Vous êtes sur la page 1sur 71

vii

TABLE OF CONTENTS

PRELIMINARIES Page

TITLE PAGE ......................................................................................... i

RECOMMENDATION SHEET ............................................................................. ii.

APPROVAL SHEET ............................................................................................ ii.

DEDICATION ..................................................................................................... iv.

ACKNOWLEDGEMENT ...................................................................................... v.

ABSTRACT ......................................................................................................... vi

TABLE OF CONTENTS………………………………………………………………vii

LIST OF TABLES ............................................................................................. viii.

LIST OF FIGURES ............................................................................................. ix.

CHAPTER I ......................................................................................... 1.

BACKGROUND OF THE STUDY ........................................................................ 1.

STATEMENT OF THE PROBLEM ....................................................................... 3

OBJECTIVES OF THE STUDY ............................................................................ 4

SCOPE AND DELIMITATIONS ............................................................................ 5

CHAPTER II ......................................................................................... 6

REVIEW OF RELATED STUDIES AND LITERATURE .................................... 6

CONCEPTUAL FRAMEWORK OF THE STUDY ............................................ 21

OPERATIONAL DEFINITION OF TERMS ...................................................... 23


viii

CHAPTER III ..................................................................................... 24.

PROJECT DESIGN ........................................................................................ 24.

System Architecture ....................................................................................... 27.

CHAPTER IV ..................................................................................... 32

PROJECT DESCRIPTION .............................................................................. 32

PROJECT STRUCTURE ................................................................................ 35

PROJECT CAPABILITIES AND LIMITATIONS............................................... 40

TEST RESULTS............................................................................................. 41.

PROJECT EVALUATION ............................................................................... 43.

CHAPTER V ...................................................................................... 48

SUMMARY OF FINDINGS .............................................................................. 48

CONCLUSION ................................................................................................ 51

RECOMMENDATION ..................................................................................... 52

BIBLIOGRAPHY .............................................................................. 53.

APPENDICES ................................................................................... 56.

APPENDIX A – GANTT CHART .................................................................... 56.

APPENDIX B – EVALUATION INSTRUMENT ............................................... 58.

APPENDIX C - TEST CASE ........................................................................... 60

RESEARCHERS’ PROFILE .............................................................. 62


ix

LIST OF TABLES

Table Name Page

1 Likert Scale……………………………………………………….......31

2 Summary of Results…………………………….…………………….43

3 Numerical Scale………………………………………………………43

4.0 Usability Testing………………………………………………………44

4.1 Reliability Testing …………………………………………………….44

4.2 Functionality Testing …………………………………………………45

4.3 Efficiency Testing …………………………………………………….45

4.4 Maintainability Testing ………………………………...…………….46

4.5 Portability Testing ……………………………………...…………….46

5 Total Budgetary Requirements ………………………...……………..57

6 Test Case ……………………………………………………………..60


x

LIST OF FIGURES

Figure Name Page

1 Conceptual Framework of the System………………………….....…21

2 System Architecture of the Study……………………………..……..24

3 GPS Tracking System…………………………………...……..…….26

4 Prototype Model…………………….………………………………..27

5 Arduino Uno with Proximity Sensor……………………….………..35

6 GPS Module Mobile Application…………………….………….…..36

7 Improvised Helmet…………………………………………………..37

8.0 Arduino device with Fingerprint Sensor…...………………….…….38

8.1 Proximity Sensor Module …………………………………..……….39

9 Gantt Chart…………………………………………………...…..….54
CHAPTER I
INTRODUCTION
BACKGROUND OF THE STUDY

Motorcycles have been all over the roads in the Philippines. Wherever the road

we go, we can see a motorcycle travelling across different places. Male, female, anyone

can use a motorcycle because of its easy-to-use mechanics. However, because it has only

two wheels, riding it requires a lot of balance for safety driving of the motorcycles. In

fact, the biggest challenge that many beginners encounters is having a good balance when

riding a motorcycle.

There are different types of motorcycle like the on-road bikes, which are allowed

in the national roads and off-road bikes which should not be used in a national road.

There are also variation of motorcycles like big motorcycles, which are popular in the

early 90’s, and small to average sized motorcycles which are more preferred nowadays.

Big bikes will require more balance and power especially in turning in a different

direction while the smaller ones are more stable when turning left or right.

The amount of motorcycle riders in the Philippines are gradually increasing due to

its cheap price and easy mechanics. As the number of motorcycle riders increases,

accidents that motorcycles are involved are also the ones needed to be discussed. About 6

of 10 road accidents involved motorcycle riders. Some are not wearing a helmet when the

incident happens, resulting to a fatal injuries to some other parts of the body especially in

the head.

Wearing a helmet is very important when traveling with a motorcycle. Safety

helmets are proved to reduce the risk of fatal head injuries when such road accidents

happen. Another helpful feature of the helmet is the protection from intense heat
2

especially in an open road. Whether it is a half-face helmet or a full-face, riders should

always encourage each other to wear a helmet. In fact, a Motorcycle Helmet Law has

already been implemented in the Philippines since 2004, but still there are a lot of

violators especially in an unsupervised areas.

Another major disadvantage of a motorcycle is its attraction to the eyes of the

carnappers. Motorcycles are easy to take away by carnappers by forcing to trigger the

ignition switch, pushing the motorcycle away, taking it away by carrying it out using

another vehicle and especially when keys are left on the ignition switch of the

motorcycle.

By proposing this study, we are aiming to reduce the risk of having a fatal head

injuries by forcing the riders to wear a helmet by making it as a replacement for the usage

of key in the ignition switch This will be possible by the use of Infrared Proximity

Sensors located inside the helmet, near the face of the rider specifically. With this,

starting the motorcycle without wearing a helmet is not possible.

Another goal for this study is to provide immediate notification about the specific

location of the motorcycle that is being stolen by the use of a GPS Tracking System. The

system includes GPS tracking device and a mobile application for sending the commands

and receiving the information provided by the system. This will allow motorcycle riders

to trace the location of their stolen motorcycle in real time.

Lastly, the proposed study will include a fingerprint scanner for authentication

and for the switches inside the helmet to be enabled.


3

STATEMENT OF THE PROBLEM

1. Violation of the motorcycle riders on the Motorcycle Helmet Law (RA 10054)

due to their negligence in wearing a helmet.

2. Unavailability of a tool which can track the motorcycle and notify the owner

about the specific location of the vehicle.

3. Lack of security in verifying the owner of the motorcycle that may result to

motorcycle theft.
4

GENERAL OBJECTIVE

The general objective of this study is to develop a key helmet authentication

system for the motorcycle together with the GPS Tracking System for notification about

the specific location of the motorcycle

SPECIFIC OBJECTIVE

1. To develop an improvised helmet that will serve as the replacement of the

usual keys in the motorcycle, this will require the rider to wear the helmet first

before they can start their motorcycle.

2. To develop a GPS Module that can track the position of the motorcycle and

will provide real time notification to the owner about the specific location of

the stolen vehicle.

3. To verify the identity of the rider of the motorcycle by implementing a

fingerprint scanner in the vehicle.


5

SCOPE AND DELIMITATIONS

The proposed study will implement a keyless authentication ignition system for

the motorcycle together with a GPS tracker system for motorcycle in Metro Manila only.

This will be possible by making an improvised helmet for the replacement of the usual

keys used for the ignition switch. The study will be implemented for motorcycle riders

aiming to reduce the risk of fatal head injuries and provide immediate notification for the

owners when carnnaping incident happens.

The proposed study will take into consideration some limitations of the GPS

Tracking Devices like signal issues and battery issues. The study will provide alternatives

for this limitations. A GPS signal booster antenna will allow the GPS device to

strengthen its signal even in a place where weak signals are prone. For the battery

consumption issue, the study will require an often change of batteries used in the GPS

device to avoid malfunctioning incidents due to low battery. The durability and

appearance of the helmet will not be changed in the proposed improvised helmet to avoid

uncomfortability issues of the riders.


CHAPTER II

CONCEPTUAL FRAMEWORK

REVIEW OF RELATED LITERATURE AND STUDIES

Number of Registered Motorcycle in the Philippines

According to LTO report in 2009, more than half of the 6.2 million registered

vehicles in the Philippines as of 2009, around 3.2 million to be exact, are motorcycles,

scooters, or tricycles.

