When a phase winding of a stepper motor is energized with current a magnetic flux ..... A table is shown of the "Pin Outs" of the D-Type 25 Pin connector and the ...
COMPUTER CONTROLLED OFFICE SECURITY SYSTEM
__________________ DEPARTMENT OF ELECTRICAL, ELECTRONICS & TELECOMMUNICATION ENGINEERING YEAR-2010 FACULTY OF SCIENCE AND ENGINEERING DHAKA INTERNATIONAL UNIVERSITY DHAKA, BANGLADESH
COMPUTER CONTROLLED OFFICE SECURITY SYSTEM This dissertation is submitted in partial fulfillment for the degree B.Sc in Electrical, Electronics and Telecommunication Engineering in the Dhaka International University.
Submitted by
Md. Yassir Mottalib (Roll # 05, Registration # 204105) S.K. Jannatul Fardus (Roll # 07, Registration # 204107) A.B.M. Mostafijur Rahman (Roll # 09, Registration # 204109)
Supervised by
Ashraful Arefin Lecturer, Department of Electrical Electronic & Telecommunication Engineering Dhaka International University
Department of Electrical, Electronics & Telecommunication Engineering Year-2010 Faculty of Science and Engineering Dhaka International University Dhaka, Bangladesh
BOARD OF EXAMINERS
1.
Chairman, Prof. Dr. Md. Sana Ullah. Dean, ...………………………………………………...Faculty of science & Engineering
2.
Member, Saiful Islam, Chairman,(Acting), ...…………………………………………………………………….Dept. of EETE
3.
Supervisor, …………...…………………………………….……Mr. A. Arefin, Lecturer, EETE
4.
External …………………………...…………………………Dr.Saeed Mohmud Ullah, DU
DECLARATION We, Md. Yassir Mottalib, S.K. Jannatul Fardus and A.B.M. Mostafijur Rahman are the students of B. Sc. in Electrical Electronic & Telecommunication Engineering, hereby solemnly declare that, the works presented in this project has been carried out by us and have not previously been submitted to any other University/ College/ Organization for any academic qualification/ certificate/ diploma/ degree. We warrant that the present work does not breach any copyright.
Md. Yassir Mottalib, S.K. Jannatul Fardus & A.B.M. Mostafijur Rahman.
i
ACKNOWLEDGEMENT First and foremost , we are indebted to Allah the almighty , the merciful without whose patronage and blessing this project would have not been successfully completed. He gave us zeal, confidence , power of determination and courage and vanquished all the stumbling hardness that we faced on the way.
We are very grateful to all the people who have supported us during the work during this project. First of all, we would like to thank our project supervisor Ashraful Arefin for the fantastic support and advice during the work with this project. And also we are grateful to Prof. Dr. Md. Sana Ullah, Dean, Faculty of Science & Engineering, who was always willing to respond to many problems during the research and never hesitated to offer guidance.we would also like to thank Mr.Saiful Islam,chairman, department of EETE,Dhaka International University,for the kind help that he extended to us.
Last of all, special thanks to all of our friends and all other concerned authority for all they are rendered during the course of research works.
Md. Yassir Mottalib, NOVEMBR 2010
S.K. Jannatul Fardus & A.B.M. MostafijurRahman.
ii
ABSTRACT The project was conducted in the 'Department of Electrical, Electronic & Telecommunication Engineering' at Dhaka International University, Bangladesh. The specific objective of the project was to establish and develop the Control & Security System for home or office security Development. The purpose of this project is to improve the security system of home or office using modern technology.
In this project, at first establish a hardware system for auto door control. After preparing the circuit, it controlled the circuit using a computer and made the whole system password protected. Because planning of the project was to improve our security system by password or barcode or biometric protection etc such type of modern technology. Finally, established a security system using password technology.
iii
Table of Contents
Serial
Subject
Page no.
Declaration
i
Acknowledgement
ii
Abstract
iii
Abbreviations
IV
Chapter-1 1.1 1.2 1.3 1.4 1.5
Chapter-2
Basic things of project. 2.1 Stepper Motor Basics. 2.2 Stepper Motor Types. 2.3 Motor cable identification.
Chapter-3
1 - 16 1 2 2 6 16
17 - 22 17 19 21
3.1 3.2 3.3 3.4 3.5 3.6 3.7
Computer interfacing Parallel Port. Buffer Circuit. Program development Forward motor control. Reverse motor control. Password control. C program for whole system.
23 - 29 23 27 28 29 29 29 29
4.1 4.2 4.3 4.4 4.5
Circuit construction Parallel port to circuit connection. IC connection in circuit board. Motor connection in circuit. AC voltage supply in motor. DC voltage supply in circuit.
30 - 36 30 31 31 32 32
Chapter-4
Chapter-5
Control & Security System. Introduction. Objective. Auto control system. Door control & security. Various technologies for security control.
Result. 5.1 Output display in PC monitor. 5.2 Output in motor movement. 5.3 Output display by LED. iv
33 33 34 34
Chapter-6
Conclusion And Recommendation. 6.1 Project achievement. 6.2 Limitation & Future plans.
35 35 35
Appendix 1
36
Appendix 2
37
Appendix 3
38
Appendix 4
39
References
41
v
ABBREVIATIONS
PCB
Program controlled circuit board
EPC
Electronic punch card
PC
Personal computer
DC
Direct current
AC
Alternating current
EPP
Enhanced Parallel Port
ECP
Extended Capability Port
SPP
Standard Parallel Port
CPU
Central processing unit
HVAC
Heating, ventilation and air conditioning
ADA
Americans with Disability Act
VSS
Video surveillance system
CCTV
Closed-circuit television
PSIM
Physical security information management
EL
Entry-level
vi
1
Chapter 1 Control & Security System 1.1 Introduction In this time of modern technology, security is very important fact. Now a day we feel the lack of security in various sectors. Most of office or home security are much wanted sectors. In the USA or the UK, they use various modern technologies for security purpose. Electromagnetic punch card is most popular there. But in our country it is very expensive. So when some of our companies want to arrange high security in their office, then they have to collect the security products or software’s from foreign market in a high cost.
