You are on page 1of 39

UNIVERSITY OF BUEA REPUBLIC OF CAMEROON

P.O. Box 63, Peace – Work – Fatherland


Buea, South West Region
Tel : (237) 3332 21 34/3332 26 90
Fax: (237) 3332 22 72

FACULTY OF ENGINEERING AND TECHNOLOGY

DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING

DESIGN AND IMPLEMENTATION OF A SMART


VEHICLE INFORMATION SYSTEM

Internship Report Submitted to the Department of Electrical and Electronics


Engineering, Faculty of Engineering and Technology, University of Buea, in Partial
Fulfillment of the Requirements for the Award of the Bachelor of Engineering (B.Eng.)
Degree in Electrical and Electronics Engineering
By:
NGUH DANIEL NDANGSA
FE18A211
Option: Power Systems Engineering

Professional Supervisor: Supervisor:


Mr. Moudji Ferdinand Ndille Prof. Fopah Lele Armand
UWACO Cameroon PLC University of Buea

Academic Year: 2021/2022


ACKNOWLEDGEMENT

I am immensely grateful to my professional supervisor, Mr. Moudji Ferdinand Ndille, for his
guidance and support throughout my internship, for this project would not have been realised
without him. I equally pay my deep sense of gratitude to Mr. Ivo Sumelong, Founder of
UWACO Cameroon PLC, for taking me in and providing me continuous support.

I also wish to thank my academic supervisor, Prof. Fopah Lele Armand, for his guidance in
the completion of this project.

I am immensely obliged to my friends for their elevating inspiration, encouraging guidance in


the completion of this project.

I feel the need to acknowledge my indebtedness to Mr. Norbel Ambanumben, Chief Technical
Officer of Zinger Systems, for his technical support during my internship. I am also grateful
to the entire Zinger Systems team for hospitality.

I express my sincere to Mr. Eddy Nkouadjio, CEO of UWACO, and the UWACO staff for
their guidance and support.

Finally, yet importantly, my family are also an important inspiration to me. So with due
regards, I express my gratitude to them.

i
TABLE OF CONTENTS

ACKNOWLEDGEMENT...........................................................................................................i
TABLE OF CONTENTS...........................................................................................................ii
LIST OF FIGURES...................................................................................................................iv
LIST OF ABBREVIATIONS.....................................................................................................v
ABSTRACT...............................................................................................................................vi
General Introduction.................................................................................................................vii
CHAPTER 1: INTRODUCTION...............................................................................................1
1.1. Definition of Internship................................................................................................1
1.2. Goals and Objectives of Internship..............................................................................1
1.3. Posting/Application for Internship...............................................................................1
1.4. Company Presentation..................................................................................................2
1.4.1. History...................................................................................................................2
1.4.2. Location................................................................................................................2
1.4.3. Branding................................................................................................................3
1.4.4. Mission..................................................................................................................4
1.4.5. Vision....................................................................................................................4
1.4.6. Ambition...............................................................................................................4
1.4.7. Values...................................................................................................................4
1.4.8. Company Structure...............................................................................................5
CHAPTER 2: INTERNSHIP ACTIVITIES...............................................................................7
2.1. My First Day at UWACO............................................................................................7
2.2. Technical Supervisor....................................................................................................7
2.3. Departments in which I Worked..................................................................................8
2.3.1. Cybersecurity........................................................................................................8
2.3.2. Agile Methodology...............................................................................................9
2.3.3. IT Administration................................................................................................10
2.3.4. Software development........................................................................................10
2.3.5. Hardware Development, Testing and Quality Control.......................................11
2.4. Tasks which I Executed..............................................................................................11
2.5. Main Internship Task Performed................................................................................15
2.5.1. Introduction.........................................................................................................15
2.5.2. Overview.............................................................................................................15
2.5.3. Purpose................................................................................................................15

ii
2.5.4. Scope...................................................................................................................15
2.5.5. Literature Review................................................................................................16
2.5.6. Methodology Adopted........................................................................................17
2.5.7. Results.................................................................................................................23
2.5.8. Performance When Accomplishing Tasks..........................................................24
2.5.9. Challenges Encountered......................................................................................24
2.5.10. Measures Taken to Solve Challenges.................................................................25
CHAPTER 3: OVERALL BENEFITS OF INTERNSHIP......................................................26
CONCLUSION AND RECOMMENDATIONS.....................................................................28
References.................................................................................................................................29
Appendix...................................................................................................................................30

iii
LIST OF FIGURES

Figure 1: Location of UWACO Cameroon PLC........................................................................3


