0% found this document useful (0 votes)
33 views

Anty Theft Security System

design and construction of anti-theft security and alarm system
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

Anty Theft Security System

design and construction of anti-theft security and alarm system
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

CHAPTER ONE: INTRODUCTION

1.1 Background of the study

The rate of increase in theft in this part of the world has reached an alarming rate. In the rave of

this development, engineers in this country have been performing researches aimed at providing

a lasting solution to this endemic act. This research team in an attempt to proffer a lasting

solution thought of exploring the electronic anti-theft device techniques as possible remedy. The

implementation is divided into two Subsystem the alarm and the anti-theft subsystems. The

importance of this design cannot be over emphasized since it helps to reduce the rate of theft

within our society. For instance, when there is an intruder into the system, the system will

immediately and automatically demobilize the home after few seconds the intruder moves

thereby blowing an alarm the status of the system and preventing the home items from being

stolen.

In the world day, researchers and developers have come up with a wide range of surveillance

systems that are deployed at homes, in industries and remote areas at the same time control the

tasks through affordable, intelligent and easy-to-implement hardware and software systems.

Some have so far been realized while others still remain a work in progress.

Criminal activities are becoming a very dexterous act nowadays due to intelligent and novel

methods criminals’ maneuvers to succeed in their activities in residential apartments. One of the

most important things a person desires is the safety of the family and home. From global

perspectives, the rising trend of criminal activities is becoming very alarming and has created

much public outcry to government for urgent mitigation measures. This uproar has been

characterized of diverse chaos ranging from human abduction, robbery attack, political bedlam,

terrorism, herdsmen invasion and etcetera.


A security system is a combination of hardware and software that protect life and properties in

both residential and commercial buildings from intrusion. The history of security system is

interesting because the desire for this protection and security dates back thousands of years ago.

(Vintech, 2011) stated that the idea of security systems came about after it was perceived that

value of life and property could be lost suddenly either through fire, robbery, force etc., without a

prior warning/information. Over decades, security systems have changed from simple control

panels and locks into high-technological gadgets.

Throughout history, human have sought to protect their life, property and professions, with the

busy lifestyle of people there is the need for automatic devices that can be triggered to perform

an action when the intrusion detection system notices motion, some of today’s system are

capable of displaying the actual direction and location of the intruder the direction and location

of the intruder, as this has become vital because of the frequent and rampant cases of burglary,

such as attack on homes offices, factories, banks etc.

For instance, home security systems have to evolve because of the overwhelming habitual and

novel approaches the mobsters deploy to penetrate homes. One of the challenging facts about

some security systems like home surveillance cameras is that it has the capacity to only record

the incident and could not be able to carry out other intelligent online and data processing

functions like its ability to detect motions with instant frame configuration of the motions, store

the captured video through a web server with additional short message services to the intended

recipient.

With the advancement in technology, motion can be detected by measuring change in speed or

vector of an object in the field of view, such systems are complex and expensive. However, with

recent progress in technology and the growing need for increased security in civilian and other
applications, many low-cost solutions for security system have now emerged, in the field of

Burglar Alarm Systems using modern approaches have led to a major means of providing

security in all applications, both military and civilian.

This system has to be as effective and reliable as possible to be able to fully serve the purpose for

which they have being made, they must take into account the actions of people attempting to

trespass or cause destruction, as security is the degree of protection against danger, loss and

criminals. It is perceived that not all families could afford the high cost of installation of the

security surveillance system in the market today, therefore this study considers the design and

construction of a Direction/Location Display which will be capable of detecting intrusion at any

location, send out sound and alarm, as it displays the exact location of the intruder using seven

segment displays.

1.2 Statement of the problem

Security problem has been a matter of concern over the years not only in Nigeria, but also

throughout the world. Home intrusion and car security is one of the most important issues of

them. The main object of this paper is to ensure the highest security for car or security has been

threatened immensely. This anti-theft system is designed with a target is to design a secuirt

system with which the owner do not have to bother about new ways of stealing.

