Sei sulla pagina 1di 11

UNIVERSITI KUALA LUMPUR CITY CAMPUS

MALAYSIAN INSTITUTE OF INFORMATION TECHNOLOGY

Name of Course RESEARCH METHODOLOGY Course Code IDB 30102

Lecturer DR. Eiad Yafi Semester / Year JANUARY 2017

Student Name (Programme) MUNIR ISKANDARIAN KARNADI (BCE)

ID Number 52212114401

Date
11/5/2017

Assessment ASSIGNMENT 2 Duration Week 10- 11 Weightage 100 marks (25%)


(Literature Review) 2 weeks
Learning Outcomes:
Upon completion of this course, students should be able to:

1. Analyze the needs to explore the material related to the research topic.
2. Able to express & comment on the identified LR.
3. Applied the hypothesis & decide on testing and design experiment.

1
ASSIGNMENT 2 (LITERATURE REVIEW)

Write a literature review based on the title and problem statement that you have submitted in
Assignment I. The LR report must consist of review of literature including case study comparison, proper
citation using APA style and proper references. You must include in your report (as appendix) the
original articles that you have chosen for your literature review. The literature review must be at least 4
pages (including references). Appendixes are not counted as part of the minimum 4 pages. Please print
and submit the assignment INDIVIDUALLY and save your report in a PDF format. The deadline is Friday
th
12 May 2017 . Late submission will be given 0 mark.

Rubric:

Elements 0 mark 5 marks 10 marks 15 marks 20 marks


Relevance of Not relevant at all Not so Acceptable Relevant Very relevant
literature relevant
Review of None given Very minimal Only Some Very good
case study review description description description
OR and and
comparison comparison comparison
only
Citation Almost no citation Very few Citations are Proper Proper
or clear plagiarism citations OR given for citation for a citation for all
too many most texts, large number texts
mistakes but mistakes of texts
in the citation
style
References No references Too many Some Mostly Proper
given mistakes in references correct references
references but with references for and complete
mistakes most citations for all
citations
Grammar Grammar totally Poor Average Good Perfect
incomprehensible. grammar and grammar and grammar but grammar and
10 or more 6-9 mistakes. 3-5 mistakes almost no
mistakes. mistake.

Total:

TOTAL: 100 MARKS


2

CHAPTER 2 : LITERATURE REVIEW

OVERVIEW
Literature review was done all through the entire project to gain information,
knowledge and skill expected to complete this whole project. The principle hotspots for
this project are the previous project and thesis that is related to this project.
Furthermore, the other sources are books, journals and articles obtained from the
Internet. This chapter discuss the projects and this related to this project. This chapter
also discuss a related researches conducted by previous project in the world.

From analysis, the project did by other researchers also have certain weakness. It
is vital to enhance and to develop a decent project. This project additionally will suggest
some future works that should be possible to enhance the same project. There are
some helpful ideas that can be implemented in this project from other similar projects.

INTRODUCTION
Home security has been a noteworthy issue where crime and wrongdoing is
increasing and needs to take legitimate measures to prevent intrusion. In addition, there
is need to automate home so that the user can that advantage of technological
advancement.

A model of the system is shown in Figure 1, that provide security to home, office,
or building etc via SMS using GSM technology, Internet Based Monitoring System and
alarm system.
(Pinterest,2009)

Figure 1 Home Security System

Keeping in view the fast development of wireless communication, we are


motivated to work on this project. The thought behind this project is to meet the
upcoming challenges of the modern practical application of wireless communication and
to encourage our successors with such magnificent ideas that should clear their concept
about wireless communication and control system.

