Вы находитесь на странице: 1из 96

SMS Security System

by

Peter G. Battung
Cherryl Mae M. Bilocura
Jamar E. Dejarme
Jobelle L. Jose
Fritz Richard J. Quiras

A Design Documentation Submitted to the


School of EE-ECE-CoE
In Partial Fulfillment of the Requirements for the Program

Bachelor of Science in Computer Engineering

Mapúa Institute of Technology


March 2008
APPROVAL SHEET

This is to certify that this design study entitled “SMS Security System” prepared by
Peter G. Battung, Cherryl Mae M. Bilocura, Jamar E. Dejarme, Jobelle L. Jose,
Fritz Richard J. Quiras in partial fulfillment of the requirements for the Degree
Bachelor of Science in Computer Engineering have been supervised the preparation of
the read the design documentation and hereby recommended for final examination by the
Oral Examination Committee.

Prof. Benigno B. Agapito Engr. Danilo R. Tiongco


Reader Design Adviser

As a member of the Oral Examination Committee, we hereby APPROVED the design


study which was presented before panel of Examiners of the School of EE-ECE-CoE on
March 17, 2008.

Engr. Analyn N. Yumang Engr. Donnalee G. Silanga


Panel Member 1 Panel Member 2

Engr. Gino Paolo Luis R. Villanueva


Panel Member 3

Accepted in partial fulfillment of the requirements for the degree Bachelor of Science in
Computer Engineering.

Dr. Felicito S. Caluyo


Dean, School of EE-ECE-CoE

ii
ACKNOWLEDGMENT

First of all, the group would like to thank Almighty God for giving His guidance
to finish this Project design and also, for giving the group enough strength to face all the
hardships that they had encountered during the completion of their design.

The group would like to extend their deepest gratitude to their parents for
supporting the group in terms of the finances and their moral support to finish the project
design.

The group would also like to extend their gratitude to all their friends and
classmates for giving them support whenever they needed them and for helping the group
in the testing periods of the system. And to our adviser, Engr. Danilo Tiongco for
helping us whenever we need supervision.

And lastly, the group would like to thank Engr. Noel B. Linsangan for sharing his
knowledge to his students.

iii
TABLE OF CONTENTS
TITLE PAGE i

APPROVAL SHEET ii

ACKNOWLEDGEMENT iii

TABLE OF THE CONTENTS iv

LIST OF TABLES vi

LIST OF FIGURES vii

ABSTRACT viii

Chapter 1 INTRODUCTION AND REVIEW OF RELATED LITERATURE


Research Setting 1
Review of Related Literature 1
Conceptual Framework 6
Statement of the Problem 7
Objective of the Study 7
Significance of the Study 7
Scope 8
Delimitations 8
Definition of Terms 9

Chapter 2 METHODS AND PROCEDURES


Research Design 12
Design Procedure 12
Hardware Design
List and Acquisition of Materials 14
Hardware Component 14
Circuit Design 15
Software Design
Software Components 17
System Flowchart 18

Chapter 3 PRESENTATION AND INTERPRETATION OF DATA 19

Chapter 4 CONCLUSION AND RECOMMENDATION


Conclusions 34
Recommendations 34

Bibliography 35

Appendix A: List of Materials and Equipments 37

iv
v

Appendix B: Schematic Diagram of Microcontroller 38

Appendix C: PCB Design 39

Appendix D: Visual Basic Source Code 41

Appendix E: VideoCapX Commands 44

Appendix F: Program Code for the Microcontroller 47

Appendix G: Photos of the System 49

Appendix H: Nokia 6210 Pin Configuration 52

Appendix I: PIC16F87X Data Sheet 53

Appendix J: PIC16F84A Data Sheet 57

Appendix K: PT2262 Data Sheet 59

Appendix L: LM7805 Data Sheet 63

Appendix M: MAX220/232 Data Sheet 64

Appendix N: User’s Manual 73

Curriculum Vitae 80
LIST OF TABLES

Table 1: Design Test Results during daytime within a scope of


90° and distance of 2 ft 20
Table 2: Design Test Results during daytime within a scope of
90° and distance of 12 ft 21
Table 3: Design Test Results during daytime within a scope of
90° and distance of 22 ft 22
Table 4.a: Design Test Results during daytime within a scope of
45° and varying distance 23
Table 4.b: Continuation of Table 4.a 24
Table 5: Design Test Results during daytime within a scope of
55° and varying distance 25
Table 6.a: Design Test Results during daytime within a scope of
75° and varying distance 26
Table 6.b: Continuation of Table 6.a 27
Table 7: Design Test Results during the night within a scope of
90° and distance of 2 ft 28
Table 8: Design Test Results during the night within a scope of
90° and distance of 12 ft 29
Table 9: Design Test Results during the night within a scope of
90° and distance of 22 ft 29
Table 10: Design Test Results during the night within a scope of
45° and varying distance 30
Table 11: Design Test Results during the night within a scope of
55° and varying distance 31
Table 12: Design Test Results during the night within a scope of
75° and varying distance 32

vi
LIST OF FIGURES

Figure 1: Conceptual Framework of SMS Security System 6


Figure 2: Parallel Port 15
Figure 3: System Diagram 16
Figure 4: System Flowchart 18
Figure 5: Varying Distances at 90º angle 21
Figure 6: Varying Distances at 45º angle 24
Figure 7: Varying Distances at 55º angle 25
Figure 8: Varying Distances at 75º angle 27
Figure 9: Actual photo of the testing in broad daytime condition 28
Figure 10: Actual photo of the testing in night time condition 33

vii
ABSTRACT

The design used in this study was a security system. For application purposes, the
project was designed for a small closed room. “SMS Security System” is a design system
that enables you to know if anyone or anything has entered a secured room. The design
is equipped with software that displays the current video footage of the room and records
whenever there is an “intruder”. The system works using a camera that captures and
displays a video footage of the room being surveyed. The program that was designed
only recorded the video whenever the program detected a disturbance or change in the
surveyed area. This was done by specifying the sensitivity of the program. Once an
intruder was detected by the system, the system would automatically send a text message
to the owner alerting them of a possible burglar and turning on the attached device. To
be able to make sure that the design was reliable, it was tested in different working
conditions and possible scenarios. Based on these tests, it was found out that almost all
types of movement could be detected by the designed system regardless of its intention.
The system, if performed as expected, it would be helpful when it comes to security and
could warn the authorities/owner of possible burglar.

Keywords: SMS, Camera, Security, Text Message, Video

viii
Chapter 1
INTRODUCTION AND REVIEW OF RELATED LITERATURE AND STUDIES

RESEARCH SETTING

The use of cellular phone nowadays is so popular that almost everybody owns

one. Text Messaging is a popular mode of communication for Filipinos. With the use of

this device, communicating with someone becomes easier.

At present, poverty is widespread in every community and because of this many

have engaged in burgle. Daily news tells us to be more cautious on these problems so as

to avoid being a victim. House, office, and even secured establishment are being targeted

by criminals. Precautionary measure and security gadgets have been done and installed,

but still the problem exists.

In view of all these, we have designed a possible way to give surveillance for a

small closed room and warn immediately the owner of any intruder that may enter the

premises.

REVIEW OF RELATED LITERATURE AND RELATED STUDIES

Before we came up with an idea of creating a SMS security system we wanted to

get more information why security at home is very important. According to Greg Hall in

his Article entitled “Why Home Security Is Important In This Day And Age,” published

by New Ezine Articles that these days’ thieves are able to just walk in because of the lack

of home security. Typically the thieves that are stealing from you have a home security

system and you don't. Now don't you see something wrong with that? Some 40% of

thieves are able to just walk right into the homes where they intend to rob.

1
2

The other good lock to come onto the market is the fingerprint door lock. It reads

the fingerprint in which is supposed to be able to enter the home and it scans the finger

for the right print to open the door. That is smart if you have a thief who can get around

that then you have problems. I don't see how a person could get around, something so

sophisticated like that. Unless they are family and just want to rob you.

You will just simply want to go to a store and get a good lock for your door or

maybe even two. The more locks the harder it is going to be for a thief to break into your

home. So just go to the store and ask a helper who works there about the best type of lock

and security systems for your type of home.

It doesn't matter about the lock on the door, you also need to have a high quality

or at least a good quality door. If you do not have a good door then they can just kick it

down and walk right into your home. You want to have a big heavy sturdy door. With a

sturdy heavy door and a good set of dead bolts, you are in business and you are going to

be good on home security for awhile.

If you still cannot find what you are looking for, then you need to go online and

start looking for one. You will be able to get many ideas online which you wouldn't be

able to find in stores today. You may go into a store and they may be sold out of the stuff

in which you need to buy. That is why shopping or at least looking online is good

because you can either buy the things you need online or you can just get good ideas

from sites.

