SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Index
Description
Aim of micro project
Course outcomes
Actual Procedure Followed
Actual Resource Used
Output of micro project
Skill Developed
A Burglar alarm is a system designed to detect intrusion –
unauthorized entry – into a building or other area. Security
alarms are used in residential, commercial, industrial, and
military properties for protection against burglary (theft)
or property damage, as well as personal protection against
intruders. Security alarms in residential areas show a
correlation with decreased theft. Car alarms likewise help
protect vehicles and their contents. Prisons also use security
systems for control of inmates.
Some alarm systems serve a single purpose of burglary
protection; combination systems provide both fire and
intrusion protection. Intrusion alarm systems may also be
combined with closed-circuit television surveillance (CCTV)
systems to automatically record the activities of intruders, and
may interface to access control systems for electrically locked
doors. Systems range from small, self-contained noisemakers,
to complicated, multiarea systems with computer monitoring
and control. It may even include two-way voice which allows
communication between the panel and Monitoring station.
Description
1. Omprakash Chauhan
2. Adnan Mulani
3. Ganesh Mudaliyar
4. Nashra Patel
Signature
Subject Teacher
Signature (HOD)
Muchhala Polytechnic, Thane
Information Technology Department
A
Report
On
“To Study Burglar Alarm ”
By
Procedure
The IR transmitter or IR LED is connected to a current
limiting resistor of 150Ω and connected to supply. It is
placed at the maximum possible range from photo diode.
The cathode of the photo diode is connected to supply
while anode is connected to 10KΩ resistor. Other end of
the resistor is connected to ground. The anode terminal of
the photo diode is also connected to pin 5 of LM358 op
amp, which is the non-inverting terminal.
Wiper of the 10KΩ POT is connected to the inverting
terminal i.e. pin 6 of LM358 while the other two terminals
of the POT are connected to Vcc and ground.
Pins 8 and 4 of LM358 are supply pins. They are connected
to Vcc and ground respectively.
The output of the op amp is taken at pin 7. One terminal of
the buzzer is connected to pin 7 of LM358 while the other
terminal is connected to Vcc.
Course outcomes
Test the Digital Systems, logic families and logic gates
Output
Sr.No Name of
Resource
Specification Qty Remark
1 LM358 1
2 IR Transmitter
or IR LED
1
3 Photo Diode 1
4 10 KΩ 1
5 150Ω 1
6 10 KΩ POT 1
7 Buzzer 1
Resource
Burglar alarm system nowadays can also be used for
multiple purposes as well. These other functions include,
fire, safety alarms, as well as intrusion. These can also be
used simultaneously as well.
Today, people are very concerned about their own safety. A
lot of theft crimes are now committed because of extreme
causes, and it could happen to almost anybody. That is why
having a burglar alarm system is a recommended solution as
well as investment to prevent theft in your home or office.
Skill Developed

Weitere ähnliche Inhalte

Was ist angesagt?

Mini-Project-1 Report
Mini-Project-1 ReportMini-Project-1 Report
Mini-Project-1 Report
VASAV SHETHNA
 

Was ist angesagt? (20)

Sensor Lecture Interfacing
 Sensor Lecture Interfacing Sensor Lecture Interfacing
Sensor Lecture Interfacing
 
MINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTORMINI PROJECT ON CELLPHONE DETECTOR
MINI PROJECT ON CELLPHONE DETECTOR
 
Low cost fire alarm.vce
Low cost fire alarm.vceLow cost fire alarm.vce
Low cost fire alarm.vce
 
Automatic control of street light using LDR
Automatic control of street light using LDRAutomatic control of street light using LDR
Automatic control of street light using LDR
 
Introduction plc
Introduction plcIntroduction plc
Introduction plc
 
smart blind stick
smart blind sticksmart blind stick
smart blind stick
 
Cctv camera
Cctv cameraCctv camera
Cctv camera
 
HOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINOHOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINO
 
Cell phone detector
Cell phone detectorCell phone detector
Cell phone detector
 
Programmable Logic Controller and ladder logic programming
Programmable Logic Controller and ladder logic programmingProgrammable Logic Controller and ladder logic programming
Programmable Logic Controller and ladder logic programming
 
Cell Phone Detector ppt- IIEST, Shibpur
Cell Phone Detector ppt- IIEST, ShibpurCell Phone Detector ppt- IIEST, Shibpur
Cell Phone Detector ppt- IIEST, Shibpur
 
Mini-Project-1 Report
Mini-Project-1 ReportMini-Project-1 Report
Mini-Project-1 Report
 
project report on fire alarm
project report on fire alarmproject report on fire alarm
project report on fire alarm
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology
 
