GSM BASED VEHICLE ANTI-THEFT SECURITY SYSTEM
A Thesis Submitted In Partial Fulfillment of the requirements for the degree of Bachelor of Computer Engineering in Dr. Yanga’s Colleges Inc.
Submitted by: (BSCpE -5A) Aira Mae C. Cruz Carissa C. Melgar Billy Jim S. Agbayani Larwel Dave C. Leoncio John Exequiel D.C Zafra
Ruel C. Dogma (Thesis Adviser)
CHAPTER I THE PROBLEM AND ITS BACKGROUND INTRODUCTION Republic Act 6539 ("R.A. 6539"), known as the Anti-Carnapping Law of 1972, defines carnapping as: "...the taking, with intent to gain, of a motor vehicle belonging to another without the latter's consent, or by means of violence against or intimidation of persons, or by using force upon things." Nowadays, computer and electronic technologies are growing rapidly. In fact, it plays important role in our life and it can be used to prevent vehicle from stolen. Development of Anti-Theft Vehicle and GSM (Short Message Sevice (SMS)) Using Camera is a project that contains electronic device installed on a motorcycle so that the vehicle can be detected by the owner or a third-party user. Anti-Theft GSM uses camera that is hidden on the motorcycle dashboard to capture the image of the intruder. Inspite of these prevention measures, Global System for Mobile communication (GSM) will be used as warning system when has someone open the car door of the vehicle. In addition, there is another camera in front of the motorcycle’s front body that is hidden to record actual footage where the motorcycle going and can be viewed on a computer or laptop. Anti-Theft Vehicle and GSM using camera is commonly be used by those who want to prevent their vehicle from being stolen. In some cases police can report immediately to other police outpost by the Anti-Theft GSM and show to the police the video taken with CAMERA installed on the motorcycle. The existence of Anti-Theft GSM then can be used to decrease the insurance cost. It is because the loss-risk of the vehicle drops significantly.
BACKGROUND OF THE STUDY Carjacking on the area of bulacan rises in 2017 there are 10 cases of vehicle being stolen in the said area to solve this problem, a wireless vehicle security system which implements mobile communication protocol is proposed. The control and communication between the user and the proposed system are achieved through a GSM with camera that can capture the actual footage of the where the vehicle is going. GSM based Vehicle Anti-theft Security System is an answer for spot, track and secure your portable resources. A vehicle tracking system consists of an electronic device installed on a vehicle so that it could be track by its owner or a third-party for its position. Most of today’s vehicle tracking system uses a camera to get an accurate location. Communication components such as cellular (GSM) and satellite transmitter will be combined to transmit the vehicle’s position to remote user. Vehicle’s information can be viewed by using software on a computer. Vehicle tracking systems are commonly used by fleet operators for fleet management functions such as routing, dispatch, on-board information and security. Other applications include monitoring driving behavior, such as an employer of an employee, or a parent with a teen driver. Vehicle tracking systems are also popular in consumer vehicles as a theft prevention and retrieval device. Police can simply follow the signal emitted by the tracking system and locate the stolen vehicle. When used as a security system, a Vehicle Tracking System may serve as either an addition to or replacement for a traditional Car alarm. The existence of vehicle tracking device then can be used to reduce the insurance cost, because the loss-risk of the vehicle drops significantly. Vehicle tracking is also useful in many other applications such as Asset Tracking scenarios where companies needing to track valuable assets for insurance or other monitoring purposes can now plot the real-time asset location on a map and closely monitor movement and operating status.
THEORETICAL FRAMEWORK As the crime rate is increasing day by day, vehicle theft control system is essential for every vehicle. In this project, if an unauthorized person tries to steal the vehicle the owner can send an SMS to the GSM modem to stop the engine. Here, GSM modem is interfaced to the PIC microcontroller that receives the message, the O/P of which activates a mechanism that deactivates the ignition of the vehicle resulting in stopping the vehicle. Therefore, the owner of the vehicle from anywhere can deactivate the engine of the vehicle. Further, this proposed system can be developed by a camera, which will view the exact footage of the vehicle. Further, this data can be sent to the vehicle owner through an SMS and video can also sent via wireless video transmitter and receiver to the remote system like the owner's computer device
CONCEPTUAL PARADIGM The research paradigm that guided this study is shown in Figure. It follows the Input-Process-Output approach.
INPUT
PROCESS
Vehicle
OUTPUT
GSM
Send command to the installed device to stop the vehicle Send command to turn on the camera
Received a command from handheld device Microcontroller will stop the vehicle Send command to turn on the camera The handheld device will receive a video via transceiver
Security
GSM BASED VEHICLE ANTI-THEFT SYSTEM
The vehicle will stop and will only work when a specific command is received through SMS. The camera will provide visual
OBJECTIVE The main objective of our project is to develop a tracking system for vehicle in case of any theft or for surveillance, which can be used for real time application. The main feature of the projects are GSM and Camera control systems. This system determine the exact footage of where the vehicle is going to know the location of your vehicle using camera system by sending a video to your computer by using wireless video transceiver. The 8051 Microcontroller has been programmed to control various devices connected to the product.
SCOPE The project scope defines the description of the work that is required in delivering the message in GSM modem. The following are the scopes and limitations of work during the course of the project
It can turn on and off the vehicle through SMS
The device provides visual so the user will be able to have visual on where the vehicle is travelling.
LIMITATIONS
The SIM card installed will be loaded every 3 months to prevent expiration.
The Signal of the transmitter and receiver may be reduced due to the environment of the area where the vehicle is travelling or parked.
SIGNIFICANCE OF THE STUDY Community This study will benefit the possessors of the vehicle by using the anti-theft device. The in-vehicle tracking device or unit working along with a central server and software, which let the user or owner of a car to know the whereabouts of his own vehicle, surely comes with several benefits. The camera and GSM installed inside the vehicle fetches its location information and send it to owner whenever he wants to know the location, in order to remain up-to-date all the time. As all the relevant information is displayed on the screen, it is very convenient for the user to monitor and take any actions in case of an emergency Government Also monitoring discourages dangerous and inefficient driving practices of drivers which lead to increased vehicle security and driver safety. The vehicle tracking system plays a vital role if it is used in any companies or organization for any kind of delivery purposes. Since the driver is being aware of the fact that the car is constantly being monitored so one would be careful while driving and take shortest possible route to reach destination right on time. This system can also be named as an anti-theft tracking system as this advanced yet affordable system ensures the recovery of stolen vehicles too. If the car does not get to designated location or being used by unauthorized user, the location can be traced and then notified to police to reach the unauthorized location where the vehicle is residing and thus this vehicle tracking system ensures car safety as well. Future Researchers This study will allow future researchers to gain knowledge in developing security system as well as its significance in their future careers.
