Friday, April 5, 2019

Sms Based Home Appliance Control Information Technology Essay

Sms Based Home Appliance Control Information engineering science EssaySecurity for homes and offices is an im lar bill of f beant aspect in the modern humanity engineers atomic number 18 continuously prove uncomparable certificate governing bodys that take utility of todays technology. GSM base zone shelter dodging is one of those unique systems that provides security. This system basically p milds by sending a SMS to a predetermined mobile unit within a GSM net maneuver when the security is breached. It bum excessively be logged with a pc or laptop in tack together to monitor the status of the security.In todays creative activity various types of security systems atomic number 18 creation utilise in homes, offices, cars and so forth All of these systems particularly the ones utilize at homes primarily consist of a motion demodulator, a siren that triggers when it receives a signal from the motion detector, a battery, a jibe invention and an electronic card . If there is a breach in security the motion detector sends a signal to the electronic card which in turn triggers the siren to provide the prototype. This is a disadvantage as these type of warnings can only be heard if there are people afford close to the source of the siren and even though some of the security systems provide a warning call to a pre-determined telephony (police/security company) using the fixed land limn, thieves usually disrupt the phone lines leading to the failure of such security systems.Therefore it is important to remove the afore-mentioned shortcoming and provide a security system that is efficient, affordable and characterr friendly which can be achieved by taking advantage of the present technological infrastructure and hardware.Project Aim and ObjectivesThe principal(prenominal) aim of this stray is to material body and bristle an efficient GSM base zone security system which takes advantage of the existing GSM infrastructure and hardware com ponents that can be utilise at homes and offices.The jump out leave focus on the following specific objectives-To develop and enhance a security system that sends the user a SMS when the security is breached.To test the GSM ground security system on a simulator.To build a security system that can be logged through a PC or laptop in order to monitor the status of the security.To put out front a security system that result make it difficult to be breached by burglars.To tell the benefits of the GSM based geographical zone security system compared to the other normal security system.1.32.0 LITERATURE REVIEW2.1Conceptual Literatureharmonize to Phillips (2006) security systems provide important protection against burglary and robbery. They are creation relied more and more in the world to prevent theft especially with the current high crime rate. Norman (2007) stated that there are several types of security systems but the one that users today prefer to install at homes and busin esses are receiving come out systems as they do not have the hassle of installing a lot of wires. They are too considered to be one of the easiest of all security alarm systems to operate.Norman (2007) highlighted that the piano tuner security systems use receiving set waves to send signals from the sensors to the carry panel in order to monitor the activity within the property. The latest wireless security systems as well as have the ability to send data to outside sources wirelessly by using GSM. fit in to Fares (2003) GSM which stands for Global systems for mobile communications is basically a cellular ne cardinalrk in which mobile phones tie in to it by searching cell in the immediate vicinity. In todays world GSM has choke one of the almost essential items to us as it provides us with a communication channel that enables us to communicate with the world freely. With GSM came the implementation of SMS or text messaging as stated by Poole (2006).Gast (2005) stated tha t the security systems that work with GSM infrastructure using GSM modem are known as GSM security system. In this system when there is an feature of security breach the user is sent a SMS notifying him/her of the security breach. It is a reliable security system but recently Nohl (2009) stated that there are fears that the GSM itself can be breached by cracking the algorithmic program that is responsible for the protection of the security of the GSM. This has been denied by the GSM association that represents the interests of the worldwide mobile communications industry. They have affirm that the GSM cannot be breached and that it is not currently possible to crack the algorithm protecting the GSM.According to Norman (2007) GSM security system consists of many other main components such as electromagnetic sensors, scene microcontrollers, keypad etc. These components make together with the GSM modem make a very effective