zjsoft.files.wordpress.com · web viewarduino send data to software application and then software...
TRANSCRIPT
JASS DEFENDERB.S Computer Science Batch 2013
By
2013-CS-395 Juzer Gondal
2013-CS-359 Affaq Amir
2013-CS-326
2013-CS-319
2013-CS-267
Saifuddin
Syed Sheraz Ahmed
Aleem Jamil
Computer Science DepartmentSir Syed University of Engineering & Technology
University Road, Karachi 75300http://www.ssuet.edu.pk
JASS DEFENDER
JASS DEFENDER
Project AdvisorMr. Waleej HaiderAssistant Professor
SSUET
Submitted By
Juzer Gondal 2013-CS-395
Affaq Amir 2013-CS-359
Saifuddin
Syed Sheraz Ahmed
Aleem Jamil
2013-CS-326
2013-CS-319
2013-CS-267
A project report submitted in partial fulfillment of theRequirements for the award of Bachelor of Science in Computer
Science
Faculty of Engineering and ScienceSir Syed University of Engineering & Technology
December 2016
ii
JASS DEFENDER
PrefaceAbout This Book
This report provides an extensive coverage of Jass Defender. This book is primarily
intended for those who want to prepare and getting knowledge of hardware based
software environmental security project. It provides an in-depth coverage of essential
features of how to secure organizational environment.
There report is a great and deep learning of security system, which professionally can
work more appropriate and complete its surveillance functionality. It is easy to use
due to its UX (User Experience) design. This book helps the readers to understanding
a wide range feature of Jass Defender. It provides an extensive coverage of all
objectives of Jass Defender, that’s reader feels very good while reading. This book
provides an extensive coverage of additional features that in current security system
hasn’t. Throughout the reading of this report you know the interaction of security
system in organizational environment.
1
JASS DEFENDER
ACKNOWLEDGMENTS
First and foremost, I would like to thank our Almighty Allah, for providing me the
strength, courage of conviction and the strong sense of dedication to my project that
enabled me to take it to the level that it has achieved today. Undoubtedly, I wouldn’t
have been now here, if it weren't for His Mercy and Blessings.
This Work would have been impossible without the copious amounts of help,
patience, and encouragement from my kind supervisor Mr. Waleej Haider. I would
like to thank him for teaching me so much and for inspiring me with the example of
hard work, providing great help and key information throughout the time required for
the completion of this project report. I would also very special thanks to Mr.
Muhammad Nadeem for his valuable support in the risk and cost estimation and in
testing phase of this project. I would also like to thanks the entire faculty members
for their able support and encouragement which enable me able to complete my
project report.
To my family, thank you for letting me do what I want to do, supporting my
decisions as crazy as they may be. You are always there for me. My deepest love and
gratitude goes to my father and mother who played such a vital role all through my
life by always placing my interests ahead of theirs. This project work is dedicated to
my parents, thank you for seeing me through every step of the way, for praying for
me and with me during times of trouble, and for rejoicing with me over every little
triumph. During my studies my family constantly provided me the hope that I needed
to complete my higher education. Also thanks to all other member of my family and
friends whose love and prayers are with me all the time.
2
JASS DEFENDER
DECLARATION
We hereby declare that this project report is based on our original work except for
citations and quotations which have been duly acknowledged. We also declare that it
has not been previously and concurrently submitted for any other degree or award at
Sir Syed University of Engineering & Technology or other institutions.
Name: Affaq Amir Signature: ______________________
Name: Saifuddin Signature: ______________________
Name: Syed Sheraz Ahmed
Name: Aleem Jamil
Signature: ______________________
Signature: ______________________
3
JASS DEFENDER
CERTIFICATE
I certify that this project report entitled “Jass Defender” was prepared by “Juzer
Gondal, Affaq Amir, Saifuddin, Syed Sheraz Ahmed, Aleem Jamil” has met the
required standard for submission in partial fulfillment of the requirements for the award
of Bachelor of BS in Computer Science at Sir Syed University of Engineering and
Technology.
Approved by,
Signature: _________________________
Supervisor: Mr. Waleej Haider
Date: _________________________
JASS DEFENDER
INTRODUCTION OF GROUP MEMBERSAffaq Amir
Affaq Amir is the group leader of this final year project. He plays an important role in
the development of this project. He is the student of computer science department of Sir
Syed University of Engineering and technology. He resembling to make projects as his
life carrier shows his nature, especially web based project. Mostly his field of interest is
web base POS (Point of Sales) application.
The documentation and management of project is done by Affaq Amir.
Saifuddin
Saifuddin is the student of Computer Science in Sir Syed University of Engineering
and Technology. He is 2nd important member of this group of final year project. He
works hard to build up their project.
In this project the responsibilities include creating a form of software,
integration of hardware with software and testing of software is done by Saifuddin. The
software programming section application is the responsibility of Saifuddin.
Syed Sheraz Ahmed
Syed Sheraz Ahmed is the student of Computer Science in Sir Syed University of
Engineering and Technology. He is 3rd member of this group of final year project. He
works an important role in the team work and he works hard to build up their project.
In this project the basic responsibilities include: help in analyzing the project,
build data base, hardware and software programming section is done by Syed Sheraz
Ahmed. The physical structure and environmental setup is the responsibility of him.
He like to build a creative and new innovation. His Expertise is on C sharp and
data analyst. Now days he is working as a software architecture designer in a real life
application.
JASS DEFENDER
Aleem Jamil
Aleem Jamil is the student of Computer Science in Sir Syed University of Engineering
and Technology. He is 4th member of this group of final year project. His works is the
UI design of application which give convenient visualization to our user and testing of
application is also done by Aleem Jamil.
Juzer Gonadal
Juzer Gondal was the student of Computer Science in Sir Syed University of
Engineering and Technology. He was the most important member of this final year
project. He was the one who give us this project idea and first UI of our project was
made by him. Due to his medical condition he died on JULY 2016 and because of his
effort our final year project proposal was accepted by our teachers.
JASS DEFENDER
COPYRIGHT
The copyright of this report belongs to the author under the terms of the copyright Act
1987 as qualified by Intellectual Property Policy of Sir Syed University of Engineering
and Technology. Due acknowledgement shall always be made of the use of any
material contained in, or derived from, this report.
© Batch 2013, Computer Science Department. All right reserved.
JASS DEFENDER
DEDICATION
All thanks and gratitude is due only to ALLAH, the most gracious, the most merciful
and the most beneficial, who bestowed upon me enlightenment, courage and energy to
undertake and complete this project.
This humble effort is
Dedicated to my
Mother & Project Advisor
I thank, pray for and promise them to do whatever is possible in our powers to comfort
them and promote their good mission for the noble cause of spreading education and
development of human beings. They have served me with their best efforts and have
brought me up to be the person I am today; may Almighty Allah bless them.
