Development of Anti-Theft Door System for Lecturer s Room

Similar documents
AIR CONDITIONING STUDY FOR AUTOMOTIVE APPLICATION ALAUDDIN HAFIZ BIN YUSOF UNIVERSITI MALAYSIA PAHANG

IMPROVEMENT OF BUS ROOF SECTION

SMART GARDEN SYSTEM NURSHAHNEEM BINTI MOHD SAID

A SIMPLE ID DETECTION USING INFRARED SENSORS NOOR FARHANA HALIL BT ABDUL RAZAK

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

Design and Fabrication of Solar Assisted Drying Machine

PENGARUH KEDUDUKAN DAN KEADAAN TAPAK KE ATAS KOS PEMBINAAN TAPAK TELEKOMUNIKASI SURYYANY BT ABD RANI UNIVERSITI TEKNOLOGI MALAYSIA

GAS LEAKAGE MONITORING OVER THE NET WITH RASPBERRY PI MOHD FAEZ BIN AHMAD RAZLI

FENCE INTRUDER DETECTION SYSTEM (FIDS) CHUINK BENG CHEONG

WIRELESS SECURITY SYSTEM UKASYAH BIN MAHAMOD

UNIVERSITI TEKNIKAL MALAYSIA MELAKA. Improving of Cool Air Evacuation Process for Home Application

ANALYSIS AND MEASUREMENT FIBER OPTIC FAULT BY USING OPTICAL TIME DOMAIN REFLECTROMETER (OTDR) AKWANIZAM BIN AZMI

Design and Development of Prototyping High Pressure and High Temperature Steam Cleaning Jet

STORAGE WATER TANKS CLEANING ROBOT AFIZRUL IMAN BIN MOHAMED

MOTORCYCLE ANTI-THEFT SYSTEM (MATS) MUHAMAD ALIF BIN ABU

GSM MOBILE CAR ALARM SYSTEM NURHAZWANI BT SALEH

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

Samsiah binti Mohamad

POROSITY ARCHITECTURE IN ECOLOGICAL DESIGN TAN KWON CHONG

IDENTIFICATION OF AUDIO AND ROOM PARAMETERS FOR OPTIMUM SPEECH INTELLIGIBILITY IN ROOM NG TSING CHUN UNIVERSITI TEKNOLOGI MALAYSIA

.,- '. '.. I.. \ " ; \. " / [i IlilrJII~'~ri1l1~m i ~:III'j'11 II. II ' ' ..' 1-- '. _.:"". h, ".,'.".

ASSESSMENT OF PARKING DEMAND IMPACT ON ADJOINING ROADWAY NETWORK WAN NUR ALIFFA WAN RAMLI

A COMPARISON BETWEEN TRADITIONAL PAVEMENT REHABILITATION METHOD AS COMPARED TO RECYCLING METHOD SITI MAZZUANA BINTI SHAMSUDDIN

XBee Based Industrial And Home Security System

SISTEM PBNGUJIAN TAPAK CADAI\IGAN BINAAN HALIZAH BINTI AHMAD

ANALYSIS OF HEAT GAIN AGAINST COOLING CAPACITY AT OCCUPIED BUILDING KOH KELVIN

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

STUDY OF INTERNAL HEAT EXCHANGER EFFECTS ON CAR AIR CONDITIONING SYSTEM CHAN HONG KET

UNIVERSITI TEKNIKAL MALAYSIA MELAKA

WIRELESS BASED HOME SECURITY WITH AUTOMATION SYSTEM WAN NORZIELA BINTI WAN ROSLI

APPLICATION OF BIM IN EARLY STAGE DESIGN COST ESTIMATION

GEOGRAPHICAL ANALYSIS OF LIBYAN AIRPORTS AND THEIR POTENTIAL AS A HUB OF AIR TRANSPORTATION FOUAD D S ABDULWAFI UNIVERSITI TEKNOLOGI MALAYSIA

FIRE ALARM WITH SECURITY SYSTEM MOHAMED FAIZ BIN MOHAMED MUSA

GREEN HIGHWAY ECOLOGY AND ECOSYSTEM PRESERVATION AND RESTORATION MUDATHIR OMER ADAM ARBAB

ASSESSMENT OF URBAN GREEN SPACE BASED ON LANDSCAPE ECOLOGICAL PRINCIPLES SITI SYAMIMI BINTI OMAR

A Suitable Development Trend in Linear City Based On Smart Growth A Case Study in Lanzhou Urban Area ZHOU WEI

