Home Security System

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

PROPOSAL FILE EMBEDDED SYSTEM DESIGN

PROJECT
OF
EMBEDDED SYSTEM DESIGN

HOME SECURITY SYSTEM

GROUP MEMBERS:-
- SHAHZAIB MUHAMMAD SALEEM (2012-EE-211)
- AMAR IQBAL (2012-EE-219)
- ABD-E-MUNAF KALIMEE (2012-EE-232)
- SYED AREEB AHMED (2012-EE-233)
- AYAZ SULTAN (2012-EE-235)
- MUHAMMAD TALHA (2012-EE-237)

SUBMITTED TO:
SIR OVAIS AKHTER

SSUET 1|Page
PROPOSAL FILE EMBEDDED SYSTEM DESIGN

INTRODUCTION
In today’s age of digital technology and intelligent systems, home automation has become
one of the fastest developing application-based technologies in the world. The idea of
comfortable living in home has since changed for the past decade as digital, vision and
wireless technologies are integrated into it. Intelligent homes, in simple terms, can be
described as homes that are fully automated in terms of carrying out a predetermined task,
providing feedback to the users, and responding accordingly to situations. In other words, it
simply allows many aspects of the home system such as temperature and lighting control,
network and communications, entertainment system, emergency response and security
monitoring systems to be automated and controlled, both near and at a distance. Automated
security systems play an important role of providing an extra layer of security through user
authentication to prevent break-ins at entry points and also to track illegal intrusions or
unsolicited activities within the vicinity of the home (indoor sand outdoors).
There has been much research done in the design of various types of automated security
systems. Sensor-based systems that rely on contact or movement-sensors or contact-based
systems such as fingerprint and palm print scan or keypad-activation that require substantial
amount of contact with an input device. Many security systems are based on only a single
system. In an event of system failure or intrusion of the user authentication, there is no
backup system to monitor the home continually. This shortcoming can be dealt with using
multiple security systems (or multi-layered security systems). However, multi-system
implementations will definitely be more demanding in terms of computational cost and
organization. This requires careful integration and sharing of resources. Thus, a feasible
system should be effective, practical and reasonable in cost.We proposed an
integrated dual-level sensor based home security system, consisting of two sub systems aPIR
sensor, magnetic reed switch module. Both subsystems work independently
but are incorporated into a single automated system for practical implementation.

SSUET 2|Page
PROPOSAL FILE EMBEDDED SYSTEM DESIGN

TECHNICAL BACKROUND

PIC micro-controller:
PIC is a family of modified Harvard architecturemicrocontrollers made by Microchip
Technology, derived from the PIC1650 originally developed by General Instrument's
Microelectronics Division. The name PIC initially referred to Peripheral Interface Controller.
The first parts of the family were available in 1976; by 2013 the company had shipped more
than twelve billion individual parts, used in a wide variety of embedded systems.

The PIC architecture is characterized by its multiple attributes:

 Separate code and data spaces (Harvard architecture).


 A small number of fixed-length instructions
 Most instructions are single-cycle (2 clock cycles, or 4 clock cycles in 8-bit models),
with one delay cycle on branches and skips
 One accumulator (W0), the use of which (as source operand) is implied (i.e. is not
encoded in the opcode)
 All RAM locations function as registers as both source and/or destination of math and
other functions.
 A hardware stack for storing return addresses
 A small amount of addressable data space (32, 128, or 256 bytes, depending on the
family), extended through banking
 Data-space mapped CPU, port, and peripheral registers
 ALU status flags are mapped into the data space

GSM SIM 900:


The term GSM900 is used for a GSM system which operates in any 900 MHz. The 900
MHz band defined in the ETSI (European Telecommunication Standard Institute) standard
includes the primary GSM band (GSM-P), the extension and the part of the 900 MHz band
that is reserved for railways (R-GSM).

The total GSM900 band defined in the standard ranges from 876 - 915 MHz paired with 921
- 960 MHz. Mobiles transmit in the lower band and base stations transmit in the upper band.

PIR SENSOR:
PIR sensors allow you to sense motion, almost always used to detect whether a human has
moved in or out of the sensors range. They are small, inexpensive, low-power, easy to use
and don't wear out. For that reason they are commonly found in appliances and gadgets used

SSUET 3|Page
PROPOSAL FILE EMBEDDED SYSTEM DESIGN

in homes or businesses. They are often referred to as PIR, "Passive Infrared", "Pyroelectric",
or "IR motion" sensors.

REED SWITCH:
This is a small device called a reed switch. When the device is exposed to a magnetic field,
the two ferrous materials inside the switch pull together and the switch closes. When the
magnetic field is removed, the reeds separate and the switch opens. This makes for a great
non-contact switch. This switch can carry up to 1.2A.

5-METHODOLOGY
The project here is all about a Home security system, In this project we have planned to
develop a Home security system .Home security system for detecting an intrusion into a
monitored area by an infrared detector. The area under surveillance is monitored by a passive
infrared detector which activates the transmitter upon the detection of abrupt differences in
infrared radiation levels, associated with the motion of the body in an otherwise equilibrated
environment. A SMS is send by the GSM which is received on the mobile phone by the
person whose number have been linked with it.
A security system for a home comprising: A GSM kit interfaced with ardiuno mega 2560 to
send a message indicating intrussion, and a portable receiver (Mobile Phone), display means
for generating a visual display indicating an intrusion has occurred in response to said output
signal.

Circuit diagram:

SSUET 4|Page

You might also like