DEFINITION OF TERMS Microcontroller PIC18F46K22 It is the heart and core of the system to which all the other components are interfaced. PIC is a family of RISC microcontrollers made by Microchip Technology, PIC18F4520. It is a 40 pin Low Power, High-Performance Microcontroller with XLP Technology CAMERA is installed in the system for image processing. The serial camera module makes it very easy for the microcontroller circuits to add images captured for various functions or applications. VGA 640x480 image resolution, 115kbps UART rate Video Transceiver It consists of a transmitter and a receiver. It can transmit AV signals of DVD, DVR, CCD camera, IPTV and other similar devices, by means of radio waves and receive them at distant end and input them.
GSM modem is used to send and receive messages to and from the owner. It is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. MAX 232 It is an integrated circuit. Max232 is a voltage converter which converts from RS232 voltage levels to TTL voltage levels and vice-versa. MAX232 uses +5v power source which is same as that of source voltage. Single +5v power supply is used to power both microcontroller and MAX232. It consists of two sets of line drivers for transferring and receiving data. Relay The relay we are using in this is an electromechanical relay. The excitation voltage that is required is +12V DC. It is driven using the relay driver IC ULN2003 /VLN 2003A. The device is connected to the electro mechanical relay. When the relay is excited by applying the 12V DC the relay gets activated and in the process turns ON the engine and when the excited voltage is stopped, the relay gets deactivated and in the process turns OFF the engine.
SMS Short Message Service is a communication service standardized in the GSM mobile communication system, using standardized communication protocols and allowing the interchange of short message between mobile telephone devices.
REVIEW OF RELATED LITERATURE AND STUDIES
Foreign Studies Motorcycle Theft Prevention and Recovery Security System Transportation plays a big part of our daily lives. Together with the increase of motorcycle users, motorcycle theft is also rampant over the years. In this study, a system had been developed for theft prevention and recovery of motorcycle in an easier and faster way. The user of this system will be notified through an alert once the motorcycle has been moved in a long distance or stolen. The user also could view the current location of the motorcycle, shutdown the engine and capture an image of the thief. The system has two components, the hardware and the software modules. The hardware component includes micro-controller, GSM, and a camera. The software component is the default messaging mobile application, which is the medium of communication of the user to the motorcycle and also serve as the main controller of the entire system. Based on the evaluation conducted in terms of usability and functionality it had been found out that most of the users strongly agreed the usefulness of the system. Vehicle cabin safety and security based on the embedded system This system provides vehicle cabin safety and security based on the embedded system, by modifying the existing modules. In this way, the system is able to monitor the level of the toxic gases such as CO, LPG and alcohol within the vehicle, and provides alerts through an alarm in dangerous situations. An SMS will be sent to an authorized person through the GSM. In this method, the IR Sensor is used to detect the static
obstacle in front of the vehicle and the vehicle will stop if any obstacle is detected. This mechanism will aid in avoiding collisions with obstacles. SMS Commander Car Alarm System Another prototype named SMS Commander Car Alarm System, was a good example to base our design project. It used a PIC32 microcontroller installed in the car system. It has a control on/off function via SMS, where one can query the alarm systems on/off status anytime. The position of the car can be known by simply texting the car using a coded message, and then the coordinates of its present location will be sent to the owner’s cellular phone. The car movement can be followed on-line using GPRS and a compatible software. The group’s design can be based on how the SMS Commander enables text messages to be read and analyzed by the car. Other 16 commands such as stop or lock can be easily done by the car if they will be able to make the car understand SMS messages. Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message as Feedback Antitheft security system utilizes an embedded system design with Dual Tone Multi Frequency (DTMF) and a GSM to monitor and safeguard a car. It secures the car against theft. Upon activation, it automatically demobilizes the car by disconnecting the ignition key supply from the car battery. This now makes it impossible for anybody so starts the car, let alone moving with it. In an attempt of theft through the car doors or boot, the system sends text message to the car owner and at the same time starts up an alarm.This design popped out due to the increasing rate at which packed cars are stolen especially in our country, but with this design this packed car is being monitored irrespective of where it is packed, provided there is GSM network coverage “Car Security Control System via SMS This paper is about to design and provide security for the user vehicle used. The locking system of the vehicle using mobile notification system and upgrade the security system in all aspect of range control feedback functions by implemented connection between GSM modem and PC with microcontroller. The architecture of the system is
divided into five parts which are modem, microcontroller, model of the car, car alarm system, and also a bootloader. The microcontroller that he used is PIC18452 and it is the brain of the system created and manipulated the output by control the input of the system. The firmware that the system used is MicroC to activate the system. The flowchart below is the software implementation.
Foreign Literature Development of smart car security system using multi sensors (Ouyang Hongzhi et al) describe an auto-guard system that uses RFID tag to identify the users. It uses the GSM to warn the owners about illegal entry or theft. Allows each user has to own his/her password which can be changed by them. The proposed auto guard system uses RFID tag, sensors and randomly generated password sent to the user by using GSM at the time of entry inside the car are used to prevent car theft. Real-time visual vehicle safety tracking system Kai-Tai Song and Chih-Chieh Yang created a real-time visual vehicle safety tracking system. This paper outlines a novel feature-filled vehicle-tracking algorithm, able to automatically detect and track several moving objects such as cars and motorcycles, ahead of the tracking vehicle. In conjunction with the concept of focus of expansion (FOE) and view analysis, the system can isolate features of moving objects from moving background and offer a collision word of warning in real-time. The proposed visual tracking system has been validated in real road tests. The results provide collision warning information in urban areas, with speeds of about 60 km/hour both at night and day times. Advanced Vehicle Security System with Theft Control and Accident Notification using GSM This proposed work is an attempt to design and develop a smart anti-theft system that uses GPS and GSM system to prevent theft and to determine the exact location of vehicle. The system contains GPS module, GSM modem, Infrared sensors, DTMF
decoder IC MT8870DE, 8051 microcontroller, relay switch, vibration sensor, paint spray and high voltage mesh. GSM system is also installed in the vehicle for sending the information to the owner of the vehicle because GPS system can only receive the vehicle location information from satellites. In case of accident this system automatically sends the message for help to ones relatives. The preventive measures like engine ignition cutoff, fuel supply cutoff, electric shock system (installed on steering wheel) and paint spray system are installed in the vehicle which is controlled using user or owner GSM mobile. The owner can lock or unlock his/her vehicle with the help of SMS. This complete system is designed taking in consideration the low range vehicles to provide them extreme security GSM based wireless home security system. The system is a wireless home network which contains a GSM gateway and three kinds of wireless security sensor nodes that are door security nodes, infrared security nodes and fire alarm nodes. The nodes are easy installing. The system can response rapidly to alarm incidents and has a friendly user interface including a LCD (liquid crystal display) and a capacitive sensor keyboard. The wireless communication protocol between the gateway and the nodes is also suitable for other home appliances. Design of A GSM Cell-Phone Based Vehicle Monitoring& Theft Security System This was a project that has been designated to develop an advanced vehicle locking system in real time. This project was also to make a theft security and vehicle monitoring by enhancing locking system. There are three types the different theft detection between this project and others which are vibration sensor, battery removal sensor and rider sensor. Timer circuit connected to IR receiver, electromagnetic relay and buzzer. The timer circuit functioning as a timing control for buzzer and to buzz when the first time the sensor detected. The relay will turned on and the buzzer by signal from IC. The system get the power is from 9V DC from separate battery, hence the system will able to work without vehicle battery.
