0% found this document useful (0 votes)
111 views19 pages

Laser Security Systems GRP 7

Uploaded by

Neel Modi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views19 pages

Laser Security Systems GRP 7

Uploaded by

Neel Modi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

ACKNOWLEDGEMENTS

It is great pleasure for me to express my gratitude to our honorable Production Engineering Faculty,
for giving the opportunity and platform with facilities in accomplishing the project.

We express the sincere gratitude to our principal DR. HARI VASUDEVAN SIR for his administration
towards our academic growth.

We express sincere gratitude to entire faculty of production department for their leadership and
constant motivation provided in successful completion of our academic semester. We record it as my
privilege to deeply thank for providing us the efficient faculty and facilities to make our ideas into
reality.

We express my sincere thanks to our project supervisor Mr. MEHUL PRAJAPATI SIR for his novel
association of ideas, encouragement, appreciation and intellectual zeal which motivated us to venture
this project successfully.

We express our deep gratitude and affection to our parents who stood behind us in all our endeavours.

Finally, it is pleased to acknowledge the indebtedness to all those who devoted themselves directly or
indirectly to make this project report success.
ABSTRACT

This project deals with a model of laser security alarm system design. Laser security
systems used to be difficult to install and rarely available to anyone other than the super-
rich. Now, there are dozens of different security systems on the market that utilize lasers
and can effectively protect everything from small apartments and businesses to large areas
of property. Most home laser security systems consist of two parts: a basic alarm unit and
an infrared motion detector. Laser based security system is a type of security and alarm
system that uses laser light and a light sensor.
Why a laser to be used? It is known that a laser light goes through long distance without
any scattering effect (disturbing) and it is only visible at source and the destination point so
it can be used as mediator between source and destination but to analyse the source a
sensor is need, here the use of LDR is applicable. Just analysis is not enough alerting should
be done in general alerting is sound effect so here buzzer act as alerting. Making use of
this, a laser security system is designed. Its working: There is a laser diode that generates
the laser beam which continuously strikes over the Light dependent resister sensors. When
any person crosses the path, it inhibits laser to reach LDR and the sensor generate a low
which is read by controller to power on the buzzer.
Laser fence or barrier is a mechanism used to detect objects that pass vision line between
the laser source and optical detector. During that, warning device will work as well as smart
surveillance camera will focus on the entry of unauthorized persons. This system makes
more secure to the protected area by a laser beam by using optical mirror in every corner
for the beam reflection. In this research, a new algorithm used to detect moving objects
from a stationary background scene based on scenes variation.
This workachieves the most efficient security system based on qualitative assessment and
quantitative measurement. Moreover, the optical communication is a new idea special for
this project to reduce the required cost and increase the communication speed.
Also, this work has special programs to achieve holistic system optically, electronically and
programmatically. The system program is by using c# as program language to detect a
penetration. The other program is by using visual basic language to evaluate the system.
INTRODUCTION

Need of security is the basic necessity of any individual. The feeling that we are safe and everything
around us is all right is imperative for a peaceful living. But in this unsafe world, when crime, terror
and threats are on their peak, how can one attain that sense of security? Here, laser security
system provides us with a solution and for this reason more and more people are installing them in
order to stay safe and secure. Various electronic security systems can be used at home and other
important working places for security and safety purposes.

Laser Security alarm is a device used for security purposes. It has a wide application in fields of
security and defence starting from the security of simple house hold material to a very highvalued
material of an organization. They once used to be expensive solutions for security needs. Owing to
cost cutting and fast technological advancements, this form of security system is becoming more
affordable.

Laser light travels in a straight line. For instance, to protect the front of the yard, putting the laser at
one comer and the detector at the other corner would do the job. That's not a very practical
configuration, though. More typically, if it is needed to protect the perimeter of a room, or at least
the enhances. So laser security systems start with a laser pointing to a small mirror. The first mirror
is angled to direct the beam to a second small mirror, and so on until the final mirror directs the
beam to the detector. If the beam is interrupted anywhere betweenthe laser and the detector, the
electronics will put the warning signal.
LITERATURE

