Date post: | 30-May-2018 |
Category: |
Documents |
Upload: | warriormike |
View: | 217 times |
Download: | 0 times |
of 31
8/9/2019 Hardware First Docu Final
1/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
1 | P a g e
Chapter 1
THE PROJECT AND ITS SETTING
Introduction
Today there are many crimes in the country; one of these crimes is robbery
and speaking of robbery, there is a robbery gang that specializes in breaking and
entering in homes and robbing valuables. This gang is called as Akyat-Bahay
Gang literally means Climb-House Gang. They often do reconnaissance in
home and family activities such as what time the homeowner leave, what time
the owner return, which is left in the house, and how can criminals get inside the
house. This Gang often does this in long periods of time, so that criminals can
precisely time, plan and coordinate in attack.
Homes that live in villages which have security guards patrolling the village
are not safe from the Akyat-Bahay Gang. The said gang also scouts the activity
of the security guards, the neighbors, and even the housemaids, so that criminals
can get into the house without too much hassles and avoid being detected.
So, the Culprit Alarm Device was developed by the researchers in order to
make the homeowners or establishment owners properties safe and secure.
Even though the owner is not around to secure its properties, there is a device
that can detect person who wants to rob the owners properties.
8/9/2019 Hardware First Docu Final
2/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
2 | P a g e
The project designers had viewed and realized the advantageous that
automation had brought which had led us to conduct further studies on the
subject and come up with the design that will apply to the industry settings.
Automation and its many aspects were carefully studied and integrated with a
more recent technology-the Short Messaging Services (SMS).
With people becoming more concerned about the security and its every
aspect, the introduction of a more reliable and a more sophisticated way of
addressing the problems that comes with office and industrial security will be a
major breakthrough. Incorporating the existing technologies to achieve such an
objective is seen to be the best alternative there is other than creating a whole
new system, which will call for painstaking studies.
Background of the Project
Every man wants to make their properties or valuables safe and secure. So,
the researchers have planned to develop and implement a new device that can
really help people for their safety. This device was called as Culprit Alarm
Device; this device is a powerful tool for private and public safety and security
purpose. Because of this device, the owner can monitor his house wherever he
is. This device can detect someone or intruder/s who wants to enter in any
establishments/houses, then after detecting intruder/s the device will
automatically send text message to the gadget owners cell phone telling that
8/9/2019 Hardware First Docu Final
3/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
3 | P a g e
someone forced to open the owners house. In this kind of system-hardware, it
will really help to reduce and prevent crimes inside the house or even in any
establishments.
Scope:
The researchers project was designed to provide further security to the
houses and even to industries establishments through the use of a specially
designed hardware and which will be alarmed a cell phone and send text
message from a specific number. The system also informs selected individuals in
case of possible intrusion. This way the authorities will be warned accordingly.
Delimitation:
The system is limited only to locking and unlocking the door as well as on
informing the authorities about a possible forced entry/intrusion. The hardware
will not send a warning message once the button intended for them are blocked.
However, the design does not include any measure of blocking intruders in case
the entry to the location where device are installed by any other means. Even
any authorized person who wishes to enter another will also receive a warning
message to the assigned cell phone number. An alarm system is likewise
installed to inform authorities within the vicinity.
8/9/2019 Hardware First Docu Final
4/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
4 | P a g e
Significance of the Study
In this study, the researchers expect to contribute to the development of a
more sophisticated security system, which will bring about change in current
systems that are implemented by most conscious entities. It will also give future
researchers an idea on how any other processes maybe helpful to the
environment and for the improvement of the industry.
The study will be benefit by the following:
yHomeowners
The system will be benefited by the homeowners because of it provides
security for all the properties and valuables of the homeowners.
yEstablishments owners
The establishment's owners such as the people who owned building for
business purpose, may benefit this system that may serve as a protection for all
the properties of the establishment owner.
yFuture Researchers
To the future researchers, this study and system development will serve
as a basis for similar hardware projects and help to enhance the readers
knowledge about the hardware development.
8/9/2019 Hardware First Docu Final
5/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
5 | P a g e
CHAPTER 2
THEORETICAL FRAMEWORK
This chapter presents the review of Related Literature and Related Studies as
basis for conceptualization of this study.
REVIEW OF RELATED STUDIES/LITERATURES
Intruder Alarm
According to Shenzhen Sinda, the inventor of Intruder Alarm System,
comfort is a full-featured Intruder Alarm System (EN50131-compliant) with dialer,
telephone control, multiple security modes, and a practical Home Automation
System.