In our country some companies like SQURE pharmaceutical, INSEPTA pharmaceutical uses office security system. But their security system is not established properly because in our country this system is not properly developed. Some lift company of our country like Maan Bangladesh Ltd., Creative Ltd., Challenger Ltd., Property Elevator Ltd., Hunday Ltd., Ajij group Ltd., Fuji Ltd., they work on door control. They import the products from foreign markets. Usually Fuji, Sigma, Daffodil, Muithshumisy, are most popular companies who have auto control door, lift, security door in market. Their products are very expensive. There are no Bangladeshi companies who have these security products manufactured by their own.
Chain, Korea, and Switzerland have many companies works with home security system. They have their own products in their market. Door controlling circuit board (PCB), cc cam, security shoe, security alarm, security card (EPC), security lock, lift security control board, etc are available products in their market. These products are manufactured by their own production. Those products are used in our country. When these products have any problem then most of the case we have to buy the parts or product again from their market. Because most of the time these products are not repairable. In this way these markets totally control our security areas
.
Computer Controlled Office Security System
2 But now in our country home or office security is most wanted security system. So we feel the lack of this sector. And from this we are interested to work with our project topic “Computer Controlled Office Security System”.
1.2 Objective
To develop automatic door control based on password protected security system.
To develop the security system at the office based on password requirement to unlock the door.
1.3 Auto control system Auto control system is very familiar in modern electronic system. Auto control system makes our life more easy and comfortable. Now a day this technology is used in doors, lifts, vehicles, robots, and various electronic devices. In our country these facilities of auto control system is available.
A control system is a system of integrated elements whose function is to maintain a process variable at a desired value or within a desired range of values. The control system monitors a process variable or variables, then causes some action to occur to maintain the desired system parameter. In the example of the central heating unit, the system monitors the temperature of the house using a thermostat. When the temperature of the house drops to a preset value, the furnace turns on, providing a heat source. The temperature of the house increases until a switch in the thermostat causes the furnace to turn off. Two terms which help define a control system are input and output.
Control system input is the stimulus applied to a control system from an external source to produce a specified response from the control system.
In the case of the central heating
unit, the control system input is the temperature of the house as monitored by the thermostat.
.
Computer Controlled Office Security System
3 Control system output is the actual response obtained from a control system.
In the
example above, the temperature dropping to a preset value on the thermostat causes the furnace to turn on, providing heat to raise the temperature of the house.
In the case of nuclear facilities, the input and output are defined by the purpose of the control system. The knowledge of the input and output of the control system enables the components of the system to be identified. A control system may have more than one input or output.
Control systems are classified by the control action, which is the quantity responsible for activating the control system to produce the output. The two general classifications are open-loop and closed-loop control systems.
An open-loop control system is Figure 1
Open-Loop Control System one in which the
control action is independent of the output. An example of an open-loop control system is a chemical addition pump with a variable speed control (Figure 1). The feed rate of chemicals that maintain proper chemistry of a system is determined by an operator, who is not part of the control system. If the
chemistry
of
the
system changes, the
pump cannot respond by adjusting its feed rate (speed) without operator action.
Figure 1 : Open-Loop Control System A closed-loop control system is one in which control action is dependent on the output. Figure 2 shows an example of a closed-loop control system. The control system maintains water level in a storage tank. The system performs this task by continuously sensing the level in the tank and adjusting a supply valve to add more or less water to the tank. The desired level is preset by an operator, who is not part of the system.
.
Computer Controlled Office Security System
4
Figure 2 : Closed-Loop Control System
Feedback is information in a closed-loop Figure 3 Feedback in a Closed-Loop Control System control system about the condition of a process variable. This variable is compared with a desired condition to produce the proper control action on the process. Information is continually "fed back" to the control circuit in response to control action.
In the previous example, the actual storage tank water level, sensed by the level transmitter, is feedback to the
level
controller. This
feedback
is compared with a desired level to
produce the required control action that will position the level control as needed to maintain the desired level. Figure 3 shows this relationship
Figure 3
.
Feedback in a Closed-Loop
Computer Controlled Office Security System
5 An automatic control system is a preset closed-loop control system that requires no operator action.
This assumes the process remains in the normal range for the
control system.
An automatic control system has two process variables associated with it:
a controlled variable and a manipulated variable.
A controlled variable is the process variable that is maintained at a specified value or within a specified range. In the previous example, the storage tank level is the controlled variable.
A manipulated variable is the process variable that is acted on by the control system to maintain the controlled variable at the specified value or within the specified range. In the previous example, the flow rate of the water supplied to the tank is the manipulated variable.
In any automatic control system, the four basic functions that occur are:
Measurement
Comparison
Computation
Correction
In the water tank level control system in the example above, the level transmitter measures the level within the tank. The level transmitter sends a signal representing the tank level to the level control device, where it is compared to a desired tank level.
The level
control device then computes how far to open the supply valve to correct any difference between actual and desired tank levels.
The three functional elements needed to perform the functions of an automatic control system are:
A measurement element
An error detection element
A final control element
Relationships between these elements and the functions they perform in an automatic control system are shown in Figure 4.
.
The measuring element performs the
Computer Controlled Office Security System
6 measuring function by sensing and evaluating the controlled variable. The error detection element first compares the value of the controlled variable to the desired value, and then signals an error if a deviation exists between the actual and desired values. The final control element responds to the error signal by correcting the manipulated variable of the process. Figure 4 Relationships of Functions and Elements in an Automatic Control System
Figure 4 Relationships of Functions and Elements in an Automatic Control System Feedback Control of an automatic controller is an error-sensitive, self-correcting device. It takes a signal from the process and feeds it back into the process.
