TRANSILVANIA UNIVERSITY OF BRAȘOV Electrical Engineering and Computers Science Faculty Electrical Engineering and Applied Physics Department Bachelor… [301642]

TRANSILVANIA UNIVERSITY OF BRAȘOV

Electrical Engineering and Computers Science Faculty

Electrical Engineering and Applied Physics Department

Bachelor degree: Electrical Engineering and Computers

Smart houses’ [anonimizat]

– [anonimizat]: ZAHARIA Bogdan

Scientific coordinator: Conf.univ.dr.ing. Aciu Lia Elena

2015

Table of Contents

Chapter 1. “Why smart house?”

1.1. Introduction…………………………………………………………6

1.2. The Intelligent Building concept……………………………………8

1.2.1. Central dispatcher subsystem……………………………………..8

1.2.2. The detection subsystem and signalling…………………………..9

1.2.3. Subsystem fire detection and signalling………………………….10

1.2.4. Subsystem for tracking access to persons and objects and documents…………………………………………………………..….10

1.2.5. [anonimizat]……………………….….11

1.3. Types of security systems for smart houses………………………12

1.4. Components used for home automation………………………….15

1.5. Tasks………………………………………………………………17

Chapter 2. Components, principles and functions of a security system

2.1. Concepts and speciality terminology…………….………………..19

2.1.1. The components of the structure alarm systems…………………19

2.1.2. Specialized terminology……………………………………….19

2.2. Principles of detection and types of detectors…….………………20

2.2.1. The passive detectors…………….…………….……………..…20

2.2.2. Types of active detection…………….…………….………….21

2.2.3. [anonimizat], applications, limitations…………….…………….…………….…………….………21

2.3. Functions of Burglar plants…………….……………..…………..29

2.3.1. Area types and their role…………….…………….……………….29

2.3.2. [anonimizat], disable, [anonimizat], communication, storage only of events………………………29

2.4. Principle of execution…………….…………….…………………30

2.4.1. Organizing an installation…………….…………….……………30

2.4.2. Types of cables…………….…………….………………………30

2.4.3. Connecting principles…………….…………….………………….31

2.4.4. Checks…………….…………….…………….…………………31

Chapter 3. Security system design and implementation

3.1. Introduction…………….………….…………………………….32

3.2. House project…………….…………….………………………….32

3.3. Security system components …………….………………………..34

3.3.1. [anonimizat] 738……………………………………..34

3.3.2. Keypad …………….…………….………………………….…..37

3.3.3. Magnetic contact…………….…………….……………….……39

3.3.4. Motion detection sensors…………….……………………….…40

3.3.5. Glass brake detector…………….………………………….……42

3.3.6. Temperature sensors…………….………………………..……..43

3.4. Installation and programming of the security system………..….43

3.4.1. Verification of the equipment and programming the board for verification …………….…………….…………….……………..……44

3.4.2. Assembly steps…………….………….………………………..47

3.4.3. Testing the security system…………………………………….50

Chapter 4 – Tehnico – economic analyze and conclusions

4.1. Tehnico – economic analyze…………………………………….54

4.2. Conclusions………………………………………………….…..54

Bibliography.………………………………………………………….56

Attachments

Attachment 1………………………………………………………..59-60

Attachment 2……………………………………………………..…61-74

Chapter 1.

“Why Smart Houses?”

1.1. Introduction[1]

[anonimizat], [anonimizat]. [anonimizat], [anonimizat].

By the mid-19th century, private organizations such as those of Philip Sorensen in Sweden and Allan Pinkerton in the United States had also begun to build efficient large-scale security services. Pinkerton’s organization offered intelligence, counterintelligence, internal security, investigative, and law enforcement services to private business and government. Until the advent of collective bargaining in the United States, strikebreaking was also a prime concern. The Sorensen organization, in contrast, moved toward a loss-control service for industry. It provided personnel trained to prevent and deal with losses from crime, fire, accident, and flood and established the pattern for security services in the United Kingdom and elsewhere in western Europe.

World Wars I and II brought an increased awareness of security systems as a means of protection against military espionage, sabotage, and subversion; such programs in effect became part of a country’s national-security system. After World War II much of this apparatus was retained as a result of international tensions and defense-production programs and became part of an increasingly professionalized complex of security functions.

The development and diffusion of security systems and hardware in various parts of the world has been an uneven process. In relatively underdeveloped countries, or the underdeveloped parts of recently industrializing countries, security technology generally exists in rudimentary form, such as barred windows, locks, and elementary personnel security measures. In many such regions, however, facilities of large international corporations and sensitive government installations employ sophisticated equipment and techniques.

Since the 1960s, crime-related security systems have grown especially rapidly in most countries. Among contributing factors have been the increase in number of security-sensitive businesses; development of new security functions, such as protection of proprietary information; increasing computerization of sensitive information subject to unique vulnerabilities; improved reporting of crime and consequent wider awareness; and the need in many countries for security against violent demonstrations, bombings, and hijackings.

Security systems are becoming increasingly automated, particularly in sensing and communicating hazards and vulnerabilities. This situation is true in both crime-related applications, such as intrusion-detection devices, and fire-protection alarm and response (extinguishing) systems. Advances in miniaturization and electronics are reflected in security equipment that is smaller, more reliable, and more easily installed and maintained.

Security and protection system, any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack.

Most security and protection systems emphasize certain hazards more than others. In a retail store, for example, the principal security concerns are shoplifting and employee dishonesty (e.g., pilferage, embezzlement, and fraud). A typical set of categories to be protected includes the personal safety of people in the organization, such as employees, customers, or residents; tangible property, such as the plant, equipment, finished products, cash, and securities; and intangible property, such as highly classified national-security information or “proprietary” information (e.g., trade secrets) of private organizations. An important distinction between a security and protection system and public services such as police and fire departments is that the former employs means that emphasize passive and preventive measures.

Security systems are found in a wide variety of organizations, ranging from government agencies and industrial plants to apartment buildings and schools. Sufficiently large organizations may have their own proprietary security systems or may purchase security services by contract from specialized security organizations.

Chapter 1.2 The intelligent building concept

A building will be considered building intelligence, within the meaning of the company's systems engineering, if has following features:

Subsystem to ensure the safety building and exterior boundary of the latter;

Subsystem for monitoring and coordination of commercial operation of facilities building (heating, electrical installations, lifts, etc);

Subsystem for follow-up and coordination of work carried out within the building;

Subsystem Dispatcher Central.

Integrated system to ensure the safety and security, organized hierarchically and distributed both at a functional level as well as for structural policies, it may have in its structure following subsystems:

Subsystem Dispatcher Security Center;

Subsystem detection and Signalling assault Attempts;

Subsystem detection and Signals new Beginnings fire;

Subsystem detection and Signalling flooding;

Subsystem Access Control persons and Document tracking and Objects;

Subsystem closed-circuit television;

Subsystem monitoring and preventing risks.

These subsystems structure is hierarchical and can be organized on three levels:

Level 1 – detection of the equipment special events (attempts to assault, its beginnings of fire, etc. );

Level 2 – of the equipment and alarm signal;

Level 3 – of central dispatcher's security, to which they are paired devices on the level 2.

1.2.1. Central dispatcher subsystem

Subsystem security Dispatching Center is intended to centralise the information collected from the equipment on the level 1 and to assist in making human dispatcher best decision in the event of the occurrence of special events.

Structure Hardware – Dispatching Center subsystem may be composed of two dispatching center, attached to the computer to process, in a standard configuration. For retrieving information from local workstation, specialized interfaces are used, dependent on the type signals.

Software structure – The package of programs used by Central Dispatcher has the following functions:

Acquisition of permanent information provided by local workstation through your existing signals and dispatching local;

Event Storage and great human activities;

Reporting of information;

Display a synoptic chart containing schemes optimal routes for the operations at the place detection of the event;

Display operator to assist guide human dispatcher's decision-making;

Testing and self-test hardware and software.

