Академический Документы
Профессиональный Документы
Культура Документы
by
Peter G. Battung
Cherryl Mae M. Bilocura
Jamar E. Dejarme
Jobelle L. Jose
Fritz Richard J. Quiras
This is to certify that this design study entitled “SMS Security System” prepared by
Peter G. Battung, Cherryl Mae M. Bilocura, Jamar E. Dejarme, Jobelle L. Jose,
Fritz Richard J. Quiras in partial fulfillment of the requirements for the Degree
Bachelor of Science in Computer Engineering have been supervised the preparation of
the read the design documentation and hereby recommended for final examination by the
Oral Examination Committee.
Accepted in partial fulfillment of the requirements for the degree Bachelor of Science in
Computer Engineering.
ii
ACKNOWLEDGMENT
First of all, the group would like to thank Almighty God for giving His guidance
to finish this Project design and also, for giving the group enough strength to face all the
hardships that they had encountered during the completion of their design.
The group would like to extend their deepest gratitude to their parents for
supporting the group in terms of the finances and their moral support to finish the project
design.
The group would also like to extend their gratitude to all their friends and
classmates for giving them support whenever they needed them and for helping the group
in the testing periods of the system. And to our adviser, Engr. Danilo Tiongco for
helping us whenever we need supervision.
And lastly, the group would like to thank Engr. Noel B. Linsangan for sharing his
knowledge to his students.
iii
TABLE OF CONTENTS
TITLE PAGE i
APPROVAL SHEET ii
ACKNOWLEDGEMENT iii
LIST OF TABLES vi
ABSTRACT viii
Bibliography 35
iv
v
Curriculum Vitae 80
LIST OF TABLES
vi
LIST OF FIGURES
vii
ABSTRACT
The design used in this study was a security system. For application purposes, the
project was designed for a small closed room. “SMS Security System” is a design system
that enables you to know if anyone or anything has entered a secured room. The design
is equipped with software that displays the current video footage of the room and records
whenever there is an “intruder”. The system works using a camera that captures and
displays a video footage of the room being surveyed. The program that was designed
only recorded the video whenever the program detected a disturbance or change in the
surveyed area. This was done by specifying the sensitivity of the program. Once an
intruder was detected by the system, the system would automatically send a text message
to the owner alerting them of a possible burglar and turning on the attached device. To
be able to make sure that the design was reliable, it was tested in different working
conditions and possible scenarios. Based on these tests, it was found out that almost all
types of movement could be detected by the designed system regardless of its intention.
The system, if performed as expected, it would be helpful when it comes to security and
could warn the authorities/owner of possible burglar.
viii
Chapter 1
INTRODUCTION AND REVIEW OF RELATED LITERATURE AND STUDIES
RESEARCH SETTING
The use of cellular phone nowadays is so popular that almost everybody owns
one. Text Messaging is a popular mode of communication for Filipinos. With the use of
have engaged in burgle. Daily news tells us to be more cautious on these problems so as
to avoid being a victim. House, office, and even secured establishment are being targeted
by criminals. Precautionary measure and security gadgets have been done and installed,
In view of all these, we have designed a possible way to give surveillance for a
small closed room and warn immediately the owner of any intruder that may enter the
premises.
get more information why security at home is very important. According to Greg Hall in
his Article entitled “Why Home Security Is Important In This Day And Age,” published
by New Ezine Articles that these days’ thieves are able to just walk in because of the lack
of home security. Typically the thieves that are stealing from you have a home security
system and you don't. Now don't you see something wrong with that? Some 40% of
thieves are able to just walk right into the homes where they intend to rob.
1
2
The other good lock to come onto the market is the fingerprint door lock. It reads
the fingerprint in which is supposed to be able to enter the home and it scans the finger
for the right print to open the door. That is smart if you have a thief who can get around
that then you have problems. I don't see how a person could get around, something so
sophisticated like that. Unless they are family and just want to rob you.
You will just simply want to go to a store and get a good lock for your door or
maybe even two. The more locks the harder it is going to be for a thief to break into your
home. So just go to the store and ask a helper who works there about the best type of lock
It doesn't matter about the lock on the door, you also need to have a high quality
or at least a good quality door. If you do not have a good door then they can just kick it
down and walk right into your home. You want to have a big heavy sturdy door. With a
sturdy heavy door and a good set of dead bolts, you are in business and you are going to
If you still cannot find what you are looking for, then you need to go online and
start looking for one. You will be able to get many ideas online which you wouldn't be
able to find in stores today. You may go into a store and they may be sold out of the stuff
in which you need to buy. That is why shopping or at least looking online is good
because you can either buy the things you need online or you can just get good ideas
from sites.
