Vous êtes sur la page 1sur 45

COMBINED MULTI-PURPOSE INTEGERATED

ALARM SYSTEM
18ES390 – DESIGN THINKING

NOVEMBER 4, 2019
THIAGARAJAR COLLEGE OF ENGINEERING
MADURAI – 625 015
PUBLIC SAFETY AND SECURITY
COMBINED MULTI-PURPOSE INTEGERATED
ALARM SYSTEM

18ES390 – DESIGN THINKING

Technical Report

Submitted by
KRISHKARNA M (18G056)
MOHAMED THANSIM FARID S (18G069)
ROOBAN KUMAR K (18G097)
SANTHOSH P (18G098)
RUBAN CHANDRAKANTH K (62ME014)

in partial fulfilment for the award of the degree of


BACHELOR OF ENGINEERING
IN
MECHANICAL ENGINEERING OF ANNA UNIVERSITY, CHENNAI

Faculty In-charge
Mr M. SERMARAJ
Assistant Professor of Mechanical Engineering
Department of Mechanical Engineering

THIAGARAJAR COLLEGE OF ENGINEERING


(A Govt. Aided Autonomous Institution, Affiliated to Anna University)
MADURAI – 625 015

NOVEMBER 2019

1|P a g e
THIAGARAJAR COLLEGE OF ENGINEERING
(A Govt. Aided Autonomous Institution, Affiliated to Anna University)
MADURAI – 625 015.

Certificate of Evaluation

Certified that this 18ES390 – Technical Report titled “COMBINED MULTI-PURPOSE


INTEGERATED ALARM SYSTEM” is the bona-fide work KRISHKARNA M (18G056)
MOHAMEDTHANSIM FARID S (18G069) ROOBAN KUMAR K (18G097)
SANTHOSH P (18G098) RUBAN CHANDRAKANTH K (62ME014) of Third Semester
B.E –Mechanical Engineering during the academic year 2019 – 2020.

Project Guide H.D.M.E.

Station: Madurai
Date:

Submitted for the 18ES390 – End Semester Practical Examination (Demonstration and
Poster Presentation) held at Thiagarajar College of Engineering, Madurai – 625 015 on
_____________.

EXAMINER 1 EXAMINER 2

2|P a g e
ABSTRACT

In the recent years, with the development of technology, it has been noticed that
thefts are increasing for various public and private establishments, homes, offices,
companies, etc., as well as increased fires due to sabotage, for example, or because
of the gas leak inside the house. The homes when their owners are abroad for
vacation or business trip the danger increased so, it is necessary to find means and
systems for the security and safety, in this paper the implemented system based on
two parts, the first part is responsible on the security and the second part
responsible on the safety. The implemented system based on the Arduino UNO
microcontroller, gas sensor, flame sensor, PIR sensor, laser and LDR, the gas
sensor used in order to detect the gas leak, the flame sensor used to detect the fire,
the PIR sensor and the LDR used to detect the motion. In this work the security
made up from two level of security where, the first level based on PIR sensor to
detect the motion and second level based on the laser and LDR when the thief tries
to cutting the laser beam or passing from the front of PIR sensor the alarming
system will be turning on. Recently, technology is rapidly evolving and
developing. With the development of current technology, some of the system must
constantly evolve to avoid being obsolete. Several years ago, the home monitoring
system cannot be managed without human operation, but with current technology
discovery, especially on the Internet of Things (IoT), it gave a new face to the
home monitoring and security system. The concept and its application can be
explored by understanding the basic concept of home security using the Internet of
Things. Once this happens, it is possible to develop using the technology concept.
Different home security systems have been developed where Bluetooth, RFID,
Android and short message (SMS) communication links are used. All of this has
different approaches to the home security system but serves the same purpose as
monitoring the safety and the security of homes

3|P a g e
ACKNOWLEDGEMENT

We express our sincere gratitude to our honourable correspondent Mr. Karumuthu


T. Kannan for his encouragement and guidance in our academic life at Thiagarajar College
of Engineering.

We are greatly obliged to Dr. V. ABHAIKUMAR, Principal, Thiagarajar College of


Engineering, Madurai for his kind patronage.

We are grateful to Dr. K. CHOCKALINGAM, Professor and Head, Department of


Mechanical Engineering, Thiagarajar College of Engineering, Madurai for his energetic
encouragement.

We express our deep sense of gratitude to our project guide and faculty in-charge of Design
Thinking, Mr M. SERMARAJ, Assistant Professor of Mechanical Engineering for his
unstinting guidance and continuous support which enabled us to complete this project
successfully.

We also like to convey our sincere thanks to all the Faculty & Staff Members and all the
customers for helping and guiding us to complete this project with great success.

We also express our special thanks to our Parents who have sacrificed greatly in our
education and welfare. We thank all those who have helped us directly and indirectly in
doing this project and bringing out this report successfully Above all we are very much
thankful to THE ALMIGHTY for his marvellous grace towards us.

