Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

19
SMS CONTROLLED DOOR LOCK W/ IMAGE CAPTURE USING ANDROID PHONE A Thesis Proposal Presented to The Faculty of The Electrical and Electronics Engineering Department of the University of San Carlos Cebu City, Philippines In Partial Fulfillment Of the Requirements for the Degree Bachelor of Science in Electronics Engineering By Filomeno, Gil Maica Marie V. Ledon, Michelle P. Lenares, Prima Soccorro L. Engr. Baltazar Raffi ñ an Adviser Engr. Adrian Villarin i

description

Chap 1 and 2Chap 1 and 2Chap 1 and 2Chap 1 and 2Chap 1 and 2Chap 1 and 2Chap 1 and 2

Transcript of Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

Page 1: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

SMS CONTROLLED DOOR LOCK

W/ IMAGE CAPTURE USING ANDROID PHONE

A Thesis Proposal Presented to

The Faculty of

The Electrical and Electronics

Engineering Department of the

University of San Carlos

Cebu City, Philippines

In Partial Fulfillment

Of the Requirements for the Degree

Bachelor of Science in Electronics Engineering

By

Filomeno, Gil Maica Marie V.

Ledon, Michelle P.

Lenares, Prima Soccorro L.

Engr. Baltazar Raffiñan

Adviser

Engr. Adrian Villarin

Co-Adviser

August 2014

i

Page 2: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

ii

Page 3: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

Adviser’s Certification

This thesis proposal has been reviewed by the

undersigned and is certified acceptable

in content and form for proposal

hearing presentation:

_______________________

John D. Cruz, Jr., M.S.

Adviser

i

Page 4: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

Table of Contents

Title Page

Adviser’s Certification i

Table of Contents ii

Chapter 1 The Problem and Its Settings 1

1.1 Introduction1.2 Statement of the Problem1.3 Significance of the Study1.4 Scope and Limitations1.5 Definition of Terms

Chapter 2 Review of Related Literature 5

1.6 Modeling Parameters1.7 Simulation in Scilab1.8 Filtered QPSK System1.9 QPSK Modulator Baseband

Chapter 3 Methodology 11

1.1 Flow Chart1.2 System Block Diagram of a QPSK Modulator1.3 Software Tools1.4 Hardware Implementation1.5 Halfway Deliverables

Bibliography 17

Gantt Chart 19

ii

Page 5: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

Chapter 1

The Problem and Its Settings

1.1 Introduction

How secure are our houses? Security of our houses is a matter of concern to us. We have

a lot of things going on in our lives every day. Each and everyone are busy with their

own lives, their problems, responsibilities, work, school and the list goes on. Some are

busy that they forgot the security threats that come to their properties. On average, in

Manila, the indices of people worrying about house break-ins and problems on property

crimes are about 69 percent on the year 2012[1].

Table 1.1 Indices of Crime Rates in Manila, Philippines [1]

Security threats may come at a time where we least expected it especially if we forgot the

safety measures to be done when we leave our properties unattended.

There are several solutions to decrease the worries and occurrences of the said

crimes. One method is to remotely control and monitor the property with the use of 2G

technologies.  2G technologies enabled the various mobile phone networks to provide the

services such as text messages, picture messages and MMS (multimedia messages)[2].

With the use of this technology, it will help provide real-time communication with the

system and the user, where the user can remotely control the system using SMS and

monitor the area by capturing an image and send it to the users phone using MMS.

1

Page 6: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

1.2 Statement of the Problem

Leaving a house unattended poses a great risk to its security, exposing it to threats

like intruders but from time to time people leave their houses because of their daily

activities and responsibilities. Owners heighten the risk of intruders especially when they

leave their houses unlocked or not even ensuring whether it is locked or not, especially

when they are in a hurry. Since most lock today are not remotely accessible owners will

have to go back to their house to check its status, which will take time or they will just

leave it as it is.

Also leaving a house unattended means leaving its owners not knowing who come

and go to their house. Cases like, owners are expecting visitors, but they are not yet there

to let them in is also a problem because visitors will have to wait outside the house.