According to statistics from the Land Transportation Office (LTO), more than

half of the vehicles nationwide are motorcycles. Of the total 8.7 million vehicles

registered with the LTO for 2015, 4.8 million are motorcycles. At 2016, the motorcycle

bought continued to increase, According to LTO annual report 2016, 1,425,956 new

motorbike with sidecars were registered and 2,707,349 were renewed. 146,366 new

motorbikes with sidecar were registered and 1,041,852 without sidecar were renewed.

According to the LTO Administrative Order No. AHS-2008-013

1. All motorcycles and scooters being used on ANY HIGHWAY in the Philippines

should be registered with the LTO in accordance with Republic Act (R.A.) No.

4136, or the Land Transportation and Traffic Code.

2. If you own a motorcycle and use it, your license plate should be visible and clean

so your ride can be identified by everyone.

3. Motorcycles follow the same speed limits as cars. In case you’ve forgotten, that’s:
7

 80 kph on open country roads with no blind corners

 40 kph on “through streets” or roads clear of traffic and without blind corners

 30 kph if there’s light traffic and it’s not a through street

 20 kph everywhere else

4. Passengers, often referred to as back riders, are limited to one. Cargo, on the other

hand, is limited to saddlebags or luggage carriers approved by the Department of

Trade and Industry (DTI).

5. Both driver and passenger must wear a DTI-approved (i.e. with an ICC sticker)

helmet when riding a motorcycle as per R.A. 10054 or the Motorcycle Helmet

Act of 2009.

6. For accessories, all motorcycles should have headlights, tail lights, signal lights,

brake lights, side mirrors, and a horn. The LTO also allows a maximum of two

supplementary white or selective yellow LED/high-intensity discharge (HID)

lamps with six bulbs each, directed downward and never towards the left side, and

should let you see 10 meters ahead.

 Any other accessories have to be approved by the LTO and the DTI.

7. DUI is still illegal for motorcycle riders, along with using a mobile phone or

similar gadgets.

Road Crash incidents in the Philippines

According to Philippine Statistics Authority (PSA) at 2015, 10,012 people died

due to road crashes in 2015 – a 45.76% increase from 6,869 deaths recorded in 2006. In

2006, the PSA recorded 6,869 deaths due to road crashes. Nine years later, in 2015, that

number jumped to 10,012. Since 2010, the number of road crash deaths never dipped
8

below 8,000. The year with the most number of road crash-related deaths is 2015, with

10,012 people killed. This is 1.79% of the 560,605 total deaths (including non-road crash

ones) recorded by the PSA that year.

According to the data recorded by World Health Organization at 2002, Road

traffic injuries are among the top 3 causes of death for those 5-24 years old. It is the top

cause of death among those 15-19 years old, followed by self-inflicted injuries and

maternal conditions.

According to Health Department (2010), Motorcycle riders have constantly been

the top victim of road crash injuries since 2010.

Based on 2013 data from the Philippines' Department of Public Works and

Highway-Traffic Accident Recording and Analysis System, 1,513 people have died due

to road accidents.

According to the report of World Health Organization (2015), 1.25 million people

have died globally due to road accidents, with motorcyclists comprising 23% of deaths.

More than half of those who die in road accidents in the Philippines are motorcycle

riders, according to a new road safety report of the World Health Organization (WHO).

In the Philippines, the Philippine Statistics Authority recorded 10,012 deaths due to road

traffic crashes in 2015.

According to Department of Health (DOH) in 2015, the total number of road-

crash related injuries are 30,412, a 61.24% increase from the 18,861 recorded injuries in

2014.
9

According to another data shown by the Department of Health (DOH),

motorcycle riders are the most vulnerable to injuries. 19,852 cases or 65% of patients

injured were riding a motorcycle. Of the road traffic-related injuries involving

motorcycles, 98.7% of fatalities involved motorists without helmets, and 1.3% of

fatalities involved motorists wearing a helmet.

Benefits of Wearing a Helmet

According to (“What Are the Benefits of Wearing a Motorcycle Helmet?”,2017),

A motorcycle helmet has four basic components: an outer shell, comfort padding, an impact-

absorbing liner and a retention system. All of these components work together to protect a rider's

brain and the face in the event of a crash. According to a publication distributed by the U.S.

Department of Transportation, National Highway Traffic Safety Administration and the National

Center for Statistics and Analysis, helmets saved 7,808 lives during the period between 1993 and

2002. The report also indicates that had all motorcyclists worn proper motorcycle helmets during

this time period, this number would have been as high as 11,915. The report states that even

though motorcycles represent less than three percent of registered passenger vehicles, fatalities

from motorcycle crashes represent about nine percent of fatalities involving passenger vehicles. A

motorcycle rider without a helmet is three times as likely to die from head injuries as a rider who

is wearing one.

Republic Act 10054 (Motorcycle Helmet Law)

Republic Act 10054 (RA 10054), known as the Motorcycle Helmet Act of 2009,

is the primary law that mandates all motorcycle riders to wear standard protective

motorcycle helmets and provides for the specific penalties for its violation.
10

According to RA 10054 (2009), “All motorcycle riders, shall at all times wear

standard protective motorcycle helmets while driving, whether long or short drives, in

any type of road and highway.”

According to (Dotillos, 2017), Eight years after the Motorcycle Helmet Act of

2009 was implemented, riders still ply the country’s roads wearing substandard helmets

or none at all.

Motorcycle Theft in the Philippines

According to the Highway Patrol Group (HPG), About 150 motorcycles are stolen

every week in Metro Manila alone or an average of 21 per day. HPG spokesman

Superintendent Elizabeth Velasquez also reported that in 2014, a total of 11,870

motorcycles were stolen, while 10,771 were taken in 2013.

According to an HPG report in(2017), the month with the lowest number of stolen

motor vehicles and motorcycles was last July 2017 with 11 carnapped vehicles and 119

motorcycles

Proximity Sensor

A proximity sensor is an electronic sensor capable of detecting the presence of

nearby objects without physical contact. It emits an electromagnetic field or a beam of

electromagnetic radiation (for example: infrared) and then looks for changes in the return

signal or field. The object that is being sensed is the proximity sensor's target. Depending

on the proximity sensor targets, different sensors may be used.


11

For sensing capability system, proximity sensors are widely used in many

industries including food and beverage (Amft et al., 2010; Stevan Jr. et al., 2015),

chemical processing (Nair et al., 2015; Facco et al., 2010; Vijayaraghavan et al., 2007),

pharmaceuticals (Cesarovic et al., 2011), building and construction (Lundström et al.,

2015) because of their versatility and high level of functionality. There are a few types of

proximity sensors that are popular such as inductive, capacitive and ultrasonic

Types of Proximity Sensor

Inductive sensor (Passeraub et al., 1997; Kej´ık et al., 2004) detects metallic

objects and is suitable for industrial applications. This type of sensors produces a

magnetic field in the vicinity of an oscillation coil. When a conductive object gets near to

the coil, the eddy current on the object induced by the magnetic field reacts with the coil

to change the oscillation frequency. Although the inductive sensor is simple, sensitive

and suitable for industrial applications, it is unable to detect nonmetallic objects.

Capacitive sensor (Chen & Luo, 1998; Buck & Aherin, 1991) detects metals, objects with

high humidity and other types of obstacles that change dielectric permeability of the

space around the active area of the sensor. The sensor measures the capacitance between

two electrodes and the capacitance changes when a detectable object is approaching.

Proximity Sensor on Android Phones

According to (Proximity Sensor on Android Gingerbread, 2011), in most Android

phones, the proximity sensor is implemented as a boolean-sensor. Its returns just two

values "NEAR" & "FAR". Thresholding is done on the LUX value i.e. the LUX value of
12

the light sensor is compared with a threshold. A LUX-value more than threshold means

the proximity sensor returns "FAR". Anything less than the threshold value and the

sensor returns "NEAR". The actual value of threshold is custom-defined depending on

the sensor-chip in use and its light-response, coupled with the location & orientation of

the chip on the smart-phone body.

