You are on page 1of 25

SIMULATION AND DESIGN REGARDING THE FOUR WALLS CROSSED

SECURITY SYSTEM FROM THE INTRUDERS BY THE USE OF PIC


MICROCONTROLLER

1
ACKNOWLEDGEMENT
I express my gratitude to my team members for all the efforts and hard work they have
provided to build this project in a successful manner. I gained a lot of knowledge and ideas from
my teammates regarding the subject title, and I would like to provide my greatest regards to
them.
With the hard work and dedication of our team members the project entitled “SIMULATION
AND DESIGN REGARDING THE FOUR WALL CROSSED SECURITY SYSTEM BY THE USE OF PIC
CONTROLLER” was performed and this was considered to be a part of study course under the
electrical and electronics department. The success of the project was mostly obtained by the
major help of our supervisor as he provided various ideas regarding the project title, as well as,
helped in solving the problems regarding the obstacles obtained during the performance of the
project.
By the direct supervision of our supervisor Mr…. the project was performed and completed. We
would like to provide special regards to our electrical and electronics engineering department
for helping us in finding various project files related to our project title. Warm regard to our
project supervisor, without him this project would never be considered a successful one.
Heartfelt greeting to every teacher who helped us during the project and a very special thanks
to our family members who stayed by us in every difficulty, encouraged us in bad situations,
and build our confidence so that we could perform better regarding the project.
Project member

2
DECLARATION
This project was performed by our team members and the project entitled “SIMULATION AND
DESIGN REGARDING THE FOUR WALL CROSSED SECURITY SYSTEM BY THE USE OF PIC
CONTROLLER” was considered under the course regarding the electrical and electronics
department.
No contents regarding this project were considered to be copied from any other project file
source and the only the concept regarding the methods and terminologies were taken into
consideration. The project was performed on the basis of our own knowledge and ideas and the
project was conducted without the violation of any rules and regulations regarding the project.
After the completion of the project, this file was submitted to the engineering department and
was under the protection of that department. If anyone is found to be guilty regarding the
copying of the content of our file then they are liable to receive any action provided by the
university.
Project members

3
ABSTRACT
In the recent world, greater technology regarding the security system of the protected area is
required as with the advancement in the technology, the thief has upgraded their way of
performing their activity, as a result, the older way of security system could be easily breakable
and could perform their activity very neatly. So with the advancement of technology, the
upgrade in the security system was very essential. In this system, the design regarding the four
walls crossed security system was performed by the application of a PIC microcontroller. This
system considered four walls consisting in every direction i.e. east, west, north, south. Every
wall was provided by a sensor consisting of a light-dependent resistor (LDR) along with the
light-emitting diode (LED). Now, this system performed by as any of the unauthorized person
crossed the wall, they disturbed the continuous flow of light from LDR to LCD which resulted in
the zero output voltage of the peripheral interface controller. As soon as this controller gained
the voltage of nil, then the signal regarding the crossing of the wall was sent immediately to the
liquid crystal display (LCD). As this activity was performed, the dc motor consisted in the system
was activated and performed the activity stopping of the CCTV at the wall where the crossing
activity has occurred to record the activity and immediately activated the buzzer which
provided the alarm and provided the knowledge regarding the intrusion of the protected
property. If, in the case of gaining of 5V from each of the LDR by the controller, then everything
was considered to be normal and no intrusion activity has occurred till that time. Also, the
display of “ALL WALLS OK” was obtained on the LCD. This system also provided information
regarding the date, as well as time in liquid crystal display.

4
TABLE OF CONTENT

ACKNOWLEDGEMENT…………………………………………………………………………………………………………….2
DECLARATION…………………………………………………………………………………………………………………………3
ABSTRACT……………………………………………………………………………………………………………………………….4
CHAPTER 1: INTRODUCTION……………………………………………………………………………………………………7
1.1 OVERVIEW…………………………………………………………………………………………………………………………7
1.2 BACKGROUND…………………………………………………………………………………………………………………..7
1.3 PROBLEM REGARDING THE PROJECT………………………………………………………………………………..8
1.4 OBJECTIVE OF THE DESIGN………………………………………………………………………………………………..8
1.5 SCOPE REGARDING THE PROJECT……………………………………………………………………………………..8
1.6 METHODOLOGY………………………………………………………………………………………………………………..9
CHAPTER 2: LITERATURE REVIEW……………………………………………………………………………………………10
CHAPTER 3: COMPONENTS AND TERMINOLOGIES………………………………………………………………….14
3.1 RESISTOR…………………………………………………………………………………………………………………………..14
3.2 LIQUID CRYSTAL DISPLAY (LCD)…………………………………………………………………………………………14
3.3 LIGHT DEPENDENT RESISTOR (LDR)…………………………………………………………………………………..14
3.4 LIGHT-EMITTING DIODE (LED)…………………………………………………………………………………………..15
3.5 BUZZER……………………………………………………………………………………………………………………………..15
3.6 TRANSISTOR………………………………………………………………………………………………………………………15
3.7 OSCILLATOR………………………………………………………………………………………………………………………16
CHAPTER 4: DESIGNING OF THE SYSTEM…………………………………………………………………………………17
4.1 MICROCONTROLLER (PIC 16F877A)…………………………………………………………………………………..17
4.2 METHODS………………………………………………………………………………………………………………………….18
4.3 DESIGN EQUATIONS…………………………………………………………………………………………………………..19
CHAPTER 5: SIMULATION ANALYSIS AND RESULTS………………………………………………………………….21
CHAPTER 6: DISCUSSION………………………………………………………………………………………………………….23

5
CHAPTER 7: CONCLUSION………………………………………………………………………………………………………..24
7.1 ADVANTAGES…………………………………………………………………………………………………………………….24
7.2 DISADVANTAGES……………………………………………………………………………………………………………….24
7.3 FUTURE SCOPES………………………………………………………………………………………………………………..24
CHAPTER 8: BIBLIOGRAPHY…………………………………………………………………………………………………….25

6
CHAPTER 1: INTRODUCTION
1.1 BACKGROUND
The security of the house or our valuable property was regarded to be the essential factor from
the ancient age. Protection of our property was given first priority so various methods of
security systems were considered regarding the security of our houses and our properties. In
the earlier age, the most common form of security was considered to be dogs. Every home and
the important lands were guarded by the dogs. They were trained to keep away the intruders
from entering the secured area. But this system was not considered to be efficient as those
animals could easily be diverted and the breaking of the important property could be done. So
along with the time, the system of key and lock system was introduced. In this system, a lock
was able to get open or get closed by the use of only a single key. This was relatively much
efficient than the dogs as a security guard. It was considered to be much cheaper in
maintenance. But this system also could not perform more reliably as this was easily breakable
and it could be broken without producing any noise as a result the owner was unable to get
knowledge regarding the intrusion entering the house. So with the advancement of time and
along with the advancement in technology, the crime regarding the thief was increasing rapidly
in the cities, as well as, urban areas where most of the people were engaged in outside work.
So to tackle this crime an advanced technology regarding the security system was introduced
which had the ability to provide information regarding the intrusion occurring in people’s
property and also the security system regarding the protection device was very complex and
only the owner consisting of its password could open the lock.

1.2 OVERVIEW
The security regarding the protected area as well as home and the office from the intruders and
protecting the area from illegal entry and protecting the valuable property or damaging of any
valuable objects was regarded to be the top priority in human life. Not only the thief but also in
some cases the threat of life could be also excluded by the availability of the proper security
system in the protected area. Generally, the system of security is applied in various fields such
as schools, residential areas, properties related to industries, military areas, hospitals, etc.
Along with the houses and building structures, the vehicles are also provided with security
systems such as sensors and alarms along with the tracking system provided to them. In the
recent period, the security system included the visual system commonly known as closed-circuit
television (CCTV) which was considered to have an important role in the case of the security
system. In this system, liquid crystal display (LCD) was considered to be a user interface. This
system consisted of various light beams called transmitters along with the receiver. Also, the
system of time recording was performed by the application of a real-time clock. In this system,
the beam of light was provided to the receiver so that if any unauthorized person tried to enter
the protected area, the LCD provided the information of intrusion. This system provided the

7
alarm in the case of alerting the signal to the authorized person. Also, the CCTV provided to the
system captured the video regarding the activity and displayed it to the LCD display so that
owner gained the information regarding the intruder.
1.3 PROBLEM REGARDING THE PROJECT
This system was based on the protection of the area along with the protection of various
valuable properties from the thief. This system was regarded as one of the best and reliable
methods regarding the protection of the system as it used various advanced technologies and
the breaking of the seemed to be impossible and also the information provided to the owner
regarding the intrusion made the owner to inform the security personnel and can stop the
intrusion and help in capturing the thief. Along with its various advantageous factors, it consists
of some problems regarding the system that the installation cost was relatively higher and the
average earning person could not afford this system. There was complexity in the system and
only the technical person could able to perform the maintenance work as the circuit was
relatively complex and maintenance cost was much higher.
1.4 OBJECTIVE OF THE DESIGN
This project was conducted for the security of the protected area by designing the security
system in the case of four walls crossed system by the use of a PIC microcontroller. These
consisted of various many objectives regarding the design of the project. Some of them are
listed below:

 To provide security regarding the protected area such as houses, offices, hospitals,
industrial areas, etc.
 To secure the valuable properties along with the important documents from the
intruders.
 To provide the efficient as well as cheapest means of the security system for the users.

1.5 SCOPE REGARDING THE PROJECT


This design was based on the protection system and stopping the intruder from entering the
protected area. This system was considered to be most valuable among all the other security
systems as it not only stopped the intruder from entering the restricted area but also this
provided the information regarding the intrusion activity being conducted in the protected area
and also in visual display so necessary actions were conducted by the owners to stop the crime
of intrusion and inform the police regarding the activity and it was easy for the security
personal to trace the intruder as they contained the video recording of the intruders during the
period of intrusion. This system could also be used in the areas of banks for the protection
system of the locker. This system provided a clear idea of what activities are being performed
by the intruders and what might be their next step which made it much easier in capturing
those persons.

8
1.6 METHODOLOGY
The methodology is the process of explaining every step that occurred during the performance
of the design. In this system, at the initial phase, the description regarding the introduction part
was conducted where topics were included such as in the background title the earlier stages of
the protection system methods were studied and followed by the overview of the design that
was performed in this project. Here, a basic explanation of the system was described. Then, the
problems related to the system were discussed which should be solved in the coming future.
Then the major objectives related to this system were explained followed by the scope in the
coming future was classified. After the completion of the introduction part, a review regarding
the literature was done where various project files were gathered as information was acquired
regarding the related topic so as to gain the idea related to the methods along with the
designing system of the project. Then, after the completion of the literature reviewing part, the
description related to the components that were used during the formation of the design was
conducted along with the description of the important terms. Now, the designing part was
performed, where various circuit diagrams were built as per the requirement and the process
of simulation analysis was performed regarding the obtained circuit design. The simulation was
performed regarding many values and the results were obtained. Those results were discussed,
checked to the rated result, and discussed if the obtained design performed the correct
method. And with the successful simulation and acceptable results obtained, the conclusion
was performed where the advantages, disadvantages along future scope regarding the
conducted project were discussed.

introduction

Literature review

Components and terminologies used

Designing of the system

Discussion

Conclusion

Fig 1. Flow chart regarding methodology

9
CHAPTER 2: LITERATURE REVIEW
From the earlier time period, the safety regarding the valuable properties along with the safety
from the physical harm was regarded as an important factor. The main objective of this theory
was to stop the intruders to enter the protected area that might be either a house or an office
through the door. In this system, the GSM microcontroller modem along with the key cushion
was regarded as the important device for the performance of the project. Also, a sensor related
to the entryway is considered to be an essential component. As per the system, the keypad that
was present in the lock system of the door was connected to the GSM microcontroller, and the
operation of the system was as the authorized person pressed the password or regarded as a
protected keyword than that signal was sent immediately to the microcontroller. The
microcontroller was considered to be the heart of the system. As the correct signal is gained by
the microcontroller, then it passed the signal of the opening of the gate or door. In the case of
the wrong keyword pressed to the system for the repeated time, then the detail was sent to
the microcontroller which again checked the condition. If the condition did not satisfy then it
activated the alarm signal that made the owners get information regarding the intrusion
process occurring in the protected area. (ARPITA MISHRA, 2004)
As in the past, a very common system of security regarding the valuable property was
manufactured such as guard was applied to a certain system and with the modification, a key
and lock system was developed. But this system was not efficient as this system could be easily
breakable and could perform the activities of intrusion very easily so the advanced system was
developed. In this system, a secure electronic jolt was introduced which was regarded as an
upgraded version of the key and lock system where an advanced locking system along with the
electronic key system was included. Here, according to this system, for the input source, a
keypad was available along with the liquid crystal display (LCD) attached to the keypad. As we
entered some numbers or values in the keypad, that was displayed on the LCD. This system also
included a microcontroller which functioned as the main operation of the system. It consisted
of a program where every operation was compared to the programmed system and if the
operation was satisfied only then the door was opened else it would never be opened by an
unauthorized person. The password could also be changed as per a certain period of time.
(RAHMAN, MD.MAKSUDUR, 2002)
Various researches were performed regarding the development of the security system in the
case of houses and buildings as well as important areas and various theories were developed in
the case of door locking systems. This design explained the door locking system that applied the
microcontroller as its important component. In this system, an H type of bridge was applied for
the development of the system which was password protected. The main function of an H
bridge was for the function of opening and closing of the door automatically. Here, a 4*4
keypad was applied along with the attachment of the 16*2 LCD. The value that was entered
into the keypad was displayed on the LCD. This system also included a microcontroller which
was provided by EEPROM and had the major functionality of storing the data which was

10
achieved from the system during the performance of the gate or the door. The information
regarding the door was provided to the microcontroller and that condition was checked with
the programmed condition. If the condition did satisfy then the door was let open else the
microcontroller sent the signal to the buzzer causing the alarm to be activated. (OTASOWIE,
P.O., 2002)
During the earlier period of time, older techniques regarding the system of security of the
houses were performed which were regarded to be a very inefficient method as it was very
vulnerable to breakage. So as the advancement in technology took place the electronic system
regarding the protection of the houses and offices were made which were regarded to be
unbreakable by the unauthorized person and were only accessible to the owner or the
authorized person. In this system, the use of an ARM7 microcontroller was done which was in
connection to the input system i.e. keyboard consisting of a display. The microcontroller
performed the decision-making action. When the input was provided to the system or the
password was entered into the system through a keyboard that activity was sent to the
microcontroller. And the condition was compared to the programmed condition. This system
also had the functionality of fingerprint in which with the fingerprint of the only, the door got
open else any unauthorized person trying to open it then the alarm was activated. For the
programming of the system, Keil microvision4 was applied and the conversion of the code to
the hex files was performed. (KUMAR 1, ANIL, 2000)
Among various theories developed for the protection of the properties, the use of the internet
in the case of home automation was regarded to be of best use. In this system, the description
regarding the use of the internet which performs the monitoring locally as well as remote and
controlling of the house. This system applied the philosophy of an object- orientation where
each and every device presented in the home was denoted as an object which provided the
integrated view regarding the house. By this system, every system was visualized carefully and
was felt and this system applied the technique of sensing and actuation. This system consisted
of a personal computer along with the availability of a web server. By the application of HTML
or java applets page, the implementation of the user interface was performed. By the use of the
standard PC interfaces which consisted of either USB or LAN or might be serial port, the home
control system has interacted. By the use of script, this system provided a strong method of
controlling along with the programming regarding the activity of the house. A scenario was
applied in the case of the normal user which consisted of a set of a device that could be
controlled by the user. (R.J.C. NUNES, J.C.M. DELGADO, FEBRUARY 2000)
Various methods regarding the security system were developed for the security of valuable
objects. With the development in technology various techniques such as password-protected
system were introduced, fingerprint system was introduced. In this system, the face detection
system was described where only the recognition of facial structure could unlock the door. The
facial recognition was performed as a password for the locking system. This system applied the
Raspberry Pi software this system was made possible. With the use of this software, the

11
recognition of the face was performed by scanning the facial structure of the people. The
program regarding the facial structure was already performed and as for the operation of the
door if a person allows their face to scan, then that input was compared to the programmed
structure and if the structure did match then the operation of the door was performed by that
person else if the face structure did not match with the programmed structure than the
authority was not provided to that person for the application of that door. This system applied
various components such as a microcontroller, keypad, video recorder, LCD along with the
camera, and a personal computer. (REDDY, DR.D. RAVI KRISHNA, 2001)
Various mechanical techniques were also proposed for the advanced system of protection
regarding the property. In this system, the theory regarding the password changing process was
discussed which was performed by the wireless system along with the modification in the
performance of the system. In this system, a transmitter was applied which had the
functionality of transmission of data as well as information to the user. The main operation
regarding the system was performed by the microcontroller which consisted of various devices
such as light producing diode, main processing unit, along with the servo. The decision
regarding the operation of the door and the condition satisfaction process was conducted by
the Arduino which was provided with information. It was also associated with the smart
application which applied technology of wireless so as to develop a pin code along with the
connection of visual along with the user and was provided to the microcontroller. (DEWANI 1,
AMIRITA, 2001)
Along with the advancement in the technology regarding the electronic system, the
development regarding the security system was increased. Various theories regarding the
Bluetooth technology were performed regarding the smart lock system which was generally
performed in the case of doors. This system applied the method of LOT which helped in the
increment of the electronic systems. By the introduction of the lot did replace the system of
lock and key system. In this system, the word could be pressed for the performance of the open
and close in the case of the framework of the bolt. For the controlling process regarding the
bolt framework, the use of the gadget could be applied. In the case of the theme of the bolt
framework, the entryway was regarded as the domestic concept. The application of the moo
control was done for the operation of the Bluetooth system and was considered to be
applicable for all the devices. (HADIS, M.S., 2001)
In the recent period, the protection regarding the important assert along with the threat of the
human life was considered to be the important factor in the environment we were living. And
with the development of the advanced system regarding the security of the vaults along with
the houses and buildings was replacing the older technique of security system which was
basically mechanical in the system. This system was proposed so as to provide the advanced
form of security considering a higher secure method of operation, lesser cost, as well as, faster
operation. This system consisted of an electronic door lock system which was made to operate
in the quick time period. This system used an ATmega-328 microcontroller as a major

12
component for the operation of the system. This system also included Arduino. For the process
of input of the password, a 4*4 hexadecimal keypad was provided along with the
microcontroller. Until and unless the correct password was entered into the system, the door
did not operate. (TAMOUNOWARI, MINA, 2003)
In this system, various locking system regarding the doors was proposed which was considered
to be completely advanced and automatic in nature which did access to only the authorized
person. This system could perform the operation for 24 hours and considered to be easily
operated. According to the system, various details regarding the authorized person along with
the timing were provided. This technique was considered to be wireless in the case of operation
and could be performed by the use of various electronic communication devices in the
availability of the network. This system was applied in the case when the quicker operation of
the door and in a systematic manner was required. Various notations were applied to make the
operation process easier and simpler. This system recorded every activity of the people. It
consisted of the special feature of the addition of various identity modules of the subscriber.
Various data could be stored in real-time so this system was considered to be applicable in the
recent period. (KOMOL, MD. MOSTARFIZUR RAHMAN, 2001)

13
CHAPTER 3: COMPONENTS AND TERMINOLOGIES USED
3.1 RESISTOR
When a component performed the activity of resistance of the electricity regarding the circuit
element then that component was described as a resistor. This component was basically
electrical and consisted of a passive double terminal. The main purpose of this resistor was for
the restriction of the flow of the current, adjustment regarding the levels of the signal, used for
the termination of the transmission line, division of the voltage, etc. In the context of resistors
acquiring greater power and has the ability to release higher watts in the case of power in the
form of heat could be performed considering the motor control parts along with the
distribution system regarding the power. Resistors that are considered to be of fixed value, they
have the property wherewith the difference in temperature or in the case of time or changing
of the voltage that is operating, only smaller change in the resistance was observed which was
basically considered to be negligible.
3.2 LIQUID CRYSTAL DISPLAY (LCD)
LCD was generally termed as liquid crystal display. It was regarded as a display consisting of a
flat panel or could be defined as an optical device that was modulated electronically, which
utilized the properties of liquid crystals such as properties of modulating of light and was
included with the polarizer. These liquid crystals do not have the ability of the emission light but
for the production of the images consisting of color, a backlight or generally termed as reflector
was utilized. The main purpose of the LCDs was used for the presentation of the images
regarding the arbitrary, as well as, the images consisting of very less information was displayed
or could be hidden. In the case of digits or displays regarding seven-segment available in digital
clock, they utilized the same method but the only difference was that images of arbitrary were
developed by a smaller pixels matrix whereas in the case of other displays, they consisted of
greater elements. According to the arrangement of the polarization, the position of the LCDs
could be obtained in either on or off state. The general application of the LCD is LCD television,
monitors of the computer, instrument panels, etc.
3.3 LIGHT DEPENDENT RESISTOR (LDR)
LDR is generally considered as a light-dependent resistor also termed as a photoresistor which
has the ability for the detection of the light and also for changing the operation regarding the
circuit which depended on the levels of light. They are considered to be an electronic
component and are generally used in designs where the detection of light was essential. It can
be denoted by various names such as a photoresistor, photo cell, as well as, photoconductor.
These devices have the specific characteristic of lower cost, less cost in manufacturing, and are
easily available along with easy operation. The use of LDR has been in the case of photographic
light meters.

14
3.4 LIGHT-EMITTING DIODE (LED)
LED was generally described as a light-emitting diode which was considered as a source of light
that has the capability of releasing light energy during the passage of current along with the
device. In the device, the semiconductor contained the electron, that electron was combined
with the holes of the electron causing the release of energy in the form of a photon. The energy
that should be provided in the case of electrons determined the color in the case of light, as
well as, the required energy, which does help in the crossing of the bandgap for the electrons.
The achievement of the white light was caused by the use of various semiconductors, as well
as, was caused by a layer consisting of phosphor having the capability of light emission in the
case of the semiconductor devices. During the initiation of the LEDs, it had the capability of
emission of infrared light having lower intensity. Those LEDs consisting of infrared rays were
generally applied in remote-control circuits. In the case of LEDs which had the property of
visibility consisted of lesser intensity and consisted of only red color. The LEDs are available
today have various advantageous characteristics such as it required lesser consumption of
power, it consisted of a greater lifetime, having better robustness regarding physical structure,
being portable in nature, and being regarded as quick action of switching.
3.5 BUZZER
The buzzer is regarded as a device that has the capability of producing audio signals. This
component could be either of mechanical type or piezoelectric in nature, as well as,
electromechanical in nature. The buzzer included various components such as timers, as well
as, the alarm device along with either a mouse or a keystroke in the case of input conformation.
According to the various types of buzzers, the electromechanical buzzer was generally applied
in the doorbells in the earlier time period. In this system, a relay was applied to the device
which had the main functionality of disturbing the actuating current present in itself and made
the buzzing of the contacts. In the case of piezoelectric type buzzer, the element present in the
piezoelectric generally was operated by the presence of oscillating electronic circuits, as well in
the case of sources of the audio signal. In the case of this piezoelectric buzzer, it was also
dependent upon the resonance regarding the acoustic cavity, as well as, the resonance of
Helmholtz so that the production of a beep sound was heard. In the case of the mechanical
type of buzzer, the requirement of drivers was essential.
3.6 TRANSISTOR
The transistor is regarded as a component that has the ability to either amplify or switching of
the electrical signals, as well as, the power. It is generally regarded as a semiconductor device.
In the case of electronics, transistors are considered an important factor for the revolution. It
generally has triple terminals and is made up of semiconductor material. In the case of triple
terminals that are connected to the circuit, either a voltage or a current is supplied in one of the
terminals in a pair of the transistor, and in the same case, the other terminal of the pair is
connected to the current. The transistor has the property of acting as an amplifier as the power

15
output could be greater than that of controlling input power. In the present time, the generally
used transistors are considered to be metal oxide semiconductor field-effect transistors
(MOSFET). Generally, the transistors are manufactured by silicon in a pure form or in some
cases; transistors are also manufactured from germanium. According to the transistor type, the
type of charge carrier is dependent along. In the case of a field-effect transistor, it consisted of
one kind of charge carrier. Similarly, in the case of bipolar junction transistor, the charge carrier
consisted of two types. As per the comparison to the vacuum tube, lesser power is required for
the operation process and the transistors are comparatively smaller in size.
3.7 OSCILLATOR
The oscillator is generally referred to as an indicator that has the capability of finding
overbought which are short-term or in the case of oversold conditions. This component has the
capability of variation in the case of time and within a band i.e. either above or below in the
case of a centerline or in between the set levels. Some of the generally used oscillators are
MACD or ROC or CCI as well as RSI. In the case of an electronic oscillator, it is considered as an
electronic device that has the potential of production of a periodic, electronic signal that is
oscillating and generally consists of either a sine wave or a square wave or it might also be in
the form of the triangular wave. The main function of the oscillator is for the conversion of
direct current to an alternating current which is present in the power supply. This device is
applied in wider fields such as it is used in the simplest form of an electronic device such as
clock generators to the complex and advanced form of electronic components such as
computers. In the case of the audio oscillator, it generates the audio range of frequency of 16Hz
to 20Hz. Similarly, in the case of an RF oscillator, it generates the radio frequency ranging from
100 kHz to 100 GHz.

16
CHAPTER 4: DESIGNING OF THE SYSTEM
This project is conducted for the simulation regarding the four walls crossed security system
that is generally performed from the security of the intruders by the application of the PIC
microcontroller. Here the development regarding the various circuits diagram belonging to the
project is done along with the numerical consideration required for the operation of the
system.
4.1 MICROCONTROLLER (PIC 16F877A)
A microcontroller is considered to be a complex device consisting of various complex
components. All of them have the functionality of performance along with the control function
application. The peripheral interface controller (PIC) has the functionality of controlling the
peripheral devices, also has the capability of performance of the numerical calculations, and
also performs the function of load improving which is available in the central processing unit
(CPU). It consists of lesser capacity regarding memory. This PIC is usually operated by the CPU.
If local resolutions are to be taken then this component is used for the designing purpose. It has
the property of greater performing ability, lesser cost regarding CMOS, it consists of 40 pins and
is regarded as an 8-bit microcontroller along with reduced instruction set computer (RISC). The
timer present in this microcontroller is 8 bit and 16 bit. Along with the other pins, serial ports,
five input/output ports along with parallel ports, as well as, compare and capture modules are
available in the case of the microcontroller. The above figure represents the pin configuration
regarding the PIC16F877A microcontroller.

Fig 2. Pin configuration of PIC16F877A microcontroller

17
4.2 METHODS

Fig 3. Block diagram of the four walls crossed security system


The above figure represents the block diagram regarding the four-wall crossed security systems
by the application of the microcontroller. Here in the system, if the system is activated or is
kept in ON position, the display regarding the time, as well as, the calendar is presented on the
liquid crystal display (LCD). And also at the same time along with the display of time and date,
the display regarding the information i.e. ALL FOUR WALLS ARE OK is presented. This condition
is only satisfied and is displayed if no intrusion activity has occurred. But in this case, if any one
of the walls is crossed by the unauthorized person then there occurs the disturbance between
the continuous flow of light beam from light-dependent resistor (LDR) to the liquid crystal
display (LCD). This causes the displaying of the name of the wall that has been crossed and
allows the motor to rotate so as to move the CCTV towards the crossed wall to obtain the real-
time video recording along with the activation of an alarm consisting of a buzzer and alerting
the owner regarding the intrusion activity occurring in the home. The buzzer is activated until
the process of reset is done. In case of every wall crossed, the system provides the display of
the information on the LCD. In this system, in the case of simulation, if there occurs a sign of
positive regarding the LDR then the information regarding no intruder crossing the wall is
determined i.e. the LDR has a continuous flow of light beam toward the LCD. If there occurs a
sign of negative then one or more walls have been crossed by the intruder i.e. the light beam
has been disturbed from the continuous flow towards the LCD.
Fig 4. circuit diagram of the four walls crossed security system
In this circuit diagram, the microcontroller PIC16F877A is used that consists of five ports i.e.
port A, port B, port C, port D, as well, port E. In the ports present in the microcontroller, each
one consists of eight pins ranging from B0 to B7. Port C consists of C0-C7 along with D0 to D7 in

18
the case of port D. But in the case of port E, a total of three pins are present i.e. E0 to E2. In this
system, the connection of pin 2 is with the Q2 and Q3 base of the transistor along the R5
resistor consisting of the value of…… Ω. In the case of pin 3, Q1, and Q4 if the base transistor is
connected with it along the R6 resistor consisting of the value of ….kilo ohms. For the purpose
of starting the motor either in both directions i.e. clockwise or anticlockwise, pin 2 and pin 3 in
the case of the microcontroller are responsible. Here, the CCTV is attached with the beam. For
the operation of the buzzer regarding the intrusion period, the transistor Q5 is connected to pin
5 along with the resistor of R7 consisting of ……..kilo-ohms. With the pull-down resistor
consisting of a value of ….kilo ohms, pin 15 to pin 18 are connected along with the light-
dependent resistor (LDR). With the pull-up resistor having the value of….Kilo ohms, the pin
ranging from 23 to 26 are connected along with the push button. In the case of push-button,
the physical presence is not applied in the case of push-button. When one of the walls has been
crossed, the contact has to be stopped by the motor. In the case of the push button, button 1 is
placed at the north LDR. Similarly, button 2 is placed in the east direction whereas button 3 is to
the south direction of the LDR, and the last fourth one is placed in the west direction of the
LDR. In the case of pins ranging from 37 to 40, they are connected along with the liquid crystal
display (LCD). The main purposes of these pins are to display the characters across the LCD
when any of the play buttons are pressed in the case of crossing any of the walls by the
intruders.
4.3 DESIGN EQUATIONS
Some of the formulas regarding the design of the system are presented below
IC
I B= (1)
β
IB=base current of the transistor
Ic=collector current of the transistor
β= transistor gain
V C =I B R B +V BE (2)

VBE=base emitter voltage of the transistor=0.7v in the case of silicon


RB=base resistor of the transistor
1 /2
β=(β ¿ ¿ max∗β min ) ¿ (3)

V CC
I sinking= (4)
R pull−up

In this system for the purpose of switching, C945 has been selected.
In the case of a light-dependent resistor (LDR), the current passing through the LDR is given by

19
V LDR
I LDR =
R LDR

In the case of light-emitting diode (LED), the resistor required is given by the formula,
V CC −V LED
R LED =
I LED

In the case of a buzzer, the current passing through the buzzer is obtained by
V BUZZER
I BUZZER =
RBUZZER

In context to the push button, the calculation regarding the sinking current could be obtained
by using the formula,
V CC
I sinking=
R pull−up

The calculation regarding the current drawn by the motor is given by


V motor
I motor=
R motor

20
CHAPTER 5: SIMULATION ANALYSIS AND RESULTS
This project is performed regarding the simulation and designing of the security system of the
four walls that have been crossed by the intruder by the application of a PIC microcontroller.
Here various tests have been performed regarding the design and are applied to various
sections regarding the system. This system is developed so as for the improvement of the
system regarding security as well as for the improvement of the reliability and effectiveness in
context to wall-crossed security system detection. The simulation is conducted by the
application of MPLAB SIM which is regarded to be part of MATLAB software. The design
regarding the circuit diagram is performed by the use of Proteus ISIS which is considered to be
an electronic design software and the program regarding the peripheral interface controller is
placed in the designed diagram. After the completion of the designing part, the circuit was
simulated for observation regarding its performance. The various simulation results regarding
the design are presented in the figure below:

Fig 4. simulation result representing the “all four walls ok” on the liquid crystal display
The simulation result is obtained if the play button is pressed. In this case, all the ports along
with the sensors are initializing and the display in the LCD gives a date, as well as, time and also
provides the information regarding everything is ok by displaying “ALL FOUR WALLS OK”.
Fig 5. Simulation result presentation on the liquid crystal display if the case of interruption of
the north wall
The result represented in figure 5 presents the condition during the interruption of the light-
dependent resistor across the light beam or is moved away. In this case, the display on the LCD
is obtained as “NORTH WALL CROSSED” and at the same time period, the motor is rotated
unless the contact is made to the north point and gets stopped so that real-time video is
captured by the CCTV mounted with it.
Fig 6. Simulation result representation on the liquid crystal display in the case of interruption of
the south wall
The figure obtained in figure 6 represents the display of the “SOUTH WALL CROSSED” indicator
on the LCD during the interruption of the light-dependent resistor which is located in the south
across the beam light or is taken away from it by the press of negative sigh in the case of LDR.
As the LCD displays the data, at the same time the motor is rotated and gets in contact with the
south point so that the real-time video is captured by the CCTV.

21
Fig 7. Simulation result representation on the liquid crystal display in the case of interruption of
the west wall
The figure acquired in figure 7 represents the displaying of the “WEST WALL CROSSED”
indicator on the LCD display during the interruption of the light-dependent resistor which is
located in the west across the beam light or is taken away from it by the press of the negative
sign in the case of LDR. As the LCD displays the data, at the same time the motor is rotated and
gets in contact to the west point so that the real-time video is captured by the CCTV.
Fig 8. Simulation result representation on the liquid crystal display in the case of interruption of
the east wall
The figure achieved above represents the display of the “EAST WALL CROSSED” indicator on the
LCD display during the interruption of the light-dependent resistor which is located in the east
across the beam light or is taken away from it by the press of the negative sign in the case of
LDR. As the LCD displays the data, at the same time the motor is rotated and gets in contact to
the east point so that the real-time video is captured by the CCTV.

22
CHAPTER 6: DISCUSSION
In the recent period, the security regarding the valuable property along with the safety of the
physical harm is considered to be one of the most essential aspects. With the advancement in
technology the development regarding security is increasing rapidly. This system describes the
protection of the four walls from an intruder by the application of the PIC microcontroller. In
this system, all the four walls in four directions consist of a sensor consisting of LDR by which
the light beam is passed to the LCD in a continuous mode. If anyone disturbs the flow regarding
the light beam then the display with either “NORTH WALL CROSSED” or any wall that has been
crossed is displayed in the LCD and at the same time, the motor is rotated to the same direction
where the intruder has crossed the wall and a real-time video is captured by the CCTV. In the
case of no wall being crossed and play button is pressed then the display as “ALL FOUR WALLS
OK” is presented on the LCD display.

23
CHAPTER 7: CONCLUSION
The project is performed for the simulation along with the design of the four walls crossed
security system by any intruders by the application of PIC microcontroller. In this system the
simulation process is conducted by MPLAB SIM which is considered to be a part of MATLAB
software and the design regarding the circuit diagram is conducted by the use of Proteus.
7.1 ADVANTAGES
As the project is developed it consists of various advantageous factors which are enlisted
below:

 This system provides the proper description regarding the occurrence of the intrusion.
 As it consists of real-time video, information regarding the total number of intruders is
provided to the owner.
 This system is regarded to be of quicker operation in displaying of the information to the
LCD as a result the proper action could be taken by the owner.
7.2 DISADVANTAGES

 As it consists of various components such as LCD, LDR, CCTV, etc so it is comparatively


costlier than the other forms of the security system.
 With the addition of various components in the system, this system consists of a
complex circuit diagram that cannot be understood by normal users.
 The maintenance regarding this system is relatively costlier as compared to the other
system.
7.3 FUTURE WORK
This system is regarded to be the best in the form of a security system as it consists of displaying system
which provides the idea regarding the direction where the intrusion is happening along with the
advantageous factor such as CCTV which provides the real-time video of the incident. This could further
be made advanced by the addition of the GSM system as in the case of intrusion, the message could be
sent to the owner even if he/she is not available at home so that necessary action could be taken being
far from the protected property to stop the intrusion activity.

24
CHAPTER 8: BIBLIOGRAPHY
ARPITA MISHRA. (2004). PASSWORD-BASED SECURITY LOCK SYSTEM. INTERNATIONAL JOURNAL OF
ADVANCED TECHNOLOGY IN ENGINEERING AND SCIENCE.

DEWANI 1, AMIRITA. (2001). KEYLESS SMART HOME: AN APPLICATION OF HOME. ORIENTAL JOURNAL
OF COMPUTER SCIENCE AND TECHNOLOGY.

HADIS, M.S. (2001). DESIGN OF A SMART LOCK SYSTEM FOR DOORS WITH SPECIAL FEATURES USING
BLUETOOTH TECHNOLOGY. COMPUTER SCIENCE.

KOMOL, MD. MOSTARFIZUR RAHMAN. (2001). REMOTE SENSING GLOBAL RANGED DOOR LOCK
SECURITY SYSTEM VIA MOBILE COMMUNICATION. RESEARCH GATE.

KUMAR 1, ANIL. (2000). EMBEDDED HIGH DOOR LOCKING SYSTEM USING IOT TECHNOLOGY.
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND ENGINEERING.

OTASOWIE, P.O. (2002). DESIGN AND DEVELOPMENT OF A PASSWORD-BASED DOOR LOCK SECURITY
SYSTEM. JOURNAL IDENTIFIERS.

R.J.C. NUNES, J.C.M. DELGADO. (FEBRUARY 2000). AN INTERNET APPLICATION FOR HOME
AUTOMATION. Conference: Electrotechnical Conference, 2000. MALECON 2000. 10th
MediterraneanVolume: 1.

RAHMAN, MD.MAKSUDUR. (2002). PASSWORD-PROTECTED ELECTRONIC LOCK SYSTEM FOR SMART


HOME SECURITY. INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH AND TECHNOLOGY.

REDDY, DR.D. RAVI KRISHNA. (2001). FACE RECOGNITION FOR DOOR ACCESSING USING RASPBERRY PI.
INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH AND TECHNOLOGY.

TAMOUNOWARI, MINA. (2003). DESIGN AND CONSTRUCTION OF ELECTRONIC DOOR ACCESS KEYS.
RESEARCH GATE.

25

You might also like