Professional Documents
Culture Documents
A Report submitted for the Fulfillment of the requirements for the Degree of
BACIIELOR, OT' TECINTOL(rcY
in
INFORMATION TECHNOTOGY
By
Crtil frftbOlfrcimlqy
tCottr{rrr:: lodchnd
CERTIFICA
This is to certify that the work embodied in this project entitled "GSM BASED
HOME
(Gau-
SECURTTY sysrnni" subrnitted by Rwirub Daimari (Gau-C-l lll34), Manab Ghose
c-1||137),Judhasing Brahma (Gau-C-I |lL-226), Rwn Khungur Brahma
(Gau-C-I |lL'228'
out our direot supervisions and
to the Department of-Information Technology is canied under
guidance.
The project work has been prepared as per the regulations of -Cenfial Institute
of
the fulfillment of
Technology and we stongly r"ro**rnd ittut tlit project work be accepted
for
requirement for the degree of Bachelor of Technology'
.M,,
Mr.Kongkon kalita
HoD (irc)r.{,
DEPARTMENT OF INFORMATION TECHNOLOGY
\.
cr,edtq'ffi
.,
sreffa @
CENTRAL INSTITUTE OF TECHNOLOGY, KOKRAJHAR
(Ar1 Autonomous Institute under MHRD)
EaTD.:2OOO
etrd qt ffi {qrt
Kokrajhar - 783370. BTAD, Assam, India
rrysl qr ,lq\ffil{'nq
This is to certifu that the project work entitled "GSM BASED HOME SECURITY
SYSTEM" submitted by Rwirub Daimari (Gau-C-l lll34), ldanab Ghose (Gau-C-l lll37),
Judhasing Brahma (Gau-C-lltL-226), Rwn Khungur Brahma (Gau-C-11/L-228) to the
Deparflnent of Information Technology of Central Institute of Technology, Kokrajhar has been
examined and evaluated.
The project work has been prepared as per the regulations of Cenfial Institute of
Technology and qualifies to be accepted for the fulfillment of requirement for the degree of
Bachelor of Technology.
nf)
v\ry{MMm
pHi [6t c o- o rdi n ilfroffirE S
It Board of Examiners
d€$P$tNFs
C.lnlrsl fnititut€ cll lechnology
Xotr'ilrar :' Eodoland DEPARTMENT OF TNFORMATION TECHNOLOGY
ffiq ffi Ti,aqprra ffitflrur-gru
CENTRAL INSTITTJTE OF TECHNOLOGY, KOKRAJHAR
(An Autonomous Institute under MHRD)
ESTIT, ;2O!0O Kokralhar: 783370, BTAD, Assam, India
a{fidl qr qd lrltlr
drt(t\ 'tt .rdfitfrrq
We hereby declare that the project work entitled "GSM BASED HOME SECURITY
SYSTEM" is an authenticated work carried out by us under the guidance of Mr. Bikramjit
Choudhury, Asst. Prof., Department of IT, CIT, Kokrajhar for the fulfillment of award of the
degree in Information Technology and this work has not been submitted for similar purpose
anywhere else except to Department of IT, CIT, Kokrajhar.
fYL^nnb <Jth,osr-
Manab Ghose
{Jrriversity Roll No.:- Gau-C- Wl37
University Registration No: 01 5 I 85 of 2011 - zAn
Judhasingh Brahma
University Roll No. :- Gau-C- 1| ll-,-226
University Registration No: 08 1842 of 2012-13
"{'trlra @
uttilt
rSttt c,{J_C'9|
N'Ul).)t
t CENTRAL INSTITUTE OF TECHNOLOGY, KOKRAJHAR
A-'T//)Lt
mlr (An Autonomous Institute under MHRD)
.f1 {llrtll
ESm, : 2OOG Kokrajhar - 783370, BTAD, Assam, lndia
rrd {t rrfl rt}r{t
rrrrdl {l sdf.t,t{q
ACKNOWLEDGEMENT
We wish to express our deep sense of gratitude to our Project Guide Mr. Bikramjit
Choudhury (Asst. Prof. Dept. of IT, CIT, Kokrajhar) for guiding us in our progress of the project.
We sincerely acknowiedge for giving his valuable guidance, critical reviews and comments for
giving the progress shape of the hoject. Words are inadequate in offering our thanks to
Prof.Debkumar Chakraborti (Director,ClT Kokrajhar), Mr. Kongkon Kalita (HoD.Vc Dept. of
Information Technology), Mr.Dipankar Sutradhar (Asst. Prof., Dept. of Instrumentation
Engineering), Mr.Ranjan Patowary (Asst. Prof. Dept. of IT, CIT, Kokrajhar), and Mr.Nayanmoni
Barman (Lab Technician) for consistent encouragement and support for shaping our project in
the presentable form.
We wish to put on record the appreciative original work of all the authors of various
technical papers which we have referred in our project without whom it was very difficult to
achieve progress of the project. Finally, we would like to express our heartfelt thanks to all
supporting staff members and friends who have been a constant source of encouragement for
successful completion of the project.
TABLE OF CONTEIITS
Page No.
ABSTRACT............
CHAPIER 1: INTRODUCTION
1.1. Introduction..................... 2
L.2. GeneralDescriPtion 3
2.3. MAx-232.... 9
2.4. RS-232........ 9
2.5. Sensors....... 10
2.s.2.|RSensor..........;..............::........;j......... 11
2.6. 8u22er......... LL
2.7. 1EDs............ L2
2.8. CaPacitors., L2
2.9. Diode 13
2.10. Resistors..... T4
CHAPTERIt: CONCLUSION....... 32
CHAPTER 6: FIIIIIRE SCOPE.... 33
CHAPT'ER 7: REFERENCES...... 34
LIST OF FIGURES
Page No.
1. Pin diagram of PIC18F261Q2.......... 05
4: RS 232maleand female. 09
5: Fire sensor......... l0
6: IR Sensor 1l
7:Buzz,et. ll
8: Light-Emitting Diodes (LEDs)....... t2
9: Capacitors................ r3
10 : Diode.. ...............................i...... l4
1 I : Resistor.:................. t4
12 : Bread Board......... 15
20: IR Sensor...... 25
Automated security systems are a useful addition to today's home where safety is an
important issue. The important issue of this system is to obtain information from a remote place
about the intnrsion at our home via the automated system rathcr than a traditional method of
security system. A free standing intrusion detector has a transmitter coupled with a portable
receiver to alett a homeowner that an intrusion has taken plaoe or occurred within a pre-s€t time
period. With the same approach in mind, we, the final year students of Bachelor of Technology
(Information Technology), have taken up the Advanced GSM Based Home Security System as
our final year project.
1.1 Introduction
In today's age of digital technology and intelligent systems, home automation has
become one of the fastest developing application-based technologies in the world. The idea of
comfortable living in home has since changed for the past decade as digital, vision and wireless
technologies are integrated into it. Intelligent homes, in simple terms, can be described as
homes that are fully automated in terms of carrying out a predetermined task, providing
feedback to the users, and responding accordingly to situations. In other words, it simply allows
many aspects of the home system such as temperature and lighting control, network and
communications, entertainment system, emergency response and security monitoring systems
to be automated and controlled, both near and at a distance. Automated security systems play
an important role of providing an extra layer of security through user authentication to prevent
break-ins at entry points and also to track illegal intrusions or unsolicited activities within the
vicinity of the home (indoorsand outdoors).
There has been much research done in the design of various types of automated
security systems. Sensor-based systems that rely on contact or movement-sensors or contact-
based systems such as fingerprint and palm print scan or keypad-activation that require
substantial amount of contact with an input device. Many security systems are based on only a
single system. In an event of system failure or intrusion of the user authentication, there is no
backup system to monitor the home continually. This shortcoming can be dealt with using
multiple security systems (or multi-layered security systems). However, multi-system
implementations will definitely be more demanding in terms of computational cost and
organization. This requires careful integration and sharing of resources. Thus, a feasible system
should be effective, practical and reasonable in cost. In this paper, we proposed an integrated
dual-level sensor based home security system, consisting of two sub systems an lR sensor,
burglar alarm module and fire alarm module. Both subsystems work independently but are
incorporated into a single automated system for practical implementation. The organization of
this paper is as follows
1.2 GENERAL DESCRIPTION
system' In this project we have planned to
The project here is all about a Home security
an intrusion into a monitored area by an
infrared
develop a Home security system for detecting
detector.Asecuritysystemhasafree-standingintrusiondetector.Thefreestandingintrusion
portable receiver to alert a homeowner that an
detector has a transmitter coupled with a
pre-set time period 'The area under surveillance
intrusionhas taken place or occurred within a
ismonitoredbyaninfrareddetectorwhichactivatesthetransmitteruponthedetectionof
abruptdifferencesininfraredradiation|evels,associatedwiththepresenceofawarmbodyin
anotherwiseequilibratedenvironment'Aradiosignalisemittedbythetransmitterwhichis
intrusion
receiver. A first signal, indicating that an
received by the portable hand-held remote
hasbeendetectedlessthanapreselectedperiodoftimeinthepastinthemonitoredareas'is
displayedonthereceiverforthatpreselectedperiodoftime.Aftertheprese|ectedperiodof
time has elapsed, a second signal is generated
to indicate that the intrusion took place at a time
greaterthantheprese|ectedperiodoftimeinthepastandthattheprobabilityoftheintruder
is activated, the signal is continuously
sti|l being present is ress. once the intrusion detector
intrusion detector has been reset'
transmitted to the portable receiver until the
Asecuritysystemforahomecomprisingafreestandingintrusiondetectortobesetin
anareaofsaidhometobeprotected,saidfreestandingintrusiondetectorcomprisingan
in responseto an intrusion into said area' A
intrusion detector to generate an intrusion signal
intrusion signal to transmit a radio-signal means
radio signaling transmitter responsive to said
time in response to said intrusion signal
for modulating said radio signal for a predetermined
andtimedelaymeansforde|ayingtheactivationofsaidintrusiondetectortoa|Iowaperson
sufficient time to exit said area to be
protected after setting said intrusion detector and a
Means for generating an output signal
portable receiver adapted to be hand carried comprising.
generating a visual display indicating an
in response to said radio signal. Display means for
signal.
intrusion has occurred in response to said output
I
CHAPTER2: TOOLS and COMPONENTS
Core Features
1. nanoWatt TECHNOLOGY
The P|C18F26K22 incorporates a range of features that can significantly reduce power
consumption during operation.
o Multiple ldle Modes: The controller can also run with its CPU core disabled but the
peripherals still active. In these states, power consumption can be reduced even further, to as
ittf e as 4/o of normal operation requirements.
f
o On-the-fly Mode Switching: The power managed modes are invoked by user code during
operation, allowing the user to incorporate power saving ideas into their application
softwaredesign.
. Low Consumption in Key Modules: The power requirements for both Timerl and the
Watchdog Timer are minimized.
Besides its availability as a clock source, the internal oscillator block provides a stable
reference source that gives the microcontroller additional features for robustoperation:
o Fail-Safe Clock Monitor: This option constantly monitorsthe main clock source against
areference signal provided by the LFINTOSC. lf a clock failure occurs, the controller is
switched tothe internal oscillator block, allowing for continued operation or a safe
application shutdown.
o to serve as the clock source
Two-Speed Start-up: This option allows the internal oscillator
from Power-on Reset, or wake-up from Sleep mode, until the primary clock source is
available.
r
Vss 21
->
RA7 --+ I 2A Vnn
RA6 <- 10 19 <- V,SS
APPTICATIONS
2.SecuritY APPlications.
3.Sensor Monitoring.
4. GPRS Mode Remote Data Logging'
FEATURES
Serial Cable provided has following pins connected with RS232 level (+12V / -tzVl output
To use with a PCserial port, use a serial cable of male-female type with pins 2, 3, 5 connected
to 2,3,5 straight (no cross over cable).
SAMPTE CODE FOR INTERFACING WITH MICRO CONTROTTER FOR SENDING SMS
12x
x14
11 ;)
13
---
-
Connect MCU TXD/RXD through MAX232 so that MCU can communicate with GSM Modem.
Then use following reference code to send SMS. Before going ahead with MCU interfacing, it is
best practice to first try all these commands with PC with the use of Terminal software. Then
make a note of all AT commands and then proceed with development.
void moin}
{
initADc0; // setup ADC
serialtnit}; // setup 9600 s;eriol communicotion
while(7)
{
printf("AAn");
delayms(2000); // Z sec delay
p ri ntf (" AT+C M G F = 7\n " ) ;
deloyms(20Cf); // Z sec delay
p ri ntf( " AT+C M G S=\" 09 8 2 5 I 5 I 509 \ "\n" ) ;
delayms(20M); // Z sec deloY
printf ("CH#7=%bu ", getADC(l)); // sends ADC volue osSMS
putchar(25); // ctrt-z indicotes end of sMS and tronsmit
messoge
deloyms(2000); // 2 sec delay
]
].
2.3 MAX-232
The MAX232 is an integrated circuit that converts signals from an RS-232 serial port to
signals suitable for use in TTL compatible digital logic circuits, so that devices works on TTL logic
can share the data with devices connected through Serial port (DB9 Connector).
2.4 RS-232
This is a plug and play GSM Modem with a simple to Interface serial interface. Use it to
send SMS, make and receive calts, and do other GSM operations by controlling it through
simple AT commands from micro controllers and computers. lt uses the highly popular SlM300
module for all its operations. lt comes with a standard RS232 interface which can be used to
easily interface the modem to micro controllers and computers.
10
2.5.21R Sensor
Infrared radiation is the portion of electromagnetic spectrum having wavelengths longer
than visible light wavelengths, but smaller than microwaves, i.e., the region roughly from
0.75pm to 1000pm is the infrared region. Infrared waves are invisible to human eyes' The
wavelength region of 0.75pm to 3pm is called near infrared, the region from 3pm to 6pm is
called mid infrared and the region higher than 6pm is called far infrared. (The demarcations are
not rigid; regions are defined differently by many).
'
Fig 6: lRSensor
2.6 BUZZER
Buzzer is a device used for beep signal. This will help us to make understand information
or message. A buzzer is usually electronic device used in automobiles, household applications
etc.
Fig 7: Buzzer
It mostly consists of switches or sensors connected to a control unit that determines if and
which button was pushed or a preset time has lapsed, and usually illuminates a light on
appropriate button or control panel, and sounds a warning in the form of a continuous or
intermittent buzzingor beeping sound. Initially this device was based on an
electromechanical system which wasidentical to an electrical bell without the metalgong.
Often these units were anchored to a wall or ceiling and used the ceiling or wall as a sounding
board. Another implementation with some AC-connected devices was to implement a circuit
to
make the AC current into a noise loud enough toderive a loudspeaker and hook this circuit to a
11
cheap 8-ohm speaker. These buzzers do not makea sound or turn on a light, they stop a
exit and
nearby digital clock, briefly fire two smoke cannons oneach side of the stage
open the exit. However, at the end of the Heartbreaker in Viking,the buzzer
is replaced with
a sword that, when removed, Causes two contacts to touch, closingthe circuit and
causing the latter two actions above to occur.
lighting,
Light-emitting diodes are used in applications as diverse as replacements for aviation
as in traffic
automotive lighting (particularly brake lamps, turn signals and indicators) as well
and extreme
signals. The compact size, the possibility of narrow bandwidth, switching speed,
while
reliability of LEDs has allowed new text and video displays and sensors to be developed,
their high sw1ching rates are also useful in advanced communications technology. Infrared
LEDs are also used in the remote control units of many commercial
products including
televisions, DVD players, and other domestic appliances'
T2
rectifier output. They are also widely used as coupling capacitors in circuits where AC shouldbe
conducted but DC should not. There are two types of electrolytic; aluminum and tantalum'
SJructure of a Caoacitor
A capacitor contains two conductor plates which are generally made of metal and an
insulatorbetween them. This insulator also known as dielectric is made up of material like
paper,plastic, ceramic or glass. The two plates are electrically connected to the external circuit
withthe help of two thin metal rods also known as the legs of the capacitor. These two
plates
are used to store charge between them. One is connected with positivevoltage and other one
with negative voltage. A capacitor is characterized by the parametercapacitance. Capacitance is
measured as ratio of difference of charges between the plates andtotal voltage drop between
the plates.
C = de/dV
The unit of capacitance is FAMD.
Fig 9 : Capacitors
2.9DlODE
The diode is a p-n junction device. Diode is the component used to control the flow of
the current in any one direction. Thediode widely works in fonrard bias.DiodeWhen the current
flows from the p to N direction. Then it is in fonrvard bias. The Zenner diode is used in reverse
bias function i.e. N to p direction. Visually the identification of the diode's terminal can be done
13
by identifying he silver/black line. The silver/black line is the negative terminal (cathode) and
the other terminal is the positive terminal (cathode)
Fig 10 : Diode
z.to RESISTORS
The 1ow of charge through any material encounters an opposing force similar in many
respects to mechanical friction. This opposing force is called resistance of the material .in some
electric circuit resistance is deliberately introduced in form of resistor. Resistor used fall in
three categories , only two of which are color coded which are metal film and carbon film
resistor .the third category is the wire wound type ,where value are generally printed on the
vitreous paint finish of the component. Resistors are in ohms and are represented in Greek
letter omega, looks as an upturned horseshoe. Most electronic circuit requires resistors to
make them work properly and it is obliviously important to find out something about the
different types of resistors available. Resistance is measured in ohms; the symbol for ohm is an
omega ohm. 1 ohm is quite smallfor electronics so resistances are often given in kilo ohm and
Mega ohm. Resistors used in electronics can have resistances as low as 0.1 ohm or as high as 10
Mega ohm.
tr
Fig II :Re sistor
FUNCTION
Resistor restricts the flow of electric current, for example a resistor is placed in series with
light-emitting diode (LED) to limit the current passing through the LED.
L4
2.L1. CRYSTAL
__
t:::: ii:i:: i:: l'=i i ii il lii ili: i iil:lit:i i:l; i'ii:il:ii
:
i,ii i: iili
: 1l il;- : -,- :: i : : : : : : ii:,:;l;r:1 ;':
:i 5;i :: : l;;" *,,r.r
:
: :
::l :;;;:i:;::
ri.'-u,
::;::: ::;:
:::;: :i::i: :::il:i i:; ;:l;:;i:: ::!i;:::::
: I : :: :: :
'
I I : : :; : l: : ; I i :: : . :: : ; :: I .i i; : i : i i i : :iitllf :*
FigL2: Bread Board
Tousethebreadboard,thelegsofcomponentsareplacedintheholes'Eachsetofholes
connected by a metal strip underneath forms a node'
A node is a point in a circuit where two
components are formed by putting
components are connected. connections between different
their legs in a common node.
The long top and bottom row of holes are usually used
for power supply connections' The rest
them together with jumper wires'
of the circuit is built by placing components and connecting
lcs are placed in the middle of the board so that half of
the legs are on one side of the middle
line and half on the other.
15
Bread boarding tiPs:
that one can debug it and
It is important to breadboard a circuit neatly and systematically, so
get it running easily and quickly. lt also helps when someone else needs to
understand and
inspect the circuit' Here are some tips:
Pov.,er the chips from the side-lines
1. Always use the side-lines for power supply connections.
and not directly from the power supply.
power connections'
2. Use black wires for ground connections (0V), and red for other
the board does not look cluttered'
3. Keep the jumper wiies on the board flat, so that
makes changing the chips
4. Route jumper wires around the chips and not over the chips. This
when needed easier.
and LEDs, so that they fit in
5. you could trim the legs of components like reiistors, transistors
snugly and do not get pulled out by accident'
16
2.l4PICKit 3 BURNER
P|CkitisafamilyofprogrammersforPlCmicrocontro|lersmadebyMicrochip
Technology. They are used to program and
debug microcontrollers' as well as program
EEPRoM.Somemode|salsofeaturelogicanalyzerandseria|communications(UART)too].The
PlCkit use a mailing list for collaboration'
people who develop open-source software for the
of the Plckit 2 with the
Pickit3MicrochiphasgoneontomanufacturethePlCkit3,avariation
lt features a faster 16-bit P\C}4F Processor and
a
same form factor and a new translucent case.
the
complaints of it not being as reliable as
wider voltage regulation range' There are some
Prckit 2.
voltage regulators' This allows them' in
Both Plckit 2 and Plckit 3 have internal, switch-mode
2'5 to 5 volts' or in the case of the Plckit 3'
the case of the Plckit 2, to generate voltages from output
2.5 to 5.5 volts, from 5V USB, at around
100mA' Both have options for calibrating the
for some Plcs, the MCLR programming
with a multimeter, for increased accuracy. Additionally, the flash
volts. ThiS voltage is required to reprogram
voltage can be generated, at around 13-14
memory.
T7
2.!5. RELATED STUDIES
18
For all modes of EUSART operation, the TRIS control bits corresponding to the R)fi/DTx and
TXx/CKx pins should be set to '1'. The EUSART control will automatically reconfigure the pin
from input to output, as needed. When the receiver or transmitter section is not enabled then
the corresponding RXx/DTx or TXx/CKx pin may be used for general purpose input and output.
RXxrDTx ph
FCReGx ReglsEr
19
2.!5.2: TIMER FUNCTION
features:
The Timer0 module
incorporates the following
Softwareselectab|eoperationasatimero,..oun*,inboth8-bitandl6.bitmodes.
registers'
Readable and writable
programmable pre-scalar'
Dedicated 8-bit, software
Selectablec|ocksource(internalorexternal)
o Edge select for external
clock
o lnterruPt-on-overflow
TheADCcangenerateaninterruptuponcompletionofaconversion.Thisinterruptcan
be used to wake-up
the device from Sleep'
1. AT
2. 0x0d
3. AT+CMGF=1
4. AT+CMGS =" <Mobile N u mbe r>"
5. Type message to send
6. cTRL+z (25)
2T
CHAPTER 3: PROPOSED MODEL
Here, the sensors senses the intrusion and this intrusion sensed in informed to the
are set of programs'
microcontroller through the required operations done, which
sensors it alerts through
When the microcontroller receives information from the
indicators are the LEDs which glow in
indicators as well as through the GSM module. Here the
and Buzzer alarm at the room so
different colors according to the condition of the seriousness
that it can alert the neighbors.
programmed GSM SIM about the
The GSM module sends a text message to the
Here different sensor senses different
intrusion as per the text message written at the program.
intrusion'
intrusion and the GSM also sends the according to the sensed
22
Receive
Nlessage
Q"anrl
Mess age Micro-
Required
It
\/
lndicators
4.ICIRCUIT DIAGRAM:
VDD
R7 ,A.
^ 4.7K . 1X4
*r iietRvPPrRE3 RBz
*L
'6
RAO
RAI
Rg6
RB5
RAz RB4
RA3 RB3
HAq HBe
RAs
itI
RBt
Vss RBo
RA7 VDD
r: Y1
8.00il1H2
RA6
RCO
RCr
v$$1
RC7
RC6
roK
VDD
RC2 RCs R5
RT RC3 RC4
24
+5v
lMohm
olp
AN3
2N2222
100ohm
--
-l
Asthemicrocontro|lerwillbecontinuous|ymonitoringtheAna|ogpinAN3andfetching
signalson|yfromthatpin,soitisrequiredtof|ip-f|opthecircuittoon|ypasson|yonesigna]ata output
used two nPn transistors to ground the
time or interval. so in the above figure we have
input in the microcontroller'
of other when itself is conducting feeding as
25
+5v
olP
Fire $ensor
14V AC
23OAC
N4007
Fig Powersupplywith5Vvoltageregulator
get Dc voltage from the
AC
bridge rectifier to
a full
we had impremented to the Voltage
rn the above figure
of the trri itiogt rectifier is fed as input
(230V) transformer. in" output
of OC 5V' Later whose
output is fed to the
Regulator LM7805
to get constant Oo*"' 'uOOtV
microcontrol|eras5V(Dc)constantpowersupply.
26
Pseudo code
1. Begin:
2. Define MACRO:
2.L.|nc|udeheaderfileforstdio
2.2.lncludeheaderfileforstdlib
2.3.|ncludeheaderfi|eforPlc18F26K22
z.4.Configure FOSC to HSMP
2.5. Configure WDTEN to
OFF
ADCONObitS.ADON =ti
ADCON1bits.PVCFG = 00i
ADCON1bits.NVCFG = 00i
ADCON2bits.ACQT =5i
ADCON2bits.ADCS =4i
PlRlbits.ADlF = 0;
ADCON2bitS.ADFM = O;
ADCONObits.GO = Li
)
3.4.Define function for TIMERO
- void TlMER00
27
T0CONbits.TOSBlT- 0;
T0CONbits.TOCS - 0;
TocoNbits.ToPs = 4;
TOCONbits.TMROON = t;
TOCONb|IS.PSA = O;
UIE Declaration:
4. Variable IJELICII (
to ATEO ll^t^o^',n::l"
4.!. Declare unsigned character for echo[] lllt:':l
F=L /.lfor GSM rext Mode
i.i. Slllill :H:ffi character for initializ;[] to nr+crue ,-lant nf FNTFR
,Dliilil ililffi character ror enter to 0x0D // Ascll equivalent or ENrER
i.i. Sllilll ..r r- ar, // to
^r.r,:c- // tn start
cfart sending MSG
i.i. il:iffi character for mss_startl] to Ar+cMGS= i- f^r nr rmhar
i.l. Sliiil ffi ffi crra racter ror corn a.to "" 4{.:.:..Y.'.:::iJ"i'lj::l:T:i:
.r,.,.o",. for numlr to +elxxxxxxxxxx //
number where MSG
i.'.. Blilli! :::i;ffi
will be sent // MsG which
msgl[] to "lnput from fire sensorl"
4.7. Declare unsigned character for
will be sensort!!" // MsG which
1".1tJ,1", character for mse2u
to "rnput from rR
l::: l"J.l]r:
will be sent for second sensor to oxLA llASCIl for crRL+Z
terminatefl
4.1. Declare unsigned character for
28
end if
else if(a==2)
then
Select Analog Pin RA3
a=J
flag = t
end else if
call delaY$
if(timer flag is set)
then
set Analog flag as 0
if(flag is 0)
then
|f(ADRESH is 0)
then )
forfi=g to i<=l)
call delaYfl 'r
send echoffl to TX1
call delaY0
end of for looP
send enter to TX1
29
for(j=g to j<=221-
call delaY0
send msgl[jl to TX1
call delaYfl
end of for looP
send terminate to TXt
call delay$
end if
end if
if(flag is 1)
then
if(ADRESH is 0)
then
forfi=g to j<=31
call delay0
send echoffl to TX1
call delayfl
end of for looP
send enter to TX1
forfi=g to j<=91
call delaY$
send initializeUJ toTXl
call delaYfl
end of for looP
send enter to TX1
call delaYfl
for(j=g to j<=71
call delay0
send msg-start[j] to TX1
call delaY$
end of for looP
send coma to TX1
call delayfl
forfi=g to j<= I2l
call delay$
send numUl to TX1
call delay$
end of for looP
send coma to TX1
call delayfl
send enter to TX1
call delaY$
for(j=g to j<=221
call delayfl
30
send msg2[J to TX1
call delay$
end of for looP
send terminate to TX1
call delaY$
end if
end if
Set TIMER0 flag to 0
end if
Analoe GObits to 1
31
CHAPTER 5: CONCLUSION
controlled
accessible' auto-configurable' remotely
ln this project low cost, secirre, ubiquitously in the proiect is
been introduced' The approach discussed
solution for automation of homes has sMS-based system
home appliances remotely using the
novel and has the target to control proved to be
technology capable solution has
satisfying user needs and requirements.GsM to the previously
and is cost-effective as compared
controiled remotery, provide home security level of home
methods of home security' The basic
existing systems, which are traditional is extensible and
has been implemented' The system
appliance control and remote monitoring so that solution
using LGP gas deteCtOrS' smoke detector
more levels can be further developed the
with the send other detection systems' Hence we can conclude that
can be integrated using an
goals and objectives of our project have is to safeguard our home appliances
required
automated system.
32
CHAPTER FUTURE SCOPE
can be implemented
for easv customization'
o :ffi.T*:ttn,"n..", A keypad and a LCD at the LcD'
il ;;Jit;"rbv the users bv looking
.r"
rhe GSM stM number registered
33
REFERENCES:
34