0% found this document useful (0 votes)
277 views45 pages

Chapter 1 - 5

The document provides an introduction to home security systems and burglar alarms. It discusses how early systems were attached to doors and windows but were not foolproof as owners could have lapses in concentration. This led to the development of electronic circuit-based home alarm systems using IC555 timer circuits that were more reliable. It also outlines the aims, objectives, significance and methodology of the project, which is to design a comfort alarm system using electronic components.

Uploaded by

AMINA ALIYU
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
277 views45 pages

Chapter 1 - 5

The document provides an introduction to home security systems and burglar alarms. It discusses how early systems were attached to doors and windows but were not foolproof as owners could have lapses in concentration. This led to the development of electronic circuit-based home alarm systems using IC555 timer circuits that were more reliable. It also outlines the aims, objectives, significance and methodology of the project, which is to design a comfort alarm system using electronic components.

Uploaded by

AMINA ALIYU
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 45

CHAPTER ONE

1.0 INTRODUCTION

The need for having home protection has always been there. But in the recent

times, considering a dramatic rise in petty crimes like robbery and theft, the

need has been more strongly felt to have a fool proof protection of the

belongings and the family members. Home security has come a long way in

the last few decades. It was attached to the door or window which

automatically provide surveillance during night in the earlier days, but it was

not fool proof as it was only normal for the owner of the house to have

momentary lapse of concentration.

The owner of the house was also susceptible to sleep at times. It was then that

home alarm system based upon electronic circuit were developed which

proved to be highly reliable and were appreciated by the 19.32 people as they

were relieved from constant monitoring of their homes.

This intruder alarm system uses IC555 timer which was wired as a timing

circuit, as tone generator and amplifier to obtain a maximum audible sound.

The IC555 timer time the circuit and generates a tone and this tone is send to

transistor which amplifies the tone generated through a loud speaker or

buzzer.

The reset button is used to reset or open circuit the system back to its initial

stage. The system is powered with 12V power supply voltage.

1
The first chapter of this project is narrating on the introduction, the concept

of the system and also the aims and objective. Chapter two is all about

literature review. Chapter three talks about specification and operation of

system component. Chapter four is about construction, testing, and

packaging. Chapter five is conclusion, observation, recommendation and

references.

1.2 AIM AND OBJECTIVES

The main aim and objective of the design and construction this project is to

create a comfort in the minds of house owners when they’re out from their

premises without much fear of intruder.

1.3 SIGNIFICANT OF THE PROJECT

This device functions as electronics watch dogs. This device functions as

major security alarms used in residential, commercial, industrial, and military

properties for protection against burglary (theft) or property damage, as well

as personal protection against intruders.

1.4 METHODOLOGY

Burglar alarms are used in residential, commercial, industrial, and military

properties for protection against burglary (theft) or property damage, as well

as personal protection against intruders. Car alarms likewise protect vehicles

and their contents. Prison also use security systems for control of inmates.

2
1.5 SCOPE OF THE PROJECT

This circuit will help you to guard your precious documents as well as

jewellery

Intruders or theft. All you need is just to place this circuit in front of the

locker or below the mat so when any unknown person come and walk over

the switch, the circuit will trigger and sound of alarm comes. The main

benefit of the circuit is that these can be implied in two places at a time as

two different switches produces two different sounds.

1.6 MOTIVATION

Can Be Expensive:

High quality, state-of-the-art alarm systems don’t come cheap. They require

substantial initial investment, which includes equipment cost, installation and

subscription of security monitoring service.

False Alarm:

Most system are prone to false alarm that involve the alarm going off on you,

or the alarm sounding off even when there’re no emergency situation.

This can be extremely embarrassing, especially when the alarm sound sounds

and the authorities – show, only to find that you tried to ‘break’ your own

house.

3
1.7 PROJECT WORK ORGANISATION

The various stages involved in the development of this project have been

properly put into five chapters to enhance comprehensive and concise

reading. In this project thesis, the project is organised sequentially as follows:

Chapter one of this works is on the introduction to a burglar alarm. In the

chapter, the background, significance objective limitation and problem of a

burglar alarm were discussed.

Chapter two is on literature review of a burglar alarm. In this chapter, all the

literature pertaining to this work was reviewed.

Chapter three is on design methodology. In this chapter all the method

involved during the design and construction were discussed.

Chapter four is on testing analysis. All testing that result accurate

functionality was analysed.

Chapter five is on conclusion, recommendation and references.

4
CHAPTER TWO
LITERATURE REVIEW

2.1 REWIEW OF THE PROJECT

2.1.2 SENSORS/MOTION SENSORS

Motion sensors are types of electronic security device that senses movement

and usually triggers an alarm. Many types of motion sensors can sense

motion in total darkness, without an intruder becoming aware that an alarm

has been triggered.

Motion sensors are an important part of most burglar alarm systems. They

help alert security personnel, especially in situations where no obvious

break-in has occurred. For instance, if an intruder steals a key to gain access

to a protected site or hides within the site during normal business hours, the

intruder’s entrance or presence could go unnoticed.

A motion sensor will detect the intruder’s movements as soon as he or she

walks or otherwise moves within the area protected by the detector.

