Download presentation
Presentation is loading. Please wait.
Published byJason Horton Modified over 9 years ago
1
Wireless Security System Group #14 Yuncheng Wang Chris Overcash John Petty Chun Hong Lin
2
Introduction n Efficiency –no cabling required –can be monitored from mobile device n Reliability –camera more self sufficient –less chance of cabling being cut
3
Block Diagrams
5
Motion Detector n Slim Line PIR –50 x 50 ft. coverage Advanced –RF protection up to 1GHz –Enhanced high & low –Temperature compensation
6
Range of Detector n Has 34 beams in 3 detection layers n Optional lenses allow 10x90 ft (3x27m) coverage
7
How the Detector Works n Object Breaks multiple PIR beams. n The PIR will have an output signal as shown. n This signal will be used to tell the camera to take a picture.
8
Camera n Black and White n CMOS n 8 pixel digital output resolution n Min illumination 1 lux
9
Camera n Resolution : 384 x 288 pixels n Programmable frame rate (0.5~50 fps)
10
PIC Chip n Parallel to Serial interface n 625 kbps n Universal Serial Bus n Universal Synchronous Asynchronous Receiver
11
Transceiver n Transmits the image to the laptop computer n Spread Spectrum Frequency Hopping n 2.402 - 2.478 GHZ. n Data rate 882Kbps n Range of 300 ft. indoors, 3000 ft. outdoors
12
Universal Serial Bus n n Plug and Play capability n n Distributes electrical power n n Bi-directional data flow n n Full duplex communication
13
Computer n Min. Requirements –133 MHz –32 Megs Ram –Windows 95 with USB support –800X600 pixel display –256 color
14
Computer and Software n 2 gigabytes of free hard drive space. n Small and light enough to carry around easily. n Durability due to rough handling. n The software must be : –easy to use –reliable –easy to maintain and upgrade –efficient
15
Overall Block Diagram
16
Conclusion A security system can be designed so allow a guard to patrol a building more effectively. The guard would also respond to an alarm more efficiently. Requires fewer security guards. Safer for the guard because he/she knows where perpetrator is located.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.