JASS DEFENDER
ABSTRACT
Security is a prime concern in our day-today life. Everyone wants to be as much secure
as possible. In the previous decade frequency of terrorist attacked is increased in
educational institution. Most of the educational institute had not implemented
automated security system. Jass Defender is a security system is primarily based on
securing organization from security attacks. Its attacking and defensive mechanism
makes it possible to catch the terrorist entering in any organization territory. It is a
hardware based software project used to stop criminal activity and record suspicious
activity which help organization to take action before crime.
JASS DEFENDER
Table of Content
1. INTRODUCTION 12
1.1 OVERVIEW 12
1.2 RATIONALE FOR THE RESEARCH 12
1.3 AIM AND OBJECTIVES 13
1.4 SCOPE AND LIMITATION 13
1.5 FUTURE ENHANCEMENT 14
1.6 SELECTION OF DEVELOPMENT TOOLS 14
1.7 CURRENT SYSTEM 15
1.8 BACKGROUND OF THE PROJECT 16
1.9 METHODOLOGY 16
2. LITERATURE REVIEW 182.1 INTRODUCTION________________________________________________18
2.2 CURRENT SYSTEM WITH REFERENCES___________________________18
A. CAMERA AND GSM INTERFACING SYSTEM FOR HOME
SECURITYSURVEILLANCE____________________________________19
B. A REMOTE HOME SECURITY BASED ON WIRELESS SENSOR
NETWORK AND GSM TECHNOLOGY_______________________________20
C. ANTI-THEFT HOME SECURITY SYSTEM_________________________ 21
D. WIRELESS HOME SECURITY SYSTEM WITH MOBILE_____________22
3. DESIGN 243.1 SYSTEM ARCHITECTURE DESIGN________________________________24
3.2 DATA DESIGN__________________________________________________25
3.3 DATA DICTIONARY_____________________________________________27
3.4 FUNCTION DESIGN DESCRIPTION________________________________28
3.5 FUNCTION DESGN______________________________________________31
3.6 SYSTEM INTERFACE DESIGN____________________________________32
3.7 USE CASE MODEL______________________________________________33
3.8 SEQUENCE DIAGRAM___________________________________________35
3.9 STATE CHART DIAGRAM_______________________________________36
4 CODING 39
4.1 HARDWARE40
4.2 SOFTWARE______________________________________________________ 43
JASS DEFENDER
5 METHADOLOGY 46
5.1 INTRODUCTION 47
5.2 TOOLS WE USED 47
5.3 WHY WE USED IT 48
5.4 INETRFACE OD MODEL 48
5.5 MODULE ENVIRONMENT 50
6. RISK ANALYSIS AND COST ESTIMATION 51
6.1 RISK ANALYSIS_______________________________________________ 52
6.2 COST ESTIMATION_____________________________________________ 53
7. TESTING 54
7.1 PURPOSE ______________________________________________________55
7.2 OBJECTIVES55
7.3 TESTING METHADOLOGY 55
7.4 TEST PLAN 55
7.5 TEST PHASE 56
7.6 TEST SCHEDULE 57
7.7 DELIVERABLES 58
7.8 TEST STRATEGY 58
7.9 ROLES AND RESPONSIBILITIES__________________________________63
7.10 ENVIRONMNTAL TESTING63
7.11 TEST CASES 64
7.12 UNIT TESTING 71
7.13 DATABASE TESTING 73
7.14 BUG REPORT 74
8. USER MANUAL 75
8.1 MAIN SCREEN 76
8.2 ALERTS________________________________________________________76
JASS DEFENDER
8.3 LOGS OF IMAGE 77
8.4 LOGS OF ALERTS 77
8.5 CAMERA VIEW 78
8.6 LOG IN AUTHENTICATION78
8.7 MANUAL CONTROL VIEW 79
8.8 ABOUT US 79
9. CONCLUSION AND FUTURE WORK 80
9.1 CONCLUSION 81
9.2 FUTURE WORK 81
References__________________________________________________________________82
PAGE FOR REMARKS / COMMENTS__________________________________________83
PAGE FOR REMARKS / COMMENTS___________________________________________8
4
JASS DEFENDER
1. INTRODUCTION
1.1 OVERVIEW
Jass Defender is a security purpose software project. Jass Defender combines
hardware with software to maintain security in real-time environment of organization.
Jass defender is based on surveillance, attacking to intruder through gun, create
log of images on daily basis, acknowledgement before crime. This Jass Defender will
support 1 types of users a person who using it but while viewing logs it required a
password to view it.
1.2 RATIONALE FOR THE RESEARCH
Security is a prime concern in our day-today life. Everyone wants to be as much
secure as possible. Jass Defender is a security system is primarily based on securing
organization from security attacks. Its attacking and defensive mechanism make it
possible to catch the terrorist entering in any organization territory. It is a hardware
based software project used to stop criminal activity and record suspicious activity
which help organization to take action before crime.
Jass Defender is a security system is primarily based on securing organization from
security attacks. Its attacking and defensive mechanism make it possible to catch the
terrorist entering in any organization territory. It is a hardware based software project
used to stop criminal activity and record suspicious activity which help organization to
take action before crime.
The main purpose of the design of system is defend organization from terrorist attacks.
This system mainly focuses on organization like Schools, Colleges, University because
of security threats to these organizations where a number of children are dying every
year.
JASS DEFENDER
1.3 AIM AND OBJECTIVES
To design a security system which has attacking and defensive mechanism.
To develop automatic and manual function trigger to attack enemies.
Create log on daily basis.
Capture motion and take snaps of illegal activity.
We create a security system which just not secured entry point of organization but
secured whole area of organization with sensor that communicate with a control panel
or command center installed in a control room of organization. It takes action through
it gun module to stop intruder if he breaches the security to enter the organization and
help organization to stop the attack until the security of organization reached there.
1.4 SCOPE AND LIMITATION
This security system is used in every type of organizational institute where security was
not up to the mark. Mostly security system was based on surveillance, so this security
system integrates it with surveillance and attacking mechanism. Some features which
are also new in this system are attack intruder through motion, create log of images and
before the crime acknowledge.
This product must not have an adverse impact on if the organization has an
existing security systems it will not have adverse impact on it. Even it helps
organization to take action before the crime to save many people’s life. It will be the
good product for our customers in order to enhance their security.
The hardware cannot be accessed without it security system. Hardware can be work in
limited range depends on its sensors.
JASS DEFENDER
1.5 FUTURE ENHANCEMENT
The future enhancement for this system would be vast not only focusing on
intruder activity but increase range of sensors so that we observe it far away from
organizational institute, more options and features will be included as recording option
for videos. One more feature that would be improving the system functionality by
introducing a message sending option. Once a system identified an intruder it also
send a message to admin user if he was not available in control room.
