Professional Documents
Culture Documents
INTRODUCTION
In this modern and fast paced world, security is more important than ever. It is one of the
fastest growing industries in the world today. Almost every day, one hears about burglary in the
news. There are many types of security nowadays that people can employ or install. Some would
prefer to hire security guards to avoid potential hazards and defend against dangerous situations.
But hiring bodyguards are really expensive and not all are willing to risk their life for yours.
There are security system nowadays that you can just install into your house and whenever there
is burglary being committed, authorities are informed. An example of such various types of
security is a passcode system. These security systems are very famous nowadays because it is
said to be more efficient than hired security guards (Building Security, 2017).
But since these security systems are very expensive to have, this led the researcher to
make an improvised, cheap yet still efficient passcode system. It is said to be made for those who
cannot afford to employ a body guard or install security systems. It will still work like an
installed security system, efficient yet not expensive. It would work on anything you want to
1.) Will the improvised passcode system’s battery life last longer than a week?
2.) Will the equipment for creating the improvised passcode system found in recycled
Objectives
This improvised passcode system would help people have a budget-friendly security
system. This would help those who worries their safety during their sleep or the belongings they
left during the day for work or a vacation. This would protect their homes just like any other
expensive security systems. This would also help the community and also our country to learn
how to recycle reusable electric apparatus that is no longer needed into creating an improvised
passcode system. In fact, we can help recycle this extra electric apparatus in order to create new
objects. It would not only help us on our rubbish wastes, it would also help us to be effective
The researcher only aims to produce an improvised passcode system. The researcher also
wants to test the effectiveness of the product and would it last at least for a week or even more.
The researcher only focuses to test the efficiency of the product and how long would it
last.
Definition of Terms
Security System- is a system designed to detect intrusion – unauthorized entry – into a building
or other area.
Body/ Security guards- are people you can employ to secure and protect you.
Burglary- entry into a building illegally with intent to commit a crime especially theft.
Chapter II
System reliability and user error are the cause of most false alarms, sometimes called
"nuisance alarms." False alarms can be very costly to local governments, local law enforcement,
security system users and members of local communities. In 2007, the Department of Justice
reported that in just one year, false alarms cost local municipalities and their constituents at least
$1.8 billion.
In many municipalities across the United States, policies have been adopted to fine home
and business owners for multiple false alarm activations from their security system. If multiple
false alarms from the same property persist, that property could even be added to a "no response"
list, which bars police dispatch to the property except in the event of verified emergency.
Approximately 1% of police alarm calls actually involve a crime.[7][9] Nuisance alarms occur
when an unintended event evokes an alarm status by an otherwise properly working alarm
system. A false alarm also occurs when there is an alarm system malfunction that results in an
alarm state. In all three circumstances, the source of the problem should be immediately found
and fixed, so that responders will not lose confidence in the alarm reports. It is easier to know
when there are false alarms, because the system is designed to react to that condition. Failure
alarms are more troublesome because they usually require periodic testing to make sure the
sensors are working and that the correct signals are getting through to the monitor. Some systems
are designed to detect problems internally, such as low or dead batteries, loose connections,
phone circuit trouble, etc. While earlier nuisance alarms could be set off by small disturbances,
like insects or pets, newer model alarms have technology to measure the size/weight of the object
causing the disturbance, and thus are able to decide how serious the threat is, which is especially
useful in burglar alarms.
Many municipalities across the United States require alarm verification before police are
dispatched. Under this approach, alarm monitoring companies must verify the legitimacy of
alarms (except holdup, duress, and panic alarms) before calling the police. Verified response
typically involves visual on-scene verification of a break-in, or remote audio or video
verification.
Home and business owners can now choose a new type of keypad control panel designed to help
reduce false alarms.Based on a standard called CP-01-2000, developed by the American National
Standards Institute and Security Industry Association, the new generation of keypad control
panels takes aim at user error by building in extra precautions that minimize unwarranted
dispatch of emergency responders.
Some of the features of CP-01 keypads include a progress annunciation function that
emits a different sound during the last 10 seconds of delay, which hastens exit from the premises.
