report file on security alarm project

39
SUMMER TRAINING PROJECT REPORT On SECYRITY ALARM SYSTEM Electronics And Communication HOME SECURITY ALARM SYSTEM 1

Upload: anamika-yadav

Post on 28-Mar-2015

3.931 views

Category:

Documents


49 download

TRANSCRIPT

Page 1: report file on security alarm project

SUMMER TRAINING PROJECT REPORTOn

SECYRITY ALARM SYSTEM

Electronics And Communication

HOME SECURITY

ALARM SYSTEM

1

Page 2: report file on security alarm project

TABLE OF CONTENT

1. COVER PAGE

2. INDEX

3. CERTIFICATE

4. ABSTRACT

5. ACKNOWLEGMENT

1

3

5

6

7

2

Page 3: report file on security alarm project

6. LIST OF TABLES

7. LIST OF FIGURES

8. LIST OF ABBREVIATIONS

i. CHAPTERS

ii. INTRODUCTION

iii. PURPOSE/AIM

iv. IDEA OF PROJECT

v. BLOCK DIAGRAM

vi. HARDWARE DETAILS

a. CENTRAL UNIT

b. PIR SENSOR

c. MAGNETIC SENSOR

d. GSM KIT

vii. ACCURACY AND SAFETY

viii. USABILITY

ix. CONCLUSION

1. EXPECTATIONS AND IMPROVEMENTS

2. FUTURE REFERENCES

9. APPENDICES

I. APPENDIX – I

II. APPENDIX – II

III. APPENDIX - III

10. REFRENCES

8

9

10

11

12

13

14

15

17

19

22

25

25

26

26

27

28

3

Page 4: report file on security alarm project

11. PERSONNEL FEEDBACK ABOUT THE TRAINING

CERTIFICATE

I here by certify that the work is being presented in the thesis report

entitled, “Security Alarm System”, submitted by me in fulfilment of the

requirements for the project work of degree of Batcher’s of Technology in

Electronics And Communication at Bhagwan Parshuram Institute of

Technology, Sec-17, Rohini, is a authentic record of my own work carried

out under the supervision of Mr. Vinay Chadha and refers other

4

Page 5: report file on security alarm project

project’s / researcher’s works which are duly listed in the reference

section.

The matter presented in this thesis has not been submitted for the award

of any other degree of any university.

(Student Name)

This is to certify that the above statement made by the candidate is

correct and true to the best of my knowledge.

Name of Project Guide

Designation

Name of the Department

Organisation Address

5

Page 6: report file on security alarm project

ACKNOWLEDGEMENT

No volume of words is enough to express my gratitude towards my guide <Guide Name>, Designation, <Department>, <Address>, who has been very concerned and has aided for all the materials essential for the preparation of this thesis report. She has helped me to explore this vast topic in an organized manner and provided me with all the ideas on how to work towards a research-oriented venture.

I am thankful to my mentor <Mentor name>, Designation, <Department>, <HOD Name>, Head of the Department, and Mr. R K Tiwari, Head Training and Placement, BPIT for the motivation and inspiration that triggered me for the thesis work.

I would also like to thank the staff members and my colleagues who were always there at the need of the hour and provided with all the help and facilities, which I required for the completion of my thesis work.

I am very much grateful to Prof. A K Tandon, Director BPIT for his valuable support at the Institution Level for giving me the opportunity for pursuing this B.Tech course and help in conceptualising the project/research work and to all those outstanding individuals with whom I have worked in this Institution, who helped me understanding the concept.

Most importantly, I would like to thank my parents and the almighty for showing me the right direction out of the blue, to help me stay calm in the oddest of the times and keep moving even at times when there was no hope

<Student Name>

Branch

Enrolment No.

Class Roll. No

6

Page 7: report file on security alarm project

ABSTRACT <Make it as per your work>

For any work of literature, a fundamental issue is to identify the individual(s) who

wrote it, and conversely, to identify all of the works that belong to a given individual or to

identify the individual who writes many papers on same topic or to identify the topics name

that an author works on.