VISUAL REPRESENTATION OF NATURE IN THE LIBRARY SOMAYEH ROUSTAEI SADRY UNIVERSITI TEKNOLOGI MALAYSIA

Signature : MOHD ZAMRI BIN IBRAHIM

Application of OPC in the Intelligent Building System Integration

DYNAMIC ANALYSES OF COMPOSITE FOOTBRIDGES EXCITED BY PEDESTRIAN INDUCED LOADS FARAZ SADEGHI UNIVERSITI TEKNOLOGI MALAYSIA

DESIGN FACTORS THAT INFLUENCE THE EFFECTIVE USE OF MEYDAN IN IRAN REIHANEH SADAT HAJMIRSADEGHI UNIVERSITI TEKNOLOGI MALAYSIA

HEDGES USED IN BACKGROUND OF THE STUDY SECTIONS OF ENGLISH DEPARTMENT THESES: A CASE STUDY AT DIAN NUSWANTORO UNIVERSITY THESIS

HEAT TRANSFER CHARACTERISTICS OF A HEAT EXCHANGER JAMIATUL ADAWIAH BT AB. SIDEK UNIVERSITI TEKNIKAL MALAYSIA MELAKA

DESIGN OF A RECYCLE BIN TIN CAN CRUSHER MUHAMMAD HANIS BIN MUHAMMAD ZULKIFLI

NAZANEEN AHMED NASROULLA

The IPPS was developed on IBM-PC platform under QNX real time operating system (RTOS) and uses QNX-Windows GUI.

IOT Based Intelligent Bin for Smart Cities

FLOOD MAPPING FOR SUNGAI BUNUS MOHD IRSYAM NOORFAWANA BIN MASRI

CBI-064. User Manual. Caddx to KNX-BUS Interface

Implementation of Auto Car Washing System Using Two Robotic Arms

Access CONTROL. MANAGEMENT Software

PROPOSE AND DESIGN A CANVAS SHOES CLEANER MACHINE NUR SYAFIQAH BINTI ISMUINI

WIRELESS Temperature Monitoring System for Blood Bank using Zigbee. Keywords: Temperature monitoring system; ZigBee; LabVIEW; internet; alarm

II. METHODS AND MATERIALS

Section PERIMETER SECURITY SYSTEMS

Android Controlled Fire Fighting Robot

Portable Perimeter Detection and Monitoring System - PoPDaMS

A STRUCTURED CRITICAL SUCCESS FACTORS MODEL FOR THE IMPLEMENTATION OF GREEN RETROFIT PROJECTS REHMAASHINI JAGARAJAN UNIVERSITI TEKNOLOGI MALAYSIA

SMART NITRO SOLUTION

TABLE OF CONTENTS. iii iv vi. vii. xii xiii xvii xix

[Patil* et al., 5(7): July, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Why Should You Invest In An Access Management System?

TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK

Hazlet Township Police

HEAD OFFICE, SECURITY DEPARTMENT

Dryer Controller M720

ANALYSIS OF THE FIRE FIGHTING ROBOT

BURGLAR ALARM USING ARDUINO AND PIR SENSOR WITH SMS ALERT Burgoji Santhosh Kumar 1, S.Ramesh 2 1

Petrol Bunk Automation with Prepaid Card using GSM Identification

FMNA SYSTEM (FORGET ME NOT ALERT SYSTEM) SHARON BOON KHAI YEN

Kuliah 1 : Pengenalan Kepada Teknologi Maklumat & Komunikasi

Design of Microwave Anti-theft Alarm Based on Microcontroller

A Design of IADSS with the Earthquake Detecting Function

Integrated Security Solutions

HUMIDITY CONTROL SYSTEM FOR ROLLING AND FERMENTING ROOM OF A TEA FACTORY

UNIVERSITI PUTRA MALAYSIA

INTRUSION SOLUTIONS. Yehans Surveillance & Security Systems. laser perimeter alarming CONTACT US ON

ANALYZE ThJ SPRINKLER SYSTEM IN tjw LECTURE ROOM USINO CID (COMPUTATIONAL FLUID DYNAMICS) ANALYSIS. WJHAMAD KHUMAJM fin r,jzaiman

