zjsoft.files.wordpress.com  · web viewarduino send data to software application and then software...

111
JASS DEFENDER B.S Computer Science Batch 2013 By 2013-CS-395 Juzer Gondal 2013-CS-359 Affaq Amir 2013-CS-326 2013-CS-319 2013-CS-267 Saifuddin Syed Sheraz Ahmed Aleem Jamil Computer Science Department

Upload: vuhuong

Post on 11-Mar-2019

216 views

Category:

Documents


0 download

TRANSCRIPT

JASS DEFENDERB.S Computer Science Batch 2013

By

2013-CS-395 Juzer Gondal

2013-CS-359 Affaq Amir

2013-CS-326

2013-CS-319

2013-CS-267

Saifuddin

Syed Sheraz Ahmed

Aleem Jamil

Computer Science DepartmentSir Syed University of Engineering & Technology

University Road, Karachi 75300http://www.ssuet.edu.pk

JASS DEFENDER

JASS DEFENDER

Project AdvisorMr. Waleej HaiderAssistant Professor

SSUET

Submitted By

Juzer Gondal 2013-CS-395

Affaq Amir 2013-CS-359

Saifuddin

Syed Sheraz Ahmed

Aleem Jamil

2013-CS-326

2013-CS-319

2013-CS-267

A project report submitted in partial fulfillment of theRequirements for the award of Bachelor of Science in Computer

Science

Faculty of Engineering and ScienceSir Syed University of Engineering & Technology

December 2016

ii

JASS DEFENDER

PrefaceAbout This Book

This report provides an extensive coverage of Jass Defender. This book is primarily

intended for those who want to prepare and getting knowledge of hardware based

software environmental security project. It provides an in-depth coverage of essential

features of how to secure organizational environment.

There report is a great and deep learning of security system, which professionally can

work more appropriate and complete its surveillance functionality. It is easy to use

due to its UX (User Experience) design. This book helps the readers to understanding

a wide range feature of Jass Defender. It provides an extensive coverage of all

objectives of Jass Defender, that’s reader feels very good while reading. This book

provides an extensive coverage of additional features that in current security system

hasn’t. Throughout the reading of this report you know the interaction of security

system in organizational environment.

1

JASS DEFENDER

ACKNOWLEDGMENTS

First and foremost, I would like to thank our Almighty Allah, for providing me the

strength, courage of conviction and the strong sense of dedication to my project that

enabled me to take it to the level that it has achieved today. Undoubtedly, I wouldn’t

have been now here, if it weren't for His Mercy and Blessings.

This Work would have been impossible without the copious amounts of help,

patience, and encouragement from my kind supervisor Mr. Waleej Haider. I would

like to thank him for teaching me so much and for inspiring me with the example of

hard work, providing great help and key information throughout the time required for

the completion of this project report. I would also very special thanks to Mr.

Muhammad Nadeem for his valuable support in the risk and cost estimation and in

testing phase of this project. I would also like to thanks the entire faculty members

for their able support and encouragement which enable me able to complete my

project report.

To my family, thank you for letting me do what I want to do, supporting my

decisions as crazy as they may be. You are always there for me. My deepest love and

gratitude goes to my father and mother who played such a vital role all through my

life by always placing my interests ahead of theirs. This project work is dedicated to

my parents, thank you for seeing me through every step of the way, for praying for

me and with me during times of trouble, and for rejoicing with me over every little

triumph. During my studies my family constantly provided me the hope that I needed

to complete my higher education. Also thanks to all other member of my family and

friends whose love and prayers are with me all the time.

2

JASS DEFENDER

DECLARATION

We hereby declare that this project report is based on our original work except for

citations and quotations which have been duly acknowledged. We also declare that it

has not been previously and concurrently submitted for any other degree or award at

Sir Syed University of Engineering & Technology or other institutions.

Name: Affaq Amir Signature: ______________________

Name: Saifuddin Signature: ______________________

Name: Syed Sheraz Ahmed

Name: Aleem Jamil

Signature: ______________________

Signature: ______________________

3

JASS DEFENDER

JASS DEFENDER

CERTIFICATE

I certify that this project report entitled “Jass Defender” was prepared by “Juzer

Gondal, Affaq Amir, Saifuddin, Syed Sheraz Ahmed, Aleem Jamil” has met the

required standard for submission in partial fulfillment of the requirements for the award

of Bachelor of BS in Computer Science at Sir Syed University of Engineering and

Technology.

Approved by,

Signature: _________________________

Supervisor: Mr. Waleej Haider

Date: _________________________

JASS DEFENDER

INTRODUCTION OF GROUP MEMBERSAffaq Amir

Affaq Amir is the group leader of this final year project. He plays an important role in

the development of this project. He is the student of computer science department of Sir

Syed University of Engineering and technology. He resembling to make projects as his

life carrier shows his nature, especially web based project. Mostly his field of interest is

web base POS (Point of Sales) application.

The documentation and management of project is done by Affaq Amir.

Saifuddin

Saifuddin is the student of Computer Science in Sir Syed University of Engineering

and Technology. He is 2nd important member of this group of final year project. He

works hard to build up their project.

In this project the responsibilities include creating a form of software,

integration of hardware with software and testing of software is done by Saifuddin. The

software programming section application is the responsibility of Saifuddin.

Syed Sheraz Ahmed

Syed Sheraz Ahmed is the student of Computer Science in Sir Syed University of

Engineering and Technology. He is 3rd member of this group of final year project. He

works an important role in the team work and he works hard to build up their project.

In this project the basic responsibilities include: help in analyzing the project,

build data base, hardware and software programming section is done by Syed Sheraz

Ahmed. The physical structure and environmental setup is the responsibility of him.

He like to build a creative and new innovation. His Expertise is on C sharp and

data analyst. Now days he is working as a software architecture designer in a real life

application.

JASS DEFENDER

Aleem Jamil

Aleem Jamil is the student of Computer Science in Sir Syed University of Engineering

and Technology. He is 4th member of this group of final year project. His works is the

UI design of application which give convenient visualization to our user and testing of

application is also done by Aleem Jamil.

Juzer Gonadal

Juzer Gondal was the student of Computer Science in Sir Syed University of

Engineering and Technology. He was the most important member of this final year

project. He was the one who give us this project idea and first UI of our project was

made by him. Due to his medical condition he died on JULY 2016 and because of his

effort our final year project proposal was accepted by our teachers.

JASS DEFENDER

COPYRIGHT

The copyright of this report belongs to the author under the terms of the copyright Act

1987 as qualified by Intellectual Property Policy of Sir Syed University of Engineering

and Technology. Due acknowledgement shall always be made of the use of any

material contained in, or derived from, this report.

© Batch 2013, Computer Science Department. All right reserved.

JASS DEFENDER

DEDICATION

All thanks and gratitude is due only to ALLAH, the most gracious, the most merciful

and the most beneficial, who bestowed upon me enlightenment, courage and energy to

undertake and complete this project.