Information extraction techniques (such as Author Name and Topic Recognition)

have long been used to extract useful pieces of information from text. The types of

information to be extracted are generally fixed and well defined. However in some cases, the

user goal is more abstract and information types cannot be narrowly defined. For example, a

reader of online user reviews typically has the goal of making a good choice and is

interested to learn about the different aspects of a topic and author relation (e.g., famous

author of a topic, author’s papers with his research field). Some of these aspects may be

known by the reader and some others may need to be discovered from the inherent text

structure in a large collection. Even for the known aspects (such as “author name” and

“topic”), the challenge is to recognize various hidden aspects like number of papers written

by an author, his research field, popularity of an author.

In this thesis, we model the author-topic information discovery system as topics with

identifiable word distributions across documents. We review several probabilistic graphical

models (such as Latent Dirichlet Allocation) and propose a new model which is based on

frequency of the words within the document. We also provide a case study of a probability

based author-topic model developed for information discovery.

7

Page 8: report file on security alarm project

LIST OF TABLES

Table 1: PIR Specifications……………………………………………………………………..18

Table 2: AT Command ………………………………………………………………………….24

8

Page 9: report file on security alarm project

LIST OF FIGURES

Figure 1: General Setup for Remote File Syncronization………………………………….........……13

Figure 2: AT MEGA board(1280)………………………………………………..……………………….........…15

Figure 3: PIR sensor………………………………….…………………………………….........………...........…17

Figure 4:connections of PIR………………………………………………………...................…...............18

Figure 5: magnetic switch ..................................……………………………………….............……..19

Figure 6: GSM and GPRS kit...........................................................………………………………..23

9

Page 10: report file on security alarm project

LIST OF ABBREVIATION

LCD LIQUID CRYSTAL DISPLAY

PIR PASSIVE INFRARED SENSOR

GPRS GENERAL PACKET RADIO SERVICE

GPS GLOBAL POSITIONING SYSTEM

MCU MICROCONTROLLER UNIT

SMS SPEED MESSAGE SERVICE

LED LIGHT EMMITING DIODE

PWM PULSE WIDTH MODULATION

SIM SUBSCRIBER IDENTIFY MODULE

PCMCIA

AT

10

Page 11: report file on security alarm project

INTRODUCTIONThis is a digital home security system with alarm feature which can monitor password for entrance, magnetic door lock and motion detector.The goal of this project is to utilize the after-market parts and build an integrated home security system. we have also incorporated password and magnetic lock for door and motion sensor. Hence the security system will sound an alert when there is an attempt of break-in. The system is fully digital and also be fully customized. It incorporated a 16x2 LCD display with a keypad,PIR sensor and magnetic door lock. However we have used a keyboard instead of keypad for cost facility. Each sensor can be enabled or disabled. Electronic alarms designed to alert the user to a specific danger by sounding a loud buzzer.

However we have included the GPRS and GPS system in our project as future reference because they will enhance the capability of the system by sending the threat message to the house owner and local police of the intruder’s break-in house to inform them immediately wherever they are.

Sensors are connected to a control unit via low-voltage wiring used to interact with a response device.

11

Page 12: report file on security alarm project

AIM/PURPOSE

Aim of the project is to investigate a cost effective solution that will enable home security against intrusion in the absence of home owner.

12

Page 13: report file on security alarm project

PROJECT IDEAThe idea of our project comes from the fact that security system is quite basic and only offers simple password lock. Hence we would like to enhance our security system with different kinds of sensors.

13

Page 14: report file on security alarm project

MCU(Arduino Mega Board 1280)

KeyboardMagnetic sensor (Connected to the door )

Buz-zer

PIR sensor(for human detection)

LED

BLOCK DIAGRAM

14

Page 15: report file on security alarm project

Fig 1:block diagram

The block diagram of our system is shown above. The central unit will handle all the sensors and keyboard and input, output information toLCD screen, indicate system status on LED and buzze

HARDWARE DETAIL1. Central Unit

The control panel(central unit) can be called as the “brain" of the security system, and operates as the central computer.