Figure 2: UWACO Logo............................................................................................................3
Figure 3: UWACO Logo Version 2............................................................................................3
Figure 4: Organigram of UWACO.............................................................................................5
Figure 5: Complex password generation with KeepassXC........................................................9
Figure 6: Jira board; Web view.................................................................................................10
Figure 7: View of Task Tracker................................................................................................12
Figure 9: Sample raw data stored in database...........................................................................13
Figure 8: Device testing session; testing the immobilize action...............................................13
Figure 10: Device installation in a HYUNDAI IX6.................................................................14
Figure 11: Block Diagram of SVIS..........................................................................................17
Figure 12: Diagram of Immobilizer Device..............................................................................18
Figure 13: Device Specifications..............................................................................................19
Figure 14: Illustration of a socket connection...........................................................................20
Figure 15: Initialization of socket connection..........................................................................20
Figure 16: Data Flow Diagram of Device Communication......................................................21
Figure 17: SVIS Operation.......................................................................................................23
Figure 18: Advanced Tracking Window of SVIS Web............................................................23
Figure 19: Dashboard of SVIS web..........................................................................................24

iv
LIST OF ABBREVIATIONS

ACC Adaptive Cruise Control


APN Access Point Name
ASCII American Standard Code for Information Interchange
CEMAC Central African Economic and Monetary Community
CLI Command Line Interface
CSS Cascading Style Sheets
GPS Global Positioning System
GSM Global System for Mobile Communications
HTML Hypertext Mark-up Language
IAM Identity and Access Management
IP Internet Protocol
LED Light Emitting Diode
MCU Microcontroller Unit
OBD On-board Diagnostics
PC Personal Computer
PCB Printed Circuit Board
PKI Public Key Infrastructure
SVIS Smart Vehicle Information System
SIM Subscriber Identity Module
SMS Short Message Service
SOS Save Our Ship/Save Our Souls
TCP Transmission Control Protocol
USB Universal Serial Bus
UI User Interface

v
ABSTRACT

Upon carrying out my internship at UWACO Cameroon PLC, I developed an interest in


providing IT solutions to everyday problems encountered by people, as it is their main
mission. The vast use of vehicles in transportation has greatly increased over the years, and so
has the threat of vehicle theft. Although there have been innovations to increase vehicle
security over the years, such as; alarms and removable steering wheels, the threat on vehicle
security remains. In the modern world, trackers were introduced to secure vehicles even in the
case of theft, since the location of these vehicles would still be known. Unfortunately, these
tracking devices are scarce in Cameroon and very expensive, hence, low income earners
cannot afford they remain exposed to the threat of vehicle theft.

The objective of this project is to Design and Implement a “Smart Vehicle Information
System” which will guarantee the security of vehicles to all subscribers, home and abroad.
The system contains a 4G Tracking device with Immobilization capabilities installed in a
vehicle, connected to a tracking server and a database from which data about the vehicle is
pulled and viewed on Mobile and Web applications. It also enables users to remotely
immobilize their vehicles.

In order to realise this project, the UWACO team used the Angular framework to design the
Web application, Flutter to build the mobile application, JavaScript to build the backend
server and knowledge of electronics to build the tracking device.

vi
General Introduction

This report is written on account of my internship at UWACO Cameroon PLC. It explains all
the activities carried out before and after the internship and the project which was realised
during the internship period.

The following are covered in the chapters which follow:

1. Chapter One: It contains the objectives of the internship and a detailed description of
the host company. It covers aspects like the history, mission, location, values and
administrative structure of the host company.
2. Chapter Two: This chapter describes all the activities carried during the internship
period and how they were executed. Furthermore, it explains the main internship
project which was carried out, the functionality of the project and its benefits. It also
describes the challenges encountered and the measured taken to overcome them.
3. Chapter Three: It explains the overall benefits of the internship. The final section
contains the conclusion; stating whether the goals of the internship were attained. It
also contains recommendations to the host company and the school administration

vii
CHAPTER 1: INTRODUCTION

1.1. Definition of Internship

An internship is a professional learning experience that offers meaningful, practical


work related to a student’s field of study or career interest. An internship gives a
student the opportunity for career exploration and development, and to learn new
skills. It offers the employer the opportunity to bring new ideas and energy into the
workplace, develop talent and potentially build a pipeline for future full-time
employees.

1.2. Goals and Objectives of Internship

Being part of the school curriculum, and a major requirement in the completion of my
degree program, the academic internship plays a very key role in our development.
With this in mind, the objectives I had for the internship were:
 To connect theoretical and practical knowledge on our subject field with actual
work experience, in order to complement our field specific skills and learn new
ones.
 To be able to apply and analyse our skills. Also, to improve our problem solving
and critical thinking.
 Exposure to the professional world and learning of work ethics.
 Networking and developing business contacts for potential employment in the
future.