1.3 Aim and objective

This project is aimed at designing and subsequently constructing a Direction/Location Display

system capable of detecting intrusion at any location, as it will prompt an alarm to ring and using

seven segment displays the exact location can be traced.

The following are the systems objectives;

1. Ensure the security of an environment where it is installed.


2. Ensure prompt notice through the alarm system of an intruder into an unauthorized premise.

3. Provide psychological satisfaction of being secure to the office occupant.

1.4 Significance of the project

This device functions as electronics watch dog. This device functions as a major security

alarms used in any home which can also be used in residential, commercial, industrial, and

military properties for protection against burglary (theft) or property damage, as well as personal

protection.

This system doesn’t require the house owner to activate it; it operates automatically. Alarm is

considered as providing much more effective anti-theft protection than an audible alarm alone;

many auto insurance companies offer lower rates for homes that are equipped with them.

To determine whether there is a device in the house, it is very difficult. If the alarm is intended to

scare off intruders this creates many problems. To theft a thief can thoroughly inspect the house,

but the protective device will not notice, and after the break he was waiting for trouble.

The alarm is almost impossible to disconnect: to determine the location of the system unit from

the first impossible, and the principle of operation of many of the hijackers are unknown. The

simplicity and ease of use. High reliability and silent operation, which is important.

1.5 Scope of the project

A house anti-theft alarm mechanism prevents an reinforce home door from opening unless a key

is inserted into the door slot. One of the advantages is that the home owner does not have to

remember to activate it – its operation is automatic. The device is considered as a passive anti-

theft system since it does not require action from a person to make it work. One disadvantage of

the system is that car keys with the embedded transponder are more expensive and time

consuming to replace if lost and usually requires a visit to a home dealer.


1.6 Project Block Diagram

POWER SUPPLY

SENSING UNIT CONTROL UNIT ALARM SYSTEM


Fig 1.1 Project block diagram

CHAPTER TWO: LITERATURE REVIEW

2.1 Introduction

this chapter focuses on the review of related literature. A literature reviews includes the current

knowledge as well as theoretical and methodological contribution to a particular topic. It

documents the state of the art with respect to the topic you are writing. It surveys the literature in

the topic selected.

2.2 Historical Background

A lot of researches have been carried out in the antitheft application research area. Author

developed a smart approach to track the android operating system location. The research gives an

excellent outline of how google maps can be integrated with a global positioning system network

for tracking smartphones by utilizing latitude and longitude values. These values were thereafter

used for locating the current location of the android device. This interaction covers the rundown

of the predetermined point where users can choose their starting position by typing the name of

the location and finding the range of the android device from the starting position
2.3 Review of the related Work

According to (Najib k D,j 2012) developed a system that routinely detects pickpocket and grab-

and-run theft in which the thief grabs the smartphone from a victims' hands and runs away. There

was an underline factor concerning smartphone screen locking mechanisms that users refuse to

enable this operation on their devices because it takes a long time to unlock the devices and this

also puts the victims' personal information at high risk when such devices are stolen. The system

was intelligently built to support a drastic decrease in the number of periods a user is asked to

provide a lock code. The system also warns smartphone users of PINs or passcodes only when

theft occasions had been detected

According to Researchers (Hamid el dawud 2013) developed a mobile based anti-theft tracking

framework for finding friends and acquiring signals when friends are close by using location-

based services (LBS). The paper combines hybrid location schemes which integrate satellite-

based and network-based signals. This system enables location tracking using the radius

maintained between the devices with the help of the system administrator. This utility works in

open spaces only.

In a similar study conducted by a smartphone tracking application utilizing a short message

service (SMS) was designed. This application assisted by approximately informing the

smartphone's original owner of the new SIM number inserted by the culprit. Immediately the

SIM card is changed, the application will send a message to the alternated number registered

during the installation of the smartphone tracking app. In addition, the paper also proposed an

advanced global positioning system device tracker which updates the stolen smartphone location

at 10 minutes intervals, and anytime there is location modification, it sends an electronic mail to

the smartphone owner


According to a Researchers (Ahmad Nazeer 2014) developed an anti-theft application for

android phones. The purpose behind developing this project is to help users track their lost or

misplace devices. The developed software permits simple commands that will assist the user to

get hold of the smartphone's GPS location information through the friend's mobile phone URL.

Also, the camera of the phone works in the background without knowing the culprit and records

the culprit video as well as the captured pictures and sends this information to the actual owner

According to (Rekha et al 2016) developed an anti-theft device. The android-based application is

installed with preliminary registration of user mobile number, alternative mobile number, user

passcode, and email identity. The software runs within the background of the android device. It

has a platform for monitoring the present location of the mobile phone via GPS. Anytime the

culprit changes the SIM card, instantly the SIM details, latitude, and longitude of the location

will be sent to the alternate mobile phone number provided by the user during installation. The

contacts and crucial files on the lost smartphone may be retrieved via e-mail and the file switch

facility that is available in the application. The research is limited because the application can

only work if the lost phone is switched on.

Arunkumar et al. [2015] developed an android antitheft mobile application with GPS Tracker

and image acquisition. The researchers proposed an autonomous system that communicates with

the owner via email and SMS when it detects SIM change. The application also sends the

culprit's image and his location to the alternative email-id. This application was interconnected

using GPS functionalities for the mobile tracking process. The application did not provide

information about the location of the android-based smartphone via SMS.

According to a study in federal polytechnic Kaduna(2011) proposed a hardware-based

antitheft system for smartphones. The actual chip is embedded into the smartphone which can be
accessed anytime by the user to track the smartphone even after the phone is reset and also

provide support for remotely erasing the data stored, hence data integrity is achieved and the

data is not stolen. The chip can communicate with the GPS sensor in the mobile and will provide

the GPS location of the smartphone in real-time. The chip also has dedicated storage where users

can store important information and confidential data that can be secured and can access it

anytime. In future work, the researchers planned to expand the implementation to laptops.

2.4 Project Overview

The project titled “design and construction of anti-theft security system” consists of four

different stage and these stages include the sensing parts, the control unit, the power supply unit

and the alarm system.

 The power supply unit:

The power supply is the power source of the whole system. The power supply converts the

230vAc to a 12vDc which then used to power the whole system. The transformer a system that

converts a high voltage AC to a low voltage AC or vice Versa using the physics law of

electromagnetic induction. The rectifier is an arrangement of four diode connected in such a way

that they only allow current to pass in a single direction thus, converting the alternating current

which keep changing direction to a Direct current which only passes in a single direction. A

capacitor is then used to filter and smoothen the Dc voltage. A voltage regulator is then

converted that high voltage Dc to a stable 12vDc and power the whole system

 The Sensing unit


The system also contains a sensing circuit which serve as the eye of the system. The sensing

circuit consist of active components which detect movements and other physical parameters and

then triggered the input pin of the control circuit.

 The control circuits

The control circuit as the name suggest it is the heart of the system which controls the whole

system.

 The alarm system

The alarm system contains a buzzer which is a passive component converts an electrical signal

into sound signal. When the control system does all the calculation and arithmetic it either

triggered the buzzer or the leds to indicate intrusion or theft attempt.


CHAPTER THREE

CONSTRUCTION TECHNIQUES & METHODOLOGY

3.1 INTRODUCTION

This chapter deal with design and construction stage, design considerations for choice of

components and packaging materials, methodology units and how the project implemented to

perform the required functionality.

3.2 COMPONENTS USED

3.3.0 List Of Components/Materials Required For The Construction

S/N NAME OF COMPONENTS VALUES QUANTITY

1 Transistor BC547 5

2 LCD screen 16*2 type 1

3 Buzzer 5v active relay 1

4 Voltage Regulator 7812 1


5 Diode Rectifier diode 4

6 Arduino Uno Atmega328p 1

7 Resistor 1kohm 5

8 Transformer 230v/12v 1

9 Capacitor Electrolytic 10mF 2

10 keypad Bush type

11 RTC module RTC3231 1

12 Vero board Dot type 2

1. Power supply 9v battery

2. Arduino uno atmega328

3. Liquid crystal display (LCD)16*2

4. Real time clock module (RTC)

5. Buzzer

6. Resistor

7. Capacitor

9. Voltage regulator

3.3 CONSTRUCTION TECHNIQUES

The proposed device consists of RTC module that were used monitor the time. Is used to

identify or measure the actual time like a what smart watched do. in the Arduino uno board (at

mega 328PIC in construction) and when the Arduino is powered ON the Module start to generate
continuously data in real time. For displaying data on the time and alarm Equipment, a liquid

Crystal Display (LCD) was simply connected to the Arduino Uno. For Alerting person(s) of the

Actual time a buzzer was connected to the Arduino Uno. The data mainly consists of time and

date data and their intensity values. Higher values indicate higher the time or clock and vice

versa. All connections of modules can be seen in the block diagram of the proposed system. The

propose of using Arduino Uno is that now-a-days, they Arduino is much accessible and cheap as

well. Any person can have it within the budget.

3.4 DESIGN PROCEDURE

This project was carried out in four stages. These are as follows and we look at what happens in

each stage.

STAGE ONE: this involves having the schematics of the circuit

STAGE TWO: The circuit is simulated to check for the behavior of each circuit design

procedure

STAGE THREE: At this stage, the implementation of the circuit diagram is

3.4.0 POWER SUPPLY UNIT

This power supply of this project circuit is delivered from a DC battery. The power supply

circuit is present in figure 3.1 below.

The circuit above presents the 9v battery power supply of the project, but because

microcontroller require a stable or regulated +5v power supply of function correctly a +5v

voltage regulated was connected between the 9v battery and the entire circuit of the project.

3.4.1 RECTIFICATION
Rectification is the process of removing the negative part of the alternating current (AC), hence

producing partial DC. This can be achieved by using 4 diodes as shown in figure 3.4. Diode only

allow current to flow in one direction. In the first half cycle of AC Diode, D1 and D3 are forward

biased. This combination convert the positive half cycle into positive

3.4.2 FILTRATION

The output after the rectification is not a proper DC.it is oscillation output and has very high

ripple factor. A filtering capacitor is used to remove the ripple. The capacitor charge till the

waveform goes to its peak and discharge into load circuit when the waveform goes low. The

value of this capacitor can be calculated as.

3.4.3 DIODES

The output after the rectification is not a proper DC. It is oscillation output and has very high

ripple factor. A filtering capacitor is used to remove the ripple. The capacitor charge till the

waveform goes to its peak and discharge into load circuit when the waveform goes low. The

value of this capacitor can be calculated as

3.4.3 DIODES

Diodes are semiconductor devices which might be described as passing current in one direction

only. The latter part of that statement applies equally to vacuum tube diodes. Diodes however are

far more versatile devices than that. They are extremely versatile in fact. Diodes can be used as

voltage regulators, tuning devices in RF tuned circuits. Frequency multiplying devices in RF

circuits, mixing devices in RF circuits. Switching applications or can be used to make logic

decisions in digital circuits. There are also diodes which emit "light", of course these are known

as light-emitting-diodes or LED. Light emitting diodes, commonly called LED's are real unsung
heroes in the electronics world. They do dozens of different jobs and are found in all kinds of

devices. Among other things, they form the numbers on digital clocks, transmit information from

remote controls, light up watches and tell you when your appliances are turned on: Collected

together, they can form images on a jumbo television screen or illuminate a traffic light.

diode

light emitting diode

Fig 3.4: Diode


3.4.4 CAPACITOR

A capacitor is an electrical device that can store energy in the electric field between a pair of

closely spaced conductors (called 'plates'). When voltage is applied to the capacitor. electric

charges of equal magnitude, but opposite polarity, build up on each plate. Capacitors are used in

electrical circuits as energy-storage devices. Hey can also be used to differentiate between high

frequency and low-frequency signals and this makes them useful in electronic filters. Capacitors
are occasionally referred to as condensers. The capacitor‘s capacitance (C) is a measure of the

amount of charge (Q) stored on each plate for a given potential difference or voltage (V) which

appears between the plates:

C = QN ..................................... 3.0

In SI units, a capacitor has a capacitance of one farad when one coulomb of charge causes a

Potential difference of one volt across the plates. Since the farad is a very large unit, values of

capacitors are usually expressed in microfarads (HF), Nan farads (nF) or Pico farads (pF).

Capacitor networks Series or parallel arrangements Capacitors in a parallel configuration have

the same potential difference (voltage). Their total capacitance (C eq) is given by:

Ceq=Cl+C2+...+Cn............................. 3.1

The reason for putting capacitors in parallel is to increase the total amount of charge stored. In

other words. increasing the capacitance also increases the amount of energy that can be stored,

Its expression is:

Estored = l/2CV2 ............................. 3.2

The current through capacitors-in series stays the same, but the voltage across each capacitor can

be different. The sum of the potential differences (voltage) is equal to the total voltage in parallel

the effective area of the combined capacitor has increased, increasing the overall capacitance.

While in series, the distance between the plates has effectively been increased, reducing the

overall capacitance.

3.4.5 VOLTAGE REGULATOR


A Voltage Regulator (also called a "regulator") has only three legs and appears to be a

comparatively simple device but it is actually a very complex integrated circuit. A regulator

converts varying input voltage and produces a constant "regulated" output voltage. Voltage

regulators are available in a variety of outputs, typically volts, 9 volts and 12 volts. The last two

digits in the name indicate the output voltage. The "LM7805" series of voltage regulators are

designed for positive input.

F ig 3.6: Voltage Regulator

Voltage regulator

A voltage regulator LM 7805 is used to provide a regulated +Sv DC. Input voltage of the

regulator should be 2V more than the rated output voltage for proper working of regulator. (BL

Thereja, 2005). Output voltage of voltage regulator is given by

Vout: Vin -2V

Where 2v is the voltage consumed by the internal circuitry of the voltage regulator

Therefore Vin = 5+2 = 7v

3.4.6 RESISTORS
Figure 3.7: Resistor

Resistance is the property of a component which restrict c s the flow of electric current. Energy

is used up as the voltage across the component drives the current through it and this energy

appears as heat in the component. Resistance is measured in ohms, the symbol for ohm is an

omega | is qullc small for electronics so resistances are often given in k and M. The film resistor

thew resistor are made from metal oxide or small rods of ceramic-codcd metal. These are similar

t0 carbon film resistor and their resistivity is controlled by thickness of the coating layer. The

property like reliability, accuracy and stability are considerably better for these resistors. These

resistors can be obtained in wide range of resistance values (from a new ohm to millions of

ohms).
The CD4017 microcontroller is not only for technical audience but is intended for Designers and

artists well because of its focus to usability base its design which helps to achieve the intended

goal (Diakopoulos, D. & Kapur. A. 2011) it is the primary component of the framework. In

‘“which n, it is an open source microcontroller device with easily accessible software/hardware

perform and is compatible with many sensors available

3.9 BUZZER

Figure 3.12: Buzzer


A buzzer or beeper is an audio signaling device, which may be mechanical, electromechanical,

or piezoelectric. Typical uses of buzzers and beepers include alarm devices, timers and

continuation of user input such as a mouse click or keystroke. Buzzer is an integrated structure of

electronic transducers, DC power supply, widely used in computers, printers, copiers, alarms,

electronic toys, automotive electronic equipment, telephones, timers and other electronic

products for sound devices. The piezzo SFM-27-IA-12v wired siren buzzer is used for alarm.

3.3.1 Breadboard Layout


Fig 3.3.1 System Breadboard Layout

3.3.2 Veroboard Layout and soldering

3.3.3 Assembly and Casing

3.3.4 Principle of Operation


The system consists of sensor which detect any movements in this case an infrared sensor was

used when the sensor detect movement, the output data of the sensor was sent to the control

system in this case a CD4017 which activate the buzzer and some series of light emitting diode

(LED). A power supply was used to converts the high alternating voltage to low alternating

voltage and power the whole system.

3.3.5 System Circuit Diagram

Fig 3.3.5 System Circuit Diagram


CHAPTER FOUR: TESTS, RESULT AND DISCUSSION

4.1 INTRODUCTION

This chapter presents testing and calibration of the developed prototype, it also shows the

5xpcrimental set up of the test carried out and discuss on the relevance of

4.2 System Tests

The table below illustrates the results obtained.

S/N Tests Method of testing Expected outcome

1 Power Supply Test Using Digital Multimeter 5.0vDC

2 Continuity test Using Multimeter . all components

should be reading

1500 resistance

between each

power rails.
Test were conducted both The
3 System Tests circuit is
when component was laid expected to power

on the breadboard and one when its


Vero board. But the final connected to a
test conducted after the power supply.

soldering of component (on

Vero board) below are

outline of various

conducted.
4 Short-circuit tests
The system is

Using Multimeter expected not to

show any short

circuit reading.

Table 2 testing method and result

4.3 Results

By plugging the power cable and switch turns ON the power switch. The following result was

obtained.
S/N NAME OF TESTS RESULT OBTAINED

1 The transformer Test The transforming is making a

noisy because of the voltage

transformation and

converting the high voltage

Alternating current to low

voltage alternating current.

2 The system powered on


Whole system and continuity tests
instantly when the power is

connected

All the components are

reading around 1,400 in a

continuity mode tests

4.4 Result Discussion

After the power code is connected to the main 230V from our home outlet, the above results

were obtained. When the system is powered On, the system behaves just as expected. It starts

working and the sensors keep updating the data. The short circuit test was done using a

multimeter, the multimeter is set to continuity mode and the leads are connected to the leads of

the light emitting diode and measured the leads resistance. After all the tests, the results is then

obtained and its corresponded to that of expected output.


CHAPTER FIVE

SUMMARY AND CONCLUSION

5.1 SUMMARY

The construction of the system is divided into three stages as stated: power supply stage, sensor

switching stage, and Arduino connection stage. The power supply for this system is 9 V DC

battery as shown in Figure 2. It has a nominal voltage of 9 V, a discharge resistance of 620 Ω s

and a cut off voltage of 5.4 V. According to the power needed for the components of the

thickness-based traffic light control framework, supply of +5 V regarding GND is created. The

total hardware worked with TTL (Transistor-Transistor Logic) rationale dimension of 0 V to 5

V. Power applied to the Vin pin is stepped down to 5 V by the on-board regulator on the Mega.

The minimum voltage is about 6.2 V because of the regulator dropout (that is, the regulator

needs at least 1.2 V above its 5 V output in order to operate) 9 -12 V is recommended. Applying

a higher voltage to the system will not provide any more power to the Mega and its

peripherals/shields. Instead, the excess power is dissipated in the regulator as heat

5.2 CONCLUSION

The density-based traffic control system has been designed, constructed and tested to ensure

validation of its function and operations. In this research, we have succeeded in minimizing the
traffic congestions created by the fixed time-based traffic light system. The system is effective

and the cost of production is very low. Future work is recommended in order to produce the

device on a large scale and deploy to all roads in order to reduce traffic congestion in places like

Lagos where traffic congestion has become a big issue

You might also like