SMART Clock and Watch: An Arduino-Based Security System
SMART Clock and Watch: An Arduino-Based Security System
Introduction
Technology is the application of scientific knowledge for practical purposes like in industry
and engineering to invent useful thing or to solve problems from the simplest one to the most
complex. It is the purposeful utilization, designing and production of goods, tools, techniques and
systems in making human life a lot easier and better. It also makes the impossible look possible
and in today's dynamic world, the importance of technology in all aspects of the daily lives of
During the past decades, technology has become a tool to rely on for most people and
through all these years, it has been proven that life would become harder, senseless or
meaningless, and even boring without its existence. The results of the fast rise of technologies are
being observed in the present day innovations in its various fields; in the health industry where it
became and is continually becoming a great use through the continuous creation of modern
electronic equipment and also in the communication across the globe where it had been the
foundation of the invention and use of the internet. Indeed, innovations, from pioneering inventions
to bold scientific and medical advancements, changed and are constantly changing the course of
human history.
Furthermore, due to the abrupt change and development of our technology, different
electronic devices have been produced continuously. From the wired telephones, to wireless and
handy ones and now phones that on first glance are just typical fashion watches but when
assessed, are tools that can be used to communicate and more importantly as a monitoring help.
This device is known as Smart Watch. On some innovative countries, smart watches have been
1
used to monitor heart beat rates, epileptic attacks and other health conditions.
Here in the Philippines, one of the fields that was and is affected greatly by technology is
the field of education. The process of teaching and learning has been changed. From that of
manila papered visual aids to the projected ones and from paper and pencil examinations to
computerized tasks. One proof of these changes is the Department of Information and
Communications Technology (DICT) Cabagan, Isabela which was first introduced by the Isabela
State University Cabagan Campus through the help of the ISU-GMAP in the SY 2001-2002. It is a
department that aims to respond to the growing demands of IT education for globalization and
thus, students aspiring to become experts in the field of any computer related courses would
always consider this department. With this fact, computer laboratories were established in order to
fully educate its students in the upgrading world. But despite of this objective and the strict
laboratories due to loss of components are still unending through its 13 years of existence.
On the other hand, last February 25, 2005 a fire eliminated the Administration building of
the campus which could have possibly caused by faulty electrical wiring. This fire resulted to the
loss of assets like the computer laboratory of the campus, Conference rooms, Personnel and
Records Office, Executive Officer’s Office and most importantly, the records of students which is
the lifeblood of the registrar’s office were all lost. But all of these could have been stopped or
avoided if there was a tool developed by employees or even students of a specific course offered
Among the different programs offered in the in the Isabela State University - Cabagan
Campus, specifically on DICT, is the degree Bachelor of Science in Computer Engineering which
2
involves software and hardware aspects of the computation of the design of personal computers,
accomplishing this task is the Arduino. Arduino is a software and hardware company, project and
user community that designs and manufactures microcontroller based kits aiming to provide a low
cost, easy way for tyros and professionals to create devices that can interact with the environment
One of the commonly used sensors by industries, businesses and companies is the Radio
Frequency Identification (RFID) technology. It is the equivalent of using barcodes years ago. It
uses electromagnetic fields to identify and track tags which contain electrically stored information
attached to object automatically. It can be attached to cash, clothing and possessions. Likewise, it
can be affixed to computer equipment, books, mobile phones, etc. and even if tags are covered by
an object or not visible, the tags can still be read if passed near the reader. Withal, thermostats are
sensors used in monitoring temperatures. It is the fundamental device in the fire alarms and other
Furthermore, along with these different sensors, many alarm and security systems have
been emerging in markets. One of the most eye capturing inventions is the idea of making different
automations into an SMS based device wherein GSM (Global System for Mobile) are being used to
send notifications to users or for the device to receive commands from the users.
With these facts, the researchers therefore addressed the problems described beforehand
by maximizing the use of these different innovations though interfacing RFID technology, GSM
module and temperature sensor with the Arduino Uno microcontroller in the improvement of the
security of the computer laboratories in the DICT and to lessen or even eliminate the problems of
3
losing lab components and the possible fire.
The study focused on the development of an electronic device, Security System using
Mobile Global System or GSM, Arduino Uno Microcontroller, RFID Technology and Temperature
Sensor (SMART) Clock and Watch which tend to act as a Security System that could elevate the
management of the laboratories through a handy and smart device that could be a source of
protection.
Statement of Objectives
The general objective of the study is to develop a security system that uses the Arduino
Uno microcontroller to address the security-related problem in the computer laboratories of the
DICT.
