Download as pdf or txt
Download as pdf or txt
You are on page 1of 33

Department of Electronic and Computer Engineering

Electronic Design Project 3B (EDPB301)

Assessment 5

Final Report

Smart Intruder System with Silent Alarm

By

Student Details
Student Surname Initials Student Number
Hoosen SM 22023565
PLAGIARISM DECLARATION

1. I know and understand that plagiarism is using another person’s work and pretending it is one’s
own, which is wrong.

2. This report is my own work.

3. I have appropriately referenced the work of other people I have used.

4. I have not allowed and will not allow anyone to copy my work with the intention of passing it off
as his/her own work.

Hoosen SM
____________________ 22023565
___________________ _______________________

Surname and Initials Student Number Signature

18/11/2023
____________________

Date

ii
ABSTRACT
The project aimed to develop a practical smart silent alarm system suitable for real-world applications.
The report details the construction process, highlights the obtained results, and discusses the
comprehensive testing conducted to validate the system's functionality. Critical to this design was the
implementation of a web server programmed to manage HTTPS requests, and the implementation of
the Arduino to handle requests from sensors. The system operated at 100% capacity, providing a
heightened sense of security for the end user within their environment. The thorough testing
confirmed the system's functionality, ensuring it would perform as intended in real-world scenarios.
The integration of a web server designed to handle HTTPS requests enhanced the overall reliability and
security of the alarm system.

iii
TABLE OF CONTENTS

ABSTRACT ................................................................................................................................................ iii


LIST OF FIGURES ...................................................................................................................................... vi
LIST OF TABLES ....................................................................................................................................... vii
CONSTANTS AND ABBREVIATIONS ........................................................................................................ viii
CHAPTER 1: INTRODUCTION ................................................................................................................... 1
1.1 System Background Information ............................................................................................. 1
1.2 Project Objectives.................................................................................................................... 2
1.3. Project Specifications ................................................................................................................... 2
1.4 Project Limitations................................................................................................................... 3
1.5 System Benefits ....................................................................................................................... 3
CHAPTER 2: DESIGN................................................................................................................................. 4
2.1 Detailed Project Specifications ...................................................................................................... 4
2.2 Project Design.......................................................................................................................... 6
2.2.1 Mechanical Design .......................................................................................................... 6
2.2.2 Electronic Design ............................................................................................................. 7
2.2.3 Software Design............................................................................................................... 7
2.3 Input Stage .............................................................................................................................. 8
3.1 Hardware ..................................................................................................................................... 10
3.1.1 PIR Motion Sensor ................................................................................................................ 10
3.1.2 Webcam Module .................................................................................................................. 10
3.1.3 GSM900 Module .................................................................................................................. 10
3.1.4 LCD........................................................................................................................................ 11
3.1.5 Panic Button ......................................................................................................................... 11
3.2 Software ...................................................................................................................................... 11
3.2.1 HTML Web Platform ............................................................................................................. 11
3.2.2 Arduino Coding ..................................................................................................................... 11
3.3 Housing........................................................................................................................................ 12
3.3.1 Aesthetic Design ................................................................................................................... 12
CHAPTER 4: TESTING ............................................................................................................................. 13
4.1 PIR Sensor Testing ................................................................................................................. 13
4.2 Webcam Module Testing ....................................................................................................... 13
iv
CHAPTER 5: RESULTS ............................................................................................................................. 15
5.1 Stage One: Detection Stage ................................................................................................... 15
5.2 Stage Two: Alert Stage........................................................................................................... 15
5.3 Stage Three: Response Stage ................................................................................................ 15
CHAPTER 6: CONCLUSION ..................................................................................................................... 16
REFERENCES .......................................................................................................................................... 18
ANNEXURES ........................................................................................................................................... 20

v
LIST OF FIGURES
Figure 1.3: System Block Diagram ............................................................................................................ 2

Figure 2.2.1: Floor Plan ............................................................................................................................ 6

