• Tidak ada hasil yang ditemukan

SMART THEFT ALARM WITH IMAGE

6.4 LITERATURE REVIEWS

According to Ruhizan et. al (2010), a good data is obtained from carefully designed research based on the appropriate design. In the context of research design, the aspect of suitability in using Telegram Applications as a medium of information transmission to consumers will be emphasized to ensure the success of this design. A more detailed study of all aspects is needed before starting a project to be developed. Therefore, literature review focuses more on theoretical research related designs that the researcher wants to develop. Of the revised assessment through writers past all the authors introduce the Raspberry Pi as micro-controller to remotely monitor or control of an operation. Based on the number of operations that have been included and described, clearly shows the Raspberry Pi able to control operation of a circuit by using micro- controller to receive and deal with instructions and data sent by the user via Telegram applications.

6.5 METHODOLOGY

This product development developed the adaptation from the prototype model.

Prototype model used in the development of this product. This prototype model has five phases of implementation, namely planning, analysis, design, development, prototyping and testing. This model is suitable for the development of product prototypes to give the real picture about an operational product.

Pembangunan Produk & Rekabentuk Siri 6 2021 No.ISBN 978-967-2817-45-1

________________________________________________________________________________________

62

Figure 2: Prototype Development Model.

In this prototype development model, researchers need to focus carefully on five main phases:

1. Planning Phase

In this phase, the basic principles of Raspberry Pi and Camera Pi operations need to be understood in more detail to know the improvement of the product to be developed.

In addition, to facilitate travel to the next phases, planning schedules need to be developed until the product is successfully developed. Furthermore, the requirements for developing this product such as components, equipment involved, and various other work resources need to be determined immediately to facilitate the development of this product.

1. Phase Analysis

This phase is focus on producing specification for product development to be developed. This analysis phase is based on the existing problems and the factors of the problem. Therefore, the researcher must make an analysis first to solve the problem and find information related to the product to be developed

1. Design Phase

In this phase, the researcher must construct a design appropriate to its use environment.

In terms of the shape of the shape chosen and the size of the product is also important to be determined before the product is developed for product adaptation to meet the needs of consumers or homeowners. In addition, the design chosen must be durable and can last for a long time and the user is easy to maintain.

Pembangunan Produk & Rekabentuk Siri 6 2021 No.ISBN 978-967-2817-45-1

________________________________________________________________________________________

63

Figure 3: Isometric view of prototype.

1. Phase Prototype

Once the design and circuit sketches have been studied by researchers, the equipment and components involved require a high incremental cost to ensure that this product is a choice for all. In addition, this phase combines two elements that require each other namely hardware and software to ensure that this developed prototype works properly.

1. Testing Phase

This phase will explain the testing of smart theft alarm products. In this phase, the main process for developing this product is programming. Therefore, researchers will use the software "Python" to create programming. Before the production of this product is ready to be developed, the tester will test every component that will be used to determine the limits of each component.

Hardware, software and application developments

Operational flow chart shows a prototype smart theft alarm with image operate. This prototype aims to sending message with image to house owner when intrusion happen.

Pembangunan Produk & Rekabentuk Siri 6 2021 No.ISBN 978-967-2817-45-1

________________________________________________________________________________________

64

Figure 4: Operation flow of smart theft alarm with image.

Pembangunan Produk & Rekabentuk Siri 6 2021 No.ISBN 978-967-2817-45-1

________________________________________________________________________________________

65

Figure 5: Connection between this system and Telegram application.

6.6 RESULT

After running all the analysis, Researcher found there are still various shortcomings of prototype was developed. The purpose of this analysis was carried out to ensure that the design of the prototype developed is able to achieve the objectives that have been set out by the researcher. The overall objectives of the prototype has been reached.

However, there are still a lot of lack of identifiable after doing engineering analysis.

Weakness and lack of improvement for future researchers.

Analysis of power supply

Table 1: Supply input on the device.

No .

Devices Power in Power received Error (%)

1. Raspberry Pi 5 V 5 V 0

2. Magnetic Switch 5 V 2.4 V 52

3. Camera Pi 5 V 2.6 V 48

The supplies supplied to the Raspberry Pi device have enough inputs of 5V. While the

Pembangunan Produk & Rekabentuk Siri 6 2021 No.ISBN 978-967-2817-45-1

________________________________________________________________________________________

66

Magnetic Switch and Camera Pi devices receive 2.4V and 2.6V inputs. However, the whole operation can work completely and does not affect the output of this system.

Overall, the system uses low voltage at the same time can save the energy consumption.

Analysis expert

To confirm and determine whether the prototype of this Smart Theft Alarm with Image is applicable and user-friendly, analysis is based on feedback made by the expert. This expert's confirmation is also performed to determine the functionality of the prototype that has been generated. Through the validation of this expert, the researcher knows that the prototype produced is suitable for use and is commercialized on the market or not. The specialist consists of two Lecturers and a Technician from the Faculty of Technical and Vocational Education (FPTV), UTHM.

Testing a distance between prototype with Smartphone

Table 2: Testing a distance between prototype with Smartphone N

o.

The distance between prototype with smartphone The state of connection

1 3 meter / / /

2 6 meter / / /

3 9 meter / / /

4 12 meter / / /

5 15 meter / / /

6 18 meter x x x

*(/: good connection, x: no connection)

Pembangunan Produk & Rekabentuk Siri 6 2021 No.ISBN 978-967-2817-45-1

________________________________________________________________________________________

67

Figure 6:Testing a distance between prototype with Smartphone

Based on the results obtained, the prototype will operate well with the phone if a device with a phone less than 15 meters. If a device and the phone more than 15 meters and above, no connection detected and cannot operate as usual. This is because, researcher doing this analysis using “personal hotspot” and the coverage of “personal hotspot” is quite limited.

