Anty Theft Security System
Anty Theft Security System
The rate of increase in theft in this part of the world has reached an alarming rate. In the rave of
this development, engineers in this country have been performing researches aimed at providing
a lasting solution to this endemic act. This research team in an attempt to proffer a lasting
solution thought of exploring the electronic anti-theft device techniques as possible remedy. The
implementation is divided into two Subsystem the alarm and the anti-theft subsystems. The
importance of this design cannot be over emphasized since it helps to reduce the rate of theft
within our society. For instance, when there is an intruder into the system, the system will
immediately and automatically demobilize the home after few seconds the intruder moves
thereby blowing an alarm the status of the system and preventing the home items from being
stolen.
In the world day, researchers and developers have come up with a wide range of surveillance
systems that are deployed at homes, in industries and remote areas at the same time control the
tasks through affordable, intelligent and easy-to-implement hardware and software systems.
Some have so far been realized while others still remain a work in progress.
Criminal activities are becoming a very dexterous act nowadays due to intelligent and novel
methods criminals’ maneuvers to succeed in their activities in residential apartments. One of the
most important things a person desires is the safety of the family and home. From global
perspectives, the rising trend of criminal activities is becoming very alarming and has created
much public outcry to government for urgent mitigation measures. This uproar has been
characterized of diverse chaos ranging from human abduction, robbery attack, political bedlam,
both residential and commercial buildings from intrusion. The history of security system is
interesting because the desire for this protection and security dates back thousands of years ago.
(Vintech, 2011) stated that the idea of security systems came about after it was perceived that
value of life and property could be lost suddenly either through fire, robbery, force etc., without a
prior warning/information. Over decades, security systems have changed from simple control
Throughout history, human have sought to protect their life, property and professions, with the
busy lifestyle of people there is the need for automatic devices that can be triggered to perform
an action when the intrusion detection system notices motion, some of today’s system are
capable of displaying the actual direction and location of the intruder the direction and location
of the intruder, as this has become vital because of the frequent and rampant cases of burglary,
For instance, home security systems have to evolve because of the overwhelming habitual and
novel approaches the mobsters deploy to penetrate homes. One of the challenging facts about
some security systems like home surveillance cameras is that it has the capacity to only record
the incident and could not be able to carry out other intelligent online and data processing
functions like its ability to detect motions with instant frame configuration of the motions, store
the captured video through a web server with additional short message services to the intended
recipient.
With the advancement in technology, motion can be detected by measuring change in speed or
vector of an object in the field of view, such systems are complex and expensive. However, with
recent progress in technology and the growing need for increased security in civilian and other
applications, many low-cost solutions for security system have now emerged, in the field of
Burglar Alarm Systems using modern approaches have led to a major means of providing
This system has to be as effective and reliable as possible to be able to fully serve the purpose for
which they have being made, they must take into account the actions of people attempting to
trespass or cause destruction, as security is the degree of protection against danger, loss and
criminals. It is perceived that not all families could afford the high cost of installation of the
security surveillance system in the market today, therefore this study considers the design and
location, send out sound and alarm, as it displays the exact location of the intruder using seven
segment displays.
Security problem has been a matter of concern over the years not only in Nigeria, but also
throughout the world. Home intrusion and car security is one of the most important issues of
them. The main object of this paper is to ensure the highest security for car or security has been
threatened immensely. This anti-theft system is designed with a target is to design a secuirt
system with which the owner do not have to bother about new ways of stealing.
system capable of detecting intrusion at any location, as it will prompt an alarm to ring and using
This device functions as electronics watch dog. This device functions as a major security
alarms used in any home which can also be used in residential, commercial, industrial, and
military properties for protection against burglary (theft) or property damage, as well as personal
protection.
This system doesn’t require the house owner to activate it; it operates automatically. Alarm is
considered as providing much more effective anti-theft protection than an audible alarm alone;
many auto insurance companies offer lower rates for homes that are equipped with them.
To determine whether there is a device in the house, it is very difficult. If the alarm is intended to
scare off intruders this creates many problems. To theft a thief can thoroughly inspect the house,
but the protective device will not notice, and after the break he was waiting for trouble.
The alarm is almost impossible to disconnect: to determine the location of the system unit from
the first impossible, and the principle of operation of many of the hijackers are unknown. The
simplicity and ease of use. High reliability and silent operation, which is important.
