Scopes
1.
2.
3.
4.
5.
6.
7.
8.

The system can capture video and saves it automatically in SD card.


The system can detect motion.
The system can detect door vibration.
The system can detect door intrusion.
The system can send and receive text message from GSM.
The system can Lock and unlock the door base on text message.
The system can make noise alert for intruders.
The IP Camera has the capability of recording in the dark because of Night vision.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Limitations
1.
2.
3.
4.
5.
6.

The system is not monitored type of system.


Power outage will lessen the range capability of the system.
Must install the components correctly.
Wrong code will not make the components function correctly.
Specified voltages must have, not higher neither lower than its needed.
Components must not be place in the open place or water is not presents.

1.3.1 Significance of the Project


Home Owner
Home owner will be no longer worry much about his personal life in the house,
also to his family. Security system will be his partner in crime; they can be saved
by this stuff from intrusion and also from the harm of intruders.
Monthly Security Personnel Salary
Theres a big deference in getting house security personnel, but if theyre having
Home Security System they are saving their money instead of paying monthly the
person to secure their house.
Comfortable Living

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Theres nothing more better place to live than your security is the first
responsibility. Home persons can sleep well and travel without worry because their
house was secured.

Operational Definition of terms


PIR or Motion Sensor - A device used to detect motion by receiving infrared
radiation
Vibration Sensor -

Door Contacts - is an electrical switch operated by magnetic field.

LCD - is a flat-panel display or other electronic visual display that uses the lightmodulating properties of liquid crystals.

GSM - A GSM modem is a specialized type of modem which accepts a SIM card,
and operates over a subscription to a mobile operator, just like a mobile phone.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Servo Motor - is a rotary actuator or linear actuator that allows for precise control
of angular or linear position, velocity and acceleration.
IP Camera Electronic device connected to a television that allows an individual
to record various programs. The DVR acts similar to a standard video recording
device without the need of inserting some form of blank media to transfer the
program onto. A DVR has an internal hard drive with a specific memory capacity.
Users can set program to record every time they come on or every time that there
is a new episode. TIVO is one of the most popular brands of DVRs.
Deadbolt - A dead bolt, deadbolt or dead lock is a locking mechanism distinct
from a spring bolt lock because a deadbolt cannot be moved to the open position
except by rotating the lock cylinder with the key.

Technical Definition of terms


Burglars a person who illegally enters a house in order to steal things.

Intruders individuals go into place where they are not wanted or welcome.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

CHAPTER II
Review of Related Literature

2.1 Theoretical Background


Theory of Security by Ron Kurtus (revised 29 January 2012); Security is the
protection of a person, property or organization from attack. The theory of security
is to know the types of possible attacks, to be aware of the motivations for attacks
and your relationship to those motives. The security or defense against such a
threat is to make it difficult to attack, threaten counter-measures, or make a preemptive attack on a source of threat.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 1
Theory of Security by Ron Kurtus

The Figure on previous page explains that according to Ron Kurtus, You must
protect yourself and provide security against a threat. You must be aware of
possible threats, establish awareness, know the motivations of criminally-minded
people and check your vulnerabilities to those motives.
There are criminally-minded people who may attempt to attack individuals,
property or organizations. An attack on an individual can be to cause physical or
emotional harm. It may also be intended to harm a person's reputation or to injure
the person financially. A physical attack may be meant to injure or even to kill the
person. Property and buildings can be damaged or even destroyed in an attack.
Another type of attack on property is theft. Companies, organizations, governments

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

and countries may come under attack. The effort here is to destroy the structure of
the organization or perhaps take it over by force or subterfuge.
The reasons a criminal would want to attack another person, property or an
organization include for financial gain, to get personal revenge, to promote a
cause, or simply for kicks or thrills. By relating the motives of criminal-mined
people to your own situation, you can often determine the real threat to your
security.
There are situations in which you or your property can be vulnerable to attack. By
knowing the possible motivations and using common sense, you can examine the
areas in which you may be vulnerable. Obviously, Keeping things out of sight and
keeping locked are good security measures. Property within a company building
can be easily damaged or stolen. A robber can break into a building through doors
and windows. Since those are vulnerable areas, they should be made secure.
You can defend against an attack by having protective mechanisms or security
measures in place. Rapid response to an attack is also important. In some cases,
a preemptive attack on suspected threats is an appropriate measure. The first line
of defense against an attack is to make it difficult for your enemies or the criminalmined person to make the attack. A thief will find a lock on a door enough to
discourage breaking into the building to steal equipment.
A thief will not seek to break into a building that is protected by armed security
guards. An alarm system in a building or on a car is meant to alert the police to

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

come an arrest the thief. Sometimes you can attack your enemies before they get
an opportunity to attack you.

2.2 Related Literature


2.2.1 Foreign Literature
According to Ryan Goodrich (2015), the question about whether home security
systems are worth the money is one of constant debate. If youve never been the
victim of a home invasion or theft, justifying the up-front and monthly costs
associated with a security system may be difficult. Though you may have a history
of security and safety within your home, a simple security system may prevent and
continue to dissuade criminals from breaking into your home and stealing valuable
and invaluable property.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

As describe by the Electronic Security Association (2015), burglaries (any


sort of illegal intrusion to commit theft) occur once every 15 seconds and robberies
(the same, but with the victim present) once every 90 seconds. The majority of
these instances occur through forcible entry to a home through a door, window or
other entry. And in some cases, entry is gained through unlocked openings. Many
homes make ideal targets for burglars due to the absence of home security
systems. This is largely a result of how simple a task it is to break into a home
using an ordinary tool such as a hacksaw.
With a security system in place, the majority of burglars are immediately deterred
by the simple presence of a sign in your yard. And even if a criminal still decides to
break into your home, sensors on your windows and doors will trigger an audible
alarm to scare away intruders. When an intrusion is detected, both you and the
monitoring service receive an immediate alert with information about the type of
intrusion, whether it is an unauthorized window opening or motion detection. Based
on this alert, both you and the monitoring service can respond to the incident
quickly and lessen the chance of burglary. And if you have the foresight to install a
security camera as part of your system, you can secure footage of the intruder for
later identification.
Installing your first home security system is a significant up-front expense because
youre paying for a lot of equipment. Between all the door and window sensors,
control panel, security cameras and other peripheral equipment, you could

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

potentially spend several hundred dollars to get started. Factor in the added cost of
a monthly fee for a service to actively monitor your house and it may feel quite
expensive. However, the bulk of security equipment sold by monitoring services
comes with a lifetime warranty, meaning youll rarely have to pay full price for
replacements. The monthly service fee is a guarantee that someone will always be
in a position to check on you and your homes safety and even call emergency
responders if needed.
Thousands of homes are invaded every week. Although the cost of installing and
maintaining a security system may give you reason to pause, the proven history of
success relating to these systems demonstrates that there is no question a home
security system is worth it. It keeps prospective criminals from your property and
provides the added comfort of knowing someone is watching over your house,
even if youre away on vacation.
According to Joe Proveys Home Security 101 (2014), Home security systems
can give you peace of mind in other ways, too. Whether youre home or away, they
can inform you of hazards like fire, elevated carbon monoxide levels, and power
outages. They can alert you if someone is tampering with a safe, a locked tool
chest, or a medicine or gun cabinet. You might even use it to check on the safe
arrival of a child returning home from school. Or, if you lose sleep wondering
whether the water heater is flooding your basement, you can have your system set
up to alert you of that as well.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

With interactive systems come other benefits as well. Prefer not to hand out house
keys to housekeepers, or other service providers. You can unlock a door for them
from wherever you are, whether youre at work or on a trip, with systems such as
Kwiksets SmartCode.
You can also use the system to program your homes temperature so you dont
waste energy heating or cooling your home unnecessarily. During cool seasons, it
can automatically lower settings when youre sleeping or awayand raise them
just before you wake or return home.