1.3. Posting/Application for Internship

The application began in May, after obtaining a letter of recommendation and an


attestation of registration from the faculty. After doing research on some companies,
online applications were sent to CHOCOCAM, COTCO, TESLA, NESTLE,
GUINESS Cameroon, ADDAX Petroleum, CANOPY Cameroon and Dangote
Cameroon. Later on, written applications were dropped at the ENEO Buea and
SUNERGY Cameroon. Unfortunately, no positive response was received from any of
the above listed companies. It was until the 5 th of October, when an internship spot
opened at UWACO Cameroon. After contacting the human resource department, I
1
was granted an interview on the 10th of October. With this, I was accepted as an intern
in the company, and I commenced my internship on the 20th of October.

1.4. Company Presentation

1.4.1. History

UWACO Cameroon was formerly known as Sumelong Enterprise. Sumelong


enterprise was founded in June 2016 by Mr. Ivo Sumelong. It was an IT company
based in Berlin - Germany whose main goal was to provide solutions to everyday
problems. It began its journey by recruiting students from the faculty of engineering
and technology and from the college of technology. With his knowledge and
experience (as he had worked in several renowned companies worldwide like
Lamborghini, BMW, EON, MAGNA, DB, Vossloh, Honeywell, Swisslife etc.), he
trained these students and together they embarked on the problem solving journey. At
that time, the company was particularly involved with: automotive, cyber security and
access control systems, cloud computing, smart home design and implementation,
payment systems and enterprise document management. By then, the company was
strictly limited to the German market, teams from Cameroon, Germany and China had
to collaborate remotely for the completion of projects.
In 2021, Mr. Ivo Sumelong decided to offer his expertise and services to the
Cameroonian market via a fresh company — UWACO CAMEROON. The name
"UWACO" is the short form of “Ulinzi Waco”. In Swahili, it means "Your
Protection". Simply because at UWACO, we provide services designed to improve
people's security in their day-to-day global environment. The reason why this name
was chosen and "Sumelong Enterprise" not maintained is because Swahili is not only
one of the most known African language but also one of the most spoken and
appealing to the ear. An African language was chosen to bring forward the
"Africanity" of the company and the smart team of young people behind UWACO.

1.4.2. Location

In 2021, UWACO’s office was within the Zinger Systems building, behind Express
Exchange Molyko. But later on in early 2022, their head office was moved to the

2
Vallée Commissariat – Bonamoussadi, Douala, so as to enable them get a bigger
market

Figure 1: Location of UWACO Cameroon PLC

1.4.3. Branding

i. The Logo: The colours of the logo refer to our African identity. The colours
include: Giza brown and Mwanga brown.

Figure 2: UWACO Logo Figure 3: UWACO Logo Version 2

3
The curved separator under the “U” symbolizes the protection they offer to
their customers. The logo can also be displayed horizontally as shown in figure
2 above.

1.4.4. Mission

UWACO seeks to provide solutions to everyday problems, especially issues


concerning security by providing protection to its customers. The areas of protection
span from houses, through remote surveillance and smart home security, in offices, by
implementing system security and cyber security, and in vehicles, through remote
diagnostic services, tracking, geo-fencing and remote immobilization.

1.4.5. Vision

UWACO aims to transform the lives of the African population with easy-to-use
affordable solutions. The gap in technological advancement between the western
world and most African nations is still large. However, UWACO is trying to reduce
this gap by improving on the day-to-day lives of Africans with up-to-date
technologies. Also, UWACO provides affordable solutions for the African context.

1.4.6. Ambition

“The starting point of all achievement is desire” (Napoleon Hill). Hence, with the
ambition to dominate the market as a driving force, UWACO strives to be the leader
in day-to-day IT solutions in Cameroon within 5 years and in the CEMAC Zone
within 10 years.

1.4.7. Values

At UWACO, there are three basic values, which must be upheld: simplicity, trust and
loyalty.
i. Simplicity
One of the key objectives of UWACO is to provide user-friendly solutions to
its customers. What would be the use of all the services the company renders if
the customers cannot properly use or understand them? This is why the
company keeps things simple with high quality service. Simplicity also

4
stretches across to the working environment, which makes it very efficient and
easy to work in.
ii. Trust
Providing solutions to problems regarding security would not be possible if the
customers do not trust the company, hence, UWACO builds a strong
relationship with its customers, ensuring them about the trustworthiness of its
services. In addition, the management fully trusts its highly skilled team, as
members of the team are also confident in the abilities of one another. This
creates a very productive working environment.
iii. Loyalty
UWACO shares its vision with all its employees, believing in their strengths
and pushing them to get better every day. Ivo Sumelong (founder of UWACO)
once told me he doesn't believe there anything his team could not do. He
always motivates the team to stay committed and provides support in any way
he can. This is one of the incentives to the hard work the team puts in. And
with this, they stay fully committed and loyal to the company. Furthermore,
with the high quality services and strong relationships built with its customers
through great customer services, UWACO is assured that its customers will
stay loyal to its services.

