Professional Documents
Culture Documents
Hoosen SM Final Report Group G S22023
Hoosen SM Final Report Group G S22023
Assessment 5
Final Report
By
Student Details
Student Surname Initials Student Number
Hoosen SM 22023565
PLAGIARISM DECLARATION
1. I know and understand that plagiarism is using another person’s work and pretending it is one’s
own, which is wrong.
4. I have not allowed and will not allow anyone to copy my work with the intention of passing it off
as his/her own work.
Hoosen SM
____________________ 22023565
___________________ _______________________
18/11/2023
____________________
Date
ii
ABSTRACT
The project aimed to develop a practical smart silent alarm system suitable for real-world applications.
The report details the construction process, highlights the obtained results, and discusses the
comprehensive testing conducted to validate the system's functionality. Critical to this design was the
implementation of a web server programmed to manage HTTPS requests, and the implementation of
the Arduino to handle requests from sensors. The system operated at 100% capacity, providing a
heightened sense of security for the end user within their environment. The thorough testing
confirmed the system's functionality, ensuring it would perform as intended in real-world scenarios.
The integration of a web server designed to handle HTTPS requests enhanced the overall reliability and
security of the alarm system.
iii
TABLE OF CONTENTS
v
LIST OF FIGURES
Figure 1.3: System Block Diagram ............................................................................................................ 2
vi
LIST OF TABLES
Table 1: Crime Stats in South Africa from 2010 – 2020 [3] ...................................................................... 1
vii
CONSTANTS AND ABBREVIATIONS
viii
CHAPTER 1: INTRODUCTION
The Smart Silent Alarm system was a device developed to ensure the safety of the residents of a
household or building. This device used modernized technology to ensure that help arrived on the
scene of the crime before intruders became aware of the device. The use of this technology allowed
for various advanced systems to be pieced together, to create a system that could prevent potential
harm. This system utilized PIR motion sensors to detect motion in the vicinity. Subsequently, a PC
camera module was used to capture footage of the main area of the house, allowing constant
vigilance. To view this, an HTML web server was designed to access the camera footage. The system
was designed to ensure that false alarms were minimised by placing the sensor higher and
decreasing the sensitivity. Finally, a keypad was connected to the control panel to ensure that the
system could be armed and disarmed. As a secondary measure, the system was designed with an
“Arm” and “Disarm” button on the website, so that this could be done remotely.
➢ To ensure that the system alerted the respective officials of a breach of security in the
household or building.
➢ To provide an efficient means of safety for the occupants, whereby the occupants remain
unharmed in the situation.
➢ To be discreet in the dispatch of an alarm, as an audible alarm could be cause for further harm.
➢ To be designed with a User-Friendly interface to make it easier for users to engage with.
➢ To ensure that the system had a backup power supply in the case of a power outage.
➢ To ensure that the system could be useful in all environments.
2
1.4 Project Limitations
The design of this system had the following limitations:
➢ Compatibility Issues – The system designed was not created to be compatible with all smart
home devices, which can limit the ability to integrate with different devices,
➢ Power Outages – Even with a backup power supply, a prolonged power outage can render the
device inaccessible.
➢ Dependence on Notifications – Due to human error, notifications can go by unseen. This can
lead to authorities arriving on scene after the damage has been done.
➢ Poor Internet Connectivity – The system can fail if the network is unstable and can produce
errors.
➢ Lack of Audio Deterrent – The lack of an audio deterrent can allow an intruder to stay in the
residence for longer than expected, which can be a security risk for the occupants.
3
CHAPTER 2: DESIGN
1. Silent Alerts
By implementing this system, seamless integration of silent alerts could occur through instant
email, SMS, or mobile app notifications, sent to both the occupant and security company.
Embracing this practice was especially advantageous as it saved valuable time for the security
company while bolstering overall safety on site.
Utilizing a web app for remote monitoring enabled the system to send alerts solely upon
detecting an intruder. This message was sent via SMS, and the homeowner could clearly see
what was happening within the house.
By accessing the camera module, the homeowner could see what was happening within the
house and call the respective authorities, even if the motion sensor did not detect them.
The system used an https security feature on the website, which allowed the site to be
completely secure and reduced the potential of hacking. The system communicated with the
Arduino to ensure that information is not lost.
4
5. Motion Detection
The system used PIR motion sensors to detect motion within the house. By coding the sensors
correctly, the possibility of false alarms was decreased.