Motion sensors usually protect indoor areas, where conditions can be more

closely controlled. Sensors for use in homes usually detect movement in

spaces about 11 m × 11 m (35 ft × 35 ft) in area.

Sensors for large warehouses can protect areas with dimensions as large as

24 m × 37 m (80 ft × 120 ft).

5
Buildings with valuable or important assets, such as museums, also use

motion sensors to detect break-ins at vulnerable points. Such points include

walls, doors, windows, skylights, and even air ducts. Special motion sensors

can protect the inside of exhibit cases where items such as diamonds are

displayed. Others can be focused to a narrow area of coverage, somewhat

like a curtain, that is projected in front of a painting to detect even the

slightest touch. Motion sensor systems use a variety of methods to detect

movement. Each method has its advantages and disadvantages. Some of the

methods are discussed below.

2.1.3 PASSIVE INFRARED SENSOR

A Passive Infrared sensor (PIR sensor) is an electronic device that measures

infrared (IR) light radiating from objects in its field of view. PIR sensors are

often used in the construction of PIR-based motion detectors. Apparent

motion is detected when an infrared source with one temperature, such as a

human, passes in front of an infrared source with another temperature, such

as a wall.

All objects emit what is known as black body radiation. It is usually infrared

radiation that is invisible to the human eye but can be detected by electronic

devices designed for such a purpose.

6
The term passive in this instance means that the PIR device does not emit an

infrared beam but merely passively accepts incoming infrared radiation.

“Infra” meaning below our ability to detect it visually, and “Red” because

this colour represents the lowest energy level that our eyes can sense before it

becomes invisible. Thus, infrared means below the energy level of the colour

red, and applies to many sources of invisible energy.

Infrared radiation enters through the front of the sensor, known as the sensor

face. At the core of a PIR sensor is a solid-state sensor or set of sensors, made

from an approximately 1/4-inch square of natural or artificial pyroelectric

materials, usually in the form of a thin film, out of gallium nitride (GaN),

caesium nitrate (CsNO3), polyvinyl fluorides, derivatives of phenyl pyrazine,

and cobalt phthalocyanine. Lithium tantalite (LiTaO3) is a crystal exhibiting

both piezoelectric and pyro electric properties.

The sensor is often manufactured as part of an integrated circuit and may

consist of one (1), two (2) or four (4) 'pixels' of equal areas of the pyro

zelectric material. Pairs of the sensor pixels may be wired as opposite inputs

to a differential amplifier. In such a configuration, the PIR measurements

cancel each other so that the average temperature of the field of view is

removed from the electrical signal; an increase of IR energy across the

entire sensor is self-cancelling and will not trigger the device. This allows the

7
device to resist false indications of change in the event of being exposed

to flashes of light or field-wide illumination.

(Continuous bright light could still saturate the sensor materials and

render the sensor unable to register further information.) At the same time,

this differential arrangement minimizes common-mode interference, allowing

the device to resist triggering due to nearby electric fields. However, a

differential pair of sensors cannot measure temperature in that configuration

and therefore this configuration is specialized for motion detectors. In a PIR-

based motion detector (usually called a PID, for Passive Infrared Detector),

the PIR sensor is typically mounted on a printed circuit board containing

the necessary electronics required to interpret the signals from the pyro

electric sensor chip.

The complete assembly is contained within a housing mounted in a location

where the sensor can view the area to be monitored. Infrared energy is able to

reach the pyro electric sensor through the window because the plastic used

is transparent to infrared radiation (but only translucent to visible light). This

plastic sheet also prevents the intrusion of dust and/or insects from obscuring

the sensor's field of view, and in the case of insects, from generating false

alarms. A few mechanisms have been used to focus the distant infrared

energy onto the sensor surface. The window may have multiple Fresnel

lenses moulded into it. Alternatively, some PIDs are manufactured with

internal plastic, segmented parabolic mirrors to focus the infrared energy.


8
Where mirrors are used, the plastic window cover has no Fresnel lenses

moulded into it.

This filtering window may be used to limit the wavelengths to 8-14 microns

which is closest to the infrared radiation emitted by humans (9.4microns

being the strongest).

The PID can be thought of as a kind of infrared camera that remembers the

amount of infrared energy focused on its surface. Once power is applied

to the PID, the electronics in the PID shortly settle into acquiescent state and

energize a small relay. This relay controls a set of electrical contacts that are

usually connected to the detection input of a burglar alarm control panel. If

the amount of infrared energy.

2.1.4 ULTRASONIC SENSORS

Ultrasonic sensors (also known as transceivers when they both send and

receive) work on a principle similar to radar or sonar which evaluate

attributes of a target by interpreting the echoes from radio or sound waves

respectively.

Ultrasonic sensors generate high frequency sound waves and evaluate the

echo which is received back by the sensor. Sensors calculate the time interval

between sending the signal and receiving the echo to determine the distance

to an object. This technology can be used for measuring: wind speed and

direction (anemometer), fullness of a tank and speed through air or water. For
9
measuring speed or direction a device uses multiple detectors and calculates

the speed from the relative distances to particulates in the air or water.

