This document describes a student project titled "Fire Detection and Intimation System" at Dar es Salaam Institute of Technology. The student, Wambura Makongo, designed a system to detect smoke in the hostel and alert occupants in the case of a fire. The system includes a smoke detector sensor, microcontroller, buzzer, and wires. It analyzes the current lack of fire detection capabilities at the institute. The project aims to reduce fire hazards and protect hostellers by designing an automatic detection and notification system for the hostels.
The document discusses CCTV cameras and systems. It defines CCTV cameras as specialized cameras used to monitor activities within a given location. It notes their abbreviation stands for "Close Circuit Television Camera." The document outlines the benefits of CCTV cameras such as security, traffic monitoring, crime prevention and detection. It also describes the different types of CCTV systems, cameras, components, and the typical steps to a CCTV system project.
The document describes a student project to design a low-cost fire alarm system for single-family homes. The system will use an Arduino board along with sensors like a flame sensor and buzzer to detect fires at different locations in the home. When smoke or fire is detected, the system will alert residents through an alarm. The circuit diagram and requirements are provided. The conclusion states that the project aims to create a microcontroller-based fire alarm that functions similarly to systems used in commercial buildings but at an affordable price point for residential use.
Generic Access Network (GAN) allows cell phone data to be transmitted over Wi-Fi networks rather than cellular networks. A GAN Controller receives data from the internet and routes it into the phone network. GAN is commonly used to implement Wi-Fi Calling, allowing mobile phones to make calls over Wi-Fi like they would over cellular networks. GAN provides advantages for both carriers by increasing coverage cheaply, and subscribers by allowing cellular service wherever Wi-Fi is available and avoiding international roaming charges. However, subscribers need a GAN-compatible phone and calls may be disrupted during handoffs between Wi-Fi and cellular.
Smart surveillance monitoring system using raspberry pi andJEEVA ARAVINTH
This document describes a smart surveillance monitoring system using a Raspberry Pi, PIR sensor, and 3G dongle. The system aims to design and implement a mobile surveillance system to address limitations of existing CCTV systems. It uses a Raspberry Pi single board computer connected to a USB camera and PIR motion sensor. When motion is detected, the PIR sensor triggers the Raspberry Pi to capture video which is transmitted via the 3G dongle to a mobile device for remote monitoring. The system offers reliable and private home security surveillance on mobile devices.
This document summarizes several electronic fire alarm circuit designs. It describes a thermistor-based circuit that uses a thermistor as a heat sensor whose resistance decreases with increasing temperature. When the thermistor gets hot, it causes an alarm to sound. A low-cost circuit is also presented that uses a transistor as a fire sensor whose leakage current increases with temperature, triggering an alarm. An alternative low-power circuit is mentioned. Finally, a smoke detector circuit is described that uses a photo interrupter module and 555 timer chip to detect smoke and sound an alarm. The document concludes that electronic circuits can provide efficient fire detection and alarm capabilities.
This document provides information about CCTV (closed-circuit television) systems, including their basic components and purposes. It describes the key elements of a CCTV system, such as cameras, lenses, monitors, DVRs/NVRs, cables, and power supplies. It also discusses different types of CCTV systems including analog, digital/IP, and the components in a basic CCTV system diagram. Additionally, it outlines different types of CCTV cameras for indoor and outdoor use including dome, bullet, fish-eye, PTZ, network, HD, and wireless cameras.
Surveillance cameras, also known as CCTV cameras, are used to continuously monitor public or private areas for security purposes. Modern surveillance cameras transmit video signals to specific monitors. There are different types of cameras for indoor and outdoor use, including dome, bullet, and hidden cameras. CCTV systems can be wired or wireless. Surveillance cameras are commonly used to maintain security in buildings and facilities, monitor traffic and behavior, and obtain visual records for evidence. While they can deter crime, surveillance cameras have disadvantages like privacy concerns and not being able to monitor all areas at all times. The future of CCTV is moving to IP cameras that allow video to be accessed anywhere via the internet.
The document discusses CCTV cameras and systems. It defines CCTV cameras as specialized cameras used to monitor activities within a given location. It notes their abbreviation stands for "Close Circuit Television Camera." The document outlines the benefits of CCTV cameras such as security, traffic monitoring, crime prevention and detection. It also describes the different types of CCTV systems, cameras, components, and the typical steps to a CCTV system project.
The document describes a student project to design a low-cost fire alarm system for single-family homes. The system will use an Arduino board along with sensors like a flame sensor and buzzer to detect fires at different locations in the home. When smoke or fire is detected, the system will alert residents through an alarm. The circuit diagram and requirements are provided. The conclusion states that the project aims to create a microcontroller-based fire alarm that functions similarly to systems used in commercial buildings but at an affordable price point for residential use.
Generic Access Network (GAN) allows cell phone data to be transmitted over Wi-Fi networks rather than cellular networks. A GAN Controller receives data from the internet and routes it into the phone network. GAN is commonly used to implement Wi-Fi Calling, allowing mobile phones to make calls over Wi-Fi like they would over cellular networks. GAN provides advantages for both carriers by increasing coverage cheaply, and subscribers by allowing cellular service wherever Wi-Fi is available and avoiding international roaming charges. However, subscribers need a GAN-compatible phone and calls may be disrupted during handoffs between Wi-Fi and cellular.
Smart surveillance monitoring system using raspberry pi andJEEVA ARAVINTH
This document describes a smart surveillance monitoring system using a Raspberry Pi, PIR sensor, and 3G dongle. The system aims to design and implement a mobile surveillance system to address limitations of existing CCTV systems. It uses a Raspberry Pi single board computer connected to a USB camera and PIR motion sensor. When motion is detected, the PIR sensor triggers the Raspberry Pi to capture video which is transmitted via the 3G dongle to a mobile device for remote monitoring. The system offers reliable and private home security surveillance on mobile devices.
This document summarizes several electronic fire alarm circuit designs. It describes a thermistor-based circuit that uses a thermistor as a heat sensor whose resistance decreases with increasing temperature. When the thermistor gets hot, it causes an alarm to sound. A low-cost circuit is also presented that uses a transistor as a fire sensor whose leakage current increases with temperature, triggering an alarm. An alternative low-power circuit is mentioned. Finally, a smoke detector circuit is described that uses a photo interrupter module and 555 timer chip to detect smoke and sound an alarm. The document concludes that electronic circuits can provide efficient fire detection and alarm capabilities.
