Hardware First Docu Final

Embed Size (px)

Citation preview

  • 8/9/2019 Hardware First Docu Final

    1/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    1 | P a g e

    Chapter 1

    THE PROJECT AND ITS SETTING

    Introduction

    Today there are many crimes in the country; one of these crimes is robbery

    and speaking of robbery, there is a robbery gang that specializes in breaking and

    entering in homes and robbing valuables. This gang is called as Akyat-Bahay

    Gang literally means Climb-House Gang. They often do reconnaissance in

    home and family activities such as what time the homeowner leave, what time

    the owner return, which is left in the house, and how can criminals get inside the

    house. This Gang often does this in long periods of time, so that criminals can

    precisely time, plan and coordinate in attack.

    Homes that live in villages which have security guards patrolling the village

    are not safe from the Akyat-Bahay Gang. The said gang also scouts the activity

    of the security guards, the neighbors, and even the housemaids, so that criminals

    can get into the house without too much hassles and avoid being detected.

    So, the Culprit Alarm Device was developed by the researchers in order to

    make the homeowners or establishment owners properties safe and secure.

    Even though the owner is not around to secure its properties, there is a device

    that can detect person who wants to rob the owners properties.

  • 8/9/2019 Hardware First Docu Final

    2/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    2 | P a g e

    The project designers had viewed and realized the advantageous that

    automation had brought which had led us to conduct further studies on the

    subject and come up with the design that will apply to the industry settings.

    Automation and its many aspects were carefully studied and integrated with a

    more recent technology-the Short Messaging Services (SMS).

    With people becoming more concerned about the security and its every

    aspect, the introduction of a more reliable and a more sophisticated way of

    addressing the problems that comes with office and industrial security will be a

    major breakthrough. Incorporating the existing technologies to achieve such an

    objective is seen to be the best alternative there is other than creating a whole

    new system, which will call for painstaking studies.

    Background of the Project

    Every man wants to make their properties or valuables safe and secure. So,

    the researchers have planned to develop and implement a new device that can

    really help people for their safety. This device was called as Culprit Alarm

    Device; this device is a powerful tool for private and public safety and security

    purpose. Because of this device, the owner can monitor his house wherever he

    is. This device can detect someone or intruder/s who wants to enter in any

    establishments/houses, then after detecting intruder/s the device will

    automatically send text message to the gadget owners cell phone telling that

  • 8/9/2019 Hardware First Docu Final

    3/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    3 | P a g e

    someone forced to open the owners house. In this kind of system-hardware, it

    will really help to reduce and prevent crimes inside the house or even in any

    establishments.

    Scope:

    The researchers project was designed to provide further security to the

    houses and even to industries establishments through the use of a specially

    designed hardware and which will be alarmed a cell phone and send text

    message from a specific number. The system also informs selected individuals in

    case of possible intrusion. This way the authorities will be warned accordingly.

    Delimitation:

    The system is limited only to locking and unlocking the door as well as on

    informing the authorities about a possible forced entry/intrusion. The hardware

    will not send a warning message once the button intended for them are blocked.

    However, the design does not include any measure of blocking intruders in case

    the entry to the location where device are installed by any other means. Even

    any authorized person who wishes to enter another will also receive a warning

    message to the assigned cell phone number. An alarm system is likewise

    installed to inform authorities within the vicinity.

  • 8/9/2019 Hardware First Docu Final

    4/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    4 | P a g e

    Significance of the Study

    In this study, the researchers expect to contribute to the development of a

    more sophisticated security system, which will bring about change in current

    systems that are implemented by most conscious entities. It will also give future

    researchers an idea on how any other processes maybe helpful to the

    environment and for the improvement of the industry.

