Documente Academic
Documente Profesional
Documente Cultură
1
Senior High School
Chapter 1
Introduction
generation that some of our problem can be solved by the power of High-technology
devices like the Bluetooth Door block. This product is the combination of multiple
downloadable application. This product keeps your house secure and modernized,
becoming increasingly important, we are constantly looking for new and innovative
ways to add convenience to our lives. One of the most frustrating things that can
happen during an average day is to find that your keys are missing and you need
to access your house entrance in case of an emergency. But every old fashioned
house use different types of key which uses unique grooves for unlocking a
doorknob of your house’s main entrance, but nowadays we all now smart phone is
always in our pocket or else in our bags. The Door block will change the way we
access our houses securely without any hassle of being stuck outside because of
misplaced keys, Just simply download the specific application for the Door block
and pair it via Bluetooth but you must set a strong combination of password so the
homeowner is the only one who can access it with permission, thought that it would
STI- College Global City
2
Senior High School
be better if you change the pin or password regularly. The Door block uses motors
to unlock the lever and it is programmed using an Arduino Board and Bluetooth chip
so at the same time Bluetooth connection will sent signals to the Arduino
We are the group who conducted a research about this particular product
that we named as the Bluetooth Door Block because it has 2 functions, Bluetooth
where a person can easily access through their mobile phones using Bluetooth
connection whenever they want to lock/unlock their doors. The door block is used
to block the stranger’s phone whenever they are connected and wants to rob the
house, and when the pin reach the maximum limit of the requirement code needed
this door block will have an emergency call/text the owner using the phone number
Bluetooth door block, this product can help many people for their security from
thieves, robber, etc. You can input your own password using your mobile phone
and this product hopefully will become a weatherproof. This product's target
standard. A research about Jae-Young Pyun a door lock system consist of RFID
STI- College Global City
3
Senior High School
reader for user authentication, touch LCD, motor module for opening and closing of
the door, sensor modules for detecting the condition inside the house,
communication module, and control module for controlling other modules. Sensor
References
DrJaapHaartsen (1994) Bluetooth inventor at Ericsson.
(https://www.google.com/amp/s/www.androidauthority.com/history-bluetooth-
explained-846345/amp/
- Egyptians (1st Centuty AD, during the Era of Roman Egypt) Roman Automatic
door, Egypt. https://en.m.wikipedia.org/wiki/Door
- Hong Sen-Yan (25-220 AD) Padlocks since late Eastern Han Dynasty at China.
source safety and security at home. More specifically it aims to answer the following
questions:
1.1. age;
1.2. gender;
2.1 Security
2.2 Safetiness
Hypothesis
The researchers want to give more advance technology about Bluetooth door
block, wherein they will be benefited by this product whenever they want to have a high
security system at their house. This product is more profitable and convenient for buyers.
The products also have a lot of advantages to the consumers because of its design and it's
The problems of losing the key to your door will be lessen because of the product. The
product will make the buyer feel secured about their home and also to make the buyers
security advance.
and security of the house with the opinions of Senior High School students in STI
College Global City. We limit our study by focusing on their safety and security on
their homes and how it will affect their security with our product
STI- College Global City
5
Senior High School
Students
reliable lock to their house whenever they doing their school work outdoor and they
do not have a relative to watch their house. The researchers conduct this research
paper for them to solution their needs. So the one who will benefit to this study was
Teacher
As teachers they also use their phones for exclusive monitoring and they
also use their phones to control their house status. They could use the door block
to monitor their house activities and at the same time access their house smartly
and remotely in addition they could also grant family members to access with
permission according to Taha Ahmed Khan improving education is a huge issue for
our society. Test scores, our perceived performance against different nations, and
As for the Programmers researchers will need help by them to prevent the
threats from other hackers like the black hat hackers. They will handle the server of
the security app that the researcher made to access the Bluetooth door block. Most
of the red hat hackers are most likely will benefit to the product and the research.
Definition of Terms
supply.
Computer - an electronic device for storing and processing data, typically in binary
Storage Electronic - having or operating with the aid of many small components,
especially microchips and transistors, which control and direct an electric current.