Smart Home: Controlling and Monitoring Households Appliances Using Gsm Network

CENTRE OF STUDIES FOR BUILDING SURVEYING FACULTY OF ARCHITECTURE, PLANNING AND SURVEYING UNIVERSITI TEKNOLOGI MARA

PES s College of Engineering Phaltan, Shivaji University Kolhapur, Maharashtra, India

Architectural and Engineering Specification for a Security Management System. StarNet 2

Virtual Boundary System Using Passive Infrared Sensor

EVALUATION OF CRACK RELIEF LAYER FOR ROADS AND HIGHWAYS KHAIRUL HAFIZ BIN MUSTAFA

Total Unified Solution for Building Integration: Communications, Access Control, Video Surveillance and Fire

Ontech GSM 9040/50. Reference Manual English -1 -

KOLEJ UNIVERSITI TEKNOLOGI TUN HUSSEIN ONN BORANG PENGESAHAN STATUS TESIS SISTEM KA WALAN BANJIR DENGAN MENGGUNAKAN MIKROPENGA WAL

Smart Intrusion Detection

BUILDING MANAGEMENT SYSTEMS. Introduction to Building Management Systems

Microcontroller based design for Tele-sensing and extinguishing fire

Design and Development of General Purpose Alarm Generator for Automated System

Cardax System Comparison

Electromagnetic Compatibility of Alarm Systems

STATEMENT OF WORK. System Description:

Wise&Cute WSC Series IP Cameras User-Manual

PLACENESS BAGI PASAR BESAR DAN BAZAR DI KAMPUNG JAWA, MELAKA AHMAD AMZAR BIN ABDULLAH

UNIVERSITI PUTRA MALAYSIA INTEGRATING PUBLIC ART IN MALAYSIAN URBAN LANDSCAPE

Transcription:

UNIVERSITI TEKNIKAL MALAYSIA MELAKA Development of Anti-Theft Door System for Lecturer s Room Thesis submitted in accordance with the partial requirements of the Universiti Teknikal Malaysia Melaka for the Bachelor of Manufacturing Engineering (Robotics and Automation) By Ronald A. Lepon Faculty of Manufacturing Engineering March 2008

UTeM Library (Pind.1/2007) UNIVERSITI TEKNIKAL MALAYSIA MELAKA BORANG PENGESAHAN STATUS TESIS* JUDUL: SESI PENGAJIAN : Saya (HURUF BESAR) mengaku membenarkan tesis (PSM/Sarjana/Doktor Falsafah) ini disimpan di Perpustakaan Universiti Teknikal Malaysia Melaka (UTeM) dengan syarat-syarat kegunaan seperti berikut: 1. Tesis adalah hak milik Universiti Teknikal Malaysia Melaka. 2. Perpustakaan Universiti Teknikal Malaysia Melaka dibenarkan membuat salinan untuk tujuan pengajian sahaja. 3. Perpustakaan dibenarkan membuat salinan tesis ini sebagai bahan pertukaran antara institusi pengajian tinggi. 4. **Sila tandakan ( ) SULIT TERHAD TIDAK TERHAD (Mengandungi maklumat yang berdarjah keselamatan atau kepentingan Malaysia yang termaktub di dalam AKTA RAHSIA RASMI 1972) (Mengandungi maklumat TERHAD yang telah ditentukan oleh organisasi/badan di mana penyelidikan dijalankan) Disahkan oleh: (TANDATANGAN PENULIS) Alamat Tetap: (TANDATANGAN PENYELIA) Cop Rasmi: Tarikh: Tarikh: * Tesis dimaksudkan sebagai tesis bagi Ijazah Doktor Falsafah dan Sarjana secara penyelidikan, atau disertasi bagi pengajian secara kerja kursus dan penyelidikan, atau Laporan Projek Sarjana Muda (PSM). ** Jika tesis ini SULIT atau TERHAD, sila lampirkan surat daripada pihak berkuasa/organisasi berkenaan dengan menyatakan sekali sebab dan tempoh tesis ini perlu dikelaskan sebagai SULIT atau TERHAD.