Figure 3.2.2: Serial Monitor Readings .................................................................................................... 12

Figure 4: Live Webcam Feed................................................................................................................... 20

Figure 5: Circuit Schematic ..................................................................................................................... 20

Figure 6: Login Page Web Platform ........................................................................................................ 21

Figure 7: Bedroom with Sensor .............................................................................................................. 21

Figure 8: Main Room with Sensor .......................................................................................................... 22

Figure 9: Login Page HTML Code ............................................................................................................ 23

Figure 10: Live Webcam Feed Code ....................................................................................................... 24

Figure 11: Arduino Code......................................................................................................................... 25

vi
LIST OF TABLES
Table 1: Crime Stats in South Africa from 2010 – 2020 [3] ...................................................................... 1

vii
CONSTANTS AND ABBREVIATIONS

viii
CHAPTER 1: INTRODUCTION

1.1 System Background Information


Over a course of three months, stats for South African home break-ins have been recorded at a
staggering number of 36808, which equates to roughly 409 invasions recorded daily [1], as shown
in Table 1. This number is set to increase in the next few months, as holiday goers usually do not
take the necessary precautions to protect their homes from invasions. As the figures keep rising, a
solution that allows for all South Africans to remain feeling safe was required.

The Smart Silent Alarm system was a device developed to ensure the safety of the residents of a
household or building. This device used modernized technology to ensure that help arrived on the
scene of the crime before intruders became aware of the device. The use of this technology allowed
for various advanced systems to be pieced together, to create a system that could prevent potential
harm. This system utilized PIR motion sensors to detect motion in the vicinity. Subsequently, a PC
camera module was used to capture footage of the main area of the house, allowing constant
vigilance. To view this, an HTML web server was designed to access the camera footage. The system
was designed to ensure that false alarms were minimised by placing the sensor higher and
decreasing the sensitivity. Finally, a keypad was connected to the control panel to ensure that the
system could be armed and disarmed. As a secondary measure, the system was designed with an
“Arm” and “Disarm” button on the website, so that this could be done remotely.

RSA APRIL TO MARCH 2019_2020 – BURGLARIES AT RESIDENTIAL


PREMISES
2010_2011 246612
2011_2012 244667
2012_2013 261319
2013_2014 259784
2014_2015 253 716
2015_2016 250 606
2016_2017 246 654
2017_2018 228 094
2018_2019 220 865
2019_2020 205 959

Table 1: Crime Stats in South Africa from 2010 – 2020 [1]


1.2 Project Objectives
The design of the system had the following objectives:

➢ To ensure that the system alerted the respective officials of a breach of security in the
household or building.
➢ To provide an efficient means of safety for the occupants, whereby the occupants remain
unharmed in the situation.
➢ To be discreet in the dispatch of an alarm, as an audible alarm could be cause for further harm.
➢ To be designed with a User-Friendly interface to make it easier for users to engage with.
➢ To ensure that the system had a backup power supply in the case of a power outage.
➢ To ensure that the system could be useful in all environments.

1.3. Project Specifications


➢ Silent Notifications – By making use of silent notifications, the system had the ability to alert
the occupant without alerting the intruder.
➢ Battery Backup – Due to constant power outages in South Africa, the system was designed to
function even when a power outage occurred.
➢ Remote Monitoring – The system made use of a camera module that allowed the user to have
access to a complete view of the area to ensure safety.
➢ Panic Button – The system was designed with a panic button to ensure that if the need arises,
a manual way of contacting the security company was available.
➢ User Interface – By incorporating the design with a friendly UI, the system was easy to use and
control.

