Professional Documents
Culture Documents
I declare that to the best of my knowledge that this project has been done by myself and has not
been copied from anywhere else.
Prepared by:
Abdallah Yahaya Hussein
Supervisor:
PHILLYMON L.T.Y
ABSTRACT
The purpose of this project is to reduce theft incidence by providing an automatic detection of
burglars for the building at Kibamba residential house. The detection will be provided by
infrared sensors to detect the presence of burglars near the building at the required time. The
signal will be sent to initiate the buzzer at the security Control room after the burglar being
detected. Then the Camera will continuously store the video events.
ii
ACKNOWLEDGEMENT
I would like to thank all lectures and colleagues of Electrical Engineering Department of Dar es
salaam Institute of Technology for their assistance, advices and cooperation, which made this job
to be the fulfilled. My special thanks are given to my supervisor Mr. Phillymon .l. Yacobo who
gave me great cooperation from the beginning to the end of this project, also a project
coordinator who gave the time table of the project in the right time from the beginning to the end
of this project.
iii
TABLE OF COTENTS
DECLARATION ............................................................................................................................. i
ABSTRACT .................................................................................................................................... ii
ACKNOWLEDGEMENT ............................................................................................................. iii
TABLE OF COTENTS.................................................................................................................. iv
LIST OF TABLES ....................................................................................................................... viii
LIST OF FIGURES ....................................................................................................................... ix
ABBREVIATIONS ........................................................................................................................ x
CHAPTER ONE ............................................................................................................................. 1
INTRODUCTION .......................................................................................................................... 1
1.0 Background Information ....................................................................................................... 1
1.1 Problem Definition. ............................................................................................................... 2
1.2 Project Objectives. ................................................................................................................ 3
1.2.1 Main Objectives. ............................................................................................................. 3
1.2.2 Specific Objectives ......................................................................................................... 3
1.3 Methodology ......................................................................................................................... 4
CHAPTER TWO ............................................................................................................................ 5
LITERATURE REVIEW ............................................................................................................... 5
2.1 Introduction ........................................................................................................................... 5
2.2 Hardwire Security System..................................................................................................... 5
2.3 Operation of Existing System ............................................................................................... 6
2.3.1 Existing System .............................................................................................................. 7
2.3.2 Photocells........................................................................................................................ 7
2.3.3 Relay ............................................................................................................................... 8
2.3.4 Choosing a relay ............................................................................................................. 9
2.4 Alert Systems ...................................................................................................................... 10
iv
vi
.................................................................... 32
vii
LIST OF TABLES
viii
LIST OF FIGURES
ix
ABBREVIATIONS
CCTV
CPU
PIR
IDS
RAM
EPROM
DAC
CHAPTER ONE
INTRODUCTION
1.0 Background Information
Security is the protection of a person, organization or country against threats such as
crime/attacks or is the group of people responsible for protecting a building or is a combination
of measure human and material resource intended to safeguard acts of unlawful interference.
Therefore with well-organized security system people lives comfortable and safely peace minded
the situation which makes them to be able to perform their responsibilities nicely and so raising
their personal developments and then contributing to the country economics Security is a
measure taken to guarantee the safety of a person, property or organization. The types of
protection include prevention, response and pre-emptive attacks. There are three areas that can
be attacked by criminally minded people; these are people, property or organizations, Protection
against an attack and sometimes making a preemptive attack on suspected threats. Prevention
against an attack includes making it difficult for someone to attack and displaying the
willingness to counter-attack. Reasons for such an attack may be for revenge, financial gain,
political or religious motives, for thrills, or to avoid getting caught, security is a protection. A
person, property or organization may be vulnerable to an attack. Motivation to attack includes
revenge, money, a cause or even thrills Security in these days of rising crime rates, more and
more people are becoming security minded. Electronic security devices can be installed to give a
view of areas that are vulnerable to attack. (Brookes, 2001).