To be able to come up with a way to develop a security system like we intended it

to be, we searched for previous studies that could give us an idea on how the system

could be developed. We were able to find at least a couple of projects done by fellow
3

Mapuans which gave us information on how can we achieve our objectives for this

project. The MCU Coin-Operated TextBooth created by a group headed by Mr. Calupitan

gave us an idea on how can we use a cellular phone to automatically send a SMS to a

person whenever our security system detects an intruder in a surveyed area. By using the

information we got from their design documentation, we were able to come up with a

way on how a microcontroller can be used to control devices like cellular phones and

alarms. Another design project done by a group headed by Mr. Cunanan, the Securi-

Child A. B. S. also uses SMS technology to send message to parents on the login and

logout of their children at school. This information gave us ideas on how to interface our

hardware wirelessly because the control of the security system must be in a different

room. The Securi-Child A. B. S. design project also gave us information on how to

interface the cellular phone to send a SMS that will contain information as an alert to the

owner whenever the security system was triggered.

Using the mentioned studies above, we were able to find out that we could use AT

commands to control the built in modem in a cellular phone. AT commands are

instructions used to control a modem. AT is the abbreviation of attention. Every

command line starts with "AT" or "at". That's why modem commands are called AT

commands. Many of the commands that are used to control wired dial-up modems, such

as ATD (Dial), ATA (Answer), ATH (Hook control) and ATO (Return to online data

state), are also supported by GSM/GPRS modems and mobile phones. Besides this

common AT command set, GSM/GPRS modems and mobile phones support an AT

command set that is specific to the GSM technology, which includes SMS-related

commands like AT+CMGS (Send SMS message), AT+CMSS (Send SMS message from
4

storage), AT+CMGL (List SMS messages) and AT+CMGR (Read SMS messages).

After finding ways on how the security system could be developed, we wanted to

know what cameras were mostly used in security systems. In an article entitled “The

Truth About Infrared Security Cameras” by Dean Caporella, New Ezine Articles in

considering an infrared security camera system, we must be aware that we'll come across

what are known as night vision cameras. There is a subtle difference. Many people are

confused about the two but the truth is, night vision or day/night cameras don't have

infrared capability. The former has the ability to produce images in total darkness while

the latter doesn't. There is no suggestion here that one is better than the other and your

circumstances will play a big part in which way you decide to go. The said article

explains the difference between the two and their respective abilities as security

components of your property.

Infrared Security Cameras uses LED (light emitting diode) which gives it the ability

to take images in darkness. With a little light to work with, these images can increase in

clarity to resemble daytime conditions. The use of infrared cameras is popular in

businesses and residential properties which have what is known as "blind spots."

Basically, a blind spot is an area that is not prone or devoid of any lighting and it's

usually the first choice entry point for intruders. Without effective security, going from

these "blind spots" and entering the property is usually an easy assignment but with

infrared coverage, capturing any intrusion on tape is a "soft snap."

The ability to take color pictures during the day time and then revert to black and

white at night is one of the main features of this camera. In fact, when the sun sets the

camera will actually switch to infrared. It's rare that any business or home property is in
5

absolute total darkness simply for the reason that there is some light either being emitted

from the street lighting or in the shape of the night time stars.

There has been an argument for and against an infrared security camera vs. a night

vision camera. If you live in a suburban area with well lit streets then day/night cameras

should be enough. Consider whether you are ever going to be in a situation where your

property will be immersed in total darkness. This is usually rare in any area. Another

comparison that needs to be made is the expense of running infrared cameras opposed to

night vision models. The former requires more power but it's questionable whether this

will blow out your power bill.

Based on most of the articles and journals we found, the type of camera that best

suited for security system is an IR camera.


CONCEPTUAL FRAMEWORK

Application Recorded
Software Video
Video Feed
Microcontroller SMS Alert
Message
SMS Sending

Independent Dependent
INPUT PROCESS OUTPUT
Figure 1. Conceptual Framework of SMS Security System

Using the conceptual framework model (as shown in Figure 1 above), the system

made use of a Surveillance Camera as the input source. The process will then be handled

by a computer installed with the software we have developed. The monitor and the

cellular phone are used to display the output. The input element is the video footage

coming from the camera. On the other hand, the output elements are the recorded video

which will be saved on the hard disk of the computer and can be played in almost all

video players; and the SMS alert message which would be sent to the recipient’s cellular

phone.

The program works by detecting a distortion in the video feed it receives from the

camera. If the distortion reaches the sensitivity specified in the software it will then

records the video feed until no distortion has occurred for a few seconds and also sends a

signal to activate the transmitter. The transmitter box will send a signal to the receiver

box. The receiver will then activate the messaging system and the device connected to

it.

6
STATEMENT OF THE PROBLEM

How can we feel safe and secure being away from home? This is the main

concern of all. The challenge of our group is to come up with a security system that is

reliable, accurate and affordable.

Specifically, this design seeks to answer the following questions:

1. How to interface an infrared camera to detect a motion?

2. How to control a cellular phone to serve as an alert device?

3. How accurate and reliable is the design?

OBJECTIVE OF THE STUDY

1. To be able to interface an infrared camera that can capture video when

motion is detected.

2. To create a controller for the cellular phone so that it can send a message

when triggered.

3. To create an accurate and reliable security system that encompasses SMS

technology.

SIGNIFICANCE OF THE STUDY

Even we have locks for our home and doors people have still found ways to get

around them. All they need is a certain set of burglary tools and they are in. It is simple

for a home invader. This is why it is important that we get a security system installed in

our home so we don't have an invader and break in occurring in our home. If this scenario

had occurred, the system will warn the owner that there had been an intruder, upon break

in, it would only take a few seconds until the owner receives the SMS; warnings like this

7
8

can be the factor if the burglary would be a success or a failure. And the recorded video

can be used as evidence against the burglar.

This study is significant to us as students because it is the practical application of

all the knowledge we acquired while we are studying in Mapua Institute of Technology.

SCOPE

1. The camera can detect a motion within the maximum distance of 20 ft

radius at approximate angle of 110 degrees.

2. An alert will be triggered when there is motion on the captured video that

reaches the sensitivity specified in the program.

3. The device attached will be activated, records the video and sends a SMS

to the recipient if a motion is detected.

4. The computer will record the video feed and save it on the hard disk.

5. SMS will be sent to a cellular phone for alert.

6. The camera can be installed within 30 meters away from the computer.

DELIMITATIONS

1. The performance of the program depends on the computer where it was

installed.

2. The design is tested using only one cellular phone model, the Nokia 6210.

The efficiency and reliability of using other cellular phone models is not

covered in the study.

3. The cellular phone uses prepaid cards as credits. Once it runs out of

credit, the queued SMS messages will not be sent.

4. The camera’s coverage is limited.


DEFINITION OF TERMS

CELLULAR PHONE This is a long-range, portable electronic device for personal

telecommunications over long distances. In addition to the

standard voice function of a telephone, current mobile phones

can support many additional services such as SMS for text

messaging, email, packet switching for access to the Internet,

and MMS for sending and receiving photos and video.

(www.wikipedia.org)

GSM GSM is a world standard for digital cellular communications

using narrowband Time Division Multiple Access (TDMA) for

voice and Short Messaging Service (SMS).

(http://www.intel.com/products/glossary)

MCU Microcontroller is a computer on a chip. It is a type of

microprocessor emphasizing high integration, low power

consumption, self-sufficiency and cost-effectiveness, in

contrast to a general-purpose microprocessor (the kind used in

a PC). (www.wikipedia.org)

TRANSMITTER An electronic device which, usually with the aid of an antenna,

propagates an electromagnetic signal such as radio, television,

or other telecommunications. (www.wikipedia.org)

9
10

RELAY An electrical switch that opens and closes under the control of

another electrical circuit. In the original form, the switch is

operated by an electromagnet to open or close one or many sets

of contacts. (www.wikipedia.org)

TV TUNER A TV tuner receives UHF and VHF television broadcasts

providing local programming for a mobile video system and

receives composite video input. (www.crutchfield.com)

VIDEOCAPX Allows developers to easily add access to digital video capture

cards, scanners, and cameras to their applications. It captures

videos into AVI or WMV. It saves video frames JPG images

and plays media files. (www.topshareware.com)

IDE An integrated development environment (IDE) is a software

application that provides comprehensive facilities to computer

programmers for software development. An IDE normally

consists of a source code editor, a compiler and/or interpreter,

build automation tools, and (usually) a debugger. Sometimes a

version control system and various tools are integrated to

simplify the construction of a GUI. (www.techweb.com)

USB Universal Serial is a serial bus standard to interface devices.