In the event of any alarm, the system can dial to 8 telephone numbers
including Central Monitoring Station (a service which monitors alarms from alarm
systems which are subscribed), and Cellular Phones to report the alarm. Each
Alarm Type (Comfort has 31 preprogrammed Alarm Types like Intruder, Fire,
Power Failure) can be programmed to dial to any combination of the 8 telephone
numbers for example, Intruder Alarm to Central Station and owner, Power
Failure to the owner, Low Battery to the Installation company etc.The Voice Station Intercom enables you to listen to sounds around up to 8
keypads in the home in the event of an alarm dial-out to your mobile phone.
8/9/2019 Hardware First Docu Final
6/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
6 | P a g e
While you are listening on the phone, the Alarm Tracking feature
automatically announces the location of the intruder as he is detected by motion
sensors in the premises, e.g. Kitchen Window, Living Room Movement,
You can dial in to your Comfort-enabled home from anywhere in the world to
check if you left the lights or appliances on, or if you forgot to arm the security
system, and to control your home.
With Comfort, home security and home appliances can be linked together to act
intelligently, so that for example, when the system is armed to Away Mode, all
the lights, air-conditioning, or other appliances can be switched off; or when you
come home at night, the car porch light and main entrance light can be turned on
automatically. This is the benefit of Integration. (SOURCE: Shenzhen Sinda
Technology Co.,Ltd.)
Whatis a Mobile Phone?
A mobile phone, as its name suggests, is a portable device with wireless
transmission, which anyone can use while on the go. You can use one for
making phone calls, receive phone calls, which is its main function, but you can
also transfer and receive files with music, videos, images and, of course, text.
8/9/2019 Hardware First Docu Final
7/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
7 | P a g e
Cellular Phone Parts
First take a look at your own model. What do you see? It has a Liquid Crystal
Display, a keypad like the one on your TV remote, while inside it has an antenna
(which can be external and visible at some models), a removable battery, a
microphone, a speaker, and another thing that you cannot see if you dont
disassembly the handset is the circuit board, in charge with processing the
commands you type.
On the circuit board, a specialist can identify easily the conversion chips that
translate the analog audio signal emitted when you are in a phone call, into
digital signal, and the digital signal that comes to your handset over the air, back
8/9/2019 Hardware First Docu Final
8/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
8 | P a g e
into analog. The smart piece that handles the digital signal is called the Digital
Signal Processor, which uses complex algorithms to make calculations in order
to transform the analog and digital signals in real time.
Same as personal computers, cell phones have also a microprocessor that
handles the commands from the keyboard making them displayable on the LCD.
The operating system and directories are kept in the Random Access Memory
and Flash memory chips, while the power issues are controlled by the Radio
Frequency and the power area.
Cell phone speakers are incredibly small, as well as microphones, but with the
latest technologies they have powerful capabilities.
8/9/2019 Hardware First Docu Final
9/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
9 | P a g e
Cell Phone Manufacturing
The manufacturing process involves 40% metals, 40% plastics and 20%
ceramics and trace materials, while the circuit board uses copper, lead, nickel,
gold, zinc, beryllium, tantalum, coltan and others. Some of the raw materials are
processed before the cell phone manufacturing, like the crude oil used for
plastics, which has to be mixed with natural gas and chemicals in a special plant.
The copper, for example, has to be mined, ground, heated and treated with
chemical substances and electricity, in order to isolate the pure metal used also
in batteries.
Cell Phone Screens with LCDs have liquid crystalline substances like mercury,
and are sandwiched between glass and plastic layers. The batteries have the two
electrodes made of metals.
8/9/2019 Hardware First Docu Final
10/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
10 | P a g e
This is a cell phone diagram for your curiosity
How Does a Mobile Phone Work?
How does a cell phone work? This is simple. If a standard radio uses a simplex
communication system so that you can hear the moderator talking, without
having the possibility to reply, a cell phone is a duplex device permitting you to
talk to the person who started the call. It sends and receives radio signals using
cell sites located on specially built towers, poles or buildings, all being connected
to a large cabled network with a switching system. The smart thing is that cell
phones send data to the nearest cell sites located at maximum 13 Km away, this
after they are turned On, moment when it registers with the switch, using .
8/9/2019 Hardware First Docu Final
11/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
11 | P a g e
When you are on the go, carrying your phone with, it is permanently detecting the
strongest signals from the base stations, so if a signal weakens, the handset care
is passed to the nearest cell site.
