GSM Based Home Security System REPORT
GSM Based Home Security System REPORT
BACHELOR OF TECHNOLOGY
In
BONAFIDE CERTIFICATE
Certified that this project report GSM BASED HOME SECURITY SYSTEM is the Bonafide work of PRACHI NANDA and BHAVUK PUJARA - who carried out the project work under my guidance.
SIGNATURE
SIGNATURE
ABSTRACT
The final year project aims at exposing the students undergoing higher technical studies to the thoughts and logic that must be developed to ensure that one is able to integrate his/her ideas into something concrete. This generally is initiated by the inception of an idea or a concept, which not only aims at developing a product (Hardware or Software), but also the in-depth study of the earlier existing products in the same category and their deficiencies. Accordingly an approach is taken to propose a solution, which is better from the previous ones in one respect or the other. With the same approach in mind, we, the final year students of Bachelor of Technology (Electronics and Telecommunication), have taken up the ADVANCE GSM BASED HOME SECURITY SYSTEM as our final year project. Automated security systems are a useful addition to todays home where safety is an important issue. Vision-based security systems have the advantage of being easy to set up, inexpensive and non-obtrusive. Home security system for detecting an intrusion into a monitored area by an infrared detector. A security system has a flee-standing intrusion detector. The free standing intrusion detector has a transmitter coupled with a portable receiver to alert a homeowner that an intrusion has taken place or occurred within a pre-set time period.
3
ACKNOWLEGDEMENTS
It is our proud privilege to have Mr. Pardeep Kumar as our mentor for this project, GSM based home security system. He has been an immense help to us since the beginning of the project. He guided us at tough times and helped us achieve this goal. We are very thankful to him for his help and support. We would also like to extend our thanks to our H.O.D, Col. R.K. Kapur for his undying faith in us and making us believe in ourselves. His guidance has been the reason we could complete this project.
TABLE OF CONTENTS
TITLE
1. 2. 3. 4. 5.
PAGE NO. INTRODUCTION.07 GENERAL DESCRIPTION.09 INTEGRATION ARCHITECTURE11 COMPONENTS USED12 BRIEF ABOUT THE COMPONENTS13
5.1 Printed Circuit Board....13 5.2 8051 Microcontroller....14 5.2.a Pin Diagram......................15 5.2.b I/O Ports.19 5.2.c Internal Block Diagram..21 5.2.d Memory Architecture.22 5.3 Transformer... 27
5.4 5.5
Liquid Crystal Display....29 Light Emitting Diode...31 Sensors.....32 Fire Alarms......32 Burglar Alarms....33 Gas Sensing Electrode.34 PVC Wires..34 Relays.. 35 GSM Antenna..37 8051 PROGRAMMING ...38 CHARACTERISTICS & STRENGTHS OF THE
PROJECT....45
8. 9. 10.
1. INTRODUCTION
In todays age of digital technology and intelligent systems, home automation has become one of the fastest developing application-based technologies in the world. The idea of comfortable living in home has since changed for the past decade as digital, vision and wireless technologies are integrated into it. Intelligent homes, in simple terms, can be described as homes that are fully automated in terms of carrying out a predetermined task, providing feedback to the users, and responding accordingly to situations. In other words, it simply allows many aspects of the home system such as temperature and lighting control, network and communications, entertainment system, emergency response and security monitoring systems to be automated and controlled, both near and at a distance.
Automated security systems play an important role of providing an extra layer of security through user authentication to prevent break-ins at entry points and also to track illegal intrusions or unsolicited activities within the vicinity of the home (indoors and outdoors). There has been much research done in the design of various types of automated security systems. Sensor-based systems that rely on contact or movement sensors or contact-based systems such as fingerprint and palm print scan or keypad activation that require substantial amount of contact with an input device. Many security systems are based on only a single system. In an event of system failure or intrusion of the user authentication, there is no backup system to monitor the home continually. This shortcoming can be dealt with using multiple security systems (or multi-layered security systems). However, multi-system implementations will definitely be more demanding in terms of computational cost and organization. This
requires careful integration and sharing of resources. Thus, a feasible system should be effective, practical and reasonable in cost. In this paper, we proposed an integrated dual-level sensor based home security system, consisting of two subsystems a IR sensors, burglar alarm module and fire alarm module. Both subsystems work independently but are incorporated into a single automated system for practical implementation. The organization of this paper is as follows. In section II, the integrated architecture of the system is further elaborated. Finally, section ------ will give the conclusion and future directions.
