Home

3 - ijcte

image

Contents

1. moi LERE Booki ks Tool Hel Report Printing File E View istory Bookmar Tools Help lt gt S o O tee s22700sresveamin Cso E As acomplete system reports are necessary to be added in gt Getting Started GY Latest Headlines i the archive asa hard Copy Google wenho chung q G Search F Check Facebook Husam A LE Admin cp Admin cp x Employee Control Panel Data Base Admin Control Panel Users and employee need accounts to access the system for ee monitoring or controlling the VI LabVIEW See Figure 20 iis e Admin cp Windows Internet Explorer aama Jop Type z administration Tasks i http Husam PC test admin_control v R X AY Live Search p w Favorites 3 Suggested Sites v g Web Slice Gallery v Phone i ag Adminep X E WindowsiveHow fv E h v Pager Safety Took y Phone Welcome husam Figure 17 Add New Employee Form Coming amp Leaving Tasks i View Employee Data a This page is for Users Affairs In this window the administrator can view employee s data a mic University of Gaza edit or delete as shown in Figure 18 myquery select from users result odbc_exec link myquery 3 Main Board Sign Out if row odbc _ fetch row result tenet Protected Mode On ot vl do id odbc result result user id Figure 20 Employee Panel 404 International Journal of Computer
2. File Edit View History Bookmarks Tools Help Done oe aD tuto n Pel E Goca z SS GF G hetp s127 0 0 1 test admin B Glz S001 Figure 18 Employees Data Viewer gt Getting Started B Latest Headlines Google wenho chung iG Search CREERSE e Admin cp Mozilla Firefox i Sx td Facebook Husam A Admin c Admin wie e ma Fie Edit View History Bookmarks Tools Help Q D gt S amp GF D paonez Cso E Getting Started Gl Latest Headlines i Google wenho chung x q G Search f E Facebook Husam Admin ep Eg Admin Data Base Admin Control Panel husam abedrabou Logs Details May 22 2009 01 39 57 01 39 59 Apr 10 2009 08 21 27 Apr 10 2009 12 34 33 12 34 39 Apr 09 2009 09 57 08 09 57 12 Apr 09 2009 09 54 32 09 57 12 Apr 09 2009 09 03 37 09 57 12 Data Base Admin Control Panel Security System Figure 16 Employees Logs in Database woe esr cart Phone ors When the system is new or a new user attends the company Username hkm a new account must be made for the new user This new account gives the new user permission to access control or Ih monitoring panel and make an archive of employee data as shown in Figure 17 This page is for Viewing Logs Details Islamic University of Gaza 2009 Main Board Sign Out Figure 19 Employee Data View
3. Paths Front Panel Block Diagram Block Diagram Cleanup Alignment Grid Controls Functions Palettes Source Control Debugging Colors Fonts Printing Revision History Menu Shortcuts Environment Security Shared Variable Engine VI Server Configuration VI Server Machine Access VI Server User Access VI Server Exported VIs Web Server Configuration Web Server Visi Web Server Browser Access MathScript Search Paths Web Services Security y New and Changed for LabVIEW i MathScript Script Highlighting A Web Server Configuration 7 Enable Web Server Reset To Defaults Use Log File C Program Files National Instruments LabVIEW 8 6 resource webserver logs Server Label LabVIEW Server Labels Ports Root Directory C Program Files National Instruments LabVIEW 8 6 www HTTP Port 80 IP Address of Listener Listen on all net addresses Allow Access V Remote Front Panels E Scripting V Web Services V Snapshot V Static Content Timeout sec 60 V Use default gt 0K Cancel Hep Figure 9 LabVIEW Web Server Options Welcome To Administrator Page Username eseeceoe oo Figure 10 Login Window Admin cp Mozilla Firefox Srey ees a File Edit View History Bookmarks Tools Help e GQ G http 127 0 0 1 test admin admin_control_panel php zL IG
4. pass_error 0 No_Error 0 Typing 1 if Typing 1 Lcd Custom Config amp PORTB 7 6 5 4 amp PORTB 2 0 3 Initialize LCD on PORTB Led Custom Cmd Lcd CURSOR OFF cursor Led Custom Out 1 1 text 0 Print text at LCD i Test_pass if perm 1 porta f0 1 delay _ms 2500 porta f0 0 Send_Data j if perm 2 Send_Data Turn off E Remote User Controlling As a complete system users must be connected with the surroundings Also administrators can watch the system anytime and anywhere Employee logs must be recorded to make more security It is decided to make network access to LabVIEW available and to do that must have a server and a site which will tide the relation and distribute the permissions on users LabVIEW Web Server The Web server allows users to view the front panels of applications from a remote machine using a browser 11 Both static and dynamic images of a front panel VI can be viewed remotely Not only will the Web server allow us to view the front panel of an application but we have the ability to control the VI as well We can control the application or front panel remotely using a browser To activate the web server choose options from the tools menu and select web server configuration as seen in Figure 9 42 Options International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 Check Enable Web Server and press OK _Catego
