Académique Documents
Professionnel Documents
Culture Documents
ALARM SYSTEM
18ES390 – DESIGN THINKING
NOVEMBER 4, 2019
THIAGARAJAR COLLEGE OF ENGINEERING
MADURAI – 625 015
PUBLIC SAFETY AND SECURITY
COMBINED MULTI-PURPOSE INTEGERATED
ALARM SYSTEM
Technical Report
Submitted by
KRISHKARNA M (18G056)
MOHAMED THANSIM FARID S (18G069)
ROOBAN KUMAR K (18G097)
SANTHOSH P (18G098)
RUBAN CHANDRAKANTH K (62ME014)
Faculty In-charge
Mr M. SERMARAJ
Assistant Professor of Mechanical Engineering
Department of Mechanical Engineering
NOVEMBER 2019
1|P a g e
THIAGARAJAR COLLEGE OF ENGINEERING
(A Govt. Aided Autonomous Institution, Affiliated to Anna University)
MADURAI – 625 015.
Certificate of Evaluation
Station: Madurai
Date:
Submitted for the 18ES390 – End Semester Practical Examination (Demonstration and
Poster Presentation) held at Thiagarajar College of Engineering, Madurai – 625 015 on
_____________.
EXAMINER 1 EXAMINER 2
2|P a g e
ABSTRACT
In the recent years, with the development of technology, it has been noticed that
thefts are increasing for various public and private establishments, homes, offices,
companies, etc., as well as increased fires due to sabotage, for example, or because
of the gas leak inside the house. The homes when their owners are abroad for
vacation or business trip the danger increased so, it is necessary to find means and
systems for the security and safety, in this paper the implemented system based on
two parts, the first part is responsible on the security and the second part
responsible on the safety. The implemented system based on the Arduino UNO
microcontroller, gas sensor, flame sensor, PIR sensor, laser and LDR, the gas
sensor used in order to detect the gas leak, the flame sensor used to detect the fire,
the PIR sensor and the LDR used to detect the motion. In this work the security
made up from two level of security where, the first level based on PIR sensor to
detect the motion and second level based on the laser and LDR when the thief tries
to cutting the laser beam or passing from the front of PIR sensor the alarming
system will be turning on. Recently, technology is rapidly evolving and
developing. With the development of current technology, some of the system must
constantly evolve to avoid being obsolete. Several years ago, the home monitoring
system cannot be managed without human operation, but with current technology
discovery, especially on the Internet of Things (IoT), it gave a new face to the
home monitoring and security system. The concept and its application can be
explored by understanding the basic concept of home security using the Internet of
Things. Once this happens, it is possible to develop using the technology concept.
Different home security systems have been developed where Bluetooth, RFID,
Android and short message (SMS) communication links are used. All of this has
different approaches to the home security system but serves the same purpose as
monitoring the safety and the security of homes
3|P a g e
ACKNOWLEDGEMENT
We express our deep sense of gratitude to our project guide and faculty in-charge of Design
Thinking, Mr M. SERMARAJ, Assistant Professor of Mechanical Engineering for his
unstinting guidance and continuous support which enabled us to complete this project
successfully.
We also like to convey our sincere thanks to all the Faculty & Staff Members and all the
customers for helping and guiding us to complete this project with great success.
We also express our special thanks to our Parents who have sacrificed greatly in our
education and welfare. We thank all those who have helped us directly and indirectly in
doing this project and bringing out this report successfully Above all we are very much
thankful to THE ALMIGHTY for his marvellous grace towards us.
KRISHKARNA M (18G056)
SANTHOSH P (18G098)
4|P a g e
TABLE OF CONTENTS
1. INTRODUCTION 11
2. EMPATHIZE 19
2.1 INTRODUCTION 19
2.6 OBJECTIVES 26
2.6.1 Constraints 26
29
2.10 VOICE OF CUSTOMERS
5|P a g e
3. ANALYSE 31
3.1 INTRODUCTION 31
4. SOLVE 35
4.1 INTRODUCTION 35
5. TEST 40
6. CONCLUSION 41
REFERENCES 43
6|P a g e
LIST OF TABLES
8|P a g e
LIST OF FIGURES
10 | P a g e
CHAPTER 1
INTRODUCTION
1.1 DESIGN THINKING
Design thinking is a creative process that combines thoughtful research
with rapid iteration .It is a non-linear, iterative process which seeks to understand
users, challenge assumptions, redefine problems and create innovative solutions
to prototype and test. The design thinking process consisting of five phases-
Empathize, Analyse (ideate), Solve, Test.
understand their problems. The word ‘empathize’-it means “to understand”. So,
this phase are used to interact with the group of people to understand their
difficulties in the current day scenario. And empathy allows design thinkers to
set aside their own assumptions about the world in order to gain insight into users
11 | P a g e
WHY Empathize
As a design thinker, the problems you are trying to solve are rarely your
own—they are those of a particular group of people; in order to design for them,
you must gain empathy for who they are and what is important to them.