    The study will be benefit by the following:

    yHomeowners

    The system will be benefited by the homeowners because of it provides

    security for all the properties and valuables of the homeowners.

    yEstablishments owners

    The establishment's owners such as the people who owned building for

    business purpose, may benefit this system that may serve as a protection for all

    the properties of the establishment owner.

    yFuture Researchers

    To the future researchers, this study and system development will serve

    as a basis for similar hardware projects and help to enhance the readers

    knowledge about the hardware development.

  • 8/9/2019 Hardware First Docu Final

    5/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    5 | P a g e

    CHAPTER 2

    THEORETICAL FRAMEWORK

    This chapter presents the review of Related Literature and Related Studies as

    basis for conceptualization of this study.

    REVIEW OF RELATED STUDIES/LITERATURES

    Intruder Alarm

    According to Shenzhen Sinda, the inventor of Intruder Alarm System,

    comfort is a full-featured Intruder Alarm System (EN50131-compliant) with dialer,

    telephone control, multiple security modes, and a practical Home Automation

    System.

    In the event of any alarm, the system can dial to 8 telephone numbers

    including Central Monitoring Station (a service which monitors alarms from alarm

    systems which are subscribed), and Cellular Phones to report the alarm. Each

    Alarm Type (Comfort has 31 preprogrammed Alarm Types like Intruder, Fire,

    Power Failure) can be programmed to dial to any combination of the 8 telephone

    numbers for example, Intruder Alarm to Central Station and owner, Power

    Failure to the owner, Low Battery to the Installation company etc.The Voice Station Intercom enables you to listen to sounds around up to 8

    keypads in the home in the event of an alarm dial-out to your mobile phone.

  • 8/9/2019 Hardware First Docu Final

    6/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    6 | P a g e

    While you are listening on the phone, the Alarm Tracking feature

    automatically announces the location of the intruder as he is detected by motion

    sensors in the premises, e.g. Kitchen Window, Living Room Movement,

    You can dial in to your Comfort-enabled home from anywhere in the world to

    check if you left the lights or appliances on, or if you forgot to arm the security

    system, and to control your home.

    With Comfort, home security and home appliances can be linked together to act

    intelligently, so that for example, when the system is armed to Away Mode, all

    the lights, air-conditioning, or other appliances can be switched off; or when you

    come home at night, the car porch light and main entrance light can be turned on

    automatically. This is the benefit of Integration. (SOURCE: Shenzhen Sinda

    Technology Co.,Ltd.)

    Whatis a Mobile Phone?

    A mobile phone, as its name suggests, is a portable device with wireless

    transmission, which anyone can use while on the go. You can use one for

    making phone calls, receive phone calls, which is its main function, but you can

    also transfer and receive files with music, videos, images and, of course, text.

  • 8/9/2019 Hardware First Docu Final

    7/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    7 | P a g e

    Cellular Phone Parts

    First take a look at your own model. What do you see? It has a Liquid Crystal

    Display, a keypad like the one on your TV remote, while inside it has an antenna

    (which can be external and visible at some models), a removable battery, a

    microphone, a speaker, and another thing that you cannot see if you dont

    disassembly the handset is the circuit board, in charge with processing the

    commands you type.

    On the circuit board, a specialist can identify easily the conversion chips that

    translate the analog audio signal emitted when you are in a phone call, into

    digital signal, and the digital signal that comes to your handset over the air, back

  • 8/9/2019 Hardware First Docu Final

    8/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    8 | P a g e

    into analog. The smart piece that handles the digital signal is called the Digital

    Signal Processor, which uses complex algorithms to make calculations in order

    to transform the analog and digital signals in real time.

    Same as personal computers, cell phones have also a microprocessor that

    handles the commands from the keyboard making them displayable on the LCD.

    The operating system and directories are kept in the Random Access Memory

    and Flash memory chips, while the power issues are controlled by the Radio

    Frequency and the power area.

    Cell phone speakers are incredibly small, as well as microphones, but with the

    latest technologies they have powerful capabilities.