KRISHKARNA M (18G056)

MOHAMED THANSIM FARID S (18G069)

ROOBAN KUMAR K (18G097)

SANTHOSH P (18G098)

RUBAN CHANDRAKANTH K (62ME014)

4|P a g e
TABLE OF CONTENTS

CHAPTER TITLE PAGE


NO. NO.
ABSTRACT 3
LIST OF TABLES 8
LIST OF FIGURES 10

1. INTRODUCTION 11

1.1 DESIGN THINKING 11

1.1.1 Empathize Phase 11

1.1.2 Analyse Phase 16

1.1.3 Solve Phase 16

1.1.3 Test Phase 18

1.2 ABOUT THE PROJECT 18

2. EMPATHIZE 19

2.1 INTRODUCTION 19

2.2 SOCIETAL NEED 20

2.3 PURPOSE OF WORK 21

2.4 EXISTING AND CURRENT STATUS 21

2.5 PROBLEM FORMULATION 25

2.6 OBJECTIVES 26

2.6.1 Constraints 26

2.7 IDENTIFICATION OF STAKEHOLDERS 27

2.8 PUT YOURSELF IN CUSTOMER SHOES 27

2.9 OBSERVING THE CUSTOMERS 28

29
2.10 VOICE OF CUSTOMERS

5|P a g e
3. ANALYSE 31

3.1 INTRODUCTION 31

3.2 5 WHY ANALYSIS 31

3.3 MIND MAPPING 31

3.3.1 For problems 32

3.3.2 For causes 32

3.3.3 For solutions 33

3.4 OUR GOAL 34

4. SOLVE 35

4.1 INTRODUCTION 35

4.2 PRODUCT DESIGN SPECIFICATION (PDS) SHEET 35

4.3 CONCEPTUAL DESIGN 36

4.4 FUNCTIONAL DECOMPOSITION 37

4.5 CREATION OF PROTOTYPES 38

5. TEST 40

5.1 FEEDBACK FROM THE CUSTOMERS 40

6. CONCLUSION 41

6.1 SCOPE FOR FUTURE WORK 41

6.2 WORK SCHEDULE OF THE PROJECT 42

REFERENCES 43

6|P a g e
LIST OF TABLES

Table Title Page No.


No.
4.1 Product Design Specifications 36
5.1 Work Schedule 41

8|P a g e
LIST OF FIGURES

Figure Title Page No.


No.
1.1 Test Phase 13

2.1 Sustainable Development Goals 19

2.2 – 2.6 Survey about Project 28

3.1 Mind Map for Problems 32

3.2 Mind Map for Causes 32

3.3 Mind Map for Solutions 33

4.1 Final Rough Sketch 36

4.2 Functional Algorithm 37

4.3 Functional Prototype 38

10 | P a g e
CHAPTER 1

INTRODUCTION
1.1 DESIGN THINKING
Design thinking is a creative process that combines thoughtful research
with rapid iteration .It is a non-linear, iterative process which seeks to understand
users, challenge assumptions, redefine problems and create innovative solutions
to prototype and test. The design thinking process consisting of five phases-
Empathize, Analyse (ideate), Solve, Test.

“If a picture is worth a thousand words, a


Prototype is worth a thousand meetings”

1.1.1 EMPATHIZE PHASE

The empathize phase mainly works above the group of people to

understand their problems. The word ‘empathize’-it means “to understand”. So,

this phase are used to interact with the group of people to understand their

difficulties in the current day scenario. And empathy allows design thinkers to

set aside their own assumptions about the world in order to gain insight into users

and their needs.

WHAT is the Empathize Mode?

Empathy is the centerpiece of a human-centered design process. The


Empathize mode is the work you do to understand people, within the context of
your design challenge. It is your effort to understand the way they do things and
why, their physical and emotional needs, how they think about world, and what
is meaningful to them.

11 | P a g e
WHY Empathize

As a design thinker, the problems you are trying to solve are rarely your
own—they are those of a particular group of people; in order to design for them,
you must gain empathy for who they are and what is important to them.

Observing what people do and how they interact with their environment
gives you clues about what they think and feel. It also helps you learn about what
they need. By watching people, you can capture physical manifestations of their
experiences – what they do and say. This will allow you to infer the intangible
meaning of those experiences in order to uncover insights. These insights give
you direction to create innovative solutions. The best solutions come out of the
best insights into human behavior. But learning to recognize those insights is
harder than you might think. Why? Because our minds automatically filter out a
lot of information without our even realizing it. We need to learn to see things
“with a fresh set of eyes,” and empathizing is what gives us those new eyes.

Engaging with people directly reveals a tremendous amount about the


way they think and the values they hold. Sometimes these thoughts and values
are not obvious to the people who hold them, and a good conversation can
surprise both the designer and the subject by the unanticipated insights that are
revealed. The stories that people tell and the things that people say they do—
even if they are different from what they actually do—are strong indicators of
their deeply held beliefs about the way the world is. Good designs are built on a
solid understanding of these beliefs and values.