5. FIRST FLOOR FIRE ON ROOM B C FIRST FLOOR FIRE ON ROOM A B C FIRST File Edit View History Bookmarks Tools Help Ed Getting Started RQR Latest Headlines Google wenho chung Facebook Husam A E E O _http 127 0 0 1 test admin b gt G z Soosi E L Admin cp _ Admin cp Data Base Admin Control Panel Security System Code 4 Description edit alert type heref This page is for Editing Sensors Indicator Islamic University of Gaza 2009 Figure 11 Admin Control Panel Administrator Control Panel As an administrator a user name and password must be available to secure the system as shown in Figure 10 The administrator is the only user who has the whole control and access to the system the administrator can add users and employees edit their data and accounts Also he can see all the actions in the data base and deal with it Sensors descriptions are included to be edited and managed as the system required For employees security of arriving the system provides logs record to check the status of the employees Figure 11 Main Board Sign Out Figure 14 Edit Sensor Description Security Logs Security log allows administrator to see the movements of the employee in the company arriving time and leaving time The next PHP code is to display employees names from database as shown in Figure 15 Admin cp Mozilla Fir
6. coogte gt Getting Started GQ Latest Headlines Google wenho chung x C Search F Check AutoLink AutoFill B Subscribe fa Options amp wenho chung Facebook Husam Abedrabou Admin cp Admin cp een z This page is for controlling Database and deal with Actions and Sensors Descriptions Data Base Admin Control Panel Security System View Actions Security Logs Query View Employee Data Sensors labels Add New User Print a Report Islamic University of Gaza 2009 Main Board Sign Out View Actions Administrator or users with permission to access this page can read all actions happened in the system when the system is in work mode Figure 12 Sensors Labels To make alerts appears with the right indication of the sensors the system must be flexible to the changes of sensors places in the system See Figure 13 and Figure 14 Admin cp Mozilla Firefox S 2 So File Edit View History Bookmarks Tools Help E gt E Gh O http 127 0 0 test admin B G 7 Googe E gt Getting Started Latest Headlines Google wenho chung Facebook Husam A B 4 IG Search amp Vv Check _ Admin cp _ Admin cp Data Base Admin Control Panel RegionA VIEW Indication SAFE MODE FIRE ON ROOM A FIRST FLOOR FIRE ON ROOM B FIRST FLOOR FIRE ON ROOM A B FIRST FLOOR FIRE ON ROOM C FIRST FLOOR FIRE ON ROOM A C
7. 1999 He has 15 years of teaching experience and has published many papers in national and international journals His fields of interest include Control Systems Fuzzy Control Simulation amp Modeling FPGA Signal and Image Processing
8. Theory and Engineering Vol 3 No 3 June 2011 Coming amp Leaving The window shown in Figure 21 is designed to record logs and be in touch with administrator in the same time E 7 User CP Windows Internet Explorer S a X BF Live Search S o i aa Eee si Favorites 53 Suggested Sites Web Slice Gallery v E x I fy mh v Pager Safetyy Toos v j og Eusec x Arne a oo Windows Live Ho a Employee Panel Welcome husam pos Lesng Date Coming Time LeavingTime May 22 2009 01 56 54 May 22 2009 01 39 57 01 39 59 Apr 10 2009 08 21 27 Apr 10 2009 12 34 33 12 34 39 i Apr 09 2009 09 57 08 09 57 12 Apr 09 2009 09 54 32 09 57 12 Apr 09 2009 09 03 37 09 57 12 Internet Protected Mode On fv 110 v Figure 21 Employee Logs Recorder Monitoring amp Controlling Every user will have an account in his name and special permissions of monitoring or controlling over network is granted as shown in Figure 22 Admin cp Windows Internet Explorer b bala eS http Husam_PC test tasks php gt 3 gt x By Live Search P gly Favorites yg Suggested Sites Web Slice Gallery v 7 F ai B m v Pagew Safetyy Toolsv e eg Admincp X amp Windows Live Hotmail Employee Panel Welcome husam MAIN REGION A lll REGION B m REGION C C REGION D Wam REGION E mm REGION SM Security S