Also, the exit time doubles if the user disables the pre-warning feature.
Other "rules" address failure to exit premises, which results in arming all zones in Stay
Mode and a one-time, automatic restart of exit delay. However, if there is an exit error, an
immediate local alarm will sound.Alarms that utilize either audio, video, or combination of both
audio and video verification technology give security companies, dispatchers, police officers,
and property managers more reliable data to assess the threat level of a triggered alarm.
Audio and video verification techniques use microphones and cameras to record audio
frequencies, video signals, or image snapshots. The source audio and video streams are sent over
a communication link, usually an Internet protocol (IP) network, to the central station where
monitors retrieve the images through proprietary software. The information is then relayed to law
enforcement and recorded to an event file, which can be used to plan a more strategical and
tactical approach of a property, and later as prosecution evidence.
An example of how this system works is when a passive infrared or other sensor is
triggered a designated number of video frames from before and after the event is sent to the
central station.A second video solution can be incorporated into a standard panel, which sends
the central station an alarm. When a signal is received, a trained monitoring professional
accesses the on-site digital video recorder (DVR) through an IP link to determine the cause of the
activation. For this type of system, the camera input to the DVR reflects the alarm panel's zones
and partitioning, which allows personnel to look for an alarm source in multiple areas.
The United States Department of Justice states that legislation requiring alarm companies
to verify the legitimacy of an alarm, before contacting law enforcement (commonly known as
"verified response") is the most effective way to reduce false burglar alarms. The Department of
Justice considers audio, video, or an eye-witness account as verification for the legitimacy of a
burglar alarm.
Cross-zoning is a strategy that does not require a new keypad. Using multiple sensors to
monitor activity in one area, software analyses input from all the sources. For example, if a
motion detector trips in one area, the signal is recorded and the central-station monitor notifies
the customer. A second alarm signal—received in an adjacent zone within a short time—is the
confirmation the central-station monitor needs to request a dispatch immediately. This builds in
increased protection and a fail safe should a door blow open or a bird rattle an exterior window.
Enhanced call verification (ECV) helps reduce false dispatches 25–50% while still
protecting citizens, and is mandated in several US jurisdictions, although the alarm industry has
successfully opposed it in others.[7] ECV requires central station personnel to attempt to verify
the alarm activation by making a minimum of two phone calls to two different responsible party
telephone numbers before dispatching law enforcement to the scene.
The first alarm-verification call goes to the location the alarm originated. If contact with a
person is not made, a second call is placed to a different number. The secondary number, best
practices dictate, should be to a telephone that is answered even after hours, preferably a cellular
phone of a decision maker authorized to request or bypass emergency response. ECV, as it
cannot confirm an actual intrusion event and will not prompt a priority law enforcement
dispatch, is not considered true alarm verification by the security industry.
Some insurance companies and local agencies require that alarm systems be installed to
code or be certified by an independent third party. The alarm system is required to have a
maintenance check carried out every 6 – 12 months (in the UK, 'Audible Only' intruder alarm
systems require a routine service visit once every 12 months and monitored intruder alarm
systems require a check twice in every 12-month period) to ensure all internal components,
sensors and PSUs are functioning correctly. In the past, this would require an alarm service
engineer to attend site and carry the checks out. With the use of the Internet or radio path and a
compatible IP/radio transmitting device (at the alarmed premises), some checks can now be
carried out remotely from the central station (Wikipedia, 2019).
