Está en la página 1de 12

SMS CONTROLLED DOOR LOCK

W/ IMAGE CAPTURE USING ANDROID PHONE


A Thesis Proposal Presented to
The Faculty of
The Electrical and Electronics
Engineering Department of the
University of San Carlos
Cebu City, Philippines
In Partial Fulfillment
Of the Requirements for the Degree
Bachelor of Science in Electronics Engineering

By
Filomeno, Gil Maica Marie V.
Ledon, Michelle P.
Lenares, Prima Soccorro L.

Engr. Baltazar Raffian


Adviser
Engr. Adrian Villarin
Co-Adviser
August 2014

Advisers Certification

This thesis proposal has been reviewed by the


undersigned and is certified acceptable
in content and form for proposal
hearing presentation:

_______________________
John D. Cruz, Jr., M.S.
Adviser

Table of Contents
Title Page
Advisers Certification

Table of Contents

ii

Chapter 1

1.1
1.2
1.3
1.4
1.5
Chapter 2
2.1
2.2
2.3
2.4
Chapter 3
3.1
3.2
3.3
3.4
3.5

The Problem and Its Settings


Introduction
Statement of the Problem
Significance of the Study
Scope and Limitations
Definition of Terms
Review of Related Literature

Modeling Parameters
Simulation in Scilab
Filtered QPSK System
QPSK Modulator Baseband
Methodology

11

Flow Chart
System Block Diagram of a QPSK Modulator
Software Tools
Hardware Implementation
Halfway Deliverables

Bibliography

17

Gantt Chart

19

Chapter 1
The Problem and Its Settings

1.1 Introduction
How secure are our houses? Security of our houses is a matter of concern to us. We have
a lot of things going on in our lives every day. Each and everyone are busy with their
own lives, their problems, responsibilities, work, school and the list goes on. Some are
busy that they forgot the security threats that come to their properties. On average, in
Manila, the indices of people worrying about house break-ins and problems on property
crimes are about 69 percent on the year 2012[1].
Table 1.1 Indices of Crime Rates in Manila, Philippines [1]

Security threats may come at a time where we least expected it especially if we forgot the
safety measures to be done when we leave our properties unattended.
There are several solutions to decrease the worries and occurrences of the said
crimes. One method is to remotely control and monitor the property with the use of 2G
technologies. 2G technologies enabled the various mobile phone networks to provide the
services such as text messages, picture messages and MMS (multimedia messages)[2].
With the use of this technology, it will help provide real-time communication with the
system and the user, where the user can remotely control the system using SMS and
monitor the area by capturing an image and send it to the users phone using MMS.

1.2 Statement of the Problem


Leaving a house unattended poses a great risk to its security, exposing it to threats
like intruders but from time to time people leave their houses because of their daily
activities and responsibilities. Owners heighten the risk of intruders especially when they
leave their houses unlocked or not even ensuring whether it is locked or not, especially
when they are in a hurry. Since most lock today are not remotely accessible owners will
have to go back to their house to check its status, which will take time or they will just
leave it as it is.
Also leaving a house unattended means leaving its owners not knowing who come
and go to their house. Cases like, owners are expecting visitors, but they are not yet there
to let them in is also a problem because visitors will have to wait outside the house.
Thus, this study aims to develop a lock system that can be remotely accessed from
a cell phone, can help monitor if there is a person at the door and can alert the owner if
there is a forced entry. Thus, the objectives of this study are:
i) To design a lock that is remotely accessible through SMS.
ii) To design a lock that can lock, unlock and take picture if the user
commands.
iii) To design a lock that can alert the owner by means of capturing an image
and sends an MMS when there is an intrusion on the said lock.
iv) To design an interface between the GSM Module, the microcontroller, the
sensors (doorbell/knock sensors) and the cellular phone

1.3 Significance of the Study


This project is a safety device that is designed to improve monitoring and security
of households. This device allows household owners to be more vigilant of the sentinel
events that may occur. The project will provide homeowners peace of mind and
contentment, and safety with ease through the use of technology and have an easy access
and less time consumed in following up their properties security since they can access

and monitor their front door locks remotely through the use of a cellular phone via SMS
and can take picture of the person who is currently at their doorstep.
This project will be useful to any property that needs security or to a private
property that cannot afford to hire security personnel and to the people who are always in
a hurry and in the midst of an emergency. In general, this project will really be useful and
helpful to the people who are concerned of the security of their houses because of the
remote accessibility of the door lock and image capturing feature.
The outcome of this project study may also be used as a reference by the ECE/EE
students in their future studies concerning home automation and security using wireless
technology.