Sensor is a virtual part of any alarm system, these is the guardian that responds to any
disturbance caused by an intruder and trigger the main alarm circuit. Having done this, they play
further part in operation as the latching circuit in the control unit take over to keep the alarm
sounding, hence any attack on the sensor or its wiring, after the alarm has sounded is of no avail
in silencing the system, (Vivian 1999)
We live in a much unsecured world, dominated by robbery and crime. Due to the pronounced
differences between the classes of a society, culture conflicts and various other factors,
1
worldwide crime rates have known an exacerbated increase in the last decades, rendering modern
society a very unstable and unsafe environment. Every day we hear about all sorts of crime,
robberies and theft, making us doubts the safety of our homes, possessions and even our lives.
Due to all this security system are needed.
People are feeling and more insecure inside their homes these days and they reinforce their doors
and windows, install extra door locks, and even buy guard dogs to provide them protection.
However, it is very important to note that experienced robbers can easily break through to a wide
range of home defenses, also it seems that most of robberies and burglaries take place while the
owner are at home, exposing the home owner and families to a serious risk. To minimize these
problems, electronic security system is very important. In present, the only effective means to
protect your homes against robbers is to install a reliable home security system. Only after you
have equipped your home with an efficient alarm system you can actually feel more than 80
percent safe inside your home.
having any information of the remaining parts of the house. Due to human (security guard)
weakness (thus, frustration, physiological or fall asleep), thieves may enter the building without
being identified or even known. As a result the intruder may utilize these chances to steel in
comfortable, causes a lot of damage or sometimes may kill them. Having a photo sensor as a
helping tools in security, also is not a guarantee of total security since it senses the intruder who
is already close to the protected area so if he/she is well equipped can do what he/she desire.
To design a circuit that will detect the presence of a person during the night
To build a prototype
To test a prototype.
1.3 Methodology
In order to accomplish this project the following methods will be used
Literature reviews
Data collection
Data analysis
Report writing
Oct
Nov
Dec
Jan
Feb
Mar
Apr
May
Jun
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
This chapter gives the review on the concept of existing system and the other researchers on
security system.
A lot of study and research has been involved in creating security systems over time including
alert systems, alarms systems, surveillance systems, and GSM tracking systems etc. This chapter
aims to critically review a few of these works.
systems can be updated to work with wireless sensors- making it a Hybrid wired/Wireless system
as describe below
There are many hardwired security kits, pre-configured to meet anyones needs a home security
system consists of many different sensors type Each accomplishing a difference in price, overall
security.
known. As a result the intruder may utilize these chances to steel in comfortable, causes a lot of
damage or sometimes may kill them.
2.3.1 Existing System
base current to turn the transistor on and off, as you can see from diagrams A and B. In A, NPN
transistor Q1 (say a BC337 or BC338) is being used to control a relay (RLY1) with a 12V coil,
operating from a +12V supply. Series base resistor R1 is used to set the base current for Q1, so
that the transistor is driven into saturation (fully turned on) when the relay is to be energized.
That way, the transistor will have minimal voltage drop, and hence dissipate very little power, as
well as delivering most of the 12V to the relay coil. [3]
= Normally Closed, COM is connected to this when the relay coil is off.
Supply Voltage
Coil resistance
For example: A 12V supply relay with coil resistance of 400 passes a current of 30mA. This is
okay for 555 timers IC. This almost is going to be used in the fire alarm system using GSM
cellular phone.
IV. Switch rating (voltage and current)
The relays switch contacts must be suitable for the circuit they are to control. Voltage and
current rating should be checked regularly, usually the voltage rating is high for AC, for
example 5A at 24V DC or 125V AC. [4]
Detection
Medium
system
Manageme
nt system
GSM
module
Wireless
communication
Immediate
security
measure
Owner
of asset
simple SMS command that shuts off the engine of the car. The system, which is easy to install,
can be operated through use of mobile (SMS)/E-mail/telephone. In case of multiple authorized
users, all such users will receive information. The system response is immediate and the
authentic user will immediately receive the message, even if he is located anywhere in the world.
