Department of Electrical and Computer Engineering North South University

Senior Design Project

Low Cost Multi Level Home Security System for Developing Countries Tarafder Elmi Tabassum ID# 1330144643 Tanha Islam ID# 1230541642 Nadia Mohammad ID# 1411152043

Faculty Advisor: Dr. Hasan U Zaman Professor ECE Department

Spring, 2017



LETTER OF TRANSMITAL May, 2017 To Dr. Rezaul Bari Chairman, Department of Electrical and Computer Engineering North South University, Dhaka

Subject: Submission of Capstone Project on “Low Cost Multi Level Home Security System for Developing Countries.”

Dear Sir, With due respect, we would like to submit our Capstone Project Report on “Low Cost Multi Level Home Security System for Developing Countries” as a part of our BSc program. The report deals with Multi Level Based Home Security System. This project was very much valuable to us as it helped us gain experience from practical field and apply in real life. We tried to the maximum competence to meet all the dimensions required from this report.

ii

We will be highly obliged if you kindly receive this report and provide your valuable judgment. It would be our immense pleasure if you find this report useful and informative to have an apparent perspective on the issue.

Sincerely Yours,

......................................................... Tarafder Elmi Tabassum ECE Department North South University, Bangladesh

........................................................ Tanha Islam ECE Department North South University, Bangladesh

......................................................... Nadia Mohammad ECE Department North South University, Bangladesh

iii

APPROVAL Tarafder Elmi Tabassum (ID # 1330144643), Tanha Islam (ID # 1230541642) and Nadia Mohammad (ID # 1411152043) from Electrical and Computer Engineering Department of North South University, have worked on the Senior Design Project titled “Low Cost Multi-level Home Security System For Developing Countries” under the supervision of Dr. Hasan U. Zaman partial fulfillment of the requirement for the degree of Bachelors of Science in Engineering and has been accepted as satisfactory. Supervisor’s Signature …………………………………….

Dr. Hasan Uz Zaman Professor Department of Electrical Engineering & Computer Science North South University Dhaka, Bangladesh.

Chairman’s Signature …………………………………….

Dr. Rezaul Bari Associate Professor Department of Electrical Engineering & Computer Science North South University Dhaka, Bangladesh.

iv

DECLARATION

This is to certify that this Project is our original work. No part of this work has been submitted elsewhere partially or fully for the award of any other degree or diploma. Any material reproduced in this project has been properly acknowledged.

Students’ names & Signatures

1. Tarafder Elmi Tabassum

_________________ 2. Tanha Islam

_________________ 3. Nadia Mohammad

_________________

v

ACKNOWLEDGEMENT

By kindness of the Almighty we have successfully completed our senior design project entitled “Low Cost Multi-level Home Security for Developing Countries”

Our deep gratitude goes first to my faculty advisor Dr. Hasan U. Zaman, who expertly guided us in our senior design project throughout the whole EEE499A and EEE499B. His guidance helped us in all type of research, writings and completing the project.

Our sincere thanks also goes to North South University, Dhaka, Bangladesh for giving us such a platform where we can have an industrial level experience as a part of our academics.

We would also like to thank my friends Md. Junayed Bin Alam, Fatema Zahra, Noor Al Din Ahmed for helping us in this project.

Last but not the least, we would like to thank our family as their inspiration and guidance kept us focused and motivated.

vi

Abstract With the improvement of various programmed control innovation, a home security system has turned out to be increasingly vital nowadays. This paper presents a low cost, simple, effective and novel method of implementing a multi-level home security system for developing countries. This system is a microcontroller based home security system utilizing a unique fingerprint sensor, PIR motion detector sensors, GSM module and a surveillance web camera. The system is much less expensive than customary home security systems, which gives security from different viewpoints. The goal of this research is to build a straightforward and reasonable, yet productive home security system.

vii

TABLE OF CONTENT Chapter 1 ....................................................................................................................................................................... 1 Overview ........................................................................................................................................................................ 1 1.1

Introduction ................................................................................................................................................. 2

1.2

Project Description ..................................................................................................................................... 2

1.3

Purpose Of The Project .............................................................................................................................. 2

1.4

Project Goal ................................................................................................................................................. 3

1.5

Summary...................................................................................................................................................... 4

Chapter 2 ....................................................................................................................................................................... 5 Existing Systems ........................................................................................................................................................... 5 2.1

Introduction ................................................................................................................................................. 6

2.2

Similar Existing Systems ............................................................................................................................ 6

2.3

Summary.................................................................................................................................................... 10

Chapter 3 ..................................................................................................................................................................... 11 System Design ............................................................................................................................................................. 11 3.1

Introduction ............................................................................................................................................... 12

3.2

System description .................................................................................................................................... 12

3.2.1

External part ......................................................................................................................................... 12

3.2.2

Internal part .......................................................................................................................................... 12

3.3

System Design ............................................................................................................................................ 13

3.3.1

Internal part .......................................................................................................................................... 14

3.3.2

External part ......................................................................................................................................... 16

3.4

Summary.................................................................................................................................................... 18

Chapter 4 ..................................................................................................................................................................... 19 Technical Description ................................................................................................................................................. 19 4.1

Introduction ............................................................................................................................................... 20

4.2

System Description ................................................................................................................................... 20

4.2.1

Fingerprint Sensor ............................................................................................................................... 20

4.2.2

PIR sensor ............................................................................................................................................. 21

4.2.3

Buzzer .................................................................................................................................................... 23

4.2.4

Communications ................................................................................................................................... 23

4.2.5

Door Lock………………………………………………………………………………………………24

4.2.6

Relay ...................................................................................................................................................... 25

4.2.7

Keypad ................................................................................................................................................... 25 viii

4.2.8

LCD keypad Arduino shield ................................................................................................................ 25

4.2.9

Veroboard ............................................................................................................................................. 26

4.2.10

Arduino Uno ......................................................................................................................................... 27

4.2.11

Webcam ................................................................................................................................................. 28

4.2.12

Arduino Mega ....................................................................................................................................... 28

4.3

Summary.................................................................................................................................................... 29

Chapter 5 ..................................................................................................................................................................... 30 Design Implementation .............................................................................................................................................. 30 5.1

Introduction ............................................................................................................................................... 31

5.2

List of necessary hardware components ................................................................................................. 31

5.3

Principle of operation ............................................................................................................................... 32

5.3.1

External part ......................................................................................................................................... 32

5.3.2

Internal part .......................................................................................................................................... 34

5.4

Summary.................................................................................................................................................... 35

Chapter 6 ..................................................................................................................................................................... 36 Cost of Implementation .............................................................................................................................................. 36 6.1

Introduction………………………………………………………………………………………..………37

6.2

Cost of Implementation.…...………………………………………………………………………………37

6.3

Summary……………….…………………………………………………….……………………….……38

Chapter 7 ..................................................................................................................................................................... 39 Results & Analysis ...................................................................................................................................................... 39 7.1 Introduction ...................................................................................................................................................... 40 7.2 Results & Analysis ............................................................................................................................................ 40 7.3 Summary ........................................................................................................................................................... 42 Chapter 8 ..................................................................................................................................................................... 43 Compliance with standards ....................................................................................................................................... 43 8.1

Introduction…………………………………….…………………………………………………………44

8.2

Compliance with IEEE standard..........................................................................................................….44

8.3 Compliance with US standard……………………………………………………………...............…....45 8.4 Compliance with European standard………………………………………………………………...…47 8.5 Summary…………………………….………………………………………………………………….…47 Chapter 9 ..................................................................................................................................................................... 48 Design Impact ............................................................................................................................................................. 48 9.1 Introduction…………………………………………………………………………………………………....49 9.2 Economic Impact………………………………………………………………………………………………49 9.3 Social Impact…………………………………………………………………………………………………. 50 9.4 Political Impact………………………………………………………………………………………………..50 ix

9.5 Health and Safety Impact………………………………………………………………………………….….51 9.6 Environmental Impact………………………………………………………………………………………...51 9.7 Ethical Impact………………………………………………………………………………………………....51 9.8 Manufacturability……………………………………………………………………………………………. 51 9.9 Sustainability………………………………………………………………………………………………… .52 9.10 Impact in Real Life…………………………………………………………………………………………. 52 9.11 Summary……………………………………………………………………...……………………………...55 Chapter 10………………………………………………………………………………..……………………..….. 56 Conclusion.................................................................................................................................................................. 56 Chapter 11………………………………………………………………………………..……………….…………59 Future work …………………………………………………………………………………………………………59 11.1 Introduction …………………………………………………………………………………………………60 11.2 Future Planning…………………………………………………………………………………………….. 60 11.3 Method of Productization & Marketing……...……………………………………………………………61 11.4 Situation of current security concerns around the world………………………………………...………62 11.5 Summary……………………………………………………………………………………………………. 63 Bibliography ................................................................................................................................................................ 64 Appendices .................................................................................................................................................................. 67 Appendix A ………………………………………………………………………………………….………………68 Appendix B……………………………………………………………………………………………….………… 74 Appendix C……………….…………………………………………………………………………………..…..… 96

x

List of Figures Fig. No.

Figure caption

Page No.

1.1

A protected home

3

2.1

Fingerprint based door lock

7

2.2

GSM based burglar alarm

8

2.3

GSM based alarm

9

2.4

Password based home security system

10

3.1

Complete design of the system

13

3.2

Design of internal part

15

3.3

Working Procedure of fingerprint based door lock

17

4.1

FPM10A fingerprint module

21

4.2

Setup for PIR sensor

22

4.3

5-volt Buzzer

23

4.4

SIM GSM 900 shield

24

4.5

Electric Door lock

25

4.6 4.7

Function of LCD keypad display Setup for Vero board

26 27

4.8

Arduino Uno setup

28

4.9

Arduino Mega setup

29

5.1

Structure of external part

33

5.2

Structure of internal part

34

7.1

Layout of the external part

40

7.2

Messaged received by owner of the system

41

7.3 9.1 11.1

Layout of whole system Home surveillance on phone via CCTV camera The global market for CCTV well outpaced the combined markets for access control and intruder alarm systems Asia represents the largest share of the worldwide CCTV market, followed by the Americas and Europe.