and reliable security system.2.2 Related Projects2.2.1 SMS based Home Appliance Control.This project which was done by Anand kumar 2007 is a GSM based project in which SMS is utilise to control home appliances. This is done by sending the instruction through SMS which would be received by the microcontroller which then decodes the instruction and after that executes the instruction by switching on the relays attached to its port to control the appliances. In this project 8051 microcontroller was apply and for software Keil u-Vision 3.0 and PRO51 programmer software was used.2.2.2 GSM based Voting MachineThis project was done by John Seymour (2009). It is a GSM based project in which registered suffragers can send their vote through SMS. This achieved by starting signal registering the mobile number of the voter and during that registration they are given a password. So when the user is sending a SMS vote the microcontroller leave read the instruction and will first run a check whether it is a registered voter or not, if it is a register ed voter then it will ask for the password and verify it. If the password is correct it will accept the vote and send subscribe an SMS acknowledgement to the voter. The microcontroller used is an 89S52 microcontroller.2.2.3 GSM based Remote Energy Monitoring MeterThis project is a GSM based project which was done by Hussain Said (2009). This project uses GSM infrastructure to do remote monitor and control of the energy meter located at domestic houses. This project is very useful to the Electricity surgical incision as it would enable them to read the meter readings regularly without the call for of personnel visiting each house. It basically works by using a microcontroller unit that always monitors and records the meter readings in its memory location. hence these reading are sent to optimum location set by the Electricity Department. In this project 8051 microcontroller was used and for software Kiel u-Vision 3.0 and PRO51 programmer software was used3. MATERIALS AND METHODS3.1 Technical ProposalThis project is a crew of hardware and software development. The circuit is first designed and then optimum components are selected and used for the saying of the circuit. A program is developed for the picture show microcontroller. This is done by first report the program in C programming and then compiling it in MikroC. Several tests are done to make undisputable that they are all working successfully. After that the hardware development and the software development are combined. thence optical Basic program is written for interfacing. Then an overall test is done to see if the integral project is working successfully.Block Diagram of the Methodology used in this Project.StartProject program lap covering DesignDevelop Program for PICTest program on PIC Simulator cause CircuitTroubleshootDevelop VB for InterfacingCombination of Hardware and SoftwareFinal TestingTroubleshootingEND3.2 Equipment/ Facilities/ ProgramsHardwarebread board is used before a protot ype is built. It is used for troubleshooting and testing.PCB The circuit is finally built on the Printed Circuit Board (PCB).Multimeter was used for measuring voltage, current etc and also for fault finding.GSM modemSoftwareEAGLE (Easily Applicable vivid Layout Editor) software For Printed Circuit Board planMikroC PIC Simulator Software To test the program for the PIC microcontrollerVisual Basic3.3 Technical Description3.3.1 PIC MicrocontrollerPIC microcontroller stands for Peripheral Interface Controller according to Wilmshurt (2006). The PIC is a common microcontroller because of several advantages such asPower consumptionPICs have much humble king consumption at 5V.ClockIt has more accurate calibrated oscillators which help it have specific timing thus making the design more stable and efficient.AvailabilityIt is widely available.ProgrammingThe PIC microcontroller can be easily reprogrammed.Pin directionMost of the PIC microcontroller autumns are flexible as they can be se t as an input or and output thus making the design of the circuit easier.3.3.2 Electromagnetic sensorsCUsersKHALEDPicturesPhoto0289.jpg foresee 2.17 Electromagnetic sensor The magnetic sensor on the go forth and the magnet on the rightElectromagnetic sensors are usually used on doors and in a security system they are an integral part as stated by Norman (2007). They work by sensing the movement of the doors and windows magnetically. The magnetic sensors are small in size and consist of 1 magnet and 1 magnetic sensor. Phillips (2006) stated that the magnet is placed so that the magnet and magnetic sensor are in a position to be parallel to each other. So that when the signal that is between them is interrupted the magnetic the switch is tripped and immediately it sounds the alarm.3.3.3 KeypadFigure 2.14 4-4 matrix keypad modulesA matrix keypad is used to provide a simple data entry device for microcontroller