This humble effort is

Dedicated to my

Mother & Project Advisor

I thank, pray for and promise them to do whatever is possible in our powers to comfort

them and promote their good mission for the noble cause of spreading education and

development of human beings. They have served me with their best efforts and have

brought me up to be the person I am today; may Almighty Allah bless them.

JASS DEFENDER

ABSTRACT

Security is a prime concern in our day-today life. Everyone wants to be as much secure

as possible. In the previous decade frequency of terrorist attacked is increased in

educational institution. Most of the educational institute had not implemented

automated security system. Jass Defender is a security system is primarily based on

securing organization from security attacks. Its attacking and defensive mechanism

makes it possible to catch the terrorist entering in any organization territory. It is a

hardware based software project used to stop criminal activity and record suspicious

activity which help organization to take action before crime.

JASS DEFENDER

Table of Content

1. INTRODUCTION 12

1.1 OVERVIEW 12

1.2 RATIONALE FOR THE RESEARCH 12

1.3 AIM AND OBJECTIVES 13

1.4 SCOPE AND LIMITATION 13

1.5 FUTURE ENHANCEMENT 14

1.6 SELECTION OF DEVELOPMENT TOOLS 14

1.7 CURRENT SYSTEM 15

1.8 BACKGROUND OF THE PROJECT 16

1.9 METHODOLOGY 16

2. LITERATURE REVIEW 182.1 INTRODUCTION________________________________________________18

2.2 CURRENT SYSTEM WITH REFERENCES___________________________18

A. CAMERA AND GSM INTERFACING SYSTEM FOR HOME

SECURITYSURVEILLANCE____________________________________19

B. A REMOTE HOME SECURITY BASED ON WIRELESS SENSOR

NETWORK AND GSM TECHNOLOGY_______________________________20

C. ANTI-THEFT HOME SECURITY SYSTEM_________________________ 21

D. WIRELESS HOME SECURITY SYSTEM WITH MOBILE_____________22

3. DESIGN 243.1 SYSTEM ARCHITECTURE DESIGN________________________________24

3.2 DATA DESIGN__________________________________________________25

3.3 DATA DICTIONARY_____________________________________________27

3.4 FUNCTION DESIGN DESCRIPTION________________________________28

3.5 FUNCTION DESGN______________________________________________31

3.6 SYSTEM INTERFACE DESIGN____________________________________32

3.7 USE CASE MODEL______________________________________________33

3.8 SEQUENCE DIAGRAM___________________________________________35

3.9 STATE CHART DIAGRAM_______________________________________36

4 CODING 39

4.1 HARDWARE40

4.2 SOFTWARE______________________________________________________ 43

JASS DEFENDER

5 METHADOLOGY 46

5.1 INTRODUCTION 47

5.2 TOOLS WE USED 47

5.3 WHY WE USED IT 48

5.4 INETRFACE OD MODEL 48

5.5 MODULE ENVIRONMENT 50

6. RISK ANALYSIS AND COST ESTIMATION 51

6.1 RISK ANALYSIS_______________________________________________ 52

6.2 COST ESTIMATION_____________________________________________ 53

7. TESTING 54

7.1 PURPOSE ______________________________________________________55

7.2 OBJECTIVES55

7.3 TESTING METHADOLOGY 55

7.4 TEST PLAN 55

7.5 TEST PHASE 56

7.6 TEST SCHEDULE 57

7.7 DELIVERABLES 58

7.8 TEST STRATEGY 58

7.9 ROLES AND RESPONSIBILITIES__________________________________63

7.10 ENVIRONMNTAL TESTING63

7.11 TEST CASES 64

7.12 UNIT TESTING 71

7.13 DATABASE TESTING 73

7.14 BUG REPORT 74

8. USER MANUAL 75

8.1 MAIN SCREEN 76

8.2 ALERTS________________________________________________________76

JASS DEFENDER

8.3 LOGS OF IMAGE 77

8.4 LOGS OF ALERTS 77

8.5 CAMERA VIEW 78

8.6 LOG IN AUTHENTICATION78

8.7 MANUAL CONTROL VIEW 79

8.8 ABOUT US 79

9. CONCLUSION AND FUTURE WORK 80

9.1 CONCLUSION 81

9.2 FUTURE WORK 81

References__________________________________________________________________82

PAGE FOR REMARKS / COMMENTS__________________________________________83

PAGE FOR REMARKS / COMMENTS___________________________________________8

4

JASS DEFENDER

INTRODUCTION

Chapter 1

JASS DEFENDER

1. INTRODUCTION

1.1 OVERVIEW

Jass Defender is a security purpose software project. Jass Defender combines

hardware with software to maintain security in real-time environment of organization.

Jass defender is based on surveillance, attacking to intruder through gun, create

log of images on daily basis, acknowledgement before crime. This Jass Defender will

support 1 types of users a person who using it but while viewing logs it required a

password to view it.

1.2 RATIONALE FOR THE RESEARCH

Security is a prime concern in our day-today life. Everyone wants to be as much

secure as possible. Jass Defender is a security system is primarily based on securing

organization from security attacks. Its attacking and defensive mechanism make it

possible to catch the terrorist entering in any organization territory. It is a hardware

based software project used to stop criminal activity and record suspicious activity

which help organization to take action before crime.

Jass Defender is a security system is primarily based on securing organization from

security attacks. Its attacking and defensive mechanism make it possible to catch the

terrorist entering in any organization territory. It is a hardware based software project

used to stop criminal activity and record suspicious activity which help organization to

take action before crime.

The main purpose of the design of system is defend organization from terrorist attacks.

This system mainly focuses on organization like Schools, Colleges, University because

of security threats to these organizations where a number of children are dying every

year.

JASS DEFENDER

1.3 AIM AND OBJECTIVES

To design a security system which has attacking and defensive mechanism.

To develop automatic and manual function trigger to attack enemies.

Create log on daily basis.

Capture motion and take snaps of illegal activity.

We create a security system which just not secured entry point of organization but

secured whole area of organization with sensor that communicate with a control panel

or command center installed in a control room of organization. It takes action through

it gun module to stop intruder if he breaches the security to enter the organization and

help organization to stop the attack until the security of organization reached there.

1.4 SCOPE AND LIMITATION

This security system is used in every type of organizational institute where security was

not up to the mark. Mostly security system was based on surveillance, so this security

system integrates it with surveillance and attacking mechanism. Some features which

are also new in this system are attack intruder through motion, create log of images and

before the crime acknowledge.

This product must not have an adverse impact on if the organization has an

existing security systems it will not have adverse impact on it. Even it helps

organization to take action before the crime to save many people’s life. It will be the

good product for our customers in order to enhance their security.

The hardware cannot be accessed without it security system. Hardware can be work in

limited range depends on its sensors.

JASS DEFENDER

1.5 FUTURE ENHANCEMENT

The future enhancement for this system would be vast not only focusing on

intruder activity but increase range of sensors so that we observe it far away from

organizational institute, more options and features will be included as recording option

for videos. One more feature that would be improving the system functionality by

introducing a message sending option. Once a system identified an intruder it also

send a message to admin user if he was not available in control room.