1.6 SELECTION OF DEVELOPMENT TOOLS
The software requirement for the development of this security system is:
1. C# is used as Front End.
2. Arduino IDE used to control hardware module.
3. SQL SERVER 2012 used as Back End.
4. Visual Studio Developer Express used for designing purpose.
The hardware requirement for the development of this security system is:
1. A minimum computer system that will help you access all the tools in the
courses is a DUAL CORE processor system or better.
2. Wired Connection.
3. 2 GB of RAM or better.
4. Windows 7 (or higher if possible).
5. Arduino Mega Controller.
6. High Torque Servo Motor.
7. Ultrasonic Sensor.
8. Proximity Sensor.
9. Electric Gun.
JASS DEFENDER
1.7 CURRENT SYSTEM
The security systems work on the simple concept of securing entry points into a home
or organization with sensors that communicate with a control panel or command center
installed in a convenient location somewhere in that area.
The sensors are typically placed in doors that lead to and from that premises to secure
with motion sensors.
But the clauses in this system are that it only generates alarm when the intruder breach
its security and never take any action to stop him.
Camera and GSM interfacing system for home security surveillance [1]
Link: http://www.academicjournals.org/SRE
It secured area through surveillance camera and alert through message to its
owner but acknowledge before crime.
A remote home security based on wireless sensor network and GSM
technology [2]
Link:http://ieeexplore.ieee.org/xpl/articleDetails.jsp?
reload=true&tp=&arnumber=5480767
It secured area through surveillance camera and capturing the intruder image
but take any action to stop it.
Anti-Theft home security system [3]
Link: http://www.academia.edu/4295005/anti-theft_home_security_system
It can only alert alarm to stop intruder, not have any module which used to
generate any message or to forcedly stop them.
Wireless security system with mobile [4]
Link: http://www.technicaljournalsonline.com/ijeat
As above it also capable to take intruder image or to send message to owner
through GSM but never had acknowledge before or forcedly stop anonymous
people not to break the security.
JASS DEFENDER
1.8 BACKGROUND OF THE PROJECT
Security is a prime concern in our day-today life. Everyone wants to be as much secure
as possible. There was no such security system that take action against suspicious
activity. So we create a security system which secured premises of organization with its
sensor. It takes action through it gun module to stop intruder if he breaches the security
to enter the organization and help organization to stop the attack until the security of
organization reached there.
1.9 METHODOLOGY
This segment should elaborate the technical challenges and merits of the project
including the proposed solution that is in your mind to the said problem. A project can
be divided into four major phases as follow;
design phase:
The Software process model for our JASS Defender is Spiral Model.
implementation phase:
Proposed implementation scheme of our proposed solution is software.
Testing phase:
We plan to test the implementation of our project by using function point.
evaluation phase:
We evaluate the results of our project by Software Demonstrations.
JASS DEFENDER
2. LITERATURE REVIEW
2.1 INTRODUCTION
In today's global business environment, the importance of first-to-market, customer
service, cost-competitiveness, and quality are key factors in determining an
organization's success, or undesirable failure. Manufacturers, engineering and
transactional firms share a drive to lower costs, reduce cycle time and offer a diverse
product mix as they pursue higher profits and an increased market share in a growing
global environment. As an effort to secure a competitive edge in its respective
organizations are seeking ways to increase efficiency and guarantee successful
implementation of security system. A variety of systems have been implemented that I
described in introduction chapter reducing product costs, improving security or
organizational capabilities, realizing new market share or entering new markets.
These systems were only being worked for surveillance the environment of
organization's institutes. Some organizations have integrated two or more systems to
provide security.
In this sense it is important to say that the purpose of this Literature Research is to
demonstrate how organizations are secured from suspicious activity and take action
against of it.
2.2 CURRENT SYSTEM WITH REFERENCES
The security systems work on the simple concept of securing entry points into a home
or organization with sensors that communicate with a control panel or command center
installed in a convenient location somewhere in that area.
The sensors are typically placed in doors that lead to and from that premises to secure
with motion sensors.
But the clauses in this system are that it only generates alarm when the intruder breach
its security and never take any action to stop him.
JASS DEFENDER
A. Title: Camera and GSM interfacing system for home security surveillance [1]
This system works by capturing the image of the intruder and the image will be
automatically sent to the house owner in the case of a breaking. Some tests are done
on the prototype that has been developed. These include test on the software used,
microcontroller circuit test and test on the interface between microcontroller circuit
and computer to mobile phones. Test on the whole system is also done towards the
end of the testing.
Two main software are used in carrying out this project which is CodeVisionAVR
and Microsoft Visual C++ 2008 Express Edition. For CodeVisionAVR, it is used to
write the coding for controlling the process that will be running to receive signal
from PIR sensor and ultrasonic. This signal will then be sent to the computer to
activate the camera. This programming will be embedded into ATMega 32
microcontroller in which ATMega 32 is the main part in this system. It is also
known as the controlling point in this system. CodeVisionAVR is much simpler to
use than any other software because the platform is easy to build and it support the
ATMega 32 microcontroller. Whereas for Microsoft Visual C++ 2008 Express
Edition, it is used to write the coding for sending the image to mobile phones
through GSM modem.
In developing this project, a few circuit tests will be done. It is separated into
different part to make it easier to identify the output that we will attain from these
tests.
Camera will also need to be done to ensure that it is working correctly.
Furthermore, this test is done to ensure that the camera will operate when there is
interface process between microcontroller and computer. Figure 8 shows a few
images that have been captured based on the movement detected by the sensor.
For the MMS delivery part, the setting process need to be done first to make sure
the delivery process can run smoothly where the GSM/GPRS modem is chosen
based on the type of device that will be used in the MMS delivery as shown in
Figure 9. Next the MMS server setting needs to be done and this includes gateway
number, server, login, password and APN. All this data depends on the type of
JASS DEFENDER
network and country. It can be accessed through the website or can be directly
clicked at the “Click Here” button. The MMS message part is the part where the
message will be sent. The sender and receiver number will be inserted, where the
sender number is the SIM card number that is used in the GSM/GPRS modem,
whereas the receiver number is the telephone number of the house owner. For
testing purposes, the message that is sent is the text “Hello World”. The button
“Send Message” is pressed when done. Afterwards, the receiver will receive the
message. The result and log segment will show the MMS delivery status for
checking whether the message is successfully delivered. If successful, the “Result”
box will display “0: Success” and The Specified TAPI device is already in use.
B. Title: A Remote Home Security System Based on Wireless Sensor Network and GSM Technology [2]
The system structure is illustrated in Fig.1. It is composed of the MCU-based home
wireless control center, one WSN center node module, and several data collecting
nodes, GSM module, GSM network and mobile phone. The WSN data collecting
node modules are connected with pyroelectric infrared detector, temperature sensor,
smoke detector and gas sensor separately. When the pyroelectric infrared detector
finds that some people intrudes into the house abnormally; or when the temperature
sensor detects too high indoor temperature and at the same time, the smoke sensor
detects over proof smoke concentration; or when the gas sensor detects over proof
combustible gas concentration, the sensors will send encoded alarm signal to the
home control center through the wireless sensor network established in home. Once
the wireless control center receives alarm signal, it will send alarm short message to
the users through the GSM module and GSM network immediately.