Thus, this study aims to develop a lock system that can be remotely accessed from

a cell phone, can help monitor if there is a person at the door and can alert the owner if

there is a forced entry. Thus, the objectives of this study are:

i) To design a lock that is remotely accessible through SMS.

ii) To design a lock that can lock, unlock and take picture if the user

commands.

iii) To design a lock that can alert the owner by means of capturing an image

and sends an MMS when there is an intrusion on the said lock.

iv) To design an interface between the GSM Module, the microcontroller, the

sensors (doorbell/knock sensors) and the cellular phone

1.3 Significance of the Study

This project is a safety device that is designed to improve monitoring and security

of households. This device allows household owners to be more vigilant of the sentinel

events that may occur. The project will provide homeowners peace of mind and

contentment, and safety with ease through the use of technology and have an easy access

and less time consumed in following up their properties’ security since they can access

2

Page 7: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

and monitor their front door locks remotely through the use of a cellular phone via SMS

and can take picture of the person who is currently at their doorstep.

This project will be useful to any property that needs security or to a private

property that cannot afford to hire security personnel and to the people who are always in

a hurry and in the midst of an emergency. In general, this project will really be useful and

helpful to the people who are concerned of the security of their houses because of the

remote accessibility of the door lock and image capturing feature.

The outcome of this project study may also be used as a reference by the ECE/EE

students in their future studies concerning home automation and security using wireless

technology.

1.4 Scope and Limitations

The study will focus on designing a lock system that can be remotely access via

SMS and in sending an MMS from the system to the user’s phone whenever there is an

intrusion.

The lock system consists of a microcontroller, an Android Smartphone, a door

lock and doorbell triggering circuit and a user’s phone. An Arduino Mega ADK board

will be used as the microcontroller which is only compatible for Android phone versions

2.3 and later. This board will be programmed using C programming language and a Java

programming language for the Android phone.

The Android Phone, which is connected with the microcontroller, will receive the

commands of the user’s mobile phone, which are to LOCK, UNLOCK and TAKE

PICTURE. The Android phone will be used to capture an image and send it using MMS

to the user’s phone. The Android Phone should have a regular balance in order to perform

transactions like sending SMS and MMS to the user’s phone. This study will use

SMART Network as the Subscriber Identity Module (SIM) for the Android Phone.

The system will alert the registered numbers if there is a forced entry on the said

lock by immediately sending an SMS and MMS to the numbers.

3

Page 8: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

The system will be programmed to only accept the commands from the registered

numbers to the system, which are the users’ numbers.

This study is limited to one door only.

1.5 Definition of Terms

Short Messaging Service (SMS) - it is a system that enables cellular phone to send and

receive text messages.

Multimedia Messaging Service (MMS) - is a standard way to send messages that

include multimedia content to and from mobile phones.

Arduino ADK- a type of microcontroller that has already a (universal serial bus) usb

interface and can be connected to android phones.

Android (Operating System) – is a Linux-based operating system for mobile phones

4

Page 9: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

Chapter 2

Review of Related Literature

In this chapter, different studies that are related to the proposed study will be

presented. The following are the summary of each different study. It has its advantages,

disadvantages and difference between the different study and the proposed study.

2.1Remote Door Lock Project

From the study of Lee-Own, Sobell, Lin and Velivis[3], they designed and

implemented a remote door lock that helps its users in two ways; first is to check the

status of the lock to make sure the user locked the door when they are away and to allow

them to remotely lock or unlock the door with a text message sent to the system from the

user’s phone. Second is when someone rings the user’s doorbell and a camera will take

the picture of the person at the door and sends an MMS to the user’s phone. The user will

then reply to the MMS sent with a text message to allow or deny them an access. The

system has several components, the server, an Ionics Plug Stratus Computer, which

interacts wirelessly with the microcontroller, wireless camera and the client’s phone. The

microcontroller is an Arduino PRO that is connected to the door lock mechanism.

This study is similar to our study since it uses the GSM Technology to control the

lock, however, the way of communication between the system and the user’s phone is

through the server or the plug computer, which uses the internet that sends the text

messages and picture messages to the user’s phone, which also receives the messages

from the user’s phone. This actually limits their study to homes that have internet

connection.

5

Page 10: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

2.2 Automatic Door Lock System

From the study of MOHD HELMI ALSYUKRAN BIN ABD MALIK[4], he

designs an Automatic Door Lock System where his recipients are teachers or lecturers.

The intention that he created this is to secure the lecture rooms from thieves. The project

has 3 main blocks, the receiver, controller and the door.

In their study, Sony Ericsson K700i was used as the system receiver as well as

SMS receiver because of its compatibility that support the AT-Commands. By the use of

RS232 port, the phone is link to the microcontroller. The connection between them is

through wire. MC68HC11A1 is used as the microcontroller that has a feature of serial

communications interface (SCI) or called universal asynchronous receiver transmitter

(UART).This features was used in the project in order the microcontroller read the short

messaging system (SMS) using the received (RD) and transmit (TX) port available at the

microcontroller. And the door is design based on electromagnetic principle. When the

door receives the right code, the microcontroller will trigger the relay to normally open. It

means that the magnetic effect was enabled.

The present study is similar to this that uses electromagnetic principle for the

door. However, the controller that will be used in the proposed study is Arduino ADK.

The disadvantage is that it can only unlock the door and there is no charging point for the

phone.

2.3 Security Intrusion Alert Method via SMS

From the study of SHAILENDRA S. SIKARWAR [5] the invention relates to a

security device for protection of Homes, Offices, Vehicles and many other places were

authorized or unauthorized foreign access is of concern. The author invented a device

responsible for notifying the owner and other members of the place immediately when

any of the above location has been accessed or broken into using SMS initiated by one

touch dialing. The purpose of the invention is to provide a security device which gives

immediate notification to the owner at the moment the intrusion occurs and is

accomplished by the use of the remote sensor, which activates a Global Service Module

6

Page 11: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

(GSM) to send one or more SMS (Short Message Service) messages to the owner at the

time of intrusion.

The device is made up of a PIC Micro-Controller, Sensors setup in a remote array

depending on the application(Alarm Signal Sensor, Vibration Sensor, Electromagnetic

Sensor ,Infrared Sensor, Optical Sensor), and a GSM module.

The device uses the PIC micro-controller. It is the one responsible for the whole

processing of the device. It can handle 'C' Language application of approximately 50,000

C statements or 1MB. The PIC Micro controller is then connected to an actuator. In order

to activate the GSM Module a relay is activated from the PIC Micro controller.

2.4 A GSM, Internet and Speech Controlled Wireless Interactive Home

Automation System

From Yuksekkaya, Kayalar, Tosun, Ozcan, and Alkar’s study [6], the proponents

designed a home automation system for monitoring and controlling various devices in

remote locations using three controlling methods which are: GSM Network, Speech, and

Internet. The GSM Network and the Internet were designed for remote controlling

methods while speech is when the person is inside the house.

The project has a real time monitoring system since it can be accessed remotely. It

is a wireless system that uses RF Communication Protocol for the communication

between the home appliances and the owner since it has a lower cost and has the

advantage of installation and maintenance.

From their overall system, the flow is when a communication between the user

and the system is established by using any of the three methods; via a mobile phone, the

Internet or speech the user commands are transferred to the home automation server

(which is done by a PC) via one of the three alternatives. In the home automation server

the incoming commands are processed, then digitized and sent to the relevant unit to be

processed. In each unit there are separate low-cost microcontrollers to receive the

commands from the transceiver and apply these to the appliances they are attached to.

These devices have also the capability of sending their status back to the transceiver node

which is connected to the home automation server thus they can be monitored in real-

7

Page 12: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

time. After receiving the feedbacks from the appliance nodes, the home automation

server interprets them and performs the necessary tasks.

2.5 SMS based Remote Control System

The study from Chauhan, Singh, Agrawal, Kapoor, and Sharma [7] designed a

control system that is implemented through a microcontroller-based control module that

receives commands and instructions from a cellular phone over the GSM module. The

system can control up to 16 electrical devices that can switch on or off the devices at

home remotely. The mobile phone is integrated with the microcontroller PIC16F873A

which receives SMS message from user’s mobile phone and sends a command to the

controller to control whether to turn ON or OFF the output. The mobile phone also sends

status reporting to the user regarding the electrical appliance.

2.6 Efficient Authorized Access Security System Control Using ATMEL

89C55 & Mobile Bluetooth

The study of Basil Hamed[8] presented the technology of Authorized Access

Security System. This technology uses two access ways. First is the ATMEL 89C55

microcontroller which will detect any unauthorized motion inside the protected area and

second is the Bluetooth Technology which is used in providing wireless and automatic

unlocking of the door. It uses a data logger which makes use of the ATMEL 89C55 and

visual basic program which provides multiple accesses to a protected area that can be an

office, home, bank or whatever needed it is then connected to a keypad-LCD using the

parallel port in which the commands are located. It has an added camera feature in which

it can monitor the protected area. The data logger was added to the system to make

records of users who accessed the system at any time. The Bluetooth interface is

independent from the keypad-LCD interface. It is used by enabling the Bluetooth of the

mobile phone and enters the required password in order to unlock the door.

8

Page 13: Chap 1 and 2 Chap 1 and 2Chap 1 and 2Chap 1 and 2

The advantage of the proposed study is that it can’t be accessed remotely and

Bluetooth technology has a limited range of area to be covered.

9