Infrared Proximity Sensor

According to (Hamilton-Smith, Khondker, et. Al, 2015), An IR proximity sensor

works by applying a voltage to a pair of IR light emitting diodes (LED’s) which in turn,

emit infrared light. This light propagates through the air and once it hits an object it is

reflected back towards the sensor. If the object is close, the reflected light will be

stronger than if the object is further away.

Global Positioning System (GPS)

GPS is a satellite navigation system used to determine the ground position of an

object. GPS technology was first used by the United States military in the 1960s and

expanded into civilian use over the next few decades. Today, GPS receivers are included

in many commercial products, such as automobiles, smartphones, exercise watches, and

GIS devices (Smith, 2012).

According to (Washington, 2013), The GPS system includes 24 satellites

deployed in space about 12,000 miles (19,300 kilometers) above the earth's surface. They

orbit the earth once every 12 hours at an extremely fast pace of roughly 7,000 miles per
13

hour (11,200 kilometers per hour). The satellites are evenly spread out so that four

satellites are accessible via direct line-of-sight from anywhere on the globe.

In order for a GPS device to work correctly, it must first establish a connection to

the required number of satellites. This process can take anywhere from a few seconds to a

few minutes, depending on the strength of the receiver. For example, a car's GPS unit

will typically establish a GPS connection faster than the receiver in a watch or

smartphone. Most GPS devices also use some type of location caching to speed up GPS

detection. By memorizing its previous location, a GPS device can quickly determine what

satellites will be available the next time it scans for a GPS signal.

GPS Uses

GPS systems are extremely versatile and can be found in almost any industry

sector. They can be used to map forests, help farmers harvest their fields, and navigate

airplanes on the ground or in the air. GPS systems are used in military applications and

by emergency crews to locate people in need of assistance. GPS technologies are often

working in many areas that we do not normally consider.

According to (Whitesburg, 2012), Global Positioning System are used for the

following purposes;

1. Location - determining a position

2. Navigation - getting from one location to another

3. Tracking - monitoring object or personal movement


14

4. Mapping - creating maps of the world

5. Timing - bringing precise timing to the world

Who Uses GPS?

Some of the applications that GPS systems are currently being used for around the

world include mining, aviation, surveying, agriculture, marine, recreation, and military.

These days doctors, scientists, farmers, soldiers, pilots, hikers, delivery drivers, sailors,

fishermen, dispatchers, athletes, and people from many other walks of life are using GPS

systems in ways that make their work more productive, safer, and easier

Finger Print Ignition in Automobiles

According to (Vithlani, Ronak, 2016.), Automobile theft is the biggest problem in the
remote location of the city and neither key lock nor Remote keyless system provides
reliable solution because key can be copied very easily and remote keyless system
encrypted data use radio waves which can be recorded and used to unlock the car. To
design a unique key which doesn’t rely on key or radio wave, biometric solution is the
only better option. Our purpose here is to provide biometric solution with very low cost
hardware and using open source hardware and software tool plus does it your self-
installation.

A Study on the Permeability through Concrete using RF Wireless Module for


Reinforced Concrete Structure

According to (Yoon, Park, et. Al. (2011), Ubiquitous is an information

communication environment which peoples could connect on network without being

conscious of the network and computer condition at anytime and anywhere. Presently,

advanced technology, digital cities and eco-friendly cities using Ubiquitous technology
15

are being focused through out the world. As recent information industry and

communication technology have developed remarkably, studies on intelligent structures

and structural maintenance methods by combining a general idea of connecting all

objects on network by interpolating computers which is called Ubiquitous Computing,

and USN(Ubiquitous Sensor Network) are being attempted. In this paper, a basic

experiment on penetration of RF(Radio Frequency) sensor nodes using an experimental

sample setting concrete and reinforcing bar as variables is studied to estimate the

possibility of applying wireless sensor networks in structures. The spring of reinforcing

bars, concrete thickness, intensity of radio frequency were set up as variables,

transmitting and receiving distance were checked vertically and horizontally. Moreover,

Spectrum Analyzer was used for checking the magnitude of the frequency used in order

to measure the reduction of radio wave exactly. The radio wave reduction was

numerically analyzed, and the influence of the wavelength was analysed as well. As a

result, the penetration depth in concrete without reinforcing bars was 45cm, and in

reinforced concretes which reinforcing bars placed at spacing of 5cm and 15cm, the

penetration depth were 37cm and 45cm each. No influence on radio wave penetration

depth were found when the spacing of reinforcing bars in the reinforced concrete

structures becomes over 15cm.

A study on F8L10D-N LoRa RF Module for Drone Based live Broadcasting system

According to (Lee, Cha, et. Al, 2016), LoRa technology is proved to be the mass

of low cost, long range machine-to-machine connectivity. Particularly in the field of


16

broadcasting and communication system, F8L10D-N LoRa RF Module spread spectrum

technology with long transmission distance and strong penetrative ability that is double

stronger than traditional FSK as well as PSK modulation scheme.

Remote controlled motorcycle security system (MotoGS)

According to the study conducted by (Helvaci, Karukuzu, 2017), an active alarm

and event notification system that can provide security against theft of motorcycles has

been designed. With this system, the owner of the motorcycle will be alerted at the

moment of burglary action using the voice dialing method. Burglary action will be more

difficult and deterrent when the horn on the bike is activated by the system.

Android mobile based Security lock for Bike ignition

Android mobile based Security lock for Bike ignition is a replacement for

traditional locks in bike. User has to enter password using an Android mobile. If the

password is correct then DC motor is rotated. Buzzer is turned on for wrong password.

Wireless communication is used to send commands to the project. Bluetooth technology

is used in this project. Many times we forgot to carry the key of our bike or key gets lost.

In these cases it is really difficult to get the bike started. This project is designed to solve

this purpose. Main concept behind this project is of a relay operating using a password

entered through Android mobile. It also turns on the Buzzer when wrong password is

entered for multiple times. Android mobile based Security lock for Bike ignition has its

main application in security systems. It can be used in cars, trucks, buses, two-wheelers.
17

We have provided a DC motor to give a demo of bike lock opening. User needs to enter

password using an Application on Android mobile.

Password Based Lock for Bike Security with Ignition Key Control System

According to (Kumar, Sasidharan, et. Al , 2016), “Many times we hear the cases

of bikes getting stolen from parking area or sometimes we forgot to remove the keys

from bike by mistake. In these cases it is really difficult to get the bike back. This project

is designed to solve this purpose. Main concept behind this project is of a bike security

system using a password entered through keypad. This system turns on the Buzzer when

wrong password is entered for 3 times. User can change this password anytime he/she

wish using a keypad. It uses Microcontroller: This is the CPU (central processing unit) of

our project. This project has GSM technology and Vehicle anti-theft system with vehicle

ignition controlling technique. Whenever bike owner removes key from the ignition lock

at that system is turned on. We have provided vibration sensor with this project, which is

similar to piezoelectric sensor. When vibrations are detected, SMS is sent to the owner of

the bike. When car owner sends back SMS to project then the engine is stopped. We have

provided a Relay and a DC motor to show the demo of vehicle engine controlling

system”.
18

Wireless Security for Bike Ignition Using Android Via Bluetooth

According to (Shaharuddin, 2016), “This project is about building up a prototype

of the security system for motorcycle ignition. This system can prevent the motorcycle

from being stolen. This security system is developed to control the ignition of the

motorcycle through the Android devices. This system consists of a mobile application on

an Android device that will connect wirelessly using Bluetooth to the Arduino system

that acts as the microcontroller. The Arduino, in turns is connected to the bike ignition

system. The system enables users to switch on/off the ignition of the bike by pressing a

button in the Android mobile application. To ensure that the system is secure, only

Android device that has been paired with the Arduino through the Bluetooth using correct

pass key will be able to control the ignition system of the motorcycle”.

Motorcycle Engine Management System with Microcontroller and Smart Drivers

According to (Tan, Hung, 2005), “This paper presents an engine management

system to control a 4 stroke two cylinder motorcycle engine. At the heart of the system is

a microcontroller based reference design engine control unit. This works together with a

crank wheel sensor, throttle position sensor, oxygen sensor, barometric pressure sensor,

injectors, ignition coils and fuel pump.

This system has the capability to detect engine position, sense throttle position, air

temperature, control fuel injection timing and amount and control spark timing and dwell.