1.6 SELECTION OF DEVELOPMENT TOOLS

The software requirement for the development of this security system is:

1. C# is used as Front End.

2. Arduino IDE used to control hardware module.

3. SQL SERVER 2012 used as Back End.

4. Visual Studio Developer Express used for designing purpose.

The hardware requirement for the development of this security system is:

1. A minimum computer system that will help you access all the tools in the

courses is a DUAL CORE processor system or better.

2. Wired Connection.

3. 2 GB of RAM or better.

4. Windows 7 (or higher if possible).

5. Arduino Mega Controller.

6. High Torque Servo Motor.

7. Ultrasonic Sensor.

8. Proximity Sensor.

9. Electric Gun.

JASS DEFENDER

1.7 CURRENT SYSTEM

The security systems work on the simple concept of securing entry points into a home

or organization with sensors that communicate with a control panel or command center

installed in a convenient location somewhere in that area.

The sensors are typically placed in doors that lead to and from that premises to secure

with motion sensors.

But the clauses in this system are that it only generates alarm when the intruder breach

its security and never take any action to stop him.

Camera and GSM interfacing system for home security surveillance [1]

Link: http://www.academicjournals.org/SRE

It secured area through surveillance camera and alert through message to its

owner but acknowledge before crime.

A remote home security based on wireless sensor network and GSM

technology [2]

Link:http://ieeexplore.ieee.org/xpl/articleDetails.jsp?

reload=true&tp=&arnumber=5480767

It secured area through surveillance camera and capturing the intruder image

but take any action to stop it.

Anti-Theft home security system [3]

Link: http://www.academia.edu/4295005/anti-theft_home_security_system

It can only alert alarm to stop intruder, not have any module which used to

generate any message or to forcedly stop them.

Wireless security system with mobile [4]

Link: http://www.technicaljournalsonline.com/ijeat

As above it also capable to take intruder image or to send message to owner

through GSM but never had acknowledge before or forcedly stop anonymous

people not to break the security.

JASS DEFENDER

1.8 BACKGROUND OF THE PROJECT

Security is a prime concern in our day-today life. Everyone wants to be as much secure

as possible. There was no such security system that take action against suspicious

activity. So we create a security system which secured premises of organization with its

sensor. It takes action through it gun module to stop intruder if he breaches the security

to enter the organization and help organization to stop the attack until the security of

organization reached there.

1.9 METHODOLOGY

This segment should elaborate the technical challenges and merits of the project

including the proposed solution that is in your mind to the said problem. A project can

be divided into four major phases as follow;

design phase:

The Software process model for our JASS Defender is Spiral Model.

implementation phase:

Proposed implementation scheme of our proposed solution is software.

Testing phase:

We plan to test the implementation of our project by using function point.

evaluation phase:

We evaluate the results of our project by Software Demonstrations.

JASS DEFENDER

Chapter 2

LITERATURE REVIEW

JASS DEFENDER

2. LITERATURE REVIEW

2.1 INTRODUCTION

In today's global business environment, the importance of first-to-market, customer

service, cost-competitiveness, and quality are key factors in determining an

organization's success, or undesirable failure. Manufacturers, engineering and

transactional firms share a drive to lower costs, reduce cycle time and offer a diverse

product mix as they pursue higher profits and an increased market share in a growing

global environment. As an effort to secure a competitive edge in its respective

organizations are seeking ways to increase efficiency and guarantee successful

implementation of security system. A variety of systems have been implemented that I

described in introduction chapter reducing product costs, improving security or

organizational capabilities, realizing new market share or entering new markets.

These systems were only being worked for surveillance the environment of

organization's institutes. Some organizations have integrated two or more systems to

provide security.

In this sense it is important to say that the purpose of this Literature Research is to

demonstrate how organizations are secured from suspicious activity and take action

against of it.

2.2 CURRENT SYSTEM WITH REFERENCES

The security systems work on the simple concept of securing entry points into a home

or organization with sensors that communicate with a control panel or command center

installed in a convenient location somewhere in that area.

The sensors are typically placed in doors that lead to and from that premises to secure

with motion sensors.

But the clauses in this system are that it only generates alarm when the intruder breach

its security and never take any action to stop him.

JASS DEFENDER

A. Title: Camera and GSM interfacing system for home security surveillance [1]

This system works by capturing the image of the intruder and the image will be

automatically sent to the house owner in the case of a breaking. Some tests are done

on the prototype that has been developed. These include test on the software used,

microcontroller circuit test and test on the interface between microcontroller circuit

and computer to mobile phones. Test on the whole system is also done towards the

end of the testing.

Two main software are used in carrying out this project which is CodeVisionAVR

and Microsoft Visual C++ 2008 Express Edition. For CodeVisionAVR, it is used to

write the coding for controlling the process that will be running to receive signal

from PIR sensor and ultrasonic. This signal will then be sent to the computer to

activate the camera. This programming will be embedded into ATMega 32

microcontroller in which ATMega 32 is the main part in this system. It is also

known as the controlling point in this system. CodeVisionAVR is much simpler to

use than any other software because the platform is easy to build and it support the

ATMega 32 microcontroller. Whereas for Microsoft Visual C++ 2008 Express

Edition, it is used to write the coding for sending the image to mobile phones

through GSM modem.

In developing this project, a few circuit tests will be done. It is separated into

different part to make it easier to identify the output that we will attain from these

tests.

Camera will also need to be done to ensure that it is working correctly.

Furthermore, this test is done to ensure that the camera will operate when there is

interface process between microcontroller and computer. Figure 8 shows a few

images that have been captured based on the movement detected by the sensor.

For the MMS delivery part, the setting process need to be done first to make sure

the delivery process can run smoothly where the GSM/GPRS modem is chosen

based on the type of device that will be used in the MMS delivery as shown in

Figure 9. Next the MMS server setting needs to be done and this includes gateway

number, server, login, password and APN. All this data depends on the type of

JASS DEFENDER

network and country. It can be accessed through the website or can be directly

clicked at the “Click Here” button. The MMS message part is the part where the

message will be sent. The sender and receiver number will be inserted, where the

sender number is the SIM card number that is used in the GSM/GPRS modem,

whereas the receiver number is the telephone number of the house owner. For

testing purposes, the message that is sent is the text “Hello World”. The button

“Send Message” is pressed when done. Afterwards, the receiver will receive the

message. The result and log segment will show the MMS delivery status for

checking whether the message is successfully delivered. If successful, the “Result”

box will display “0: Success” and The Specified TAPI device is already in use.

B. Title: A Remote Home Security System Based on Wireless Sensor Network and GSM Technology [2]

The system structure is illustrated in Fig.1. It is composed of the MCU-based home

wireless control center, one WSN center node module, and several data collecting

nodes, GSM module, GSM network and mobile phone. The WSN data collecting

node modules are connected with pyroelectric infrared detector, temperature sensor,

smoke detector and gas sensor separately. When the pyroelectric infrared detector

finds that some people intrudes into the house abnormally; or when the temperature

sensor detects too high indoor temperature and at the same time, the smoke sensor

detects over proof smoke concentration; or when the gas sensor detects over proof

combustible gas concentration, the sensors will send encoded alarm signal to the

home control center through the wireless sensor network established in home. Once

the wireless control center receives alarm signal, it will send alarm short message to

the users through the GSM module and GSM network immediately.

