Preview

Gsm Based Home Alarm System

Better Essays
Open Document
Open Document
2286 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Gsm Based Home Alarm System
GSM based Security System using LabVIEW
Hasan Baig1, Muhammad Owais1, Muhammad Saleheen Aftab1, Kamran Shamim1 and Hamza Azeem2
Department of Electronic Engineering
NED University of Engineering & Technology, 2PAF KIET, Pakistan.
(hasan.baig, ovaisbabai, saleheen2006, kamranshamim, hamzaazeem)@hotmail.com
1

Abstract- The purpose of this paper is to introduce an efficient, reliable and cost-effective security system for use at homes, offices, schools, and shops. The system automatically reports intrusion by making a call to a target mobile phone. Thus, the reporting mechanism is based on
Global System for Mobile (GSM) and the logic is designed using LabVIEW.
Keywords: Security System, LabVIEW, GSM, Infrared.

II. HARDWARE
Infrared transmitter-receiver has been used to detect the obstruction in infrared beam. Transmitter is placed at one end and receiver is placed at a distance (according to its range) exactly in the line of sight of transmitter at the other end. The basic component of transmitter is LM555 which generates the desired frequency to be transmitted to receiver.

I. INTRODUCTION
A. Transmitter
One of the biggest demerits of the development in the field of technology is the innovative techniques and ideas that are being introducing for illusory purposes. These imperfections of on going technology should be prevented through the inventions to hinder such types of criminal or illegal activities.
This project is one of such campaigns which are taking part to guard the areas that need a lot of security.
The theme of this model is illustrated in Fig. 1. The figure shows the whole system comprises of two sections. First one is Hardware and the second one is Software (Computer).
Hardware section senses the interruption in infrared beam and generates a HIGH voltage level which in turn provided to the computer via LPT (Line Printing Terminal). This condition is detected by logic, programmed on LabVIEW causing the computer to



References: [1]. Thomas L. Floyd, Electronic Devices, Pearson Education, 2002. [2]. Infrared receiver Modules, www.vishay.com. [3]. Robert H. Bishop, Learning with LabVIEWTM 7 Express, Pearson Education, 2005. [4]. National Instruments, www.ni.com.

You May Also Find These Documents Helpful

  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    There are some software’s that you cannot trust with a security computer systems software and hardware. Which different types of computer systems that can resulted in many possibility and use it very limited. Because ones approached with computer systems can always lead them to failure. Computer designing which often has hardware techniques are used to effective the security after they are design. The approach of the techniques and using the techniques security systems is having the effective of the design in the computer systems. The technique is to enforce the computer design principle and provide them with the function they need to attack and gain access to the program then need.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Wise Group Solutions offers the security of engaging with a service provider possessing a 30…

    • 401 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Not everyone needs to have a sophisticated home security system, but many feel better and are better able to sleep at night if they have what makes them feel safe. Your need for a security system depends on where you live, the style of your home, and even your past history with problems. Some find that a simple alarm system is all that they need to have, but others want to have something more. If you fall into the group that needs something more, a home surveillance system complete with visual aids may be what you seek.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Power Line Carrier System

    • 3929 Words
    • 16 Pages

    This is to certify that the Practical Training Seminar report on “Topic Name” at IRPMU (Satellite Hub Centre), Railways, Delhi from 13th May 2010 to 15th June 2010 is submitted by Miss Monalisa Dhall (07EAIEC302) in partial fulfillment for the award of degree of Bachelor of Technology in Electronics & Communication Engineering has been found satisfactory and is approved for submission.…

    • 3929 Words
    • 16 Pages
    Good Essays
  • Good Essays

    It is quite obvious that a poultry animal cannot incubate as many eggs as needed for industrial production, therefore, through this project, as little as 50 eggs can be incubated at a time and with a bigger construction as…

    • 3791 Words
    • 16 Pages
    Good Essays
  • Better Essays

    Free Space Path Loss Model

    • 1173 Words
    • 5 Pages

    Path loss models play a vital role in planning of wireless communication systems. They represent a set of mathematical equations and algorithms that are used for radio signal propagation prediction in certain areas. Propagation path loss models are used for calculation of electromagnetic field strength for the purpose of wireless network planning during preliminary deployment. Path loss model describes the signal attenuation from transmitter to receiver antenna as a function of distance, carrier frequency, antenna heights and other significant parameters like terrain profile (urban, suburban and rural). In this section various path loss models are discussed.…

    • 1173 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    GSM BASED VEHICLE THEFT SYSTEM What is GSM? • GSM stand for GLOBAL SYSTEM FOR MOBILE COMMUNICATION developed European Telecommunications Standards Institute (ETSI) to describe protocols for second generation ( 2G) digital cellular networks used by mobile phones. • The GSM standard was developed as a replacement for first generation (1G) analog cellular networks, and originally described a digital, circuit-switched network optimized for full duplex voice telephony.…

    • 352 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Microcontrollers

    • 1522 Words
    • 7 Pages

    2) Trigger: The trigger signal for starting the transmission is given to this pin. The trigger signal must be a pulse with 10uS high time. When the module receives a valid…

    • 1522 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    gprs

    • 670 Words
    • 3 Pages

    GRPS-Based Distributed Home-Monitoring Using Internet-Based Geographical Information System A. R. Al-Ali, Imran A. Zualkernan, Assia Lasfer, Alaa Chreide, and Hadel Abu Ouda Abstract — Recent developments in publically available webbased Geographical Information Systems (GIS) and the availability of low-cost integrated General Packet Radio Service (GPRS)/Global Positioning Systems (GPS) modem have enabled the development of embedded stand-alone home monitoring systems. This paper presents the design, implementation and testing of a home-monitoring system that utilizes online Map from a GIS in conjunction with the readily available public satellite-based GPS, and GPRS mobile networks. In addition to detecting intruders, the system allows a home owner to remotely monitor various critical home sensors status including those tied to fire, flooding, and gas leaks.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Gsm Based Notice Board

    • 19325 Words
    • 78 Pages

    Notice Board is primary thing in any institution / organization or public utility places like bus stations, railway stations and parks. But sticking various notices day-to-day is a difficult process. A separate person is required to take care of this notices display. This project deals about an advanced hi-tech wireless notice board.…

    • 19325 Words
    • 78 Pages
    Powerful Essays
  • Powerful Essays

    The Piper classic home security system allows you to view an entire room whether large or small. It combines monitoring, security and full automation for your home. It is easy to set up, comes with very loud siren alerts as well as two-way audio for extra security and comfort. However, it doesn't not have any web based app and is not backed by satisfactory customer service…

    • 1212 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Abstract—Hypertension and arrhythmia are chronic diseases, which can be effectively prevented and controlled only if the physiological parameters of the patient are constantly monitored, along with the full support of the health education and professional medical care. In this paper, a role-based intelligent mobile care system with alert mechanism in chronic care environment is proposed and implemented. The roles in our system include patients, physicians, nurses, and healthcare providers. Each of the roles represents a person that uses a mobile device such as a mobile phone to communicate with the server setup in the care center such that he or she can go around without restrictions. For commercial mobile phones with Bluetooth communication capability attached to chronic patients, we have developed physiological signal recognition algorithms that were implemented and built-in in the mobile phone without affecting its original communication functions. It is thus possible to integrate several front-end mobile care devices with Bluetooth communication capability to extract patients’ various physiological parameters [such as blood pressure, pulse, saturation of haemoglobin (SpO2 ), and electrocardiogram (ECG)], to monitor multiple physiological signals without space limit, and to upload important or abnormal physiological information to healthcare center for storage and analysis or transmit the information to physicians and healthcare providers for further processing. Thus, the physiological signal extraction devices only have to deal with signal extraction and wireless transmission. Since they do not have to do signal processing, their form factor can be further reduced to reach the goal of microminiaturization and power saving. An alert…

    • 3479 Words
    • 14 Pages
    Powerful Essays

Related Topics