1.1 Background of Study

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 18

INTRODUCTION

1.1 BACKGROUND OF STUDY


Security system are gaining increase importance in recent times to protect life and valuable resources, many
advanced method of providing security have been developed and are in use in the last few decades. One
important area is the security system required for military/strategic applications, which has advanced
greatly. Such systems being complex and expensive are useful to high end application only. However with
recent progress in technology and the growing need for increased security in civilian and other applications,
many low cost solutions security system have now emerged. In the field of the Burglar Alarm Systems
using modern approaches has become a major means of providing security in all applications, both military
and civilian.
Due to high state of insecurity being experienced in the entire world the need to keep the occupants of the
office aware of any intrusion in to their premises forms part of the project.

In the civilian circle, security systems are required for both life and property protection. Properties such as
goods in wharehouse required protection from theft and robbery. These demand that one form or the other
of an intrusion detection system be installed in the wharehouse . The purpose of the development of the
office grown simple intrusion detection system that meets the same needs as commercial available system.

1.2 STATEMENT OF THE PROBLEM


Erisco food company has been experiencing a lot of losses in their business, due to theft in the wharehouse,
the company suffer a great deal of loss caused by their internal employee and external civilian in the locality
which take the combination process, security system ,implementation to reduce theft in the company.

1.3 AIMS AND OBJECTIVES


The aim of the study is at designing, simulating and implanting a cheap and reliable alarm system using
Small Scale Integrated and Medium Scale Integrated chips that can detect and warn on external intrusion.
Objectives of study are the following;
1. Ensure the security of an office by deterring person intending to burglar and warning the occupants
of the office of any unauthorized entry into their premise.
2. Provide psychological satisfaction of being secure to the office occupant.
3. Provide safety to goods at night after work hours.

1.4 SCOPE OF THE WORK


1.5 JUSTIFICATION/SIGNIFICANCE OF THE STUDY
1. To Regulate the entry and exit in the factory at a given period of time.
2. To specify at what point goods were taken and kept.
3. To keep adequate record of minimum and maximum sales of goods per working day and record of
products produced per day.
4. To enable the occupant to give accurate account of goods produced and delivered.
5. To keep security personnel alert of any unauthorized entry and exit in the company after working hours.
CHAPTER TWO: LITERATURE REVIEW

2.1 INTRUSION DETECTION SYSTEM

An Intrusion Detection System (IDS) is a monitoring system that detects suspicious activities and
generates alerts when they are detected. Based upon these alerts, a security operations center (SOC) analyst or
incident responder can investigate the issue and take the appropriate actions to remediate the threat to alert the
owner of the property of the wharehouse.

According to (www.WIKIPEDIA.com) an intrusion detection system (IDS; also intrusion prevention system or
IPS) is a device or software application that monitors a network or systems for malicious activity or policy
violations. Any intrusion activity or violation is typically reported either to an administrator.

According to (Ben Lutkevich 2009) an intrusion detection system (IDS) is a system that monitors network traffic
for suspicious activity and alerts when such activity is discovered.

2.2 DESIGN

2.3 IMPLENTATION

2.4 ERISCO FOODS COMPANY LIMITED

Erisco Foods limited, is an indigenous foods product manufacturer incorporated in Nigeria in 2004 and
started operation in 2009, we are firmly committed to producing high-quality products that combine
nourishment with value pricing. As they strive to become one of Nigerias largest indigenous food
manufacturers on a global scale.
ERISCO VISION AND MISSION
To become one of the largest indigenous manufacturers of food products globally producing high-quality
products that combine nourishment with value pricing.
CHAPTER THREE: MATERIAL AND METHODOLOGY

3.1MATERIAL USED

1. BURGLAR ALARMS

Most burglar alarm systems run from a fixed 12V power supply. This is also the standard operating supply
voltage for usual subsystems such as any ultrasonic, PIR, heat, pressure or magnetic sensors etc. also the
majority of the Strobe flashing lights and sirens available also run from 12V. Bearing this knowledge in mind,
my burglar alarm control panel should run from a 12V supply, and when an alarm output has to be activated, a
supply of 12V should be supplied. A standard also exists for how input sensors operate. They normally use a
normally closed (N.C.) loop for sensors, so that an alarm condition is signaled by a switch being opened within
the sensor and cutting the circuit. This also means that should a burglar cut the wires to a sensor, then the loop
will be cut and an alarm signal is generated. Most commercial burglar alarms have the capability to monitor the
input sensors separately, so that in the event of a burglary, it is known which sensors were and were not triggered
so that the point of entry and extent of break in can be deduced.

2. MICROCONTROLLER

A microcontroller (also MCU or µC) is a small computer on a single integrated circuit consisting of a relatively
simple CPU combined with support functions such as a crystal oscillator, timers, and watchdog, serial and analog
I/O etc. Program memory in the form of NOR flash or OTP ROM is also often included on chip, as well as a,
typically small, read/write memory. Thus, in contrast to the microprocessors used in personal computers and
other high performance applications, simplicity is emphasized. Some microcontrollers may operate at clock
frequencies as low as 32 KHz, as this is adequate for many typical applications, enabling low power
consumption (millwatts or microwatts). They will generally have the ability to retain functionality while waiting
for an event such as a button press or other interrupt; power consumption while sleeping (CPU clock and most
peripherals off) may be just nanowatts, making many of them well suited for long lasting battery applications. 5
Microcontrollers are used in automatically controlled products and devices, such as automobile engine control
systems, remote controls, office machines, appliances, power tools, and toys. By reducing the size and cost
compared to a design that uses a separate microprocessor, memory, and input/output devices, microcontrollers
make it economical to digitally control even more devices and processes.

4.ANALOG TO DIGITAL CONVERTER

An analog-to-digital converter (abbreviated ADC, A/D or A to D) is a device which converts continuous signals
to discrete digital numbers. The reverse operation is performed by a digital-to-analog converter (DAC).
Typically, an ADC is an electronic device that converts an input analog voltage (or current) to a digital number.
However, some non-electronic or only partially electronic devices, such as rotary encoders, can also be
considered ADCs. The digital output may use different coding schemes, such as binary, Gray code or two's
complement binary. 5.TRANSDUCERS

This section deals with the various possible sensor designs and how they function and which could be
appropriate for particular case.

6. INFRARED MOTION DETECTOR

7. PASSIVE INFRARED SENSOR (PIR SENSOR

 Passive Infrared sensor (PIR sensor) is an electronic device that measures infrared (IR) light radiating
from objects in its field of view. PIR sensors are often used in the construction of PIR-based motion
detectors (see below). Apparent motion is detected when an infrared source with one temperature, such
as a human, passes in front of an infrared source with another temperature, such as a wall. All objects
emit what is known as black body radiation. It is usually infrared radiation that is invisible to the human
eye but can be detected by electronic devices designed for such a purpose. The term passive in this
instance means that the PIR device does not emit an infrared beam but merely passively accepts
incoming infrared radiation. In passive infrared motion detectors, a sensor containing an infrared-
sensitive phototransistor is placed in the area to be protected. Circuitry within the sensor detects the
infrared radiation emitted by the intruder's body and triggers the alarm. The problem with using this type
of detector is that it can be falsely triggered by warm air movement or other disturbances that can alter
the infrared radiation levels in an area. In order to prevent this problem, newer systems use two infrared
sensors which monitor different zones within a protected area. Logic within system triggers the alarm
only when the two zones are activated in sequence, as would occur if a person walked through the
protected area.
 Pyroelectric Sensors
The pyroelectric sensor is made of a crystalline material that generates a surface electric charge when
exposed to heat in the form of infrared radiation. When the amount of radiation striking the crystal
changes, the amount of charge also changes and can then be measured with a sensitive FET device built
into the sensor. The sensor elements are sensitive to radiation over a wide range so a filter window is
added to the TO5 package to limit detectable radiation to the 8 to 14mm range which is most sensitive to
human body radiation. Typically, the FET source terminal pin 2 connects through a pull down resistor of
about 100 K to ground and feeds into a two stage amplifier having signal conditioning circuits. The
amplifier is typically bandwidth limited to below 10Hz to reject high frequency noise and is followed by
a window comparator that responds to both the positive and negative transitions of the sensor output
signal. A well filtered power source of from 3 to 15 volts should be connected to the FET drain terminal
pin 1.

Figure 1.1
The PIR325 sensor has two sensing elements connected in a voltage bucking configuration. This
arrangement cancels signals caused by vibration, temperature changes and sunlight. A body passing in
front of the sensor will activate first one and then the other element whereas other sources will affect
both elements simultaneously and be cancelled. The radiation source must pass across the sensor in a
horizontal direction when sensor pins 1 and 2 are on a horizontal plane so that the elements are
sequentially exposed to the IR source. A focusing device is usually used in front of the sensor.
Figure 2.2
Fresnel lens
A Fresnel lens (pronounced Frennel) is a Plano Convex lens that has been collapsed on itself to form a
flat lens that retains its optical characteristics but is much smaller in thickness and therefore has less
absorption losses.
Figure 2.3
Our FL65 Fresnel lens is made of an infrared transmitting material that has an IR transmission range of
8 to 14um which is most sensitive to human body radiation. It is designed to have its grooves facing the
IR sensing element so that a smooth surface is presented to the subject side of the lens which is usually
the outside of an enclosure that houses the sensor.

The lens element is round with a diameter of 1 inch and has a flange that is 1.5 inches square. This
flange is used for mounting the lens in a suitable frame or enclosure. Mounting can best and most easily
be done with strips of Scotch tape. Silicone rubber can also be used if it overlaps the edges to form a
captive mount. There is no known adhesive that will bond to the lens material.

The FL65 has a focal length of 0.65 inches from the lens to the sensing element. It has been determined
by experiment to have a field of view of approximately 10 degrees when used with a PIR325
Pyroelectric sensor.
Figure 2.4
This relatively inexpensive and easy to use Pyroelectric Sensor and Fresnel Lens can be used in a
variety of science projects, robots and other useful devices.
8. ACTIVE INFRARED MOTION DETECTOR

Figure2.5
Figure 2 shows the operation of an active infrared motion detector. In the active system each sensor
consists of two housings. One housing contains an infrared-emitting diode and an infrared-sensitive
phototransistor. The other housing contains an infrared reflector. When positioned in front of an entrance
to a protected area, the two housings establish an invisible beam. A person entering the area interrupts
the beam causing an alarm to be triggered. An active motion detector is much more reliable than a
passive one, but it requires careful alignment when it is installed. The detector can be falsely triggered if
one of the housings moves slightly and causes a discontinuous beam.

9.MAGNETIC REED SWITCHES


Though a house is well protected by installing break proof doors and windows it is necessary to monitor
the conditions of the door. This can be done by installing small magnetic switches inside the frame. This
activates the alarm when it is disturbed.

Figure 2.6
10. BREAKING GLASS DETECTOR
Modern glass break detectors consist of small microphone connected to a sound processor. The
microphone is tuned to the frequency of breaking glass, and the processor looks for a characteristic
sound pattern. Additionally, the shock sensor detects the tiny shock wave that passes all through the
building when a window suffers an impact. Only when there is sound of breaking glass, and a shock
wave, will the alarm sound. Thus, they are tremendously immune to environmental noise which might
cause a false alarm. Glass break detectors must be located within a range of the glasses to protected,
usually ten feet or so. Additionally, heavy window treatments can significantly reduce the effective
range. Up to now the windows and doors are covered.

11. ULTRASONIC MOTION DETECTORS


Ultrasonic transducers can be used to detect motion in an area where there are not supposed to be any
moving objects. This type of motion detector is most commonly used in burglar alarm systems since they
are very effective in this application.

Figure 2.7 shows the operation of an ultrasonic motion detector. There are two transducers: one emits an
ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected
waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something
moves, the received signal is shifted in phase. A phase comparator detects the shifted phase and sends a
triggering pulse to the alarm.

Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types
of motion detectors. The main advantages are that they are very sensitive and extremely fast acting.
However, the largest problem with this type of motion detector is that it sometimes responds to normal
environmental vibration that can be caused by a passing car or a plane overhead. Some types of motion
detectors use infrared sensors to avoid this problem, but even these detectors have some problems.

