SlideShare a Scribd company logo
1 of 39
MAKERERE UNIVERSITY
COLLEGE OFENGINEERING, DESIGN, ART AND TECHNOLOGY
SCHOOL OF ENGINEERING
DEPARTMENT OF ELECTRICAL AND COMPUTER
ENGINEERING
Bachelor of Science in Computer Engineering
DESIGN OF AN AFFORDABLE AND EFFECTIVE BURGLAR
HOME SECURITY SYSTEM
A PROJECT REPORTT
Submitted in Partial Fulfillment of the Requirements for the award of the
Degree of Bachelor of Science in Computer Engineering of Makerere
University
Belinda Priscilla Achieng
09/U/2776/PS
MAY, 2O13
ii
Declaration
I, Belinda Priscilla Achieng declares that this Report is my original work and has not
been submitted to any college, university or institution for any academic award.
Belinda Priscilla Achieng
Signed: ..............................................
Date: ……………………………….
We, the supervisors, have approved this proposal for it meets the examiners’ requirements
for the Bachelor of Science in Computer Engineering Degree of Makerere University.
Main Supervisor
Mr. Sebbaale Derrick
Department of Electrical & Computer
Engineering
School of Engineering
Makerere University
Signature……………………………..
Date…………………………………..
Co-Supervisor
Mr. Bogere Paul
Department of Electrical & Computer
Engineering
School of Engineering
Makerere University
Signature……………………………
Date………………………………….
iii
Dedication
I dedicate this report to my parents Mr. Ofwono Emmanuel and Mrs. Ofwono Christine
who have enabled me to reach this level.
iv
Acknowledgement
There are a number of people without whom this report might not have been written and
to whom I am greatly indebted.
My appreciation is due to my mentors, superiors, colleagues and juniors from whom I
learnt a lot. I owe my deepest gratitude to all that made this dissertation possible.
My sincere thanks go my supervisors Mr.Sebbaale Derrick and Mr. Bogere Paul for the
great guidance and support throughout this project.
I am also thankful to the technical staff of the Department of Electrical and Computer
Engineering for their time and cooperation.
My Project partner Willy Mukasa with whom we worked closely to make this a success. I
am deeply grateful for the long discussions and troubleshooting steps that helped us sort
out the technical challenges during research.
Special thanks to my brothers John and Steven, who have always been by my side
throughout the struggle.
Most of all thanks to God the Almighty who continues to make the impossible possible!
v
Table of Contents
Declaration............................................................................................................................ii
Dedication ............................................................................................................................iii
Acknowledgement ...............................................................................................................iv
Table of Contents .................................................................................................................v
Table of Figures..................................................................................................................vii
Abstract..............................................................................................................................viii
Chapter One: Introduction .................................................................................................1
1.1 Background..............................................................................................................1
1.2 Problem Definition..................................................................................................2
1.3 General Project Objective........................................................................................2
1.4 Specific Objectives..................................................................................................2
1.5 Justification..............................................................................................................2
1.6 Project Scope ...........................................................................................................3
1.7 Significance of the Study.........................................................................................3
1.8 Ethical Considerations.............................................................................................4
1.9 Limitations...............................................................................................................4
Chapter Two: Literature Review........................................................................................5
2.1 Introduction .............................................................................................................5
2.2 Summary of Literature Review ...............................................................................5
2.2.1 Trend of Burglar Alarm Systems .....................................................................5
2.2.2 Sensor Types ...................................................................................................6
2.2.3 Security System Keypads.................................................................................9
2.3 Alarm connection and Monitoring ........................................................................10
2.4 Advantages of Alarm Systems ...............................................................................11
2.5 Conclusions ............................................................................................................11
2.6 Hypothesis .............................................................................................................11
Chapter Three: Methodology............................................................................................12
3.1 Introduction............................................................................................................12
3.3 Project Components...............................................................................................13
3.4 Setting up the working environment .....................................................................14
3.5 Design specification ..............................................................................................14
3.6 Project Models: Hardware Development ..............................................................15
vi
3.6.1 Motion detector circuit...................................................................................15
3.6.2 Infrared transmitter.........................................................................................16
3.6.3 Infrared receiver .............................................................................................18
3.6.4 Keypad ...........................................................................................................18
3.6.5 Controller circuit ............................................................................................19
3.6.6 Output devices................................................................................................19
3.6.7 LCD display ...................................................................................................19
3.6.8 Buzzer.............................................................................................................21
3.6.9 Indicator .........................................................................................................21
3.7.0 Software development....................................................................................22
Chapter Four: Results, Key Findings and Challenges ...................................................24
4.1 Introduction ...........................................................................................................24
4.2 Motion detector circuit ..........................................................................................24
4.2.1 The emitter .....................................................................................................24
4.3 Summary of Key Results.......................................................................................24
4.4 Challenges .............................................................................................................25
Chapter Five: Conclusion and Recommendations ..........................................................26
5.1 General Discussion................................................................................................26
5.2 Added Value for Research.....................................................................................26
5.3 Areas of future Improvements...............................................................................26
5.4 Recommendations .................................................................................................27
References...........................................................................................................................28
Appendices..........................................................................................................................29
vii
Table of Figures
Figure 1: Background.............................................................................................................1
Figure 2: Active infrared motion detectors ..........................................................................12
Figure 3: The concept of infrared motion detector for security system ...............................13
Figure 4: Block diagram for the home Intrusion Detection System ....................................15
Figure 5: Basic principle of infrared operation ....................................................................16
Figure 6: Infrared Transmitter Circuit..................................................................................17
Figure 7: Square Wave Result on the Oscilloscope .............................................................17
Figure 8: Pins of the 3x4 keypad..........................................................................................18
Figure 9: Breadboard Connection, Character LCD and Netduino .......................................20
Figure 10: Flow chart of software for the security system...................................................23
Figure 11: System Prototype................................................................................................25
Table 1: Shows part of the code that calls the buzzer method. ...........................................21
Table 2: Showing the project components ..........................................................................31
viii
Abstract
Nowadays, house security system becomes the best solution to overcome house intrusion
problem when user is not in house. There are many types of house security systems used in
Uganda today; however most of them are imported from outside the country making them
too expensive for the Low Income earners.
This project is focusing on developing an effective house security system at low cost with
an active infrared motion detector which is controlled by 32 bit Micro-controller. The
overall project is divided into two parts;
The first part is concern on the hardware development where all electronics component are
Connected via the circuit design, an active infrared and keypad are the input components
while buzzer, indicator, and LCD display are the output components controlled by
controller circuit.
The second part is based on software programming to operate the hardware structure.
Netduino Electronics Platform is an open source electronics platform using .NET Micro
Framework. It features a 32-bit microcontroller and a rich development environment. It
combines 20 GPIOs with SPI, 12C, 2 USARTs, 4 PWMs, and 6 ADC channels to load into
external memory of the hardware structure via serial communication.
The process of downloading and executing the program is done using HyperTerminal’s
communication software to the microcontroller serial port.
In order to achieve the best house security system, more detectors or sensors can be
connected to the microcontroller output port where it can be reprogrammed by user using
their personal computer at home. As the result, the infrared motion detector is capable to
detect motion while the microcontroller is capable to control the whole operation of the
Security system
1
Chapter One: Introduction
1.1 Background
Burglary and theft form the core of most criminal activities in households, pharmaceuticals
