Documente Academic
Documente Profesional
Documente Cultură
1.0 INTRODUCTION
The need for having home protection has always been of
great importance. But in recent times, considering a dramatic rise
in petty crimes like robbery and theft, the need has been more
strongly felt to have a fool proof protection of the belongings and
the family members. Home security has come a long way in the
last few decades. Initially security was in the hands of guards who
manually provided surveillance during the night in the earlier
days, but it was not fool proof as it was only normal for a security
man to have momentary lapses in concentration. The guard was
also susceptible to sleep at times. It was then that home alarm
systems based upon electronic circuits were developed which
proved to be highly reliable and were appreciated by the people
as they were relieved from constant monitoring of their homes.
A shadow alarm, as defined by Trimmer, H. William (1981) is
a system designed to detect intrusion unauthorized entry into
a building or area by generating or giving off an alarm whenever a
shadow falls on it. Security alarms are used in residential,
and
90s
were
particularly
marked
by
growing
window will find it virtually impossible to break into the house due
to the claw-like steel bars. In addition, any attempt to force entry
that is detected is forwarded to an alarm control panel, which
then reliably sets off a loud alarm and the offender is forced to
escape.
But the flaw in the above described device however, is that
there is no definite difference between the shadow cast by an
intruder and that of a small animal. The aim and objective of this
project work is to design a device which can comfortably detect a
human shadow as distinct from shadows cast by little animals and
trees. This is going to be achieved by using a moving and sizeable
shadow as the reference shadow of the device. This project has
the capability of reducing burglary and unauthorized intrusion to
its barest minimum, thereby giving property owners a sense of
security and comfort even when they leave their premises and
homes.
1.4
10
CHAPTER TWO
LITERATURE REVIEW
2.0 REVIEW OF THE SYSTEM
Several works have been done by various authors and
scholars on this topic and several other related topics. This
chapter reviews previous efforts made in the construction and
design of a shadow detector circuit. One of such works was done
by the Kaduna State University, Computer Science Department.
Their project was on automatic alarm of various kinds. In the
project, they wrote about the intruder alarm and its design, as
11
12
Modern
intruder
alarms,
however,
are
far
more
13
14
15
had
another
decisive
idea:
burglaries
occurred
16
17
18
detector
started
with
Herschels
experiment
with
19
to
be
primarily
driven
by
military
applications.
20
21
unoccupied
interiors
for
motions,
sound,
22
Alerting
devices serve
23
dispatching
private
security
forces.
Such
signals
may
be
the
Holmes
business.
Using
the
advanced
24
2.3.2
IMPROVEMENTS
INTEGRATION
25
CHAPTER THREE
CONSTRUCTION METHODOLOGY
3.0 SYSTEM BLOCK DIAGRAM
Shadow alarms are widely used for security purposes.
Described here is a simple but improved circuit of a smart shadow
sensor alarm, which can register a shadow when there is a light
difference. A shadow alarm is a device that generates an alarm
whenever a shadow falls on it. This shadow alarm circuit can
sense a moving shadow in a confined area. It can be used to
protect things from theft. When somebody approaches the unit, it
26
will give a loud alarm to abort the attempt of theft. The circuit
uses the light sensing property of the Photo diode. This project
can be easily installed on windows and doors. This block diagram
demonstrates the principle of operation of a simple shadow alarm
using photodiode. The block diagram is as shown below:
27
28
29
30
PHOTODIODE
32
CAPACITOR
33
ii.
3.5.3
RECTIFYING DIODE
34
rectifiers
and
switches.
Historically,
other
even
silicon-based
synchronous
semiconductor
electromechanical
switches and motors have been used. Early radio receivers, called
crystal radios, used a cats whisker of fine wire pressing on a
crystal of galena (lead sulphide) to serve as a point-contact
rectifier or crystal detector.
35
3.5.4
36
ii.
iii.
Long-Duration Timers/Monostables
iv.
v.
37
vi.
vii.
viii.
Peak Detectors
ix.
x.
3.5.5
38
is
determined
by
the
energy
band
gap
of
the
and
management
require
than
more
compact
precise
fluorescent
current
lamp
and
heat
sources
of
comparable output.
Light-emitting diodes are used in applications as diverse as
aviation
lighting,
automotive
lighting,
advertising,
general
lighting, and traffic signals. LEDs have allowed new text, video
displays, and sensors to be developed, while their high switching
39
3.5.6
RESISTORS
40
i.
ii.
2.
3.
41
FIRST
BAND
BLACK
SECOND
BAND
_
BROWN
RED
00
ORANGE
000
YELLOW
0000
GREEN
00000
BLUE
000000
VIOLET
0000000
GREY
00000000
WHITE
THIRD
BAND
TOLERANCE
10
1%
2%
000000000
GOLD
X0.1
SILVER
X0.01
5%
10%
42
CHAPTER FOUR
TEST AND RESULT ANALYSIS
4.1 CONSTRUCTION PROCEDURE
In building this project, the following procedures were
properly considered and observed.
43
i.
ii.
iii.
the components.
Drafting out a schematic diagram on how to arrange the
iv.
v.
materials/components.
Testing the completed system to see if the design works and
Finally, implementation of design of the project.
Having procured all the materials, we proceeded into
arranging the components onto the Vero board. Care was taken
not to lay the I.C. directly on the bread board since the heat the
soldering iron emits while soldering could damage it. After every
other soldering, the I.C. was then properly soldered. The
components were all soldered onto the board after which the
circuit was correctly confirmed done.
4.1 ASSEMBLING OF THE DIFFERENT SECTIONS
Having
provided
the
casing
and
having
finished
the
44
45
4.4 PACKAGING
This is a very important aspect of the design work. It is the
appearance given to the final work. After soldering on the vero
board, we did not leave the work as it were; it has to be cased.
Packaging could serve two major functions.
1.
2.
Height
-- 14.cm
The vero board and the transformer are held firmly by bolts and
nuts.
4.5 TESTING
46
47
the
meter
to
the
required
value
and
range
POST-IMPLEMENTATION TESTING
48
49
CHAPTER FIVE
CONCLUSION AND RECOMMENDATION
5.0 CONCLUSION
Security alarms are system designed to detect intrusion
unauthorized entry into a building or area. Security alarms are
used in residential, commercial, industrial, and military properties
for protection against burglary (theft) or property damage, as well
as personal protection against intruders. Car alarms likewise
protect vehicles and their contents. Prisons also use security
systems for control of inmates.
Some alarm systems serve a single purpose of burglary
protection; combination systems provide both fire and intrusion
protection. Intrusion alarm systems may also be combined with
closed-circuit television surveillance systems to automatically
record the activities of intruders, and may interface to access
50
5.1 RECOMMENDATION
This project is designed to be used in our homes, offices and
industries or any other place where there is need for protection of
properties against theft. It is recommended that work should be
done on the implementation and integration of this device into
the security network in our homes and industries.
51
REFERENCES
J Tian, J Sun, Y Tang, Tricolor attenuation model for shadow
detection. IEEE Trans Image Process 18(10), 23552363
(2009).
K Barnard, G Finlayson, Shadow identification using colour
ratios. Proceedings of the IS&T/SID Eighth Color Imaging
Conference: Color Science, Systems and Applications
(Scottsdale, Arizona, USA, 2000) 8, pp. 97101
K Chung, Y Lin, Y Huang, Efficient shadow detection of color
aerial images based on successive thresholding scheme.
IEEE Trans Geosci Remote Sensing 47(2), 671682 (2009)
W Zhang, X Fang, X Yang, Q Wu, Moving cast shadows
detection using ratio edge. IEEE Trans Multism 9(6), 1202
1214 (2007)
52
invariant
color
features.
Comput
Vis
Image
Conference
on
Computer
Vision
and
Pattern
53
J Huang, C Chen, Moving cast shadow detection using physicsbased features. IEEE Conference on Computer Vision and
Pattern Recognition (Miami, Florida, USA, 2009), pp. 2310
2317
N Brisson, A Zaccarin, Learning and removing cast shadows
through a multi-distribution approach. IEEE Trans PAMI
29(7), 11331146 (2007)
K Siala, M Chakchouk, O Besbes, F Chaieb, Moving shadow
detection with support vector domain description in the
color ratios space. International Conference on Pattern
Recognition (Cambridge, UK, 2004) 4, pp. 384387
A Joshi, N Papanikolopoulos, Learning to detect moving shadows
in dynamic environments. IEEE Trans PAMI 30(11), 2055
2063 (2008)
T Wu, C Tang, A Bayesian approach for shadow extraction from
a
single
image.
IEEE
International
Conference
on
54
using
paired
Vision
and
regions.
IEEE
Conference
Pattern
Recognition
on
(Springs,
APPENDIX 1
COMPREHENSIVE CIRCUIT DIAGRAM OF THE SHADOW
DETECTOR DEVICE
55
56