Figure 2.7
12. LV-MAXSONAR-EZ1HIGH PERFORMANCE SONAR RANGE FINDER

With 2.5V - 5.5V power the LV-MaxSonar-EZ1 provides very short to long range detection and ranging,
in an incredibly small package. The LV-MaxSonarEZ1detects objects from 0-inches to 254-inches (6.45-
meters) and provides sonar range information from 6-inches out to 254-incheswith 1-inch resolution.
Objects from 0-inches to 6-inches range as 6-inches. The interface output formats included are pulse
width output, analog voltage output, and serial digital output.
Features
·Continuously variable gain for beam control and side lobe suppression
· Object detection includes zero range objects
· 2.5V to 5.5V supply with2mA typical current draw
· Readings can occur up to every 50mS, (20-Hz rate) 14
· Free run operation can continually measure and output range information
· Triggered operation provides the range reading as desired
· Designed for protected indoor environments
· Sensor operates at 42 KHz
Benefits
· Very low cost sonar ranger
· Reliable and stable range data
· Sensor dead zone virtually gone
· lowest power ranger
· Quality beam characteristics
· Mounting holes provided on the circuit board
· Very low power ranger, excellent for multiple sensor or battery based systems
· Can be triggered externally or internally
· Sensor reports the range reading directly, frees up user processor
Beam Characteristics
People detection requires high sensitivity, yet a narrow beam angle requires low sensitivity. The LV-
MaxSonarÒ-EZ1Ô balances the detection of people with a narrow beam width. Sample results for
measured beam patterns are shown below on a 12-inch grid. The detection Pattern is shown for;
(A) 0.25-inch diameter dowel, note the narrow beam for close small objects,
(B) 1-inch diameter dowel; note the long narrow detection pattern,
(C) 3.25-inch diameter rod, note the long controlled detection pattern,
(D) 11-inch wide board moved left to right with the board parallel to the front sensor face and the sensor
stationary. This shows the sensor’s range capability.
Note: The displayed beam width of (D) is a function of the secular nature of sonar and the shape of the
board (i.e. flat mirror like) and should never be confused with actual sensor beam width.
13.VARIOUS APPROACH.
In order to design this project the main decision I need to make is what approach I will take for the main
alarm processing. In this chapter discussion of these designs dealt with and the reason why one design
was chosen.
14. Discrete Component Based Design
This is one of the earliest forms of design which involve discrete components to build the digital
systems.
Disadvantages:
· Huge power consumption
· Large size of a complete system
· Difficult to debug the complete system
These systems includes the use of digital gates such as NAND, AND , NOR gates etc. .such as 74yy
series. To build the system as stated the following components would be used
· AND, OR gates
· Delay circuits that can be implemented using flip-flop,555 timer ICS.
· Motion detector such as infrared motion detector would involve infrared sensitive transistor that are
biased to conduct by infrared emitted energy.
Generally if these project where to be implemented using this way it would be quite bulky expensive
and very hard to trouble shoot it in case of failure.

15. COMPUTER BASED DESIGN


Computers are very powerful device that can implement the control unit with minimum components .the
only important part is the interface between the sensors, switches, alarm and buzzer to the
computer .This can be done through the 1pt printer port (parallel port) which has eight pins and five
input pins. To get more pin one can add another input card or include a microcontroller to communicate
with the computer serially. By writing software to manipulate the voltage at these pins one is able to scan
the conditions of the sensor and perform the appropriate action .However to interface the circuit to
computer one as to be careful as the parallel port only accept up to a maximum of 5volts.while things
like relay switches ear usually accompanied by the transient which are be harmful to the printer port.
These demands use of optiosolator to electrically separate the computer from the external circuits.

Limitations for computer based design:


· High cost of computer
· The computer has to be continuously, this means the need for dedicated computer which is
uneconomical
· Due to constant power losses there is need to include power backups which and the cost.
16. MICROCONTROLER BASED DESIGN
Circumstances that we find ourselves in today are in the field of microcontrollers which had their
beginnings in the development of technology of integrated circuits. This development has made it
possible to store hundreds of thousands of transistors in to one chip. That was a perquisite for production
of microprocessors, and the first computers were made by adding external peripheral such as memory,
input –output lines timers and other .further increasing of the volume of the package resulted in creation
of integrated circuits .these integrated circuits contained both processor and peripherals. That is how the
first chip containing a microcomputer, or what would later be known as microcontroller came about.
Microcontroller differs from microprocessor in many ways. First and fore most important is its
functionality. In order for a microprocessor to be used other components such as memory, or
components for receiving and sending data must be added to it .in short that means that microprocessor
is very heat of computer in other hand microcontroller is designed to be all of that in one. No other
external component are needed for its application because all necessary peripherals are already built into
it ,thus we save the time and space needed to construct devices.
In this project microcontroller will form the heart of the system. This would perform the function of
polling sensors interpreting input and perform the necessary action. This is so because using instead of
using intelligent sensor s that would be reporting to central unit the project will utilize dump sensors.
Most microcontrollers come with several ports than several bit wide for example in this case the
Atmega168 from Atmel Company has two 8bit ports and one 7bit port. These ports can be connected to
the various sensors whose high condition are 5.5volts and low are 1.8volts.
Advantages of microcontroller based design
 Can be produced in small packages that users can be able to configure on their own.
 Low Power Consumption thus cheap to maintain can be run by batteries
– Active Mode: 250 μA at 1 MHz, 1.8V15 μA at 32 kHz, 1.8V (including Oscillator)
– Power-down Mode: 0.1μA at 1.8V

 They stand alone equipments that require little maintenance.


 They are easy to debug in case of fault as they consist of very few copheriperial
components.
 They are easy to upgrade due to compatibility of AVR microcontrollers of
differed series for example the code written for ATmega48 can be run in
ATmega88 with minor modification.
 The ATmega48/88/168 has Advanced RISC Architecture (reduced instruction set
computer).
– 131 Powerful Instructions – Most Single Clock Cycle Execution
– 32 x 8 General Purpose Working Registers
– Fully Static Operation
– Up to 20 MIPS Throughput at 20 MHz
– On-chip 2-cycle Multiplier
Thus they are easy to learn and develop software having in mind the need to
shorten development time and reduce time to market. This is very important
aspect in modern world.
High Endurance Non-volatile Memory segments
– 4/8/16K Bytes of In-System Self-programmable Flash program memory
– 256/512/512 Bytes EEPROM
– 512/1K/1K Bytes Internal SRAM
– Write/Erase cycles: 10,000 Flash/100,000 EEPROM
– Data retention: 20 years at 85°C/100 years at 25°C
– Optional Boot Code Section with
Independent Lock Bits In-System
Programming by On-chip Boot Program
True Read-While-Write Operation
– Programming Lock for Software Security
Thus reduce cost of field up grades since the cost of upgrading a
system code can be dramatically reduced. with very little effort and
planning, flash based system can be designed to have code upgrades
in the field for AT mega FLASH device the entire code can be
rewritten with new code new code segments and parameter tables
can be easily added in program memory areas left blank for upgrade
purpose, only portion of code (such as key algorithm) require update.
 Calibration and customization of your system
Calibration need not be done only in factory .during installation
of the system can be calibrated to actual operating environment.
In fact recalibration can be easily done during periodic servicing
and maintenance.
Customization need not to be done in factory only. In many
situations customizing a product at installation time is very
useful. .a good example is a home or car security systems where
ID code, access code and other such information can be burned
in after the actual configuration is determined.
 Add unique Id code to your system during manufacturing.
 Many products require a unique ID number or a serial number.
An example application would be remote keyless entry device.
Each transmitter has a unique “binary key” that makes it very
easy to program in the access code at the very end of the
manufacturing process and prior to final test. Serial number,
revision code, date code, manufacture ID and a variety of other
useful information can also be added to any product for
traceability

3.2 METHODOLOGY ADOTED.

Project was designed in the following modules:

1. House Intrusion Module:


This module consists of motion detectors placed strategically in concealed location this
sensors when activated should activate the following devices in the following sequence:- ·
Activate buzzer to warn the occupants. · If present, activate the cameras · Finally, it should
set off the alarm
2. The Control Unit Module:
This is the decision making center that interprets the various inputs from the sensor and
makes the appropriate logic decision.
3. Arm and Disarm Module:
This is for arming and disarming the system.
4. Alarm Module:
This is for warning and deterring the intruders.

Block diagram:

Arm/Disarm

Power supply Microcontroller(Poll/Make Decisions) Alarm

Range sensor

Figure 1.

You might also like