Local Studies Gsm-Based Home Intrusion Detection Device Using SMS Messaging In Reporting Intrusions to Security Administrator The GSM-Based Home Intrusion Detection Device is a security device that sends a text message to the owner’s mobile number in case of home intrusion. This is to warn and notify the owner of an impending attack. It is used when the owner is outside the house, or even when asleep. The device uses a GSM modem which requires a SIM card to send SMS messages. The device is activated once the door or window is opened and it automatically sends a text message to the security administrator. The device improves the effectiveness to which possible incidents of intrusion and robbery are reported to security administrators when he is away from home through long distance communication using GSM technology. It bridges the gap between the security device and its administrator when the latter is away. Face Detection System In Face Detection System used to detect the face of the driver, and compare with the predefined face. The car owner is sleeping during the night time and someone theft the car. Then Face Detection System obtains images by one tiny web camera, which is hidden easily in somewhere in the car. Face Detection System compared the obtained images with the stored images. If the images don't match, then the information sends to the owner through MMS. The owners get the images of the thief in mobile phone and trace the place through GPS. The place of the car and its speed displayed to the owner through SMS. The owner can recognize the thief images as well as the place of the car and can easily find out the hijackers image. This system applied in our day-to-day life. Efficient Camera Based Monitoring and Security System using Raspberry Pi In surveillance, CCTV camera is costly because of the use of computer. It reserves too much space for continues recording and also require manpower to detect the unauthorized Activity. But compared to the existing system Raspberry pi system is much cheaper with better resolution and low power consumption feature. This system uses
ARM 11 processor based embedded system to process real time data collected using the PIR sensor. Once the person is sensed the camera snapshot the person and send to the web server using Wi- Fi technology. DC Motor is used for closing the door of ATM. Camera is always in processing and sending snapshots continuous to the web server and it will be saved in computer. To capture the robber occur and send the robbery occurrence with the message to the nearby police station and corresponding bank through the GSM. Hear LCD display board using showing the output of the message continuously. This will prevent the robbery and the person involving in robbery can be easily caught. Keypad is used for run the DC motor and stepper motor for automatic door lock and also leak the gas inside the ATM. Security System Using Wireless Surveillance Camera with Motion Detector and Global System for Mobile Communication Technology This study developed a system that would monitor movements outside the establishment or residential area using wireless surveillance camera. It could also send message to the user’s mobile phone when there are movements sensed by the motion detectors. Likewise, the alarm system would also be activated. Wireless camera, motion detector, ultrasonic proximity sensor, and GSM technology were used to provide a more secured method of monitoring user’s properties. The software program processes data coming from the proximity sensor and motion detector, and displays the desired output to the GSM module, DVR, and alarm system. It was observed through test procedures that the security system using wireless surveillance camera with motion detector and GSM technology could help easily recognize intruders. Microcontroller-based Vehicle Security System with Tracking Capability using GSM The security of vehicles is extremely essential for vehicle owners especially to those whose hard-earned income was used to avail of one or simply, its loss would mean inconveniences to family and work. With these, it becomes the major problem of every vehicle owner. This paper consist of Microcontroller based Vehicle Security System with Tracking Capability using GSM
Car Security Control System via SMS This paper is about to design and provide security for the user vehicle used. The locking system of the vehicle using mobile notification system and upgrade the security system in all aspect of range control feedback functions by implemented connection between GSM modem and PC with microcontroller. The architecture of the system is divided into five parts which are modem, microcontroller, model of the car, car alarm system, and also a bootloader. The microcontroller that he used is PIC18452 and it is the brain of the system created and manipulated the output by control the input of the system. The firmware that the system used is MicroC to activate the system. The flowchart below is the software implementation.