Based on Home Security System Review of John Carlsen (2014), whether


you're away for fifteen minutes or two weeks, you need to know that your family
and valuables are safe at home. A home security system can notify you when
things happen in your home, such as when your children come home from school.
It can also protect you from fire, flood, carbon monoxide, natural gas and human
intrusion.
Installing a new system can be a significant financial investment, but it can lower
your home insurance costs and save you money. From our research, we found that
Frontpoint, Protect America and LiveWatch are among the best home security
companies because of their versatile offerings that keep you and your home safe.
For additional information, read our articles on home security systems.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

When choosing a Home Security system, always keep in mind the needs of your
house and family. An effective system protects everything you hold dear, helps you
feel safe and offers peace of mind. Strong support features and effortless
interaction with the security company are surefire ways to help you feel a greater
sense of security at home and while youre away.
According to J. Curtis (2014), keeping your home safe with a security system
makes sense it's the ideal way to protect your belongings and your family from
intruders. But shopping for a security system can leave you scratching your head,
thanks to the vast number of brands, features and pricing available for different
systems. Before you begin your search, make sure you understand just what
different systems have to offer and how they'll protect your home and family before
deciding which the right one for your property is.
Not all security systems are created equally. The best home alarm systems use a
variety of devices and features to offer your home the highest level of protection.
From motion-sensor lights to video cameras and alarms, you get to choose the
level of security you want based on the devices used in the initial setup. New
features like 24/7 online video monitoring so you can check in remotely make
home security systems much more sophisticated than their traditional alarm-only
counterparts. The devices you choose will depend heavily on the size and type of
property you need to protect.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

John Carlsen (2014), explain that most people recognize that some things are
nearly impossible to predict: the weather, the future and the price of gasoline. It's
also difficult to predict the actions of would-be intruders who may target your home.
However, it is possible to detect and even deter these trespassers using a security
system equipped with motion sensors.
As is common with many technologies, motion sensors have roots in warfare. The
principles for motion detection by electronic means came with the development of
radar during World War II. This revolutionized warfare by allowing military forces to
detect enemy ships and aircraft beyond the visible horizon. After the war, the
science behind radar technology outgrew its militaristic origins to transform
meteorology and security.
Safewise Company (2015) tells that a home security system is an investment,
and as with any investment it's important to determine the return you're likely to
receive. While it can be simple to tally the up-front and monthly costs associated
with a security system and alarm monitoring, attaching a price tag to peace of mind
is a difficult thing to do, especially if you have children or teens in the house.
Security systems can do more than deter burglars. The right system can keep you
linked to your home no matter where you are. It will also let you know when doors
are opened and closed and if attempts are made to access sensitive areas like gun
and liquor cabinets. There are also other, hidden benefits that you may be able to
take advantage of, such as discounts on home owners or renters insurance.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

2.2.2 Local Literature


According to Integrated Security and Automation, Inc. (2015), Intrusion Alarm
System is a system that detects and/or prevents break-in attempts to any property.
Includes sensing devices, which can be located inside and outside the property
premises that sends a signal to a control panel whenever it activates. This can be
integrated with other systems such as Fire Detection, Access Control and CCTV.
Lamudi Company Philippines (2014), tells that there is nothing worse than
feeling unsafe in your own home. Of course there are some basic measures
everyone can take to secure their property move to a safe area, keep lights on
around your perimeter, even buy a dog.
But technology has put advanced home security within easy reach for the average
homeowner. Today we go beyond the basic alarm systems and look at some clever
inventions for boosting home security. Consider installing one of these to make
sure you and your family stay safe at home.
Boost the value of your alarm system by adding glass break sensors to your
windows and doors, as well as motion sensor lighting to your exterior. Often these
can be included as an inexpensive add-on alongside your home security package.
Motion sensors in particular are one of the best ways to ensure outdoor entry
points front doors, balconies, patios are well lit, without dramatically increasing

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

your energy bill. If your budget is limited, you can even buy simple do-it-yourself
kits to install these systems yourself.
For a simple entry point into the world of tech and home security, check out mobile
apps like the AtHome Camera. This app allows you to monitor video of your home
remotely, with capability to watch live updates via 3G/4G or WiFi. Other technology
such as SmartThings lets users see whats going on at home when theyre out and
about by tracking sensors, locks, light switches and more.
Imagine a smart home security system that tracks motion, temperature, air quality
and even sound using a HD video camera and safety sensors. A device controlled
from your smartphone that you can check from absolutely anywhere, via a mobile
app.
Trace Alarm & Security System, Inc. (2011) was established in 1997 by a group
of Filipino entrepreneurs to cater to the needs of the fast growing Philippine
economy and to meet the increasing demand in the industry. As one of the leading
electronic security providers in the Philippines, the company has continued to
deliver unparalleled security solutions to its clients since its incorporation. Our
company has started in providing simple alarm security solutions to homes and
businesses and since then, we have now expanded to provide the latest IT
solutions that will cater to the specific needs of our clients.
At present, we have a nationwide coverage for our alarm security services. Some
of our major clients include Bank of the Philippine Islands, Philippine National Bank

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

and Union Bank of the Philippines to name a few. Our clients come from all over
the country. Wherever you are, we will always find ways to serve you better and to
make

your

life

and

properties

more

secured.