It all started on April 5, 1874, with a nighttime break-in. American District Telegraph
(ADT) Founder Edward Callahan created a telegraph-based "call-box" to signal for assistance to
a central office. He quickly connected 50 other homes in the neighborhood, creating the first
residential security system network. ADT introduced the first proactive security monitoring and
response service, employing "Roundsmen" to make rounds each night of customers’ homes to
help prevent crime before it happened. ADT grew strongly and steadily under the guidance of its
high-profile early leadership. Thomas T. Eckert, who led the Telegraph Office during the Civil
War and was close to President Lincoln, who was one of our early presidents. He was followed
soon after by Robert C. Clowry, a colonel in the U.S. military who worked his way up from
messenger boy to eventually serve as president of both Western Union and ADT, which he led
for eight years. ADT pioneered the concept of the Central Monitoring Center, enabling
thousands of customers to link to 24/7/365 monitoring and protection. ADT started its first big
expansion in the 1940s after pioneering the first automated burglar system. At the same time,
ADT installed the first automated fire alarm system, enabling immediate response to fire. A new
ADT security feature gained immediate customer approval: the iconic ADT yard sign, which
now dots millions of customers’ yards across the country. ADT elevated home intelligence when
it launched Pulse, the app that lets customers remotely access and control their home security
system, as well as lighting, climate control, security cameras and much more – all in real-time
(ADT, 2019).
Conceptual Framework
Independent Variable
Arduino Uno
Dependent Variable
METHODOLOGY
Materials:
Servomotor Hammer
Procedure:
2.) First, make six sides of rectangular prism out of plywood, nail five sides with a
hammer. Next is to attach one side of the door hinge into the formed box. After that attach the
sixth side to the other side of the door hinge to have a box that could be opened or closed.
3.) At the top of the box, paste the 16’2 LCD display at the center-most part with a glue
gun with a stick glue. Next also paste the 3’4 matrix keypad to the right center-most part of the
box. At the bottom of both equipment, make a rectangular hole for the wires (the wires has to be
5.) Connect the wire of the keypad to the arduino uno using the pins:
Keypad Arduino
6.) Connect the wires of the rainbow jumper wires from the LCD display to the arduino
uno:
*10K resistor:
Table 4.1.1
Energizer 7 13
Duracell 8 12
Eveready 8 12
In Table 4.1.1 shows the no. Of errors and success of accessing the passcode.
In this table, we can see the no of errors and success of the passcode
Chapter V
Summary of Findings
The results of the study show that the researcher’s questions were answered as the
experiment was done.
Conclusion
The researcher therefore conclude that the improvised passcode system is efficient like
any other passcode system yet has shorter battery life.
Recommendation
The researcher recommends finding/ buying a long-lasting and durable batteries for the
product to last longer.
Bibliography
www.wikipedia.com
www.buildingsecurity.com
www.ADT.com
https://detect-allsecurity.com/alarm-systems/reasons-why-home-security-systems-are-important/
http://www.netfreedom.org/the-importance-of-home-security-system.asp
https://www.safewise.com/home-security-faq/do-i-need-a-security-system/
www.arduino.cc
May 3, 2019
Research 8 Adviser
Acknowledgment
First of all, I would like to thank our God Almighty for giving me enough strength and
knowledge to complete this task. I would also like to thank my ever-loving parents, Mama and
Papa, for supporting me emotionally and financially throughout this study. To Ms. Tyra Jaye B.
Juario, thank you for correcting my papers and for teaching us how to do these papers right. To
my friends, thank you for helping me to do my papers and lastly I would like to thank myself for
overcoming this task and by handling this without too much emotional breakdown.
Table of Contents
Title Page
Abstract i
Acknowledgement ii
Chapter I – Introduction
3.1 Materials/Equipment 11
5.2 Conclusion 13
5.3 Recommendation 13
Bibliography 13
Abstract
Developing conclusions based upon current trends with robberies and burglaries is a very
different task.For many cases, robberies and burglaries go unsolved. Unless the perpetrator is
caught at the scene of the crime, these types of crimes are very difficult to solve. Robberies and
burglaries are usually quick, sometimes planned out, and are over and done with before anyone
people’s houses in order for the employer to have the assurance of their safety, not just for his
Yet hiring or installing these type of security might be very hard and expensive especially
to those who cannot afford them. This led the researcher to produce an improvised passcode
system that is cheap but still efficient. This study aims to use extra electrical paraphernalia in
order to help not just our community but also our country to reuse these and create new
appliances using the rubbish materials.This study only limits the efficiency of the product and
how long would it last. As the researcher completed the study, it is claimed that the improvised