A piezzo buzzer
4
2. Determine the perception of the faculty and students regarding the use of the
a. Functionality;
b. Usability; and
c. Reliability.
This study entitled “SMART Clock and Watch: An Arduino-Based Security System” is a
security system that provides a monitoring system on one of the five computer laboratories of the
Isabela. It inhibits a fire alarm system, an RFID-based security system and a SIM900a GSM
module that could send SMS notifications and receive commands, specifically the OFF command.
RFID tags were attached to several components of one of the five computer laboratories of
the department, specifically those that were usually stolen like the mouse. On the other hand, an
RFID reader, temperature sensor and a GSM modem was embedded in a typical wall clock. The
clock was programmed using the Arduino Uno Microcontroller as the controlling process. It was put
at the top part of the computer laboratory door and will alarm if there is a possible fire or a
component is brought out of the computer laboratory. Once the clock alarmed, the GSM module
sends an SMS notification to the Smart Watch assigned to the scheduled faculty in which the
module can also receive an SMS OFF command to turn off the alarm system which can be sent
The intended respondents or users of the system were five faculty scheduled to use the
5
assessed laboratory, which is the computer engineering computer laboratory on the testing and
The reading range of the RFID reader used in this project is limited to 6m in diameter.
Once the RFID tags were removed from the components in which they were attached to, the
system will no longer be able to monitor them. The developed device can only send SMS
notifications to one specified number as long as it has a SIM load. The device can likewise receive
a message from the user who wants to turn off the device alarm. The approximate number of SMS
the smart watch can receive is 30 messages so deleting previous text messages is needed to be
able to receive messages again. For security reasons, only authorized faculty will have the
privilege to know the SIM contact number of the device. Furthermore, the system will not work if
6
CHAPTER II
This chapter discusses different researches of experts and graduate students of the same
field which have a significant relation to the design project. This chapter also presents the research
gaps between the existing security system and the researchers’ design.
On the continuous upgrade of technology, different security devices and technologies have
been introduced to humans with the aim of making human life easier and better. Among these
security devices and technologies are the Radio Frequency Identification (RFID) technology,
thermostats, Global System for Mobile (GSM) communication, Arduino Uno Microcontroller and the
Hamid (2006) stated that Radio Frequency Identification (RFID) is one of today’s
Automatic Identification Data Collection (AIDC) industry segments that are most rapidly growing. It
is a technology that is able to work under harsh environment and reads from long distance.
Mahyidin (2008) added that it is a new technology that is based from barcodes in the early times. It
integrates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the
electromagnetic spectrum to uniquely identify an object, animal, or person. The typical RFID
system consists of three components: an antenna and transceiver (often combined into one
reader) and a transponder (the tag). The antenna uses radio frequency waves to transmit a signal
that activates the transponder. When activated, the tag transmits data back to the antenna. RFID
can read the tag using RF, meaning that the RFID reader can be read from a distance, right
7
Arulogun, et al (2013) mentioned that RFID is not actually a new technology; it only quickly
gained more attention recently because of its current low cost and advances in other computing
fields that open up more application areas. They added that RFID combines radio frequency and
microchip technologies to create a smart system that can be used to identify, monitor, secure and
do object inventory.
radio to identify objects from a distance without requiring a line of sight or physical contact. MITIP
(2006) supported Borriello’s statement by saying RFID is a technology that gathers and captures
data about a certain item without the need of touching or seeing the data carrier, through the use of
inductive coupling or electromagnetic waves. Domingo, et al (2008) added that RFID Reader
Module, are also called as interrogators. They convert radio waves returned from the RFID tag into
a form that can be passed on to Controllers, which can make use of it. RFID tags and readers have
to be tuned to the same frequency in order to communicate. RFID systems use many different
frequencies, but the most common and widely used Reader frequency is 125 KHz.
All these related statements therefore agree to Want (2006) words that RFID’s potential
benefits are large and can have many novel applications in the future even applications that we
Another device use for security systems specifically in fire alarm systems is the thermostat
sensors. Thermostats are defined by Jackson Systems, LLC (2011) as the key component of any
HVAC system that can maintain the space temperature by cycling the heating or cooling equipment
on and off to maintain a desired temperature or set point. According to Aragon, Meier, Peffer, Perry
and Pritoni(2011), the basic functions of the typical thermostat over the past sixty years is to set a
8
target temperature, see the current temperature, and control the equipment accordingly and the
second-and expanding-role is to save energy. Thermostats play a vital role in both providing
comfort to people in their homes and controlling the most energy intensive systems in the home-
On the other hand, communication means between human and devices was also
innovated by the use of GSM modem. NevonProjects (2015) and Ramani et al. (2013) agrees
when they define Global System for Mobile Communication (GSM) modem as a specialized type of
system which accepts a SIM card to connect to cell phone networks for data passing. Alcantara,
Lagula, Latina and Te (2013) supported this concept when they said that GSM is a wireless
communication not only between people alone but people to devices also. This system poses a
great advantage and convenience to the public when it is interfaced with different sensors and
functions even if a user is not physically present in the vicinity of the device.