Therefore, closed-
loop control is referred to as feedback control
1.4 Door Control & Security Home automation (also called domotics) is the residential extension of "building automation". It is automation of the home, housework or household activity. Home automation may include centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, and other systems, to provide improved convenience, comfort, energy efficiency and security. Home automation for the elderly and disabled can provide increased quality of life for persons who might otherwise require caregivers or institutional care.
.
Computer Controlled Office Security System
7 A home automation system integrates electrical devices in a house with each other. The techniques employed in home automation include those in building automation as well as the control of domestic activities, such as home entertainment systems, houseplant and yard watering, pet feeding, changing the ambiance "scenes" for different events (such as dinners or parties), and the use of domestic robots. Devices may be connected through a computer network to allow control by a personal computer, and may allow remote access from the internet. Typically, a new home is outfitted for home automation during construction, due to the accessibility of the walls, outlets, and storage rooms, and the ability to make design changes specifically to accommodate certain technologies. Wireless systems are commonly installed when outfitting a pre-existing house, as they reduce wiring changes. These communicate through the existing power wiring, radio, or infrared signals with a central controller. Network sockets may be installed in every room like AC power receptacles. Although automated homes of the future have been staple exhibits for World's Fairs and popular backgrounds in science fiction, complexity, competition between vendors, multiple incompatible standards and the resulting expense have limited the penetration of home automation to homes of the wealthy or ambitious hobbyists. Overview and benefits: In modern construction in industrialized nations, homes have been wired for electrical power, telephones, TV outlets (cable or antenna), and a doorbell. Many household tasks were automated by the development of special appliances. For instance, automatic washing machines were developed to reduce the manual labor of cleaning clothes, and water heaters reduced the labor necessary for bathing. Other traditional household tasks, like food preservation and preparation have been automated in large extent by moving them into factory settings, with the development of premade, pre-packaged foods, and in some countries, such as the United States, increased reliance on commercial food preparation services, such as fast food restaurants. Volume and the factory setting allows forms of automation that would be impractical or too costly in a
.
Computer Controlled Office Security System
8 home setting. Standardized foods enable possible further automation of handling the food within the home. The use of gaseous or liquid fuels, and later the use of electricity enabled increased automation in heating, reducing the labor necessary to fuel heaters and stoves. Development of thermostats allowed more automated control of heating, and later cooling. A remote control for moving vessels and vehicles was first patented by Nikola Tesla in 1898. World's Fairs in Chicago (1934), New York (1939) and (1964–65) depicted electrified and automated homes. In 1966 Jim Sutherland, an engineer working for Westinghouse Electric, developed a home automation system called "ECHO IV"; this was a private project and never commercialized. With the invention of the microcontroller, the cost of electronic control fell rapidly. Remote and intelligent control technologies were adopted by the building services industry and appliance manufacturers worldwide, as they offer the end user easily accessible and/or greater control of their products. As the amount of controllable appliances in the home rises, the ability of these devices to interconnect and communicate with each other digitally becomes a useful and desirable feature. The consolidation of control or monitoring signals from appliances, fittings or basic services is an aim of home automation. In simple installations this may be as straightforward as turning on the lights when a person enters the room. In advanced installations, rooms can sense not only the presence of a person inside but know who that person is and perhaps set appropriate lighting, temperature, music levels or television channels, taking into account the day of the week, the time of day, and other factors. Other automated tasks may include setting the air conditioning to an energy saving setting when the house is unoccupied, and restoring the normal setting when an occupant is about to return. More sophisticated systems can maintain an inventory of products, recording their usage through bar codes, or an RFID tag, and prepare a shopping list or even automatically order replacements.
.
Computer Controlled Office Security System
9 Home automation can also provide a remote interface to home appliances or the automation system itself, via telephone line, wireless transmission or the internet, to provide control and monitoring via a smart phone or web browser. An example of a remote monitoring in home automation could be when a smoke detector detects a fire or smoke condition, then all lights in the house will blink to alert any occupants of the house to the possible fire. If the house is equipped with a home theatre, a home automation system can shut down all audio and video components to avoid distractions, or make an audible announcement. The system could also call the home owner on their mobile phone to alert them, or call the fire department or alarm monitoring company. An electronic lock (more precisely an electric lock) is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. More often electric locks are connected to an access control system. The advantages of an electric lock connected to an access control system include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. The most basic type of electronic lock is a magnetic lock (commonly called a mag lock). A large electro-magnet is mounted on the door frame and a corresponding armature is mounted on the door. When the magnet is powered and the door is closed, the armature is held fast to the magnet. Mag locks are simple to install and are very attack resistant. One drawback is that improperly installed or maintained mag locks can fall on people. and also that one must unlock the mag lock to both enter and leave. This has caused fire marshals to impose strict codes on the use of mag locks and the access control practice in general. Additionally, NFPA 101, Standard for Life Safety and Security, as well as the ADA (Americans with Disability Act) require "no prior knowledge" and "one simple movement" to allow "free egress". This means that a person must be able to walk up to a door and with one motion (no push buttons, or having another person unlock the door, or read a sign "special knowledge") and exit. Other problems include a lag time (delay) in releasing as the collapsing magnetic field is not instantaneous. This lag time can cause a user to walk into the door. Finally, mag locks by design fail unlocked, that is if power is removed they unlock. This could be a problem where security is a prime concern. Additionally, power outages could affect mag locks installed on fire listed doors, which are required to remain latched at all times. Thus, a mag lock would
.