Figure 1.3 System Block Diagram

2
1.4 Project Limitations
The design of this system had the following limitations:

➢ Compatibility Issues – The system designed was not created to be compatible with all smart
home devices, which can limit the ability to integrate with different devices,
➢ Power Outages – Even with a backup power supply, a prolonged power outage can render the
device inaccessible.
➢ Dependence on Notifications – Due to human error, notifications can go by unseen. This can
lead to authorities arriving on scene after the damage has been done.
➢ Poor Internet Connectivity – The system can fail if the network is unstable and can produce
errors.
➢ Lack of Audio Deterrent – The lack of an audio deterrent can allow an intruder to stay in the
residence for longer than expected, which can be a security risk for the occupants.

1.5 System Benefits


Utilising this system has the following benefits:
➢ Remote Access – The system can be accessed remotely through the web page that has been
designed. This comes equipped with a login security feature, which allows the user to log into
the system and arm or disarm it.
➢ Reduced False Alarms – By positioning the sensors correctly and correctly coding them, the
possibility of false alarms as reduced substantially.
➢ Discreetness – By utilising this system, a state of panic can be averted in the event of a robbery
or break-in.

3
CHAPTER 2: DESIGN

2.1 Detailed Project Specifications


The system was designed to be discreet and efficient, ensuring that homeowners could feel safe
without drawing attention to potential threats. Its seamless integration with existing security
measures allowed for a comprehensive approach to home protection. Additionally, the system's
ability to provide real-time updates to security companies enabled swift and effective responses
to any security breaches.

The design had the following specifications:

1. Silent Alerts

By implementing this system, seamless integration of silent alerts could occur through instant
email, SMS, or mobile app notifications, sent to both the occupant and security company.
Embracing this practice was especially advantageous as it saved valuable time for the security
company while bolstering overall safety on site.

2. Web App Integration

Utilizing a web app for remote monitoring enabled the system to send alerts solely upon
detecting an intruder. This message was sent via SMS, and the homeowner could clearly see
what was happening within the house.

3. Access to camera module

By accessing the camera module, the homeowner could see what was happening within the
house and call the respective authorities, even if the motion sensor did not detect them.

4. Encryption and Security

The system used an https security feature on the website, which allowed the site to be
completely secure and reduced the potential of hacking. The system communicated with the
Arduino to ensure that information is not lost.

4
5. Motion Detection

The system used PIR motion sensors to detect motion within the house. By coding the sensors
correctly, the possibility of false alarms was decreased.

To guarantee that production standards were achieved, the design process for the Smart Silent
Alarm System adhered to a rigorous quality control management approach. This strategy was
composed of three main procedures:

1. Quality Planning
Developed design objectives and guidelines to produce the system. Conducted research and
evaluations to develop an effective system design. Established an execution strategy to
oversee the design project. Created a Gantt Chart to manage time effectively.

2. Quality Control
Conducted trial tests and inspections in accordance with the standards and production
objectives, to examine the functionality and progress of the system, at various stages of the
design process. Record data extracted.

3. Quality Assurance
Thoroughly examined and scrutinize all the available trial data, closely analysing findings.
Following this thorough analysis, considered reassessing both the design and production
processes in place, carefully weighing whether any modifications or adjustments were
required based on the new insights.

The Smart Silent Alarm System's design was divided into three sub-components and executed per
the quality planning procedure.

5
2.2 Project Design
The project was designed in accordance with design specifications, and met the requirements set
out during initial planning.

2.2.1 Mechanical Design


1. Circuitry Housing
The system circuitry was contained within a white tubing and placed within the housing so
that the system could function without errors. This also allowed overall design of the
housing to have a neat finish, as well as not clutter the rest of the design. The PIR sensor
and camera module remained visible, to ensure that motion was easily detected, and a full
view of the room was available. This was a necessary precaution to ensure that
detectability was minimised.

2. Aesthetic Design
The purpose of the aesthetic design was to create a workable demo to present that
effectively demonstrated the outcome that was expected. This allowed the system to be
tested in a real-world environment, facilitating experiments and evaluation. To this end, a
2-bedroom model house was constructed, as seen in Annexure 3. The motion sensors were
mounted in the vertices of the house and was supplemented by the camera module of
comprehensive coverage in the main living area and point of entrance. In addition, mirrors
were placed opposite the camera to ensure that there were no available blind spots that
an intruder could manoeuvre through undetected. The house plan for the design is shown
in Figure 2.1.1. The house has been constructed using Polymethyl Methacrylate, also
known as Plexi Glass, which is a shatterproof plastic sheet that allowed for the design to
be transparent. This allowed for the system setup to be visible at all points for
demonstration purposes.