The Arduino Uno Microcontroller is another device that was used in this study. According
environment for writing software on the board that can be a tool for making systems that can sense
and control more of the physical world than the desktop alone.
Lastly, the Oxford University Press (2014) gave a definite definition of Smart Watch when
they define it as a mobile device with a touch screen display designed to be worn on the wrist. The
main benefit of a smart watch is to keep the user constantly updated without having a whip on their
smart phones.
9
Impact of Security Systems on Schools and Universities
International Peace Institute (2016) stated, new technology is and truly is driving rapid global
change in which changes created new opportunities for multilateral cooperation in the area of
sustainable development, relations between the state and the society, peace and conflict, global
governance and mostly on the international security. Security technologies had greatly affected the
lives of mankind with its continuous innovation. Among the different fields of our community, one of
the fields that were affected obviously is the field of education, specifically the medium of security
Safe and nurturing environments are the necessary foundation for education specifically
not only on the students but to the educators as well. Unique challenges have been faced by
different schools, universities and educational institutions. Different security providing innovations
On the assessment of the National Center for Education Statistics (2014), it was found out
that schools use a variety of practices and procedures to promote the safety of students, faculty,
and staff. Certain practices, such as locking or monitoring doors and gates, are intended to limit or
control access to school campuses, while others, such as the use of metal detectors and security
cameras, are intended to monitor or restrict students' and visitors' behavior on campus. In the
2013–14 school year, 93 percent of public schools reported that they controlled access to school
10
Existing Security Systems
Different security systems have emerged the community and are continuously dominating
the processes in different fields of human life. Among these security systems is the study by RFID
based Security System at Cagayan State University by Harry Domingo, et.al (2008) which is a
system that was based on Radio Frequency Identification (RFID) technology and consists of a
passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic
field generated by the base station, gathers information about the Tag ID and sends this
information to the base station. The base station receives, decodes and checks the information
available in its Database and Manchester code was used to send that information. The system
performed as desired with a 10cm diameter antenna attached to the transponder. The base station
is built by using the popular 8051 family microcontroller. It gets the tag ID and if the tag ID is stored
in its memory then the microcontroller will allow the person inside.
This security system presents the idea of using RFID technology in gathering and sending
Tag ID information which the researchers incorporated in the design project. On the other hand, it
was identified that the above stated system possesses the weakness of a minimum range of
coverage area. Meaning, the system gathers and sends data only in the specified locale of the
Among the related studies also are the CKSM Student Attendance Monitoring System with
RFID Technology by Espiritu, Oro, and Pura (2016), the PUP Student Monitoring Using RFID with
SMS Advisory by Rommel Del Rosario and the RFID Based Automatic Attendance System in
Arduino Uno Microcontroller interfaced with the RFID technology and the GSM modem to monitor
the arrival and departure of students who holds the RFID tags/cards which was detected by the
11
RFID reader and then registers the information in a database which eradicates the deficiencies or
difficulties in the manual attendance monitoring system. The information registered was sent
through GSM modem to the students’ parents as the additional features of these studies.
The similarity of these studies to the design project is the use of the Arduino
Microcontroller, the RFID technology and the GSM modem in the monitoring system and the
providing of detailed references on the functionality of the different devices used. The researchers
adapted the use of these security devices in reading tags through the RFID readers and sending
and receiving notifications and commands through the GSM modem. Yet, the researchers have
seen that the weakness of these related literatures is that the cards/tags of each student can be
On the other hand, the study of Mbaka (2009) entitled RFID Based Electronic Equipment
Anti-Theft System is a system which checks and verifies the ownership of such devices when the
person enters or leaves a given premises. An RFID chip is embedded both on the intended devices
and the owners Identification Card. A database is created for storing the details of ownership and
used in the verification process. The RFID reader polls both tags and verifies such information as
The researchers adapted the equipment anti-theft system because it was related to the
prime objective of the proposed design project which was to lessen or eliminate the loss of DICT
computer laboratory’s components. But the observed weakness of this study is one’s Identification
Card can be swapped with another person’s ID making it still possible for a thief to steal devices.
