Car Security Semistor Project111
Car Security Semistor Project111
Car Security Semistor Project111
Declaration
We declare that this project is the original work of us and it has not been submitted earlier either to
this or any other universities, and all sources of materials used for the project have been fully
acknowledged.
Name of the student signature date
Girmaye Tadele __________ ________
Getasew Bazezew __________ ________
Tadlo Jegnie __________ ________
Wondu Gudissa __________ _________
Advisor Approval
The project has been submitted for examination with my approval as a university advisor.
Name of advisor signature date
Mr. Yimesgen Getahun ____________ ___________
Table of Contents
Declaration ..................................................................................................................................................... i
List of figure ................................................................................................................................................. iii
list of table ................................................................................................................................................... iii
ACKNOWLEDGEMENT .................................................................................................................................. iv
List of Acronyms ............................................................................................................................................ v
Executive Summary...................................................................................................................................... vi
CH APTER ONE .............................................................................................................................................. 1
Introduction .................................................................................................................................................. 1
1.1 Background Information ..................................................................................................................... 1
1.2. Statement of Problem ........................................................................................................................ 1
1.3 Objective ....................................................................................................................................... 2
1.3.1 General objectives ....................................................................................................................... 2
1.3.2 Specific objective ......................................................................................................................... 2
1.4. Methodology Used in this Project ..................................................................................................... 2
CHAPTER TWO .............................................................................................................................................. 5
Review of Related Literature ........................................................................................................................ 5
CHAPTER THREE ............................................................................................................................................ 7
System Design and Analysis .......................................................................................................................... 7
3.1. Description of Components and its operation................................................................................... 8
Type of buzzers: .................................................................................................................................. 17
CHAPTER FOUR ........................................................................................................................................... 19
RESULTS AND DISCUSSIONS ........................................................................................................................ 19
4.1. Software simulation results and discussions ................................................................................... 19
4.2Proteus VSM ...................................................................................................................................... 21
4.3 Schematic Diagram.......................................................................................................................... 21
CHAPTER FIVE ............................................................................................................................................. 24
CONCLUSION AND RECOMMENDATIONS................................................................................................... 24
5.1 Conclusion: ........................................................................................................................................ 24
5.2 Recommendation.............................................................................................................................. 25
References .................................................................................................................................................. 26
Appendices.................................................................................................................................................. 27
Appendix A .............................................................................................................................................. 27
Appendix B .............................................................................................................................................. 27
List of figure
Figure1. 1:block diagram of working methodology ....................................................................... 3
Figure3. 1:System Design Block Diagram ..................................................................................... 8
Figure3. 2:Arduino Uno .................................................................................................................. 9
Figure3. 3:PIR sensor.................................................................................................................... 13
Figure3. 4:GSM module ............................................................................................................... 14
Figure3. 5: LCD Display............................................................................................................... 15
Figure3. 6 :Relay........................................................................................................................... 17
Figure3. 7 :Buzzer ......................................................................................................................... 18
Figure4. 1System flow chart ......................................................................................................... 20
Figure4. 2:Circuit Simulation before thief detected ..................................................................... 22
Figure4. 3:Circuit Simulation after thief detected. ....................................................................... 23
list of table
Tabe3. 1:Pin description of LCD .................................................................................................. 15
Semester project on GSM Based Car Security System February 2, 2017 iii
Bahir dar institute of technology
ACKNOWLEDGEMENT
First and for most we would like to give great praise to our Lord, Jesus Christ for his forgiveness
and guidance in our life.
Then we are extremely grateful to the faculty of Electrical and Computer Engineering for giving
us the opportunity to carry out this project which is an integral part of the curriculum in BSC.
We would like to express our earnest gratitude and regards to our project adviser, Mr. Yimesgen
G. for his continuous encouragement, valuable supervision, perpetual motivation and guidance
during the period of doubts and uncertainties that has helped us to carry outthis project. Last but
not least we express our sincere thanks to our entire department staff members who have
patiently extended all sorts of help for accomplishing this undertaking.