In an integrated system of safety and security, the Central Dispatcher security systems engages and emergency lighting installations, ventilation and air conditioning, lifts, for the purpose of coordinating their special events in the case.

The package of programs shall be carried out and allows you to update modular to based on the specific needs of the beneficiary, in an efficient manner and quickly.

1.2.2. The detection subsystem and signalling

subsystem assault attempts can be structured in two levels, namely:

Level 1 – of the equipment of detection (passive infrared detectors, detectors active ultrasound and microwave, magnetic contacts, buttons and hand-operated pedals);

Level 2 – processing of the equipment/turn signal (center of tampering). This level is in continuous link with central dispatcher.

Tasks of this subsystem are:

Detection and alarming and selective central any attempt intrusions in the spaces monitored;

Address indication of central area affected on the assault as well as on the diagram flowchart to central dispatcher;

Continuous protection of connecting lines between local workstation and local dispatcher dispatcher as well as with central;

Autonomous operation of at least 60 hours in the event of failure of the supply voltage;

Automatic communication intervention points to an attempt of tampering.

To the confirmation efractiei, magnetic lock automatic door of access to the place of the offense, simultaneously with the elevator shaft and locked mouths of ventilation systems (only on medium and large)

1.2.3 Subsystem fire detection and signalling

Subsystem can be structured in two levels, namely:

Level 1 – of the equipment of detection (smoke detectors with ion chambers, temperature detectors, gas detectors, hand-operated buttons, etc. );

Level 2 – of the equipment for processing and signalling (central fire). This level is in continuous link with central dispatcher.

Tasks of this subsystem are:

Detecting and signalling and selective central beginnings of fire by displaying address central area affected on the fire as well as the appearance of a wiring diagrams a synoptic chart to central dispatcher;

The autonomy of operation on standby at least 60 hours;

automatic activation of extinguishing on alarm, in the spaces provided with fire extinguishers orderable. In the event of an outbreak of fire, central dispatcher will provide a guide operator with indications on access in the affected area, as well as any material to turn off that will be used.

1.2.4. Subsystem for tracking access to persons and objects and documents

The role of this subsystem is to watch and control access various categories of staff and visitors. Access control subsystem for persons can be structured on three levels, namely:

Level 1 – of the equipment door actuator;

Level 2 – of the equipment documents read access;

Level 3 – validation of the equipment access documents and drive elements of the door lock – this level may be in continuous link with central dispatcher.

Tasks of this subsystem are:

Access within the perimeter of protected only authorised persons, on the basis of magnetic or barcode;

Access by typing secret code to the device/dispozitivelelor with numeric code on level 3;

This subsystem is linked to the guard against efractiilor, in order to prevent the alarm at the entrance to protected perimeter of an authorized person.

Access control subsystem is used for:

Privileged access on the areas, persons and hours;

Bridging personal;

Tracking flow of documents and objects;

Tracking manufacturing flow on technological line.

1.2.5. Subsystem of closed-circuit television

Surveillance subsystem can be structured on three levels:

Level 1 – pick-up images (cameras normal and infrared lenses with narrow angle or wide, autoiris and focus, fixed or mobile, color or black-and-white)

Level 2 – image processing (manual and automatic selection cameras, mixing equipment images mobile cameras, remote controls, etc. )

Level 3 – The display pictures (color monitors or black-and-white).

The surveillance subsystem function are:

Declined to tracking of the premises under surveillance, under normal lighting conditions and minimum requirements;

Identify individuals who request access, with a view to permitting entry, through the command to the dispatcher.

1.3. Types of security systems for smart houses[2]

The security systems can be classified in few normal types, such as:

of production enterprise, such as industrial, hospital, government contractor, governmental, or commercial;

of organization, such as proprietary or contract security;

of security process, using physical security or personnel;

of security function or emphasis, like theft control,fire prevention, accident protection, protection of sensitive information.

Since the security systems are not designed only for big companies or rich directors, we have some special situations such as:

Security for small businesses: since small firms cannot afford to employ specialized proprietary security staffs, the measures they take must be purchased from outside organizations. Snatching, not only external but also internal, is a prime concerc for small busnisses;

Residential security: large houses, apartments or apartments complexes, especially if they are under one management, should employ sophisticated security measures. As for example, closed-circuit television monitoring of elevators and also for hallways and trained security guards, because even if you have the security system well prepared, the thief have greater chances to escape without a security guard. Relatively simple equipment for houses or small apartment buildings, as, for example, exterior lighting and alarms, is increasingly used.

Physical security

Some of the most efficient advances in security technologies during the past time have been in the area of physical security, meaning protection by tangible means. Physical security has two main components:

Building architecture and appurtenances;

Equipment and devices.

A) A building can be designed for security by such means as planning and limiting the number and location of entrances and by careful attention to exits, traffic patterns, and loading docks.

B) Equipment and devices can be classified in various categories depending on the criteria used. If the criterion is purpose, some of the principal categories are record containers, including safes and files; communications, such as two-way radios and scrambler telephones; identification, including badges and automatic access-control systems requiring the use of a code; investigation and detection (e.g., lie detectors) and intrusion-detection devices, such as photoelectric cells and ultrasonic-wave-propagating equipment; observation and surveillance, including listening and recording devices, cameras, closed-circuit television, and one-way mirrors; countermeasures for observation and surveillance, such as equipment designed to detect electronic surveillance devices; and fire protection. A classification system based on process results in another set of categories as for examples we include perimeter barriers (such as fences, walls) and locks to prevent or control access, as well as lighting systems to aid surveillance and to deter illegal entry.

Advances in security equipment technology have been numerous. Some of the more noteworthy examples include sensor devices that report unauthorized removal of items; personal-identification and access-control systems that directly “read” unique personal characteristics such as voice quality and hand geometry; surveillance devices that can scan premises at night; and devices that permit surveillance at considerable distances, making entry to the premises unnecessary.

A major part of security programs consists of measures designed to recruit and effectively use trustworthy personnel. “Personnel security” is a term often used to include measures designed to select only those people for whom there is a good prognosis for trustworthiness, on the premise that losses from employee untrustworthiness are more frequent and usually larger than losses from outside the system (e.g., burglary, robbery, shoplifting, espionage) and that one of the best predictors of future behaviour is past behaviour.

The most common technique is the background investigation, which involves obtaining all relevant available data about a person’s past education, employment, and personal behaviour and making judgments concerning the individual’s likely future loyalty and honesty. Thus, the dossier and computerized national data banks exemplify a response by a society in which great geographic mobility necessitates record keeping as a basis for judgments. Another technique is the polygraph, or lie-detector, examination. Research has also been directed to the possible capabilities and limitations of pencil-and-paper psychological tests and stress interviews. In addition to selection techniques there are other measures designed to keep personnel trustworthy after they have been brought into the system—for example, employee indoctrination programs and vulnerability testing.

Systems and procedures constitute another area of the personnel-administration approach to security. It is possible to devise work methods and management controls in such a way that security is one of the values sought along with maximizing productivity and minimizing cost. Examples include the use of automated record-keeping systems, the use of forms and reports periodically checked against physical inventories, and the application of the principle of dual responsibility, whereby work is so subdivided that the work of one employee checks the accuracy of the work of another.

Because control systems are not self-administering, they must be periodically tested and policed. A typical procedure is the vulnerability test, or “created-error” check, in which an error or breach, such as an erroneous invoice, is deliberately planted in the system to see if it is detected and reported. Undercover investigators, such as hired “shoppers” who check on the honesty of sales personnel, also play a role in monitoring the operation of control systems.

Guard-force training, supervision, and motivation are other important aspects of the personnel-administration approach to security. The use of operational personnel to attain security objectives is still another. Examples include engineers, production workers, and clerical staff applying government security regulations for the safeguarding of classified information, and salespeople cooperating with security staff in the detection of shoplifters. The cooperation of operational personnel to attain security objectives along with production objectives demands an interplay between knowledgeable training and communication programs, supervision, employee motivation, and management example.

