Preview

Gsm Based Home Alarm System

Better Essays
Open Document
Open Document
2286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gsm Based Home Alarm System
GSM based Security System using LabVIEW
Hasan Baig1, Muhammad Owais1, Muhammad Saleheen Aftab1, Kamran Shamim1 and Hamza Azeem2
Department of Electronic Engineering
NED University of Engineering & Technology, 2PAF KIET, Pakistan.
(hasan.baig, ovaisbabai, saleheen2006, kamranshamim, hamzaazeem)@hotmail.com
1

Abstract- The purpose of this paper is to introduce an efficient, reliable and cost-effective security system for use at homes, offices, schools, and shops. The system automatically reports intrusion by making a call to a target mobile phone. Thus, the reporting mechanism is based on
Global System for Mobile (GSM) and the logic is designed using LabVIEW.
Keywords: Security System, LabVIEW, GSM, Infrared.

II. HARDWARE
Infrared transmitter-receiver has been used to detect the obstruction in infrared beam. Transmitter is placed at one end and receiver is placed at a distance (according to its range) exactly in the line of sight of transmitter at the other end. The basic component of transmitter is LM555 which generates the desired frequency to be transmitted to receiver.

I. INTRODUCTION
A. Transmitter
One of the biggest demerits of the development in the field of technology is the innovative techniques and ideas that are being introducing for illusory purposes. These imperfections of on going technology should be prevented through the inventions to hinder such types of criminal or illegal activities.
This project is one of such campaigns which are taking part to guard the areas that need a lot of security.
The theme of this model is illustrated in Fig. 1. The figure shows the whole system comprises of two sections. First one is Hardware and the second one is Software (Computer).
Hardware section senses the interruption in infrared beam and generates a HIGH voltage level which in turn provided to the computer via LPT (Line Printing Terminal). This condition is detected by logic, programmed on LabVIEW causing the computer to



References: [1]. Thomas L. Floyd, Electronic Devices, Pearson Education, 2002. [2]. Infrared receiver Modules, www.vishay.com. [3]. Robert H. Bishop, Learning with LabVIEWTM 7 Express, Pearson Education, 2005. [4]. National Instruments, www.ni.com.

You May Also Find These Documents Helpful

  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Wise Group Solutions offers the security of engaging with a service provider possessing a 30…

    • 401 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Not everyone needs to have a sophisticated home security system, but many feel better and are better able to sleep at night if they have what makes them feel safe. Your need for a security system depends on where you live, the style of your home, and even your past history with problems. Some find that a simple alarm system is all that they need to have, but others want to have something more. If you fall into the group that needs something more, a home surveillance system complete with visual aids may be what you seek.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Free Space Path Loss Model

    • 1173 Words
    • 5 Pages

    Path loss models play a vital role in planning of wireless communication systems. They represent a set of mathematical equations and algorithms that are used for radio signal propagation prediction in certain areas. Propagation path loss models are used for calculation of electromagnetic field strength for the purpose of wireless network planning during preliminary deployment. Path loss model describes the signal attenuation from transmitter to receiver antenna as a function of distance, carrier frequency, antenna heights and other significant parameters like terrain profile (urban, suburban and rural). In this section various path loss models are discussed.…

    • 1173 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Gsm Based Notice Board

    • 19325 Words
    • 78 Pages

    Notice Board is primary thing in any institution / organization or public utility places like bus stations, railway stations and parks. But sticking various notices day-to-day is a difficult process. A separate person is required to take care of this notices display. This project deals about an advanced hi-tech wireless notice board.…

    • 19325 Words
    • 78 Pages
    Powerful Essays
  • Powerful Essays

    The Piper classic home security system allows you to view an entire room whether large or small. It combines monitoring, security and full automation for your home. It is easy to set up, comes with very loud siren alerts as well as two-way audio for extra security and comfort. However, it doesn't not have any web based app and is not backed by satisfactory customer service…

    • 1212 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    gprs

    • 670 Words
    • 3 Pages

    GRPS-Based Distributed Home-Monitoring Using Internet-Based Geographical Information System A. R. Al-Ali, Imran A. Zualkernan, Assia Lasfer, Alaa Chreide, and Hadel Abu Ouda Abstract — Recent developments in publically available webbased Geographical Information Systems (GIS) and the availability of low-cost integrated General Packet Radio Service (GPRS)/Global Positioning Systems (GPS) modem have enabled the development of embedded stand-alone home monitoring systems. This paper presents the design, implementation and testing of a home-monitoring system that utilizes online Map from a GIS in conjunction with the readily available public satellite-based GPS, and GPRS mobile networks. In addition to detecting intruders, the system allows a home owner to remotely monitor various critical home sensors status including those tied to fire, flooding, and gas leaks.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Abstract—Hypertension and arrhythmia are chronic diseases, which can be effectively prevented and controlled only if the physiological parameters of the patient are constantly monitored, along with the full support of the health education and professional medical care. In this paper, a role-based intelligent mobile care system with alert mechanism in chronic care environment is proposed and implemented. The roles in our system include patients, physicians, nurses, and healthcare providers. Each of the roles represents a person that uses a mobile device such as a mobile phone to communicate with the server setup in the care center such that he or she can go around without restrictions. For commercial mobile phones with Bluetooth communication capability attached to chronic patients, we have developed physiological signal recognition algorithms that were implemented and built-in in the mobile phone without affecting its original communication functions. It is thus possible to integrate several front-end mobile care devices with Bluetooth communication capability to extract patients’ various physiological parameters [such as blood pressure, pulse, saturation of haemoglobin (SpO2 ), and electrocardiogram (ECG)], to monitor multiple physiological signals without space limit, and to upload important or abnormal physiological information to healthcare center for storage and analysis or transmit the information to physicians and healthcare providers for further processing. Thus, the physiological signal extraction devices only have to deal with signal extraction and wireless transmission. Since they do not have to do signal processing, their form factor can be further reduced to reach the goal of microminiaturization and power saving. An alert…

    • 3479 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Power Line Carrier System

    • 3929 Words
    • 16 Pages

    This is to certify that the Practical Training Seminar report on “Topic Name” at IRPMU (Satellite Hub Centre), Railways, Delhi from 13th May 2010 to 15th June 2010 is submitted by Miss Monalisa Dhall (07EAIEC302) in partial fulfillment for the award of degree of Bachelor of Technology in Electronics & Communication Engineering has been found satisfactory and is approved for submission.…

    • 3929 Words
    • 16 Pages
    Good Essays
  • Good Essays

    It is quite obvious that a poultry animal cannot incubate as many eggs as needed for industrial production, therefore, through this project, as little as 50 eggs can be incubated at a time and with a bigger construction as…

    • 3791 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Mobile Phone Security

    • 1564 Words
    • 5 Pages

    This fact sheet has been developed for the Consumer Education Program by the Communications Commission of Kenya. It was compiled by studying material from various authoritative sources and adopting what is universally acceptable and relevant to the Kenyan situation. The fact sheet is intended to enable Consumers have a good understanding of the issues discussed and hence empower them when making decisions regarding ICT products and services. Introduction One of the biggest threats that a mobile phone user faces today is loss or theft of the phone. Not only is the mobile valued as a physical device, the phone may contain personal and financial data stored in the handset or in the phones subscriber identity module (SIM card). While a stolen SIM can be barred by a mobile network once the theft has been reported it is a bit harder to bar the handset from being used with different SIM card. Unless the user had protected his personal information with a PIN prior to the theft or loss of the phone, this data can be accessed by unauthorised persons. Mobile phone users normally store a wide range of information on their phones. This information can either be stored in the phone’s internal or external memory (depending on the make and model of the phone) or in the SIM card. The SIM card is used mainly to store contacts and short messages while the phone’s memory is used to store information such as personal photos, emails, and calendar items. In order to prevent unauthorised persons from using the phone and further gaining access to the stored information, some mobile phones have security features which the user can activate. This fact sheet has been developed to address security of the information stored and what to do should you lose the phone. Securing the information stored. There are at least two methods one can use to secure the information stored on a mobile phone. These are: a) SIM lock This method takes advantage of the SIM card…

    • 1564 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Microcontrollers

    • 1522 Words
    • 7 Pages

    HC-SR04 is an ultrasonic ranging module designed for embedded system projects like this. It has a resolution of 0.3cm and the ranging distance is from 2cm to 500cm. It operates from a 5V DC supply and the standby current is less than 2mA. The module transmits an ultrasonic signal, picks up its echo, measures the time elapsed between the two events and outputs a waveform whose high time is modulated by the measured time which is proportional to the distance. .The photograph of an HC-SR04 module is shown below.…

    • 1522 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    GSM BASED VEHICLE THEFT SYSTEM What is GSM? • GSM stand for GLOBAL SYSTEM FOR MOBILE COMMUNICATION developed European Telecommunications Standards Institute (ETSI) to describe protocols for second generation ( 2G) digital cellular networks used by mobile phones. • The GSM standard was developed as a replacement for first generation (1G) analog cellular networks, and originally described a digital, circuit-switched network optimized for full duplex voice telephony.…

    • 352 Words
    • 3 Pages
    Satisfactory Essays

Related Topics