You are on page 1of 21

CHAPTER I

INTRODUCTION

Background of the Study

In this modern and fast paced world, security is more important than ever. It is one of the

fastest growing industries in the world today. Almost every day, one hears about burglary in the

news. There are many types of security nowadays that people can employ or install. Some would

prefer to hire security guards to avoid potential hazards and defend against dangerous situations.

But hiring bodyguards are really expensive and not all are willing to risk their life for yours.

There are security system nowadays that you can just install into your house and whenever there

is burglary being committed, authorities are informed. An example of such various types of

security is a passcode system. These security systems are very famous nowadays because it is

said to be more efficient than hired security guards (Building Security, 2017).

But since these security systems are very expensive to have, this led the researcher to

make an improvised, cheap yet still efficient passcode system. It is said to be made for those who

cannot afford to employ a body guard or install security systems. It will still work like an

installed security system, efficient yet not expensive. It would work on anything you want to

protect, your house’s doors, windows, vaults, etc.

Statement of the Problem

1.) Will the improvised passcode system’s battery life last longer than a week?

2.) Will the equipment for creating the improvised passcode system found in recycled

extra electric apparatus?


3. ) Will the improvised passcode system work efficiently?

Objectives

This study aims to produce a cheap yet efficient passcode system.

This study also aims to achieve the following:

1.) To have it working for at least a week.

2.) To recycle extra electric apparatus.

3.) To have a functional improvised passcode system.

Significance of the Study

This improvised passcode system would help people have a budget-friendly security

system. This would help those who worries their safety during their sleep or the belongings they

left during the day for work or a vacation. This would protect their homes just like any other

expensive security systems. This would also help the community and also our country to learn

how to recycle reusable electric apparatus that is no longer needed into creating an improvised

passcode system. In fact, we can help recycle this extra electric apparatus in order to create new

objects. It would not only help us on our rubbish wastes, it would also help us to be effective

citizens to create such new appliances.

Scope and Delimitations

The researcher only aims to produce an improvised passcode system. The researcher also

wants to test the effectiveness of the product and would it last at least for a week or even more.
The researcher only focuses to test the efficiency of the product and how long would it

last.

Definition of Terms

Security System- is a system designed to detect intrusion – unauthorized entry – into a building

or other area.

Efficient- achieving maximum productivity with minimum wasted effort or expense.

Body/ Security guards- are people you can employ to secure and protect you.

Burglary- entry into a building illegally with intent to commit a crime especially theft.
Chapter II

REVIEW OF RELATED LITERATURE


Security is freedom from, or resilience against, potential harm (or other
unwanted coercive change) caused by others. Beneficiaries (technically referents) of security
may be of persons and social groups, objects and institutions, ecosystems or any other entity or
phenomenon vulnerable to unwanted change by its environment. Security mostly refers to
protection from hostile forces, but it has a wide range of other senses: for example, as the
absence of harm (e.g. freedom from want); as the presence of an essential good (e.g. food
security); as resilience against potential damage or harm (e.g. secure foundations); as secrecy
(e.g. a secure telephone line); as containment (e.g. a secure room or cell); and as a state of mind
(e.g. emotional security). The term is also used to refer to acts and systems whose purpose may
be to provide security (e.g. security forces; security guard; cyber security systems; security
cameras; remote guarding). Since it is not possible to know with precision the extent to which
something is 'secure' (and a measure of vulnerability is unavoidable), perceptions of security
vary, often greatly. For example, a fear of death by earthquake is common in the United States
(US), but slipping on the bathroom floor kills more people and in France, the United Kingdom
and the US there are far fewer deaths caused by terrorism than there are women killed by their
partners in the home. Another problem of perception is the common assumption that the mere
presence of a security system (such as armed forces, or antivirus software) implies security. For
example, two computer security programs installed on the same device can prevent each other
from working properly, while the user assumes that he or she benefits from twice the protection
that only one program would afford. Security theater is a critical term for measures that change
perceptions of security without necessarily affecting security itself. For example, visual signs of
security protections, such as a home that advertises its alarm system, may deter an intruder,
whether or not the system functions properly. Similarly, the increased presence of military
personnel on the streets of a city after a terrorist attack may help to reassure the public, whether
or not it diminishes the risk of further attacks.