to be, we searched for previous studies that could give us an idea on how the system
could be developed. We were able to find at least a couple of projects done by fellow
3
Mapuans which gave us information on how can we achieve our objectives for this
project. The MCU Coin-Operated TextBooth created by a group headed by Mr. Calupitan
gave us an idea on how can we use a cellular phone to automatically send a SMS to a
person whenever our security system detects an intruder in a surveyed area. By using the
information we got from their design documentation, we were able to come up with a
way on how a microcontroller can be used to control devices like cellular phones and
alarms. Another design project done by a group headed by Mr. Cunanan, the Securi-
Child A. B. S. also uses SMS technology to send message to parents on the login and
logout of their children at school. This information gave us ideas on how to interface our
hardware wirelessly because the control of the security system must be in a different
interface the cellular phone to send a SMS that will contain information as an alert to the
Using the mentioned studies above, we were able to find out that we could use AT
command line starts with "AT" or "at". That's why modem commands are called AT
commands. Many of the commands that are used to control wired dial-up modems, such
as ATD (Dial), ATA (Answer), ATH (Hook control) and ATO (Return to online data
state), are also supported by GSM/GPRS modems and mobile phones. Besides this
command set that is specific to the GSM technology, which includes SMS-related
commands like AT+CMGS (Send SMS message), AT+CMSS (Send SMS message from
4
storage), AT+CMGL (List SMS messages) and AT+CMGR (Read SMS messages).
After finding ways on how the security system could be developed, we wanted to
know what cameras were mostly used in security systems. In an article entitled “The
Truth About Infrared Security Cameras” by Dean Caporella, New Ezine Articles in
considering an infrared security camera system, we must be aware that we'll come across
what are known as night vision cameras. There is a subtle difference. Many people are
confused about the two but the truth is, night vision or day/night cameras don't have
infrared capability. The former has the ability to produce images in total darkness while
the latter doesn't. There is no suggestion here that one is better than the other and your
circumstances will play a big part in which way you decide to go. The said article
explains the difference between the two and their respective abilities as security
Infrared Security Cameras uses LED (light emitting diode) which gives it the ability
to take images in darkness. With a little light to work with, these images can increase in
businesses and residential properties which have what is known as "blind spots."
Basically, a blind spot is an area that is not prone or devoid of any lighting and it's
usually the first choice entry point for intruders. Without effective security, going from
these "blind spots" and entering the property is usually an easy assignment but with
The ability to take color pictures during the day time and then revert to black and
white at night is one of the main features of this camera. In fact, when the sun sets the
camera will actually switch to infrared. It's rare that any business or home property is in
5
absolute total darkness simply for the reason that there is some light either being emitted
from the street lighting or in the shape of the night time stars.
There has been an argument for and against an infrared security camera vs. a night
vision camera. If you live in a suburban area with well lit streets then day/night cameras
should be enough. Consider whether you are ever going to be in a situation where your
property will be immersed in total darkness. This is usually rare in any area. Another
comparison that needs to be made is the expense of running infrared cameras opposed to
night vision models. The former requires more power but it's questionable whether this
Based on most of the articles and journals we found, the type of camera that best
Application Recorded
Software Video
Video Feed
Microcontroller SMS Alert
Message
SMS Sending
Independent Dependent
INPUT PROCESS OUTPUT
Figure 1. Conceptual Framework of SMS Security System
Using the conceptual framework model (as shown in Figure 1 above), the system
made use of a Surveillance Camera as the input source. The process will then be handled
by a computer installed with the software we have developed. The monitor and the
cellular phone are used to display the output. The input element is the video footage
coming from the camera. On the other hand, the output elements are the recorded video
which will be saved on the hard disk of the computer and can be played in almost all
video players; and the SMS alert message which would be sent to the recipient’s cellular
phone.
The program works by detecting a distortion in the video feed it receives from the
camera. If the distortion reaches the sensitivity specified in the software it will then
records the video feed until no distortion has occurred for a few seconds and also sends a
signal to activate the transmitter. The transmitter box will send a signal to the receiver
box. The receiver will then activate the messaging system and the device connected to
it.
6
STATEMENT OF THE PROBLEM
How can we feel safe and secure being away from home? This is the main
concern of all. The challenge of our group is to come up with a security system that is
motion is detected.
2. To create a controller for the cellular phone so that it can send a message
when triggered.
technology.
Even we have locks for our home and doors people have still found ways to get
around them. All they need is a certain set of burglary tools and they are in. It is simple
for a home invader. This is why it is important that we get a security system installed in
our home so we don't have an invader and break in occurring in our home. If this scenario
had occurred, the system will warn the owner that there had been an intruder, upon break
in, it would only take a few seconds until the owner receives the SMS; warnings like this
7
8
can be the factor if the burglary would be a success or a failure. And the recorded video
all the knowledge we acquired while we are studying in Mapua Institute of Technology.
SCOPE
2. An alert will be triggered when there is motion on the captured video that
3. The device attached will be activated, records the video and sends a SMS
4. The computer will record the video feed and save it on the hard disk.
6. The camera can be installed within 30 meters away from the computer.
DELIMITATIONS
installed.
2. The design is tested using only one cellular phone model, the Nokia 6210.
The efficiency and reliability of using other cellular phone models is not
3. The cellular phone uses prepaid cards as credits. Once it runs out of
(www.wikipedia.org)
(http://www.intel.com/products/glossary)
a PC). (www.wikipedia.org)
9
10
RELAY An electrical switch that opens and closes under the control of
of contacts. (www.wikipedia.org)
swapping). (www.wikipedia.org)
(/www.micro2000uk.co.uk/hardware_glossary.htm)
measurements. (www.amv-services.com)
(www.webopedia.com)
Chapter 2
RESEARCH DESIGN
The project design used both the Descriptive and Experimental research.