and small businesses in Uganda. Each year in Uganda, a number of cases involving
burglaries are recorded. According to the Police Annual Criminal Report of 2012, over
6000 cases of burglaries were investigated as compared to 5,509 cases in 2011 hence an
increase by 4.5%, also a total of 1,990 cases of House breakings were recorded in the
same year.
Figure 1: Background
Netduino platform offered a greatly enhanced list of features required for the project.
It has got Input /Output Interfaces with switches, sensors, LEDs, serial devices and
combines the ease of high-level coding and the features of microcontrollers. Event-based
programming, multi-threading, line-by-line debugging, breakpoints were also made very
possible.
Netduino also features the 32-bit microcontroller that has a high operating frequency,
allows code reuse and low active power requirement making it more suitable for the
project.
The 3x4 Keypad of offered a simple architecture and provided the easy of interfacing large
number of input keys to the microcontroller.
2
With the use of low costly components and easier programming language ( C#), with a
framework of pre-developed components and full features, development of the proposed
system was made faster and easier
1.2 Problem Definition
Most of the programmeable burglar home security systems used in Uganda today are
imported from outside such as Europe . This has made them relatively more expensive for
the low income earners in Uganda as compared to if they were manufactured within the
country leading to the increase in number of burglar cases recorded annually in the
country.
Our system costs about 500,000ug shs as compared to Approximately 2 millions of similar
existing system on market.
1.3 General Project Objective
 To develop an affordable and effective burglar home security system.
1.4 Specific Objectives
 To Interface a 12 -key keypad with the 32 -bit microcontroller.
 To design the infrared motion sensor circuit and connect it to the Netduino
microcontroller
 To combine the two units (keypad and IR sensor) into a single intrusion detection
system
 To carry out system testing
1.5 Justification
The family is the top priority and home is probably man’s largest investment. Why then
not take precaution of providing a low costly and effective security system with a friendly
user interface for the residents in our country?
3
1.6 Project Scope
This project concentrated on a development of a keypad and infrared based house security
system. To develop the whole project, it was important to understand the concept and
operation of a home security system.
Hardware development involved the design of the active infrared circuit that was used to
detect or sense motion, the Keypad unit for Access Control, the LCD and the Buzzer
circuit as visual and audio output respectively.
Software development involved writing programs designed to operate the hardware
structure.
The Netduino Micro- controller was programmed to receive events from IR detector like
interrupts and triggers an appropriate signal at the output. It also follows instructions from
keypad code, for activates or deactivates the system states accordingly.
1.7 Significance of the Study
This security system is very practical. It is not only designed for home environment but
also in a business world. There is a possibility of customizing it to suit individual need and
preference.
The keypad and LCD also offers a great user interface and users get easily familiarized
with it at ease.
4
1.8 Ethical Considerations
 We will confirm to the IEEE Code of Ethics based on safety, putting in mind that
the disastrous parts of the design should be enclosed with a non-conducting
element.
 The apertures for the IR/PIR sensors are not large and pose minimal risk to users.
The IR emitter poses a potential risk to the human eye if it is stared at directly, but
this is only the case for large numbers of IR diodes.
 We will also conform to Draft Uganda Standard (DUS), DUS ISO/IEC 18043:
2006 based on Information Technology Security Techniques and Operation of
Intrusion Detection Systems.
1.9 Limitations
 Lack of enough finance to fund the project addressable by use of low cost
components in the market.
 The Infrared sensors have a short range thus performance drops off with longer
distances. They are also weather sensitive, direct sunlight, rain, fog, dust, pollution
can affect transmission.
 Then system will not address false alarms caused by house pets, we assume the
light beams from the pets are negligible
5
Chapter Two: Literature Review
2.1 Introduction
Burglar alarms are systems designed to detect intrusion and unauthorized entry into a
building or area. They are also called security alarms, security systems, alarm systems or
intrusion detection systems. Burglar alarms are used in residential, commercial, industrial,
and military properties for protection against burglary (theft) or property damage, as well
as personal protection against intruders.
This chapter will discuss the literature related to the operational procedures and utilization
of already existing intrusion detection systems, their strength, weaknesses and gaps.
2.2 Summary of Literature Review
The literature review is arranged as follows; Section 1 was an introduction, Section 2 will
describe the trend of the early burglar alarm systems up to date. Section 3 will point out
the different alarm connections and monitoring. Section 4 will give a brief view of Alarm
System Facts and a conclusion will be made in Section 5.
2.2.1 Trend of Burglar Alarm Systems
Early alarm systems relied upon a ratchet and gear assembly to ring a bell when a window
or door was opened. With the advent of electricity, alarm systems which use electrified
components confined within windows and doors were developed. Modern alarm systems
include some form of movement detection gargets placed within the building being
protected.
The design of most basic alarm systems today consists of one or more sensors to detect
intruders and an alerting device to indicate the intrusion.
However, a typical premise security alarm employs the following components:
Premises control unit (PCU) or panel:
6
This is the "brain" of the system and it reads sensor inputs, tracks arm/disarm status and
signals intrusions and in modern systems, this is enclosed along with a power supply.
Sensors: Devices which detect intrusions. Sensors may be placed at the perimeter of the
protected area, within it, or both. Sensors can detect intruders by a variety of methods, such
as monitoring doors and windows for opening, or by monitoring unoccupied interiors for
motions, sound, vibration, or other disturbances.
Alerting devices: These indicate an alarm condition. Most commonly, these are
flashing lights or bells. Alerting devices serve the dual purposes of warning occupants of
intrusion, and potentially scaring off burglars.
Keypads: Small devices, typically wall, used as human-machine interface to the system.
In addition to buttons, keypads typically feature indicator lights.
Interconnections between components: This may consist of direct wiring to the control
unit or wireless links with local power supplies
2.2.2 Sensor Types
Motion detectors
These are mainly used in security systems and are typically positioned near exterior
doorways or windows of a building to monitor the area around it. Since motion detectors
are so flexible and have so many uses, it offers feelings of protection and security for the
average homeowner as well as commercial organizations.
An electronic motion detector is a device used to detect any physical movement in a
given area and transforms motion into an electric signal. It consist of sensor that
electrically connected to other devices such as security system, lighting, audio alarms and
other applications. Motion sensors are used in a wide variety of applications and as a
result, many different types of motion sensors are available including the infrared sensor.
Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke
detection. It is a device that often used in automatic light switches and security systems to
turn on a light or to activate some other form of alarm or warning indicator when a person
7
enters a monitored area. The infrared sensors have basically two forms: active and passive
Infrared.
An active infrared detector includes a radiation source and an infrared sensor which is
sensitive to interruptions in the radiation sensed from the source. These detectors are used
as intrusion detectors by providing a path of radiation from the source to the sensor in a
place where the path is likely to be interrupted by an intruder.
The active infrared method of motion detection has the advantage of fast speed response of
a relatively large sensor. This advantage permits simpler optical system design, especially
for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which
presents substantial problems in the passive infrared (PIR) sensors. Low production cost is
another advantage of these active infrared detectors.
Passive infrared motion detection detects heat energy radiated or emitted by an object,
such as a body of a person, moving across a field of view of a heat sensor of the motion
detection system. It is generally uses an optical collection system and multiple sensing
elements of alternating polarity to create detection pattern in the volume of interest.
PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic
circuit. The radiation sensors detect changes in ambient infrared radiation.
The detection system has an electrical circuit operatively coupled to the heat sensor for
producing a detection signal in response to the heat sensor detecting a change of
temperature caused by the body heat of a person entering the detection pattern.
PIR motion detectors are perhaps the most frequently used home security device. Passive
IR motion detectors are usually designed to provide an indication to an alarm panel in
response to detecting IR that is indicative of motion of the object. The alarm panel is
responsive to receipt of the breach indication to cause an alarm condition to occur.
8
The other motion detector used in security system is an ultrasonic motion detector. It is
commonly used for automatic door openers and security alarms.
It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are
the sensor that used in ultrasonic motion detector. It can be used to detect motion in an area
where there are not supposed to be any moving objects. This type of motion detector is
most commonly used in burglar alarm systems since they are very effective in this
application.
In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave
and the other picks up reflections from the different objects in the area. The reflected
waves arrive at the receiver in constant phase if none of the objects in the area are moving.
If something moves, the received signal is shifted in phase. A phase comparator detects the
shifted phase and sends a triggering pulse to the alarm.
Ultrasonic motion detectors have certain advantages and disadvantages when compared
with other types of motion detectors. The main advantage is that they are very sensitive
and extremely fast acting.
However, the largest problem with this type of motion detector is that it sometimes
responds to normal environmental vibration that can be caused by a passing car or a plane
overhead. Besides, the installation options on this type of motion detector are limited
because ultrasonic beams are easily blocked by thin materials, including paper. False
triggering is easily caused by reflections from blowing curtains, pets, and flying insects.
While the passive infrared motion detectors offers problem where it can be falsely
triggered by warm air movement or other disturbances that can alter the infrared radiation
levels in an area. In order to prevent this problem, newer systems use two infrared sensors,
which monitor different zones within a protected area. Logic within system triggers the
alarm only when the two zones are activated in sequence, as would occur if a person
walked through the protected area.
9
For that reason, the purpose of using the active infrared as a sensor to detect motion for
this project is surely on the advantage offers by the sensor. Its capability on detecting
motion with a simple design at lowest cost is needed to build an effective house security
system based on motion detection.
2.2.3 Security System Keypads