The personnel-relations approach implicit in much of the above recognizes that the attitudes of rank-and-file employees and the social climate that they create can either be conducive to security or constitute its greatest enemy. Therefore, if security programs are to be successful, they must be carried out in a context of considerable understanding and cooperation of virtually the entire work force. The security program is apt to be only as good as the overall pattern and climate of social relations and loyalties of workers and executives of all ranks.

1.4. Components used for home automation

Home automation refers to the use of computer(or other devices as smartphones, tablets, notebooks) and information technology to control from distance(or just for a bigger comfort) home appliances and features (such as windows or lighting). Systems can vary from simple remote control of small features(e.g. lighting, doors, gas range and so on) through to complex computer or micro-controller based networks with varying degrees of intelligence and automation. Most times, home automation is used for reasons of ease, security and energy efficiency.

“For home automation systems usually we include the following types of devices:

Sensors – to measure or detect things like temperature, humidity, daylight or motion.

“A sensor is a transducer whose purpose is to sense (that is, to detect) some characteristic of its environs. It detects events or changes in quantities and provides a corresponding output, generally as an electrical or optical signal; for example, a thermocouple converts temperature to an output voltage. But a mercury-in-glass thermometer is also a sensor; it converts the measured temperature into expansion and contraction of a liquid which can be read on a calibrated glass tube.

Sensors are used in everyday objects such as touch-sensitive elevator buttons (tactile sensor) and lamps which dim or brighten by touching the base, besides innumerable applications of which most people are never aware. With advances in micromachinery and easy-to-use microcontroller platforms, the uses of sensors have expanded beyond the more traditional fields of temperature, pressure or flow measurement.”[4] Even today, analog sensors, such as force-sensing resistors and potentiometers, are still widely used. Applications include home automation, manufacturing and machinery, airplanes, aerospace, cars, medicine and robotics.

Controllers – such as a PC or a dedicated home automation controller.

“In computing and especially in computer hardware, a controller is a chip, an expansion card, or a stand-alone device that interfaces with a peripheral device. This may be a link between two parts of a computer (for example a memory controller that manages access to memory for the computer) or a controller on an external device that manages the operation of (and connection with) that device.”[5]

Actuators – such as motorized valves, light switches and motors.

An actuator is a type of motor that have the task to move or controll a mechanism or system. Usually it is operated by electric current, hydraulic fluid or pneumatic pressure, and converts the type of energy received into motion. There are several types of actuators, such as: electric, pneumatic, hydraulic, thermal(or magnetic) and mechanical. As for example of actuators we have: electric motor, hydraulic piston, piezoeletric actuator, pneumatic actuator, comb drive, thermal bimorph.

Buses – for communication that can be wired or wireless.

In computer architecture, a bus (related to the Latin "omnibus", meaning "for all") is a communication system that transfers data between components inside a computer, or between computers. This expression covers all related hardware components (wire, optical fiber, etc.) and software, including communication protocols.[6]

Interfaces – for human-machine and/or machine-to-machine interaction.

One or more human-machine and/or machine-to-machine interface devices are required, so that the residents of the home can interact with the system for monitoring and control; this may be a specialized terminal or, increasingly, may be an application running on a smart phone or tablet computer. Devices may communicate over dedicated wiring, or over a wired network, or wirelessly using one or more protocols. Building automation networks developed for institutional or commercial buildings may be adapted to control in individual residences. A centralized controller can be used, or multiple intelligent devices can be distributed around the home.”[3]

1.5. Tasks

“HVAC – Heating, ventilation and air conditioning systems can include temperature and humidity control, including fresh air heating and natural cooling. An Internet-controlled thermostat allows the homeowner to control the building's heating and air conditioning systems remotely. The system may automatically open and close windows to cool the house. There are also dedicated gateways that connect advanced VRV / VRF and split HVAC systems with some automation and BMS (Building Management Systems) controllers for centralized control and monitoring. In addition, such gateway solutions is capable of providing remote control operation of all HVAC indoor units over the internet incorporating a simple and friendly user interface.”[7]

“Lighting – Perhaps the most popular application of a home automation system is the ability to control lighting. Dimmers, sensors, and gauges allow homeowners to keep track of light intensity and determine whether lights that should be turned off are actually turned on. Homeowners can control lighting in bedrooms, kitchens, living rooms, basements, and garages.”[8] For lighting automation, Z-Wave, Insteon and the older X10 protocol are usually used for lighting automation.

“Security system – Cameras are the core of home automated security systems. With ever-changing technology, homeowners can improve camera optics, sensors, and other features that allow them to view their homes from another location. Homeowners can set their systems to snap photographs any time something moves inside of the home. Remote controls allow homeowners to open garage doors and unlock specifically programmed home doors, such as the main entrance door. Recently released home automation systems include a feature that monitors homes for water leaks and sudden rises in temperature.

Entertainment – Home automation synchronizes home entertainment components, such as Blue – Ray Players and digital cable boxes. Homeowners select which inputs and outputs to switch from one remote. The home entertainment center component of home automation requires some technical expertise and it is during this phase of installation that some homeowners may need professional assistance. New electronic home theater devices have no trouble meshing with wireless home automation systems.

Thermostats – Control over home temperatures is one of the most sought after features of home automation systems. Homeowners have the capability to operate a home heating and cooling system from virtually anywhere. Sensors alert homeowners whenever a room exceeds the programmed temperature maximum, or falls below the minimum. Those who live in particularly harsh climates can get a head start on cooling or heating their homes from the comfort of their cars.

Phones – A home automation system can increase phone security, privacy, and even monitoring. Homeowners can program their phone systems to ring only for certain numbers. Wireless technology allows family members to form a cellular network that alerts everyone on the network whenever someone in the family calls. Some systems integrate stored phone numbers with personal computer databases.

Irrigation – Many municipalities have stringent lawn watering ordinances that include maximum usage amounts. Homeowners can program their home automation systems to ensure they never exceed maximum water levels. Sensors that detect rain automatically turn off sprinklers. Homeowners can even deter animals that eat home gardens by setting a sprinkler system to go off whenever sensors detect movement on the lawn.”[8]

Chapter 2

Components, principles and functions of a security systems

2.1. Concepts and speciality terminology

Concepts and terminology specialist elements of a safety system are: the sensors, central, warning devices and communication devices from a distance.

Sensors – are devices that take a signal;

Center – is a unit of automation to process the information taken from the sensors according to the status of the system (on, off, etc. );

System elements – an anti-intrusion system is structured on the areas and partitions.

2.1.1. The components of the structure alarm systems

The central alarm: manage information from the sensors and processes this information depending on the status of the system. Main role of any center of tampering is to signalize (optical, acoustic and/or remote) detection of a instructions in the protected space;

Peripherals: keyboards, modules expandoare, etc. : have the role to extend the number of entries and system control (turn on/off, suspend alarms, read event log, etc. );

Warning devices: sirens, flashes (optical and acoustic);

Communication devices from a distance: comunicatoare telephone with voice mail or digital, serial interfaces or TCP/IP.

2.1.2. Specialized terminology

There will be the definitions for the following concepts:

(a) Concept of area. From an electrical point of view, the area is an entry on the alarm panel. From the point of view systemic, area is a well delimited which is protected against efractiei.

(b) The concept of partition (area). The partition represents a lot of areas that are turned on and off at the same time, by the same user.

c) Codes: plumber, master and the user – they have different roles in Unauthorized discharge bypass fitted functional system.

Installer – code by the installer is to allow access to the programming functions of the system. In most cases, the code by the installer also allows the analysis of log of events in the memory power plant;

Master – primary user – enable, disable, programming, skip areas, etc;

User – engagement, disarm.[1]

2.2. Principles of detection and types of detectors

The purpose of this chapter is to familiarise learners with both types of detectors existing as well as with the principles and physical phenomena underlying a certain type of detector.