1.4.8. Company Structure

The organizational structure of UWACO is shown in the figure below.

5
The management of UWACO is done by the corporate strategist (Ivo Sumelong) and
the executive manager (Eddy Nkouadjio), as they work hand-in-glove to define
strategies, ensure the administrative and financial situation of the company. Despite
their huge roles, everyone in UWACO was treated the same, as we never used titles to
address each other; a sign of equality and humility.

Figure 4: Organigram of UWACO

6
CHAPTER 2: INTERNSHIP ACTIVITIES

2.

2.1. My First Day at UWACO

Upon reporting to the office on the 20 th of October, as early as 7:30 am, I met up with
the head engineer of UWACO, Moudji Ferdinand Ndille. Subsequently, he introduced
me to the other members of the team and the neighboring company, Zinger Systems.
Later on, he spoke to me about the company values, encouraged me to be very
inquisitive and self-motivated. I then had a meeting with the company founder (Ivo
Sumelong) on Skype, wherein more light was thrown on the company values, mission
and goal. He also spoke about the dressing code and the importance of punctuality,
self-discipline and professionalism. “You should always have a pen and paper in
hand”, he said to me; to enable me learn as much as I could by jutting down new
concepts and organizing tasks assigned to me.
After the session with Ivo, the head engineer introduced me to the project the
company was working on at that time – the Smart Vehicle Information System
(SVIS). He explained the main components of the systems and how the system
operated, and then gave me manuals of the all the tracking devices they used (GS10,
GS18, GS20 and GS22) to study their respective features and specifications. At the
end of the day, I was asked to report all that I learnt in the evening meeting (a daily
routine of meetings in the morning and evening) and was asked to research on the
generations of network technology, GPS, GSM, OBD and GPRS. Astonished by the
level of technological advancement the projects carried out by the company were at, I
went home feeling enthusiastic about learning more about those new concepts in
telecommunication introduced to me.

2.2. Technical Supervisor

Moudji Ferdinand Ndille, the head engineer of UWACO, was assigned to be my


supervisor. As a former student of the faculty of engineering and technology and my
former teacher from BGS Molyko, he was the perfect choice. He was very
understanding and was always willing to lend a helping hand whatever the scenario;
whether it was explaining a concept, which was new to me repeatedly, explaining a

7
task assigned to me, or simply uttering motivating words. I believe I would not have
learnt a lot if he was not there and will always remain grateful.

2.3. Departments in which I Worked

At UWACO, following the work plan, which was made for me, I worked with the
departments of software development, hardware development and maintenance, and
hardware installation. This was so that I would not only improve my skills in the field
of electrical engineering, but also acquire skills in other fields, which would be very
helpful to me. Under the previously listed branches, I was specifically trained on:
Cybersecurity, Agile Methodology, IT administration, Hardware and Software
development processes, Testing and Quality Control.

2.3.1. Cybersecurity

With the growing number of cyber criminals in the world and the need for secured
systems, I was trained on the following:
 The PKI strategy
This involved the extensive use of certificates (keys) for authentication and
authorisation into all the platforms UWACO used. In the PKI strategy, public
keys were used for encryption and private keys were used to decrypt encrypted
messages. This eliminated unauthorized access (for example, through stolen
credentials) into their system.
 Securing workspaces
The main reason behind this was to protect all files related to UWACO. This
was done by creating a highly encrypted drive in which all company files were
stored, such that even if an employee’s PC was hacked, the hacker won’t have
access to company related files. The application used for creating encrypted
workspaces was VeraCrypt.
 Secure file sharing methods
At UWACO, sharing files through platforms like Skype and WhatsApp, or
through USB sticks was prohibited. The safest method of sharing files was by
uploading them to the file repository – Alfresco, and then sharing the link to
the file with the intended recipient.
 Complex password generation

8
For platforms that needed passwords for access, complex passwords were
generated with a length of at least 30 characters including: lowercase letter,

Figure 5: Complex password generation with KeepassXC


uppercase letters, digits, special characters and extended ASCII characters.
Manual generation of such passwords with high complexity would be tedious,
so a password manager, KeepassXC, was used for this.
 Secure email communication
In the corporate world, communication is done using emails. However, the
threat of phishing and unauthorized monitoring of this emails is ever
increasing. As such, UWACO applied a secure means of email
communication. This was done through email signing and encryption. Email
signing verifies the integrity of the sender by attaching the public key of the
sender which is unique to him/her. With this, the recipient is certain of the
identity of the sender. Next, email encryption is achieved through the use of
public keys and private keys for encryption and decryption of emails, as in the
PKI strategy. All of these were done using Microsoft Outlook.

2.3.2. Agile Methodology

Agile methodology is way to manage a project by splitting it up into several phases. It


involves constant collaboration with stakeholders and continuous improvement at
every stage. The agile process goes through the functionality of the project, planning,
implementation, testing and review. The project management software used at
UWACO which supported the agile methodology is Jira.

