Post on 28-Mar-2015
SUMMER TRAINING PROJECT REPORTOn
SECYRITY ALARM SYSTEM
Electronics And Communication
HOME SECURITY
ALARM SYSTEM
1
TABLE OF CONTENT
1. COVER PAGE
2. INDEX
3. CERTIFICATE
4. ABSTRACT
5. ACKNOWLEGMENT
1
3
5
6
7
2
6. LIST OF TABLES
7. LIST OF FIGURES
8. LIST OF ABBREVIATIONS
i. CHAPTERS
ii. INTRODUCTION
iii. PURPOSE/AIM
iv. IDEA OF PROJECT
v. BLOCK DIAGRAM
vi. HARDWARE DETAILS
a. CENTRAL UNIT
b. PIR SENSOR
c. MAGNETIC SENSOR
d. GSM KIT
vii. ACCURACY AND SAFETY
viii. USABILITY
ix. CONCLUSION
1. EXPECTATIONS AND IMPROVEMENTS
2. FUTURE REFERENCES
9. APPENDICES
I. APPENDIX – I
II. APPENDIX – II
III. APPENDIX - III
10. REFRENCES
8
9
10
11
12
13
14
15
17
19
22
25
25
26
26
27
28
3
11. PERSONNEL FEEDBACK ABOUT THE TRAINING
CERTIFICATE
I here by certify that the work is being presented in the thesis report
entitled, “Security Alarm System”, submitted by me in fulfilment of the
requirements for the project work of degree of Batcher’s of Technology in
Electronics And Communication at Bhagwan Parshuram Institute of
Technology, Sec-17, Rohini, is a authentic record of my own work carried
out under the supervision of Mr. Vinay Chadha and refers other
4
project’s / researcher’s works which are duly listed in the reference
section.
The matter presented in this thesis has not been submitted for the award
of any other degree of any university.
(Student Name)
This is to certify that the above statement made by the candidate is
correct and true to the best of my knowledge.
Name of Project Guide
Designation
Name of the Department
Organisation Address
5
ACKNOWLEDGEMENT
No volume of words is enough to express my gratitude towards my guide <Guide Name>, Designation, <Department>, <Address>, who has been very concerned and has aided for all the materials essential for the preparation of this thesis report. She has helped me to explore this vast topic in an organized manner and provided me with all the ideas on how to work towards a research-oriented venture.
I am thankful to my mentor <Mentor name>, Designation, <Department>, <HOD Name>, Head of the Department, and Mr. R K Tiwari, Head Training and Placement, BPIT for the motivation and inspiration that triggered me for the thesis work.
I would also like to thank the staff members and my colleagues who were always there at the need of the hour and provided with all the help and facilities, which I required for the completion of my thesis work.
I am very much grateful to Prof. A K Tandon, Director BPIT for his valuable support at the Institution Level for giving me the opportunity for pursuing this B.Tech course and help in conceptualising the project/research work and to all those outstanding individuals with whom I have worked in this Institution, who helped me understanding the concept.
Most importantly, I would like to thank my parents and the almighty for showing me the right direction out of the blue, to help me stay calm in the oddest of the times and keep moving even at times when there was no hope
<Student Name>
Branch
Enrolment No.
Class Roll. No
6
ABSTRACT <Make it as per your work>
For any work of literature, a fundamental issue is to identify the individual(s) who
wrote it, and conversely, to identify all of the works that belong to a given individual or to
identify the individual who writes many papers on same topic or to identify the topics name
that an author works on.
Information extraction techniques (such as Author Name and Topic Recognition)
have long been used to extract useful pieces of information from text. The types of
information to be extracted are generally fixed and well defined. However in some cases, the
user goal is more abstract and information types cannot be narrowly defined. For example, a
reader of online user reviews typically has the goal of making a good choice and is
interested to learn about the different aspects of a topic and author relation (e.g., famous
author of a topic, author’s papers with his research field). Some of these aspects may be
known by the reader and some others may need to be discovered from the inherent text
structure in a large collection. Even for the known aspects (such as “author name” and
“topic”), the challenge is to recognize various hidden aspects like number of papers written
by an author, his research field, popularity of an author.
In this thesis, we model the author-topic information discovery system as topics with
identifiable word distributions across documents. We review several probabilistic graphical
models (such as Latent Dirichlet Allocation) and propose a new model which is based on
frequency of the words within the document. We also provide a case study of a probability
based author-topic model developed for information discovery.