A laser fence is a detection device for providing a


warning signal in response to an intrusion by an
intruder in a limiting area. A laser fence includes a
laser generator for generating a laser beam. Also,
first mirror is aligned with the laser beam for
reflecting the beam to a second mirror. A second
mirror is aligned with a third mirror for reflecting the
beam to the optical detector (3). Fig. 1 has shown an example of this system The Background
subtraction method is one of the best manners that be used by programmers. This method uses the
principle of subtraction of the present image and the background image to detect moving bodies.
The theory involving is the first frame image is stored as the reference image. Then the present frame
image with the pre-stored image then results in background subtraction, and if pixel image is larger
than confirmed threshold, then it defines pixel to pixel on moving bodies or as background pixel (6,8).
The selection of threshold of background subtraction is very significant to achieve detection. If the
threshold value is very small, will leads to lot of fake points on the background .If the threshold value
is very large, will reduce the scope of variations in the motion. Therefore the selection of dynamic
threshold would be selected (1,7). The background subtraction method is used to detect movement
by

comparing the pixel value of variation image with threshold value provided by programmer in the
algorithm.

As shown in Tab. 2, object in movement is said to be detected when pixel value is more than the
threshold value. Threshold value is provided according to the requirements depending upon
ambience.

The detection processes are:

➣ Difference of Two Successive Frames (9): Ik is supposed to be the value of the reference frame.
Ik+1 is the value of the frame in image sequences. The Pixels Variant (σ) is defined as follows: [1] σ =
Id (k, k + 1) = |Ik+1 –Ik
➣ Comparison with threshold value (7): The program compares the pixels variant values (σ) with a
given threshold (T). This research takes the threshold value T to be 0.001.

➣ Transformation of Unambiguous Differentiation Image to Gray Image (8,9): There are apertures
in moving object zone, and circumference of moving object is not closed. The unambiguous
differentiation image is transformed to gray image to ease further operations. The gray pixel valueis
defined as follows: [2] Y = 0.299×R + 0.587×G + 0.114×B … where Y is Gray pixel value, R is Red, G is
Green, and B is Blue (RGB) for every pixel.

➣ Filtering Gray Image (7,9): In order to remove the apertures, the image is passed within the Gauss
low pass filter. Id1 is got by filtering the gray image. Now image is binarized using binary threshold
and got Id2 binary image.

PRINCIPLE:
There are three essential components to a laser security system: a laser, a detector and sensing
circuit. The laser is a concentrated light source that puts out a straight line, 'pencil beam, of light of
a single colour. The detector is sensitive to light and puts out a voltage when the laser light hits it.
The detector is connected to the sensing circuit. When the laser beam is interrupted and cannot
reach the detector, its voltage output changes, and the circuit sense the change and put out a
warning signal.

WORKING:
First, the Op – Amp circuit acts as a comparator i.e. it compares the voltages at the inverting and
non – inverting terminals and produces an output accordingly. The LDR, resistor Voltagedivider is
connected to the non – inverting terminal of Op –Amp and a potentiometer is connected to the
inverting terminal.

Assume, the laser pointer is placed directly in line of sight to the LDR and the light from the laser is
continuously being incident on LDR. In this situation, the resistance of LDR falls down to few Ohms
and as a result, the voltage at the non – inverting terminal will be less thanthat at the inverting
voltage. The output of the Op –Amp is low and the transistor is OFF.

If the laser light is blocked by an intruder from falling on the LDR (even for a small duration), the
resistance of the LDR goes to few hundreds of Ohms and as a result, the output of the Op –Amp will
be HIGH. This will turn on the Transistor. As the output of the transistor is connected to the Trigger
Pin (Pin 2) of the 555 Timer IC, if the transistor is ON, the trigger pin gets a short low pulse and as a
result, the output of the 555 becomes HIGH. This will activate the alarm by turning ON the buzzer.
Since, the 555 Timer IC is configured as a Bi – Stable Multivibrator, a small active low trigger pulse
at the trigger pin will set its output to HIGH and in order to reset it a person need to push the reset
button. Until the reset push button is pushed, the alarm will stay on hence; place the reset button
at a secret location so that only the owner can disable the alarm.
OBJECTIVE:

The core objective of this project is to design a laser security system with laser and light
dependent resistor.
BLOCK DIAGRAM:

LASER
LIGHT

LDR- LIGHT DEPENDENTRESISTOR

/\/\/\/\

COMPARATOR

IC-555
TIMER

BUZZER
CIRCUIT DIAGRAM:
COMPONENT DESCRIPTION:

LASER: A laser is a device that emits light through a process of optical amplification based on the
stimulated emission of electromagnetic radiation. The term "laser" originated as an acronym for
"light amplification by stimulated emission of radiation".