9
Figure 6: Jira board; Web view

2.3.3. IT Administration

This training was carried out by Ivo himself, wherein I managed the Identity Access
and Management (IAM) system of UWACO. Here, the main idea was to manage the
central system which controlled access to all the other platforms used by the company.
Creating user accounts for new employees, disabling accounts for employees on leave
or no longer with the company and providing support to any issues regarding
authorization to UWACO’s platforms. All these were done on the Active Directory.

2.3.4. Software development

The training was on the web application development process. Since I had to no prior
knowledge on this, I had to learn the basics of HTML, JavaScript and CSS. Since
UWACO used the Angular framework for developing applications, I also had to learn
TypeScript. Angular is a development platform, built on TypeScript. As a platform,
Angular includes: a component-based framework for building scalable web
applications, a collection of well-integrated libraries that cover a wide variety of
features, including routing, forms management, client-server communication, and
more and a suite of developer tools to help you develop, build, test, and update your
code. Next, I learnt about Git; a free and open source distributed version control
system designed to handle everything from small to very large projects with speed and
10
efficiency. I was taught basic Git commands, how to ‘commit’ code and ‘pull’ code to
and from the Git repository (GitLab). Finally, I was introduced to Jenkins; an open
source automation server which enables developers around the world to reliably build,
test, and deploy their software.

2.3.5. Hardware Development, Testing and Quality Control

The hardware development process starts from analysing the feasibility of the project,
writing down all ideas about the project including its features, configurations,
competing products and number of resources required. Next, the preliminary hardware
design, with a block diagram to specify all the electronic functions and how they
interconnect with other functional components. The next phase, the system block
diagram is used as a reference to design the Schematic Circuit Diagram. While system
block diagram focusses on the high-level functionality of the product, the schematic
marks the tiniest details of microchips, resistors, sensors and components connected
together making the functional circuit. The final phases include: designing of
mechanical and industrial components, designing the PCB and generating the final bill
of materials. The software used for PCB design at UWACO is KiCad.
Testing and Quality Control simply involved testing the performance of services
offered by UWACO. I was trained on how to develop efficient test cases and
document them. The main idea was testing with aim of trying to ‘break’ the service, to
find any vulnerabilities. This goes a long way to ensure the quality of services offered
by UWACO.

2.4. Tasks which I Executed

At UWACO, I worked during weekdays and working hours were from 8:00 to 17:00.
The normal daily routine included daily morning meetings from 8:00 – 8:15 am,
wherein employees were expected to state the tasks for the day and predict possible
challenges. There were also daily evening meetings from 16:45 – 17:00, in which
employees were expected to state the tasks they worked on and challenges they
encountered. Stated below are some of the tasks I executed.
 Employee On-boarding
With the training I received, I was tasked with introducing new employees to
all the platforms used by UWACO, how to navigate the platforms, issues
regarding security such as creating secure workspaces and secure email
11
communication. In effect, I was the IT support personnel always on standby to
help out other employees.
 Developed a Web application
After the lessons on software development, I had to build a Task Tracker,
applying all that I learned. The aim was to build an application which would
enable a user add, save, view and deleting tasks created on the application. The
application was built with the Angular framework. Although it took a while to
get done, the results were exquisite.

Figure 7: View of Task Tracker

 Device Configuration
With the numerous amount of tracking devices present, I had to configure
some of them using SMS commands. The first part of the process involved
configuring the APN setting and then connecting devices to a particular Server.
I also had to configure other features like motion detection for all devices.

12
 Testing and Troubleshooting

Before installing the tracking devices, I had to test if all their features were
functioning properly. To do this, I had to mount circuits using bulbs as loads,
taking walks to test the GPS precision of the devices.

Figure 8: Device testing session; testing the immobilize action


In addition, in order to correctly troubleshoot issues with devices, I had to
learn the communication protocol of the devices. With this, I was able to
decode raw data sent by devices which were stored in the database, and then
deduce the root of errors encountered.

Figure 9: Sample raw data stored in database

I also worked on testing and documenting UI issues on all software developed


by UWACO, particularly their web applications; testing if all features worked
properly.
 Device Installation

13
I provided support to the electrical technicians during device installation
sessions in vehicles. In addition, I had to document the installation process, so
that new technicians would easily grasp the technique used for such
installations.