Figure 2.2.1 Floor Plan


6
2.2.2 Electronic Design
➢ PIR Motion Sensors
The HC-SR501 PIR motion sensor was used to detect the motion of an intruder within the
vicinity. This module was programmed to decrease the sensitivity of the component, to
ensure that false alarms were reduced. The sensors were strategically placed to further
decrease the occurrence of false alarms.
➢ PC Camera Module
The PC camera module allowed for the living area and main Point of Entry to be viewable
through an HTML web server. Through strategic placement, the camera was undetectable
in darkness. This was also due to the module being enclosed in a black casing. By
connecting the module to a power source, the camera could be powered and run
continuously to ensure that the area was being monitored constantly. The video feed was
accessible through the web server, which was encrypted by an https SSL, and required login
details to be viewed.
➢ Secondary Power Source
In the event of a power outage, the system was equipped with an external power source
to overcome this problem. The system uses a 9V battery as a secondary power supply.
➢ GSM Module
By utilising the GSM module, the user was able to receive real time alerts whenever motion
was detected in the vicinity. This was programmed to be sent to the security company and
the occupant.

2.2.3 Software Design


1. HTML Web Server
The HTML web server was designed using Visual Studio code, and combined HTML, CSS,
and JavaScript languages. The Arduino was unable to communicate to the web page
directly, so a Node.js server was created to act as a collection point for both the Arduino
and the web server. Instead of the Arduino sending information directly to the web page,
it sent this information to the Node server, which then communicated that information to
the web page and vide versa. By configuring the code, the web page was created to have
a login page, with a username of “Shaeen” and a password of “Hoosen” This was then
uploaded to a domain with SSL security. Once the login details were confirmed, the next
page of the web server was accessible, which showed the Camera Module, as well as
buttons to arm and disarm the device. This code is shown in Annexure 3.
2. Arduino IDE

7
The Arduino IDE was used to configure the PIR motion sensors so that they could detect
motion in the area and decrease the sensitivity of the sensors. By doing this, it allowed
for the motion sensor to reduce the occurrence of false alarms. The Arduino was also
used to program the LCD, which displayed when the system was armed or disarmed.

2.3 Input Stage


During the initial phase of the security system's operation, the PIR (Passive Infrared) motion sensors
actively and continuously monitored the property for any signs of movement. These sensors were
designed to detect even the slightest motion within the designated area. Once any movement was
identified, the PIR motion sensors promptly captured and recorded this information, which was
then meticulously documented and displayed on the web platform as a detailed graphical
representation of the detected motion. The graphical representation on the web platform served
as a visual depiction of the detected motion, providing a comprehensive overview of the
movement patterns within the property. This graphical representation not only enhanced the
understanding of the detected motion but also facilitated the analysis of the movement data for
further insights. If the graphical representation on the web platform indicated a sustained motion
surpassing a 5V threshold for a continuous period of five seconds, the security system initiated a
series of predefined actions to ensure the safety and security of the property. One of the primary
actions triggered by this threshold breach was the transmission of an immediate alert to both the
designated mobile application and the web platform. The alert, once received by the mobile
application and web platform, served as a critical notification signalling the security company to
promptly dispatch a security vehicle to the location of the breach. This swift and decisive response
was essential in addressing the security breach and ensuring the timely arrival of security personnel
to assess and mitigate any potential threats to the property.