It has the option to control idle with stepper motor and has close loop feedback of oxygen
19

levels in the exhaust. Serial communication via KWP2000 is used for reprogramming of

the controller and reading diagnostic codes.

The main goal of this system is to meet emission requirements and provide On Board

Diagnostics (OBD) capability. This presentation will discuss the system's electronics

including voltage regulators, smart drivers and IGBT. Fault protection and detection

capabilities using the smart drivers will also be discussed.”

Overview of Fingerprint Recognition System

According to (Ali, Yannawar, et. Al, 2016), The basic fingerprint recognition

system consists of four stages: firstly, the sensor which is used for enrolment &

recognition to capture the biometric data. Secondly, the pre-processing stage which is

used to remove unwanted data and increase the clarity of ridge structure by using

enhancement technique. Thirdly, feature extraction stage which take the input from the

output of the pre-processing stage to extract the fingerprint features. Fourthly, the

matching stage is to compare the acquired feature with the template in the database.

Finally, the database which stores the features for the matching stags.

Fingerprint Recognition System and Tehniques: A Survey

According to (Sharma, Mishra, et. Al, 2013), The fingerprint is a physiological biometric

characteristic to identify a person. As the name implies fingerprint is the impression or

the print made by human finger due to fingerprint, as the name suggests is the print or the

impression made by our finger because of the patterns formed on the skin of our palms

and fingers since birth. With age, these marks get prominent but the pattern and the
20

structures present in those fine lines do not undergo any change. . Fingerprints are raised

ridges of skin on the hairless surfaces of hands and feet (Dermal Ridges).Primates and

other animals have fingerprints. They provide traction and every ridge contains glands.

There are three principles of fingerprints:-

1. A fingerprint is an individual characteristic

2. Fingerprints remain unchanged during a lifetime.

3. Fingerprint has general ridge patterns that permit them to be classified. The main aim

of this paper is to study the various technique and algorithms for Fingerprint Recognition

System such as latest minutiae based, correlation based and other global, local methods

for fingerprint matching and status of success of concurrent methods. The problem is to

develop a Fingerprint Recognition System that returns relevant results to a query

fingerprint image in a relevant time.

Fingerprint Recognition Using Minutiae Extractar

According to (Redhu, Balkishan, 2013), The popular Biometric used to authenticate a

person is fingerprint which is unique and permanant throughout the person life.

Fingerprint Recognition or fingerprint authentication refers to the automated methods of

verifying a match between two human fingerprint Fingerprints are widely used in daily

life for more than 100 years due to its feasibility, distinctiveness, permanence, accuracy,

reliability, and acceptability. A large number of approaches to fingerprint matching and

various algorithm and methods are behind their matching procedure.


21

CONCEPTUAL MODEL OF THE STUDY

INPUT PROCESS OUTPUT

Knowledge Design
Requirements
 Project Initiation
 Circuit Diagram  Requirement
 GPS Definition
 Ignition System
of the
Motorcycle
Software Development
Requirements
 Prototyping
 Arduino IDE Model
A Development of a
 MATLAB
Key Helmet
Hardware Authentication System
Requirements with GPS Tracking
Testing Module for Motorcycle
 Infrared in Metro Manila
Proximity  System Testing
Sensor  Acceptance
 Infrared Testing
Proximity  Usability
Receiver Testing
 Full Face Helmet  Functionality
 Microcontroller Testing
switch  Compatibility
 Signal Booster Testing
 RF Module  Reusability
 Fingerprint
Scanner
 4 Channel Relay
 GPS Tracking
Module

Evaluation
22

The figure describes the conceptual framework of the study where in the input is

consisting of the knowledge, software, and hardware requirements. The knowledge

requirements consist of Arduino Programming, Ignition of a Motorcycle, GPS Tracker,

Circuiting, etc.

On the other side, the process being used is through design, development, and

testing such as System Testing, Test Script, Test Summary, etc. The output objective of

this study is to develop a key helmet that would serve as a replacement to the traditional

insertion of a key to the ignition lock and to also authenticate the user preventing

motorcycle theft while tracking real time the location of the vehicle using a GPS module.

On the basis of test and evaluation conducted on the performance of “The

Development of a Key Helmet Authentication System with GPS Tracking Module for

Motorcycles in Metro Manila”, the study passed in the objective testing of the system.
23

OPERATIONAL DEFINITION OF TERMS

Ignition System – a part of a motorcycle that functions as the igniter for the

engine to start

Ignition Switch – is a switch in the control system of a motorcycle that activates

the main electrical systems for the vehicle

Proximity - nearness or closeness of an object

Proximity Sensor - is a sensor able to detect the presence of nearby objects

without any physical contact

Infrared Proximity Sensor – a type of proximity sensor that emits infrared lights

when the target object is sensed

Geofencing - the use of GPS or RFID technology to create a virtual geographic

boundary, enabling software to trigger a response when a mobile device enters or

leaves a particular area.

Global Positioning System – also known as GPS, is a satellite-based or cellular

network based navigation system

Authentication - the process or action of proving or showing something to be

true, genuine, or valid

Radio Frequency Module - An RF module (radio frequency module) is a

(usually) small electronic device used to transmit and/or receive radio signals

between two devices.

Electric Current – a flow of electric charge for the 4 channel relay to function

Arduino - is an open-source platform used for building electronics projects


CHAPTER III

METHODOLOGY

This chapter presents the project design, project development, operating

and testing procedure as well as the evaluation procedure.

PROJECT DESIGN

“A Development of a Key Helmet Authentication System with GPS Tracking

Module for Motorcycle in Metro Manila” is an authenticated keyless ignition system for

the motorcycle that will use an improvised helmet as a trigger to the switch and scan the

fingerprint to enable the buttons attached to the helmet together with a GPS Tracking

System for providing of the specific.

Figure 2. System Architecture Design of the proposed key helmet authentication system.
25

The motorcycle rider/s will wear the proposed improvised helmet with the devices

integrated. The Infrared Proximity Sensor located at the forehead part of the full face

helmet will sense the target object (forehead part).If the sensor detects the target object,

the result will be transmitted to the microcontroller. The microcontroller initializes the

fingerprint scanner lighting up the LED and in stand-by mode for pressing of finger. If

the rider/s doesn’t wear the helmet, the process will not proceed As the fingerprint

scanner is now enabled, the rider will now have to authenticate his/her fingerprint for the

system to proceed to the next process. If Authenticated fingerprint is scanned, the system

will continue by allowing electric currents to flow into the motorcycle engine of the

vehicle.
26

Figure 3. System Architecture Design of the proposed GPS Tracking system.

The GPS module integrated with a Wi-Fi module connects to the database and

sends the location to the cloud database consisting of latitude and longitude of the

vehicle.The Mobile Application fetches the coordinates from the database and

displays it in a map in real time refreshing every one second for a more accurate

location of the vehicle. The user can now track the location of the vehicle in real time.
27

PROJECT DEVELOPMENT

The proponents chose the Prototyping Model system development method. In

prototyping, a prototype (an early approximation of a final system or product) is built, tested, and

then reworked as necessary until an acceptable prototype is finally achieved from which the

complete system or product can now be developed. The proponents chose this because this

model works best in scenarios where not all of the project requirements are known in detail

ahead of time, for example, the panellists or the clients want another feature for our proposed

system, this model will allow the proponents to add the other requirements without hassle, as

well as it is an iterative, trial-and-error process that takes place between the developers and the

users.

Figure 4. This figure shows the process in the prototyping model


28

The several steps in Prototyping Model are as follows:

1. The new system requirements are defined in as much detail as possible. This

usually involves interviewing a number of users representing all the departments or

aspects of the existing system.

2. A preliminary design is created for the new system.

3. A first prototype of the new system is constructed from the preliminary design. This

is usually a scaled-down system, and represents an approximation of the

characteristics of the final product.

4. The users thoroughly evaluate the first prototype, noting its strengths and

weaknesses, what needs to be added, and what should to be removed. The

developer collects and analyzes the remarks from the users.

5. The first prototype is modified, based on the comments supplied by the users, and a

second prototype of the new system is constructed.