Your cell phone receives the phone call from a friend and this digital signal is
8/9/2019 Hardware First Docu Final
12/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
12 | P a g e
transformed into analog signal, processed by the Digital Signal Processor, and
finally amplified via the built-in speaker. When you talk, the voice is detected by
the small microphone as analog, processed, and in the end transformed into
digital signal to be sent over the air.
The SIM card is a microchip called a Subscriber Identity Module, and the phone
is dependent on it to work. It is in charge with storing information like the calling
plan and other phones details, while having a unique numerical identifier used to
lock the device permanently after the first activation.
History of the Cell Phone
Who Invented the Cell Phone? If you want to know who was the first who got the
idea of creating a cellular phone the answer is the American Telephone &
Telegraph which is no other than AT&T from the United States, which was the
world's largest telephone company and the world's largest cable television
operator, with $300 billion dollars revenue. It was purchased by Baby Bell SBC
Communications in 2005.
In April 1973, Dr Martin Cooper, former general manager for the systems division
at Motorola, invented the mobile phone prototype and made the first call to Joel
Engel, his rival, head of research at Bell Labs.
8/9/2019 Hardware First Docu Final
13/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
13 | P a g e
Copper was a project manager at Motorola and the worlds first mobile
phone was Motorola Dyna-Tac, a 2.5 pounds handset measuring 9 x 5 x 1.75
inches, featuring 30 circuit boards, 35 minutes talk time, 10 hours recharge time,
and having just three functionalities: dial, talk and listen. He, together with his
8/9/2019 Hardware First Docu Final
14/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
14 | P a g e
colleagues, published the patent for the worlds first portable duplex radio
telephone system.
AT&Ts concept couldnt pass by the monopoly on the wired service in the US in
1915, so someone else had to finalize this, and the answer for your next question
- When was the first mobile phone invented? - is the year 1978 and the place
Japan. There, the Nippon Telegraph and Telephone Corporation, known as the
most popular cell phone operator in the country, NTT DoCoMo, created the
worlds first commercial cell phone.
There are different types of mobile phones. Nokia Communicator launched in
1996 was the worlds first cell phone with Internet connectivity and email
functionality. The same company created the worlds first Smartphone.
NTT DoCoMo launched i-Mode, the first mobile Internet service, in 1999 in
Japan.
The first http://en.wikipedia.org/wiki/Short_message_service Short Message
Service message was sent in 1992 in the United Kingdom, but from a computer
to a cell phone, and the first text message sent from a phone to another phone
was in 1993 in Finland.
How many people own cell phones at this moment? We cannot be sure about the
8/9/2019 Hardware First Docu Final
15/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
15 | P a g e
number, but at the end of last year there were 3.3 billion subscribers worldwide,
meaning half of the population on the globe, and if you take into account the fact
that maybe 50% of them own more than one cell phone, you could imagine a
higher number, of almost 4.5 billion. The cellular phone technology is the most
widely spread and the most popular gadget in the world.
(SOURCE:http://www.cameraphonesplaza.com/who-invented-the-cell-phone)
8/9/2019 Hardware First Docu Final
16/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
16 | P a g e
Conceptual Framework
The conceptual framework that will be used in the study is the Input-
Process-Output Model. In the IPO model, a process is viewed as a series of
boxes (processing elements) connected by inputs and outputs. Information or
material objects flow through a series of tasks or activities based on a set of rules
or decision points. (,Rubrico 1997) Flow charts and process diagrams are often
used to represent the process. (,Rubrico 1997) What goes in is the input; what
causes the change is the process; what comes out is the output. (Paso, 2001)
Figure 1 illustrates the IPO model:
Input Process Output
Figure 1 Input, Process and Output Model
y Program thehardware
y Connect all the
materials/devices
y GatherInformation and
researches about
the hardware
y Gather all the
materials needed
for the hardware
y Provides securityfor all houses and
establishments
properties
y Reduces crimes
rates
8/9/2019 Hardware First Docu Final
17/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
17 | P a g e
Definition of Terms
SMS - stands forshort message service. SMS is also often referred to as texting,
sending text messages or text messaging.
Microcontroller- is an integrated chip that is often part of an embedded system.
Hardware - In information technology, hardware is the physical aspect of
computers, telecommunications, and other devices.
Software - is meant to be more self-contained and independent, and functions
as a tiny, dedicated computer.
Sensor - A device that measures or detects a real-world condition, such as
motion, heat or light and converts the condition into an analog or digital
representation.
Feasibility - Capable of being accomplished or brought about.
