Showing posts with label CCTV. Show all posts
Showing posts with label CCTV. Show all posts

2. Background :MHSS)

2. Background - MHSS

2.1. GSM/GPRS Based Security System

Based on the IEEE802.11 standard, wireless home network is known as WiFi, which provides a medium for transferring media files [1]. However, it is high cost and high
International Journal of Smart Homepower consumption. Y. Zhao [2] has developed a low cost GSM/GPRS based wireless home security system which includes wireless security sensor nodes and a GSM/GPRS gateway [2-3]. It has the following features:
 (a) low cost, 
(b) low power consumption,
 (c) simple installation,
 (d) fast response and 
(e) simple user interface.
 In general, GSM modem acts as the interface between the users and the sensors nodes. There are 3 types of sensor nodes applied in the system which include the door security nodes, infrared sensor nodes, and fire alarm nodes. This architecture includes components such as filters, amplifiers, analog to digital converters and communication interfaces. The system used a wireless transceiver module to transfer data between gateway and sensor nodes. Every sensor node comprises a microprocessor and a wireless transceiver module. The function of the microprocessor is to receive and analyze the signal from the sensors’ node as well as the current status of the nodes. This system also consists of a sleep timer and switch mode pump circuit, which reduces of the power consumption.
C.K. Ng [4] has developed a wireless security system where an alarm system is programmed in a graphical user interface (GUI). The system is used to monitor the RFID reader, RFID tag and the GSM terminal. The information obtained from the tag is sent to the server in a RF link that is exhibited in a GUI. If the laptop is stolen from the covered region, the alarm system will start to draw attention. Meanwhile, the laptop owner will be notified by an alert message. In addition, the alarm system will not be stopped until the laptop is put back in the covered region, or the program is stopped/terminated.RFID have been available for many years for reading bar codes RFID tag located several meters away [5-8]. It is increasingly being used in other applications ranging from inventory management to anti-counterfeiting protection. In a wireless security system (WSS) [8], a RFID tag is attached to the laptop and RFID reader is connected to server. If the laptop is stolen from the reader, the alarm system will be triggered to draw attention with loud noise. The laptop owner will be notified with short messaging service (SMS) from the server via GSM module system in a few seconds. Alternatively, it can be improved with Bluetooth technology which is embedded in most of mobile laptop today [9]. The GSM terminal is used as the SMS interface to send messages 
[10]. Generally the notebook acts as the base station to run the program. Usually GSM terminal comes with a RS232 connector to external terminal equipment, and the Subscriber Identity Module (SIM) cardholder and the external connector [4].Nakrop Jinaporn [11] has developed a security system against asset theft by using radio frequency identification technology. 
The system consists of five main parts: 
(a) RFID reader and tag,
 (b) GUI,
 (c) database system,
 (d) CCTV and 
(e) wireless transmitter and receiver. 
The RFID reader is installed at the entrance of the campus and the tags are attached on/in student ID cards and their properties. The program of the developed system has the capabilities of investigating the identification process, database management and controlling function of the hardware.GUI is used in a vehicle security system where the information is controlled via the GUI [11-12]. The system is activated when the tag is read while the motorcycle is being located within the effective range. The system will automatically record this incident and exhibit the information on the monitor. Any theft occurrence will turn the monitor on automatically with the alarm signal which alerts other systems. When the burglar occurs, the CCTV will also be started for recording is immediately. The motorcycle engine is shut off automatically when the asset theft occurs however this requires a further investigation.

Introduction :A Multilevel Home Security System (MHSS)

1. Introduction

Home security has been a concern of worldwide. As the technology is emerging every second, abundant home based security systems have been developed and implemented to keep their welfare safe. Home security system is an essential mean of protecting our home from illegal invasion. A conventional home security system consists of a Closed Circuit Television, CCTV and burglar alarm. CCTV captures video in 24 hour to identify what goes on around the house and in the house as well as get a hold of the evidence if there is a house breaking around the captured areas. Burglar alarm acts as the tool to alert the house owners and their neighbors. In additional, it may also chase away the burglar as the system may emit a high frequency sound wave. Nevertheless, the memory consumption is considerably large as the camera keeps recording non-stop. The power consumption is considered as a concern of installing a security system. In this project, a multilevel home security system that sends alert messages to the house owner and police station has also been designed, developed and validated. Section 2 introduces the background of the project. Section 3 introduces an overview of MHSS. Section 4 and 5 discusses the system implementation and hardware & circuit testing respectively. Section 6 makes the conclusions of the project as well as highlights the future work.