Sei sulla pagina 1di 81

Chapter 3

RESULTS AND DISCUSSION

ICT Profile of Don Mariano Marcos Memorial State University, Mid-La Union

Campus

The Information and Communication Technology (ICT) resources of Don

Mariano Marcos Memorial State University, Mid-La Union Campus are gathered through

a survey checklist categorized into five areas consisting of hardware, software, support

facilities, connectivity and technical support and maintenance.

According to Anju Malhotra Anjara et.al (2012) Information and communications

technologies (ICTs) include tools, devices, and resources used to communicate and to

create, manage, and share information. This includes hardware (computers, modems,

mobile phones), software (computer programs, mobile phone applications) and networks

(wireless communications, Internet).

As a support from the statement above, Salami (2013) stated that there exists

close connections between ICT and national security, which plays an important role in

securing the necessary level of national safety and defense of the nation. ICT is very

important to the national security. It is a bridge between the present day and the future.

Hardware

Table 2 shows the hardware resources of DMMMSU MLUC. The available ICT

resources in DMMMSU MLUC in terms of hardware are as follows: 768 computer units,

768 storage medias, CCTV camera, 82 printers, and 702 power supplies which were the
28

basic requirement for the developed system. In addition, according to the MIS Staff of

DMMMSU MLUC, they have computer units, storage media, printer, keypad, power

supply and LCD in Finance Unit Building, Administrative Office and Guard House

which they are using in their operations. This implied that some needed hardware is

present and some are not present in the organization that can support the developed

system.

According to Rouse (2014) as cited by Nativitad, Orpia, Patacsil, Porlas, Sanchez

(2015) hardware implies permanence and invariability. Like software, hardware is a

collective term. Hardware includes not only the computer proper but also the cables,

connectors, power supply units, and peripheral devices such as the keyboard, mouse

audio speakers and printers.

Therefore, hardware is essential in developing a system and throughout its

implementation. Therefore, the hardware present in DMMMSU MLUC will be the

foundation of their capability in implementing an Arduino based intrusion detection

system.
29

Table 2. Hardware

ICT Resources Status Quantity

Computer Unit Present 768

Storage Media Present 768

Printer Present 82

Motion Sensor Not Present _

IP Camera Not Present _

Servo Motor Not Present _

Magnetic Reed Switch Not Present _

Keypad Not Present _

Power Supply Present 702

Alarm Not Present _

LCD Not Present _

GSM Sim 900 Not Present _

Arduino Mega Not Present _


30

Software

The ICT resources that are present in DMMMSU MLUC are shown in Table 3.

The available ICT resources in DMMMSU MLUC in terms of software are as follows:

the Operating Systems that are installed are Windows 7 and Windows 8. Software

productivity tools were also installed such as Microsoft Office, Utility software such as

Anti-Virus and Web browser.

As stated by Barnes (2012) cited by Gamboa et.al (2015), software includes all

the various forms and roles that digitally stored data may have and play in a computer (or

similar system), regardless of whether the data is used as code for a CPU or other

interpreter, or whether it represents other kinds of information.

Therefore, software is important in using the system throughout its

implementation specially in using the webpage of the security system. Thus, software is

really a very important component in terms of computer hardware useful and turns data

into organized and useful information.


31

Table 3. Software

ICT Resources Status

Operating System
Windows 7 Present
Windows 8 Present
Windows 10 Not Present
Microsoft Office Present
Web Browser Present
Anti-Virus Present

Support Facilities

The ICT Profile of DMMMSU MLUC in terms of support facilities is shown in

Table 4. Based from the results of profiling, DMMMSU MLUC has the following

support facilities: Guard House, Desk Space, Administrative Room and Finance Building

which were required during implementation of the developed system.

Support facility according to Caro (2011) is an important aspect of computer

resources. It includes not only the physical property, such as the building, host computers,

and utilities, but also the supporting documentation needed for the development and

support. A software development facility and a software support facility are virtually

identical since the same software and hardware tools are required for both. The facility

may also be connected to other facilities through local area network.


32

Therefore support facilities are important aspect of a business or an organization

for the implementation of a system or project that will secure the establishments and

other important things.

Table 4. Support Facilities

ICT Resources Status

Guard House Present

Desk Space Present

Administrative Room Present

Finance Building Present


33

Connectivity

The Fourth category is the ICT resources of DMMMSU MLUC in terms of

connectivity as shown in Table 5. The result shows that Internet Connection, Wireless

Fidelity (Wi-Fi), Local Area Network and Telephone Connection are present in

DMMMSU MLUC. This can be used in activating and deactivating the intrusion system,

real time surveillance, sending of intrusion alerts from the Finance and Administrative

Office to the Guard House and can be also used in sharing of files such as documents in

the school.

According to Jayakody (2010) cited by Balaso (2015) a computer network can be

identified as a group of computers that are interconnected for sharing data between them

or their users. There is a wide variety networks and their advantages mainly depend on

the type of network.

Therefore, connectivity in relation to network is an important aspect of an

organization or business because it makes easier for employees to share information and

collaborate on work. Carrying papers from office to office, manual monitoring of rooms

or even personal dissemination of an information like intrusions is just not as efficient as

storing and communicating information on a centralized server for access by all who are

authorized to access it.


34

Table 5. Connectivity

ICT Resources Status

Internet Connection (wired/wireless) Present

Local Area Network Present

Telephone Connection Present

GSM Wi-fi Shield Not Present

Technical Support and Maintenance

The ICT Profile of DMMMSU MLUC in terms of Technical Support and

Maintenance in relation to peopleware is shown in Table 6. Based on the results of

profiling, DMMMSU MLUC has ICT personnel namely the MIS Personnel, Security

Personnel and Administrative Staff. They are responsible for using the system to monitor

rooms, process information about intrusions on rooms, generate reports and software and

hardware maintenance.