Local Literature Anti-Car Theft System using Android Phone (D.K. I. Sta. Iglesia) Short Message Service (SMS) is a good choice of communication as an added feature to immediately determine that something wrong is happening to the car. This study aimed to develop an anti-car theft system using android phones that notifies the car owner by sending SMS when someone illegally opens the door at the driver’s seat. The developed car security system via SMS is for car applications wherein target users are people who have their own car as well as those people who are using the vehicles of the company or someone who owned a taxi. Remote monitoring system based on SMS and GSM A remote monitoring system based on SMS and GSM was implemented, inclusive of the hardware and software designs. This paper notes that remote signals can be transmitted through the GSM network. This includes two parts: the monitoring center and the remote monitoring station. First, the monitoring center is made up of a computer and the GSM communication module. The software-monitoring center and the remote monitoring station were implemented using VB. The result of this demonstration shows
that the system can control communication between the monitoring center and the remote monitoring station DESIGN AND CONSTRUCTION OF A REMOTELY CONTROLLED VEHICLE ANTITHEFT SYSTEM VIA GSM NETWORK Remotely controlled vehicle anti-theft system via GSM network is a system that explores the GSM network in order to produce a reliable and efficient vehicle security system. However, the design project can be viewed from two perspectives viz the hardware consideration and the software consideration. Minicom which is a terminal emulation program on Linux was utilized for the configuration of the Modem used in this project work due to its inherent advantages. Communication between the user and the vehicle sub-system is via sms (Short Messaging Service) messaging. SMS commands are sent to the GSM/GPRS Modem Module. The GSM/GPRS interpretes the message and performs necessary control actions. Also, sms messages are sent from the GSM/GPRS Modem Module to the user’s mobile phone whenever an alarm situation occurs. However, a toy car was used as a prototype display of this project work and prototype car was immobilized and demobilized from a mobile phone via SMS Keywords— GSM/GPRS Modem Module, Remote Access Link, AT-Commands, Vehicle Subsystem. GSM-BASED HOME INTRUSION DETECTION DEVICE USING SMS MESSAGING IN REPORTING INTRUSIONS TO SECURITY ADMINISTRATOR The GSM-Based Home Intrusion Detection Device is a security device that sends a text message to the owner’s mobile number in case of home intrusion. This is to warn and notify the owner of an impending attack. It is used when the owner is outside the house, or even when asleep. The device uses a GSM modem which requires a SIM card to send SMS messages. The device is activated once the door or window is opened and it automatically sends a text message to the security administrator. The device improves the effectiveness to which possible incidents of intrusion and robbery are reported to security administrators when he is away from home through long distance communication
using GSM technology. It bridges the gap between the security device and its administrator when the latter is away. GSM Based Car Security System This paper is about a project to make a system that can save the vehicle of the user. The system design is based on the GSM which can provide security to the vehicle and the system will switch on the buzzer and the system alert send the message to the user. The security system consist of five sensing parameter which are obstacle sensing, vibration sensing, micro switches, battery sensing and also revolution sensing. The buzzer will on at every single sensing mode and message will be send using GSM. The system is a well function and reliable even it is just one way communication. Microcontroller AT89S52 is the brain of the system and it is cheaper in the market and also using other devices such as GSM module, LCD, buzzer, vibration sensor, revolution sensor, battery sensor, and also optical sensor. The system is functioning when the LCD display “HELLO” and it also will display five parameters which is detection of vibration occurs, front doors open, optical detected, and revolution happen. If the parameters sense any detection the buzzer will automatically buzz and will send the message to the user mobile phone via GSM. Below is the block diagram of the circuit and the hardware of the system.
SYNTHESIS Vehicle tracking system become increasingly important in large cities and it is more secured than other system. Now a day’s vehicle theft s rapidly increasing with this we can have a good control in it. This technology can also help to advance the system of transportation and can be in many organization for security purpose and tracking purpose.
CHAPTER II RESEARCH METHODS RESEARCH DESIGN The study is a descriptive research based on mean of questionnaires and evaluations. The characteristics of individuals are needed since it will be very beneficial to anyone who needs higher vehicle security. They can choose whether establishing the said research had higher percentage when it comes to its uses. Also, with the said result, more ideas can be built up or eliminated. Everything is always based on individuals’ perception of the advantage and disadvantages of the said research.
RESEARCH LOCALE This study will be revolving on every vehicle possessors. The research will be conducted on workshop in urban areas. Where records of crime incidents workshops are the best sample of this study where different individuals are available for research. We have selected the place where we are living which is Guiguinto. Guiguinto is a first class urban municipality in the province of Bulacan, Philippines. According to the 2015 census, it has a population of 99,730 people. Guiguinto is politically subdivided into 14 barangays such as; Cutcut, Daungan, Ilang-Ilang, Malis, Panginay, Poblacion, Pritil, Pulong-Gubat, Sta.Cruz, Santa Rita, Tabang, tabe, Tiaong, Tuktukan. In this list, we are choosing Barangay Tiaong as samples for the study. The reasons are due to accessibility, variations in sample and possible of participants. With these numbers of barangays and individuals living on the place where the study will be conducted, we are expecting a great result in terms of accuracy and research relevance. So we can determine what type of vehicles we use.
RESEARCH PARTICIPANTS The participants of this study are selected and we are interested on riders that usually ride every day because of work or activities outdoors. They understand the need of a great vehicle anti-theft security and for those who can afford the vehicle anti-theft security.
RESEARCH INSTRUMENT The proponents will use survey as a method in this project which aims at producing novel solutions to practically and theoretically relevant problems. Constructive research creates knowledge about how the problem can be solved. This will enable the proponents to develop an acceptable solution to the problem. In developing the system, the main focus was to create a low cost system which is reliable and accurate. The proponents researched on previous studies of different existing designs. Each design was observed and analyzed whether it had satisfied the objective of the design. Tests were conducted to determine the accuracy and reliability of the design. The outcomes of each test scenarios are listed and compared with other test results.
DATA GATHERING PROCEDURE The researcher will present a letter to the barangay’s/municipality that asks permission to conduct the study on their area. After allowing the researcher to conduct a study, the researcher will ask the permission of the head in barangay to conduct surveys by presenting the signed letter by the barangay’s/municipality head. The demographic profiles of the respondents were included in the research but the information given will be kept confidential. The sources of data on this study will be mainly the primary sources which are the participants of the study.
STATISTICAL TREATMENT OF DATA Formula: M= f(x1) + f(x2) + …f(Xn) N
Where: M = mean of each criteria n = total number of respondents f = refers to the frequency of the number of times that a given (x) rated by respondents f(x1) + f(x2) + …f(Xn) = refers to respondent’s numerical rating
WM = ƩM N
Where: WM = weighted mean ƩM = sum of means per criteria N
= total number of criteria being rated
ETHICAL CONSIDERATION The proponents ensure the individuals who will be participating on the study that will be accountable on the privacy of their personal information. With due respect on their participation, we are not going to disclose any information to the public and on this paper without their permission. The research with holds the idea of integrity, respect, privacy and thus treats any personal information confidential. Our research strive honesty in all forms. We will still honestly report data, results, methods, procedures and publication status. We will not fabricate, falsify, and misrepresent any data.
We strive to avoid bias in experimental design, data analysis, data interpretation, personal decision and other aspect of research where objectivity is expected or required. As an integrity-oriented study, we will keep our promises and agreements to the individuals who will participate on the study. We will act with sincerity throughout the study and strive for consistency of thought and action. With our objective to help, we will avoid careless errors and negligence. We will carefully and critically examine our own work and the work of our peers for the most effective result. We are open and willing on sharing tools, data, result, ideas and resources for new researcher. And for future use, we are open and greatly appreciate and welcome feedbacks, criticisms and new ideas that will improve and hone the study.
CHAPTER III RESULTS AND DISCUSSION PRESENTATION OF DATA 1. Have you ever experienced carjacking incident?