This is a set of buttons arranged in a block or "pad" which usually bear digits, symbols and
usually a complete set of alphabetical letters. If it mostly contains numbers then it can also
be called a numeric keypad.
Security System Keypads typically operate by using buttons and simple numeric codes to
arm and disarm the system, verify that all zones are clear and operational, plus check the
back-up battery status. Often, there is a panic button located on the keypad as well. Once
pushed, the panic button can be programmed to contact your home monitoring service,
police, fire, or EMS.
For basic wired and wireless alarm systems, the control panel and the main keyboard are
typically one in the same unit. The user can then buy additional keypads to enrol into the
system.
Because the keypad is the part of the alarm system that will be used most, the placement of
it should be well thought out. If you have just one keypad it is recommended to be placed
close to the most used door. One or two keypads are probably all you need for an
apartment, condo, or small house. On the other hand, multiple keypads provide the greatest
flexibility for those living in a bigger home or operating a business.
4x3 hexadecimal keypads
The purpose of using 4x3 hexadecimal keypad in the project is as an input where secure
code entries to activate of deactivate the security system operation. The keypad provides
seven interface pins, where one pin for each row and column of the keypad matrix. This
4x3 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the
keypad bouncing in the hardware development.
10
Keypad encoder (Netduino)
The Netduino key encoders provide all the necessary logic to fully encode an array of 4x3
hexadecimal keypad. It is used to encode the data received from the keypad code entry
thus convert into binary code. These binary code is in hexadecimal number is required in
data bus of the microcontroller system. The keypad is used as a switch to give logic
configuration to the keypad encoder.
While the encoder will encode the data configuration from the keypad into the binary code
based on datasheet of the encoder. These binary codes will be stabilized using the octal
buffer to be process in the microcontroller system. These data will be process by the
microcontroller thus running the system operation based on software designed for the
security system.
2.3 Alarm connection and Monitoring
Depending upon the application, the alarm output may be local, remote or a combination.
Local alarms do not include monitoring, though may include indoor and/or outdoor
sounders (e.g. motorized bell or electronic siren) and lights which may be useful for
signaling an evacuation notice for people during fire alarms or where one hopes to scare
off an amateur burglar quickly.
Remote alarm systems are used to connect the control unit to a predetermined monitor of
some sort and they come in many different configurations. High-end systems connect to a
central station or responder (e.g. Police/ Fire/ Medical) via a direct phone wire, a radio
network (i.e. GPRS/GSM) or an IP path. In the case of a dual signalling system two of
these options are utilized simultaneously.
The alarm monitoring includes not only the sensors, but also the communication
transmitter itself. Though direct phone circuits are still available in some areas from phone
companies, they are becoming uncommon due to high costs of subscriptions.
11
Wired Versus Wireless, “Wired” simply means all components of the system are
connected to each other by electrical wire, usually offering more proven reliability.
“Wireless” systems rely on transmitting signals between components, much like radio
signals. “Wireless” systems are growing in popularity as the technology improves. A good
system costs about the same as a hardwired system. The control panel and sensors are
constantly sending each other signal. The control panel is in a locked and tamper-proof
area.
2.4 Advantages of Alarm Systems
Though an alarm system is an excellent defense, the best defense is through reinforcement
and combination of efforts of the already existing alarm systems.
 The mere fact that an alarm system exists is often a sufficient deterrent to
discourage a burglar even before he tries to force an entry.
 Knowing you and your property are secure increases peace of mind.
 Most insurance companies give a reduction on home owner’s insurance when an
alarm system has been installed.
2.5 Conclusions
Depending on the system, the skill required to install it ranges from your own assumptions,
often the wiring of a system is not the only thing you need to know about. Sensor location
can make the difference between a system that works properly and one that is a false alarm
nightmare.
In addition, there may be difficulty in finding someone to monitor or service the
equipment. One of the recommended systems is the Sensor based detection systems.
2.6 Hypothesis
It is observed that the cost and the effectiveness of alarm systems depends entirely on the
type of system components used and the interactions between these components
respectively for its optimal performance and operation.
12
Chapter Three: Methodology
3.1 Introduction
This chapter examines the steps that were taken to achieve the objectives of this Project. It
analyses the methods, tools and processes that were used in the design and development of
system.
Information on motion detection that aided the design of Infrared sensor circuit was
gathered through literature review from previous chapter.
Project design was based on both Hardware and Software development. Hardware
development involved connections of the project components via the circuit design, an
active infrared and keypad are the input components while buzzer, indicator, and LCD
display are the output components controlled by controller circuit.
The second part is based on software programming to operate the hardware structure. This
involved the development of a software structure for the9 security system to be interfaced
with the hardware development.
3.2 The concept of motion detector for security system
Figure 2: Active infrared motion detectors
Figure 2 shows the concept of an active infrared motion detector for a security system. In
the active system each sensor consisted of two housings. The first housing contained an
infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector.
13
The other housing contained an infrared reflector to reflect the infrared signal. When
positioned in front of an entrance to a protected area, the two housings establish an
invisible beam.
Figure 3: The concept of infrared motion detector for security system
The concept of infrared motion detector for security system .A person who enters the area
interrupts the beam causing an alarm to be triggered. For this type of motion detector uses
the basic concept of the active infrared motion detector. Aninterruption in the signal
modulated pulsating beam transmit by an infrared diode while receive by an infrared
detector will set ‘on’ or‘off’ the alarm of the security system.
3.3 Project Components
Netduino Electronics Platform
This is an open source software with a .NET framework development board featuring 32-
bit microcontroller and got a rich development environment. The 32-bit microcontroller
has a high operating frequency, allowed code reuse and got a low active power
requirement which made it more suitable for use the project.
Netduino platform also offered a greatly enhanced list of features required for the project.
It has got Input /Output Interfaces with switches, sensors, LEDs, serial devices and it
combines the ease of high-level coding. It also supports event-based programming, multi-
threading, line-by-line debugging and breakpoints.
14
The 32 bit Micro-controller used has a high operating frequency, enabled code reuse and
has got a low active power requirement.
A 4x3 keypad was used because of its simple Architecture, the easy to interface and their
ability to allow interface of large number of input keys to the microcontroller.
3.4 Setting up the working environment
This involved installation of Microsoft Visual Studio 2010 and Netduino frame work
software. The programming language used was c-sharp programming language (C#)
mainly because it’s a rich framework of pre-developed components, libraries and it also
had full features that made development faster and easier, usually at the cost of
flexibility.
3.5 Design specification
This was based on Draft Uganda Standard (DUS), DUS ISO/IEC 18043: 2006 based on
Information Technology Security Techniques and Operation of Intrusion Detection
Systems. The model was defined by a set of functions. These functions included: raw data
sourcing, event detection analysis, data storage.
15
3.6 Project Models: Hardware Development
Figure 4: Block diagram for the home Intrusion Detection System
The hardware development was divided into three stages as shown in block diagram
above. The inputs stage of the security system was the motion detector circuit, keypad. The
second stage is the controller unit which was the microcontroller Netduino. The purpose of
using microcontroller was to control the whole system operation by sending data to the
output stage which is the LCD display, indicator, and buzzer.
3.6.1 Motion detector circuit
In designing the infrared motion detector circuit, it was based on two basic principle of
active infrared motion detector which was the infrared transmitter and infrared receiver as
shown in Figure 4.
16
Figure 5: Basic principle of infrared operation
3.6.2 Infrared transmitter
For the infrared transmitter which was also known as emitter circuit, it was on abasic
design of timer 555 astable operation. The output of timer was connected to the infrared
transmitter used to produce pulse using an astable timer circuit.
In astable circuit operation, pulse continually generated until the power supplied through
the circuit was removed. The astable circuit produced a continuous train of pulses at 38kHz
frequency required. This meant that the 555 timer could operate repeatedly; it would
switch ‘on’ and ‘off’ continually to generate data for the infrared transmission.
To get 38KHz the circuit was first simulated using computer aided design software called
multisim as shown in the diagram below.
17
Figure 6: Infrared Transmitter Circuit
The circuit was connected as shown, Voltage input (Vcc) and Rest connected to main
voltage supply VDD, threshold and trigger pins on the 555 timer was connected together
via a capacitor of 0.001µF to ground.
The ground of 555 timer was connected to ground and output pin connected to R2(470Ω)
through the transmitter. Resistor (R1) was kept constant and Resistor(R4) was determined
by varying the resistance at that point using a potentiometer. A 38KHz frequency was
obtained by making R1 be 14.7KΩ and R2 11KΩ and a square wave obtained on
oscillscope as shown in diagram.
Figure 7: Square Wave Result on the Oscilloscope
18
3.6.3 Infrared receiver
The infrared receiver which is also known as infrared detector receives the data transmitted
by the infrared transmitter circuit. It is a simple electronics device on detecting infrared
signal. This infrared detector can be directly connected into the controller circuit to
produce logic high ‘1’ or low ‘0’ from the output terminal thus activate or deactivate the
controller system operation. The range of infrared detector components according to
datasheet stated that the infrared detector ca fully operates on detecting the infrared signal
of 38 to 45 kHz.
3.6.4 Keypad
Keypad is an array of switch with 2 wires connected each time a button is pressed. There is
no connection between rows and columns thus the button makes it connect. They are many
types of keypad from different manufactures and they may have different pin connection.
The work done, involved interfacing the 7 pins, 3x4 keypad having a part number 88AB2-
143 with the Netduino framework. The keypad exists out of 4 rows and 3 columns, thus we
have 4 row pins and 3 column pins
In the matrix keypad (7 pins), to obtain key1, row1 and column1 are connected.), row1
matches pin1 and column1 matches pin5, thus pin 1 and 5 are connected. The same
procedure for the respective columns and rows are followed to obtain the rest of the keys
as shown in the figure below.
Figure 8: Pins of the 3x4 keypad
Using C sharp programming language in Visio studio, a new project TextMatrixKeyPad is
created under program.cs, the keypad driver software imported and the following code