LDR (Light Dependent Resistor): A photo resistor or light-dependent resistor (LDR) or photocell is a
light-controlled variable resistor. The resistance of a photo resistor decreases with increasing
incident light intensity;in other words, it exhibits photoconductivity. A photo resistor can be
applied in light-sensitive detector circuits, and light- and dark-activated switching circuits.

LED (Light Emitting Diode): A light-emitting diode (LED) is a two-lead semiconductor light source.
Like an ordinary diode, the LED diode works when it is forward biased. In this case, the n-type
semiconductor is heavily doped than the p-type forming the p-n junction.

BUZZER: A buzzer or beeper is an audio signalling device, which may be mechanical,


electromechanical, and piezoelectric. Typical uses of buzzers and beepers include alarm devices,
timers and confirmation of user input such as a mouse click or keystroke.

TRANSISTOR: A transistor is a semiconductor device used to amplify and switch electronic signals
and electrical power. Transistor has many functions, such as detecting, rectifying, amplifying,
switching, voltage stabilizing; signal modulating and so on. It is composed of semiconductor
material with at least three terminals for connection to an external circuit.

RESISTOR: A resistor is a passive two-terminal electrical component that implements electrical


resistanceas a circuit element. Resistors act to reduce current flow, and, at the same time, act to
lower voltage levels within circuits.

CAPACITOR: A capacitor (originally known as a condenser) is a passive two-terminal electrical


component used to store energy electro statically in an electric field.

BATTERY: An electric battery is a device consisting of two or more electrochemical cells that
convert stored chemical energy into electrical energy.

BREADBOARD AND CONNECTING WIRES: A breadboard is a construction base for prototyping of


electronics. These solderless breadboards does not require soldering, it is reusable. This makes it
easy to use for creating temporary prototypes and experimenting with circuit design. A modern
solderless breadboardsocket consists of a perforated block of plastic with numerous tin plated
phosphor bronze or nickel silver alloy spring clips under the perforations.

IC555 TIMER: The 555 timer IC is an integrated circuit (chip) used in a variety of timer, pulse
generation, and oscillator applications. The 555 can be used to provide accurate time delays, as an
oscillator, and as a flip-flop element.
IC LM358: In this project, the LM358 is used as a Comparator. The LM358 IC is a great, low power
and easy to use dual channel op-amp IC. It is designed and introduced by national semiconductor.It
consists of two internally frequency compensated, high gain, and independent op-amps.

POTENTIOMETER: A potentiometer is a three-terminal resistor with a sliding or rotating contact


that forms an adjustable voltage divider. If only two terminals are used, one end and the wiper, it
acts as a variable resistor or rheostat.

APPLICATIONS:

Potentiometer as a Voltage Divider: the potentiometer can be worked as a voltage divider to obtain
a manual adjustable output voltage at the slider from a fixed input voltage applied across the two
ends of the potentiometer.

Audio Control: Sliding potentiometers, one of the most common uses for modern low-power
potentiometers are as audio control devices.

Television: Potentiometers were used to control the picture brightness, contrast, and colour
response. A potentiometer was often used to adjust “vertical hold”, which affected the
synchronization between the received picture signal and the receiver’s internal sweep circuit (a
multi-vibrator).

Transducers: One of the most common applications is measuring of displacement. To measure the
displacement of the body, which is movable, is connected to the sliding element located on the
potentiometer. As the body moves, the position of the slider also changes accordingly so the
resistance between the fixed point and the slider changes. Due to this the voltage across these
points also changes

CIRCUIT DESIGN:

The design of the laser security system circuit is very simple.Coming to the design of the circuit,