The wireless sensor network in
home of this system is composed
of one center node module and
several data collecting node
modules, operating in point-to-
multipoint communication mode.
In different application, the
formation of a WSN node is not
JASS DEFENDER
always the same. In general, a WSN node includes four parts: data collecting unit,
data processing unit, wireless communication unit and power management unit.
C. Title: ANTI-THEFT HOME SECURITY SYSTEM [3]
ATMEGA 8515 is a high performance, low power AVR 8-bit microcontroller. Its
memory consists of 512 bytes of EEPROM, 512 bytes of SRAM and supports up to
64KB of optional external memory space. Also includes 8 KB of insystem
programmable flash with read-while-write capabilities. It peripheral features
encompasses one 8-bit timer/counter and one 16-bit timer/counter. Along with rich
instruction set, it also has 32 general
purpose working registers.
All the 32 registers are directly
connected to the Arithmetic Logic Unit
(ALU), allowing two independent
registers to be accessed in one single
instruction executed in one clock cycle.
The resulting architecture is more code
efficient while achieving throughputs
up to ten times faster than conventional
CISC microcontrollers.
PIR sensors are small, inexpensive,
low power, rugged, have a wide lens
range, are easy to interface with, and
are easy to use. A passive infrared
(PIR) sensor measures infrared light
emitted from objects that generate heat,
and therefore infrared radiation, in its field of view. PIR sensors have a range of
approximately 6 meters, depending on conditions. The sensor adjusts to slowly
changing conditions that occur normally within the environment, but shows a high-
output response when a sudden change takes place.
The Wireless Magnetic Door / Window Contact Sensor is a protective device that
can send notification when the opening and closure of doors and windows occurs. It
is designed to send a wireless signal to a compatible home security system when the
contact between the transmitter and corresponding magnetic sensor is broken.
JASS DEFENDER
Magnetic contact used to monitor normally closed entry points such as doors and
windows, wirelessly communicates with a compatible home security system up to
300 feet away, adjustable radio frequency settings and built-in technology prevent
missed signals and transmission errors.
Here we use a piezoelectric buzzer. A piezoelectric element may be driven by an
oscillating electronic circuit or other audio signal source, driven with a piezoelectric
audio amplifier. Sounds commonly used to indicate that a button has been pressed
are a click, a ring or a beep.
D. Title: Wireless Home Security System with Mobile [4]
Mini Mobile can be utilizing for this purpose;
Identifying and utilizing the wireless communication devices for input in mobile for
WHSSM as for the security purpose and alertness we WHSSM.
Designing and Developing application in the mobile for the WHSSM. Identifying
and Utilizing the wireless communication devices for input in mobile for utilizes
certain input devices. Capturing the image and video clips, sound recording for the
identification, communication with SMS, utilizing the internet for transferring
information, communicating electronic devices with mobile.
Designing and developing application in the mobile for the WHSSM as for the
security purpose and handling the input devices with mobile, we require to develop
applications for mobile. Here will develop application on windows mobile.
Software for WHSSM which covers form report and graphics, it takes actions –on
specific events, accuracy and efficiency will measure, testing with different inputs
will be made, system will cover the exchanging information in terms of EMAIL
and SMS by using wireless communications. 6. Remotely accessible. The solution
of the problem is topically divided into 2 areas, which determine main ways of
dealing with the actual task, and at the same time, represent the controls of the
individual stages of yearly periodicals. Develop software for mobile device which
integrates all Capturing of images, Sound Recording, Wireless Communications
devices, Email, SMS and to identify such electronic devices which uses for home
safety to communicate with our programs.
JASS DEFENDER
3. 3. PROJECT DESIGN
3.1 System Architecture Design
JASS Defender is security system designed to assist organization, such as educational
institute and other.
In Jass Defender data transfers occur through the windows desktop application. This
data is then transferred to the hardware layer (Trigger of Gun) through wired
connection.
Figure 1: System Architecture of Jass Defender
JASS DEFENDER
In the communication layer there lies the application server which forwards the control
to relative functionality through command passed by local user through UI. In the
functional services layer, the data input or request is routed to the appropriate
functional module like record suspicious activity, trigger controls, change/view logs.
Only the two required functions like record suspicious activity and change/view logs
can be accessed to database for information.
3.2 Data Design
3.2.1 Entity Relationship Diagrams
The data object USER ACCOUNT contains four types of entities: Administrator,
Trigger of Gun, Logs, Camera and Session. All of these have an inheritance
relationship with the USER
3.2.2 Data Objects DesignFigure 2: ERD of Jass Defender
JASS DEFENDER
Provide below is a summary of the various data objects that make up the Jass
Defender. Included in each table are the attributes of each object, the data type for each
attribute, the number of characters allowed for each field, the default value, and any
other information that defines the field (i.e., calculation for overdue fees).
User/Admin Object
Columns Data type Constraint Nullable Unique Description
User ID int Primary key False True Create ID for user
Name nvarchar(50) Class
attributes
False False Used to save
name in database
UserName nvarchar(50) Class
attributes
False False Used to show
name in front
view
Password nvarchar(50) Class
attributes
False True Create password
for user
Table 1: Admin Object
Session Object
Columns Data type Constraint Nullable Unique Description
Session_Start time(7) Class attributes True False Record time when
video session start
Session_stop time(7) Class attributes True False Record time when
video session end
Session_ID int Primary key False True Used to create ID
of session
Table 2: Session Object
Log Object
Columns Data type Constraint Nullable Unique Description
Log_ID int Primary key False True Create ID of logs
Log_Detail nvarchar(50) Class attributes True False Use to feed
detail of logs
Table 3: Log Object
Camera Object
JASS DEFENDER
Table 4: Camera Object
Columns Data type Constraint Nullable Unique Description
Camera_ID int Primary key False True Create ID of
camera
Camera_Detail nvarchar(50) Class attributes True False Use to feed
detail of
camera
Recording_ID int Primary key False True Create ID of
recording
video
Recording bits Class attributes False False Record
video of
session
Photos bits Class attributes False False Captured
image of
activity
3.1 Data Dictionary
3.1.1 User/Admin Object:
Description: This object contains information such as the User’s Full Name ,
User ID, Password and Login Name. The User ID serves as a primary key in the
database.
Usage: This object is used to associate within all of function access within the
software.
3.1.2 Session Object:
Description: This object contains information such as the Session_Start,
Session_Stop and Session ID. The Session ID serves as a primary key in the
database.
Usage: Its purpose is to record time when video session start and end.