The studies entitled RFID Based Library Management System of AMA Computer College
Santiago Campus by Alejo et al. (2012), the Book Monitoring System with Real-Time Inventory
12
Using RFID Technology by Barbieto et al (2007) and the Library Management System Using RFID
by Viernes, Pasinos and Ventura (2012) are other type of developed systems which are RFID-
based library management system. These studies aimed to provide automated library system by
the use of RFID technology. Also, the aim to help librarians solve the problem in the time
consuming search, inventory, monitoring and supervising of books in libraries by applying program
that incorporates RFID reader with high-frequency tags attached in books. The books and other
reading materials were tagged in which all the information is stored in database with unique
identification.
These studies were identified by the researchers as one of the most related studies due to
the fact that it used RFID technology for the library management system which the researchers
adapted and implemented as a computer laboratory system. The weakness of these studies was
the instance wherein the librarian is physically absent in the vicinity or doing some other stuffs
outside the library or at a far distant from the library. In this scenario, if a student will bring out a
library material even if detected by the system, it will still require human effort to bring back or get
back the material. And so even if the system alarmed if the librarian is not notified, the project’s
Lagula, C. (2013) and the SMS Based Device/Home Controlling System by Talamayan,
Sid, et al (2009) are developed system that used GSM and SMS technology to control household
appliances from remote places with or without the presence of the user in his/her home. The GSM
modem was used for receiving SMS from user’s mobile phone that automatically enables the
controller to take any further action such as to switch ON and OFF the home appliances like lights,
television and fans. The system was integrated with microcontroller and GSM network interface
using assembly language. Furthermore, Potts (2009) and Sabawi (2009) developed a system that
13
interfaces with an Android mobile device by the integration of a GPS receiver, a microcontroller
and a GSM module. The mobile application can be loaded in any compatible device, and once
loaded, interfacing the security system can already be done. Commands that will lock, unlock, or
check the status of the door to which the security system is installed were sent quickly from the
mobile device. The GSM module was used as a command interface for transmitter and receiver of
data.
These studies have been additional proofs that GSM modem is a functional tool that can
be used to receive and transmit data that could support the proposed security system but due to
the consideration of the difficulty of the entire system developed by these researchers, the design
project integrated also the use of the GSM modem to send notifications to the users and allow the
Furthermore, the above cited works focused mainly on the use of the RFID technology,
Arduino Uno Microcontroller and the GSM modem disregarding the fact that on several schools
and universities, use of cellular phones is prohibited and since all the existing security systems
require direct AC source, the researchers established the fact that there is a possibility that the
14
CHAPTER III
METHODOLOGY
This chapter presents the methodology to achieve the researchers’ prime objectives. More
specifically, it discusses the population and locale of the study, design and data gathering
This design project entitled “SMART Clock and Watch: An Arduino-based Security
The questionnaires were distributed to 79 respondents which composed of five faculty and
74 students who generally came from the 3rd year and 4th year BSCpE levels during the
Technology (DICT) computer laboratory to determine the problem and initial data. The data
gathered gave the researchers the idea of designing the proposed project.
Library and internet research were undertaken that significantly helped the researchers in
the entire process. Through the use of these methods, informationand activities in journals, thesis
and dissertationsweregathered.
regarding the use of the device. Likert Scale was used as an approach to scaling the responses in
15
the questionnaire. The questionnaires consisted of 15 questions wherein the questions generally
focused on the evaluation of the design project. The first five questions ask the users whether the
system meets the required functionality of the system. The second five questions were about the
usability of the system while the remaining five were about the reliability of the system.
Design Procedures
This section discusses the different phases the researchers have undergone in the
development of the design project including the specific set of activities done. Likewise, the block
The design project was all about a security system for the computer laboratory of the DICT
that embedded the use of the RFID technology and the temperature sensor. The study was
conceptualized based from the observation that computer laboratories of the department are
unsecured. It was believed that the idea of the project will lessen the loss of laboratory
components.
Due to the complexity of the concept, the researchers’ first step was the gathering of the
data necessary for the completion of the proposed project. The proponents collected information
through books, internet and from the previous design projects related to the study.
After the conceptualization phase, the researchers started designing the proposed project.
The data gathered on the previous phase were filtered and the useful information were compiled
and edited.
16
This phase focused on the technical aspect of the design project. The researchers arrived
first with the block diagram of the project which is discussed and presented hereafter.