APPROVAL This thesis submitted to the senate of UTeM and has been accepted as partial fulfillment of the requirements for the degree of Bachelor of Manufacturing Engineering (Robotics and Automation). The members of the supervisory committee are as follow:.. Main Supervisor (Official Stamp and Date) ii

DECLARATION I hereby, declare this thesis entitled Development of Anti-Theft Door System for Lecturer s Room is the result of my own research except as cited in the references. Signature :.. Author s Name :.. Date :.. iii

ABSTRACT This project combined both hardware and software development to create a simple anti-theft door system for the lecturer's room. Basically, a PC interface system to control electromagnetic door was developed to be controlled using PC via serial or parallel port communication. Control program will be used to lock or unlock the door. The door is locked when electromagnetic door is energized and vice versa. For this project, the system will be used to lock or unlock the door via PC. User interface is equipped with the LOCK and UNLOCK button to control the door. The door is locked using electromagnetic device or any relevant mechanical system. Password is mandatory to get access into the main control panel of the system. iv

ABSTRAK Dalam projek ini, pembangunan perisian dan juga perkakasan digabungkan untuk menghasilkan sistem anti pencuri untuk bilik pensyarah. Sistem antaramuka berkomputer untuk mengawal sistem elektromagnet yang digunakan untuk mengunci pintu telah dibangunkan. Sistem elektromagnet tersebut dikawal dengan menggunakan komputer dan bersambung kepada sistem kawalan melalui sambungan liang selari. Pintu boleh dikunci atau dibuka dengan menggunakan perisian kawalan yang telah dihasilkan. Pintu dikunci apabila elektromagnet diaktifkan, dan pintu dibuka apabila sistem elektromagnet tidak diaktifkan. Sistem antaramuka berkomputer dilengkapi dengan butang KUNCI dan juga BUKA untuk mengawal pintu bilik. Pintu dikunci dengan menggunakan alat mekanikal atau sistem elektromagnet mengikut kesesuaian. Hanya kata laluan yang betul sahaja yang boleh memberikan capaian kepada sistem kawalan antaramuka berkomputer. v

DEDICATION For my beloved Constacia and my family. vi

ACKNOWLEDGEMENT I would like to thank God for giving me a wonderful and interesting project. For my supervisor, Madam Nur Aidawaty Binti Rafan, thank you very much for the comments, ideas, inspirations, advices, and all efforts you ve made for me that really guide me professionally in this project, especially inspiration to get started, for getting started is the most difficult part of this project. Not to forget the ideas, continuous support, inspirations, and discussions with my lecturers, friends, SBC Metamorphosis Team, and my course mates, UTeM s BMFA team. vii

TABLE OF CONTENTS Borang Pengesahan Status Tesis... i Approval... ii Declaration... iii Abstract... iv Abstrak... v Dedication... vi Acknowledgement... vii Table of Contents... viii List of Figures... xi List of Tables... xiii Sign and Symbols... xiv 1.0 INTRODUCTION... 1 1.1 Background... 1 1.2 Problem Statements... 3 1.3 Objectives of Project... 4 1.4 Scope of Project... 5 2.0 LITERATURE REVIEW... 6 2.1 Definition and Architecture of Security System... 6 2.2 Door Security... 7 2.3 Microcontroller and Assembly Language... 7 2.4 Home Security... 8 2.5 Drawback of Electronic Security System... 9 2.6 Implementation of PatrolBot... 9 2.7 Secure Way System... 10 2.8 Robot Application In Security System... 11 viii

2.9 PC Interfacing to External Device... 13 2.9.1 Parallel Port Interface... 13 2.9.2 Parallel Port Controlling in Windows... 16 2.9.3 Serial Port Interface... 16 3.0 METHODOLOGY... 18 3.1 Introduction to Project Methodology... 18 3.2 Topic Selection... 19 3.3 Project Planning and Gantt Chart... 19 3.4 Method of Conducting a Literature Review... 26 3.5 Information Resources... 27 3.6 Project Implementation... 28 3.6.1 System Overview... 28 3.6.2 Hardware Component Design... 30 3.6.3 Circuit, Electronics, and Electrical Element... 30 3.6.4 Flow Chart and Operation of the system... 32 3.7 Software Development using Visual Basic 6.0... 34 4.0 RESULTS AND DISCUSSION... 40 4.1 Overview of the Results... 40 4.2 Circuit Design and Analysis... 42 4.3 Electromagnetic Device... 45 4.4 Modification of ATX Power Supply Unit... 46 4.5 Control Software... 50 5.0 CONCLUSIONS AND RECOMMENDATIONS... 60 5.1 Conclusion... 60 5.2 Recommendations... 61 ix

REFERENCES... 63 APPENDICES... 66 82 A Visual Basic Programming Code... 66 B Pictures of Project... 78 C Bill of Material and Cost Estimation... 83 x