42 53 62

11.2

63

xi

Chapter 1 Overview

1

1.1 Introduction Technology is developed by people to improve the quality of human lives. In this modern age, all are using technological advances in many different ways. One of these ways is security system. Home Security System is an important feature for both the modern residential and office setups.

1.2 Project Description Many people overlook, ignore, and underestimate the need of taking appropriate home security measures. A burglary or theft can lead to devastating consequences, both emotionally and financially. While the financial loss may be recoverable, the trauma inflicted on one’s family may last forever. This loss is not worth the risk. That is why we made this system for maximum security. Choosing a security system for home is probably the trickiest part of the whole process. Since there are so many companies out there, selecting the best one can be difficult. Moreover, not all company has a system, which is low cost based and has several features to provide maximum security.

1.3 Purpose Of The Project It is paramount for home security systems to be affordable, genuine and effective at the same time in this fast moving competitive world. In this omnipresent network society, individuals can access their information easily anytime and from anywhere. On the other hand, they face the risk that others can also hack into their personal and sensitive information from anywhere and anytime. Due to this risk, personal identification technology easily can differentiate between registered authorized users and imposters, is now generating great interest among people.

2

Generally, for the sake of security purposes, passwords, PIN verification, identification card techniques are being used currently but the disadvantage is that the passwords can be hacked or guessed and a card may be stolen or lost. This paper describes the implementation of different features in one home security system, which provides home security in every possible way. From keeping track and record of the intruder from the very first step inside the house until to notify the owner is ensured in this system.

1.4 Project Goal There is no such family, who does not want their home to be safe when they are away from it. They always want it out of harm’s way. When people leave for work or study, they expect to go back home that is secure and in the same way they left it. The growing crime rates across cities are reflecting bitter reality now a day.

Fig. 1.1. A protected home

3

Therefore, we have few goals set initially which we achieved success upon completing the project. We tried our hard best to achieve the goals while upgrading the system when needed. We came up with new and more improved plans for the betterment of the system. Goals are mentioned below, •

Low cost based system to provide highest security.



Protecting against intrusion.



Multi leveled security.



24*7 securities.



Tension free when away from home.



Admin-User panel for door access.



User-friendly.



Budget- friendly.

1.5 Summary In this chapter, we discussed the importance and the goals of our project. In our society, peoples are always concern for their family. By securing home, people can remain outside or sleep at home peacefully. Installing a smart and powerful home security system can solve all the security problems. Especially in developing countries, home security system is essential to monitor or safe guard the house and to keep people in peaceful mind without worrying about the security of their property.

4

Chapter 2 Existing Systems

5

2.1 Introduction Installing a home security system can be costly but installing no security system can cost even more. The biggest reason to have a security system is for protecting family member from intruder. Our system will include 4 different security measurements which will provide the highest security possible. We are introducing a security system with fingerprint door lock, a monitoring cc camera, motion detectors and a burglar alarm. The fingerprint door lock is basically based on a fingerprint sensor which will help to restrict the entry and with a LCD display it shows who is entering into the house, also stores the entry on Arduino SD card shield. We are going to use a webcam to record if anyone tries to enter the house putting wrong fingerprint. Besides it, we want to place motion detector in every room so that if the door lock doesn't work or someone breaks into the house, then this motion detector will detect the movement and ring alarm as burglar alarm. This alarm will ring to notify the neighbors or surroundings.

2.2 Similar Existing Systems There are many existing papers related to home security systems as individual devices or few limited features but none comes with a great combo in such low cost. B. Anubala et.al proposed a fingerprint recognition system, which performs verification where the system compares an input fingerprint to the enrolled fingerprint of a specific user to determine if they are from the same finger. It also has servomotor to open door lock, GSM to send text to the authorized person along with a snap taken by the camera but the project does not have the burglar alarm, which is an important feature [1]. Mary Lourde R and Dushyant Khosla proposed a system, which identifies the fingerprint, which is not sufficient for a home security system [2].

6

Subhankar Chattoraj, Karan Vishwakarma proposed a well-planned system which has servo motor to open door lock after scanning fingerprint, LED to display text, buzzer to make surroundings aware but it lacks camera [3].

Fig. 2.1.Fingerprint Scanner Door Lock Sadeque Reza Khan Et.al proposed a home security system, which detects obstacle, touch, heat, smoke, sound. A PIC microcontroller 16F76 controls the whole system. It collects information from the sensors and sends SMS to a corresponding number by using a GSM module [6]. Nathan David et.al proposed a low cost and flexible home control and environmental monitoring system, which employs an embedded micro-web server in an Arduino Mega 2560 microcontroller with IP connectivity for access and control remotely. Their project has very good features but still lacks to provide full security of home [7]. 7

Fig. 2.2. GSM Based Burglar Alarm Viraj Mali et.al proposed a home automation and security system which is low cost by using motions sensors, PIR sensors and GSM where Arduino will trigger an alarm and alert messages will be sent to user’s mobile via GSM module [8]. N. Sriskanthan and F. Tan Karande developed a home automation system based on Bluetooth wireless technology, which allows the user to monitor and control different appliances connected 8

over a Bluetooth in home environment. This system is complicated for vast usage and has some limitations for which it cannot provide full home security system in low cost [10].

Fig. 2.3. GSM based alarm Bhavani Annapurna et.al developed a system which is a password based digital lock where an access control system allows authorized persons to access a restricted area and the RF wireless communication technology transmits theft indication signals to the neighboring houses [11].

9

Fig. 2.4. Password based home security system

2.3 Summary In this chapter, we discussed about the similar systems that are being invented before by researchers or that are already existing in the society and being sold in markets for higher prices. There are various kinds of home security systems, which are mainly invented to get one’s life highest, secured and costs a good amount of money. These home security systems are focused on various features and all these feature are made to ensure the right security for the owner of the systems. Sometimes a system may not have all the features that one needs.

10

Chapter 3 System Design

11

3.1 Introduction This system is designed to make the life of the house owner easier and safer. The design of the system will protect both the property inside and outside of the house. If there is any kind of disturbance and unwanted person trying to get into the home while none of the house members are present into the home, this system is enough to protect the house and informing the abnormality going on to the owner of the house. Such features make the system multi leveled and unique at the same time.

3.2 System description The system is divided into two parts. They are external part and internal part. Both the parts are described in details below:

3.2.1 External part This part contains a fingerprint sensor, door lock, LCD keypad shield, keypad and a webcam. Here, keypad and fingerprint sensor are the inputs of the system. Webcam, door lock and LCD keypad shield are the outputs of the system. This part works using Arduino Uno microcontroller. It is a fingerprint based door lock to restrict the entry of unwanted visitors. Besides, to enhance the level of security, we have used a webcam to monitor the house.

3.2.2 Internal part This part contains PIR motion detector sensors, GSM shield, buzzer and lights. We have used an Arduino Mega microcontroller for the internal mechanism. Here, PIR sensors are used to detect any unwanted movement inside the house. If the sensors find any interruption, immediately the lights turn on automatically and trigger the buzzer. At the same time, the GSM (Global System for

12

Mobile communication) module sends an SMS instantly to the owner to notify the unwanted movement inside the house.

3.3 System Design In this section, total block diagram of the system including all the subsystems shown in fig. 3.1. We have designed the system in such a way that makes it unique from all other systems available in the market. Fig. 3.1. explains in brief how the system was made in initial step.

Fig. 3.1. Complete design of the system 13

3.3.1 Internal part The internal system is designed with switch, PIR motion detector sensors, GSM module, buzzers and lights. The internal part is designed into Arduino mega microcontroller. Switch is used to turn on inside the home and when it is turned on the internal part is activated. Whenever the owner and the all the person will leave the home, they have to turn on the switch and then have to leave the home. When the switch is turned on the internal part is on activated mode if anyone tries to break or any unwanted movement is there inside the home. PIR sensor detects the living things (warm bodies) motion. PIR sensors are attached in the corners of the room. PIR sensors will immediately detect the movement and will send the signal to the Arduino mega microcontroller. After receiving the processed signal three things will happen which are: i) Buzzer works as an alarm device ii) Lights of the rooms will get turned on iii) GSM module sends SMS to the owner

14

Fig 3.2. Design of the Internal Part

The LED lights blink and the alarm immediately starts to buzz for three seconds with intervals to aware the surroundings. The respective lights of the certain rooms also get turned on. After the buzzer is triggered, GSM sends an SMS to the owner to notify immediately. Therefore, at the same time, neighbors and the owner of the house get to know if there is anyone in his home without his absence. Design of the internal part is shown in the Fig. 3.2.

15

3.3.2 External part The external system is designed with fingerprint module, door lock, LCD display, LCD shield and a webcam. The external part is implemented into Arduino Uno. The system is designed by FPM10A fingerprint module .The user can store around 200 fingerprint images, coverts it into a numerical algorithm and stores it in the database in this system. The door is unlocked when authentic fingerprint is detected by the fingerprint sensor and signal is sent to the Arduino Uno is accepted as authentic. If the fingerprint is unauthentic then the signal will send to the Arduino Uno. When the system starts, it shows ‘Fingerprint Door Lock system’ on LCD screen after 3 seconds it shows the menu with options named ‘1. Admin and 2. User’. Admin option is for the owner of the system who can manually add or delete the fingerprints. In a word, owner controls the entry of the house and initialization of the device. After saving the fingerprint by the owner, it goes to the user option, which can be operated by all of the people in the house or outside. Admin option is secured with a specific password which only admin can access with password. When the owner tries to access the ‘Admin’ option, he/she has to put the password using keypad to get into the next menu. If the password is correct, it shows ‘Matched’ on the LCD screen or else it shows ‘Incorrect’. After getting into the next menu, LCD display shows another menu bar ‘1. Add fingerprint and 2. Delete fingerprint’. New fingerprint is added with a specific code. Again, the owner can delete any stored fingerprint from the device.