Finally, we extend our gratefulness to one and all who are directly or indirectly involved in the
successful completion of this project work.
List of Acronyms
AT………………………………………….Attention command.
GSM…………………………………………….GlobalSystemforMobilecommunication
LCD…………………………………………….…LiquidCrystalDisplay
SMS……………………………………………….ShortMessageService
Executive Summary
The main scope of this project is to stop the engine of an automobile automatically. This can be
done whenever a person trying to steal the vehicle, at that time PIR sensor sends signal to a
programmable Arduino. Then the Arduino orders the GSM to send SMS for the stored owner's
number and it also enables the Buzzer soundon. Finally the owner receives a SMS that his car is
being stolen. The owner sends back the SMS to the GSM modem to ‘‘STOP’’ the fuel flow by
Relay off. The control instruction is given to the Arduino through interface, the output from
which active a relaydriver to trip the fuel that disconnects the ignition of the automobile resulting
in stopping the vehicle. The system includes a GSM module, Arduino, buzzer, relay, and the 12V
battery to power up this module.
CHAPTER ONE
Introduction
This Project presents an automotive GSM services. It permits the automobile to transmit a short
message (SMS) to the owner’s cell phone request. Afterreceiving SMS message from owner, this
system automatically stops the ignition system. Hence, the vehicle will not function any more.
Other security systems prevent from unwanted and give information to the nearer or recorded
security system give late information, while GSM based car security system give information at
a time and this system also inform the nearer people. This is GSM based car security system
(GBCSS) so it is send the SMS andalso generate the alarm when this security system
isbreaks.We can save our car and thief is failed.
A wireless vehicle security system which implements the mobile communication protocol is
used.
1.1Background Information
Today vehicle security systembecomes our day to dayneeds oflife. Now a days Vehicle thefts
are increasing and the production of car in early world.Car theft has emerged as a serious
problem throughout the world. GSM based carsecurity is efficient and effective security. To
solve the problem most of vehicle owners have started using the system in developed country
while very small in developing country.
Based on the problem and data related to stolen cars, we observed that the car theft is a global
problem. Nobody likes his or her car to be stolen. The insurance companies also feel the pressure
as they must pay the claims made by the customers. Thus, the insurance companies have to
increase the insurance premium. When this happened only a small percentage of people could
afford a good insurance premium. The increase of the insurance premium also due to the lack of
security system installed in to the car.
The car manufacturers installed a minimum standard security system such as an alarm based
security system. However, this device is not effective enough. It does not have any pager system
attached to it. The car thief takes only a few minutes to deactivate the security system.
Furthermore, nobody will pay an attention when the car alarm goes off.
1.3 Objective
To save the cars from thief, Make cars more secured and moderate.
Reliableinterfacebetweenthesystem and the ownerof vehicle.
Develop a control program of the proposed system.
Design and develop voice-based car security alarm system.
Conduct appropriate tests for the proposed system.
The SMS sent would come through the GSM service provider and then reach the vehicle, which
is traveling, because the vehicle has a GSM device with sim card. This GSM modem will receive
the SMS and send to the Arduino in the vehicle. The Arduino will receive this SMS and compare
the password and the command. If everything matches, then it will perform the request required
by owner.
That is person who knows the device password only able to operate. In case of any mishaps such
as fire, theft or obstacle, the device will automatically will send an alert to the registered number,
i.e, the number that is feeded into the memory of Arduino. Then after, write documentation
report to complete our project.
The scope of this project is to develop continuous protection and control system for GSM
Based vehicle theft security system.
Design and develop the hardware of the proposed system
Conduct appropriate tests for the proposed system.
Finally, we give highest emphasis to the software design and simulation to develop a suitable
algorithm that will promptly interact with the, Arduino and the LCD.
Detect and neutralize un recognized person when he/she attempt to steal vehicle.
Reduce unforeseen expenditure due to vehicle theft.