2.2.1. The passive detectors.

The detection infra-red: it is based on the effect a photoelectric device. A body with the temperature difference to the environment, on the move, and it generates a variable flow in infrared spectrum which is detected by the sensor, it has generated an alarm. This principle of detection is the most commonly used due to decreased costs special detectors and detection efficiency;

Detection of vibrations: (piezo sensor coil with variable core, inertia sensor (contact with weight). There are different possibilities for the detection of an attempt of tampering in the case in which protects walls, glazed surfaces, etc. in an attempt to punch a wall mechanical is generated where the low frequency of a certain intensity. They can be detected by several types of sensors such as: piezo sensor (which converts vibrations into an electric signal), a coil with variable magnetic core (used very often in alarm systems auto) or a inertia sensor, the latter being least sensitive;

detection acoustic spectrum attempt of tampering by break a window generates an audible warning signal with a specific spectrum in the field high frequencies;

pressure detection: used to protect objects or to prevent a person's access into the protected space.

2.2.2. Types of active detection

Ultrasound detection on the basis of an effect Doppler: used for active ultrasound sensors;

Detection on the basis of an effect using Doppler spectrum electromagnetic radiation in microwave;

IR barriers – absorption of the signal from the transmitter based on the distance and environmental conditions.

2.2.3. Types of detectors – principle of detection, applications, limitations.

Magnetic contact (reed relay):contacts are the magnetic switches NOT INC/NO which detects motion a magnet located on a body to be protected (window, door). Magnetic contacts are composed of two parts: a relay located on the interior side, fixed of the window/door and a magnet located on the element. When the door is closed, the switch is in the NC, he passing in NO by opening the door. These types of detectors are used as I have shown on doors, windows, containers, etc. to detect packaging is opened. Does not provide a high degree of safety (may be entered through break the window e.g. ), therefore it is recommended to be used in conjunction with other types of detectors (e.g. PIR detectors, broken window, etc. ). Can generate false alarms if the door or window does not close correctly and can be sacked by the use of a magnet.

Fig 2.1 Magnetic Contact [1]

PIR detector: the detector PIR is a volumetric detector, in the sense that it oversees a particular volume of a room. The principle of detection has been stated above. Constructive, your device has a front bezel with Fresnell lenses, by which the sensor analyzes on the basis of the number of lenses (12-15 or even more depending on the complexity infrared sensor) flows in the room. When a body warm transiting through such a spot, piroelementul generates an electrical impulse which is analyzed and processed by the electronics of the sensor. Depending on the arrangement meet spots curtain sensors, sensors with long-term or spot volume sensors are used.This type of sensor has a very wide range of applications is practically the most used detectors in anti-intrusion security systems.Usual detectors shall be installed in general to 2 to 2.3 m from the floor room and have an angle of detection of 90 – 1050. Rule shall be installed at the corners of the room to ensure complete protection. Detection Range on central spots is typically 12 m, which is sufficient installing a single sensor in a room.If the protected space presents some special notes can use the other types of lenses shown; e.g. in the case of a long corridor (up to 30 – 35 m) can be used a sensor with spot long-term and in the case in which we intend to protect a glazed over assault from the outside curtain sensors can be used.Limitations on these types of detectors are derived from the principle of detection: cannot detect a body with temperature in the region of the medium (differences of max. 2-30C) and are susceptible to false alarms generated by air flows (both warm and cold). Also, the sensors can easily be obstructed by doors or open windows (glass is opaque to ordinary radiation IR).

Fig. 2.2 Fig. 2.3 Fig. 2.4

Motion Detector [2] Field of view [3] Motion Detector [4]

Impact Detector: impact detectors are intended as a general rule for special applications, such as the protection of walls treasures but and glazed surfaces. Impact detectors contain a translator that converts acoustic signals type into electrical signals. In general, these detectors contain a piezo translator but there are other types of traducatoare.Detection Range is variable, depending on the nature of the material from which it is built the wall protected. Most manufacturers provide a range of approximately 5 m for the walls of concrete. These detectors are sensitive to false alarms such as rapping on the walls or noise from the rest of the repair building, with the result that their usefulness to be extremely low and specific.The installation of such detectors shall be analyzed structure walls protect: both basic material (concrete, brick, wood, etc. ) as well as the coating material or insulation. For example, installation of an impact sensor (fig. 2.5) on a wall of reinforced concrete coated with an insulator antifonic of expanded polystyrene should be carried out by the application of the impact sensor on the basic structure of the wall, before covering it with polystyrene. Also, we must take into account a much larger coefficient of absorption of the sounds.

Fig. 2.5 Shock Sensor [5]

The broken window detectors: the broken window detectors operates on the principle of analysis sound of breaking a glazed surfaces. This sound is superior to harmonicas at a certain fader which makes that the sound can be distinguished from other noises in the environment. This type of sensors is much more indicated to protect glazed surfaces than the vibration sensors because they are sensitive to external noise (usually low-frequency). The sensor is mounted at a distance of up to 5 m of glazed surface and has a coverage of Approx. 6 Meters.Main limitation lies in the fact that a window can be cut without generating specific noise of damage. It is recommended that both shock detectors detectors as well as the broken window to be used in conjunction with volumetric detection components.

Fig 2.6 Glass-brake detector [6]

Pressure detectors : pressure detectors are devices that generate alarm in the case in which the detector registers a difference in pressure. Can be used on both as an intruder detection and protection of objects. Their Applicability is quite low and will be confined to specific applications (museums, etc. ). Physical can be avoided in the case in which it is known their location.

Fig. 2.7 Pressure sensor [7]

Audio sensors: audio sensors are used to detect the sounds produced by an intruder in a protected space and are used in general (but not exclusively) in indoor applications, the corridors of entry to critical areas of storage and processing of data.The sensor is composed of two devices: the catchment units mounted on walls or ceilings and a unit of gain which shall include the processing of the sounds. The catchment units are microphones that collects sound to noise analysis and the analysis circuit and processing can be calibrated for a threshold of noise typical of an attempted tampering. In the event that a certain level of noise is detected in the area monitored for a period of time by default, the device alarms.Applications: audio sensors shall be installed in areas where the noise produced by an attempted tampering exceeds the noise normally existing in the environment. In the event that in the area there is no background noise to a certain level and not sensor calibration is performed to compensate for the noise exists, it will not be able to distinguish the noise natural that produced by an intruder.Typically, audio sensors are to be used in conjunction with other types of detectors (PIR, microwave), to increase the possibility of detection. Whereas a sensor audio is not affected by temperature changes and fluorescent light does not have any effect on the characteristics of the sensor detection, using it together with a detection system based on motion thermal recess (PIR or camcorder) can offer both detection/audio recording and video of a efractii.Detector limitations are related to the level of noise and accidental noise which may generate false alarms. Also, a criminal who endorsed can reduce the noise level of an attempt of tampering below the level of detection.

Fig. 2.8 Audio sensor [8]

Ultrasonic detectors: the detector active ultrasonic is a motion sensor that emits ultrasound in the protected space and respond quickly to changing energy reflected. The detection principle is based on Doppler effect; a body in motion produces a deviation of frequency detected by the sensor.Applications: typically, ultrasonic sensors are mounted on the ceiling and walls and can be used in conjunction with other types of detectors passive (e.g. PIR) to increase likelihood of detection. Ultrasonic detectors are not affected are not affected by temperature. Also, ultrasonic waves do not exceed the limits position outside protected therefore does not detect movement from the outside.Limitations: ultrasonic waves are masked objects which exist in the protected space (shelves, etc. ) which creates areas "masked". Because of this, placing the sensor must be made after scrutiny of the space protected. It also must be avoided significant change temperature or humidity which lead to a drop in electrical performance of the circuits. The sensor is sensitive to environmental factors which generate false alarms such as: air flows generated by heating installations or air-conditioning, and the sounds created by pipes, the ringer on your phone, etc.Also, the ability of detection of horizontal movements slow is reduced, which implies a careful calibration of the latter. A criminal well-equipped can analyze coverage areas of the detector and they can be avoided.