Figure 3.1
Answer
42% 58%
Yes
No
Table 3.1 Respondents
Percentage
Yes
50 persons
42 %
No
50 persons
58 %
According to figure 3.1, 42% have experienced carjacking incident and 58% does not have experienced carjacking incident.
2. What kind of vehicle do you have?
Figure 3.2
Answer 20% 50% 30%
Motorcycle
Car
Both
Table 3.2 Respondents
Percentage
Motorcycle
50 persons
50 %
Car
50 persons
30 %
Both
50 persons
20 %
According to figure 3.2, 50% does have motorcycle, 30% does have car and 20% does have both motorcycle and car.
3. Do you worry about your vehicle being stolen when it is in a parking lot?
Figure 3.3
Answer 26%
74%
Yes
No
Table 3.3 Respondents
Percentage
Yes
50 persons
74 %
No
50 persons
26 %
According to figure 3.3, 74% does worry about their vehicle being stolen when it is in a parking lot and 26% does not worry about their vehicle being stolen when it is in a parking lot.
4. Does your vehicle can be located through computer?
Figure 3.4
Answer 26%
74%
Yes
No
Table 3.4 Respondents
Percentage
Yes
50 persons
26 %
No
50 persons
74 %
According to figure 3.4, 26% does their vehicle can be located through computer and 74% does their vehicle cannot be located through computer.
5. Does your vehicle have security features? If motorcycle then proceed to no. 6. If car then proceed to no.7 if both then answer no’s. 6 and 7.
Figure 3.5
Answer
42% 58%
Yes
No
Table 3.5 Respondents
Percentage
Yes
50 persons
58 %
No
50 persons
42 %
According to figure 3.5, 58% does their vehicle have security features and 42% does their vehicle not have security features.
6. What type of security feature do you use for your motorcycle?
Figure 3.6
Answer 12%0%
35%
Chain Lock
Disk Lock
53%
Alarm System
Other
Table 3.6
Respondents
Percentage
Chain Lock
35 persons
72 %
Disk Lock
35 persons
14 %
Alarm System
35 persons
14 %
Other
35 persons
0%
According to figure 3.6, 72% have used chain lock for their motorcycle, 14% have used disk lock for their motorcycle and 14% have used alarm system for their motorcycle.
7. What type of security features do you use for your car?
Figure 3.7
Answer 0% 28% 48% 24%
Remote Start System
Mechanical Immobilizer
Alarm System
Other
Table 3.7
Respondents
Percentage
Remote Start System
25 persons
20 %
Mechanical Immobilizer
25 persons
20 %
Alarm System
25 persons
60%
Other
25 persons
0%
According to figure 3.7, 20% have used remote start system for their car, 20% have used mechanical immobilizer for their car and 60% have used alarm system for their car.
8. Do you believe that SMS can be used as a function in a certain way that has something to do with the security of your vehicle?
Figure 3.8
Answer 16%
84%
Yes
No
Table 3.8
Respondents
Percentage
Yes
50 persons
84 %
No
50 persons
16 %
According to figure 3.8, 84% believed that SMS can be used as a function in a certain way that has something to do with the security of their vehicle and 16% do not believed that SMS can be used as a function in a certain way that has something to do with the security of their vehicle.
9. If it is available and affordable, would you buy one?
Figure 3.9
Answer
32% 68%
Yes
No
Table 3.9 Respondents
Percentage
Yes
50 persons
68 %
No
50 persons
32 %
According to figure 3.9, 68% would buy GSM based vehicle anti-theft security system with camera if it is available and affordable and 32% would buy GSM based vehicle antitheft security system with camera if it is available and affordable.
10. If not, why don’t you equip vehicles with an anti-theft device?
Figure 3.10
Answer
39% 61%
Yes
No
Table 3.10 Respondents
Percentage
Costly
50 persons
61 %
Availability
50 persons
39 %
According to figure 3.10, 61% don’t want to equip their vehicle with an anti-theft device because it is costly and 39% can’t equip their vehicle with an anti-theft device because of availability.
Scale
Equivalent
5
Excellent
4
Satisfactory
3
Average
2
Fair
1
Poor
Functionality
5
4
3
2
1
Average Equivalent
Turning off the vehicle using the device
42
8
0
0
0
4.84
Excellent
41
9
0
0
0
4.82
Excellent
47
3
0
0
0
4.94
Excellent
4.86
Excellent
Record the actual footage of where the vehicle is going Send the recorded footage to the owner’s computer Total Accuracy Message report
40
10
0
0
0
4.80
Excellent
Proper system function
45
5
0
0
0
4.90
Excellent
Get the recorded actual footage
40
10
0
0
0
4.80
Excellent
4.83
Excellent
Total User Interface Ease of use
48
2
0
0
0
4.96
Excellent
Installation
40
10
0
0
0
4.80
Excellent
4.88
Excellent
Total
ANALYSIS OF THE DATA Based on the data that we gathered, many of the respondents wants to use the GSM based anti-theft security system with camera on their vehicles. Some prefers to install it on their cars while most prefers installing the device on their motorcycles. Because of the growing number of crimes in our country, and the threat of the criminals on stealing the vehicle, most preferred using this device on their motorcycles. Individuals that we asked mention that having a great security is a must nowadays and this GSM based anti-theft security system with camera is a great addition to what they have now. Others stated that individuals who are living alone also need to have this device. This working individuals need to leave their vehicle due to work that no one will guard their belongings; thus this device will greatly benefit them. Vehicle owners as well were pleased on what this device can do. They are looking forward to have this device to add on the security of their vehicle In terms of security system, majority of the respondents selected modern way such as using the anti-theft device. 72% of them were aware of manually locking their vehicles, 84% were aware that a SMS can be used in security purposes, 26% of their vehicle can locate through computer, and 42% had experienced losing their vehicles. With these details, it is evident that their security is at risk. Even though 58% never experienced being robbed, the remaining 42% is still alarming. There were also 14% who faced some related incidents due to dysfunctional of their vehicle because 72% of them forgot to lock their vehicles before leaving to their work. With these data, most of them need an advance technology for their vehicle security and safely. For correlation, to check the overall value of the GSM based anti-theft security system with camera, we also provided handouts to the respondents where they can grade the device from 5 being the highest and 1 being the lowest. We got a satisfying result with an average of 4.70 for all categories. Respondents were satisfied based on their answers. The categories that we asked are the mere reflections on how efficient and effective the device should be.