A house anti-theft alarm mechanism prevents an reinforce home door from opening unless a key
is inserted into the door slot. One of the advantages is that the home owner does not have to
remember to activate it – its operation is automatic. The device is considered as a passive anti-
theft system since it does not require action from a person to make it work. One disadvantage of
the system is that car keys with the embedded transponder are more expensive and time
POWER SUPPLY
2.1 Introduction
this chapter focuses on the review of related literature. A literature reviews includes the current
documents the state of the art with respect to the topic you are writing. It surveys the literature in
A lot of researches have been carried out in the antitheft application research area. Author
developed a smart approach to track the android operating system location. The research gives an
excellent outline of how google maps can be integrated with a global positioning system network
for tracking smartphones by utilizing latitude and longitude values. These values were thereafter
used for locating the current location of the android device. This interaction covers the rundown
of the predetermined point where users can choose their starting position by typing the name of
the location and finding the range of the android device from the starting position
2.3 Review of the related Work
According to (Najib k D,j 2012) developed a system that routinely detects pickpocket and grab-
and-run theft in which the thief grabs the smartphone from a victims' hands and runs away. There
was an underline factor concerning smartphone screen locking mechanisms that users refuse to
enable this operation on their devices because it takes a long time to unlock the devices and this
also puts the victims' personal information at high risk when such devices are stolen. The system
was intelligently built to support a drastic decrease in the number of periods a user is asked to
provide a lock code. The system also warns smartphone users of PINs or passcodes only when
According to Researchers (Hamid el dawud 2013) developed a mobile based anti-theft tracking
framework for finding friends and acquiring signals when friends are close by using location-
based services (LBS). The paper combines hybrid location schemes which integrate satellite-
based and network-based signals. This system enables location tracking using the radius
maintained between the devices with the help of the system administrator. This utility works in
service (SMS) was designed. This application assisted by approximately informing the
smartphone's original owner of the new SIM number inserted by the culprit. Immediately the
SIM card is changed, the application will send a message to the alternated number registered
during the installation of the smartphone tracking app. In addition, the paper also proposed an
advanced global positioning system device tracker which updates the stolen smartphone location
at 10 minutes intervals, and anytime there is location modification, it sends an electronic mail to
android phones. The purpose behind developing this project is to help users track their lost or
misplace devices. The developed software permits simple commands that will assist the user to
get hold of the smartphone's GPS location information through the friend's mobile phone URL.
Also, the camera of the phone works in the background without knowing the culprit and records
the culprit video as well as the captured pictures and sends this information to the actual owner
installed with preliminary registration of user mobile number, alternative mobile number, user
passcode, and email identity. The software runs within the background of the android device. It
has a platform for monitoring the present location of the mobile phone via GPS. Anytime the
culprit changes the SIM card, instantly the SIM details, latitude, and longitude of the location
will be sent to the alternate mobile phone number provided by the user during installation. The
contacts and crucial files on the lost smartphone may be retrieved via e-mail and the file switch
facility that is available in the application. The research is limited because the application can
Arunkumar et al. [2015] developed an android antitheft mobile application with GPS Tracker
and image acquisition. The researchers proposed an autonomous system that communicates with
the owner via email and SMS when it detects SIM change. The application also sends the
culprit's image and his location to the alternative email-id. This application was interconnected
using GPS functionalities for the mobile tracking process. The application did not provide
antitheft system for smartphones. The actual chip is embedded into the smartphone which can be
accessed anytime by the user to track the smartphone even after the phone is reset and also
provide support for remotely erasing the data stored, hence data integrity is achieved and the
data is not stolen. The chip can communicate with the GPS sensor in the mobile and will provide
the GPS location of the smartphone in real-time. The chip also has dedicated storage where users
can store important information and confidential data that can be secured and can access it
anytime. In future work, the researchers planned to expand the implementation to laptops.
The project titled “design and construction of anti-theft security system” consists of four
different stage and these stages include the sensing parts, the control unit, the power supply unit
The power supply is the power source of the whole system. The power supply converts the
230vAc to a 12vDc which then used to power the whole system. The transformer a system that
converts a high voltage AC to a low voltage AC or vice Versa using the physics law of
electromagnetic induction. The rectifier is an arrangement of four diode connected in such a way
that they only allow current to pass in a single direction thus, converting the alternating current
which keep changing direction to a Direct current which only passes in a single direction. A
capacitor is then used to filter and smoothen the Dc voltage. A voltage regulator is then
converted that high voltage Dc to a stable 12vDc and power the whole system
circuit consist of active components which detect movements and other physical parameters and
The control circuit as the name suggest it is the heart of the system which controls the whole
system.