A security alarm is a system designed to detect intrusion – unauthorized entry – into a


building or other area. Security alarms are used in residential, commercial, industrial, and
military properties for protection against burglary (theft) or property damage, as well as personal
protection against intruders. Security alarms in residential areas show a correlation with
decreased theft. Car alarms likewise help protect vehicles and their contents. Prisons also use
security systems for control of inmates.Some alarm systems serve a single purpose of burglary
protection; combination systems provide both fire and intrusion protection. Intrusion alarm
systems may also be combined with closed-circuit television surveillance (CCTV) systems to
automatically record the activities of intruders, and may interface to access control systems for
electrically locked doors. Systems range from small, self-contained noisemakers, to complicated,
multirally systems with computer monitoring and control. It may even include two-way voice
which allows communication between the panel and Monitoring station.The most basic alarm
consists of one or more sensors to detect intruders, and an alerting device to indicate the
intrusion. However, a typical premises security alarm employs the following
components:Premises control unit (PCU), Alarm Control Panel (ACP), or simply panel: The
"brain" of the system, it reads sensor inputs, tracks arm/disarm status, and signals intrusions. In
modern systems, this is typically one or more computer circuit boards inside a metal enclosure,
along with a power supply.Sensors: Devices which detect intrusions. Sensors may be placed at
the perimeter of the protected area, within it, or both. Sensors can detect intruders by a variety of
methods, such as monitoring doors and windows for opening, or by monitoring unoccupied
interiors for motions, sound, vibration, or other disturbances.Alerting devices: These indicate an
alarm condition. Most commonly, these are bells, sirens, and/or flashing lights. Alerting devices
serve the dual purposes of warning occupants of intrusion, and potentially scaring off burglars.
These devices may also be used to warn occupants of a fire or smoke condition.Keypads: Small
devices, typically wall-mounted, which function as the human-machine interface to the system.
In addition to buttons, keypads typically feature indicator lights, a small multi-character display,
or both.ectInterconnections between components. This may consist of direct wiring to the control
unit, or wireless links with local power supplies.

System reliability and user error are the cause of most false alarms, sometimes called
"nuisance alarms." False alarms can be very costly to local governments, local law enforcement,
security system users and members of local communities. In 2007, the Department of Justice
reported that in just one year, false alarms cost local municipalities and their constituents at least
$1.8 billion.

In many municipalities across the United States, policies have been adopted to fine home
and business owners for multiple false alarm activations from their security system. If multiple
false alarms from the same property persist, that property could even be added to a "no response"
list, which bars police dispatch to the property except in the event of verified emergency.
Approximately 1% of police alarm calls actually involve a crime.[7][9] Nuisance alarms occur
when an unintended event evokes an alarm status by an otherwise properly working alarm
system. A false alarm also occurs when there is an alarm system malfunction that results in an
alarm state. In all three circumstances, the source of the problem should be immediately found
and fixed, so that responders will not lose confidence in the alarm reports. It is easier to know
when there are false alarms, because the system is designed to react to that condition. Failure
alarms are more troublesome because they usually require periodic testing to make sure the
sensors are working and that the correct signals are getting through to the monitor. Some systems
are designed to detect problems internally, such as low or dead batteries, loose connections,
phone circuit trouble, etc. While earlier nuisance alarms could be set off by small disturbances,
like insects or pets, newer model alarms have technology to measure the size/weight of the object
causing the disturbance, and thus are able to decide how serious the threat is, which is especially
useful in burglar alarms.

Many municipalities across the United States require alarm verification before police are
dispatched. Under this approach, alarm monitoring companies must verify the legitimacy of
alarms (except holdup, duress, and panic alarms) before calling the police. Verified response
typically involves visual on-scene verification of a break-in, or remote audio or video
verification.

Home and business owners can now choose a new type of keypad control panel designed to help
reduce false alarms.Based on a standard called CP-01-2000, developed by the American National
Standards Institute and Security Industry Association, the new generation of keypad control
panels takes aim at user error by building in extra precautions that minimize unwarranted
dispatch of emergency responders.

Some of the features of CP-01 keypads include a progress annunciation function that
emits a different sound during the last 10 seconds of delay, which hastens exit from the premises.
Also, the exit time doubles if the user disables the pre-warning feature.

Other "rules" address failure to exit premises, which results in arming all zones in Stay
Mode and a one-time, automatic restart of exit delay. However, if there is an exit error, an
immediate local alarm will sound.Alarms that utilize either audio, video, or combination of both
audio and video verification technology give security companies, dispatchers, police officers,
and property managers more reliable data to assess the threat level of a triggered alarm.

Audio and video verification techniques use microphones and cameras to record audio
frequencies, video signals, or image snapshots. The source audio and video streams are sent over
a communication link, usually an Internet protocol (IP) network, to the central station where
monitors retrieve the images through proprietary software. The information is then relayed to law
enforcement and recorded to an event file, which can be used to plan a more strategical and
tactical approach of a property, and later as prosecution evidence.