Descriptive research was used to search for the facts with enough information that was
needed in the project design. The research was mainly focused on finding what materials
to be used for the design. This was done by reading books as well as articles found in the
Internet. We also consulted with people who have knowledge regarding the project. In
addition to that, descriptive research was used because the relationship of the variables
was taken into consideration.
The following variables were taken into consideration in this project:
1. area of the room
2. the ease of installation of the camera for the purpose of presentation
3. lighting condition in the room being surveyed
4. distortion of the image captured by the IR camera
Experimental research was also used to determine the compatibility of the materials to be
used in the project design. With this, the group was able to determine and to finalize
what materials and components were considered best to use for this type of project
design.
DESIGN PROCEDURE
2. Gathering data
5. Software Programming
12
13
6. Acquisition of Materials
7. Hardware Assembly/Construction
8. Testing
GATHERING DATA
To be able to achieve the goals, the researchers conducted the study by asking the help of
their colleagues and professors. Upon gathering all the information needed, they have
come up with a design that had a camera, cellular phone and it would be controlled by a
For demonstration purposes, the system was installed in one of the classrooms in Mapua
Institute of Technology. The camera was attached to the center of the wall facing the two
doors of the classroom. All of the equipments used in this design were inside a room.
HARDWARE DESIGN
The materials used in this design (shown in Appendix A) were purchased in Hua
materials were picked to make sure the design would be affordable without sacrificing
HARDWARE COMPONENT
The main component of this design was the microcontroller. It was used to trigger
the alarm as well as the SMS alert. The microcontroller used was the PIC16F877. Here
are the reasons why the researchers decided to use this type of microcontroller:
Another component of this design was the Nokia 6210 that was connected in the
receiver box. It was affordable and it had a built-in modem that used AT- commands.
Relays were also used in both the receiver and transmitter box. The relay acted as switch.
Whenever the program outputs a signal of 1 on the parallel port’s D4 and D5 (Figure 2),
the relays switched ON the alarm attached to the receiver box and commanded the
14
15
CIRCUIT DESIGN
After all the data gathering and research, the researchers created a schematic
diagram of the circuit using the software called Proteus Virtual System Modelling
(VSM). The schematic diagram of the circuit is shown in Appendix C. After all the
The system diagram as show in Figure 3 shows how the design will be connected.
As seen below, the camera is connected to the computer with the aid of a TV tuner. The
receiver box which contains the microcontroller will be controlled by the software which
will be installed on the computer. The receiver box will communicate with the computer
that has a security program using a wireless transmitter. The microcontroller used in this
in activating the alarm attached to the system and will also send a SMS using the Nokia
6210 cellular phone once an intruder is detected. The program installed on the computer
16
will serve a sensor and will also be responsible in recording the video just in case an
intruder is detected.
Video Cable or
S.Video Cable
Video Feed IR Camera TV Tuner
USB
Interface
Receiver Box
Parallel Port
Nokia 6210 Transmitter Interface Desktop/Laptop
Cellular Computer
Box
Phone
SMS
SOFTWARE COMPONENTS
Visual Basic was the language used to create the program for our system. In
order for the program to work, IO.DLL should be in the system32 of the computer.
VideoCapX must also be installed and added as a component in visual basic. The
program started by initializing the IO.DLL and by setting all data ports to zero (0).
The program developed has a very simple logic. As shown in the flowchart
(Figure 5), once the program is activated, it automatically detects movement in the
surveyed room. A sensitivity of two (2) was used to make use that the system performed
recording the video coming from the IR camera. The program continued to record until
the movement stopped or once the motion in the room was less than 2 again. Once the
sensitivity was below 2 again, the program waited for ten (10) seconds. If a movement
was detected by the system within that 10 seconds period, the system continued to record
the video. If there was no movement within that period, the recording stopped and the
recorded video would be stored to the computer’s hard disk. The program consisted of
17
SYSTEM FLOWCHART
Start
Activate software
Detect motion
Y
Capture Video
Send SMS Alert to owner
Activate Attached Device
N
Terminate Application?
Y
End
18
Chapter 3
This chapter focused on the analysis and interpretation of the data gathered using
experimental method to test the performance of the system that was designed. These data
gave an overview on how the system would perform on certain conditions and how
The system was designed in such a way that very small movements from pests
like rats, cockroaches, flying mosquitoes and the like would not trigger any false alarm to
the users. The researchers considered certain elements like dust, insects and other
environmental factors that would not trigger a false alarm. This was done by making sure
that the sensor was sensitive enough without sacrificing the systems quality. By trial and
error, the researchers were able to set the appropriate sensitivity of the system. The
stated conditions for a specified period of time was very important. Since no system was
100 percent accurate, there should be an assurance that the system designed would output
19
20
The system was first tested in broad daylight. Since the camera covered a limited
range of 110°(based on camera’s specification), it was tested first with all the movements
done within a distance of 2 ft from the camera and an angle of 90°. Please see Figure 5.