7
LIST OF TABLES
Table 1: PIR Specifications……………………………………………………………………..18
Table 2: AT Command ………………………………………………………………………….24
8
LIST OF FIGURES
Figure 1: General Setup for Remote File Syncronization………………………………….........……13
Figure 2: AT MEGA board(1280)………………………………………………..……………………….........…15
Figure 3: PIR sensor………………………………….…………………………………….........………...........…17
Figure 4:connections of PIR………………………………………………………...................…...............18
Figure 5: magnetic switch ..................................……………………………………….............……..19
Figure 6: GSM and GPRS kit...........................................................………………………………..23
9
LIST OF ABBREVIATION
LCD LIQUID CRYSTAL DISPLAY
PIR PASSIVE INFRARED SENSOR
GPRS GENERAL PACKET RADIO SERVICE
GPS GLOBAL POSITIONING SYSTEM
MCU MICROCONTROLLER UNIT
SMS SPEED MESSAGE SERVICE
LED LIGHT EMMITING DIODE
PWM PULSE WIDTH MODULATION
SIM SUBSCRIBER IDENTIFY MODULE
PCMCIA
AT
10
INTRODUCTIONThis is a digital home security system with alarm feature which can monitor password for entrance, magnetic door lock and motion detector.The goal of this project is to utilize the after-market parts and build an integrated home security system. we have also incorporated password and magnetic lock for door and motion sensor. Hence the security system will sound an alert when there is an attempt of break-in. The system is fully digital and also be fully customized. It incorporated a 16x2 LCD display with a keypad,PIR sensor and magnetic door lock. However we have used a keyboard instead of keypad for cost facility. Each sensor can be enabled or disabled. Electronic alarms designed to alert the user to a specific danger by sounding a loud buzzer.
However we have included the GPRS and GPS system in our project as future reference because they will enhance the capability of the system by sending the threat message to the house owner and local police of the intruder’s break-in house to inform them immediately wherever they are.
Sensors are connected to a control unit via low-voltage wiring used to interact with a response device.
11
AIM/PURPOSE
Aim of the project is to investigate a cost effective solution that will enable home security against intrusion in the absence of home owner.
12
PROJECT IDEAThe idea of our project comes from the fact that security system is quite basic and only offers simple password lock. Hence we would like to enhance our security system with different kinds of sensors.
13
MCU(Arduino Mega Board 1280)
KeyboardMagnetic sensor (Connected to the door )
Buz-zer
PIR sensor(for human detection)
LED
BLOCK DIAGRAM
14
Fig 1:block diagram
The block diagram of our system is shown above. The central unit will handle all the sensors and keyboard and input, output information toLCD screen, indicate system status on LED and buzze
HARDWARE DETAIL1. Central Unit
The control panel(central unit) can be called as the “brain" of the security system, and operates as the central computer.
Various sensors are connected to the control panel from locations throughout the home.
If sensors detect a problem, control panel cause an appropriate alarm output.
The central unit used in our program is Arduino AT mega board. It has a MCU no. 1280.
15
Fig 2:Arduino ATMega board(1280)
Arduino board is connected to the PC via USB port through serial port. It provide a 5v signal and other digital input, analog input, PWM output.The microcontroller used is ATMEGA 1280.
16
2. PIR motion sensor
The Passive Infrared Detector works through detecting the human bodies infrared spectrum.
The sensor receives infrared rays given off by the human body and outputs signals after computing to the central unit for further action to be taken.
This Technology detector combined with microwave and passive infrared intelligence, adopting advanced signal analysis technology, can avoid various kinds of false
17
alarms under worse environment and proper installation can avoid dead zones.
Fig 3:PIR sensor
Specifications of PIR Sensor-
1.pin specifications
PIN CONNECTIONSOut Gives output+ Connect to V supply-(gnd) Connect to groundTable 1
2. Other specification-
18
Range- 20 feet
Dimensions- 32.2 * 24.3 * 25.4 mm
Cost- Rs 450
Fig 4:Connections of PIR
3. Door/Window Magnetic Sensor
This is usually accomplished with a non-contact switching system using a sintered alnico magnet and a reed switch.
The presence of the magnetic field passing through the conductors of the switch causes them to pull together, closing the circuit.
19
When the magnet is moved away from the switch, the circuit opens. Closed circuit indicates the closed door/window and
Releases the reed switch when the door/window is opened and triggers an alarm at the same time.
Fig 5:magnetic sensor(reed switch)
SPECIFICATIONS OF REED SWITCH-
20
CIRCUIT FOR REED SWITCH
Arduino (1x)
Reed Switch (1x)
10K Resistor (1x)
Breadboard (1x)
LED (1x)
21
Magnet(1x)
Wires (MISC.)
first connect a LED to pin 13 and Ground on the breadboard.
Now connect Arduino 5 volt and ground to its own buses. Then insert your reed switch onto your bread.
Now connect a 10K resistor from 5 volts to the reed switch
Connect Digital Pin 2 of the Arduino board where you connected your 10K resistor to the reed switch. Finally, connect the other pin of the reed switch to ground
The circuit diagram for reed switch is attached in appendix 1.
4.GSM module
A GSM modem is a wireless modem that works with GSM networks.