An example of how this system works is when a passive infrared or other sensor is
triggered a designated number of video frames from before and after the event is sent to the
central station.A second video solution can be incorporated into a standard panel, which sends
the central station an alarm. When a signal is received, a trained monitoring professional
accesses the on-site digital video recorder (DVR) through an IP link to determine the cause of the
activation. For this type of system, the camera input to the DVR reflects the alarm panel's zones
and partitioning, which allows personnel to look for an alarm source in multiple areas.

The United States Department of Justice states that legislation requiring alarm companies
to verify the legitimacy of an alarm, before contacting law enforcement (commonly known as
"verified response") is the most effective way to reduce false burglar alarms. The Department of
Justice considers audio, video, or an eye-witness account as verification for the legitimacy of a
burglar alarm.

Cross-zoning is a strategy that does not require a new keypad. Using multiple sensors to
monitor activity in one area, software analyses input from all the sources. For example, if a
motion detector trips in one area, the signal is recorded and the central-station monitor notifies
the customer. A second alarm signal—received in an adjacent zone within a short time—is the
confirmation the central-station monitor needs to request a dispatch immediately. This builds in
increased protection and a fail safe should a door blow open or a bird rattle an exterior window.

Enhanced call verification (ECV) helps reduce false dispatches 25–50% while still
protecting citizens, and is mandated in several US jurisdictions, although the alarm industry has
successfully opposed it in others.[7] ECV requires central station personnel to attempt to verify
the alarm activation by making a minimum of two phone calls to two different responsible party
telephone numbers before dispatching law enforcement to the scene.

The first alarm-verification call goes to the location the alarm originated. If contact with a
person is not made, a second call is placed to a different number. The secondary number, best
practices dictate, should be to a telephone that is answered even after hours, preferably a cellular
phone of a decision maker authorized to request or bypass emergency response. ECV, as it
cannot confirm an actual intrusion event and will not prompt a priority law enforcement
dispatch, is not considered true alarm verification by the security industry.

Some insurance companies and local agencies require that alarm systems be installed to
code or be certified by an independent third party. The alarm system is required to have a
maintenance check carried out every 6 – 12 months (in the UK, 'Audible Only' intruder alarm
systems require a routine service visit once every 12 months and monitored intruder alarm
systems require a check twice in every 12-month period) to ensure all internal components,
sensors and PSUs are functioning correctly. In the past, this would require an alarm service
engineer to attend site and carry the checks out. With the use of the Internet or radio path and a
compatible IP/radio transmitting device (at the alarmed premises), some checks can now be
carried out remotely from the central station (Wikipedia, 2019).

It all started on April 5, 1874, with a nighttime break-in. American District Telegraph
(ADT) Founder Edward Callahan created a telegraph-based "call-box" to signal for assistance to
a central office. He quickly connected 50 other homes in the neighborhood, creating the first
residential security system network. ADT introduced the first proactive security monitoring and
response service, employing "Roundsmen" to make rounds each night of customers’ homes to
help prevent crime before it happened. ADT grew strongly and steadily under the guidance of its
high-profile early leadership. Thomas T. Eckert, who led the Telegraph Office during the Civil
War and was close to President Lincoln, who was one of our early presidents. He was followed
soon after by Robert C. Clowry, a colonel in the U.S. military who worked his way up from
messenger boy to eventually serve as president of both Western Union and ADT, which he led
for eight years. ADT pioneered the concept of the Central Monitoring Center, enabling
thousands of customers to link to 24/7/365 monitoring and protection. ADT started its first big
expansion in the 1940s after pioneering the first automated burglar system. At the same time,
ADT installed the first automated fire alarm system, enabling immediate response to fire. A new
ADT security feature gained immediate customer approval: the iconic ADT yard sign, which
now dots millions of customers’ yards across the country. ADT elevated home intelligence when
it launched Pulse, the app that lets customers remotely access and control their home security
system, as well as lighting, climate control, security cameras and much more – all in real-time
(ADT, 2019).
Conceptual Framework

Independent Variable

Arduino Uno

Dependent Variable

Improvised Passcode System


Chapter III

METHODOLOGY

Materials:

Arduino Uno Plywood

3’4 matrix keypad Small nails

Servomotor Hammer

16’2 Lcd Display Door hinge

Some jumper wire screws

Glue gun screw driver

Stick glue pins for the arduino uno

Procedure:

1.) Gather all the needed materials.

2.) First, make six sides of rectangular prism out of plywood, nail five sides with a

hammer. Next is to attach one side of the door hinge into the formed box. After that attach the

sixth side to the other side of the door hinge to have a box that could be opened or closed.

3.) At the top of the box, paste the 16’2 LCD display at the center-most part with a glue

gun with a stick glue. Next also paste the 3’4 matrix keypad to the right center-most part of the

box. At the bottom of both equipment, make a rectangular hole for the wires (the wires has to be

inside the box).