USB was designed to allow many peripherals to be connected

using a single standardized interface socket and to improve the


11

plug-and-play capabilities by allowing devices to be connected

and disconnected without rebooting the computer (hot

swapping). (www.wikipedia.org)

PARALLEL PORT A connection for high-speed transfer of information, using

multiple data lines.

(/www.micro2000uk.co.uk/hardware_glossary.htm)

INFRARED An area in the electromagnetic spectrum extending beyond red

light from 760 nanometers to 1000 microns (106 nm). It is the

form of radiation used for making non-contact temperature

measurements. (www.amv-services.com)

SMS Short Message Service is a communications protocol allowing

the interchange of short text messages between mobile

telephone devices. (www.wikipedia.org)

VISUAL BASIC A programming language and environment developed by

Microsoft. It is based on BASIC language and was one of the

first products to provide a graphical programming environment

and a paint metaphor for developing user interfaces.

(www.webopedia.com)
Chapter 2

METHODS AND PROCEDURES

RESEARCH DESIGN

The project design used both the Descriptive and Experimental research.
Descriptive research was used to search for the facts with enough information that was
needed in the project design. The research was mainly focused on finding what materials
to be used for the design. This was done by reading books as well as articles found in the
Internet. We also consulted with people who have knowledge regarding the project. In
addition to that, descriptive research was used because the relationship of the variables
was taken into consideration.
The following variables were taken into consideration in this project:
1. area of the room
2. the ease of installation of the camera for the purpose of presentation
3. lighting condition in the room being surveyed
4. distortion of the image captured by the IR camera
Experimental research was also used to determine the compatibility of the materials to be
used in the project design. With this, the group was able to determine and to finalize
what materials and components were considered best to use for this type of project
design.

DESIGN PROCEDURE

In developing this design, the following procedures were followed:

1. Determining the problem

2. Gathering data

3. Determining the required operations/procedures

4. Designing the system diagram

5. Software Programming

12
13

6. Acquisition of Materials

7. Hardware Assembly/Construction

8. Testing

9. Determining System Requirements

GATHERING DATA

To be able to achieve the goals, the researchers conducted the study by asking the help of

their colleagues and professors. Upon gathering all the information needed, they have

come up with a design that had a camera, cellular phone and it would be controlled by a

microcontroller and a Visual Basic based program.

DETERMINING THE REQUIRED OPERATIONS/PROCEDURES

For demonstration purposes, the system was installed in one of the classrooms in Mapua

Institute of Technology. The camera was attached to the center of the wall facing the two

doors of the classroom. All of the equipments used in this design were inside a room.
HARDWARE DESIGN

LIST AND ACQUISITION OF MATERIALS

The materials used in this design (shown in Appendix A) were purchased in Hua

Yang Electronics Enterprises, Alexan Commercial, and Powerwin Marketing. These

materials were picked to make sure the design would be affordable without sacrificing

accuracy and reliability.

HARDWARE COMPONENT

The main component of this design was the microcontroller. It was used to trigger

the alarm as well as the SMS alert. The microcontroller used was the PIC16F877. Here

are the reasons why the researchers decided to use this type of microcontroller:

• It is very affordable and available here in Philippine electronic market.

• It is a flash microcontroller which means reprogrammable.

• Device Programmer is available on the net and also free.

Another component of this design was the Nokia 6210 that was connected in the

receiver box. It was affordable and it had a built-in modem that used AT- commands.

Relays were also used in both the receiver and transmitter box. The relay acted as switch.

Whenever the program outputs a signal of 1 on the parallel port’s D4 and D5 (Figure 2),

the relays switched ON the alarm attached to the receiver box and commanded the

microcontroller to send a SMS alert using the Nokia 6210.

14
15

Figure 2. Parallel Port

CIRCUIT DESIGN

After all the data gathering and research, the researchers created a schematic

diagram of the circuit using the software called Proteus Virtual System Modelling

(VSM). The schematic diagram of the circuit is shown in Appendix C. After all the

testing using that program the actual circuit was created.

The system diagram as show in Figure 3 shows how the design will be connected.

As seen below, the camera is connected to the computer with the aid of a TV tuner. The

receiver box which contains the microcontroller will be controlled by the software which

will be installed on the computer. The receiver box will communicate with the computer

that has a security program using a wireless transmitter. The microcontroller used in this

design is PIC16F877. The program embedded on this microcontroller will be responsible

in activating the alarm attached to the system and will also send a SMS using the Nokia

6210 cellular phone once an intruder is detected. The program installed on the computer
16

will serve a sensor and will also be responsible in recording the video just in case an

intruder is detected.

Video Cable or
S.Video Cable
Video Feed IR Camera TV Tuner

USB
Interface

Receiver Box
Parallel Port
Nokia 6210 Transmitter Interface Desktop/Laptop
Cellular Computer
Box
Phone

SMS

Security Cellular Phone


Device (Owner)

Figure 3. System Diagram


SOFTWARE DESIGN

SOFTWARE COMPONENTS

Visual Basic was the language used to create the program for our system. In

order for the program to work, IO.DLL should be in the system32 of the computer.

VideoCapX must also be installed and added as a component in visual basic. The

program started by initializing the IO.DLL and by setting all data ports to zero (0).

VideoCapX commands (refer to Appendix H) where used to preview and to capture

video from the IR camera.

The program developed has a very simple logic. As shown in the flowchart

(Figure 5), once the program is activated, it automatically detects movement in the

surveyed room. A sensitivity of two (2) was used to make use that the system performed

accurately. Once a motion reached a sensitivity of 2 or greater, the program started

recording the video coming from the IR camera. The program continued to record until

the movement stopped or once the motion in the room was less than 2 again. Once the

sensitivity was below 2 again, the program waited for ten (10) seconds. If a movement

was detected by the system within that 10 seconds period, the system continued to record

the video. If there was no movement within that period, the recording stopped and the

recorded video would be stored to the computer’s hard disk. The program consisted of

several functions to perform all the tasks discussed earlier.

17
SYSTEM FLOWCHART

Start

Camera, Cellular phone,


Computer, Attached
Device

Activate software

Detect motion

Is there a movement in the


surveyed room?
N

Y
Capture Video
Send SMS Alert to owner
Activate Attached Device

Is there no movement for 10


seconds? Continue Recording

Stop recording and Save video

N
Terminate Application?

Y
End

Figure 4. System Flowchart

18
Chapter 3

PRESENTATION AND INTERPRETATION OF DATA

This chapter focused on the analysis and interpretation of the data gathered using

experimental method to test the performance of the system that was designed. These data

gave an overview on how the system would perform on certain conditions and how

reliable and accurate the results.

The system was designed in such a way that very small movements from pests

like rats, cockroaches, flying mosquitoes and the like would not trigger any false alarm to

the users. The researchers considered certain elements like dust, insects and other

environmental factors that would not trigger a false alarm. This was done by making sure

that the sensor was sensitive enough without sacrificing the systems quality. By trial and

error, the researchers were able to set the appropriate sensitivity of the system. The

sensitivity used in the system was set to 2.

The ability of a system or component to perform its required functions under

stated conditions for a specified period of time was very important. Since no system was

100 percent accurate, there should be an assurance that the system designed would output

a very minimal errors.

19
20

Figure 5. Varying Distances at 90º angle

The system was first tested in broad daylight. Since the camera covered a limited

range of 110°(based on camera’s specification), it was tested first with all the movements

done within a distance of 2 ft from the camera and an angle of 90°. Please see Figure 5.

Operating Condition: Day time


Angle: 90°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
2 Walking Yes Yes
2 Running Yes Yes
2 Opened Door Yes Yes
2 Throw Big Object Yes Yes
2 Throw Small Object Yes Yes
2 Waive Hand Yes Yes
Table 1. Design Test Results during daytime within a scope of 90° and distance of 2ft

Based on the results shown in Table 1, all the movements done within 90° of the

camera’s scope and with a distance of 2 ft from where the camera was installed would
21

trigger the system. The said movements; walking, running, opening of the door and

throwing of big objects within a size of a basketball, throwing of small object within a

size of a baseball and waiving of hand were detected because they caused a large

distortion of more than 40% of the area of the video feed. The system was able to detect

those movements as an intrusion so the alarm was triggered and a SMS alert was sent.

After testing the system within the conditions stated in Table 1, some of the conditions

varied and tested the system again. All the same movements were done within a distance

of 12 ft and within the same angle of 90°. Please refer to Table 2.