6. The second prototype is evaluated in the same manner as was the first prototype.

7. The preceding steps are iterated as many times as necessary, until the users are

satisfied that the prototype represents the final product desired.

8. The final system is constructed, based on the final prototype.

9. The final system is thoroughly evaluated and tested. Routine maintenance is carried
out on a continuing basis to prevent large-scale failures and to minimize downtime.
29

OPERATION AND TESTING PROCEDURES

OPERATION PROCEDURE

First of the operation procedure in this study is to find the problems that are being

encountered by our client by observations, interviews and surveys. Next is by planning the

solutions for the problems and finding the initial requirements for the proposed system. The next

step will be creating the preliminary design of the proposed key helmet authentication system

with GPS tracking system then creating the first prototype from the preliminary design. After

developing the first prototype, the proponents will present the output to the panelists and clients

for evaluation, specifically for finding its strengths and weaknesses, finding what needs to be

added, updated or removed.

The first prototype will now then be modified, to create the second prototype of the

proposed key helmet authentication system with GPS Tracking system. The second prototype

will be evaluated in the same manner as the first prototype does. The process will continue to

iterate until the panels and clients are satisfied with the prototype. The final prototype will now

be modified and become the final system if it meets the clients‟ and panelists‟ requirements.

TESTING PROCEDURE

For the final step of the operational and testing procedure of the proposed system, the

researches will create and provide test cases for each component and module in the key helmet

authentication system with GPS tracking system. The test cases will expect accurate output in

various cases. Lastly, the proponents will perform device and module testing to check if it

produces accurate data.


30

EVALUATION PROCEDURE

Comprehensive specification and evaluation of software product quality is a key factor in

ensuring adequate quality. This can be achieved by defining appropriate quality characteristics,

taking account of the purpose of usage of the software product. It is important that every relevant

software product quality characteristic is specified and evaluated, whenever possible using

validated or widely accepted metrics. ISO/IEC 9126-1 (2000) is a software product evaluation

with quality characteristics and guidelines for their use, which was developed to support these

needs, defined six quality characteristics and described a software product evaluation process

model. The fundamental objective of the ISO/IEC 9126 standard is to address some of the well-

known human biases that can adversely affect the delivery and perception of a software

development project. It categorizes software quality attributes into six characteristics

(functionality, reliability, usability, efficiency, maintainability and satisfaction), which are

further subdivided into sub characteristics.

Functionality. The capability of the software product to provide functions which meet

stated and implied needs when the software is used under specified conditions

Reliability. The capability of the software product to maintain a specified level of

performance when used under specified conditions.

Usability. The capability of the software product to be understood, learned, used and

attractive to the user, when used under specified conditions.

Efficiency. The capability of the software product to provide appropriate performance,

relative to the amount of resources used, under stated conditions.

Maintainability. The capability of the software product to avoid unexpected effects

from modifications of the software.


31

Portability. The capability of the software product to satisfy users in a specified context

of use.

Project Demonstration

This study was demonstrated to 35 Maynilad Service consumers, and IT professionals.

Professionals taking up engineering will also serve as the project evaluators.

The said evaluation instrument is presented in Appendix C.

Final Evaluation

For the final evaluation in this phase, the system is evaluated among 35 respondents.

Each of them was given an evaluation form that will be computed to finalize the overall

performance and impact of the device and the application using Likert Scale as shown in Table

1.0

Table 1.0 Likert Scale


Numerical Scale Descriptive Rating
5 Excellent

4 Very Good

3 Good

2 Fair
1 Poor
CHAPTER IV

RESULTS AND DISCUSSION

This chapter presents the project description and structure, capabilities and

limitations, test results and project evaluation.

PROJECT DESCRIPTION

The project “A Development of a Key Helmet Authentication System with GPS

Tracking Module for Motorcycle Riders in Metro Manila” intended to develop a key

helmet authentication system for the motorcycle riders in metro manila and a GPS

tracking module for motorcycle tracking purposes. The project is consisted of three

different objectives to be done. First one is to create a improvised helmet that will require

the motorcycle rider to wear the said helmet for the motorcycle to be available for

starting. Next is to develop a mobile application that will include a GPS Tracking

Module. This objective will allow motorcycle riders to track their vehicle wherever they

go as long as the mobile application is installed. The last objective is implementing a

fingerprint scanner in the system for authentication purposes.

The first objective of this project will be done with the use of a sensor called

proximity sensor. Proximity sensor is used for detecting any nearby objects. There are a

lot of types of proximity sensor such as inductive, capacitive,

infrared, etc. For this project, the developers used a infrared type of proximity sensor for

the reason of the other types doesn‟t meet the requirements of the proposed objective.
33

The proximity sensor will be attached to the helmet together with the arduinouno

microcontroller. Its function in the system will be for detecting if the rider wears the

helmet. Once the rider wears the helmet, the proximity sensor will detect the head of the

rider and an LED light will be turned on for indication purposes. At the same time, the

fingerprint scanner will now be enabled as soon as the rider wears the helmet. The

motorcycle will now be available for starting and running.

For the second objective, the developer will create a mobile application that

includes a GPS Tracking Module. The mobile application is created using Java

programming language. However, the mobile application will only be fully functional

when the GPS module is inserted to the target motorcycle. The mobile application will be

connected into the GPS module for it to be able to track the motorcycle. Once the GPS

module is implemented to the vehicle, the mobile application is now ready to use. The

mobile application will allow motorcycle owners to track their motorcycle wherever they

go. Owners can easily track the location of their motorcycle even if they are away from

the vehicle.

The last objective of this project is implementing a fingerprint scanner for

authentication purposes. The developer will attach a fingerprint scanner to the helmet

also, that will be connected to the same Arduino uno microcontroller that the proximity

sensor is connected. This is because the proximity sensor needs to detect first when the

helmet is worn by the rider before enabling the function of


34

fingerprint scanner. The fingerprint scanner that will be used is GT-521F32. This model can

store up to 300 different fingerprints and comes with a small and convenient size that will fit into

the helmet. Once the proximity sensor detects when the rider is wearing the helmet, the

fingerprint scanner will now start to detect fingerprints, if the fingerprints matched, the

motorcycle will now be ready for starting. Another advantage that this objective have is, even if

the helmet is stolen, the thief will not be able to start the motorcycle because his fingerprint is

not registered so the fingerprint scanner will continuously give him the error in detection.
35

PROJECT STRUCTURE

During the development of “A Real Time Water Quality Monitoring Application

with GIS-based mapping for Bureau of Fisheries and Aquatic Resources in Fish Farming

using Arduino Devices”, the following module was created:

Figure 5 Arduino UNO Device with infrared scanner

The Infrared Proximity Sensor detects obstacle present in a straight

light using infrared lights. The infrared scanner then sends a true value to the

microcontroller and the microcontroller interpret it that there is an obstacle present. The

sensor is attached to the microcontroller ( Arduino Uno) using 5v of power. The

microcontroller contains the code for the whole process.


36

Figure 6. The mobile application for Vehicle Tracking

The mobile applications fetches the longitude and longitude sent by the GPS

module to the database. The mobile application displays the coordinates in the user

interface and locates the position of the vehicle in a map fragment from Google. The

mobile app fetches data through the internet and refreshes every 1 second for an accurate

location.
37

Figure 7 Improvised Helmet made from paper mache.

This will serve as the helmet for the testing of the device. The devices and sensors

would be placed in the helmet strategically. The IR proximity Sensor is placed on the

forehead for the detection of the head and the fingerprint scanner is on the chin side of

the helmet. When the helmet is worn, the process starts.


38

F
i
g
u
r
e

8
.
0

A
r
d
u
i
n
o

Figure 8. Arduino device with Infrared Proximity Sensor and


Fingerprint Scanner.

The complete devices integrated inside the helmet of the motorcycle rider

giving functions of authentication and head detection of the rider. These sensors

communicates to the Arduino microcontroller and then the Arduino sends data to each

other when a certain value triggers the initialization of each sensors..


39

Figure 8.1 Infared Proximity Scanner detecting an object.