8/9/2019 Hardware First Docu Final
18/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
18 | P a g e
CHAPTER 3
OPERATIONAL FRAMEWORK
Project Design
Figure 2 Block Diagram
Attached
Cell phone
(Sender)
Button
Cell phone
(Receiver)
8/9/2019 Hardware First Docu Final
19/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
19 | P a g e
Figure 3 System Flowchart
8/9/2019 Hardware First Docu Final
20/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
20 | P a g e
Project Development
In developing the hardware, the researchers are discussing and
thinking first about the output, concept and the operation of the hardware.
The proponents done a research for gather more information and
techniques that can help the researchers to build the said hardware.
Evaluation / Validation Criteria
Discuss the parameters that will be used to evaluate the project in terms of
1. Technical Considerations
In technical considerations the user/s must consider and make sure that
the hardware is properly installed in order to run the hardware, make sure that
wires are not defective and the connection of all the devices are properly
arranged.
2. Operations
The first step in operating the House alarm culprit system, the user must
install first the sensor button of the said system-hardware in any desired location
(e.g. door, window) of the user's house. Then, after installing the censor button of
the system-hardware the user must consider that the cell phone
installed/connected to the microcontroller of the system-hardware has enough
loads to send text message/s to other cell phone. In order to receive text
8/9/2019 Hardware First Docu Final
21/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
21 | P a g e
message/s from the system-hardware the receiver must always make sure that
the cell phone is always on and have signal. After all this steps, test the system-
hardware, go out with the SMS receiver phone and close the part of the house
where censor button located then open it and wait for the warning message in
the receiver's phone.
3. Schedule
Because the researchers are new to this kind of project, the researchers
initially start by researching information or data related to the project for a month.
The researchers studied how to configure and connect all the materials include to
the project. After all this process, the researchers start to develop, connect and
buy all the materials needed to finish the project for over a month. In the whole
summary of the projects development schedule, the researchers finished it in
more than three months.
4. Economic and Cost Effectiveness
Every owner wants a cost-effective system. But what does this mean? In
many respects the interpretation is influenced by an individual's interests and
objectives.
y Is it the lowest first-cost structure that meets the program?
y Is it the facility in which users is most productive?
8/9/2019 Hardware First Docu Final
22/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
22 | P a g e
Yes, the developed system is very helpful to reduce expenses in any
establishments/houses it provides security and safety to the properties of the
owner. Instead of hiring a more security guard there is a SMS Culprit alarm
system that can detect intruders and warn the owner.
Design Instruments and Techniques
The instruments and techniques use din the collection of data for this study were:
a. Observations
Before developing the proposed system-hardware, the
researchers observed to some related hardware projects, the
purpose of this is to get a clearer and richer understanding of what
the proponent need to do to develop this kind of hardware, to know
what kind of materials needed, what are the capabilities of the
researchers project must have.
b. Research
The researchers visited some libraries such as the Adamson
University and the Quezon City library in order to gain more
knowledge about the system-hardware requirements, the features
and how the project does is developed. And with the help of
internet, the development of the project made the researchers to
understand how to develop the same system.
8/9/2019 Hardware First Docu Final
23/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
23 | P a g e
Chapter 4
Presentation of the Project Implementation
Before starting design work, some ideas require technical consultancy to
determine their technical feasibility and limit risk. Initial technical consultancy may
be required to assess the feasibility of the project and determine the correct
technical solutions. If the result of this is agreeable the development can start.
This chapter intends to study the possibility of completing a new
computerized system successfully. As it goes to the basic, the feasibly study
should provide necessary information to evaluate if the system is feasible to
be continued. The question and answer method have been employed to get
a clearer picture on this feasibility study answer method have been
employed to get a clearer picture on this feasibility study.
Technical Feasibility
In this part of the research, the technical aspects of the system will be
clarified.
The technical elements in the system will be confirmed and verified whether it is
practical and achievable.
1. Does the organization have the necessary equipment for the system?
8/9/2019 Hardware First Docu Final
24/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
24 | P a g e
No.
They do not have the required equipment since they have only practiced a
manual system before. All the necessary hardware needs to be purchased and
long-time investments on the computer peripherals is essential.
2. Can the future technology be adopted in the system?
No. There would not be any future technology that will be adopted since the
stability of this future systems have not been tested yet. The current, reliable
technologies will be used in this system. It is important to keep in mind that in
advertisement industry, the computer technological advancement is not
prioritized.
3. Does the organization need any technical expertise?
Yes. The agency will have to do some minor maintenance and debugging. All the
staffs in the company are computer literates, thus they will be able to understand
and use the system with basic training.