2.4 Active Stage


During the active stage, the Arduino was utilized as the central component to facilitate the
connection between the LCD and the system, effectively indicating any breach that occurred. The
LCD, strategically positioned in the main bedroom, served as the primary display for relaying this
crucial information. Simultaneously, notifications were promptly dispatched to both the security
company and the homeowner, ensuring that all relevant parties were promptly informed of the
breach. This seamless communication process enabled the security company to swiftly mobilize
and arrive at the premises before the intruders could discern that an alarm had been triggered,
thereby enhancing the overall effectiveness of the security measures in place.

8
2.5 Output Stage
At the output stage, the camera module was actively engaged in recording the designated area
continuously, ensuring comprehensive coverage at all times. In the event of any motion being
detected for a duration exceeding 5 seconds, the camera module promptly recorded the footage
of the specific area. Subsequently, a notification was promptly dispatched to the resident, ensuring
that they were promptly informed of the detected motion, thus enabling them to take appropriate
action if necessary. Furthermore, the security company was promptly alerted, prompting them to
dispatch a dedicated team to the premises, thereby ensuring a swift and effective response to any
security concerns.

9
CHAPTER 3: CONSTRUCTION

The construction of the included the interfacing of the components using the Arduino to ensue that all
components communicated with each other. This was also interfaced with VS Code, to ensure that the
device was accessible through the web server. Lastly, all components were placed within the housing
to create the finalised aesthetic look of the design.

3.1 Hardware

3.1.1 PIR Motion Sensor


The PIR Motion Sensor was connected to the Arduino using Pin 2 as the output. The sensor
had additional pins that needed to be connected to 5V and GND. As the Arduino only had a
single GND and 5V slot, a single track on the Veroboard was used for the pins to be
connected. The sensor detects motion in a range of 1.5m. It functioned such that motion
was detected using an infrared pulse, which, when broken, sent a message back to the
Arduino indicating that motion had been detected. A delay of 5s was used as the interval.
This quick succession allowed the security company to be constantly updated when motion
was detected.

3.1.2 Webcam Module


The webcam module was used to display a live feed of the main living area and Point of
Entry. By integrating the webcam into the system, the user was able to have a continuous
live feed of the area that could be accessed remotely. This module was connected directly
to a PC and required constant power. The module was integrated onto the HTML webpage
using “getUserMedia”, which is an API available from WebRTC. By setting the API to “true”,
the user was able to access the connected webcam.

3.1.3 GSM900 Module


By making use of the GSM module, the user was able to receive real time updates on motion
that had been detected. This device was interfaced with the Arduino, and coded such that
whenever motion was detected for a period longer than 3s, an SMS was sent to the user.
Through trial and error, it was decided that an SMS module was able to send a message
faster than the application. This is due to the application having backend coding that slowed
down the response time. By using the GSM Module, the user was able to receive a
notification in 3s, which resulted in a quicker response time from the security company.

10
3.1.4 LCD
The LCD was used to display information on arming and disarming the system. By including
the LCD in the final design, it allowed for the system to be more User-Friendly. This
conclusion arose from a survey taken by 5 separate individuals.

3.1.5 Panic Button


The panic button was integrated into the circuit as a backup system in the case where a user
required immediate assistance. A manual way of sending the notification was made
available in the case where the occupant realises that there is an intruder before the motion
sensor detects motion. By utilising this tool, it allowed for the user to manually request for
assistance at his/her premises.

3.2 Software

3.2.1 HTML Web Platform


The HTML Web Platform served as the portal to access the live video feed of the camera
module. This platform did not communicate directly with the Arduino; instead, a node.js
server was created to communicate information to the Arduino from the web page. This
allowed for seamless communication between the two devices. The HTML web page
consisted of two separate pages: the first being the login page, and the second being the
live video feed page. On the login page, CSS coding was used to design the web page to
ensure that there was a friendly UI. The default logins were set as “user” and “password”
but could be changed upon request. If the incorrect login details were entered, the web
page displayed “Incorrect Details! Please try again”. Once the correct details were entered,
the web page opened to the live webcam feed, as seen in Figure 3.2.1. The web page also
had the function of arming and disarming the system, making it easier for the user to turn
the system on and off.