Observing what people do and how they interact with their environment
gives you clues about what they think and feel. It also helps you learn about what
they need. By watching people, you can capture physical manifestations of their
experiences – what they do and say. This will allow you to infer the intangible
meaning of those experiences in order to uncover insights. These insights give
you direction to create innovative solutions. The best solutions come out of the
best insights into human behavior. But learning to recognize those insights is
harder than you might think. Why? Because our minds automatically filter out a
lot of information without our even realizing it. We need to learn to see things
“with a fresh set of eyes,” and empathizing is what gives us those new eyes.
12 | P a g e
Figure 1.1 Empathize phase
To empathize, you:
- Observe. View users and their behavior in the context of their lives.
As much as possible do observations in relevant contexts in addition to
interviews. Some of the most powerful realizations come from noticing a
disconnect between what someone says and what he does. Others come from a
work-around someone has created which may be very surprising to you as the
designer, but she may not even think to mention in conversation.
13 | P a g e
context of someone’s home or workplace – so many stories are embodied in
artifacts. Use the environment to prompt deeper questions.
about the problems faced by their people and their constraints that the product
would exert. Example (cost). As a result of this step we would know about the
constraints such as cost and the problems they are faced by their existing product.
In this stage after asking questions from the people, the next step is to
put ours in customer shoes and we would think of the problems that we faced in
place of the customers. As a result of this we would experience the problems
faced by the customers.
Final stage of the empathize phase is to define the problem with the help
of four stages. The information from the four steps are used to define the
14 | P a g e
problem clearly. OUR PROBLEM DEFINITION IS BURGLARIES AND
ACCIDENTS DUE TO POOR ANTI-THEFT AND ALARM SYSTEMS IN HOUSES
AND WORKPLACES.
Consider what stood out to you when talking and observing people. What
patterns emerge when you look at the set? If you noticed something
interesting ask yourself (and your team) why that might be. In asking why
someone had a certain behavior or feeling you are making connections from
that person to the larger context. Develop an understanding of the type of
person you are designing for – your USER. Synthesize and select a limited
set of NEEDS that you think are important to fulfill; you may in fact express
a just one single salient need to address. Work to express INSIGHTS you
developed through the synthesis of information your have gathered through
empathy and research work. Then articulate a point-of-view by combining
these three elements – user, need, and insight – as an actionable problem
statement that will drive the rest of your design work.
-Saves you from the impossible task of developing concepts that are all things to
all people (i.e. your problem statement should be discrete, not broad.)
15 | P a g e
1.1.2 ANALYZE PHASE
problem, we have to analyse the problem carefully. The analyse phase can be
done by 4 ways such as 5 why analysis, root cause analysis, mind mapping.
In this analyse problem is done by asking the why questions five times
for the problem and getting the clear idea about the problem.
In this the analyse is done by drawing the mind map of the problem
cause in a separate mind map and the analyse is done by the mind maps. This is
the more effective tool to study the problems faced by the people.
16 | P a g e
as product design specification, conceptual design, functional decomposition,
working functional prototype.
17 | P a g e
1.1.2 TEST PHASE
Last and final stage of the design thinking process is the test phase, In
this phase the test can be done by giving the functional prototype to the customer
and collecting the feedback about the functional prototype and if there any
unwanted issues in that, that can be re done on the functional prototype. It is the
main motto of the test phase.
18 | P a g e
CHAPTER 2
EMPATHIZE
2.1 INTRODUCTION
19 | P a g e
2.2 NEED ASSESSMENT (SOCIETAL NEEDS)
Home security:
ATM security:
20 | P a g e
and desired condition. Therefore, public security depends on scientific
identification of objectives and ideals of society, requirements, and limitations.
*Become more useful and provide high safety than current products
*Protection of general public against threats to their well being and to the
prosperity of communities.
Current products: CCTV cameras, pattern locking doors and gates, 360 degree
motion sensor with light sensor, dual antenna Wi-Fi enabled wireless indoor
security alarm with night vision, pro wireless burglar alarm kit, fire tech alarm
security lock for home.