JASS DEFENDER
3.1.3 Log Object:
Description: This object contains information such as the Log Detail and Log
ID. The Log ID serves as a primary key in the database.
Usage: Its purpose is to create log of suspicious activities.
3.1.4 Camera Object:
Description: This object contains information such as the Camera ID, Camera
Detail, Recording ID, Recording and Photos. The Camera ID serves as a primary
key in the database while the Recording ID serves as the foreign key in the
database.
Usage: Its purpose is to record video of session and to captured image of
suspicious activity.
3.2 Function Design Description
3.2.1 Multi-Level Data Flow Design for Function Process
When examining a security surveillance system or analyzing the information that is
going to be Transferred to hardware, it is important to recognize what the data is, where
the data comes from, how it passes from one point to another within the information
system, and how it will be used by the intended user. The following data flow diagrams
(DFDs) represent the movement of data within the system. The amount of detail
specified in this document will include a level zero, level one and level two DFD’s. All
diagrams include references to additional levels when applicable. Expanded functions
are referenced using numbered tabs, which provide the corresponding diagram number.
JASS DEFENDER
(Level 0 DFD)
(Level 1 DFD)
(Level 2 DFD)
Figure 3: DFD Level 0
Figure 4: DFD Level 1
Figure 5: DFD Level 2
JASS DEFENDER
(Level 2 DFD)
3.3 Function Design
3.3.1 Functional Requirement
Before the crime acknowledge.
Track record of suspicious activity.
Create log on daily basis.
Secured areas from anonymous people.
Motion capture through camera.
Capturing the image.
3.3.2 Non Functional requirement
Usability
It will be easy to learn and operate system.
It has well-structured user manual.
Provide help facilities.
2 to 3 days required to understand functionality of system.
Well-formed graphical user interface.
Figure 6: DFD Level 2
JASS DEFENDER
Reliability
The system should be available on mean period of time if there is a
criminal activity.
The system might be failed to deliver its service if hardware problem
occurs.
Performance
The response of system is within a second so that we can save as possible
as many lives from terrorist activity.
The hardware must be accurate to record suspicious activity so that there
was no false alarm.
Implementation
Jass defender is basically a security based system which give exposure to
the organization with new way of interactive system which just not create
log but also attack anonymous people.
Interface
Its Interface is very simple and easy to use. Simple interface helps
organization to manage all of its functionality easily and help to preview
different screen in an easy and convenient way.
3.4 System Interface Design
3.4.1 Software Interface
Figure 7: Software Interface of Jass Defender
JASS DEFENDER
3.4.2
3.4.2 Hardware Interface
3.5 Use Case Model
(Use Case of Hardware)
(Use Case of Software)
(General Use Case)
Figure 9: Use case of Hardware
Figure 8: Hardware Interface of Jass Defender
Figure 10: Use Case of SoftwareFigure 11: General Use Case
JASS DEFENDER
4.1 HARDWARE CODING
This section defined coding phase of hardware. It identified its important functionality of project in which it deals with its manual controls how it identifies intruder how it get value from environment and its autonomous controls.
The further explanation was explained in phase wise.
Manual Control
This explain the logic for moving gun manually which help user to move it accordingly itself.
void manual()
{
if (Serial.available()>0)
{ y = Serial.read();
if (y=='a')
{ deg1=deg1+5;
servo1.write(deg1);
Serial.println(deg1); }
else if (y=='q')
{ deg1=deg1-5;
servo1.write(deg1);
Serial.println(deg1); }
else if (y=='o')
{ fire();}
}
Fire Control
This function help to fire a gun to intruder to stop him entering the privilege of organization.
void fire()
{ digitalWrite(6,HIGH);
delay(500);
digitalWrite(6,LOW); }
JASS DEFENDER
Reading Function
This help to send sensor value to Arduino to get coordinate value of person detecting by sensor.
void reading()
{ digitalWrite(trigPin1, LOW);
delayMicroseconds(2);
digitalWrite(trigPin1, HIGH);
delayMicroseconds(10);
digitalWrite(trigPin1, LOW);
duration1 = pulseIn(echoPin1, HIGH);
distance1 = (duration1/2) / 29.1;
delay(5); }
Autonomous Control
This explain the autonomous functionality
void autonomous()
{ reading();
if ( distance3 < 150 )
{ delay(1);
reading();
if ( distance3 < 150 )
{ servo1.write(75);
servo2.write(70);
Serial.println("3");
fire(); }
}
else if ( distance4 < 150 )
{ delay(1);
reading();
if ( distance4 < 150 )
JASS DEFENDER
{ servo1.write(85);
servo2.write(70);
Serial.println("4"); } }
}
4.2 SOFTWARE CODING
This explain the logic behind our application that how it get value from Arduino while detecting through sensor and how our login and different form work and how value save from database, how the intruder image capture by application, how record maintain which help the organization to identified intruder.
MENU METHOD
The method which help to connect Arduino with our application through serial port so that we are able to control our hardware through C# application.
public MENU( )
{
InitializeComponent( );
serialPort1.PortName = "COM8";
serialPort1.BaudRate = 9600;
serialPort1.Open();
}
ALERT GENERATION
The method helps to generate an alert pop-up in C# sharp application when our hardware detects some activity in its predefined range.
private void MENU_Load(object sender, EventArgs e)
{
panel1.MaximumSize = this.MaximumSize;
if (serialPort1.IsOpen)
{
serialPort1.ReadTo("@");
cn.Open();
JASS DEFENDER
cmd = new SqlCommand("INSERT INTO Alerts_Report (Alerts) VALUES('Warning! Security Breached')", cn);
i = cmd.ExecuteNonQuery();
cn.Close();
Gun_Activation_Alert ui = new Gun_Activation_Alert (serialPort1);
ui.Show();
}
}
LOGIN AUTHENTICATION
Method that restrict unauthorized person to view logs of intruder images so that privacy of logs never breached.
private void Login_Click(object sender, EventArgs e)
{
SqlConnection cn = new SqlConnection("Data Source=SAIFUDDIN-PC\\SQLEXPRESS;Initial Catalog=Jass Defender;Integrated Security=True");
SqlDataAdapter da = new SqlDataAdapter("Select * FROM Login where Username = '" + textBox1.Text + "'And Password ='" + textBox2.Text + "'", cn);
DataTable dt = new DataTable();
da.Fill(dt);
if (dt.Rows.Count == 1)
{
this.Hide();
Logs ui = new Logs();
}
else
{
MessageBox.Show("Invalid Username OR Password");
}
JASS DEFENDER
LOGS OF IMAGES
A private method that help you to view logs of images of intruder captured by our hardware. It helps to call images from database and viewing it in our application.