Capacity - the maximum amount that something can contain. Corrupted - A data or
program file that has been altered accidentally by hardware or software failure.
Red hat hackers - These are the vigilantes of the hacker world. They’re like White
Chapter 2
Review of Related Literature Related literature
Foreign Studies
Nowadays, the case of home robberies has been rampant. According to the
alone. Here in the Philippines, according to the survey conducted by the Social
Weather Stations or SWS in 2018, 1.4 million of Filipinos are victims of common
crimes, one of which is home robbery. Furthermore, the survey also showed that
52% of Filipinos are afraid of their own neighborhood because someone might
break into their house. Traditional locks are easily picked and often times, people
lose their keys. The idea of keyless doors paved the way for innovated security
lock system.
With the rising technology and modernizations, not only the convenience in digital
age is advancing but also the safety and the security of households. Given the
human nature to innovate, with the continuous work to provide services that would
system. There has been a new trend these days about smart-locks— a
combination of lock system and technology— which provides peace of mind for
people who are worried for burglars. Smart locks are electromechanical lock
One of the most common smart-locks are the Bluetooth Door Locks, according to
a journal published J.P Chaudhari (2016) Bluetooth based lock system is a house
STI- College Global City
9
Senior High School
innovation that utilizes Bluetooth function available in smart devices. The
framework of using Bluetooth turns out to be more simple and productive for
smart phone and Bluetooth module. Arduino microcontroller in the Bluetooth Door
work, he stated that the system was designed to remotely configure the door
using a mobile phone and to give access strictly, only to the authorized personnel.
communication, GUI monitoring system and embedded system. There are used
embedded system which controls the lock, another one is connected to the serial
port of the host PC, in order to receive the data and to show all the needed
information about the personnel according to that data. The embedded system
Local Studies
STI- College Global City
10
Senior High School
In this paper, we examines on how the Bluetooth door block can be applied in
some local regions and areas in the Philippines that are prone to the robberies
and conduct some research to prevent that kind of situation. This research is
great potential of having a device that can prevent robberies and crimes with the
help of our phones. We conduct research with local students to find out what
changes and changes in our product as we know how to apply it in some cases
and to know what the advantages of having this product are. In this paper, we
applied some research and know the possible outcomes that may occur if your
house is not that safe especially in the poor areas of the Philippines. With that in
mind, we know that multiple regions are involved to some crimes, robbing and
even murder. With the help of this research, we can know more how to live a
satisfy life without those crimes as we can be safe without any interactions and
can live peacefully. This paper concludes the evidence of some local studies that
we studied and applied with the help of some further investigation and
preparation.
range of devices to communicate with each other and connect to the Internet
without the need for wires, cables and connectors. It is supported and used in
Ericsson, Nokia, Motorola, Intel, IBM, Toshiba, Motorola, Apple, Microsoft, and
even Toyota, Lexus and BMW. A variety of products available on the market have
short range Bluetooth radios installed, including printers, laptops, keyboards, cars
and the most popular type of Bluetooth enabled devices - mobile phones, driving
60% of the Bluetooth market. The technology has already gained enormous
week. According to IDC, there will be over 922 million Bluetooth enabled devices
yet it can also be a high threat for the privacy and security of Bluetooth users
The idea behind Bluetooth technology was born in 1994, when a team of
computers, headsets and other devices. It was later developed into the Bluetooth
September 1998. The founding members were Ericsson, IBM, Intel, Nokia and
After years of development the final Bluetooth technology uses the free and
unlicensed for low-power use, and allows two Bluetooth devices within 10-100 m
range to share data with throughput up to 723.2 Kbps, or 2.1Mbps with the new
Enhanced Data Rate specification already released in 2005. Each device can
encryption, quality of service (QoS) control and other security features. However,
it will be shown that Bluetooth is vulnerable in a number of ways, opening the door
Chapter 3
RESEARCH METHODOLOGY
This chapter discusses the methods and procedures used in this research
of the product. This is where the researcher explains what method they use to
STI- College Global City
13
Senior High School
measure the respondents of the research, the instrument that have been use, and
Research Design
method that describes an existing or current phenomenon (Bowling 1997, & Grove
1997) this type of method gives the respondents pre-determined the Bluetooth
door-block’s usefulness.