The Quatro system network has the facility to monitor, indicate and control the
functions of a fire alarm installation, thus allowing signals to be distributed
around a large site. The networking is normally wired in a ring using Fireproof
Communication Cable. Each panel will need a network card added to the
termination board (when using QT-NC). Optionally the network ring can be wired
with fibre optic cable (using QT-NC/FP). The network will accomodate up to 32
nodes. Each node is programmed independantly with one mode chosen to be a
master. The network uses RS 485 data communication. Up to a total network
21 | P a g e
cable length of 10km is possible. All panels will continue to function in stand-
alone mode, even if the network fails. The operation of the network is such that
each node has total stand alone capability in that its local operation is not directly
affected by its connection to or disconnection from the network. The ability of a
local control panel to observe events means that it can be programmed to respond
to events elsewhere on the network. The effect of this capability is that any control
panel is able to respond to any sensor device connected anywhere on the network.
This provides a possible effective 126 loop control panel distributed around a
single site as a number of smaller units. Network repeater panels provide the
ability to observe and control elements of the network via a compact unit which
may be conveniently mounted at manned control points and still provide all
essential display and control facilities. Network communication takes place over
a single pair of wires to create a ‘Bus’ network, or a double pair of wires to create
a ‘Ring’ network (recommended).
22 | P a g e
2.4.1.2 Technical Specification
Model QT-NC QT- QT-
GNC NC/FP
Part No. 37-510 37-511 37-512
RS485 Yes Yes No
Network
Fibre No No Yes
Optic
Network
TCP/IP No Yes No
Connecti
on
RS232 Yes No No
Connecti
on (for
printer)
Modbus Yes No No
Connecti
on
2.4.2GatewayNetworkCard (QT-GNC)
The Quatro control panel is designed, manufactured and tested to fully meet
the requirements of EN54 part 2 and part 4. This panel is of a modular nature
and can be supplied in 1, 2, 3, and 4 loop versions.
23 | P a g e
Technical Specification
Model QT/1 QT/2 QT/3 QT/4
Part No 37-500 37-501 37-502 37-503
Supply Voltage 230V +10%/-15% @ 50-60 Hz
System Voltage 29.5V Nominal
Number of 1 2 3 4
loops
Loop Capacity 250 250 250 250
Zonal Indication 20 20 20 20
- LED
Zonal Indication 250 250 250 250
- LCD
Fault Output Normally Energised Relay: 30V @ 1A
Fire Output Relay: 30V @ 1A
Alarm Output 2 x Conv Sounder Output @ 450mA
Printer NO NO NO NO
Dimensions 485 x 477.5 x 128
Max Battery 17Ah
size
IP Rating IP30
Operating -5oC to + 50oC
Temperature
24 | P a g e
2.4.3.1 PRODUCT DESCRIPTION
The existing market products are literally too expensive and when it comes for the
product it is more relatively cost efficient compared to former. Thus it becomes a
promising choice. Also when comparing the performance of components of the
product to their existing market product assures us of it worth.
2.6 OBJECTIVES
2.7 CONSTRAINTS
alarms and CCTV converging systems at the time of discussing the product
project to design the new combined multipurpose alarm. The major constraints
False Alarm
These security systems are prone to false alarms that involve the alarm ringing
when anyone from your family enters the restricted area. Or there are instances
when the alarm is triggered by itself without any reason
Expensive
Both, wireless and hardwired alarm systems are expensive to install. They require
an initial investment, which includes equipment cost, installation, and subscription
of security monitoring service.
Can be Stolen
Irrespective of the type of burglar alarm you have, it can be stolen from the site
where it is installed. Wireless systems are comparatively easier to disconnect.
Some burglars can easily disconnect the wired alarm systems.
Can Relocate
26 | P a g e
The alarm system devices can be disconnected and installed at different places. It
is easy to relocate both, wireless as well has wired alarm security systems.
The stakeholders are the people (customers) who are directly are
indirectly related with the problem and difficulties related to the project so in
this step identification of stakeholders is done for the problem:
1. People in houses
In this step the product designers are in the place of customers what are
the problems faced about the project or the prototype:
4. Maintenance of alarms
5. Cost
6. Power supply
27 | P a g e
2.9 OBSERVING THE CUSTOMERS
The voice of the customer about the project can be done by the online
mode place a vital role in designing a product so in this step the voice of the
customer are as follows:
28 | P a g e
Where do you feel you are facing safety
problems : 4%
22%
Home 35%
16%
Work places
ATM 23%
Do you have
enough safety in
your house and Yes
your neighbour- No 45%
hood? 55%
Suggest any
suitable
measures to
improve the
safety of
house.29 | P a g e
The ATMs you use regularly are situated
in:
scarcely populated
0%
moderate flow
22%
frequently running
population
Densely populated
56%
22%
30 | P a g e
CHAPTER 3
ANALYZE
3.1 INTRODUCTION
The main motto of our project is to develop a product (alarm systems)
that should be able to camouflage and manufacture with affordable price for
the use of customers. The problem definitions and the constraints have been
previously discussed in the empathize phase. In that phase we had found the
problems that are related with the currently available alarm systems and the
constraints that are related with the new product. There are lot of constraints
in the formulation of new product. And the stakeholders are identified and
the feedback is noted. And in the second phase named analyse phase. The
name analyse deals with the product’s various constraints that are related
with various components. And in the analyse phase there are various
techniques that are used to choose the components that are used to design the
product. The analyse phase can be done by various methods such as 5 why
The 5 why analysis can be done by asking the why questions for a
particular problem that leads to a base cause that is the basement for a
particular problem. Maximum for a problem 5 times why can be enough but
it can be elaborated to branched why for one why question. It is one of the
best method to analyse a particular problem.