When the sensor detects the head of the owner it enables the LED Light of the

Fingerprint Scanner , the scanner then stands-by for incoming finger press. A successful

fingerprint scan initiates the motorcycle… but when the helmet is removed, the engine

stops immediately.
40

PROJECT CAPABILITIES AND LIMITATIONS

The following capabilities of the project:

a. A helmet that acts as a key in a motorcycle that requires riders to wear in order to

start the motorcycle's engine.

b. A fingerprint scanner that authenticates the rider's identity using the fingerprint of the

rider.

c. A GPS module that tracks the location of the motorcycle.

d. A Geofencing function that enables the user to set a distance where the vehicle should

stay. If the vehicle exceeds the distance, the GPS module sends a notification to the

user.

e. A mobile application that provides a user interface for the rider in tracking the

location of their motorcycle.

The following limitations of the project:

a. The helmet's impact capability is not covered by the project. The materials and the

overall quality of the helmet is exclusive to the manufacturer.

b. The fingerprint would only authenticate the only registered rider. If the owner wants

to lend the vehicle, he should register the borowee first.

c. The Signal of the GPS tracker could be obstructed by buildings and topological

structures resulting to lower accuracy of the tracker.


41

d. The geofencing function is limited only to the sending of notification to the owner of

the vehicle. In case of theft, the culprits would not be apprehended by the security

system of the vehicle.

e. The user's internet connectivity affects the accuracy of tracking of the vehicle.

TEST RESULTS

The project was tested using ISO/IEC 9126-1 (2000) standard. It was developed

as a model for evaluating software product quality. This ISO model composed of six

components that can used in testing the quality of the system.

The result of the functionality of the project study “The Development of a Key

Helmet Authentication System with GPS Tracking Module for Motorcycles in Metro

Manila” using the ISO/IEC 9126-1 (2000) are:

1. Usability in terms of attractiveness of the mobile application to the user and

enables them to understand the application easily is highly acceptable by the evaluators

with the overall mean of 3.72.

2. Reliability is evaluated by the consumers as „Very Good‟ with the overall mean

of 3.62 which means that the system maintains specified level of performance when used

under specified conditions.

3. Functionality of the system is accepted by the consumers with the overall mean of 3.71

which means that the system is „Very Good‟ and can provide functions which meet

stated and implied needs when the software is used under conditions.

4. Efficiency means the system provides appropriate performance, relative to the

amount of resources used and it is highly acceptable by the evaluators with the

overall mean of 3.68 which means that the system is „Very Good‟.
42

5. Maintainability of the system is acceptable by the consumers but there are

areas for improvements that is why it has an overall mean of 3.46.

6. Portability is accepted by evaluators with the overall mean of 3.41 which

means that the system is „Good‟.

7. In addition to the test results evaluated using the ISO 2000 standard model, the

researchers also conducted a series of tests that were undertaken to such system.
43

PROJECT EVALUATION

Moreover, the study conducted a survey to test the (1) Usability, (2) Reliability,

(3) Functionality, (4) Efficiency, (5) Maintainability and (6) Portability of the system

entitled “The Development of Water Conservation System with Leakage Detection in

Maynilad Provided Residential Areas using Arduino”.

Table 2.0 Summary of Results


Criteria Mean Qualitative Interpretation

1. Usability 3.75 Very Good

2. Reliability 3.64 Very Good

3. Functionality 3.74 Very Good

4. Efficiency 3.66 Very Good

5. Maintainability 3.46 Good

6. Portability 3.41 Good

Overall Mean 3.61 Very Good

Numerical Scale Descriptive Rating


4.51 – 5.00 Excellent
3.51 – 4.51 Very Good
2.51 – 3.51 Good
1.51 – 2.51 Fair
1.00 – 1.51 Poor

Table 3.0 Numerical Scale


44

Table 2.0 shows the summary of evaluation result conducted during system

development and implementation, the overall mean is 3.61 which means that the system

is “Very Good” based on the legend shows in Table 3.0.

Table 4.0 Usability Testing


Usability Criteria Mean Qualitative Interpretation

1. Attractiveness 3.74 Very Good

2. Understandability 3.85 Very Good

3. Learnability of 3.66 Very Good

functions

Overall Mean 3.75 Very Good

Table 4.0 shows the summary of evaluation under the Usability category

conducted during system development and implementation, the overall mean is

3.75 which means that the system has a “Very Good” usability.

Table 4.1 Reliability Testing


Reliability Criteria Mean Qualitative Interpretation

1. Maturity 3.55 Very Good

2. Recoverability 3.73 Very Good

3. Fault Tolerance 3.65 Very Good

Overall Mean 3.64 Very Good


45

Table 4.1 shows the summary of evaluation under the Reliability category

conducted during system development and implementation, the overall mean is

3.64 which means that the system has a “Very Good” reliability.

Table 4.2 Functionality Testing


Functionality Criteria Mean Qualitative Interpretation

1. Accuracy of data 3.74 Very Good

2. Sustainability of 3.75 Very Good

objectives

Overall Mean 3.74 Very Good

Table 4.2 shows the summary of evaluation under the Functionality

category conducted during system development and implementation, the overall

mean is 3.74 which means that the system has a “Very Good” functionality.

Table 4.3 Efficiency Testing


Efficiency Criteria Mean Qualitative Interpretation

1. Time behavior 3.58 Very Good

2. Resource utilization 3.67 Very Good

3. Compliance 3.75 Very Good

Overall Mean 3.66 Very Good


46

Table 4.3 shows the summary of evaluation under the Efficiency category

conducted during system development and implementation, the overall mean is

3.66 which means that the system has a “Very Good” efficiency.

Table 4.4 Maintainability Testing


Maintainability Criteria Mean Qualitative Interpretation

1. Stability of 3.46 Good

performance

2. Testability of system 3.46 Good

Overall Mean 3.46 Good

Table 3.4 shows the summary of evaluation under the Maintainability

category conducted during system development and implementation, the overall

mean is 3.46 which means that the system has a “Very Good” maintainability.

Table 4.5 Portability Testing


Portability Criteria Mean Qualitative Interpretation

1. Freedom from 3.51 Very Good

discomfort

2. Absence of errors 3.43 Good

3. Positive attitude 3.29 Good

towards project

Overall Mean 3.41 Good


47

Table 4.5 shows the summary of evaluation under the Usability category

conducted during system development and implementation, the overall mean is 3.41

which means that the system has a “Good” satisfaction.

The researchers also designed a series of tests that were undertaken and consulted

to such system. The study was demonstrated to IT professionals in consideration of the

objectives of the study and the expected outputs desired by the testers. On the basis of

test and evaluation conducted on the performance of “The Development of a Key Helmet

Authentication System with GPS Tracking Module for Motorcycles in Metro Manila”,

the study passed in the objective testing of the system.


CHAPTER V

SUMMARY OF FINDINGS, CONCLUSION, AND

RECOMMENDATION

This chapter presents the summary of findings, conclusions, and

recommendations based from the results of tests and evaluation.

SUMMARY OF FINDINGS

On the basis of test and evaluation conducted on the performance of “The Development

of a Key Helmet Authentication System with GPS Tracking Module for Motorcycles in

Metro Manila”.

1. The Key Helmet is developed using a sensor and a scanner namely : IR Proximity

Sensor and Fingerprint Scanner. The helmet successfully detected the

2. head of the rider and the removal of it prohibiting the starting of the motorcycle.

3. The helmet also authenticated the rider for the security of the vehicle.

4. Successfully developed a GPS Tracking mobile application using a GPS module

and ESP8266 for data gathering from the satellites and real time displayed the

location of the motorcycle in a map fragment in the application.

5. Successfully authenticated the rider prohibiting the initialization of the motor

engine.
49

6. The study was conducted a survey to test the performance of the “The

Development of a Key Helmet Authentication System with GPS Tracking Module

for Motorcycles in Metro Manila”. The survey test was assigned to 35 Motorcycle

owners and the results were the following:

7. The overall evaluation result of the project is 3.61 with a qualitative interpretation

of “Very Good”

8. The overall mean result of the project based on the usability criteria was 3.75 with

descriptive rating of “Very Good” which means that the capability of the project

to be understood, learned, used and attractive to the user was highly acceptable.

9. The overall mean result of the project based on the reliability criteria was 3.64

with descriptive rating of “Very Good” which means that the capability of the

software product to maintain a specified level of performance was highly

acceptable.