Computer Controlled Office Security System
10 not meet current fire codes as the primary means of securing a fire listed door to a frame. Because of this, many commercial doors (this typically does not apply to private residences) are moving over to stand alone locks, or electric locks installed under a Certified Personnel Program. The first mechanical recodable card lock was invented in 1976 by Tor Sornes, who worked VingCard since 1950s. The first card lock order was shipped in 1979 to Westin Peachtree Plaza Hotel, Atlanta, USA. This product developed triggered the evolution of electronic locks for the hospitality industry. Electric strikes (also called electric latch release) replace a standard strike mounted on the door frame and receive the latch and latch bolt. Electric strikes can be simple to install when they are designed for drop-in replacement of a standard strike, although some electric strikes require that the door frame be heavily modified. Installation of a strike into a Fire Listed Door (for open backed strikes on pairs of doors) or Frame must be done under listing agency authority if any modifications to the frame are required (mostly for commercial doors and frames). Since there is no current Certified Personnel Program to allow field installation of electric strikes into fire listed door openings, listing agency field evaluations would most likely require the door and frame to be de-listed and replaced. Electric strikes allow mechanical free egress: As a user leaves, he operates the lockset in the door, not the electric strike in the door frame. Electric strikes can also be either fail unlocked (except in Fire Listed Doors, as they must remain latched when power is not present), as a mag lock, or the more secure fail locked. Electric strikes are easier to attack than a mag lock. It is simple to lever the door open at the strike, as often there is an increased gap between the strike and the door latch. Latch guards are often used to cover this gap. Electric mortise and cylindrical locks are drop in replacements for the door mounted mechanical locks. A hole must be drilled in the door for electric power wires. Also a power transfer hinge is used to get the power from the door frame to the door. Electric mortise and cylindrical locks allow mechanical free egress. Electric mortise and cylindrical locks can be either fail unlocked or fail locked. In the US, UL rated doors must retain their rating. In new construction doors are cored and then rated. In retofits, the doors must be re-rated. Electrified exit hardware, sometimes called panic hardware or crash bars, are used in fire exit applications. One pushes against the bar to open it, making it the easiest of mechanically free exit methods. Electrified exit hardware can be either fail unlocked or fail locked. A drawback of electrified exit hardware is their complexity which requires skill to install and maintenance
.
Computer Controlled Office Security System
11 to assure proper function. Only hardware labeled "Fire Exit Hardware" can be installed on fire listed doors and frames and must meet both Panic Exit listing Standards and Fire listing Standards. Motor operated locks are used throughout Europe. A European motor operated lock has two modes, day mode where only the latch is electrically operated, and night mode where the more secure deadbolt is electrically operated. A magnetic lock is a simple locking device that consists of an electromagnet and armature plate. By attaching the electromagnet to the door frame and the armature plate to the door, a current passing through the electromagnet attracts the armature plate holding the door shut. Unlike an electric strike a magnetic lock has no interconnecting parts and is therefore not suitable for high security applications because it is possible to bypass the lock by disrupting the power supply. Nevertheless, the strength of today's magnetic locks compares well with that of conventional door locks and they cost less than conventional light bulbs to operate. Power supplies incorporating a trickle-charged lead-acid battery pack can be used to retain security for short-term power outages. History An electromagnetic lock, also known as magnetic lock, was patented on May 2, 1989, by Arthur, Richard and David Geringer of Security Door Controls, an access control hardware manufacturing firm. The device outlined in their designs was the same in principle as the modern magnetic lock consisting of an electromagnet and armature plate. The patent did not make any reference to the manufacturing methods of the electromagnet and detailed several variations on the design including one that used a spring-loaded armature plate to bring the armature plate closer to the electromagnet. The patent expired on May 2, 2009. This device was a 'shear' magnetic lock, as opposed to the original (and now ubiquitous) 'direct pull' electromagnetic locks and was an improvement on a 1984 patent cited in the same document. Operation The magnetic lock relies upon some of the basic concepts of electromagnetism. Essentially it consists of an electromagnet attracting a conductor with a force sufficiently large enough to
.
Computer Controlled Office Security System
12 prevent the door from being opened. In more detailed examination, the device makes use of the fact that a current through one or more loops of wire (known as a solenoid) produces a magnetic field. This works in free space, but if the solenoid is wrapped around a ferromagnetic core such as soft iron the effect of the field is greatly amplified. This is because the internal magnetic domains of the material align with each other to greatly enhance the magnetic flux density. Physical security describes both measures that prevent or deter attackers from accessing a facility, resource, or information stored on physical media, and guidance on how to design structures to resist various hostile acts. It can be as simple as a locked door or as elaborate as multiple layers of armed security guards and guardhouse placement. Physical security is not a modern phenomenon. Physical security exists in order to deter persons from entering a physical facility. Historical examples of physical security include city walls, moats, etc. The key factor is the technology used for physical security has changed over time. While in past eras, there was no passive infrared (PIR) based technology, electronic access control systems, or video surveillance system (VSS) cameras, the essential methodology of physical security has not altered over time. The goal is to convince potential attackers that the likely costs of attack exceed the value of making the attack. The initial layer of security for a campus, building, office, or physical space uses crime prevention through environmental design to deter threats. Some of the most common examples are also the most basic - barbed wire, warning signs and fencing, concrete bollards, metal barriers, vehicle height-restrictors, site lighting and trenches. From the figure 5 we can see a electronic access control door.
.