Based on the results shown in Table 1, all the movements done within 90° of the
camera’s scope and with a distance of 2 ft from where the camera was installed would
21
trigger the system. The said movements; walking, running, opening of the door and
throwing of big objects within a size of a basketball, throwing of small object within a
size of a baseball and waiving of hand were detected because they caused a large
distortion of more than 40% of the area of the video feed. The system was able to detect
those movements as an intrusion so the alarm was triggered and a SMS alert was sent.
After testing the system within the conditions stated in Table 1, some of the conditions
varied and tested the system again. All the same movements were done within a distance
Based on the results shown in Table 2, all the movements triggered the alarm of
the system just like before. The system was able to detect those movements as an
intrusion so the alarm was triggered and a SMS alert was sent. The system did this
because within these conditions, all the movements stated on the table caused a distortion
of at least 20% of the area of the captured video feed. After the second testing of the
system within the conditions stated in Table 2, some of the conditions varied again and
tested the system again. All the same movements were done within the same angle of
Based on the results shown in Table 3, the first 4 movements triggered the alarm
of the system just like before and a SMS alert was sent. However, the last 2 movements
were not detected by the system. Movements like walking, running, opening of the door
and throwing of big objects within a size of a basketball caused a distortion of at least 5%
of the area of the captured video feed while throwing of small object within a size of a
baseball and waiving of hand caused a distortion of 2% of the area of the video feed. The
tests were repeated with the conditions stated in table 4 but still got the same results. The
researchers came with a hypothesis that the system could be triggered by a distortion of at
least 5% of the area of the video feed. All movements that would cause distortions of
below 5% of the area of the video feed would not trigger the system.
After the tests, the researchers were not satisfied, so they conducted more series
The researchers tested it again by varying the angle where the movement was
done. First they tried the same movements stated in the Tables 1, 2 and 3 but within an
angle of 45° from the camera (see Figure 6). The results were shown in Tables 4.a and
4.b.
Based on the results in Tables 4.a and 4.b, the system was able to detect the
movements like walking, running, opening a door and throwing a big object as an
intrusion no matter how far it was from the camera. However, referring to Table 4.b, the
last 2 movements were still not detected by the system when the testing distance was 22
ft because they caused a distortion of below 5% of the area of the video feed.
Varying the angle to 55° as shown in Figure 7, did not vary the output of the
Based on the results in Table 5, the system was able to detect the movements like
walking, running, opening a door and throwing a big object as an intrusion. But then
again, the last 2 movements were still not detected by the system when the testing
distance was 22 ft because they caused a distortion of below 5% of the area of the video
feed.
26
Varying the angle to 75° as shown in Figure 8, did not again change the results.
The results shown in Tables 6.a and 6.b are just the same in the results shown in
previous tables. This means that as long as the movement being done is still within the
scope of the camera, the system can be triggered. We have also observed that the last
two movements (throwing of small objects and waiving of hand) within a distance of 22
ft on any angle from the scope of the camera was still not detected as an intrusion
because those movements caused distortions of below 5% on the area of the video feed.
Once those said movements were done closer to the camera, the movements were easily
We could still see that there is still a blind spot referring to Figure 9. This is the
disadvantage of using only one camera. To be able to solve this limitation, the group
would like to recommend the use of multiple cameras to achieve maximum coverage.
However, the reliability of using multiple cameras is not covered in this study.
Since most of the time the security system is activated during night time or in
total darkness, the researchers also tested the system during night time without use of any
lighting. Since the researchers were using an IR camera which was designed to be used as
a night vision, they could still see the video feed as if there was an aid of light as shown
Based on the results shown in Table 7, there is no difference in the output of the
system even if the system is activated during night time. All movements were still
detected as an intrusion within the range of 90° and a distance of 2 ft because it caused a
large distortion of more than 40% of the area of the video feed just like the results in
Table 1.
29
Varying the distance to 12 ft. where the movements were done during night time
did change the output of the system. Just like what was discussed in Table 2, the
movements caused a distortion of at least 20% of the area of the captured video feed.
After the second testing of the system within the conditions stated in Table 8, the distance
was varied and the system was tested again. All the same movements were done within
the same angle of 90° but with a distance of 22 ft. Please refer to Table 9.
Based on the results gathered in Table 9, the system still performed the same even
during night time. The first 4 movements triggered the alarm of the system just like
before and a SMS alert was sent while the last 2 movements were not detected by the
30
system at the distance of 22 ft. It was decided to vary the angle to 45°. Please refer to
Table 10.
Based on the results gathered in Table 10 which were in night time operating
condition, the system still performed the same as if it used in day time. This means that as
long as the movement being done was still within the scope of the camera, the system
could be triggered. It was observed that the last two movements (throwing of small
objects and waiving of hand) within a distance of 22 ft on any angle from the scope of the
camera was still not detected as an intrusion because those movements caused distortions
Based on the results in Table 11, the system was able to detect the movements
like walking, running, opening a door and throwing a big object as an intrusion. But
then, the last 2 movements were still not detected by the system when the testing distance
was 22 ft because they caused a distortion of below 5% of the area of the video feed.
32
Based on the results obtained in Table 12, the system produced same results as
compared to other tables that have different angles and in day time operating condition.
After all the tests with the system the researchers were able to come up with some
general observations:
surveyed room as well as the distance of that movement from the IR camera.