1.4 Scope and Limitations


The study will focus on designing a lock system that can be remotely access via
SMS and in sending an MMS from the system to the users phone whenever there is an
intrusion.
The lock system consists of a microcontroller, an Android Smartphone, a door
lock and doorbell triggering circuit and a users phone. An Arduino Mega ADK board
will be used as the microcontroller which is only compatible for Android phone versions
2.3 and later. This board will be programmed using C programming language and a Java
programming language for the Android phone.
The Android Phone, which is connected with the microcontroller, will receive the
commands of the users mobile phone, which are to LOCK, UNLOCK and TAKE
PICTURE. The Android phone will be used to capture an image and send it using MMS
to the users phone. The Android Phone should have a regular balance in order to perform
transactions like sending SMS and MMS to the users phone. This study will use SMART
Network as the Subscriber Identity Module (SIM) for the Android Phone.
The system will alert the registered numbers if there is a forced entry on the said
lock by immediately sending an SMS and MMS to the numbers.

The system will be programmed to only accept the commands from the registered
numbers to the system, which are the users numbers.
This study is limited to one door only.

1.5 Definition of Terms


Short Messaging Service (SMS) - it is a system that enables cellular phone to send and
receive text messages.
Multimedia Messaging Service (MMS) - is a standard way to send messages that
include multimedia content to and from mobile phones.
Arduino ADK- a type of microcontroller that has already a (universal serial bus) usb
interface and can be connected to android phones.
Android (Operating System) is a Linux-based operating system for mobile phones

Chapter 2
Review of Related Literature

In this chapter, different studies that are related to the proposed study will be
presented. The following are the summary of each different study. It has its advantages,
disadvantages and difference between the different study and the proposed study.

2.1Remote Door Lock Project


From the study of Lee-Own, Sobell, Lin and Velivis[3], they designed and
implemented a remote door lock that helps its users in two ways; first is to check the
status of the lock to make sure the user locked the door when they are away and to allow
them to remotely lock or unlock the door with a text message sent to the system from the
users phone. Second is when someone rings the users doorbell and a camera will take
the picture of the person at the door and sends an MMS to the users phone. The user will
then reply to the MMS sent with a text message to allow or deny them an access. The
system has several components, the server, an Ionics Plug Stratus Computer, which
interacts wirelessly with the microcontroller, wireless camera and the clients phone. The
microcontroller is an Arduino PRO that is connected to the door lock mechanism.
This study is similar to our study since it uses the GSM Technology to control the
lock, however, the way of communication between the system and the users phone is
through the server or the plug computer, which uses the internet that sends the text
messages and picture messages to the users phone, which also receives the messages
from the users phone. This actually limits their study to homes that have internet
connection.

2.2 Automatic Door Lock System


From the study of MOHD HELMI ALSYUKRAN BIN ABD MALIK[4], he
designs an Automatic Door Lock System where his recipients are teachers or lecturers.
The intention that he created this is to secure the lecture rooms from thieves. The project
has 3 main blocks, the receiver, controller and the door.
In their study, Sony Ericsson K700i was used as the system receiver as well as
SMS receiver because of its compatibility that support the AT-Commands. By the use of
RS232 port, the phone is link to the microcontroller. The connection between them is
through wire. MC68HC11A1 is used as the microcontroller that has a feature of serial
communications interface (SCI) or called universal asynchronous receiver transmitter
(UART).This features was used in the project in order the microcontroller read the short
messaging system (SMS) using the received (RD) and transmit (TX) port available at the
microcontroller. And the door is design based on electromagnetic principle. When the
door receives the right code, the microcontroller will trigger the relay to normally open. It
means that the magnetic effect was enabled.
The present study is similar to this that uses electromagnetic principle for the
door. However, the controller that will be used in the proposed study is Arduino ADK.
The disadvantage is that it can only unlock the door and there is no charging point for the
phone.