9. and gives a reading Compare If the result of comparing was not equal zero then the PIC will record the reading of the sensors in a register ReadInputs Test Mode If the PIC received a signal of testing mode from LabVIEW it will energize all the sensors to make indicates to PIC then transmit the generated code to the main PIC if portc f2 1 sensgroup 000 0b11111111 sensgroup2 000 0b11111111 j This code is testing any changing in the input status The next code is needed to determine the indication is in digital or analog sensors also it is responsible of transmission protocol if Test_ DataPin 1 Send_Data j if Test _ DataPin Analog D4 Analog 1 Send_Data Analog 0 j if Test_DataPin Security 1 Analog 2 Send Data Analog 0 D Keypad Keypad device works via login system which connected with the main board Users data will be transmitted to 402 LabVIEW to be recorded as an action First initialize input output ports and pins and then initialize the LCD monitor This will go into loops waiting for input and when the user enters his own password it will make some processes and print out password correct or password wrong on LCD and sends a signal to make suitable reaction a code will be transmitted to LabVIEW to record the action void main TRISd 0b00000010 trisc 0b01 111000 trisa 0b00010000 portd 0 while 1 perm 0 pass 0 user 0
10. door 114 is open 34 16 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 115 is open 17 of 4M a T TTT gt bbs eat Figure 31 Sensors Description Table in Database DOI00I0000000001 Figure 32 Alert Query V CONCLUSION The goal of this paper is to build a complete surveillance security system which can protect any facility from any danger also the system can be accessed through the internet To accomplish our goal we have invented a way to transmit data between two Medias and to use database and SQL with LabVIEW Finally the test of controlling VI remotely is successfully performed It provides us a high reference value for the VI networked inspection Since the System uses the programming technique which makes the interfaces independent and ensures the system s good transplant ability stability reliability and efficiency Our experiment shows that the system works well in both local and remote inspection LabVIEW has a TCP IP application with Remote Panels So as to communicate over internet connection In this way a local PC with LabVIEW installed can communicate over internet connection to a remote PC with LabVIEW running The host PC can request and gain control of the LabVIEW program on the remote PC REFERENCES 1 Huadong Li Yufang Zhong Mingguang Wu R
11. server to a client application or Web page manipulate the data on the client and return updates to the server in a single round trip Previously released as Microsoft Remote Data Service 1 5 RDS has been combined with the ADO programming model to simplify client side data remote IV DESIGN This section will explain the design procedure and how the surveillance security system works In general sensors will detect the actions and indicate the secondary PIC A code will transmit to the primary PIC which will connect the LabVIEW designed program and then the computer will save the actions in the database and take a reaction as shown in Figure 4 and Figure 5 Figure 4 System Hardware The primary PIC will receive a code consist of two packages every package contains 9 bits the first bit is 1 that means starting transmitting the other 8 bits are for sensors status The transmitted code has the form of 100000000100000000 which will be generate from the 400 secondary PIC The primary PIC will process the code and follow it with another 3 bits containing the sensor type indication or the location of the action Then the primary PIC will transmit the code for the LabVIEW using parallel port This code must be saved in the database to be dealt with a comparison is made to know the action type and the place where it occurs All of these actions will be stored in a database and user will be able to see these actio
12. 009 Main Board Sign Out Figure 15 Employees Names in Database 403 International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 Name odbc _result result Name lt query select from users result odbc_exec link query Gime toni eee FR SL e e gt if row odbc_ fetch row result eat heen ia petra eae 4 do 1 A L hittp 127 00 1 test admin employee php lx 7 Google 4j id odbc_result result user_id sel net Alla Name odbc result result Name 9 gt Google wenho chung Ir C Search ME Check 7 AutoLink E AutoFill B Subscribe v fed Options amp f wenho _ i a E Facebook Husam Abedrabou L Admin cp D Maiacp g The next PHP code is to display employees logs from Data Base Admin Control Pane T database as shown in Figure 16 Employee Data myqueryl select from come where D Emphyeelame Qualifier scentfic op Type Jop_descrpton Moble Details Update Delete user_id like id 1 husam abedrabou riod jera Administrator 0598899456 Details Update Delete result odbc_exec link myquery1 5 Halim Jurca ng SIO Operator OTSA Update Delete if row odbc_ fetch row result do date odbc_result result1 dat time1 odbc_result result1 tim1 This page is for Viewing Actions from Database Islamic University of Gaza 2009 Main Board Sign Out Admin cp Mozilla Firefox