The wireless sensor network in

home of this system is composed

of one center node module and

several data collecting node

modules, operating in point-to-

multipoint communication mode.

In different application, the

formation of a WSN node is not

JASS DEFENDER

always the same. In general, a WSN node includes four parts: data collecting unit,

data processing unit, wireless communication unit and power management unit.

C. Title: ANTI-THEFT HOME SECURITY SYSTEM [3]

ATMEGA 8515 is a high performance, low power AVR 8-bit microcontroller. Its

memory consists of 512 bytes of EEPROM, 512 bytes of SRAM and supports up to

64KB of optional external memory space. Also includes 8 KB of insystem

programmable flash with read-while-write capabilities. It peripheral features

encompasses one 8-bit timer/counter and one 16-bit timer/counter. Along with rich

instruction set, it also has 32 general

purpose working registers.

All the 32 registers are directly

connected to the Arithmetic Logic Unit

(ALU), allowing two independent

registers to be accessed in one single

instruction executed in one clock cycle.

The resulting architecture is more code

efficient while achieving throughputs

up to ten times faster than conventional

CISC microcontrollers.

PIR sensors are small, inexpensive,

low power, rugged, have a wide lens

range, are easy to interface with, and

are easy to use. A passive infrared

(PIR) sensor measures infrared light

emitted from objects that generate heat,

and therefore infrared radiation, in its field of view. PIR sensors have a range of

approximately 6 meters, depending on conditions. The sensor adjusts to slowly

changing conditions that occur normally within the environment, but shows a high-

output response when a sudden change takes place.

The Wireless Magnetic Door / Window Contact Sensor is a protective device that

can send notification when the opening and closure of doors and windows occurs. It

is designed to send a wireless signal to a compatible home security system when the

contact between the transmitter and corresponding magnetic sensor is broken.

JASS DEFENDER

Magnetic contact used to monitor normally closed entry points such as doors and

windows, wirelessly communicates with a compatible home security system up to

300 feet away, adjustable radio frequency settings and built-in technology prevent

missed signals and transmission errors.

Here we use a piezoelectric buzzer. A piezoelectric element may be driven by an

oscillating electronic circuit or other audio signal source, driven with a piezoelectric

audio amplifier. Sounds commonly used to indicate that a button has been pressed

are a click, a ring or a beep.

D. Title: Wireless Home Security System with Mobile [4]

Mini Mobile can be utilizing for this purpose;

Identifying and utilizing the wireless communication devices for input in mobile for

WHSSM as for the security purpose and alertness we WHSSM.

Designing and Developing application in the mobile for the WHSSM. Identifying

and Utilizing the wireless communication devices for input in mobile for utilizes

certain input devices. Capturing the image and video clips, sound recording for the

identification, communication with SMS, utilizing the internet for transferring

information, communicating electronic devices with mobile.

Designing and developing application in the mobile for the WHSSM as for the

security purpose and handling the input devices with mobile, we require to develop

applications for mobile. Here will develop application on windows mobile.

Software for WHSSM which covers form report and graphics, it takes actions –on

specific events, accuracy and efficiency will measure, testing with different inputs

will be made, system will cover the exchanging information in terms of EMAIL

and SMS by using wireless communications. 6. Remotely accessible. The solution

of the problem is topically divided into 2 areas, which determine main ways of

dealing with the actual task, and at the same time, represent the controls of the

individual stages of yearly periodicals. Develop software for mobile device which

integrates all Capturing of images, Sound Recording, Wireless Communications

devices, Email, SMS and to identify such electronic devices which uses for home

safety to communicate with our programs.

JASS DEFENDER

Chapter 3

DESIGN

JASS DEFENDER

3. 3. PROJECT DESIGN

3.1 System Architecture Design

JASS Defender is security system designed to assist organization, such as educational

institute and other.

In Jass Defender data transfers occur through the windows desktop application. This

data is then transferred to the hardware layer (Trigger of Gun) through wired

connection.

Figure 1: System Architecture of Jass Defender

JASS DEFENDER

In the communication layer there lies the application server which forwards the control

to relative functionality through command passed by local user through UI. In the

functional services layer, the data input or request is routed to the appropriate

functional module like record suspicious activity, trigger controls, change/view logs.

Only the two required functions like record suspicious activity and change/view logs

can be accessed to database for information.

3.2 Data Design

3.2.1 Entity Relationship Diagrams

The data object USER ACCOUNT contains four types of entities: Administrator,

Trigger of Gun, Logs, Camera and Session. All of these have an inheritance

relationship with the USER

3.2.2 Data Objects DesignFigure 2: ERD of Jass Defender

JASS DEFENDER

Provide below is a summary of the various data objects that make up the Jass

Defender. Included in each table are the attributes of each object, the data type for each

attribute, the number of characters allowed for each field, the default value, and any

other information that defines the field (i.e., calculation for overdue fees).

User/Admin Object

Columns Data type Constraint Nullable Unique Description

User ID int Primary key False True Create ID for user

Name nvarchar(50) Class

attributes

False False Used to save

name in database

UserName nvarchar(50) Class

attributes

False False Used to show

name in front

view

Password nvarchar(50) Class

attributes

False True Create password

for user

Table 1: Admin Object

Session Object

Columns Data type Constraint Nullable Unique Description

Session_Start time(7) Class attributes True False Record time when

video session start

Session_stop time(7) Class attributes True False Record time when

video session end

Session_ID int Primary key False True Used to create ID

of session

Table 2: Session Object

Log Object

Columns Data type Constraint Nullable Unique Description

Log_ID int Primary key False True Create ID of logs

Log_Detail nvarchar(50) Class attributes True False Use to feed

detail of logs

Table 3: Log Object

Camera Object

JASS DEFENDER

Table 4: Camera Object

Columns Data type Constraint Nullable Unique Description

Camera_ID int Primary key False True Create ID of

camera

Camera_Detail nvarchar(50) Class attributes True False Use to feed

detail of

camera

Recording_ID int Primary key False True Create ID of

recording

video

Recording bits Class attributes False False Record

video of

session

Photos bits Class attributes False False Captured

image of

activity

3.1 Data Dictionary

3.1.1 User/Admin Object:

Description: This object contains information such as the User’s Full Name ,

User ID, Password and Login Name. The User ID serves as a primary key in the

database.

Usage: This object is used to associate within all of function access within the

software.

3.1.2 Session Object:

Description: This object contains information such as the Session_Start,

Session_Stop and Session ID. The Session ID serves as a primary key in the

database.

Usage: Its purpose is to record time when video session start and end.

JASS DEFENDER

3.1.3 Log Object:

Description: This object contains information such as the Log Detail and Log

ID. The Log ID serves as a primary key in the database.

Usage: Its purpose is to create log of suspicious activities.

3.1.4 Camera Object:

Description: This object contains information such as the Camera ID, Camera

Detail, Recording ID, Recording and Photos. The Camera ID serves as a primary

key in the database while the Recording ID serves as the foreign key in the

database.