10. The overall mean result of the project based on the functionality criteria was 3.74

with descriptive rating of “Very Good” which means that the capability of the

software product to provide functions which meet stated and implied needs was

highly acceptable.

11. The overall mean result of the project based on the efficiency criteria was 3.66

with descriptive rating of “Very Good” which means that the capability of the

software product to provide appropriate performance, relative to the amount of

resources used was highly acceptable.


50

12. The overall mean result of the project based on the maintainability criteria was

3.46 with descriptive rating of “Good” which means that the capability of the

software product to be modified was acceptable.

13. The overall mean result of the project based on the portability criteria was 3.41

with descriptive rating of “Good” which means that the capability of the software

product to be transferred from one environment to another was acceptable.


51

CONCLUSION

In consideration of the objective of the study and the results of testing and

evaluation carried out, the following conclusions were derived:

1. The researchers conclude that the system developed a helmet that serves as a

key to a motorcycle and integrated a fingerprint scanner that authenticates the

rider for security purposes avoiding motorcycle theft.

2. The researchers conclude that the GPS module provides a real time tracking of

the motorcycle using the mobile application fetching data from the server passed

by the GPS Module and WI-FI Module ESP8266.

3. The researchers conclude that the system successfully authenticates the user‟s

identity by scanning the fingerprint and successfully associated the fingerprint the

the initialization of the motor.


52

RECOMMENDATION

The study entitled “The Development of a Key Helmet Authentication

System with GPS Tracking Module for Motorcycles in Metro Manila” is highly

recommended for everyone who owns motorcycles and wants to achieve safe

riding. Also, it was also recommended to anyone desires to learn more in different

Arduino devices/sensors.

However, a number of recommendations were identified based on the

findings and conclusions presented for further improvement of the study:

1. The researchers recommend the use of a real motorcycle engine to test the

functions of the system in real life situations.

2. The researchers recommend that the GPS tracking module be integrated into a

cheaper way of data communication.

3. The researchers suggest to improve the overall appearance and quality of the

helmet.

4. The researchers also suggest to add a real time tracking of the movement of the

motorcycle in the GPS Tracking application where the route of the vehicle is

displayed.

5. The researchers recommend the hardware devices be improved and enhanced

to provide results with higher accuracy.

6. The researchers recommend the change of the refresh rate of the GPS tracking

application to be more convenient to the user.


53

BIBLIOGRAPHY

R. Seva ,(Received 8 January 2017; accepted 12 June 2017) ,MODELING

MOTORCYCLE ACCIDENT SEVERITY IN THE PHILIPPINES USING HELMET

USE, RIDING EXPERIENCE, AND DRIVING BEHAVIOUR, from

http://ijtte.com/uploads/2017-08-22/6d5cf703-9ddf-cbe7ijtte.2017.7(3).05.pdf

E.Reyes, (May 10, 2017), Cases of Motornapping / Bikenapping in the

Philippines, from https://ichoose.ph/blogs/cases-motornapping-bikenapping-

philippines

I. DOTILLOS, (MAY 17, 2017), INCONSISTENCIES IN IMPLEMENTING THE

MOTORCYCLE HELMET LAW, from http://verafiles.org/articles/implementation-

motorcycle-helmet-law-inconsistent

TheCodeArtist, (2011), Proximity Sensors on GingerBread, from

https://thecodeartist.blogspot.com/2011/01/proximity-sensor-on-android-

gingerbread.html

Primer PH, (April 22, 2017), A Guide to Motorcycle Laws in the Philippines, from
http://primer.com.ph/tips-guides/2017/04/22/expats-guide-motorcycle-laws-in-the-philippines/

Vithlani, Ronak. (2016). BIOMETRIC AUTOMOBILE IGNITION LOCKING


SYSTEM. International Journal of Electronics and Communication Engineering and
Technology. 7. 28–37.

Yoon, Park, et al. (2011) A Study on the Permeability through Concrete using RF
Wireless Module for Reinforced Concrete Structure | Request PDF. Available
from:
54

https://www.researchgate.net/publication/263630863_A_Study_on_the_Permeability_thr
ough_Concrete_using_RF_Wireless_Module_for_Reinforced_Concrete_ Structure [accessed
Oct 04 2018].
Lee, Cha, et. Al. (2016) A study on F8L10D-N LoRa RF Module for Drone Based
live Broadcasting system.
Availablefrom:https://www.researchgate.net/publication/315936532_A_study_on
_F8L10D-N_LoRa_RF_Module_for_Drone_Based_live_Broadcasting_system [accessed
Oct 04 2018].

Helvaci, Karukuzu (2017), Remote controlled motorcycle security system (MotoGS),


https://ieeexplore.ieee.org/document/8093375

Kumar, Sasidharan, et. Al, (2016), Password Based Lock for Bike Security with Ignition

Key Control System, http://ijsart.com/Content/PDFDocuments/IJSARTV2I53271.pdf,

Shaharuddin, (2016), WIRELESS SECURITY FOR BIKE IGNITION USING


ANDROID VIA
BLUETOOTH,http://eprints.utem.edu.my/18427/1/Wireless%20Security%20For%
20Bike%20Ignition%20Using%20Android%20Via%20Bluetooth.pdf
Tan, R. and Hung, T., "Motorcycle Engine Management System with Microcontrollerand Smart
Drivers," SAE Technical Paper 2005-26-362, 2005, https://doi.org/10.4271/2005-26-362.

Ali, Yannawar, et. Al. (2016), (PDF) Overview of Fingerprint Recognition System.
Available from:
https://www.researchgate.net/publication/310953762_Overview_of_Fingerprint_
Recognition_System [accessed Oct 04 2018].

Sharma, Mishra, et. Al (2016), Fingerprint Recognition System and Tehniques: A


Survey,https://pdfs.semanticscholar.org/c8fa/402b414e27bd3971c0d58920d924 ede9fa3f.pdf

Redhu, Balskishan, (2013), Fingerprint Recognition Using Minutiae Extractar


http://www.ijera.com/papers/Vol3_issue4/OG3424882497.pdf

P. Acosta,( MARCH 13, 2017) ,Motorcycle riders should wear protective helmets at all times,

from https://www.manilatimes.net/motorcycle-riders-wear-protective-helmets-times/316916/
55

K. Sy, (October 02, 2017) 6 in 10 injured in road crashes are motorcycle riders, from

https://www.rappler.com/move-ph/issues/road-safety/183384-top-injuries-road-crashes-

philippines

K.Sy, (April 12, 2017), IN NUMBERS: Road crash incidents in the Philippines, from

https://www.rappler.com/move-ph/issues/road-safety/166151-road-crashes-philippines-

awareness-safety

K. Francisco, (October 27, 2015), Road deaths in PH: Most are motorcycle riders,

pedestrians, from https://www.rappler.com/nation/110789-road-safety-report-2015-who-

philippines
56

APPENDICE
APPENDIX A

GANTT CHART

Figure 9. This shows the research schedule to be considered while conducting the study
LEGEND:

Complete Task

To do Task
57

Appendix B

TOTAL BUDGETARY REQUIREMENTS

Account Description Amount


IR Proximity Module (includes sensor ₱ 250.00
and receiver)
Full-Face Helmet ₱ 950.00

Signal Booster ₱ 450.00

Finger Print Scanner ₱ 1000.00

Arduino UNO R3 ₱ 250.00

GPS Tracking Module ₱ 1195.00

TOTAL ₱ 4100.00
58

APPENDIX C

Evaluation Instrument

“The Development of a Key Helmet Authentication System with GPS Tracking

Module for Motorcycles in Metro Manila”

Name (Optional): ________________ Age: ___ Signature: _______________

Instruction: Please evaluate the prototype by using the given scale and placing a
checkmark (√) under the corresponding numerical rating.
Capability
I. Usability

Must be understood, learned, used and attractive to the 5 4 3 2 1

user, when used under specified conditions.


Use of color and the nature of the graphical design. 5 4 3 2 1
Enables the user to understand the software, and how it
5 4 3 2 1
can be used for particular tasks
Enables the user to learn its application. 5 4 3 2 1
II. Reliability

Maintains a specified level of performance when used 5 4 3 2 1


under specified conditions

Avoids failure as a result of faults in the software. 5 4 3 2 1


Recovers the data directly affected in the case of a
5 4 3 2 1
failure.
Maintains a specified level of performance in cases of
software faults or of infringement of its specified 5 4 3 2 1
interface.
III. Functionality
5 4 3 2 1
Provide functions which meet stated and implied needs
59

when the software is used under specified conditions.