private void button1_Click(object sender, EventArgs e)
{
cn.Open();
da = new SqlDataAdapter("SELECT * FROM Camera_Capture where DateInserted BETWEEN '"+dateTimePicker1.Value.ToString("MM/dd/yyyy") +"' AND '"+dateTimePicker2.Value.ToString("MM/dd/yyyy")+"'",cn);
DataSet ds = new DataSet();
da.Fill(ds,"Camera_Capture");
dataGridView1.DataSource = ds.Tables["Camera_Capture"];
cn.Close();
}
MANUAL CONTROL
These methods help how we control our defensive mechanism gun through our C# sharp application. In these method we define how our gun move, how it shoot the intruder, how it capture image on shooting and how images save in database.
private void Mannual_Controls_Load(object sender, EventArgs e) { webcam = new WebCam(); webcam.InitializeWebCam(ref pictureBox1); webcam.Start(); } private void Shoot_Click(object sender, EventArgs e) {if (serialPort1.IsOpen) {serialPort1.Write("o"); } cn.Open(); cmd = new SqlCommand("INSERT INTO Camera_Capture(Camera_Capture) VALUES(@pic)", cn); convertimage(); i = cmd.ExecuteNonQuery(); cn.Close(); if (i < 0) {MessageBox.Show("Save Error", "Error" + MessageBoxIcon.Information); } } private void pictureBox2_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("s");
JASS DEFENDER
} } private void pictureBox3_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("a"); } } private void pictureBox5_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("d"); } } private void pictureBox4_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("w"); } } void convertimage() { if (pictureBox1.Image != null) { ms = new MemoryStream(); pictureBox1.Image.Save(ms, ImageFormat.Jpeg); byte[] photo_array = new byte[ms.Length]; ms.Position = 0; ms.Read(photo_array, 0, photo_array.Length); cmd.Parameters.AddWithValue("@pic", photo_array); } } public SerialPort serialPort3 { get; set; } private void Mannual_Controls_FormClosing(object sender, FormClosingEventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("m"); } webcam.Stop(); }
JASS DEFENDER
5. METHODOLOGY
5.1 INTRODUCTION
Jass Defender functions includes C# sharp application that has a simple interface for
the intended user. The Landscape view of this software is it’s from where users can
start the software for securing the environment before being identified of any intruder.
In this mode the application is stand by until or unless the hardware detect some
activity and generate an alert signal in application. When the system detect activity its
show a pop up that asked a confirmation either you want to activate defensive
mechanism system manually, autonomous or if it false alert so cancel it.
When the defensive mechanism system manually control it show a screen for manual
control and at each fire it take snap of environment so that organization are able to
know to whom they were fired in future.
5.2 TOOLS WE USED
Tools that we used to create this application and hardware are;
Software Tools:
C# sharp application
SQL server 2012
Arduino
Hardware Tools:
Arduino Mega Controller
High Torque Servo Motor
Ultrasonic Sensor
Electric Gun
JASS DEFENDER
5.3 WHY WE USED
We used this tool because C# sharp application is completely compatible with Arduino
Because our system consists on 2 phase, 1st phase it software coding that done in C#
sharp platform and 2nd phase is hardware coding that done in Arduino for connectivity
between Arduino Mega with Servo Motor and Ultrasonic Sensors.
Once the hardware detects anything its pass a value through serial port to desktop
application and in response the application passed some value through serial port to
Arduino Mega Controller Circuit.
5.4 WORKING
The Jass Defender working based on hardware and software both has equal wattage in
this project.
Hardware Working
The working of hardware based on ultrasonic sensor, web camera, electric gun, servo
motor and Arduino Mega Controller. First the sensor detect intruder and send data to
arduino controller. Arduino send data to software application and then software
application activate web camera to take snap of intruder, activate servo motor to move
gun toward intruder to stop him and activate gun to fire intruder.
Ultrasonic Sensor
When application run the sensor are activate automatically and surveillance the
environment. When it detect any activity within a mean while time it send respond to
controller for some activity record and if defensive mechanism system has to work
autonomous so it help a mechanism to move it toward intruder by taking coordinate
from environment and send it to controller and controller help mechanism to move it in
that particular point.
Web Camera
The purpose of web camera in this project is captured a real life event when defensive
mechanism system attack intruder and help the admin user to control the defensive
mechanism manually.
JASS DEFENDER
Electric Gun and Arduino Controller
Electric gun is essential part in our defensive mechanism. It helps to attack intruder. It
can be handled autonomous through sensor or can be handled manually by given input
through our software application.
Arduino Controller working as a bridge between our software application and our
surveillance hardware. It help to send or receive confirmation between software and
hardware.
Software Working
The desktop application of our project start working when our sensor send some
activity alert through arduino controller by the help of serial port then we are able to
handle defensive mechanism manually or autonomous and if its false alert then cancel
it.
The logs of image can be view by providing a user name and password and it created
when gun fire toward intruder. In the mean while the logs of alert is also generated
whenever it get alerts message either they are true or false.
The camera view tabs allow you to view environment through application. It has a
capability to increase number of camera for surveillance
5.5 MODULE ENVIRONMENT
There are essentially two parts of Jass Defender system: the environmental-side,
which because the hardware is going to accessed by the software controlled by the
security officer from control room. And the Client-side which will be handled by the
End-User Example Security Officer.
JASS DEFENDER
Due to a limited budget we are not capable of buying a high ultrasonic or proximity
sensor
Figure 17: Model of Jass Defender
JASS DEFENDER
6. RISK ANALYSIS AND COST ESTIMATION
6.11 RISK ANALYSISQualitative Risk Impact Matrix
Risk Probability Impact Risk Score
System Crash .10 5,000 (500)
Hardware Failure .30 35,000 (10,500)
Lack of developer .30 30,000 (9,000)
Lack of sponsor .60 45,000 (27,000)
Firmware Changes .20 (10 days) (2 days)
Installation of hardware .15 (7-8 days) (3 days)
Reliability .20 5000 (1,000)
Contingency reserve
needed
48000
Table 5: Qualitative Risk Impact Matrix Table
Quantitative Risk Impact Matrix
Risk Probability Impact Risk Score
System Crash Low High Low
Hardware Failure Medium High Medium
Lack of developer Medium Medium Medium
Lack of sponsor High High High
Firmware Changes Low Medium Low
Installation of hardware Low Low Low
Reliability Low Medium Medium
Table 6: Quantitative Risk Impact Matrix Table
Ref# Project Expenditure Estimated Hours
No. of People
Unit Cost
Sub Total
JASS DEFENDER
1 Software CostUser Interface DesignDatabase DesignDatabase DevelopmentBackend CodingFrontend CodingUnit Testing
120 hours144 hours120 hours360 hours168 hours240 hours
122113
$ 10$ 11$ 10$ 50$ 50$ 16
$ 10$ 22$ 20$ 50$ 50$ 48
Sub Total $ 2002 Hardware Cost
Circuit DesignArduino CircuitSentry Gun controllerCircuit to connect Arduino with GunCircuit Testing
120 hours720 hours480 hours360 hours72 hours
12312
$ 24$ 37$ 40$ 50$ 16
$ 24$ 74$ 120$ 50$ 32
Sub Total $ 300Total $ 500
6.12 Cost Estimation
Table 7: Cost Estimation Table
Chapter 7TESTING
JASS DEFENDER
7. TESTING
7.1 Purpose
The overall purpose of testing is to ensure the Jass Defender meets all of its
technical functional and business requirements. The purpose of this document is to
describe the overall test plan and strategy for testing the Jass Defender application.
