Security is a prime concern in our day-today life. Everyone wants to be as secure as possible. Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection is structures and processes that provide or improve security as a condition. Many people do not think about security at home until it is too late and they have become victims of burglar crimes. Cases of vandalism, robbery and trespassing are now just common scenarios in today’s generation. As a matter of fact, no house owners or institution can claim of being entirely secured. Schneider, 2010) A burglary occurs when an intruder has entered or attempted to enter a home and stolen or attempted to steal property. Aggravated burglary is when an intruder has, armed with a firearm, weapon or explosive, and enters a dwelling as a trespasser to steal or commit grievous bodily harm. (Jones, 2010) Technologies nowadays are advanced and many countries have switched from manual system to electronic machines. Different devices are invented for the betterment of humanity and one of its benefits is security.
Like the telecommunication technologies, it become wider and more new features exist to make human life better. These help people to communicate with each other easier than before. People can communicate by many ways. For this new era, people are most using the wireless technology system to communicate with each other. Wireless technology is known that the communication system is not used the wire. This generation uses the digital modulation and has an improvement on spectral efficiency as well as voice quality. However this second generation still uses the same features as first generation technologies.
The Essay on Linux Security Technologies
In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the ...
From this, the group has come up with an idea of developing an Automated Door Lock System with Camera Integration that will eliminate the aforementioned problem. This project is aimed at designing an alarm system that able to capture an image to a specific hand phone when there are intruders. The increasing of the number of the stealing and house breaking cases especially when the people are not at home, need a system that can tell them if the cases happen. This device will be designed for the purpose of securing homes, wherein theft is prevalent.
This project will use MMS or multimedia messaging to notify the house owner in case there is an intruder. The door lock can be open by entering the correct pass code to the system. Once the pass code is incorrect, the system will allow three consecutive incorrect pass codes before the security features will be triggered. The program in the microcontroller will determine if the pass code is correct or incorrect. After that, the alarm system will be activated and the image will be sent to the receiver’s phone to notify that there is an intrusion.
The project that would minimize the stealing cases either at homes, shops and offices will be a great deal and desirable for the potential users. Statement of the Problem The general problem of the study is how to develop an “Automated Door Lock with Camera Integration”? Specifically, this study sought to answer the following questions: 1. What are the hardware and software requirements in terms of: 1. 1Microcontroller; 1. 2Camera; 1. 3Cell phone; 2. What are the features of the project? 3. How does the project be evaluated based on the following criteria: 3. Functionality; 3. 2Ease of Use; 3. 3Reliability ; 3. 4Maintainability; 3. 5Portability; 3. 6Safety; 3. 7Training and Documentation; Significance of the Study The safety in the house is essential because the lack of safety awareness among the house owners or the family members of the house can cause damage and loss to properties due to crimes and burglary. Besides the conventional door locks that use keys can be easily open by unauthorized person or burglar by having the right key or forcing the door.
The Business plan on Systems Approach to Project Management
All projects need simple processes in place to monitor and control cost, progress and quality. It is argued, however, that projects involving innovation and complexity, almost regardless of size, need a “systems approach” to project management. Discuss. 1. Introduction This literature review will discuss Project Management and the apparent need for a systems approach when managing projects ...
The Automated Door Lock System with Camera Integration will benefit house owners, it will include additional security to their homes and aid in crime prevention and investigation. Also the project will be helpful to the entrepreneurs; they will have a peace on mind whenever they will leave their establishments. Lastly, it will be beneficial to the future researchers that this project would serve as a reliable and supporting basis for the future research and make it as a guide in conducting and developing further related systems.
Scope and Delimitation of the Study The study focuses on the development of an “Automated Door Lock System with Camera Integration”, which will be helpful in securing door for the common household. To be able to determine the capabilities and boundaries of the project design, the group formulated its scope and limitations. This project concentrated at the multimedia messaging system in order to capture an image of the intruder that will be sent to the owner’s phone to notify the owner of the house that there is an intrusion.
The researchers used Netphone 701 android phone and the processor is PIC16F690 Microcontroller Unit. The application used on the phone is running for all android phones. The length of the pass code is required of four digits only. If the signal light is amber, it indicates that the device has no entered pass code yet. If the signal light is red, it indicates that the pass code is incorrect; hence, if the signal light is green, the pass code is correct. After three consecutive wrong pass codes the servo motor will press the capture image button on the android phone screen.
The Essay on The Advantages and Disadvantages of Mobile Phone Technology
1.Multitasking– Yups, Androidphones can run many applications, it means you can browse, Facebook while listened to the song. 2.Ease of Notification– Any SMS, Email, or even the latest articles from an RSS Reader, there will always bea notification on the Home Screen Android phone, do not miss the LED indicator is blinking, so you will not missa single SMS, Email or even Misscall . 3.Easy access to ...
The image was taken and the servo motor will press again for the send button to be sent to the owner’s phone by means of MMS. At the same time, the alarm buzzer will be activated for only five minutes interval. The owner can retrieve the image in the memory card of the android phone. The device can reset and changes pass code by pressing the reset button. When the power is out, there will be 12 volts battery that will supply electricity to locked or unlock the solenoid lock. A hidden button present inside and outside the door that allows the user to unlock the door when there is a power loss.
However, there were problems that the researchers encountered during the development of the project. The 3G signal that the MMS technology uses were limited. To be able to send and retrieve images captured by the android phone, a 3G signal must be present. The android phone must have a minimum of 20 pesos balance load to be able to send an MMS. Low end camera phones took longer time to receive and download the images that was sent. The camera cannot capture images beyond its angle because it cannot move sideways and the camera will need a source of light in order to produce good quality images at night.