The alarm system contains a buzzer which is a passive component converts an electrical signal
into sound signal. When the control system does all the calculation and arithmetic it either
3.1 INTRODUCTION
This chapter deal with design and construction stage, design considerations for choice of
components and packaging materials, methodology units and how the project implemented to
1 Transistor BC547 5
7 Resistor 1kohm 5
8 Transformer 230v/12v 1
5. Buzzer
6. Resistor
7. Capacitor
9. Voltage regulator
The proposed device consists of RTC module that were used monitor the time. Is used to
identify or measure the actual time like a what smart watched do. in the Arduino uno board (at
mega 328PIC in construction) and when the Arduino is powered ON the Module start to generate
continuously data in real time. For displaying data on the time and alarm Equipment, a liquid
Crystal Display (LCD) was simply connected to the Arduino Uno. For Alerting person(s) of the
Actual time a buzzer was connected to the Arduino Uno. The data mainly consists of time and
date data and their intensity values. Higher values indicate higher the time or clock and vice
versa. All connections of modules can be seen in the block diagram of the proposed system. The
propose of using Arduino Uno is that now-a-days, they Arduino is much accessible and cheap as
This project was carried out in four stages. These are as follows and we look at what happens in
each stage.
STAGE TWO: The circuit is simulated to check for the behavior of each circuit design
procedure
This power supply of this project circuit is delivered from a DC battery. The power supply
The circuit above presents the 9v battery power supply of the project, but because
microcontroller require a stable or regulated +5v power supply of function correctly a +5v
voltage regulated was connected between the 9v battery and the entire circuit of the project.
3.4.1 RECTIFICATION
Rectification is the process of removing the negative part of the alternating current (AC), hence
producing partial DC. This can be achieved by using 4 diodes as shown in figure 3.4. Diode only
allow current to flow in one direction. In the first half cycle of AC Diode, D1 and D3 are forward
biased. This combination convert the positive half cycle into positive
3.4.2 FILTRATION
The output after the rectification is not a proper DC.it is oscillation output and has very high
ripple factor. A filtering capacitor is used to remove the ripple. The capacitor charge till the
waveform goes to its peak and discharge into load circuit when the waveform goes low. The
3.4.3 DIODES
The output after the rectification is not a proper DC. It is oscillation output and has very high
ripple factor. A filtering capacitor is used to remove the ripple. The capacitor charge till the
waveform goes to its peak and discharge into load circuit when the waveform goes low. The
3.4.3 DIODES
Diodes are semiconductor devices which might be described as passing current in one direction
only. The latter part of that statement applies equally to vacuum tube diodes. Diodes however are
far more versatile devices than that. They are extremely versatile in fact. Diodes can be used as
circuits, mixing devices in RF circuits. Switching applications or can be used to make logic
decisions in digital circuits. There are also diodes which emit "light", of course these are known
as light-emitting-diodes or LED. Light emitting diodes, commonly called LED's are real unsung
heroes in the electronics world. They do dozens of different jobs and are found in all kinds of
devices. Among other things, they form the numbers on digital clocks, transmit information from
remote controls, light up watches and tell you when your appliances are turned on: Collected
together, they can form images on a jumbo television screen or illuminate a traffic light.
diode
A capacitor is an electrical device that can store energy in the electric field between a pair of
closely spaced conductors (called 'plates'). When voltage is applied to the capacitor. electric
charges of equal magnitude, but opposite polarity, build up on each plate. Capacitors are used in
electrical circuits as energy-storage devices. Hey can also be used to differentiate between high
frequency and low-frequency signals and this makes them useful in electronic filters. Capacitors
are occasionally referred to as condensers. The capacitor‘s capacitance (C) is a measure of the
amount of charge (Q) stored on each plate for a given potential difference or voltage (V) which
C = QN ..................................... 3.0
In SI units, a capacitor has a capacitance of one farad when one coulomb of charge causes a
Potential difference of one volt across the plates. Since the farad is a very large unit, values of
capacitors are usually expressed in microfarads (HF), Nan farads (nF) or Pico farads (pF).
the same potential difference (voltage). Their total capacitance (C eq) is given by:
Ceq=Cl+C2+...+Cn............................. 3.1
The reason for putting capacitors in parallel is to increase the total amount of charge stored. In
other words. increasing the capacitance also increases the amount of energy that can be stored,
The current through capacitors-in series stays the same, but the voltage across each capacitor can
be different. The sum of the potential differences (voltage) is equal to the total voltage in parallel
the effective area of the combined capacitor has increased, increasing the overall capacitance.