Sampling Technique
LaMorte (2016) the central limit theorem states that if you have a population with
mean μ and standard deviation σ and take sufficiently large random samples from
the population with replacement text annotation indicator, then the distribution of
the sample means will be approximately normally distributed. This will hold true
sample size is sufficiently large (usually n > 30). If the population is normal, then
STI- College Global City
14
Senior High School
the theorem holds true even for samples smaller than 30. In fact, this also holds
true even if the population is binomial, provided that min (np, n (1-p))> 5, where n
is the sample size and p is the probability of success in the population. This means
that we can use the normal probability model to quantify uncertainty when making
inferences about a population mean based on the sample mean. The researchers
Instrumentation
pretest and a post test. The questions are based on the statement of the problem
questionnaires that have been tallied and also to determine the percentage of every
question.
STI- College Global City
15
Senior High School
TWF
WM = -------------------------
Where:
WM = Weighted Mean
TWF = Total Weighted Frequency
N = Total Population
use the likert scale to measure if the product will reach its objective.
1 Strongly Agree
2 Agree
3 Disagree
4 Strongly Disagree
Good day, we are researcher from CCT-301 we are conducting our research about
our product the Bluetooth door block as a tool for your security. We will appreciate
your answer and any information obtain with this study will remain confidential.
The product is
prone to hackers
The product can
help you improve
your security at
home
The product is
useful when it
comes to
security
The product can
be safely used
by everyone
The product can
be sold through
the market
Chapter 4
questionnaires completed by STI Senior High school students who are the
purpose of the study is to know the importance of the product regarding on the
safety and security of the house, the methods of how the researchers gathered
Table 1.1
that compromises of 50% of the total of respondent, while the age range of 16 to
STI- College Global City
18
Senior High School
17 compromises of 40% of the total of respondents. The age range of 20 and above
Table 1.2
agree Disagree
1 2 3 4
WM = 43(1)+(47)(2)+(10)(3)+4(0)
100
100 100
The table discusses how easily the product can be paired to a mobile phone using
Bluetooth. The overall weighted mean is 1.67. Out of 100 students, 43 of them
answer the question 1 with strongly agree while, 47 of the students answer it with
agree and some of them responded it with disagree. Based on weighted mean the
result is 1.67 or 1.7 the researchers round it off the weighted mean is 2 which is
agree. The respondents agree that the product can easily connect via Bluetooth.
Table 2.1
agree Disagree
1 2 3 4
STI- College Global City
20
Senior High School
2.The product can
monitor your
Home safely. 62 27 5 6
WM = 62(1)+(27)(2)+(5)(3)+6(4)
100
100 100
It discusses how the product can monitor the safetiness of your house when you
are off for your outside itinerary. The overall weighted mean is 1.55. Out of 100
students, 62 of them answer the question 2 with strongly agree while, 54 of the
students answer it with agree and some of the students responded it with 5 disagree
and the other students responded with 6 disagree. Based on weighted mean the
result is 1.55 or 1.6 the researchers round it off the result of weighted mean is 2
which is agree. The respondents agree that the product can monitor their home
safely.
Table 2.2
agree Disagree
STI- College Global City
21
Senior High School
1 2 3 4
3. The product is
prone to
hackers 22 38 32 8
WM = 62(1)+(27)(2)+(5)(3)+8(4)
100
100 100
In this table it questions the respondents on how the product is prone to hackers.
The overall weighted mean is 2.26 Out of 100 students, 22 of them answer the
question 3 with strongly agree while, 38 of the students answer it with agree and
some of the students responded it with 32 disagree and the other students
responded with 8 disagree. Based on weighted mean the result is 2.26 or 2.3 the
researchers round it off the result of weighted mean is 2 which is agree. The
Table 2.3
STI- College Global City
22
Senior High School
Questionnaire Strongly Agree Disagree Strongly
agree Disagree
1 2 3 4
WM = 26(1)+(37)(2)+(30)(3)+7(4)
100
100 100
In this table the researchers want to know if the product can improve the security at
home. The overall weighted mean is 2.18 Out of 100 students, 26 of them answer
the question 4 with strongly agree while, 37 of the students answer it with agree
and some of the students responded it with 30 disagree and the other students
responded with 7 disagree. Based on weighted mean the result is 2.18 or 2.2 the
researchers round it off the result of weighted mean is 2 which is agree. The
respondents agree that the product can help them improve their security at home.
