Documentos de Académico
Documentos de Profesional
Documentos de Cultura
By
Filomeno, Gil Maica Marie V.
Ledon, Michelle P.
Lenares, Prima Soccorro L.
Advisers Certification
_______________________
John D. Cruz, Jr., M.S.
Adviser
Table of Contents
Title Page
Advisers Certification
Table of Contents
ii
Chapter 1
1.1
1.2
1.3
1.4
1.5
Chapter 2
2.1
2.2
2.3
2.4
Chapter 3
3.1
3.2
3.3
3.4
3.5
Modeling Parameters
Simulation in Scilab
Filtered QPSK System
QPSK Modulator Baseband
Methodology
11
Flow Chart
System Block Diagram of a QPSK Modulator
Software Tools
Hardware Implementation
Halfway Deliverables
Bibliography
17
Gantt Chart
19
Chapter 1
The Problem and Its Settings
1.1 Introduction
How secure are our houses? Security of our houses is a matter of concern to us. We have
a lot of things going on in our lives every day. Each and everyone are busy with their
own lives, their problems, responsibilities, work, school and the list goes on. Some are
busy that they forgot the security threats that come to their properties. On average, in
Manila, the indices of people worrying about house break-ins and problems on property
crimes are about 69 percent on the year 2012[1].
Table 1.1 Indices of Crime Rates in Manila, Philippines [1]
Security threats may come at a time where we least expected it especially if we forgot the
safety measures to be done when we leave our properties unattended.
There are several solutions to decrease the worries and occurrences of the said
crimes. One method is to remotely control and monitor the property with the use of 2G
technologies. 2G technologies enabled the various mobile phone networks to provide the
services such as text messages, picture messages and MMS (multimedia messages)[2].
With the use of this technology, it will help provide real-time communication with the
system and the user, where the user can remotely control the system using SMS and
monitor the area by capturing an image and send it to the users phone using MMS.
and monitor their front door locks remotely through the use of a cellular phone via SMS
and can take picture of the person who is currently at their doorstep.
This project will be useful to any property that needs security or to a private
property that cannot afford to hire security personnel and to the people who are always in
a hurry and in the midst of an emergency. In general, this project will really be useful and
helpful to the people who are concerned of the security of their houses because of the
remote accessibility of the door lock and image capturing feature.
The outcome of this project study may also be used as a reference by the ECE/EE
students in their future studies concerning home automation and security using wireless
technology.
The system will be programmed to only accept the commands from the registered
numbers to the system, which are the users numbers.
This study is limited to one door only.
Chapter 2
Review of Related Literature
In this chapter, different studies that are related to the proposed study will be
presented. The following are the summary of each different study. It has its advantages,
disadvantages and difference between the different study and the proposed study.
(GSM) to send one or more SMS (Short Message Service) messages to the owner at the
time of intrusion.
The device is made up of a PIC Micro-Controller, Sensors setup in a remote array
depending on the application(Alarm Signal Sensor, Vibration Sensor, Electromagnetic
Sensor ,Infrared Sensor, Optical Sensor), and a GSM module.
The device uses the PIC micro-controller. It is the one responsible for the whole
processing of the device. It can handle 'C' Language application of approximately 50,000
C statements or 1MB. The PIC Micro controller is then connected to an actuator. In order
to activate the GSM Module a relay is activated from the PIC Micro controller.
time. After receiving the feedbacks from the appliance nodes, the home automation server
interprets them and performs the necessary tasks.
independent from the keypad-LCD interface. It is used by enabling the Bluetooth of the
mobile phone and enters the required password in order to unlock the door.
The advantage of the proposed study is that it cant be accessed remotely and
Bluetooth technology has a limited range of area to be covered.