According to Starkschall and Siochi (2013) cited by Balaso (2015), two groups

are identified representing the peopleware at different stages of a system cycle: the users,

and the developers. Peopleware refers to all the aspects related to the role of people as

individuals as a group in the development, implementation, management, or use of

software and hardware.


35

Therefore, technical support and maintenance in relation to peopleware is

necessary to maintain the quality of the Arduino based intrusion detection system. These

are the end-users of the developed system, information providers and the people who

have direct access in the system.

Table 6. Technical Support and Maintenance

ICT Resources Status

MIS Personnel Present

Security Personnel Present

Administrative Staff Present


36

Security Tool for Arduino Based Intrusion Detection System for Don Mariano
Marcos Memorial State University Mid-La Union Campus

In order to address the current security problems of DMMMSU MLUC the

researches came up with the idea of making an Arduino Based Intrusion Detection

System for Don Mariano Marcos Memorial State University Mid-La Union Campus

having a PIR motion sensor, IP camera with a servo motor, magnetic reed switch,

Ethernet shield, keypad, power supply, alarm, LCD sand Global System for Mobile

Communication (GSM) SIM900 module integrated to a single Arduino Mega r3, and a

portal which will serve as the communication between the user and the system.

Portal Features

The portal for the Arduino Based Intrusion Detection System for DMMMSU will

be having the following features: user authentication, user management, reports

management, and live footage monitoring.

User Authentication

As cited by Malempati and Mogalla (2014) user authentication is the first line of

defense in a system. This feature restricts the unregistered users from logging in to the

system. Having the concept of user id and password is an efficient method of safe

keeping of the important records and processes that should only be accessed by a

registered user.
37

User Management

The user management feature covers the creation and deletion of user accounts

including the editing of user account information

Reports Management

Whenever an intrusion or anything that has to do with the system happens, it

should be recorded on system for documentation purposes, and the said activity will be

done by the guard. This feature also covers the printing of different reports such as the

incident and log report which will solely be for the admin.

Live Footage Monitoring

The live footage can be monitored by any user of the system using the IP camera

attached to the servo motor mounted on the ceiling. Changing the position of the camera

and turning the alarm and lights on and off can also be done in the portal.

According to Agbo, Ezema, and Abafor (2016) having a n IP camera could be of

great help in remotely monitoring a controlled environment. Thus, having a live stream

feature integrated on the portal for the motoring the happenings on the vicinity can

become a useful piece for the system.


38

System Box Features

The system box consisting of all the hardware connected to the microcontroller

will be having the following features: automatic activation/deactivation, manual

activation /deactivation, intrusion detection and SMS notification.

Automatic Activation/Deactivation

This system was preset to be activated from 8:00 P.M. to 5:00 P.M. The said time

frame was chosen by the researchers as this is the time where the institution is vulnerable

to possible threats.

Manual Activation/Deactivation

The system can also be activated or deactivated manually through the dedicated

keypad; this feature can be used especially on times that the security system will be

needed to be activated or deactivated earlier or later than the set time.

Intrusion Detection

Intrusion will be detected with the use of the PIR motion sensor and the reed

switch. As stated by Mohan and Gopakumar (2013) PIR motion sensors can be triggered

when a there was a change on the constant infrared light radiating its field of view. With

the PIR sensor intruders inside the vicinity could be known; and reed switch can be used

to monitor occupancy on a room as stated by Aftab (2013).


39

With that the researchers came up with an intrusion detection feature. When the

PIR motion sensor detects any motion within its range or the reed switch which was

attached to the door frame got separated the lights will be turned on and the alarm will be

triggered; the servo motor will turn the IP camera to where the intrusion took place and

an SMS message will be sent to the user notifying that an intrusion happened.

SMS Notification

As stated by Eseosa and Promise (2014) GSM modem is a specialized type of

modem which accepts SIM card, and operates over a subscription to mobile operators.

When the GSM modem and computer are interconnected, there is communication over

the mobile network. Though these GSM modems are most frequently used to provide

mobile internet connectivity, most of them can also be used for sending and receiving

SMS and MMS messages.

With the use of the GSM module an SMS message will be sent to notify the user

whenever someone attempts to login more than 3 times, when the system gets

activated/deactivated and when the system detects an intrusion.


40

Development of Arduino Based Intrusion Detection System for Don Mariano

Marcos Memorial State University Mid-La Union Campus

In developing the Arduino Based Intrusion Detection System, the researchers used

the Design Science Research Process (DSRP) developed for by Peffers, Tuunanen,

Gengler, Rossi, Hui,Virtanen and Bragge (2006). This model was a refinement of the

different research designs employed in Information Systems (IS) literature from the time

IS started as a separate academic discipline. This was also a much-needed simplification

of the emerging design science (Hevener et al.,2004) that translates to a working design

science model.

The DSRP model consists of six activities in formal (but not rigid) sequence: (1)

problem identification and motivation; (2) objectives of a solution; (3) design and

development; (4) demonstration; (5) evaluation; and (6) communication (Peffers et al.,

2006).

Problem Identification and Motivation Phase

In this phase of the research process, an information was gathered in an interview

from the administrative unit headed by Mrs. Perla Garcia, for many decade that

DMMMSU-MLUC exists as a prestigious and globally competitive university it

encounters different security problems and crimes like room intrusions and burglar

crimes. At present, the university has an existing security measures like installation of

CCTVs and parameter fencing since it was hard to monitor the people going in and out of

the campus. According also to the information gathered in the interview, the university
41

wants to adapt modern security systems that can supply their needs and can help the

institution to protect their properties as well as the people and individuals in it. We are

now in the modern era, with some of the emerging variety of ways offered by security

system manufacturers and alarm monitoring services to monitor homes, institutions and

other entities with this, we can conceptualize and develop modern security systems which

is a great help in addressing the problem in security.