Operating Condition: Day time


Angle: 90°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
12 Walking Yes Yes
12 Running Yes Yes
12 Opened Door Yes Yes
12 Throw Big Object Yes Yes
12 Throw Small Object Yes Yes
12 Waive Hand Yes Yes
Table 2. Design Test Results during daytime within a scope of 90° and distance of 12ft

Based on the results shown in Table 2, all the movements triggered the alarm of

the system just like before. The system was able to detect those movements as an

intrusion so the alarm was triggered and a SMS alert was sent. The system did this

because within these conditions, all the movements stated on the table caused a distortion

of at least 20% of the area of the captured video feed. After the second testing of the

system within the conditions stated in Table 2, some of the conditions varied again and

tested the system again. All the same movements were done within the same angle of

90° but with a distance of 22 ft. Please refer to Table 3.


22

Operating Condition: Day time


Angle: 90°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
22 Walking Yes Yes
22 Running Yes Yes
22 Opened Door Yes Yes
22 Throw Big Object Yes Yes
22 Throw Small Object No No
22 Waive Hand No No
Table 3. Design Test Results during daytime within a scope of 90° and distance of 22ft

Based on the results shown in Table 3, the first 4 movements triggered the alarm

of the system just like before and a SMS alert was sent. However, the last 2 movements

were not detected by the system. Movements like walking, running, opening of the door

and throwing of big objects within a size of a basketball caused a distortion of at least 5%

of the area of the captured video feed while throwing of small object within a size of a

baseball and waiving of hand caused a distortion of 2% of the area of the video feed. The

tests were repeated with the conditions stated in table 4 but still got the same results. The

researchers came with a hypothesis that the system could be triggered by a distortion of at

least 5% of the area of the video feed. All movements that would cause distortions of

below 5% of the area of the video feed would not trigger the system.

After the tests, the researchers were not satisfied, so they conducted more series

of tests varying the angles where the movement would be done.


23

Figure 6. Varying Distances at 45º angle

The researchers tested it again by varying the angle where the movement was

done. First they tried the same movements stated in the Tables 1, 2 and 3 but within an

angle of 45° from the camera (see Figure 6). The results were shown in Tables 4.a and

4.b.

Operating Condition: Day time


Angle: 45°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
2 Walking Yes Yes
2 Running Yes Yes
2 Opened Door Yes Yes
2 Throw Big Object Yes Yes
2 Throw Small Object Yes Yes
2 Waive Hand Yes Yes
12 Walking Yes Yes
12 Running Yes Yes
12 Opened Door Yes Yes
12 Throw Big Object Yes Yes
12 Throw Small Object Yes Yes
12 Waive Hand Yes Yes
Table 4.a Design Test Results during daytime within a scope of 45° and varying distance
24

Operating Condition: Day time


Angle: 45°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
22 Walking Yes Yes
22 Running Yes Yes
22 Opened Door Yes Yes
22 Throw Big Object Yes Yes
22 Throw Small Object No No
22 Waive Hand No No
Table 4.b Continuation of Table 4.a

Based on the results in Tables 4.a and 4.b, the system was able to detect the

movements like walking, running, opening a door and throwing a big object as an

intrusion no matter how far it was from the camera. However, referring to Table 4.b, the

last 2 movements were still not detected by the system when the testing distance was 22

ft because they caused a distortion of below 5% of the area of the video feed.

Figure 7. Varying Distances at 55º angle


25

Varying the angle to 55° as shown in Figure 7, did not vary the output of the

system. Please refer to Table 5.

Operating Condition: Day time


Angle: 55°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
2 Walking Yes Yes
2 Running Yes Yes
2 Opened Door Yes Yes
2 Throw Big Object Yes Yes
2 Throw Small Object Yes Yes
2 Waive Hand Yes Yes
12 Walking Yes Yes
12 Running Yes Yes
12 Opened Door Yes Yes
12 Throw Big Object Yes Yes
12 Throw Small Object Yes Yes
12 Waive Hand Yes Yes
22 Walking Yes Yes
22 Running Yes Yes
22 Opened Door Yes Yes
22 Throw Big Object Yes Yes
22 Throw Small Object No No
22 Waive Hand No No
Table 5. Design Test Results during daytime within a scope of 55° and varying distance

Based on the results in Table 5, the system was able to detect the movements like

walking, running, opening a door and throwing a big object as an intrusion. But then

again, the last 2 movements were still not detected by the system when the testing

distance was 22 ft because they caused a distortion of below 5% of the area of the video

feed.
26

Figure 8. Varying Distances at 75º angle

Varying the angle to 75° as shown in Figure 8, did not again change the results.

Please refer to Tables 6.a and 6.b for the results.

Operating Condition: Day time


Angle: 75°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
2 Walking Yes Yes
2 Running Yes Yes
2 Opened Door Yes Yes
2 Throw Big Object Yes Yes
2 Throw Small Object Yes Yes
2 Waive Hand Yes Yes
12 Walking Yes Yes
12 Running Yes Yes
12 Opened Door Yes Yes
12 Throw Big Object Yes Yes
12 Throw Small Object Yes Yes
12 Waive Hand Yes Yes
Table 6.a Design Test Results during daytime within a scope of 75° and varying distance
27

Operating Condition: Day time


Angle: 75°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
22 Walking Yes Yes
22 Running Yes Yes
22 Opened Door Yes Yes
22 Throw Big Object Yes Yes
22 Throw Small Object No No
22 Waive Hand No No
Table 6.b. Continuation of Table 6.a

The results shown in Tables 6.a and 6.b are just the same in the results shown in

previous tables. This means that as long as the movement being done is still within the

scope of the camera, the system can be triggered. We have also observed that the last

two movements (throwing of small objects and waiving of hand) within a distance of 22

ft on any angle from the scope of the camera was still not detected as an intrusion

because those movements caused distortions of below 5% on the area of the video feed.

Once those said movements were done closer to the camera, the movements were easily

detected as an intrusion just like the results in the previous tables.

Figure 9. Actual photo of the testing in broad daytime condition


28

We could still see that there is still a blind spot referring to Figure 9. This is the

disadvantage of using only one camera. To be able to solve this limitation, the group

would like to recommend the use of multiple cameras to achieve maximum coverage.

However, the reliability of using multiple cameras is not covered in this study.

Since most of the time the security system is activated during night time or in

total darkness, the researchers also tested the system during night time without use of any

lighting. Since the researchers were using an IR camera which was designed to be used as

a night vision, they could still see the video feed as if there was an aid of light as shown

in Figure 10. The result of the said test is shown in Table 7.

Operating Condition: Night Time


Angle: 90°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
2 Walking Yes Yes
2 Running Yes Yes
2 Opened Door Yes Yes
2 Throw Big Object Yes Yes
2 Throw Small Object Yes Yes
2 Waive Hand Yes Yes
Table 7. Design Test Results during the night within a scope of 90° and distance of 2ft

Based on the results shown in Table 7, there is no difference in the output of the

system even if the system is activated during night time. All movements were still

detected as an intrusion within the range of 90° and a distance of 2 ft because it caused a

large distortion of more than 40% of the area of the video feed just like the results in

Table 1.
29

Operating Condition: Night time


Angle: 90°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
12 Walking Yes Yes
12 Running Yes Yes
12 Opened Door Yes Yes
12 Throw Big Object Yes Yes
12 Throw Small Object Yes Yes
12 Waive Hand Yes Yes
Table 8. Design Test Results during the night within a scope of 90° and distance of 12ft

Varying the distance to 12 ft. where the movements were done during night time

did change the output of the system. Just like what was discussed in Table 2, the

movements caused a distortion of at least 20% of the area of the captured video feed.

After the second testing of the system within the conditions stated in Table 8, the distance

was varied and the system was tested again. All the same movements were done within

the same angle of 90° but with a distance of 22 ft. Please refer to Table 9.

Operating Condition: Night time


Angle: 90°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
22 Walking Yes Yes
22 Running Yes Yes
22 Opened Door Yes Yes
22 Throw Big Object Yes Yes
22 Throw Small Object No No
22 Waive Hand No No
Table 9. Design Test Results during the night within a scope of 90° and distance of 22ft

Based on the results gathered in Table 9, the system still performed the same even

during night time. The first 4 movements triggered the alarm of the system just like

before and a SMS alert was sent while the last 2 movements were not detected by the
30

system at the distance of 22 ft. It was decided to vary the angle to 45°. Please refer to

Table 10.