Provides the right or agreed results or effects with the


5 4 3 2 1
needed degree of precision.
Provides an appropriate set of functions for specified
5 4 3 2 1
tasks and user objectives.
IV. Efficiency
Provides appropriate performance, relative to the 5 4 3 2 1
amount of resources used, under stated conditions.
Provides appropriate response and processing times
5 4 3 2 1
and throughput rates when performing its function.
Uses appropriate amounts and types of resources when
5 4 3 2 1
the software performs its function
Adheres to standards or conventions relating to
5 4 3 2 1
efficiency
V. Maintainability
Can be modified for corrections, improvements or
5 4 3 2 1
adaptation of the software to changes in environment,
and in requirements and functional specifications
Can avoid unexpected effects from modifications of the
5 4 3 2 1
software.
Can enable modified software to be validated 5 4 3 2 1
VI. Portability
5 4 3 2 1
Can be transferred from one environment to another
Adapted for different specified environments without
5 4 3 2 1
applying actions or means other than those provided
Can be installed in a specified environment. 5 4 3 2 1
Can be used in place of another specified software
5 4 3 2 1
product for the same purpose in the same environment.
60

APPENDIX

TEST CASE

Test No. Test Description Expected Actual Results Feedback


Results
SDO End User

Improvised Rider wears the IR sensor senses Fingerprint


Helmet improvised the head of the scanner lights
Helmet with the rider initializing up indicating
sensors the LED of the rider’s head
integrated. fingerprint was detected
scanner.

Finger print Rider places LED light would LED light lights
scanner finger in the light up and up and motor
scanner to motor will star spun
authenticate the simultaneously simultaneously.
rider and detect if fingerprint is
Unregistered
if registered. registered.
finger did
If else, nothing nothing.
happens.

GPS Tracking Motorcycle Longitude and Longitude and


Mobile owner opens the latitude is latitude of the
Application application and displayed in the GPS module is
tracks the application and displayed and
location of the location is also location shown
motorcycle displayed in a in the map
map fragment fragment in the
in the mobile
application. application.

This shows a series of tests that were undertaken and consulted to such system. This

study was demonstrated to IT professionals in consideration of the objectives of the study and

the expected outputs desired by the testers. The results of testing and evaluation will be used for

as test results based from objective testing.


61

APPENDIX E

SOURCE CODE

Helmet Arduino Uno

#include "FPS_GT511C3.h"
#include "SoftwareSerial.h"
const int ProxSensor=2;
int motorPin = 3;
int led = 13;
String inputString = ;
boolean stringComplete = false;
String commandString = "";
int x=0;
FPS_GT511C3 fps(4, 5);
void setup()
{
pinMode(ProxSensor,INPUT);
pinMode(led,OUTPUT);
Serial.begin(9600);
delay(100);
fps.Open();
delay(1000);
}
void loop()
{
if(digitalRead(ProxSensor)==LOW){
delay(200);
fps.SetLED(true);
if (fps.IsPressFinger())
{
fps.CaptureFinger(true);
int id = fps.Identify1_N();
if (id <200)
{
Serial.print("Verified ID:");
Serial.println(id);
digitalWrite(led, HIGH);
digitalWrite(motorPin, HIGH);
}
else
{
Serial.println("Finger not found");
}
}
else
{
Serial.println("Please press finger");
}
delay(100);
}
62

else{
delay(100);
fps.SetLED(false);
digitalWrite(led, LOW);
digitalWrite(motorPin,LOW);
}
if(stringComplete)
{
stringComplete = false;
getCommand();

if(commandString.equals("STAR") )
{
while (x!=1){
fps.SetLED(true);
x= Enroll();
}
}
if(commandString.equals("TEXT"))
{
String text = getTextToPrint();
fps.DeleteID(text.toInt());
Serial.println("ID SUCCESSFULLY DELETED");
}
if(commandString.equals("STOP"))
{
fps.SetLED(false);
}
if(commandString.equals("Bye"))
{
fps.DeleteAll();
}
inputString = "";
}
}
void getCommand()
{
if(inputString.length()>0)
{
commandString = inputString.substring(1,5);
}
}

String getTextToPrint()
{
String value = inputString.substring(5,inputString.length()-2);
return value;
}
void serialEvent() {
while (Serial.available()) {
char inChar = (char)Serial.read();
inputString += inChar;
if (inChar == '\n') {
stringComplete = true;
}
}
}
63

int Enroll()
{
// Enroll test
// find open enroll id
int enrollid = 18;
bool usedid = true;
while (usedid == true)
{
usedid = fps.CheckEnrolled(enrollid);
if (usedid==true) enrollid++;
}
fps.EnrollStart(enrollid);
// enroll
Serial.print("Press finger to Enroll #");
Serial.println(enrollid);
while(fps.IsPressFinger() == false) delay(100);
bool bret = fps.CaptureFinger(true);
int iret = 0;
if (bret != false)
{
Serial.println("Remove finger");
fps.Enroll1();
while(fps.IsPressFinger() == true) delay(100);
Serial.println("Press same finger again");
while(fps.IsPressFinger() == false) delay(100);
bret = fps.CaptureFinger(true);
if (bret != false)
{
Serial.println("Remove finger");
fps.Enroll2();
while(fps.IsPressFinger() == true) delay(100);
Serial.println("Press same finger yet again");
while(fps.IsPressFinger() == false) delay(100);
bret = fps.CaptureFinger(true);
if (bret != false)
{
Serial.println("Remove finger");
iret = fps.Enroll3();
if (iret == 0)
{
Serial.println("Enrolling Successful");
int a=1;
return a;
}
else
{
Serial.print("Enrolling Failed with error code:");
Serial.println(iret);
Serial.print("try again");
}
}
else Serial.println("Failed to capture third finger");
}
else Serial.println("Failed to capture second finger");
}
else Serial.println("Failed to capture first finger");
}
64

GPS MODULE
#include <TinyGPS++.h>
#include <SoftwareSerial.h>
#define BLYNK_PRINT Serial
#include <ESP8266WiFi.h>
#include <BlynkSimpleEsp8266.h>
static const int RXPin = 4, TXPin = 5;
static const uint32_t GPSBaud = 9600;
TinyGPSPlus gps;
WidgetMap myMap(V0);
SoftwareSerial ss(RXPin, TXPin);
BlynkTimer timer;
float spd;
float sats;
String bearing;
char auth[] = "c98768c4c60c45b5bb1f0a1e2f358a26";
char ssid[] = "wifi123";
char pass[] = "123456";
unsigned int move_index = 1;
void setup()
{
Serial.begin(115200);
Serial.println();
ss.begin(GPSBaud);
Blynk.begin(auth, ssid, pass);
timer.setInterval(5000L, checkGPS);
}
void checkGPS(){
if (gps.charsProcessed() < 10)
{
Serial.println(F("No GPS detected: check wiring."));
Blynk.virtualWrite(V4, "GPS ERROR");
}
}
void loop()
{
while (ss.available() > 0)
{
if (gps.encode(ss.read()))
displayInfo();
}
Blynk.run();
timer.run();
}
void displayInfo()
{
if (gps.location.isValid() )
{
float latitude = (gps.location.lat());
float longitude = (gps.location.lng());
Serial.print("LAT: ");
Serial.println(latitude, 6);
Serial.print("LONG: ");
Serial.println(longitude, 6);
Blynk.virtualWrite(V1, String(latitude, 6));
Blynk.virtualWrite(V2, String(longitude, 6));
65

myMap.location(move_index, latitude, longitude, "GPS_Location");


spd = gps.speed.kmph();
Blynk.virtualWrite(V3, spd);
sats = gps.satellites.value();
Blynk.virtualWrite(V4, sats);
bearing = TinyGPSPlus::cardinal(gps.course.value());
Blynk.virtualWrite(V5, bearing);
}
Serial.println();
}
66

RESEARCHERS’
PROFILE
67

Vous aimerez peut-être aussi