For their difference in measures, the statistics that we gathered from the respondents thru surveys and questionnaires highly depicts what the device can do. Whether on functionality or producing output and also on how it works, the responses that we have are important to our research. We can see that the result is positive in relation with the proposal and the product itself. The difference in the functionality and design is significant. This provides a room for improvement for the product to us and also the future researchers. Or just shows that the device can be further enhanced to provide better service and additional function can be added as well. INTEGRATION OF DATA The findings show the positive relation of the desired output to gather with the result that we gathered. Based on our study, the device will be useful on providing upgrade vehicle security as well as controlling a device. The respondents' answers on the questionnaire supported the problem and the hypothesis we laid on the early part of the research. We were able to prove that the problem we proposed matches the capability of the GSM and GPS based anti-theft security system which is manifested by the findings. The result can be compared to the present literature that we have based on www.safewise.com, the number of vehicle crimes committed in 2013 totaled about 8.6 million approximately 4.1% less than in 2012. In 2013, it was estimated that the losses from all reported property crimes totaled $16.6 billion. More than 2.5 million carjacking are reported every year in the United States Criminal target renters. The 37.4% of vehicle crimes in the United States in 2013 occurred in the South, Followed by the West with 23.5%, the Midwest with 21.4%, and the Northeast with 17.7%.Vehicle without security or alarm systems are up to 300% more likely to be broken into. The average amount of stolen vehicle with a security system totals $3,000, compared to $5,000 in stolen vehicle when a vehicle doesn't have security system. US policed officials surveyed believed that vehicle monitoring systems help deter burglary attempts. Some insurance provides offers discounts up to 20% when a vehicle security system is installed. These facts are the main basis of the success of our research. Providing a better vehicle security device is a must and we believe it will help to lessen the reports Safe Wise.
Overall, the result of the research is great. The result that we gathered are beyond our expectations. The respondents provided a path for us to prove that the research is valuable and also we can consider that what we worked on was successful. The hypothesis and statement of the problem is directly proportional. We were able to come up with an efficient device which resolved the problem and will provide additional security to establishments where this GSM-based Panel will be installed. Efficiency wise, we can also tell its success. Individuals that will use for this anti-theft devices responded on our questionnaires with great scores. This means that they are satisfied on what this device can do. We were able to give our respondents the proposed outcome. They can now access their vehicles using this device which provides efficiency and accuracy. The result imply that the objective together with the background research is positive with regards to the hypothesis of the product. The outcome was a success for us researchers because the respondents gave us a great scores which mean they are satisfied while using the device and also were able to see the potential of the GSM based anti-theft security system with camera with further improvements and revisions.
GSM BASED VEHICLE ANTI-THEFT SECURITY SYSTEM WITH CAMERA The following criteria were the basis for the evaluation.
Functionality – Determine if the device work well
Accuracy – Determine if the output is exactly as expected
User Interface – Determine if the device is easy to control and understand
Scale
Equivalent
5
Excellent
4
Satisfactory
3
Average
2
Fair
1
Poor
Functionality Turning off the vehicle using the device Record the actual footage of where the vehicle is going Send the recorded footage to the owner’s computer Accuracy Message report Proper system function Get the recorded actual footage User Interface Ease of use Installation
5
4
3
2
1
CHAPTER 4 SUMMARY, CONCLUSIONS, AND RECOMMENDATIONS Summary After six months of studying and doing research, we were able to finish and make a conclusion on our research, from stating the problem, making a hypothesis and all the way to the end, we were able to justify the importance and value of the research. The product itself which is the GSM Based Vehicle Anti-Theft Security System and the research paper shows the effort and hard work the researchers exerted. We believe that making a valuable research should start from stating a real problem. Before making any study, any solution, one must see that the problem is evident and it’s deemed to be solved or at least be lessened. The problem we proposed is supported by facts and real events which are happening nowadays. After stating a problem, a wise and intelligent guess is needed. It’s where you can get a basis of the solution and it will be the foundation of the goal that the researchers will aim. When we made the hypothesis, we visualized what could be the efficient and most possible solution. Most hypothesis are based on stock knowledge but we did some basic research to have a background and a better understanding. We also added some necessary information like first two chapters is like making the foundation of the study. We can consider the first part as the heart of the study. It’s where the qualitative substance of the research is located. We also referenced and added some related facts and previous studies from past researchers. We allotted almost four months on doing the middle part of the research. Gathering data and presenting them are considerably the most vital parts of the thesis. It’s where the problem and the data gathered should relate with each other to prove the existence and value of the problem. Before we can present the data, we have to do research first from previous studies. Studying previous research is important because it gives background and general information to the researchers. Reading articles and previous thesis is also important. For us to gather data, we created questionnaires and surveys
that were distributed and answered by respondents from different part of society. Asking questions from different sectors will give diverse data and thus will be valuable for the research. After data gathering, we have to present the data. Using the correct techniques helped us show the relationship of each factors. It was great that the data we gathered and presented was directly proportional on the problem that we proposed. We can summarize that the research is success. We came up with a solution which will benefit the individuals encountering problems in burglary. The Camera and the GSM module is going to be useful for preventing burglary incidents which is the main objective of the research. We were able answer the question that was laid. The six months of the study paid off for the researchers. We believe that there’s something more to improve on our research. This study will serve as a foundation and reference for future researchers on where they can get valuable information which will drive them to make a better study.
Conclusion We can conclude that the overall research is a success. The product and results we are able to produce reflect the goal of our study. The data we presented and gathered is the evidence that the research is successful. The study shows that there’s a big problem is our society regarding vehicle theft. Owners had to spend and invest at anti-theft vehicle security which cost them thousands and yet they aren’t assured to keep their vehicle fully safe. Efficiency of old-fashioned anti-theft vehicle security like chain lock and disk lock are declining now due to the advancement of technology. The data we gathered shows that burglars improved their techniques on vehicle theft thus the common and generic anti-theft vehicle security devices seems not working anymore. The GSM-Based Security we have created is going to help solve this problem. With the advancement of technology, we also used the latest in terms of controlling a device. Our drive to lessen the burglary related incidents propelled us to create this device. Powered by 2G/3G technology, the access on this device is much secured and only selected persons can activate the device. This will prevent even burglars to attempt breaking a vehicle because even the technology they have will not be able to access and break a vehicle. Though its’ evident that the device is working and functional, we still believe that there’s a vehicle for improvement. We will leave this improvement for future researchers where they can use this study as a future foundation and basis.