Fig. 2.9 Ultrasonic sensor [9]

Fig. 2.10 Wiring diagram for ultrasonic sensor [10]

Microwave detectors: are microwave detectors active sensors that generate an electromagnetic field in the protected space. Any movement of a body which reflects electromagnetic radiation is sensed and alarms. The principle of detection is all Doppler effect as in the case active detectors ultrasonic cleaners. The sensors transmit signals in-band X generated by a diode Gunn which does not have any harmful effects on human beings or sensitive equipment (pacemakere, etc. ). Signal strength is also extremely low, the signal having a run-out of a maximum of 100 m in a straight line. The deviation in frequency measured by Doppler effect is between 20 and 120Hz. This range is correlated with the movement of the human body; any other frequencies being excluded.The transmitter and receiver are located in the same housing. The coverage area is adjustable depending on receiver sensitivity. This adjustment is particularly important because microwave signals pass as a rule through walls, even those of reinforced concrete.Microwave detectors can be used both the exterior and interior, which is not sensitive to variations in heat or air flows. Detectors are sensitive, difficult or impossible to be masked but they also have the main problem delimitation impossibility protected space. In conditions where there are sources of electromagnetic frequencies close (tape X) appear use limitations. Areas with fluorescent tubes may generate false alarms; the ion cycle created by such lamps can be interpreted by the detector as a false alarm. The sensor can be masked with metal objects increase, which reflects electromagnetic radiation in the spectrum.

Figure 2.11 Microwave detector [11]

Dual detectors PIR/microwave: These types of detectors combine two technologies of detection to improve either sensor sensitivity is to reduce as far as possible false alarms on the basis of logic and/or used in the analysis.By using logic or obtain a sensor hard mascabil but sensitive to all types of false alarms referred to in the two types of detectors.By using logic and obtain a detector less sensitive, whose area of detection is bounded by existing natural boundaries (walls, Windows), insensitive to drafts which causes a very low rate of false alarms.

IR barriers: active IR sensors inside generates a curtain of energy modulated IR and responds to a change of the modulation or cut-off frequency IR energy received. These phenomena are going on under the conditions under which a person violates protected area.Indoor IR barriers consist of a IR transmitter and a receiver located in the same housing or in different cases. In the case in which they are located in the same housing, a set of mirrors reflectors are used to delimit protected space.Applications: this system is highly effective in detecting efractiilor. Speed and direction of travel are not important, and the detector is not sensitive to environmental factors (air flows, temperature).Main problem of these barriers consists in lens cover with dust, which creates the possibility of false alarms.[2]

2.3. Functions of Burglar plants

As I have shown above, anti-intrusion power stations are programmable automatic which converts the input signals (areas) in alarms and signs depending on the status of the system (armed/disarmed) and the type of zone which has generated alarm.

2.3.1. Area types and their role

Instant areas are areas typical of tampering, which generate an alarm in the case in which the partition in which it is included is activated. On such areas shall be installed motion detectors (any of the types referred to above) which are not installed on the driveways.

Timed areas are areas of type instant access for a period of time in the protected space (tens of seconds) to turn the system off. On such areas shall be installed detectors what is on accesses to control keyboards from the systems. Areas of 24 hours are areas which generates an alarm condition regardless of partition to which they are assigned. In such areas shall be installed the buttons of panic attack or fire detectors in the case in which a panel of tampering is used for a joint system.

2.3.2. Basic functions of systems, reinforcement, disable, skip areas, warning, communication, storage only of events

Arming and deactivation refers to change in the status of a partition by the user. Some central supports automatic functions.

Skip zone is a function of the system used in the case in a given area it is necessary to allow sometimes the access with the rest enabled partition or there is a fault that cannot be easily serviced chassis, immediately.

The warning in the event generating an alarm is of two types: optical and acoustic. As a general rule, warning duration is limited to a few minutes, after which the system will restart signaling if a new attempt of tampering is signalled. Depending on the programming facilities of the Kozloduy may limit the number of signs of tampering in a single cycle of arming/disarming.

The alarm power plants may include a Reacher digital or voice which allows communication on phone line of an alarm message to a subscriber dispatching or phone.

Storing the log events is a function extremely useful both in maintenance as well as in the analysis of the event. Armari, disarming, alarms to which it stores date and time during which that event occurs allow analyzing weaknesses of parties and restoring system but film of the event.[3]

2.4. Principle of execution

Without going into details, on the basis of the existence of a project or even in its absence, here are some brief stages of organization and carrying out of a firewall.

2.4.1. Organizing an installation

Laying down the types and positions detectors

Determines the position of the warning systems and the modules expandoare

Shall be determined runs cables

Defines the log-cables with the meaning of each pair of wires

Performs the work

Review if there is scurturi on the pairs of power before connecting sources of accumulators and system

Supplies, can be used to program the system and make sure it is working.

2.4.2. Types of cables

There are three categories of cables used in anti-intrusion installations.

Anti-intrusion cable, which includes pairs of wires netorsadate, starting from a pair and reaching the 6 pairs typically, from which a pair may be the section above for the supply.

Bus cable type TTL currency code. It is similar assault cable but the section cables is higher. It can be used successfully for the cable you use buses of fire.

The data cable. For the stations that use communications protocol RS 485, the data bus is a communication line cabled with the impedance of 120 ohms (UTP cable Cat5).

2.4.3. Connecting principles

In making connections must be pursued, and carried out with great accuracy the following classes of connections:

a. Location of the end-of-line (EOL – end of line) in detectors and not in center.

b. A common line of the table, without interruption.

c. Shielding correct implementation of the installation (avoid loops ground).

2.4.4. Checks

For the implementation of quality systems, in particular in the case in which the number of zones is high, must be carried out following tests and checks.

a) Shall be tested each zone in part, even if power plants are provided with self diagnostic functions. Through testing we understand operational software or hardware by each zone both in stand-by as well as in alarm.

b) Check enable and disable each partitions and is generated alarm in each partition. It verifies that users understand, each of them, how it is used and specific procedures if an alarm is triggered.[4]

Chapter 3. Security system design and implementation

3.1. Introduction

“Home security has been a concern of worldwide. As the technology is emerging every second, abundant home based security systems have been developed and implemented to keep their welfare safe. Home security system is an essential mean of protecting our home from illegal invasion.”[1]

The second section of this chapter introduces the house project, meaning the plan and schematic of the platform and of the circuit from the security system used on this platform. Inthe third section we introduce the components used in the assembly of the security system on the platform. As we will see below, we have a central board, keypad, different types of sensors, magnetic contacts and cables.

In the fourth part we will find how to implement and work for the final product of the platform, but also the programming code used for the putting into operation of the alarm.

3.2. House project

To carry out a proper installation of the security system, there is a need for a wiring diagram along with the layout of the dwelling. The draft platform is done in the program AutoCAD (Annex 1). In figures below is legend project, followed by the project.

Fig. 3.1 House project

3.3. Security system components

3.3.1. Central board – Paradox 738

Fig. 3.2 Items for central board

The central board Paradox 738(marked as C in the picture from above) is working under 16V, so as we can see in the figure from above we have have a transformer next to it, which transforms from 230V to 16V(marked as B in the picture from above), and we also have battery of 12V(marked as A in the picture from above), as a safety measure it in case the electric power is cut off.

If we take a closer look to the board, we can see the input and outputs, as shown in the next 2 figures.