Improve car security: From this system, we can try to save our car by anywhere
Better Customer Service: Here the better service plus also benefited with cost wise
because its cost is very less compared to car cost.
As soon as we use Arduino Uno the system implemented in:Homes, Offices, Vehicles. Banks
and so on.
Because of its sophisticated ness system,it becoming more selected in huge cites.
More protected scheme than other.
Simple security system is used to save important items. In place of simple security system, we
can implement this GSM based security. So, that we get sms immediate whenever system disturb
and alarm will also generate. So, it is use full in every type of security system and we can make
more secure our things.
CHAPTER TWO
Car theft is one of the social problems in the society. There are several factors
Contributing to this problem;
The gap between the rich and the poor are getting bigger and higher.
Poverty increases every day at an alarming rate and this will lead to dissatisfaction among
people. The easiest way to get money is by committing crime and car theft is one of the crime
which gives good return. They, in general do not care about the consequences of the crimes.
Moreover, the law and its enforcement to punish the criminals are not
punishable enough.
The current car security system is not effective and the carelessness of the car owner does
not help in inhibiting the crimes.
There are many forms of car theft. The types of car theft vary considerably from one country to
another, from straight forward unorganized theft for profit on the resale market to well organized
groups of criminals stealing on demand for the export market to other countries.
This crime was done either by using common tools orbrutal force. The locks on the car and
current car security system provides littledeterrent to a skilled car thief.
Another type of car theft, prevalent predominantly in the United Kingdom, is called "joy-riding"
crime which is normally done by teenagers, for the sheer destructive pleasure of driving at high
speed with complete disregard to the law, sometimes causing fatal injuries to innocent by
standers and even the criminals in the stolen cars aswell. It is also recognized that joy-riding is
the first step on the ladder of professional thief.
Furthermore, car theft could also be grouped as; theft "from" the vehicle and theft" of' the
vehicle. Theft "from" vehicle means that the thief would only takes personal items, parts and
accessories from the vehicles. The second group called theft "of' the vehicle consists of
professional theft who stole the car for parts and accessories dismantling, exporting and even
changed the identity of the car to be resold in the market. Sometimes, thieves in this would
sustain the crime for a short period to avoid being suspected.
As the theft rate increases, the customers always have high expectations that an anti-theft
protection on their brand-new vehicle is to be provided as part of the basic requirements.
CHAPTER THREE
The system is integrated to each other that enables the Arduino to Control all internally and
externallyconnected components to it. Since Arduino is CPU(Central processing Unit) of
security system. Whenever the Thief trying toopen the Door of vehicle, PIR sensor senses and
the buzzer alarmed on. GSM module transmit a short message (SMS) to the owner on his /her
phone as his/her request. Then afterthe owner send SMS back to GSM “stopcommand’’and the
Relay off automatically it stops the ignition system. Hence, the vehicle will not function any
more. Other security system prevents from unwanted and give information to the nearer or
recorded security system give late information, while GSM based car security system give
information at a time and this system also inform the nearer people. Thus,wecan save our
carandthiefisfailed.
The owner can deactivate the system up to he/she has the entry password.Because the system is
reliably interfaced with the owner.
PIR
SENSOR
LCD
ARDUINO
RELAY UNO
GSM
BUZZER
Arduino
The power of the Arduino is not its ability to crunch code, but rather its ability to interact with
the outside world through its input-output (I/O) pins. The Arduino Uno has 14 digital I/O pins
labeled 0 to 13 that can be used to turn motors and lights on and off and read the state of
switches.
Each digital pin can sink or source about 40 mA of current. This is more than adequate for
interfacing to most devices, but doesn’t mean that interface circuits are needed to control devices
other than simple LED's. In other words, you cannot run a motor directly using the current
available from an Arduino Uno. Pin, but rather must have the pin drive an interface circuit that in
turn drives the motor.To interact with the outside world, the program sets digital pins to a high or
low value using C code instructions, which corresponds to +5 V or 0 V at the pin. The pin is
connected to external interface electronics and then to the device being switched on and off.