Testing a prototype capture image with difference time

This test has been done to see the extent of image clarity captured by this system at different times between noon and late night. This test is done 5 times at different times from 11:00 am to 2:00 am. This is to see the comparison of image clarity at that time and to see the functionality of the system at night because many home-intrusion cases happen at night.

Figure 7:Testing a prototype capture image with difference time

Based on the results obtained, the system operates well during the day until late at night. During the day, the results of the images obtained are very clear and satisfying.

But in the evening, the results are less satisfactory even if the image is captured under lighting of the lamps. The image captured is less illuminated and slightly blurred.

Pembangunan Produk & Rekabentuk Siri 6 2021 No.ISBN 978-967-2817-45-1

________________________________________________________________________________________

68 6.7 DISCUSSION

The process of developing the prototype smart theft alarm with image this a variety of research and reference were carried out by researchers to obtain a prototype that meets the characteristics of a real theft alarm. The use of smart theft alarms is a good thing to take advantage of wireless applications where it gives the homeowners the advantage of leaving home comfortably and safely where to avoid aggression when homeowners leave their homes. This prototype development process through a number of phases that have been in the adaptation by the prototype model. After all the materials, devices and equipment completed, researchers have developed a prototype house carefully. Based on the results of the findings of the study, researchers found the prototype developed has reached the objective of the study. Here is the development objective of the prototype development:

a. To design a smart theft alarm with image prototype by using Telegram application as a medium or sending platform.

Through an expert evaluation form conducted on a specialist, experts have provided some suggestions for improvement. All suggestions proposed by this specialist are to increase the usability of the artificial intelligence alarm prototypes that have been generated. Among the suggestions that have been presented are as follows:

i. Position design of Camera Pi on smart theft alarm prototype has to be tilted further down to more precise image capture results.

ii. Use CCTV as a replacement for Camera Pi to record a video.

iii. Create a LDR sensor or install the lights near the Camera Pi for clearer image results at night.

iv. Reduces the delay in receiving messages to give homeowners immediate action.

Recommendations for further research

The following are the recommendations of this study based on the findings, discussions and conclusions that have been mentioned by the researcher. This proposal can be a reference for the next researcher to continue this study. Therefore, there are some suggestions that have been discussed by researchers, among the recommendations are:

i. Replaces Camera Pi which is limited to capture images only to CCTV that can record video Install a cooling system on Raspberry Pi's micro controller to keep up the operation to maximum level.

ii. Position Camera Pi is so tilted down so that image arrest is more focused on criminals.

Pembangunan Produk & Rekabentuk Siri 6 2021

iv. Adds "motion sensor" to this system to detect the movement.

6.9 CONCLUSIONS

This prototype successfully achieved all of the objectives that have been set out by the researchers. The objective of this prototype production includes design phase, the development phase and phase testing functional. At the stage of design, material selection and appropriate devices to guarantee the success of the prototype is done.

Reference design phase at the outset to do the next process, namely the development phase the prototype. Development of prototype includes developing circuit, developing a hardware prototype and develop applications on the phone. The prototype development phase took some time and research should be focused on security during the development of this prototype was carried out. Although the prototype produced has achieved its objective, however this prototype still needs to be done in terms of improving hardware design, circuit design and application design to guarantee the quality of this prototype. Overall, the prototype was produced, and certified specialists have reached the objectives that have been set out by researchers and advanced study can be done by researchers for improve.

6.10 REFERENCE

Hafizullah, M., & Hamid, A. (2008). Radio Frequency Indentification (RFID) Enabled Door Access Control Systems.

Jafridin, N. I. A. (2016). Tips keselamatan rumah ketika bercuti.

http://www.utusan.com.my/rencana/forum/tip-keselamatan-rumah--ketika-bercuti- 1.369447

Malaysia Youth Data Bank System (2017). Statistik Jenayah Indeks Mengikut Negeri Tahun 2016-2017 di Malaysia. Dicapai daripada

http://www.data.gov.my/data/ms_MY/dataset/statistik-jenayah-indeks-seluruh-malaysia- mengikut-jenis-jenayah-negeri-dan-tahun.

M kassim A Jalil (2001), Proses dan kaedah Rekabentuk Satu Pendekatan Kreatif dan Sistematik, Universiti Teknologi Malaysia (UTM)

Malik, B (2016). 8 Perkara Ini Mungkin Punca Rumah Anda ‘Dipecah Masuk’

Pencuri. Dicapai daripada https://www.thevocket.com/punca-rumah-dipecah-masuk/

MStar (2016). Rakyat Malaysia Pandang Remeh Isu Keselamatan Di Rumah.

Dicapai daripada

http://www.mstar.com.my/berita/berita-semasa/2010/05/24/rakyat-malaysia-pandang- remeh-isu-keselamatan-di-rumah/.

Ruhizan M. Yasin, Mohd. Nizam Ab. Rahman, Zunuwanas Mohammad, Saemah Rahman. (2010). Developing Framework for Intelligent Laboratory Management. Procedur Social and Behavioral Sciences Journal. Vol 9 (2010).

Sidhu, M., Coley, B. D, Goske, M. J., Connolly, B., Racadio, J., Yoshizumi, T. T., &

Strauss, K.

J. (2009). Image Gently, Step Lightly: Increase Radiation Dose Awareness In Pediatric Interventional Radiology. Pediatric Radiology, 39(10), 11

Pembangunan Produk & Rekabentuk Siri 6 2021 No.ISBN 978-967-2817-45-1

________________________________________________________________________________________

70

BAB 7

AUTOMATIC ENVIRONMENTAL CONTROL SYSTEM OF

Dokumen terkait