LIST OF FIGURES 2.1 DB-25 Parallel Pin Configuration... 14 2.2 DB-9 Serial Port Connector... 17 3.1 Gantt Chart for PSM1 (Part A)... 20 3.2 Gantt Chart for PSM1 (Part B)... 21 3.3 Gantt Chart for PSM2... 22 3.4 Flow chart for PSM 1... 23 3.5 Flow chart for PSM 2... 25 3.6 Method used for conducting literature review... 26 3.7 Block diagram of the suggested system... 29 3.8 Schematic diagram of switching circuit... 31 3.9 Flowchart of the main system operation... 32 3.10 Reject loop sub-routine... 33 3.11 New Project dialogue box... 34 3.12 Project and empty form... 35 3.13 Project tree view and pop-up form... 35 3.14 Empty code window for the user form... 36 3.15 User form interface layout... 36 3.16 General Declaration code for the user form... 36 3.17 User form layout after modifications... 37 3.18 Code for Lock command button... 37 3.19 Inpout32.dll file in Windows directory... 38 3.20 Icon setting for the user form... 39 3.21 Make Project1.exe command button... 39 4.1 Final design of hardware for the system... 41 4.2 Switching transistor circuit for testing... 42 4.3 Circuit for testing relay to control a real table fan... 43 4.4 Schematic circuit for final design... 44 xi

4.5 Electromagnetic device... 45 4.6 The resulting electromagnetic device... 46 4.7 Inner view of an ordinary ATX power supply unit... 47 4.8 The power supply connectors... 47 4.9 ATX power supply pinouts... 48 4.10 Power supply unit with modifications... 48 4.11 Connection of electromagnet to power supply unit... 49 4.12 Preliminary control software design... 50 4.13 Password dialogue box... 51 4.14 Access denied message box... 51 4.15 Official icon for Anti-Theft Door System... 52 4.16 Main Controller Unit... 53 4.17 Single Unit Controller interface... 54 4.18 Channel-148 Controller... 57 4.19 Combination Lock Demo... 58 4.20 Individual Bit Controller... 59 5.1 Schematic circuit design for electronic security lock... 62 xii

LIST OF TABLES 2.1 DB-25 Pin Function Description... 14 2.2 I/O Address and Bits Classification... 15 2.3 Serial Connector Pin Configuration... 17 4.1 Possible voltage output configuration... 49 4.2 Colour code description... 49 4.3 Hexadecimal, Octal, and Binary data representation... 56 xiii

SIGN AND SYMBOLS CCTV - Close Circuit Television CO - Carbon Monoxide COM - Communication port DB-25 - Connection cable for parallel port communication GUI - Graphical User Interface IBM - International Business Machine LED - Light Emitting Diode PC - Personal Computer PIC - Programmable Integrated Controller PIR - Passive Infra Red RS-232 - Recommended Standard 232 UART - Universal Asynchronous Receiver/Transmitter VB - Visual Basic XP - experience (Microsoft Windows Operating System family) xiv

CHAPTER 1 INTRODUCTION 1.1 Background Anti-theft Security System for the Lecturer s Room was a title given to this project. In this project, a security system will be developed specifically for the lecturer s room. This anti-theft system will cover human identification and access control for the user, whether to lock or unlock the room door. Integration of human identification with the system will be done in this project. This feature enables the user to accept or deny the visitor s request to enter the room. User can gain access and control to the system via IBM compatible PC. The system s operating software will be developed in this project and need to be installed to control the system. Personal computer or laptop with Windows XP operating system is the recommended platform for this project. A minimum attention was given in current development of security system which was designed specifically for the room. Most developers will focus on the major security system, which covers the entire unit of a building, area or civilian home. The system usually have a high cost and complicated installation process which required more time, works, and cost to be invested. This project focus on development of security system specifically designs for the room. 1

Wireless camera will be used to build the prototype of the system. This camera will transmit the signal to the receiver and video will be displayed on television screen inside the room. This will give information for the user to make decision whether to keep the door lock, or unlock the room s door. Basically, application and idea of security system can be found almost everywhere. However, design of every security system are different based on the security scope, application, and desired task to be performed by the respective security system. Graphical User Interface (GUI) design is yet another element that will be taken into consideration in this project. The blue print of all interconnections between the hardware and controller will be developed and will be used to build the system. This will make it easier to build the system. This idea of this project focuses mainly on human identification and integration of computer controlled door access security system. User can gain access to control the door, and have a full access to lock or unlock the door based on information provided by the video camera installed outside the room. The main purpose of the system is to avoid unauthorized access to the room. Programming in this project will cover door control using PC. Software to control the door using PC, whether to lock or unlock the door will be created. Hardware will be connected directly to the PC parallel port. Proper configuration of hardware and software is very important to reduce false alarm. A lot of factors need to be considered to make this system really works as desired. Conventional security system nowadays usually sends the signal for human being for further action to be taken. However, this technique is no longer efficient since the system was more likely to generate false alarm, which will be improved in this project. False alarm is the main issue of the existing security system nowadays, which is not good for both human being and the system. 2