Figure 10: Device installation in a HYUNDAI IX6

14
2.5. Main Internship Task Performed

DESIGN AND IMPLEMENTATION OF A SMART VEHICLE


INFORMATION SYSTEM (SVIS)

2.5.1. Introduction

Since the invention of the automobile, they have been prized possessions and
invaluable assets. As cars became more accessible and less of a luxury item, people
began to leave them unoccupied and vulnerable to thieves. Thus, the need to keep
them safe and theft-proof increased. The first recorded car theft took place in Paris,
France, 1896, when a mechanic stole a Peugeot from Baron de Zuylen, founder of the
Automobile Club of France. While the vehicle was eventually recovered and the thief
caught, it set forth a series of innovations that would see our cars become more theft-
proof. These include removable steering wheels, locks, alarms, immobilizers and
finally, the use of trackers. While technology has allowed manufacturers to make cars
more theft-proof, regardless of how secure you think your car is, it is imperative that
you stay vigilant and take every precaution to protect it from theft. A GPS tracker is
the only device that can give you your car’s location after it has been stolen.

2.5.2. Overview

The threat to vehicle security is still large despite several innovations developed to
solve the problem. However, the SVIS will bring about the ultimate form of vehicle
security, as knowing your vehicle’s location even after theft will be possible with a
mobile phone or PC. The system consists of a GPS tracking device installed in a
vehicle, which is linked to a server, mobile and web applications, which provide
interfaces through which users can track their vehicles.

2.5.3. Purpose

This project was aimed at providing a secure vehicle monitoring system to effectively
track vehicles, detect theft and the engine status of vehicles, remotely immobilize
vehicles, mileage, over speeding and to detect when a vehicle enters and leaves a
particular geographical region.

2.5.4. Scope
15
This project is applicable to all vehicles within Cameroon, Nigeria and the CEMAC
zone.

2.5.5. Literature Review

2.5.5.1. Existing Vehicle Security Systems

Several systems like alarms, locks and removable steering wheels were put in place in
the past and are still currently used as a means of securing vehicles.
 Removable Steering Wheels: They were one of the first anti-theft technology
in cars, developed in the 1900s. The idea was that the driver would remove the
steering wheel after driving and carry it along to deter thieves.
 Locks: It seems like a no-brainer to secure cars using locks. However, most
early cars didn’t even have doors, which wouldn’t be standard until the early
1920s. By then, companies started to add locks to their cars. However, early
car locks were easy to pick and it wouldn’t be until the 1970s when more
sophisticated locks were introduced.
 Alarms: Car alarms can be dated back to 1913 with a snippet of newspaper
claiming that an unnamed Denver prisoner invented an alarm that would
trigger when someone tried to hand crank the engine. Three years later, in
1916, the magazine “Popular Science Monthly” reported an inventor
developing a wireless alarm system which would make a buzzer vibrate when
their car’s ignition was tampered with. Modern car alarms have sensors to
detect when a vehicle is touched or tampered with and then make a buzzer
vibrate.

2.5.5.2. Shortcomings of Existing Systems

Although the systems listed proved to be helpful, they still have many flaws.
 Removable steering wheels were quite inconvenient to carry around, as they
were heavy and easily noticeable.
 Alarms are easily disabled and their effectiveness up to this day is
questionable.
 Locks are easily picked or broken; hence do not fully guarantee security.

16
2.5.6. Methodology Adopted

A simplified block diagram of the SVIS is shown below:

Figure 11: Block Diagram of SVIS

The system consists of a tracking device installed in a vehicle which is connected to a


socket server. The tracking device sends data containing the location and state of the
vehicle. These data, referred to as tracks are stored in the database, Parse. The data
stored in the data base is then pulled and displayed to users through mobile and web
applications. Also the apps can send information to the device through parse to the
tracking server, then to the device.

2.5.6.1. System Components

The main components of the SVIS are the tracking device, the socket server, parse
(database) and the client applications (web and mobile).

a. Device
The main device used is a 4G immobilizer device. It is called an immobilizer because
it provides the functionality of being able to remotely stop a vehicle from moving. The
main components of the device are:
 GPS sensor
 GSM module
 Vibration sensor
 Power circuit

17
 Backup battery and switch
 Memory unit and an MCU
 SOS button
In terms of functionality; the GSM module is used for signal transmission, the GPS
sensor receives the specific location GPS location of the device and either transmits to
the socket server or stores in the memory unit, the vibration sensor detects vibrations
within the vehicle in which the device is installed, the memory unit stores data
concerning device configuration and tracks when the device is on but cannot transmit,
the power circuit regulates the charging of the backup battery and powers the entire
device and all of listed components are controlled by a central MCU (STM32F401).
To perform the immobilizing action, the device is coupled with an electrical relay.
With this, an electrical signal from the device controls the relay which when
connected to a vehicle’s ignition line or fuel pump line would immobilize the vehicle.
A diagram of the device coupled with the electrical relay is shown below:

Figure 12: Diagram of Immobilizer Device

18
Furthermore, the device has LED indicators, to show the connection status of the GPS
and GSM modules. The SOS button is an additional feature for emergencies; when
pressed it sends an alert to the server. Finally, the device is able to detect the engine
status (ON or OFF) using its ACC wire; which is connected to the vehicle’s ignition
line and a SIM card slot. The figure below shows the specifications of the device.