As an added service, we have set-up a Central Alarm Monitoring Facility which


provides monitoring services to its clients such as banks, pawnshops, commercial
establishments, residences and other financial institutions 24 hours a day, seven
days a week.
According to Zipmatch (2014), Intrusion is a common concern especially in
urban areas in the Philippines. In fact, with rising crime statistics, more and more
consumers are beginning to invest in home security systems.
In a recent survey conducted by Numbeo, 66.02% of respondents fear intruders
breaking into their homes. In 2012 alone, NSO and other government and private
agencies reported a total of 26,988 robberies. And in 2013, theft, physical assault,
and robbery were the top three most common crimes reported to local authorities.
Although having a neighborhood watch program, well-lighted streets, awareness
seminars, and a national emergency number can help reduce the prevalence of
hazards and other unforeseen emergencies, with a security system installed in
your home, you can be alerted immediately once a threat has been detected.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

A good home security system does more than just guard the perimeter of your
house and ward off intruders. Todays modern technology allows alarm systems to
not only detect a problem but also contact the proper authorities even if you are not
home. This is because most systems have components like sensors, alarms, and a
direct connection to emergency personnel.
Although somewhat costly, knowing that your home is protected is one of the
biggest benefits of having a home security system. After all, you cannot put a price
tag on your familys safety.
With a security system in your home, you and your family are provided with a level
of protection. But before investing in one, it is important to know which kind you are
likely to benefit from.

2.3 Related Studies


2.3.1 Foreign Studies
According to a Study of Motion Detection Method for Smart Home System by
Mayur J. Charadva et al. (2014), Motion detection surveillance technology gives
ease for time-consuming reviewing process that a normal video surveillance
system offers. By using motion detection, it save the monitoring time and cost. It
has gained a lot of interests over the past few years.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

There are mainly two classes categorized for motion detection, i.e. pixel-based
motion detection and region-based motion based algorithm. The pixel-based
motion detection is based on binary difference by employing local model of
intensity used in real time applications. The latter is based on the spatial
dependencies of neighboring pixel colors to provide result is more robust to false
alarm. The region based motion detection algorithm include special point detection,
block matching algorithm etc.

In the analysis of Passive Infrared Sensor Based Home Security System by


Dimuthu (2011), Home security is avoiding someone or some people entering a
house without the knowledge of the owner for the purpose of committing a
burglary. According to the FBIs uniform crime report in the year 2005, property
crime makes up slightly more than 75% of all crime in the United States. A burglary
takes place in the United States every 14.6 seconds according to the Uniform
Crime Reporting Program Crime Clock. Home security systems are one of the
most efficient, safe, and cost effective ways to prevent a home from burglary.
The earliest home security system comes from the early 1900s. They were very
expensive at that time and hard to monitor an intrusion. Now the technology has
developed very much more than the old days. In the early days in home security
technology, most systems made a loud sound when an intrusion was taking place.
These systems were unbelievably ineffective; most of them made false alarms,

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

most of the time people began to neglect even a real intrusion. Intruders got to
know how to overcome those systems and made them useless. Today home
security systems are far more advanced and inexpensive compared to the old
days.
Home security systems are also named home burglar alarm systems. It is
electronic equipment that is connected with sensors that sense and report any
unwanted activity. The most commonly used burglar alarm systems are Passive
Infrared Detectors (PIR), Ultrasonic Detectors, Photo electric beams and Glass
Break Detectors. These advanced technology sensors are used in places where
the criminal activities are expected. Those systems are mainly named as indoor
security systems. Outdoor security systems such as Vibration Sensors, Microwave
Barriers, and Taut wire fence systems are also available in the market.
The next generation home burglar alarm systems are based on the wireless
technology and they do not need to be connected to any power supply. They work
from the battery power and can sense any unwanted movement near the house.
The installation of a wireless alarm system is very easy when compared to the
previous models. It is far better in operations and working methodology. Their
prefect working technology makes them the best product in the market. The
problem is those systems are much more expensive.
All the alarm systems operate with the help of motion sensors and heat sensors.
Those sensors allow detection of any intrusion near the installed area. The passive

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

infrared detector is a heat sensor. It senses the infrared radiation of a body. In


passive infrared detectors, the meaning of the term passive is the detector is able
to function without the need of generating or radiating energy.

According to Arun Cyril Jose et al. Smart Home Automation Security (2015),
The tasks of a modern security system include identifying an intruder trying to
gain access to the home, alerting the homeowner about the intrusion or intrusion
attempt, preventing the intruder from gaining access to the home, and gathering or
collecting evidence regarding the intrusion so that the perpetuators can be brought
to justice.

The advancement of technology has contributed to the changing concept of


security in modern homes. It has changed from a simple lock and key security
concept to

implementing

sophisticated

security systems using

cameras,

microphones, contact sensors, proximity sensors, alarms, silent alarms, etc. By


connecting modern homes to the Internet which is very popular today, users can
access and control their homes remotely at any time and from anywhere in the
world. An increase in processing power of newly-designed processors and the
considerable reduction in power consumption, cost, and size of new electronics
devices enables people to know and control every aspect of their home, like which
door or window is open, which device or light is switched on, and which rooms are
occupied. Inhabitants can keep an eye on their home using live video and audio

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

feeds from different parts of their home. They can also be aware of different
environmental factors inside and outside their home, like humidity, temperature,
and light intensity. In a Wireless Sensor Actor Network, sensors gather information
about the physical world or environment around them. Actors perform the
appropriate actions on the environment as directed by the user or any other party.
Improvements in Wireless Sensor Actor Networks are certainly a contributing factor
in the popularity of smart homes. Combining Ubiquitous Computing, Wireless
Sensor Actor Networks and the popularity of the Internet has allowed designers,
engineers, and researchers to come up with efficient methods to allow home
inhabitants to access and control each and every aspect of their home, including
the environment.

Alex Colon (2015), According to his research The Best IP Cameras for Home
Surveillance, One of the biggest benefits of a smart home is being able to know
what's going on when you're not actually there. Whether you're checking in on your
kids, pets, or an exotic jewel collection, a home surveillance camera is a great tool
for keeping an eye on things from afar.
Although capabilities vary from device to device, home surveillance cameras allow
you to monitor what's going on in your home through live or recorded video. But
not all cameras are created equally. Some have alarms or can send you

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

notifications when they detect activity, some offer two-way audio, some are meant
to monitor your baby, and some even double as full-on home automation hubs.
We've tested lots of home surveillance cameras over the last few years, so we
know what's important to look for. For instance, you want a camera that's simple to
set up and use. Additionally, one of the very first qualities we notice is an attractive
though discreetdesign. It's important that the camera looks like something you
actually want in your home, but depending on your needs, you may not want it to
stand out too much.
Device support is critical as well. Our favorite cameras allow you to check in from
anywhere, whether it's an app on your phone or a Web browser. Additional
features vary from camera to camera, and each of our top picks offer just enough
variety to set them apart from the rest of the competition.

2.3.2 Local Studies


According to Rosslin et al (2010), in their study of Smart Home Development, a
smart home or building is a home or building, usually a new one that is equipped
with special structured wiring to enable occupants to remotely control or program
an array of automated home electronic devices by entering a single command.
Conventional security systems keep homeowners, and their property, safe from
intruders. A smart home security system, however, offers many more benefits.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Home automation technology notifies homeowners of any problems, so that they


can investigate.