4. Approximately 5% distortion on the area of the video feed was needed to consider
Conclusions
After the group developed and tested the device, the following were drawn:
1. A program created using Visual Basic was used in order to detect intrusion on a
secured room based on the video feed coming from an IR camera.
2. A microcontroller was used to send a SMS alert to the owner and to trigger the
device attached to the system whenever an intruder was detected in the secured
area.
3. To be able to make sure that the system developed was reliable and accurate, it
was tested to several working conditions. To achieve maximum reliability and
accuracy of the system, a sensitivity of 2 was used in the said program.
Recommendations
perform better.
2. Make use of GSM module instead of Nokia 6210 to assure that the SMS alert will
be more stable.
3. Collaborate with the cellular network providers to decrease the expense for text
messaging.
4. Use more than one camera to achieve maximum coverage and avoid any blind
spots.
34
BIBLIOGRAPHY
Deitel, Harvey; Deitel, Paul J. (2001) Visual Basic 6 How to Program, 2nd Edition
Greg Hall , New Ezine Articles “Why Home Security Is So Important In This Day And
Age”
Dean Caporella, New Ezine Articles “The Truth About Infrared Security Cameras”
35
APPENDICES
APPENDIX A
37
Appendix B
38
Appendix C
PCB Design
39
40
Pc Interface Circuit
Appendix D
Private Declare Sub PortOut Lib "IO.DLL" (ByVal Port As Integer, ByVal Data As
Byte)
Private Declare Function PortIn Lib "IO.DLL" (ByVal Port As Integer) As Byte
Dim num As Integer
Dim filename As String
41
42
End If
End Sub
VideoCapX Commands
44
45
46
Appendix F
Device = 16F877
'--------------------------------------------------------------------
' Define Osc 4
'--------------------------------------------------------------------
XTAL = 4
'--------------------------------------------------------------------
' HARDWARE DEFINES
'--------------------------------------------------------------------
HSERIAL_BAUD = 9600 ' Set baud rate to 9600
HSERIAL_RCSTA = %10010000
HSERIAL_TXSTA = %00100100
ALL_DIGITAL = TRUE
'--------------------------------------------------------------------
ADCON1 = 7
OPTION_REG.7 = 0
TRISA = %000000
TRISD = %00000000
TRISB = %00000000
TRISC = %10000000
TRISE = %000
'--------------------------------------------------------------------
Symbol LOAD1 PORTD.0
PORTD = 0
'--------------------------------------------------------------------
; START SMS PROTOCOL
'--------------------------------------------------------------------
MAIN:
HSerOut ["AT" ,13]
HSerIn 1000, [Wait("K")]
HSerOut ["AT+CMGF=1" ,13]
HSerIn 1000, [Wait("K")]
LOOP:
If PORTB.6=1 Then
GoTo SENDOK
EndIf
GoTo LOOP
47
48
;----------------------------------------------
; SEND Message
;---------------------------------------------
SENDOK:
HSerOut ["AT+CMGS=",34,"09198158760",34,13]
DelayMS 1000
HSerOut ["INTRUDER DETECTED ",26]
DelayMS 500
;-------------------------------------
; SMS DELETE Message(s)
;-------------------------------------
DELETE:
DelayMS 200
HSerOut ["AT",13]
DelayMS 200
HSerOut ["AT+CMGF=1",13]
DelayMS 200
HSerOut ["AT+CMGD=0",13]
DelayMS 200
DelayMS 200
HSerOut ["AT+CMGD=1",13]
DelayMS 200
DelayMS 200
HSerOut ["AT+CMGD=2",13]
DelayMS 200
DelayMS 200
HSerOut ["AT+CMGD=3",13]
DelayMS 200
DelayMS 200
HSerOut ["AT+CMGD=4",13]
DelayMS 200
GoTo LOOP
End
Appendix G
49
50
(Looking from outside on the connector, keypad is on top. This description is valid for
51xx, 61xx and 71xx phones)
100-600uA
Accessory mute >2. 5V not Muted out
<1. 5 muted
Headset detection >1. 5 not Headset/DATA In
Mode
52
Appendix I
53
54
55
56
Appendix J
57
58
Appendix K
59
60
61
62
63
64
Appendix L
65
Appendix M:
66
67
68
69
70
71
72
Appendix N
User’s Manual
1.1 Welcome!
Before you can use the system, you must set up the hardware and install the software.
Please check the components with the list below:
1.2 Components
Transmitter Box
73
-a free USB2.0 slot or USB2.0 interface expanded card equipped
1.4.2 Browse the contents of the support CD to locate VideoCapX.exe from the support
folder. Double-click the VideoCapX.exe to run the setup of VideoCapX.
1.4.3 Follow the instructions of the installation until end of VideoCapX installation
setup.
1.4.4 Make it sure that the TV tuner is connected to your PC(please refer to 1.5.1).
Browse the contents of the support CD to locate Setup.exe from the UTV 330
Driver folder. Double-click the Setup.exe to install the UTV 330 driver. Follow
the instructions of the installation until the end of VideoCapX installation setup.
1.4.5 Browse the contents of the support CD to locate setup.exe. Double-click the
setup.exe to run the setup.