13. In test mode a Boolean 1 must get out to the main PIC to inter the system in testing mode also it will disable Record Actions stage to separate true actions and virtual actions The Out Port 378h can be used to provide the system with a DC 5 V as seen in Figure 8 401 Figure 8 Test Mode Enable The Main Board The main function of the PIC 16f877a is to manage a connection between sensors and the VI LabVIEW It is responsible of receiving data from the secondary PIC and distributes it on branches codes after that it will send data to LabVIEW A transmission protocol must considering synchronization response and number of bits to be sent B The Main Board The main function of the PIC 16f877a is to manage a connection between sensors and LabVIEW It is responsible of receiving data from the secondary PIC and distributes it on branches codes after that it will send data to LabVIEW A transmission protocol must considering synchronization response and number of bits to be sent Input output Units To use the most pins of the PIC 16F877A the number of sensors which are needed for surveillance security system must be known We can add 8 regions and there components so initialization the inputs and the outputs ports must be done void main TRISb 0b01010101 portb 0x00 TRISd 0b01010101 portd 0x00 TRISc 0b00000010 portc 0x00 Delay Delay is used to make a period between executing transmissio
14. International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 Real Time Application Surveillance Security System Based on LabVIEW Basil Hamed Abstract Nowadays_ surveillance security system is very important for companies and factories No facility can operate without a surveillance security system Remote real time surveillance systems are built in a network which improves the power of application The main purpose of this paper is to know the exact location and type of problem that may occur in the facility by monitoring the system using computers This system can be relayed on to do the suitable reaction automatically when the facility is in real danger and as an advanced option the supervisor can monitor and connect to the system at any time or place using the internet This system consists of hardware and software tools and the main tools are PIC 16F877 LabVIEW Parallel Port and different type of sensors In this paper we developed a Real time Online Inspection System to control VI remotely using LabVIEW Index Terms Control LabVIEW surveillance security and PICI6F877A I INTRODUCTION The protection of people and valuable assets against loss is one of the primary concerns for both private and public sector businesses If we currently have or intend to install security fire protection detection or evacuation systems to protect people and assets we must select a perfect system which prevents dest
15. OOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 101 is open 50 auxiliary water 4 3 FIRE ON ROOM A B FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 102 is open 100 auxiliary water 5 4 FIRE ON ROOM C FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 103 is open 0 fuel 6 5 FIRE ON ROOM A C FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 104 is open 50 fuel 7 6 FIRE ON ROOM B C FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 105 is open 100 fuel 8 7 E ON ROOM A B C FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 106 is open poor batarypower 9 8 moderator 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door107is open good batary power 10 9 FIRE ON ROOM D A FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 108 is open 100 patary power 11 10 FIRE ON ROOM D B FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 109 is open 12 11 E ON ROOM D B A FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 110 is open 13 12 FIRE ON ROOM D C FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 111 is open 14 13 E ON ROOM D C A FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 112 is open 15 14 E ON ROOM D C B FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door 113 is open 16 15 IN ROOM D C B A FIRST FLOOR 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR
16. am Auxiliaries Alert ALERT 42h FLOORSth FLOOR4th FLOOR4tn FLOOR4th FLOORAth FLOOREtE Test Mode RECEIVING s DATA WRITE Date Chang Alert Query Get From DB Write From 3 _ PEE Fate code tate cade etah ende tte enda it Internet Protected Mode On fg Ruo Figure 22 Monitoring amp Control Over Network AHA PictureBox Height A m PictureBox Handle Figure 24 USB Web Camera Viewer 405 stop 00000000000o0o0o0ooo000ooooooooooo Figure 25 Video Sampling and Capturing Video Monitoring For video monitoring a web camera have been used with ActiveX object The simple VI program to run USB Camera is explained in Figure 23 Figure 24 and Figure 25 o o if ore Figure 27 Secondary Board Circuit Diagram Circuits Diagrams A circuit diagram is a simplified conventional pictorial representation of an electrical circuit It shows the components of the circuit as simplified standard symbols and the power and signal connections between the devices Arrangement of the components interconnections on the diagram does not correspond to their physical locations in the finished device Main and Secondary Board Circuit Diagram Figure 26 provide a simulation program to test how the surveillance security system works in a virtual computer Proteus 7 program has been used for this test Keypad Circuit Dia
17. efox File Edit View History Bookmarks Tools Help e gt h O http 127 0 04 test admin B gt G 7 Google File Edit View History Bookmarks Tools Help gt Google wenho chung E Facebook Husam Abedrabou 2462 error 2461 SAFE MODE 2460 room A amp C in region H 2459 SAFE MODE 2458 room B in region C 2457 room B in region C 2456 rooms B amp C 8 33 16 PM 4 16 2009 2455 rooms B amp C 8 33 14PM 4 16 2009 E 2454 rooms B amp C 8 33 11PM 4 16 2009 2453 rooms B amp C 8 33 08 PM 4 16 2009 2452 room B 8 33 05 PM 4 16 2009 2451 room A 8 33 02 PM 4 16 2009 CAA ntp 127003 testadmin View Actions php Getting Started E Latest Headlines Cose E z 4 G Search amp F Check SK AutoLink E AutoFill fi Subscribe fed Options g wenho Q chung Admin cp D Admin cp B Data Base Admin Control Panel Security System l 9 11 27 PM_ 4 16 2009 9 10 16 PM 4 16 2009 9 03 54PM 4 16 2009 8 33 33PM_ 4 16 2009 8 33 25PM 4 16 2009 8 33 23PM_ 4 16 2009 Done Figure 12 View Actions in Database gt Getting Started B Latest Headlines Google wenho chung G Search amp a Check gt Facebook Husam A Admin cp _ Admin cp Data Base Admin Control Panel Security Logs nn lhusam abedrabou m ee i aiii Hakim Y Jaru This page is for Viewing Employee Loges Islamic University of Gaza 2
18. esearch on network of remote real time surveillance system based on LabVIEW 7th 407 IEEE International Conference on Industrial Informatics 23 26 June 2009 Page 60 65 2 PIC Microcontrollers Ist EDITION 2008 Milan Verle mikroElektronika 3 PIC16F87A Data Sheet 2001 Microchip Technology Inc 4 LabVIEW Advanced Programming Techniques SECOND EDITION R Better T Mohiuddin and M Mawrocki 5 LabVIEW User Manual April 2003 Edition National Instruments 6 Proteus Professional PCB Design and Simulation www labcenter co uk 7 Introduction to Microsoft FrontPage 2007 Teaching Learning and Technology Center Texas Tech University 8 Microsoft Open Database http support microsoft com kb 1 10093 9 Introduction to Microsoft Office Access 2003 the George Washington University Washington DC 20037 Standard Language for accessing and manipulating databases SQL http www w3schools com SQL sql_intro asp Internet Applications in http www jeffreytravis com books ialv html 2006 Connectivity ODBC 10 11 LabVIEW Dr Basil Hamed is Assistant Professor of Electrical Engineering Department Islamic University of Gaza Palestine since 1999 He has Bachelor Degree in Electrical Engineering from New Mexico State University NM USA in the year of 1989 he recetved Master degree from University of New Orleans La USA in the year of 1992 and earned his PhD from New Mexico State University NM USA in the year
19. f functions controls the front panel objects 4 Front panel The front panel is the user interface of the VI You build the front panel with controls and indicators which are the interactive input and output terminals of the VI respectively Controls are knobs push buttons dials and other input devices Indicators are graphs LEDs and other displays Controls simulate instrument input devices and supply data to the block diagram of the VI Indicators simulate instrument output devices and display data the block diagram acquires or generates 5 Block diagram After building the front panel add code using graphical representations of functions to control the front panel objects The block diagram contains this graphical source code Front panel objects appear as terminals on the block diagram It cannot delete a terminal from the block diagram Every control or indicator on the front panel has a corresponding terminal on the block diagram Additionally the block diagram contains functions and structures from built in LabVIEW VI libraries B MikroC MikroC is a powerful feature rich development tool for PIC micros It is designed to provide the programmer with the easiest possible solution for developing applications for embedded systems without compromising performance or control 2 C Proteus 7 Professional Proteus 7 is an interactive system level simulator Which combines mixed mode circuit simulation micro processor m