Smart homes obviously have the ability to make life easier and more convenient.
Home networking can also provide peace of mind. Whether you're at work or on
vacation, the smart home will alert you to what's going on, and security systems
can be built to provide an immense amount of help in an emergency. For example,
not only would a resident be woken with notification of a fire alarm, the smart home
would also unlock doors, dial the fire department and light the path to safety.

Smart homes also provide some energy efficiency savings. Because systems like
Z-Wave and ZigBee put some devices at a reduced level of functionality, they can
go to "sleep" and wake up when commands are given. Electric bills go down when
lights are automatically turned off when a person leaves the room, and rooms can
be heated or cooled based on who's there at any given moment. One smart
homeowner boasted her heating bill was about one third less than a same-sized
normal home. Some devices can track how much energy each appliance is using
and command it to use less.

Smart home technology promises tremendous benefits for an elderly person living
alone.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Smart homes could notify the resident when it was time to take medicine, alert the
hospital if the resident fell and track how much the resident was eating. If the
elderly person was a little forgetful, the smart home would perform tasks such as
shutting off the water before a tub overflowed or turning off the oven if the cook
had wandered away. It also allows adult children who might live elsewhere to
participate in the care of their aging parent. Easy-to control automated systems
would provide similar benefits to those with disabilities or a limited range of
movement.

CHAPTER Ill

Knowledge requirements:
a. Existing Home Security System
b. Home Security Tutorial
Technical
c. GSM based Home Security
Tutorial
d. Arduino
Tutorial of the Project
3.1
Technicality
Software requirements:
a.INPUT
Arduino 1.6.7
b. Notepad/Notepad++

Hardware requirements:
a. Arduino Mega 2560
b. Computer/Laptop
c. Camera/OV5642
d. Motion Sensor
e. Reed Switch
f. Servo Motor
g. LCD
h. Pin Connector
i. Resistors
j. 12 Key Membrane Switch Keypad
k. LED
l. Buzzer
m. Breadboard
n. LCD.

Background

PROCESS

System
Methodology
a. Development and
Design Interface
b. Developing a
Module
c. System
Development
d. Testing and
Evaluation
e. Implementation

OUTPUT

Home
Security
System

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Feedback

Figure 2
Conceptual Model

Figure 2 Conceptual Model on the previous page explains the Technicality of the
Project. Knowledge Requirements are the keys on how does the proponents will
make the system. There are some tutorials on the internet that shows on how to
make the system like the proponents proposed. Existing Home Security System
will helps the proponents a lot. At first it exists and possible to build, there are
many ideas to get by researching, reading and interviewing such person in field of
Home Security.
In the field of Technology and Electronics, Arduino are the brain of the system.
Because it is programmable and whatever you want to be functioned just make the
right code and voila its a smart living like things.
Software Requirements are very important in the system. Without software its
useless and nonsense system. The proponents used Notepad and Arduino 1.6.7 in

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

programming the system because it is compatible in the Operating System that is


using.
Hardware Requirements are abundant in the project proposed. Home Security
System requires a lot of Hardware such as Arduino Mega, Computer/ Laptop,
Sensors, Servo motor, Camera etc. Hardware must be hundred percent functional
because if its not, the security system are no longer security.

3.2 Details of Technology Used


Arduino 1.6.7
The open-source Arduino Software (IDE) makes it easy to write code and upload it
to the board. It runs on Windows, Mac OS X, and Linux. The environment is written
in Java and based on Processing and other open-source software. This software
can be used with any Arduino board.
Arduino Mega 2560
The MEGA 2560 is designed for more complex projects. With 54 digital I/O pins, 16
analog inputs and a larger space for your sketch it is the recommended board for
3D printers and robotics projects. This gives your projects plenty of room and
opportunities

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

The Mega 2560 is a microcontroller board based on the ATmega2560. It has 54


digital input/output pins (of which 15 can be used as PWM outputs), 16 analog
inputs, 4 UARTs (hardware serial ports), a 16 MHz crystal oscillator, a USB
connection, a power jack, an ICSP header, and a reset button. It contains
everything needed to support the microcontroller; simply connect it to a computer
with a USB cable or power it with an AC-to-DC adapter or battery to get started.
The Mega 2560 board is compatible with most shields designed for the Uno and
the former boards Duemilanove or Diecimila.
The Mega 2560 is an update to the Arduino Mega, which it replaces.
The Mega 2560 board can be programmed with the Arduino Software (IDE).
The ATmega2560 on the Mega 2560 comes preprogrammed with a bootloader that
allows you to upload new code to it without the use of an external hardware
programmer. It communicates using the original STK500 protocol (reference, C
header files).
You can also bypass the bootloader and program the microcontroller through the
ICSP (In-Circuit Serial Programming) header using Arduino ISP or similar; see
these instructions for details.

The Mega 2560 has a resettable polyfuse that protects your computer's USB ports
from shorts and overcurrent. Although most computers provide their own internal
protection, the fuse provides an extra layer of protection. If more than 500 mA is

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

applied to the USB port, the fuse will automatically break the connection until the
short or overload is removed.

The Mega 2560 can be powered via the USB connection or with an external power
supply. The power source is selected automatically.
External (non-USB) power can come either from an AC-to-DC adapter (wall-wart)
or battery. The adapter can be connected by plugging a 2.1mm center-positive
plug into the board's power jack. Leads from a battery can be inserted in the GND
and Vin pin headers of the POWER connector.

The board can operate on an external supply of 6 to 20 volts. If supplied with less
than 7V, however, the 5V pin may supply less than five volts and the board may
become unstable. If using more than 12V, the voltage regulator may overheat and
damage the board. The recommended range is 7 to 12 volts.

Motion/PIR Sensor
(Passive InfraRed sensor) A device used to detect motion by receiving infrared
radiation. When a person walks past the sensor, it detects a rapid change of
infrared energy and sends a signal. PIR sensors are used for applications such as
automatically turning on lights when someone enters a room or causing a video
camera to begin operating.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Reed Switch
The reed switch is an electrical switch operated by an applied magnetic field. It
was invented at Bell Telephone Laboratories in 1936 by W. B. Ellwood. It consists
of a pair of contacts on ferrous metal reeds in a hermetically sealed glass
envelope.
The basic reed switch consists of two ferromagnetic nickel-iron wires and a glass
capsule. The two wires are formed into "reeds" by flattening one end. The reed
ends are carefully aligned with a small overlap and then permanently sealed inside
the glass capsule. The overlap or contact area of the reeds is coated with special
metals such as ruthenium. The nickel-iron leads are tin plated so that they can be
soldered.
The two reeds act as magnetic flux conductors when exposed to an external
magnetic field from either a permanent magnet or an electromagnetic coil. Poles of
opposite polarity are created at the contact gap and the contacts close when the
magnetic force exceeds the spring force of the reeds. The contacts open when the
external magnetic field is reduced so that the magnetic attractive force between the
reeds is less than the restoring spring force of the reeds.
The basic reed switch is a Single Pole Single Throw Normally Open switch, also
known as a SPST-NO or Form A switch. By adding an additional nonmagnetic
contact that is electrically closed with no magnetic field present, a Single Pole