Figure 13: Device Specifications

 Choice of Relay: The electrical relay chosen was a negatively triggered Bosch
Relay. This 5 pin relay is powerful and performs the switching action
effectively. 12 and 24 V Bosch relays were used depending on the type of
vehicle; 12 V for small vehicles and 24 V for large vehicles.

b. Socket Server
This is the central component of the SVIS. It is an application responsible for
receiving tracks sent by the device and then storing the tracks in Parse (the database).
The Socket Server is a backend server application which was built with JavaScript, in
addition, it is hosted and runs on a remote server. The device is connected to the
Socket server through a socket connection.
A socket is the combination of an IP address and a port, and it acts as an endpoint for
receiving or sending information over the internet, which is kept organized by TCP. A
software port is a number that identifies the specific application or service on your
computer that’s attempting to access the network.

19
The device sends a connection request to the Socket server which is constantly
listening. Then the Server allocates a specific IP address for the device.

Figure 15: Initialization of socket connection


There are four types of data packets which the device sends to the socket server:
Authentication data packet, Location data packet, Alarm data packet and Status data
packet. To start off with, the authentication data packet is sent when the device wants
to connect with the socket server. Next, the location data packet contains date, time
and location data information about the device. The alarm data packet contains both
location data and information about the status of the device like: the engine state,
alerts triggered, whether the vehicle is immobilized or not and mileage. Finally, the
status data packet simply describes the state of the vehicle in which the device is
installed.

20
Figure 16: Data Flow Diagram of Device Communication

c. Parse Server
Parse server is an open source backend server which was integrated to our system. It
basically acts as a database storing data from the socket server in well-organized
tables. All data sent to socket server is decoded, analysed and then stored under
specific sections in the parse server.
21
d. Client Applications
The Web application and Mobile application are the two client applications through
which users can view and interact with the SVIS. These applications get data from the
parse server through queries, then display the data through navigable UI’s. The web
application was built with the Angular framework, while the mobile application was
built with Flutter.

2.5.6.2. Device Configuration and System Operation

The device is initially configured through SMS. Parameters such as the transmission
rate, APN setting, Server setting, vibration sensor sensitivity and more are configured
by sending SMS commands which the device recognizes. The device intend sends
SMS messages to confirm each configuration. Also, the status of any parameter can be
queried through SMS commands.
Once the device is connected to the socket server, it starts transmitting data to it. Also,
the user can communicate with the device through GPRS commands sent through the
socket server to the device and receive response through the same channel.

22
Figure 17: SVIS Operation

2.5.7. Results

With all the tracks stored in the parse server, comparisons and calculations are done to
get values for speed (using successive location data values), mileage, and other
features. These are all displayed on the client applications.

Figure 18: Advanced Tracking Window of SVIS Web

23

Figure 19: Dashboard of SVIS web


The diagrams above show how the SVIS web application provides us with information
about a vehicle’s location, mileage, engine status, speed, battery voltage, state
(whether parked or moving or stopped) and whether it is immobilized or not.
It also displayed the number of type of events that were triggered, for example, figure
17 shows three SOS alerts and zero vibration alerts from the vehicle.

2.5.8. Performance When Accomplishing Tasks

At UWACO, professionalism was paramount at all levels. Dedication to tasks and


executing them with discipline. This was the same way I tackled all tasks assigned to
me, as the company values had already sunk in me.

2.5.9. Challenges Encountered

Although I always gave my all to the tasks assigned to me, I still encountered a few
difficulties during my stay at UWACO. Initially, I couldn’t communicate my ideas
clearly to my supervisors since I didn’t know how to appropriately express myself in a
cooperate environment. Next, since I had no history in software development, I
encountered difficulties in developing software applications at first (the task tracker).
Finally, during the period when the company was going live, working hours increased
and the working conditions became quite stressful.

2.5.10. Measures Taken to Solve Challenges

Nevertheless, I didn’t expect my stay at UWACO to be an easy ride, so I was


determined to overcome the challenges I encountered. During the hectic go live
period, I simply had to adapt and get accustomed to working seven days a week. I also
put in extra hours to learn the basics of software development to better contribute to
the development process at UWACO. Finally, with regards to issues of
communication, I just had to learn from my superiors on how to effectively
communicate my ideas.
On one such occasion, I was asked to make a presentation on how location data could
be used to determine the direction of a vehicle. I clearly explained the calculation of
the bearing angle between successive geo-coordinates which depict the direction in
which a vehicle is moving. The presentation was approved and greatly appreciated as I
had made great progress towards fitting into the corporate world.