With the concept transformed into a block diagram, the researchers started working out on
combining, filtering, evaluating and testing the different circuit diagrams collected in the previous
phase for them to arrive with the correct diagram that helped in the success of the design project
This was the final phase of the design project where the prototype or the device was
The security system used RFID technology and GSM modem which consisted of both
hardware and software implementation. After the construction of the wiring diagram, the
researchers gathered the materials needed to start with the development of the SMART Clock and
Watch through online or direct purchasing. When the materials were ready for the device
construction step, the researchers started on developing the design project. The materials were
assembled manually and through the use of the Arduino software, the coding or programming
along with the functional verification testing of the device were done accordingly together with the
RFID reader, GSM module and the temperature sensor that were put in the SMART clock including
the. RFID tags were attached to the computer laboratory components and when passed or read by
the RFID reader, can cause the SMART clock to alarm. Likewise, when the temperature sensor
sensed a 36.50-degree Celsius temperature or higher, the alarm will also be triggered. The aim of
the GSM modem in the system was to send notifications to the scheduled faculty regarding the
possible fire and stealing of computer laboratory components. Considering the fact that it is
17
prohibited to use cellular phones during class hours, the researchers used a Smart Watch as the
receiver and sender means of the SMS to and from the GSM module.
The entire prototype was carefully tested for possible errors and the DICT computer
laboratories were assessed considering its sizes and the budget before it was implemented and
used by the chosen area and respondents for evaluation. When the device was ready and the
laboratories were already assessed, the researchers used Purposive Nonprobability Sampling in
deciding which among the laboratories was used for the scope of the study and with the result, the
system was then implemented and tested in the CPE laboratory. The testing stage was done to
eliminate error which was very important in making sure that the design project was working
After the implementation and testing period, the researchers distributed questionnaires to
determine the performance efficiency and notions of the respondents to the security system. The
results were evaluated using several statistical tools and the other necessary corrections needed
18
Data Analysis and Statistical Tools
A questionnaire was designed and prepared to gather the necessary data from the
respondents. The data gathered were tabulated and analyzed using weighted mean. A five-point
Likert scale as shown in Table 1 was used to interpret the computed data.
19
CHAPTER IV
Project Design
The flowchart and the block diagram of the system have been used as a guide in the
design of the system. Figure1 presents the block diagram of the design project. The RFID tags
were sticker type tags that were attached to 10 laboratory components wherein when these tags
pass through the 902-928 MHz UHF RFID reader, the Arduino Uno microcontroller will trigger the
SMART clock to alarm and light up a red-colored LED. On the other hand, an LM35 temperature
sensor was used to monitor the temperature of the computer laboratory. If the monitored
temperature increased to 36.50-degree Celsius, the SMART clock alarm will also be triggered and
a yellow-colored LED light will turn on. At the same time, when either or both of these cases
happen, the microcontroller will cause the SIM900A GSM module to send an SMS notification to
the SMART Watch. The SMART Watch can then reply to the GSM module an SMS OFF message
Figure 1. The Block Diagram of the SMART Clock and Watch: An Arduino-Based Security System
20
Figure 2 shows the flowchart of the SMART Clock and Watch: An Arduino-Based Security
System which signifies the different inputs, outputs, decision and decision flows that the
researchers used in the entire process of the design project. At the start of the process, the
sensors were considered as the input to the system namely the RFID reader and the temperature
sensor. When either or both of these sensors gave a YES decision, the alarm will be triggered and
the GSM module will be enabled to send SMS notification. The authorized personnel can then
reply an SMS OFF command to the GSM module to turn off the alarm system or directly press the
Figure 2.The Flowchart of SMART Clock and Watch: An Arduino-Based Security System
21
Project Development
Figure 3 presents the wiring diagram of the system which was based from the block
Figure 3. The Wiring Diagram of the SMART Clock and Watch: An Ardino-Based Security System
22
The wiring diagram was a representation of all the wire connections used and done to
construct the design project. The red line was the connection to a +5V source, the black line to the
GROUND and the gray line to a 220V power source. The blue line was connected to pin A0 of the
Arduino Uno, green to pin13, yellow to pin12, violet to pin7, orange to pin8, brown to pin10 and
During the development of the design project, the researchers originally designed a wiring
diagram that do not have connected LED lights but due to the recommendations taken, red and
yellow LED were added to match exactly to the block diagram of the design project. The wiring of
the prototype was extremely sensitive thus, careful connectivity was required. Apart from this, the
researchers made use of the block diagram, flowchart and wiring diagram to construct correctly the
Project Evaluation
Table 2 shows the mean perception of the faculty and students towards the functionality of
the system. Results show that the overall weighted mean of the respondents is 4.84. It implies that
the respondents strongly agree on the functionality of the project in terms of convenience in
23
Table 2.Respondents’ Rating on the Functionality of the System
Descriptive
Criteria Respondents’ Weighted Mean
Equivalent
1. The design project is convenient in
4.83 Strongly Agree
monitoring the DICT computer laboratory.