Various sensors are connected to the control panel from locations throughout the home.

If sensors detect a problem, control panel cause an appropriate alarm output.

The central unit used in our program is Arduino AT mega board. It has a MCU no. 1280.

15

Page 16: report file on security alarm project

Fig 2:Arduino ATMega board(1280)

Arduino board is connected to the PC via USB port through serial port. It provide a 5v signal and other digital input, analog input, PWM output.The microcontroller used is ATMEGA 1280.

16

Page 17: report file on security alarm project

2. PIR motion sensor

The Passive Infrared Detector works through detecting the human bodies infrared spectrum.

The sensor receives infrared rays given off by the human body and outputs signals after computing to the central unit for further action to be taken.

This Technology detector combined with microwave and passive infrared intelligence, adopting advanced signal analysis technology, can avoid various kinds of false

17

Page 18: report file on security alarm project

alarms under worse environment and proper installation can avoid dead zones.

Fig 3:PIR sensor

Specifications of PIR Sensor-

1.pin specifications

PIN CONNECTIONSOut Gives output+ Connect to V supply-(gnd) Connect to groundTable 1

2. Other specification-

18

Page 19: report file on security alarm project

Range- 20 feet

Dimensions- 32.2 * 24.3 * 25.4 mm

Cost- Rs 450

Fig 4:Connections of PIR

3. Door/Window Magnetic Sensor

This is usually accomplished with a non-contact switching system using a sintered alnico magnet and a reed switch.

The presence of the magnetic field passing through the conductors of the switch causes them to pull together, closing the circuit.

19

Page 20: report file on security alarm project

When the magnet is moved away from the switch, the circuit opens. Closed circuit indicates the closed door/window and

Releases the reed switch when the door/window is opened and triggers an alarm at the same time.

Fig 5:magnetic sensor(reed switch)

SPECIFICATIONS OF REED SWITCH-

20

Page 21: report file on security alarm project

CIRCUIT FOR REED SWITCH

Arduino (1x)

Reed Switch (1x)

10K Resistor (1x)

Breadboard (1x)

LED (1x)

21

Page 22: report file on security alarm project

Magnet(1x)

Wires (MISC.)

first connect a LED to pin 13 and Ground on the breadboard.

Now connect Arduino 5 volt and ground to its own buses. Then insert your reed switch onto your bread.

Now connect a 10K resistor from 5 volts to the reed switch

Connect Digital Pin 2 of the Arduino board where you connected your 10K resistor to the reed switch. Finally, connect the other pin of the reed switch to ground

The circuit diagram for reed switch is attached in appendix 1.

4.GSM module

A GSM modem is a wireless modem that works with GSM networks.

22

Page 23: report file on security alarm project

A GSM modem can be an external unit or a PCMCIA card (also called PC Card). An external GSM modem is connected to a PC through a serial cable, a USB cable, Bluetooth or Infrared. Like a GSM mobile phone, a GSM modem requires a SIM card from a wireless carrier in order to operate

PC use AT commands to control a modem. GSM modems support an extended set of AT commands. These extended AT commands are defined in the GSM standards. With the extended AT commands, you can do things like: Read, write and delete SMS messages. Send SMS messages. Monitor the signal strength. Monitor the charging status and charge

level of the battery. Read, write and search phone book

entries.

23

Page 24: report file on security alarm project

Fig 6:GPRS and GPS kit

24

Page 25: report file on security alarm project

If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per minute may be achieved. This is much faster than SMS over GSM. A GPRS modem is required to send and receive SMS via GPRS. Some wireless carriers do not support the sending and receiving of SMS via GPRS. A GPRS modem is typically required for MMSA GSM modem can be an external modem device, such as the Siemens MC35 or Wavecom FASTRACK external modems. Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer

Command Description

AT+CMGD DELETE SMS MESSAGEAT+CMGF SELECT SMS MESSAGE FORMATAT+CMGL LIST SMS MESSAGES FROM PREFERRED STOREAT+CMGR READ SMS MESSAGEAT+CMGS SEND SMS MESSAGEAT+CMGW WRITE SMS MESSAGE TO MEMORYAT+CMSS SEND SMS MESSAGE FROM STORAGEAT+CMGC SEND SMS COMMANDAT+CNMI NEW SMS MESSAGE INDICATIONS

Table 2:AT command

25

Page 26: report file on security alarm project

ACCURACY AND SAFETYAfter the user enables the security system, the green status LED will lid to indicate the system status. User can now enter proper password to unlock the system. If any sensor goes wrong, the LCD will output error. Magnetic switch attached at the door will keep the door closed as long as password is incorrect. If password entered is correct then sensors will be disabled else all will remain enabled and if any intruder tries to break-in house without correct password, immediately the buzzer will buzz out loudly to inform about the intruder.

26

Page 27: report file on security alarm project

USABILITYOur home security system is very practical. It can be used not only in the home environment but also in a business environment too. It can monitor the surrounds to not only protect our properties but also our lives. Besides, it can be highly customized to suit each one's need and preference. So our security system is very useful for us as well as other people. We believe every house in the world should equip a security system like the one we design.

27

Page 28: report file on security alarm project

CONCLUSIONSExpectation and ImprovementThe result of our design has met our expectation, in which every sensor is working and will sound specific alarm when the system goes into alert status. The keypad and LCD also offer great interface and users can be familiar with our system in less than few seconds.

Future References If we have chance to design this project again, we will add a-1. GPRS and GSM kit as it will alert the user anywhere he/she is present and can also inform nearby police to catch the intruder as soon as possible.2. Smoke detector for fire safety.3. Temperature detector.4. A keypad instead of a keyboard.5. A voice message alert system along with the buzzer.

28

Page 29: report file on security alarm project

Appendix 1:

29

Page 30: report file on security alarm project

Appendix 2:

PROGRAM FOR MAGNETIC SENSOR

int ledPin = 13;

30

Page 31: report file on security alarm project

int inputPin = 2;

int val = 0;

void setup()

{ pinMode(ledPin, OUTPUT);

pinMode(inputPin, INPUT);

}

void loop()

{ val = digitalRead(inputPin);

if (val == LOW)

{ digitalWrite(ledPin, LOW);

}

else

{ digitalWrite(ledPin, HIGH);

}

}

PROGRAM FOR PIR SENSOR

int ledPin = 13; // choose the pin for the LED

int inputPin = 24; // choose the input pin (for PIR sensor)

int pirState = LOW; // we start, assuming no motion detected

int val = 0; // variable for reading the pin status

void setup()

{pinMode(ledPin, OUTPUT); // declare LED as outputpinMode(inputPin, INPUT); // declare sensor as input

Serial.begin(9600);

}

void loop()

31

Page 32: report file on security alarm project

{val = digitalRead(inputPin); // read input valueif (val == HIGH)

{

digitalWrite(ledPin, HIGH); // turn LED ON if (pirState == LOW)

{ // we have just turned on Serial.println("Motion detected!"); // We only want to print on the output change, not state pirState = HIGH; } }

else

{ digitalWrite(ledPin, LOW); // turn LED OFF if (pirState == HIGH)

{ // we have just turned off Serial.println("Motion ended!"); // We only want to print on the output change, not state pirState = LOW; } }

}

PROGRAM FOR PASSWORD

include <Password.h>#define LED 13Password password = Password( "1234" );int c,i,j;char check;char pass[4];void setup(){ Serial.begin(9600); pinMode(LED,OUTPUT); c=0;}void loop()

32

Page 33: report file on security alarm project

{ for(i=0;i<4;i++) { while(Serial.available()==0);

j=Serial.read();

password.append(j); Serial.print(j,BYTE); } if(password.evaluate()) { digitalWrite(LED,HIGH); Serial.println("correct password"); delay(5000); } else { delay(5000); c++; password.reset(); Serial.println("incorrect password"); } while(c==4) { Serial.println("limit exceeded"); exit(0); }}

33