  • 8/9/2019 Hardware First Docu Final

    9/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    9 | P a g e

    Cell Phone Manufacturing

    The manufacturing process involves 40% metals, 40% plastics and 20%

    ceramics and trace materials, while the circuit board uses copper, lead, nickel,

    gold, zinc, beryllium, tantalum, coltan and others. Some of the raw materials are

    processed before the cell phone manufacturing, like the crude oil used for

    plastics, which has to be mixed with natural gas and chemicals in a special plant.

    The copper, for example, has to be mined, ground, heated and treated with

    chemical substances and electricity, in order to isolate the pure metal used also

    in batteries.

    Cell Phone Screens with LCDs have liquid crystalline substances like mercury,

    and are sandwiched between glass and plastic layers. The batteries have the two

    electrodes made of metals.

  • 8/9/2019 Hardware First Docu Final

    10/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    10 | P a g e

    This is a cell phone diagram for your curiosity

    How Does a Mobile Phone Work?

    How does a cell phone work? This is simple. If a standard radio uses a simplex

    communication system so that you can hear the moderator talking, without

    having the possibility to reply, a cell phone is a duplex device permitting you to

    talk to the person who started the call. It sends and receives radio signals using

    cell sites located on specially built towers, poles or buildings, all being connected

    to a large cabled network with a switching system. The smart thing is that cell

    phones send data to the nearest cell sites located at maximum 13 Km away, this

    after they are turned On, moment when it registers with the switch, using .

  • 8/9/2019 Hardware First Docu Final

    11/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    11 | P a g e

    When you are on the go, carrying your phone with, it is permanently detecting the

    strongest signals from the base stations, so if a signal weakens, the handset care

    is passed to the nearest cell site.

    Your cell phone receives the phone call from a friend and this digital signal is

  • 8/9/2019 Hardware First Docu Final

    12/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    12 | P a g e

    transformed into analog signal, processed by the Digital Signal Processor, and

    finally amplified via the built-in speaker. When you talk, the voice is detected by

    the small microphone as analog, processed, and in the end transformed into

    digital signal to be sent over the air.

    The SIM card is a microchip called a Subscriber Identity Module, and the phone

    is dependent on it to work. It is in charge with storing information like the calling

    plan and other phones details, while having a unique numerical identifier used to

    lock the device permanently after the first activation.

    History of the Cell Phone

    Who Invented the Cell Phone? If you want to know who was the first who got the

    idea of creating a cellular phone the answer is the American Telephone &

    Telegraph which is no other than AT&T from the United States, which was the

    world's largest telephone company and the world's largest cable television

    operator, with $300 billion dollars revenue. It was purchased by Baby Bell SBC

    Communications in 2005.

    In April 1973, Dr Martin Cooper, former general manager for the systems division

    at Motorola, invented the mobile phone prototype and made the first call to Joel

    Engel, his rival, head of research at Bell Labs.

  • 8/9/2019 Hardware First Docu Final

    13/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    13 | P a g e

    Copper was a project manager at Motorola and the worlds first mobile

    phone was Motorola Dyna-Tac, a 2.5 pounds handset measuring 9 x 5 x 1.75

    inches, featuring 30 circuit boards, 35 minutes talk time, 10 hours recharge time,

    and having just three functionalities: dial, talk and listen. He, together with his

  • 8/9/2019 Hardware First Docu Final

    14/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    14 | P a g e

    colleagues, published the patent for the worlds first portable duplex radio

    telephone system.

    AT&Ts concept couldnt pass by the monopoly on the wired service in the US in

    1915, so someone else had to finalize this, and the answer for your next question

    - When was the first mobile phone invented? - is the year 1978 and the place

    Japan. There, the Nippon Telegraph and Telephone Corporation, known as the

    most popular cell phone operator in the country, NTT DoCoMo, created the

    worlds first commercial cell phone.

    There are different types of mobile phones. Nokia Communicator launched in

    1996 was the worlds first cell phone with Internet connectivity and email

    functionality. The same company created the worlds first Smartphone.