Table 2.4
STI- College Global City
23
Senior High School
Questionnaire Strongly Agree Disagree Strongly
agree Disagree
1 2 3 4
5. The product is
useful when it
comes to 47 32 21 0
security
WM = 47(1)+(32)(2)+(21)(3)+4(0)
100
100 100
In this table the researchers want to know if the product is useful when it comes to
security. The overall weighted mean is 1.74 Out of 100 students, 47 of them answer
the question 5 with strongly agree while, 32 of the students answer it with agree
and some of the students responded it with 21 disagree. Based on weighted mean
the result is 1.74 or 1.7 the researchers round it off the result of weighted mean is
2 which is agree. The respondents agree that the product is useful when it comes
to security.
STI- College Global City
24
Senior High School
Table 2.5
agree Disagree
1 2 3 4
WM = 77(1)+(15)(2)+(3)(3)+5(4)
100
100 100
In this table it discusses if the product can be safely used for everyone. The overall
weighted mean is 1.26 Out of 100 students, 77 of them answer the question 6 with
strongly agree while, 15 of the students answer it with agree and some of the
students responded it with 3 disagree and the others responded with 5 strongly
disagree. Based on weighted mean the result is 1.26 or 1.3 the researchers round
it off the result of weighted mean is 1 which is strongly agree. The respondents
Table 2.6
agree Disagree
1 2 3 4
7. The product
can
be sold 69 27 0 4
through
the market
WM = 69(1)+(27)(2)+3(0)+4(4)
100
100 100
In this table the researchers want to know if the product can be sold in the market.
The overall weighted mean is 1.39 Out of 100 students, 69 of them answer the
question 7 with strongly agree while, 27 of the students answer it with agree and
the others responded with 4 strongly disagree. Based on weighted mean the result
is 1.39 or 1.4 the researchers round it off the result of weighted mean is 1 which is
strongly agree. The respondents strongly agree that the product can be sold to
market.
STI- College Global City
26
Senior High School
Chapter 5
Conclusions
With the statistical data gathered from the respondents, the researchers
concluded that people do not really feel safe with their current lock systems. People
still feel a little uneasy with regards in the security that their locks systems provide.
Majority of the respondents answered that they don't really feel safe with their
household locks. However in terms of safety, the respondent thinks that the
Bluetooth door lock system is very much safer than the normal locks. Given that
the normal lock could be easily be picked with a wrench or even a bobby pin.
However Bluetooth door lock system could also be hacked since almost everyone
lock system are very useful since the hassle of carrying around of door keys is taken
out.
Generally, Bluetooth door lock systems are found to be more reliable than current
Based on the statistical data gathered and reviewed by the researchers, the
results show the efficiency, convenience and effectivity among the people who has
the same door lock systems. The researchers arrive to a conclusion that these
modern devices used for security purposes exhibit a great convenience and more
co placement that regular locks that require keys. Moreover, according to the
order to utilize the use of the technology, specifically the Bluetooth program; the
researchers have concluded that the efficacies of the bluetooth door lock.
Furthermore, in terms of feeling secured, it is safe to say that the modern door lock
STI- College Global City
28
Senior High School
system provides more assurance of security unlike the traditional door lovk system
Recommendations
what is the best suit for your security at home. Advance security system
can be a best choice to like the Bluetooth door block because it’s a
that the security system that you are using is prone from harm. Also make
sure that the security system has a backup feature to make sure that it
use a reliable and easy to access security system like the Bluetooth door
block. This would lessen your hassle from opening your door.
STI- College Global City
29
Senior High School
4. Future Researchers should conduct a research about advance
technology security to add more knowledge and fill the gaps about their
REFERENCES
Mark Dowd, John McDonald, Justin Schuh (2007) The Art of Software
Security Assessment: Identifying and Preventing Software
Vulnerabilities.