systems. Their design is that the keys are connected in actors lines and c olumns, so that when a button is pressed a row and a column are connected. In order to read the keypad, each row is set low in turn and the state of the inputs is tested. If no button is pressed, all the inputs remain high. During the operation the rows and the columns of the keypad will be scan continuously by the microcontroller. When a key is being operated, a low on that row is detected on the column input for that key, which allows a corresponding code to be generated.3.3.4 RS 232RS 232 is an galvanizing signaling specification which is also known as signal port is used as the entry for data transmissions 232 comes in 9 declivitys which have its own specific twilight assignments. There are two types of RS 232 which is male (DB9M) and female (DB9F).Figure 2.11 The serial port overviewTable 2.12 The definition of each serial port evenfallsIn this project only three entraps are used. Pin 2 and PIN 3 is used to receive and transmit signal with the circuit. So Pin 5 will be u ses as ground.3.3.5 GSM modemA GSM modem is a wireless modem that works within a GSM wireless network according to Fares (2003) and he also states that the behavior of dial up modem is the same as a wireless modem. The only difference is that a dial up modem uses a fixed telephone line to transmit and receive data slice a wireless modem transmits and receives data through radio waves. A GSM modem needs a SIM card in order to operate.The GSM modem available in 2 typesExternal wireless modemIt is connected to the computer or a laptop a serial cable or USB cable.PC card/PCMCIA cardIts designed for laptops as it is slotted in a particular card slot built in the laptop.Figure 2.19 shown the main blocks and communication principle of a wireless system using the SIEMEINS C35i GSM modem.Figure 2.19 Main blocks in communication modem and the microcontroller.3.3.6 AT commandAn AT command is simply a set of instructions used to control a modem it the short form for Attention. Each command lin e starts with AT or at. A common set of standard AT commands are supported by GSM and dial up modems but the GSM modems support a more extended set of AT commands.In order to send, read, write and delete SMS message. We can use For example AT+CMGS (send command), AT+CMGR (read command), AT+CMGW (write command) and AT+CMGD (delete command) .Using the above mentioned commands the modem can do -Reading, writing and deleting SMS message.Sending SMS messageMonitoring the signal strength3.3.7 SMSSMS which is a short form for Short subject Service is used to receiving and sending message in between the mobile phone.Fares (2003) stated that since the development of SMS it has become a very successful wireless carrier becauseSMS message can be sent and take in at any time.SMS message are supported 100% GSM mobile phones and they can be exchange between different wireless carriers.SMS is a suitable technology for wireless application.The application of SMS is virtually unmeasurable today a s they are always being associated with embedded system to increase its utilization.Examples of SMS application are-Person-person text messageDelivery and notification messageUsed in remote system monitoring application.3.3.8 MikroC SoftwareMikroC is a software programming program which used by the people in order to program and compile microcontroller.Figure 3.3 MikroC with C programmingAfter created the program compile it by piffle the BUILD icon from the project toolbar.Figure 3.5 After compilation successful3.3.9 EAGLEEAGLE also known as Easily Applicable Graphical Layout Editor is draw conventional for PCB layout. One of the main reason that EAGLE is better in drawing schematic than any other software is that it has a comprehensive component library so this helps save time as there is less need to draw up the components. The auto route function of EAGLE is also good.Figure 3.6 Schematic drawing windowFigure 3.7 Placing componentsnetFigure 3.9 Wire up componentsFigure 3.10 Swi tch from schematic to boardRoute toolbarFigure 3.11 Routing toolbar4 PROJECT DEVELOPMENT4.1 Overall Circuit Schematic DiagramFigure 3.01 The Full Circuit Diagram of the GSM Zone based Security SystemFigure 3.01 shows the overall schematic diagram of GSM Zone based intruder system. The system hardware is divided into few parts for a better explanation. They are Microcontroller (PIC16F877A) Power Supply module, Serial port communications and liquid crystal display.4.1.1 PIC 16F877PFigure 3.02 The microcontroller and liquid crystal display implementationAs shown in Figure 3.02 the PIC Microcontroller 16F877P was chosen because of its software support availability, low exist and high feature count.For a reset button a push button is connected to MCLR pin anything happens during the operation. When the PIC is ON and the MCLR pin is connected to ground RESET occurs.A 4MHz oscillator is used which