To guarantee that production standards were achieved, the design process for the Smart Silent
Alarm System adhered to a rigorous quality control management approach. This strategy was
composed of three main procedures:
1. Quality Planning
Developed design objectives and guidelines to produce the system. Conducted research and
evaluations to develop an effective system design. Established an execution strategy to
oversee the design project. Created a Gantt Chart to manage time effectively.
2. Quality Control
Conducted trial tests and inspections in accordance with the standards and production
objectives, to examine the functionality and progress of the system, at various stages of the
design process. Record data extracted.
3. Quality Assurance
Thoroughly examined and scrutinize all the available trial data, closely analysing findings.
Following this thorough analysis, considered reassessing both the design and production
processes in place, carefully weighing whether any modifications or adjustments were
required based on the new insights.
The Smart Silent Alarm System's design was divided into three sub-components and executed per
the quality planning procedure.
5
2.2 Project Design
The project was designed in accordance with design specifications, and met the requirements set
out during initial planning.
2. Aesthetic Design
The purpose of the aesthetic design was to create a workable demo to present that
effectively demonstrated the outcome that was expected. This allowed the system to be
tested in a real-world environment, facilitating experiments and evaluation. To this end, a
2-bedroom model house was constructed, as seen in Annexure 3. The motion sensors were
mounted in the vertices of the house and was supplemented by the camera module of
comprehensive coverage in the main living area and point of entrance. In addition, mirrors
were placed opposite the camera to ensure that there were no available blind spots that
an intruder could manoeuvre through undetected. The house plan for the design is shown
in Figure 2.1.1. The house has been constructed using Polymethyl Methacrylate, also
known as Plexi Glass, which is a shatterproof plastic sheet that allowed for the design to
be transparent. This allowed for the system setup to be visible at all points for
demonstration purposes.
7
The Arduino IDE was used to configure the PIR motion sensors so that they could detect
motion in the area and decrease the sensitivity of the sensors. By doing this, it allowed
for the motion sensor to reduce the occurrence of false alarms. The Arduino was also
used to program the LCD, which displayed when the system was armed or disarmed.
8
2.5 Output Stage
At the output stage, the camera module was actively engaged in recording the designated area
continuously, ensuring comprehensive coverage at all times. In the event of any motion being
detected for a duration exceeding 5 seconds, the camera module promptly recorded the footage
of the specific area. Subsequently, a notification was promptly dispatched to the resident, ensuring
that they were promptly informed of the detected motion, thus enabling them to take appropriate
action if necessary. Furthermore, the security company was promptly alerted, prompting them to
dispatch a dedicated team to the premises, thereby ensuring a swift and effective response to any
security concerns.
9
CHAPTER 3: CONSTRUCTION
The construction of the included the interfacing of the components using the Arduino to ensue that all
components communicated with each other. This was also interfaced with VS Code, to ensure that the
device was accessible through the web server. Lastly, all components were placed within the housing
to create the finalised aesthetic look of the design.
3.1 Hardware
10
3.1.4 LCD
The LCD was used to display information on arming and disarming the system. By including
the LCD in the final design, it allowed for the system to be more User-Friendly. This
conclusion arose from a survey taken by 5 separate individuals.
3.2 Software
11
Figure 3.2.2. Serial Monitor Readings
3.3 Housing
12
CHAPTER 4: TESTING
13
4.4 Website Button Testing
➢ The buttons on the HTML website were programmed within the code to ensure that the user
could turn the system on and off.
➢ This was done by integrating a relay into the circuit to act as a switch for the circuit.
➢ The “arm” button activated the circuit, whilst the “disarm” button deactivated the circuit.
4.5 Panic Button Testing
➢ The panic button was included in the design to be kept near the LCD.
➢ The button was soldered onto the Veroboard and attached to the circuit to function as a safety
switch.
➢ During testing, the button was integrated to the circuit using an LED and was tested on the
breadboard.
➢ It was configured to turn the LED on when the button was pressed, and to turn the LED off
when the button was pressed for the second time.
➢ This notion was used to send a message to the user when the button was pressed.
4.6 Web Page Testing
➢ Testing of the webpage required trial and error and using GitHub repositories.
➢ This was done to ensure that the coding for the website login page and live feed was correct.
➢ A domain was purchased to ensure that the website had an SSL certificate installed, and so that
it could be accessible from anywhere.
➢ By troubleshooting the code, the web page was able to function as expected.