Computer Controlled Office Security System
13
Fig5: Electronic access control The next layer is mechanical and includes gates, doors, and locks. Key control of the locks becomes a problem with large user populations and any user turnover. Keys quickly become unmanageable forcing the adoption of electronic access control. Electronic access control easily manages large user populations, controlling for user lifecycles times, dates, and individual access points. For example a user's access rights could allow access from 0700 to 1900 Monday through Friday and expires in 90 days. Another form of access control (procedural) includes the use of policies, processes and procedures to manage the ingress into the restricted area. An example of this is the deployment of security personnel conducting checks for authorized entry at predetermined points of entry. This form of access control is usually supplemented by the earlier forms of access control (i.e. mechanical and electronic access control), or simple devices such as physical passes. An additional sub-layer of mechanical/electronic access control protection is reached by integrating a key management system to manage the possession and usage of mechanical keys to locks or property within a building or campus. The third layer is intrusion detection systems or alarms. Intrusion detection monitors for attacks. It is less a preventative measure and more of a response measure, although some would argue that it is a deterrent. Intrusion detection has a high incidence of false alarms. In many jurisdictions, law enforcement will not respond to alarms from intrusion detection systems. From the figure 6 we can see a closed-circuit television used to develop more security control system.
.
Computer Controlled Office Security System
14
Fig6: Closed-circuit television sign The last layer is video monitoring systems. Security cameras can be a deterrent in many cases, but their real power comes from incident verification and historical analysis. For example, if alarms are being generated and there is a camera in place, the camera could be viewed to verify the alarms. In instances when an attack has already occurred and a camera is in place at the point of attack, the recorded video can be reviewed. Although the term closedcircuit television (CCTV) is common, it is quickly becoming outdated as more video systems lose the closed circuit for signal transmission and are instead transmitting on computer networks. Advances in information technology are transforming video monitoring into video analysis. For instance, once an image is digitized it can become data that sophisticated algorithms can act upon. As the speed and accuracy of automated analysis increases, the video system could move from a monitoring system to an intrusion detection system or access control system. It is not a stretch to imagine a video camera inputting data to a processor that outputs to a door lock. Instead of using some kind of key, whether mechanical or electrical, a person's visage is the key. FST21, an Israeli company that entered the US market this year, markets intelligent buildings that do just that. When actual design and implementation is considered, there are numerous types of security cameras that can be used for many different applications. One must analyze their needs and choose accordingly. Intertwined in these four layers are people. Guards have a role in all layers, in the first as patrols and at checkpoints. In the second to administer electronic access control. In the third to respond to alarms. The response force must be able to arrive on site in less time than it is expected that the attacker will require to breach the barriers. And in the fourth to monitor and analyze video. Users obviously have a role also by questioning and reporting suspicious people. Aiding in identifying people as known versus unknown are identification systems.
.
Computer Controlled Office Security System
15 Often photo ID badges are used and are frequently coupled to the electronic access control system. Visitors are often required to wear a visitor badge.
Other physical security tools In recent times, new developments in information and communications technology, as well as new demands on security managers, have widened the scope of physical security apparatus. Fire alarm systems are increasingly becoming based on Internet Protocol, thus leading to them being accessible via local and wide area networks within organisations. Emergency notification is now a new standard in many industries, as well as physical security information management (PSIM). A PSIM application integrates all physical security systems in a facility, and provides a single and comprehensive means of managing all of these resources. It consequently saves on time and cost in the effectual management of physical security.
Door Detective is a tailgate detection and door security system that further supports an access-controlled door. Door Detective increases the security of any access controlled door by removing the security burden placed upon everyday employees when they open the door. Access control systems only control when a door is unlocked; Door Detective takes it one crucial step further by preventing unwanted intruders from “tailgating” behind authorized staff through the opened door. Tailgate detection is essential to any substantial entry security system.
Infrared beam arrays crossing the doorway work together with microprocessor-based intelligence to ensure only one person passes in the appropriate direction for each authorization. Upon alarm, Door Detective can lock nearby entrance control doors or trigger cameras while informing local and remote security personnel. Door Detective is available in two models, the entry-level EL and the more elegant CL.
.
Computer Controlled Office Security System
16
1.5 Various Technologies for Security Control
There are various technologies for security control. Now in this time technology is developing day by day. The security system is also moderated. For high security access control system is very popular. Card control security, password control security, finger print control security, voice control security, eye contact control security, image control security, ray control security etc are now used in various sectors. To maintain computer controlled such security system we have to use various programs and hardware system. There are various lock system also like as magnetic door lock, motor control door lock, power control door lock etc. The visitors entering permission is controlled by various programs. There is also a security system on room controlled visitor system. In this security system the permission of visiting room by visitors is controlled. For this technology in this system electronic shoos are used. The shoos has fix room permission to visit. If the visitors use the shoos in not permitted room then it make security alarm. Now a day’s most of the company fills the need of these security systems for their office.
There is various card systems like as magnetic card, electric card, barcode card etc. magnetic card are more used card system. These card are use for the permission or key for the security system. This technology is developed day by day. And also some modern technologies are coming up nearly in future time.
.
Computer Controlled Office Security System
17
Chapter 2 Basic things of project
2.1 Stepper Motor Basics A stepper motor is an electromechanical device which converts electrical pulses into discrete mechanical movements. The shaft or spindle of a stepper motor rotates in discrete step increments when electrical command pulses are applied to it in the proper sequence. The motors rotation has several direct relationships to these applied input pulses. The sequence of the applied pulses is directly related to the direction of motor shafts rotation. The speed of the motor shafts rotation is directly related to the frequency of the input pulses and the length of rotation is directly related to the number of input pulses applied.
When to Use a Stepper Motor: A stepper motor can be a good choice whenever controlled movement is required. They can be used to advantage in applications where you need to control rotation angle, speed, position and synchronism. Because of the inherent advantages listed previously, stepper motors have found their place in many different applications. Some of these include printers, plotters, high end office equipment, hard disk drives, medical equipment, fax machines, automotive and many more.
The Rotating Magnetic Field: When a phase winding of a stepper motor is energized with current a magnetic flux is developed in the stator. The direction of this flux is determined by the “Right Hand Rule” which states: “If the coil is grasped in the right hand with the fingers pointing in the direction of the current in the winding (the thumb is extended at a 90° angle to the fingers), then the thumb will point in the direction of the magnetic field.” Figure 5 shows the magnetic flux path developed when phase B is energized with winding current in the direction shown. The
.