As a stake holders of the university the researchers were motivated to seek a

solution for the security problem which was stated above. The researchers visited

different libraries and surfed different journals on the internet to suffice their knowledge

in security problems and to know how to deal with them in order to develop and build an

artifact that can aid the security problems in the university. Based on the related literature

stated in the study by Omorogiuwa Eseosa1, Elechi Promise (2014) in todays age of

digital technology and intelligent systems, home automation has become one of the

fastest developing application based technologies in the world. The idea of comfortable

living in homes has since changed for the past decade as digital and wireless

technologies, are integrated into it. Intelligent home security systems such as controlled

network, and communication systems, emergency response, anti-theft monitoring systems

requires automated and controlled system both near and at a distance of control.

Intelligent home security systems play important roles in providing an extra layer of

security through user authentication to prevent break-ins at entry points and also to track

illegal intrusions or activities within the vicinity of the home system, it also involves

automation of homes or household activities such as security locks of gates and doors.

There are many researches done in the design of various types of intelligent home
42

security system like sensor-based system that reply and contact-based systems such as

finger-print and palm-print scan that requires substantial amount with an input device.

The study helped and motivated the researchers to internalize different concepts

of security systems for them to develop a competitive security system integrated with

different sensors for the university to adapt the modern technologies.

Objectives of a Solution Phase

Based on the situation mentioned in problem identification and motivation

phase the university has an existing security measures but these are not sufficient enough

to secure the whole population of the university in the potential security threats that may

happen around the clock. It is clear that the university needs a tighter security to avoid

intrusions and burglar crimes that may affect the students and staff of the university. In

this phase the researchers searched and surfed for the related literatures in the internet

that can help them to strengthen their knowledge and wisdom which can support their

ideas and concepts in developing an artifactual solution.

The study presented by Sharma, Fatnani, Katara, and Shankar (2014) was a home

security system was implemented using the microcontroller. The system used Global

System for Mobile (GSM) using Short Messaging System (SMS) in order to activate and

deactivate the systems as well as sending and receiving messages. It uses Passive Infrared

(PIR) motion sensor to detect any motion and a camera to capture images. The Modular

Home Security System has been tested and succeed detect human movement.

In addition, the study presented by E.Supraja, et al (2014) was an embedded

system. The system has the security of a locking system and it can be enhanced with the
43

help of Radio Frequency (RF) and GSM wireless technology by using a 4 digit password

which provides the authentication. The system has a RF receiver and RF transmitter. The

system was designed in a way that the digital keypad is interfaced to the controller, on the

transmitter side. When you enter the password through the keypad it will compare the

passcode you enter from the pre-set password through the RF transmitter which was also

interfaced to the controller through an RF decoder.

Lastly, a home security device which send fast information to user GSM mobile

device using SMS and also use to activate - deactivate system. This Home Security

System make expandable their capability by add more sensors on the system. The

hardware of this system has been designed using microcontroller AT Mega 328, PIR

motion sensor as the primary sensor for motion detection, camera for capturing images,

GSM module for sending and receiving SMS and buzzer for alarm. For software this

system using Arduino Integrated Development Environment (IDE) for Arduino and Putty

for testing connection programming in GSM module. (Budijono 2014)

Through the information gathered by the researchers on the related literatures and

on the current status of the security measures of DMMMSU MLUC, the researchers came

with the idea to design a low cost and efficient security system having a PIR motion

sensor, IP camera with a servo motor, magnetic reed switch, Ethernet shield, keypad,

power supply, alarm, LCD sand Global System for Mobile Communication (GSM)

SIM900 module integrated to a single Arduino Mega r3 packaged in the system box.

Therefore, the researchers developed the Arduino Based Intrusion Detection

System for Don Mariano Marcos Memorial State University Mid-La Union Campus. The
44

researchers only limited the scope of the study to be implemented in the administrative

and financial department of the university since it is where the most valuable things are

kept.

The developed security system is composed of a software and hardware

component to function and perform its specified task.

The software component is the webpage and has the following features:

The moment that the user entered their respective username and password to the

system they are now able to access and operate the system according to their specific task

that they are allowed to do.

Another module of the webpage is the provision for adding and updating the

employee information. The admin will be the one to input all the personal information of

the employees to be kept and stored in the database.

Through the webpage the viewing the real time event of the room is possible by

controlling the servo motor up to 180 o through the webpage so that the user can monitor

if any intrusion has occurred. Controlling the lights within the building is also included in

the features of the system.

An additional feature of the webpage is the ability to record all the transactions

happened during the user accessed the system through the log module. The system has

also the capability to generate reports of incidents like intrusions happened in the

building.

The hardware component is the system box and has the following features:
45

The user will enter the password with a maximum of 3 attempts to input the

activation/deactivation pin using the keypad and the LCD screen will display messages

to prompt the user.

Another feature of the hardware component is sending of SMS notification and

activation of the alarm when there is an intrusion happened in the building.

An automatic activation/deactivation is also a feature of the system. When the

clock strikes at 8 in the evening the system is automatically activated and at 5 in the

morning the system is automatically deactivated.

Design and Development Phase

Software Component

Functional Requirements of the System

These requirements explain the essential functions of the developed intrusion

detection system. The system provides user access controls which allow each user the

corresponding actions in the system.

Authentication Module. This module restricts the user that can access the

system. The system will employ and interface asking for the users username and

password.

Registration Module. This module grants the administrator to register the users

who may be in need of using the system. Only the administrator can access this module
46

Security Monitoring Module. This grants the users to change the angle position

of the camera and turn on/off the lights.