20. gram Figure 27 shows Proteus 7 a simulation program to test how the keypad is working on the program International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 a Format Into String b gt UPDATE signal SET code WHERE id f Concatenate Strings EF In Ports v Return Data T ConnectionString 2 Create hn Open A SAL i Close Beetroy Write From 53 onn Conn Execute Conn Conn Pez L ni D Wy t J J DOacogooceataotoooaoaoaoo TREE EEE SEEM PO HHH Figure 29 Read from Signal Table in Database INSERT INTO ACTIONS CODE LERLE VIEL ve if x aj 0 p i i y gt 327679 me E JOSN myD8 Ci Boolean f aD ro Fs Create Open oe B i Conn Conn Execuke SELECT CODE FROM ACTIONS ORDER BY COD_ID DESC DATA WRITE Create ma Open SQL ic ar ca Se La Figure 30 Record Actions 406 International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 I SEN_DESC Jj ammo D coDE ESCO Desci Descz Desc3 Desc Descs Desce DESC D SAFE MODE SAFE MODE SAFEMODE SAFEMODE SAFE MODE SAFE MODE SAFE MODE No Change 2 i FIRE ON ROOM A FIRST FLOOR A 2nd FLOOR 3rd FLOOR 4th FLOOR 5th FLOOR 6th FLOOR door100is open 0 auxiliary water 3 2 FIRE ON ROOM B FIRST FL
21. l table and then will masking it to omit unwanted bits the statement of SELECT code FROM signal ORDER BY id in the execute ADO is responsible of importing code data from database The code is 26 bit separated to three packages the first and second packages are data information and it needs the first bit of these packages only to transmit the code so it should get rid of them The first three bits of the third package the branch code is needed so we should get rid of the other five bits The result will be arranged in 16 bit represents the sensors status in cluster form and 3 bits of the region in an array form Record Actions In this block we will compare the new and the last action to avoid repetition in action records If there is no repetition in codes or test mode is off a new record will be inserted Otherwise it will not insert any records The SQL ADO will query about the last CODE recorded in the ACTIONS Table using this statement SELECT CODE FROM ACTIONS ORDER BY COD ID DESC and the result will be compared with the received code from signal Table When a new action happened the SQL ADO will insert a new record in the ACTIONS Table Time and date of the action are important for actions query so we have to add time and date in the ACTIONS Table the SQL statement which execute recording is INSERT INTO ACTIONS CODE ALERT 1 D_ATE T IME VALUES action code alert description date time Also it needs the alert no
22. n and receiving data from ports this delay makes stability in processing the coming and leaving codes delay _ms 3000 Received Data Tests The system must be stand by waiting for any changing in the received data a while loop is used to supervised a changing in received data while 1 Data received from one of the ports region is checked by if portb f0 1 After recognizing the region a code of the region is added Pic Num 1 The next code can indicate data changes Test_ DataPin f0 1 If change occurs the PIC must be ready to be received Recive Data 10 Recive Data 2 Data must be transmitted to LabVIEW send _ data This code will be repeated 8 times to cover all regions International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 C The Secondary PIC Different sensors types are used to indicate actions digital analog or a keypad Digital Analog Sensors For digital sensors a 16 pins are initialized as inputs and 8 pins for analog sensors void main TRISb 0611111111 TRISd 0611111111 ADCONI1 0x80 TRISA OxFF TRISE 0600000010 porte 0 TRISc 0601010110 portc 0x00 A delay is needed to save electricity stability delay _ms 5000 The system must be stand by waiting for any change in the sensor status a while loop is used to supervise the change in the sensor status while 1 In the next code the new status of the sensor is compared with the last status