14
CHAPTER 5: RESULTS
5.1 Stage One: Detection Stage
During the detection stage, the smart silent alarm system used the PIR sensors to detect when
motion was present. There was a 5s interval between each pulse, which was sufficient for the
security company to ensure that they could send a dispatch team out quickly. This motion was
shown on the Arduino IDE as digital ‘1’s and ‘0’s. When motion was detected, the system showed
a ‘1’. When no motion was detected, the system showed a ‘0’. The motion that was detected was
also visible on the serial plotter in the Arduino IDE, which showed a peak when motion was
detected.
Additionally, the LCD setup that was configured displayed when the system was armed and
disarmed, providing the response required for the design.
15
CHAPTER 6: CONCLUSION
6.1 Decisions Made
- SMS Module: The use of the SMS service was revisited after testing the time taken for the
mobile application to send a notification. By using the SMS module, the time taken to receive
the notification was reduced to 3s. This allowed for a swifter response from the security
company.
- LCD AND Matrix Keypad: Whilst creating the design, it was important to realise that power
outages became problematic to the end user. This was due to poor connectivity, which caused
the inability of using the mobile app. To overcome this issue, the LCD and Matrix Keypad were
introduced, to enhance the functionality of the device and to provide a device that could keep
the occupants safe during load shedding.
- Panic Button: The use of a panic button allowed the user to be able to contact the security
company if danger was present. This was done by overriding the system, and directly sending
a message to the security company if the button was pressed. The button was kept higher up
and out of reach of children on the final design.
- Relay: By incorporating a relay to the system, the user was able to remotely arm and disarm
the system without having to use the matrix keypad. This made it easier for the end user to use
the system and was done through incorporating buttons on the website to control the system.
6.2 Observations
By making the changes above, the use of the system became seamless and allowed the end user
to make use of the system efficiently. The PC camera module was used to have a live view of the
room to ensure that remote viewing was possible. The system also had the option of customizing
the alert settings based on which room the motion was detected. This was done through updating
of the code. This system allowed for a user to have a cost efficient and energy efficient method of
keeping the residence safe. By using enhanced security features, the system allowed for a
convenient sense of control to the user, ensuring his/her safety.
6.3 Outcomes
The system was designed and functioned to 100% efficiency. The system could send information to
the user in a shorter period and ensure that the security company could get there on time. The
time taken to design the system was a little off schedule, due to the malfunctioning of certain
aspects of the initial design. This included the motion sensor plot being available on the web page.
This issue was related to the Arduino and Node.js server not communicating efficiently.
16
6.4 Recommendations
To optimize the functionality and efficacy of a smart, silent alarm system, it is recommended that
the following alterations be implemented:
- Augmenting Compatibility with Smart Home Devices: To enhance the functionality of our
silent alarm, we propose improving its compatibility with various smart home devices. With
this integration, users can establish a comprehensive security ecosystem that communicates
effectively and triggers suitable responses based on specific events or customized
parameters. This technology may include but not be limited to smart locks, motion sensors,
and high-quality security cameras.
17
REFERENCES
Main References
[1] “The 10 worst areas in South Africa for home break-ins and robberies ...,” The 10 worst areas in
South Africa for home break-ins and robberies,
https://businesstech.co.za/news/lifestyle/712780/the-10-worst-areas-in-south-africa-for-home-
break-ins-and-robberies/ (accessed Oct. 15, 2023).
[2] Macfos, “PIR sensor working principle: How pir sensor works,” Robu.in | Indian Online Store | RC
Hobby | Robotics, https://robu.in/pir-sensor-working-principle/ (accessed Oct. 15, 2023).
[5] T. Xometry, “Everything you need to know about acrylic (PMMA),” Xometrys RSS,
https://www.xometry.com/resources/materials/acrylic-
pmma/#:~:text=Polymethyl%20methacrylate%20(PMMA)%20is%20also,shatter%2Dresistant%2
0alternative%20to%20glass. (accessed Nov. 12, 2023).
Other References
Web Sources
[1] “Node.js web application framework,” Express, https://expressjs.com/ (accessed Nov. 19, 2023).
[2] V. A. Reston, “Viewing WebSocket Server Endpoints for a WebSocket Port,” Reverb,
https://documentation.softwareag.com/webmethods/compendiums/v10-
5/C_API_Management/index.html#page/api-mgmt-comp/to-websocket_new_7.html (accessed
Nov. 19, 2023).
18
[5] Communicating between an HTML/Javascript website with an Arduino, Thomas A, YouTube, 2020.
19
ANNEXURES
ANNXURE A
ANNEXURE B
20
ANNEXURE C
ANNEXURE D
21
Figure 8: Main room with Sensor
22
ANNEXURE E
23
ANNEXURE F
24
ANNEXURE G
25