24
25
CHAPTER 3: OVERALL BENEFITS OF INTERNSHIP

a) Improving practical skill


With the excellent training I received at UWACO, I gained lots of skills. Some of
which are: programming in JavaScript, creating encrypted workspaces, speed
reading, operating a portable generator, installing tracking devices in vehicles, secure
email communication, complex password management and generation, critical
thinking, PCB design and cloud computing.

b) Upgrading theoretical knowledge


The project I worked on at UWACO pushed me to delve into the world of
telecommunication, in which I learnt more about generations of mobile
communication and how the GPS works, adding to what I had learnt in basic
telecommunication. I equally learnt more about communication protocols, as the
tracking devices used by UWACO had a dedicated protocol for data transmission. In
addition, I learnt about the family of Bosch relays and how they function. All these
went a long way to improve my knowledge on the courses I learnt in school.

c) Upgrading interpersonal communication skill


Effective communication between team members and the management was a crucial
skill all employees had to possess. With great help from my superiors, I learnt how to
effectively communicate my ideas, how to present to audiences and also how to give
oral reports. I also learnt about the importance of body language in communication
and how to use it to interact with people in an authentic and interesting way.

d) Improving team playing skill


At UWACO, individual success was not appreciated as much as team success.
Because of this, I understood the importance of team playing. I had to understand my
role within the team and work to achieve my duties to the best of my abilities. In
addition, collaboration with other team members and being accountable for all my
actions made me a great team player.

e) Improving leadership skill

26
During the execution of some tasks, I was assigned to organize and coordinate team
members. The feeling of being the lead was new to me, but fortunately, I got through
it and the outcome was successful.

f) Work ethics and related issues


Some of the primary elements of the strong work ethic at UWACO are:
professionalism, integrity, respect for the work and fellow teammates, punctuality,
and discipline. This value of ethics has moulded me into a more responsible and
more determined individual. It has impacted all the activities of my day-to-day life.

27
CONCLUSION AND RECOMMENDATIONS

At the end, my stay at UWACO was very productive as I accomplished all the
objectives I set for myself. Getting into the corporate world was exhilarating and the skills I
attained will greatly help me in future projects.
My recommendation to the UWACO management is that they develop specific work plans for
their interns which are related to their fields of study. Although acquiring skills from different
engineering fields is important, internships are meant to improve on the practical skills of the
student regarding his field of study.
I would also further recommend to the school administration to help with the internship
application process by obtaining internship placements for the students in different
companies. This is because the application process is very tedious and students are not always
guaranteed internship spots upon application.

28
References

[1] E. Nkouadjio, Presentation of UWACO Cameroon PLC, Douala, 2022.

[2] F. Moudji, “Mission and History of UWACO,” UWACO Cameroon PLC, January
2022. [Online]. Available: uwaco.net. [Accessed January 2022].

[3] W. Way, “G18 & G10 Communication Protocol,” Guangdong, 2021.

[4] E. Kaplan, “365 Days of Motoring,” Cellutrak , 21 March 2021. [Online]. Available:
http://www.365daysofmotoring.com/blog/car-maintenance/evolution-car-security-
features-brief-history/. [Accessed 31 January 2022].

[5] H. Damian, “A Brief History of Car Security Systems,” Black Knight Global Tracking
Systems, October 2021. [Online]. Available:
https://www.blackknighttracking.com/post/2019/07/10/a-brief-history-of-car-security-
systems. [Accessed 31 January 2022].

[6] L. PenzeyMoog, “Understanding Socket Connections in Computer Networking,”


Medium, 24 May 2019. [Online]. Available: https://medium.com/swlh/understanding-
socket-connections-in-computer-networking-bac304812b5c. [Accessed 1 February
2022].

[7] A. S. Team, “What is Angular,” Angular, 28 October 2021. [Online]. Available:


https://angular.io/guide/what-is-angular. [Accessed 7 February 2022].

[8] G. S. Team, “What is Git,” Git, May 2018. [Online]. Available:


https://git-scm.com/book/en/v2/Getting-Started-What-is-Git%3F. [Accessed 7 February
2022].

[9] J. S. Team, “Jenkins User Documentation,” Jenkins, June 2016. [Online]. Available:
https://www.jenkins.io/doc/#what-is-jenkins. [Accessed 7 February 2022].

[10] S. Nott, “How do Car Alarms Work,” WarrantyWise, 17 April 2012. [Online].
Available: https://www.warrantywise.co.uk/blog/how-do-car-alarms-
work#:~:text=Shock%20sensors%20detect%20hits%20and,detecting%20when%20an
%20impact%20occurs.&text=The%20car%20alarm%20is%20then,they%20might
%20occasionally%20activate%20accidentally. [Accessed 1 February 2022].

29
Appendix

Appendix 1: SVIS Web; Creating a Geofence

Appendix 2: Front View of 4G Tracking Device With Immobilizing Capabilities

30
Appendix 3: SVIS Mobile Application Dashboard

31

You might also like