In this project, LED (Light Emitting Diode) will be used to indicate that the door was locked or not. Toggle switch will be used to represent the human identification sensor. In actual system, actuator which can lock or unlock the door will be connected to the PC and relay will be used to enable the usage of PC to control any electrical equipment without damaging the PC main board with the high operating voltage. Control signal which can turn external devices on or off can be connected directly to the computer and devices via parallel port or RS-232 communication cable. 1.2 Problem Statement Lecturer s room door was not equipped with anti-theft system. Most people only take the whole home security system into account. This project focuses specifically on the room security system, and nothing to do with the home security system. This project is a simple version of security system, and the scope was not so big as well. Door security is the main element which will be taken into consideration. Door security system is important nowadays. The whole building security system or civilian home security system is expensive. Most security systems available in the market nowadays are complicated, and installation of the system will cost another amount of money to be invested in order to have a good security system. A variety of security devices for deterring, detecting, and identifying offenders or intruders can be found. However, very few provide a working relationship to a room. An intrusion deterrent device which activates a water spraying system has been invented. A triggering mechanism for a tear-gas canister was introduced for the purpose of security and protection, but this idea did not have a working relationship to a room. 3

Security devices to identify the bank robbers using the spray gun to discharge a scent which can be detected by the dog have a working relationship to a room. Device was installed inside the room, mounted at the ceiling. This project will implement a simple anti-theft security system for lecturer s room that has a clear relationship to a room to fulfill this void. This project will also demonstrate the idea of port programming and PC-based control system. Usage of computer software to control security system was widely accepted, and only authorized person will have access to the system which determines the room security. This feature can avoid unauthorized person to take control of the system or gain access to the security system. This is very important to make sure that the system is secure. 1.3 Objectives of Project This project was done in order to achieve some objectives at the end of the project timeline. Here is the list of this project objectives: 1. To develop programming and software using any available software to program the security system for the room door with auto-lock feature. 2. To demonstrate and apply the idea of computer port programming and PC-based control system. 3. To develop Graphical User Interface (GUI) which will be used by the user to manage and control the system. 4. To integrate the door system with personal computer using any available communication port. 5. To design and integrate hardware with electronic and electrical elements which will be used to simulate electromagnetic door system. 4

1.4 Scope of Project This project will focus on programming to lock or unlock the door via PC. Port programming which enables interrupt process for the operating system can be used to control any external devices attached to the PC via serial or parallel port. Port programming and user interface design can be done using programming language such as Visual Basic 6.0, Delphi, Matlab, Visual C++, Java, or Borlant Turbo. Both software and hardware for the system will be developed in this project. However the system will be developed using LEDs, solenoid, and some mechanical system to demonstrate the response of the output and input devices. Integration of hardware and software will be done in this project to create a simple PC-based control system. Basically, the idea is to connect output device to the PC via serial or parallel port. Then, control software to control output device will be developed using any software development programming language. Software is used to activate the output device by a click of a button or simply hit the key on keyboard. Also, output device must be able to be turned off using keyboard or mouse click. The system can control up to 8 separate outputs individually. For this project, the system will be used to lock or unlock the door via PC. User interface must have LOCK and UNLOCK button to control the door. The door may be locked using electromagnetic device or any relevant mechanical system. Password is mandatory to get access into the main control panel of the system. 5

