Académique Documents
Professionnel Documents
Culture Documents
BACHELOR OF TECHNOLOGY
IN
This is to certify that the Mini Project-II Report entitled “HOME AUTOMATION
SYSTEM USING GSM” submitted by Happy Agarwal (13BEC033) & Akash Kedia
(14BEC010) as the partial fulfillment of the requirements for the award of the degree of
Bachelor of Technology in Electronics & Communication Engineering, Institute of
Technology, Nirma University is the record of work carried out by him/her under my
supervision and guidance. The work submitted in our opinion has reached a level
required for being accepted for the examination.
Date: 04/05/2017
I would like to extend my thanks to Institute of Technology, Nirma University for giving us this
opportunity for undergoing this project work, which helped in our development in various aspects.
I would like to thank respected Prof. RACHNA SHARMA for giving me such a wonderful opportunity
to expand my knowledge for my own branch and giving me guidelines to present a Mini project
report. It helped me a lot to realize of what we study for. Secondly, I would like to thank my
parents who patiently helped me as i went through my work and helped to modify and eliminate
some of the irrelevant or un-necessary stuffs. Thirdly, I would like to thank my friends who helped
me to make my work more organized and well-stacked till the end. Next, I would thank Microsoft
for developing such a wonderful tool like MS Word. It helped my work a lot to remain error-free.
Last but clearly not the least, I would thank The Almighty for giving me strength to complete
report on time. I have tried to cover all the aspects in the project and minimize the errors.
ABSTRACT
Security has been a major issue where crime is increasing and everybody wants to take proper measures
to prevent intrusion. In addition there was a need to automate home so that user can take advantage of
the technological advancement in such a way that a person going out of home can keep an eye anytime.
Considering the advancement in technology we have designed an automatic security system which can
be used both for household as well as for office purpose. As nowadays everything can be controlled by
mobile so we have designed a system which can easily be operated by our handset. In today’s age of
digital technology and intelligent systems, home automation has become one of the fastest developing
application-based technologies in the world. The idea of comfortable living in home has since changed
for the past decade as digital, vision and wireless technologies are integrated into it.
Index
2 Literature Review
3 Peripherals Used
Conclusions 23
References 24
Annexure 25
LIST OF FIGURES
1.1) QR Code 10
1.2 OBJECTIVE
Basic Idea of our project is to provide GSM Based security even if the owner is away from the
restricted areas. For this we adopted wireless mode of transmission using GSM. Beside this there
are many methods of wireless communication but we selected GSM in our project because as
compared to other techniques, this is an efficient and cheap solution also, we are much familiar
with GSM technology and it is easily available.
GSM Technology
The radio spectrum can be shared by different users accessing similar frequency band without
causing any kind of obstruction. The techniques used for this are TDMA (Time division multiple
access), FDMA (Frequency division multiple access) and CDMA (Code division multiple
access).GSM is the combination of both Time and Frequency-Division Multiple Access
(TDMA/FDMA). FDMA part involves the partition by frequency of (maximum) 25 MHz
bandwidth into 124 carrier frequencies spaced 200 kHz apart. Each of the carrier frequencies is
then alienated in time, using a TDMA plan. The fundamental unit of time in this TDMA system
is called a burst period and it lasts 15/26 ms (or approx. 0.577 ms). Eight burst periods are
grouped into TDMA frame (120/26 ms, or approx. 4.615 ms), which forms essential unit for the
definition of logical channels. One physical channel is one burst period per TDMA frame. Thus
GSM allows eight concurrent calls on same radio frequency. GSM (Global System for Mobile
Communications) is a form of multiplexing, which divides the accessible bandwidth between
different channels.GSM operates on four special frequencies worldwide [1].
QR codes
QR codes are two dimensional quick response codes that are now gaining notability and
popularity in the United States. They are easy to use and versatile. The code itself stores huge
amounts of information that is easily scanned and stored onto a mobile device. Many businesses
are now adopting this code as a means of marketing and as another way to attract customers to
the internet for more information. QR codes have both advantages and disadvantages and both
benefits and drawbacks of the code should be understood before using the QR code as a
marketing technique.
1.1 QR Code
Advantages:
The main advantage of a QR code is its versatility. QR codes can be used for anything and
everything. They are also beneficial for both customers and businesses. For example, a business
saves money and advertising costs by distributing a QR code to their website or URL. A
customer can scan this QR code and this allows them to store the information for future
reference. What’s also greater about QR codes is that they bridge different forms of marketing
streams together. For example ecommerce and mobile commerce are both used for QR codes.
QR codes acts as the link and it also exposes customers to other forms of advertising the
business or service of the QR code has done. This maximizes exposure and can potentially
generate revenue
Advantages of Python
Python has clean object-oriented design, provides enhanced process control capabilities, and
possesses strong integration and text processing capabilities and its own unit testing framework,
all of which contribute to the increase in its speed and productivity. Python is considered a
viable option for building complex multi-protocol network applications. Python provides a large
standard library which includes areas like internet protocols, string operations, web services
tools and operating system interfaces. Many high use programming tasks have already been
scripted into the standard library which reduces length of code to be written significantly.
CHAPTER 2 – LITERATURE REVIEW
In most of the cases we use a watchman at our home, a dog or a camera to keep a record so these are the
most commonly used system nowadays to protect our houses but a major drawback in these systems are
the cost and camera can be only used to see how a robbery was made, it cannot give an instant alert to
the owner and stop the robbery. Home security involves the security hardware in place on a property,
and personal security practices. The hardware would be the doors, locks, alarm systems, lighting,
motion detectors, security camera systems, etc. that are installed on a property. Personal security
practices would be ensuring doors are locked, alarms activated, windows closed, extra keys not hidden
outside and many other routine tasks which act to prevent a burglary. According to an FBI report, 58.3
percent of burglaries involved forcible entry. A typical burglary lasts for about 8 to 12 minutes and, on
average, a burglar will break into a home within 60 seconds. Home security can be strengthened by
adding a first line of defense like a thorny shrub or bush to give the burglar a hard time. A motion
activated bright light can play a psychological role in deterring a burglar also acting as a second line of
defense along with outdoor security cameras. In order to protect the entry points, we need to have
window and door sensors. Once a burglar gets past the second line of defense, motion detectors kick in.