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Double Throw switch can be made. This is also known as a changeover switch or
a SPDT switch. This is a break-before-make switch in that the closed contact
opens before the open contact closes.
The electrical contacts in a reed switch are hermetically sealed. That is, airtight
glass-to-metal seals prevent the contacts from being exposed to the environment.
Hamlin reed switches are sealed with an inert nitrogen atmosphere inside the
switch. The Hamlin MDRR-6, MRPR-8, DRR-DTH, and DRT-DTH reed switches
are sealed with a higher-than-atmospheric pressure. This increases the breakdown
voltage and makes these switches particularly well suited to 240 VAC mains
switching applications. The Hamlin MARR-5 reed switch has a vacuum inside the
switch capsule. Since there is no gas to ionize and arc, this switch has very high
voltage switching capability.
Reed switches can operate for billions of operations on low voltage logic loads. Life
is typically in the millions of operations at higher loads such as 10 to 120 V AC/DC
and 10 to 250 mA. However, for extreme loads, end of life may be reached in less
than a million operations. See application notes below for further information on
capacitive loads and incandescent lamp loads. Contact Hamlin with the load
voltage, current, type (AC or DC, inductive or capacitive or resistive), required life,
and application for recommendations on the best switch type to use.
Reed switches are the major component in reed sensors as well as reed relays.
Since Hamlin manufactures both standard and custom reed sensors and relays,

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

applications can very often benefit from Hamlins engineering expertise, production
capabilites, and quality systems to provide parts in a cost-effective and timely
manner. Options include standard surface mount reed switches, custom cropping
& forming of leads, modifications to existing standard product, and full custom
product. Contact Hamlin to discuss your application needs.

Servo Motor
A servomotor is a rotary actuator or linear actuator that allows for precise control
of angular or linear position, velocity and acceleration. [1] It consists of a suitable
motor coupled to a sensor for position feedback. It also requires a relatively
sophisticated controller, often a dedicated module designed specifically for use
with servomotors.
Servomotors are not a specific class of motor although the term servomotor is
often used to refer to a motor suitable for use in a closed-loop control system.
Servomotors are used in applications such as robotics, CNC machinery or
automated manufacturing.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

As the name suggests, a servomotor is a servomechanism. More specifically, it is a


closed-loop servomechanism that uses position feedback to control its motion and
final position. The input to its control is some signal, either analogue or digital,
representing the position commanded for the output shaft.
The motor is paired with some type of encoder to provide position and speed
feedback. In the simplest case, only the position is measured. The measured
position of the output is compared to the command position, the external input to
the controller. If the output position differs from that required, an error signal is
generated which then causes the motor to rotate in either direction, as needed to
bring the output shaft to the appropriate position. As the positions approach, the
error signal reduces to zero and the motor stops.
The very simplest servomotors use position-only sensing via a potentiometer and
bang-bang control of their motor; the motor always rotates at full speed (or is
stopped). This type of servomotor is not widely used in industrial motion control,
but it forms the basis of the simple and cheap servos used for radio-controlled
models.
More sophisticated servomotors measure both the position and also the speed of
the output shaft. They may also control the speed of their motor, rather than always
running at full speed. Both of these enhancements, usually in combination with a
PID control algorithm, allow the servomotor to be brought to its commanded
position more quickly and more precisely, with less overshooting.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Camera
Is an optical instrument for recording images, which may be stored locally,
transmitted to another location, or both. The images may be individual still
photographs or sequences of images constituting videos or movies.

Breadboard
A breadboard is a construction base for prototyping of electronics. Originally it was
literally a bread board, a polished piece of wood used for slicing bread. In the
1970s the solderless breadboard (AKA plugboard, a terminal array board)
became available and nowadays the term "breadboard" is commonly used to refer
to these. "Breadboard" is also a synonym for "prototype".
Because the solderless breadboard does not require soldering, it is reusable. This
makes it easy to use for creating temporary prototypes and experimenting with
circuit design. For this reason, solderless breadboards are also extremely popular
with students and in technological education. Older breadboard types did not have
this property. A stripboard (veroboard) and similar prototyping printed circuit
boards, which are used to build semi-permanent soldered prototypes or one-offs,

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

cannot easily be reused. A variety of electronic systems may be prototyped by


using breadboards, from small analog and digital circuits to complete central
processing units (CPUs).

LCD
A liquid-crystal display (LCD) is a flat-panel display or other electronic visual
display that uses the light-modulating properties of liquid crystals. Liquid crystals
do not emit light directly.[1]
LCDs are available to display arbitrary images (as in a general-purpose computer
display) or fixed images with low information content, which can be displayed or
hidden, such as preset words, digits, and 7-segment displays as in a digital clock.
They use the same basic technology, except that arbitrary images are made up of
a large number of small pixels, while other displays have larger elements.
LCDs are used in a wide range of applications including computer monitors,
televisions, instrument panels, aircraft cockpit displays, and signage. They are
common in consumer devices such as DVD players, gaming devices, clocks,

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

watches, calculators, and telephones, and have replaced cathode ray tube (CRT)
displays in nearly all applications. They are available in a wider range of screen
sizes than CRT and plasma displays, and since they do not use phosphors, they
do not suffer image burn-in. LCDs are, however, susceptible to image persistence.
[2]

The LCD screen is more energy-efficient and can be disposed of more safely than
a CRT. Its low electrical power consumption enables it to be used in batterypowered electronic equipment more efficiently than CRTs. It is an electronically
modulated optical device made up of any number of segments controlling a layer
of liquid crystals and arrayed in front of a light source (backlight) or reflector to
produce images in color or monochrome. Liquid crystals were first discovered in
1888.[3] By 2008, annual sales of televisions with LCD screens exceeded sales of
CRT units worldwide, and the CRT became obsolete for most purposes.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 3
How the project will work

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

For Security Mechanism, it shows how it works for the intruders or burglar to be
aware and alarmed because the house is Security Present.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

At first, whenever the system has been activated the IP Camera will
automatically record video that saves on SD Card; also the camera has the
capability to detect motion and still record video if the place is in the dark
because of Night Vision. IP Camera can save up to 32G or higher, it depends on
you on how large of storage you are preferred to use.
Second is the Motion Sensor that can detect Motion form things that emit
Infrared. If the motion is detected, buzzer connected to it will sound loudly
enough for the Intruder or Burglar to be alarmed and stop their activity.
Third is the Vibration Sensor that can detect vibration even the very small
vibration cause by someone or by natural cause. Vibration has been installed in
the door for the Intruder or Burglar to know that they are really serious for their
intension to rub the house by entering the door or because of other things that
needed to pass by the door. If the sensor detects vibration higher than the slight
vibration, it will send SMS to the home owner to alarm it because of someone is
trying to enter the house and the buzzer also that connected to it will sound
loudly enough for Intruder or Burglar to grab their second chance. Since the
Intruder or Burglar has already alerted by the buzzer of motion sensor and still
they continue the operation, it is better is the system has the capability to text
someone that there are Intruder or Burglar in the house.
And the last for Security Mechanism is the Door Contacts that are connected in
the edge of the upper right part of the door and the wall itself. When the two