This system efficiently alerts the user of an intruder in his car and the user can immobilize the
car. This project would apply a similar technology to security and surveillance of a building.
2.4.3 Using Telephones for Alert Systems
The telecopy project uses a telephone system for an audio surveillance system. The telephone
system makes a call and gives virtual ears to the users so that they can hear what is going on in
their homes. The system uses a motion sensor and a microphone. The Motion Sensor: The
Telecopys motion sensor is PIR or Passive Infrared Technology. The passive infrared sensor
detects changes in the room's heat signature due to occupant motion. The range is in excess of
9m at which point the width is about 6m, creating about a 45 degree wedge beyond the sensor
origin.
It will be used at any area where the security system is not reliable.
11
12
(Random access memory), ROM (read-only memory), I/O (input/output) lines, control unit,
serial and parallel ports, timers, and sometimes other built-in peripherals such as analog to digital
(A/D) analogue comparator and digital to analog (D/A) converters (John Iovine, 2000)
The features of a microcontroller are described in detail as follow;
2.5.4 Central Processing Unit
The central processing unit (CPU) is the part of a microcontroller that is used to run a program
(Executes program instructions) it consists of control unit and arithmetic unit (Timoth J. Leary
and Linda I. oLeary, 2008).
2.5.5. Microcontroller Memories
The microcontroller has two types of memory that are EPROM (Electrically Programmable Read
only Memory) and Random Access Memory (RAM). EPROM is where we store written
program. This kind of memory is non-volatile and is not affected with the absence of power.
During execution of the instructions all the manipulation of data is done in the registers, this kind
of memory is known as Random Access Memory (RAM) and is volatile memory, meaning that
data are lost with the absence of power (www.wikipedia.org).
2.5.6 Input Lines.
The input lines to a microcontroller are used to receive signal from input components. The input
components consists of digital devices such as switches, push buttons and analogue sensors such
as light dependent resistors, thermistor, gas sensors, pressure sensors and any type of sensor or
Input from any source.
2.5.7 Control Unit.
The microcontroller will monitor the inputs and as a result the program would turn output ON
and OFF. The microcontroller stores the program in its memory, and executes the instructions
under the Control of the clock circuit.
2.5.8 Output Lines.
The output lines are used to send the executed output to the output devices. In my project, the
output will be sent from a microcontroller to a CCTV.
13
outside, this
is
due to
the availability of
a microcontroller.
(www.wikipedia.org).
The most obvious consideration is how many digital inputs, analogue inputs and outputs
does the system require. This specifies the minimum number of I/O the microcontroller
must have.
The next consideration is the size of the program memory we need. This is very
important feature as one would find discarding a microcontroller for the reason that it
does not suite the capacity required.
Clock frequency, this determines the speed at which the instructions are executed. This is
important for any long execution of a program. With the higher frequency the
microcontroller will finish one task and start another.
Number of interrupts and timer circuits required, for instance, how many number of data
EEPROM is needed.
14
Modern cameras can provide high definition coverage in all types of visibility during both day
and night. Infrared and thermal imaging improves target detection and recognition. When
coupled with image becomes a very effective sensor in its own right and a supplier of essential
identifies information.
CCTV sensors can be remotely controlled in three axes, pant, tilt and zoom and they can accept
designation from other sensor information such as Radar, RDF and AIS and continue to track the
designated target. CCTV (Closed Circuit television) system can protect our property in case an
intruder picks your house. Close Circuit means only you have to access to footage your camera
system. Operating with CCTV system at any area store understands convenience of owning a
powerful camera system and thats why we carry the numerous options of camera systems. 2camera systems, 16-camera systems, Digital Video Recorders that store footage for weeks,
wireless cameras, and camera built with infrared, dome and bullet styled camera system, smart
phone monitoring, and touch screen television monitoring- our selection of kits will suit any
circumstances of your protection and needs. Surveillance camera system can be simple or
elaborate, but ultimately they all save the same purpose. Security camera Store has many
surveillance accessories to choose from. Accessories housed in our warehouses include camera
cable & bracket, CCTV warning signs, connectors& adapters, DVR lock boxes & brackets,
monitor brackets & accessories, and tools.