SEARCH STRATEGY
It is important to choose the right resources to collect information for a study.
Databases, library catalogues, and Internet search engines can be used for a literature
search. I used multiple research databases including Emerald Insight, ProQuest, and
Google Scholar. Keywords searched were security, home security, home automation,
home security system, wireless home security system, security system using Arduino
and internet based monitoring system.
RESEARCH FROM PREVIOUS PROJECT
According to Logeswaran (Logeswaran A/L Arumugam,2009), the project was
developed to design the home security by alarm system. The alarm system should
check the status of the transmitter of the system regularly to ensure that the system
could function without any failure. The failure of the transmitter will be indicated at the
receiver through LEDs and the buzzer beeping sound. The project is to develop an
alarm system for a house.
The system can be operated through a password secured remote control. The
remote can arm and disarm the whole system or each individual zone. The components
that the project used are PIC16F877A microcontroller, encoder HT12E, LCD, 4X4
keypad, transmitter and receiver module.
There are some limitations in this project is only one transmitter and one receiver
is built for this project cannot perform bi-directional communication which allowed the
receiver to send signals to transmitter to request the status of the transmitter because
the communication between the transmitter and the receiver is only one way
communication.
In 2007, Rosli bin Mamat is working on developing a project by using the RF
transmission and the project cover 4 to 5 zones (Rosli bin Mamat,2007). The
components that this project used are encoder, voltage regulator, RF module, Antenna,
decoder, PIC 16F877A microcontroller and alarm. Figure 2 showed the overall process
of the project.
The project limitations are:
1. Expensive due to the voltage regulator is an end product purchased from the
market.
2. Big in size.
3. Encoder-decoder not fully utilized, 15 data only used for 5 zones.
4. The PIC micro-controller which can do more functions beside trigger alarm.
5. Difficult to control because the system can be activated and deactivated through
switching the power supply only.

(Rosli bin Mamat, 2007)


Suman Pandit, Syakyand Kamble and Vinit Vasudevan have been studied
on Home Security Alarm with Arduino. The basic idea behind the project is that all the
bodies generate some heat energy in the form of infrared which is invisible to human
eyes. But, it can be detected by electronic motion sensor (Suman Pandit, Shakyand
Kamble, Vinit Vasudevan,2015).
The project involves the use of Arduino, motion sensor, buzzer, LCD display and
a simple program. In this project, they are using P.I.R. Motion Sensor Module as an
infrared sensor that generates electric charge when exposed in heat and sends a signal
to Arduino. According to level of the infrared in front of sensor, Arduino displays the
status on L.C.D and start buzzing speaker and glows the L.E.D. A simple program is
running on Arduino which checks sensor if anything is moved or new object has been
detected.
The Arduino will processes the signal and set off the alarm along with detection
message on display. With this system we can easily set up a security alarm in our home
for unwanted intruders.

There are some limitations in this project which are the given alarm system
determines the presence of the intruder only, and does not determine how many
persons are in there actually. Besides that, the alarm activates only when the person
cuts through the line of the PIR sensor.

In 2004, Chun-Pai, Jimmy Hsieh and Yang Cao has been working on Home
Security System The project is a digital home security system with voice feature which
can monitor room temperature, smoke, motion, windows and doors (Chun-Pai, Jimmy
Hsieh, Yang Cao,2004). This project built a wired home security system using different
type of sensors. The project using the traditional magnetic switch equipped on doors
and windows. Besides that, the project also using the temperature sensor, smoke
detectors, and motion sensor. In this project the security system will sound an alert
when there is an attempt of break-in or if there is possible smoke or fire.
This project is built without considering how the owner of the system could switch
off the system when he enters the armed house from outside. This is because the main
control unit of the system is attached inside the house.
REFERENCES

1. LOGESWARAN A/L ARUMUGAM. ( MAY 2009 ). Wireless home security


system. Bachelor degree, Universiti Teknologi Malaysia, Skudai.
2. MOHD ROSLI BIN MAMAT. ( 2007 ). Sistem Penggera Keselamatan Rumah
Kediaman Mudah Dan Pintar. Bachelor degree. Universiti Teknologi Malaysia,
Skudai.
3. CHAN HWOH CHUENG. ( MAY 2009 ). Wireless home security system.
Bachelor degree, Universiti Teknologi Malaysia, Skudai.
4. CHUN-PAI JIMMY HSIEH AND YANG CAO. ( 2004). Home security system.
Cornell University.
5. SUMAN PANDIT, SYAKYAND KAMBLE AND VINIT VASUDEVAN. ( 2015 ).
Home security alarm system using Arduino. University of Mumbai
APPENDIXES