12 | P a g e
Figure 1.1 Empathize phase

To empathize, you:

- Observe. View users and their behavior in the context of their lives.
As much as possible do observations in relevant contexts in addition to
interviews. Some of the most powerful realizations come from noticing a
disconnect between what someone says and what he does. Others come from a
work-around someone has created which may be very surprising to you as the
designer, but she may not even think to mention in conversation.

- Engage. Sometimes we call this technique ‘interviewing’ but it


should really feel more like

a conversation. Prepare some questions you’d like to ask, but expect to


let the conversation deviate from them. Keep the conversation only loosely
bounded. Elicit stories from the people you talk to, and always ask “Why?” to
uncover deeper meaning. Engagement can come through both short ‘intercept’
encounters and longer scheduled conversations.

- Watch and Listen. Certainly you can, and should, combine


observation and engagement. Ask someone to show you how they complete a
task. Have them physically go through the steps, and talk you through why they
are doing what they do. Ask them to vocalize what’s going through their mind
as they perform a task or interact with an object. Have a conversation in the

13 | P a g e
context of someone’s home or workplace – so many stories are embodied in
artifacts. Use the environment to prompt deeper questions.

1.1.1.1 IDENTIFY YOUR CUSTOMER AND HIS CONTRAINTS

First process of the design thinking is identifying the customers and


their constraints. So from this stage that is identifying the customer and his
constraints helps us to understand the problems and their constraints that are
related to our project that is the main motto of this step.

1.1.1.2 OBSERVE THE CUSTOMERS FOR THEIR PROBLEMS

Before entering to ask questions from the customers it is necessary to


Observe the customers and their problems and their difficulties. As a result of
this, we have identified that, what are the main causes for the problem faced by
their customers and their difficulties.

1.1.1.3 ASK HIM A QUESTION IN DIRECT OR INDIRECT WAY

After observing the customers we have a duty to ask the question

about the problems faced by their people and their constraints that the product

would exert. Example (cost). As a result of this step we would know about the

constraints such as cost and the problems they are faced by their existing product.

1.1.1.4 PUT YOURSELF IN CUSTOMER SHOES

In this stage after asking questions from the people, the next step is to
put ours in customer shoes and we would think of the problems that we faced in
place of the customers. As a result of this we would experience the problems
faced by the customers.

1.1.1.5 DEFINE THE PROBLEM

Final stage of the empathize phase is to define the problem with the help
of four stages. The information from the four steps are used to define the

14 | P a g e
problem clearly. OUR PROBLEM DEFINITION IS BURGLARIES AND
ACCIDENTS DUE TO POOR ANTI-THEFT AND ALARM SYSTEMS IN HOUSES
AND WORKPLACES.

Consider what stood out to you when talking and observing people. What
patterns emerge when you look at the set? If you noticed something
interesting ask yourself (and your team) why that might be. In asking why
someone had a certain behavior or feeling you are making connections from
that person to the larger context. Develop an understanding of the type of
person you are designing for – your USER. Synthesize and select a limited
set of NEEDS that you think are important to fulfill; you may in fact express
a just one single salient need to address. Work to express INSIGHTS you
developed through the synthesis of information your have gathered through
empathy and research work. Then articulate a point-of-view by combining
these three elements – user, need, and insight – as an actionable problem
statement that will drive the rest of your design work.

A good point-of-view is one that:

- Provides focus and frames the problem

- Inspires your team

- Informs criteria for evaluating competing ideas

- Empowers your team to make decisions independently in parallel

- Captures the hearts and minds of people you meet

-Saves you from the impossible task of developing concepts that are all things to
all people (i.e. your problem statement should be discrete, not broad.)

15 | P a g e
1.1.2 ANALYZE PHASE

Second stage of design thinking is analyse phase. After defining the

problem, we have to analyse the problem carefully. The analyse phase can be

done by 4 ways such as 5 why analysis, root cause analysis, mind mapping.

1.1.2.1 5 WHY ANALYSIS

In this analyse problem is done by asking the why questions five times
for the problem and getting the clear idea about the problem.

1.1.1.1 ROOT CAUSE ANALYSIS


In this the analyse phase is done by finding the root of the problem
and finding the problems faced by the people.

1.1.1.2 MIND MAPPING

In this the analyse is done by drawing the mind map of the problem
cause in a separate mind map and the analyse is done by the mind maps. This is
the more effective tool to study the problems faced by the people.

Figure 1.2 Analyse phase


1.1.3 SOLVE PHASE
After analysing the problem we have to think the problem link with the
solution that think in the solve phase solve phase can be done by four ways such

16 | P a g e
as product design specification, conceptual design, functional decomposition,
working functional prototype.

Figure 1.3 Solve phase

1.1.3.1 PRODUCT DESIGN SPECIFICATION

It describes about the steps involving the exact specifications of the


solution product that is to be designed newly.

1.1.3.2 CONCEPTUAL DESIGN

Conceptual design involves a simple paper sketch to a very complicated


software design that is prior made to make easy and better understanding of the
new solution.