74
1.4.7 Click the button that says “Click this button to install SMS…” for automatic
installation or click the “Change Directory” to change the installation folder.
Follow the instructions of the setup until the end of installation.
1.4.8 After you see the image above. The installation of the SMS Security System V1.0
is complete.
1.5.1 TV Tuner – Connect the S.Video cable to the S.Video marked socket in the TV Tuner.
The other end of the S.Video cable is connected to the IR camera. Then connect the USB
cable to the USB marked socket in the TV Tuner then connect the other end to the
free USB2.0 slot or USB2.0 interface expanded card equipped PC. Then install its
driver (please refer to 1.4.4).
IR Camera
PC
TV Tuner
75
1.5.2 IR Camera - You can mount the IR camera to where you want to place it.
TV tuner
AC Adaptor
IR Camera
220V AC
1.5.3 Transmitter Box – Plug it into a 220 V AC socket then follow the figure below.
PC Parallel
port
1.5.4 Receiver Box – Plug it into a 220 V AC socket. Open its cover. Inside you will
see the cell phone interface cable for the Nokia 6210 and a red LED. Attach
Nokia 6210 to the interface cable. You will know if the Nokia 6210 is properly
connected when the red LED is turned off. Place the Nokia 6210 inside then put
the cover back on. The owner’s cell phone number is preinstalled inside the
program of the receiver box. The SIM card inside the Nokia 6210 is replaceable.
220V AC
Zoom in on
the red LED
Nokia 6210
Lift the cover upward
Cell phone
interface cable
76
2. USING THE SYSTEM
After the hardware setup and software installation, you may now use the SMS Security
System V1.0
2.1.1 CLICK Start All Programs SMS Security System V1.0 SMS Security
System V1.0
2.1.2 The SMS Security System V1.0 should be loading and you should see the User
Interface (please refer below.).
1 2 3 4 5
1. Show time on-video – clicking this check box will show/hide the date and time
on the video preview and on the recorded video.
77
3. Motion Detect Indicator – this indicator will light if there is a motion/distortion
in the video preview.
4. Device Indicator – this indicator will light if the device attach to the Receiver
box is active.
5. DEVICE switch button – clicking this button will activate/deactivate the device
attach to the Receiver box. If this button is red, the system is not active.
If the button is green the device attached is activated.
2.1.3 Click the MOTION DETECT switch button and your set to go. (MOTION DETECT
switch button is green.) The SMS Security System is now active.
2.2.1 You can turn off the SMS Security System V1.0 by clicking on the MOTION
DETECT switch button. (MOTION DETECT switch button is red.)
2.2.2 If you want to use the system again, you can turn on the system anytime you want it
to be activated.
2.2.3 If you will not use the system, you can close the program by clicking the Close
button.
2.2.4 Unplug the Receiver box, Transmitter Box, and the IR Camera from the AC Socket.
Safely remove the USB of the TV Tuner from the PC.
You can do manual tests to insure that the system continues to function as intended. It is
important that you test them weekly.
78
3.1 To know if the system is running in perfect condition, you can turn the system on;
waive your hand in front of the IR camera. The Motion Detect Indicator and the Device
Indicator should light and a video recording should take place (Notice in the title bar
saying “Capturing...”) and you should be receiving SMS on your cell phone saying
“INTRUDER ALERT”. You can view the recorded video inside the default directory.
(The default directory is “C:\”)
3.2 To manually test the device attached to the Receiver Box, you can click on the
DEVICE switch button. The device should be turned on and the DEVICE switch button
is green. Click again to turn it off.
4. TROUBLESHOOTING
4.2 Why you did not receive any SMS on your cell phone when you do manual tests?
-Please check if the Nokia 6210 inside the Receiver Box is properly connected.
(Please refer to 1.5.4) If it does not solve the problem please check if the SIM card in the
Nokia 6210 has prepaid credits.
Important Notice
A security system cannot prevent emergencies. It is only intended to alert you and, if
included, a monitoring station, of an emergency situation. Security systems are generally
very reliable but they may not work under all conditions and they are not a substitute for
prudent security practices or life and property insurance. Your security system should be
installed and serviced by qualified security professionals who should instruct you on the
level of protection that has been provided and on system operations.
79
CURRICULUM VITAE
PETER G. BATTUNG
Address: Iñga, Enrile, Cagayan
City Address: 1130-E Natividad Lopez St. Ermita, Manila
Mobile: 09206384963 / (02)5276254
Email: peter_battung@yahoo.com
AREAS OF INTEREST
Electronics, Data Communications, Computer Organizations/Networks, Information and Technology,
Research and Project Management
EDUCATION
Mapua Institute of Technology
Bachelor of Science in Computer Engineering
Candidate for Graduation
Adamson University
st
Bachelor of Science in Computer Engineering 1 year
St. Louis College Tuguegarao City
High School Year Graduated: 2001
Iñga Elementary School
Elementary Year Graduated: 1997
TECHNICAL SKILLS
Knowledgeable in Programming using Turbo C++, JAVA, and Assembly
Knowledgeable in PC Troubleshooting
Knowledgeable in using Multisim, AUTOCAD, and PSpice
Knowledgeable in using the internet for collecting and downloading of information
Proficient in Microsoft Office 2003 (Word, Excel, PowerPoint, Publisher,and FrontPage), Internet;
Knowledge in C#.net
Knowledge in manipulating MS SQL Database
SEMINARS ATTENDED
VLSI Designing August 7, 2007
Network Troubleshooting August 14, 2007
Silicon Interposer Resistivity Systematized Selection for Enhanced Bluetooth RF Performance
August 21, 2007
Bridging the Campus Career-Gap August 28, 2007
Familiarization Course on ISO 9001:2000 Standard August 30, 2007
PERSONAL DATA
Born in Iñga, Enrile, Cagayan on September 24, 1984. Single, Filipino citizenship, Roman
Catholic. Proficient in written and verbal English. Dependable, analytical and hardworking. Can
work under pressure with minimal supervision. Can work well with a team.