Non Functional Requirements of the System

The following information describes the hardware and software requirements

needed for the development and implementation of the developed system.

Hardware Requirements

The minimum hardware requirements needed for the development and

implementation of the developed system.

1 Gigahertz (GHz) processor


At least 2 Gigabyte (GB) RAM
At least 20 Gigabyte (GB) hard disk space

Software Requirements

The minimum software requirements needed for the development and

implementation of the developed system.

Development:

32-bit Windows OS (7/8)


WAMP Server 2.4
PHP 5.4
Web Browser

Implementation:
47

Server

32-bit Windows OS (7/8)


WAMP Server 2.4
PHP 5.4
Web Browser

Client

32-bit Windows OS (7/8)


Web Browser

Users of the System

There are 2 main users of the system, the administrator and the guard.

The head for the security of the university will act as the administrator for the

developed system. The administrator has the overall privilege on the different

functional system components. He/ she manage user accounts, turn the lights

on/off, change the angle position of the camera, change passwords for user

accounts, view logs, and generate logs and incident reports.


The guard has been given the privilege to turn the lights on/off, change the angle

position of the camera, change his/her password and create reports.


48

Figure 3: Use Case Diagram


49

Figure 3 illustrates the interaction of the actors, the Guard and the Administrator,

Servo Motor, PIR Motion Sensor, GSM Module and Relay on the Arduino Based

Intrusion Detection System for DMMMSU


50

Figure 4: Class Diagram

Figure 4 illustrates the class diagram for the webpage for the Arduino Based

Intrusion Detection System.


51

Figure 5: Activity Diagram for Login


52

Figure 6: Activity Diagram for Manage User Accounts (Add User)


53

Figure 7: Activity Diagram for Manage User Accounts (Edit User Info)
54

Figure 8: Activity Diagram for Manage User Accounts (Delete User)


55

Figure 9: Activity Diagram for Control the Cameras Position


56

Figure 10: Activity Diagram for Turn the Lights On/Off


57
58

Figure 11: Activity Diagram for Turn the Alarm On/Off


59

Figure 12: Activity Diagram for Creating Incident Report


60

Figure 13: Activity Diagram for Printing Incident Report


61

Figure 14: Activity Diagram for Printing Log Report


62

Figure 15: Activity Diagram for Activating the Security System Manually
63
64

Figure 16: Activity Diagram for Deactivating the Security System Manually
65

Figure 17: Sequence Diagram for Login

Figure 18: Sequence Diagram for Manage User Accounts (Add User)
66

Figure 19: Sequence Diagram for Manage User Accounts (Edit User Information)

Figure 20: Sequence Diagram for Manage User Accounts (Delete User)
67

Figure 21: Sequence Diagram for Control the Cameras Position


68

Figure 22: Sequence Diagram for Turn the Lights On/Off

Figure 23: Sequence Diagram for Turn the Alarm On/Off


69

Figure 24: Sequence Diagram for Creating Incident Report

Figure 25: Sequence Diagram for Printing Incident Report


70

Figure 26: Sequence Diagram for Printing Log Report


71

Figure 27: Sequence Diagram for Activating the Security System Manually
72

Figure 28: Sequence Diagram for Deactivating the Security System Manually
73

Figure 29: Sequence Diagram for Detect Intrusion


74

Plate 1: Login Form

User Login Form

The login form is where the Administrator and the Guard will fill their respective

username and password in order to access the system.


75

Plate 2: Controller Interface For the Guard

Plate 2 illutrates the Controller Interface for the Arduino Based Intrusion Detection

System. The Guard will be the user for this interface


76

Plate 3: Report Creation Interface

Plate 3 illustrates the Report Creation Interface for the Arduino Based Intrusion Detection

System. The Guard will be the user for this interface.


77

Plate 4: Controller Interface For the Admin

Plate 4 illustrates the Controller Interface for the Arduino Based Intrusion Detection

System. The Admin will be the user for this interface


78

Plate 5: User Interface

Plate 5 illustrates the User Interface for the Arduino Based Intrusion Detection System.

This interface is for viewing, creating, editing, and deleting of the users of the system.
79

Plate 6: Logs Interface

Plate 6 illustrates the Logs Interface for the Arduino Based Intrusion Detection System.

This interface is for viewing, and printing of the log session of the users.
80

Plate 7: Report Interface

Plate 7 illustrates the Report Interface for the Arduino Based Intrusion Detection System.

This interface is for viewing, and printing of the incident reports.


81

Plate 8: Activity Log Interface

Plate 7 illustrates the Activity Interface for the Arduino Based Intrusion Detection

System. This interface is for viewing, and printing of all the activities done by users.

Hardware Component

The hardware component of the Arduino Based Security System is the system box

which comprises of the Arduino Mega from which the different sensors are connected

including the alarm. LED light. Relay and GSM Module.


82

The Arduino Mega was programmed using the Arduino IDE using C++ so that the

different component of the system box would function to the intended task.

Figure 30: Conceptual Framework

The above figure shows that the Ethernet shield connected to a router that serves

as the intermediary between the server and the system box which enables the server and

the system box to communicate wirelessly and function its specified task. The server

which is the portal is used to control the lights and the camera angle and the Arduino

mega r3 is where the different sensors: magnetic reed switch and motion sensor were
83

connected. The keypad and LCD screen is used to activate/deactivate the system in case

that the user wants to activate/deactivate the system during the times not included in the

automatic activation/deactivation feature of the system. The LED lights serves as the

indicator: green light when activated, yellow light when deactivated and red when the

intrusion has been detected. And if the sensors are triggered the Arduino mega r3 will

send a message through the use of the GSM module. The alarm will also be activated to

alert the user.