Usage: Its purpose is to record video of session and to captured image of

suspicious activity.

3.2 Function Design Description

3.2.1 Multi-Level Data Flow Design for Function Process

When examining a security surveillance system or analyzing the information that is

going to be Transferred to hardware, it is important to recognize what the data is, where

the data comes from, how it passes from one point to another within the information

system, and how it will be used by the intended user. The following data flow diagrams

(DFDs) represent the movement of data within the system. The amount of detail

specified in this document will include a level zero, level one and level two DFD’s. All

diagrams include references to additional levels when applicable. Expanded functions

are referenced using numbered tabs, which provide the corresponding diagram number.

JASS DEFENDER

(Level 0 DFD)

(Level 1 DFD)

(Level 2 DFD)

Figure 3: DFD Level 0

Figure 4: DFD Level 1

Figure 5: DFD Level 2

JASS DEFENDER

(Level 2 DFD)

3.3 Function Design

3.3.1 Functional Requirement

Before the crime acknowledge.

Track record of suspicious activity.

Create log on daily basis.

Secured areas from anonymous people.

Motion capture through camera.

Capturing the image.

3.3.2 Non Functional requirement

Usability

It will be easy to learn and operate system.

It has well-structured user manual.

Provide help facilities.

2 to 3 days required to understand functionality of system.

Well-formed graphical user interface.

Figure 6: DFD Level 2

JASS DEFENDER

Reliability

The system should be available on mean period of time if there is a

criminal activity.

The system might be failed to deliver its service if hardware problem

occurs.

Performance

The response of system is within a second so that we can save as possible

as many lives from terrorist activity.

The hardware must be accurate to record suspicious activity so that there

was no false alarm.

Implementation

Jass defender is basically a security based system which give exposure to

the organization with new way of interactive system which just not create

log but also attack anonymous people.

Interface

Its Interface is very simple and easy to use. Simple interface helps

organization to manage all of its functionality easily and help to preview

different screen in an easy and convenient way.

3.4 System Interface Design

3.4.1 Software Interface

Figure 7: Software Interface of Jass Defender

JASS DEFENDER

3.4.2

3.4.2 Hardware Interface

3.5 Use Case Model

(Use Case of Hardware)

(Use Case of Software)

(General Use Case)

Figure 9: Use case of Hardware

Figure 8: Hardware Interface of Jass Defender

Figure 10: Use Case of SoftwareFigure 11: General Use Case

JASS DEFENDER

3.6 Sequence

Diagram

Figure 12: Sequence Diagram of Jass Defender

Figure 13: State Chart of Jass Defender

JASS DEFENDER

3.7 State

Chart

Diagram

JASS DEFENDER

3.8 Hierarchical Structure

Figure 14: Hierarchical Structure of Jass Defender

JASS DEFENDER

Chapter 4

CODING

JASS DEFENDER

4.1 HARDWARE CODING

This section defined coding phase of hardware. It identified its important functionality of project in which it deals with its manual controls how it identifies intruder how it get value from environment and its autonomous controls.

The further explanation was explained in phase wise.

Manual Control

This explain the logic for moving gun manually which help user to move it accordingly itself.

void manual()

{

if (Serial.available()>0)

{ y = Serial.read();

if (y=='a')

{ deg1=deg1+5;

servo1.write(deg1);

Serial.println(deg1); }

else if (y=='q')

{ deg1=deg1-5;

servo1.write(deg1);

Serial.println(deg1); }

else if (y=='o')

{ fire();}

}

Fire Control

This function help to fire a gun to intruder to stop him entering the privilege of organization.

void fire()

{ digitalWrite(6,HIGH);

delay(500);

digitalWrite(6,LOW); }

JASS DEFENDER

Reading Function

This help to send sensor value to Arduino to get coordinate value of person detecting by sensor.

void reading()

{ digitalWrite(trigPin1, LOW);

delayMicroseconds(2);

digitalWrite(trigPin1, HIGH);

delayMicroseconds(10);

digitalWrite(trigPin1, LOW);

duration1 = pulseIn(echoPin1, HIGH);

distance1 = (duration1/2) / 29.1;

delay(5); }

Autonomous Control

This explain the autonomous functionality

void autonomous()

{ reading();

if ( distance3 < 150 )

{ delay(1);

reading();

if ( distance3 < 150 )

{ servo1.write(75);

servo2.write(70);

Serial.println("3");

fire(); }

}

else if ( distance4 < 150 )

{ delay(1);

reading();

if ( distance4 < 150 )

JASS DEFENDER

{ servo1.write(85);

servo2.write(70);

Serial.println("4"); } }

}

4.2 SOFTWARE CODING

This explain the logic behind our application that how it get value from Arduino while detecting through sensor and how our login and different form work and how value save from database, how the intruder image capture by application, how record maintain which help the organization to identified intruder.

MENU METHOD

The method which help to connect Arduino with our application through serial port so that we are able to control our hardware through C# application.

public MENU( )

{

InitializeComponent( );

serialPort1.PortName = "COM8";

serialPort1.BaudRate = 9600;

serialPort1.Open();

}

ALERT GENERATION

The method helps to generate an alert pop-up in C# sharp application when our hardware detects some activity in its predefined range.

private void MENU_Load(object sender, EventArgs e)

{

panel1.MaximumSize = this.MaximumSize;

if (serialPort1.IsOpen)

{

serialPort1.ReadTo("@");

cn.Open();

JASS DEFENDER

cmd = new SqlCommand("INSERT INTO Alerts_Report (Alerts) VALUES('Warning! Security Breached')", cn);

i = cmd.ExecuteNonQuery();

cn.Close();

Gun_Activation_Alert ui = new Gun_Activation_Alert (serialPort1);

ui.Show();

}

}

LOGIN AUTHENTICATION

Method that restrict unauthorized person to view logs of intruder images so that privacy of logs never breached.

private void Login_Click(object sender, EventArgs e)

{

SqlConnection cn = new SqlConnection("Data Source=SAIFUDDIN-PC\\SQLEXPRESS;Initial Catalog=Jass Defender;Integrated Security=True");

SqlDataAdapter da = new SqlDataAdapter("Select * FROM Login where Username = '" + textBox1.Text + "'And Password ='" + textBox2.Text + "'", cn);

DataTable dt = new DataTable();

da.Fill(dt);

if (dt.Rows.Count == 1)

{

this.Hide();

Logs ui = new Logs();

}

else

{

MessageBox.Show("Invalid Username OR Password");

}

JASS DEFENDER

LOGS OF IMAGES

A private method that help you to view logs of images of intruder captured by our hardware. It helps to call images from database and viewing it in our application.

private void button1_Click(object sender, EventArgs e)

{

cn.Open();

da = new SqlDataAdapter("SELECT * FROM Camera_Capture where DateInserted BETWEEN '"+dateTimePicker1.Value.ToString("MM/dd/yyyy") +"' AND '"+dateTimePicker2.Value.ToString("MM/dd/yyyy")+"'",cn);