16

Fig. 3.3. Working procedure of fingerprint based door lock

All the authorized persons’ fingerprints can be saved into fingerprint sensor memory. Whenever an authorized person attempts to unlock the door, he/she has to select the second option which is ‘2.user’. Immediately ‘put your finger’ appears on the LCD screen and then the person has to put their finger on the fingerprint sensor. It compares the fingerprint with the stored data in the system. When it is accepted by the system, it displays a pre-programmed ‘Welcome Home!’ message on the LCD screen and the door unlocks. Otherwise, for a random fingerprint, it shows ‘not accepted’ message on the LCD screen and door remains locked. The system has webcam to monitor the entrance area 24/7. It is placed on the top of the door so that it is able to record every entry.

17

3.4 Summary In this chapter, we have discussed how the main parts of the system works for a better understanding of the system. The system is designed into two main parts, the internal part and external part. We have discussed both the parts of the system in this chapter. The internal system is designed in such a way that it will protect the whole area inside the house. This internal part consists of few features, which provides the owner to ensure security inside the home. The external system is designed in such a way that it will cover the outside part of the house. It monitors 24*7 of the activities taking place outside of the house and provides the access of the home. The camera outside the house makes aware to people who think of doing unethical activities with someone else’s property. Our system lets an individual keep an eye on their property and provides smartphone alerts whenever there’s motion detected inside the house.

18

Chapter 4 Technical Description

19

4.1 Introduction In this chapter, we will discuss about the components used for technical functions of this project. The technical description of our project will be discussed in this section. As our project comes with different types of features, we will discuss them one by one along with their roles in this project.

4.2 System Description The entire multi-level system consists of several components which supports the project to be useful in all aspects. The components are described below for the better understanding of the project:

4.2.1 Fingerprint Sensor Fingerprints are unique. We could use a passcode system for the entrance security, but as fingerprints are more secure, we have used the fingerprint sensor. The fingerprint scanner can store different fingerprints and the database of prints can even be downloaded from the unit and distributed to other modules. As well as the fingerprint “template,” the analyzed version of the print, you can also retrieve the image of a fingerprint and even pull raw images from the optical sensor. We have used FPM10A fingerprint module (shown in Fig. 4.1) for our project. We have connected our fingerprint module to an Arduino Uno. The fingerprint scanner captures the fingerprint image, converts it into a numerical algorithm and stores it in the database.

20

Fig. 4.1. FPM10A Fingerprint Module

4.2.2 PIR Sensor PIRs are basically made of a pyro electric sensor (which you can see above as the round metal can with a rectangular crystal in the center), which can detect levels of infrared radiation. Everything emits some low level radiation, and the hotter something is, the more radiation is emitted. The sensor in a motion detector is actually split in two halves. The reason for that is that we are looking to detect motion (change) not average IR levels. We have used PIR sensors to ensure security when the owner is out of home. The PIR (passive infrared sensor) detects motion through heat detection. When warm bodies like a human or animal passes by, it first intercepts

21

one-half of the PIR sensor, which causes a positive differential change between the two halves and vice versa[4]. It detects movement in 120-degree direction up to 7 meters. We could have chosen ultrasonic sensors but it detects every particle in motion but we need a sensor, which can only detect human’s movement. Each room has a PIR sensor attached in the ceiling. The setup is shown in Fig. 4.2.

Fig. 4.2. Setup for PIR sensors

22

4.2.3 Buzzer A buzzer works as an audio signaling device for alarm devices. In our project, we have previously used a 5-V buzzer, which was implemented to get an output. If any intruder enters in the home is detected by the PIR motion sensors. The normal buzzer alarms would not be heard from far clearly, which is required for the system. That is why we have used the 5-V speaker as alarm, which is compatible with the Arduino.

Fig. 4.3. 5-Volt Buzzer

4.2.3 Communications GSM shield is used to communicate with the owner if any intruder breaks into the house. PIR sensors detect the intruder’s warm body and GSM shield is implemented with Arduino in this system to send a text message to the owner of the house to a desired or pre-set number. GPRS module is a breakout board and minimum system of SIM900 Quad-band/SIM900A Dual-band GSM/GPRS module. It can communicate with controllers via AT commands. This module supports software power on and reset. 23

Fig. 4.4. SIM 900 GSM shield

We have used SIM 900 GSM SHEILD in the system which was placed on the Arduino. We have firstly used the A6 GSM MODULE which had few drawbacks such as poor signal, not being able to send SMS in real time, delay or no response etc. For the betterment of the system, we have used SIM 900 GSM shield (shown in Fig. 4.4), which has better functionality and real time response with no delay at all.

4.2.4 Door Lock We have used a 12-volt solenoid electric door lock in this project. When the fingerprint sensor detects a registered fingerprint and sends signal to the Arduino Uno to unlock the main door of the house.

24

Fig. 4.5. Electric door lock

4.2.5 Relay Relay is a switch. We have used relay in this system to maintain the voltage level between Arduino Uno and electric door lock. Arduino Uno passes 5-volt voltage but door lock needs 12 volts to turn on. Relay solves this issue in the system.

4.2.6 Keypad We have used keypad to add more security to the system. When owner adds his or her fingerprint, or wants to delete the previously saved fingerprints, this keypad is used to access and keep that information secured through a specific password. We are using 4x4 matrix membrane keypad. This keypad is connected to the Arduino Uno and attached to main door of the house.

4.2.7 LCD keypad Arduino Shield LCD keypad Arduino shield is mainly developed for Arduino compatible boards, which gives a friendly interface so that any user can use it without any hassle. We have used LCD 25

keypad Arduino shield in this system to show the several menus of the fingerprint mechanism. The user can easily understand the functions after putting the fingerprint on the fingerprint modules. We have used 16x2 LCD keypad shield. The functions of the LCD display are shown in Fig. 4.6.

Fig. 4.6. Function of LCD keypad display

4.2.8 Veroboard Vero board is a brand of strip board, a pre-formed circuit board material of copper strips on an insulating bonded paper board which was originated and developed in the early 1960s by the Electronics Department of Vero Precision Engineering Ltd (VPE). We have replaced the internal part’s initial setup with Vero board, which minimizes the wiring hassles. Vero board along with minimizing the long wires also helps to avoid the wire connections being loose. The Vero board connects the buzzer and LED lights to motion sensors. The setup is shown in Fig. 4.7. for the better understanding of how the Vero board was set up.

26

Fig. 4.7. Setup for Vero Board

4.2.9 Arduino Uno The Arduino Uno is a microcontroller board based on the ATmega328 (datasheet). It has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz crystal oscillator, a USB connection, a power jack, an ICSP header, and a reset button. We have used it because it is reasonable and user friendly. The external part is Arduino Uno based which is shown in Fig. 4.8.

27

Fig. 4.8. Arduino Uno Setup

4.2.10 Webcam We have used the webcam to monitor the entrance area 24/7. We have placed the webcam on the top of the door so that every entry is recorded. It also delivers an excellent image, clear audio, practical smart-home integration.

4.2.11 Arduino Mega The Arduino Mega is a microcontroller board based on the AT mega 1280. It consists of fifty-four input/output pins that helped us to implement the system smoothly according to our

28

need. We have used the Arduino Mega in the burglar alarm system. We could use Arduino Uno but it has limited pins. All the PIR sensors are connected to the Arduino Mega using Vero board. Whenever the PIR sensors in the rooms detect any motion, a signal is sent to the Arduino Mega. Then it sends the signal to the LED light pin set up in the rooms as well as the buzzer pin. The buzzer pin lights begin to blink and immediately the alarm starts to buzz for three seconds with intervals. Arduino mega setup is shown on Fig. 4.9.

Fig. 4.9. Arduino Mega setup

4.3 Summary In this chapter, we have discussed the components, their features and how they have played vital roles respectively to make the project a perfect one. We have discussed every single component and their reasons for using. We have discussed about fingerprint and PIR sensor, buzzer, door lock, relay, keypad, GSM shield, keypad, LCD shield, Vero board, Arduino UNO & Mega, webcam etc. We have used reasonable components and that is the most interesting part of the project. 29

Chapter 5 Design Implementation

30

5.1 Introduction In this chapter, we will discuss about the design of the technical functions of the project. Implementation is the action that must follow any preliminary thinking in order for something to actually happen. Our project features required perfect design implementation in order to run in harmony with other features. We have discussed the entire design implementation in this part.

5.2 List of necessary hardware components •

LCD display



Keypad



Relay



Door lock



Wires



Arduino UNO



Arduino Mega



4 PIR sensors



4 lights



Vero board



Buzzer



Breadboard



GSM shield SIM 900



FPM10A



SIM card



Webcam 31



Power bank



Adapter etc.

5.3 Principle of operation There are two parts of the whole system. Each part has some principles for working properly and they are described below:

5.3.1 External part This part is an Arduino Uno based which includes a fingerprint based door lock and a webcam. When the system starts, it shows ‘Fingerprint Door Lock system’ on LCD screen after 3 seconds it shows the menu with options named ‘1. Admin and 2.User’. Admin option is for the owner of the system who can manually add or delete the fingerprints. In a word, owner controls the entry of the house and initialization of the device. After saving the fingerprint by the owner, it goes to the user option, which can be operated by all of the people in the house or outside. Admin option is secured with a specific password which only admin can access with password. When the owner tries to access the ‘Admin’ option, he/she has to put the password using keypad to get into the next menu. If the password is correct, it shows ‘Matched’ on the LCD screen or else it shows ‘Incorrect’. After getting into the next menu, LCD display shows another menu bar ‘1. Add fingerprint and 2. Delete fingerprint’. New fingerprint is added with a specific code. Again, the owner can delete any stored fingerprint from the device.