The Security System provides enhanced security as whenever an intrusion occurs,

a text message is sent to a desired number and the activation of the alarm to take

necessary measures. Cameras are embedded with the security system that allow live

streaming and monitoring on the building controlled by a servo motor to identify the

desired angle
84

Figure 31: Surveillance Camera

The above figure shows the surveillance camera can be controlled and accessed

directly though the server via the internet. The camera can be directed at any angle

through the servo motor which has been specified by the user
85

Figure 16: On/Off of Light

The above figure shows that the user can on or off the light to the building

selected through the server via internet

In building the hardware component of the security system the researchers used

the development process Generate-Test Cycle. The researcher first assembled the led,

motion sensor, reed switch and alarm into the Arduino board to test the peripherals

respectively to guarantee that all of it are working. After testing the first batch of

peripherals, the LCD and keypad is added and was tested if the keypad is functioning and

if the LCD screen displays the programmed output message on the screen. Then the GSM

module is combined and has been tested to see if the GSM Module would send SMS

Notification. After which the Ethernet shield is combined to the other components and

was tested with the website design to see if the portal could communicate and transfer
86

instructions to the hardware component of the system like controlling the lights in the

room. Programming of the portal and testing of the CCTV camera follows. On the portal

the researchers had tested if it can control the direction of the CCTV camera.

After testing all the functionalities of the different components, the researchers

have designed the PCB and also the system box of the hardware component which will

be the housing of the security system. After finalizing the design, the researchers have

assembled the system box then followed by the re-testing and re-configuring of the

system for which will be installed in the constructed model for the demonstration using

black box testing.

Table 7. Bill of Materials

Peripherals Quantity Amount Total Amount


Arduino Mega r3 1 800 800
Ethernet Shield 1 550 550
4x4 Tact Keypad 1 350 350
LED light 3 5 15
2x16 LCD with ic2 1 350 350
Magnetic Reed Switch 4 180 720
PIR Motion Sensor 2 150 300
Connecting Wires 3 118 118
IP Camera 1 2,500 2,500
Servo Motor 1 525 525
Alarm 1 400 400
PCB 1 120 120
Total Amount P 6, 748
87

Table 7 presents the complete peripherals with the quantities and the overall

expenses in developing the system.

Demonstration

In this phase, after the researchers had developed a competent security

system which is the Arduino based security system. The researchers had undergone a

simulation process in order to determine the efficacy of the develop system and provided

several intrusion scenarios under a controlled environment.

Upon the activation of the security system the researchers made an intrusion in

which they open the door and passed in the windows of the model that made the magnetic

reed switch to separate with each other, the system responded quickly by activating the

alarm and sending a simultaneous SMS message to the user until the system is

deactivated. This means that the magnetic reed switch, the alarm and the SMS

notification is working in case an intrusion like this occurred. The researchers also tested

the PIR motion sensor together with the alarm and the SMS alert, the system responded

quickly by activating the alarm and sending a simultaneous SMS message to the user

until the system is deactivated when the motion sensor detected a movement inside the

building. The IP camera is also operating effectively by directing its lens to where the

movement and the intrusion occurred.


88

Plate 9: Actual Model

Plate 9 shows the actual model used for the black box testing in which the

researchers made the model similar to the cashier building of the institution where the

system is intended to use.

Plate 10: System box


89

Plate 10 shows the system box where the Arduino mega r3 with the keypad,

Ethernet Shield, LCD and sim card are kept.

Through the simulation process the researchers had found several errors and as

quantified in the generate test cycle these errors were used by the researchers to improve

the develop system and to solve the errors that has been found.

One of the errors that the researchers encountered was the simultaneous sending

of SMS message until the system is deactivated to the user. This feature was not practical

since the user will be spending too much for the load of the sim card of the system, thats

why the researchers only limited the text message into five SMS message when there was

an intrusion occurred. There are some instances that SMS messages were delayed and

some were not really sent to the receiver which make the researchers not settled in

sending only one SMS message. Therefore, five SMS message is not that costly than

simultaneous sending of messages and it is a great help to avoid instances like delaying

of message or not receiving of message.

Another error was met by the researchers because there was no alarm activation

when there was a three attempts in activating/deactivating the security system by an

unknown user. It is stated in the study that there is five SMS message sent to the user

when this attempts happened but the researchers considered when there are times that

telecommunications are having trouble with their networks resulting to down their

system. Adding the activation of the alarm notifies the users of the system if there will we

instances like that happened.


90

The researchers also considered the place where the sim is located so that the user

will not have a hard time in taking off the sim card in case they need to subscribe it in any

telecommunication promos.

From the errors collected the researchers had re-testing and re-configuring both

the software and the hardware component of the system to come up at least a competent

security system.

Evaluation

After the simulation process, in this phase the researchers iterate back to step 3

and used the results in improving the system until the errors were fixed and come up a

competent security system. As stated by Chen et al (2003) the use of instantiation is to

demonstrate the efficacy of a design can provide strong evidence when used to show that

a design works as intended, is useful for its intended purpose, or has the potential to

achieve an expected performance level.

Then the developed Arduino based security system is then presented to the

proponents of the system which were the accounting staffs, administrative staffs and

security guards. Together with evaluators, the researchers presented the different

simulations with different scenarios that would demonstrate the functionalities of the

security system.

After the demonstration activity, the researcher distributed the acceptability

questionnaire for the evaluation of the system. The proponents were ask to answer the

questionnaire to assess the level of acceptability of the develop Arduino based security
91

system which covers the six indicators such as functionality, reliability, usability,

efficiency, maintainability, and portability.

To determine the level of acceptability of the security system, the data gathered

for from the survey were quantified using frequency count and mean and was interpreted

using the Likert Scale presented on the previous chapter.

The developed system was evaluated using the test cases to determine if the actual

results were met.