Recommendation We the proponents believe that there’s a room for improvement on this research. Though we exerted our best on gathering and presenting data and producing the final product, still there’s something to be improved and honed. We recommend to the future researchers to add camera feature to capture the users face and send it to the owner using mobile application. It’s the age of advance technology where most people are using android phones. A mobile application related with the SMS-Based Security is going to be beneficial on checking the status of the device while being used. We also recommend the future researchers to add battery level indicator so that it is easier to determine how long the power will last, and a Bluetooth function on the device. It would be more convenient to control the device with the use of Bluetooth technology, rather than sending an SMS message to activate the device. This study will serve as the foundation for them to build a better and more efficient product.
ACKNOWLEDGMENT This research will not be able to be accomplished and be made possible without the helping hand of the individuals who showed to us their priceless efforts of kindness and their assistance all throughout. With the researches outmost gratitude to those persons who helped us, we would like to give them our genuine appreciation of kindness for their valuable acts. To Mr. Ruel Dogma and Mr. Joey Francisco, for giving us the capacity to develop our skills in making research, assistance, moral encouragement, wise guidance and efforts to make this clearly defined. To the Motorcycle Riders for being cooperative and patient in answering the survey questionnaires honestly. To all of their friends in giving their full support in times of need and being an inspiration and being part of this research in making this possible. To their parents for giving the parental consent and giving the sufficient need in emotional, spiritual especially in financial needs. And above all, to Almighty God, who continuously bless the researches for making things at the right time and place. And for unconditionally showering the wisdom that the researches need to fulfil their minds with the relevant ideas for their research. Praise and thanks His gratefulness.
The Researches
DEDICATION
We dedicate this project to God Almighty our creator, our strong pillar, our source of inspiration, wisdom, knowledge and understanding. He has been the source of our strength throughout this project. We also dedicate this project to our parents because of their unwaivering support since we start this project, we are very thankful to them especially because of their financial assistance who help us to continue this project, without the help of our parents we won't be able to achieve this kind of success. And also we would like to dedicate this project to the peers of friends that truly believed on us that we can make this project successful, with their help and support that we use as a strength to make this project going, we are truly blessed to have you guys on our side this project won't be successful without your help. And last to our project adviser Mr. Ruel Dogma and Mr. Joey Francisco who guided us to bring success to this project, he who taught us to be strong willed individual for us to overcome every problem we might occur during the days of project making, we are also thankful for our adviser for believing on us that we can make this project a success, for every help he have given us throughout this project, and for every inspiration and motivation he have given to us that drive us to make this project. And also we would like to extend our deepest gratitude to all the people who believe in us until the end of this project. Our love for you all can never be quantified. God bless us all.
ABSTRACT
Transportation plays a big part of our daily lives. Every year, people in the Philippines are increasingly using vehicles especially motorcycles as their common means of transportation. Together with the increase of motorcycle users, motorcycle theft is also rampant over the years. In this study, a system had been developed for theft prevention and recovery of motorcycle in an easier and faster way. The user also could view the current location of the motorcycle and shutdown the motorcycle. The system has two components, the hardware and the software modules. The hardware component includes micro-controller (Arduino Uno), GSM and a camera. The software component is the Arduino application, which is the whole process is done. Based on the evaluation conducted in terms of usability and functionality it had been found out that most of the users strongly agreed the usefulness of the system.
REFERENCES
I.J. Intelligent Systems and Applications, 2013, 09, 86-93 Published Online August 2013 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2013.09.10
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 11 (2017) pp. 2680-2687 © Research India Publications. http://www.ripublication.com
International Journal of Science and Technology (IJST) – Volume 5 No.12, December, 2016
“GSM Based Car Security System” by Ruchita J. Shah, Anuradha P. Gharge October 2012(Journal)
Muhammad Fazly Bin Jamal MAY2008 (Thesis)
Design of A GSM Cell-Phone Based Vehicle Monitoring& Theft Security
Wan Lili, Chen Tiejun, “Automobile anti-theft system design based on GSM,” Proceedings of International Conference on an Advanced Computer Control, Jan. 2009, pp. 551- 554.
International Journal of Pure and Applied Mathematics Volume 117 No. 22 2017, 19-23 ISSN: 1311-8080 (printed version) http://www.ijpam.eu
International Journal of Applied Engineering Research ISSN 0973-4562 Volume 12, Number 11 (2017) pp. 2680-2687 © Research India Publications. http://www.ripublication.com
Ibrahim et. al. (2012). Microcontroller Based Anti-Theft Security System Using GSM Networks with Text Message as Feedback http://www.ijerd.com/paper/vol2-issue10/D02 101822.pdf
INTERNATIONAL JOURNAL OF MULTIDISCIPLINARY SCIENCES AND ENGINEERING, VOL. 4, NO. 5, JUNE 2013
M. R. Rodzi, (2006), “An Enhancement of Vehicle Security Alarm System Via SMS”, Mara University of Technology http://eprints.uitm.edu.my/679/1/MOHD_ROSMANIZAM_BIN_HAM AD_RODZI_06_24.pdf.