    NTT DoCoMo launched i-Mode, the first mobile Internet service, in 1999 in

    Japan.

    The first http://en.wikipedia.org/wiki/Short_message_service Short Message

    Service message was sent in 1992 in the United Kingdom, but from a computer

    to a cell phone, and the first text message sent from a phone to another phone

    was in 1993 in Finland.

    How many people own cell phones at this moment? We cannot be sure about the

  • 8/9/2019 Hardware First Docu Final

    15/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    15 | P a g e

    number, but at the end of last year there were 3.3 billion subscribers worldwide,

    meaning half of the population on the globe, and if you take into account the fact

    that maybe 50% of them own more than one cell phone, you could imagine a

    higher number, of almost 4.5 billion. The cellular phone technology is the most

    widely spread and the most popular gadget in the world.

    (SOURCE:http://www.cameraphonesplaza.com/who-invented-the-cell-phone)

  • 8/9/2019 Hardware First Docu Final

    16/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    16 | P a g e

    Conceptual Framework

    The conceptual framework that will be used in the study is the Input-

    Process-Output Model. In the IPO model, a process is viewed as a series of

    boxes (processing elements) connected by inputs and outputs. Information or

    material objects flow through a series of tasks or activities based on a set of rules

    or decision points. (,Rubrico 1997) Flow charts and process diagrams are often

    used to represent the process. (,Rubrico 1997) What goes in is the input; what

    causes the change is the process; what comes out is the output. (Paso, 2001)

    Figure 1 illustrates the IPO model:

    Input Process Output

    Figure 1 Input, Process and Output Model

    y Program thehardware

    y Connect all the

    materials/devices

    y GatherInformation and

    researches about

    the hardware

    y Gather all the

    materials needed

    for the hardware

    y Provides securityfor all houses and

    establishments

    properties

    y Reduces crimes

    rates

  • 8/9/2019 Hardware First Docu Final

    17/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    17 | P a g e

    Definition of Terms

    SMS - stands forshort message service. SMS is also often referred to as texting,

    sending text messages or text messaging.

    Microcontroller- is an integrated chip that is often part of an embedded system.

    Hardware - In information technology, hardware is the physical aspect of

    computers, telecommunications, and other devices.

    Software - is meant to be more self-contained and independent, and functions

    as a tiny, dedicated computer.

    Sensor - A device that measures or detects a real-world condition, such as

    motion, heat or light and converts the condition into an analog or digital

    representation.

    Feasibility - Capable of being accomplished or brought about.

  • 8/9/2019 Hardware First Docu Final

    18/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    18 | P a g e

    CHAPTER 3

    OPERATIONAL FRAMEWORK

    Project Design

    Figure 2 Block Diagram

    Attached

    Cell phone

    (Sender)

    Button

    Cell phone

    (Receiver)

  • 8/9/2019 Hardware First Docu Final

    19/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    19 | P a g e

    Figure 3 System Flowchart

  • 8/9/2019 Hardware First Docu Final

    20/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    20 | P a g e

    Project Development

    In developing the hardware, the researchers are discussing and

    thinking first about the output, concept and the operation of the hardware.

    The proponents done a research for gather more information and

    techniques that can help the researchers to build the said hardware.

    Evaluation / Validation Criteria

    Discuss the parameters that will be used to evaluate the project in terms of

    1. Technical Considerations

    In technical considerations the user/s must consider and make sure that

    the hardware is properly installed in order to run the hardware, make sure that

    wires are not defective and the connection of all the devices are properly

    arranged.