Table 8. Test Cases on the System Box

TEST TEST CASE EXPECTED RESULT / ACTUAL RESULT


CASE DESCRIPTION OUTPUT VALUES
NO
1 User entered a valid pin LCD screen will display LCD screen displayed
(manual system System Activated System Activated
activation) message, Green LED will message, Green LED
be turned on and an SMS will be turned on and an
will be sent to the user. SMS will be sent to the
user.
2 User entered an invalid System will display System displayed
pin (manual system Invalid PIN. Invalid PIN.
activation)
3 User entered an invalid System will display System displayed
pin 3 times System Locked. Entering System Locked.
pin will be disabled for 3 Entering pin will be
minutes. disabled for 3 minutes.
4 System activation was System will be activated on System was activated on
predefined to be the specified time. the specified time.
92

executed automatically.
5 System deactivation was System will be deactivated System was deactivated
predefined to be on the specified time. on the specified time.
executed automatically.
6 The reed switch got The alarm will be turned The alarm will be turned
separated. on, Red LED will lit, light on, Red LED will lit,
bulb will be lit, and an light bulb will be lit, and
SMS alert will be sent to an SMS alert will be
the user sent to the user
7 The motion sensor The alarm will be turned The alarm was turned
detected a motion on, Red LED will lit, light on, Red LED was lit,
bulb will be lit, and an light bulb was lit, and an
SMS alert will be sent to SMS alert was be sent to
the user the user

Table 9. Test Cases on the Portal


TEST PART OF TEST CASE EXPECTED ACTUAL
CASE THE DESCRIPTION RESULT RESULT
NO SYSTEM
1 Login User enters unregistered System will System
username and password display Error displayed
message. Error
message.
2 Controller User clicks the Alarm The Alarm will be The Alarm was
Menu button activated. activated.
3 Controller User clicks the Light The lights will be The lights was
Menu button turned on. turned on.
4 Controller User clicks the Right The IP camera will The IP camera
Menu button be moved to the was moved to
\Right. the Right.
5 Controller User clicks the Center The IP camera will The IP camera
Menu button be moved to the will be moved
Center. to the Center.
93

6 Report Men u User clicks submit System will System


(Guards button with the display Error displayed Error
Interface) textboxes unfilled message. message.
7 Report Menu User clicks submit System will System
(Guards button with the display displayed
Interface) textboxes filled Successfully Successfully
Submitted Submitted
message. message.
8 User Menu Sort Results by quantity Results will be Results was
filtered based on filtered based
the specified on the specified
quantity quantity
9 User Menu Click edit icon System will System
(Admins display edit form displayed edit
Interface) form
10 User Menu User clicks submit System will System
(Edit Form) button with the display Error displayed Error
textboxes unfilled message. message.
11 User Menu User clicks submit System will exit System will
(Edit Form) button with the the edit form. exit the edit
textboxes filled form.
12 User Menu Click delete System will System
(Admins display the delete displayed the
Interface) modal. delete modal.

13 Logs Menu Sort Results by Date / System will System


Time display filtered displayed
results filtered results
14 Logs Menu Click view full report System will System
icon display full report displayed full
dashboard report
dashboard
15 Logs Menu Click print icon System will System
display print displayed print
preview preview
16 Logs Menu Click print Printer will print Printer prints
(Print Preview) the report the report
94

The proponents were also ask for their feedback from which the researchers

decided whether to iterate back to step 3 to try to improve the effectiveness of the artifact

or to continue on to communication and leave further improvement to subsequent

projects.

One of the feedbacks from the proponents is how to determine if there is an

intrusion occurred during working hours or during the times that the system is not

activated. The researchers proposed that the IP camera will change its camera angle in

every specified time that is programmed to the system but the proponent suggested that

since the IP camera have a servo motor it would be better to program the system to

change the angle of the IP camera with the servo motor in 180 o continuously so that the

entire room will be monitored by the user consistently.

After analyzing the feedbacks and suggestions from the proponents the

researchers decided to iterate back to step 3 and improved the effectiveness of the artifact

based from the feedbacks and suggestions of the proponents.

Communication

As stated by Manasseh (2012) Communication is important because all projects

need to inform people .It is also important that you raise awareness by explaining what

you do and how this project helps citizens and solve security issues. Disseminating your

project outputs also helps you to guarantee the durability of the projects results.

In this phase, from the findings that had been found, the researchers then decide to

communicate the problem on security measures and its importance which is significant to
95

be addressed. The artifact, its utility and novelty including the capabilities of the

developed system. The rigor of its design as well as the process of development of the

different components of the security system, both the hardware and the software how it

functions and its effectiveness to researchers and other relevant audiences, such as

practicing professionals.

The result of the research was relayed and communicated to the management of

DMMMSU-MLUC specifically to the administrative unit through a meeting. This

enabled them to know the artifact, considered its benefits to the organization and assess

their options. The researcher presented the materials needed together with allocated

budget for implementation of the security system. A plan to conduct series of training

program for the admin and security guards in order to be skilled and have knowledge to

operate the security system were also presented.

This phase was done after the final defense of the researchers and after the

approval of the researchers panelist.

Level of Acceptability of the Arduino Based Intrusion Detection System for Don

Mariano Marcos Memorial State University Mid-La Union Campus

The acceptability of the Arduino Based Intrusion Detection System for Don

Mariano Marcos Memorial State University Mid-La Union Campus was determined

through the use of ISO/IEC 9126. The researchers administered the survey questionnaire

to determine the level of acceptability in terms of functionality, reliability, usability,

efficiency, maintainability and portability. It was administered by thirty-five (35)


96

respondents consisting of one (1) MIS Staff, two (2) Administrative Staff, sixteen (16)

Finance Unit Staff and sixteen (16) Security Guards.

Table 10. Functionality.