The approached describe the framework provide all testing related to this
application. The document will also be updated as required for each other.
7.2 Objectives
Verify software requirements are complete and accurate.
Perform detailed test planning
Prepare and document test scenarios cases.
Manage defect tracking process.
Ensure the application is certified for a release into the University of
production environment
Satisfies the Entrance Criteria for User Acceptance Testing.
7.3 Testing Methodology
The goals in testing this application include validating quality, usability,
reliability and performance of the application. Testing will be performed from a
black-box approach, not based on any knowledge of internal design or code.
7.4 TESTING PLAN
7.4.1 What project features has to be tested.
Hardware working including (Gun Functionality, Signal Passing, Recording of Camera
at particular time)
Software Testing including (Retrieval and Saving of Logs, Proper Saving of Recording,
Gun Controls, UI Testing)
7.4.2 What project features not be tested (Project features out of scope).
24 hours recording of camera
recognition of intruder face
Any other testing type not included in test objective section.
Figure 15: Work Break Down Structure
JASS DEFENDER
It is the intent that all of the individual test cases contained in each test plan will be
performed. However, if time does not permit, some of the low priority test cases may
be dropped.
7.5 What are the phases and tasks? (Work Break Down Structure)
7.6 How to schedule phases and tasks? (Scheduling means when it will start and end.)
Figure 16
JASS DEFENDER
7.7
Deliverables
Table 8: Deliverables
Table
7.8 Testing
Strategy and
Approach
7.8.1
Testing
Approach
STLC
Stage
Entry Criteria Activity Exit Criteria Deliverables
Requirement Analysis
Requirements Document available (both functional and non-functional)
Acceptance criteria defined.
Analyze business functionality to know the business modules and module specific functionalities.
Signed off RTM
Test automation feasibility report signed off by the client
RTM
Automation feasibility report (if applicable)
Deliverable For Date / Milestone
Test Plan Project Manager; QA
Director; Test Team
14/12/2016
Traceability Matrix Project Manager; QA
Director
23/12/1016
Test Results Project Manager 29/12/2016
Test Status report QA Manager, QA
Director
04/01/2017
Figure 17: Schedule phases and task
JASS DEFENDER
Application architectural document available.
Identify all transactions in the modules.Identify all the user profiles.
Gather user interface/authentication, geographic spread requirements.
Identify types of tests to be performed.
Gather details about testing priorities and focus.
Prepare Requirement Traceability Matrix (RTM).
Identify test environment details where testing is supposed to be carried out.
Automation feasibility analysis (if required).
Test Planning
Requirements Documents
Requirement
Analyze various testing approaches available
Approved test plan/strategy document.
Test plan/strategy document.
Effort estimation
JASS DEFENDER
Traceability matrix.
Test automation feasibility document.
Finalize on the best suited approach
Preparation of test plan/strategy document for various types of testing
Test tool selection
Test effort estimation
Resource planning and determining roles and responsibilities.
Effort estimation document signed off.
document.
Test case development
Requirements Documents
RTM and test plan
Automation analysis report
Create test cases, automation scripts (where applicable)
Review and baseline test cases and scripts
Create test data
Reviewed and signed test Cases/scripts
Reviewed and signed test data
Test cases/scripts
Test data
Test Environment setup
System Design and architecture documents are available
Environment set-up plan is
Understand the required architecture, environment set-up
Prepare
Environment setup is working as per the plan and checklist
Test data setup is
Environment ready with test data set up
Smoke Test Results.
JASS DEFENDER
available hardware and software requirement list
Finalize connectivity requirements
Prepare environment setup checklist
Setup test Environment and test data
Perform smoke test on the build
Accept/reject the build depending on smoke test result
complete
Smoke test is successful
Test Execution
Baselined RTM, Test Plan , Test case/scripts are available
Test environment is ready
Test data set up is done
Unit/Integration test report for the build to be tested is available
Execute tests as per plan
Document test results, and log defects for failed cases
Update test plans/test cases, if necessary
Map defects to test cases in RTM
Retest the defect fixes
All tests planned are executed
Defects logged and tracked to closure
Completed RTM with execution status
Test cases updated with results
Defect reports
JASS DEFENDER
Regression testing of application
Track the defects to closure
Test Cycle closure
Testing has been completed
Test results are available
Defect logs are available
Evaluate cycle completion criteria based on - Time, Test coverage , Cost , Software Quality , Critical Business Objectives
Prepare test metrics based on the above parameters.
Prepare Test closure report
Qualitative and quantitative reporting of quality of the work product to the customer.
Test result analysis to find out the defect distribution by type and severity
Test Closure report signed by our project supervisor
Test Closure report
Test metrics
JASS DEFENDER
Table 9: Test Approach Table
7.9 Roles and responsibilities of the entire team
Following people will be responsible for
Resource Name Role
Syed Sheraz Developer / Hardware / Tester
Afaq Amir Project Manager / Tester
Saifuddin Developer / Hardware / Tester
Aleem Jamil UI/UX Designing / Tester
Table 10: Roles and Responsibility Table
7.10 Testing Environment
There are essentially two parts of Jass Defender system: the environmental-side,
which
because the hardware is going to accessed by the software controlled by the security
officer from control room. And the Client-side which will be handled by the End-User
i.e. Security Officer.
Figure 17: Testing Environment Diagram
JASS DEFENDER
Due to a limited budget we are not capable of buying a high ultrasonic or proximity
sensor.
7.11 Test Cases
7.11.1 Functional Testing
Table 11: Functional Testing
Test Case
ID
Test
Objective
Test Data Expected
Result
Actual
Result
Test
Status
Pass /
Fail
FUT_001 Create log on
daily basis
Captured
images
saved in
database.
When any
anonymous
activity
occurs.
Success Pass
Figure18
FUT_002 Attacking
intruder
Intruder
breaching
security.
When an
organization
is under
caution.
Success Pass
Figure19
FUT_003 Secured areas
from
anonymous
people
Intruder
breaching
security.
Intruder
trying to
enter
premises.
Success Pass
FUT_004 Capturing the
image
Anonymous
actions.
Images of
illegal
actions.
Success Pass
Figure20
JASS DEFENDER
7.11.2 Cosmetic/UI Testing
Test Case
ID
Test
Objective
Test Data Expected Result
Test Status
Pass / Fail
UIT_001 User Permission Through this functionality we login into logs.