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Magnetic Door Contacts has been separated, the buzzer connected to it will
make a loud noise enough for the Intruder or Burglar to stop what they are doing
for the third chance of informing them that the house was Security Secured.
Every time the motion sensor detected motion in its parameter, it will trigger its
buzzer to make a loud alerting noise for someone. Also motion sensor can
detect motion 7 meters away, 180 degree up and down. Better to install Motion
Sensor allowing detecting motion widely. Theres no way for Intruder or Burglar
to hide them from this sensor.
For Door Lock Texting Mechanism, it shows how GSM and Servo Motor work
together for the Door to Lock and Unlock. GSM shield sim900 is connected to
Arduino so that it can be coded for function you want for it to do. We code the
GSM and Servo Motor to communicate if it receive text message from home
owner whether to lock it or Unlock. If the GSM receive LOCK the servo will turn
180 degrees and it turn the Door Lock to Lock and if it is already lock, the GSM
will reply The Door Was Locked. Same as for unlocking it, the home owner will
just text UNLOCK to make the servo motor turn 90 degrees and it means that
the door lock is now unlock and the door is ready to open, the it will reply again
as The Door is now Unlocked.
The GSM is not just accepting any kind of text message and from any cellphone
number. It will only communicate from the number of simcard that you input in
the code, and the text message must be the exact form of letters and

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

capitalization from what you input in the code before you upload it to the
Arduino. If you text the wrong text to the GSM it will reply to you the INVALID
COMMAND.
But make sure that you loaded the simcard for you to make it a reply and make
it work properly. Regular load or Register load is up to you. Better to register the
GSM for long term registration of unlimited text, for you if you are not at home
for a week.

CHAPTER IV
Methodology

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

4.2 Requirements Specification


Program

Description

Version

Specification
Arduino

Act as the Brain of the

Arduino 1.6.7

system. This is where


the codes were
uploaded.

Software

Description

Version

Specification
Microsoft Windows
ARDUINO

Operating System
The open-source

Windows 7
ARDUINO 1.6.7

Arduino Software
(IDE) makes it easy to
write code and upload
it to the board. It runs
on Windows, Mac OS
X, and Linux. The
environment is written
in Java and based on
Processing and other
open-source software.

Hardware

Description

Version

Specification
HP Laptop- Intel Core

The Laptop/Computer

HP Compaq 6710b

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

2 Duo CPU, 2.20GHz,

that the proponents

2.00GB, 32-bit

using.

Operating System
Arduino Uno
Servo Motor

The Micro Controller


Use to move the

Arduino Uno
SM7637

camera.
Use to detect Motion.

GH-718C Mini

Motion Sensor(PIR)
Vibration Sensor
Door Contacts
Camera
GSM
Buzzer
Door

4.2.1 Operational Feasibility


4.2.1.1 Fishbone Diagram

Environme

People
Life Treat

Personal
Motive

Midnigh
t

House
Vicinity
House
Structure

Summer

Successf

House
Intrusion
of
Burglars

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Early Morning

Rich

Christmas
season

Time

Season

Welfare

Figure 4
Fishbone Diagram

The Fishbone Diagram shows the different category of cause for someone to
make a house intrusion. Many reasons why there are people commit intrusion
and get rub the house or do such bad things or intension to home owner or
whos at home.
We did five categories that make a cause of house intrusion. We have people,
Environment, Time, Season and Welfare.
Person or individual are the one who do such bad intension to someone. Under
the people category theres a life treat and personal motive. If there is someone
who hates who the most and they wanted to kill you and they dont have a place
for you to get killed, well its already a choice for them to kill you at your house

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

where in you are resting at night and sleeping tight. Second is the personal
motive, if someone wants something from you like material things or information
that only at your house can be getting by them.
For environment there is house vicinity and house structure. If your house was
built in the place where in only few people lives, it is reason for some to choose
because theres a very small of chances to get caught. Also the house structure
plays a big role in it, if your house was not such that hard to enter its already a
reason for burglar or intruder to do an operation.
Time is one of the most reasons to consider if you want to rub a house. There is
midnight and early morning where in intruder do their operation. Midnight is
already a night and a dark hour of the day where in most of people are already
sleep, this is the time to do such bad work. But some intruder chooses early
morning to operate because all of the people in this dead hour were deeply
dreaming and no one will notice the hell happening.
Seasons also burglars and intruders will never forget to think and to choose.
They attack if there is no one at home at it will happen only like vacations and
holidays. Summer vacation where in some or most of the family will go outing or
travel far away from home. The same as the Christmas Season where in lots of
greetings and presents are there to give to someone you love; examples are
brand new gadgets or bags, shoes etc.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Welfare or life status is at the top of the reasons to consider and to look of most
of the intruders and burglars. If you are Successful or Rich, youre the apple of
the eye. Burglars or intruders are more likely to hit a jackpot if they do dirty job
because of the consequences they will be face if they are get caught.

4.2.1.2 Functional Decomposition Diagram

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 5
Functional Decomposition Diagram

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Functional Decomposition Diagram shows how the system divided and


decomposed from different functions the system do. The systems only circulate
from two individuals, the home owner and the Burglar or intruder.
For home owner, home owner itself has the only that can power and will operate
the system. Hes the one knows how to startup the system and where it is
located.
Home owner itself must know and dont forget on what he put on the code
especially pertaining to GSM. The text message must exactly the same as what
is putted on the code and uploaded to the Arduino. GSM is so sensitive on what
it was receive, wrong type and text of message will end of result to not operate
the servo motor connected to GSM and control turns of Door Lock.
Also, only the home owner is the one that can view the video recorded by the IP
Camera. It is for tracing or proof for someone who do the act of intrusion or
burglar the house.
For burglar or intruders, they are being video recorded because of IP Camera
that operates when the system is powered and startup.
Every time that there is motion detected by motion sensor, the buzzer connected
to it will make a loud noise that will alert the intruder or burglar. Theres no place
to hide if they are in the 7 meter parameter of motion detection area.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

If the intruder or burglar still continue the operation and up to the door without
hesitating of the presence of buzzer by the motion sensor that still doing the
loud noise, it will send a text message to the home owner if it is detected above
the normal vibration. Also it will make the same noise as the motion buzzer does
because it has buzzer too.
The last for intruder or burglar is the Door Contacts that when separated and still
its powered by the system it will make a loud noise as long as the door was
open.
4.2.2 Technical Feasibility