Operating Condition: Night time


Angle: 45°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
2 Walking Yes Yes
2 Running Yes Yes
2 Opened Door Yes Yes
2 Throw Big Object Yes Yes
2 Throw Small Object Yes Yes
2 Waive Hand Yes Yes
12 Walking Yes Yes
12 Running Yes Yes
12 Opened Door Yes Yes
12 Throw Big Object Yes Yes
12 Throw Small Object Yes Yes
12 Waive Hand Yes Yes
22 Walking Yes Yes
22 Running Yes Yes
22 Opened Door Yes Yes
22 Throw Big Object Yes Yes
22 Throw Small Object No No
22 Waive Hand No No
Table 10. Design Test Results during the night within a scope of 45° and varying distance

Based on the results gathered in Table 10 which were in night time operating

condition, the system still performed the same as if it used in day time. This means that as

long as the movement being done was still within the scope of the camera, the system

could be triggered. It was observed that the last two movements (throwing of small

objects and waiving of hand) within a distance of 22 ft on any angle from the scope of the

camera was still not detected as an intrusion because those movements caused distortions

of below 5% on the area of the video feed.


31

Operating Condition: Night time


Angle: 55°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
2 Walking Yes Yes
2 Running Yes Yes
2 Opened Door Yes Yes
2 Throw Big Object Yes Yes
2 Throw Small Object Yes Yes
2 Waive Hand Yes Yes
12 Walking Yes Yes
12 Running Yes Yes
12 Opened Door Yes Yes
12 Throw Big Object Yes Yes
12 Throw Small Object Yes Yes
12 Waive Hand Yes Yes
22 Walking Yes Yes
22 Running Yes Yes
22 Opened Door Yes Yes
22 Throw Big Object Yes Yes
22 Throw Small Object No No
22 Waive Hand No No
Table 11. Design Test Results during the night within a scope of 55° and varying distance

Based on the results in Table 11, the system was able to detect the movements

like walking, running, opening a door and throwing a big object as an intrusion. But

then, the last 2 movements were still not detected by the system when the testing distance

was 22 ft because they caused a distortion of below 5% of the area of the video feed.
32

Operating Condition: Night time


Angle: 75°
Distance
Type of Movement Motion Detected? SMS Sent?
(ft)
2 Walking Yes Yes
2 Running Yes Yes
2 Opened Door Yes Yes
2 Throw Big Object Yes Yes
2 Throw Small Object Yes Yes
2 Waive Hand Yes Yes
12 Walking Yes Yes
12 Running Yes Yes
12 Opened Door Yes Yes
12 Throw Big Object Yes Yes
12 Throw Small Object Yes Yes
12 Waive Hand Yes Yes
22 Walking Yes Yes
22 Running Yes Yes
22 Opened Door Yes Yes
22 Throw Big Object Yes Yes
22 Throw Small Object No No
22 Waive Hand No No
Table 12. Design Test Results during the night within a scope of 75° and varying distance

Based on the results obtained in Table 12, the system produced same results as

compared to other tables that have different angles and in day time operating condition.

Figure 10. Actual photo of the testing in night time condition


33

After all the tests with the system the researchers were able to come up with some

general observations:

1. The design could perform accurately within different working conditions e. g.

day, night and with or without light.

2. The system could be triggered depending on the type of movement in the

surveyed room as well as the distance of that movement from the IR camera.

3. The system relayed on the percentage of distortion on the captured video to be

able to detect an intruder.

4. Approximately 5% distortion on the area of the video feed was needed to consider

that an intruder entered the surveyed area.


Chapter 4

CONCLUSION AND RECOMMENDATION

Conclusions

After the group developed and tested the device, the following were drawn:

1. A program created using Visual Basic was used in order to detect intrusion on a
secured room based on the video feed coming from an IR camera.
2. A microcontroller was used to send a SMS alert to the owner and to trigger the
device attached to the system whenever an intruder was detected in the secured
area.
3. To be able to make sure that the system developed was reliable and accurate, it
was tested to several working conditions. To achieve maximum reliability and
accuracy of the system, a sensitivity of 2 was used in the said program.

Recommendations

For further improvement on the development of an SMS Security System, the


following are recommend:
1. Install the created software in a computer that can process faster for the system to

perform better.

2. Make use of GSM module instead of Nokia 6210 to assure that the SMS alert will

be more stable.

3. Collaborate with the cellular network providers to decrease the expense for text

messaging.

4. Use more than one camera to achieve maximum coverage and avoid any blind

spots.

34
BIBLIOGRAPHY

Calupitan, et al. “MCU-Based Coin Operated Text Booth”. 2006

Cunanan, et al. “Mainframe Auto-Login using RFID”. 2006

Deitel, Harvey; Deitel, Paul J. (2001) Visual Basic 6 How to Program, 2nd Edition

Greg Hall , New Ezine Articles “Why Home Security Is So Important In This Day And
Age”

Dean Caporella, New Ezine Articles “The Truth About Infrared Security Cameras”

35
APPENDICES
APPENDIX A

List of Materials and Equipments

Qty Unit Item Qty Unit Item


1 pc 10kΩ Resistor 3 pc LEDs
1 pc 15kΩ Resistor 1 pc S Video Cable
2 pc 1kΩ Resistor 4 pc BNC
2 pc 150Ω Resistor 2 pc DB9 RS232
1 pc 4.7kΩ Resistor 2 pc 4X6 PCB
1 pc 100Ω Resistor 1 set Black Casing
2 pc 22pF Capacitor 1 pc MAX220
1 pc 2200uF Capacitor 1 pc DB25 Parallel Cable
1 pc 220uF Capacitor 1 pc N6210 PC Cable
5 pc 100nF Capacitor 1 set UTV 330 Plus
2 pc 10uF Capacitor 2 pc Omron Relay (12V)
1 pc PIC16F877 2 pc Philips Screw Driver
1 pc PIC16F84A 2 pc Soldering Iron
2 pc LM7805 (Voltage Regulator) 1 tube Soldering Lead
2 pc 1N4001 Diode 1 pc Handheld Drill
1 pc 1N4005 Diode 2 pc Pliers
2 pc TRAN-2P3S Transformer 2 pc Wire Cutter
1 pc N6210 Cellular Phone (w/ SIM) 1 pc SIL-100-06
1 pc Infrared Camera (ERA JK-205) 1 pc Desktop
30 meters RG6 Cable 1 pc MAX232
3 meters Wires 1 set Desktop Computer

37
Appendix B

Schematic Diagram of the Microcontroller

38
Appendix C

PCB Design

Microcontroller Main PCB

Mobile Interface PCB

39
40

Pc Interface Circuit
Appendix D

Visual Basic Source Code

Private Declare Sub PortOut Lib "IO.DLL" (ByVal Port As Integer, ByVal Data As
Byte)
Private Declare Function PortIn Lib "IO.DLL" (ByVal Port As Integer) As Byte
Dim num As Integer
Dim filename As String

Private Sub Form_Load()


num = 0
PortOut 888, 0
vcx.Connected = True
vcx.Preview = True
Check3_Click
filename = "C:\" & Format(Now, "DD-MM-YYYY") & Format(Now, "__hh-mm-ss")
& ".AVIF"
End Sub

Private Sub Check3_Click()


If Check3.Value = 1 Then
vcx.SetTextOverlay 0, "TIME", 0, 0, "Arial", 22, RGB(255, 255, 255), -1
Else
vcx.SetTextOverlay 0, "", 0, 0, "", 0, 0, 0
End If
End Sub

Private Sub Check1_Click()


If Check1.Value = 0 Then
Check1.Caption = "MOTION DETECT OFF"
Timer1.Enabled = False
Check1.BackColor = vbRed
Check1.ForeColor = vbWhite
Image1.Picture = LoadPicture(App.Path + "\off.bmp")
vcx.StopCapture
Form1.Caption = "SMS Security System"
Check2.Value = 0
Check2_Click
Else
Check1.Caption = "MOTION DETECT ON"
Timer1.Enabled = True
Check1.BackColor = vbGreen
Check1.ForeColor = vbWhite
End If
End Sub

41
42

Private Sub Timer1_Timer()


If Not vcx.IsCapturing Then
If vcx.DetectMotion() >= 2 Then
Image1.Picture = LoadPicture(App.Path + "\on.bmp")
CaptureVideo
End If
Else
If vcx.DetectMotion() >= 2 Then
Timer2.Enabled = False
ElseIf vcx.DetectMotion() < 2 Then
Timer2.Enabled = True
If num = 1 Then
Image1.Picture = LoadPicture(App.Path + "\off.bmp")
vcx.StopCapture
Form1.Caption = "SMS Security System"
num = 0
Timer2.Enabled = False
End If
End If
End If
End Sub

Private Sub CaptureVideo()


vcx.CapFilename = filename
Form1.Caption = "Capturing " + vcx.CapFilename
vcx.StartCapture
Beep
PortOut 888, 48
DelayTime 2
Check2.Value = 1
Check2_Click
End Sub

Private Sub Check2_Click()