2. GENERAL DESCRIPTION
The project here is all about a Home security system, In this project we have planned to develop a Home security system. Home security system for detecting an intrusion into a monitored area by an infrared detector. A security system has a flee-standing intrusion detector. The free standing intrusion detector has a transmitter coupled with a portable receiver to alert a homeowner that an intrusion has taken place or occurred within a pre-set time period. The area under surveillance is monitored by an infrared detector which activates the transmitter upon the detection of abrupt differences in infrared radiation levels, associated with the presence of a warm body in an otherwise equilibrated environment. A radio signal is emitted by the transmitter which is received by the portable hand-held remote receiver. A first signal, indicating that an intrusion has been detected less than a preselected period of time in the past in the monitored areas, is displayed on the receiver for that preselected period of time. After the preselected period of time has elapsed, a second signal is generated to indicate that the intrusion took place at a time greater than the preselected period of time in the past and that the probability of the intruder still being present is less. Once the intrusion detector is activated, the signal is continuously transmitted to the portable receiver until the intrusion detector has been reset.
10
A security system for a home comprising: A free standing intrusion detector to be set in an area of said home to be protected, said free standing intrusion detector comprising: An intrusion detector to generate an intrusion signal in response to an intrusion into said area; A radio signaling transmitter responsive to said intrusion signal to transmit a radio signal means for modulating said radio signal for a predetermined time in response to said intrusion signal; and time delay means for delaying the actuation of said intrusion detector to allow a person sufficient time to exit said area to be protected after setting said intrusion detector; and a portable receiver adapted to be hand carried comprising. Means for generating an output signal in response to said radio signal. Display means for generating a visual display indicating an intrusion has occurred in response to said output signal.
11
12
3. INTEGRATION ARCHITECTURE
The proposed integration architecture incorporates subsystems IR sensors, burglar alarm module and fire alarm module , into a single automated architecture for practical implementation in intelligent home environments. The figure shows a block diagram of the proposed system architecture and its setup and connectivity. The modules work independently and parallely but share computational resources.
13
4. COMPONENTS USED
PCB
8051 MICROCONTROLLER
TRANSFORMER 12V/500mA VOLTAGE REGULATOR LM7805 ELECTROLYTIC CAPACITORS LCD DISPLAY LEDs
SENSORS - Fire, Burglar, Gas Sensors
14
components using conductive pathways, tracks or signal traces etched from copper sheets laminated onto a non-conductive substrate. It is also referred to as printed wiring board (PWB) or etched wiring board. A PCB populated with electronic components is a printed circuit assembly (PCA), also known as a printed circuit board assembly (PCBA). Printed circuit boards are used in virtually all but the simplest commercially-produced electronic devices. PCBs are inexpensive, and can be highly reliable. They require much more layout effort and higher initial cost than either wire wrap or point-to-point construction, but are much cheaper and faster for high-volume production; the production and soldering of PCBs can be done by totally automated equipment. Much of the electronics industry's PCB design, assembly, and quality control needs are set by standards that are published by the IPC organization.
15
128 user defined software flags. 8-bit data bus 16-bit address
16 bit timers (usually 2, but may have more, 3 internal and 2 external interrupts.
Bit as well as byte addressable RAM area of 16 bytes. Four 8-bit ports, (short models 16-bit program counter
16
TYPICAL APPLICATIONS 8051 chips are used in a wide variety of control systems, telecom applications, and robotics as well as in the automotive industry. By some estimation, 8051 family chips make up over 50% of the embedded chip market.