2. The design project alarms when a
component is about to be brought out of the 4.89 Strongly Agree
laboratory.
3. The design project alarms when there is
4.81 Strongly Agree
possible fire.
4. The design project provides automatic
SMS notification when the alarm system is 4.89 Strongly Agree
turned on.
5. The design project alarm system stops
4.79 Strongly Agree
when an OFF command is received.
Overall Weighted Mean 4.84 Strongly Agree
Table 3shows the mean perception of the faculty and students towards the usability of the
system. Results show that the overall weighted mean of the respondents is 4.60. It implies that the
respondents strongly agree on the usability of the project as an effective security measure, is/was
easy to install, has easy process of operation, provides/provided accurate processing and can be
24
Table 4 presents the mean perception of the faculty and students towards the reliability of
the system. Results show that the overall weighted mean of the respondents is 4.84. It implies that
the respondents strongly agree on the reliability of the design project as to its dependability and
Respondents’ Descriptive
Criteria
Weighted Mean Equivalent
11. The design project is dependable. 4.75 Strongly Agree
12. The design project detects components
4.87 Strongly Agree
immediately.
13. The design project measured
4.80 Strongly Agree
temperature is accurate.
14. The design project produces precise
4.80 Strongly Agree
alarm result.
15. The design project sends SMS
notification and receives commands 4.97 Strongly Agree
promptly.
Overall Weighted Mean 4.84 Strongly Agree
25
CHAPTER VI
Conclusions
With all the steps and procedures undertaken in this study, the researchers conclude the
following:
1. The SMART Clock and Watch: An Arduino-Based Security System achieved its objective
wherein an RFID reader, GSM module, temperature sensor and an alarm system were
2. With the evaluation done in relation to the requirements, the respondents’ perceptions
Recommendations
Withal, the system can still be developed and enhanced by future researchers. The
1. Consideration of the type of RFID reader to be used in the study is a great concern that
2. Researchers should further study and practice the use of the GSM module
3. The designers may integrate more security features and ideas like having a database of all
the components in the laboratory so that when the stolen laboratory component passed
through the reader, the authorized personnel will be notified immediately what specific
26
REFERENCES
Alcantara, Lagula, Latina and Te. 2013. Mobile Phone Graphical User Interface (GUI) for Appliance
Remote Control: An SMS-based Electronic Appliance Monitoring and Control System.
Retrieved from http://www.dlsu.edu.ph/academics/colleges/coe/research/_files/2013/esg-
01-1213-20.asp
Alejo, et.al. 2012. RFID-Based Library Management System of AMA Computer College Santiago
Campus. Undergraduate Thesis. AMA Computer College, Malvar, Santiago City.
Aragon, Meier, Peffer, Perry and Pritoni. 2011. Facilitating energy savings with programmable
thermostats: Evaluation and guidelines for the thermostat user interface. Retrieved from
https://www.researchgate.net/publication/263522533_Facilitating_energy_savings_with_pr
ogrammable_thermostats_Evaluation_and_guidelines_for_the_thermostat_user_interface
Arulogun, et.al. 2013. RFID- Based Students Management System. Retrieved from
http://www.academia.edu/5419129/RFIDBased_Students_Attendance_Management_Syst
em
Barbieto, et al. 2007. Book Monitoring System with Real-Time Inventory Using RFID Technology.
Retrieved fromhttp://www.dlsu.edu.ph/academics/colleges/coe/research/_files/2007/21.asp
Boyinbode and Olanipekun. 2015. RFID Based Automatic Attendance System in Educational
Instituions of Nigeria. Retrieved from
http://www.sersc.org/journals/IJSH/vol9_no12_2015/7.pdf
Del Rosario, Romel. 2012. Student Monitoring Attendance Using RFID with SMS Advisory at the
Polytechnic University of the Philippines.
Domingo, Harry et.al. 2008. RFID based Security System at Cagayan State University,
Tuguegarao City, Cagayan.