If Check2.Value = 0 Then
Check2.Caption = "DEVICE OFF"
Image3.Picture = LoadPicture(App.Path + "\Blue off.bmp")
PortOut 888, 0
Check2.BackColor = vbRed
Check2.ForeColor = vbWhite
Else
Check2.Caption = "DEVICE ON"
Image3.Picture = LoadPicture(App.Path + "\Blue on.bmp")
PortOut 888, 32
Check2.BackColor = vbGreen
Check2.ForeColor = vbWhite
43

End If
End Sub

Private Sub DelayTime(DelayTime)


Dim LoopTime As Long
Const SecInDay = 86400
LoopTime = Timer + DelayTime
If LoopTime > SecInDay Then
LoopTime = LoopTime - SecInDay
Do While Timer > LoopTime
DoEvents
Loop
End If
Do While Timer < LoopTime
DoEvents
Loop
End Sub

Private Sub Form_Unload(Cancel As Integer)


vcx.Connected = False
PortOut 888, 0
End Sub

Private Sub Timer2_Timer()


num = 1
Timer2.Enabled = False
End Sub
Appendix E

VideoCapX Commands

44
45
46
Appendix F

Program Code for the Microcontroller

Device = 16F877
'--------------------------------------------------------------------
' Define Osc 4
'--------------------------------------------------------------------
XTAL = 4
'--------------------------------------------------------------------
' HARDWARE DEFINES
'--------------------------------------------------------------------
HSERIAL_BAUD = 9600 ' Set baud rate to 9600
HSERIAL_RCSTA = %10010000
HSERIAL_TXSTA = %00100100
ALL_DIGITAL = TRUE
'--------------------------------------------------------------------
ADCON1 = 7
OPTION_REG.7 = 0
TRISA = %000000
TRISD = %00000000
TRISB = %00000000
TRISC = %10000000
TRISE = %000

'--------------------------------------------------------------------
Symbol LOAD1 PORTD.0

PORTD = 0

'--------------------------------------------------------------------
; START SMS PROTOCOL
'--------------------------------------------------------------------
MAIN:
HSerOut ["AT" ,13]
HSerIn 1000, [Wait("K")]
HSerOut ["AT+CMGF=1" ,13]
HSerIn 1000, [Wait("K")]

LOOP:
If PORTB.6=1 Then
GoTo SENDOK
EndIf
GoTo LOOP

47
48

;----------------------------------------------
; SEND Message
;---------------------------------------------
SENDOK:
HSerOut ["AT+CMGS=",34,"09198158760",34,13]
DelayMS 1000
HSerOut ["INTRUDER DETECTED ",26]
DelayMS 500
;-------------------------------------
; SMS DELETE Message(s)
;-------------------------------------
DELETE:
DelayMS 200
HSerOut ["AT",13]
DelayMS 200
HSerOut ["AT+CMGF=1",13]
DelayMS 200
HSerOut ["AT+CMGD=0",13]
DelayMS 200

DelayMS 200
HSerOut ["AT+CMGD=1",13]
DelayMS 200

DelayMS 200
HSerOut ["AT+CMGD=2",13]
DelayMS 200

DelayMS 200
HSerOut ["AT+CMGD=3",13]
DelayMS 200

DelayMS 200
HSerOut ["AT+CMGD=4",13]
DelayMS 200

GoTo LOOP
End
Appendix G

Photos of the System

Screenshot of the Program

SMS Security System Hardware Components

49
50

Receiver Box (Inside)

Transmitter Box (Inside)


51

IR Camera (mounted on wall)

IR Camera, TV Tuner and Cables


Appendix H

Nokia 6210 Pin Configuration

Figure 1. The connector pin out for Nokia phones

(Looking from outside on the connector, keypad is on top. This description is valid for
51xx, 61xx and 71xx phones)

Pin Name Functions in / out


1 CHARGE Charging voltage 0-8. 5V, 0-850mA in
2 CCONTROL Charging control PWM,32-37Hz, 1-99% out
3 MIC/XMIC Analog audio in 1Vpp/100 Ohms in
Analog audio in (Headset) 200mVpp/2. 5K/BIAS in

100-600uA
Accessory mute >2. 5V not Muted out

<1. 5 muted
Headset detection >1. 5 not Headset/DATA In
Mode

<1. 3 Headset connected


4 AGND Analog ground
5 EAR/XEAR Analog audio out U=80mV-1. 0V out
6 MBUS Bidir. Serial bus 9600 bps in/out
7 FBUS Serial data in 9600-230. 400 bps in
8 FBUS RX Serial data in 9600-230. 400 bps out
9 SGND Signal Ground/Charging 9600-230. 400 bps out
ground

Table 1. Pin Configurations of Nokia 6210 Cellular phone

52
Appendix I

PIC16F87X Data Sheet

53
54
55
56
Appendix J

PIC16F84A Data Sheet

57
58
Appendix K

P2262 Data Sheet

59
60
61
62
63
64
Appendix L

LM7805 Data Sheet

65
Appendix M:

MAX220/232 Data Sheet

66
67
68
69
70
71
72
Appendix N

User’s Manual

SMS SECURITY SYSTEM V1.0

1. SETTING UP THE SYSTEM

1.1 Welcome!

Thank you for using the SMS Security System V1.0!

Before you can use the system, you must set up the hardware and install the software.
Please check the components with the list below:

1.2 Components

IR Camera IR Camera ERA JK-205


AC Adaptor

TV Tuner Gadmei USB TV Box UTV330


Mini USB Data and USB Cable
CD Driver

Transmitter Box

Receiver Box Nokia 6210

Application CDs SMS Security System V1.0 Support CD

Cables 1 x S.Video cable or RCA cable


1 x Parallel Port Cable
1 x RG6 Coaxial Cable*
2 x BNC connectors*

Note: * - optional components

1.3 System Requirements

-Operation system: Windows 2000/XP


-AGP display card which support Direct X9.0 or above
-Pentium 4 2.4GHZ
-256MB or higher memory
-200MB up free disk space for software installation, and 1 GB up for recording
storage (depend on record time)
-5400rpm or higher Hard Disk

73
-a free USB2.0 slot or USB2.0 interface expanded card equipped

1.4 Software Installation

1.4.1 Turn on your PC.

1.4.2 Browse the contents of the support CD to locate VideoCapX.exe from the support
folder. Double-click the VideoCapX.exe to run the setup of VideoCapX.

1.4.3 Follow the instructions of the installation until end of VideoCapX installation
setup.

1.4.4 Make it sure that the TV tuner is connected to your PC(please refer to 1.5.1).
Browse the contents of the support CD to locate Setup.exe from the UTV 330
Driver folder. Double-click the Setup.exe to install the UTV 330 driver. Follow
the instructions of the installation until the end of VideoCapX installation setup.

1.4.5 Browse the contents of the support CD to locate setup.exe. Double-click the
setup.exe to run the setup.

1.4.6 Click OK to start installation.

74
1.4.7 Click the button that says “Click this button to install SMS…” for automatic
installation or click the “Change Directory” to change the installation folder.
Follow the instructions of the setup until the end of installation.

1.4.8 After you see the image above. The installation of the SMS Security System V1.0
is complete.

1.5 Setting Up the Hardware

1.5.1 TV Tuner – Connect the S.Video cable to the S.Video marked socket in the TV Tuner.
The other end of the S.Video cable is connected to the IR camera. Then connect the USB
cable to the USB marked socket in the TV Tuner then connect the other end to the
free USB2.0 slot or USB2.0 interface expanded card equipped PC. Then install its
driver (please refer to 1.4.4).

IR Camera

PC

TV Tuner
75
1.5.2 IR Camera - You can mount the IR camera to where you want to place it.

TV tuner
AC Adaptor

IR Camera

220V AC

1.5.3 Transmitter Box – Plug it into a 220 V AC socket then follow the figure below.

220V AC Parallel Cable

PC Parallel
port

1.5.4 Receiver Box – Plug it into a 220 V AC socket. Open its cover. Inside you will
see the cell phone interface cable for the Nokia 6210 and a red LED. Attach
Nokia 6210 to the interface cable. You will know if the Nokia 6210 is properly
connected when the red LED is turned off. Place the Nokia 6210 inside then put
the cover back on. The owner’s cell phone number is preinstalled inside the
program of the receiver box. The SIM card inside the Nokia 6210 is replaceable.

Security Device e.g. Alarm, Siren,


Electronic Lock, Light, Zapper, etc.

220V AC
Zoom in on
the red LED

Nokia 6210
Lift the cover upward
Cell phone
interface cable

76
2. USING THE SYSTEM

2.1 Starting the System

After the hardware setup and software installation, you may now use the SMS Security
System V1.0

You can start by doing the following:

2.1.1 CLICK Start All Programs SMS Security System V1.0 SMS Security
System V1.0

2.1.2 The SMS Security System V1.0 should be loading and you should see the User
Interface (please refer below.).

The User Interface

1 2 3 4 5

1. Show time on-video – clicking this check box will show/hide the date and time
on the video preview and on the recorded video.