23. ns and control the system from the network Now discussion of these procedures is presented Any indication on any sensor will make interrupt to a secondary PIC which will transmit bit to the main PIC to start receiving the coming message A master slave protocol is used which will generate a 16 pulse to control received bits from secondary PIC When the main PIC receives any data package it will send them to LabVIEW with the code of the branch where the interrupt occur in the same way of master slave method The packages will be processed in LabVIEW to indicate the exact action which happened in the system Figure 5 Connection Diagram A LabVIEW Record Coming Signal In Port vi 379h is responsible of receiving codes from parallel port data is transmitted from primary PIC on the S3 pin by parallel port If any 1 bit is received the LabVIEW will transmit a 25 pulses which are transmission protocol The received code will be updated in the signal table of the database See Figure 6 and Figure 28 the SQL ADO execution statement which execute the database exportation is UPDATE signal SET code 0 WHERE id row no Where signal is the table name and code is the column name QONGMAWA 4 Figure 6 Signal Table in Database Read Code from Signal In this block Figure 29 LabVIEW will read the stored International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 bits from the signa
24. odels and interactive component models to allow the simulation of complete micro controller based designs 6 International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 D MS FrontPage FrontPage 2003 provides the features flexibility and functionality to help build better Web sites 7 Take advantage of professional design authoring data publishing tools and everything that needed to create a dynamic sophisticated Web presence E ODBC Open Database Connectivity ODBC is a technology programs use to access a wide range of databases or data sources 8 In our system data need to export from LabVIEW into an Access database To do this the correct ODBC driver and data source needed F MS Access Microsoft Access is a powerful program to create and manage databases 9 It has many built in features to assist in constructing and viewing data Access is much more involved and is a more genuine database application than other programs such as Microsoft Works G LabSQL ADO functions Microsoft ActiveX Data Objects ADO enables the user to write an application to access and manipulate data in a database server through an OLE DB provider Its primary benefits are ease of use high speed low memory overhead and a small disk footprint ADO supports key features for building client server and Web based applications 10 ADO also features Remote Data Service RDS by which we can move data from a
25. r reset so they have to set up for digital I O if required Port B is used for downloading the program to the chip flash ROM RB6 and RB7 and RBO and RB4 RB7 can generate an interrupt Port C gives access to timers and serial ports while Port D can be used as a slave port with Port E providing the control pins for this function 3 B Parallel Port Traditionally IBM PC systems have allocated their first International Journal of Computer Theory and Engineering Vol 3 No 3 June 2011 two parallel ports according to the configuration as shown in Table 1 TABLE 1 PARALLEL PORT RESOURCES Data Port LPT1 0378h 0379h 037ah LPT2 0278h 0279h 027ah The registers that are located at the addresses in Table 1 are listed in table 2 TABLE 2 PARALLEL PORT REGISTERS S Type 0 Data l Status Base LPT Control Register W 2 Control Notice that the registers shown in the table 2 are all of different types Since data can flow both ways on the parallel port the LPT Data Register is both R W The LPT Status Register says whether or not voltages have been applied to the status pins C LCDs Liquid crystal display or LCD is a very commonly used device in electronics projects to display data and interact with users To use LCD effectively in microcontrollers some initial experiments can performed by connecting up a series of switches to the pins of the module as presented in Figure 2 2 Line x 16 Charac
26. ruction of life property and institutions For a complete system monitoring is needed to see actions online since the alert is on LAN access is available for users records and actions archive will be necessary for proceeding and controlling cameras will be useful in the system For more safety an automatic reaction must be done if there was any high level alert Remote real time surveillance systems are built in a network which improves the power of application 1 The system contains three major parts the main board sections the secondary board section and the monitoring and data storing section We used in the secondary and the main section board PIC 16f877 but form monitoring and storing we have used LabVIEW and Parallel Port used to connect the main PIC and LabVIEW The surveillance security system will use different type of sensors such as fire detectors motion and security sensors These sensors are connected to a PICI6F877 for processing Manuscript received October 8 2010 revised January 4 2011 Basil Hamed is with Islamic University of Gaza Palestine email bahamed hotmail com 398 by transforming signal into codes and transmit it to a main board This signal will be responsible of taking automatic reaction and transmitting codes to the monitoring program The monitoring program will be responsible of receiving codes and converting the codes to actions and indicators to be fixable with user interface also it