While in series, the distance between the plates has effectively been increased, reducing the
overall capacitance.
comparatively simple device but it is actually a very complex integrated circuit. A regulator
converts varying input voltage and produces a constant "regulated" output voltage. Voltage
regulators are available in a variety of outputs, typically volts, 9 volts and 12 volts. The last two
digits in the name indicate the output voltage. The "LM7805" series of voltage regulators are
Voltage regulator
A voltage regulator LM 7805 is used to provide a regulated +Sv DC. Input voltage of the
regulator should be 2V more than the rated output voltage for proper working of regulator. (BL
Where 2v is the voltage consumed by the internal circuitry of the voltage regulator
3.4.6 RESISTORS
Figure 3.7: Resistor
Resistance is the property of a component which restrict c s the flow of electric current. Energy
is used up as the voltage across the component drives the current through it and this energy
appears as heat in the component. Resistance is measured in ohms, the symbol for ohm is an
omega | is qullc small for electronics so resistances are often given in k and M. The film resistor
thew resistor are made from metal oxide or small rods of ceramic-codcd metal. These are similar
t0 carbon film resistor and their resistivity is controlled by thickness of the coating layer. The
property like reliability, accuracy and stability are considerably better for these resistors. These
resistors can be obtained in wide range of resistance values (from a new ohm to millions of
ohms).
The CD4017 microcontroller is not only for technical audience but is intended for Designers and
artists well because of its focus to usability base its design which helps to achieve the intended
goal (Diakopoulos, D. & Kapur. A. 2011) it is the primary component of the framework. In
3.9 BUZZER
or piezoelectric. Typical uses of buzzers and beepers include alarm devices, timers and
continuation of user input such as a mouse click or keystroke. Buzzer is an integrated structure of
electronic transducers, DC power supply, widely used in computers, printers, copiers, alarms,
electronic toys, automotive electronic equipment, telephones, timers and other electronic
products for sound devices. The piezzo SFM-27-IA-12v wired siren buzzer is used for alarm.
used when the sensor detect movement, the output data of the sensor was sent to the control
system in this case a CD4017 which activate the buzzer and some series of light emitting diode
(LED). A power supply was used to converts the high alternating voltage to low alternating
4.1 INTRODUCTION
This chapter presents testing and calibration of the developed prototype, it also shows the
5xpcrimental set up of the test carried out and discuss on the relevance of
should be reading
1500 resistance
between each
power rails.
Test were conducted both The
3 System Tests circuit is
when component was laid expected to power
outline of various
conducted.
4 Short-circuit tests
The system is
circuit reading.
4.3 Results
By plugging the power cable and switch turns ON the power switch. The following result was
obtained.
S/N NAME OF TESTS RESULT OBTAINED
transformation and
connected
After the power code is connected to the main 230V from our home outlet, the above results
were obtained. When the system is powered On, the system behaves just as expected. It starts
working and the sensors keep updating the data. The short circuit test was done using a
multimeter, the multimeter is set to continuity mode and the leads are connected to the leads of
the light emitting diode and measured the leads resistance. After all the tests, the results is then
5.1 SUMMARY
The construction of the system is divided into three stages as stated: power supply stage, sensor
switching stage, and Arduino connection stage. The power supply for this system is 9 V DC
and a cut off voltage of 5.4 V. According to the power needed for the components of the
thickness-based traffic light control framework, supply of +5 V regarding GND is created. The
V. Power applied to the Vin pin is stepped down to 5 V by the on-board regulator on the Mega.
The minimum voltage is about 6.2 V because of the regulator dropout (that is, the regulator
needs at least 1.2 V above its 5 V output in order to operate) 9 -12 V is recommended. Applying
a higher voltage to the system will not provide any more power to the Mega and its
5.2 CONCLUSION
The density-based traffic control system has been designed, constructed and tested to ensure
validation of its function and operations. In this research, we have succeeded in minimizing the
traffic congestions created by the fixed time-based traffic light system. The system is effective
and the cost of production is very low. Future work is recommended in order to produce the
device on a large scale and deploy to all roads in order to reduce traffic congestion in places like