This document provides information about CCTV (closed-circuit television) systems, including their basic components and purposes. It describes the key elements of a CCTV system, such as cameras, lenses, monitors, DVRs/NVRs, cables, and power supplies. It also discusses different types of CCTV systems including analog, digital/IP, and the components in a basic CCTV system diagram. Additionally, it outlines different types of CCTV cameras for indoor and outdoor use including dome, bullet, fish-eye, PTZ, network, HD, and wireless cameras.
Surveillance cameras, also known as CCTV cameras, are used to continuously monitor public or private areas for security purposes. Modern surveillance cameras transmit video signals to specific monitors. There are different types of cameras for indoor and outdoor use, including dome, bullet, and hidden cameras. CCTV systems can be wired or wireless. Surveillance cameras are commonly used to maintain security in buildings and facilities, monitor traffic and behavior, and obtain visual records for evidence. While they can deter crime, surveillance cameras have disadvantages like privacy concerns and not being able to monitor all areas at all times. The future of CCTV is moving to IP cameras that allow video to be accessed anywhere via the internet.
CCTV systems use video cameras to transmit signals to specific monitors rather than broadcasting publicly. They can use point-to-point, point-to-multipoint, or mesh wireless links. CCTV is commonly used for security purposes like crime prevention, monitoring premises and restricted areas, and deterring theft. The key components of a CCTV system include cameras, a digital video recorder or network video recorder for recording footage, hard disks for storage, and cabling for video and power transmission. IP cameras connect over a network using CAT5/6 cabling while analog cameras use coaxial cables.
Seminar on night vision technology pptdeepakmarndi
ppt of night vission technology. this is made under the guidance of teacher. withe this report also given in theis side. main things report is given according to the ppt...........
Closed Circuit Television(CCTV) is the use of video cameras to transmit a signal to a specific place on a limited set of monitors.
CCTV comprises of camera, wires, monitoring screen, recorder.
It may employ point to point, point to multipoint or wireless links.
This document provides an overview of CCTV (closed-circuit television) systems, including their components and purposes. CCTV systems use video cameras to transmit signals to specific monitors for security and surveillance. They can help reduce costs and crime while encouraging good behavior. The key elements of a CCTV system are cameras, lenses, monitors, a DVR or NVR for recording, cables to connect components, and storage devices to save footage. CCTV systems can be analog, using coaxial cables, or digital/IP based, using Ethernet cables. They have various applications like monitoring bars, cash rooms, hospitals, public spaces, and detecting theft or vandalism.
The safety in the house is very important.This project presents a prototype smart door lock which can be used to enhance security of a door which is a smart door lock.Here we can utilize Bluetooth technology to scan Bluetooth Devices at the door knob for automatic door lock purposes.
The document discusses the evolution and capabilities of modern security systems. It notes that early security systems were basic and difficult to install, but that technology has made systems smarter, more reliable and put more control in the hands of homeowners. Modern systems can detect intrusions and dangers, alert homeowners and emergency services, and be controlled remotely through internet or cell phone. The document outlines some common electronic security devices like surveillance cameras, fire alarms, intruder alarms, and electronic locks. It provides details on how these systems work and have advanced with technology.
This document provides an overview of CCTV (closed-circuit television) systems, including:
- CCTV architecture which involves cameras transmitting signals to monitors through either wired or wireless connections.
- Digital CCTV uses video compression and network transmission over Ethernet, allowing for remote access and storage.
- IP cameras transmit video over internet protocols, increasing flexibility but requiring a private network for security.
- CCTV is used widely in industrial facilities, public spaces, businesses and homes for surveillance purposes. Applications discussed include toll gates, apartments, factories, airports and military installations.
The document proposes a pothole detection system using a Raspberry Pi camera to capture images of the road surface and detect potholes in real-time. When a pothole is detected, the system will alert the driver and notify municipal authorities, providing the location and dimensions of the pothole. This aims to help drivers avoid potholes and reduce accidents, while helping municipalities address infrastructure issues more quickly. The proposed system uses inexpensive, accessible hardware and computer vision algorithms to achieve this goal in a low-cost manner.
Fire Alarm, Smoke Detector and Automatic Sprinkle SystemKhairul Azhar
This document describes a fire alarm and smoke detector system designed using digital logic. The system uses inputs from an emergency switch, smoke detector, and main switch. It outputs a fire alarm and activates an automatic sprinkler system. The logic design includes OR gates, AND gates, a JK flip flop timer set to 3 seconds, a 1Hz clock, 7 segment displays, and inverters. When the smoke detector or emergency switch is activated, the alarm will sound for 3 seconds before automatically shutting off the sprinkler and alarm. The group's responsibilities for the project are also outlined.
CCTV systems use video cameras to transmit signals to specific monitors rather than broadcasting publicly. There are several reasons to use CCTV systems, including crime prevention and monitoring public/high security areas. CCTV can reduce crime in covered areas by over 95% according to some statistics. Properly installed CCTV systems can dramatically reduce crime levels by as much as 90%. While initial costs were previously high, CCTV equipment costs have decreased and provide effective security for small to medium businesses.
This document discusses smart door lock systems. It provides information on how smart locks work using wireless protocols and cryptographic keys to send signals from a device to lock and unlock doors. It also discusses the main functionality of smart locks using Bluetooth and WiFi to open and close doors remotely. Additionally, it covers smart lock access control systems which use a lock controller, smartphone, and cloud to authorize access and command locks to open. It also addresses common smart lock problems such as not locking/unlocking, lights/sounds not working, and accelerometers malfunctioning, and provides potential solutions.
CCTV camera systems use cameras to transmit video, images, and audio data to a monitoring hub for live or recorded viewing. There are many types of CCTV cameras for security purposes, including indoor, outdoor, infrared, dome, bullet, vandal-proof, hidden, and pan-tilt-zoom cameras. CCTV systems can be wired, connecting cameras to recording devices via cables, or wireless, using radio transmitters and receivers. CCTV is commonly used for maintaining perimeter security, medical observation, traffic monitoring, building security, and hazardous environment oversight. The future of CCTV is moving to IP systems that allow video access and storage via the internet from anywhere.
Abbreviation
• What is CCTV
• Elements of CCTV system
• CCTV Camera Types
• DVR/NVR Back Side ports
• Cable
• BNC/DC Connectors/Pins
• Cable Connectors
• Used To Monitor Cable
• CCTV System's Block Diagram
• Wiring
• NVR Back Side Ports
• Connecting Method of PTZ Camera & IP Camera
• Digital transmission
• Configure IP Camera Network
This presentation is about Internet of Things(IoT), it's characteristics, technologies that uses IoT, Security issues, Threats & Countermeasures, applications of IoT etc.
The document provides information about Mihika Shah's roll number and then discusses the history and types of surveillance systems including analog CCTV cameras, IP cameras, and their components and architecture. It describes the advantages and disadvantages of analog versus IP cameras. It also discusses how to configure an IP camera and provides examples of video surveillance applications in farms.
The document discusses the history and technology of 3D television. It begins with the basics of how 3D TV provides separate images to each eye to create depth perception. It then explains several technologies currently used for 3D TV displays like anaglyph, polarization, and parallax barriers. Potential applications of 3D TV include medicine, education, entertainment and gaming. However, health issues and the need for glasses are disadvantages that need further research.
This document provides an introduction to the Internet of Things (IoT). It begins by outlining upcoming sessions on IoT topics like web architecture, security, and applications. Real-world examples of IoT are then presented, including a smart toothbrush and solutions for improving water access. Key enablers of IoT like cheap sensors and bandwidth are discussed. IoT is defined and distinguished from the internet, noting IoT connects physical objects through sensors. Challenges like addressing billions of devices are addressed through technologies like IPv6. Finally, opportunities from IoT like new industries and the need for basic programming skills are covered.
CCTV systems use video cameras to transmit signals to a limited set of monitors for security purposes rather than broadcasting publicly. Modern CCTV cameras employ closed-circuit television technology. The first CCTV security system was installed in 1942 in Germany, while digital and wireless CCTV cameras were later developments. CCTV cameras can be indoor, outdoor, hidden, dome-shaped, or have pan-tilt-zoom functions. Systems are either wired using coaxial cables or wireless using radio transmitters. CCTV provides security benefits but also raises privacy concerns.
This document summarizes the key components of a residential security system. It discusses lighting, fire security features like smoke detectors and fire doors, and electronic security systems including alarms, CCTV cameras, and intercom systems. The document also outlines different types of door locks and fire extinguishing arrangements to secure the home and address potential fire hazards. In conclusion, it notes that security systems are commonly used in places like hospitals, banks, and ATMs to deter intruders and promote safety.
The document discusses using Internet of Things (IoT) technology to address challenges facing modern cities. It notes that rapid urbanization, economic pressures, and environmental sustainability concerns are stressing city infrastructure and quality of life. The document then outlines how independent infrastructure investments by different city departments result in wasted resources and a lack of shared intelligence. It proposes that an integrated IoT platform allowing data sharing across departments could help optimize city management and operations.
This document describes a master's thesis project carried out at Ericsson's site in Linköping, Sweden. The purpose of the project was to construct a model to capture and present the utilization rate of test equipment at a telecommunications company. The authors studied models from the production industry and proposed a common utilization tool that could store, configure and present utilization data from all types of equipment in Ericsson's test environment. As part of the project, the authors implemented a measurement module to sample the state of Base Station Controllers in Ericsson's test environment and validated it against real data.
Any form of education in an engineering or science discipline is incomplete without a means of testing and appreciating theories learned in class. The ability to carry out experimentation demonstrating theories through laboratory work is an integral part of an engineering, science and technology education. In laboratories, students can learn how to process real data, understand and appreciate discrepancies between their observations and the predictions according to theories. Not only do students appreciate those discrepancies, they learn how to make compromises to minimize the imperfections of their observations. This is a valuable skill for an engineer to have as engineers are problem solvers.
CCTV systems use video cameras to transmit signals to specific monitors rather than broadcasting publicly. They can use point-to-point, point-to-multipoint, or mesh wireless links. CCTV is commonly used for security purposes like crime prevention, monitoring premises and restricted areas, and deterring theft. The key components of a CCTV system include cameras, a digital video recorder or network video recorder for recording footage, hard disks for storage, and cabling for video and power transmission. IP cameras connect over a network using CAT5/6 cabling while analog cameras use coaxial cables.
Seminar on night vision technology pptdeepakmarndi
ppt of night vission technology. this is made under the guidance of teacher. withe this report also given in theis side. main things report is given according to the ppt...........
Closed Circuit Television(CCTV) is the use of video cameras to transmit a signal to a specific place on a limited set of monitors.
CCTV comprises of camera, wires, monitoring screen, recorder.
It may employ point to point, point to multipoint or wireless links.
This document provides an overview of CCTV (closed-circuit television) systems, including their components and purposes. CCTV systems use video cameras to transmit signals to specific monitors for security and surveillance. They can help reduce costs and crime while encouraging good behavior. The key elements of a CCTV system are cameras, lenses, monitors, a DVR or NVR for recording, cables to connect components, and storage devices to save footage. CCTV systems can be analog, using coaxial cables, or digital/IP based, using Ethernet cables. They have various applications like monitoring bars, cash rooms, hospitals, public spaces, and detecting theft or vandalism.
The safety in the house is very important.This project presents a prototype smart door lock which can be used to enhance security of a door which is a smart door lock.Here we can utilize Bluetooth technology to scan Bluetooth Devices at the door knob for automatic door lock purposes.
The document discusses the evolution and capabilities of modern security systems. It notes that early security systems were basic and difficult to install, but that technology has made systems smarter, more reliable and put more control in the hands of homeowners. Modern systems can detect intrusions and dangers, alert homeowners and emergency services, and be controlled remotely through internet or cell phone. The document outlines some common electronic security devices like surveillance cameras, fire alarms, intruder alarms, and electronic locks. It provides details on how these systems work and have advanced with technology.
This document provides an overview of CCTV (closed-circuit television) systems, including:
- CCTV architecture which involves cameras transmitting signals to monitors through either wired or wireless connections.
- Digital CCTV uses video compression and network transmission over Ethernet, allowing for remote access and storage.
- IP cameras transmit video over internet protocols, increasing flexibility but requiring a private network for security.
- CCTV is used widely in industrial facilities, public spaces, businesses and homes for surveillance purposes. Applications discussed include toll gates, apartments, factories, airports and military installations.
The document proposes a pothole detection system using a Raspberry Pi camera to capture images of the road surface and detect potholes in real-time. When a pothole is detected, the system will alert the driver and notify municipal authorities, providing the location and dimensions of the pothole. This aims to help drivers avoid potholes and reduce accidents, while helping municipalities address infrastructure issues more quickly. The proposed system uses inexpensive, accessible hardware and computer vision algorithms to achieve this goal in a low-cost manner.
Fire Alarm, Smoke Detector and Automatic Sprinkle SystemKhairul Azhar
This document describes a fire alarm and smoke detector system designed using digital logic. The system uses inputs from an emergency switch, smoke detector, and main switch. It outputs a fire alarm and activates an automatic sprinkler system. The logic design includes OR gates, AND gates, a JK flip flop timer set to 3 seconds, a 1Hz clock, 7 segment displays, and inverters. When the smoke detector or emergency switch is activated, the alarm will sound for 3 seconds before automatically shutting off the sprinkler and alarm. The group's responsibilities for the project are also outlined.
CCTV systems use video cameras to transmit signals to specific monitors rather than broadcasting publicly. There are several reasons to use CCTV systems, including crime prevention and monitoring public/high security areas. CCTV can reduce crime in covered areas by over 95% according to some statistics. Properly installed CCTV systems can dramatically reduce crime levels by as much as 90%. While initial costs were previously high, CCTV equipment costs have decreased and provide effective security for small to medium businesses.
This document discusses smart door lock systems. It provides information on how smart locks work using wireless protocols and cryptographic keys to send signals from a device to lock and unlock doors. It also discusses the main functionality of smart locks using Bluetooth and WiFi to open and close doors remotely. Additionally, it covers smart lock access control systems which use a lock controller, smartphone, and cloud to authorize access and command locks to open. It also addresses common smart lock problems such as not locking/unlocking, lights/sounds not working, and accelerometers malfunctioning, and provides potential solutions.
CCTV camera systems use cameras to transmit video, images, and audio data to a monitoring hub for live or recorded viewing. There are many types of CCTV cameras for security purposes, including indoor, outdoor, infrared, dome, bullet, vandal-proof, hidden, and pan-tilt-zoom cameras. CCTV systems can be wired, connecting cameras to recording devices via cables, or wireless, using radio transmitters and receivers. CCTV is commonly used for maintaining perimeter security, medical observation, traffic monitoring, building security, and hazardous environment oversight. The future of CCTV is moving to IP systems that allow video access and storage via the internet from anywhere.
Abbreviation
• What is CCTV
• Elements of CCTV system
• CCTV Camera Types
• DVR/NVR Back Side ports
• Cable
• BNC/DC Connectors/Pins
• Cable Connectors
• Used To Monitor Cable
• CCTV System's Block Diagram
• Wiring
• NVR Back Side Ports
• Connecting Method of PTZ Camera & IP Camera
• Digital transmission
• Configure IP Camera Network
This presentation is about Internet of Things(IoT), it's characteristics, technologies that uses IoT, Security issues, Threats & Countermeasures, applications of IoT etc.
The document provides information about Mihika Shah's roll number and then discusses the history and types of surveillance systems including analog CCTV cameras, IP cameras, and their components and architecture. It describes the advantages and disadvantages of analog versus IP cameras. It also discusses how to configure an IP camera and provides examples of video surveillance applications in farms.
The document discusses the history and technology of 3D television. It begins with the basics of how 3D TV provides separate images to each eye to create depth perception. It then explains several technologies currently used for 3D TV displays like anaglyph, polarization, and parallax barriers. Potential applications of 3D TV include medicine, education, entertainment and gaming. However, health issues and the need for glasses are disadvantages that need further research.
This document provides an introduction to the Internet of Things (IoT). It begins by outlining upcoming sessions on IoT topics like web architecture, security, and applications. Real-world examples of IoT are then presented, including a smart toothbrush and solutions for improving water access. Key enablers of IoT like cheap sensors and bandwidth are discussed. IoT is defined and distinguished from the internet, noting IoT connects physical objects through sensors. Challenges like addressing billions of devices are addressed through technologies like IPv6. Finally, opportunities from IoT like new industries and the need for basic programming skills are covered.
CCTV systems use video cameras to transmit signals to a limited set of monitors for security purposes rather than broadcasting publicly. Modern CCTV cameras employ closed-circuit television technology. The first CCTV security system was installed in 1942 in Germany, while digital and wireless CCTV cameras were later developments. CCTV cameras can be indoor, outdoor, hidden, dome-shaped, or have pan-tilt-zoom functions. Systems are either wired using coaxial cables or wireless using radio transmitters. CCTV provides security benefits but also raises privacy concerns.
This document summarizes the key components of a residential security system. It discusses lighting, fire security features like smoke detectors and fire doors, and electronic security systems including alarms, CCTV cameras, and intercom systems. The document also outlines different types of door locks and fire extinguishing arrangements to secure the home and address potential fire hazards. In conclusion, it notes that security systems are commonly used in places like hospitals, banks, and ATMs to deter intruders and promote safety.
The document discusses using Internet of Things (IoT) technology to address challenges facing modern cities. It notes that rapid urbanization, economic pressures, and environmental sustainability concerns are stressing city infrastructure and quality of life. The document then outlines how independent infrastructure investments by different city departments result in wasted resources and a lack of shared intelligence. It proposes that an integrated IoT platform allowing data sharing across departments could help optimize city management and operations.
This document describes a master's thesis project carried out at Ericsson's site in Linköping, Sweden. The purpose of the project was to construct a model to capture and present the utilization rate of test equipment at a telecommunications company. The authors studied models from the production industry and proposed a common utilization tool that could store, configure and present utilization data from all types of equipment in Ericsson's test environment. As part of the project, the authors implemented a measurement module to sample the state of Base Station Controllers in Ericsson's test environment and validated it against real data.
Any form of education in an engineering or science discipline is incomplete without a means of testing and appreciating theories learned in class. The ability to carry out experimentation demonstrating theories through laboratory work is an integral part of an engineering, science and technology education. In laboratories, students can learn how to process real data, understand and appreciate discrepancies between their observations and the predictions according to theories. Not only do students appreciate those discrepancies, they learn how to make compromises to minimize the imperfections of their observations. This is a valuable skill for an engineer to have as engineers are problem solvers.
This document summarizes a dissertation report on designing and implementing a SCADA system using wireless sensors to control fire effects in a refinery. The report acknowledges those who helped with the project and states the research aims to understand how to design interactive systems that are useful and save lives. It then discusses requirements for the hardware and software, technical issues considered, and designing the network topology.
This document provides a summary of a student's seminar paper on resource scheduling algorithms. The paper discusses the need for resource scheduling algorithms in cloud computing environments. It then describes several types of algorithms commonly used for resource scheduling, including genetic algorithms, bee algorithms, ant colony algorithms, workflow algorithms, and load balancing algorithms. For each algorithm type, it provides a brief introduction, overview of the basic steps or concepts, and some examples of applications where the algorithm has been used. The paper was submitted by a student named Shilpa Damor to fulfill requirements for a degree in information technology.
Digital distancerelaymodelingandtestingusinglabvie wandmatlabsimulinksalam_a
The key inputs signals to the distance relay are the voltage and current signals from the transmission line. The relay uses different combinations of voltage and current signals depending on the type of fault, in order to measure the positive sequence impedance to the fault.
1.5 Distance protection comparators
Distance protection uses two comparators:
- Phase comparator
- Magnitude comparator
1.5.1 Phase comparator
The phase comparator compares the phase angle between the voltage and current signals. It checks if the current lags the voltage, which indicates a forward fault. If the current leads the voltage, it indicates a reverse fault.
1.5.2 Magnitude comparator
The magnitude comparator compares the magnitude of the measured imped
Smart Speaker as Studying Assistant by Joao ParganaHendrik Drachsler
The thesis by Joao Pargana followed two main goals, first, a smart speaker application was created to support learners in informal learning processes through a question/answer application. Second, the impact of the application was tested amongst various users by analyzing how adoption and
transition to newer learning procedures can occur.
This document provides an introduction to modelling communication systems using TIMS (Telecommunications Instructional Modelling System). It discusses key concepts like modulation, messages, bandwidths and spectra, measurement instruments, and modelling techniques. The document is an instruction manual for a system that allows students to build hardware models of communication system block diagrams and observe waveforms on an oscilloscope. It aims to support courses in telecommunications at various levels.
The Green Evolution of EMOTIVE Cloud EMOTIVE Cloud: The BSC’s IaaS open-sourc...Alex Vaqué
Alexandre Vaqué Brull.
Master in Computer Architecture, Network and Systems.
Universitat Politècnica de Catalunya.
Advisors: Jordi Torres and Jordi Guitart.
September 2011
An Analysis of Component-based Software Development -Maximize the reuse of ex...Mohammad Salah uddin
This document provides an analysis of component-based software development by Mohammad Salah Uddin for his Master's degree. It includes an introduction outlining the aims and objectives of analyzing CBSE and maximizing reuse of existing software. It then discusses key aspects of components such as definitions, characteristics, relationships to objects, differences from traditional software engineering, benefits of CBSE, and importance of reusability. The document also examines component technologies, frameworks, and a case study using the Avalon framework.
This is a part of the report I created during performance evaluation of Desktop Support operations, I undertook this project during my summer internship. this is an on-going project where currently I am working on the implementation of the recommendations I made. A brief description of this project is provided under "Summer Internship" Experience.
Internship project - Disability compensation using new technologiesWassimELBOURI1
The present work, done within Ericsson France as a graduation project, is in the purpose of obtaining my Resarch Master diploma in "Advanced Wireless Communications Systems" from CentraleSupelec and my Engineering diploma in Telecommunications from the High School of Communications of Tunis.
The aim of this work is to afford a global solution, based on new technologies, for autistic persons to help them have a normal life.
- The document proposes analytical models to estimate electromagnetic field (EMF) emissions from Wi-Fi and powerline communication (PLC) links in a home network.
- It develops a model for Wi-Fi EMF emissions based on assumptions about the transmission system, propagation environment, and a path loss model. This is used to define a "radiant exposure" (RE) routing metric that estimates the expected radiated energy within a radiation-sensitive area from transmitting along a path.
- The RE metric incorporates the effects of distance between the radiating sources and sensitive area, as well as the asymmetry of radiated energy regarding the direction of each link. It is designed to fit within shortest path routing algorithms to find minimum
This document outlines the details of the WT5912 Technology Education & Workshop Practice 2 module at the University of Limerick. It includes information on the module aims and objectives, resources, labs, lab requirements, and health and safety policies. The module focuses on preparing students to teach construction subjects at secondary level through both theoretical and practical learning activities. Labs will take place in the wood processing machine lab and involve extensive safety training and practice on equipment such as planers, thicknessers, and rip saws. Strict attendance policies, personal protective equipment requirements, and cleaning responsibilities are in place for the labs.
This document is a diploma thesis submitted to the University of Bonn titled "Interaction Techniques for Immersive Seismic Interpretation". It was written by Delger Lhamsuren under the supervision of Prof. Dr. Reinhard Klein and Dipl.-Inform. Stefan Rilling. The thesis explores applying stereoscopic 3D and specialized interaction techniques using multiple input devices to improve the process of seismic interpretation, specifically for identifying faults. It presents the background on geothermal energy exploration and seismic interpretation, reviews existing seismic interpretation software, discusses the state of the art in 3D interaction techniques, and proposes new interaction techniques to be evaluated in a user study.
CloudAnalyst: A CloudSim-based Tool for Modelling and Analysis of Large Scale...ambitlick
This document describes CloudAnalyst, a tool for simulating large-scale cloud computing environments. CloudAnalyst is built on CloudSim, a framework for modeling and simulating cloud infrastructures. The tool aims to provide an easy to use graphical interface for configuring and running simulations of internet applications deployed in cloud environments. It measures key metrics like response time and data center usage. The document outlines CloudAnalyst's design, which leverages CloudSim while introducing extensions. It also provides instructions for using the tool and demonstrates simulating a social networking application across multiple data centers under different configurations.
Copy of jimma university institute of engineering and technologyDeginet Yossef
This document describes a term project submitted by five students from the Biomedical Engineering department at Jimma University in Ethiopia on maintenance methodology for a steam autoclave. The project was submitted on June 2nd, 2012 and includes an abstract, acknowledgements, table of contents, and 5 chapters that discuss the operational principles, installation, maintenance, and troubleshooting of steam autoclaves. The objectives of the project are to help students understand maintenance procedures for medical equipment like steam autoclaves.
This thesis examines machine learning approaches using Hadoop in the cloud. It implements a distributed machine learning infrastructure in the cloud without dependence on distributed file systems or shared memory. This infrastructure learns and configures a distributed network of learners. The results are then filtered, fused and visualized. The thesis also develops a machine learning infrastructure using Python and compares the two approaches. It uses real-world immigration and GDP datasets from a government database to test the frameworks. The cloud-based approach is able to scale to petabytes of data with minimal configuration.
1. DAR ES SALAAM INSTITUTE OF TECHNOLOGY
NAME OF THE COURSE COMPUTER
ORDINARY DIPLOMA IN COMPUTER ENGINEERING
Project title: Fire Detection and Intimation System.
Project type: Problem solving.
Name of Candidate: Wambura Makongo
Supervisor : Mr. Mwasaga
Academic year: 2010/2011
Admission Number: 0802015154
Call/contact Me: (+255) 782 874 492 , jopendecember2011@gmail.com , www.ngomako.tk
February, 2011
3. i
DECLERATION
I am, Wambura Makongo a student in Computer Studies Department, with
Registration number 0802015154 hereby declaring that all the work described in this report is my own work.
Whenever I have used information from other sources, I have given the relevant reference of the source materials so that it can be clearly distinguished what is my own work and what have been quoted from other sources.
………………………………… ………………………………
Supervisor’s name…Mr. Mwasaga Student name Wambura Makongo
4. ii
ACKNOWLEGEMENT
Firstly, I would like to thank my God for his marvelous grace to the accomplishment of my project.
My special thanks to the Estate manager who allowed me to undertake my project in her estate. My special thanks to my mother, Esther Rhobi, my young brother Mr. J.Werema and Mr Lucas Msimbete for their assistance in all stationary costs
I would like to acknowledge my project supervisor Mr. Moses Mwasaga whom has been advising and instructing me on how to go towards the achievement of my project.
My special thanks to Mr. Simbeye who has been my lecture in this field of Automation
Lastly I must express my special thanks to Mr. Fimbombaya and my colleague students for their encouragements to achievement of my project.
5. iii
ABSTRACT
This report describes designing and implementing Fire detection and intimation system for Dar es salaam Institute Of Technology (DIT) hostel which located in the main campus-Ilala District Dar es Salaam .
The Institute hostel use Fire extinguishers in each hostel but these extinguishers are not totally working. So in case of fire outbreak, the Institute has no any system for fire detection which can detect smoke before it outbreak.
Also all workshops, laboratories, offices, classes and Library lacking fire detection systems .
Thus, by designing a Fire detection and intimation system which detects smoke in case of fire outbreak in the hostel will encourage or be a starting point for the Institute to implement in the places mentioned above.
6. iv
TABLE OF CONTENTS
DECLERATION ............................................................................................................................ i
ACKNOWLEGEMENT............................................................................................................... ii
ABSTRACT .................................................................................................................................. iii
CHAPTER ONE ............................................................................................................................1
1.1 Introduction ............................................................................................................................. 1
1.2 Problem Statement ................................................................................................................. 2
1.3 Objectives Of The Project ....................................................................................................... 2
1.3.1 Main Objectives ................................................................................................................................ 2
1.3.2 Specific Objectives .......................................................................................................................... 2
1.4 Significance Of The Project ................................................................................................... 2
CHAPTER TWO ...........................................................................................................................3
2.0 Literature Reviews .................................................................................................................... 3
2.1 Introduction ............................................................................................................................. 3
2.2 Current System..................................................................................................................... 3
2.2.1 Disadvantages Of Current System ..................................................................................................... 3
The Proposed Systemt .................................................................................................................6
3.0 Methodology ........................................................................................................................... 7
3.1 Data Collection ...................................................................................................................... 8
3.1.1 Observation ....................................................................................................................................... 8
3.1.2 Oral Interviews . ................................................................................................................................. 8
3.1.3 Consultant Experts ........................................................................................................................... 8
3.1.4 Internet Surfing ................................................................................................................................ 8
4.0 CHAPTER FOUR ..................................................................................................................11
4.1 Tools To Used ......................................................................................................................... 12
CHAPTER FIVE……………………............………..………………………………………...12
5.1 Data Analysis………………………………………………………………………….. .........12
5.1.1 Components Values ............................................................................................................ 12
5.2 Circuit Operation ...................................................................................................................18
CHAPTER SIX………………………………………………………………………..……......20
6.1 Conclusion .............................................................................................................................. 20
6.2 Recommendation .................................................................................................................... 20
Refference ......................................................................................................................................21
Appendex .......................................................................................................................................22
7. v
LIST OF TABLES
Table 1: Questionnaire………………...……………………………………………………...…10
Table 2: Cost Estimates……………………………………………………………..…………...19
LIST OF FIGURES
Figure3 Block Diagram .................................................................................................................10
Figure 6 Circuit Diagram ..............................................................................................................17
Figure 4 Flow Chart For Proposed System .................................................................................. 15
Figure 5 Ladder Logic Diagram For The Proposed System ........................................................ 16
Figure 1 Data Flow Diagram (Dfd) Level 0 ................................................................................................ 4
Figure 2 Data Flow Diagram (Dfd) Level 1…………………….……………….……….............5
LIST OF SYMBOLS
Tools and Symbols..................................................................................................................…...12
8. CHAPTER ONE
INTRODUCTION
DIT hostels are located near the Morogoro and Bibititi road junction . The DIT hostel facilitates the accommodation services. The hostel has high number of students who are living within the campus but it hasn’t fire detector which can detect smoke and giving alert in case fire outbreak.
The institute provides the engineering courses in the level of ordinary, bachelor and other courses such as certificate in Information Technology (IT).
1
9. 2
1.2 PROBLEM STATEMENT
Many Hostels are becoming in fire trouble/hazards where the hostellers can loose their belongings/properties and lives. To reduce that problem the system for fire detection and alert in case fire outbreak should be designed and implemented
1.3 OBJECTIVES OF THE PROJECT
1.3.1 MAIN OBJECTIVES
To design and implement an automatic fire detection and intimate system for DIT hostels.
1.3.2 SPECIFIC OBJECTIVES
To design the circuit for detecting smoke.
To design a subsystem to intimate incase smoke is detected
The above mentioned objectives will be met by consulting the difference experts especially in designing and implementing the circuit.
1.4 SIGNIFICANCE OF THE PROJECT
The project reduces fire hazards: After designing and implementing the circuit for fire detection and alert in case smoke detected will be the way of reducing fire hazard in DIT hostels
To protect hostellers from injury or death caused by fire.
In case of fire outbreak ,the system alerts hostellers and collectively to extinguish
10. 3
CHAPTER TWO
2.0 LITERATURE REVIEWS
2.1 INTRODUCTION
Fire detector system is the system or circuit which implemented in the houses or hostels to detect smoke in case of fire outbreak Controls, J. (2006). These systems are designed to detect smoke of different densities Thomas, C. (2007), through that technology the cigarette (smoking) smoke is where violated from the electricity smoke.
2.2 CURRENT SYSTEM
The current system has no fire detection in case of fire outbreak. It has the old fire extinguishers which located in each floor but are not working and students are not educated how to use them
2.2.1 DISADVANTAGES OF CURRENT SYSTEM
It is not easy to help and cure hostellers because no one educated to use them in case of fire outbreak.
It needs the hostellers to have enough education of using the available resource
The system can’t intimate incase hostellers are far
11. 4
Data flow Diagram of the current system
Figure 1
12. 5
Data flow Diagram of the current system (level 1)
Figure 2
13. 6
THE PROPOSED SYSTEMT
The proposed system will include the subsystem that detects smoke and alerts automatically in case smoke detected. Through that, the proposed system will give the high opportunity of taking action (to extinguish) when fire outbreak, the system will include smoke detector sensor, microcontroller, buzzer/bell and wires to the main objectives
14. 7
CHAPTER THREE
3.0 METHODOLOGY
This project is being done under prototyping-based methodology. In his prototyping –based methodology, the analysis, design, and implementation phases are performed concurrently and all these three phases are performed repeatedly until the system is completed.
The first prototype (the first part of the system the user will use) is shown to the users and project sponsors who provide comments. These comments are used to re-analyze, re-design and re- implement the second prototype that provides few new features.
This process occurs until the analyst, user, and sponsor agree that it provides enough functionality to be installed and used in the required area.
This prototyping-based methodology has one of the great advantage in which it allows user to interact with the system even if it is not ready for wide-spread organizational use.
This methodology includes the following methods:-
15. 8
3.1, DATA COLLECTION
The method of gathering information about the existing system has been done by oral interview, observation and questionnaires as the following sample of questions shown in the table below;
3.1.1 OBSERVATION I will around within the DIT hostel to observe about the current system.
3.1.2 ORAL INTERVIEWS This done by asking questions face by face to get the real data.
3.1.3 CONSULTANT EXPERTS The consultation of experts will be also used in designation and implementation of the circuit for fire detection.
3.1.4 INTERNET SURFING Also the internet surfing will be used to read more references concerning fire detection and alert systems.
16. 9
3.2 Table 1: Questionnaires
NUMBER
QUESTION
ANSWER
1.
How many hostels do you have at main campus?
Four(4) hostels
2.
Do you have fire detectors in your hostels?
no
3.
Do you need fire detectors in the hostel?
yes
4.
Where (other than in the hostels) do you want fire detectors to be implemented?
In all workshops and laboratories
5.
How your current system is in case of fire outbreak?
We have old fire extinguishers but are not working.
18. 11
4.0 CHAPTER FOUR
4.1 TOOLS TO USED AND THEIR SYMBOLS
Tools to be used to accomplish the specific objectives of the project are;
S/N NAME SYMBOLS
i. Smoke detector sensor
27.0 VOUT
3
U1
MCP9700
ii. Cable (wire)
iii. Switch/start button.
iv. Buzzer/bell
BUZ1
BUZZER
v. Comparator
3
2
1
4 8
U1:A
LM193
vi. Transistors(NPN) 2N2222
vii. Five resistors
R1
1k
viii. Relay
RL1
G2R-14-DC5
ix. Light Emitting Diode (LED)-Green
D1
x. One Red lamp
L1
12V
19. 12
CHAPTER FIVE
5.1 DATA ANALYSIS
There are five blocks/dormitories in the DIT main campus
Block/dormitory I has 30 rooms and 6 bath/toilet rooms =36smoke detectors
Block/dormitory II has 12 rooms and 4 bath/toilet rooms =16smoke detectors
Block/dormitory III has 30 rooms and 6 bath/toilet rooms =36 smoke detectors
Block/dormitory IV has144rooms,4 bathrooms and 4 toilet rooms =152 smoke detectors.
Block V has 144 rooms,4 bathrooms and 4 toilet rooms =152 smoke detectors.
Each room in blocks I, II, III, (IV) and (V) should need one smoke detector and one system in each bath/ toilet room for all blocks (I-V).
From the proposed system, the following specifications of devices will be applied to achieve/meet the specific objective.
5.1.1 COMPONENTS VALUES
Voltage (source) to the circuit (Vcc) =15V
Relay current (Ic) = 12v =0.05A
240ohm
Ic max= 15 =0.0625A
240ohm
For h fe =100
IB= IC/100 ; 0.05/100=0.5mA
For VR2
VR2= ( R2) X VCC ; ( 40) X15V= 8.22V
( R2+R1) ( 40+33)
Base resistance (Rb) ; VR2=IBRb + VBE
RB= VR2-VBE ; 8.22-0.7 =15.04K
IB 0.5m
R1 and R2 are parallel;
RT=RB = (R1XR2 ) ……………………………………………………………..(i)
(R1+R2)
But RB = 15.04k ; Then , VR2= ( R2 ) X VCC (15V).
(R1+R2)
From the above ; R1= 0.82R2……………………………………………(ii)
Substitute (ii) into (i)
20. 13
RB = (R1XR2 ) ; 15.04k= 0.82 x (R1)2 ; R1= 33.38K
(R1+R2 ) (1.82 R1 )
Again from (ii); R2= (33.38k) = 40.24k
( 0.82 )
FOR Q1 h fe =100 and vcc = 15v, Then VC= VA (voltage at Anode) and when Q1
not conducting Vcc=Vc=15v ,then R4=R5=15ohms
When there is conduction in Q1, Vc=7.5v=VCE
Ic1 max=15v/33 = 0.45mA
Power departed
Power (p) =VCE x IC ; 7.5v x 0.45m= 3.14X103W
IC = VCC-VCB = 0.23 X 103A
33X103
R6 = ( 15V - 0.7V) = 28.6k
( 1.05m)
The sensitivity of the sensor is 40ft=12m length, now the number smoke detector in each room is one (1).
The coil resistance=240ohms,
Ic max= (15V ) = 0.05A;
(240ohm)
For h Fe=100
Ib= ( c ) =
(100)
When Q1 is conducting: Vcc=VA while Q1 not conducting, Vc =Vcc =15V
Comparator.
(Vcc x R4) = (15x 10) =11.25v (constant)
(R5 +R4) (33+10)
OUTPUT OF Q1
V out = (V3-V2) x A, where A =voltage gain of comparator
V2= ( R3 ) x Vcc = (150 ) x 15 = 14.06v
(R4+R3) (10+150)
Vcc =Ic Rc+ Vce,
V3 = Vce = vcc - IcRc……………………………………………………... …………………(i)
21. 14
Ic= hefx Ib………………………………………………............................. …………………(ii)
INPUT OF Q1
R sensor=30k , Now Vb=Vin sensor
Vb=Ib Rb+ Vbe; where Vbe=0.7v and
Vb=Vin sensor= (30 ) x 15 = 7.14v
(30+33)
71.4= (Ic x 30) +0.7; Ic=21.5mA
(100)
From …………………………………………………………………………………………….(i)
V3=15-(21mx33) = 14.29v
From the comparator:
Vo = (V3-V2) x A; A is voltage gain of the Comparator
Vo = (14.29-14.06) x 5.0v=1.15V
STANDARD VALUES OF THE COMPONENTS
Resistor one (R1) = 33kohm
Resistor two (R2) = 40kohm
Resistor three (R3) = 150kohm
Resistor four (R4) = 10ohms
Resistor five (R5) = 33kohm
Resistor (R6) = 33kohm
Resistor (R7) = 220ohms
Voltage to the Buzzer =voltage to the Relay=12V,
Transistor: Q1 =Q1 = 2N2222A
Flow chart or proposed system
22. 15
Figure 4
INITIALIZE SENSOR
START
SPLAY RED LAMP
IS THE SENSOR DETECTED SMOKE?
AUDIBLE ALARM
SPLAY GREEN
23. 16
Ladder logic diagram for the proposed system
Key: 001 =Start switch
002 =Smoke sensor
033 =Stop button
009 =Green-LED
010 =Red-Lamp
011 =Alarm
001 009
033
009
010
002
011
Figure 5
END
25. 18
5.0 CIRCUIT OPERATION
When there is no smoke detected, light beam from the Light Emitting Diode (LED) shoots and does not reach the Sensor ( S) , hence Transistor Q1 is in conducting state and Vc =Vin(sensor) =12V hence deferential input to the comparator is 0V and comparator output is also =0V , by that time Q2 is in cutoff state and really Relay is not energized
When the sensor is in conducting , Q1 is pulled out of conduction since no enough voltage at its base to forward bias it; it then forced to cutoff region. Under this condition Vc = Vcc.
Under smoke condition, smoke migrates between the light beam and scatters the light, the scattered light then reaches the sensor S1,and it start to conduct pulling the base of Q1, All the VCC drops across R6,When Q1 is cutoff state , all VCC appears across VCE of Q1. VC is then=VCC
The two UN equal voltage, VC and Vin(sensor), are then applied to the comparator the differential input is amplified to +12.
The output of the comparator forward biases the transistor Q2 into conduction.
Once transistor Q2 is conducting, enough current flow through the relay coil (R1) .The relay then closes contact (RL1)
Energizing the controlling circuit, then indicator lamp and electric buzzer starting.
27. 20
CHAPTER SIX
6.1 CONCLUSION
This report demonstrates completion of senior project one for the year 2010/2011. The report contains background information, definition of the problem, project objectives, and significance of the project, methodology and data collection. Finally FIRE DETECTION AND INTIMATION SYSTEM design and implementation for DIT hostels is aiming at saving the hostellers’ lives, resources and other properties also to be a starting point for the institute to implement the system for fire (smoke) detectors
6.2 RECOMMENDATION
The proposed system with its associated features should be put into consideration for further analysis and design so that it can be used for the implementation of Fire Detection and Intimation system. Also the institute management especially Estate manager should make sure that there is communication between hostellers and Fire Rescue; this is because the hostellers are the ones who are living in hostels. Through this project , I advise the Institute to implement the fire detection system in all offices, workshops and hostels to reduce or avoid the fire hazards that occurring in different areas such as hostels. The implementation of the project could not met due to the lack enough tools for implementation of the real circuit, this happened because of the financial factor.
28. 21
REFFERENCE
1. Thomas. C, (2007) Residential Smoke Alarm Performance, Building and Fire Research Laboratory, National Institute of Standards and Technology, Cambridge.
2. National Fire Protection Association, (2009), Smoke Alarm Safety Tips. Safety Information, New York.
3. www.johnsoncontrols.com/publish/us/en/products/building,efficiency/security- solutions/fire-safety-products.html (Feb.2011)
4. Johnson, C. ( 2006),Fire detection and fire alarm systems, Aspirating smoke detectors
5. Errata ,R .(2009).Smoke Detectors for Fire Alarm Systems. IEEE, Cambridge.
6.www.skiveprojects.com/ieee-projects/embedded/residential-safety-
(FIRE DETECTORS PROJECTS)
7. BBC News (2003). Fire Detecting Devices. New York.
http://www.fireprotection.co.uk/, 20/05/2011
29. 22
APPENDEX
Oral interview questions
1 . How many hostels do you have at main campus?
. Four hostels
2. Do you have fire detectors in your hostels?
No
3. Where (other than in the hostels) do you want fire detectors to be implemented?
In all hostels and workshops
4. Do you need fire detectors in the hostel?
Yes
5. How your current system is in case of fire outbreak?
We have old fire extinguishers but are not working