Figure 5.2.a.(i) Pin Diagram of 8051 Microcontroller Pins 1-8: Each of these pins can be configured as an input or an output.
17
Pin 9: RST A logic one on this pin disables the microcontroller and clears the contents of most registers. In other words, the positive voltage on this pin resets the microcontroller. By applying logic zero to this pin, the program starts execution from the beginning. Pins10-17: Port 3 Similar to port 1, each of these pins can serve as general input or output. Besides, all of them have alternative functions: Pin 10: RXD Serial asynchronous communication input or Serial synchronous communication output. Pin 11: TXD Serial asynchronous communication output or Serial synchronous communication clock output. Pin 12: INT0 Interrupt 0 inputs. Pin 13: INT1 Interrupt 1 input. Pin 14: T0 Counter 0 clock input. Pin 15: T1 Counter 1 clock input. Pin 16: WR Write to external (additional) RAM. Pin 17: RD Read from external RAM. Pin 18, 19: X2, X1 Internal oscillator input and output. A quartz crystal which specifies operating frequency is usually connected to these pins. Instead of it,
18
miniature ceramics resonators can also be used for frequency stability. Later versions of microcontrollers operate at a frequency of 0 Hz up to over 50 Hz. Pin 20: GND Ground.
Pin 21-28: Port 2 If there is no intention to use external memory then these port pins are configured as general inputs/outputs. In case external memory is used, the higher address byte, i.e. addresses A8-A15 will appear on this port. Even though memory with capacity of 64Kb is not used, which means that not all eight port bits are used for its addressing, the rest of them are not available as inputs/outputs. Pin 29: PSEN If external ROM is used for storing program then a logic zero (0) appears on it every time the microcontroller reads a byte from memory. Pin 30: ALE Prior to reading from external memory, the microcontroller puts the lower address byte (A0-A7) on P0 and activates the ALE output. After receiving signal from the ALE pin, the external register (usually 74HCT373 or 74HCT375 add-on chip) memorizes the state of P0 and uses it as a memory chip address. Immediately after that, the ALU pin is returned its previous logic state and P0 is now used as a Data Bus. As seen, port data multiplexing is performed by means of only one additional (and cheap) integrated circuit. In other words, this port is used for both data and address transmission. Pin 31: EA By applying logic zero to this pin, P2 and P3 are used for data and address transmission with no regard to whether there is internal memory or not. It means that even there is a program written to the microcontroller, it will not be executed. Instead, the program written to external ROM will be executed. By applying logic one to the
19
EA pin, the microcontroller will use both memories, first internal then external (if exists). Pin 32-39: Port 0 Similar to P2, if external memory is not used, these pins can be used as general inputs/outputs. Otherwise, P0 is configured as address output (A0-A7) when the ALE pin is driven high (1) or as data output (Data Bus) when the ALE pin is driven low (0). Pin 40: VCC +5V power supply.
20
21
When the pin is configured as an output, it acts as an open drain. By applying logic 0 to a port bit, the appropriate pin will be connected to ground (0V). By applying logic 1, the external output will keep on floating. In order to apply logic 1 (5V) on this output pin, it is necessary to built in an external pull-up resistor. (ii) Port 1 P1 is a true I/O port, because it doesn't have any alternative functions as is the case with P0, but can be configured as general I/O only. It has a pull-up resistor built-in and is completely compatible with TTL circuits. (iii) Port 2 P2 acts similarly to P0 when external memory is used. Pins of this port occupy addresses intended for external memory chip. This time it is about the higher address byte with addresses A8-A15. When no memory is added, this port can be used as a general input/output port showing features similar to P1. (iv) Port 3 All port pins can be used as general I/O, but they also have an alternative function. In order to use these alternative functions, a logic one (1) must be applied to appropriate bit of the P3 register. In terms of hardware, this port is similar to P0, with the difference that its pins have a pull-up resistor built-in.
