• Tidak ada hasil yang ditemukan

CHAPTER 1 - Daffodil International University

N/A
N/A
Protected

Academic year: 2023

Membagikan "CHAPTER 1 - Daffodil International University"

Copied!
44
0
0

Teks penuh

This is to certify that this project and thesis entitled "Design and implementation of Arduino based home security system" was done by the following students under my direct supervision and this work was done by them in the laboratories of the Department of Electronics and Electronics. Engineering at the Faculty of Engineering of Daffodil International University in partial fulfillment of the requirements for the degree of Bachelor of Science in Electrical and Electronic Engineering. The project and thesis entitled "Design and Implementation of Arduino-Based Home Security System", submitted by Taranna Tanjin, ID No and Shamima Akter, ID No Session: Spring 2018 has been accepted as satisfactory in partial fulfillment of the requirements for the degree Bachelor. of Science in Electrical and Electronics Engineering 2018. We would then like to take this opportunity to express our appreciation and gratitude to our project and thesis supervisor Rohan Sarker, Lecturer, Department of EEE for being dedicated in supporting, motivating and guiding us through this project.

Shahid Ullah, Professor and Head of the EEO Department for his help, support and constant encouragement. We would like to express our deepest love and gratitude to our beloved family for being very supportive and also for their inspiration and encouragement during our studies at this university.

ABSTRACT

INTRODUCTION

  • Introduction
  • Problem Statement
  • Objectives
  • Scopes
  • Project Outline

This proposed system will provide a technological solution that will reduce crime rates as well as security costs.

LITERATURE REVIEWS

  • Introduction
  • Types of Security System
    • Monitored Security System
    • Unmonitored Security System
  • Some Existing Home Security Systems
    • Ring Alarm
    • Nest Secure
  • Technologies
    • RFID Authorization
    • Motion Detection Using PIR
  • Summary

In unmonitored security systems, the consumer will be offered devices that can be installed by professionals or by themselves. A typical unmonitored security system may have the following devices, eg: control panel, motion sensor, smoke and fire sensor, door and window sensor, glass break sensor and alarm bell. Some systems can be paired with smartphones and other computing devices to provide the ability to monitor the system from a remote location.

It has contact sensors that can detect an open window, broken glass, fire and gas leakage, etc. The radio frequency identification system has three parts, namely a scanning antenna, a transmitter with a decoder for data interpretation and a transponder - an RFID tag. - which was programmed with information. The radio frequency radiation does two things, it provides a means to communicate with the transponder and supplies the RFID tag with energy to communicate.

This is an absolutely key piece of technology; RFID tags do not need to contain batteries, and therefore can remain usable for very long periods of time. RFID tags can be read in a variety of circumstances where barcodes or other optically read technologies are useless. The label should not be on the surface of the object and therefore not subject to wear [5].

The PIR sensor has two slots in it, each slot is made of a special material that is sensitive to IR. When the sensor is idle, both sockets detect the same amount of IR, the amount of ambient irradiated from the room or walls or outside. When a warm body such as a human or animal passes by, it first captures half of the PIR sensor, which causes a positive differential change between the two halves.

When the warm body moves away from the sensitive area, the opposite occurs, where the sensor generates a negative differential change. In this chapter we have discussed different types of monitoring systems with their advantages and disadvantages. We also discussed security technology, structure, working principle and others with the aim of clarifying our proposed work.

DESING AND FABRICATION

  • Introduction
  • Block Diagram
  • Program Flow Chart
  • Implementation and Testing
    • Hardware Arrangement

The microcontroller will act as the main controller of the system and responsible for all types of input, output and processing. When the system is activated, the system will wait until one of the sensors generates an interrupt. If a user scans their RFID tag to enter their home, the microcontroller will read the hexadecimal value of the tag and match it to the user table.

If the user is authorized by the system, the system then opens or closes the door depending on whether the person in question is inside or outside the home. The system will also turn the room light on or off depending on the owner's entry or exit. If the system detects an unknown RFID tag, it sends a warning message to the owner via the GSM module and blows for a while.

The system will ignore any movement detected from the PIR sensor, while any legitimate person stays inside the home, in the absence of any legitimate person, the system will detect him as an intruder and notify the owner immediately. To lock the door, the position of the servo motor must be set to the 0 degree position, and to lock the door, the position must be set to the 90 degree position. These images show GSM device which is responsible for sending message to eur as mobile SMS.

SIM 900A GSM

Overall Demonstration

The system can detect the presence and absence of a specific user inside the house, so it turns on or off the light at the entrance or exit of that particular person. Figure 3.11 shows that the system is denying access to an unauthorized person and sending an alarm message to the owner. The system can detect the presence and absence of a specific user, so it displays and notifies with various messages on entry or exit.

A door lock/unlock button will be placed in the home so that it can be opened or closed from the inside without authentication.

Summary

HARDWARE AND SOFTWARE DEVELOPMENT

Introduction

Hardware components used

  • Arduino Mega 2560
  • Simcom SIM 900a GSM Module
  • RFID Reader Module
  • RFID Transponder

The system uses Arduino Mega 2560 as the main microcontroller which is selected for its strong capacity compared to other similar boards. It has a large number of GPIOs, larger RAM and fits well with all the components used in this system. It can be controlled by AT command and can be interfaced via UAER/Serial communication.

RFID modules are very affordable, such as the Mifare MFRC522 chip that we used in our project. An RFID tag also known as an RFID transponder consists of a chip, some memory and an antenna cap that exchanges data with an RFID reader via radio waves. Passive tags are mainly used due to lower costs and smaller size, passive tags must be activated by the RFID reader before data can be transferred.

4.2.4 16*2 LCD display

Servo motor

Servo motor is a self-contained electrical device that rotates parts of a machine with great precision. In this security system, a servo motor is used to lock and unlock the door during authentication. The rotating shaft of the motor is set to lock the door and vice versa.

Gas Sensor

Software Development

  • Software Algorithm
  • Software Coding and Libraries

RFID tag reading code

Servo Motor Control Code

PIR Motion Detection Code

SIM 900A SMS Sending Code

Arduino IDE

Arduino products are distributed as open source hardware and software and are licensed under the GNU Lesser General Public License (LGPL) or the GNU General Public License (GPL).

RESULTS AND DISCUSSIONS

Introduction

5. 2 Test for different operations

CONCLUSIONS

Conclusions

Limitations of the Work

Future Scopes of the Work

Referensi

Dokumen terkait

PROGRAM STRUCTURE AND ORGANIZATION  Program Description Program Structure by kind of requirements: Kind of Requirements Course Code Course Title Credit Hours Pre- requisites