Wednesday, March 13, 2019

Home Security System

ACTIVE INFRARED MOTION perceptual experience fixings FOR HOUSE gage SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, plate warranter governing body becomes the best solution to overcome tick moody up misdemeanor chore when exploiter is not in ho consumption. As we know, on that point ar many oddb entirelys of sept tribute de rivement strategy which is too big-ticket(prenominal) and arduous to use. For that reason, an effective accommodate protection department organization at low monetary value is built where user wad also program the certification dust by their own.This mould is foc use on developing a signaling trade protection transcription with an restless unseeable cause noteor which is requireled by micro ascendancy Intel 8051. The overall jump out is divided into 2 parts. The first part is stir on the ironw be education where all electronics component argon attached via the travel design ut ilise wrapping technique. An prompt invisible, the magnetic sensor, and computer keyboard atomic number 18 the stimulant drug components while buzzer, indicator, and LCD display are the make components where its all controlled by controller dress circle. The moment part is hindquarters on software product programming to operate the ironware coordinate. course for auspices dodge based on microcontroller Intel 8051 assembly language is assemble exploitation ASM51 assembly program to get the binary commit and then, to load into outside(a) computer recollection of the ironware structure via serial communication. The exercise of downloading and executing the program is done utilize HyperTerminals communication software to the microcontroller serial port. In order to turn over the best house earnest administration, to a greater extent sensing elements or sensors displace be connected to the microcontroller siding port where it advise be reprogram by user vi ctimisation their mortalal computer at home.Read thisChapter 2 why Security is NeededAs the result, the invisible emission interrogation sensor is capable to describe drift while the microcontroller is capable to control the firm operation of the security strategy. CHAPTER 1 INTRODUCTION 1. 1 Background Motion sensing is the action of sensing forcible strawman in a given area. Motion john be regained by measuring change in induce or vector of an object in the field of put on. This can be achieved severally by mechanical thingummys that physically interact with the field or by electronic pulls that quantifies and measures changes in the given environment. in that location are two contrivance of head detecting which is the mechanical device, and the opposite one is electronic device. In the mechanical device, a tripwire is a unprejudiced form of movement spying. If a moving objects steps into the tripwires field of view then a simple sound device homogeneou s bells may alert the user. Mechanical trend espial devices can be simple to implement, but at the athe sames of term, it can be defeated easily by interrupting the devices mechanics like cutting the wire. While in electronic device, the electronic work sensing much(prenominal) as social movement demodulators, can prevent such(prenominal) mechanical intervention.The principal methods by which exertion can be electronically identified are visual detection and acoustical detection. infrared radiation easy or laser technology may be utilise for opthalmic detection. Motion detection devices, such as apparent movement demodulators, have sensors that detect movement and send a bes peak to a sound device that rises an apprehension or batter on an image recording device. There are apparent exploits sensing element which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network.The applications for such detect ion are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish well-heeleding, and detection of a moving object which detonates a camera to record subsequent events. The head detector is thus a sanctioned idea of electronic security brasss. 1. 2 Project objective The objective of this project is to shape a house security placement development microcontroller Intel 8051 based on fighting(a) unseeable crusade detection. 1. 3 Project scope This project concentrates on a development of an alert infrared operation detector for house security remains.To develop the full-page project, it consists of third methods which are the design of security organisation, the galvanic structure, and the software programming. The pattern of security system is on the detection of movement using sprightly sensor to trigger qui vive clock controlled by the microcontroller Intel 8051. The galvanical structure consist of two systems which are the restless infrared travel that employ to detect or sense motion and the microcontroller Intel 8051 circle, utilise to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction rights.It contains a program knowing for a security system as an interaction to operate the galvanic structure. 1. 4 Literature brush up Motion detectors are mainly utilize in security systems 4. It is typically positioned near exterior accesswayways or windows of a girding to varan the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the bonnie homeproprietor as well as mercenary organizations 4. An electronic motion detector is a device employ to detect any physical movement in a given area and transforms motion into an electric signal.It consist of sensor that electrically connected to other devices such as security system, wakefuling , audio alarms, and other applications. Motion sensors are used in a replete(p) variety of applications and as a result, many assorted types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in turn on or smoke detection. It is a device that often used in automatic crystalize switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person bring outs a monitored area 4.The infrared sensors have canonically two forms quick and passive. 4 An active infrared detector includes a ray of light showtime and an infrared sensor which is sensitive to interruptions in the radiation sensed from the fount. 4 These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. The proposed active infrared method of motion detection has the advantage of fast animate answer of a relatively large sensor.This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents veritable problems in the passive infrared (PIR) sensors. Low production cost is some other advantage of these active infrared detectors. 4 Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally use an optical ollection system and multiple sensing elements of alternating polarity to shape a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for prod ucing a detection signal in response to the heat sensor detecting a change of temperature caused by the body heat of a person incoming the detection pattern. PIR motion detectors are perhaps the just about frequently used home security device. 4 Passive IR motion detectors are unremarkably designed to let an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is reactive to receipt of the breach indication to cause an alarm condition to occur. The other motion detector used in security system is an supersonic motion detector. It is commonly used for automatic door openers and security alarms 4. It is threepenny and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector.It can be used to detect motion in an area where there are not so-called to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since th ey are real effective in this application 4. In an ultrasonic motion detector, there are two transducers one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the murderer in unremitting phase if none of the objects in the area are moving. If something moves, the get windd signal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm.Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a skim overhead. Besides, the installation options on this type of motion detector are express mail because ultrasonic beams are easily close offed by thin materials, including paper. put on triggering is easily caused by reflections from blowing curtains, pets, and flying insects.While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use two infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the aim of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor.Its capability on detecting motion with a simple design at low cost is indispensabilityed to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the proj ect objective, the project scope, and the literature go over of motion detector for security system. The concepts of motion detector are the major element as a guide for the development of the security system. Chapter 2 explains the systems abstruse for the development of the active infrared motion detector for house security system.The understanding of three systems which are the active infrared, motion detector, and house security system stated in this chapter needed for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for computer hardware development, and the programming for the operation of the security system. Chapter 4 discusses on the results obtained of the whole project.All discussions are concentrating on the result and performance of the sec urity system. The discussion is semiprecious for future development of the security system. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification take on this project is stated in this chapter for notwithstanding development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system.The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit volitioning be control by the second system which is the microcontroller Intel 8051 based system. The confederacy amidst this two systems wi ll built a project called an active infrared motion detector for house security system. 2. 2 participating infrared (IR)Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that pay back heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4 meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as germanium and silicon. The active infrared sensors use invisible light to scan a defined area.In active infrared systems, there are two-piece elements which are consisting of an infrared sender and an infrared receiver. There is a 3/8 inch infrared beam between the vector which is fixed on one side of the trail and the receiver which is placed on the other side of the trail. The sender and the receiver can be separated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which forever monitors the scan zone. When a person or object enters the zone the infrared light is interrupted.It then sends a signal to the controller system, which is wired into the door controls. One variation of this operating mode is called background suppression. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone thus cause a reflectance variation of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is either integrated with or connected to other devices that alert the user of the pre-sense of motion.An electronic motion detector contai ns a motion sensor that transforms the detection of motion into an electric signal. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. expeditious sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell.A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is nickel-and-dime(prenominal) devi ces that can add for more security to a home and provide peace of mind for home owners. 2. 4 House security system House security system is one of security that truly tie in to burglar or safety alarm system.Burglar and safety alarms are run aground in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a agent for announcing the alarm to elicit response. In a new bodily structure systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are give to one mission handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar.Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The fir st security system invented, house alarms were triggered by the release of a pressure tone ending fitted into a door or window frame. This basic alarm was essentially flawed as the entire intruder needed to do to inhibit the alarm was to close the door or window. While various systems on the market ranging from inexpensive house security alarms to highly sophisticated systems requiring professed(prenominal) installation.All modern alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the security system designed. The alarm is triggered when the circuit is altered and will not be silenced until a scratch is punched into the control panel. The most expensive and complicated alarm systems might also involve a faction of motion sensors and pressure pads to ensure even the most cunning intruder doesnt get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit machi ne.Its memory is nonionic in bytes and practically all its instruction deal with byte quantities. It uses an Accumulator as the primary register for instruction results. Other operands can be accessed using one of the four different addressing modes available register implicit, direct, indirect or contiguous. Operands reside in one of the five memory sets of the 8051. The five memory spots of the 8051 are the Program Memory, immaterial information Memory, Internal Data Memory, circumscribed Function Registers and round Memory. The Program Memory space contains all the instructions, immediate data and constant tables and strings.It is principally addressed by the 16-bit Program snack counter (PC), but it can also be accessed by a few instructions using the 16-bit Data Pointer (DPTR). The supreme size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffer zones and data structures that can not fit on-chip. It is principal ly addressed by the 16-bit Data Pointer (DPTR), although the first two general purposes register R0 and R1 of the shortly selected register bank can access a 256-byte bank of External Data Memory. The maximum size of the External Data Memory space is 64K bytes.The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most outstanding data memory space. In it resides up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on directly by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space.The exceptional Function Register space contains all the on-chip peripheral input and payoff registers as well as particular registers that need program access . The maximum number of Special Function Registers (SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the velocity 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The Bit Memory space is used for storing bit variables and flags.There are specific instructions in the 8051 that operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before progress for the design and development touch on. This is grievous to ensure the project done jibe to the main idea of each part discuss in this chapte r. CHAPTER 3 METHODOLOGY 3. 1 IntroductionThere are several steps to be use in pattern an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the theoretical design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware development is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed.This process is just only being proceed if each part of the circuit being improved is sensible, else, it will be repeated until it is valid as the theoretical. Once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be interface with the hardware development. While the final step of this investigate is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security system discover 3. 1 Active infrared motion detectors effigy 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two trappings. The first housing contains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security systemA person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the a ctive infrared motion detector. An interruption in the signal modulate pulsating beam transmit by an infrared diode while receive by an infrared detector will set on or off the alarm of the security system. 3. 3 Hardware development Figure 3. 3 Block draw for the house security system The hardware development is divided into three submits as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypad, and magnetic sensor.The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In designing the infrared motion detector circuit, it is based on two basic principle of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared op eration 3. 3. 2 Infrared transmitterFor the infrared transmitter which is also known as emitter circuit, it is on a basic design of timer 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a continuous train of pulses at any frequency required. This means that the 555 timer can operate repeatedly it will switch on and off continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high 1 or low 0 from the output terminal thus activate or de mobilise the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector can fully operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure write in code entries to activate of deactivate the security system operation. The keypad provides eight interface pins, where one pin for each row and column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad modifyr (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 Keypad convertr (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller system. Figur e 3. 5 Interaction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic configuration to the keypad encoder.While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is simply a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load.The octal buffer is used to isolate one device from another by e liminating loading effects. It provides a buffer between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 expended mode.In expended mode configuration, external ROM and RAM are used to add the data memory to be more than internal memory provided by the Intel shaper. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on overbearing devices and instruments due to its flexibility, existence of multiple producers. It co nsists of a simple architecture introduced by Intel in the year of 80s.It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains matched with 8051. There are various versions of 8051 with different speeds and amount of the on-chip ROM which is invaluable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler.The 8051 chump Assembler (ASM51) takes an assembly language source file created with a textual matter editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the transverse Assembler builds a symbol table and labels that used in the sou rce file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose.A security program as shown in flow graph below were written in notepad based on 8051 instruction set before assembling process to get the binary code. This binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as 1985 to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition.To deactivate the system where opening door without alarm, user moldiness enter the inactivation code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If deactivation code was make better, green LED will on while alarm will off condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will on where the system is in a warning mode.The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate the green LED will on and the alarm will off condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will on. User must enter the correct deactivation code to turn off the alarm system.The activatio n and deactivate code for this system are 1985 and the enter handout codes are A for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security system, the hardware development, and the software designed for the security system. Each part of these elements is think to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 IntroductionThis chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitt er circuit and the infrared detector component. 4. 2. 1 The emitter The emitter which also known as infrared transmitter circuit was build as shown in Figure 4. . A probe or the range is attached to the infrared LED while the adjustable resistor is change to calibrate the emitter to transmit 38 kHz square wave. The Figure 4. 1 shows the final configuration of the emitter circuit Figure 4. 1 The emitter circuit Figure 4. 2 shows the result obtained from the oscilloscope where the frequency generated by the emitter circuit is 38. 67 kHz square wave. At this generated frequency, the voltage maximum produced is 1. 60V and the peak to peak voltage is 1. 16V. Figure 4. 2 The 38 kHz frequency generated by the emitter circuit

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.