Espiritu, Oro, and Pura. 2016. CKSM Student Attendance Monitoring System with RFID
Technology. Retrieved from http://docshare01.docshare.tips/files/31412/314128975.pdf
Hamid, H.A. 2006. Introduction to Radio Frequency Identification (RFID) and it’s uses. Retrieved
from http://www.freepatentsonline.com/article/Review-Business-Research/177983905.html
27
Mbaka. 2009. RFID Based Election Equipment Anti-Theft System. Retrieved from
http://www.jkuat.ac.ke/departments/eee/wp-content/uploads/2014/09/EEE-
UNDERGRADUATE-PROJECT-ABSTRACTS-2.pdf
MITIP. 2006. Radio Frequency Identification(RFID) and its basic application. Retrieved from
http://ropardo.ro/fileadmin/prezentari_pdf/RFID_MITIP2006.pdf
National Center for Education Statistics. 2014. Assessment of the impact of security systems on
schools and universities. Retrieved from https://nces.ed.gov/
NevonProjects. 2015. A definition of Global System for Mobile Communication (GSM). Retrieved
from http://nevonprojects.com/gsm-home-security/
Peace Institute. 2016. The impact of security systems on schools. Retrieved from
https://www.usip.org/
Sabawi. 2009. Interfacing GSM module with Android Devices. Retrieved from
http://eprints.utem.edu.my/3770/1/Vehicle_Tracking_System_Using_Gps_And_Gsm_Tech
nology_Mohamad_Faizul_Bin_Sabawi_G109.5.M42_2009_-_24_Pages.pdf
Viernes, Pasinos and Ventura. 2012. Library Management System Using RFID.
28
APPENDICES
29
APPENDIX A
Relevant Source Codes
30
RELEVANT SOURCE CODES
#include <SoftwareSerial.h>
SoftwareSerialTM(7, 8);
charmsg=0;
float temp;
inttempPin=0;
intsoundDetectedPin = 10;
intyled =12;
booleanbAlarm = false;
intsoundAlarmTime = 500;
void setup ()
pinMode(rled,OUTPUT);
pinMode(yled,OUTPUT);
Serial.begin(9600);
TM.begin(19200);
31
delay(100);
TM.println("AT+CNMI=2,2,0,0,0\r");
delay(100);
void loop ()
off();
sound();
tempe();
void sound()
if (!bAlarm){
bAlarm = true;
TM.println("AT+CMGF=1");
delay(100);
32
TM.println("AT+CMGS=\"+639553974165\"\r");
delay(100);
delay(100);
TM.println((char)26);
delay(100);
digitalWrite(rled,HIGH);
voidoff()
if(TM.available() >0)
msg=TM.read();
if (msg=='O')
msg=TM.read();
if (msg=='F')
33
if (msg=='F')
digitalWrite(yled, LOW);
digitalWrite(rled, LOW);
bAlarm=false;
}}
voidtempe()
temp = analogRead(tempPin);
Serial.print("TEMPERATURE = ");
Serial.print("*C");
Serial.println();
delay(300);
34
TM.println("AT + CMGS = \"+639553974165\"");
delay(1000);
delay(1000);
delay(1000);
delay(1000);
digitalWrite(yled, HIGH);
delay(100);
35
APPENDIX B
Evaluation Tool
36
Questionnaire for SMART Clock and Watch: An Arduino-Based Security System
Introduction: This design project entitled “SMART Clock and Watch: An Arduino-Based Security
System” is intended to monitor the temperature of the computer laboratory and detect
componenets for securing DICT computer laboratories. Likewise, the project is programmed to
alarm, send SMS notifications and receive commands using the Arduino software.
Objective: This questionnaire is intended to evaluate the performance of the system given the
Direction: Please check the corresponding box of your choice. Answer honestly.
Functionality 5 4 3 2 1
37
Usability 5 4 3 2 1
Reliability 5 4 3 2 1
Comments/ Suggestions:_________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
_______________________________
Signature
38
APPENDIX C
Gantt Chart
39
Gantt Chart
40
APPENDIX D
Working Title Form
41
42
APPENDIX E
Photos
43
CODING AND TESTING
The picture shows Romeo Tuazon and Aubrey Cabalza the coding and testing of the design project.
The picture shows Romeo Tuazon and Dhonna Gangan doing the coding and testing of the design
project.
The picture shows Romeo Tuazon and Hazel Lopez the coding and testing of the design project.
44
COMPONENTS
The picture shows the casing of the design project and the RFID reader.
45
EXHIBIT PHOTOS
The researchers and the design project prototype during the BS Computer Engineering Exhibit.
46
The researchers’ presentation of the design project to the BSCpE-2 students during the BS
Computer Engineering Exhibit day.