27. ter LCD Display OO o0 fd of fe Oo ho RS GHD Wo Woo Figure 2 Circuit diagram for LCD Connections D Matrix Keypad Keypad is a commonly used device to get the user input Although simple push switches can be used to get user input as has been done for this system this would require I O line per switch T f g Column Column Column o 1 2 COLUMNS Figure 3 Keypad rows and columns 399 The keypads Shown in Figure 3 has three columns and 4 rows UI SOFTWARE The software s used in the surveillance security system are LabVIEW MikroC Proteus 7 Professional LabSQL ADO and MS FrontPage A LabVIEW LabVIEW is a software and registered trademark of National Instruments It is a popular visual programming environment for data acquisition analysis and control A visual programming interface allows the user to create programs by connecting objects with various functions in a flow diagram such as DAQ VIs buttons and graphs LabVIEW is a graphical programming language that uses icons instead of lines of text to create applications In contrast to text based programming languages where instructions determine program execution LabVIEW uses dataflow programming where data determine execution In LabVIEW the user builds a user interface by using a set of tools and objects The user interface is known as the front panel The code contains in the block diagram is a graphical representation o
28. tification to be clear so it can be known where the action happened See Figure 7 and Figure 30 I ACTIONS Jp cco lf cono cope Alert DATE TME E 2451 1 roomA 4 16 2009 8 33 02 PM m 2452 2 roomB 4 16 2009 8 33 05 PM E 2453 6 rooms B amp C 4 16 2009 8 33 08 PM E 2454 6 rooms B amp C 4 16 2009 8 33 11 PM i 2455 6 rooms B amp C 4 16 2009 8 33 14 PM E 2456 6 rooms B amp C 4 16 2009 8 33 16 PM ie 2457 2182 room B in region C 4 16 2009 8 33 23 PM m 2458 2182 room B in region C 4 16 2009 8 33 25 PM a 2459 0 SAFE MODE 4 16 2009 8 33 33 PM ie 2460 65539 room amp C in region H 4 16 2009 9 03 54 PM 2461 0 SAFE MODE 4 16 2009 9 10 16 PM E 2462 262143 error 4 16 2009 9 11 27 PM EFT 0 12 gold 14 4 11 PJP yesi Figure 7 ACTIONS Table in Database Alert Query The block in Figure 32 is responsible of finding the exact alert type with the same code received we have made a table which contains all available alert descriptions in Figure 31 when any action occurs it will use the query function to find its description then display it on the alert window The SQL ADO query statement is SELECT DESC branch No FROM SEN DESC If any two actions or more happened in the same time the alert must contains the description of all actions So we have query about all sensors descriptions and enable the exact description Test Mode Test mode is an important process to test the system 1f it is working properly
29. will preview a video signal of monitoring cameras Network monitoring and controlling will access more flexibility on the system web browsing and employees database is added to give more securing to monitoring and to prevent breaking into the facility Il HARDWARE COMPONENTS The hardware components used in the surveillance security system are PIC16F877 Microcontrollers Parallel Port LCDs Keypad and Sensors A PICI6F877A as shown in Figure 1 it has a set of serial ports built in which are used to transfer data to and from other devices as well as analogue inputs which allow measurement of inputs such as temperature PIC16F877A 1s used widely as a more advanced teaching device because it has a full complement of interfaces analogue input serial ports slave port and so on plus a good range of hardware timers 2 Figure 1 PIC16F877A PIC16F877 has a total of 40 pins The chip can be obtained in different packages such as conventional 40 pin DIP Dual In Line Package square surface mount or socket format Most of the pins are for input and output and arranged as 5 ports A 5 B 8 C 8 D 8 and E 3 giving a total of 32 I O pins These can all operate as simple digital I O pins but most have more than one function and the mode of operation of each is selected by initializing various control registers within the chip Note in particular that Port A and port E become analogue inputs by default on power up o

Download Pdf Manuals

image

Related Search

Related Contents

Porta Generator  "取扱説明書"      Eaton PXGMSUPS  Wireless LAN USB Dongle  A20-OLINUXINO-LIME and A20-OLINUXINO-LIME-4GB  Komplettes Magazin als E-Paper    Mode d`emploi ADOC  

Copyright © All rights reserved.
Failed to retrieve file