2. MOTION DETECT switch button – clicking this button will activate/deactivate


the program of the SMS Security System V1.0. If this button is red, the
system is not active. If the button is green the system is activated.

77
3. Motion Detect Indicator – this indicator will light if there is a motion/distortion
in the video preview.

4. Device Indicator – this indicator will light if the device attach to the Receiver
box is active.

5. DEVICE switch button – clicking this button will activate/deactivate the device
attach to the Receiver box. If this button is red, the system is not active.
If the button is green the device attached is activated.

6. Video Preview Window – continuously showing the video feed.

7. Close button – close/exit the SMS Security System V1.0 program.

2.1.3 Click the MOTION DETECT switch button and your set to go. (MOTION DETECT
switch button is green.) The SMS Security System is now active.

2.2 Shutting down the system

2.2.1 You can turn off the SMS Security System V1.0 by clicking on the MOTION
DETECT switch button. (MOTION DETECT switch button is red.)

2.2.2 If you want to use the system again, you can turn on the system anytime you want it
to be activated.

2.2.3 If you will not use the system, you can close the program by clicking the Close
button.

2.2.4 Unplug the Receiver box, Transmitter Box, and the IR Camera from the AC Socket.
Safely remove the USB of the TV Tuner from the PC.

3. Testing the system

You can do manual tests to insure that the system continues to function as intended. It is
important that you test them weekly.

78
3.1 To know if the system is running in perfect condition, you can turn the system on;
waive your hand in front of the IR camera. The Motion Detect Indicator and the Device
Indicator should light and a video recording should take place (Notice in the title bar
saying “Capturing...”) and you should be receiving SMS on your cell phone saying
“INTRUDER ALERT”. You can view the recorded video inside the default directory.
(The default directory is “C:\”)

3.2 To manually test the device attached to the Receiver Box, you can click on the
DEVICE switch button. The device should be turned on and the DEVICE switch button
is green. Click again to turn it off.

4. TROUBLESHOOTING

4.1 Why is it that there is no picture in the Video Preview Window?


-Please check if the IR camera is powered on. (Please refer to 1.5.2) If it does not
solve the problem please check the TV Tuner if the driver is installed or if it is properly
connected. (Please refer to 1.5.1)

4.2 Why you did not receive any SMS on your cell phone when you do manual tests?
-Please check if the Nokia 6210 inside the Receiver Box is properly connected.
(Please refer to 1.5.4) If it does not solve the problem please check if the SIM card in the
Nokia 6210 has prepaid credits.

Important Notice
A security system cannot prevent emergencies. It is only intended to alert you and, if
included, a monitoring station, of an emergency situation. Security systems are generally
very reliable but they may not work under all conditions and they are not a substitute for
prudent security practices or life and property insurance. Your security system should be
installed and serviced by qualified security professionals who should instruct you on the
level of protection that has been provided and on system operations.

79
CURRICULUM VITAE
PETER G. BATTUNG
Address: Iñga, Enrile, Cagayan
City Address: 1130-E Natividad Lopez St. Ermita, Manila
Mobile: 09206384963 / (02)5276254
Email: peter_battung@yahoo.com

AREAS OF INTEREST
Electronics, Data Communications, Computer Organizations/Networks, Information and Technology,
Research and Project Management

EDUCATION
Mapua Institute of Technology
Bachelor of Science in Computer Engineering
Candidate for Graduation
Adamson University
st
Bachelor of Science in Computer Engineering 1 year
St. Louis College Tuguegarao City
High School Year Graduated: 2001
Iñga Elementary School
Elementary Year Graduated: 1997

TECHNICAL SKILLS
Knowledgeable in Programming using Turbo C++, JAVA, and Assembly
Knowledgeable in PC Troubleshooting
Knowledgeable in using Multisim, AUTOCAD, and PSpice
Knowledgeable in using the internet for collecting and downloading of information
Proficient in Microsoft Office 2003 (Word, Excel, PowerPoint, Publisher,and FrontPage), Internet;
Knowledge in C#.net
Knowledge in manipulating MS SQL Database

RESEARCH PAPERS AND PROJECTS HANDLED


Cellphone-to-cellphone charging
Remote control doorbell
Sales Inventory and Operation of Redline Internet Café
SMS Security System

SEMINARS ATTENDED
VLSI Designing August 7, 2007
Network Troubleshooting August 14, 2007
Silicon Interposer Resistivity Systematized Selection for Enhanced Bluetooth RF Performance
August 21, 2007
Bridging the Campus Career-Gap August 28, 2007
Familiarization Course on ISO 9001:2000 Standard August 30, 2007

PERSONAL DATA
Born in Iñga, Enrile, Cagayan on September 24, 1984. Single, Filipino citizenship, Roman
Catholic. Proficient in written and verbal English. Dependable, analytical and hardworking. Can
work under pressure with minimal supervision. Can work well with a team.

81
CHERRYL MAE M. BILOCURA
City Address: 838 Tolentino St. Ph. 5 Gatchalian Subd. Las Piñas City
Mobile Number: 0915-2149717
Email Address: cherrylmae.bilocura@gmail.com; my_boo1209@yahoo.com

OBJECTIVE
To pursue continuous learning, use the knowledge and skills that I have acquired in my field of
specialization, and commit myself in my chosen career.

AREAS OF INTEREST
Software development, Web development, Information Technology, Network administration, Electronics
and Computer Systems design, Research and Project management, and Computer troubleshooting

EDUCATION
MAPUA INSTITUTE OF TECHNOLOGY
B.S. Computer Engineering (2002-Present)
St. Joseph’s Academy
Elementary and High School Diploma (1992-2002)

EXTRA-CURRICULAR ACTIVITIES
Institution Moving towards the Advancement of Computer Engineers (IMACOE) – SY2005 to 2006
An exclusive organization of Computer Engineering Students of Mapua Institute of Technology
Position: Secretary
RESEARCH PAPERS AND PROJECTS HANDLED
Software Design on Automated Airline Ticketing System
• a software engineering project designed to process reservations, cancellations and admistrative
functions for airline ticketing
Visual Basic 6 compiler
• a compiler written in turbo C++ that compiles selected visual basic 6 commands
Power Supply
• an electronics design project that convert alternating current to direct current with voltage
regulation
TRAININGS AND SEMINARS ATTENDED
Fundamentals of UNIX (HP-UX) - April to July 2005
Systems and Network Administration 1 (HP-UX) - July to Sept 2005
Openview Network Management (HP-UX) - Jan to Mar 2005
Systems and Network Administration 2 (HP-UX) - May to July 2007
POSIX Shell Scripting (HP-UX) - April to July 2006
Seminar on Flash MX: Action script (MIT) - Nov 24, 2003

TECHNICAL SKILLS
Knowledgeable in Hardware (Logic Design and Basic PC Troubleshooting), Software Design,
Knowledgeable in Programming (using Turbo C++, MS SQL, VB6,Assembly Language, Prolog), POSIX Shell
Scripting (HP-UX), System / Network Administration (HP-UX), Proficient in Microsoft Office (Word, Excel, and
PowerPoint), Windows Operating System, HP-UX Operating System.

PERSONAL DATA
Born in Pasig City on July 19,1985, 5’4 inches in height, Single, Filipino citizen, Roman Catholic, Excellent
communication skills, fluent in written and spoken English and Filipino, Likes reading, watching DVDs. Hard
working, reliable, Responsible, focused and fast – learner, Can work under pressure with minimal
supervision, Can work in a team or group.

82
JAMAR ESCABA DEJARME
Address: 239 Foundation of St. Joseph the Worker Ortigas Ave. Rosario, Pasig City
Telephone Number: (02) 901-96-28
Fax Number: (02) 915-10-80
Mobile Number: 09198158760
Email: jedejarme66@yahoo.com, jamar.dejarme@gxs.com

AREAS OF INTEREST
Software Development , Computer Networking, Electronics, Information Technology

EDUCATION
MAPUA INSTITUTE OF TECHNOLOGY
B. S. Computer Engineering
(Candidate for Graduation, May 2008)

WORK-RELATED EXPERIENCE
STUDENT TRAINEE (On-the-job-Trainee)
NCAS (Napar Contracting and Allied Services) - October to December 2007
Assisted the Software Quality Assurance division in testing the multilingual functionality of CheckPro
Manager.

Electronic Data Interchange Developer


Global eXchange Services Philippines (GXS) – February 2008 to Present
Software Programmer that develops inbound and outbound maps.