Fig. 3.3 Overvie of Paradox 738 part 1

Fig. 3.4 Overvie of Paradox 738 part 2

From the last 2 figures of the center board, figure 3.3.1-3 and figure 3.3.1-3, we use to implement the alarm system:

Reset jumper – Used to reset the board. Resets program sequence used to set and activate the alarm system. To reset, we unplug the board from the supply(and also remove the battery) and introduce thejumper(after all connections are made and the circuit is operational). After we introduce this jumper, wait 10 seconds(usually it’s done in 5 seconds but for safety is better to wait 10) and stops the supply.We remove the jumper, we plug back the power supply(then we connect the battery)and the board is ready to be reprogrammed;

Battery link – Here we have 2 wires that usually are already connected to the board, one red( for +) and one black (for -). Those 2 wires are used to connect the board to the battery, which is the second power supply in case the electric power goes down. Use a 12VDC 7AH rechargeableacid/lead or gel cell battery. The system cannot be running from the start only with the battery;

3),4) COM terminals and zone terminals – are used to connect the sensors to the board. In these terminals we connect the functional part of the sensor, not the supply pipe, as we can see in the next figures;

5) Input voltage – Use a 16.5VAC (50-60 Hz) transformer(shown in figure 3.3.1.-1 as B component) with a minimum 40VA rating to provide sufficient AC power. Do not utilize any switch-controlled outlets to power the transformer.

Warning: Do not connect transformer until all wiring is completed;

6),7) Buzzer + and – links–here we have the positive and negative links to the buzzer. As we can see in the figure 3.3.1.-3 the negative link to the buzzer comes from the first set of aux terminals. We connect the red wire to the positive terminal, and the black wire to the negative terminal. The output is 12V;

8), 9) Aux + and – terminals – This auxiliary output is generally used to power the keypad and sensors (for sensors supply we use the diagram from the figure 3.3.1.-4). “A maximum of 400mA 12VDC is available from the AUX+ and AUX- terminals. “The auxiliary supply is microprocessor-protected against current overload and automatically shuts down if current exceeds 1 amp. Auxiliary power will resume once the overload condition is removed and after battery test takes place (within 1 – 60 seconds).”[2]

10) Keypad link green and yellow –they keypad is connected to the central board following the diagram from the next figure:

Fig. 3.5 Schematic for connection keypad – central board [1]

11) Telephone links –“connect the incoming telephone company wires into "TIP" and "RING". Wires should then be run from "T1" and "R1" to the installation's phone system.”[2]

3.3.2. Keypad

Fig. 3.6 Keypad

The keypad(model: Esprit 626) belongs to the control section of the alarm system, from it being programmed. On the right corner, as we can see, there are 2 leds:

Ready – the color of this led is green, and it’s showing us if the system can be armed. If it is switched off then it means we have an error, or that an area is not closed.If it is lit, then it means we can armthe system.If we introduce the master code and the system is arming, then the LED will flash until alarm will be armed;

Armed – the color of the second led is red, and it’s telling us if the system is armed or not. If we try to open the sensor hull, the red light will start to glow, and if it’s programmed the alarm can be triggered. This led stayes turned on only when the system is armed.

The buttons from the keypad have different attributes, such as:

The Esprit control panel can support up to 24 zones, 2 zones for each button on the keypad(from 1 to 2). If we open a zone or breach it, the corresponding key will light up on the keypad)e.g. if we have a motion sensor on zone 4, and we walk in front of that sensor the 4-th key will light up on the keypad. The status of the zones is shown through keys 1 to 12, by default.

The [2ND] button is used to show the status of the zones 13 to 24. If we press this button they keypad will go on the second zone status.

As we can see in the figure above, the keys 11 and 12 shows us something else, when the system is armed. SinceEsprit system is equipped with a partitioning feature that can divide your alarm system into two distinct areas (System A and System B), the 11 key(STAY) shows us if system A is armed, and the 12 key(AWAY) shows us if system B is armed. If both system are armed, both keys will be flashing.

The [TRBL] key is for the trouble display. When flashing rapidly indicates "power failure". When we press [TRBL] the function of each key from 1 to 11 changes to:

1 – The first key shows us if the battery is connected or not to control panel, or if it’s at low capacity;

2 – If the control panel is not connected to a power supply and works only from battery this key will illuminate;

3 –The same as key 2, usually is excluded from the trouble display by the ones who install the system;

4 – The 4-th key shows us if the bell is connected or not to control panel. If key 4 illuminates then the bell is disconnected;

5 – If key 5 illuminates, it means that the bell/siren output current exceeds 3A. This causes automatic shutdown of the bell output. Once this problems is solved, power will be automatically restored to bell output;

6 – Key 6 illumination indicates that the auxiliary output current exceeds 1A. If key 6 starts to illuminate then the auxiliary output is closed, and will reopen when the problems is solved;

7 – If the communication between the control panel and the central monitoring stations fails, then key 7 will illuminate;

8 – Key 8 will illuminate every time after we cut off the power(AC and battery) from the control panel. This means the clock inside the keypad resets. To program it again or to change the time we have to: press [ENTER] + master code + [MEM] + 2 keys(from 00 to 23, first 2 keys are for hour) + 2 keys (00 to 59, these 2 keys are for minutes) + [ENTER] + [CLEAR];

9 – The illumination of key 9 means there is a wiring problem in one of your protected zones.

10 – Key 10 illuminates if the panel detects the loss of the telephone line( in case it was connected or programmed)

11 – If the fire zone is programmed and cut, the fire zone key and trouble key 11 will illuminate to prevent us.

[MEM] key or the “Alarm Memory Display” key. When [MEM] illuminates it means that alarms were generated while the system was armed. If we press it we can check what zones were triggered.

The [BYP] key is the bypass – This feature arms the system while bypassing zones you wish to leave unarmed. You can select zones to leave open when arming system.

[CLEAR] button is used to erase any keypad entries and return control panel to a previous status. If you make any mistake while programming the system, you press clear and start over from the last sequence.

[ENTER] key is used to store keypad entries to the memory.

For the programming part of the system from keypad, I attached a programming user guide at the end.

3.3.3. Magnetic contact

As I wrote in chapter2.2.3. “magnetic contacts are the magnetic switches NOT INC/NO which detects motion a magnet located on a body to be protected (window, door)”. Let’s take a closer look to the model used for this platform.

Fig. 3.7 Magnetic Contact

As we can see we have 2 resistors connected on contact. Each resistor has 1KOhm and they are connected following the next circuit diagram:

Fig. 3.8 Electric circuit of magnetic contact [2]

Following this diagram we imagine that the magnetic contact is placed instead of N.C. switch(the magnetic contact acts like a switch on this diagram). So we have to add 1KOhm resistor to the wire that is going to zone input and 1KOhm resistor between contact terminals. The other terminal goes into the COM port of the central board.

3.3.4. Motion detection sensors

The motion sensors are connected to the zones from 4 to 6. It’s indicated to have at least one motion sensors where we have doors(even if we have a magnetic contact on the door) or where we have windows(in case we don’t have a glass-brake detector).

In this platform we have 2 types of motion detector sensors, one that can be adjusted(from a fine-tuning button that is placed on the circuit board inside the sensor) and the other one that is a normal sensor without adjustment.

Fig. 3.9 Motion detector sensor DSC

Fig. 3.10 Motion detector sensor with fine-tunning

As we can see in the pictures from above on both sensors we have 2 resistors, each one of 1KOhm. To connect these resistors we follow the same circuit diagram as for the magnetic contact. And for a simple mounting we can also follow the next figure of connections:

Fig. 3.11 Connection diagram of motion detector sensors [3]

The operation of these schemes is based on the two resistors. When I connect the sensors to the paradox 738, the switch is open and the plate meets only 1KOhm resistance. When the sensor is activated, the switch closes, and then the two resistors are connected in series, so we have a 2KOhm resistance. When the board meets the 2KOhm resistance the alarm is triggered. This principle applies only if we have 1 zone/input.

3.3.5. Glass brake detector

Figure 3.12 Glass brake detector

As we can see in the pictures from above the glass-brake detector have a microphone incorporated with which it receives the noise. The glass-brake detector works under high frequencies. This model has also a shock sensor, so it works also as an impact detector. We have 2 fine-tuning buttons for glass calibration and for shock calibration, and 3 LEDs (yellow – shows us that the detector receives current from the board; green – shows that the attack analysis is confirmed and the frequency spectrum is partially valid; red – shows a high-level attack signals and trigger the alarm). The schematic to connect this detector is the same as the one used for motion detectors or for magnetic contacts.