CHAPTER 2 LITERATURE REVIEW 2.1 Definition and Architecture of Security System Security is the condition of being protected against danger or loss. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside. Individuals or actions that encroach upon the condition of protection are responsible for the breach of security. The word "security" in general usage is synonymous with "safety," but as a technical term "security" means that something not only is secure but that it has been secured [18]. It is very often true that people's perception of security is not directly related to actual security. For example, a fear of flying is much more common than a fear of driving; however, driving is generally a much more dangerous form of transport [18]. According to Marston, R. M., (1998) modern electronics security system range in complexity from simple electronic door-bell to ultra-sophisticated wireless burglar alarm system that comes complete with an array of passive infra-red (PIR) movement detectors and contact sensors plus full remote-control and sensormonitoring facilities. The idea of electronics-based security system has a wide range of application. They can be designed to be activated by physical contact or body proximity, or by variation in heat, light, or infrared radiation levels, or in voltage, current, resistance or some other electrical properties and parameters (Marston, 1998). 6

2.2 Door Security Door security relates to prevention of door-related burglaries. Such break-ins take place in various forms, and in a number of locations; ranging from front, back and side doors to garage doors [19]. Solid wood door, panel doors (hollow and solid core), metal skinned wood-edged doors and metal edge-wrapped doors are the types of doors typically used in residential applications. Typically, door frames are solid wood. Residential doors also frequently contain wood. Security tests by Consumer Reports Magazine in the 1990s found that many residential doors fail or delaminate when force is applied to them. Solid wood doors withstood more force than the very common metal skinned wood-edged doors used in newer construction [19]. The Chula Vista Residential Burglary Reduction Project there were the following findings: "From victim interviews, we learned that in 87% of the break-ins that occurred when intruders defeated locked doors with tools such as screwdrivers or crowbars, the burglars targeted "the one door that had no deadbolt lock."... not one burglar attempted to break a double-pane window during the course of successful or attempted burglary." (Page 3, The Chula Vista Residential Burglary Reduction Project Summary). 2.3 Microcontroller and Assembly Language Back to security system, Robert Gaffigan (1997) discussed in his book entitle Home Security Projects about the usage of microcontroller to design and develop a simple security system for a single home. He made it very clear that programming was required to design a good security system. The programming can be done in assembly language or high-level programming language. 7

High level programming language makes it easier for human being to write the code of program, comparing to the low level language. Using only PIC Microcontroller or Programmable Integrated Controller, Robert Gaffigan (1997) was successfully designed a portable CO detector, pool alarm system, an early warning alarm system, and dog bark inhibitor system. He suggested that new user should start to learn programming using simulator. Programming using PIC to develop a security system required a good understanding of processor working principles. Security system was created to produce a safe and sound environment for human being and personal properties. Security system mostly refers to electronic and computer controlled system which can monitor and scan any given area all the time automatically. 2.4 Home Security The FBI reports that a home is burglarized in the U.S. every 15.4 seconds. Burglary is now considered to be the most serious threat a home can face. In most cases, burglars are looking for items that they can easily resell for cash. The most targeted items by burglars include laptop computers, guns, jewelry, DVD players and other similar small electronic items (Kelly, 2008). Most burglaries occur during the day when homeowners are at work. Generally, burglars use a certain type of force when they break into a home; however, it only stands to reason that burglars target those homes with seem to offer the easiest amount of access [20]. In order to protect their property and possessions, more people are buying home surveillance systems. A home surveillance system protects against vandalism, burglary, and act as a deterrent to crime (Ryan Mcelhinny, 2008). 8

2.5 Drawback of Electronic Security System However, usage of sophisticated electronic security system generates a lot of false alarm and this issue had become more serious, where burglar alarm warning was no longer treated as an emergency. This idea was very clear. Most convensional alarm system can only detect intruders and emergency but fail to eliminate the situation. At some point, the user have to reset the system manually. Signal of emergency was then forwarded to the human being to handle. Most security system operates like this. The idea of security system which only notify human in case of emergency was totally outdated. However, early warning system can save a lot of life if it was applied to fight Tsunami in 2004 [6]. Security systems nowadays make use of wireless technology and robotic security system. 2.6 Implementation of PatrolBot Security robot application was now getting more and more popular in the world of security system. PatrolBot developed by Mobile Robot Inc was now available to purchase, however with a very high price. This new technology has grabbed the interest of security enthusiasts to move forward into the wireless and robotics security system [22]. The origin of PatrolBot idea was generated from an old idea of using security guard to take care and of the building or any given areas. The potential of PatrolBot can reduce false alarm. PatrolBot can detect moving object, hazard environment, and easy to integrate with most security system. Artificial intelligent element enables PatrolBot to learn and understand the floor plan all by itself, without the need of human operator to program a complex code into the system [22]. The user only need to download the software into the system, with no additional programming required. This makes this robot very flexible and easy to use. 9