81
CHERRYL MAE M. BILOCURA
City Address: 838 Tolentino St. Ph. 5 Gatchalian Subd. Las Piñas City
Mobile Number: 0915-2149717
Email Address: cherrylmae.bilocura@gmail.com; my_boo1209@yahoo.com
OBJECTIVE
To pursue continuous learning, use the knowledge and skills that I have acquired in my field of
specialization, and commit myself in my chosen career.
AREAS OF INTEREST
Software development, Web development, Information Technology, Network administration, Electronics
and Computer Systems design, Research and Project management, and Computer troubleshooting
EDUCATION
MAPUA INSTITUTE OF TECHNOLOGY
B.S. Computer Engineering (2002-Present)
St. Joseph’s Academy
Elementary and High School Diploma (1992-2002)
EXTRA-CURRICULAR ACTIVITIES
Institution Moving towards the Advancement of Computer Engineers (IMACOE) – SY2005 to 2006
An exclusive organization of Computer Engineering Students of Mapua Institute of Technology
Position: Secretary
RESEARCH PAPERS AND PROJECTS HANDLED
Software Design on Automated Airline Ticketing System
• a software engineering project designed to process reservations, cancellations and admistrative
functions for airline ticketing
Visual Basic 6 compiler
• a compiler written in turbo C++ that compiles selected visual basic 6 commands
Power Supply
• an electronics design project that convert alternating current to direct current with voltage
regulation
TRAININGS AND SEMINARS ATTENDED
Fundamentals of UNIX (HP-UX) - April to July 2005
Systems and Network Administration 1 (HP-UX) - July to Sept 2005
Openview Network Management (HP-UX) - Jan to Mar 2005
Systems and Network Administration 2 (HP-UX) - May to July 2007
POSIX Shell Scripting (HP-UX) - April to July 2006
Seminar on Flash MX: Action script (MIT) - Nov 24, 2003
TECHNICAL SKILLS
Knowledgeable in Hardware (Logic Design and Basic PC Troubleshooting), Software Design,
Knowledgeable in Programming (using Turbo C++, MS SQL, VB6,Assembly Language, Prolog), POSIX Shell
Scripting (HP-UX), System / Network Administration (HP-UX), Proficient in Microsoft Office (Word, Excel, and
PowerPoint), Windows Operating System, HP-UX Operating System.
PERSONAL DATA
Born in Pasig City on July 19,1985, 5’4 inches in height, Single, Filipino citizen, Roman Catholic, Excellent
communication skills, fluent in written and spoken English and Filipino, Likes reading, watching DVDs. Hard
working, reliable, Responsible, focused and fast – learner, Can work under pressure with minimal
supervision, Can work in a team or group.
82
JAMAR ESCABA DEJARME
Address: 239 Foundation of St. Joseph the Worker Ortigas Ave. Rosario, Pasig City
Telephone Number: (02) 901-96-28
Fax Number: (02) 915-10-80
Mobile Number: 09198158760
Email: jedejarme66@yahoo.com, jamar.dejarme@gxs.com
AREAS OF INTEREST
Software Development , Computer Networking, Electronics, Information Technology
EDUCATION
MAPUA INSTITUTE OF TECHNOLOGY
B. S. Computer Engineering
(Candidate for Graduation, May 2008)
WORK-RELATED EXPERIENCE
STUDENT TRAINEE (On-the-job-Trainee)
NCAS (Napar Contracting and Allied Services) - October to December 2007
Assisted the Software Quality Assurance division in testing the multilingual functionality of CheckPro
Manager.
TECHNICAL SKILLS
Proficient in Microsoft Office ’2003 (Word, Excel, and PowerPoint)
Knowledgeable in C++ Programming
Knowledgeable in UNIX
Basic Knowledge in Visual Basic .Net
Basic Knowledge in Visual Basic 6
Basic Knowledge in Assembly Language
Basic Knowledge in PC troubleshooting
Basic knowledge in AutoCAD, MATLAB
Basic knowledge Circuit Simulation Softwares (Multisim, Tina Pro)
Basic Knowledge in Application Integrator (AI)
EXTRA-CURRICULAR ACTIVITIES
Member - Institute of Electrical and Electronics Engineers Inc. (IEEE) MIT – January 2006 up to present
Vice President - Computer Engineering GC Class October - December 2007
CERTIFICATION
Cisco Intro Certified Cisco ID: CSCO11242984
83
Fingerprint Automated Cellphone
A research that involves developing a Biometric security system on cellular phones.