3.3.6. Temperature detector

Detector temperature is a device used for safety systems for prevention of fires. This temperature detector sets off an alarm if registers a temperature greater than 80 Celsius degrees. The wiring diagram for the temperature detector is shown in the figures from below.

3.4. Installation and programming of the security system

The making of “Smart houses’ security systems – lab platform” is starting with the chapter 3.2 where we can find the house project. That is the first step, because all the time before we make a platform we need to make the project.

3.4.1 Verification of the equipment and programming the board for verification

After I bought the components mentioned it chapter 3.3 I had to verify their functionality. So following the schematics from figure 3.3.-10 first I mounted the resistors in sensors. Let’s take again a closer look to one of them:

Figure 3.15 Motion detector sensor with 2 resitances of 1 KOhm

First we connect the 2 resistance, one on the relay, from NC to COM, and one from relay to tamper, from COM (relay) to NC (tamper). After we connect the 2 resistances we have to add 4 wires. To be sure we don’t confuse the wires, is indicated to use different colors. I used red and black wire for power supply ( red for + and black for -) , white for COM to C and brown for tamper to zone.

First we must reset the board. We put the jumper on the reset pins, then we plug it back in power outlet. We wait 5 to 10 seconds, after this we can take it our from the power outlet to remove the reset jumper. When we will use plug in again, the board is reset and ready to be reprogrammed.

After I finished the setup for one motion sensor and for the magnetic contact, I linked them to the board and I closed the other zones from the board with 1KOhm resistances, as in the next picture.

Figure 3.16 Closing zones with 1KOhm resistances on central board

Now we have to connect the buzzer and the keypad. The buzzer connects using 2 wires, one red wire that goes to the BELL+ terminal and one black wire that goes to the AUX- terminal. For keypad, we take the green and yellow wires and connect them to the board where we have GRN and YEL notations, and the red and black wires for the power supply.

To verify is the components are working we first have to program the board. The programming is made from the keypad using “Esprit programming guide” I attached at the end.

To start the programming part, first we need to know 2 codes:

Master Code – 474747;

Installer Code – 383838;

To eneter in programming mode we need to press [ENTER] and after we press this key we introduce the installer code. Now the [ENTER] button will flash indicating that we entered in the programming modeand we can enter following locations which we want to change. This programming mode is also called HEXA. The outlet of the programming is done by pressing the [CLEAR] until the Enter key stops flashing.

Note: by activating written options it is to be understood that all other keys are turned off.

Locations scheduled for me have been:

086: In which I have enabled options 1,7,12 finally have confirmed with the [ENTER] key (E) (Note: check your location to have all options for your work and telephone communication);

088: 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, E (from now on the codes will be 4 digits, i.e. installer master 3838 and 4747);

090: 6, 8, E ;

108: 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, E (only numbers);

124: 1 – 12, E (key 1 to key 12, only the figures without [MEM], [2ND], [TRBL], [BYP]);

049: 030 (the time to exit delay, 30 seconds);

050: 015 (during the entry delay, 15 sec);

052: 001 (how much time siren sounds, 1 min).

Programming Telephone communication: go to programming: E, 3838 after which you push key 7 (at this time flashes alternately key E and [2ND] – streamlined programming mode (locations prgramate will be of 2 digits).

The reporting codes we’ll be programmed as this: being in streamlined programming enter your location 34 after which codes enter the report for each zone as follows (11, 12, 13, 14, 15.16, 17.18, 19.20, 21.22, 23 ,24) at the end you push once [CLEAR] but to watch to stay on how streamlined (flashes alternately [ENTER] and [2ND]).

We program the special codes also in HEXA at the location 64 as follows (31.32, 33, 34) at the end you push once [CLEAR] but to watch to stay on in streamlined (flashes alternately [ENTER] and [2ND]).

We program the account of the system at the location 08 so (1234, 1234) you push [CLEAR] twice and remain in HEXA mode.

038: [TRBL], [TRBL] (is the way in which such communication on your motive e.g. );

037: [2ND], 5 (time correction call);

Entering the phone numbers is done as follows (maximum of 2 phone numbers): enter the programming mode in streamlined and arrange the first number at the location 04 (e.g. 0742123456, [TRBL]) .

Note: after the introduction of the phone number we should you push the button [TRBL] to mark ther end of the number. If we want to use a second number we add it on the location 06, in the same way. At the end exit programming and do tests. To operate panic on the keyboard (as to fortune easier telephone communication), simultaneously push buttons 1 and 3 for 5 seconds.

3.4.2. Assembly steps

After the verification and programming of the Paradox 738 board and the sensors, we have to make the platform. For building the platform I used OSB wood for walls and foundation and I've cut out after the project in chapter 3.2, with the dimensions:

Height -> 31cm;

Length -> 82cm (85 the bottom plate);

Width -> 60cm (65 the bottom plate);

In order to avoid unwanted triggers from the motion sensors, I used another plate as a roof, having the dimensions: length -> 85cm and width -> 60cm.

When the platform was ready, I also linked to the other sensors after the pattern of the similar one with which I have done initial tests.

After all detectors were ready to use, I started to fix them on the walls, as I followed the schematics from the project. After we fix the sensors to the desired spots, we must fix the board, the keypad and the others components: transformer, battery, buzzer.

Fig 3.17 Keypad and buzzer on platform

When everything got in his right place, I had to measure the distances between them and the central board (again, following the schematic from the project) to see the dimension of the wires. After a few measurements we got dimensions (I add 7cm to every wire for the entry of the sensors and of the central board):

Motion sensor in the living room -> 145cm;

Motion sensor in the hall -> 35cm;

Motion sensor in the kitchen -> 95cm;

Glass-brake sensors in the bedroom 1 -> 85cm;

Glass-brake sensors in the bedroom 2 -> 95cm;

Magnetic contact on the entrance door ->50cm;

Bell -> 50cm;

Battery -> 170cm;

Transformer -> 120cm;

Keypad -> 35cm.

After the measurements are made we change the cables that were used for testing to the new ones with the corresponding dimensions.

As we can in the picture from below, in kitchen we have also one temperature sensor, but it was not connected due to the fact that the triggering temperature is 80 Celsius degrees and I couldn’t find a way to make it there in a short time.

When I finished changing the cables I started to connect the detectors to the central board. On the first zone I’ve connected the magnetic contact (keypad key number 1). On the second and on the third zone I’ve connected the glass-brake detectors (bedroom 1 is shown on the key number 2 and bedroom 2 is shown by number 3). The keys from 4 to 6 are for the motion detectors, connected in the following order: on key 4 is the detector from kitchen, key 5 is for the detector from hall, and the last one, on key 6 is from the living room.

After all the sensors are set, we must connect the buzzer in order to have a better volume when the system is trigger (even if we don’t connect the buzzer they keypad triggers his own buzzer). At the end we connect the battery and the power supply from the transformer.

Fig 3.18 Overview inside the platform

3.4.3 Testing the security system

I've come to the last part of the project, the testing. For the purposes of testing, you must cover layout with a plywood (as roof)for that motion sensors to detect unwanted movements

Fig. 3.19. Closed platform

Now that we've covered platform, we put into the socket the alarm system and then connect the battery. Wait a few moments before calibrating plate and sensors, as indicated on keypad by switching off the lights up the keys.

Fig. 3.20. Calibration state – ready state

Now that the system is calibrated, the [TRBL] key will be still lighted up. This is due to the fact that every time you navigated the system from any power supply, is reset time. To fix this, you must programam time: press [ENTER] + master code (4747 for us) + [MEM] + 00-23 (hours) + 00-59 (minutes) + [ENTER] + [CLEAR].

After we set the time, we check if we connected sensors to desired areas. To check this, you need to activate the sensors and to take a look at the keypad keys light up what they want, as in the following examples:

Fig. 3.21. Door opened and hall movement

Fig. 3.22 Glass-brake sensor detected sound or shock

In case that the zones are entangled around sensors can be changed by changing inputs on the areas from the connection of wires to the motherboard paradox 738. This is not required, because platform can operate even if we didn’t made the desired order.