The picture shows the researchers’ interaction with the respondents during the BS Computer
Engineering Exhibit day.
47
The picture shows the respondents’ evaluation of the system while answering the evaluation form.
The picture shows the researchers and the prototype of the design project.
48
The picture shows the researchers at the conclusion part of the BS Computer Engineering Exhibit
Day.
The picture shows the BSCpE5 students with the department Chair, Dr. Allen M. Paz on the Exhibit
day.
49
FINAL DEFENSE
The researchers together with the thesis Adviser, panelist and other CPE faculty.
50
Romeo Tuazon, one of the researchers, demonstrating the process of the prototype.
51
Photo2 of the researchers during the presentation of the final prototype.
52
The researchers’ photo2 during the final defense presentation.
53
Photo1 of the BSCpE 5 students together with the CPE faculty, after the final defense.
Photo 2 of the BSCpE 5 students together with the CPE faculty, after the final defense.
54
APPENDIX F
Grammarian’s
Certification
55
CERTIFICATION
This is to certify that the undersigned had examined the documentation of the design ““SMART
Clock and Watch: An Arduino-Based Security System” of Aubrey Micah A. Cabalza, Dhonna D.
Gangan, Hazel P. Lopez and Romeo T. Tuazon Jr., Bachelor of Science in Computer Engineering, as
JENNIE-D D. GANGAN
English Critic
56
APPENDIX G
Bill of Materials
57
Breakdown
ITEM PRICE
Adapter PHP 250.00
Arduino Mega PHP 745.00
Breadboard PHP 125.00
Header (40 pcs.) PHP 32.00
Led PHP 50.00
LM35 PHP 84.00
Male to Female connector (20 pcs.) PHP 100.00
Male to Male Connector (20 pcs.) PHP 100.00
PCB PHP 50.00
RFID Reader PHP 6,630.00
RFID Tags (12 stickers, 1 card) PHP 658.00
RS232 (2 pcs.) PHP 630.00
SIM Card (2pcs.) PHP 40.00
Sim900A GSM Module PHP 1,100.00
Smart Watch PHP 799.00
Soldering Iron PHP 250.00
USB Female Type A (2pcs.) PHP 20.00
Wall clock PHP 250.00
Other Expenses PHP 1,000.00
SUBTOTAL PHP 12,913.00
58
COPY OF OFFCIAL RECEIPTS
59
60
61
62
63
64
65
66
67
68
69
70
71
72
APPENDIX H
Specifications of the
Different Modules
73
Arduino UNO
74
SIM 900A GSM GPRS Module
Introduction
This is an ultra compact and reliable wireless module. The SIM900A is a complete Dual-band
900/1800MHz performance for voice, SMS, Data, and Fax in a small form factor and with low
power consumption. With a tiny configuration of 24mmx24mmx3mm, SIM900A can fit in almost all
the space requirements in user applications, especially for slim and compact demand of design.
Features
75
Dual-Band 900/ 1800 MHz
GPRS multi-slot class 10/8GPRS mobile station class B
Compliant to GSM phase 2/2+Class 4 (2 W @850/ 900 MHz)
Class 1 (1 W @ 1800/1900MHz)
Control via AT commands (GSM 07.07 ,07.05 and SIMCOM enhanced AT Commands)
Low power consumption: 1.5mA(sleep mode)'
Operation temperature: -40°C to +85 °C
Status indicator(D5):It will flashes continuously whenever the call arrives otherwise it is left
ON.
Network LED(D6):This led will blink every second which indicates that the GSM module is
not connected to the mobile network. Once the connection is established successfully, the
LED will blink continuously every 3 seconds.
Hardware connections
The SIM900A module has 6pins in which two pins for Vcc and Gnd and the rest are
3VR&3VT(3volt Rx &Tx) and 5VR,5VT(5volt Rx &Tx) and the connections are made as follows:
Vcc to 5V
Gnd to Gnd
5VR digital pin 9
5VT digital pin 10
Before getting into the program part,we need to look into the AT commands which are discussed in
the following used by this module.With the help of these AT commands,the user can send or
receive messages,make a call and so on.
76
77
78
79
80
81
APPENDIX I
Curriculum Vitae
82
EDUCATIONAL BACKGROUND
Dream: To be a successful
Computer Engineer
Cabagan, Isabela
DHONNA DAQUIOAG GANGAN
84
EDUCATIONAL BACKGROUND
Dream: To be a successful
Computer Engineer and Cabagan, Isabela HAZEL PAGUIGAN LOPEZ
Business Woman
85
EDUCATIONAL BACKGROUND
86
87