Professional Documents
Culture Documents
APPROACH:
Three stages of protection to strengthen the security of the car: Firstly, when the user
access the car by the car key and entered the wrong password, the power is remain
disable. If the power shifted by others, the second level comes by disabling the starter
motor from being turned on, so the stolen keys cannot turn the car on.
RESULTS:
Student is able to design a car security using logic gates also in logisim and also in
hardware.
CONCLUSION:
This car security system is also programmed in logisim .This system worked properly
and tested successfully. alarm systems and gps tracking systems are also tested
successfully.
`
INTRODUCTION
PRINCIPLE OF OPERATION:
This is used to provide the security and safety to the passangers travelling in the car.
When the driver step into the car first it checks whether all the doors are properly closed
or not , if the doors are closed then it checks for seatbelt is fasten or not all the conditions are
satisfied then the engine will start otherwise buzzer will blown.
a real-time vehicle location tracking system which uses the current technologies of Global
Positioning System (NAVSTAR GPS) to provide continuous position and velocity tracking of
moving vehicle presented a novel signal acquisition and tracking method that reduces the
number of operations, simplifies the HW implementation and decrease time needed.
APPARATUS:
No.of 3-inputs AND Gates: 1,
No.of 2-inputs AND Gates: 2,
No.of 2-inputs OR Gates:1,
No.of invertetrs : 2.
efficient carsecurity system is presented here which may add extra advantage over the
existed systems . This system is a password protected system, which enables only the
car owner to switch and drive it. In addition, it prevents the car from being switched
on or let the motor starts when illegal enter. These details will be discussed clearly,
but here a general view of the system, the driver uses the keypad to enter the known
password following the instructions displayed on the LCD. The entered data is
processed by the control circuit, which compares the entered data with those stored
in its memory . The driver uses the keypad to enter the known password following the
instructions displayed on the LCD. The entered data is processed by the control circuit, which
compares the entered data with those stored in its memory . According to data processing,
the control circuit is able to actuate one of two choices, first choice, if the entered password is
true; firstly, the power of the car is activated, secondly the motor starter is enabled such that
the engine can be turn on, thirdly the directional valve changes its direction and the fuel will
enter the engine .Second choice, if the entered password is wrong, then the user is able to re-
enter for maximum of three error entries, after that the alarm system is activated and the
system will be locked and the user needs to enter a special code (PUK: Personal Unblocking
Key) given when mounting the system, through which the driver can reset the system for
initial password of (00000000).
RESULTS
In this study the alarm system is used to be activated (i.e., buzzer and LEDs flasher)
when the wrong password is entered for three times.
CONCLUSION
The system which obtained is an enhancement of the standard one (an
anti-theft protection System) because of the three stages (three levels of
`
protection). By using this enhanced system the engine of the car is turned
off not only by electrical reasons but and by the means of fuel. The new
designed system is inexpensive, the system is workable and it is tested
successfully
BLOCK DIAGRAM:
PROCEDURE:
Connect to circuit as per the logic diagram collect all the inputs of the
circuits to the to switches connect all the the outputs of the circuits to
the LED’s.
Apply the inputs as per the truth table. Observe and tabulate the
output of the circuit.
Connect the inputs to any one logic gate by clicking on the symbol
an logisim tool box.
Connect the outputs to any one logic gate by clicking on the symbol
an logisim tool box.
`
TRUTH TABLE :
INPUTS OUTPUTS
key cardoors seatbelt buzzer engine
0 X X 0 0
1 0 X 1 0
1 1 0 1 0
1 1 1 0 1
K-MAPS:
Engine=key.cardoors.seatbelt
Buzzers=key.cardoors+key.seatbelt
`
LOGIC DIAGRAM :
OUTPUT DIAGRAM:
`
OBSERVATION:
car security systems are verified.
If key is ‘0’ then the engine not works.
In key, cardoors and seatbelt are in then the engine will
start without buzzer.
If anyone of cardoors or seatbelt is ‘0’ then buzzers will
blow and engine doesn’t start.
THANK YOU