    2. Operations

    The first step in operating the House alarm culprit system, the user must

    install first the sensor button of the said system-hardware in any desired location

    (e.g. door, window) of the user's house. Then, after installing the censor button of

    the system-hardware the user must consider that the cell phone

    installed/connected to the microcontroller of the system-hardware has enough

    loads to send text message/s to other cell phone. In order to receive text

  • 8/9/2019 Hardware First Docu Final

    21/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    21 | P a g e

    message/s from the system-hardware the receiver must always make sure that

    the cell phone is always on and have signal. After all this steps, test the system-

    hardware, go out with the SMS receiver phone and close the part of the house

    where censor button located then open it and wait for the warning message in

    the receiver's phone.

    3. Schedule

    Because the researchers are new to this kind of project, the researchers

    initially start by researching information or data related to the project for a month.

    The researchers studied how to configure and connect all the materials include to

    the project. After all this process, the researchers start to develop, connect and

    buy all the materials needed to finish the project for over a month. In the whole

    summary of the projects development schedule, the researchers finished it in

    more than three months.

    4. Economic and Cost Effectiveness

    Every owner wants a cost-effective system. But what does this mean? In

    many respects the interpretation is influenced by an individual's interests and

    objectives.

    y Is it the lowest first-cost structure that meets the program?

    y Is it the facility in which users is most productive?

  • 8/9/2019 Hardware First Docu Final

    22/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    22 | P a g e

    Yes, the developed system is very helpful to reduce expenses in any

    establishments/houses it provides security and safety to the properties of the

    owner. Instead of hiring a more security guard there is a SMS Culprit alarm

    system that can detect intruders and warn the owner.

    Design Instruments and Techniques

    The instruments and techniques use din the collection of data for this study were:

    a. Observations

    Before developing the proposed system-hardware, the

    researchers observed to some related hardware projects, the

    purpose of this is to get a clearer and richer understanding of what

    the proponent need to do to develop this kind of hardware, to know

    what kind of materials needed, what are the capabilities of the

    researchers project must have.

    b. Research

    The researchers visited some libraries such as the Adamson

    University and the Quezon City library in order to gain more

    knowledge about the system-hardware requirements, the features

    and how the project does is developed. And with the help of

    internet, the development of the project made the researchers to

    understand how to develop the same system.

  • 8/9/2019 Hardware First Docu Final

    23/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    23 | P a g e

    Chapter 4

    Presentation of the Project Implementation

    Before starting design work, some ideas require technical consultancy to

    determine their technical feasibility and limit risk. Initial technical consultancy may

    be required to assess the feasibility of the project and determine the correct

    technical solutions. If the result of this is agreeable the development can start.

    This chapter intends to study the possibility of completing a new

    computerized system successfully. As it goes to the basic, the feasibly study

    should provide necessary information to evaluate if the system is feasible to

    be continued. The question and answer method have been employed to get

    a clearer picture on this feasibility study answer method have been

    employed to get a clearer picture on this feasibility study.

    Technical Feasibility

    In this part of the research, the technical aspects of the system will be

    clarified.

    The technical elements in the system will be confirmed and verified whether it is

    practical and achievable.

    1. Does the organization have the necessary equipment for the system?

  • 8/9/2019 Hardware First Docu Final

    24/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    24 | P a g e

    No.

    They do not have the required equipment since they have only practiced a

    manual system before. All the necessary hardware needs to be purchased and

    long-time investments on the computer peripherals is essential.

    2. Can the future technology be adopted in the system?

    No. There would not be any future technology that will be adopted since the

    stability of this future systems have not been tested yet. The current, reliable

    technologies will be used in this system. It is important to keep in mind that in

    advertisement industry, the computer technological advancement is not

    prioritized.

    3. Does the organization need any technical expertise?

    Yes. The agency will have to do some minor maintenance and debugging. All the

    staffs in the company are computer literates, thus they will be able to understand

    and use the system with basic training.

    4. Will the hardware and software platform be reliable?

    Yes. Both the platforms will be reliable and their reliability will be tested carefully

    to avoid any problems in the future.

    5. Will the system be able to handle the projected growth of the

    organization in the future?

    Yes. There will be a backup provided and older datas will be recorded and kept

    in a separate backup.