EST 130, Emerging Trends in Electronics
EST 130, Emerging Trends in ElectronicsEST 130, Emerging Trends in Electronics
EST 130, Emerging Trends in Electronics
 
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry PiIRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
IRJET - IoT based Anti Theft Detection and Alerting System using Raspberry Pi
 
Metal detector robot
Metal detector robotMetal detector robot
Metal detector robot
 
Project ideas ece students
Project ideas ece studentsProject ideas ece students
Project ideas ece students
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
Fence presentation
Fence  presentationFence  presentation
Fence presentation
 

Ähnlich wie Burglar Alarm Micro Project

An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
Zac Darcy
 
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEMHOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
paperpublications3
 
Lecture 1 PPT - Introduction to Embedded Systems.pptx
Lecture 1 PPT - Introduction to Embedded Systems.pptxLecture 1 PPT - Introduction to Embedded Systems.pptx
Lecture 1 PPT - Introduction to Embedded Systems.pptx
cronydeva
 
Super sensitive industrial security system ppt
Super sensitive industrial security system pptSuper sensitive industrial security system ppt
Super sensitive industrial security system ppt
Mohammed Siraj
 

Ähnlich wie Burglar Alarm Micro Project (20)

An electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring systemAn electronic switch sensor with a point to-point intrusive monitoring system
An electronic switch sensor with a point to-point intrusive monitoring system
 
Electronic security system
Electronic security systemElectronic security system
Electronic security system
 
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATIONFIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
FIRE ALARM SYSTEM BASED ON MCU FOR INDUSTRY APPLICATION
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
 
GSM Based Security System
GSM Based Security SystemGSM Based Security System
GSM Based Security System
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7Implementation of vision based intelligent home security system using ARM7
Implementation of vision based intelligent home security system using ARM7
 
protection on lineman while working on transmission line report
 protection on lineman while working on transmission line report protection on lineman while working on transmission line report
protection on lineman while working on transmission line report
 
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEMHOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
 
IJISET_V2_I6_90
IJISET_V2_I6_90IJISET_V2_I6_90
IJISET_V2_I6_90
 
Lecture 1 PPT - Introduction to Embedded Systems.pptx
Lecture 1 PPT - Introduction to Embedded Systems.pptxLecture 1 PPT - Introduction to Embedded Systems.pptx
Lecture 1 PPT - Introduction to Embedded Systems.pptx
 
Super sensitive industrial security system ppt
Super sensitive industrial security system pptSuper sensitive industrial security system ppt
Super sensitive industrial security system ppt
 
Smart DoorLock System using DTMF
Smart DoorLock System using DTMFSmart DoorLock System using DTMF
Smart DoorLock System using DTMF
 
Smart Door Lock System Using DTMF
Smart Door Lock System Using DTMFSmart Door Lock System Using DTMF
Smart Door Lock System Using DTMF
 
ppt.pptx
ppt.pptxppt.pptx
ppt.pptx
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
 
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULEREAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
 
Auto Room Lighting and Door lock Report
Auto Room Lighting and Door lock ReportAuto Room Lighting and Door lock Report
Auto Room Lighting and Door lock Report
 
Project report on dtmf based door opening system
Project report on  dtmf based door opening systemProject report on  dtmf based door opening system
Project report on dtmf based door opening system
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 

Mehr von Omprakash Chauhan

motherboard electronic components and their functions
motherboard electronic components and their functionsmotherboard electronic components and their functions
motherboard electronic components and their functions
Omprakash Chauhan
 
System of units
System of unitsSystem of units
System of units
Omprakash Chauhan
 

Mehr von Omprakash Chauhan (19)

Introduction to curve
Introduction to curveIntroduction to curve
Introduction to curve
 
Stack - Data Structure - Notes
Stack - Data Structure - NotesStack - Data Structure - Notes
Stack - Data Structure - Notes
 
Sorting and Searching - Data Structure - Notes
Sorting and Searching - Data Structure - NotesSorting and Searching - Data Structure - Notes
Sorting and Searching - Data Structure - Notes
 
Queue - Data Structure - Notes
Queue - Data Structure - NotesQueue - Data Structure - Notes
Queue - Data Structure - Notes
 
Basic of Data Structure - Data Structure - Notes
Basic of Data Structure - Data Structure - NotesBasic of Data Structure - Data Structure - Notes
Basic of Data Structure - Data Structure - Notes
 
Polygons - Computer Graphics - Notes
Polygons - Computer Graphics - NotesPolygons - Computer Graphics - Notes
Polygons - Computer Graphics - Notes
 