Login for Access to logs of image.
Pass
Figure21
UIT_002 Camera Displays environment of organization.
Capture Images, Display views
Pass
Figure22
Figure 20: FUT_004 Diagram
Table 12: Cosmetic and UI Testing
JASS DEFENDER
UIT_003 Logs Retrieve Logs saved in database
Show logs with captured images with date and time taken.
Pass
Figure20
UIT_004 Gun Controls Controls Gun Attacking Intruder.
Pass
Figure23
UIT_005 Alerts Generate Alerts on gun activation
Display on screen + siren.
Pass
Figure24
UIT_006 Exit Logout, exit application functionality implemented
Functions are implemented on click.
Pass
UIT_007 About Us Shows a form on click
Display information of software version and about developers
Pass
Figure25
Figure 21: UIT_001 Diagram
Figure 22: UIT_002 Diagram
JASS DEFENDER
7.12 Unit Testing
The application is run on test mode and each individuals option is being highly
observed and number of relevancy being performed on the unit as all the functions that
are being encoded are highly providing efficiency and work following are the areas
where test being performed as on individual units.
We have used Manual techniques so test our system so far, every single component has
been tested multiple times to make sure that the performance and functionality of our
system isn’t compromised
Test Case ID : UNT_001
Password restriction for logs of image.
<Graphically show pass> Figure26, Figure27, Figure28
Test Case ID : UNT_002
Camera Viewer
<Graphically show pass> Figure22
Test Case ID : UNT_003
Logs
<Graphically show pass> Figure20
Test Case ID : UNT_004
Gun Controls
<Graphically show pass>Figure23
Test Case ID : UNT_004
Integration of hardware with software application
<Graphically show fail> Bug ID: BUG_001
Table 13: Unit Testing Table
Figure 26: UNT_001 Diagram
Figure 27: UNT_001 Diagram
JASS DEFENDER
7.13 Database Testing
Test Case
ID
Test
Objective
Test Data Test Status
Pass / Fail
DBT_001 Camera
Images
Images are stored
in database
Pass
DBT_002 Logs Logs of images
created
Pass
Table 14: Database Testing Table
Figure 28: UNT_001 Diagram
JASS DEFENDER
Figure 28: Database Testing Diagram
7.14 Bug Reporting
Bug ID Test Case
ID
Bug
Description
Report
ed By
Status Fixed by Sever
ity
Prior
ity
BUG_001 UNT_004 Integration
of hardware
with
software
Tester Fixed Software
Developer
High High
Table 15: Bug Reporting Table
JASS DEFENDER
8. USER MANUAL
This section provides the user manual of Jass Defender. The snap of each screen is
based on the functionality described in the Function Description section.
References are provided as appropriate to the corresponding function descriptions.
8.1 MAIN SCREEN
This is the main screen of Jass Defender.
8.2 ALERTS
Application generated alert when it detects some activity in limited premises of
organization.
8.3 LOGS OF IMAGE
Figure 29: Main Screen Diagram
Figure 19: Alert Screen Diagram
JASS DEFENDER
Logs of images generated when application detect activity of intruder and that in
database so that we can use it later.
8.4 LOGS OF ALERT GENERATED BY SYSTEMLogs of alert generated each time when system suspect some activity either it true
or not.
It tells number of camera work in application for surveillance right now we are
using only one for viewing
Figure 20: Logs View Diagram
Figure 18: Alert Logs Diagram
JASS DEFENDER
8.5 CAMERA VIEW
It tells number of camera work in application for surveillance right now we are
using only one for viewing environment.
8.6 LOG IN AUTHENTICATION
The images of intruder are private entity that cannot be view by everyone so for
viewing the logs of images there is a log in security. After providing a right name
and password you are able to view it.
8.7 MANUAL CONTROL VIEW
Figure 22: Camera View Diagram
Figure 25: Log in Diagram
JASS DEFENDER
This screen view, when you want to operate the gun manually.
8.8 ABOUT US
This screen tells some short information about the group member who are creating
this application. It can be open by click a person icon on right side.
Figure 23 Manual Control Diagram
Figure 21: About us Diagram
JASS DEFENDER
9 CONCLUSION AND FUTURE WORK9.1 CONCLUSION
We conclude that by making this project and developing this superior system prototype
it would be beneficial to all the sectors of organization. It provides all the information
regarding intruder and its criminal activity which can be access from any premises of
organization. It is beneficial for organization to take precaution for any non-suspicious
activity. Help organization to stop intruder through its defensive mechanism manually
or automatic and on that basis generate logs of image from real life environment.
9.2 FUTURE WORK
Even though the purpose of this security system has been achieved, but the camera used
for security surveillance has a few disadvantages that it needs to overcome in order to
improve its performance and efficiency. There are a few suggestions that help to
remove disadvantages that we identified during the development of this security
system. The objective can be further added to have a better security system. Its main
disadvantages are the low quality of the image captured result, night vision issues and
its sensor that help to detect intruder. The camera used has low pixel resolution due to
budget cost. For the next improvement process, it will refer to use a higher pixel
camera. With the use of a better camera, the image captured will be sharper and the
process of identifying the intruder will be easier and with better image it’s possible to
do image processing so that our organization are able to detect intruder if he observing
the organization for criminal activity. The working done in this project is limited to
capturing image of individual moving in normal condition. Other than that, the uses of
sensors that sense intruder activity are less efficient because we want to detect intruder
from a long distance to do that we use this sensor. There are sensors who efficient to
detect but their range was limited which was useless in our project. Thus to increase the
effectiveness of the product performance its refer to use a sensor which are more
efficient for long range. In our project it is most important because it used to activate
the servo motor and gun which used in defensive mechanism to attack intruder.
JASS DEFENDER
References:
[1] Muhammad Syuhami Ab-Rehman, Aminatul Hidayah Asmir, Kasmiran Jumari, “Camera and GSM interfacing system for home security surveillance”, Space Science Institute (ANGKASA) Malaysia, Vol.8(38), Page 1858-1871, June 2013.
[2] Huiping Huang, Shide Xiao, Xiangyin Meng, Ying Xiong, “A Remote Home Security System Based on Wireless Sensor Network and GSM Technology”, Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference, Vol.1, Page: 535 – 538, 24-25 April 2010.
[3] Vaibhav Shah, Sahil Shah, Jay Shah, Prithvish Mamtora, “Anti-Theft Home Security System”, International Journal of Electronics and Communication Engineering (IJECE), Vol.2 Issue IV, Page: 113 – 118, Sept 2013.
[4] Prof. (Dr.) Khanna Samrat, Vivekanand Omprakash, “Wireless Home Security System with Mobile”, Information Technology Dept., ISTAR, Sardar Patel University, VVNagar, India, Vol.II - Issue IV, Page: 396-397, October-December, 2011.