4.) Place the the servomotor and the arduino uno at the other side of the LCD display and

the matrix keypad. Paste them using a glue gun.

5.) Connect the wire of the keypad to the arduino uno using the pins:

Keypad Arduino

Pin 1 (row 1) Pin 1

Pin 2 (row 2) Pin 2

Pin 3 (row 3) Pin 3

Pin 4 (row 4) Pin 4

Pin 5 (row 5) Pin 5

Pin 6 (row 6) Pin 6

Pin 7 (row 7) Pin 7

6.) Connect the wires of the rainbow jumper wires from the LCD display to the arduino

uno:

*LCD RS pin to analog Pin A0

*LCD En pin to anaog Pin A1

*LCD D4 pin to analog Pin A2

*LCD D5 pin to analog Pin A3

*LCD D6 pin to analog Pin A4


*LCD D7 pin to analog Pin A5

*LCD R/W pin to ground

*LCD VSS pin to ground

*LCD VCC pin to 5V

*10K resistor:

*ends to +5V and ground

*wiper to LCD VO pin (pin 3)

*Servo motor Signal pin Arduino Digital pin9


Chapter IV

Results and Discussion

Findings and Data of Analysis

Table 4.1.1

Battery Brands No. Of Errors No. Of success

Energizer 7 13

Duracell 8 12

Eveready 8 12

In Table 4.1.1 shows the no. Of errors and success of accessing the passcode.

In this table, we can see the no of errors and success of the passcode
Chapter V

Conclusion and Recommendation

Summary of Findings

The results of the study show that the researcher’s questions were answered as the
experiment was done.

Conclusion

The researcher therefore conclude that the improvised passcode system is efficient like
any other passcode system yet has shorter battery life.

Recommendation

The researcher recommends finding/ buying a long-lasting and durable batteries for the
product to last longer.

Bibliography

www.wikipedia.com

www.buildingsecurity.com

www.ADT.com
https://detect-allsecurity.com/alarm-systems/reasons-why-home-security-systems-are-important/

http://www.netfreedom.org/the-importance-of-home-security-system.asp

https://www.safewise.com/home-security-faq/do-i-need-a-security-system/

www.arduino.cc

Improvised Passcode System

Roshan Kate N. Saldia

Submitted in Partial Fulfillment of the Requirements in Research II


Alubijid NAtional Comprehensive High School

May 3, 2019

Ms. Tyra Jaye B. Juario

Research 8 Adviser

Acknowledgment

First of all, I would like to thank our God Almighty for giving me enough strength and

knowledge to complete this task. I would also like to thank my ever-loving parents, Mama and

Papa, for supporting me emotionally and financially throughout this study. To Ms. Tyra Jaye B.

Juario, thank you for correcting my papers and for teaching us how to do these papers right. To

my friends, thank you for helping me to do my papers and lastly I would like to thank myself for

overcoming this task and by handling this without too much emotional breakdown.
Table of Contents

Title Page

Abstract i

Acknowledgement ii

Table of Contents iii

Chapter I – Introduction

1.1 Background of the Study 1

1.2 Statement of the Problem 1-2


1.3 Objectives 2

1.4 Significance of the Study 2

1.5 Scope and Delimitation 2-3

1.6 Definition of Terms 3

Chapter II – Review of Related Literature 4-9

2.1 Conceptual Framework 10

Chapter III – Methodology

3.1 Materials/Equipment 11

3.2 Procedures 11-13

3.3 Flowchart 14-16

Chapter IV – Results and Discussion

4.1 Findings and Analysis of Data 17

Chapter V – Summary of Findings, Conclusion and Recommendation

5.2 Conclusion 13

5.3 Recommendation 13

Bibliography 13
Abstract

Developing conclusions based upon current trends with robberies and burglaries is a very

different task.For many cases, robberies and burglaries go unsolved. Unless the perpetrator is

caught at the scene of the crime, these types of crimes are very difficult to solve. Robberies and

burglaries are usually quick, sometimes planned out, and are over and done with before anyone

knows anything is missing.


Nowadays, security personals, cameras, systems are being hired and installed into

people’s houses in order for the employer to have the assurance of their safety, not just for his

family but also for his possessions.

Yet hiring or installing these type of security might be very hard and expensive especially

to those who cannot afford them. This led the researcher to produce an improvised passcode

system that is cheap but still efficient. This study aims to use extra electrical paraphernalia in

order to help not just our community but also our country to reuse these and create new

appliances using the rubbish materials.This study only limits the efficiency of the product and

how long would it last. As the researcher completed the study, it is claimed that the improvised

passcode system is efficient but has low battery life.

You might also like