3.2.2 Arduino Coding


The Arduino IDE was used to develop the code for the PIR motion sensor, LCD, and the GSM
module. By interfacing the code with the subcircuits, the system was able to function
seamlessly. For the GSM Module, an MTN sim card was purchased as the receiver number
for the SMS. Codes were taken from GitHub repositories and edited to ensure that the
system functioned as expected.

11
Figure 3.2.2. Serial Monitor Readings

3.3 Housing

3.3.1 Aesthetic Design


The prototype of the house was designed using Plexi Glass and was scored to cut the glass
into equal pieces. The outer walls of the house measured at 175mmX500mm, with a 50mm
slot separating the prototype into its respective rooms. The system was placed in a strategic
location within the home and fastened onto the walls. This ensured that the components
did not move and could not be tampered with. The LCD and a Matrix Keypad were placed
in the main bedroom for easy access to arming and disarming the device. Two PIR sensors
were used in the prototype: one being in the kitchen, and one being in the living area. The
camera module was placed closer to the Point of Entry so that the live view could detect
blind spots. Finally, mirrored glass was placed opposite the camera to that all blind spots
were covered. The prototype was painted and decorated according to the room. To ensure
full visibility of the system, the prototype was built without the roof.

12
CHAPTER 4: TESTING

4.1 PIR Sensor Testing


➢ The PIR sensors were interfaced with the Arduino to test if they could efficiently
communicate with a single Arduino in unison.
➢ The range of motion for the PIR sensor was also tested to determine if that range of motion
would adequately detect the motion within the range of the room. This was done by
detecting heat signatures that enter the room, emitted by an intruder.
➢ When the IR sensor was interfaced with the Arduino, it was placed in a corner of a room
with dimensions of 2.5m x 2.5m. A test subject walked through the door, and the PIR
detected motion for their approach.
➢ The additional LED that was interfaced with the Arduino during the testing stage began to
flash, indicating that motion was detected.
➢ The result of this observation concluded that the PIR sensor was able to detect motion
within a minimum range of 2.5m.
➢ The PIR sensor was placed in larger rooms of the house to reinforce the test.

4.2 Webcam Module Testing


➢ The webcam module has been coded to record the surrounding of the room.
➢ This has been coded using HTML, which allows the webcam to stream to a live server.
➢ This can be accessed using the main computers IP address.
➢ The webcam module recorded the area in HD quality.
➢ The camera module was able to connect directly to the web server to ensure that the
surrounding area could be seen properly.
➢ The webcam module was adjustable, so the view could be altered.

4.3 LCD Display Testing


➢ The LCD display has been interfaced with the Arduino and coded using the Arduino IDE to
display when the system has been enabled or disabled.
➢ It has also been coded to display when an intruder has been detected by the PIR sensor.

13
4.4 Website Button Testing
➢ The buttons on the HTML website were programmed within the code to ensure that the user
could turn the system on and off.
➢ This was done by integrating a relay into the circuit to act as a switch for the circuit.
➢ The “arm” button activated the circuit, whilst the “disarm” button deactivated the circuit.
4.5 Panic Button Testing
➢ The panic button was included in the design to be kept near the LCD.
➢ The button was soldered onto the Veroboard and attached to the circuit to function as a safety
switch.
➢ During testing, the button was integrated to the circuit using an LED and was tested on the
breadboard.
➢ It was configured to turn the LED on when the button was pressed, and to turn the LED off
when the button was pressed for the second time.
➢ This notion was used to send a message to the user when the button was pressed.
4.6 Web Page Testing
➢ Testing of the webpage required trial and error and using GitHub repositories.
➢ This was done to ensure that the coding for the website login page and live feed was correct.
➢ A domain was purchased to ensure that the website had an SSL certificate installed, and so that
it could be accessible from anywhere.
➢ By troubleshooting the code, the web page was able to function as expected.