Computer Controlled Office Security System
18 rotor then aligns itself so that the flux opposition is minimized. In this case the motor would rotate clockwise so that its south pole aligns with the north pole of the stator B at position 2 and its north pole aligns with the south pole of stator B at position 6. To get the motor to rotate we can now see that we must provide a sequence of energizing the stator windings in such a fashion that provides a rotating magnetic flux field which the rotor follows due to magnetic attraction.
Step Modes: Stepper motor "step modes" include Full, Half and Micro step. The type of step mode output of any motor is dependent on the design of the driver.
(i) Full Step Standard (hybrid) stepping motors have 200 rotor teeth, or 200 full steps per revolution of the motor shaft. Dividing the 200 steps into the 360º's rotation equals a 1.8º full step angle. Normally, full step mode is achieved by energizing both windings while reversing the current alternately. Essentially one digital input from the driver is equivalent to one
(ii) Half Step Half step simply means that the motor is rotating at 400 steps per revolution. In this mode, one winding is energized and then two windings are energized alternately, causing the rotor to rotate at half the distance, or 0.9º's. (The same effect can be achieved by operating in full step mode with a 400 step per revolution motor). Half stepping is a more practical solution however, in industrial applications. Although it provides slightly less torque, half step mode reduces the amount "jumpiness" inherent in running in a full step mode.
(iii) Micro step Micro stepping is a relatively new stepper motor technology that controls the current in the motor winding to a degree that further subdivides the number of positions between poles. AMS micro step drives are capable of rotating at 1/256 of a step (per step), or over 50,000 steps per revolution.
.
Computer Controlled Office Security System
19
2.2 Stepper Motor Types
There are three basic stepper motor types. They are: • Variable-reluctance • Permanent-magnet • Hybrid
Variable-reluctance (VR) This type of stepper motor has been around for a long time. It is probably the easiest to understand from a structural point of view. Figure 7 shows a cross section of a typical V.R. stepper motor. This type of motor consists of a soft iron multi-toothed rotor and a wound stator. When the tator windings are energized with DC current the poles become magnetized. Rotation occurs when the rotor teeth are attracted to the energized stator poles.
Permanent Magnet (PM) Often referred to as a “tin can” or “canstock” motor the permanent magnet step motor is a low cost and low resolution type motor with typical step angles of 7.5° to 15°. (48 – 24 steps/revolution) PM motors as the name implies have permanent magnets added to the motor structure. The rotor no longer has teeth as with the VR motor. Instead the rotor is magnetized with alternating north and south poles situated in a straight line parallel to the rotor shaft. These magnetized rotor poles provide an increased magnetic flux intensity and because of this the PM motor exhibits improved torque characteristics when compared with the VR type in figure 8. principle of a PM. or tin-can stepper motor is shown.
Hybrid (HB) The hybrid stepper motor is more expensive than the PM stepper motor but provides better performance with respect to step resolution, torque and speed. Typical step angles for the HB stepper motor range from 3.6° to 0.9° (100 – 400 steps per revolution). The hybrid stepper motor combines the best features of both the PM and VR type stepper motors. The rotor is multi-toothed like the VR motor and contains an axially magnetized concentrimagnet around its shaft. The teeth on the rotor provide an even better path which helps guide the magnetic flux to preferred locations in the airgap. This further increases the detent, holding and
.
Computer Controlled Office Security System
20 dynamic torque characteristics of the motor when compared with both the VR and PM types. The two most commonly used types of stepper motors are the permanent magnet and the hybrid types. If a designer is not sure which type will best fit his applications requirements he should first evaluate the PM type as it is normally several times less expensive. If not then the hybrid motor may be the right choice.
There also excist some special stepper motor designs. One is the disc magnet motor. Here the rotor is designed sa a disc with rare earth magnets, See fig. 9, 10. This motor type has some advantages such as very low inertia and a optimized magnetic flow path with no coupling between the two stator windings. These qualities are essential in some applications.
Figure 7. Cross-section of a variable reluctance (VR) motor.
Figure 9. Cross-section of a hybrid Stepper motor.
.
Figure 8. Principle of a PM or tin-can stepper motor.
Figure 10. Principle of a disc magnet motor developed by Portescap.
Computer Controlled Office Security System
21
2.3 Motor cable identification
Fig 11: motor inside
Procedure 1: With the ohmmeter, separate the wires into two groups of three (there'll be continuity among the three in a group, but no continuity between the groups) As you are testing, make sure that none of the motor wires are shorted together, other than the ones specified in the test. Arbitrarily label the wires in one set a, b, and c. Twist together a and c and hold them to one side of the battery while holding b to the other side. Does the motor turn easily?
If yes, then b is the center and a and c are the ends.
If not, then try again:
Twist together leads b and c and connect them to one side of the battery and lead a to the other. Motor turn easily?
If yes, then a is the center and b and c are the ends.
If not, then try again:
Twist together leads a and b and connect them to one side of the battery and c to the other. Motor turn easily?
If yes, then c is the center and a and b are the ends.
.
Computer Controlled Office Security System
22
If no, then there’s an unknown problem because those are the only combinations.
Repeat the labelling and test sequence for the other set of wires. Procedure 2: If you have two sets of 3 wires (a 6 wire motor) you need to find the center wire of each set. Starting with the "A" set, label the wires A1, A2, and A3 in any order. Connect A1 to A2. Feel how hard it is to spin. Now connect that same A1 wire to the A3 wire in the set.
If it is easier to spin, then the A2 wire is the center. Re-label A2 as "AC"
If it is harder to spin, then the A3 wire is the center. Re-label A3 as "AC"
If it is the same, then the A1 wire is the center. Re-label A1 as "AC"
Repeat this for the B set to find the B center wire "BC" Connect AC and BC together to form your common M+ wire. This modifies the motor to become a unipolar stepper. To use it in bipolar modes, keep AC and BC disconnected from each other any everything.