TECHNICAL SKILLS
Proficient in Microsoft Office ’2003 (Word, Excel, and PowerPoint)
Knowledgeable in C++ Programming
Knowledgeable in UNIX
Basic Knowledge in Visual Basic .Net
Basic Knowledge in Visual Basic 6
Basic Knowledge in Assembly Language
Basic Knowledge in PC troubleshooting
Basic knowledge in AutoCAD, MATLAB
Basic knowledge Circuit Simulation Softwares (Multisim, Tina Pro)
Basic Knowledge in Application Integrator (AI)

EXTRA-CURRICULAR ACTIVITIES
Member - Institute of Electrical and Electronics Engineers Inc. (IEEE) MIT – January 2006 up to present
Vice President - Computer Engineering GC Class October - December 2007

CERTIFICATION
Cisco Intro Certified Cisco ID: CSCO11242984

RESEARCH PAPERS AND PROJECTS HANDLED


Cainta Catholic College Library System
A software design that was developed using VB .net language and MS SQL 2005. This system is for the use
of the Cainta Catholic College-high school department Learning Resource Center.

83
Fingerprint Automated Cellphone
A research that involves developing a Biometric security system on cellular phones.

Collision-Depth Detector Motion Robot


A Zilog microcontroller-based electronics design that detects and avoids depth and obstruction through the
use of infrared sensors.

Pinay Cosmetics Venture


A feasibility study on a product-based business that focuses their target market on the cosmetics industry.
The main product of the business is mineral make-ups.

Criminal Record System


A system design developed using Borland C++. This software was designed for managing criminal records.

TRAININGS AND SEMINARS ATTENDED


Fundamentals of UNIX - October 2005 to December 2005
HP Openview - January 2006 to March 2006
System and Network Administration 1 - April 2006 to June 2006
System and Network Administration 2 - July 2006 to September 2006
POSIX Shell Programming - October 2006 to December 2006
Cellphone Techinician - January 2007 to March 2007
CCNA 1: Networking Basics - January 2007 to March 2007
CCNA 2: Routers and Routing Basics - April 2007 to June 2007
CCNA 3: Switching Basic and Intermediate Routing - October to December 2007
VHDL - October 2005
IEEEXplore - October 2005
Semiconductor Manufacturing - June 2007
3G Technology with Circuit and Packet Switching Technologies - October 2007
Flash Based Storage - October 2007
HMI / SCADA Touch Panel Programming - October 2007

PERSONAL DATA
Born in San Pablo City, Laguna on October 17, 1986. Single, Filipino citizen, Roman Catholic, Above-
average communication skills. Can speak English and Filipino. Responsible, determined, futuristic and goal-
oriented. Can work under pressure and willing to learn.

84
JOBELLE L. JOSE
City Add: Block 06 Lot 15 Ina Exec. Homes, SAV – 1, Sucat, Parañaque City 1714
Tel. (02) 8257640
Mobile: +63915 - 9066186
Email: jobelle_jose@yahoo.com

AREAS OF INTEREST
Information and Technology, Project Management, Software Programming

EDUCATION
MAPUA INSTITUTE OF TECHNOLOGY

B.S., Computer Engineering (Candidate for Graduation, August 2008)

EXTRA-CURRICULAR ACTIVITIES
CHAIRWOMAN FOR BUDGET AND FINANCE – Pavilion Cardinals, MIT - S.Y. 2007 – 2008
Handles the finance of the organizations

MEMBER – Institution Moving towards the Advancement of Computer Engineering students, MIT -
S.Y. 2005 – present
Organized and coordinated internal and external activities for the organization.

VICE PRESIDENT – League of Peer Educators on Adolescent Development, MIT - S.Y. 2005 – 2006
and 2006 - 2007
Organized and coordinated internal and external activities for the organization.

COMMITTEE MEMBER – EE – ECE – CoE Student Council, MIT - S.Y. 2006 – 2008 and ,S.Y. 2005 –
2006
Assisted in organizing and executing various activities for the Department of EE – ECE - CoE

ASST. SECRETARY – Mapúa Central Student Council – Lower House (Council of Organizations) - S.Y.
2004 – 2005
Manages paperwork for the COO and keeps track of student organizations records

MEMBER – San Antonio Youth Choir – 1998 – 2003


Sings alto and bass

AWARDS AND ACHIEVEMENTS


Best in Computer, St. Rita College S.Y. 2000 - 2001
Loyalty Award, St. Rita College

RESEARCH PAPERS AND PROJECTS HANDLED


SMS Security System

It is a system that will continuously sends a live feed from an IR cam to a computer. Once a motion has
been detected it will automatically record the video as well as send a text message to the owner to warn
about the intrusion. Additional devices may also be connected to the system (siren, flood light, etc.)

TRAININGS AND SEMINARS ATTENDED


Inter and Intra Personal Seminar - June 12, 2004
MIT Leadership and Teambuilding - July 31 – August 1, 2004
LEAD Teambuilding Workshop - March 13 – 15, 2006
A3:6! Accenture Student Leadership Conference - January 18 – 20, 2008

85
Semicon Manufacturing - January 26, 2008
Financial Management - January 26, 2008
Flash Based Storage Solution - January 29, 2008
GSM BSS Dimensioning - January 30, 2008
IPTV: Going Beyond Voice and Data - January 31, 2008

TECHNICAL SKILLS
Proficient in Microsoft Office ’2003 (Word, Excel, and PowerPoint); Proficient in C++ , Visual Basic and Turbo
Pascal; Knowledgeable in Adobe Photoshop; Knowledgeable in Autocad;

PERSONAL DATA
Born in Parañaque on March 11, 1986. Single, Filipino citizenship, Roman Catholic. Above-average
communication skills, fluent in English and Filipino. Likes sports, reading novels, watching movies and
listening to music. Dependable, analytical and hardworking. Can work under pressure with minimal
supervision. Can work alone or with group.

86
FRITZ RICHARD JAUCIAN QUIRAS
199 6th St. corner Narra St., Fortune Village 6, Valenzuela City, Metro Manila 1440
 02 292 9187
0917 605 6108
@ fritzrichard@gmail.com

OBJECTIVE
To secure a position as a Computer Engineer in an established company where acquired knowledge and
skills will be utilized towards continuous growth and advancement.

AREAS OF INTEREST
Graphics Designing, Computer Hardware, Electronics, Internet, Information and Technology, Music and
Computer Gaming.

EDUCATION
MAPUA INSTITUTE OF TECHNOLOGY
B.S., Computer Engineering (Candidate for Graduation, May 2008)
SAINT LOUIS COLLEGE VALENZUELA
Elementary and High School Diploma

WORK-RELATED EXPERIENCE
Elementary/ High School Tutor - Advanced Tutorial Center (ATC) October 2002 - December 2003

EXTRA-CURRICULAR ACTIVITIES
Vice President - Computer Engineering GC Class January-March 2008
Board of Director - Chairman - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT
July-December 2007
Board of Director - Member - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT
January-June 2007
President - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT July - December 2006

External P.R.O.- Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT July 2005 -
December 2005
Property Committee - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT January
2005 – June 2005
Member - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT August 2002 - Present

RESEARCH PAPERS AND PROJECTS HANDLED


SMS Security System System Design that alerts the owner through SMS if it anyone or anything had
breached the protected area.
Kaka-Pizza A feasibility study on a “unique” Rice-Pizza restaurant.
Ion Pump Application, “Self-Cooling Microchip” A comparative research between Ion Pump Application,
“Self-Cooling Microchip” to “Heat Sinks and Cooling Fans”
C++ Compiler A basic C++ Compiler inside C++ platform.
Walker Spider Robot A Zilog-based six-legged walking robot.
Basic Microcomputer System A Microcomputer system using basic logic gates capable of basic arithmetic
functions and storage.

TRAININGS AND SEMINARS ATTENDED


IPTV - January 2008
GSM BSS Dimensioning - January 2008

87
Flash Based Storage Solutions - January 2008
Financial Management for new Yuppies - January 2008
Semiconductors - January 2008
Fundamentals of UNIX HP-UX - October 2007
Semiconductor Manufacturing Process - May 2007
Global Warming - May 2007
Computer Clustering - November 2006

TECHNICAL SKILLS
Proficient in Windows based applications (Microsoft Office, Multisim, ISIS, ARES); Advanced knowledge in
Adobe Photoshop CS3; Knowledgeable in electronic/logic circuits and pc troubleshooting; Basic knowledge
in Visual Basic, C++ and Assembly programming languages;

PERSONAL DATA
Born in Ligao, Albay on March 28, 1984. Single, Filipino citizenship, Roman Catholic. Good leadership skills.
Good oral and written skills Likes computers, sports and stringed musical instruments. Reliable, analytical
and diligent. Willing to take extensive training. Easily adapts to environment.

88

Вам также может понравиться