Although many surveillance kits come with accessories it will likely be necessary to make
addition purchases. Thats because installing a surveillance system will take special tools and
equipment and if you dont have already these items in advance you will need to get them before
you can complete installation.
One of the most time consuming steps of setting up and installing your security system will be
dealing with wire and cables. Thats why you should first make sure that you buy the right cable
and next make sure that you have the proper tools to cut cable and tuck it away. Such tools
include a wire stripper and staple gun.
15
2.9. Sensors.
A sensor is a type of transducer which uses one type of energy, a signal of some sort, and
converts it into a reading for the purpose of information transfer. A mercury thermometer is an
example of a sensor that convert the expansion and contraction of volume of mercury in response
to change in temperature (the signal), to a reading on a calibrated glass tube giving information
about ambient temperature. Other sensors such as a thermocouple produce an output voltage or
other electrical output which may be attached to ammeter for reading a change or interpreted by
another device (such as a computer).for accuracy in the application a calibration of the sensor
and its output information is necessary.
Sensors are used in everyday objects such as touch-sensitive elevator buttons and lamps which
dim or brighten by touching the base. There are also innumerable applications for sensors of
16
which most people are never aware. Applications include automobile, machines, aerospace,
medicine, industry, and robotics.
Sensor's sensitivity indicates how much the sensor's output changes when the measured quantity
changes. Sensors that measure very small changes must have very high sensitivities.
Technological progress allows more and more sensors to be manufactured on microscopic scale
as micro sensors using MEMS technology. In most cases, a micro sensor reaches a significantly
higher speed and sensitivity compared with macroscopic approaches.
Because sensor is a type of transducer they change one form of energy into another. For this
reason, sensors can be classified according to the type of energy transfer that they detect.
2.9.1 Passive Infra-Red Sensor
The PIR Sensor detects motion up to 6m away by using a Fresnel lens and infrared-sensitive
element to detect changing patterns of passive infrared emitted by objects in its vicinity.
Inexpensive and easy to use, it's ideal for alarm systems, motion-activated lighting, and holiday
props. The PIR Sensor is compatible with all Parallax microcontrollers.
2.9.2 Pir-Based Motion Detector (PID).
A passive infrared sensor (PIR sensor) is an electronic sensor that measures infrared (IR) light
radiating from objects in its field of view. They are most often used in PIR-based motion
detectors.
2.9.3 Operating Principles of Pir
All objects with a temperature above absolute zero emit heat energy in the form of radiation.
Usually this radiation is invisible to the human eye because it radiates at infrared wavelengths,
but it can be detected by electronic devices designed for such a purpose.
The term passive in this instance refers to the fact that PIR devices do not generate or radiate any
energy for detection purposes. They work entirely by detecting the energy given off by other
objects. It is important to note that PIR sensors don't detect or measure "heat" per se; instead they
detect the Infrared radiation emitted from an object which is different from but often
associated/correlated with the object's temperature (e.g., a detector of X-rays or gamma rays
17
would not be considered a heat detector, though high temperatures may cause the emission of X
or gamma radiation).
to
Hz or 1000 to
Table 2.1
Number
Refraction
Penetration
75
84
56
70
42
60
50
18
For indoor application these problem do not apply but losses are incurred at each refraction or
glass penetration. These reduce the range as shown in table 2.1 above. More than three
reflections reduce the range to 30% and are not recommended.
2.10 Calibration
The PIR Sensor requires a warm-up time in order to function properly. This is due to the
settling time involved in learning its environment. This could be anywhere from 10-60 seconds.
During this time there should be as little motion as possible in the sensors field of view. There is
a variable resistor (Delay Time) on the PIR sensor to control the ON delay time for the sensor.
Turning the variable resistor clockwise will give longer ON delay time while turning
anticlockwise with reduce the ON delay time.
