1 / 26

Extreme Security: Automated Intruder elimination system

Extreme Security: Automated Intruder elimination system. Rick Mills Eastern Kentucky University Dept . of Technology, CET. OUTLINE. Motivation – provide X- treme security Introduction – research crime and existing security options

maura
Download Presentation

Extreme Security: Automated Intruder elimination system

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Extreme Security:Automated Intruder elimination system Rick Mills Eastern Kentucky University Dept. of Technology, CET

  2. OUTLINE • Motivation – provide X-treme security • Introduction – research crime and existing security options • Problem statement – provide true security and peace of mind • Proposed solution – X-treme security through the use of technology and innovation

  3. OUTLINE • Results - three unique control systems providing total security • Conclusions – research + preparation + planning = success • Future work – building upon success • Q&A

  4. Motivation Crimes committed during the first 6 months of 2009 in Lexington, Kentucky. Violent crimes………..………………..866 Murders…………………..…………………7 Robberies………………….…………….249 Aggravated assaults………...……….558 Property crimes……………………..4,598 Burglaries………………………….....1,101 Motor vehicle thefts………………….271 Arsons……………………………………...13 U.S. Department of Justice — Federal Bureau of Investigation. (2009, December)

  5. MOTIVATION (Cont.) Result: • Property Loss • Property Damage • Loss of Peace of Mind And all too often:

  6. INTRODUCTION • Existing security systems • Need for a more secure system • Combining technologies • Implementing system

  7. PROBLEM STATEMENT • Design a system to provide true security • Incorporate multiple technologies in the system • Provide system troubleshooting tools • Give the system a marketable appearance

  8. PROPOSED SOLUTION • Determine the design • Specify components • Develop sequence of operation

  9. PROPOSED SOLUTION • Determine input and output distribution

  10. PROPOSED SOLUTION • Design control logic • Programmable Logic Controller logic • Personal Computer Interface Board logic • Basic Stamp 2 microprocessor logic

  11. PROPOSED SOLUTION • Programmable Logic Controller logic • RSLogix 500 (industrial experience)

  12. PROPOSED SOLUTION • Personal Computer Interface Board logic • QBasic (classroom experience) QBasic Program for the Computer Interface Board REM Program for Intruder Elimination 8 Project1 A = INP(768)CLSOUT 768, 0IF A = 1 GOTO 2 ELSE 12 COLOR 10CLSBEEPPRINT " "PRINT " "PRINT " "PRINT "             INTRUDER ELIMINATOR ON"SLEEP 7

  13. PROPOSED SOLUTION • Basic Stamp 2 microprocessor logic • PBasic 2.5 (self-taught) ' {$STAMP BS2}' {$PBASIC 2.5}' -----[ Program Description ]-----------------------------------------' This program controls the 24v portion of the IE8' -----[ I/O Definitions ]------------------------------------------------' InputsPlcAlarm PIN 15IbWarningDn PIN 14IbBuzReqPIN 12IbConvReq PIN 11 '  OutputsBuz24v PIN 10PnuSol24v PIN 9Cnvey24v PIN 8

  14. PROPOSED SOLUTION • Design and build power distribution panel

  15. PROPOSED SOLUTION • Design and build controls circuits PCIB Output to PLC Input Circuit PLC Output to PCIB Input Circuit

  16. PROPOSED SOLUTION • Integrate components into system • Troubleshoot circuits and operations • Give the system a marketable appearance

  17. RESULTS • A fully operational security system • A security system that incorporates three unique control systems • A security system that attacks the problem, not the symptom • The satisfaction of a job well done http://studentweb.eku.edu/rick_mills36/Ricks Projects.html

  18. Results Basic Stamp 2 MicroLogix 1000 PC Interface Board Transistor Board

  19. Results Intruder Eliminator 8

  20. CONCLUSIONS • The Capstone project covered all phases of project development • Self-teaching is possible with appropriate tools • Planning is essential to project completion

  21. FUTURE WORK Possible extensions could include: • Additional sensors • Additional warnings • Additional deterrents, i.e. Tazers…

  22. Questions & Suggestions?

  23. THANK YOU! RickWMills@yahoo.com

  24. REFERENCES U.S. Department of Justice — Federal Bureau of Investigation. (2009, December).Preliminary Semiannual Uniform Crime Report, January to June 2009. Retrieved April 15, 2010 from World Wide Web: http://www.fbi.gov/ucr/2009prelimsem/table_4il-mo.html

  25. ACKNOWLEDGEMENTS • Special thanks to Dr. Vigyan Chandra, our beloved Professor Vigs, for your dedication, devotion, and commitment to teaching and your students.

  26. Dedicated to the memory of my beloved son, Jeremy Wayne Mills February 25, 1981 – October 8, 2000

More Related