22
A GSM modem can be an external unit or a PCMCIA card (also called PC Card). An external GSM modem is connected to a PC through a serial cable, a USB cable, Bluetooth or Infrared. Like a GSM mobile phone, a GSM modem requires a SIM card from a wireless carrier in order to operate
PC use AT commands to control a modem. GSM modems support an extended set of AT commands. These extended AT commands are defined in the GSM standards. With the extended AT commands, you can do things like: Read, write and delete SMS messages. Send SMS messages. Monitor the signal strength. Monitor the charging status and charge
level of the battery. Read, write and search phone book
entries.
23
Fig 6:GPRS and GPS kit
24
If SMS over GPRS is used, an SMS transmission speed of about 30 SMS messages per minute may be achieved. This is much faster than SMS over GSM. A GPRS modem is required to send and receive SMS via GPRS. Some wireless carriers do not support the sending and receiving of SMS via GPRS. A GPRS modem is typically required for MMSA GSM modem can be an external modem device, such as the Siemens MC35 or Wavecom FASTRACK external modems. Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer
Command Description
AT+CMGD DELETE SMS MESSAGEAT+CMGF SELECT SMS MESSAGE FORMATAT+CMGL LIST SMS MESSAGES FROM PREFERRED STOREAT+CMGR READ SMS MESSAGEAT+CMGS SEND SMS MESSAGEAT+CMGW WRITE SMS MESSAGE TO MEMORYAT+CMSS SEND SMS MESSAGE FROM STORAGEAT+CMGC SEND SMS COMMANDAT+CNMI NEW SMS MESSAGE INDICATIONS
Table 2:AT command
25
ACCURACY AND SAFETYAfter the user enables the security system, the green status LED will lid to indicate the system status. User can now enter proper password to unlock the system. If any sensor goes wrong, the LCD will output error. Magnetic switch attached at the door will keep the door closed as long as password is incorrect. If password entered is correct then sensors will be disabled else all will remain enabled and if any intruder tries to break-in house without correct password, immediately the buzzer will buzz out loudly to inform about the intruder.
26
USABILITYOur home security system is very practical. It can be used not only in the home environment but also in a business environment too. It can monitor the surrounds to not only protect our properties but also our lives. Besides, it can be highly customized to suit each one's need and preference. So our security system is very useful for us as well as other people. We believe every house in the world should equip a security system like the one we design.
27
CONCLUSIONSExpectation and ImprovementThe result of our design has met our expectation, in which every sensor is working and will sound specific alarm when the system goes into alert status. The keypad and LCD also offer great interface and users can be familiar with our system in less than few seconds.
Future References If we have chance to design this project again, we will add a-1. GPRS and GSM kit as it will alert the user anywhere he/she is present and can also inform nearby police to catch the intruder as soon as possible.2. Smoke detector for fire safety.3. Temperature detector.4. A keypad instead of a keyboard.5. A voice message alert system along with the buzzer.
28
Appendix 1:
29
Appendix 2:
PROGRAM FOR MAGNETIC SENSOR
int ledPin = 13;
30
int inputPin = 2;
int val = 0;
void setup()
{ pinMode(ledPin, OUTPUT);
pinMode(inputPin, INPUT);
}
void loop()
{ val = digitalRead(inputPin);
if (val == LOW)
{ digitalWrite(ledPin, LOW);
}
else
{ digitalWrite(ledPin, HIGH);
}
}
PROGRAM FOR PIR SENSOR
int ledPin = 13; // choose the pin for the LED
int inputPin = 24; // choose the input pin (for PIR sensor)
int pirState = LOW; // we start, assuming no motion detected
int val = 0; // variable for reading the pin status
void setup()
{pinMode(ledPin, OUTPUT); // declare LED as outputpinMode(inputPin, INPUT); // declare sensor as input
Serial.begin(9600);
}
void loop()
31
{val = digitalRead(inputPin); // read input valueif (val == HIGH)
{
digitalWrite(ledPin, HIGH); // turn LED ON if (pirState == LOW)
{ // we have just turned on Serial.println("Motion detected!"); // We only want to print on the output change, not state pirState = HIGH; } }
else
{ digitalWrite(ledPin, LOW); // turn LED OFF if (pirState == HIGH)
{ // we have just turned off Serial.println("Motion ended!"); // We only want to print on the output change, not state pirState = LOW; } }
}
PROGRAM FOR PASSWORD
include <Password.h>#define LED 13Password password = Password( "1234" );int c,i,j;char check;char pass[4];void setup(){ Serial.begin(9600); pinMode(LED,OUTPUT); c=0;}void loop()
32
{ for(i=0;i<4;i++) { while(Serial.available()==0);
j=Serial.read();
password.append(j); Serial.print(j,BYTE); } if(password.evaluate()) { digitalWrite(LED,HIGH); Serial.println("correct password"); delay(5000); } else { delay(5000); c++; password.reset(); Serial.println("incorrect password"); } while(c==4) { Serial.println("limit exceeded"); exit(0); }}
33