LIST OF FIGURES
NO TITLE
PAGE
1.1 2.1
Burglary modus operandi Typical SCADA system architecture
2 15
2.2 2.3
2.4 2.5
Integrated SCADA architecture The Web Studio Development Environment
IWS Data Flow
Data Flow Example 16
17 18
19 2.6
2.7 Basic PLC Components System
PLC System Overview 21
22
2.8 Example of CCTV applications
24
2.9 Multi-Fresnel lens type of PIRPID
29
2.10 Basic Smoke Detector
30 2.11
3.1 3.2
Example of Burglar Alarm Flowchart of SCADA system
Gantt Chart for Project Planning 31
33 34
4.1 4.5
4.6 4.7
Logic Gate Design Login Page
Basic Layout of a House Event Screen
38 43
44 44
LIST OF ABBREVIATIONS
UTeM Universiti Teknikal Malaysia Melaka
PLC Programmable Logic Controller
PIC Programmable Integrated Chip
SCADA Supervisory Control and Data Acquisition
SMS Short Messaging System
GSM Global System Mobile
HMI Human Machine Interface
GUI Graphical User Interface
RTUs Remote Terminal Units
CCTV Closed Circuit Television
dB Decibel
PID Passive Infrared Detector
PIR Passive Infrared Sensor
IO InputOutput
IWS Indusoft WebStudio
IR Infra Red
LIST OF APPENDICES
NO TITLE
PAGE A
InduSoft WebStudio Project 57
B Specifications of PLC OMRON
58 C
Printed Materials 59
CHAPTER 1
INTRODUCTION
1.1 Project Background
Just as we are more conscious of national security these days, home security remains a top concern in the minds of most people. Home is a proverbial castle, and
although a moat cannot be build around the house, we can - and should - take steps to make our home as safe as possible. When we do, well sleep easier at night, whether we
are tucked into our own bed or in some place hundreds of miles away.
It is surprising the number of people who install expensive alarm systems and yet neglect basic physical security measures. A house having an alarm but offering easy
entry may tempt a burglar to chance it, snatch a few valuables, and then make a quick getaway. They may gamble on the fact that because of the prevalence of false alarms,
few people take any notice of an alarm sounding unless it goes on for too long. They may even try, and succeed, in silencing it.
People that make burglarizing people have three main enemies: time, light and noise. When a security home system is purchased, large enemies for burglars are
created. If the system is monitored, the burglar knows that his time in our house has to be very fast because the police are dispatched on their way. The noise of the alarm is
enough to get them out by themselves of our house immediately.
A brief description at the burglar modus operandi is discussed-the things he looks for, how he gets in, and what does when he’s in.
The favourite method of access is a rear window. They are less likely to be observed at the back than at the front, or be caught by someone returning home at the
front door. Furthermore, people tend to neglect security of the back door where frequently front doors can be seen fairly equipped with several high-security locks and
bolts while rear doors have just a simple lock and windows have virtually no protection at all.
Figure 1.1: Burglary modus operandi
There are several security measures that really make a difference in protecting the house:
a Burglars alarm
b Security locks for doors and windows.
c CCTV
d Additional features such as smoke detector, water sprinkler and etc.
1.2 Problem Statement