.
Computer Controlled Office Security System
23
Chapter 3 Computer interfacing
3.1 Parallel Port PC parallel port can be very useful I/O channel for connecting circuits to PC. The PC's parallel port can be used to perform some very amusing hardware interfacing experiments. The Parallel Port is the most commonly used port for interfacing home made projects. This port will allow the input of up to 9 bits or the output of 12 bits at any one given time, thus requiring minimal external circuitry to implement many simpler tasks. The port is composed of 4 control lines, 5 status lines and 8 data lines. It is found commonly on the back of our PC as a D-Type 25 Pin female connector. There may also be a D-Type 25 pin male connector. This will be a serial RS-232 port and thus, is a totally incompatible port. Newer Parallel Port’s are standardized under the IEEE 1284 standard first released in 1994. This standard defines 5 modes of operation which are as follows,
1. Compatibility Mode. 2. Nibble Mode. (Protocol not Described in this Document) 3. Byte Mode. (Protocol not Described in this Document) 4. EPP Mode (Enhanced Parallel Port) 5. ECP Mode (Extended Capabilities Mode)
The aim was to design new drivers and devices which were compatible with each other and also backwards compatible with the Standard Parallel Port (SPP). Compatibility, Nibble & Byte modes use just the standard hardware available on the original Parallel Port cards while EPP & ECP modes require additional hardware which can run at faster speeds, while still being downwards compatible with the Standard Parallel Port. Compatibility mode or "Centronics Mode" as it is commonly known, can only send data in the forward direction at a typical speed of 50 kbps but can be as high as 150+ kbps. In order to receive data, we must
.
Computer Controlled Office Security System
24 change the mode to either Nibble or Byte mode. Nibble mode can input a nibble (4 bits) in the reverse direction, e.g. from device to computer. Byte mode uses the Parallel's bidirectional feature (found only on some cards) to input a byte (8 bits) of data in the reverse direction. Extended and Enhanced Parallel Ports use additional hardware to generate and manage handshaking. To output a byte to a printer (or anything in that matter) using compatibility mode, the software must,
1. Write the byte to the Data Port. 2. Check to see is the printer is busy. If the printer is busy, it will not accept any data, thus any data which is written will be lost. 3. Take the Strobe (Pin 1) low. This tells the printer that there is the correct data on the data lines (Pins 2-9). 4. Put the strobe high again after waiting approximately 5 microseconds after putting the strobe low.
This limits the speed at which the port can run at. The EPP and ECP ports get around this by letting the hardware check to see if the printer is busy and generate a strobe and appropriate handshaking. This means only one I/O instruction need to be performed, thus increasing the speed. These ports can output at around 1 to 2 mbps. The ECP port also has the advantage of using DMA channels and FIFO buffers, thus data can be shifted around without using I/O instructions. IEEE 1284 Type C however, is a 36 conductor connector like the Centronics, but smaller. This connector is claimed to have a better clip latch, better electrical properties and is easier to assemble. It also contains two more pins for signals which can be used to see whether the other device connected, has power. 1284 Type C connectors are recommended for new designs, so we can look forward on seeing these new connectors in the near future.
.
Computer Controlled Office Security System
25
Fig 12: 25-way Female D-Type Connector
Various enhanced versions of the original specification have been introduced over the years
Bi-directional (PS/2)
Enhanced Parallel Port (EPP)
Extended Capability Port (ECP)
So now the original is commonly referred to as the Standard Parallel Port. Another pin diagram of parallel port is shown below:
Fig 13: 25-way Female D-Type Connector mentioning their names
.
Computer Controlled Office Security System
26 A table is shown of the "Pin Outs" of the D-Type 25 Pin connector and the Centronics 34 Pin connector. The D-Type 25 pin connector is the most common connector found on the Parallel Port of the computer, while the Centronics Connector is commonly found on printers. The IEEE 1284 standard however specifies 3 different connectors for use with the Parallel Port. The first one, 1284 Type A is the D-Type 25 connector found on the back of most computers. The 2nd is the 1284 Type B which is the 36 pin Centronics Connector found on most printers.
The pin assignments of the D-Type 25 pin Parallel Port Connector is shown is table 1 below:
.
Computer Controlled Office Security System
27
Table 1: Pin Assignments of the D-Type 25 pin Parallel Port Connecto
3.2 Buffer Circuit In this stage we have got the bitwise inverted form of the required signal. The current rating of the signal is not sufficient to draw the stepper motor. So there have to amplify the current achieved from the signal. The signal is first sent to the input of the buffer. Here we used IC 4050B. Pin-1 and Pin-8 of the IC is connected to the Vcc and ground respectively. For the inputs at pin-3, pin-5, pin-9 and pin-11 we get the outputs at pin-2, pin-4, pin-10 and pin-12 respectively. These inputs are sent to the bases of four transistors through four 4.4 kΩ resistors. In project there used transistor TIP122. The emitters of the transistors are connected to the ground. And the collectors are connected to the four terminals of the motor. The circuit diagram of the buffer circuit is shown below
Fig 14: Buffer Circuit with the Stepper Motor
.
Computer Controlled Office Security System
28 The inputs of the circuit come from the pin 2, pin 3, pin 4 and pin 5 of the parallel port. Pin 18, pin 19, pin 20, pin 21, pin 22, pin 23, pin 24 and pin 25 are connected to the ground of the buffer circuit. An important part of our circuit is the generating part of the DC 12V for the motor. We used a step-down transformer which takes AC 220V as input and gives AC 12V as output. This AC 12V is sent to a Bridge Rectifier which take AC 12V as input and gives DC 12V as output. This DC 12V is sent to the Vcc terminals of the stepper motor.