1.1.3.3 FUNCTIONAL DECOMPOSITION

Functional decomposition refers to the function of individual


components in making up the final product.

1.1.3.4 WORKING FUNCTIONAL PROTOTYPE

Functional prototype is very essential step in establishing a much


stronger impact of the idea.

17 | P a g e
1.1.2 TEST PHASE
Last and final stage of the design thinking process is the test phase, In
this phase the test can be done by giving the functional prototype to the customer
and collecting the feedback about the functional prototype and if there any
unwanted issues in that, that can be re done on the functional prototype. It is the
main motto of the test phase.

Figure1.4 Test phase

1.2 ABOUT THE PROJECT


In this project, the functional prototype of the combined alarm system
is to be done. And as we told in the past that the idea for this project can be taken
from the feedback of the people who are in the situation to face the problem. The
functional prototype of the combined alarm system can be redone compared to
the cost of the existing market product, is made reduced. Our motto is to lessen
the cost of the alarm system while retaining the efficiency of the system and it
will reached to all kinds of people.

18 | P a g e
CHAPTER 2
EMPATHIZE

2.1 INTRODUCTION

Recently, technology is rapidly evolving and developing. With the development of


current technology, some of the system must constantly evolve to avoid being
obsolete. Several years ago, the home monitoring system cannot be managed
without human operation, but with current technology discovery, especially on the
Internet of Things (IoT), it gave a new face to the home monitoring and security
system. The concept and its application can be explored by understanding the basic
concept of home security using the Internet of Things. Once this happens, it is
possible to develop using the technology concept. Different home security systems
have been developed where Bluetooth, RFID, Android and short message (SMS)
communication links are used. All of this has different approaches to the home
security system but serves the same purpose as monitoring the safety and the
security of homes.

Figure 2.1 Sustainable Development goals

19 | P a g e
2.2 NEED ASSESSMENT (SOCIETAL NEEDS)

APPLICATIONS / SOCIETIAL NEED:


Matrix of variables:

Economic: General public faces problems economically. Installation of


High safety equipment requires larger amount.

Social: Hacking of safety system become a major social factor influencing


public security.

Alignment of social issue:

Home security:

Mission and Vision: provide safety through advanced, digital,


technology-driven monitoring accompanied with the experience of our highly
dedicated security specialists; to be prepared for any urgent requirements and to
provide these services during emergency situations … whether caused by fire,
intrusions, environmental problems, natural disasters, or other such occurrences; to
balance our continued commitment to your welfare along with maintaining our
forward-thinking, emergency protocols.

ATM security:

Mission: to promote ATM convenience, growth and usage worldwide; to


protect the ATM industry’s assets, interests, good name and public trust.

Vision: “Making it easy for you”, by being conveniently located and


offering a safe and user friendly banking experience.

Social context description: Public Security represents one of basic foundations


of comprehensive security in any social system. The sustainable development of
public security leads to strengthened independence and stability of the social
system. Security and its dimensions are phenomena which are in the center of
people`s and social groups` attention in social development between the status quo

20 | P a g e
and desired condition. Therefore, public security depends on scientific
identification of objectives and ideals of society, requirements, and limitations.

2.3 PURPOSE OF WORK


Motivation of current project:

*To make efficient and cost effective safety equipment.

Goal of the project:

*Become more useful and provide high safety than current products

Significant to project partner

*Protection of general public against threats to their well being and to the
prosperity of communities.

Need of organization: General public

Current products: CCTV cameras, pattern locking doors and gates, 360 degree
motion sensor with light sensor, dual antenna Wi-Fi enabled wireless indoor
security alarm with night vision, pro wireless burglar alarm kit, fire tech alarm
security lock for home.

2.4 EXISTING AND CURRENT STATUS

2.4.1 Premier Quarto Addressable.

2.4.1.1 PRODUCT DESCRIPTION

The Quatro system network has the facility to monitor, indicate and control the
functions of a fire alarm installation, thus allowing signals to be distributed
around a large site. The networking is normally wired in a ring using Fireproof
Communication Cable. Each panel will need a network card added to the
termination board (when using QT-NC). Optionally the network ring can be wired
with fibre optic cable (using QT-NC/FP). The network will accomodate up to 32
nodes. Each node is programmed independantly with one mode chosen to be a
master. The network uses RS 485 data communication. Up to a total network

21 | P a g e
cable length of 10km is possible. All panels will continue to function in stand-
alone mode, even if the network fails. The operation of the network is such that
each node has total stand alone capability in that its local operation is not directly
affected by its connection to or disconnection from the network. The ability of a
local control panel to observe events means that it can be programmed to respond
to events elsewhere on the network. The effect of this capability is that any control
panel is able to respond to any sensor device connected anywhere on the network.
This provides a possible effective 126 loop control panel distributed around a
single site as a number of smaller units. Network repeater panels provide the
ability to observe and control elements of the network via a compact unit which
may be conveniently mounted at manned control points and still provide all
essential display and control facilities. Network communication takes place over
a single pair of wires to create a ‘Bus’ network, or a double pair of wires to create
a ‘Ring’ network (recommended).

22 | P a g e
2.4.1.2 Technical Specification
Model QT-NC QT- QT-
GNC NC/FP
Part No. 37-510 37-511 37-512
RS485 Yes Yes No
Network
Fibre No No Yes
Optic
Network
TCP/IP No Yes No
Connecti
on
RS232 Yes No No
Connecti
on (for
printer)
Modbus Yes No No
Connecti
on

2.4.2GatewayNetworkCard (QT-GNC)

The Quatro control panel is designed, manufactured and tested to fully meet
the requirements of EN54 part 2 and part 4. This panel is of a modular nature
and can be supplied in 1, 2, 3, and 4 loop versions.

A specially designed Quatro Configuration software is available for


configuring the panel or multi-panels and can be downloaded to the system
via USB connection.

Up to 32 panels/repeaters can be networked over 10,000m of data cable and a


special alarm management system can provide all needs for very large
projects such as university campus, hospital complex etc.

23 | P a g e
Technical Specification
Model QT/1 QT/2 QT/3 QT/4
Part No 37-500 37-501 37-502 37-503
Supply Voltage 230V +10%/-15% @ 50-60 Hz
System Voltage 29.5V Nominal
Number of 1 2 3 4
loops
Loop Capacity 250 250 250 250
Zonal Indication 20 20 20 20
- LED
Zonal Indication 250 250 250 250
- LCD
Fault Output Normally Energised Relay: 30V @ 1A
Fire Output Relay: 30V @ 1A
Alarm Output 2 x Conv Sounder Output @ 450mA
Printer NO NO NO NO
Dimensions 485 x 477.5 x 128
Max Battery 17Ah
size
IP Rating IP30
Operating -5oC to + 50oC
Temperature

24 | P a g e
2.4.3.1 PRODUCT DESCRIPTION

The existing market products are literally too expensive and when it comes for the
product it is more relatively cost efficient compared to former. Thus it becomes a
promising choice. Also when comparing the performance of components of the
product to their existing market product assures us of it worth.

2.5 PROBLEM FORMULATION

Based on the response, problem is formulated:


 Expensive forms of alarms and anti-theft systems
 Presence of different alarms for different purposes
 Absence of disguise / camouflage in burglar alarm
 Interference in anti-theft and CCTV networks
 Low sensitivity of motion sensors in alarm systems
.

2.6 OBJECTIVES

Based on the problems formulated, the objectives are


25 | P a g e
 To provide low cost alarm systems
 To combine all sorts of alarms in one device
 To improve the camouflage of alarms and anti-theft systems
 To prevent the interference in anti-theft systems
 To enhance the sensitivity of the alarms and related systems

2.7 CONSTRAINTS

As we discussed the objectives of the featured products such as existing

alarms and CCTV converging systems at the time of discussing the product

description of that featured product we have many constraint in that discussing

product so in the previous session we have discussed the objectives of our

project to design the new combined multipurpose alarm. The major constraints

in our developing products are:

False Alarm

These security systems are prone to false alarms that involve the alarm ringing
when anyone from your family enters the restricted area. Or there are instances
when the alarm is triggered by itself without any reason

Expensive

Both, wireless and hardwired alarm systems are expensive to install. They require
an initial investment, which includes equipment cost, installation, and subscription
of security monitoring service.

Can be Stolen

Irrespective of the type of burglar alarm you have, it can be stolen from the site
where it is installed. Wireless systems are comparatively easier to disconnect.
Some burglars can easily disconnect the wired alarm systems.

Can Relocate

26 | P a g e
The alarm system devices can be disconnected and installed at different places. It
is easy to relocate both, wireless as well has wired alarm security systems.

2.7 IDENTIFICATION OF STAKEHOLDERS

The stakeholders are the people (customers) who are directly are
indirectly related with the problem and difficulties related to the project so in
this step identification of stakeholders is done for the problem:

1. People in houses

2. Workers in workplaces and industries

3. Owners and salespersons in shops

4. General public in social places

2.8 PUT YOURSELF IN CUSTOMER SHOES

In this step the product designers are in the place of customers what are
the problems faced about the project or the prototype:

1. Difficulty in buying the different alarms

2. Difficulty in installing alarms

3. Operation procedures of alarms

4. Maintenance of alarms

5. Cost

6. Power supply

27 | P a g e
2.9 OBSERVING THE CUSTOMERS

Observing the customers place a vital role in constructing a product or


the prototype so in this step observing the customer for that project is done:

1. The alarms not works properly


2. It is not easy to operate
3. Unnecessary stimuli
4. Lack of facilities in systems
5. High cost
6. Electricity is more

2.10. VOICE OF THE CUSTOMERS

The voice of the customer about the project can be done by the online
mode place a vital role in designing a product so in this step the voice of the
customer are as follows:

28 | P a g e
Where do you feel you are facing safety
problems : 4%
22%

Home 35%

16%
Work places

ATM 23%

Do you have
enough safety in
your house and Yes
your neighbour- No 45%
hood? 55%

Suggest any
suitable
measures to
improve the
safety of
house.29 | P a g e
The ATMs you use regularly are situated
in:
scarcely populated
0%

moderate flow
22%

frequently running
population
Densely populated
56%
22%

Figure 2.6 Survey about the project

30 | P a g e
CHAPTER 3
ANALYZE
3.1 INTRODUCTION
The main motto of our project is to develop a product (alarm systems)

that should be able to camouflage and manufacture with affordable price for

the use of customers. The problem definitions and the constraints have been

previously discussed in the empathize phase. In that phase we had found the

problems that are related with the currently available alarm systems and the

constraints that are related with the new product. There are lot of constraints

in the formulation of new product. And the stakeholders are identified and

the feedback is noted. And in the second phase named analyse phase. The

name analyse deals with the product’s various constraints that are related

with various components. And in the analyse phase there are various

techniques that are used to choose the components that are used to design the

product. The analyse phase can be done by various methods such as 5 why

analysis, root cause analysis, mind mapping.

3.2 5 WHY ANALYSIS

The 5 why analysis can be done by asking the why questions for a
particular problem that leads to a base cause that is the basement for a
particular problem. Maximum for a problem 5 times why can be enough but
it can be elaborated to branched why for one why question. It is one of the
best method to analyse a particular problem.

3.3 MIND MAPPING

The mind mapping is one of the tool to analyse a problem causes and
to identify the solution for that problem in this section there are three mind
map can be done to describe a problem, causes and a solution:

31 | P a g e
1. Problem

2. Causes

3. Solutions – are the three mind mapping done in this section.

3.3.1 FOR PROBLEM ANALYSIS


In this the mind mapping can be done for the problems and the constraints,

the designed functional prototype so, first let construct a mind map for the problem.

COST
CONSTRAIN
DISPLAY AND NO
NOTIFICATION CAMOUFLAGE

PROBLEMS

INTERFERE- CUSTOMER
-NCE NEEDS

DIFFERENT
ALARMS
1st Qtr 2nd Qtr 3rd Qtr 4th Qtr

Figure 3.1 Mind map for problems

3.3.2 FOR CAUSE ANALYSIS


In this the problems are above mentioned and the mind map for the
causes can be done in this step. There are more problems in the prototype
that are caused by the materials that are low strength, over weight and lot and
lots of causes. For this the mind map can be used the problems in the above
mentioned mind map can be caused by which material that are put in the form

32 | P a g e
of mind map in this section. And deeply analysing that materials and the
prototype can be done in the solve phase. In this the mind map mainly
describes about the materials(i.e. causes) and result can be got in the next
section.

COMPLEX
PARTS
IMPROPER POWER
DISPLAYING SUPPLY

CAUSES

UNWANTED SENSITIVIT
OUTPUT Y RANGE
ALARMS
MALFUNCTIO
N

Figure 3.2 Mind map for causes

3.3.3 FOR SOLUTION


The solutions for the above mentioned problems are made through
the mind map in this section, the materials that causing the constraint are
replaced by this method.
1. COMBINING GAS, FIRE AND THEFT ALARM IN ONE SYSTEM.
2. INSTALLING CCTV CAMERAS WITH AI THAT CAN DIFFERENTIATE
HUMAN FACES
3. LINKING ALARM SYSTEMS TO NEARBY POLICE STATION
4. AUDIO-RECOGNITION SYSTEMS
5. USING THERMAL SENSORS FOR THERMAL IMAGE
IDENTIFICATION
6. PORTABLE AND HIDDEN ALARMS
7. AUTOMATIC GAS CYLINDER LOCKING WHILE DETECTING GAS
LEAKAGE

33 | P a g e
8. ALERTING NEARBY FIRE STATION AND POLICE STATION
AUTOMATICALLY IN CASE OF FIRE ACCIDENTS
9. CONNECTING FIRE AND SMOKE ALARM WITH MOBILE PHONES
THROUGH APPS
10. REMOTELY SENSING ACCIDENTS IN HOUSES BY ACCESSING
THROUGH GPS
11. FIXING METAL AND ARMS DETECTION SYSTEM IN ALARM
SYSTEMS

GPS
TRACKING
CCTV WITH AI PORTABLE
TECHNOLOGY ALARM

SOLUTION

THERMAL LINKING
SENSORS ALARMS
COMBINING
ALARMS

Figure 3.3 Mind map for solutions


3.4 OUR GOAL
Our goal is construct or design an alarm system with:

1. Low cost

2. Best quality

3. High sensitivity

4. Easy operation

5. Camouflage

34 | P a g e
CHAPTER 4
SOLVE
4.1 INTRODUCTION

This stage solve stage is next to the analyze stage that deals with the
prototype that is functional prototype. The materials, problems, constraints
that are clubbed together to form a functional prototype in this stage.
4.2 PRODUCT DESIGN SPECIFICATION

The product design specification is an important stage in an design


thinking process. The material selection for all the parts of the product can
be done in this stage. The materials and the apparatus we chosen are:

Table to show the chosen materials:

35 | P a g e
Microcontroller ATmega328

Rated.Operating.Volt-age 5V

Input Voltage (recom-mended) 7-12V

Input Voltage (limits) 6-20V

Number of Digital I/O Pins 14 (of which 6 provide PWM output)

Number of Analog Input Pins 6 pin

DC Current per I/O Pin 40 mA

DC Current for 3.3V Pin 50 mA

Flash Memory 32 KB (ATmega328) of which 0.5 KB used by


bootloader
SRAM 2 KB

EEPROM 1 KB

Clock Speed 16 MHz

Wi-Fi Mod-ule ESP-12E module similar to ESP-12 module but


with 6 extra GPIOs.
USB micro USB port for power, programming and
debugging.
Headers 2x 2.54mm 15-pin header with access to
GPIOs, SPI, UART, ADC, and power pins.

Misc. Reset and Flash buttons.

Power 5V via micro USB port.

Dimensions 49 x 24.5 x 13mm.

36 | P a g e
Table 4.1 Product Design Specification

4.3 CONCEPTUAL DESIGN

The conceptual design is a step in which the rough sketches of the


functional prototype are drawn and are held in step by steps in the form of
mind map is known as conceptual sketch.

SECURITY PART
37 | P a g e
SAFETY
PART

Figure 4.1 Final Rough Sketch

4.4 FUNCTIONAL DECOMPOSITION


The functional algorithm describes the information about each and
particular part that takes place part in the prototype and its capacity and its
functions in the prototype the below is the functional decomposition:

38 | P a g e
ALARM SYSTEM PIR SENSOR: DETECTS THE MOTION OF
LIVING ORGANISMS AS IR RADIATION

GAS SENSOR: DETECTS SMOKE, CO2, CO,


METHANE,AND LPG GAS

FLAME SENSOR: DETECTS FLAME FROM


HEAT RADIATION

Figure 4.2 Functional algorithm

4.5 PROTOTYPE
The process of making prototype is a third stage of a design thinking
process it lies under the solve stage. The prototype for the above mentioned
all the factor can be finished through prototype. Our prototype is as follows:

39 | P a g e
Figure 4.3 Functional prototype

CHAPTER 5

40 | P a g e
TEST
5.1 INTRODUCTION
The test phase is the final phase of the design thinking process and in

this phase the functional prototype made in the previous phase (solve) can be

given to the people and getting their difficulties and the feedbacks in the

current made functional prototype and some adjustments are made in the

final prototype for future use. In this phase the prototype and the product

designers are interact with the people.

5.2 FEEDBACK FROM THE CUSTOMERS

We had exhibited our project report, design and prototype in an in-

house open exhibition. Many of the customers visited our project and gives

essential feedback about the project. The feedbacks are both positive as well

as negative. Many of them had visited our project and gives the feedback

about the project. And gives a valuable feedback about that. That are useful

to renovated the existing project. People can give negative feedbacks are

mainly used to renovate the project.

CHAPTER 6
41 | P a g e
CONCLUSION

6.1 CONCLUSION
Finally we completed our functional prototype. At the time of
prototype making, we have a lot of issues and drawbacks such as material
selection, constraint, product design, portability, electricity and the arduino.
Major issue is the material selection for the project in the analyse phase for
the outstanding functionality of the project.

6.1 SCOPE OF FUTURE WORK

From the ideas we get it from the customers, we have planned to


improve our project to the next level and have scope of our project in future.
The following are the sectors we have a scope:
 Design improvement
 Component integration
 Linking with organisations
 Thermal recognition.

6.2 WORK SCHEDULE OF THE PROJECT


DATE TASK DONE

01/07/19 INTRODUCTION TO DESIGN THINKING

08/07/19 TEAM FORMATION

17/07/19 DECIDING SOCIALLY RELEVANT PROBLEMS

26/07/19 PROBLEM AND CUSTOMER IDENTIFICATION

29/07/19 OBSERVING STAKEHOLDERS

31/07/19 CREATING SURVEY FORMS

07/08/19 SURVEYING

10/08/19 CONSOLIDATION OF THE SURVEY RESULTS

12/08/19 CREATING SURVEY REPORTS AND PRESENTATION

21/08/19 FORMULATION OF PROBLEM, OBJECTIVES, SCOPE,


CONSTRAINS AND REVIEW-I
26/09/19 ANALYSING CUSTOMER REVIEWS

42 | P a g e
29/09/19 BRAINSTROMING AND IDEA GENERATION

2/09/19 TRADE OFF SUITABLE SOLUTION TO FIND BEST SOLUTION

9/09/19 PRESENTING BEST SOLUTION

15/09/19 PURCHASING MATERIALS FOR PROTOTYPE

22/09/19 PREPARING PRESENTATION FOR REVIEW II

26/09/19 PREPARATION OF PROTOTYPE MODEL


30/09/19 BRAINSTROMING, IDEA GENERATION, BEST SOLUTION
REVIEW-II
1/10/19 MAKING CHANGES IN PROTOTYPE

6/10/19 MAKING POSTER

10/10/19 FUNCTIONS AND ALTERNATE SOLUTIONS


REVIEW-III
14/10/19 PRESENTING PROTOTYPE AND POSTER IN EXHIBITION

Table 6.1 Work schedule

References

43 | P a g e
[1] T. Via et al., “Design and Development of Home Security Systems based on
Internet of Design and Development of Home Security Systems based on Internet of
Things Via Favoriot Platform,” Int. J. Appl. Eng. Res., vol. 13, no. 2, pp. 1253–1260,
2018.
[2] M. N. Azni, M. Daud, K. Azir, and P. L. E. Kan, “Home Automation System with
Android Application,” 3rd Int. Conf. Electron. Des. (ICED), IEEE, pp. 299–303,
2016. https://doi.org/10.1109/ICED.2016.7804656.
[3] Patchava, V., Kandala, H. B., & Babu, P. R., “A Smart Home Automation
Technique with Raspberry Pi using IoT,” Int. Conf. Smart Sensors Syst. IEEE., pp. 3–
6, 2015. https://doi.org/10.1109/SMARTSENS.2015.7873584.
[4] I. A. Taha and H. M. Marhoon, “Implementation of Controlled Robot for Fire
Detection and Extinguish to Closed Areas Based on Arduino,” TELKOMNIKA, vol.
16, no. 2, pp. 654–665, 2018. https://doi.org/10.12928/telkomnika.v16i3.8197.
[5] S. Warudkar, R. Deshmukh, and V. R. Parihar, “POWER MONITORING
SYSTEM USING MICROCONTROLLER FOR OPTIMUM POWER UTILITY IN
HOMES,” Reinvention Int. An Int. J. Thesis Proj. Diss., vol. 1, no. 1, pp. 97–112,
2018.
[6] H. M. Marhoon and I. A. Taha, “DESIGN AND IMPLEMENTATION OF
INTELLIGENT CIRCUIT BREAKER FOR ELECTRICAL CURRENT SENSING
AND MONITORING,” Int. J. Core Eng. Manag., vol. 4, no. 11, pp. 39–49, 2018.
[7] A. M. A.-K. Hamzah M. Marhoon, Zeyad A. Karam, “Implementation of Cell
Phone Detection Mobile Robot for Restricted Areas IMPLEMENTATION OF CELL
PHONE DETECTION MOBILE,” Iraqi J. Inf. Commun. Technol., vol. 1, no. 1, pp.
27–35, 2018. https://doi.org/10.31987/ijict.1.1.6.
[8] H. M. Marhoon, M. I. Mahdi, E. D. Hussein, and A. R. Ibrahim, “Designing and
Implementing Applications of Smart Home Appliances,” Mod. Appl. Sci., vol. 12, no.
12, pp. 8–17, 2018. https://doi.org/10.5539/mas.v12n12p8.
[9] I. Mobin, N. Islam, and R. Hasan, “An Intelligent Fire Detection and Mitigation
System Safe from Fire ( SFF ),” Int. J. Comput. Appl., vol. 133, no. 6, pp. 1–7, 2016.

44 | P a g e
[10] R. S. Ransing, “Smart Home for Elderly Care , based on Wireless Sensor
Network,” Int. Conf. Nascent Technol. Eng. F. (ICNTE). IEEE, pp. 1–5, 2015.
https://doi.org/10.1109/ICNTE.2015.7029932.
[11] C. Tsai, Y. Bai, C. Chu, C. Chung, and M. Lin, “PIR-sensor-based Lighting
Device with Ultra-low Standby Power Consumption PIR-sensor-based Lighting
Device with Ultra-low Standby Power Consumption,” IEEE Trans. Consum.
Electron., vol. 57, no. 3, pp. 1157–1164, 2015.
https://doi.org/10.1109/TCE.2011.6018869.
[12] H. A. Sohag, M. Hasan, M. M. Khatun, and M. Ahmad, “An Accurate and
Efficient Solar Tracking System Using Image Processing and LDR Sensor,” Int. Conf.
Electr. Inf. Commun. Technol.,IEEE. pp. 522–527, 2015.
https://doi.org/10.1109/EICT.2015.7392008.
[13] A. Pramanik, V. Nagar, S. Dwivedi, and B. Choudhury, “GSM based Smart
Home and Digital Notice Board,” Int. Conf. Comput. Tech. Inf. Commun. Technol.
(ICCTICT).IEEE, pp. 41–46, 2016. https://doi.org/10.1109/ICCTICT.2016.7514549.
[14] S. M. Ahmed, H. M. Marhoon, and O. Nuri, “Implementation of smart anti-theft
car security system based on GSM,” Int. J. Eng. Technol., vol. 7, no. 4, pp. 5368–
5372, 2018.

45 | P a g e
46 | P a g e

Vous aimerez peut-être aussi