The mind mapping is one of the tool to analyse a problem causes and
to identify the solution for that problem in this section there are three mind
map can be done to describe a problem, causes and a solution:
31 | P a g e
1. Problem
2. Causes
the designed functional prototype so, first let construct a mind map for the problem.
COST
CONSTRAIN
DISPLAY AND NO
NOTIFICATION CAMOUFLAGE
PROBLEMS
INTERFERE- CUSTOMER
-NCE NEEDS
DIFFERENT
ALARMS
1st Qtr 2nd Qtr 3rd Qtr 4th Qtr
32 | P a g e
of mind map in this section. And deeply analysing that materials and the
prototype can be done in the solve phase. In this the mind map mainly
describes about the materials(i.e. causes) and result can be got in the next
section.
COMPLEX
PARTS
IMPROPER POWER
DISPLAYING SUPPLY
CAUSES
UNWANTED SENSITIVIT
OUTPUT Y RANGE
ALARMS
MALFUNCTIO
N
33 | P a g e
8. ALERTING NEARBY FIRE STATION AND POLICE STATION
AUTOMATICALLY IN CASE OF FIRE ACCIDENTS
9. CONNECTING FIRE AND SMOKE ALARM WITH MOBILE PHONES
THROUGH APPS
10. REMOTELY SENSING ACCIDENTS IN HOUSES BY ACCESSING
THROUGH GPS
11. FIXING METAL AND ARMS DETECTION SYSTEM IN ALARM
SYSTEMS
GPS
TRACKING
CCTV WITH AI PORTABLE
TECHNOLOGY ALARM
SOLUTION
THERMAL LINKING
SENSORS ALARMS
COMBINING
ALARMS
1. Low cost
2. Best quality
3. High sensitivity
4. Easy operation
5. Camouflage
34 | P a g e
CHAPTER 4
SOLVE
4.1 INTRODUCTION
This stage solve stage is next to the analyze stage that deals with the
prototype that is functional prototype. The materials, problems, constraints
that are clubbed together to form a functional prototype in this stage.
4.2 PRODUCT DESIGN SPECIFICATION
35 | P a g e
Microcontroller ATmega328
Rated.Operating.Volt-age 5V
EEPROM 1 KB
36 | P a g e
Table 4.1 Product Design Specification
SECURITY PART
37 | P a g e
SAFETY
PART
38 | P a g e
ALARM SYSTEM PIR SENSOR: DETECTS THE MOTION OF
LIVING ORGANISMS AS IR RADIATION
4.5 PROTOTYPE
The process of making prototype is a third stage of a design thinking
process it lies under the solve stage. The prototype for the above mentioned
all the factor can be finished through prototype. Our prototype is as follows:
39 | P a g e
Figure 4.3 Functional prototype
CHAPTER 5
40 | P a g e
TEST
5.1 INTRODUCTION
The test phase is the final phase of the design thinking process and in
this phase the functional prototype made in the previous phase (solve) can be
given to the people and getting their difficulties and the feedbacks in the
current made functional prototype and some adjustments are made in the
final prototype for future use. In this phase the prototype and the product
house open exhibition. Many of the customers visited our project and gives
essential feedback about the project. The feedbacks are both positive as well
as negative. Many of them had visited our project and gives the feedback
about the project. And gives a valuable feedback about that. That are useful
to renovated the existing project. People can give negative feedbacks are
CHAPTER 6
41 | P a g e
CONCLUSION
6.1 CONCLUSION
Finally we completed our functional prototype. At the time of
prototype making, we have a lot of issues and drawbacks such as material
selection, constraint, product design, portability, electricity and the arduino.
Major issue is the material selection for the project in the analyse phase for
the outstanding functionality of the project.
