Industrial Security System

 Download your Full Reports for Industrial Security System

Security is primary concern for every one. This Project describes a design of effective security alarm system that can monitor an industry with different sensors. Unauthorized access, Temperature increment, IR detection can be monitored by the status of each individual sensor. Obviously, this burglar alarm also has an input to 'arm' the alarm, a tamper input and a couple of outputs to control a siren and Auto dialing system. The alarm is also fitted with a so-called 'panic button'.
The burglar alarm is built around the 8051 micro controller from Atmel. This micro controller provides all the functionality of the burglar alarm. It also takes care of filtering of the signals at the inputs. Only after an input has remained unchanged for 30 milliseconds, is this new signal level passed on for processing by the micro controller program. This time can be varied by adopting small changes in the source code.
A maximum of 5 sensors can be connected to the burglar alarm. These sensors need to have their contacts closed when in the inactive state (i.e. Normally Closed). In addition, each sensor needs to have its tamper connection wired as well. A power supply voltage of +5 VDC is available for each sensor at the corresponding wiring terminals.

The uniqueness of this project is not only alerting the neighbors by siren, it also dials a mobile number which is already programmed into the system. A mobile number or a land line number can be programmed into the system. As this system works on existing telephone line, it can dial the number even the subscriber is out of station.

??????? This project uses regulated 5V, 500mA power supply. 7805 three terminal voltage regulator is used for voltage regulation. Bridge type full wave rectifier is used to rectify the ac out put of secondary of 230/12V step down transformer.

Security is the condition of being protected against danger or loss. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside. Individuals or actions that encroach upon the condition of protection are responsible for the breach of security. The word "security" in general usage is synonymous with "safety," but as a technical term "security" means that something not only is secure but that it has been secured. One of the best options for providing good security is by using a technology named EMBEDDED SYSTEMS.


  • 8K Bytes of Re-programmable Flash Memory.
  • RAM is 256 bytes.
  • 4.0V to 5.5V Operating Range.
  • Fully Static Operation: 0 Hz to 33 MHz?s
  • Three-level Program Memory Lock.
  • 256 x 8-bit Internal RAM.
  • 32 Programmable I/O Lines.
  • Three 16-bit Timer/Counters.
  • Eight Interrupt Sources.
  • Full Duplex UART Serial Channel.
  • Low-power Idle and Power-down Modes.
  • Interrupt recovery from power down mode.
  • Watchdog timer.
  • Dual data pointer.
  • Power-off flag.
  • Fast programming time.
  • Flexible ISP programming (byte and page mode).

 Download your Full Reports for Industrial Security System


© 2013 All Rights Reserved.