Indicators Mean Descriptive Descriptive

Rating Interpretation
1. The system does what was 4.37 Excellent Very Highly
proposed correctly. Acceptable

2. The system can interact directly to 4.45 Excellent Very Highly


another system. Acceptable

3. The system can protect information 4.57 Excellent Very Highly


97

Acceptable
and data from unauthorized user.

4. The system provides an appropriate


4.54 Excellent Very Highly
set of functions for specialized tasks
Acceptable
and user objectives.

5. The different modules of the Very Highly


software interact with one another, 4.48 Excellent Acceptable
without any glitch.

6. The system has a secure access 4.49 Excellent Very Highly


through passwords. Acceptable

7. The system is precise in executing 4.65 Excellent Very Highly


its functions. Acceptable
8. The system can view/request and
4.51 Excellent Very Highly
print security reports.
Acceptable

Mean 4.51 Excellent Very Highly


Acceptable

The Level of Acceptability of the Arduino Based Intrusion Detection System for

Don Mariano Marcos Memorial State University Mid-La Union Campus in terms of

Functionality, as shown in the table 8 has a mean rating of 4.51 indicating a descriptive

rating of Excellent and interpreted as Very Highly Acceptable. This implies that the

developed system has the capability to provide functions which meet the stated and

implies needs of users under specified conditions of usage. The indicator The system is

precise in executing its functions. got the highest mean rating of 4.65 and interpreted as

highly acceptable. On the other hand, the indicator The system does what was proposed

correctly. got the lowest mean rating of 4.37 which still describes the system as highly
98

acceptable. This means that the developed systems accurateness to connect with the

hardware peripherals were achieved.

According to Clarke (2010) as cited by Vallo (2013) functionality of the software

should provide a useful, time saving, and acceptably accurate solution to a specified task

or problem. It should be tested with a wide range of datasets with several trial users and

should be stable and predictable in its behavior.

Table 11. Reliability.

Indicators Mean Descriptive Descriptive


Rating Interpretation
1. The system can provide correct 4.57 Excellent Very Highly
output all the time in all requested Acceptable
information.

2. The system can always maintain the 4.43 Excellent Very Highly
specified level of performance in Acceptable
requesting and printing documents.

3. The system can always work as 4.43 Excellent Very Highly


expected without errors or problems. Acceptable
99

4. The system can provide correct


output all the time in all requested 4.51 Excellent Very Highly
information without crasher or service Acceptable
interrupts.
Mean 4.51 Excellent Very Highly
Acceptable

Table 9 presents the Level of Acceptability of the Arduino Based Intrusion

Detection System for Don Mariano Marcos Memorial State University Mid-La Union

Campus in terms of reliability which has a mean rating of 4.51 that describes the system

as excellent and interpreted as highly acceptable. The result entails that the developed

system maintain its level of performance under stated conditions for a stated period of

time.

The highest mean of 4.57 indicates that The system can provide correct output

all the time in all requested information. which describes the system as excellent and is

interpreted as very highly acceptable. While the lowest mean of 4.43 indicates The

system can always maintain the specified level of performance in requesting and printing

documents. which also describes the system as excellent and is interpreted as highly

acceptable. This denotes that the system should maintain its performance anytime in case

there would be trouble arises.

According to Prasad et al (2011) software reliability is one of the most significant

attributes for measuring software quality. It is defined as the probability of failure free

operation of a software in a specified environment during specified duration.

Table 12. Usability.


100

Indicators Mean Descriptive Descriptive


Rating Interpretation
1 The system can be used as a tool in 4.71 Excellent Very Highly
providing information to the user. Acceptable

2 The system can be used as an 4.57 Excellent Very Highly


instrument to have quality services Acceptable

3 The system can be accepted to use 4.51 Excellent Very Highly


as a tool in communications. Acceptable

4.54 Excellent Very Highly


4 It is easy to operate and control. Acceptable

4.6 Excellent Very Highly


5 It is easy to learn how to use. Acceptable

4.6 Excellent Very Highly


Acceptable
6 It is easy to understand the concept
and application

Mean 4.59 Excellent Highly Acceptable

As shown in Table 10, Acceptability of the Arduino Based Intrusion Detection

System for Don Mariano Marcos Memorial State University Mid-La Union Campus in

terms of usability. Overall, the respondents very strongly agreed that the developed

system is highly acceptable as justified by its mean rating of 4.59. This means that the

developed system is considered to be user friendly.

The highest mean of 4.71 which indicates The system can be used as a tool in

providing information to the user. and interpreted as very highly acceptable. This
101

implies that the respondents are guided very well in using the developed system. On the

other hand, the lowest mean of 4.51 indicates The system can be accepted to use as a

tool in communications. which still the respondents strongly agreed that the system is

excellent and is interpreted as highly acceptable. This implies that the system is

understandable, learnable and manageable.

According to Freddy Paz et al (2016) usability is considered one of the most

important aspects for the success of any technological product. It is related to the ease of

use of a software product. In the context of software, if a product is difficult to use or

provides mechanisms that are hard to understand, then the application is expected to fail.

This concept can be applied to any technological interface that allows interaction between

humans and machines.

Table 13. Efficiency.

Indicators Mean Descriptive Descriptive


Rating Interpretation
102

1. The system is capable of 4.6 Excellent Very


providing accurate response in Highly Acceptable
performing function.
4.6 Excellent Very
2. The system is viewing records Highly Acceptable
providing expected result upon
the administrators request.
4.57 Excellent Very
3. The system is effective in
Highly Acceptable
providing information and
precise records.