First, the LDR and a 10 K Ω resistor are connected in series with the voltage divider and its output
(common point) is connected to the pin 3 (non – inverting) of the Op- Amp IC LM358.
For the inverting terminal (pin 2), connected the wiper of a 10 KΩ potentiometer (other two
terminal of the POT are connected to VCC and GND).
The 8th and 4th pin of Op-Amp IC LM358 are connected to the voltage divider and ground
respectively.
The output of the Op – Amp (Pin 1) is connected to the base of the transistor (BC547)
through a resistor of 220 ohms.
The trigger pin of 555 (Pin 2) is connected to the common point of 10 KΩ resistor and
collector of transistor common point. The other end of resistor is given to voltage divider.
The emitter of the transistor is given to the ground
The reset pin (pin 4) of the 555 is connected to VCC through a 10 KΩ resistor and a pushbutton
is connected between Pin 4 of 555 and GND.
The non-inverting input (5th pin) is connected to ground through 100nano farad capacitor. A
buzzer is connected to pin 3 of ic555 IC. The other end of buzzer is given to the ground
The voltage divider (8th pin) of ic555 timer is given to voltage divider and the output pin (1stpin) is
given to the ground.

MODEL CIRCUIT:
PRECAUTIONS:

• We have used a laser pointer in this project. Direct exposure of laser light on eyes can be very
dangerous. Even though it is a low power laser, avoid direct eye exposure of laser.
• Make sure the connections are correct.(mainly op-amp, transistor, ic555timer, potentiometer)
• Using potentiometer change the volume of buzzer.
• Check proper biasing of OP-Amp and transistor.

ADVANTAGES AND DISADVANTAGES

ADVANTAGES:
.These are easy to install and work at both within as well as outside houses. These are very effective
perimeter alarm systems around properties. In indoor systems can utilize the normal power outlets
and jacks making them inconspicuous. At outside these can be easily be hiddenbehind the bushes
or plants without causing any damage. They consume less power when compared to the laser
system as the whole, which is expensive.

.These laser systems can be installed in homes either by self or by hiring a technical person. By
technological innovations cost of the security systems has been cut to a large extent. So, making
laser systems one among affordable security system options can be very safe.

.Lasers are strong in beam width and can be focused on the perfect target. By using laser security
system one can be safe in the case of harmful effects to the body. As the beam width used in the
laser security systems are not strong beam widths.

.The circuit, construction and setup for the Laser Security System are very simple. If used with a
battery, the laser security system can work even when there is a power outage.

DISADVANTAGES:

.The laser security system works only if the laser is obstructed. If the intruder passeswithout
obstructing the laser, it is considered as a failure.

.In order to secure a larger area, we need more lasers and corresponding sensors.

APPLICATIONS:

.Laser Security System can be used in safety lockers in our homes, where even if thelocker’s code
is hacked, it acts as an additional layer of security.

.Apart from security systems, this laser based setup can also be used to check if pets orbabies
crossed a certain boundary.
RESULT AND DISCUSSION:

CONCLUSION:

Laser security system provides us the security against any crime, theft in our day to day life and so
people are installing them in order to stay safe, secure and sound. Various electronic security
systems can be used at home and other important working places for security and safety purposes.
It is a great opportunity and source of saving man power contributing no wastage of electricity. The
"Laser Security System" is an important helping system. Using this system robbery, thefts & crime
can be avoided to large extend. Avoiding thieves resultsin the safety of our financial assets and
thereby this system provides us protection against all.

The Laser & LDR system is highly sensitive with a great range of working. The system senses the
light emitted by the Laser falling over the LDR connected with the circuit. Whenever the beam of
light is interrupted by any means, it triggers the alarm or siren. This highly reactive approach has
low computational requirement, therefore it is well suited to surveillance, industrial application and
smart environments.

REFERENCE:

[1] IEEE spectrum ( May 2009), the 555 was selected as one of the” 25 Microchips that shook the
world”.

[2] Adel S. Sedra & Kenneth C. Smith.,”Microelectronics Circuit 6th edition”

[3] D. patranabis,” Sensors and Transducers” 2nd edition.

[4] Kogelnik, H., and Li, T., "Laser beams and resonators," Appl. Opt., vol. 5, Oct. 1966.
[5] Gould, R. Gordon (1959). "The LASER, Light Amplification by Stimulated Emission of Radiation".
In Franken, P.A. and Sands, R.H. (Eds.). The Ann Arbor Conference on Optical Pumping, the
University of Michigan

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy