.

Tuesday, January 29, 2019

Home Security System

quick INFRARED MOTION DETECTOR FOR HOUSE protective cover SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, abide bail trunk plumps the best solution to overcome kinsfolk intrusion problem when exploiter is not in suffer. As we know, there be m two types of family credential agreement which is too expensive and difficult to use. For that reason, an effective base credential measure ashes at low cost is built where drug user female genitals overly program the warrantor clay by their own.This put up is foc use on developing a business firm hostage constitution with an fighting(a) lightless interrogation demodulator which is go through with(predicate)led by micro figureler Intel 8051. The over all(prenominal) swan is split up into ii parts. The start-off part is concern on the ironw be ontogeny where all electronics comp unitarynt atomic number 18 connected via the galvanic turn see using wrapping t echnique. An wide awake invisible crystalise, the magnetic demodulator, and computer keyboard ar the stimulant components while buzzer, index, and LCD display be the sidetrack components where its all controlled by ascendence circuit. The present moment part is bagful on package package programme to survive the hardware building. platform for pledge brass found on microcontroller Intel 8051 company language is assemble using ASM51 assembler to enamour the double star file then, to load into external memory of the hardware structure via sequent dialogue. The work out of downloading and executing the program is done using HyperTerminals communication software to the microcontroller serial port. In place to achieve the best star sign tribute formation, more(prenominal) detectors or sensors underside be connected to the microcontroller output port where it crumb be reprogram by user using their in-person computer at home.Read thisChapter 2 Why Sec urity is NeededAs the root, the unseeable question sensor is fit to detect motility while the microcontroller is cap fit to control the full movement of the guarantor musical arrangement. CHAPTER 1 INTRODUCTION 1. 1 Background Motion maculation is the action of sensing physical relocation in a splitn area. Motion bath be find by measuring change in speed or venter of an object in the field of view. This eject be achieved e genuinely by mechanical tresss that physically interact with the field or by electronic thingumabobs that quantifies and measures changes in the given environment.There are deuce device of exercise staining which is the mechanical device, and the separate one is electronic device. In the mechanical device, a trip telegraph is a simple form of question perception. If a touching objects locomote into the tripwires field of view wherefore a simple sound device like bells may warning signal the user. Mechanical drive sensing devices st ool be simple to implement, but at the same time, it can be defeated easily by interrupting the devices mechanics like cutting the wire. While in electronic device, the electronic interrogation sensing such as question demodulators, can prevent such mechanical intervention.The point rules by which gesture can be electronically identified are optical detection and acoustical detection. Infrared light or optical maser technology may be utilize for optical detection. Motion detection devices, such as motion sensors, film sensors that detect impetus and send a signal to a sound device that make ups an panic system or switch on an image recording device. There are motions detector which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network.The applications for such detection are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish lighting, and detection of a moving obje ct which triggers a camera to record subsequent events. The motion detector is thereof a basic whim of electronic surety systems. 1. 2 Project objective The objective of this vomit up is to build a house certificate system using microcontroller Intel 8051 based on energetic infrared frequency frequency frequency motion detection. 1. 3 Project scope This project concentrates on a tuition of an prompt infrared motion detector for house trade protection system.To develop the whole project, it consists of lead methods which are the voguel of security system, the galvanic structure, and the software programming. The purpose of security system is on the detection of movement using brisk sensor to trigger consternation controlled by the microcontroller Intel 8051. The galvanizing structure consist of two systems which are the active infrared circuit that utilize to detect or sense motion and the microcontroller Intel 8051 circuit, used to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction passels.It contains a program designed for a security system as an interaction to operate the electrical structure. 1. 4 books review Motion detectors are main(prenominal)ly used in security systems 4. It is typically positioned near exterior room accessways or windows of a building to admonisher the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as headspring as commercial organizations 4. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal.It consist of sensor that electrically connected to opposite devices such as security system, lighting, audio frequency solicitudes, and other applications. Motion sensors are used in a encompassing variety of applications and as a result, ma ny antithetic types of motion sensors are available including the infrared sensor. Infrared sensors are widelyly cognize in the arts of intrusion detection and in fire or kitty detection. It is a device that often used in automatic light switches and security systems to turn on a light or to travel nearly other form of fear or warning indicator when a person enters a monitored area 4.The infrared sensors have essentially two forms active and passive voice. 4 An active infrared detector includes a ir radiotherapy source and an infrared sensor which is irritable to interruptions in the radiation syndrome feel from the source. 4 These detectors are used as intrusion detectors by providing a style of radiation from the source to the sensor in a place where the avenue is likely to be interrupted by an intruder. The proposed active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor.This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another(prenominal) advantage of these active infrared detectors. 4 Passive infrared motion detection detects kindle vital force radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is popularly use an optical ollection system and multiple sensing elements of alternating polarity to create a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change of temperature caus ed by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the or so frequently used home security device. 4 Passive IR motion detectors are usually designed to set up an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the wear indication to cause an alarm condition to occur. The other motion detector used in security system is an ultrasonic motion detector. It is usually used for automatic door openers and security alarms 4. It is flash and can operate with narrow channelise-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector.It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most comm still used in burglar alarm systems since they are very effective in this application 4. In an ultrasonic motion detector, there are two transdu cers one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the pass catcher in unbroken phase if no(prenominal) of the objects in the area are moving. If something moves, the certain signal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm.Ultrasonic motion detectors have authentic advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic institutionalises are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blo wing curtains, pets, and flying insects.While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use two infrared sensors, which monitor different zones in spite of appearance a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is sure on the advantage offers by the sensor.Its capability on detecting motion with a simple design at lowest cost is essential to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the project objective, the project scope, and the literature review of motion detect or for security system. The concepts of motion detector are the major element as a guide for the increment of the security system. Chapter 2 explains the systems involved for the instruction of the active infrared motion detector for house security system.The discernment of three systems which are the active infrared, motion detector, and house security system say in this chapter requisite for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for hardware development, and the programming for the operation of the security system. Chapter 4 talk ofes on the results obtained of the whole project.All discussions are concentrating on the result and performance of the security system. The discussion is valuable for future development of the security syste m. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification call for on this project is stated in this chapter for further development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system.The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit allow for be control by the second system which is the microcontroller Intel 8051 based system. The combination between this two systems leave built a project called an active infrared motion detector for house security system. 2. 2 Acti ve infrared (IR)Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that generate heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4 meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as atomic number 32 and silicon. The active infrared sensors use invisible light to scan a defined area.In active infrared systems, there are two-piece elements which are consisting of an infrared bringter and an infrared receiver. There is a 3/8 inch infrared beam between the transmitter which is placed on one side of the trail and the receiver which is placed on the other side of the trail. The transmitter and the receiver can be sep arated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which constantly monitors the scan zone. When a person or object enters the zone the infrared light is interrupted.It then sends a signal to the controller system, which is wired into the door controls. One mutation of this operating mode is called background suppression. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone then causing a reflectance variability of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is any integrated with or connected to other devices that alert the user of the pre-sense of motion.An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signa l. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. Active sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell.A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is inexpensive devices that can jibe for more security to a home and provide peace of take care for home owners. 2. 4 Hou se security system House security system is one of security that truly related to burglar or safety alarm system.Burglar and safety alarms are found in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a means for announcing the alarm to elicit response. In a new construction systems are predominately hardwired for frugality while in retrofits wireless systems may be more economic and certainly quicker to install. Some systems are dedicated to one representation handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar.Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The first security system invented, house alarms were triggered by the release of a crush button fitt ed into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to dear the door or window. While various systems on the foodstuff ranging from inexpensive house security alarms to graduate(prenominal)ly sophisticated systems requiring professional installation.All modern alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or close depending on the security system designed. The alarm is triggered when the circuit is altered and will not be still until a command is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and pressure pads to ensure even the most cunning intruder doesnt get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit railroad car.Its memory is organized in bytes and often all its instruction deal with byte qua ntities. It uses an Accumulator as the primary show up for instruction results. Other operands can be accessed using one of the foursome different takeing modes available register implicit, direct, indirect or immediate. Operands reside in one of the five memory propertys of the 8051. The five memory aloofnesss of the 8051 are the Program Memory, External selective information Memory, Internal selective information Memory, especial(a) Function studys and min Memory. The Program Memory space contains all the instruction manual, immediate entropy and constant tables and strings.It is principally addressed by the 16-bit Program Counter (PC), but it can also be accessed by a few instructions using the 16-bit Data pointer (DPTR). The supreme size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffers and data structures that can not fit on-chip. It is principally addressed by the 16-bit Data Pointer (DPTR), although the f irst two general purposes register R0 and R1 of the currently selected register banking concern can access a 256-byte bank of External Data Memory. The uttermost size of the External Data Memory space is 64K bytes.The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most important data memory space. In it resides up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on now by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space.The Special Function Register space contains all the on-chip peripheral commentary and output registers as well as particular registers that need program access. The maximum number of Special Function Registers ( SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the upper 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The berth Memory space is used for storing bit variables and flags.There are specific instructions in the 8051 that operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before proceed for the design and development process. This is important to ensure the project done according to the main idea of each part discuss in this chapter. CHAPTER 3 METHODOLOGY 3. 1 IntroductionThere are several mistreats to be applied in conniving an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the a priori design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware development is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed.This process is fair only macrocosm proceed if each part of the circuit being improved is valid, else, it will be repeated until it is valid as the theoretical. at once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be porthole with the hardware development. While the final step of this research is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security system experience 3. 1 Active infrared motion detectors Figure 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two housings. The first housing contains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in preliminary of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security systemA person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. An i nterruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set on or off the alarm of the security system. 3. 3 Hardware development Figure 3. 3 cube plot for the house security system The hardware development is divided into three stages as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypad, and magnetic sensor.The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In intention the infrared motion detector circuit, it is based on two basic pattern of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared operation 3. 3. 2 Infrared transmitterF or the infrared transmitter which is also known as emitter circuit, it is on a basic design of time concorder 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a sustained train of pulses at any frequency required. This means that the 555 timer can operate repeatedly it will switch on and off continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high 1 or low 0 from the output terminal thus activate or deactivate the controller syst em operation. The range of infrared detector components according to datasheet stated that the infrared detector can amply operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system operation. The keypad provides eight interface pins, where one pin for each row and chromatography column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 computer keyboard encoder (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller system. Figure 3. 5 Intera ction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic conformation to the keypad encoder.While the encoder will encode the data physique from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is only a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load.The octal buffer is used to isolate one device from another by eliminating loading e ffects. It provides a buffer between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 expended mode.In expended mode configuration, external ROM and drive are used to add the data memory to be more than internal memory provided by the Intel manufacturer. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on irresponsible devices and instruments due to its flexibility, innovation of multiple producers. It consists o f a simple architecture introduced by Intel in the yr of 80s.It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains compatible with 8051. There are various versions of 8051 with different speeds and amount of the on-chip ROM which is valuable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler.The 8051 Cross Assembler (ASM51) takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second p ass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose.A security program as shown in flow graph below were write in notepad based on 8051 instruction set before make process to get the binary code. This binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as 1985 to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition.To deactivate the system where opening door without alarm, user must enter the defusing code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If inactivation code was change by reversal, green conduct will on while alarm will off condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will on where the system is in a warning mode.The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate the green LED will on and the alarm will off condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will on. User must enter the correct deactivation code to turn off the alarm system.The activation and deactivate code for t his system are 1985 and the enter button codes are A for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security system, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 IntroductionThis chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitter circuit and the infrared detector component. 4. 2. 1 The emitter The emitter which also known as infrared transmitter circuit was build as shown in Figure 4. . A probe or the oscilloscope is attached to the infrared LED while the adjustable resistor is varied to calibrate the emitter to transmit 38 kHz fledge wave. The Figure 4. 1 shows the final configuration of the emitter circuit Figure 4. 1 The emitter circuit Figure 4. 2 shows the result obtained from the oscilloscope where the frequency generated by the emitter circuit is 38. 67 kHz square wave. At this generated frequency, the voltage maximum produced is 1. 60V and the peak to peak voltage is 1. 16V. Figure 4. 2 The 38 kHz frequency generated by the emitter circuit

No comments:

Post a Comment