32

Fig. 5.1. Structure of external part

All the authorized persons’ fingerprints can be saved into fingerprint sensor memory. Whenever an authorized person attempts to unlock the door, he/she has to select the second option which is ‘2.user’. Immediately ‘put your finger’ appears on the LCD screen and then the person has to put their finger on the fingerprint sensor. It compares the fingerprint with the stored data in the system. When it is accepted by the system, it displays a pre-programmed ‘Welcome Home!’ message on the LCD screen and the door unlocks. Otherwise, for a random fingerprint, it shows ‘not accepted’ message on the LCD screen and door remains locked. The entire working procedure is explained in the external part.

33

There is a camera installed in the house which monitors 24/7 surveillances and saves in desired storage.

5.3.2 Internal part The second part is Arduino Mega Controlled Burglar alarm system with GSM shield. This part’s function is to detect intruder when the owner of the house is outside and notifies him/her immediately via SMS or call.

Fig. 5.2. Structure of internal circuit Each of the rooms has PIR sensors and lights attached to the ceiling. Whenever an intruder tries to break into the home, PIR sensor senses the disturbance and sends a signal to the Arduino Mega. The LED lights blink and the alarm immediately starts to buzz for three seconds with intervals to aware the surroundings. The respective lights of the certain rooms also get turned on. 34

After the buzzer is triggered, GSM sends an SMS to the owner to notify immediately. Therefore, at the same time, neighbors and the owner of the house get to know if there is anyone in his home without his absence. The overall design of internal part is shown in Fig. 5.2.

5.4 Summary In this chapter, we have discussed the design of our project and how we achieved it with proper implementation. This process helped us to achieve more than we expected. We have used both Arduino Uno and mega to make the whole project handier. The whole project can work individually or can be attached together. We have merged both the systems for the betterment of the project and also to make it multi leveled system.

35

Chapter 6 Cost of Implementation

36

6.1 Introduction The components used, their prices and the techniques involved in making the system work are the key factors in making a project work. Initially when we planned our system, we listed down the things which were needed initially and as time passed we added more components to it. Initially we made a costing list along with the components name but later on we could cut cost from our initial costing comparing with different shops where our components were available. We also got few components, which did not last long or were not perfect for the project.

6.2 Cost of Implementation Here is our total cost, which occurred for the implementation of the project. We tried our best to reduce the cost as much as possible. We are successful to implement our planned system within a limited cost, which adds a great value to the system. Table 6.1 illustrates the name of the required components name, quantity, and the price.

Materials

Quantity

Price(taka)

Arduino(UNO & Mega)

3

1950

Fingerprint module

1

3217

LCD display

1

206

Door lock

1

720

Webcam

1

1300

Battery

1

311

Memory card

1

900

PIR sensors

1

189

Piezo Buzzer

1

180

37

Arduino compatible SD card shield

1

1200

Breadboard

2

190

LEDs, Resistors, Transistors

-

100

Papers, Colors, Cardboards

-

1000 Total: 13000

Table 6.1. Total Costing Breakdown

6.3 Summary In this chapter we have discussed what was our costing regarding initial plan and the final plan, how we could reduce the costing after research in the local markets to keep a minimum costing for the system.

38

Chapter 7 Results & Analysis

39

7.1 Introduction In this section, we will talk about the results we obtained, and its analysis. This shows how we obtained our results and what was our findings regarding the project. We will also discuss how we analyzed our project for the betterment of it.

7.2 Results & Analysis After the analysis of our system individually, we have seen the project works perfectly. Which means, we have effectively implemented the prototype of the entire system, which we planned initially. The whole system has two main parts and we combined them to make the system more efficient. In Fig. 7.1, it is shown how the external part works. It controls the access to the house. Only owner of the house can access the Admin option. The external part here consists the LCD shield which has a display to which makes the device more handy and friendly.

Fig. 7.1. Layout of the external part

40

The PIR sensors are installed inside which detect abrupt changes in temperature and the alarm triggers to notify the surrounding. At the same time, the respective lights get turned on inside the room. The GSM module is installed at home in a secured place also informs the designated person via SMS in real time. In Fig.7.2 it is shown what the message is received by owner when PIR sensors sense any movement.

Fig. 7.2. Message recieved by owner of the system

The whole system is implemented in a layout shown in Fig. 7.3. This is a prototype of a twostoried building. Our internet part’s circuit box is placed inside it and 3 sensors and lights are placed on the corners of it. The sensors are connected with GSM module. The internal part activates when unwanted movement is detected. The main door of the house has a fingerprint sensor, LCD keypad shield and door lock. The webcam is placed on the top of the door in the

41

entrance. The external part activates when someone tries to enter the house through the main gate and uses the door lock.

Fig. 7.3. Layout of the model of setup.

7.3 Summary In this chapter, we have discussed the result and analysis of our system. The results obtained are discussed in this chapter and we sew that our method improved the entire system. We have also discussed how the internal part and the external part was working properly and gave perfect output better than we expected.

42

Chapter 8 Compliance with standards

43

8.1 Introduction In this chapter we will discuss the various comparisons of standards with our system, such as IEEE standard, US standard and the European standard. In general, compliance means conforming

to

a

rule,

such

as

a

specification,

policy,

standard or

law.

Regulatory compliance describes the goal that organizations aspire to achieve in their efforts to ensure that they are aware of and take steps to comply with relevant laws, polices, and regulations.

8.2 Compliance with IEEE standards The establishment of electrical and hardware particular architects guidelines companionship (IEEE-SA) is an association inside IEEE that develops worldwide principles for claiming industries, including: control systems, renewable energy, biomedical health care, data engineering. Furthermore robotics, telecommunication and also home automation, transportation, nanotechnology. Our project concerns home automation hence we look at standards that relate to the IEEE standards concerned with home automation. Home automation or smart home (also known as domotics) is building automation for the home. It involves the control and automation of lighting, heating (such as smart thermostats), ventilation, air conditioning (HVAC), and security. The IEEE standard IEEE 802.6 that is relevant to our project applies to Standards for information exchange between systems which was detecting through sensors and sending text to the owner using GSM Module. IEEE 1451 is a set of smart transducer interface standards developed by the Institute of Electrical and Electronics Engineers (IEEE) Instrumentation and Measurement Society’s Sensor Technology Technical Committee describing a set of open, common, network-independent communication interfaces for connecting transducers (sensors or actuators) to microprocessors, 44

instrumentation systems, and control/field networks. This applies to all our sensor systems we have used in the project. IEEE standard 802.15.4 intends to offer the fundamental lower network layers of a type of wireless personal area network (WPAN) which focuses on low-cost, low-speed ubiquitous communication between devices. 802.21 is an IEEE standard published in 2008. The standard supports algorithms enabling seamless handover between networks of the same type as well as handover between different network types also called Media independent handover (MIH) or vertical handover. Our system manages to maintain the mentioned standards and meet with IEEE code.

8.3 Compliance with US standards Alarm management with a guideline EEMUA191 and a US standard ANSI/ISA18.2–2009 relets to the need of it and the overview, and is the recent trend of IEC for setting an international standard. The ANSI/CEA-709.5 Implementation Guidelines define the application layer requirements for interoperable devices and how they share key information, status, and data across an open control network. Typically deployed on an ANSI/CEA-709.1 LonWorks® protocol network, these application elements define how to interact with disparate devices from multiple vendors in the same system. This significantly improves the system installation time and integration of typical home and building systems by defining units, range and resolution, configuration, and enumeration requirements along with device self-documentation information within the standard. The new standard now enables other transports the option of adopting a common application layer element description library.

45

The ANSI/CEA-709.6 Application Elements build upon the ANSI/CEA-709.5 Implementation Guidelines by providing a catalog of more than 100 common device profiles, with more than 380 specific implementation options. These profiles define the mandatory and optional design requirements for standard data variables, standard configuration properties, enumeration types, and standard interface file requirements. This library of device profiles includes definitions for a broad collection of devices for HVAC, indoor and outdoor (roadway) lighting, security, access, metering, energy management, fire and smoke control, gateways, commercial and industrial I/O, gas detection, generators, room automation, renewable energy, utility, automated food service, semiconductor fabrication, transportation, home appliances, and others. Enabling the burgeoning home control market are a range of wireless communications standards that give security systems the ability to control thermostats, video cameras, door locks and other devices. Today these standards include Z-Wave, ZigBee, Bluetooth and Wi-Fi. Manufacturers build communications capability into their products based on which option they believe is best suited to the task at hand. Home industry has expanded with an ever growing number of devices and services, companies are placing bets on which wireless protocols will dominate. The past few years the leaders have been Z-Waveand ZigBee.

Companies

are

also

using

a

variety

of

other

standards

including Crestron’s Infinet, Insteon, and proprietary technologies such as Lutron’s Clear Connect. The popular ZigBee and Z-Wave short-range wireless technologies have proven ideal for the kinds of home-area networks that are becoming prevalent. Based on the IEEE’s 802.15.4 personal-area network radio standard, ZigBee is an open wireless standard. Z-Wave was developed by Zensys (later acquired by Sigma Designs) as a proprietary wireless standard. It’s

46

estimated that more than 500 consumer home control products are sold at Home Depot and Lowes. Our project compliances with these various types of standards mentioned.

8.4 Compliance with European Standard GSM (Global System for Mobile Communications, originally Group Special Mobile), is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe technologies for second generation digital cellular networks. EHS (European Home System) developed EHSA (European Home System Association) derives from the European project ESPRIT (European Strategy Program for Research & Development in Information Technologies) were experts from several companies, with government collaboration, define the way that electrical devices can communicate between them, using every kind of media available. It’s an open standard that requires a product certification. Even though progress on international standards is relatively slow, participation is important for the exchange of ideas among home automation developers world-wide. The specification of application models may promote product interoperability. This may be more worthwhile than the current focus on protocols, which is encouraging protocol competition. Such competition is wasting resources, confusing potential market players, and delaying the home automation industry. The primary objective of companies and organizations in home automation should be to stimulate consumer interest, which will result in a flourishing industry.

8.5 Summary In this chapter, we examined the different standards of rules regulations for transportation, and how it compared to our own Home Security System. We have shown how our system follows all the standards, IEEE, USA standards and UK standards.

47

Chapter 9 Design Impact

48

9.1 Introduction In this chapter we will discuss about the impact of our design on environment, politics, economic

aspect and health issue that we could face. We will discuss the implications of our design on every aspect individually. We will discuss how it effects the economy and society and also the personal benefit. Our system does the followings: reduction in insurance premiums, opportunity cost[14]of police presence, increase in tourist income and tourist employment, decrease in longterm health costs (due to the reduction in victim-hood and an increase in psychological wellbeing), reduction in the carbon cost of crime, Less people who feel forced to move to another home, reduction in costs of securing void areas. Major impacts are described below:

9.2 Economic Impact Security measures intend to increase the level of security, deterring crime, and/or at least mitigating the negative economic impact of crime. In essence, they increase actual and/or perceived risk to the offender and his or her effort, changing the behavior of the criminal. Put differently, anti-crime security measures positively influence the costs of crime. To make the concept of benefits of security measures more concrete, the following equation calculates the net benefit of a measures given estimates of its impact on crime and its costs as per this equation: NB = [RISK] x [Reduction of

]-

(1)

where:



NB is the annual net benefit of a security measures



RISK is the likelihood of an event realizing X Impact.

49



Reduction of

is the impact of the security measure in terms of percent risk

reduction. •

are the estimated cost of the security measure (annually)

While paying a monthly monitoring fee may make little financial sense, finding a service that provides one peace of mind is invaluable.

9.3 Social Impact The social impact that surveillance may have on human’s lives is highly dependent upon existing social relations, identities and cultural traditions. Our system is designed in such a way that people will think twice before breaking into someone else’s house. They will always know that they are under surveillance. At the same time, however, everyone from the society are not passive subjects of social structures and technological processes. By evading, negotiating and resisting surveillance regimes, citizens can shape surveillance practices and technologies in novel and unanticipated ways.

9.4 Political Impact If political leaders and politicians accept the idea and design implementation of our system, they have enough power to implement it in the society for the betterment of the nation. They can also create awareness for it and have a good vibe in the nation.

50

9.5 Health and Safety Impact Our system is designed in such a way that it has no negative impact on a person’s health. It has a very positive impact on a nation’s safety. Our multi layered system provides security in every possible way to protect ones valuable things along with their life. Our system provides both indoor and outdoor security. The measurements which were followed while making the system makes it strong and unique than any other system available in the market.

9.6 Environmental Impact Each home has its own mini environment and maintaining it is extremely important for getting the best living experience. As the owner one must realize about the environmental impacts of the devices or systems he or she is using. Our system does not in any way bring harm to the environment and proved to be effective to deter the issues associated with the house where it is installed.

9.7 Ethical Impact Regarding issues based on ethics, this product does not hamper any sort of ethical or moral codes as it is clearly based on positive outcomes; it does not, in any form, affect one’s perspective but rather help a country achieve better home security system.

9.8 Manufacturability In order to produce our system in larger scale thinking of marketing we can reduce cost per system if we get proper support from the government and buy components in bulk. Manufacturing the system can be a good deal for both the nation and for us.

51

9.9 Sustainability The time certainly is ripe for security based businesses that are involved in sustainability. First movers are blazing a profitable path to the sustainable future and demonstrating the value of going green to companies that are preparing to dive into what will soon be the new normal. We need to identify the role smart home solutions that could play in supporting delivery of the performance levels of the Code for Sustainable Homes. Home security solutions can be used to enhance the environment as well as nation.

9.10 Impact in Real Life Our project is budget friendly and easy to use at the same time. Anyone who has less or very little knowledge about technology will be able to use this user-friendly project. Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and/or valuable asset, such as a person, dwelling, or community. There are many elements to think about when it comes to home security systems and that includes how the security system could benefit one and their family. Here are a few reasons how our project makes it true: •

Protects Valuables

This is, of course, the benefit most people immediately think of. We likely all know someone who has lost electronics, jewelry, or other high-value items due to a home invasion. The tragedy is compounded when the item is an irreplaceable family heirloom. A home security system has an alarm that scares off many would-be burglars and can notify the local authorities if someone does attempt a break-in.

52



Deters Crime

When the number of home security systems increases in an area, the number of residential robberies decreases in that area, even for people who didn’t have their own security system- this was found in a recent survey. Having a security system not only protects you, but also helps your neighborhood be a safer place for everyone. •

Allows Remote Access to Your Home

Our modern security system allows one to remotely monitor what is happening in their home when they are not there. They can monitor what happens via camera installed outside or inside their home.

• Helps Keep Tabs on Kids This is another great aspect of home automation. If the owner is at work, they can check what is happening in their home via camera, so they will know whom their teens are inviting over when they are away. The fingerprint based automatic door locks can keep their kids safe after school, so they do not have to worry about carrying (and potentially losing) a key to the house.

Fig. 9.1. Home surveillance on phone via CCTV camera. 53

• Makes Room for Peace of Mind The sense of security and peace one can gain with an alarm system is perhaps the greatest benefit of all. Next to being safe, the confidence of feeling safe will help one a more productive, healthy, and focused person. Finally, home alarm systems are beneficial for families that often leave family members home alone. Whether it is children of working parents being left alone, or whether it is spouses of the military who are frequently left alone for extended periods, home security systems provide peace of mind.

• Additional Reasons Why One Should Install a Home Security System •

Security systems not only protect family and possessions, but they also provide protection for pets. If a fire were to break out when no one but the family pet was home, without a home alarm system that pet would be doomed.



Home security systems allow for homeowners to secure less frequented areas of the home such as the basement and the garage. This makes it more difficult for intruders to take their preferred methods of entry into the home and go unnoticed.



Home security systems mean that homeowners do not have to depend upon neighbors to watch over their home when they are away. There is less chance of human error with alarm systems.



Home alarm systems prevent home intruders from staying too long if they do gain access to the house since there is a higher likelihood of them being scared away when an alarm is sounding loudly.

54



Having a home alarm system installed actually increases the home value when it comes to selling your home. As an added bonus, it also keeps the home protected throughout the selling process where a number of strangers will be inside one’s home.



Homes with security systems installed have a quicker emergency response time because they cut out the intermediary and directly contact authorities for faster dispatch, which we have implemented in the GSM module to send text to the owner.



Our home security system comes equipped with outdoor camera, which allows for homeowners and their families to see who is at the front door without going close to it. This feature is particularly useful for families with children of working parents who often have to leave children at home alone.

9.11 Summary In this chapter we have discussed the impacts a Home Security System will have on the economy, environment and also health. We discussed how this system does not do any pollution to the environment, provides security from every aspects and how the proper implementation with full support financially of this system can bring better days for the citizens of a certain nation. We have discussed how our system can ensure and have a great affect in personal life. Adding a security system to one’s home gives them an extra layer of defense against any potential intruders. Whether they rent or own, they can enjoy the benefits that come with having a security system.

55

Chapter 10 Conclusion

56

It has been successfully proven through the prototype that this home security system works perfectly. The fingerprint door lock gives the highest security ever that no other unknown person can come inside the house. Again, the burglar alarm part also gives protection to the house when no one is at home. It also gives more security by sending messages to the owner if anyone tries to break into the house. Moreover, webcam that has been attached on the roof top gives the owner every single update of any entry. Besides this, the system is cheap compared to other systems and it has many features altogether. Thus, this home security system can be an efficient, one of a kind system for developing countries. This project can be improves by attaching both microcontrollers. Besides by adding GSM connection on the Fingerprint door lock part can make it more powerful. Multiple ways were found to implement the project but the best and effective method was chosen, where the owner will be provided the highest security. Our team came up with the idea to build a home security system which would initially do the burglar alarm system which will notify the neighbors or the house owners when someone tries to break into their house. Our plan was to build and install a fingerprint based door lock, which will unlock the main gate door, which authorized fingerprint tip. A very basic project for the developing countries. As time passed, with the help and suggestions of your advisor of this project we came up with better upgrades for the project. We were suggested to add admin and user – two different panels for the betterment of the door lock system. By upgrading to that stage, we set up a pass lock with number pad to get access of the admin panel so it remains protected. The admin panel needed this lock or else anyone can access it and do harm to the door lock system. User panel remained same. Alarm system which was very basic detecting warm bodies and giving us alarm sound was upgraded to another level which was the real time text notification using the GSM module. This made the project more efficient at the same time multi featured. At first, we wanted to take snap

57

when wrong fingerprint given on the fingerprint module with the camera installed outside the home but that would make the project complicated for the user and our target was to make it user friendly. We also wanted to set PIR sensors outside our home for unauthorized access in the area of the home but that idea was not implemented as it can detect animals or random person strolling around. We wanted to put the call function on our GSM module but the text option served the purpose for which we did not implement the calling idea. Crime rates have been steadily declining for years. Consumers are more concerned about security than ever before, especially in residential areas. This unease is a substantial contributor to the growth of the home security market. People are increasingly focusing on their home security.

58

Chapter 11 Future Work

11.1 Introduction 59

In this chapter, we will discuss about how we can add more features to our system to make it worth enough to use in households commercially and sell for a better-secured society. Advancement in technology and emergence of smart homes has led to the rise of integrated home security systems, which can be connected to smartphones and enable the monitoring of residences from remote locations.

11.2 Future Planning We have planned how we can successfully do the industrial marketing of our project. The presence of a home security system provides many families with a peace of mind knowing that their home is protected from a variety of devastating scenarios. Because of this, we feel that our idea of the system will be a boom as it is multi layered and comes with multiple features. In order to make the idea result in big we have thought to do the industrial marketing if we get enough support from the government. We can ensure that our system will provide highly intuitive services for our customers or clients. Closed-circuit television (CCTV) which is one of our features has the largest market share in world security, the largest markets being Asia and America. The features we are planning to add in future if properly nourished by our government and investors are: •

Add a backup battery system so that even if there is a power cut of failure, it will be turned on always to provide the highest security.



There will be a security team, who will operate 24 hours a day and is poised to respond to any threat. We will invest in providing the reliable support, procedures and protocols to all our designated sites for our corporate blue-chip customers. We want to gain trust in both public and private sectors. 60



After launching online support of 24*7 hours so that customers can contact us if they face any issue with the system installed in their home.

11.3 Method of Productization & Marketing The entire method of productization and marketing process on how we can implement the system in larger scale for marketing purpose is described below:

• System Functionality Whatever ones’ specific security needs, whether it is price or features that are most important to one, our system layers are state of the art and offer all the latest technical advancements.

• The Protection We have used the highest quality industry standard detection devices, such as motion detectors, switches, and fingerprint recognizer and surveillance system. All detection devices and associated cabling can be monitored when we launch in the industry for selling purpose and earning revenue out of it. In future when we implement the backup battery, it will ensure continued protection in the event of power failure or tampering. By capitalizing on our distinctive capabilities, we continue responding to the increasingly diverse needs of homeowners for security and peace of mind.

• The Peace of Mind Our future work includes the feature that, different areas within one’s home will report individually to our Monitoring Centre. The system will be able to tell us what is happening and where and the flexibility to choose the right level of protection for our customer’s home, ensuring that alarm messages are relayed to our security monitoring station.

61

11.4 Situation of current security concerns around the world Security has become an intrinsic part of our everyday lives, and we can expect it to become even more present and discrete both inside and outside our buildings. The pie charts below will show the current situation concerns around the world from a recent study.

Fig.11.1. The global market for CCTV well outpaced the combined markets for access control and intruder alarm systems.

Fig.11.2. Asia represents the largest share of the worldwide CCTV market, followed by the Americas and Europe.

62

Electronic access control systems such as smart cards and biometrics, as well as mechanical and electromechanical locks, will post the fastest gains as new construction rebounds. The most rapid market growth will occur in the office, home and lodging segment.

11.5 Summary In this chapter, we have discussed how we can make our system more efficient by implementing few more ideas in the future if we get the proper support and investments. Our system can add a great value to the society if properly nourished and implemented. We have also discussed how we can launch our project with proper support. Our home security system gives one the peace of mind and freedom that comes from the knowledge wherever you go and whatever they do, their home is always protected. Designed to be technically advanced, simple to use and supported by unparalleled service, our home security system is individually formulated to suit one’s unique security needs.

63

Bibliography

[1]

B. Anubala, M. Rahini, T. Bavithr, “Intelligent Door Locking System, International

Journal of Engineering Research and Applications”, (IJERA) ISSN: 2248-9622 International Conference on Humming Bird (01st March 2014). [2]

Mary Lourde R. and Dushyant Khosla, “Fingerprint Identification in Biometric Security

Systems”, International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010. [3]

Subhankar Chattoraj , Karan Vishwakarma, “A Biometric Solution for Door Locking

System using Real time Embedded System and Arduino as the Microcontroller”, IOSR Journal

64

of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. IV (Jul. – Aug. 2016), PP 01-05. [4]

How PIR Motion sensor works, [online] URL: https://learn.adafruit.com/pir-passive-

infrared-proximity-motion-sensor/how-pirs-work. [5]

Adel

Keyless

Biometric

Fingerprint

Door

Lock

Trinity

788,[online]

URL:https://www.amazon.com/Adel-Biometric-Fingerprint-Trinity-788/dp/B00270UU4C. [6]

Sadeque Reza Khan, Ahmed Al Mansur, Alvie Kabir, Shahid Jaman, Nahian Chowdhury,

“Design and Implementation of Low Cost Home Security System Using GSm network”, International Journal of Scientific and Engineering Research, Vol. 3, Issue 3, 2012. [7]

Nathan David, Abafor Chima, Aronu Ugochukwu, Edoga Obinna, “Design of a Home

Automation System Using Arduino”, International Journal of Scientific & Engineering Research, Vol. 6, Issue 6, 2015. [8]

Viraj Mali, Ankit Gorasia, Meghana Patil, Prof. P.S.Wawage, “Home Automation and

Security using Arduino Microcontroller”, International Journal of Research in Advent Technology (E-ISSN: 2321-9637) Special Issue, National Conference “NCPCI-2016”, 19 March 2016. [9]

GM02

wireless

auto

dial

home

security

alarm

system,

[online]

URL:

http://cothinking.en.alibaba.com/product/676349675213755529/GM02_auto_dial_intrusion_alarm_system_wireless_alarm_system.html. [10]

N. Sriskanthan and F. Tan Karande, “Bluetooth Based Home Automation System”,

Journal of Microprocessors and Microsystems, Vol. 26, pp.281-289, 2002.

65

[11]

B. Annapurna, K. Mounika, K. Chakradhara Chary, Roohi Afroz, “Smart Security

System using Arduino and Wireless Communication”, International Journal of Engineering Innovation & Research, Volume 4, Issue 2, ISSN: 2277 – 5668. [12]

nfc fingerprint digital hotel door lock, [online] URL: https://www.alibaba.com/product-

detail/biometric-fingerprint-nfc-door-lock_60435350549.html. [13]

Jayashri Bangali , Arvind Shaligram, “Design and Implementation of Security Systems

for Smart Home based on GSM technology”, International Journal of Smart Home Vol.7, No.6 (2013), pp.201-208.

66

Appendices

67

Appendix A Arduino Mega code (GSM and PIR Based Security Alarm)

The Arduino Mega based code is given below: #include SoftwareSerial mySerial(10,11); int smsTrue= 0; int inputPin1 = 2; int inputPin2 = 3; 68

int inputPin3 = 4; int inputPin4 =5;

// choose the input pin (for PIR sensor)

int ledPin1=53; int ledPin2=51; int ledPin3=49; int ledPin4=47; int pirState = LOW; int val = 0;

// we start, assuming no motion detected // variable for reading the pin status

int pinSpeaker = 43;

//Set up a speaker on a PWM pin (digital 9, 10, or 11)

void setup() { // pinMode(ledPin, OUTPUT); // declare LED as output pinMode(ledPin1, OUTPUT); pinMode(ledPin2, OUTPUT); pinMode(ledPin3, OUTPUT); pinMode(ledPin4, OUTPUT); pinMode(inputPin1, INPUT); pinMode(inputPin2,INPUT); pinMode(inputPin3,INPUT); pinMode(inputPin4,INPUT);

// declare sensor as input

pinMode(pinSpeaker, OUTPUT); Serial.begin(9600); mySerial.begin(19200); if (mySerial.available()){

69

mySerial.write("AT+CMGF=1"); delay(100); mySerial.write("AT+CSCA=\"+88019900557\""); //SERVICE CENTER NUMBER delay(100); } } void loop() { pirSensor(inputPin1,ledPin1); pirSensor(inputPin2,ledPin2); pirSensor(inputPin3,ledPin3); pirSensor(inputPin4,ledPin4); } // Tell Arduino To Play Piezo Buzzer Tone // duration in mSecs, frequency in hertz void playTone(long duration, int freq) { duration *= 1000; int period = (1.0 / freq) * 1000000; long elapsed_time = 0; while (elapsed_time < duration) { digitalWrite(pinSpeaker, HIGH); delayMicroseconds(period / 2); digitalWrite(pinSpeaker, LOW); delayMicroseconds(period / 2);

70

elapsed_time += (period); } } void pirSensor(int inputPin, int ledPin){ val = digitalRead(inputPin); // read input value if (val == HIGH) {

// check if the input is HIGH

digitalWrite(ledPin, HIGH); // turn LED ON playTone(700,700); delay(100); if (pirState == LOW) { // we have just turned on Serial.print("Motion detected! \t"); while(smsTrue!=1){ sendSMS(); smsTrue=1; } Serial.println(inputPin); // We only want to print on the output change, not state pirState = HIGH; } } else { digitalWrite(ledPin, LOW); // turn LED OFF

71

playTone(0,0); delay(100); if (pirState == HIGH) { // we have just turned off Serial.print("Motion ended! \t"); Serial.println(inputPin); // We only want to print on the output change, not state // Inside Of The Serial Port pirState = LOW; } } } void sendSMS() { mySerial.print("AT+CMGF=1\r"); // AT command to send SMSmessage delay(100); mySerial.println("AT + CMGS = \"+8801749681396\""); // recipient's mobilenumber, in international format delay(100); mySerial.println("ALERT! ALERT! ALERT!"); // message tosend delay(100); mySerial.println((char)26); // End AT command with a ^Z, ASCII code 26 delay(100);

72

mySerial.println(); delay(5000); // give module time to send SMS //SIM900power(); // turn off module }

Appendix B 73

Arduino Uno code (Fingerprint Door Lock)

The Arduino Uno based code is given below: #include #include #include #include #include //call the LCD library #include #include

74

LiquidCrystal lcd(8, 9, 4, 5, 6, 7); int addr=0; int a=19; int pass; int getFingerprintIDez(); int z=0; int p=3; //attempt time int buttonState = 0; uint8_t id =EEPROM.read(addr); uint8_t getFingerprintEnroll(); SoftwareSerial mySerial(2, 3); Adafruit_Fingerprint finger = Adafruit_Fingerprint(&mySerial); String newPasswordString; //hold the new password char newPassword[6]; //charater string of newPasswordString Password password = Password( "147" ); // password set to 1470 byte maxPasswordLength = 5; // Max pass length byte currentPasswordLength = 0; const byte ROWS = 4; // Four rows const byte COLS = 3; // Four columns //Define the keymap char keys[ROWS][COLS] = { {'1','2','3'}, {'4','5','6'},

75

{'7','8','9'}, {'*','0','#'}, }; //// Connect keypad ROW0, ROW1, ROW2 and ROW3 to these Arduino pins. byte rowPins[ROWS] = {18,17,16,15}; //connect to row pinouts // Connect keypad COL0, COL1, COL2 and COL3 to these Arduino pins. byte colPins[COLS] = {13,12,11}; //connect to column pinouts // Create the Keypad Keypad keypad = Keypad( makeKeymap(keys), rowPins, colPins, ROWS, COLS ); void setup(){ digitalWrite(a,HIGH); //while (!Serial); Serial.begin(9600); lcd.begin(16, 2); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Fingerprint Door"); // print a sample message lcd.setCursor(0,1);

//cursor will st at 1st digit of 2nd row, that means 2nd line

lcd.print(" Lock System "); // print a simple message Serial.println("Fingerprint Door Lock"); delay(5000); // set the data rate for the sensor serial

lcd.setCursor(0,0);

//cursor will set at 1st digit

of 1st row lcd.print("Choose Any One "); // print a sample message

76

lcd.setCursor(0,1);

//cursor will st at 1st digit of 2nd row, that means 2nd line

lcd.print("1.Admin 2.User "); // print a simple message port finger.begin(57600); if (finger.verifyPassword()) { Serial.println("Found fingerprint sensor!"); } else { Serial.println("Did not find fingerprint sensor :("); // while (1); } // Serial.println("Waiting for valid finger..."); pinMode(a,OUTPUT); // digitalWrite(a,HIGH); } void loop(){ {char key = keypad.getKey(); if (key != NO_KEY){ delay(60); switch (key){ case '1': admin(); break; case '2': user(); break; case 'C': break; case 'D': break; case '*': break;

77

case '#': break; default: processNumberKey(key); } } } } void admin(){ lcd.clear(); char key = keypad.getKey(); while(key != '#'){ lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Password Pls"); // print a sample message // lcd.setCursor(0,1);

//cursor will st at 1st digit of 2nd row, that means 2nd line

//lcd.print("1# Admin 2#User"); // print a simple message {char key = keypad.getKey(); if (key != NO_KEY){ delay(60); switch (key){ case 'A': break; case 'B': break; case 'C': break; case 'D': break; case '*': checkPassword(); break;

78

case '#': break; default: processNumberKey(key); } } } // if(pass==1)break; } } void admin1(){ lcd.clear(); while(1){ lcd.print("1. Add Finger"); // print a sample message lcd.setCursor(0,1);

//cursor will start at 1st digit of 2nd row, that means 2nd line

lcd.print("2. Delete Finger");

// print a simple message port

{char key = keypad.getKey(); if (key != NO_KEY){ delay(60); switch (key){ case '1': add(); break; case '2': del(); break; case 'C': break; case 'D': break; case '*': break;

79

case '#': break; default: processNumberKey(key); } } } } } void add(){ lcd.clear(); // while(1){ //

lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

// lcd.print("ADD"); // print a sample message // } Serial.println("Ready to enroll a fingerprint! Please Type in the ID # you want to save this finger as..."); id = id+1; EEPROM.write(addr, id); addr = addr + 1; if (addr == EEPROM.length()) { addr = 0; } Serial.print("Enrolling ID #"); Serial.println(id);

80

while (! getFingerprintEnroll() ); soft_restart(); } void del(){ lcd.clear(); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Put your finger"); // print a sample message delay(5000); getFingerprintIDez1(); delay(50); Serial.print("deleting ID #"); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Deleting ID

"); // print a sample message

Serial.println(id); lcd.setCursor(0,1);

//cursor will set at 1st digit of 1st row

lcd.print(id); // print a sample message deleteFingerprint(id); delay(2000); lcd.setCursor(0,0); lcd.print("Done :D

//cursor will set at 1st digit of 1st row

"); // print a sample message

delay(2000); soft_restart(); void user(){

81

// char key = keypad.getKey(); // while(key != '#'){ lcd.clear(); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Please put finger"); // print a sample message // lcd.setCursor(0,1);

//cursor will start at 1st digit of 2nd row, that means 2nd line

//lcd.print("1# Admin 2#User"); // print a simple message while(1) { getFingerprintIDez(); delay(50); } /* {char key = keypad.getKey(); if (key != NO_KEY){ delay(60); switch (key){ case 'A': break; case 'B': break; case 'C': break; case 'D': break; case '*': checkPassword(); break; case '#': break; default: processNumberKey(key); } }

82

} }*/ } void processNumberKey(char key) { Serial.print(key); currentPasswordLength++; password.append(key); lcd.setCursor(z,1); lcd.print(key); z++; if (currentPasswordLength == maxPasswordLength) { checkPassword(); } } void checkPassword() { //password verification logic if (password.evaluate()){ lcd.clear(); lcd.setCursor(0,0); lcd.print("Matched :)"); Serial.println("Pass Match"); p=3; z=0; delay(2000);

83

admin1(); } else { pass=0; digitalWrite(a,HIGH); lcd.clear(); lcd.setCursor(0,0); lcd.print("Incorrect :("); Serial.println("Incorrect"); z=0; p=p-1; if(p==0){ //number of attempt verified logic security();} delay(2000); soft_restart(); //digitalWrite(a,LOW); } resetPassword(); } void resetPassword() { password.reset(); currentPasswordLength = 0;

84

} void security() { p=3; digitalWrite(a,HIGH); delay(200); } int getFingerprintIDez() { uint8_t p = finger.getImage(); if (p != FINGERPRINT_OK) return -1; p = finger.image2Tz(); if (p != FINGERPRINT_OK) return -1; p = finger.fingerFastSearch(); if (p != FINGERPRINT_OK) return -1; // found a match! Serial.print("Found ID #"); Serial.print(finger.fingerID); // if(finger.fingerID == ){ lcd.clear(); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print(" Welcome Home "); // print a sample message digitalWrite(a,LOW); delay(2000); digitalWrite(a,HIGH);

85

Serial.println("Match"); // } Serial.print(" with confidence of "); Serial.println(finger.confidence); delay(2000); soft_restart(); return finger.fingerID; } uint8_t getFingerprintEnroll() { int p = -1; Serial.print("Waiting for valid finger to enroll as #"); Serial.println(id); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Put Fingertip"); while (p != FINGERPRINT_OK) { p = finger.getImage(); switch (p) { case FINGERPRINT_OK: Serial.println("Image taken"); lcd.setCursor(0,0); lcd.print("Image taken

//cursor will set at 1st digit of 1st row ");

break; case FINGERPRINT_NOFINGER: Serial.println("."); break;

86

case FINGERPRINT_PACKETRECIEVEERR: Serial.println("Communication error"); lcd.setCursor(0,0); lcd.print("Com Error

//cursor will set at 1st digit of 1st row

");

break; case FINGERPRINT_IMAGEFAIL: Serial.println("Imaging error"); lcd.setCursor(0,0); lcd.print("Image Error

//cursor will set at 1st digit of 1st row

");

break; default: Serial.println("Unknown error"); lcd.setCursor(0,0); lcd.print("Unknown Error

//cursor will set at 1st digit of 1st row ");

break; } } // OK success! p = finger.image2Tz(1); switch (p) { case FINGERPRINT_OK: Serial.println("Image converted"); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

87

lcd.print("Image Converted

");

break; case FINGERPRINT_IMAGEMESS: Serial.println("Image too messy"); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Image too messy"); return p; case FINGERPRINT_PACKETRECIEVEERR: Serial.println("Communication error"); lcd.setCursor(0,0); lcd.print("Com Error

//cursor will set at 1st digit of 1st row

");

return p; case FINGERPRINT_FEATUREFAIL: Serial.println("Could not find fingerprint features"); return p; case FINGERPRINT_INVALIDIMAGE: Serial.println("Could not find fingerprint features"); return p; default: Serial.println("Unknown error"); lcd.setCursor(0,0); lcd.print("Unknown Error

//cursor will set at 1st digit of 1st row

");

return p;

88

} Serial.println("Remove finger"); lcd.setCursor(0,0); lcd.print("Remove Finger

//cursor will set at 1st digit of 1st row ");

delay(2000); p = 0; while (p != FINGERPRINT_NOFINGER) { p = finger.getImage(); } Serial.print("ID "); Serial.println(id); p = -1; Serial.println("Place same finger again"); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Put same finger"); while (p != FINGERPRINT_OK) { p = finger.getImage(); switch (p) { case FINGERPRINT_OK: Serial.println("Image taken"); lcd.setCursor(0,0); lcd.print("Image Taken

//cursor will set at 1st digit of 1st row

");

break; case FINGERPRINT_NOFINGER:

89

Serial.print("."); break; case FINGERPRINT_PACKETRECIEVEERR: Serial.println("Communication error"); break; case FINGERPRINT_IMAGEFAIL: Serial.println("Imaging error"); break; default: Serial.println("Unknown error"); lcd.setCursor(0,0); lcd.print("Unknown Error

//cursor will set at 1st digit of 1st row

");

break; } } // OK success! p = finger.image2Tz(2); switch (p) { case FINGERPRINT_OK: Serial.println("Image converted"); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Converted"); break;

90

case FINGERPRINT_IMAGEMESS: Serial.println("Image too messy"); return p; case FINGERPRINT_PACKETRECIEVEERR: Serial.println("Communication error"); return p; case FINGERPRINT_FEATUREFAIL: Serial.println("Could not find fingerprint features"); return p; case FINGERPRINT_INVALIDIMAGE: Serial.println("Could not find fingerprint features"); return p; default: Serial.println("Unknown error"); lcd.setCursor(0,0); lcd.print("Unknown Error

//cursor will set at 1st digit of 1st row

");

return p; }

// OK converted! Serial.print("Creating model for #"); Serial.println(id); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Creating Model");

91

p = finger.createModel(); if (p == FINGERPRINT_OK) { Serial.println("Prints matched!"); } else if (p == FINGERPRINT_PACKETRECIEVEERR) { Serial.println("Communication error"); return p; } else if (p == FINGERPRINT_ENROLLMISMATCH) { Serial.println("Fingerprints did not match"); return p; } else { Serial.println("Unknown error"); lcd.setCursor(0,0); lcd.print("Unknown Error

//cursor will set at 1st digit of 1st row

");

return p; } Serial.print("ID "); Serial.println(id); p = finger.storeModel(id); if (p == FINGERPRINT_OK) { Serial.println("Stored!"); lcd.setCursor(0,0); lcd.print("Stored

//cursor will set at 1st digit of 1st row

");

delay(1000); soft_restart();

92

} else if (p == FINGERPRINT_PACKETRECIEVEERR) { Serial.println("Communication error"); return p; } else if (p == FINGERPRINT_BADLOCATION) { Serial.println("Could not store in that location"); return p; } else if (p == FINGERPRINT_FLASHERR) { Serial.println("Error writing to flash"); return p; } else { Serial.println("Unknown error"); lcd.setCursor(0,0); lcd.print("Unknown Error

//cursor will set at 1st digit of 1st row

");

return p; } } uint8_t deleteFingerprint(uint8_t id) { uint8_t p = -1; p = finger.deleteModel(id); if (p == FINGERPRINT_OK) { Serial.println("Deleted!"); } else if (p == FINGERPRINT_PACKETRECIEVEERR) { Serial.println("Communication error");

93

return p; } else if (p == FINGERPRINT_BADLOCATION) { Serial.println("Could not delete in that location"); return p; } else if (p == FINGERPRINT_FLASHERR) { Serial.println("Error writing to flash"); return p; } else { Serial.print("Unknown error: 0x"); Serial.println(p, HEX); return p; } } int getFingerprintIDez1() { uint8_t p = finger.getImage(); if (p != FINGERPRINT_OK) return -1; p = finger.image2Tz(); if (p != FINGERPRINT_OK) return -1; p = finger.fingerFastSearch(); if (p != FINGERPRINT_OK) return -1; // found a match! Serial.print("Found ID #"); lcd.setCursor(0,0);

//cursor will set at 1st digit of 1st row

lcd.print("Found ID"); // print a sample message

94

Serial.print(finger.fingerID); lcd.setCursor(0,1);

//cursor will set at 1st digit of 1st row

lcd.print((finger.fingerID)); // print a sample message Serial.print(" with confidence of "); Serial.println(finger.confidence); id=(finger.fingerID); return finger.fingerID; }

95

Appendix C User Manual



Setting up the Finger Print Door Lock:

The initial option for the Fingerprint Lock will “0000” on the screen. Since you are the owner, you can add a 4- digit password. Once done you can access the admin/owner panel. You can add fingerprint and also delete fingerprint. The limit is up to 200 fingerprints. Please clear or wipe your finger with dry cloth before putting fingerprint. The sensor is very sensitive so please use wisely. •

Guideline for Installing PIR Motion Sensor:

96

1. Before use, make sure the power switch of PIR motion sensors is at the ON position. 2. Installation height is about 2.2 meters above ground and the optimized detection angle for most motion sensor is 90 degree. The sensor should face the detected area with this consideration for best coverage. It is advised to install with the face of motion sensor perpendicular to the most probable moving detection of people for the highest effective detection. 3. Within coverage of detection, there should be no any objects for obstruction. 4. There should be no two infrared detectors in the same as they will possibly intervene with each other. 5. Avoid the detector facing window, cooling or warming machines, or other appliances that cause the temperature changing sharply and thus cause false alarm. 6. Most infra-red detector needs about 5 minutes to heat up before READY for normal operation. 7. Regular PIR motion sensor is for indoor use unless the specification stated otherwise. Unless specifies otherwise, most infra-red detector are indoor use and not reliable to use outdoor.



Alarm Panel Initial Setup:

97

Load the SIM Card on the GSM shield, fix the GSM Antenna, and connect the power and other cables if any, then power up alarm panel. SIM Card installation procedure is given below:

The alarm panel will prompt and start self-test the GSM network. GSM Signal will start (it takes about 10 seconds or so for searching). "GSM signal" light means GSM signals and SIM card are normal. This is to apply when you are leaving home empty. •

CCTV Setup: At first, install the given CD to install the camera software on your desktop or laptop. Once done open the software and turn on the recording whenever you want to keep record when you are away from home.

98

Low Cost Multi Level Home Security System for ...

sensor, PIR motion detector sensors, GSM module and a surveillance web camera. The system is much less ...... heat, smoke, sound. A PIC microcontroller 16F76 controls the whole system. It collects information from the sensors and sends SMS to a corresponding number by using a GSM module. [6]. Nathan David et.al ...

4MB Sizes 2 Downloads 226 Views

Recommend Documents

A Low-Cost and Noninvasive System for the Measurement and ...
There was a problem previewing this document. Retrying. ... A Low-Cost and Noninvasive System for the Measurement and Detection of Faulty Streetlights.pdf.

In-cabin occupant tracking using a low-cost infrared system
In-cabin occupant tracking using a low-cost infrared system. Abstract – Vehicles in future will be safer and more intelligent, able to make appropriate and ...

High-Level Low-Power System Design Optimization - Cadence
an industrial high-level low-power design methodology that enables ..... Cadence. Joules™. RTL. Power. Solution, https://www.cadence.com/content/cadence-.

High Level Transforms for SIMD and low-level ...
The second part presents an advanced memory layout trans- ..... We call this phenomenon a cache overflow. ... 4, center). Such a spatial locality optimization can also be used in a multithreaded ... In the following, we call this optimization mod.

low-cost road roughness machine
vehicle maintenance, the extent of tyre damage and ... The second class of instrument is the dynamic profile .... the mark at its closest proximity to the road.

Low-cost haptic mouse implementations
Jun 18, 2004 - Actuator For Teleoperator Robot Control,” Bachelor of Sci ence Thesis, MIT, May ... lssues in Force Display,” Computer Science Dept. Univer-.

Low Cost Lexicon
Extraction. Features x. Acoustic Model k a t. R a n. Lexicon or. Pronunciation. Dictionary ... Subspace acoustic models (UBM's) need less data. • Text data for ...

Low-cost haptic mouse implementations
Jun 18, 2004 - facing a user with a host computer. ...... The host computer (console unit) provides com ..... such as used for the Internet and World Wide Web.

Mobile-ATM: A Low Cost Mobile Payment System for ...
Mobile-ATM: A Low Cost Mobile Payment System for. Developing Countries .... telephone line or directly via a leased line, which is expensive. In addition to that ...

A Proposition for Low Cost Preventive Cardiology for ...
A Proposition for Low Cost Preventive Cardiology for Rural Health. Care System. Sujay Deb1 ... 3: Dept. of Computer Science & Engineering. Indian Institute of ...

Multi-Level Reputation-Based Greylisting
The still increasing volume of unsolicited bulk e-mail. (spam) continues to be a driving force for research in reliable anti-spam filters. In recent years, a vast ...

Multi Level Marketing.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Multi Level ...

TIMESTAMP LIQUID LEVEL (LTS) LOW LEVEL ALARM HIGH LEVEL ...
TIMESTAMP. LIQUID LEVEL (LTS). LOW LEVEL ALARM. HIGH LEVEL ALARM. 8/10/2017 9:27:11. 115. 0. 0. 8/10/2017 10:10:05. 115. 0. 0. 9/15/2017 13:52:06.

A Low-cost Emulation System for Fast Co-verification ...
(called Infrastructure Microprocessor or IM) to implement different verification ... Section V describes the system implementation, whose automation is outlined in.

A Low-cost Head and Eye Tracking System for ...
In this paper we present a cheap hybrid real-time head and eye ... brought about, in part, by readily available and cheap data capture platforms such as the ...

man-150\ge-home-security-system-user-manual.pdf
man-150\ge-home-security-system-user-manual.pdf. man-150\ge-home-security-system-user-manual.pdf. Open. Extract. Open with. Sign In. Main menu.

Long Resume.pages - Low Level Bits
iOS apps. • web services deployed on Linux (RedHat, Debian), and once on FreeBSD. Being opened for new technologies, I became acquainted (to a different ...

Multi Level Marketing.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

wireless home security system project pdf
wireless home security system project pdf. wireless home security system project pdf. Open. Extract. Open with. Sign In. Main menu. Displaying wireless home ...

man-153\sony-home-security-system-user-manual.pdf
man-153\sony-home-security-system-user-manual.pdf. man-153\sony-home-security-system-user-manual.pdf. Open. Extract. Open with. Sign In. Main menu.

man-149\philips-home-security-system-user-manual.pdf ...
man-149\philips-home-security-system-user-manual.pdf. man-149\philips-home-security-system-user-manual.pdf. Open. Extract. Open with. Sign In. Main menu.

man-125\craftsman-home-security-system-user-manual.pdf ...
man-125\craftsman-home-security-system-user-manual.pdf. man-125\craftsman-home-security-system-user-manual.pdf. Open. Extract. Open with. Sign In.