1. Wireless Home Security System by Logeswaran A/L Arumugam.


In Malaysia burglary cases are increasing dramatically. Therefore this
project is designed to reduce this crime since this wireless alarm system is
low in cost and able to be owned by everyone. This system could check the
condition of transmitters continuously to ensure that the entire system is
able to work without interruption.
Furthermore, all zones transmitters can be armed and disarmed
individually. A remote control which require password is built in order to
access the system. This project is analysed and designed before beginning
the hardware selection and implementation stage. System is built after
software simulation for the three main parts of the project namely remote
control, transmitter and receiver is done. Then, the hardware is tested and
improved to make it more reliable. The wireless system built at the end of
this project has the required features and met the objectives of this project.
Furthermore, it can be applied in a double storey house as expected since
the transmission distance is reasonably long. Finally, the project is
completed within the low cost budget expected.
http://portal.fke.utm.my/libraryfke/files/169_LOGESWARANALARUM
UGAM2009.pdf
1. Sistem Penggera Keselamatan Rumah Kediaman Mudah dan Pintar
by Mohd Rosli Bin Mamat
The project was developed by using the RF transmission and the project
cover 4 to 5 zones (Rosli bin Mamat,2007). The components that this
project used are encoder, voltage regulator, RF module, Antenna, decoder,
PIC 16F877A microcontroller and alarm. Figure 2 showed the overall
process of the project.
https://books.google.com.my/books/about/Sistem_penggera_kesela
matan_rumah_kediam.html?id=L8CyAQAACAAJ&redir_esc=y
3. Home Security Alarm System using Arduino by Suman
Pandit, Shakyanand Kamble and Vinit Vasudevan.
The need for home security alarm systems nowadays is a serious
demand. As the number of crimes are increasing every day, there has to be
something that will keep us safe. We are all aware of the high end security
systems present in the market but they are not easily available to everyone.
We therefore intend to provide a solution by constructing a cost efficient
electronic system that has the capability of sensing the motion of the
intruders and setting off the alarm. The basic idea behind this project is that
all the bodies generate some heat energy in the form of infrared which is
invisible to human eyes. But, it can be detected by electronic motion
sensor.
The project involves the use of Arduino, motion sensor, buzzer, LCD
display and a simple program. The sensor detect any motion in its
permissible range and triggers the alarm.
It will also send the signal to Arduino which processes the signal and set
off the alarm along with detection message on display. With this system we
can easily set up a security alarm in our home for unwanted intruders.
http://studytronics.weebly.com/uploads/4/4/3/7/44372217/home_sec
urity_alarm_system_using_arduino_project_report.pdf
4. Home Security System by Chun-Pai Jimmy Hsieh And Yang Cao from
Cornell University.
This is a digital home security system with voice feature which can monitor
room temperature, smoke, motion, and windows & doors.
The goal of this project is to utilize the after-market parts and build an
integrated home security system. Besides traditional magnetic switch
equipped on doors and windows, we have also incorporated temperature
sensor, smoke detectors, and motion sensor. Hence the security system
will sound an alert when there is an attempt of break-in or if there is
possible smoke or fire.
The system is fully digital and also be fully customized. It incorporated a
16x2 LCD display with a 4x4 keypad. Each sensor can be enabled or
disabled, and alarm frequency and skim can also be chosen by users. We
have also equipped a voice playback chip, and it will speak which sensor
has gone wrong.
https://people.ece.cornell.edu/land/courses/ece4760/FinalProjects/s2
004/ch236/homesecuritysystem.html

Potrebbero piacerti anche