You are on page 1of 31

SUMMER TRAINING PROJECT REPORT

On

SECYRITY ALARM SYSTEM

Electronics And Communication

HOME SECURITY
ALARM SYSTEM

1
TABLE OF CONTENT

1. COVER PAGE 1

2. INDEX 3

3. CERTIFICATE 5

4. ABSTRACT 6

5. ACKNOWLEGMENT 7

2
6. LIST OF TABLES 8

7. LIST OF FIGURES 9

8. LIST OF ABBREVIATIONS 10

i. CHAPTERS

ii. INTRODUCTION 11

iii. PURPOSE/AIM 12

iv. IDEA OF PROJECT 13

v. BLOCK DIAGRAM 14

vi. HARDWARE DETAILS

a. CENTRAL UNIT 15

b. PIR SENSOR 17

c. MAGNETIC SENSOR 19

d. GSM KIT 22

vii. ACCURACY AND SAFETY 25

viii. USABILITY 25

ix. CONCLUSION

1. EXPECTATIONS AND IMPROVEMENTS 26

2. FUTURE REFERENCES 26

9. APPENDICES

I. APPENDIX – I 27

II. APPENDIX – II 28

III. APPENDIX - III

10. REFRENCES

3
11. PERSONNEL FEEDBACK ABOUT THE TRAINING

CERTIFICATE

I here by certify that the work is being presented in the thesis report
entitled, “Security Alarm System”, submitted by me in fulfilment of the
requirements for the project work of degree of Batcher’s of Technology in
Electronics And Communication at Bhagwan Parshuram Institute of
Technology, Sec-17, Rohini, is a authentic record of my own work carried
out under the supervision of Mr. Vinay Chadha and refers other

4
project’s / researcher’s works which are duly listed in the reference
section.

The matter presented in this thesis has not been submitted for the award
of any other degree of any university.

(Student Name)

This is to certify that the above statement made by the candidate is


correct and true to the best of my knowledge.

Name of Project Guide


Designation
Name of the Department
Organisation Address

5
ACKNOWLEDGEMENT

No volume of words is enough to express my gratitude towards my guide <Guide Name>,


Designation, <Department>, <Address>, who has been very concerned and has aided for all
the materials essential for the preparation of this thesis report. She has helped me to explore
this vast topic in an organized manner and provided me with all the ideas on how to work
towards a research-oriented venture.

I am thankful to my mentor <Mentor name>, Designation, <Department>, <HOD Name>,


Head of the Department, and Mr. R K Tiwari, Head Training and Placement, BPIT for the
motivation and inspiration that triggered me for the thesis work.

I would also like to thank the staff members and my colleagues who were always there at the
need of the hour and provided with all the help and facilities, which I required for the
completion of my thesis work.

I am very much grateful to Prof. A K Tandon, Director BPIT for his valuable support at the
Institution Level for giving me the opportunity for pursuing this B.Tech course and help in
conceptualising the project/research work and to all those outstanding individuals with whom
I have worked in this Institution, who helped me understanding the concept.

Most importantly, I would like to thank my parents and the almighty for showing me the right
direction out of the blue, to help me stay calm in the oddest of the times and keep moving
even at times when there was no hope

<Student Name>

Branch

Enrolment No.

Class Roll. No

6
ABSTRACT <Make it as per your work>

For any work of literature, a fundamental issue is to identify the individual(s) who
wrote it, and conversely, to identify all of the works that belong to a given individual or to
identify the individual who writes many papers on same topic or to identify the topics name
that an author works on.

Information extraction techniques (such as Author Name and Topic Recognition)


have long been used to extract useful pieces of information from text. The types of
information to be extracted are generally fixed and well defined. However in some cases, the
user goal is more abstract and information types cannot be narrowly defined. For example, a
reader of online user reviews typically has the goal of making a good choice and is
interested to learn about the different aspects of a topic and author relation (e.g., famous
author of a topic, author’s papers with his research field). Some of these aspects may be
known by the reader and some others may need to be discovered from the inherent text
structure in a large collection. Even for the known aspects (such as “author name” and
“topic”), the challenge is to recognize various hidden aspects like number of papers written
by an author, his research field, popularity of an author.

In this thesis, we model the author-topic information discovery system as topics with
identifiable word distributions across documents. We review several probabilistic graphical
models (such as Latent Dirichlet Allocation) and propose a new model which is based on
frequency of the words within the document. We also provide a case study of a probability
based author-topic model developed for information discovery.

7
LIST OF TABLES

Table 1: PIR Specifications……………………………………………………………………..18

Table 2: AT Command ………………………………………………………………………….24

8
LIST OF FIGURES

Figure 1: General Setup for Remote File Syncronization………………………………….........……13

Figure 2: AT MEGA board(1280)………………………………………………..……………………….........…15

Figure 3: PIR sensor………………………………….…………………………………….........………...........…17

Figure 4:connections of PIR………………………………………………………...................…...............18

Figure 5: magnetic switch ..................................……………………………………….............……..19

Figure 6: GSM and GPRS kit...........................................................………………………………..23

9
LIST OF ABBREVIATION

LCD LIQUID CRYSTAL DISPLAY

PIR PASSIVE INFRARED SENSOR

GPRS GENERAL PACKET RADIO SERVICE

GPS GLOBAL POSITIONING SYSTEM

MCU MICROCONTROLLER UNIT

SMS SPEED MESSAGE SERVICE

LED LIGHT EMMITING DIODE

PWM PULSE WIDTH MODULATION

SIM SUBSCRIBER IDENTIFY MODULE

PCMCIA

AT

INTRODUCTION
This is a digital home security system with alarm feature
which can monitor password for entrance, magnetic door lock
and motion detector.
The goal of this project is to utilize the after-market parts and
build an integrated home security system. we have also

10
incorporated password and magnetic lock for door and motion
sensor. Hence the security system will sound an alert when
there is an attempt of break-in.
The system is fully digital and also be fully customized. It
incorporated a 16x2 LCD display with a keypad,PIR sensor
and magnetic door lock. However we have used a keyboard
instead of keypad for cost facility. Each sensor can be enabled
or disabled. Electronic alarms designed to alert the user to a
specific danger by sounding a loud buzzer.

However we have included the GPRS and GPS system in our


project as future reference because they will enhance the
capability of the system by sending the threat message to the
house owner and local police of the intruder’s break-in house
to inform them immediately wherever they are.

Sensors are connected to a control unit via low-voltage wiring


used to interact with a response device.

AIM/PURPOSE

11
Aim of the project is to investigate a cost effective
solution that will enable home security against intrusion
in the absence of home owner.

PROJECT IDEA
12
The idea of our project comes from the fact that security
system is quite basic and only offers simple password lock.
Hence we would like to enhance our security system with
different kinds of sensors.

BLOCK DIAGRAM

13
Magnetic sensor
Keyboard (Connected to the door )

MCU
(Arduino Mega Board 1280)

Buz-zer
PIR sensor(for
human detection)

LED

Fig 1:block diagram

The block diagram of our system is shown above. The central


unit will handle all the sensors and keyboard and input, output
information to
LCD screen, indicate system status on LED and buzze

HARDWARE DETAIL
1. Central Unit

14
 The control panel(central unit) can be called as the
“brain" of the security system, and operates as the central
computer.
 Various sensors are connected to the control panel from
locations throughout the home.
 If sensors detect a problem, control panel cause an
appropriate alarm output.

The central unit used in our program is Arduino AT mega


board. It has a MCU no. 1280.

Fig 2:Arduino ATMega board(1280)

15
Arduino board is connected to the PC via USB port through
serial port. It provide a 5v signal and other digital input,
analog input, PWM output.
The microcontroller used is ATMEGA 1280.

16
2. PIR motion sensor
 The Passive Infrared Detector works through detecting
the human bodies infrared spectrum.
 The sensor receives infrared rays given off by the human
body and outputs signals after computing to the central
unit for further action to be taken.
 This Technology detector combined with microwave and
passive infrared intelligence, adopting advanced signal
analysis technology, can avoid various kinds of false
alarms under worse environment and proper installation
can avoid dead zones.

Fig 3:PIR sensor

17
Specifications of PIR Sensor-
1.pin specifications
PIN CONNECTIONS
Out Gives output
+ Connect to V supply
-(gnd) Connect to ground
Table 1
2. Other specification-
Range- 20 feet
Dimensions- 32.2 * 24.3 * 25.4 mm
Cost- Rs 450

Fig 4:Connections of PIR

18
3. Door/Window Magnetic Sensor
 This is usually accomplished with a non-contact
switching system using a sintered alnico magnet and a
reed switch.
 The presence of the magnetic field passing through the
conductors of the switch causes them to pull together,
closing the circuit.
 When the magnet is moved away from the switch, the
circuit opens. Closed circuit indicates the closed
door/window and
 Releases the reed switch when the door/window is
opened and triggers an alarm at the same time.

Fig 5:magnetic sensor(reed switch)

19
SPECIFICATIONS OF REED SWITCH-

20
CIRCUIT FOR REED SWITCH
 Arduino (1x)
 Reed Switch (1x)
 10K Resistor (1x)
 Breadboard (1x)
 LED (1x)
 Magnet(1x)
 Wires (MISC.)
 first connect a LED to pin 13 and Ground on the
breadboard.
 Now connect Arduino 5 volt and ground to its own
buses. Then insert your reed switch onto your bread.
 Now connect a 10K resistor from 5 volts to the reed
switch
 Connect Digital Pin 2 of the Arduino board where you
connected your 10K resistor to the reed switch. Finally,
connect the other pin of the reed switch to ground
The circuit diagram for reed switch is attached in appendix
1.

21
4.GSM module
 A GSM modem is a wireless modem that works with
GSM networks.
 A GSM modem can be an external unit or a PCMCIA
card (also called PC Card). An external GSM modem is
connected to a PC through a serial cable, a USB cable,
Bluetooth or Infrared. Like a GSM mobile phone, a GSM
modem requires a SIM card from a wireless carrier in
order to operate
 PC use AT commands to control a modem. GSM
modems support an extended set of AT commands.
These extended AT commands are defined in the GSM
standards. With the extended AT commands, you can do
things like:
 Read, write and delete SMS messages.
 Send SMS messages.
 Monitor the signal strength.
 Monitor the charging status and charge level of the
battery.
 Read, write and search phone book entries.

22
Fig 6:GPRS and GPS kit

23
If SMS over GPRS is used, an SMS transmission speed of
about 30 SMS messages per minute may be achieved. This is
much faster than SMS over GSM. A GPRS modem is
required to send and receive SMS via GPRS. Some wireless
carriers do not support the sending and receiving of SMS via
GPRS. A GPRS modem is typically required for MMSA
GSM modem can be an external modem device, such as the
Siemens MC35 or Wavecom FASTRACK external modems.
Insert a GSM SIM card into this modem, and connect the
modem to an available serial port on your computer
Command Description
AT+CMGD DELETE SMS MESSAGE
AT+CMGF SELECT SMS MESSAGE FORMAT
AT+CMGL LIST SMS MESSAGES FROM PREFERRED STORE
AT+CMGR READ SMS MESSAGE
AT+CMGS SEND SMS MESSAGE
AT+CMGW WRITE SMS MESSAGE TO MEMORY
AT+CMSS SEND SMS MESSAGE FROM STORAGE
AT+CMGC SEND SMS COMMAND
AT+CNMI NEW SMS MESSAGE INDICATIONS
Table 2:AT command

24
ACCURACY AND SAFETY
After the user enables the security system, the green status
LED will lid to indicate the system status. User can now enter
proper password to unlock the system. If any sensor goes
wrong, the LCD will output error. Magnetic switch attached at
the door will keep the door closed as long as password is
incorrect. If password entered is correct then sensors will be
disabled else all will remain enabled and if any intruder tries
to break-in house without correct password, immediately the
buzzer will buzz out loudly to inform about the intruder.

25
USABILITY
Our home security system is very practical. It can be used not
only in the home environment but also in a business
environment too. It can monitor the surrounds to not only
protect our properties but also our lives. Besides, it can be
highly customized to suit each one's need and preference. So
our security system is very useful for us as well as other
people. We believe every house in the world should equip a
security system like the one we design.

26
CONCLUSIONS
Expectation and Improvement
The result of our design has met our expectation, in which
every sensor is working and will sound specific alarm when
the system goes into alert status. The keypad and LCD also
offer great interface and users can be familiar with our system
in less than few seconds.

Future References
If we have chance to design this project again, we will add a-
1. GPRS and GSM kit as it will alert the user anywhere he/she
is present and can also inform nearby police to catch the
intruder as soon as possible.
2. Smoke detector for fire safety.
3. Temperature detector.
4. A keypad instead of a keyboard.
5. A voice message alert system along with the buzzer.

27
Appendix 1:

28
Appendix 2:

PROGRAM FOR MAGNETIC SENSOR

int ledPin = 13;

int inputPin = 2;

int val = 0;

void setup()

{ pinMode(ledPin, OUTPUT);

pinMode(inputPin, INPUT);

void loop()

{ val = digitalRead(inputPin);

if (val == LOW)

{ digitalWrite(ledPin, LOW);

else

{ digitalWrite(ledPin, HIGH);

PROGRAM FOR PIR SENSOR

int ledPin = 13; // choose the pin for the LED

int inputPin = 24; // choose the input pin (for PIR sensor)

int pirState = LOW; // we start, assuming no motion detected

int val = 0; // variable for reading the pin status

void setup()

{
pinMode(ledPin, OUTPUT); // declare LED as output
pinMode(inputPin, INPUT); // declare sensor as input

Serial.begin(9600);

29
}

void loop()

{
val = digitalRead(inputPin); // read input value
if (val == HIGH)

digitalWrite(ledPin, HIGH); // turn LED ON


if (pirState == LOW)

{ // we have just turned on


Serial.println("Motion detected!");
// We only want to print on the output change, not state
pirState = HIGH;
}
}

else

{
digitalWrite(ledPin, LOW); // turn LED OFF
if (pirState == HIGH)

{ // we have just turned off


Serial.println("Motion ended!");
// We only want to print on the output change, not state
pirState = LOW;
}
}

PROGRAM FOR PASSWORD

include <Password.h>
#define LED 13
Password password = Password( "1234" );
int c,i,j;
char check;
char pass[4];
void setup()
{ Serial.begin(9600);

30
pinMode(LED,OUTPUT);
c=0;
}
void loop()
{ for(i=0;i<4;i++)
{ while(Serial.available()==0);

j=Serial.read();

password.append(j);
Serial.print(j,BYTE);
}
if(password.evaluate())
{ digitalWrite(LED,HIGH);
Serial.println("correct password");
delay(5000);
}
else
{ delay(5000);
c++;
password.reset();
Serial.println("incorrect password");
}
while(c==4)
{ Serial.println("limit exceeded");
exit(0);
}
}

31

You might also like