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

4.2.2.1 Compatibility Testing

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 6
Compatibility Testing

4.2.3 Schedule Feasibility


4.2.3.1 Gantt chart

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 7
Gantt chart for Capstone 1st Semester

Gantt Chart Figure 7 shows how the proponents make the capstone 1 in the
whole semester. Doing such a hard project must have a list of activity or a chart of
day where work must be do or finish. Proponents start the project by planning it at
the month of December followed by multiple researches of files that can help
along the making of project. The title project is not easy as its say, this will be the
bases of the look and idea of other and professors about what proponents was
doing.
Proponents make the chapter 1 for the whole month of January. Several
researches have been done in the internet and books; even journal was used in
documenting the past or history of home security projects. What its important in
the life of individual.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Chapter 2 was start doing in the second week of January till the third week of
February. In this part of capstone, it is all about the different literature from all over
the world. Many ideas were gathered by the proponents on how the project must
be done and the components needed to finish it.
Planning the components that will be used is not easy because of the price and
how really it must be present in the project. Many components that the proponents
proposed but some of them were not that important.
Chapter 3 is all about the project and how it will work. There are researches about
the technology used for the projects. The importance of components the step by
step it must be done.
The hardest part of doing such project is the communication of software from
hardware. The software we used is the Arduino studio and the GSM library. There
is much hardware we used, there are sensors, camera, door contact, wires,
breadboard, servo motor etc. also we make a special door for the project that cost
much.
On our 1st defense, many things that must be remake and renew. Our panelist
makes a big decision to make our system new and easy to do. They tell us what
we really need to focus.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 8
Gantt chart for Summer Revision 60%

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

For figure 8 of Gantt chart for Summer Revision 60%, since 1 st defense was
successful yet many things to make over, especially in hardware of the system.
There is little hardware that will be added and some are lessen. Even though it
is summer and the time for us to get vacation and relax, weve decided to still
continue doing the system as what our professors and adviser told us.
Revisions system is not easy, software and hardware needs a minor to major
make over for the new system that we are heading. We have two months to do it
and luckily we did, not fully 60% has done but what systems focus is
successfully did.
Chapter 1 to 2 is not a big revision for us, unlike chapter 3 needs a big
modification. Making the software is really a headache for us due to it is more on
coding and logical. Hardware for us was not that big deal aside from the door
that also takes a big roll on the system.
Chapter 4 was also a large make over for us because of almost the systems was
change. Lots of new diagram was made.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

4.2.4 Economic Feasibility


4.2.4.1 Chart Benefit Analysis

Components /
Electronic Hardware

Item Price

Item /
Hardware
Count

Multiplied Price

Gizduino

1300php

1300php

Breadboard

50php

50php

Solid wires

5php

25

125php

Connector

100php

100php

GSM

2000php

2000php

Servo Motor

600php

600php

Motion Sensor

400php

400php

Vibration Sensor

300php

300php

Door Contacts

180php

180php

Buzzer

30php

60php

Simcard

40php

40php

Adapter

200php

200php

Battery

80php

80php

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

IP Camera

00000

00000

Total Electronics Price

00000
5 435.00php

Total Electronics
Transportation Cost
250php
Door (E-Gismo)
Item
150php
(SM
Hardwar
Price
Megamall)
e
Plywood

Food Cost

Communication Cost

Item 300php
/
Total Price
150php
Hardware
Count

In Addition Cost
300php
1

Door
Lock

80php
2
Total Cost

160php

650php

650php

Total Cost for


Door

4.2.5 Requirements Modeling


4.2.5.1 HIPO

1180.00php

300php

Good
270php
3
810php
Other Cost Including Libraries and
Lumber
Computer Researches
Stopper

100php (Call n Text)


Transportation
Labor
230php (GSM Load)

180php
300php
500.00php

2400.00php

1600.00ph

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 9
Hierarchy, Input, Process, Output

The HIPO (Hierarchy, Input, Process, and Output) figure shows how the system
affects the problem of house intrusion and what was needed to avoid such
intrusion in the house.
Input shows how to start the solution by powering the system, the Arduino as the
brain of the system where in all components was depend on it because they are
coded. Without the power, system is useless due to it is a technology.
Process is what was happening when the system has been powered and
activated. Process starts at IP Camera that will automatically record video
directly save to SD Card the video, then at the same time while recording the
video sensors are waiting for their different function, first to be trigger is the
motion sensor followed by the vibration sensor and the door contacts, all those

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

three was connected to buzzer. So when triggered, they will make a noise. Last
for the process is the home owner that will communicate to the GSM and Servo
motor for the door whether to lock or unlock.
Lastly, the output is the completely secure of the house because of the intruders
that did not continue what they are intended to do. Accomplishment and proper
work of the system will result to the zero intrusion record which is the problem
that the system stands for.

4.2.5.2 Data & Process modeling


4.2.5.2.1 Context Diagram

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 10
Context Diagram

The figure above shows how the system works in a very easy to understand way.
Context diagram explains the whole system in one diagram in such a very simple
manner. There is only two individual needed to see how the project works, the
home owner who owned a house that intruded by the burglar or just an intruder
only.
Home owner simply need to power the system to activate it. After that he can text
the GSM whether to lock or unlock the door lock connected to servo motor. Every
time the GSM receive a text message that is on the code it will send a specific text
depends on what you text. Invalid message will not be consider by the GSM.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

For Intruders or Burglar, simply they were just trigger the sensors and be alerted by
the buzzer. If they trigger the vibration sensor, it will send a text message to the
home owner that someone is trying to unlock the door which is completely
secured.
In this diagram you will surely understand on how our system works.

Data Flow Diagram

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 11
Data Flow Diagram Level 0

Figure 11 as you shown above is the Data Flow Diagram level 0, these explain on
how the data of the system work pertaining to the text message. The circle in the
center is the home security system which is surrounded by the data makers that
send and receive data.
Home owner must start to power the system to power the GSM. If the GSM was
ready to do its job, it will just wait for the text of the home owner to receive. Then
after receiving text message it will make a reply to the home owner depend on
what it sends.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

At the same time, not just the GSM is related on the data flow. There is vibration
sensor that also communicates to the GSM when powered. Vibration will wait for
any vibration above from the normal vibration to text the home owner.

