# Home Security alarm system - Research Paper Example

Summary
We are required to design our logic circuit using BOOELEAN algebra, and we use His theory to design 4 alarm systems, such as; burglar, water, fire and system. Student decided to design our finish design is a super…

## Extract of sample "Home Security alarm system"

Download file to see previous pages We are required to research home alarm systems available in the market, investigate and understand conditions that may results in activating an alarm, develop a smarter home alarm system using digital technology, draw a circuit diagram (preferably using computer software) that will assist in building the circuit, develop a test strategy to demonstrate the operation of your circuit, produce a team written technical report, reflect on process from start to finish in regards to the alarm circuit, in an individual written exercise. For all the requirement we need to use our math, science and problem solving skills to solve the problem. We approach the problem by designing the new simple circuit using BOOELEAN algebra to do all tree such as logic expression, truth table and logic circuit. We build our circuit use our circuit diagram to demonstrate the operation of our circuit to the supervisor. Once the circuit is operated successfully, we decide to compile a report clearly explaining the steps taken to approach this problem, the final design of the circuit of home security alarm system and the diagram we used as part of the process as well as verifying our calculation and finding through the MATLAB programing software.
As part of our investigation, we discuss our plan of action prior to attending a digital electronic work of home alarm system and discuss how our team would proceed with the information and details already available to us.
The aims of the report include the research, analysis, design and construction of the alarm circuit. The other issue is to come up with a detailed description of the system hereby designed. The project aims at discovering possibilities putting in place home security as well as a wide research, observed from already existing designs. Research of alarms in the marketplace which perform different tasks is also analysed. Schematic and block diagrams showing the functionality of the design work ...Download file to see next pagesRead More
Cite this document
• APA
• MLA
• CHICAGO
(“Home Security alarm system Research Paper Example | Topics and Well Written Essays - 750 words”, n.d.)
(Home Security Alarm System Research Paper Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/engineering-and-construction/1693439-home-security-alarm-system.
“Home Security Alarm System Research Paper Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/engineering-and-construction/1693439-home-security-alarm-system.
Click to create a comment or rate a document

## CHECK THESE SAMPLES OF Home Security alarm system

### Home Land Security: Communication Discussion

...? Without a doubt, communication capability is the most single crucial resource of the response team. As soon as disaster occurs, the recovery team must have a head communication center called CommandCentre. CommandCentre, is the head communication center that plans and organizes recovery team. An incident manager is needed to supervise the whole mission as recovery teams are in action. Once the plan is embedded, notifications are sent to teams through asynchronous communication. There are many challenges that become obstacles towards establish vital communication. Disaster recovery consists of methodologies, processes and policies that transpire into a recovery plan in a crisis. Establishing communications during a disaster event...
1 Pages(250 words)Essay

### The Social Security System

...? The Social Security System School The Social Security System History of the Social Security System In the year 1934, the Committee on Economic Security (CES) was created by the President Franklin D. Roosevelt. Roosevelt assigned the CES the responsibility of exploring the feasibility of a system of economic security that would provide the disabled and the elderly people with income. The government and the family members were the caretakers of the people who were not unable to work. Roosevelt felt the requirement of a national system. Therefore, the CES submitted their...
6 Pages(1500 words)Research Paper

### Computer system Network Security

...Network Security Network security is essential component as now-a-days information is computers are connected worldwide. Information is wealth for organisations. The computer systems are linked both internally and externally. The computers receive and send unlimited information2. Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network The issue of computer security first arose in the 1970s as individuals began to break... into...
5 Pages(1250 words)Essay

### Information and System Security

...Information and System Security Information security means protecting information and information systems from un ized access, use, disclosure,disruption, modification, or destruction. The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them. These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information...
2 Pages(500 words)Essay

### Information System Security

...management permits IT managers to leverage on both the cost efficiency of operations and economic costs of protective mechanisms. Ultimately, they contribute concretely to mission capability by ensuring the protection of information, systems and data that are supportive of the firm’s mission. Risk management is not peculiar to information systems only but permeates critical aspects of our day-to-day life. For instance, home security – numerous individuals make the decision of installing home security systems and pay a premium for the tracking of these systems to heighten the sense of protection of their...
56 Pages(14000 words)Essay

### System Security

...___________ Grade _____________ d: 2008-12-21 System Security System security over the last twenty years has gone through a tremendous series of ups and downs where the focus of providing security is to minimize uncertainty by measuring the probability of a threat event. Initially the secure and financial data were not on the internet directly so at that time the most common threat to a computer system or to a land environment was the virus attack. Criminal minded geniuses were designing the virus to destroy a system partially or completely. This provided an edge to the antivirus companies to scan,...
2 Pages(500 words)Essay

### Alarm Systems Paper

...and requirements, different types of alarm systems are used to cater to each organization’s needs. The Queensland Police Service (2007) identified the following types: movement detectors (ultrasonic, microwave infra-red) that react to movement and/or heat and can be placed in strategic locations around your home or business; magnetic reed switches - electro-mechanical devices that are activated when the electronic circuit is broken; and duress or panic assistance in the form of a fixed button, coded pad pin alert, or a portable device connected to an alarm. In fact, Morris (2003) emphasized that “duress alarms are often used by receptionists, cashiers,...
3 Pages(750 words)Essay

### Home land security and terrorism

...is controlled within a state. But this does not make the whole system a fool proof system but it still leaves doubts because of which the government tries to enhance its system. Bush administration bequeathed a border security program to Obama team in which undocumented immigrants were cited as a cause of terrorism. Therefore Secure Border Initiative (SBI) plan was made by Obama administration’s new team. It is a comprehensive plan to control the illegal flow of immigrations. It includes increased staffing to strengthen interior enforcement. A great investment was also made in detecting technology and infrastructure. A vital module of the SBI...
2 Pages(500 words)Essay

### Home Land Security

...also provided by the government in checking various parts of the body of the passengers which included waistbands, groins and inner thighs. Passengers who have been alarmed in the metal detector had to undergo additional screening which involved body search for the detection of any concealed item which could raise sufficient threat. In order to prevent any probe in the security system of the aviation, the government also had passed the law which prohibits passenger to withdraw themselves from the screening process and passengers offering resistance to the screening process were subjected to civil penalties (Bragdon, 2008, p.125). Maritime security: Apart from...
6 Pages(1500 words)Research Paper

### Existing Home Automaton Systems Controlled via the internet

...and cons The system is rugged and weatherproof, providing forecast for one week. Hence, this is ideal for homes that have air-conditioning and heating systems installed that need regular monitoring. The estimated cost is around \$177 for this weather station.(The Best, 2015) Wireless home security alarm kit Picture given below displays the complete wireless Home Security Alarm System, as manufactured by ‘Fortress Security’. This system comes with the required motion sensors meant for detection of passive motion, due to any suspicious...
8 Pages(2000 words)Essay