Mean 4.48 Excellent Very


Highly Acceptable

Table 11 presents the level of acceptability of the Arduino Based Intrusion

Detection System for Don Mariano Marcos Memorial State University Mid-La Union

Campus in terms of efficiency which has a mean rating of 4.48 that indicating a

descriptive rating excellent and interpreted as very highly acceptable. This means that the

developed system has the capability to provide desired performance, relative to the

amount of resources

The indicator The system is capable of providing accurate response in

performing function. gathered the highest mean value of 4.6 and interpreted as very

highly acceptable. On the other hand, the indicator The system is effective in providing

information and precise records. gathered the lowest mean value of 4.57 and interpreted

as highly acceptable. This connotes that the developed system is very useful, complete

and interactive.
103

According to Neilsen (2012) as cited by Alicante (2015) that efficiency is the

capability of the product to enable users to expand appropriate amounts of resources in

relation to the effectiveness achieved in a specified context of use.

Table 14. Maintainability.

Indicators Mean Descriptive Descriptive


Rating Interpretation

1 The system can easily diagnose a 4.54 Excellent Very


problem or fault. Highly Acceptable
4.31 Excellent Very
2 The system can be easily Highly Acceptable
modified. 4.48 Excellent Very
Highly Acceptable
3 The system can be tested easily.
4

Mean 4.44 Excellent Very Highly


Acceptable

As shown in the table 12, level of acceptability of the Arduino Based Intrusion

Detection System for Don Mariano Marcos Memorial State University Mid-La Union
104

Campus in terms of maintainability which has a mean rating of 4.44 that indicates a

descriptive rating of excellent and interpreted as highly acceptable. This means that the

developed system has the capability to be modified which may include corrections,

improvements or adaptations of the system to change in the environment and in the

requirements and functional specifications

The indicator The system can easily diagnose a problem or fault. got the highest

mean rating of 4.54 which respondents gave a descriptive rating of excellent and

interpreted as very highly acceptable. On the other hand, the indicator which The system

can be easily modified. got the lowest mean rating of 4.31 which has a descriptive rating

excellent and interpreted as highly acceptable. This implies that the developed system can

perform a successful repair action within a given time to replace faulty components.

As cited by Tiwari (2012) the ease with which a software system or component

can be modified to correct faults, improve performance or other attributes, or adapt to a

changed environment is maintainability. It can evolve from its current state to its future

desired state. It is termed as the most difficult and costliest activity due to its inherently

involvement in making predictions about the future.

Table 15. Portability.


105

Mean Descriptive Descriptive


Indicators Rating Interpretation

1. The system can be installed 4.62 Excellent Very Highly


easily Acceptable

2. The system can be easily 4.48 Excellent Very Highly


replaced. Acceptable
3. The software can be moved
4.46 Excellent Very
to another environment.
Highly Acceptable
5

Mean 4.52 Excellent Very Highly


Acceptable

Table 13 presents the level of acceptability of the Arduino Based Intrusion

Detection System for Don Mariano Marcos Memorial State University Mid-La Union

Campus in terms of profitability which has a mean rating of 4.52 and interpreted as

highly acceptable. The highest mean rating 4.62 indicates The software can be moved

to another environment. which has a descriptive rating excellent interpreted as highly

acceptable while the indicator The system can be installed easily gathered the lowest

mean rating of 4.48 and interpreted as very highly acceptable. This denotes that the

developed system has the capability to transfer from one environment to another and the

environment may include organizational, hardware, or software.

According to Rouse (2005) as cited by Lim et al (2015) portability refers to the

process of testing the ease with which a computer software component or application

can be moved from one environment to another. Being able to move software from one

machine platform to another either initially or from existing environment.


106

Summary of the Level of Acceptability of the Arduino Based Intrusion Detection

System for Don Mariano Marcos Memorial State University Mid-La Union Campus

Table 16. Summary of the Level of Acceptability of the Arduino Based Intrusion

Detection System for Don Mariano Marcos Memorial State University Mid-La

Union Campus.

Indicators Mean Descriptive Descriptive Interpretation


Rating

1 Functionality 4.51 Excellent Very Highly Acceptable


2 Reliability 4.51 Excellent Very Highly Acceptable
3 Usability 4.59 Excellent Very Highly Acceptable
4 Efficiency
4.48 Excellent Very Highly Acceptable
5 Maintainability
4.44 Excellent Very Highly Acceptable
6 Portability
4.52 Excellent Very Highly Acceptable
6

Mean 4.51 Excellent Very Highly Acceptable

Table 14 shows the overall of the level of acceptability of the Arduino Based

Intrusion Detection System for Don Mariano Marcos Memorial State University Mid-La

Union Campus indicating that the developed system was highly acceptable a in terms of

functionality, reliability, usability, efficiency, maintainability and portability as evidence

with a grand mean rating of 4.51. The highest mean rating is reflected in the systems
107

usability with the mean rating of 4.59 describe as excellent and interpreted as very highly

acceptable. On the other hand, the systems maintainability got lowest mean rating of

4.44 described as excellent and interpreted as highly acceptable. This implies that the

acceptability of the system recognized the quality characteristics of the ISO/IEC namely

functionality, reliability, usability, efficiency, maintainability and portability.

As stated by Kannellopoulos (2010) ISO/IEC 9126 standard has been developed

to address software quality issues. It specifies software product quality characteristics and

sub-characteristics and proposes metrics for their evaluation. It consists of six

characteristics: a) functionality, concerned with what the software does to fulfil user

needs, b) reliability, evaluating softwares capability to maintain a specified level of

performance, c) usability, assessing how understandable and usable the software is, d)

efficiency, evaluating the capability of the software to exhibit the required performance

with regards to the amount of resources needed, e) maintainability, concerned with the

softwares capability to be modified, and f) portability, measuring the softwares

capability to be transferred across environments.

This instrument was used to evaluate the level of acceptability of the system in

terms of functionality, reliability, usability, efficiency, maintainability and portability.

Potrebbero piacerti anche