DataSet ds = new DataSet();

da.Fill(ds,"Camera_Capture");

dataGridView1.DataSource = ds.Tables["Camera_Capture"];

cn.Close();

}

MANUAL CONTROL

These methods help how we control our defensive mechanism gun through our C# sharp application. In these method we define how our gun move, how it shoot the intruder, how it capture image on shooting and how images save in database.

private void Mannual_Controls_Load(object sender, EventArgs e) { webcam = new WebCam(); webcam.InitializeWebCam(ref pictureBox1); webcam.Start(); } private void Shoot_Click(object sender, EventArgs e) {if (serialPort1.IsOpen) {serialPort1.Write("o"); } cn.Open(); cmd = new SqlCommand("INSERT INTO Camera_Capture(Camera_Capture) VALUES(@pic)", cn); convertimage(); i = cmd.ExecuteNonQuery(); cn.Close(); if (i < 0) {MessageBox.Show("Save Error", "Error" + MessageBoxIcon.Information); } } private void pictureBox2_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("s");

JASS DEFENDER

} } private void pictureBox3_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("a"); } } private void pictureBox5_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("d"); } } private void pictureBox4_Click(object sender, EventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("w"); } } void convertimage() { if (pictureBox1.Image != null) { ms = new MemoryStream(); pictureBox1.Image.Save(ms, ImageFormat.Jpeg); byte[] photo_array = new byte[ms.Length]; ms.Position = 0; ms.Read(photo_array, 0, photo_array.Length); cmd.Parameters.AddWithValue("@pic", photo_array); } } public SerialPort serialPort3 { get; set; } private void Mannual_Controls_FormClosing(object sender, FormClosingEventArgs e) { if (serialPort1.IsOpen) { serialPort1.Write("m"); } webcam.Stop(); }

JASS DEFENDER

Chapter 5

METHODOLOGY

JASS DEFENDER

5. METHODOLOGY

5.1 INTRODUCTION

Jass Defender functions includes C# sharp application that has a simple interface for

the intended user. The Landscape view of this software is it’s from where users can

start the software for securing the environment before being identified of any intruder.

In this mode the application is stand by until or unless the hardware detect some

activity and generate an alert signal in application. When the system detect activity its

show a pop up that asked a confirmation either you want to activate defensive

mechanism system manually, autonomous or if it false alert so cancel it.

When the defensive mechanism system manually control it show a screen for manual

control and at each fire it take snap of environment so that organization are able to

know to whom they were fired in future.

5.2 TOOLS WE USED

Tools that we used to create this application and hardware are;

Software Tools:

C# sharp application

SQL server 2012

Arduino

Hardware Tools:

Arduino Mega Controller

High Torque Servo Motor

Ultrasonic Sensor

Electric Gun

JASS DEFENDER

5.3 WHY WE USED

We used this tool because C# sharp application is completely compatible with Arduino

Because our system consists on 2 phase, 1st phase it software coding that done in C#

sharp platform and 2nd phase is hardware coding that done in Arduino for connectivity

between Arduino Mega with Servo Motor and Ultrasonic Sensors.

Once the hardware detects anything its pass a value through serial port to desktop

application and in response the application passed some value through serial port to

Arduino Mega Controller Circuit.

5.4 WORKING

The Jass Defender working based on hardware and software both has equal wattage in

this project.

Hardware Working

The working of hardware based on ultrasonic sensor, web camera, electric gun, servo

motor and Arduino Mega Controller. First the sensor detect intruder and send data to

arduino controller. Arduino send data to software application and then software

application activate web camera to take snap of intruder, activate servo motor to move

gun toward intruder to stop him and activate gun to fire intruder.

Ultrasonic Sensor

When application run the sensor are activate automatically and surveillance the

environment. When it detect any activity within a mean while time it send respond to

controller for some activity record and if defensive mechanism system has to work

autonomous so it help a mechanism to move it toward intruder by taking coordinate

from environment and send it to controller and controller help mechanism to move it in

that particular point.

Web Camera

The purpose of web camera in this project is captured a real life event when defensive

mechanism system attack intruder and help the admin user to control the defensive

mechanism manually.

JASS DEFENDER

Electric Gun and Arduino Controller

Electric gun is essential part in our defensive mechanism. It helps to attack intruder. It

can be handled autonomous through sensor or can be handled manually by given input

through our software application.

Arduino Controller working as a bridge between our software application and our

surveillance hardware. It help to send or receive confirmation between software and

hardware.

Software Working

The desktop application of our project start working when our sensor send some

activity alert through arduino controller by the help of serial port then we are able to

handle defensive mechanism manually or autonomous and if its false alert then cancel

it.

The logs of image can be view by providing a user name and password and it created

when gun fire toward intruder. In the mean while the logs of alert is also generated

whenever it get alerts message either they are true or false.

The camera view tabs allow you to view environment through application. It has a

capability to increase number of camera for surveillance

5.5 MODULE ENVIRONMENT

There are essentially two parts of Jass Defender system: the environmental-side,

which because the hardware is going to accessed by the software controlled by the

security officer from control room. And the Client-side which will be handled by the

End-User Example Security Officer.

JASS DEFENDER

Due to a limited budget we are not capable of buying a high ultrasonic or proximity

sensor

Figure 17: Model of Jass Defender

JASS DEFENDER

Chapter 6

RISK ANALYSIS AND COST ESTIMATION

JASS DEFENDER

6. RISK ANALYSIS AND COST ESTIMATION

6.11 RISK ANALYSISQualitative Risk Impact Matrix

Risk Probability Impact Risk Score

System Crash .10 5,000 (500)

Hardware Failure .30 35,000 (10,500)

Lack of developer .30 30,000 (9,000)

Lack of sponsor .60 45,000 (27,000)

Firmware Changes .20 (10 days) (2 days)

Installation of hardware .15 (7-8 days) (3 days)

Reliability .20 5000 (1,000)

Contingency reserve

needed

48000

Table 5: Qualitative Risk Impact Matrix Table

Quantitative Risk Impact Matrix

Risk Probability Impact Risk Score

System Crash Low High Low

Hardware Failure Medium High Medium

Lack of developer Medium Medium Medium

Lack of sponsor High High High

Firmware Changes Low Medium Low

Installation of hardware Low Low Low

Reliability Low Medium Medium

Table 6: Quantitative Risk Impact Matrix Table

Ref# Project Expenditure Estimated Hours

No. of People

Unit Cost

Sub Total

JASS DEFENDER

1 Software CostUser Interface DesignDatabase DesignDatabase DevelopmentBackend CodingFrontend CodingUnit Testing

120 hours144 hours120 hours360 hours168 hours240 hours

122113

$ 10$ 11$ 10$ 50$ 50$ 16

$ 10$ 22$ 20$ 50$ 50$ 48

Sub Total $ 2002 Hardware Cost

Circuit DesignArduino CircuitSentry Gun controllerCircuit to connect Arduino with GunCircuit Testing

120 hours720 hours480 hours360 hours72 hours

12312

$ 24$ 37$ 40$ 50$ 16

$ 24$ 74$ 120$ 50$ 32

Sub Total $ 300Total $ 500

6.12 Cost Estimation

Table 7: Cost Estimation Table

Chapter 7TESTING

JASS DEFENDER

7. TESTING

7.1 Purpose

The overall purpose of testing is to ensure the Jass Defender meets all of its

technical functional and business requirements. The purpose of this document is to

describe the overall test plan and strategy for testing the Jass Defender application.

The approached describe the framework provide all testing related to this

application. The document will also be updated as required for each other.

7.2 Objectives

Verify software requirements are complete and accurate.

Perform detailed test planning

Prepare and document test scenarios cases.

Manage defect tracking process.

Ensure the application is certified for a release into the University of

production environment

Satisfies the Entrance Criteria for User Acceptance Testing.

7.3 Testing Methodology

The goals in testing this application include validating quality, usability,

reliability and performance of the application. Testing will be performed from a

black-box approach, not based on any knowledge of internal design or code.

7.4 TESTING PLAN

7.4.1 What project features has to be tested.

Hardware working including (Gun Functionality, Signal Passing, Recording of Camera

at particular time)

Software Testing including (Retrieval and Saving of Logs, Proper Saving of Recording,

Gun Controls, UI Testing)

7.4.2 What project features not be tested (Project features out of scope).

24 hours recording of camera

recognition of intruder face

Any other testing type not included in test objective section.

Figure 15: Work Break Down Structure

JASS DEFENDER

It is the intent that all of the individual test cases contained in each test plan will be

performed. However, if time does not permit, some of the low priority test cases may

be dropped.

7.5 What are the phases and tasks? (Work Break Down Structure)

7.6 How to schedule phases and tasks? (Scheduling means when it will start and end.)

Figure 16

JASS DEFENDER

7.7

Deliverables

Table 8: Deliverables

Table

7.8 Testing

Strategy and

Approach

7.8.1

Testing

Approach

STLC

Stage

Entry Criteria Activity Exit Criteria Deliverables

Requirement Analysis

Requirements Document available (both functional and non-functional)

Acceptance criteria defined.

Analyze business functionality to know the business modules and module specific functionalities.

Signed off RTM

Test automation feasibility report signed off by the client

RTM

Automation feasibility report (if applicable)

Deliverable For Date / Milestone

Test Plan Project Manager; QA

Director; Test Team

14/12/2016

Traceability Matrix Project Manager; QA

Director

23/12/1016

Test Results Project Manager 29/12/2016

Test Status report QA Manager, QA

Director

04/01/2017

Figure 17: Schedule phases and task

JASS DEFENDER

Application architectural document available.

Identify all transactions in the modules.Identify all the user profiles.

Gather user interface/authentication, geographic spread requirements.

Identify types of tests to be performed.

Gather details about testing priorities and focus.

Prepare Requirement Traceability Matrix (RTM).

Identify test environment details where testing is supposed to be carried out.

Automation feasibility analysis (if required).

Test Planning

Requirements Documents

Requirement

Analyze various testing approaches available

Approved test plan/strategy document.

Test plan/strategy document.

Effort estimation

JASS DEFENDER

Traceability matrix.

Test automation feasibility document.

Finalize on the best suited approach

Preparation of test plan/strategy document for various types of testing

Test tool selection

Test effort estimation

Resource planning and determining roles and responsibilities.

Effort estimation document signed off.

 

document.

Test case development

Requirements Documents

RTM and test plan

Automation analysis report

Create test cases, automation scripts (where applicable)

Review and baseline test cases and scripts

Create test data

Reviewed and signed test Cases/scripts

Reviewed and signed test data

 

Test cases/scripts

Test data

Test Environment setup

System Design and architecture documents are available

Environment set-up plan is

Understand the required architecture, environment set-up

Prepare

Environment setup is working as per the plan and checklist

Test data setup is

Environment ready with test data set up

Smoke Test Results.

JASS DEFENDER

available hardware and software requirement list

Finalize connectivity requirements

Prepare environment setup checklist

Setup test Environment and test data

Perform smoke test on the build

Accept/reject the build depending on smoke test result

complete

Smoke test is successful

 

Test Execution

Baselined RTM, Test Plan , Test case/scripts are available

Test environment is ready

Test data set up is done

Unit/Integration test report for the build to be tested is available

Execute tests as per plan

Document test results, and log defects for failed cases

Update test plans/test cases, if necessary

Map defects to test cases in RTM

Retest the defect fixes

All tests planned are executed

Defects logged and tracked to closure

 

Completed RTM with execution status

Test cases updated with results

Defect reports

JASS DEFENDER

Regression testing of application

Track the defects to closure

Test Cycle closure

Testing has been completed

Test results are available

Defect logs are available

Evaluate cycle completion criteria based on - Time, Test coverage , Cost , Software Quality , Critical Business Objectives

Prepare test metrics based on the above parameters.

Prepare Test closure report

Qualitative and quantitative reporting of quality of the work product to the customer.

Test result analysis to find out the defect distribution by type and severity

Test Closure report signed by our project supervisor

Test Closure report

Test metrics

JASS DEFENDER

Table 9: Test Approach Table

7.9 Roles and responsibilities of the entire team

Following people will be responsible for

Resource Name Role

Syed Sheraz Developer / Hardware / Tester

Afaq Amir Project Manager / Tester

Saifuddin Developer / Hardware / Tester

Aleem Jamil UI/UX Designing / Tester

Table 10: Roles and Responsibility Table

7.10 Testing Environment

There are essentially two parts of Jass Defender system: the environmental-side,

which

because the hardware is going to accessed by the software controlled by the security

officer from control room. And the Client-side which will be handled by the End-User

i.e. Security Officer.

Figure 17: Testing Environment Diagram

JASS DEFENDER

Due to a limited budget we are not capable of buying a high ultrasonic or proximity

sensor.

7.11 Test Cases

7.11.1 Functional Testing

Table 11: Functional Testing

Test Case

ID

Test

Objective

Test Data Expected

Result

Actual

Result

Test

Status

Pass /

Fail

FUT_001 Create log on

daily basis

Captured

images

saved in

database.

When any

anonymous

activity

occurs.

Success Pass

Figure18

FUT_002 Attacking

intruder

Intruder

breaching

security.

When an

organization

is under

caution.

Success Pass

Figure19

FUT_003 Secured areas

from

anonymous

people

Intruder

breaching

security.

Intruder

trying to

enter

premises.

Success Pass

FUT_004 Capturing the

image

Anonymous

actions.

Images of

illegal

actions.

Success Pass

Figure20

JASS DEFENDER

Figure 18: FUT_001 Diagram

Figure 19: FUT_002 Diagram

JASS DEFENDER

7.11.2 Cosmetic/UI Testing

Test Case

ID

Test

Objective

Test Data Expected Result

Test Status

Pass / Fail

UIT_001 User Permission Through this functionality we login into logs.

Login for Access to logs of image.

Pass

Figure21

UIT_002 Camera Displays environment of organization.

Capture Images, Display views

Pass

Figure22

Figure 20: FUT_004 Diagram

Table 12: Cosmetic and UI Testing

JASS DEFENDER

UIT_003 Logs Retrieve Logs saved in database

Show logs with captured images with date and time taken.

Pass

Figure20

UIT_004 Gun Controls Controls Gun Attacking Intruder.

Pass

Figure23

UIT_005 Alerts Generate Alerts on gun activation

Display on screen + siren.

Pass

Figure24

UIT_006 Exit Logout, exit application functionality implemented

Functions are implemented on click.

Pass

UIT_007 About Us Shows a form on click

Display information of software version and about developers

Pass

Figure25

Figure 21: UIT_001 Diagram

Figure 22: UIT_002 Diagram

JASS DEFENDER

Figure 23: UIT_004 Diagram

Figure 20: UIT_003 Diagram

JASS DEFENDER

Figure 24: UIT_005 Diagram

Figure 20: UIT_007 Diagram

JASS DEFENDER

7.12 Unit Testing

The application is run on test mode and each individuals option is being highly

observed and number of relevancy being performed on the unit as all the functions that

are being encoded are highly providing efficiency and work following are the areas

where test being performed as on individual units.

We have used Manual techniques so test our system so far, every single component has

been tested multiple times to make sure that the performance and functionality of our

system isn’t compromised

Test Case ID : UNT_001

Password restriction for logs of image.

<Graphically show pass> Figure26, Figure27, Figure28

Test Case ID : UNT_002

Camera Viewer

<Graphically show pass> Figure22

Test Case ID : UNT_003

Logs

<Graphically show pass> Figure20

Test Case ID : UNT_004

Gun Controls

<Graphically show pass>Figure23

Test Case ID : UNT_004

Integration of hardware with software application

<Graphically show fail> Bug ID: BUG_001

Table 13: Unit Testing Table

Figure 26: UNT_001 Diagram

Figure 27: UNT_001 Diagram

JASS DEFENDER

7.13 Database Testing

Test Case

ID

Test

Objective

Test Data Test Status

Pass / Fail

DBT_001 Camera

Images

Images are stored

in database

Pass

DBT_002 Logs Logs of images

created

Pass

Table 14: Database Testing Table

Figure 28: UNT_001 Diagram

JASS DEFENDER

Figure 28: Database Testing Diagram

7.14 Bug Reporting

Bug ID Test Case

ID

Bug

Description

Report

ed By

Status Fixed by Sever

ity

Prior

ity

BUG_001 UNT_004 Integration

of hardware

with

software

Tester Fixed Software

Developer

High High

Table 15: Bug Reporting Table

JASS DEFENDER

USER MANUAL

JASS DEFENDER

8. USER MANUAL

This section provides the user manual of Jass Defender. The snap of each screen is

based on the functionality described in the Function Description section.

References are provided as appropriate to the corresponding function descriptions.

8.1 MAIN SCREEN

This is the main screen of Jass Defender.

8.2 ALERTS

Application generated alert when it detects some activity in limited premises of

organization.

8.3 LOGS OF IMAGE

Figure 29: Main Screen Diagram

Figure 19: Alert Screen Diagram

JASS DEFENDER

Logs of images generated when application detect activity of intruder and that in

database so that we can use it later.

8.4 LOGS OF ALERT GENERATED BY SYSTEMLogs of alert generated each time when system suspect some activity either it true

or not.

It tells number of camera work in application for surveillance right now we are

using only one for viewing

Figure 20: Logs View Diagram

Figure 18: Alert Logs Diagram

JASS DEFENDER

8.5 CAMERA VIEW

It tells number of camera work in application for surveillance right now we are

using only one for viewing environment.

8.6 LOG IN AUTHENTICATION

The images of intruder are private entity that cannot be view by everyone so for

viewing the logs of images there is a log in security. After providing a right name

and password you are able to view it.

8.7 MANUAL CONTROL VIEW

Figure 22: Camera View Diagram

Figure 25: Log in Diagram

JASS DEFENDER

This screen view, when you want to operate the gun manually.

8.8 ABOUT US

This screen tells some short information about the group member who are creating

this application. It can be open by click a person icon on right side.

Figure 23 Manual Control Diagram

Figure 21: About us Diagram

JASS DEFENDER

Chapter 9

CONCLUSION AND FUTURE WORK

JASS DEFENDER

9 CONCLUSION AND FUTURE WORK9.1 CONCLUSION

We conclude that by making this project and developing this superior system prototype

it would be beneficial to all the sectors of organization. It provides all the information

regarding intruder and its criminal activity which can be access from any premises of

organization. It is beneficial for organization to take precaution for any non-suspicious

activity. Help organization to stop intruder through its defensive mechanism manually

or automatic and on that basis generate logs of image from real life environment.

9.2 FUTURE WORK

Even though the purpose of this security system has been achieved, but the camera used

for security surveillance has a few disadvantages that it needs to overcome in order to

improve its performance and efficiency. There are a few suggestions that help to

remove disadvantages that we identified during the development of this security

system. The objective can be further added to have a better security system. Its main

disadvantages are the low quality of the image captured result, night vision issues and

its sensor that help to detect intruder. The camera used has low pixel resolution due to

budget cost. For the next improvement process, it will refer to use a higher pixel

camera. With the use of a better camera, the image captured will be sharper and the

process of identifying the intruder will be easier and with better image it’s possible to

do image processing so that our organization are able to detect intruder if he observing

the organization for criminal activity. The working done in this project is limited to

capturing image of individual moving in normal condition. Other than that, the uses of

sensors that sense intruder activity are less efficient because we want to detect intruder

from a long distance to do that we use this sensor. There are sensors who efficient to

detect but their range was limited which was useless in our project. Thus to increase the

effectiveness of the product performance its refer to use a sensor which are more

efficient for long range. In our project it is most important because it used to activate

the servo motor and gun which used in defensive mechanism to attack intruder.

JASS DEFENDER

References:

[1] Muhammad Syuhami Ab-Rehman, Aminatul Hidayah Asmir, Kasmiran Jumari, “Camera and GSM interfacing system for home security surveillance”, Space Science Institute (ANGKASA) Malaysia, Vol.8(38), Page 1858-1871, June 2013.

[2] Huiping Huang, Shide Xiao, Xiangyin Meng, Ying Xiong, “A Remote Home Security System Based on Wireless Sensor Network and GSM Technology”, Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference, Vol.1, Page: 535 – 538, 24-25 April 2010.

[3] Vaibhav Shah, Sahil Shah, Jay Shah, Prithvish Mamtora, “Anti-Theft Home Security System”, International Journal of Electronics and Communication Engineering (IJECE), Vol.2 Issue IV, Page: 113 – 118, Sept 2013.

[4] Prof. (Dr.) Khanna Samrat, Vivekanand Omprakash, “Wireless Home Security System with Mobile”, Information Technology Dept., ISTAR, Sardar Patel University, VVNagar, India, Vol.II - Issue IV, Page: 396-397, October-December, 2011.

JASS DEFENDER

PAGE FOR REMARKS / COMMENTS

JASS DEFENDER

PAGE FOR REMARKS / COMMENTS