Line Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - NotesLine Drawing Algorithms - Computer Graphics - Notes
Line Drawing Algorithms - Computer Graphics - Notes
 
Basic of computer graphic - Computer Graphic - Notes
Basic of computer graphic - Computer Graphic - NotesBasic of computer graphic - Computer Graphic - Notes
Basic of computer graphic - Computer Graphic - Notes
 
E-R Diagram of College Management Systems
E-R Diagram of College Management SystemsE-R Diagram of College Management Systems
E-R Diagram of College Management Systems
 
Simple Calculator Flowchart
Simple Calculator FlowchartSimple Calculator Flowchart
Simple Calculator Flowchart
 
Full Wave Rectifier (FWR) Microproject
Full Wave Rectifier (FWR) MicroprojectFull Wave Rectifier (FWR) Microproject
Full Wave Rectifier (FWR) Microproject
 
A detailed study of guidelines required for presentation skills
A detailed study of guidelines required for presentation skillsA detailed study of guidelines required for presentation skills
A detailed study of guidelines required for presentation skills
 
Fractional-horsepower Motor Report
Fractional-horsepower Motor ReportFractional-horsepower Motor Report
Fractional-horsepower Motor Report
 
motherboard electronic components and their functions
motherboard electronic components and their functionsmotherboard electronic components and their functions
motherboard electronic components and their functions
 
How To Area of irregular shape Using Integration Method.
How To Area of irregular shape Using Integration Method.How To Area of irregular shape Using Integration Method.
How To Area of irregular shape Using Integration Method.
 
Process of ionization
Process of ionizationProcess of ionization
Process of ionization
 
Welcome to the world of ionization
Welcome to the world of ionization Welcome to the world of ionization
Welcome to the world of ionization
 
Printer
PrinterPrinter
Printer
 
System of units
System of unitsSystem of units
System of units
 

Kürzlich hochgeladen

Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Kürzlich hochgeladen (20)

Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Burglar Alarm Micro Project

  • 1. Index Description Aim of micro project Course outcomes Actual Procedure Followed Actual Resource Used Output of micro project Skill Developed
  • 2. A Burglar alarm is a system designed to detect intrusion – unauthorized entry – into a building or other area. Security alarms are used in residential, commercial, industrial, and military properties for protection against burglary (theft) or property damage, as well as personal protection against intruders. Security alarms in residential areas show a correlation with decreased theft. Car alarms likewise help protect vehicles and their contents. Prisons also use security systems for control of inmates. Some alarm systems serve a single purpose of burglary protection; combination systems provide both fire and intrusion protection. Intrusion alarm systems may also be combined with closed-circuit television surveillance (CCTV) systems to automatically record the activities of intruders, and may interface to access control systems for electrically locked doors. Systems range from small, self-contained noisemakers, to complicated, multiarea systems with computer monitoring and control. It may even include two-way voice which allows communication between the panel and Monitoring station. Description
  • 3. 1. Omprakash Chauhan 2. Adnan Mulani 3. Ganesh Mudaliyar 4. Nashra Patel Signature Subject Teacher Signature (HOD) Muchhala Polytechnic, Thane Information Technology Department A Report On “To Study Burglar Alarm ” By
  • 4. Procedure The IR transmitter or IR LED is connected to a current limiting resistor of 150Ω and connected to supply. It is placed at the maximum possible range from photo diode. The cathode of the photo diode is connected to supply while anode is connected to 10KΩ resistor. Other end of the resistor is connected to ground. The anode terminal of the photo diode is also connected to pin 5 of LM358 op amp, which is the non-inverting terminal. Wiper of the 10KΩ POT is connected to the inverting terminal i.e. pin 6 of LM358 while the other two terminals of the POT are connected to Vcc and ground. Pins 8 and 4 of LM358 are supply pins. They are connected to Vcc and ground respectively. The output of the op amp is taken at pin 7. One terminal of the buzzer is connected to pin 7 of LM358 while the other terminal is connected to Vcc. Course outcomes Test the Digital Systems, logic families and logic gates
  • 5. Output Sr.No Name of Resource Specification Qty Remark 1 LM358 1 2 IR Transmitter or IR LED 1 3 Photo Diode 1 4 10 KΩ 1 5 150Ω 1 6 10 KΩ POT 1 7 Buzzer 1 Resource
  • 6. Burglar alarm system nowadays can also be used for multiple purposes as well. These other functions include, fire, safety alarms, as well as intrusion. These can also be used simultaneously as well. Today, people are very concerned about their own safety. A lot of theft crimes are now committed because of extreme causes, and it could happen to almost anybody. That is why having a burglar alarm system is a recommended solution as well as investment to prevent theft in your home or office. Skill Developed