Fig 15: Circuit Diagram of the power supply which converts 220V AC to 12V DC with a high current rating.
3.3 Program development For door control we have to control the stepper motor movement. For this control we use C/C++ programming. C/C++ is usually regarded as the world’s most important professional programming language. One reason for C/C++’s success and staying power is that programmers like it. C/C++ combines subtlety and elegance with raw power and flexibility. It is a structured language that does not confine. It is a high performance language that does not constrain. It is not the contrived product of a committee, but rather the outcome of programmers seeking a better programming language.
One of the most important features of C/C++ language is it can send a digital signal up to 8 bit long to the parallel port with high accuracy. We can precisely define the signal as well as the required high and low time. For the whole program we take three steps:
Forward motor control
Reverse motor control
Password control
.
Computer Controlled Office Security System
29
3.4 Forward motor control We used inverting buffer to amplify the signal. So we had to send a signal which is bitwise inverted of the required the signal. So for forward rotation the signal sequence is 0111, 1011, 1101 and 1110. After passing through the inverting buffer the signal becomes 1000, 0100, 0010 and 0001.
The code for forward rotation in C/C++ language is given in Appendix 1.
3.5 Reverse motor control To rotate the stepper motor in reverse direction we have to invert the sequence. So the motor has to receive the sequence 0001, 0010, 0100 and 1000. Because of the inverting buffer we have to generate the sequence 1110, 1101, 1011 and 0111.
The code for reverse rotation in C/C++ language is given in Appendix 2.
We get the signal generated by the programs from the 25 pin female D-type parallel port of the CPU. And using a male-female 25-pin data cable we send the signal to the amplifier circuit.
3.6 Password control For password control we use C program cord is given in Appendix 3. This logic will work as when the user’s password will match with administrative password then user will get the permission and door will open. But for wrong password user will not allow to get in.
3.7 C program for whole system The whole program for the system is given in Appendix 4.
.
Computer Controlled Office Security System
30
Chapter 4 Circuit construction 4.1 Parallel port to circuit connection The male port of the cable was connected with parallel female port of mother board on CPU. And the other side of the cable is female for printer which we cut off to get the cables for our need to connect with our main circuit. From short circuit test of the cables we can identify the cables and can use in circuit. Only 2, 3, 4, 5 data pins for data, 18 pin for grounding were used.
Fig16: parallel port
.
Computer Controlled Office Security System
31
4.2 IC connection in circuit board We connect a 4050 IC in circuit. 2, 4, 6, 10 pin are used in four transistor T1, T2, T3, T4. And these pin are also connected with diode D1, D2, D3, D4. We use four LEDs with the negative side of diodes. Another leg of LEDs are ground. These grounds are common with DC ground cable. Vcc pin is connected with DC voltage supply line. Ground pin is connected with DC ground cable in common.
Fig 17 : IC connection
4.3 Motor connection in circuit. There are six cables in motor. Two red cables are connected with AC supply circuit. This two cables are common in circuit. This connection gives the AC power to the motor to move. Others four cable are connected with IC in main circuit. These cables give the data sequence input to the motor. By which the motor is moved in a controlled way
.
Computer Controlled Office Security System
32
4.4 AC voltage supply in motor We use a step down transformer to step down the AC voltage 220volt to 12volt. The low voltage side of transformer is connected with a capacitor and a transistor to purify the voltage. Then the positive part is connected with motor red cables and negative part is connected with in common ground of DC supply. The high voltage side of transformer is directly connected with 220 ac line.
4.5 DC voltage supply in circuit We use 10 volt DC supply for the circuit. We connect the Vcc pin of IC with DC voltage supply line and ground cable of DC supply is common with IC ground and the ground of AC voltage supply circuit. We maintain the voltage from DC supply 10volt for our circuit.
.
Computer Controlled Office Security System
33
Chapter 5 Result
5.1 Output display in PC monitor When we run the C program then it want password. This is the password which will give the visitors entering permission. We set the password 123 for permitted visitors. So when visitors give the password 123 then they get the permission to enter and in PC display they can see “Welcome”. But when they give wrong password then they are not allow to enter and in PC display they can see “Sorry you are not permitted!”. This PC display will the main display for the visitors. Which shown in figure 18.
Fig 18: Display in PC monitor.
.
Computer Controlled Office Security System
34
5.2 Output in motor movement When visitors give the password 123 then they get the permission to enter and the motor move in forward direction, then the door will open. After a delay the motor move in reverse direction to close the door. But when visitors give the wrong password then they don’t get the permission to enter and motor don’t move that means the door is not opened.
5.3 Output display by LED When visitors give the right password then in main circuits board LED’s that are connected with diodes are turn on and off step by step with maintaining data bit sequence but when visitors give the wrong password then there is no change in LED’s light. Which shown in figure 19.
Fig 19: Display in LED.
.
Computer Controlled Office Security System
35
Chapter 6 Conclusion & Recommendation
6.1 Project achievement This project is able to control the steeper motor movement. This movement is controlled by a computer which will operate the motor only if the correct password is entered. Now this movement can be used in various sectors. This can be used in door control that helps to produce a security system. And this is our project’s main goal to make a security system which is computer controlled. That means we have achieved our goal.
6.2 Limitation & Future plans Our future plan is to control the limitations of this system. And also moderate the system by other technology like card access control, finger print control, voice control etc. The system can be developed by using cc camera, door sensors, time control, alarm system etc. Most of all we have the target to involve our self in theses on M.Sc. level and study on security system.
.
Computer Controlled Office Security System
36
APPENDIX 1 The code for forward rotation in C/C++ language is given below: #include #include #include void main () { clrscr(); int s; int step[ ] = {0x7,0xB,0xD,0xE}; printf (“\n\n\n\tEnter the Number of Steps\t:\t”); scanf (“%d”,&s); for (int i=0;i