To measure the amount of liquid in a tank, the sensor measures the distance

to the surface of the fluid.

Further applications include: humidifiers, sonar, medical ultrasonography,

burglar alarms and non-destructive testing. Systems typically use a transducer

which generates sound waves in the ultrasonic range, above 20,000hertz, by

turning electrical energy into sound, then upon receiving the echo turn

the sound waves into electrical energy which can be measured and displayed.

Some older burglar alarm systems use ultrasound (sound of very high

frequency) to detect motion. They are called ultrasonic motion detectors. In

such a detector a transmitter sends out sound of a frequency that is too high

for the human ear to hear. A receiver picks up the sound waves reflected

from the room or area under protection.

The motion of someone or something in the space between the receiver and

transmitter will cause a change, or shift, in the frequency of the sound. A

circuit in the device detects any unusual shift in the frequency. A small shift,

such as that produced by an insect or rodent, is ignored. When a larger shift,

such as one produced by a moving person, is detected, the device triggers the

alarm. Ultrasonic detectors are extremely sensitive, and can sometimes be

triggered by loud noises or air gusts from an open vent.

10
The frequency shift discussed above is also known as the Doppler Effect,

which results from the behaviour of sound waves when they are compressed

by a moving object. Ultrasonic motion detectors use the Doppler Effect to

detect movement.

The detector’s circuitry compares the frequency of the sound that is emitted

by the transmitter when no motion is present to the frequency that results

when motion occurs. When no motion is present, the sound is emitted and

bounces back in an even, steady pattern. When motion occurs, the sound

waves are disturbed and the circuit detects the shift.

2.1.5 BURGLAR ALARM SYSTEMS

Burglar (or intrusion), alarms are electronic alarms designed to alert the

user to a specific danger. Sensors are connected to a control unit via low-

voltage wiring or a narrowband RF signal which is used to interact with

a response device. The most common security sensors are used to indicate

the opening of a door or window or detect motion via passive infrared (PIR).

New construction systems are predominately hardwired for economy.

Retrofit installations often use wireless systems for a faster, more economical

installation. Some systems serve a single purpose of burglar or fire

protection. Combination systems provide both fire and intrusion protection.

11
Systems range from small, self-contained noisemakers, to complicated,

multi-zoned systems with color-coded computer monitor outputs.

Many of these concepts also apply to portable alarms for protecting cars,

trucks or other vehicles and their contents (i.e., "car alarms").Burglar alarms

(or perimeter security systems, perimeter detection systems, Perimeter

protection, intrusion detection systems and many more terms for the same

thing) are divided to two main fields: home burglar alarms and industrial

burglar and perimeter intrusion detection.

2.2 HISTORY OF BURGLAR ALARM SYSTEM

When one mentions burglar alarms it's not unreasonable to think of high-

tech devices developed in the silicon age. The truth is, the concept of an

alarm system is one that was invented long before that. For thousands of

years man has used animals, more notably the dog, to guard and alert him of

any one trying to tamper or steel his valuables. In the middle Ages large

gongs were used to warn a population of impending doom or large bonfires

lit to warn of imminent invasion. As important as these developments were,

it was not until 1852 that the first electro-mechanical alarm system was

invented. Edwin Holmes was an American Inventor from Boston

Massachusetts; the alarm he devised was simplistic but effective. A solenoid

struck a gong when a trip wire was disturbed. Although his alarm system is

nothing compared to today's offerings it was positively received in its day.


12
These early alarm systems continued to make use of simple electrical circuits

and relays. A typical installation would see wire wound along windowsills

and around doorframes coupled with conductive lead foil and mechanical or

magnetic switches laced with thin wire. The security conscious had to wait

until the next century for further alarm system advances, which heralded the

advent of the transistor and the integrated circuit.

This technology allowed smaller units integrated with microwave and

ultrasonic motion sensors along with features such as entrance and exit

delays to be introduced. With the level of technical sophistication increasing,

so did the applications. Now it was possible to use alarms to monitor

industrial processes such as steel production or to monitor natural events such

as volcanoes and earthquakes. Today, alarm systems have advanced even

further. The rapid and expanded use of the has revolutionized alarm systems

immensely, as alarm systems have now become intelligent. It is now possible

for them to sort problems out themselves, by identifying triggers and

minimizing false alarms. They even have the ability to measure weight, size

and other environmental factors. Some also have self-diagnostic capabilities

and can detect internal circuitry problems, allowing them to functioning

correctly.

13
2.2.1 PRINCIPLE OF BURGLAR ALARMS

All alarms systems consist of four main component areas: - Detection

Devices, to detect if an intrusion has occurred- Warning Devices, bells, sirens

and remote monitoring- Control Panel, to control the various states of the

system Power Supplies, including backup batteries.

DETECTION DEVICES

Detection devices do exactly as the name implies, these are the senses of the

system and detect intrusion by a number of different means. One of the

most common detection devices is the contact switch which detects the

opening of windows, doors, etc. Numerous different types of contacts are

available for different applications such as roller shutters requiring large

heavy-duty types or domestic doors requiring neat flush fitting types. From a

burglar’s point of view, it is some times more convenient to smash their way

through a door or window than to open it and some even less desirable

methods have been employed for gaining access to a premises. Other types

of detection are used where this is a risk.

Devices such as lead foil tape can be used for glass sections or closed-circuit

wiring for semi-solid structures such as doors, walls, etc.

14
These last two types are relatively old forms of detection and although

they facilitate a very in expensive installation, they have the disadvantage in

that they must be replaced after an attack has occurred. A more modern

device for detecting forced entry is the vibration sensor (or inertia sensor).

Primarily this is the advantage, in that it can be easily installed and, coupled

with the relevant analyser it can differentiate between different types of

vibrations. This makes it very suitable for different structures e.g.; solid

walls, glass, wood, etc. In some cases, it is not always cost effective to cover

every entry point so units such as motion detectors can be used and in fact

these detectors are used quite extensively in modern domestic and

commercial systems. A motion detector, as the name implies, detects the

motion of an intruder within a certain area. The maximum range of these

detectors is about 35 meters.

WARNING DEVICES

These are devices that are used to alert the owner of the house or facility that

the alarm has been installed in. Some of the devices used include Bells,

Sirens & remote monitoring.

CONTROL PANEL

This is the heart and local brain of the system. It receives the first notification

that an alarm condition has occurred and then decides what action has to be

taken. With simpler panels this usually means activating the warning devices.
15
With microprocessor type panels this action could be considerably more

complex such as interrogating the detection device to verify the condition,

recording events in the memory or ignoring the device until it activates again.

Control panels display conditions by means of lights or LED’s flight emitting

diodes on the front of the panel e.g., clear, fault, mains on, etc. For more

sophisticated panels this is sometimes affected by means of an alphanumeric

display.

A series of words and numbers will be produced on a screen such as, zone

one open, tamper zone three, etc. A key switch or keypad is provided to

switch the system on or off. Again, with more complex panels the keypad can

be used to perform functions like interrogating the memory, inhibiting a

zone, testing the warning devices and programming the system to react in the

required manner to different situations.

POWER SUPPLIES

Power for the alarm system is derived from the 240V AC mains supply. It is

converted to 12V DC by the power supply unit and it is this voltage that is

used for the System should a mains failure occur then standby batteries,

housed inside/the control panel, will take over and power the system. When

mains return these batteries will automatically recharge.

16
2.2.2 TYPES OF BURGLAR ALARM

There are three main types of burglar alarm system and these are hardwired,

wireless and self-contained. Hardwired alarm systems are often referred to as

the more traditional type of security system. These systems usually consist of

a main control panel, bell box or siren and a number of sensor devices which

detect an intrusion. Essentially all components are wired together using

multi-core cable.

The cabling provides power to the device and detection of the device being

triggered into an alarm condition as well as the identifying of tampering

of the sensor device. One advantage of this system is that it is considered

more permanent than a wireless system and sometimes more reliable and not

so susceptible to false alarms. One disadvantage is that it is recommended

having the system installed by a professional alarm installer and this will

come at an additional cost - both for labour and materials. On the other hand,

a wireless alarm system is very straightforward to install. Virtually no

additional materials are involved so if you are not looking to spend a fortune

on a home security system then a wireless system is for you. These days they

are so much more reliable than they once were and false alerts are a thing of

the past.

They are fantastic for rented accommodation too as they can be easily

removed when you leave your rented property. Adding an additional sensor

17
or two at a later time is a breeze and there is no need to employ a tradesman

to do this. The only slight disadvantage is that you will have a change all of

the batteries in the wireless sensors on a regular basis but it is a small price to

pay for the flexibility and versatility of a wireless alarm system. A self-

contained alarm system is a single unit often shaped like an everyday object

such as a VCR or PIR motion detector. These devices are limited in features

and functionality but offer great flexibility if portability is a requirement such

as a short term stay in a property or even your garden shed, where there is no

power available. Most self-contained alarm systems are powered by batteries

so are great for outdoor use or vehicles such as motor homes or caravans.

2.2.3 INDOOR/OUTDOOR ALARM TYPESINDOOR

These types of sensors are designed for indoor use. Outdoor use would not

be advised due to false alarm vulnerability and weather durability.

Passive Infrared Detectors

The passive infrared detector (PIR) is one of the most common detectors

found in household and small business environments because it offers

affordable and reliable functionality. The term passive means the detector is

able to function without the need to generate and radiate its own energy

(unlike ultrasonic and microwave volumetric intrusion detectors that are

“active” in operation). PIRs are able to distinguish if an infrared emitting

object is present by first learning the ambient temperature of the monitored

18
space and then detecting a change in the temperature caused by the presence

of an object.

Using the principle of differentiation, which is a check of presence or non-

presence, PIRs verify if an intruder or object is actually there. Creating

individual zones of detection where each zone comprises one or more layers

can achieve differentiation. Between the zones there are areas of

no sensitivity (dead zones) that are used by the sensor for comparison.

OUTDOOR

These types of sensors would be found most of the time mounted on fences

or installed on the perimeter of the protected area.

Vibration (shaker) or Inertia Sensors

These devices are mounted on barriers and are used primarily to detect an

attack on the structure itself. The technology relies on an unstable mechanical

configuration that forms part of the electrical circuit. When movement or

vibration occurs, the unstable portion of the circuit moves and breaks the

current flow, which produces an alarm. The technology of the devices varies

and can be sensitive to different levels of vibration. The medium transmitting

the vibration must be correctly selected for the specific sensor as they are

best suited to different types of structures and configurations. A rather new

and unproven type of sensors use piezo-electric components rather than

mechanical circuits, which can be tuned to be extremely sensitive to

vibration.

19
* Pros: Very reliable sensors, low false alarm rate and middle place in the

price range.

* Cons: Must be fence mounted. The rather high price deters many

customers, but its effectiveness offsets its high price.

Piezo-electric sensors are a new technology with an unproven record as

opposed to the mechanical sensor which in some cases has a field record in

excess of 20 years

Passive Magnetic Field Detection

Buried security system is based on the Magnetic Anomaly Detection

principle of operation.

The system uses an electromagnetic field generator powered by two wires

running in parallel. Both wires run along the perimeter and are usually

installed about 5 inches apart on top of a wall or about 12"/30cm below

ground. The wires are connected to a signal processor which analyses any

change in the magnetic field. This kind of buried security system sensor cable

could be buried on the top of almost any kind of wall to provide a regular

wall detection ability or be buried in the ground.* Pros: Very low false alarm

rate, can be put on top of any wall, very high chance of detecting

realburglars.* Cons: Cannot be installed near high voltage lines, radars, or

airports

E-field

20
This proximity system can be installed on building perimeters, fences, and

walls. It also has the ability to be installed free standing on dedicated poles.

The system uses an electromagnetic field generator powering one wire, with

another sensing wire running parallel to it. Both wires run along the

perimeter and are usually installed about 800 millimetres apart.

The sensing wire is connected to a signal processor that analyses:

* Amplitude change (mass of intruder),

* Rate change (movement of intruder),

* Pre-set disturbance time (time the intruder is in the pattern).

These items define the characteristics of an intruder and when all three are

detected simultaneously, an alarm signal is generated. The barrier can

provide protection from the ground to about 4 metres of altitude. It is usually

configured in zones of about 200 metre lengths depending on the number

of sensor wires installed.

* Pros: concealed as a buried form.

*Cons: expensive, short zones which mean more electronics (more

money), high rate of false alarms as it cannot distinguish a cat from a human.

In reality it doesn't work that well, as extreme weather causes false alarms

Microwave Barriers

The operation of a microwave barrier is very simple. This type of device

produces an electromagnetic beam using high frequency waves that

21
pass from the transmitter to the receiver, creating an invisible but sensitive

wall of protection.

When the receiver detects a difference of condition within the beam (and

hence a possible intrusion), the system begins a detailed analysis of the

situation. If the system considers the signal a real intrusion, it provides an

alarm signal that can be treated in antilog or digital form.

* Pros: Low cost, easy to install, invisible perimeter barrier, unknown

perimeter limits to the intruder.

* Cons: Extremely sensitive to weather as rain, snow and fog for example

would cause the sensors to stop working, need sterile perimeter line because

trees, bushes or anything that blocks the beam would cause false alarm or

lack of detection.

Micro Phonic Systems

Micro phonic based systems vary in design but each is generally based on the

detection of an intruder attempting to cut or climb over a chain wire fence.

Usually the micro phonic detection systems are installed as sensor cables

attached to rigid chain wire fences, however some specialized versions

of these systems can also be installed as buried systems underground.

Depending on the version selected, it can be sensitive to different levels

of noise or vibration.

The system is based on coaxial or electro-magnetic sensor cable with the

controller having the ability to differentiate between signals from the cable or

22
chain wire being cut, an intruder climbing the fence, or bad weather

conditions.

The systems are designed to detect and analyse incoming electronic signals

received from the sensor cable, and then to generate alarms from signals

which exceed pre-set conditions. The systems have adjustable electronics to

permit installers to change the sensitivity of the alarm detectors to the suit

specific environmental conditions.

The tuning of the system is usually accomplished during commissioning of

the detection devices.

* Pros: Very cheap, very simple configuration, easy to install.

* Cons: Some systems have a high rate of false alarms because some of these

sensors might be too sensitive. Although systems using DSP (Digital Signal

Processing) will largely eliminated false alarms on some cases.

Taut Wire Fence Systems

A taut wire perimeter security system is basically an independent screen of

tensioned tripwires usually mounted on a fence or wall. Alternatively, the

screen can be made so thick that there is no need for a supporting chain wire

fence. These systems are designed to detect any physical attempt to penetrate

the barrier. Taut wire systems can operate with a variety of switches

or detectors that sense movement at each end of the tensioned wires. These

switches or detectors can be a simple mechanical contact, static force

23
transducer or an electronic strain gauge. Unwanted alarms caused by animals

and birds can be avoided by adjusting the sensors to ignore objects that exert

small amounts of pressure on the wires. This type of system is vulnerable

to intruders digging under the fence. A concrete footing directly below the

fence is installed to prevent this type of attack.

* Pros: low rate of false alarms, very reliable sensors and high rate of

detection.

* Cons: Very expensive, complicated to install and old technology.

Fibre Optic Cable

A fibre-optic cable can be used to detect intruders by measuring the

difference in the amount of light sent through the fibre core. If the cable is

disturbed, light will ‘leak’ out and the receiver unit will detect a difference in

the amount of light received.

The cable can be attached directly to a chain wire fence or bonded into a

barbed steel tape that is used to protect the tops of walls and fences. This type

of barbed tape provides a good physical deterrent as well as giving an

immediate alarm if the tape is cut or severely distorted. Other type’s works

on the detection of change in polarization which is caused by fibre position

change.

* Pros: Very similar to the Micro phonic system, very simple configuration,

easy to install. Can detect for distances of several km on a single processor.

24
* Cons: High rate of false alarm or no alarms at all for systems using light

that leaks out of the optical fibre. The polarization changing system is much

more sensitive but false alarms depend on the alarm processing.

H-field

This system employs an electro-magnetic field disturbance principle based on

two unshielded (or ‘leaky’) coaxial cables buried about 10–15 cm deep and

located at about 1 metre apart. The transmitter emits continuous Radio

Frequency (RF) energy along one cable and the energy is received by the

other cable. When the change in field strength weakens due to the presence of

an object and reaches a pre-set lower threshold, an alarm condition is

generated. The system is unobtrusive when it has been installed correctly,

however care must be taken to ensure the surrounding soil offers good

drainage in order to reduce nuisance alarms.

* Pros: concealed as a buried form, low rate of false alarms.

* Cons: can be affected by RF noise, high rate of false alarms, hard to install.

25
CHAPTER 3

3.0 CONSTRUCTION METHODOLOGY

3.1 INTRODUCTION

The design of the burglar alarm system is divided into two major sections.

 the hardware design and

 The software designs.

For every electronic component manufactured, there are maximum values of

operating parameters (e.g. voltage, current, power etc), set by the

manufacturers to assure the long life of the component. Therefore, it is

important that these components are not subjected to conditions above those

recommended. In fact, it is better to operate these devices well below the

rated maximum values. This technique is called COMPONENT

DERATING. Usually, a ‘derating factor’ is used to ensure a margin of safety

between operating values and maximum values.

Presented below are the various components (electronic) used in the

construction and their values, to achieve stable and efficient operating


26
conditions? The technique of component derating was applied when

necessary.

The software design section covers the software structure for the system to

be interfaced with the hardware development. This is presented in the form

of a flow chart, explaining the operation of the burglar alarm system.

3.2 CIRCUIT DIAGRAM

Fig 3.1 Circuit Diagram of Burglar Alarm System

3.3 CIRCUIT DESCRIPTION

27
The hardware design consists of different blocks – block diagrams of the

different units which when brought together form the complete electrical

structure of a burglar alarm system. These blocks are

1. The active infrared motion sensor

2. The power supply unit.

3. Microcontroller circuit.

MOTION MICROCONTROLLER ALARM


DETECTOR BUZZER
SENSOR

LCD MODULE

Fig 3.2 The Block Diagram of Burglar Alarm System.

3.3.1 ACTIVE INFRARED MOTION DETECTOR

IR beam
IR TRANSMITTER
REFLECTING

OBJECT

MICROCONTROLLER IR RECIEVER

28
Fig 3.3 the Concept of Infrared Motion Detector for Security System.

The sensor in fig 3.1 uses active infrared transmission for motion detection. It

consists of an infrared (IR) transmitter and receiver. The transmitter sends

continuous pulses of visible infrared light. The receiver is placed directly

adjacent to the transmitter but with a light resistant material separating them.

The sensor is kept at a considerable distance from any object.

If an object comes near to the sensor, the IR beam is reflected and picked up

by the receiver. The receiver passes on this signal to the microcontroller.

Transmitter Circuit

R4
680

CD4047 R2 D1
5 10 IR LED
AST Q
4
AST 5.6k
6 11
-T Q
8
+T Q1
12 13 9014
RTRG OSC
3
RCC
BATTERY C1
9V
1
CX

R1
1nF
2
RX
10k 9
MR
4047

Fig 3.4 Infrared Transmitter Circuit.

To transmit infrared light successfully to the receiver, the infrared light is

modulated to a frequency of 38 kHz (using a 38 kHz receiver module). This

modulation is done by switching the light on and off at a frequency of 38

29
kHz. The circuit uses the popular CD4047 IC, in the as table multivariate or

mode, to generate oscillations at 38 kHz. The only external components

required are resistor R1 and capacitor C1

CD4047 oscillator

According to the datasheet acquired from Harris semiconductors, the period

of the oscillator is

tA = 4.40 * R1 * C1

Therefore, frequency F,

F = 1/ tA = 1/ (4.40 * R1 * C1) = 38 kHz

Choosing values for R1 and C1, at C1 = 560pF.

R1 = 1/ (4.40 * 560 * 10-12 *38 * 103) = 10.6K

Using a variable resistor adjusted to 10.6K, we have R1 = 10.6K, C1 =

560pF.

The oscillator output Q voltage = 4.45V rms

Transistor – C9014

30
The maximum output current for the CD4047 IC is 10mA, therefore to drive

a load (i.e. IR LED) of 10mA will damage the IC. We use the popular C9014

NPN transistor as a switch to provide adequate current to the IR LED without

damaging the IC.

Q1 base voltage (with Q1 base connected to oscillator output) = 4.45V

Base current IB = (4.45 – VBE)/5.6K

Where VBE = base emitter voltage drop of Q1

With VBE = 0.71 (measured value at room temperature).

Base current IB = (4.45 – 0.71)/5.6K

Therefore, IB = 667.85µA

Collector current IC = (Vcc – Vc - 2)/680

With voltage drop of LED = 2V

IC = (8.9 – 0 – 2)/680 = 10.29mA

The maximum rated current for the IR LED is 30mA. Applying the principle

of component derating and, using a derating factor of 0.6 of the rated current,

we arrive at an operating current of not more than

0.6 * 30 * 10-3 = 18mA.

Therefore, operating the IR LED with a current of 10.3mA will be preferable

for optimum working conditions.

31
Receiver Circuit

Vcc 9V

D S Q
To microcontroller
IR module

R Q

Fig 3.5 Infrared Receiver Circuit.

The receiver circuit is an IR module connected to a D type flip flop

(TC4013).

When the infrared module detects a 38 kHz IR light source, its output

produces an oscillating voltage applied to the clock of the flip flop. The flip

flop is connected in a toggle mode – the output Q will change state with an

edge rising clock as seen in the truth table below.

Table 3.1 Truth Table for the tc4013 Flip Flop.

3.3.2 POWER SUPPLY UNIT

32
The 8051 microcontroller as well as other digital devices operates with 5

volts to ground dc power supply. To achieve this, we use a single 9 volts

battery which provides 9 volts dc which is regulated by the 7805 voltage

regulator IC (U1). The output of this IC gives a stable dc voltage of 5V.

Fig 3.6 Power supply unit for the burglar alarm project.

Additionally, the 9V dc voltage from the battery will be found useful in

powering analog (non-digital) components of the system, like the infrared

transmitter oscillator. The input and output capacitors are provided for

transient suppression and filtering.

3.4 SYSTEM OPERATION

We have the alarm control sensor: this consists mainly of a small sensor, plus

an additional ‘buzzer’ to indicate that the alarm has sounded (Figure 3.8).

The alarm system is designed in such a way that the user – having set the

alarm by entering a sensor has time to open the door and leave the room

before the monitoring process starts. Overall, the system is designed to

operate as follows:

 When initially activated, the system is in ‘Disarmed’ state.

 In Disarmed state, the sensors are ignored. The alarm does not sound.

The System remains in this state until the user enters. In arming state, the

33
system waits for 60 seconds, to allow the user to leave the area before the

monitoring process begins. After 60 seconds, the system enters the ‘Armed’

state.

 In Armed state, the status of the various system sensors is monitored.

If the sensor is tripped, the system enters ‘Disarming’ state.

 In Disarming state, we assume that the door has been opened by

someone who may be an authorized system user. In Intruder state, an alarm

will sound. The alarm will keep sounding (indefinitely.

CHAPTER 4

RESULTS TESTING

4.1 INTRODUCTION

To achieve reliable results and optimum performance from any electronic

construction project, specific tests (static and dynamic) are carried out to

determine if the device is operating under the required standard conditions.

Also the precautions taken and safety considerations made in achieving both

the hardware and software part of our work are considered.

4.2 ASSEMBLING OF SECTION

As mentioned earlier, this consists of an infrared transmitter and receiver

4.2.1 INFRARED TRANSMITTER CIRCUIT

34
The transmitter was constructed using the CD4047 oscillator. The output of

the oscillator was tested using a multi-meter in alternating current (ac) mode.

The output gave 4.45 volts.

4.2.2 INFRARED RECIEVER CIRCUIT

The three pin IR receiver used produced 7.3 volts on its output when

measured with a multi-meter. If it detects any IR beam, the output goes to 0

volts.

4.2.3 RESULTS FOR THE MOTION DETECTOR SYSTEM

Detection range for the motion sensor detector system varies with battery

strength and the reflecting object surface. Its range is about 1.5 meters. The

system was demonstrated thus: the receiver output was connected to a light

emitting diode (LED). When an object enters the zone, the LED starts

blinking.

4.3 STATIC TESTS

Here the various tests carried out on the components without power supply

input shall be discussed.

Capacitors

35
We tested the capacitors with the digital voltmeter in the resistance mode.

We observed their charging and discharging times.

Diodes

The 1N4007 diodes gave a low resistance when forward biased by the Digital

voltmeter, and a high resistance when reversed biased by the Digital

voltmeter.

Relays

We tested the relay contacts when they were normally closed and they were

found to be continuous.

Also, the input terminals (across the relay coil) gave a good resistance value

showing that the relay coils were good.

Resistors

The potentiometers gave resistance values varying from 0 Ω to 5.0k Ω in a

fairly linear fashion. We also confirmed the 100k Ω resistance value of the

resistor used in the MCU.

4.4 MOUNTING AND COMPONENT CONNECTIONS

36
All connections made between components were either made via connecting

wires or directly with solder. The following steps were employed to achieve

good connection of components used in the project.