Researchers: Lawrence S. Bando, Ritchwel H. Binaohan, Ma. Eleanor G. Honrade, and Juvindle C. Tina Adviser: Engr. Alvin Mancilla / https://ejournals.ph/article.php?id=385
CODE: #include <SoftwareSerial.h> char inchar; // Will hold the incoming character from the GSM shield SoftwareSerial SIM900(2, 3); int ind=0; // 0 = off, 1 = on int pin2 = 12;//Motor OFF int pin3 = 11;//Motor ON int pin4 = 10;//Cam ON int pin5 = 9;//Cam OFF int pin6 = 4;//permanent 5V output int asd1 = 0; code void setup() { pinMode(pin11, OUTPUT); pinMode(pin12, OUTPUT); pinMode(pin10, OUTPUT); pinMode(pin9, OUTPUT); digitalWrite(pin6, HIGH); Serial.begin(9600); // set baud rate of Arduino serial monitor delay(1000);//1000 = 1 second SIM900.begin(9600); // set baud rate of GSM module delay(1000); // give time to log on to network. Serial.println("AT+CLIP=1\r"); // turn on caller ID notification delay(100); Serial.println("AT+CNMI=2,2,0,0,0\r"); // AT Command to recieve a live SMS delay(100); } void loop() //waits SMS from authorized number
{ if(SIM900.available() >0) { inchar=SIM900.read(); if (inchar=='0') { delay(10); inchar=SIM900.read(); if (inchar=='5') { delay(10); inchar=SIM900.read(); if (inchar=='8') { delay(10); inchar=SIM900.read(); if (inchar=='5') { delay(10); inchar=SIM900.read(); if (inchar=='8') { delay(10); inchar=SIM900.read(); if (inchar=='0') { delay(10); inchar=SIM900.read(); if (inchar=='4') { delay(10); inchar=SIM900.read(); if (inchar=='7') { delay(10); inchar=SIM900.read(); if (inchar=='2') {
//Doorlock(); MSGprocess(); delay(10); } } } } } } } } } }
} void MSGprocess() //test the SMS content { while (inchar!='#') { delay(10); inchar=SIM900.read(); if (inchar=='#') { delay(10); inchar=SIM900.read(); for(ctr=0;ctr<10;ctr++) { //Serial.println(inchar); if (inchar==mesej[ctr]) { delay(10); inchar=SIM900.read(); if (inchar=='*') { ctr = 10; delay(10); inchar=SIM900.read();
if (inchar=='>')//change door lock code { delay(10); inchar=SIM900.read(); if (inchar=='>') { delay(10); inchar=SIM900.read(); if (inchar=='#') { for (ctr2=0; ctr2<11; ctr2++) { delay(10); inchar=SIM900.read(); if (inchar=='*'&&ctr2>0) { ctr=10; ctr2=11; NewPW(); } else { if(ctr2==10&&inchar!='*') { ctr=10; ind=0; Doorlock(); } else { mesej2[bilang]=inchar; bilang=bilang+1; } } } } } } else
{ ctr=10; ind=1; Doorlock(); } } } else if (inchar=='1') { delay(10); inchar=SIM900.read(); if (inchar=='O') { delay(10); inchar=SIM900.read(); if (inchar=='N') { ctr=10; app1=1; Appliance1(); } else if (inchar=='F') { delay(10); inchar=SIM900.read(); if (inchar=='F') { ctr=10; app1=0; Appliance1(); } else { ctr=10; WrongCMD(); } } else {
ctr=10; WrongCMD(); } } else { ctr=10; WrongCMD(); } } else if (inchar=='2') { delay(10); inchar=SIM900.read(); if (inchar=='O') { delay(10); inchar=SIM900.read(); if (inchar=='N') { ctr=10; app1=1; Appliance1(); } else if (inchar=='F') { delay(10); inchar=SIM900.read(); if (inchar=='F') { ctr=10; app2=0; Appliance2(); } else { ctr=10; WrongCMD(); } }
else { ctr=10; WrongCMD(); } } else { ctr=10; WrongCMD(); } } else if (inchar=='a') { delay(10); inchar=SIM900.read(); if (inchar=='b') { delay(10); inchar=SIM900.read(); if (inchar=='O') { delay(10); inchar=SIM900.read(); if (inchar=='N') { ctr=10; app1=1; app2=1; sabay(); } else if (inchar=='F') { delay(10); inchar=SIM900.read(); if (inchar=='F') { ctr=10; app1=0; app2=0;
sabay(); } else { ctr=10; WrongCMD(); } } else { ctr=10; WrongCMD(); } } else { ctr=10; WrongCMD(); } } else { ctr=10; WrongCMD(); } } else if (inchar=='G') { delay(10); inchar=SIM900.read(); if (inchar=='8') { delay(10); inchar=SIM900.read(); if (inchar=='O') { delay(10); inchar=SIM900.read(); if (inchar=='N') {
ctr=10; gate1=1; Appliance3(); } else if (inchar=='F') { delay(10); inchar=SIM900.read(); if (inchar=='F') { ctr=10; gate1=0; Appliance3(); } else { ctr=10; WrongCMD(); } } else { ctr=10; WrongCMD(); } } else { ctr=10; WrongCMD(); } } else { ctr=10; WrongCMD(); } } else {
ctr=10; WrongCMD(); } } } } }
void SendMessage2()//reserved for registering { SIM900.println("AT+CMGF=1"); //Sets the GSM Module in Text Mode delay(1000); // Delay of 1000 milli seconds or 1 second SIM900.println("AT+CMGS=\"8888\"\r"); // Replace x with mobile number delay(1000); SIM900.println("S5");// The SMS text you want to send delay(100); SIM900.println((char)26);// ASCII code of CTRL+Z delay(1000); SMSdeleter(); }
void SMSdeleter()//deletes all messages in SIM card { Serial.println("AT+CMGDA=\"DEL ALL\"\r"); // AT Command to recieve a live SMS delay(1000);
SIM900.println("AT+CNMI=2,2,0,0,0\r"); // AT Command to recieve a live SMS delay(1000); }
Ladder Diagram
Schematic Diagram
Burning Bootloader to an empty ATmega328p-pu
Click File>Examples>ArduinoISP>ArduinoISP, upload the program Follow the figure above then click Tools>Programmer and choose Arduino as ISP Click Tools then select Burn Bootloader
Uploading Sketches for a ATmega328p-pu with Arduino Bootloader
GSM Module
Arduino
GSM
RX
Pin10
TX
5V
5V
GND
GND
Pin9
Connection of Arduino to GSM
List of Components 2 pcs 8 pins 12v relay 2 pcs 8 pins 5v relay 1 pc GSM Module 1 pc Arduino 1 pc Camera 1 pc Transmitter 1 pc Receiver 12v Battery 9v Battery
Name:
Age:
Date:
We are conducting a survey about GSM and GPS based Vehicle Anti-Theft System which will be beneficial in helping us understand if we need advance technology in lessening robbery. Check the box for your answer.
1. Have you ever experienced carjacking incident? Yes No 2. What kind of vehicle do you have? Motorcycle Car Both 3. Do you worry about your vehicle being stolen when it is in a parking lot? Yes No 4. Does your vehicle can be located through Computer? Yes No 5. Does your vehicle have security features? If motorcycle then proceed to no.6. If car then proceed to no.7. If both then answer no’s.6 & 7. Yes No
6. What type of security feature do you use for your motorcycle? Chain Lock Disk Lock Alarm System Other____________ 7. What type of security feature do you use for your car? Remote Start System Mechanical Immobilizer Alarm System Other____________ 8. Do you believe that SMS can be used as a function in a certain way that has something to do with the security of your vehicle? Yes No 9. If it is available and affordable, would you buy one? Yes No 10. If not, why don’t you equip vehicles with an anti-theft device? Costly Availability