PERSONAL DATA
Born in San Pablo City, Laguna on October 17, 1986. Single, Filipino citizen, Roman Catholic, Above-
average communication skills. Can speak English and Filipino. Responsible, determined, futuristic and goal-
oriented. Can work under pressure and willing to learn.
84
JOBELLE L. JOSE
City Add: Block 06 Lot 15 Ina Exec. Homes, SAV – 1, Sucat, Parañaque City 1714
Tel. (02) 8257640
Mobile: +63915 - 9066186
Email: jobelle_jose@yahoo.com
AREAS OF INTEREST
Information and Technology, Project Management, Software Programming
EDUCATION
MAPUA INSTITUTE OF TECHNOLOGY
EXTRA-CURRICULAR ACTIVITIES
CHAIRWOMAN FOR BUDGET AND FINANCE – Pavilion Cardinals, MIT - S.Y. 2007 – 2008
Handles the finance of the organizations
MEMBER – Institution Moving towards the Advancement of Computer Engineering students, MIT -
S.Y. 2005 – present
Organized and coordinated internal and external activities for the organization.
VICE PRESIDENT – League of Peer Educators on Adolescent Development, MIT - S.Y. 2005 – 2006
and 2006 - 2007
Organized and coordinated internal and external activities for the organization.
COMMITTEE MEMBER – EE – ECE – CoE Student Council, MIT - S.Y. 2006 – 2008 and ,S.Y. 2005 –
2006
Assisted in organizing and executing various activities for the Department of EE – ECE - CoE
ASST. SECRETARY – Mapúa Central Student Council – Lower House (Council of Organizations) - S.Y.
2004 – 2005
Manages paperwork for the COO and keeps track of student organizations records
It is a system that will continuously sends a live feed from an IR cam to a computer. Once a motion has
been detected it will automatically record the video as well as send a text message to the owner to warn
about the intrusion. Additional devices may also be connected to the system (siren, flood light, etc.)
85
Semicon Manufacturing - January 26, 2008
Financial Management - January 26, 2008
Flash Based Storage Solution - January 29, 2008
GSM BSS Dimensioning - January 30, 2008
IPTV: Going Beyond Voice and Data - January 31, 2008
TECHNICAL SKILLS
Proficient in Microsoft Office ’2003 (Word, Excel, and PowerPoint); Proficient in C++ , Visual Basic and Turbo
Pascal; Knowledgeable in Adobe Photoshop; Knowledgeable in Autocad;
PERSONAL DATA
Born in Parañaque on March 11, 1986. Single, Filipino citizenship, Roman Catholic. Above-average
communication skills, fluent in English and Filipino. Likes sports, reading novels, watching movies and
listening to music. Dependable, analytical and hardworking. Can work under pressure with minimal
supervision. Can work alone or with group.
86
FRITZ RICHARD JAUCIAN QUIRAS
199 6th St. corner Narra St., Fortune Village 6, Valenzuela City, Metro Manila 1440
02 292 9187
0917 605 6108
@ fritzrichard@gmail.com
OBJECTIVE
To secure a position as a Computer Engineer in an established company where acquired knowledge and
skills will be utilized towards continuous growth and advancement.
AREAS OF INTEREST
Graphics Designing, Computer Hardware, Electronics, Internet, Information and Technology, Music and
Computer Gaming.
EDUCATION
MAPUA INSTITUTE OF TECHNOLOGY
B.S., Computer Engineering (Candidate for Graduation, May 2008)
SAINT LOUIS COLLEGE VALENZUELA
Elementary and High School Diploma
WORK-RELATED EXPERIENCE
Elementary/ High School Tutor - Advanced Tutorial Center (ATC) October 2002 - December 2003
EXTRA-CURRICULAR ACTIVITIES
Vice President - Computer Engineering GC Class January-March 2008
Board of Director - Chairman - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT
July-December 2007
Board of Director - Member - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT
January-June 2007
President - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT July - December 2006
External P.R.O.- Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT July 2005 -
December 2005
Property Committee - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT January
2005 – June 2005
Member - Study Organization Leading to Integrated EE-ECE-CoE Development (SOLID), MIT August 2002 - Present
87
Flash Based Storage Solutions - January 2008
Financial Management for new Yuppies - January 2008
Semiconductors - January 2008
Fundamentals of UNIX HP-UX - October 2007
Semiconductor Manufacturing Process - May 2007
Global Warming - May 2007
Computer Clustering - November 2006
TECHNICAL SKILLS
Proficient in Windows based applications (Microsoft Office, Multisim, ISIS, ARES); Advanced knowledge in
Adobe Photoshop CS3; Knowledgeable in electronic/logic circuits and pc troubleshooting; Basic knowledge
in Visual Basic, C++ and Assembly programming languages;
PERSONAL DATA
Born in Ligao, Albay on March 28, 1984. Single, Filipino citizenship, Roman Catholic. Good leadership skills.
Good oral and written skills Likes computers, sports and stringed musical instruments. Reliable, analytical
and diligent. Willing to take extensive training. Easily adapts to environment.
88