4. Will the hardware and software platform be reliable?
Yes. Both the platforms will be reliable and their reliability will be tested carefully
to avoid any problems in the future.
5. Will the system be able to handle the projected growth of the
organization in the future?
Yes. There will be a backup provided and older datas will be recorded and kept
in a separate backup.
8/9/2019 Hardware First Docu Final
25/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
25 | P a g e
Operational Feasibility
Operational feasibility involves considering whether the system is
appropriate with the working environment of the agency. All the terms (technical
terms) used in the research are elevated with the advertising terminologies
used in the working environment of the agency.
The main constrain of the feasibility study is to ensure the proposed
system gets the management support. As in this research, authorization is
obtained from an advertisement agency to conduct the research. Six
questions are used to clarify the operational feasibility study.
1. Do the users (staff) support the new system?
Yes they do. This is because all their opinion about the new computerized
system has been gathered. They believe that the new system can reduce the
errors during work and can simplify their job.
2. Are they satisfied with the current file based system?
No. The current manual system needs the staffs to perform every task manually.
For example, it is a difficult task to search for a booking and prepare (type) the
invoice. A computerized system will be easier to use. Computerized system also
will allow report generation that will be effective in decision-making.
3. Will there be any necessary for training?
8/9/2019 Hardware First Docu Final
26/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
26 | P a g e
4.
Yes. There is a need for some basic training for few days to understand the
systems.
4. Will the new system result in a workforce reduction?
Yes. There will be a workforce reduction since the invoicing process will
be automated. Invoicing consumes most of advertisement agencies working time.
Thus, this gives an advantage to the management in reducing expenditure
whereretrenchment is possible.
5. Will the users be involved in the planning of the new system from the
beginning?
Yes. The staffs will be involved to provide ideas and expectation from the new
system
6. Is the schedule for development systematic?
Yes. This is possible due to the usage of the waterfall model, which is a discipline
approach It guilds the system's development in stages up to the system
implementation process.
Economic Feasibility
This economic feasibility is intended to be studied if there will be any
additional cost such as purchasing new hardware.
8/9/2019 Hardware First Docu Final
27/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
27 | P a g e
1. Is there any special cost for people including the staff and users?
No. However some training cost will occur for the implementation of the new
computerized system.
2. Are there any special cost for the hardware and equipments?
No, The company has existing computer hardware and software that can be
used.
3. Is there any special cost for software?
No, all the software used in the system is a free open source software (FOSS) or
downloadable to the internet for free.
4. Is there any special cost for both formal and informal training?
Yes, there will be, but the cost will be minimal and the system will be developed
to be user friendly.
5. Will there be any licensing cost?
No licensing cost will occur since all the original software are purchased and
used only on a single pc. There is no connected pc or workstation, which would
require additional licensing.
8/9/2019 Hardware First Docu Final
28/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
28 | P a g e
Table: Feasibility Study Conclusion
1. Some financial allocation is vital in purchasing the hardware and software but
the amount is not much and will not be a burden to the company.
2. Some basic training is required for the staffs to train them to use the system.
The business process will not be affected since the training requires minimal
time.
3. Since the research concentrates on migrating from a manual system to a new
computerized system, there might be some unforeseen problems occurring in
future. If the guidelines are followed, it can solve the problem. The well-
documented system development will give a clear idea on the systems
functionality and will be helpful to overcome these unforeseen events.
4. The new system provides both tangible and intangible benefits to the agency,
which on the other hand will increase the agencys competitive advantage. This
will also smoothen the management of the agency. These benefits are necessary
and desirable.
8/9/2019 Hardware First Docu Final
29/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
29 | P a g e
Chapter 5 Summary of the Project Paper
Summary of Findings
Conclusions
Recommendations
8/9/2019 Hardware First Docu Final
30/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
30 | P a g e
8/9/2019 Hardware First Docu Final
31/31
QQQUUUEEEZZZOOONNN CCCIIITTTYYY PPPOOOLLLYYYTTTEEECCCHHHNNNIIICCC UUUNNNIIIVVVEEERRRSSSIIITTTYYY
&&&HHHQQQWWWHHHUUURRRIII((([[[FFFHHHOOOOOOHHHQQQFFFHHHLLLQQQ(((GGGXXXFFFDDDWWWLLLRRRQQQ 555HHHVVVHHHDDDUUUFFFKKKDDDQQQGGG666HHHUUUYYYLLLFFFHHH
31 | P a g e