2.11 Sensitivity
The PIR Sensor has a range of approximately 5 meters. The PIR sensor can sense object up to
120 within 1 meter range. The sensitivity can vary with environmental conditions. The sensor is
designed to adjust to slowly changing conditions that would happen normally as the day
progresses and the environmental conditions change, but responds by making its output high
when sudden changes occur, such as when there is motion.
19
CHAPTER THREE
METHODOLOGY
3.1 Introduction:
To achieve the objectives of this project the PROTOTYPING method is used as a framework to
structure the plan and development of the system.
The following are procedures in which some of them have already been used and others have to
be taken in order to accomplish the project:
a. .Literature review.
Consultation from project supervisor and other professionals from the relevant
field.
site visit
b. Design circuit.
c. Simulation of circuit.
d. Implementing and testing the circuit.
20
Power supply.
Sensor.
Switching mechanism.
Relay/contactor.
The data collected will determine the proper selection of the components to be used in the
circuit.
3.4 Simulation:
Different parts of this system after design were simulated in order to observe results of each part
before implementing the complete circuit.
The simulation of the circuit and the analysis of the result have been done in this part of the
project and the available software used to fulfill the requirements.
21
CHARTER FOUR
DATA COLLECTION
The data collected are information about proposed project for use in evaluation, which will
determine project effectiveness. It describes some situation from which conclusion can be drawn.
The following are data which were collected from House no 223
Height of the fence 3m, 1.5m is solid wall and 1.5m square frame attached on top of that
solid wall and supported by concrete beams
HOUSE
Length m
80
16
Width m
50
12
Height m
5m
Rear
3m
Side 1 right
4m
Side 2 left
5m
22
Operating
Current
voltage
Detecting
Operating
range(feet)
temperature
D203B
3-15 Volts
<100A
Up to15ft
25C
D203S
3-15 Volts
<100A
Up to15ft
25C
D203X
3.3-5 Volts
<100A
1-15ft
0C to50C
500GB, 1000GB
Monitor
Coaxial cable without power
RG59CP,100M,750Ohms,
Table: 4.4 Specification of camera.
Construction
6-24volts ,50 Hz
Flying
10mA
amperes
to
leads
Resonance frequency
Up to 110dB
1500- 2kHz
PCB
several mount
electromechanical
23
Value
Flash
Number of pins :
40
Clock speed :
48 MHz
Program memory
32
(kB)
CPU speed (MIPS) :
12
RAM Bytes :
2048
256
Mounting type :
Through hole
(2.00 5.50)V
24
25
CHARTER FIVE
DATA ANALYSIS
5.1 INTRODUCTION:
In this design the necessary technical data were collected and will be used in the design stage,
from the fact that any design process there must be some data which are supposed to be collected
in order to achieve the design requirement. The analysis of the collected data has to be done in
this second part of the project. During the process of data collection, data were obtained through
the following methods:
From the project site.
Through literature review.
(I)
PIV
(iv)
Where;
= ripple factor which is about 3.9% for the bridge rectifier.
26
+ (v)
Note that
above from
27
28
29
props. The PIR Sensor is compatible with all Parallax microcontrollers. Passive infrared sensor is
a good because it detects heat from a body of a person.
30
R7=1290
But standard resistance which is available=1k
Let R7=1k.
32
33
34
CHAPTER SIX
RESULTS AND DISCUSSION
6.1 Introduction
This chapter describes how the testing was carried out and what found from the test. Both
simulation and implementation have been done. Simulation has been done in PROTEUS 7
Professional while the program was written in Micro Basic language in the Micro Basic compiler
for PIC.
35
36
37
38
6.7 Conclusion
The result of simulation shows the successfulness of the design, and prototype built will reveal
and satisfies the security of the house and by how much the optimal performance of the security
system has been achieved.
It is not easy by now to state for how much the reliability of the system is, since all what
happened have been carried out virtual. But during the real implementation of the system I think
the result will be the same since the modelling, simulation, and prototyping are the key and
fundamental procedures in designing of any system in the field of engineering.