07/08/19 SURVEYING
42 | P a g e
29/09/19 BRAINSTROMING AND IDEA GENERATION
References
43 | P a g e
[1] T. Via et al., “Design and Development of Home Security Systems based on
Internet of Design and Development of Home Security Systems based on Internet of
Things Via Favoriot Platform,” Int. J. Appl. Eng. Res., vol. 13, no. 2, pp. 1253–1260,
2018.
[2] M. N. Azni, M. Daud, K. Azir, and P. L. E. Kan, “Home Automation System with
Android Application,” 3rd Int. Conf. Electron. Des. (ICED), IEEE, pp. 299–303,
2016. https://doi.org/10.1109/ICED.2016.7804656.
[3] Patchava, V., Kandala, H. B., & Babu, P. R., “A Smart Home Automation
Technique with Raspberry Pi using IoT,” Int. Conf. Smart Sensors Syst. IEEE., pp. 3–
6, 2015. https://doi.org/10.1109/SMARTSENS.2015.7873584.
[4] I. A. Taha and H. M. Marhoon, “Implementation of Controlled Robot for Fire
Detection and Extinguish to Closed Areas Based on Arduino,” TELKOMNIKA, vol.
16, no. 2, pp. 654–665, 2018. https://doi.org/10.12928/telkomnika.v16i3.8197.
[5] S. Warudkar, R. Deshmukh, and V. R. Parihar, “POWER MONITORING
SYSTEM USING MICROCONTROLLER FOR OPTIMUM POWER UTILITY IN
HOMES,” Reinvention Int. An Int. J. Thesis Proj. Diss., vol. 1, no. 1, pp. 97–112,
2018.
[6] H. M. Marhoon and I. A. Taha, “DESIGN AND IMPLEMENTATION OF
INTELLIGENT CIRCUIT BREAKER FOR ELECTRICAL CURRENT SENSING
AND MONITORING,” Int. J. Core Eng. Manag., vol. 4, no. 11, pp. 39–49, 2018.
[7] A. M. A.-K. Hamzah M. Marhoon, Zeyad A. Karam, “Implementation of Cell
Phone Detection Mobile Robot for Restricted Areas IMPLEMENTATION OF CELL
PHONE DETECTION MOBILE,” Iraqi J. Inf. Commun. Technol., vol. 1, no. 1, pp.
27–35, 2018. https://doi.org/10.31987/ijict.1.1.6.
[8] H. M. Marhoon, M. I. Mahdi, E. D. Hussein, and A. R. Ibrahim, “Designing and
Implementing Applications of Smart Home Appliances,” Mod. Appl. Sci., vol. 12, no.
12, pp. 8–17, 2018. https://doi.org/10.5539/mas.v12n12p8.
[9] I. Mobin, N. Islam, and R. Hasan, “An Intelligent Fire Detection and Mitigation
System Safe from Fire ( SFF ),” Int. J. Comput. Appl., vol. 133, no. 6, pp. 1–7, 2016.
44 | P a g e
[10] R. S. Ransing, “Smart Home for Elderly Care , based on Wireless Sensor
Network,” Int. Conf. Nascent Technol. Eng. F. (ICNTE). IEEE, pp. 1–5, 2015.
https://doi.org/10.1109/ICNTE.2015.7029932.
[11] C. Tsai, Y. Bai, C. Chu, C. Chung, and M. Lin, “PIR-sensor-based Lighting
Device with Ultra-low Standby Power Consumption PIR-sensor-based Lighting
Device with Ultra-low Standby Power Consumption,” IEEE Trans. Consum.
Electron., vol. 57, no. 3, pp. 1157–1164, 2015.
https://doi.org/10.1109/TCE.2011.6018869.
[12] H. A. Sohag, M. Hasan, M. M. Khatun, and M. Ahmad, “An Accurate and
Efficient Solar Tracking System Using Image Processing and LDR Sensor,” Int. Conf.
Electr. Inf. Commun. Technol.,IEEE. pp. 522–527, 2015.
https://doi.org/10.1109/EICT.2015.7392008.
[13] A. Pramanik, V. Nagar, S. Dwivedi, and B. Choudhury, “GSM based Smart
Home and Digital Notice Board,” Int. Conf. Comput. Tech. Inf. Commun. Technol.
(ICCTICT).IEEE, pp. 41–46, 2016. https://doi.org/10.1109/ICCTICT.2016.7514549.
[14] S. M. Ahmed, H. M. Marhoon, and O. Nuri, “Implementation of smart anti-theft
car security system based on GSM,” Int. J. Eng. Technol., vol. 7, no. 4, pp. 5368–
5372, 2018.
45 | P a g e
46 | P a g e