2.3 Security Intrusion Alert Method via SMS


From the study of SHAILENDRA S. SIKARWAR [5] the invention relates to a
security device for protection of Homes, Offices, Vehicles and many other places were
authorized or unauthorized foreign access is of concern. The author invented a device
responsible for notifying the owner and other members of the place immediately when
any of the above location has been accessed or broken into using SMS initiated by one
touch dialing. The purpose of the invention is to provide a security device which gives
immediate notification to the owner at the moment the intrusion occurs and is
accomplished by the use of the remote sensor, which activates a Global Service Module

(GSM) to send one or more SMS (Short Message Service) messages to the owner at the
time of intrusion.
The device is made up of a PIC Micro-Controller, Sensors setup in a remote array
depending on the application(Alarm Signal Sensor, Vibration Sensor, Electromagnetic
Sensor ,Infrared Sensor, Optical Sensor), and a GSM module.
The device uses the PIC micro-controller. It is the one responsible for the whole
processing of the device. It can handle 'C' Language application of approximately 50,000
C statements or 1MB. The PIC Micro controller is then connected to an actuator. In order
to activate the GSM Module a relay is activated from the PIC Micro controller.

2.4 A GSM, Internet and Speech Controlled Wireless Interactive Home


Automation System
From Yuksekkaya, Kayalar, Tosun, Ozcan, and Alkars study [6], the proponents
designed a home automation system for monitoring and controlling various devices in
remote locations using three controlling methods which are: GSM Network, Speech, and
Internet. The GSM Network and the Internet were designed for remote controlling
methods while speech is when the person is inside the house.
The project has a real time monitoring system since it can be accessed remotely. It
is a wireless system that uses RF Communication Protocol for the communication
between the home appliances and the owner since it has a lower cost and has the
advantage of installation and maintenance.
From their overall system, the flow is when a communication between the user
and the system is established by using any of the three methods; via a mobile phone, the
Internet or speech the user commands are transferred to the home automation server
(which is done by a PC) via one of the three alternatives. In the home automation server
the incoming commands are processed, then digitized and sent to the relevant unit to be
processed. In each unit there are separate low-cost microcontrollers to receive the
commands from the transceiver and apply these to the appliances they are attached to.
These devices have also the capability of sending their status back to the transceiver node
which is connected to the home automation server thus they can be monitored in real-

time. After receiving the feedbacks from the appliance nodes, the home automation server
interprets them and performs the necessary tasks.

2.5 SMS based Remote Control System


The study from Chauhan, Singh, Agrawal, Kapoor, and Sharma [7] designed a
control system that is implemented through a microcontroller-based control module that
receives commands and instructions from a cellular phone over the GSM module. The
system can control up to 16 electrical devices that can switch on or off the devices at
home remotely. The mobile phone is integrated with the microcontroller PIC16F873A
which receives SMS message from users mobile phone and sends a command to the
controller to control whether to turn ON or OFF the output. The mobile phone also sends
status reporting to the user regarding the electrical appliance.

2.6 Efficient Authorized Access Security System Control Using ATMEL


89C55 & Mobile Bluetooth
The study of Basil Hamed[8] presented the technology of Authorized Access
Security System. This technology uses two access ways. First is the ATMEL 89C55
microcontroller which will detect any unauthorized motion inside the protected area and
second is the Bluetooth Technology which is used in providing wireless and automatic
unlocking of the door. It uses a data logger which makes use of the ATMEL 89C55 and
visual basic program which provides multiple accesses to a protected area that can be an
office, home, bank or whatever needed it is then connected to a keypad-LCD using the
parallel port in which the commands are located. It has an added camera feature in which
it can monitor the protected area. The data logger was added to the system to make
records of users who accessed the system at any time.

The Bluetooth interface is

independent from the keypad-LCD interface. It is used by enabling the Bluetooth of the
mobile phone and enters the required password in order to unlock the door.

The advantage of the proposed study is that it cant be accessed remotely and
Bluetooth technology has a limited range of area to be covered.

También podría gustarte