Design And Construction Of An Intruder Alarm

The Design And Construction Of An Intruder Alarm (PDF/DOC)

Overview

ABSTRACTC The CD4011 times the circuits and also generates a tone and this tone is send to transistor which amplifies the tone generated through a loud speaker or buzzer.

This device functions as a major security alarms  used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders . It is an electronic device that is connected to the battery being installed in and gets activated when the owner of the building is leaving the building by moving the switch to the “set” position. When the system is in this “set” position, if intruder open and enters the building the alarm will start to blow after 20 seconds indicating that unauthorized has entered the building. The device and the “reset” switch are not seen but, it has an indicator light which shows that the alarm has been activated and it can only be reset by the owner of the building when return.

TABLE OF CONTENTS

 TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRCT

TABLE OF CONTENT

CHAPTER ONE

  • INTRODUCTION
  • LIMITATION OF THE PROJECT
  • AIM/OBJECTIVE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • SCOPE OF THE PROJECT
  • LIMITATION OF THE PROJECT
  • APPLICATION OF THE PROJECT
  • PROJECT ORGANISATION

CHAPTER TWO

LITERATURE REVIEW

2.0      LITERATURE REVIEW
2.1      REVIEW OF THE PROJECT

2.2     HISTORICAL BACKGROUND OF INTRUDER ALARM

CHAPTER THREE

3.0      CONSTRUCTION METHODOLOGY

3.1      BLOCK DIAGRAM OF THE SYSTEM

3.2      CIRCUIT DIAGRAM

3.3      CIRCUIT DESCRIPTION

3.4      SYSTEM OPERATION

3.5      COMPONENTS LIST

3.6     DESCRIPTION OF MAJOR COMPONENTS USED

CHAPTER FOUR

4.0       RESULT ANALYSIS

4.1      CONSTRUCTION PROCEDURE AND TESTING

4.2      ASSEMBLING OF SECTIONS

4.3      CONSRUCTION OF THE CASING

4.4     TESTING

CHAPTER FIVE

  • CONCLUSIONS
  • RECOMMENDATION

5.3     REFERENCES

LIST OF SYMBOLS

NAME                                                                    SYMBOLS

Resistor

Transistor

Diode

Zener diode

Trimmer capacitor

Polarized capacitor

Unpolarized capacitor

 

Variable capacitor                                                                                 

CHAPTER ONE

1.0                                                        INTRODUCTION

The need for having home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration [1] [2].

The guard was also susceptible to sleep at times. It was then that home alarm system based upon electronic circuits were developed which proved to be highly reliable and were appreciated by the people as they were relieved from constant monitoring of their homes [3].

This intruder alarm system uses CD4011 Cmos IC which was wired as a timing circuit, as tone generator and amplifier to obtain a maximum audible sound. The CD4011 times the circuits and also generates a tone and this tone is send to transistor which amplifies the tone generated through a loud speaker or buzzer.

The reset button is used to reset or open circuit the system back to its initial stage. The system is powered with 12V power supply voltage [9].

1.1                                                  PROBLEM STATEMENT

The need for having a constant home illumination and home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration. This device brought solution to this need. It ensures adequate protection against intruders.

1.2                                     AIM AND OBJECTIVE

The main aim and objective of the design and construction this project is to create a comfort in the minds of house owners when they out from their premises without much fear of intruder.

1.3                             SIGNIFICANCE OF THE PROJECT

This device functions as an electronics watch dog. This device functions as a major security alarms  used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders.

1.4                                                         APPLICATION OF THE PROJECT

Burglar alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Car alarms likewise protect vehicles and their contents. Prisons also use security systems for control of inmates.

1.5                                                 SCOPE OF THE PROJECT

This circuit will help you to guard your precious documents as well as jewellery from intruders or theft. All you need is just to place this circuit in front of the locker or below the mat so when any unknown person come and walk over the switch, the circuit will trigger and sound of alarm comes. The main benefit of the circuit is that these can be implied in two places at a time as two different switches produces two different sounds.

1.6                                           LIMITATION OF THE PROJECT

Can Be Expensive:

High quality, state-of-the-art alarm systems don’t come cheap. They require substantial initial investment, which includes equipment cost, installation and subscription of security monitoring service [8].

False Alarm:

Most systems are prone to false alarms that involve the alarm going off on you, or the alarm sounding off even when there’s no emergency situation. This can be extremely embarrassing, especially when the alarm sound sounds and the authorities – show, only to find that you tried to “break” your own house [8].

1.7                          PROJECT WORK ORGANISATION

The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:

Chapter one of this works is on the introduction to an intruder alarm. In this chapter, the background, significance, objective limitation and problem of a intruder alarm were discussed.

Chapter two is on literature review of an intruder alarm. In this chapter, all the literature pertaining to this work was reviewed.

Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.

Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.

Chapter five is on conclusion, recommendation and references.

 

Chapter Two

Click the button below to INSTANTLY subscribe and download the COMPLETE MATERIAL (PDF/DOC)!

Related Field(s):

This Study On The Design And Construction Of An Intruder Alarm Is Relevant To Students And Researchers In Electrical Electronics Engineering And Related Fields.