Shortly, we can conclude that the main objective as well the stated specific objectives have been
achieved and the system is suitable to be installed in the particular area as prescribed in the first
presentation of the title of this project.
39
This system cannot only benefit that particular house, but also the other houses, companies,
where security is not reliable
Recommendations
This circuit should be taken into consideration so as to reduce if not to eliminate the problem of
theft that will help the society to stay safely within their place.
It is recommended that there should be the regular corrective maintenance and preventive
maintenance to ensure the required system performance; this is because the system is operating
automatically so it does not require the existing of the operator most of the time.
40
ITEM
QTY
PRICE
TOTAL PRICE
1.
1pc
5000/-
5000/-
2.
Relay
2pc
3000/-
6000/-
3.
Variable Resistor
2pc
1000/-
2000/-
4.
Resistor 1/4W
10pcs
800/-
8000/-
5.
Polarized Capacitor
4pcs
500/-
2000/-
6.
Soldering wire
1reel
3500/-
3500/-
7.
Jumper
2m
1000/-
2000/-
8.
Soldering gun
1pc
10000/-
10000/-
9.
Soldering pump
1pc
5000/-
5000/-
10
Transistor (NPN)
2pc
1500/-
3000/-
11.
Transformer (12V)
1pc
5000/-
5000/-
12.
Infrared sensor
1pc
39000/-
39000/-
13.
7 copies
6000-
42000/-
14.
Bridge rectifier
1pc
3000/-
3000/-
15.
Regulator LM7812
1pc
4500/-
4500/-
16
Regulator LM7805
1pc
4500/-
4500/-
17
PIC
1pc
40000/-
40000/-
18
Display
1Pc
30000/-
30000/-
Subtotal costs
260600/-
52120/-
Grand total
312720
41
sound(){
for(sound1=0;sound1<4;sound1++){
for(sound2=0;sound2<2000;sound2++){
portc.f2=~portc.f2;
delay_us(500);
}
sound2=0;
}
}
void addf(){
char txt0[16]="";
x=PortD;
42
if(x!=hold){
if(portD.F0 || portD.F1 || portD.F2 || portD.F3){
strncpy(txt0,"Sector ",7);
if(portD.F0){
strcat(txt0," A");
}
if(portD.F1){
strcat(txt0," B");}
if(portD.F2){
strcat(txt0," C ");} if(portD.F3){
strcat(txt0," D ");}
lcd_cmd(_lcd_clear);
Lcd_out(1,1,txt0);
//lcd_cmd(_lcd_clear);
Lcd_out(2,1,"Alert!!!");
LatC.F0=1;
}
else{
lcd_cmd(_lcd_clear);
Lcd_out(1,1,"SECURITY SYSTEM");
Lcd_out(2,1," ACTIVATED");
LatC.F0=0;
}
hold=x;
//delay_ms(1000);
43
}
}
void main() {
TRISC=0X80;
portc=0x00;
TRISB=0X00;
TRISD=0X0f;
PORTD=0X00;
PORTB=0X00;
//INTCON=0XC0;
CMCON = 0x07; // Disable comparators
TRISa0_bit = 1;
lcd_init();
delay_ms(500);
lcd_cmd(_lcd_cursor_off);
lcd_cmd(_lcd_clear);
Lcd_out(1,1,"SECURITY SYSTEM");
Lcd_out(2,1," ACTIVATED");
delay_ms(50);
do{
temp_res = ADC_Read(0);
44
45
REFERENCES
Electrical Circuit Theory and Technology, John Bird, BSc(Hons), CEng, MIEE,FIEIE,
CMath, FIMA, FCollP, Revised second edition, Oxford OX2 8DP 200 Wheeler Rd,
Burlington, MA 01803
ELECTRIC POWER SYSTEMS, B.M. WEEDY, 3rd Edition, JOHN WILEY & SONS;
New York (1987); pg. 488.
Vivian Capel. (1999), Security systems & Intruder Alarms, Second Edition.
Mike Tooley (2006), Electronic circuit Fundamental and Application Newes sterdam. pg.
122-131
India
46