22
23
24
(vi) Data Memory As already mentioned, Data Memory is used for temporarily storing data and intermediate results created and used during the operation of the microcontroller. Besides, RAM memory built in the 8051 family includes many registers such as hardware counters and timers, input/output ports, serial data buffers etc. The previous models had 256 RAM locations, while for the later models this number was incremented by additional 128 registers. However, the first 256 memory locations (addresses 0-FFh) are the heart of memory common to all the models belonging to the 8051 family. Locations available to the user occupy memory space with addresses 07Fh, i.e. first 128 registers. This part of RAM is divided in several blocks. The first block consists of 4 banks each including 8 registers denoted by R0-R7. Prior to accessing any of these registers, it is necessary to select the bank containing it. The next memory block (address 20h-2Fh) is bit- addressable, which means that each bit has its own address (0-7Fh). Since there are 16 such registers, this block contains in total of 128 bits with separate addresses (address of bit 0 of the 20h byte is 0, while address of bit 7 of the 2Fh byte is 7Fh). The third group of registers occupy addresses 2Fh-7Fh, i.e. 80 locations, and does not have any special functions or features. (vii) Additional RAM In order to satisfy the programmers constant hunger for Data Memory, the manufacturers decided to embed an additional memory block of 128 locations into the latest versions of the 8051 microcontrollers. However, its not as simple as it seems to be The problem is that electronics performing addressing has 1 byte (8 bits) on disposal and is capable of reaching only the first 256 locations.
25
26
(viii) Addressing While operating, the processor processes data as per program instructions. Each instruction consists of two parts. One part describes WHAT should be done, while the other explains HOW to do it. The latter part can be a data (binary number) or the address at which the data is stored. Two ways of addressing are used for all 8051 microcontrollers depending on which part of memory should be accessed: (ix) Direct Addressing On direct addressing, the address of memory location containing data to be read is specified in instruction. The address may contain a number being changed during operation (variable). For example: Since the address is only one byte in size (the largest number is 255), only the first 255 locations of RAM can be accessed this way. The first half of RAM is available for use, while another half is reserved for SFRs.
MOV A,33h; Means: move a number from address 33 hex. to accumulator (x) Indirect Addressing On indirect addressing, a register containing the address of another register is specified in instruction. Data to be used in the program is stored in the letter register. For example: Indirect addressing is only used for accessing RAM locations available for use (never for accessing SFRs). This is the only way of accessing all the latest versions of the microcontrollers with additional memory block (128 locations of RAM). Simply put, when the program encounters instruction including @ sign and if the specified address is higher than 128 ( 7F hex.), the processor knows that indirect addressing is used and skips memory space reserved for SFRs.
27
MOV A,@R0; Means: Store the value from the register whose address is in the R0 register into accumulator On indirect addressing, registers R0, R1 or Stack Pointer are used for specifying 8-bit addresses. Since only 8 bits are avilable, it is possible to access only registers of internal RAM this way (128 locations when speaking of previous models or 256 locations when speaking of latest models of microcontrollers). If an extra memory chip is added then the 16-bit DPTR Register (consisting of the registers DPTRL and DPTRH) is used for specifying address. In this way it is possible to access any location in the range of 64K.
(a)
Special Function Registers (SFRs) are a sort of control table used for running and monitoring the operation of the microcontroller. Each of these registers as well as each bit they include, has its name, address in the scope of RAM and precisely defined purpose such as timer control, interrupt control, serial communication control etc. Even though there are 128 memory locations intended to be occupied by them, the basic core, shared by all types of 8051 microcontrollers, has only 21 such registers. Rest of locations are intensionally left unoccupied in order to enable the manufacturers to further develop microcontrollers keeping them compatible with the previous versions. It also enables programs written a long time ago for microcontrollers which are out of production now to be used today. (i) A Register (Accumulator) A register is a general-purpose register used for storing intermediate results obtained during operation. Prior to executing an instruction upon any number or operand it is necessary to store it in the accumulator first.
28
All results obtained from arithmetical operations performed by the ALU are stored in the accumulator. Data to be moved from one register to another must go through the accumulator. In other words, the A register is the most commonly used register and it is impossible to imagine a microcontroller without it. More than half instructions used by the 8051 microcontroller use somehow the accumulator. (ii) B Register Multiplication and division can be performed only upon numbers stored in the A and B registers. All other instructions in the program can use this register as a spare accumulator (A).
5.3 TRANSFORMER
A step-down transformer accepts a given voltage on the primary winding (coil), and outputs a lower voltage on its secondary winding. A good example is a doorbell transformer you might buy for your home. It uses 120 volts from the house electrical system and steps it down to a safer 18 volts used to ring the doorbell. The voltage produced is a function of the 'turns-ratio' of the transformer. For example, if the transformer has 500 turns of wire in the primary, and 125 turns of wire in the secondary, we would say it has a turns ratio of 4:1 (pronounced "four-to-one").If we feed 120 volts into the primary, the secondary would produce 30 volts.120:30 = 4:1 A transformer is a static device that transfers electrical energy from one circuit to another through inductively coupled conductorsthe transformer's coils. A varying current in the first or primary winding creates a varying magnetic flux in the transformer's core and thus a varying magnetic field through the secondary winding.
29
A basic voltage regulator LM7805 has three legs, converts varying input voltage and produces a constant regulated output voltage. The most common part numbers start with the numbers 78 or 79 and finish with two digits indicating the output voltage. The number 78 represents positive voltage and 79 negative one.
30
Figure 5.6 An LCD A liquid crystal display (LCD) is a thin, flat electronic visual display that uses the light modulating properties of liquid crystals (LCs). LCs do not emit light directly.
31
They are used in a wide range of applications, including computer monitors, television, instrument panels, aircraft cockpit displays, signage, etc. They are common in consumer devices such as video players, gaming devices, clocks, watches, calculators, and telephones. LCDs have displaced cathode ray tube (CRT) displays in most applications. They are usually more compact, lightweight, portable, less expensive, more reliable, and easier on the eyes. They are available in a wider range of screen sizes than CRT and plasma displays, and since they do not use phosphors, they cannot suffer image burn-in. LCDs are more energy efficient and offer safer disposal than CRTs. Its low electrical power consumption enables it to be used in battery-powered electronic equipment.
32
Figure 5.7 LEDs A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical electronic component in 1962, early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness. When a light-emitting diode is forward biased (switched on), electrons are able to recombine with electron holes within the device, releasing energy in the form of photons. This effect is called electroluminescence and the color of the light (corresponding to the energy of the photon) is determined by the energy gap of the semiconductor. An LED is often small in area (less than 1 mm2), and integrated optical components may be used to shape its radiation pattern. LEDs present many advantages over incandescent light sources including lower energy consumption, longer lifetime, improved robustness, smaller size, faster switching, and greater durability and reliability. LEDs powerful enough for room lighting are relatively expensive and require more precise current and heat management than compact fluorescent lamp sources of comparable output.
33
Light-emitting diodes are used in applications as diverse as replacements for aviation lighting, automotive lighting (particularly brake lamps, turn signals and indicators) as well as in traffic signals. The compact size, the possibility of narrow bandwidth, switching speed, and extreme reliability of LEDs has allowed new text and video displays and sensors to be developed, while their high switching rates are also useful in advanced communications technology. Infrared LEDs are also used in the remote control units of many commercial products including televisions, DVD players, and other domestic appliances.
5.8 SENSORS
5.8.a FIRE ALARMS An automatic fire alarm system is designed to detect the unwanted presence of fire by monitoring environmental changes associated with combustion. In general, a fire alarm system is classified as either automatically actuated, manually actuated, or both. Automatic fire alarm systems are intended to notify the building occupants to evacuate in the event of a fire or other emergency, report the event to an off-premises location in order to summon emergency services, and to prepare the structure and associated systems to control the spread of fire and smoke. After the fire protection goals are established - usually by referencing the minimum levels of protection mandated by the appropriate model building code, insurance agencies, and other authorities - the fire alarm designer undertakes to detail specific components, arrangements, and interfaces necessary to accomplish these goals. Equipment specifically manufactured for these purposes are selected and standardized installation methods are anticipated during the design.
34
35
5.8.c GAS SENSING ELECTRODES Gas-sensing electrodes respond to dissolved gases in solution. They have a plastic body that is usually made of polytetrafluorethylene (PTFE). With gas-sensing electrodes, the dissolved gas diffuses across the membrane into a small volume of buffer. The reaction of the gas with the buffer causes a pH change which is sensed by an internal-glass pH electrode. Because the reference element is built-in, a separate reference electrode is not necessary. Carbon dioxide and ammonia are among the species measured by gas-sensing electrodes.
Figure 5.9.(i) PVC Wires Polyvinyl chloride, (IUPAC Poly (chloroethanediyl)) commonly abbreviated PVC, is a thermoplastic polymer.
36
It is a vinyl polymer constructed of repeating vinyl groups (ethenyls) having one of their hydrogens replaced with a chloride group.Polyvinyl chloride is the third most widely produced plastic, after polyethylene and polypropylene. PVC is widely used in construction because it is cheap, durable, and easy to assemble. PVC production is expected to exceed 40 million tons by 2016.It can be made softer and more flexible by the addition of plasticizers, the most widely used being phthalates. In this form, it is used in clothing and upholstery, and to make flexible hoses and tubing, flooring, to roofing membranes, and electrical cable insulation. It is also commonly used in figurines and in inflatable products such as waterbeds, pool toys, and inflatable structures.
5.10 RELAYS
We are using relay in our project to switch ON/OFF any electrical devices. These relay are switched ON/OFF by sending control signal from microcontroller. The output from these relay can be used to operate any electrical device of suitable volt-ampere rating.
37
A relay is an electrically operated switch. Many relays use an electromagnet to operate a switching mechanism mechanically, but other operating principles are also used. Relays are used where it is necessary to control a circuit by a low-power signal (with complete electrical isolation between control and controlled circuits), or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Relays were used extensively in telephone exchanges and early computers to perform logical operations. A type of relay that can handle the high power required to directly drive an electric motor is called a contactor. Solid-state relays control power circuits with no moving parts, instead using a semiconductor device to perform switching. Relays with calibrated operating characteristics and sometimes multiple operating coils are used to protect electrical circuits from overload or faults; in modern electric power systems these functions are performed by digital instruments still called "protective relays". ADVANTAGES OF RELAYS Relays can switch AC and DC, transistors can only switch DC. Relays can switch higher voltages than standard transistors. Relays are often a better choice for switching large currents (> 5A). Relays can switch many contacts at once. DISADVANTAGES OF RELAYS Relays are bulkier than transistors for switching small currents. Relays cannot switch rapidly (except reed relays), transistors can switch many times per second. Relays use more power due to the current flowing through their coil.
38
39
40
unsigned char i,j; for(i=0;i<60;i++) key1flag=1; key2flag=1; key3flag=1; key4flag=1; phonesensor=0; buzzer=0; phonecount=0; ET1=0; TR1=0; }} void key1chk() { if(key1flag) { if(key1==0) { key1flag=0; keycount++; if(keycount==1) passwordarr[0]=1; if(keycount==2) passwordarr[1]=1; if(keycount==3) passwordarr[2]=1; if(keycount==4) passwordarr[3]=1; }}} void key2chk() { if(key2flag) {
41
if(key2==0) { key2flag=0; keycount++; if(keycount==1) passwordarr[0]=2; if(keycount==2) passwordarr[1]=2; if(keycount==3) passwordarr[2]=2; if(keycount==4) passwordarr[3]=2; }}} void key3chk() { if(key3flag) { if(key3==0) { key3flag=0; keycount++; if(keycount==1) passwordarr[0]=3; if(keycount==2) passwordarr[1]=3; if(keycount==3) passwordarr[2]=3; if(keycount==4) passwordarr[3]=3; }}} void key4chk() { if(key4flag)
42
{ if(key4==0) { key4flag=0; keycount++; if(keycount==1) passwordarr[0]=4; if(keycount==2) passwordarr[1]=4; if(keycount==3) passwordarr[2]=4; if(keycount==4) passwordarr[3]=4; }}} void irchk() { if(!irsensor) irsensorflag=1; } void firesensorchk() { if(!firesensor) firesensorflag=1; } void rainsensorchk() { if(!rainsensor) rainsensorflag=1; } void securitychkopr() {
43
while(1) { key1chk(); delay(); key2chk(); delay(); key3chk(); delay(); key4chk(); delay(); irchk(); delay(); firesensorchk(); delay(); rainsensorchk(); delay(); if(firesensorflag) break; if(rainsensorflag) break; if(irsensorflag) break; if(keycount>=4) { keycount=0; keycountflag=1; break; }}} void main() { key1flag=1; key2flag=1; key3flag=1;
44
key4flag=1; TMOD=0x11; TF0=0; TH0=0x4b; TL0=0x0fd; TF1=0; TH1=0x4b; TL1=0x0fd; EA=1; ET0=0; TR0=0; ET1=0; TR1=0; relay1=0; relay2=0; phonesensor=0; buzzer=0; firesensor=1; while(1) { securitychkopr(); if(firesensorflag) { firesensorflag=0; phonesensor=1; ET1=1; TR1=1; } if(rainsensorflag) { rainsensorflag=0; phonesensor=1; ET1=1; TR1=1;
45
} if(keycountflag) { if(!irsensorflag) { passwordcount++; if(passwordcount<=3) { if(passwordarr[0]==4 && passwordarr[1]==1 && passwordarr[2]==2 && passwordarr[3]==3) { keycountflag=0; passwordflag=1; relay1=1; ET0=1; TR0=1; } }}} if(irsensorflag) { if(!passwordflag) { irsensecount++; if(irsensecount==1) { irsensorflag=0; phonesensor=1; buzzer=1; ET1=1; TR1=1; }}}}}
46
47
8. APPLICATIONS
a. ANTI-THEFT REPORTING
When someone break in , Home-Guard uses GSM network to report automatically to and 1 voice call. The owner can monitor or talk to the thief.
5 preset numbers: short message for control center, short message for 3 pre-stored mobile phone,
It has 8 security region codes and 1 fire/ smoke code to distinguish. We can choose
b. EMERGENCY REPORTING
Under emergency situation, the house member can press SOS key on the RF remote or on wireless Door/ Window sensor. Home-Guard also uses GSM network to report to 5 pre-stored numbers: short message for control center, short message for 3 pre-stored mobile phone, and 1 voice call for monitoring or talking.
c. EXTRA FUNCTIONS
Fire/Gas Instant reporting: Wireless Heat Sensor, Wireless Smoke Sensor, Wireless
48
d. ARM/DISARM BY SMS
In addition to use the RF Remote, the system allows the users to arm and disarm the alarm system via SMS message from mobile phone. Users can also check the alarm status anytime by simply sending an inquiry SMS message to the main unit.
49
In the paper low cost, secure, ubiquitously accessible, auto-configurable, remotely controlled solution for automation of homes has been introduced. The approach discussed in the paper is novel and has achieved the target to control home appliances remotely using the SMS-based system satisfying user needs and requirements. GSM technology capable solution has proved to be controlled remotely, provide home security and is cost-effective as compared to the previously existing systems. Hence we can conclude that the required goals and objectives of our project have been achieved. The basic level of home appliance control and remote monitoring has been implemented. The system is extensible and more levels can be further developed using automatic motion/glass breaking detectors so the solution can be integrated with these and other detection systems. In future the system will be small box combining the PC and GSM modem. The hardware will be self contained and cannot be prone to electric failure. This appliance will have its own encapsulated UPS and charging system.
50
10. REFERENCES :
Choi, K.-M. Kim, J.-W. Jung, S.-Y. Chun, and K.-S. Park.
K
world wide home security system using PC-cameras: The e-Vigilante Network Project, SICE 2004 Annual Conference.
51