To test on, I have to activate alarm. Turn on the alarm is done by typing user code, 4747, or by pressing for a few seconds the key 11 ( this activation is more rapidly, and is named forced activation) . After being armed, the keypad will look as follows:

Figure 3.23. Activation steps of the system

and activated state

To test further, we must trigger the alarm somehow. To trigger the alarm we first start with the hall. To activate the alarm from the hall we must open the door. After we open the door, due to the magnetic contact we have 10 seconds to close the alarm (we must press 4747 on keypad). If we don’t shut it down, the alarm we’ll trigger after 10 seconds, and the memory we’ll register two violated zones (since we have in hall magnetic contact for door and motion detector for perimeter): zone 1 and zone 5 as in the next photo:

Figure 3.24 Zone 1 and 5 triggered

and zone 1 and zone 5 in memory

Now we test one by one the motion detector sensor from kitchen and living room. To do so, we need to activate again the alarm. After activation we’ll just make some movements entering from the window (the sensors are placed in such a way as to form an angle of 90 degrees on the area windows). As results we’ll get:

Because we were unable to test the temperature sensor ( I've been trying to reach 80 degrees to use a hair dryer and ministries with the cigarette lighter, but didn't come to desired temperature).

The last step of the testing is testing the sensors by breaking the glass. To test them I've added 2 windows to the rooms with the sensors of breaking the glass, and I broke one window. Since the sensors are designed for large rooms, they may be activated and both at once or as a function of calibration. The result is:

Fig. 3.25 Zone 2 triggered and zone 2 in memory

Chapter 4 – Technical – economic analyze and conclusions

4.1 Technical – economic analyze

For creating platform have been used materials listed below in the bill of materials.

Bill of material:

Total: 554RON.

Along the table above we can see that a system alarm does not involve very high costs. For a house that has the design platform, estimated costs are somewhere from 3 to 4 times higher. From the economic point of view, for the safety house, alarm system is a good investment.

4.2 Conclusion

The platform laboratory carried out in connection with the project is intended for operation study monitoring systems access and fire for lab equipment home appliances. The result of our design has met our expectation, in which every sensor is working and will sound specific alarm when the system goes into alert status. The keypad offer an easy interface and users can be familiar with our system in less than few seconds. It is an easy to program, together with the components coming and two guides, one for installation and one for programming. As I have mentioned in this work, the security system is not only for intruding upon but also for fire or other events that could jeopardize your safety or of the family.

In conclusion, if we analyze the technical-economic report a system security is an investment suitable if you have in the house valuables, or for your own personal safety.

Bibliography

Books:

Gerhart, James (31 March 1999). Home Automation and Wiring

Esprit 738 Express and 738 Installation Manual version 3.10

Esprit 738+ Programming Guide

Tehnician pentru sisteme de detectie, supraveghere video si de monitorizare control acces si comunicatii – Suport de curs Ed.3 Rev.0/01.08.2009

Curs notes – Conf.univ.dr.ing. Aciu Lia Elena

Bennett, S. (1993). A History of Control Engineering 1930-1955

Preville, Cherie (26 Aug 2013). "Control Your Castle: The Latest in HVAC Home Automation"

"Bus Definition from PC Magazine Encyclopedia". pcmag.com. 2014-05-29

A. Alheraish, “Design and implementation of home automation system”, IEEE Trans. Consumer Electron., vol. 50, no. 4, (2004).

References:

Chapter 1:

[1] – http://www.britannica.com/technology/security-and-protection-system

[2] – http://www.britannica.com/technology/security-and-protection-system

[3] – https://en.wikipedia.org/wiki/Home_automation#Security

[4] – Bennett, S. (1993). A History of Control Engineering 1930-1955

[5] – https://en.wikipedia.org/wiki/Controller_(computing)

[6] – "Bus Definition from PC Magazine Encyclopedia". pcmag.com. 2014-05-29

[7] – Preville, Cherie (26 Aug 2013). "Control Your Castle: The Latest in HVAC Home Automation"

[8] – http://www.ebay.com/gds/What-Can-You-Control-With-Home-Automation-Systems-/10000000177628883/g.html

Chapter 2:

[1] – Tehnician pentru sisteme de detectie, supraveghere video si de monitorizare control acces si comunicatii – Suport de curs Ed.3 Rev.0/01.08.2009 Chapter 8.1

[2] – Tehnician pentru sisteme de detectie, supraveghere video si de monitorizare control acces si comunicatii – Suport de curs Ed.3 Rev.0/01.08.2009 Chapter 8.2

[3] – Tehnician pentru sisteme de detectie, supraveghere video si de monitorizare control acces si comunicatii – Suport de curs Ed.3 Rev.0/01.08.2009 Chapter 8.3

[4] – Tehnician pentru sisteme de detectie, supraveghere video si de monitorizare control acces si comunicatii – Suport de curs Ed.3 Rev.0/01.08.2009 Chapter 8.4

Chapter 3:

[1] – http://www.sersc.org/journals/IJSH/vol7_no2_2013/5.pdf

[2] – Esprit 738 Express and 738 Installation Manual version 3.10

Figures references:

Chapter 2:

[1] – Figure 2.2.3.-1 -> http://smartenit.com/sandbox/wp-content/uploads/2013/10/ Magnetic_Contacts.jpg

[2] – Figure 2.2.3.-2 -> http://www.dsc.com/index.php?n=products&o=view&id=93

[3] – Figure 2.2.3.-3 -> http://www.riscogroup.com/products/product/265

[4] – Figure 2.2.3.-4 -> Tehnician pentru sisteme de detectie, supraveghere video si de monitorizare control acces si comunicatii – Suport de curs Ed.3 Rev.0/01.08.2009 page 120

[5] – Figure 2.2.3.-5 -> http://www.hiwtc.com/buy/shock-sensor-84318/

[6] – Figure 2.2.3.-6 -> http://www.thecrowgroup.com/Products_Systems/gbd_II_ gbd_plus/gbd_II_gbd_plus/

[7] – Figure 2.2.3.-7 -> http://na.industrial.panasonic.com/products/sensors/sensors-automotive-industrial-applications/pressure-sensors

[8] – Figure 2.2.3.-8 -> http://core-electronics.com.au/sensors-modules/sound-audio.html

[9] – Figure 2.2.3.-9 -> https://electrosome.com/wp-content/uploads/2014/08/ Working-of-HC-SR04-Ultrasonic-Sensor.jpg

[10] – Figure 2.2.3.-10 -> http://denethor.wlu.ca/pc300/projects/sensors/ HCSR04b.pdf

[11] – Figure 2.2.3.-11 -> http://www.lightworksuk.co.uk/pdfs/MicrowaveSensor.pdf

[12] – Figure 2.2.3.-12 -> http://goalarmshop.com.au/motion-detector-ness-quantum-dual

[13] – Figure 2.2.3.-13 -> http://www.alibaba.com/product-detail/Hot-infrared-detector-security-alarm-pir_443029535.html

[14] – Figure 2.2.3.-14 -> https://shopdelta.eu/infra-red-barriers-an900-a100-2-beams_ c513_p3977.html?ps_session=9f3debe15d1e7e884a249b22baa8094c

[15] – Figure 2.2.3.-15 -> Tehnician pentru sisteme de detectie, supraveghere video si de monitorizare control acces si comunicatii – Suport de curs Ed.3 Rev.0/01.08.2009 page 125

Chapter 3

[1] – Figure 3.3.-4 -> Esprit 738 Express and 738 Installation Manual version 3.10, page 8, figure 5;

[2] – Figure 3.3.-7 -> Esprit 738+ Programming Guide, page 11, figure 8;

[3] – Figure 3.3.-10 -> Esprit 738+ Programming Guide; page 11, figure 8;

[4] – Figure 3.3.-14 -> Esprit 738+ Programming Guide, page 14, Fire alarm zone connections.

Similar Posts