 Soldering Iron tip was well scraped before commencing soldering.

 Good care was taken to avoid overheating of components.

 Solder sucker/extractor was used to remove improper and unintended

joints.

 A digital multi-meter was used for continuity, resistance, isolation test,

voltage and current measurements.

Circuit Board Preparation

37
Fig.4.4 Construction Diagram

We used a matrix board for mounting the most of our circuit component. A

matrix board was chosen for the following reasons.

 All connections are self-isolating.

 Difficulty in making unintended connections (i.e. bridging lines)

 Connection lines can be made with solder like that of a PCB

facilitating the tracing of errors during soldering.

38
Fig. 4.4.1 Complete Construction

CHAPTER 5

CONCLUSION & RECOMMENDATIONS


39
5.1 CONCLUSION

From the circuit schematic, the write up and the tests carried out, it can be

concluded that the alarm system is functional and can be installed were ever

it is required be it a commercial or residential asset to act as the first line of

defence before the arrival of the police in the event that a burglary incident

occurs.

5.2 RECOMMENDATIONS

A burglar alarm can initiate a considerable response by police or private

security personnel, who may leave other important duties to race to the scene

of the alarm. Therefore, the following recommendations are stated so as to

avoid the problems that are most likely to arise due to the issue of false

alarms and on how to make the system more effective:

- The active infrared detectors can be programmed to ignore the first

movement detected, as in when the intruder moves from one detection

zone to another, and to sound the alarm only when the movement passes

through two or more detection zones within a specified period of time.

- Another means of preventing false alarms is the dual-technology motion

detector.

This is the more common type of detector used in more sophisticated burglar

alarm systems. A dual-technology detector combines an active infrared

device and a microwave device in one small unit. The active infrared device
40
sees many detection zones and measures the change in background

temperature as a target moves across them. At the same time, the detector

projects microwaves and measures the Doppler shift when a target moves

through the protected space.

- If the alarm is to be used in commercial assets or high security areas the

following authorization methods could be added to ensure the

effectiveness of the system e.g. addition of multiple codes, or a

fingerprint, badge, hand-geometry, retinal scan, encrypted response

generator, and other means that are deemed secure for the asset in

question.

REFERENCES

41
Dietel H.M. & Dietel P.J. (2003), “C How to Program” (4th Edition), Prentice

Hall, Pearson Education Publishers

Horowitz P. & Winfield H., 2003, “The Art of Electronics”, 2nd Ed.,

University Press, Cambridge-Great Britain

Jorgensen D., (2009), “Literature Survey on Sensors & Actuators: Infrared

Proximity Sensor”, Department of Electrical & Computer Engineering, Utah

State University, USA

Allen, Samuel M. (2009) "Motion Sensors" Microsoft(R) Encarta(R) [DVD].

Redmond, WA: Microsoft Corporation.

Theraja, B.L. & Theraja, A.K. (2005), “A Textbook of Electrical

Technology”, Revised 24th Edition, S. Chand & Company Ltd., New Delhi,

India

Tokhiem R. L. (1999), “Digital Electronics: Principles and applications”,

5th Ed., the McGraw-Hill Companies Inc., USA

Pont M.J. (2002), “Embedded C”, Addision Wesley, Pearson Education

Publishers

8051 Microcontroller (2010, 18 August – Last Update). [Online]

42
Available:

http://en.wikibooks.org/wiki/Embedded_Systems/8051_Microcontroller

[2010, September 16]

Basic Principles of Burglar Alarms (2010, August 10). [Online]

Not Available: http://www.howtoinstallalarms.com/chapter-2-basic-

principles-of-alarms/basic-principles-burglar-alarm-systems.php [2010,

September 16]

Burglar Alarm (2010, 27 August -Last Update). [Online]

Available: http://en.wikipedia.org/wiki/Burglar_Alarm [2010, September 16]

Gregory J., A Short History of Burglar Alarms (2007, 3 March – Last

Update). [Online]

Available: http://ezinearticles.com/?A-Short-History-of-Burglar-

Alarms&id=475162 [2010, September 16]

Jones A. Types of Burglar Alarm System (2009, 12 April -Last Update).

[Online]

Available: http://ezinearticles.com/?Types-of-Burglar-Alarm-System---All-

You-Need-to-Know&id=2212440 [2010, September 16]

Microcontroller (2008, July – Last Update). [Online]

43
Available: http://en.wikipedia.org/wiki/Microcontroller [2010, September

16]

Passive Infrared Sensor (2010, 13 September – Last Update). [Online]

Available: http://en.wikipedia.org/wiki/Passive_Infrared_Sensor [2010,

September 16]

44
APPENDIX

S/NO COMPONENTS VALUE

1 Resistor 1 1k

2 Resistor 2 1k

3 Resistor 3 100k

4 Resistor 4 1k

5 IC555timer

6 Capacitor 1 100uf

7 Capacitor 2 100uf

8 Buzzer 1

9 Transistor Bc548

10 Photodiote

11 Transformer 12v

12 Diote 4 IN4001

13 LED 2

14 Power Switch

45

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy