Burglar Alarm System Term Paper
Burglar Alarm System Term Paper
Burglar Alarm System Term Paper
ABSTRACT
Applications of digital electronics were widely used in almost all areas of life: computers,
automated machine control, robots, energy monitoring and control, inventory management,
medical science and technology, transportation, entertainment and space exploration. The burglar
alarm system would be designed to cover and monitor the whole perimeter of a building to ensure
that any movement made within the protected area would be sensed and a burglar alarm would be
activated. The burglar alarm system was built around a microcontroller programmed to accept a
known security code with which the security system is either enabled or disabled. The
microcontroller accepts the entered code and digital compares it with the registered code. The
motion detection stages are implemented through the use of infra red transceivers. The infra red
transmitter emits infra red rays which are detected by the photo diode placed within the line of
sight of the transmitters. When motion is detected by any of the four transceivers employed to
monitor the perimeter of the building, an alarm comes on to alert of a possible presence of an
intruder.
Keywords: Burglar Alarm System, Microcontroller, Motion Detection, Infrared Transmitter
1. Introduction
Digital electronics applications were for many years confined to computer systems. In todays
world, the term digital has become part of our everyday vocabulary because of the dramatic
way that digital circuits and digital techniques have become so widely used in almost all areas of
life: computers, automated machine control, robots, energy monitoring and control, inventory
management, medical science and technology, transportation, entertainment and space
exploration. In modern homes, digital circuitry controls the appliances, alarm system and heating/
cooling systems. In corporate organization, digital circuitry is employed is almost every activity
including employees resumption timing, cash counting, processing payrolls, and communication.
This project involves the design and construction of a burglar alarm system. The burglar alarm
system would be designed to cover and monitor the whole perimeter of a building to ensure that
any movement made within the protected area would be sensed and a burglar alarm would be
activated. The burglar alarm system would also feature a keypad user interface with which the
owner of the protected building can enter a pass code to either enable or disable the security
system. The pass code would be a six digit code which can always be changed by the user. On
entering the correct six (6) digit code on a keypad into the system, the burglar alarm system
comes alive. The system incorporates an anti-fiddle protection that ensures that only four
trials of code entry are allowed. When the code has been incorrectly entered four times in a
row, system would switch to alarm mode. In this state, all keys pressed are ignored for one
minute and at the same time the buzzer will sound the alarm signal. This function thwarts any
attempt by
hackers, to quickly try large numbers of codes in sequence.
In designing this project, a microcontroller would be programmed to activate an output that
enables or disables the security system when the correct access code has been entered on a
keypad. A buzzer would be added to provide input feedback, the number of beeps indicates
whether the input has been correctly entered or not. The burglar alarm system would employ
four infra red transceiver units to cover the whole perimeter of the building and when motion
is sensed, a burglar alarm is enabled to alert the security agents around of the presence of a
possible burglar.
I am majorly interested in this project solely because of the increasing crime rate in this
country and a way of stopping the situation. Furthermore, there was a need to protect home so
that users can take advantage of technological advancement even when the person concerned
is not around.
According to Ahmed M. S, Mohammed A. S. & Agbo G. A. (2008) explained how the amplifier
stage was built around an LM386 CMOS operational amplifier. The circuit arrangement is such
that it can amplify an input signal up to 200 times its original value.
Once a sound that exceeds certain intensity is produced, it is picked by the microphone, amplified
and sent to the latch, the latch keeps the alarm still ringing until the reset button is pressed.
multimeter, IC programmer.
DIGITAL
TIMING
Power
INFRARED
ALARM
LOGIC
Supply
CIRCUITRY
SENSORS
CONTROL
STAGE
STAGE
MICROCON TROLLER
STAGE
CODE
ENTRY
STAGE (KEYPAD)
Figure 2: Generalized block diagram for the burglar alarm
STAGE
output to the data input, for counter and toggle applications. The logic level present at the D input
is transferred to the Q output during the positive-going transition of the clock pulse. Setting or
resetting is independent of the clock and is accomplished by a high level on the set or reset line
respectively.
Motion Detection Unit
This stage is implemented through the use of the infra red break beam approach wherein any
break in the infra red beam transmitted to the photo diode is detected as motion. It is subdivided
in two stages:
Transmitter stage
The Transmitter Stage involves an infrared diode and a limiting resistor. The infrared diode is
forward biased to meet the electrical conditions at which it is manufactured to operate.
Receiver Stage
The circuit employs the use of a photodiode receiver and an amplifier to give a HIGH or LOW
output when the beam is broken.
The circuit diagrams that make up the whole of burglar alarm system are analyzed as shown in
figure 3 above.
5. Software Design Consideration
The PIC was programmed by using Assembly Language Programming for speed optimization.
Coding in assembly language represents half-way position between machine code and a high level
language. A programmer unit was used to enable the program to be loaded into microcontrollers
memory which allows it to run,
After overall planning, the principle of burglar alarm system is in the first priority to work on and
follow to instruct the microcontroller to accept and execute a known security code with which the
security system is either enabled or disabled. As discussed above, the overall thread for the
programming worked out, and shown as the following flowchart in figure 5 above.
7. System construction
The physical realization of the project is very vital. This is where the fantasy of the whole idea
meets reality. Here the paper work is transformed into a finished hardware. After carrying out all
the paper design and analysis, the project was implemented, constructed and tested to ensure its
working ability. The construction of this project was done in three different stages.
Like every research and practical engineering work, diverse kinds of problems are often
encountered. The problems encountered in this project and how the were solved and
maneuvered are listed below. Difficulties in running the programme effectively until after
several troubleshooting.
Components are very scarce, thereby going extra length before getting
them.
Code:
#include <REGX51.H>
sbit rs=P3^2;
sbit rw=P3^3;
sbit en=P3^4;
sfr datas=0xA0;
void lcdinit(void);
void lcdcmd(unsigned char );
void delay(unsigned int del);
void lcddata(unsigned char ldat);
void del1();
void sms1();
void sendd();
void INITLCD()
{
lcdinit();
}
void COMMAND(unsigned char val)
{
lcdcmd(val);
}
void DISPLAY(unsigned char val)
{
lcddata(val);
}
void lcdinit(void)
{
lcdcmd(0x38);
lcdcmd(0x38);
lcdcmd(0x38);
lcdcmd(0x06);
lcdcmd(0x0e);
lcdcmd(0x01);
lcdcmd(0x0C);
lcdcmd(0x80);
}
void lcdcmd(unsigned char lcmd)
{
datas=lcmd;
rs=0;
rw=0;
en=1;
delay(100);
en=0;
}
void delay(unsigned int del)
{
while(del--);
}
void lcddata(unsigned char ldat)
{
datas=ldat;
rs=1;
rw=0;
en=1;
delay(100);
en=0;
}
char flags=0;
char flagt=0;
char kval=0;
char flagr=0;
int recharge=0;
char flagtick=0;
unsigned char keypad();
void disp(unsigned char dat)
{
}
DISPLAY(dat);
void cls()
{
COMMAND(0x01);
COMMAND(0x02);
COMMAND(0x80);
else
val[j]=SBUF;
j++;
RI=0;
{
TI=0;
}
void main()
{
P1=0X00;
P2_0=1;
while(1)
{
if(P2_0==1)
{
P1_5=0;
P1_6=1;
P1_7=1;
}
else if(P2_0==0)
{
P1_5=1;
P1_6=0;
P1_7=0;
}
}
}
}
9. Conclusion
The project which is the design and construction of digital head counter was designed
considering some factors such as economic application, design economy, availability of
components and research materials, efficiency, compatibility and portability and also durability.
The performance of the project after test met design specifications. However, the general
operation of the project and performance is dependent on the user who is prone to human error
such as entering wrong timing.
10. Recommendations
For the purpose of the future research, the project work can be improved upon in the following
ways:
The system can be designed to send security alert to the nearest police station.