4.2.5.2.2 Data Flow Diagram

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 12
Data Flow Diagram Level 1

Data Flow Diagram Figure 12 shows how the data was transmitted by the home
owner and the GSM after it was powered.
GSM will wait for the home owner to receive its text. If the sender sends the word
LOCK, the GSM will communicate to the servo motor to lock the door lock. Also,
it will make a reply to the sender like this The door was Locked. The same
scenario if the sender sends UNLOCK.
Vibration also makes the GSM to send SMS if it is detected any vibration above
from normal vibration.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

4.2.5.2.4 Program Flow Chart

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 13
Program Flowchart

Program Flowchart

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 14
Program Flowchart
Program Flowchart

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 15
Program Flowchart
Used Case Diagram

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 16
Used Case Diagram

Used Case Diagram

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 17
Used Case Diagram

4.2.5.3 Risk Assessment

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 18
Software Risk Assessment

4.2.5.3 Risk Assessment

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Figure 19
Software Risk Assessment

Functionalities

IP Camera
Why needed

To capture video on the place near the door and capture Intruder or
Burglar on the act of doing intrusion and save it directly on SD Card

Location of
Components

Must place in the area where it can capture a good shoot of video. Must
not be place in the area where water are present and direct sunlight

Function

Can Capture Video that saves directly on SD Card

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

INPUT

Power, SD Card

To Perform the Function


: Must be Connected to Power Supply
: Must have SD Card inside
: Must be place at the area that will capture Intruder or Burglar in process
OUTPUT

Can capture video and saves directly on the SD Card when powered
and view the Video on your PC, Smartphones or IPhone

Performance

Not yet present on the System

: Cannot yet capture video


: Cannot yet Saves video on SD Card

Functionalities

Motion Sensor
Why needed

Because Burglars / Intruders commonly are just humans that emits


infrared.

Location of
Must place in the perimeter of the house that away from the heat of the
Components sun,
also place in the angle that covers Door and Windows so it c an detect
someone closing to the Door or Window.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Function

Motion Sensor can detect motion from infrared that emits from person

INPUT

Motion, Infrared, Heat


To Perform the Function

: Must be connected to Arduino


: Must have its code
: Must be connected to 5v power supply
: Must place it where Motion can be detected
OUTPUT

When motion or infrared are present and once detected, motion sensor
communicate to Arduino to sounds its buzzer enough to alert the person
in the perimeter of the house.

Performance Motion Sensor already doing its function on the system


: Already detecting Motion and Infrared
: Can communicate to its Buzzer

Functionalities

Vibration Sensor
Why needed

Because Burglars often oscillated the door when they are trying to
forcibly open the door with or without the use of tools or something.

Location of
Components

Must place in Front Door or Main Door because obviously it is the best
way to escape with something they get big or small. And doors are the

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

effective route to run when they are caught in act.

Function

Vibration Sensor can detect vibration

INPUT

Vibration, Shaking, Jiggling, Oscillated.

To Perform the Function


: Must be connected to Arduino
: Must have its code
: Must be connected to 5v power supply
: Must place it where vibration always occurs
OUTPUT

Performance

When vibration once detected even its just a little shake or vibrate, the
vibration sensor sounds the buzzer and send a text message to the home
owner to report that someone is trying to open the door because it
already dont mind the buzzer of motion sensor that already detected
them.
Vibration Sensor already doing some of its function on the system

: Already detecting Vibration


: Can communicate to its Buzzer
: Yet cannot communicate to the GSM

Functionalities

Door Contacts
Why

Because Burglars / Intruders have a tendency to open the door when

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

needed

they are really up on the operation. As long as the door was open it
will not stop to sounds its buzzer.

Location of
Component
s

Must place in the Front Door or Main Door, upper right of the edge of
the door and one on the wall horizontal or vertically face each other
Door Contact.

Function

Connects the path of current to flow when each Door Contacts was
separated by the means of magnetic

INPUT

Separate the Door Contacts


To Perform the Function

: Must be connected to 5v power supply


: Must place one upper right corner or edge of the door and the other one at the wall
faces each other
When one of each Door Contact separates from another, it will sounds
OUTPUT
it buzzer enough to alert the one who open the door. It will never end
its noise till the two Door Contacts meets again.
Performanc
e

Door Contacts already doing its function on the system

: Already detecting each Door Contact when separated to each other


: Can communicate to its Buzzer

Functionalities

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

GSM Shield Sim900d


Why
needed

The Focus of our system, GSM can communicate to Arduino with our
sensors. GSM will be used for the Door Lock to make it unlock or Lock
through the use of Servo Motor.

Location of
Component
s

Must place in the safe and secured area of the used

Function

To Receive SMS and Send SMS to the Home Owner

INPUT

SMS Load, Signal, Codes, SMS Receiver, Triggered Vibration Sensor

To Perform the Function


: Must be connected to Arduino
: Must have its code
: Must be connected to 5v power supply of Arduino and 12v power supply of Adapter
: Must be loaded
: Signal Must Present in the area
OUTPUT

When powered it was ready to receive and send SMS. If the


home owner Send the ideal SMS it will reply depend on what
was received. If LOCK Receive it will communicate through
Servo Motor and turn it 180degree to lock the Door Lock. And If
UNLOCK Receive it will communicate through Servo Motor
and turn it 90degree to unlock the Door Lock. For every time it
receives SMS it will make a reply. For vibration Sensor that once
triggered, it will send SMS that tells someone is at the Door
trying to Open it.

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

Performanc
e

GSM Shield Sim900d already doing some of its function on the system

: Already Receiving SMS from the Sender that only known


: Already Sending SMS to the Receiver that only known
: Already Communicate to Servo Motor
: Cannot yet Communicate to Vibration Sensor

Door
Why needed

To be simulated by the Proponents the real happening what does the


burglar / intruders do. To place the Components on their proper places.

Place for the


Door

Must place in the area where water and sunlight are not present, place it
in the corridor or inside room.

Function

For Proper execution of the System

INPUT

Components, Sensors, Hardware


To Perform the Function

: Must be fix the Components, Sensors, Hardware righteously in it


: Must have Person to perform as Intruder or Burglar
: Must be place at proper area
OUTPUT

Actual and Real things that Intruder or Burglar will be executed. Good
place for Components, Sensors, Hardware to install

Performance Door already do its function on the system

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

: Can install Components, Sensors, Hardware

Functionalities

Servo Motor
Why needed

We need Servo Motor to Communicate to GSM Shield Sim900d and


make turns like 180degrees and 90degrees that is controlling the Door
Lock

Location of
Component
s

Must place in the Door Lock inside of the House

Function

To Rotate the Door Lock that depend on the GSM once it was Receives
SMS

INPUT

SMS Received by the GSM, Command from GSM

To Perform the Function


: Must be connected GSM Shield Sim900d
: Must have its code
: Must be connected to 5v power supply of Arduino
: Must be fix to the Door Lock
OUTPUT

When powered it was ready to do rotation of the Door Lock depend on


what GSM Shield Sim900d commanded to perform

Performanc
e

Servo Motor already doing some of its function on the system

: Already Communicating to GSM Shield Sim900d

Pateros Technological College


College St. Sto.RosarioKanluran, Pateros, Metro Manila

: Already Rotating 180degree (LOCK)

: Already Rotating 90degree (UNLOCK)

: Did not yet fix to its real position

You might also like