Input voltage - 7-12V, 14 Digital I/O Pins (6 PWM outputs), 6 Analog Inputs, 32k Flash
Memory, 16Mhz Clock Speed.
The maximum values that Arduino can handle: Max frequency: 16MHz, Max Voltage:
5V, Max Current: 50m.
Using the high-speed micro-processing controller.
The development of languageand development environment is very simple, easy to
understand, very suitable for beginners to learn.
1. Power (USB/Barrel Jack): Every Arduino board needs a way to be connected to a power
source. The Arduino UNO can be powered from a USB cable coming from your
computer or a wall power supply (like this) that is terminated in a barrel jack. In the
picture above the USB connection is labeled (1) and the barrel jack is labeled (2). Do
NOT use a power supply greater than 20 Volts as you will overpower (and thereby
destroy) your Arduino. The recommended voltage for most Arduino models is between
6 and 12 Volts.
2. Pins (5V,3.3V, GND, Analog, Digital, PWM, AREF): The pins on your Arduino are the
places where you connect wires to construct a circuit (probably in conjunction with a
bread boardand some wire. They usually have black plastic ‘headers’ that allow you to
just plug a wire right into the board. The Arduino has several different kinds of pins,
each of which is labeled on the board and used for different functions.
GND (3): Short for ‘Ground’. There are several GND pins on the Arduino, any of
which can be used to ground the circuit.
5V (4) & 3.3V (5): As you might guess, the 5V pin supplies 5 volts of power, and
the 3.3V pin supplies 3.3 volts of power. Most of the simple components used with
the Arduino run happily off of 5 or 3.3 volts.
Analog (6): The area of pins under the ‘Analog In’ label (A0 through A5 on the
UNO) are Analog In pins. These pins can read the signal from an analog sensor
(like a temperature sensor) and convert it into a digital value that we can read.
Digital (7): Across from the analog pins are the digital pins (0 through 13 on the
UNO). These pins can be used for both digital input (like telling if a button is
pushed) and digital output (like powering an LED).
PWM (8): You may have noticed the tilde (~) next to some of the digital pins (3, 5,
6, 9, 10, and 11 on the UNO). These pins act as normal digital pins, but can also be
used for something called Pulse-Width Modulation (PWM). We think of these pins
as being able to simulate analog output (like fading an LED in and out).
AREF (9): Stands for Analog Reference. Most of the time you can leave this pin
alone. It is sometimes used to set an external reference voltage (between 0 and 5
Volts) as the upper limit for the analog input pins.
Reset pin: Arduino has a reset button (10). Pushing it will temporarily connect the
reset pin to ground and restart any code that is loaded on the Arduino. This can be
very useful if our code doesn’t repeat, but we needs to test it multiple times. Unlike
the original Nintendo however, blowing on the Arduino doesn’t usually fix any
problems.
Power LED Indicator: Just beneath and to the right of the word “UNO” on our
circuit board, there’s a tiny LED next to the word ‘ON’ (11). This LED should light
up whenever we plug our Arduino into a power source. If this light doesn’t turn on,
there’s a good chance something is wrong. Time to re-check our circuit!
TX RX LEDS: TX is short for transmit, RX is short for receive. These markings
appear quite a bit in electronics to indicate the pins responsible for serial
communication. In our case, there are two places on the Arduino UNO where TX
and RX appear – once by digital pins 0 and 1, and a second time next to the TX and
RX indicator LEDs (12). These LEDs will give us some nice visual indications
whenever our Arduino is receiving or transmitting data (like when we’re loading a
new program onto the board).
Main IC; The black thing with all the metal legs is an IC, or Integrated Circuit (13).
Think of it as the brains of our Arduino. The main IC on the Arduino is slightly
different from board type to board type, but is usually from the AT mega line of
IC’s from the ATMEL company. This can be important, as we may need to know
the IC type (along with our board type) before loading up a new program from the
Arduino software. This information can usually be found in writing on the top side
of the IC. If we want to know more about the difference between various IC’s,
reading the datasheets is often a good idea.
Voltage Regulator:The voltage regulator (14) is not actually something you can (or
should) interact with on the Arduino. But it is potentially useful to know that it is
there and what it’s for. The voltage regulator does exactly what it says – it controls
the amount of voltage that is let into the Arduino board. Think of it as a kind of
gatekeeper; it will turn away an extra voltage that might harm the circuit. Of course,
it has its limits, so don’t hook up your Arduino to anything greater than 20 volts.
PIR SENSOR
A passive infrared sensor (PIR sensor) is an electronic sensor measures infrared (IR) light
radiating from objects in its field of view. They are most often used in PIR-based motion
detectors.
A passive infrared (PIR) sensor measures infrared light emitted from objects that generate heat,
and therefore infrared radiation, in its field of view. Crystalline material at the center of a
rectangle on the face of the sensor detects the infrared radiation. The sensor is split into two
halves to detect not the radiation itself, but the change in condition that occurs when a target
enters its field. These changes in the amount of infrared radiation on the element in turn change
the voltages generated, which are measured by an on-board amplifier. When motion is detected
the PIR sensor outputs a high signal on its output pin, which can either be read by an MCU or
drive a transistor to switch a higher current load.
What is detected is the broken field for a “normal” temperature. The field does not have to be
broken by an object with a different temperature in order to register change, as highly sensitive
sensors will activate from the movement alone. Designed for use at ambient temperatures of
15°C to 20°C, at higher temperatures the field of view narrows, and if below 15°C, the field of
view widens and small or distant objects can activate the sensor. Commonly used in security
lighting and alarm systems in an indoor environment, PIR sensors have a range of approximately
6 meters, depending on conditions. The sensor adjusts to slowly changing conditions that occur
normally within the environment, but shows a high-output response when a sudden change takes
place.
PIR sensors are:
inexpensive
low power
rugged
have a wide lens range
are easy to interface and are easy to use.
When idle, both slots detect the same amount of IR. When a person/animal comes into their
environment, one half will intercept the IR, causing a positive change between the two halves.
Once the entity passes through, there is a negative differential change.
PIR sensors are most frequently found in motion detector devices aptly called passive infrared
detectors (PIDs). The PIR sensor in this case sits on a PCB that interprets signals from the
pyroelectric sensor chip. Focusing the infrared energy onto the surface of the sensor is
accomplished in two primary ways:
the window or cover of the PID has Fresnel lenses molded into it that are used to gather
light from a very wide field of view and focus it onto the PIR sensor directly, or
the PID has segmented parabolic mirrors that focus the infrared energy inside of it.
When a GSM modem is connected to a computer, this allows the computer to use the GSM
modem to communicate over the mobile network. While these GSM modems are most
frequently used to provide mobile internet connectivity, many of them can also be used for
sending and receiving SMS and MMS messages. GSM network is a cellular telecommunication
Network with a versatile architecture complying with the ETSI GSM 900/GSM 1800 standard.
Siemens’ implementation is the digital cellular mobile communicationsystem D900/1800/1900
that usesthe very latest technology to meet every requirement of the standard. SIM 900 is
affixed cellular terminal (FCT) used for data applications. It is a compact and portable terminal
which satisfies various data communication over GSM. It also can be connected to a computer
with a standard RS232C serial port. SIM 900 offers features like short message service (SMS),
data services (sending and receiving data files), Fax service and data file connectivity through
wire is not available or not possible. SIM 900 is very easy to setup. It also finds its application in
IT companies, banks, financial institutions etc.
LCD:A 2x16 LCD is used for displaying the massage when any one of the parameter is
detected.
A liquid-crystal display (LCD) is a flat panel display, electronic visual display, or video display
that uses the light modulating properties of liquid crystals. Liquid crystals do not emit light
directly.
LCDs are used in a wide range of applications including computer monitors, televisions,
instrument panels, aircraft cockpit displays.
LCD display is a display; electronic visual display that uses light modulating property of
liquid crystal. It can present a string, digits, and 7 segment displays as digital clock. The LCD
screen is more efficient and can be disposed of more safelythan a CRT (Cathode Ray
Tube).There are different types of LCD display, wechoose in our project type 2x16 LCD to
interface with the Arduino Uno microcontroller. The criteria choosing this type is we need only
to display the status and current but not the other parameters so small LCD display is required.
The liquid-crystal display has the distinct advantage of having low power consumption than the
LED. It is typically of the order of microwatts for the display in comparison to the some order of
mill watts for LEDs.
The LCD display consists of command registers such as RS, RW (read and write), E(enable),
data bus (D0, D1, D2…...D7) and a 5V VDD and others pin is described table blow.
Tabel3. 1:Pin description of LCD
RELAY: Relays are switches that open and close circuits electromechanically or electronically.
Relays control one electrical circuit by opening and closing contacts in another circuit. As relay
diagrams show, when a relay contact is normally open (NO), there is an open contact when the
relay is not energized. When a relay contact is Normally Closed (NC), there is a closed contact
when the relay is not energized. In either case, applying electrical current to the contacts will
change their state. An electromagnetic switch operated by a relatively small electric current that
can turn on or off a much larger electric current. The heart of a relay is an electromagnet(a coil of
wire that becomes temporary magnet when electricity flows through it.relay is usually an
electromechanical device that is actuated by an electrical current. Relays are like remote-
control switches and areused in many applications because of their relative simplicity, long
life, and proven high reliability. Relays are used in a wide variety of applications throughout
industry, such as in telephone exchanges, digitalcomputers and automation systems. Highly
sophisticated relays are utilized to protect electric power systems against trouble and power
blackoutsas well as to regulate and control the generation and distribution ofpower.
Figure3. 6 :Relay
Buzzer: A buzzer isan audio signaling device. It can be driven by an oscillating electronic circuit
or other audio signal source. A click beep or ring can indicate that a button has been
pressed.Typical uses of buzzers and beepers contain alarm devices, timers and verifications of
user input such as mouse click.
Type of buzzers:
Mechanical: A joy buzzer is an example of a purely mechanical buzzer. They require drivers.
Educational purposes
Electronic metronomes
Game show lock-out device
Figure3. 7 :Buzzer
CHAPTER FOUR
.This chapter discusses about the simulation results of vehicle theft and controlling system.
Simulation software is based on the process of modeling a real phenomenon. It is, essentially, a
program that allows the user to observe an operation through simulation without performing that
operation. In this project, vehicle theft, controlling and protection using Arduino is proposed. A
motion sensing circuit is designed and the results have been verified with proteus software
START
READ SWITCH
VALUE
ACTIVATE PIR
SENSOR
ARDUINO
LISTEN
SWITCH
IS THE DOOR
OPEN
NO NO
PIR SENSE
m
DOOR
OPNING YES
YES
LCD DISPLAY
THEIF LCD DISPLAY
DETECTED NO THEIF
. GSM SENDSMS
BUZZER ON
RELAY OFF
STOP
4.2Proteus VSM
We simulate the prototype in Proteus. Proteus Virtual System Modeling (VSM) uses our proven
Schematic Capture software to provide the environment for design entry and development.
Proteus capture:
Has powerful editing tools. The Proteus design.
It enables us to progress more rapid.
It gives us the ability to make hardware or software changes.
reduces hardware and software troubleshooting problems.
supports schematic capture for simulation.
provides a very high degree of control over the drawing appearance.
The project is built and tested in Proteus just by using the software prototype components
without using the physical hardware prototype. It combines mixed mode SPICE circuit
simulation, animated components and microprocessor models to facilitate simulation of complete
microcontroller based designs. Therefore, by using Proteus software, PIR sensor, Relay ,Arduino
Uno, Buzzer , LCD display and serial communication were all developed and tested as shown
figure 4.2 and 4.3.
Our project deal with GSM based car security system .In this system the Arduino Uno interfaced
with
The following two circuit shows us simulation out puts before and after thief detection.
Really, we can protect our car from thief.
CHAPTER FIVE
we have proposed vehicle tracking and locking systems used to track the theft vehicle by using
GSM technology. This system puts into the sleeping mode vehicle handled by the owner or
authorized persons; otherwise goes to active mode.
The mode of operations changed by persons or remotely. When the theft identified, the
responsible person send SMS to the programmable Arduino, then issue the control signals to stop
the engine motor.
After that all the doors locked. To open the doors or to restart the engine authorized person
needs to enter the passwords.
Generally, it has:
Advantages:
Used for many application
Simple circuitry system
Better customer service
It provides more security other systems
From the remote place, we can access the system
Disadvantages:
5.2 Recommendation
Remotely controlledvehicle anti-theft system via GSMnetwork is highly recommended if cost
effectiveness, resource management and the life of the owner are of great priority. Having in
mind that it reduces harm to the vehicle owners and it enables easy recovery of the stolen vehicle
by security agents/operatives.
References
[1]"First-Hand Histories: Liquid Crystal Display Evolution - Swiss Contributions". IEEE Global
History Network. IEEE. Retrieved July 31, 2012.
[2] “GSM Global System for Mobile Communications". 4G Americas. Retrieved 2014 -03-02
[3] Gunnar Heine GSM Networks: Protocols, Terminology and Implementation
(MobileCommunicationsLibrary
[4]https://www.arduino.cc/en/Main/ArduinoBoardUno
[5]"How Infrared motion detector components work". Noncommercial research page. Global
Corporation. Retrieved 2013-05-31.
[6]https://www.arduino.cc/en/Main/ArduinoBoardUno
[7]https://www.hackster.io/arduino/products/arduino-uno-genuino-uno
[8]Liquid Gold: The Story of Liquid Crystal Displays and the Creation of an Industry, Joseph A.
Castellano, 2005 World Scientific Publishing Co. Pte. Ltd., ISBN 981-238-956-3.
[9]P. J. Wild, Matrix-addressed liquid crystal projection display, Digest of Technical Papers,
International Symposium, Society for Information Display, June 1972, pp. 62–63
Appendices
Appendix A: Definitions of Terms used in the document
Arduino Uno: - It is a small computer on a single integrated circuit containing a processor core,
memory, and programmable input/output peripherals.
Arduino: - compiler-Name of code compiler software
GSM (Global System for Mobile Communications):It's used as associate data transmission
module.
Proteus: is a virtual system modeling (VSM) that combines circuit simulation, animated
components and microprocessor models to simulate the complete microcontroller based design.
Sensor: Sensor is an ideal detecting device to solve these problems.It can convert no power
information into electrical signals. It can easily transfer process, transform and control signals
SMS (Short Messaging Service): is a written text send to an authorized perso
Appendix B: The whole code that we wrote for the simulation using IDE.
Source code
#include <LiquidCrystal.h>
int button=8;
int value=0;
void set up ()
void loop ()
if (digital Read(button)==HIGH)/////// hi guys real code is not zis but from the other
documentation getasew
lcd.setCursor(0,0);
delay (1000);
if(digital Read(Pir)==HIGH)
lcd.setCursor(0, 1);
delay(1000);
delay(1000);
delay(1000);
void sendSMS();
delay(5000);
lcd.setCursor(0, 0);
lcd.setCursor(0, 1);
delay(1000);
delay(1000);
digitalWrite(13,HIGH);//Turn on relay
else {
lcd.setCursor(0,0);
lcd.setCursor(0,1);
void sendSMS();
delay(1000);
delay(1000);
Serial.write(34);
delay(1000);
delay(1000);
delay(1000);
delay(4000);
}}