14
CHAPTER 5: RESULTS
5.1 Stage One: Detection Stage
During the detection stage, the smart silent alarm system used the PIR sensors to detect when
motion was present. There was a 5s interval between each pulse, which was sufficient for the
security company to ensure that they could send a dispatch team out quickly. This motion was
shown on the Arduino IDE as digital ‘1’s and ‘0’s. When motion was detected, the system showed
a ‘1’. When no motion was detected, the system showed a ‘0’. The motion that was detected was
also visible on the serial plotter in the Arduino IDE, which showed a peak when motion was
detected.

Additionally, the LCD setup that was configured displayed when the system was armed and
disarmed, providing the response required for the design.

5.2 Stage Two: Alert Stage


Upon detecting motion, the control panel immediately and automatically sent a message to the
designated cell number, allowing the security company to promptly dispatch a response team to
the location where the motion was detected. This swift communication and action ensured that
any potential security threats or breaches were addressed in a timely manner, enhancing the
overall safety and security of the premises. Additionally, to minimize the occurrence of false
alarms, the system's sensitivity was carefully and precisely adjusted to a higher setting, thereby
ensuring that the device was not operating at its maximum sensitivity level, which could lead to
unnecessary alerts and disruptions.

5.3 Stage Three: Response Stage


Upon receiving the discreet alert, the response phase entails taking suitable action in response to
the received notification. This means that homeowners or authorized individuals have the option
to remotely assess the situation using their mobile devices or to swiftly act by contacting
emergency services or confirming the reason for the alert. It's important to note that integrated
smart home capabilities may facilitate remote management of security cameras, door locks, or
other interconnected devices to thoroughly investigate the triggered event or fortify the
property's security. This allows for a comprehensive approach to addressing the situation,
ensuring that the appropriate measures are taken to address the alert effectively and efficiently.

15
CHAPTER 6: CONCLUSION
6.1 Decisions Made
- SMS Module: The use of the SMS service was revisited after testing the time taken for the
mobile application to send a notification. By using the SMS module, the time taken to receive
the notification was reduced to 3s. This allowed for a swifter response from the security
company.
- LCD AND Matrix Keypad: Whilst creating the design, it was important to realise that power
outages became problematic to the end user. This was due to poor connectivity, which caused
the inability of using the mobile app. To overcome this issue, the LCD and Matrix Keypad were
introduced, to enhance the functionality of the device and to provide a device that could keep
the occupants safe during load shedding.
- Panic Button: The use of a panic button allowed the user to be able to contact the security
company if danger was present. This was done by overriding the system, and directly sending
a message to the security company if the button was pressed. The button was kept higher up
and out of reach of children on the final design.
- Relay: By incorporating a relay to the system, the user was able to remotely arm and disarm
the system without having to use the matrix keypad. This made it easier for the end user to use
the system and was done through incorporating buttons on the website to control the system.

6.2 Observations
By making the changes above, the use of the system became seamless and allowed the end user
to make use of the system efficiently. The PC camera module was used to have a live view of the
room to ensure that remote viewing was possible. The system also had the option of customizing
the alert settings based on which room the motion was detected. This was done through updating
of the code. This system allowed for a user to have a cost efficient and energy efficient method of
keeping the residence safe. By using enhanced security features, the system allowed for a
convenient sense of control to the user, ensuring his/her safety.

6.3 Outcomes
The system was designed and functioned to 100% efficiency. The system could send information to
the user in a shorter period and ensure that the security company could get there on time. The
time taken to design the system was a little off schedule, due to the malfunctioning of certain
aspects of the initial design. This included the motion sensor plot being available on the web page.
This issue was related to the Arduino and Node.js server not communicating efficiently.

16
6.4 Recommendations
To optimize the functionality and efficacy of a smart, silent alarm system, it is recommended that
the following alterations be implemented:

- Augmenting Compatibility with Smart Home Devices: To enhance the functionality of our
silent alarm, we propose improving its compatibility with various smart home devices. With
this integration, users can establish a comprehensive security ecosystem that communicates
effectively and triggers suitable responses based on specific events or customized
parameters. This technology may include but not be limited to smart locks, motion sensors,
and high-quality security cameras.

- Advanced Machine Learning Algorithms can be employed to upgrade the performance of


silent alarms, enabling them to distinguish between legitimate security threats and false
alarms. Through a comprehensive analysis of behavioural patterns, environmental factors
and user activities, these algorithms optimize their capabilities in accurately detecting
suspicious behaviour within premises while minimizing incidences of erroneous alerts. The
deployment thereof guarantees timely responses towards potential breaches in buildings
under surveillance systems' coverage.

- Customizable Notification Configurations: Offer users a selection of alterable notification


configurations to serve their distinct preferences and requirements. Grant users the freedom
to choose from an assortment of notification modes, comprising mobile app alerts, email
notifications, and SMS messages while offering versatility in setting varying priority levels for
specific occurrences. This personalization enhances user agency by enabling real-time
information updates delivery expeditiously that ensures timely receipt of crucial security
updates.

17
REFERENCES

Main References

[1] “The 10 worst areas in South Africa for home break-ins and robberies ...,” The 10 worst areas in
South Africa for home break-ins and robberies,
https://businesstech.co.za/news/lifestyle/712780/the-10-worst-areas-in-south-africa-for-home-
break-ins-and-robberies/ (accessed Oct. 15, 2023).

[2] Macfos, “PIR sensor working principle: How pir sensor works,” Robu.in | Indian Online Store | RC
Hobby | Robotics, https://robu.in/pir-sensor-working-principle/ (accessed Oct. 15, 2023).

[3] “HC-SR501 infrared pir module,” Devobox, https://www.devobox.com/el/proximity/235-hc-sr501-


infrared-pir-module.html (accessed Oct. 15, 2023).

[4] Pir Infrared Motion Sensor (HC-SR501), https://www.pishop.co.za/store/pir-infrared-motion-


sensor-hc-sr501 (accessed Oct. 24, 2023).

[5] T. Xometry, “Everything you need to know about acrylic (PMMA),” Xometrys RSS,
https://www.xometry.com/resources/materials/acrylic-
pmma/#:~:text=Polymethyl%20methacrylate%20(PMMA)%20is%20also,shatter%2Dresistant%2
0alternative%20to%20glass. (accessed Nov. 12, 2023).

Other References

Web Sources

[1] “Node.js web application framework,” Express, https://expressjs.com/ (accessed Nov. 19, 2023).

[2] V. A. Reston, “Viewing WebSocket Server Endpoints for a WebSocket Port,” Reverb,
https://documentation.softwareag.com/webmethods/compendiums/v10-
5/C_API_Management/index.html#page/api-mgmt-comp/to-websocket_new_7.html (accessed
Nov. 19, 2023).

[3] Chart.js - installation,” Online Tutorials, Courses, and eBooks Library,


https://www.tutorialspoint.com/chartjs/chartjs_installation.htm (accessed Nov. 12, 2023).

[4] “HC-SR501 Pir Sensor,” Components101, https://components101.com/sensors/hc-sr501-pir-


sensor (accessed Nov. 11, 2023).

18
[5] Communicating between an HTML/Javascript website with an Arduino, Thomas A, YouTube, 2020.

19
ANNEXURES
ANNXURE A

Figure 4 Live Webcam Feed

ANNEXURE B

Figure 5 Circuit Schematic

20
ANNEXURE C

Figure 6 Login Page: Web Platform

ANNEXURE D

Figure 7: Bedroom with Sensor

21
Figure 8: Main room with Sensor

22
ANNEXURE E

Figure 9: Login Page HTML Code

23
ANNEXURE F

Figure 10: Live Webcam Feed Code

24
ANNEXURE G

Figure 11: Arduino Code

25

You might also like