was written in the main class.
19
3.6.5 Controller circuit
The Netduino Micro-controller which is the central unit was programmed to receive
signals from initiation devices (motion detectors and the keypad) and then it could activate
an appropriate notification device (The buzzer or LED) depending on the Event.
The Control Unit in addition to processing programmed instructions/reactions, it also
electrically monitors system wiring and primary powe
3.6.6 Output devices
These were controlled by the panel. They categorized both visual and audible devices such
as LCD display, Buzzer and the LEDs. More than one device was activated at a given time.
These output devices were controlled locally.
3.6.7 LCD display
Liquid Crystal Displays (LCD) are a great choice of output device for displaying
alphanumeric characters in real time and very useful for interactive user interface for data
input. Besides, they are inexpensive, consume less power than LED displays, and give a
more professional look.
20
Figure 9: Breadboard Connection, Character LCD and Netduino
Interfacing and programming the LCD
static SerialPort port = new SerialPort("COM1", 9600, Parity.None, 8, StopBits.One);
This line initializes the object os serial port which takes in the above parameters, like
COM1 which is a serial port on netduino for receiving inputs
if(!port.IsOpen) port.Open();
This line makes the port always open to enter different data to LCD
port.Write(clr, 0, clr.Length);
string buff_number = keyCode.ToString();
byte[] buff = Encoding.UTF8.GetBytes(digs);
port.Write(buff, 0, buff.Length);
if (digs.Length == teststring.Length)
{
if (digs.CompareTo(teststring) == 0)
{
string str = "success";
port.Write(clr, 0, clr.Length);
byte[] buff2 = Encoding.UTF8.GetBytes(str);
port.Write(buff2, 0, buff2.Length);
}
//if we find out password doesn't match
else {
digs = "";//we clear the wrong password
port.Write(clr, 0, clr.Length);
}
}
21
3.6.8 Buzzer
This audio signalling device, which is electromechanically driven by an oscillating
electronic circuit sounds whenever an interrupt is handled at the buzzer method due to
detection of an intrusion
Table 1: Shows part of the code that calls the buzzer method.
3.6.9 Indicator
A LED was used to indicate the system status when a valid code was input in the course of
accessing the Home premises. In an event of intrusion, the LED would blink to signify
trouble.
22
3.7.0 Software development
The software structure was developed using C sharp programming language where a set of
instructions / program based on security system was assembled. The C sharp programming
language takes an assembly language source file created with a text editor and translates it
into a machine language object file.
This translation process is done in two passes over the source file. During the first pass, the
Cross Assembler builds a symbol table and labels that used in the source file. While the
second pass of the Cross Assembler is actually translates the source file into the machine
language object file. During the second pass, the listing file of the assembled is generated
for the analysis purpose.
A security program as shown in flow chart below were written in notepad based on 8051
instruction set before assembling process to get the binary code. This binary code is then
used to be load into the location of the memory thus operates the hardware developed.
The flowchart as shown in Figure 8 is a basic designed for the security system operation.
In this security system, the security code was set as ‘12345’ to activate and deactivate the
system. When the user closed the door, the infrared sensors would automatically be
activated.
To deactivate the system when opening door, user must enter the deactivation code. If the
deactivation code was correct, green LED will ‘on’ while alarm will go‘off’ condition.
System at this time is successfully deactivated and user can open the door without alarm.
If deactivation code entered was incorrect, Keypad remained locked and the system is
keeps in the activate mode. The system will keep in this mode until the correct deactivation
code is entered.
In an event of Unauthorised entrance such as House breaking, the Alarm is triggered with
the buzzer and a LED giving out an Audio and Visual output respectively.
23
The Alarm stays ‘on’ until a correct Reset code is entered propably by the House owner to
deactivate the system. If the Reset code is correct, the system is deactivated and the buzzer
goes off otherwise the alarm stays ‘on’.
Figure 10: Flow chart of software for the security system
24
Chapter Four: Results, Key Findings and Challenges
4.1 Introduction
This chapter will briefly discuss on the results and discussions of the hardware
development. There were three major modules in developing the hardware structure which
included the active infrared motion detector circuit, keypad module circuit, and the most
important; the controller circuit.
4.2 Motion detector circuit
The hardware development of the active infrared motion detector system was divided into
two parts, which are the infrared emitter circuit and the infrared detector component.
4.2.1 The emitter
The emitter also known as infrared transmitter circuit was built showing the final
configuration of the emitter circuit as shown in Figure 6, Chapter 3. A probe or the
oscilloscope was attached to the infrared LED while the adjustable resistor is varied to
calibrate the emitter to transmit 38 kHz square wave.
Figure 7, Chapter 3 still shows the result obtained from the oscilloscope where the
frequency generated by the emitter circuit was 38.67 kHz square wave. At this generated
frequency, the voltage maximum produced was 1.60V and the peak to peak voltage 1.16V.
4.3 Summary of Key Results
The keypad and LCD also offer great interface and users can be familiar with our system in
less than few seconds.
25
There are basically three elements discussed in this chapter which are; the concept of
motion detector for security system, the hardware development, and the software designed
for the security system. Each part of these elements is related to each other.
The understanding of the concepts and methods on developing the project was very
important in achieving the main objective for the whole project.
Figure 11: System Prototype
4.4 Challenges
 A small insignificant detector output voltage change which was hard to determine
as either binary 1 or 0 by Microcontroller to initiate an appropriate trigger on the
output devices. This was addressable using Operational Amplifiers and Filtering
the signal using a capacitor to give us the expected results.
 The system is quite vulnerable to power interruption since it highly dependent on
Electricity. A Battery Backup was suggested as a future improvement to supply
current for the output devices and also provides current during AC power outages
26
Chapter Five: Conclusion and Recommendations
5.1 General Discussion
The project was successfully completed and all the objectives were achieved. This project
Sought to design an Affordable and Effective Burglar Home Security System .This
security home feature is expected to draw much attention in the next decades.
People are getting more and more concerned about how to protect themselves and their
houses from emergencies. These emergencies include both burglar intrusion and property
damage. This system provides a means for being able to securely monitor a house by use
of IR sensor and an access control keypad integrated with a microcontroller.
The project aimed at utilizing the low costly components on market to design a system that
could be Affordable to every Ugandan including Low income Earners. Our system is very
practical and can be used in households, small businesses and pharmaceuticals
5.2 Added Value for Research
This project was undertaken with the conviction that it will give students offering the
course an opportunity to reinforce the theoretical concepts by practicing Micro-controller
Programming and obtaining more knowledge on concept involving Interrupt handling,
multi-threading, line-by-line debugging and breakpoints.
The Project also offered a greater understanding of both Digital and Analog Electronics in
the field of Amplification and Signal filtering.
5.3 Areas of future Improvements
With the increasing prevalence of intelligent home automation, many aspects of a
conventional home environment have undergone changes to make living more
comfortable, convenient and safe.
27
In home safety, automated security systems play an important role of ensuring that home
intrusions are thwarted and illegal trespasses are detected and tracked. For commercial
purposes, we plan to incorporate a temperature sensor and smoke detectors in addition to
the motion sensor intergrated in a Microcontoller and GSM unit.
SMS provides an economical and convenient way to alert users of a possible intrusion into
the property as most Ugandans own and have mobile phones with them most of the time.
This will make the system more safe and cost effective
5.4 Recommendations
We recommend the use of multiple intrusion detection technologies to achieve more
comprehensive and accurate detection as sited in the Areas of Improvement.
With the studies and Uganda police investigations carried out that have proven that home
security systems deter crime. The Report shows a steady decrease in crime coinciding
with the number of registered home security systems. These studies found that not only do
home security systems benefit the individual homeowners but also the neighboring
Households.
We therefore urge the Ugandan Police to organize workshops that will sensitize the
citizens about the benefits of a home security system such as quick response in case of an
emergency and above all protection of both lives and property.
28
References
1. Ibrahim Geha and Kfoury Elie, “SAFE HOME© An Advanced Home Security
System”, Volume 2, (2009),p p 234-239
.
2. Nadia Shaheen, “Home Automation Disaster Management System via SMS and
GSM” JOURNAL Of Computing, Volume 3, Issue 7, July 2011.
3. Goldberg, Lee. Infrared Data Transmission: Electronic Design. April 17, 1995:47-
64.
4. Cremer, Mike. An Introduction to the IrDA Protocols. PDA Developers 2.6.
Nov/Dec, 1994:35-39.
5. Weeder, Terry J. Remote Control Adapter. Electronics Now. August 1995:41-49,
83.
6. 8 Apr 2011 ... 2010 Human Rights Report: Uganda, the 2009 Police Annual Crime
Report recorded a total of 332 mob action cases
7. 23 May 2012 curbing burglary and theft cases in the district more than
10 cases are recorded Uganda radionetwork.com/a/story.
8. Inderpreet Kaur, “Microcontroller Based Home Automation System With
Security”, International
9. Journal of Advanced Computer Science and Applications (IJACSA), Vol. 1, No.
6, December 2010,
10. Shiwani Saini,C.R.Suri, “Design and Development of Microcontroller Based
Auto-Flow Assembly
29
Appendices
Name picture function
Development board(Netduino) It is the development board
where the sources code is
deployed to it using Microsoft
visual studio for interfacing
project components.
3*4 Keypad
It is an array of switches with 2
wires connected each time a
button is pressed
LCD LCD used for displaying
alphanumeric characters in real
time
555 timer IC The IC was used for generating
accurate timing pulses. It is an
8 pin timer IC and has mainly
two modes of operation:
Monostable and Astable. In
Monostable mode time delay
of the pulses can be precisely
controlled by an external
resistor and a capacitor
whereas in Astable mode the
frequency and duty cycle are
controlled by two external
resistors.
30
Resistors
Resistors are passive
component which were used to
control current in a circuit.
Resistance was given by the
ratio of voltage across resistor
terminals to current. Thus a
particular value of resistor, for
fixed voltage, limits the current
through. They were
omnipresent in electronic
circuits.
Capacitors
Are passive component used to
store charge. The charge stored
in a capacitor is the product of
its capacitance value and
voltage applied to them.
Capacitors offer infinite
reactance to zero frequency so
they were used for blocking
DC components or bypassing
the AC signals.
Connecting wires
Used to connect different
components
Buzzer
Sounds whenever an interrupt
is handled at the buzzer
method due to detection of an
intrusion
31
Table 2: Showing the project components
Motion infra red sensor
Sending and receiving of infra
red beams for motion detection

More Related Content

Viewers also liked

Viewers also liked (8)

MINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORMINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTOR
 
Cellphone detector report
Cellphone detector reportCellphone detector report
Cellphone detector report
 
Project report on IR based vehicle with automatic braking and driver awakenin...
Project report on IR based vehicle with automatic braking and driver awakenin...Project report on IR based vehicle with automatic braking and driver awakenin...
Project report on IR based vehicle with automatic braking and driver awakenin...
 
Infrared IR Sensor Circuit Diagram and Working Principle
Infrared IR Sensor Circuit Diagram and Working PrincipleInfrared IR Sensor Circuit Diagram and Working Principle
Infrared IR Sensor Circuit Diagram and Working Principle
 
High Voltage Dc (HVDC) transmission
High Voltage Dc (HVDC) transmissionHigh Voltage Dc (HVDC) transmission
High Voltage Dc (HVDC) transmission
 
Fire Detector And Extinguisher Robot- Project Report
Fire Detector And Extinguisher Robot- Project ReportFire Detector And Extinguisher Robot- Project Report
Fire Detector And Extinguisher Robot- Project Report
 
Dissertation report on issue and success factors in micro financing
Dissertation report on issue and success factors in micro financingDissertation report on issue and success factors in micro financing
Dissertation report on issue and success factors in micro financing
 
HDFC BANK PROJECT REPORT
HDFC BANK PROJECT REPORTHDFC BANK PROJECT REPORT
HDFC BANK PROJECT REPORT
 

Similar to FINAL YEAR REPORT

Project_ReportTBelle(1)
Project_ReportTBelle(1)Project_ReportTBelle(1)
Project_ReportTBelle(1)
Tyler Belle
 
EXPLORING MODULAR CONSTRUCTION WITH THE USE OF SHIPPING CONTAINERS FOR HOUSI...
 EXPLORING MODULAR CONSTRUCTION WITH THE USE OF SHIPPING CONTAINERS FOR HOUSI... EXPLORING MODULAR CONSTRUCTION WITH THE USE OF SHIPPING CONTAINERS FOR HOUSI...
EXPLORING MODULAR CONSTRUCTION WITH THE USE OF SHIPPING CONTAINERS FOR HOUSI...
OLANREWAJU AKINOLA
 
GEOTECHNICAL INVESTIGATION OF ROAD FAILURE
GEOTECHNICAL INVESTIGATION OF ROAD FAILUREGEOTECHNICAL INVESTIGATION OF ROAD FAILURE
GEOTECHNICAL INVESTIGATION OF ROAD FAILURE
Simbeiwet Daniel
 
2014-11-25-Thesis-Rev08
2014-11-25-Thesis-Rev082014-11-25-Thesis-Rev08
2014-11-25-Thesis-Rev08
Edward Curt
 
Comparative Implementation of AES-based Crypto-Cores
Comparative Implementation of AES-based Crypto-CoresComparative Implementation of AES-based Crypto-Cores
Comparative Implementation of AES-based Crypto-Cores
Muhammad Asim Zahid
 
Transcoding Transport Stream MPEG2
Transcoding Transport Stream MPEG2Transcoding Transport Stream MPEG2
Transcoding Transport Stream MPEG2
Videoguy
 
Comparitive LCA of Waste Tyre Managment routes
Comparitive LCA of Waste Tyre Managment routesComparitive LCA of Waste Tyre Managment routes
Comparitive LCA of Waste Tyre Managment routes
Eddie Dooney
 
BE1268_Dissertation_Clarke_Ricky_W13032289
BE1268_Dissertation_Clarke_Ricky_W13032289BE1268_Dissertation_Clarke_Ricky_W13032289
BE1268_Dissertation_Clarke_Ricky_W13032289
Ricky Clarke
 

Similar to FINAL YEAR REPORT (20)

ABSTRACT
ABSTRACTABSTRACT
ABSTRACT
 
Student's Work Experience Program (SWEP) by IGINA PAUL
Student's Work Experience Program (SWEP) by IGINA PAUL Student's Work Experience Program (SWEP) by IGINA PAUL
Student's Work Experience Program (SWEP) by IGINA PAUL
 
Project_ReportTBelle(1)
Project_ReportTBelle(1)Project_ReportTBelle(1)
Project_ReportTBelle(1)
 
EXPLORING MODULAR CONSTRUCTION WITH THE USE OF SHIPPING CONTAINERS FOR HOUSI...
 EXPLORING MODULAR CONSTRUCTION WITH THE USE OF SHIPPING CONTAINERS FOR HOUSI... EXPLORING MODULAR CONSTRUCTION WITH THE USE OF SHIPPING CONTAINERS FOR HOUSI...
EXPLORING MODULAR CONSTRUCTION WITH THE USE OF SHIPPING CONTAINERS FOR HOUSI...
 
Students in the director's seat: Teaching and learning across the school curr...
Students in the director's seat: Teaching and learning across the school curr...Students in the director's seat: Teaching and learning across the school curr...
Students in the director's seat: Teaching and learning across the school curr...
 
fac_alahari001_planczhaov1
fac_alahari001_planczhaov1fac_alahari001_planczhaov1
fac_alahari001_planczhaov1
 
GEOTECHNICAL INVESTIGATION OF ROAD FAILURE
GEOTECHNICAL INVESTIGATION OF ROAD FAILUREGEOTECHNICAL INVESTIGATION OF ROAD FAILURE
GEOTECHNICAL INVESTIGATION OF ROAD FAILURE
 
2014-11-25-Thesis-Rev08
2014-11-25-Thesis-Rev082014-11-25-Thesis-Rev08
2014-11-25-Thesis-Rev08
 
Development of Digital Power and Machines Labs
Development of Digital Power and Machines LabsDevelopment of Digital Power and Machines Labs
Development of Digital Power and Machines Labs
 
Credit risk management and loan performance in microfinance....pdf
Credit risk management and loan performance in microfinance....pdfCredit risk management and loan performance in microfinance....pdf
Credit risk management and loan performance in microfinance....pdf
 
Fyp proposal-GSM based piped water theft detection by Khabusi Simon Peter
Fyp proposal-GSM based piped water theft detection by Khabusi Simon PeterFyp proposal-GSM based piped water theft detection by Khabusi Simon Peter
Fyp proposal-GSM based piped water theft detection by Khabusi Simon Peter
 
CSIRO Project Report
CSIRO Project ReportCSIRO Project Report
CSIRO Project Report
 
Comparative Implementation of AES-based Crypto-Cores
Comparative Implementation of AES-based Crypto-CoresComparative Implementation of AES-based Crypto-Cores
Comparative Implementation of AES-based Crypto-Cores
 
Cove: A Practical Quantum Computer Programming Framework
Cove: A Practical Quantum Computer Programming FrameworkCove: A Practical Quantum Computer Programming Framework
Cove: A Practical Quantum Computer Programming Framework
 
Transcoding Transport Stream MPEG2
Transcoding Transport Stream MPEG2Transcoding Transport Stream MPEG2
Transcoding Transport Stream MPEG2
 
Comparitive LCA of Waste Tyre Managment routes
Comparitive LCA of Waste Tyre Managment routesComparitive LCA of Waste Tyre Managment routes
Comparitive LCA of Waste Tyre Managment routes
 
BE1268_Dissertation_Clarke_Ricky_W13032289
BE1268_Dissertation_Clarke_Ricky_W13032289BE1268_Dissertation_Clarke_Ricky_W13032289
BE1268_Dissertation_Clarke_Ricky_W13032289
 
Building information modeling in support of sustainable design and constructi...
Building information modeling in support of sustainable design and constructi...Building information modeling in support of sustainable design and constructi...
Building information modeling in support of sustainable design and constructi...
 
DESIGN OF A TURBULENCE REDUCTION DEVICE FOR CANE JUICE CLARIFICATION
DESIGN OF A TURBULENCE REDUCTION DEVICE FOR CANE JUICE CLARIFICATIONDESIGN OF A TURBULENCE REDUCTION DEVICE FOR CANE JUICE CLARIFICATION
DESIGN OF A TURBULENCE REDUCTION DEVICE FOR CANE JUICE CLARIFICATION
 
KAWEESI_FINAL
KAWEESI_FINALKAWEESI_FINAL
KAWEESI_FINAL
 

FINAL YEAR REPORT

  • 1. MAKERERE UNIVERSITY COLLEGE OFENGINEERING, DESIGN, ART AND TECHNOLOGY SCHOOL OF ENGINEERING DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING Bachelor of Science in Computer Engineering DESIGN OF AN AFFORDABLE AND EFFECTIVE BURGLAR HOME SECURITY SYSTEM A PROJECT REPORTT Submitted in Partial Fulfillment of the Requirements for the award of the Degree of Bachelor of Science in Computer Engineering of Makerere University Belinda Priscilla Achieng 09/U/2776/PS MAY, 2O13
  • 2. ii Declaration I, Belinda Priscilla Achieng declares that this Report is my original work and has not been submitted to any college, university or institution for any academic award. Belinda Priscilla Achieng Signed: .............................................. Date: ………………………………. We, the supervisors, have approved this proposal for it meets the examiners’ requirements for the Bachelor of Science in Computer Engineering Degree of Makerere University. Main Supervisor Mr. Sebbaale Derrick Department of Electrical & Computer Engineering School of Engineering Makerere University Signature…………………………….. Date………………………………….. Co-Supervisor Mr. Bogere Paul Department of Electrical & Computer Engineering School of Engineering Makerere University Signature…………………………… Date………………………………….
  • 3. iii Dedication I dedicate this report to my parents Mr. Ofwono Emmanuel and Mrs. Ofwono Christine who have enabled me to reach this level.
  • 4. iv Acknowledgement There are a number of people without whom this report might not have been written and to whom I am greatly indebted. My appreciation is due to my mentors, superiors, colleagues and juniors from whom I learnt a lot. I owe my deepest gratitude to all that made this dissertation possible. My sincere thanks go my supervisors Mr.Sebbaale Derrick and Mr. Bogere Paul for the great guidance and support throughout this project. I am also thankful to the technical staff of the Department of Electrical and Computer Engineering for their time and cooperation. My Project partner Willy Mukasa with whom we worked closely to make this a success. I am deeply grateful for the long discussions and troubleshooting steps that helped us sort out the technical challenges during research. Special thanks to my brothers John and Steven, who have always been by my side throughout the struggle. Most of all thanks to God the Almighty who continues to make the impossible possible!
  • 5. v Table of Contents Declaration............................................................................................................................ii Dedication ............................................................................................................................iii Acknowledgement ...............................................................................................................iv Table of Contents .................................................................................................................v Table of Figures..................................................................................................................vii Abstract..............................................................................................................................viii Chapter One: Introduction .................................................................................................1 1.1 Background..............................................................................................................1 1.2 Problem Definition..................................................................................................2 1.3 General Project Objective........................................................................................2 1.4 Specific Objectives..................................................................................................2 1.5 Justification..............................................................................................................2 1.6 Project Scope ...........................................................................................................3 1.7 Significance of the Study.........................................................................................3 1.8 Ethical Considerations.............................................................................................4 1.9 Limitations...............................................................................................................4 Chapter Two: Literature Review........................................................................................5 2.1 Introduction .............................................................................................................5 2.2 Summary of Literature Review ...............................................................................5 2.2.1 Trend of Burglar Alarm Systems .....................................................................5 2.2.2 Sensor Types ...................................................................................................6 2.2.3 Security System Keypads.................................................................................9 2.3 Alarm connection and Monitoring ........................................................................10 2.4 Advantages of Alarm Systems ...............................................................................11 2.5 Conclusions ............................................................................................................11 2.6 Hypothesis .............................................................................................................11 Chapter Three: Methodology............................................................................................12 3.1 Introduction............................................................................................................12 3.3 Project Components...............................................................................................13 3.4 Setting up the working environment .....................................................................14 3.5 Design specification ..............................................................................................14 3.6 Project Models: Hardware Development ..............................................................15
  • 6. vi 3.6.1 Motion detector circuit...................................................................................15 3.6.2 Infrared transmitter.........................................................................................16 3.6.3 Infrared receiver .............................................................................................18 3.6.4 Keypad ...........................................................................................................18 3.6.5 Controller circuit ............................................................................................19 3.6.6 Output devices................................................................................................19 3.6.7 LCD display ...................................................................................................19 3.6.8 Buzzer.............................................................................................................21 3.6.9 Indicator .........................................................................................................21 3.7.0 Software development....................................................................................22 Chapter Four: Results, Key Findings and Challenges ...................................................24 4.1 Introduction ...........................................................................................................24 4.2 Motion detector circuit ..........................................................................................24 4.2.1 The emitter .....................................................................................................24 4.3 Summary of Key Results.......................................................................................24 4.4 Challenges .............................................................................................................25 Chapter Five: Conclusion and Recommendations ..........................................................26 5.1 General Discussion................................................................................................26 5.2 Added Value for Research.....................................................................................26 5.3 Areas of future Improvements...............................................................................26 5.4 Recommendations .................................................................................................27 References...........................................................................................................................28 Appendices..........................................................................................................................29
  • 7. vii Table of Figures Figure 1: Background.............................................................................................................1 Figure 2: Active infrared motion detectors ..........................................................................12 Figure 3: The concept of infrared motion detector for security system ...............................13 Figure 4: Block diagram for the home Intrusion Detection System ....................................15 Figure 5: Basic principle of infrared operation ....................................................................16 Figure 6: Infrared Transmitter Circuit..................................................................................17 Figure 7: Square Wave Result on the Oscilloscope .............................................................17 Figure 8: Pins of the 3x4 keypad..........................................................................................18 Figure 9: Breadboard Connection, Character LCD and Netduino .......................................20 Figure 10: Flow chart of software for the security system...................................................23 Figure 11: System Prototype................................................................................................25 Table 1: Shows part of the code that calls the buzzer method. ...........................................21 Table 2: Showing the project components ..........................................................................31
  • 8. viii Abstract Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. There are many types of house security systems used in Uganda today; however most of them are imported from outside the country making them too expensive for the Low Income earners. This project is focusing on developing an effective house security system at low cost with an active infrared motion detector which is controlled by 32 bit Micro-controller. The overall project is divided into two parts; The first part is concern on the hardware development where all electronics component are Connected via the circuit design, an active infrared and keypad are the input components while buzzer, indicator, and LCD display are the output components controlled by controller circuit. The second part is based on software programming to operate the hardware structure. Netduino Electronics Platform is an open source electronics platform using .NET Micro Framework. It features a 32-bit microcontroller and a rich development environment. It combines 20 GPIOs with SPI, 12C, 2 USARTs, 4 PWMs, and 6 ADC channels to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminal’s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogrammed by user using their personal computer at home. As the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the Security system
  • 9. 1 Chapter One: Introduction 1.1 Background Burglary and theft form the core of most criminal activities in households, pharmaceuticals and small businesses in Uganda. Each year in Uganda, a number of cases involving burglaries are recorded. According to the Police Annual Criminal Report of 2012, over 6000 cases of burglaries were investigated as compared to 5,509 cases in 2011 hence an increase by 4.5%, also a total of 1,990 cases of House breakings were recorded in the same year. Figure 1: Background Netduino platform offered a greatly enhanced list of features required for the project. It has got Input /Output Interfaces with switches, sensors, LEDs, serial devices and combines the ease of high-level coding and the features of microcontrollers. Event-based programming, multi-threading, line-by-line debugging, breakpoints were also made very possible. Netduino also features the 32-bit microcontroller that has a high operating frequency, allows code reuse and low active power requirement making it more suitable for the project. The 3x4 Keypad of offered a simple architecture and provided the easy of interfacing large number of input keys to the microcontroller.
  • 10. 2 With the use of low costly components and easier programming language ( C#), with a framework of pre-developed components and full features, development of the proposed system was made faster and easier 1.2 Problem Definition Most of the programmeable burglar home security systems used in Uganda today are imported from outside such as Europe . This has made them relatively more expensive for the low income earners in Uganda as compared to if they were manufactured within the country leading to the increase in number of burglar cases recorded annually in the country. Our system costs about 500,000ug shs as compared to Approximately 2 millions of similar existing system on market. 1.3 General Project Objective  To develop an affordable and effective burglar home security system. 1.4 Specific Objectives  To Interface a 12 -key keypad with the 32 -bit microcontroller.  To design the infrared motion sensor circuit and connect it to the Netduino microcontroller  To combine the two units (keypad and IR sensor) into a single intrusion detection system  To carry out system testing 1.5 Justification The family is the top priority and home is probably man’s largest investment. Why then not take precaution of providing a low costly and effective security system with a friendly user interface for the residents in our country?
  • 11. 3 1.6 Project Scope This project concentrated on a development of a keypad and infrared based house security system. To develop the whole project, it was important to understand the concept and operation of a home security system. Hardware development involved the design of the active infrared circuit that was used to detect or sense motion, the Keypad unit for Access Control, the LCD and the Buzzer circuit as visual and audio output respectively. Software development involved writing programs designed to operate the hardware structure. The Netduino Micro- controller was programmed to receive events from IR detector like interrupts and triggers an appropriate signal at the output. It also follows instructions from keypad code, for activates or deactivates the system states accordingly. 1.7 Significance of the Study This security system is very practical. It is not only designed for home environment but also in a business world. There is a possibility of customizing it to suit individual need and preference. The keypad and LCD also offers a great user interface and users get easily familiarized with it at ease.
  • 12. 4 1.8 Ethical Considerations  We will confirm to the IEEE Code of Ethics based on safety, putting in mind that the disastrous parts of the design should be enclosed with a non-conducting element.  The apertures for the IR/PIR sensors are not large and pose minimal risk to users. The IR emitter poses a potential risk to the human eye if it is stared at directly, but this is only the case for large numbers of IR diodes.  We will also conform to Draft Uganda Standard (DUS), DUS ISO/IEC 18043: 2006 based on Information Technology Security Techniques and Operation of Intrusion Detection Systems. 1.9 Limitations  Lack of enough finance to fund the project addressable by use of low cost components in the market.  The Infrared sensors have a short range thus performance drops off with longer distances. They are also weather sensitive, direct sunlight, rain, fog, dust, pollution can affect transmission.  Then system will not address false alarms caused by house pets, we assume the light beams from the pets are negligible
  • 13. 5 Chapter Two: Literature Review 2.1 Introduction Burglar alarms are systems designed to detect intrusion and unauthorized entry into a building or area. They are also called security alarms, security systems, alarm systems or intrusion detection systems. Burglar alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. This chapter will discuss the literature related to the operational procedures and utilization of already existing intrusion detection systems, their strength, weaknesses and gaps. 2.2 Summary of Literature Review The literature review is arranged as follows; Section 1 was an introduction, Section 2 will describe the trend of the early burglar alarm systems up to date. Section 3 will point out the different alarm connections and monitoring. Section 4 will give a brief view of Alarm System Facts and a conclusion will be made in Section 5. 2.2.1 Trend of Burglar Alarm Systems Early alarm systems relied upon a ratchet and gear assembly to ring a bell when a window or door was opened. With the advent of electricity, alarm systems which use electrified components confined within windows and doors were developed. Modern alarm systems include some form of movement detection gargets placed within the building being protected. The design of most basic alarm systems today consists of one or more sensors to detect intruders and an alerting device to indicate the intrusion. However, a typical premise security alarm employs the following components: Premises control unit (PCU) or panel:
  • 14. 6 This is the "brain" of the system and it reads sensor inputs, tracks arm/disarm status and signals intrusions and in modern systems, this is enclosed along with a power supply. Sensors: Devices which detect intrusions. Sensors may be placed at the perimeter of the protected area, within it, or both. Sensors can detect intruders by a variety of methods, such as monitoring doors and windows for opening, or by monitoring unoccupied interiors for motions, sound, vibration, or other disturbances. Alerting devices: These indicate an alarm condition. Most commonly, these are flashing lights or bells. Alerting devices serve the dual purposes of warning occupants of intrusion, and potentially scaring off burglars. Keypads: Small devices, typically wall, used as human-machine interface to the system. In addition to buttons, keypads typically feature indicator lights. Interconnections between components: This may consist of direct wiring to the control unit or wireless links with local power supplies 2.2.2 Sensor Types Motion detectors These are mainly used in security systems and are typically positioned near exterior doorways or windows of a building to monitor the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as well as commercial organizations. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal. It consist of sensor that electrically connected to other devices such as security system, lighting, audio alarms and other applications. Motion sensors are used in a wide variety of applications and as a result, many different types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke detection. It is a device that often used in automatic light switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person
  • 15. 7 enters a monitored area. The infrared sensors have basically two forms: active and passive Infrared. An active infrared detector includes a radiation source and an infrared sensor which is sensitive to interruptions in the radiation sensed from the source. These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. The active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor. This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another advantage of these active infrared detectors. Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally uses an optical collection system and multiple sensing elements of alternating polarity to create detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change of temperature caused by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the most frequently used home security device. Passive IR motion detectors are usually designed to provide an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the breach indication to cause an alarm condition to occur.
  • 16. 8 The other motion detector used in security system is an ultrasonic motion detector. It is commonly used for automatic door openers and security alarms. It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector. It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since they are very effective in this application. In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something moves, the received signal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm. Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic beams are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blowing curtains, pets, and flying insects. While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use two infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area.
  • 17. 9 For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor. Its capability on detecting motion with a simple design at lowest cost is needed to build an effective house security system based on motion detection. 2.2.3 Security System Keypads This is a set of buttons arranged in a block or "pad" which usually bear digits, symbols and usually a complete set of alphabetical letters. If it mostly contains numbers then it can also be called a numeric keypad. Security System Keypads typically operate by using buttons and simple numeric codes to arm and disarm the system, verify that all zones are clear and operational, plus check the back-up battery status. Often, there is a panic button located on the keypad as well. Once pushed, the panic button can be programmed to contact your home monitoring service, police, fire, or EMS. For basic wired and wireless alarm systems, the control panel and the main keyboard are typically one in the same unit. The user can then buy additional keypads to enrol into the system. Because the keypad is the part of the alarm system that will be used most, the placement of it should be well thought out. If you have just one keypad it is recommended to be placed close to the most used door. One or two keypads are probably all you need for an apartment, condo, or small house. On the other hand, multiple keypads provide the greatest flexibility for those living in a bigger home or operating a business. 4x3 hexadecimal keypads The purpose of using 4x3 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system operation. The keypad provides seven interface pins, where one pin for each row and column of the keypad matrix. This 4x3 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development.
  • 18. 10 Keypad encoder (Netduino) The Netduino key encoders provide all the necessary logic to fully encode an array of 4x3 hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller system. The keypad is used as a switch to give logic configuration to the keypad encoder. While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 2.3 Alarm connection and Monitoring Depending upon the application, the alarm output may be local, remote or a combination. Local alarms do not include monitoring, though may include indoor and/or outdoor sounders (e.g. motorized bell or electronic siren) and lights which may be useful for signaling an evacuation notice for people during fire alarms or where one hopes to scare off an amateur burglar quickly. Remote alarm systems are used to connect the control unit to a predetermined monitor of some sort and they come in many different configurations. High-end systems connect to a central station or responder (e.g. Police/ Fire/ Medical) via a direct phone wire, a radio network (i.e. GPRS/GSM) or an IP path. In the case of a dual signalling system two of these options are utilized simultaneously. The alarm monitoring includes not only the sensors, but also the communication transmitter itself. Though direct phone circuits are still available in some areas from phone companies, they are becoming uncommon due to high costs of subscriptions.
  • 19. 11 Wired Versus Wireless, “Wired” simply means all components of the system are connected to each other by electrical wire, usually offering more proven reliability. “Wireless” systems rely on transmitting signals between components, much like radio signals. “Wireless” systems are growing in popularity as the technology improves. A good system costs about the same as a hardwired system. The control panel and sensors are constantly sending each other signal. The control panel is in a locked and tamper-proof area. 2.4 Advantages of Alarm Systems Though an alarm system is an excellent defense, the best defense is through reinforcement and combination of efforts of the already existing alarm systems.  The mere fact that an alarm system exists is often a sufficient deterrent to discourage a burglar even before he tries to force an entry.  Knowing you and your property are secure increases peace of mind.  Most insurance companies give a reduction on home owner’s insurance when an alarm system has been installed. 2.5 Conclusions Depending on the system, the skill required to install it ranges from your own assumptions, often the wiring of a system is not the only thing you need to know about. Sensor location can make the difference between a system that works properly and one that is a false alarm nightmare. In addition, there may be difficulty in finding someone to monitor or service the equipment. One of the recommended systems is the Sensor based detection systems. 2.6 Hypothesis It is observed that the cost and the effectiveness of alarm systems depends entirely on the type of system components used and the interactions between these components respectively for its optimal performance and operation.
  • 20. 12 Chapter Three: Methodology 3.1 Introduction This chapter examines the steps that were taken to achieve the objectives of this Project. It analyses the methods, tools and processes that were used in the design and development of system. Information on motion detection that aided the design of Infrared sensor circuit was gathered through literature review from previous chapter. Project design was based on both Hardware and Software development. Hardware development involved connections of the project components via the circuit design, an active infrared and keypad are the input components while buzzer, indicator, and LCD display are the output components controlled by controller circuit. The second part is based on software programming to operate the hardware structure. This involved the development of a software structure for the9 security system to be interfaced with the hardware development. 3.2 The concept of motion detector for security system Figure 2: Active infrared motion detectors Figure 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consisted of two housings. The first housing contained an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector.
  • 21. 13 The other housing contained an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3: The concept of infrared motion detector for security system The concept of infrared motion detector for security system .A person who enters the area interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. Aninterruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set ‘on’ or‘off’ the alarm of the security system. 3.3 Project Components Netduino Electronics Platform This is an open source software with a .NET framework development board featuring 32- bit microcontroller and got a rich development environment. The 32-bit microcontroller has a high operating frequency, allowed code reuse and got a low active power requirement which made it more suitable for use the project. Netduino platform also offered a greatly enhanced list of features required for the project. It has got Input /Output Interfaces with switches, sensors, LEDs, serial devices and it combines the ease of high-level coding. It also supports event-based programming, multi- threading, line-by-line debugging and breakpoints.
  • 22. 14 The 32 bit Micro-controller used has a high operating frequency, enabled code reuse and has got a low active power requirement. A 4x3 keypad was used because of its simple Architecture, the easy to interface and their ability to allow interface of large number of input keys to the microcontroller. 3.4 Setting up the working environment This involved installation of Microsoft Visual Studio 2010 and Netduino frame work software. The programming language used was c-sharp programming language (C#) mainly because it’s a rich framework of pre-developed components, libraries and it also had full features that made development faster and easier, usually at the cost of flexibility. 3.5 Design specification This was based on Draft Uganda Standard (DUS), DUS ISO/IEC 18043: 2006 based on Information Technology Security Techniques and Operation of Intrusion Detection Systems. The model was defined by a set of functions. These functions included: raw data sourcing, event detection analysis, data storage.
  • 23. 15 3.6 Project Models: Hardware Development Figure 4: Block diagram for the home Intrusion Detection System The hardware development was divided into three stages as shown in block diagram above. The inputs stage of the security system was the motion detector circuit, keypad. The second stage is the controller unit which was the microcontroller Netduino. The purpose of using microcontroller was to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzer. 3.6.1 Motion detector circuit In designing the infrared motion detector circuit, it was based on two basic principle of active infrared motion detector which was the infrared transmitter and infrared receiver as shown in Figure 4.
  • 24. 16 Figure 5: Basic principle of infrared operation 3.6.2 Infrared transmitter For the infrared transmitter which was also known as emitter circuit, it was on abasic design of timer 555 astable operation. The output of timer was connected to the infrared transmitter used to produce pulse using an astable timer circuit. In astable circuit operation, pulse continually generated until the power supplied through the circuit was removed. The astable circuit produced a continuous train of pulses at 38kHz frequency required. This meant that the 555 timer could operate repeatedly; it would switch ‘on’ and ‘off’ continually to generate data for the infrared transmission. To get 38KHz the circuit was first simulated using computer aided design software called multisim as shown in the diagram below.
  • 25. 17 Figure 6: Infrared Transmitter Circuit The circuit was connected as shown, Voltage input (Vcc) and Rest connected to main voltage supply VDD, threshold and trigger pins on the 555 timer was connected together via a capacitor of 0.001µF to ground. The ground of 555 timer was connected to ground and output pin connected to R2(470Ω) through the transmitter. Resistor (R1) was kept constant and Resistor(R4) was determined by varying the resistance at that point using a potentiometer. A 38KHz frequency was obtained by making R1 be 14.7KΩ and R2 11KΩ and a square wave obtained on oscillscope as shown in diagram. Figure 7: Square Wave Result on the Oscilloscope
  • 26. 18 3.6.3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high ‘1’ or low ‘0’ from the output terminal thus activate or deactivate the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector ca fully operates on detecting the infrared signal of 38 to 45 kHz. 3.6.4 Keypad Keypad is an array of switch with 2 wires connected each time a button is pressed. There is no connection between rows and columns thus the button makes it connect. They are many types of keypad from different manufactures and they may have different pin connection. The work done, involved interfacing the 7 pins, 3x4 keypad having a part number 88AB2- 143 with the Netduino framework. The keypad exists out of 4 rows and 3 columns, thus we have 4 row pins and 3 column pins In the matrix keypad (7 pins), to obtain key1, row1 and column1 are connected.), row1 matches pin1 and column1 matches pin5, thus pin 1 and 5 are connected. The same procedure for the respective columns and rows are followed to obtain the rest of the keys as shown in the figure below. Figure 8: Pins of the 3x4 keypad Using C sharp programming language in Visio studio, a new project TextMatrixKeyPad is created under program.cs, the keypad driver software imported and the following code was written in the main class.
  • 27. 19 3.6.5 Controller circuit The Netduino Micro-controller which is the central unit was programmed to receive signals from initiation devices (motion detectors and the keypad) and then it could activate an appropriate notification device (The buzzer or LED) depending on the Event. The Control Unit in addition to processing programmed instructions/reactions, it also electrically monitors system wiring and primary powe 3.6.6 Output devices These were controlled by the panel. They categorized both visual and audible devices such as LCD display, Buzzer and the LEDs. More than one device was activated at a given time. These output devices were controlled locally. 3.6.7 LCD display Liquid Crystal Displays (LCD) are a great choice of output device for displaying alphanumeric characters in real time and very useful for interactive user interface for data input. Besides, they are inexpensive, consume less power than LED displays, and give a more professional look.
  • 28. 20 Figure 9: Breadboard Connection, Character LCD and Netduino Interfacing and programming the LCD static SerialPort port = new SerialPort("COM1", 9600, Parity.None, 8, StopBits.One); This line initializes the object os serial port which takes in the above parameters, like COM1 which is a serial port on netduino for receiving inputs if(!port.IsOpen) port.Open(); This line makes the port always open to enter different data to LCD port.Write(clr, 0, clr.Length); string buff_number = keyCode.ToString(); byte[] buff = Encoding.UTF8.GetBytes(digs); port.Write(buff, 0, buff.Length); if (digs.Length == teststring.Length) { if (digs.CompareTo(teststring) == 0) { string str = "success"; port.Write(clr, 0, clr.Length); byte[] buff2 = Encoding.UTF8.GetBytes(str); port.Write(buff2, 0, buff2.Length); } //if we find out password doesn't match else { digs = "";//we clear the wrong password port.Write(clr, 0, clr.Length); } }
  • 29. 21 3.6.8 Buzzer This audio signalling device, which is electromechanically driven by an oscillating electronic circuit sounds whenever an interrupt is handled at the buzzer method due to detection of an intrusion Table 1: Shows part of the code that calls the buzzer method. 3.6.9 Indicator A LED was used to indicate the system status when a valid code was input in the course of accessing the Home premises. In an event of intrusion, the LED would blink to signify trouble.
  • 30. 22 3.7.0 Software development The software structure was developed using C sharp programming language where a set of instructions / program based on security system was assembled. The C sharp programming language takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose. A security program as shown in flow chart below were written in notepad based on 8051 instruction set before assembling process to get the binary code. This binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 8 is a basic designed for the security system operation. In this security system, the security code was set as ‘12345’ to activate and deactivate the system. When the user closed the door, the infrared sensors would automatically be activated. To deactivate the system when opening door, user must enter the deactivation code. If the deactivation code was correct, green LED will ‘on’ while alarm will go‘off’ condition. System at this time is successfully deactivated and user can open the door without alarm. If deactivation code entered was incorrect, Keypad remained locked and the system is keeps in the activate mode. The system will keep in this mode until the correct deactivation code is entered. In an event of Unauthorised entrance such as House breaking, the Alarm is triggered with the buzzer and a LED giving out an Audio and Visual output respectively.
  • 31. 23 The Alarm stays ‘on’ until a correct Reset code is entered propably by the House owner to deactivate the system. If the Reset code is correct, the system is deactivated and the buzzer goes off otherwise the alarm stays ‘on’. Figure 10: Flow chart of software for the security system
  • 32. 24 Chapter Four: Results, Key Findings and Challenges 4.1 Introduction This chapter will briefly discuss on the results and discussions of the hardware development. There were three major modules in developing the hardware structure which included the active infrared motion detector circuit, keypad module circuit, and the most important; the controller circuit. 4.2 Motion detector circuit The hardware development of the active infrared motion detector system was divided into two parts, which are the infrared emitter circuit and the infrared detector component. 4.2.1 The emitter The emitter also known as infrared transmitter circuit was built showing the final configuration of the emitter circuit as shown in Figure 6, Chapter 3. A probe or the oscilloscope was attached to the infrared LED while the adjustable resistor is varied to calibrate the emitter to transmit 38 kHz square wave. Figure 7, Chapter 3 still shows the result obtained from the oscilloscope where the frequency generated by the emitter circuit was 38.67 kHz square wave. At this generated frequency, the voltage maximum produced was 1.60V and the peak to peak voltage 1.16V. 4.3 Summary of Key Results The keypad and LCD also offer great interface and users can be familiar with our system in less than few seconds.
  • 33. 25 There are basically three elements discussed in this chapter which are; the concept of motion detector for security system, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project was very important in achieving the main objective for the whole project. Figure 11: System Prototype 4.4 Challenges  A small insignificant detector output voltage change which was hard to determine as either binary 1 or 0 by Microcontroller to initiate an appropriate trigger on the output devices. This was addressable using Operational Amplifiers and Filtering the signal using a capacitor to give us the expected results.  The system is quite vulnerable to power interruption since it highly dependent on Electricity. A Battery Backup was suggested as a future improvement to supply current for the output devices and also provides current during AC power outages
  • 34. 26 Chapter Five: Conclusion and Recommendations 5.1 General Discussion The project was successfully completed and all the objectives were achieved. This project Sought to design an Affordable and Effective Burglar Home Security System .This security home feature is expected to draw much attention in the next decades. People are getting more and more concerned about how to protect themselves and their houses from emergencies. These emergencies include both burglar intrusion and property damage. This system provides a means for being able to securely monitor a house by use of IR sensor and an access control keypad integrated with a microcontroller. The project aimed at utilizing the low costly components on market to design a system that could be Affordable to every Ugandan including Low income Earners. Our system is very practical and can be used in households, small businesses and pharmaceuticals 5.2 Added Value for Research This project was undertaken with the conviction that it will give students offering the course an opportunity to reinforce the theoretical concepts by practicing Micro-controller Programming and obtaining more knowledge on concept involving Interrupt handling, multi-threading, line-by-line debugging and breakpoints. The Project also offered a greater understanding of both Digital and Analog Electronics in the field of Amplification and Signal filtering. 5.3 Areas of future Improvements With the increasing prevalence of intelligent home automation, many aspects of a conventional home environment have undergone changes to make living more comfortable, convenient and safe.
  • 35. 27 In home safety, automated security systems play an important role of ensuring that home intrusions are thwarted and illegal trespasses are detected and tracked. For commercial purposes, we plan to incorporate a temperature sensor and smoke detectors in addition to the motion sensor intergrated in a Microcontoller and GSM unit. SMS provides an economical and convenient way to alert users of a possible intrusion into the property as most Ugandans own and have mobile phones with them most of the time. This will make the system more safe and cost effective 5.4 Recommendations We recommend the use of multiple intrusion detection technologies to achieve more comprehensive and accurate detection as sited in the Areas of Improvement. With the studies and Uganda police investigations carried out that have proven that home security systems deter crime. The Report shows a steady decrease in crime coinciding with the number of registered home security systems. These studies found that not only do home security systems benefit the individual homeowners but also the neighboring Households. We therefore urge the Ugandan Police to organize workshops that will sensitize the citizens about the benefits of a home security system such as quick response in case of an emergency and above all protection of both lives and property.
  • 36. 28 References 1. Ibrahim Geha and Kfoury Elie, “SAFE HOME© An Advanced Home Security System”, Volume 2, (2009),p p 234-239 . 2. Nadia Shaheen, “Home Automation Disaster Management System via SMS and GSM” JOURNAL Of Computing, Volume 3, Issue 7, July 2011. 3. Goldberg, Lee. Infrared Data Transmission: Electronic Design. April 17, 1995:47- 64. 4. Cremer, Mike. An Introduction to the IrDA Protocols. PDA Developers 2.6. Nov/Dec, 1994:35-39. 5. Weeder, Terry J. Remote Control Adapter. Electronics Now. August 1995:41-49, 83. 6. 8 Apr 2011 ... 2010 Human Rights Report: Uganda, the 2009 Police Annual Crime Report recorded a total of 332 mob action cases 7. 23 May 2012 curbing burglary and theft cases in the district more than 10 cases are recorded Uganda radionetwork.com/a/story. 8. Inderpreet Kaur, “Microcontroller Based Home Automation System With Security”, International 9. Journal of Advanced Computer Science and Applications (IJACSA), Vol. 1, No. 6, December 2010, 10. Shiwani Saini,C.R.Suri, “Design and Development of Microcontroller Based Auto-Flow Assembly
  • 37. 29 Appendices Name picture function Development board(Netduino) It is the development board where the sources code is deployed to it using Microsoft visual studio for interfacing project components. 3*4 Keypad It is an array of switches with 2 wires connected each time a button is pressed LCD LCD used for displaying alphanumeric characters in real time 555 timer IC The IC was used for generating accurate timing pulses. It is an 8 pin timer IC and has mainly two modes of operation: Monostable and Astable. In Monostable mode time delay of the pulses can be precisely controlled by an external resistor and a capacitor whereas in Astable mode the frequency and duty cycle are controlled by two external resistors.
  • 38. 30 Resistors Resistors are passive component which were used to control current in a circuit. Resistance was given by the ratio of voltage across resistor terminals to current. Thus a particular value of resistor, for fixed voltage, limits the current through. They were omnipresent in electronic circuits. Capacitors Are passive component used to store charge. The charge stored in a capacitor is the product of its capacitance value and voltage applied to them. Capacitors offer infinite reactance to zero frequency so they were used for blocking DC components or bypassing the AC signals. Connecting wires Used to connect different components Buzzer Sounds whenever an interrupt is handled at the buzzer method due to detection of an intrusion
  • 39. 31 Table 2: Showing the project components Motion infra red sensor Sending and receiving of infra red beams for motion detection