is widely popular in PIC circuits due to the importance of timing and clocking. Capacitor C3 and C4 is used to filter the oscillator signal. The resistor R11 is used for current limiting. The complete pin allocation shown in table 3.03.PIN NUM.PIN NAME continuative1MCLR attached to reset switch and Vcc (+5V)2RA0 order 13RA1ZONE 24RA2ZONE 35RA3ZONE 46RA47RA58RE0 connected to Buzzer9RE1Connected to Buzzer10RE211VDDVcc (+5V)12GNDGround13OSC1Connected to 4MHz Oscillator14OSC2Connected to 4MHz Oscillator15RC0ZONE 516RC1ZONE 217RC2ZONE 718RC3ZONE 819RD0Connected to liquid crystal display pin 1120RD1Connected to LCD pin 1221RD2Connected to LCD pin 1322RD3Connected to LCD pin 1423RC424RC525RC6Connected to scoopful 23226RC7Connected to MAX 23227RD4Connected to LCD pin 428RD5Connected to LCD pin 629RD630RD7Connected to output31VSSConnected to ground32VDDConnected to VCC (+5V)33RB0Connected to Keypad pin 134RB1Connected to Keypad pin 235RB2Connected to Keypad pin 336RB3Connected to Keypad pin 437RB4Connected to Keypad pin 538RB5Connected to Keypad pin 639RB6Connected to Keypad pin 740RB7Connected to Keypad pin 8Table 3.03 The PIC16F877P pin allocation4.1.2 Power supply moduleFigure 3.04 Voltage regulator used in systemDesigning a power supply module will be more complex and heavy as it consist of a step down transformer. By considering the fact, the needed input voltage is supplied directly from a 9V battery. The examine 3.04 is the voltage regulator LM 7805 used to regulate the 9V input voltage from the battery. The 9V voltage will be step down and regulate to 5V.The output bear from this power supply circuit are 9V (V+) and 5V (Vcc) DC voltage. These voltages value are based on the necessary of each module especially PIC 16F877P.The capacitor 220F is a bypass capacitor used for filtering the regulated voltage. The output voltage of this module will be supplied to PIC 16F877P, Liquid Crystal expose (LCD) and MAX 232.4.1.3 Serial Port communicationFigure 3.05 The serial port communication componentIn the serial port communication shown above, MAX 232 is connected in between modem and the circuit to work as buffer .It works by shifting the signal voltage level according to the requirement. The connection is figure above are based on the datasheet. The serial port pin 3(Tx) in RS 232 is connected with MAX 232 T1 OUTPUT which is pin 14.This connection is used to transmit data from modem to microcontroller. Hence the serial port pin 2(Rx) in RS 232 is connected with MAX 232 R1 IN input pin 13.The purpose of connection is for receiving data from microcontroller to modem.The capacitors are chosen as 10F and not 1F as stated in datasheet because the value worked well when testing was done.4.1.4 LCDFigure 3.06 The LCD used in the systemThe LCD is used to display the status of the GSM Zone based Security System. The type of LCD used is a 16 character line length in two line version JHD162A series LCD, which aline to a standard interface specification. Pins 1 and 2 are the power supply lines, whereby pin 1 is connected to ground and pin 2 to Vcc (+5V). Pin 3 is a control pin, which is used to commute the contrast of the display. This pin is connected to a variable resistor to alter the contrast by altering the resistance value. Pin 4 is the register select (RS line) connected to pin 27 of PIC 16F877P .Pin5 which will be the Read/Write line is connected with pin 3 of LCD itself. Where else the pin 6 which function as enable line connected to pin 28 of PIC 16F877P.The data line pin 11 to 14 of LCD is connected with pin 19,pin20,pin21 and pin 22 of PIC 16F877P.4.1.5 passFigure 3.07 Relay used in the systemRelay are devices which allow low power circuits to control the high circuits or instruments. Figure 3.07 shows the basic relay driver circuits used in GSM Zone based Security System. A 9V DC voltage been feed through the coil. A NPN BC547 transistor is being used to control the relay. The transistor is turn ON when the signal is feed through the pin 30 of the PIC. Once the transistor turns ON it will turn ON the re lay. A diode IN4148 is connected crosswise the relay coil to protect the transistor.4.1.6 Software ArchitectureThe PIC used in the system is programmed by using the C language. C language is one of the several programmer language commonly used to create a list of instruction to control the system. Figure 3.08 shows the flow of the constructed program in this project. As what has been discussed in chapter 2.3 the C language need to go through the compiling stage before being stored in the PIC. The MIKRO C compiler is used to compile the program of the system. Hence, the compiled program will be stored in PIC by using the PIC KIT 2 programmer. The compiling and storing process will be show in detail in appendices.Figure 3.08 Flow of the program in the intruder system4.1.6 PCB Schematic LayoutFig 4.3.1 PCB Schematic Layout

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.