Design and construction of anti-theft system via phone - 2

Figure 1.1. Overview diagram of a warning system. 3

Figure 1.2. Protection area of ​​body temperature sensor 4

Figure 1.3. Some commonly used sensors today 6

Figure 1.4. Geographical structure of GSM 11 network

Figure 1.5. GSM system model. 12

Maybe you are interested!

Figure 1.6. Structure of BSS base station. 14

Figure 1.7. Location and function of TRAU. 15

Figure 1.8. Call processing function of MSC 17

Figure 1.9. Some popular types of Arduino today 21

Figure 1.10. Actual Arduino UNO board 21

Figure 1.11. Hardware of Arduino UNO board. 22

Figure 1.12. Refer to the functions of the Arduino UNO R3 pins. 25

Figure 1.13. Arduino IDE programming software. 26

Figure 1.14. Arduino IDE software interface. 26

Figure 1.15. Software command area. 27

Figure 1.16. Basic structure of a data frame. 28

Figure 1.17. SIM800L module pin diagram 28

Figure 1.18. Infrared obstacle sensor E18-D80NK. 30

Figure 1.19. Schematic diagram of infrared sensor E18-D80NK. 31

Figure 1.20. 1-channel 5V relay module. 32

Figure 1.21. 16x2 LCD screen. 33

Figure 1.22. Structure in each transaction. 34

Figure 1.23. Starting conditions. 34

Figure 1.24. Termination condition. 35

Figure 1.25. Mater device sends start condition to all Slaves. 36

Figure 1.26. Slaves compare the address sent by the Master. 36

Figure 1.27. Master device sending or receiving data frames. 37

Figure 1.28. Slave device successfully receives data frame. 37

Figure 1.29. Master device sends stop condition, ending data transmission. 38

Figure 1.30. Buzzer. 38

Figure 1.31. Led bulb. 39

Figure 2.1. Working diagram of the burglar alarm system. 40

Figure 3.1. System block diagram 41

Figure 3.2. 5VDC adapter charging source. 42

Figure 3.3. Central processing unit 42

Figure 3.4. Sensor block 43

Figure 3.5. Remote alarm block 43

Figure 3.6. On-site alarm block 44

Figure 3.7. Display block 44

Figure 3.8. Schematic diagram of the entire system 45

Figure 4.1. Printed circuit board of the system. 47

Figure 4.2. Bottom layer 3D PCB circuit. 47

Figure 4.3. Top layer 3D PCB circuit. 47

Figure 4.4. Bottom layer circuit board. 49

Figure 4.5. Upper layer circuit board. 49

Figure 4.6. System model when not in operation. 50

Figure 4.7. Model of the alarm calling system when there is an intrusion. 50

1. Reason for choosing the topic

INTRODUCTION

As we know, recently the theft has become more and more common and sophisticated in Vietnam. Theft cases not only cause great damage to the property of families and agencies, but also create anxiety for many people, affecting social order and safety. After a series of incidents and recommendations from authorities, many families have taken measures to increase the installation of burglar alarms for their families. However, these measures sometimes do not have much effect.

From those practical requirements, the increasingly high demands of life, combined with the strong development of mobile networks, I chose the topic "Design and construction of anti-theft system via phone" to meet the need for remote monitoring and control by mobile phone, contributing to maintaining order and security of the family and society.

2. Research objectives and tasks

Target

"Anti-theft system via phone" will detect intrusions from the outside and then warn us in time to come up with the most effective solutions. The project uses a microcontroller as the central processor, infrared sensors detect signs of intrusion. Along with some output devices such as sound (bell, siren), by light signal (light), SIM Module receives signals from the center and sends notification messages to

manager to promptly handle when a break-in occurs.

Research mission

The topic focuses on researching the following issues:

- Research burglar alarm systems on the market.

- Study the components of the burglar alarm system.

- Learn about sensors and modules.

- Distinguish between types of sensors, understand sensor parameters such as: range, operating distance, supply voltage, etc. From there, make appropriate choices to put into use in the model.

- Learn about mobile networks.

- Design of burglar alarm circuit via phone.


3. Research object and scope

Object

- Research on burglar alarm systems.

- Research on infrared sensor devices and sim modules.

- Research on the components in the circuit.

Scope of research

- Theoretical study of components in burglar alarm systems.

- Theoretical research on sensor types.

- Theoretical research on GSM mobile communication network.

4. Research methods

Using methodology to leak topic content:

- Collect and analyze documents related to the topic.

- Study the components in the burglar alarm system.

- Learn about GSM mobile network.

- Research and analyze burglar alarm systems via phone.

5. Predict the results

The system will alarm when detecting an intrusion and immediately call or text the pre-set phone number to alert the owner to take action, and will also alert on-site with sound (buzzer) and light (LED bulb).

6. Scientific and practical significance

The topic helps me grasp the knowledge of the burglar alarm system combined with the GSM mobile information network. The topic is highly practical and widely applied in life. Not only agencies, businesses but also households commonly use it.

7. Layout content

CHAPTER I: THEORETICAL BASIS

CHAPTER II: ANALYSIS OF WORKING PRINCIPLE CHAPTER III: SYSTEM CALCULATION AND DESIGN CHAPTER IV: SYSTEM CONSTRUCTION

CHAPTER V: RESULTS ACHIEVED, COMMENTS AND EVALUATION


CHAPTER I: THEORETICAL BASIS

1.1. OVERVIEW OF THE WARNING SYSTEM

1.1.1. Introduction to the warning system

In the past, when talking about security protection and anti-burglary, we often thought of hiring security guards or raising dogs to protect the house... Nowadays, with the development of technology and digital electronics, people have created new inventions in the field of burglar alarms, they are diverse and widely applied in life.

In principle, a warning system consists of three main parts: sensors, central processor and warning devices.

Sensors are sensors that collect signals and then send them to the central processor. There are many types of sensors such as: smoke sensors, magnetic sensors, heat sensors, infrared sensors, optical sensors, sound sensors, etc.

The central processor is the part that receives information from the sensor and then processes it. Depending on the programmer, it will give different processing when receiving signals. Most of the processing of the central processor is given to warning devices to notify the user of the situation.

Warning devices are usually: speakers, horns, telephones, indicator lights, etc.


Figure 1.1. Overview diagram of a warning system.


1.1.2. Protection zone

The concept of “protection zone” of the warning system is simply understood as the volume within which the warning components create an intrusion detection protection by emitting infrared beams, ultrasonic waves, etc., creating a protected space.

The size and shape of the protected area vary with the layout, arrangement and depends on the characteristics and scanning width of the sensor.

Protection area of ​​infrared body temperature sensor


Figure 1.2. Protection area of ​​body temperature sensor

Depending on each type of sensor, there are different parameters such as scanning angle, maximum scanning distance, detection temperature and size.

Some notes to get the best protective observation area:

Avoid air conditioning, heaters, and places with changing temperatures.

Should be installed in rooms with few obstacles to get the best scanning range.

It is necessary to adjust the position, angle, and height appropriately to have the widest scanning area.

Avoid placing the device directly opposite and parallel to the direction of movement, as this will make the sensor less sensitive to movements parallel to the scanning beam.

1.2. OVERVIEW OF SENSORS

1.2.1. Sensor concept

Sensors are devices used to sense and convert physical quantities and non-electrical quantities that need to be measured into physical quantities with electrical properties such as: resistance, charge, voltage.


Information is processed to extract qualitative or quantitative parameters of the environment, serving the needs of scientific and technical research or civil life and is briefly called measurement, serving in information transmission and processing, or in controlling other processes.

Sensors are usually placed in protective housings that form a probe, possibly with supporting circuits, however in many documents the term sensor is rarely used for large objects.

The measured quantities (M) usually do not have electrical properties (such as temperature, pressure, weight, ...) acting on the sensor, giving us a characteristic quantity (S) with electrical properties (such as voltage, charge, current or impedance) containing information that allows determining the value of that quantity.

Conversion equation of the sensor:

S = F(M)

Where (S): output quantity or response of the sensor. (M): input quantity or stimulus

(F): depends on the structure and material of the sensor

Active sensors do not use additional power to convert to electrical signals, this type of sensor acts as a generator, responding to charge, voltage or current. Active sensors are manufactured based on the application of physical phenomena that convert a certain form of energy (heat, light, mechanical, radiation, ...) into electrical quantities.

Passive sensors use additional electrical energy to convert into an electrical signal, this type of sensor acts as an impedance in which the response is resistance, inductance or capacitance. Passive sensors are usually made from an impedance whose parameters are mainly sensitive to the quantity to be measured. The value of the impedance depends on the size, electrical properties of the material (such as resistivity p, permeability μ, dielectric constant ε) so the measured quantities can affect the size, electrical properties or both at the same time.


Some types of sensors commonly used today.


Figure 1.3. Some commonly used sensors today.

A sensor is used when it meets certain technical criteria:

Sensitivity: the smallest detectable increment.

Linearity: the transformed value range has a fixed transformation coefficient.

Transformation range: the range of usable transformation values.

Adverse effects: the ability to cause environmental changes.

Noise level: specific noise and the effect of the agent on the results.

Determination error: depends on sensitivity and noise level.

Drift; the change in parameter over service time or lifetime.

Latency: the degree of responsiveness of the process to changes.

Reliability: ability to work stably, withstand large environmental fluctuations.

Environmental conditions: temperature range, humidity, pressure, ... can work.

There is a relativeness in the criteria depending on the field of application. For sensors in digital devices, i.e. logic sensors, linearity does not have much meaning.

Comment


Agree Privacy Policy *