  • 8/9/2019 Hardware First Docu Final

    25/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    25 | P a g e

    Operational Feasibility

    Operational feasibility involves considering whether the system is

    appropriate with the working environment of the agency. All the terms (technical

    terms) used in the research are elevated with the advertising terminologies

    used in the working environment of the agency.

    The main constrain of the feasibility study is to ensure the proposed

    system gets the management support. As in this research, authorization is

    obtained from an advertisement agency to conduct the research. Six

    questions are used to clarify the operational feasibility study.

    1. Do the users (staff) support the new system?

    Yes they do. This is because all their opinion about the new computerized

    system has been gathered. They believe that the new system can reduce the

    errors during work and can simplify their job.

    2. Are they satisfied with the current file based system?

    No. The current manual system needs the staffs to perform every task manually.

    For example, it is a difficult task to search for a booking and prepare (type) the

    invoice. A computerized system will be easier to use. Computerized system also

    will allow report generation that will be effective in decision-making.

    3. Will there be any necessary for training?

  • 8/9/2019 Hardware First Docu Final

    26/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    26 | P a g e

    4.

    Yes. There is a need for some basic training for few days to understand the

    systems.

    4. Will the new system result in a workforce reduction?

    Yes. There will be a workforce reduction since the invoicing process will

    be automated. Invoicing consumes most of advertisement agencies working time.

    Thus, this gives an advantage to the management in reducing expenditure

    whereretrenchment is possible.

    5. Will the users be involved in the planning of the new system from the

    beginning?

    Yes. The staffs will be involved to provide ideas and expectation from the new

    system

    6. Is the schedule for development systematic?

    Yes. This is possible due to the usage of the waterfall model, which is a discipline

    approach It guilds the system's development in stages up to the system

    implementation process.

    Economic Feasibility

    This economic feasibility is intended to be studied if there will be any

    additional cost such as purchasing new hardware.

  • 8/9/2019 Hardware First Docu Final

    27/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    27 | P a g e

    1. Is there any special cost for people including the staff and users?

    No. However some training cost will occur for the implementation of the new

    computerized system.

    2. Are there any special cost for the hardware and equipments?

    No, The company has existing computer hardware and software that can be

    used.

    3. Is there any special cost for software?

    No, all the software used in the system is a free open source software (FOSS) or

    downloadable to the internet for free.

    4. Is there any special cost for both formal and informal training?

    Yes, there will be, but the cost will be minimal and the system will be developed

    to be user friendly.

    5. Will there be any licensing cost?

    No licensing cost will occur since all the original software are purchased and

    used only on a single pc. There is no connected pc or workstation, which would

    require additional licensing.

  • 8/9/2019 Hardware First Docu Final

    28/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    28 | P a g e

    Table: Feasibility Study Conclusion

    1. Some financial allocation is vital in purchasing the hardware and software but

    the amount is not much and will not be a burden to the company.

    2. Some basic training is required for the staffs to train them to use the system.

    The business process will not be affected since the training requires minimal

    time.

    3. Since the research concentrates on migrating from a manual system to a new

    computerized system, there might be some unforeseen problems occurring in

    future. If the guidelines are followed, it can solve the problem. The well-

    documented system development will give a clear idea on the systems

    functionality and will be helpful to overcome these unforeseen events.

    4. The new system provides both tangible and intangible benefits to the agency,

    which on the other hand will increase the agencys competitive advantage. This

    will also smoothen the management of the agency. These benefits are necessary

    and desirable.

  • 8/9/2019 Hardware First Docu Final

    29/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    29 | P a g e

    Chapter 5 Summary of the Project Paper

    Summary of Findings

    Conclusions

    Recommendations

  • 8/9/2019 Hardware First Docu Final

    30/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    30 | P a g e

  • 8/9/2019 Hardware First Docu Final

    31/31

    QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY

    &&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH

    31 | P a g e