A motion detector can raise an alarm or send a security footage to the homeowner if it's linked to a
camera system. Storing valuables like passports, jewelry, important documents, etc. might also be
considered a home security precaution. Common security methods include never hiding extra keys
outside, never turning off all the lights, applying small CCTV stickers on doors, and keeping good tabs
with neighbors.
CHAPTER 3-PERIPHERALS USED
Operating Voltage 5V
EEPROM 4KB
The reed switch (sometimes also known as Herkon) is an electrical switch operated by an applied
magnetic field. It was invented at Bell Telephone Laboratories in 1936 by W. B. Ellwood. It consists of
a pair of contacts on ferromagnetic metal reeds in a hermetically sealed glass envelope [3].
3.4 Ultra Sonic
Level II: If the burglar continues to enter the house we have kept an ultrasonic sensor in the passage
which will detect the presence and so it will transfer the signal to the GSM module and a message will
be again sent to the owner that level 2 security is been breached.
The project we have undertaken has helped us gain a better perspective on various aspects
related to our course of study as well as practical knowledge of electronic equipment and
communication. We became familiar with software analysis, designing, implementation,
testing and maintenance concerned with our project. The extensive capabilities of this
system are what make it so interesting. From the convenience of a simple cell phone, a user
is able to control and monitor virtually any electrical devices. This makes it possible for
users to rest assured that their belongings are secure and that the television and other
electrical appliances was not left running when they left the house to just list a few of the
many uses of this system. The end product will have a simplistic design making it easy for
users to interact with. This will be essential because of the wide range of technical
knowledge that homeowners have.
References
1)https://www.ukessays.com/essays/information-technology/advantages-and-disadvantages-of-gsm-
information-technology-essay.php
2) https://www.arduino.cc/en/Main/arduinoBoardMega2560
3)https://www.google.co.in/search?q=working+of+reed+switch&rlz=1C1CHBD_enIN714IN714&o
q=working+of+reed+switch&aqs=chrome..69i57.8757j0j9&sourceid=chrome&ie=UTF-8
4)dreamstime.com
5)cutcaster.com
6) centraltimeclock.com
Annexure
GSM gsmAccess;
GSM_SMS sms;
char remoteNum[20] = "+919016888444";
int encode[3] = {0,0,0};
void setup()
{
pinMode(12, INPUT);
pinMode(11, OUTPUT);
pinMode(14, INPUT);
pinMode(13, OUTPUT);
pinMode(16, INPUT);
delay(30000);
Serial.begin(9600);
while (!Serial)
{
;
}
}
void loop()
{
pinMode(13, OUTPUT);
digitalWrite(13, LOW);
delayMicroseconds(2);
digitalWrite(13, HIGH);
delayMicroseconds(5);
digitalWrite(13, LOW);
pinMode(13, INPUT);
int duration = pulseIn(13, HIGH);
int distance = duration / 29 / 2;
if((digitalRead(12)!= LOW)||(digitalRead(14)!= HIGH))
{
encode[0]=1;
}
else
{
delay(1000);
}
sms.beginSMS(remoteNum);
if(encode[2]==1)
{
sms.print("Security Level 3 Breached");
sms.endSMS();
}
else
{
if(encode[1]==1)
{
sms.print("Security Level 2 Breached");
sms.endSMS();
}
else
{
if(encode[0]==1)
{
sms.print("Security Level 1 Breached");
sms.endSMS();
}
}
}
}
#include <GSM.h>
#include <string.h>
GSM gsmAccess;
GSM_SMS sms;
void setup() {
// initialize serial communications and wait for port to open:
Serial.begin(9600);
while (!Serial) {
; // wait for serial port to connect. Needed for native USB port only
}
}
void loop() {
char c;
char message_income[16];
int i;
if (sms.available()) {
i=0;
while (c = sms.read())
{
message_income[i]=c;
++i;
}
if((strcmp(message_income,"14BEC010")==0)||(strcmp(message_income,"MP6")==0)||(strcmp(message_income,"GUIDER
S")==0))
{
sms.remoteNumber(senderNumber, 20);
Serial.println(senderNumber);
sms.flush();
}
}
delay(1000);
#include <GSM.h>
#define PINNUMBER ""
GSM gsmAccess;
GSM_SMS sms;
void setup()
{
Serial.begin(9600);
pinMode(13,OUTPUT);
pinMode(12,OUTPUT);
pinMode(6,OUTPUT);
boolean notConnected = true;
while (notConnected)
{
if (gsmAccess.begin(PINNUMBER) == GSM_READY)
{
notConnected = false;
}
else
{
Serial.println("Not connected");
delay(1000);
}
Serial.println("GSM initialized");
}
}
void loop()
{
char remoteNum[20]= "8758582771";
Serial.println(remoteNum);
// sms text
//Serial.print("Now, enter SMS content: ");
char txtMsg[4][200];
char str[200];
int i = 1;
char result[5];
while(1)
{
if(Serial.available())
{
result[i-1]=Serial.read();
//Serial.print(result[i-1]);
if((result[i-1]=='1')&&(i==1))
strcpy(txtMsg[0]," F1 ON ");
else if((result[i-1]=='0')&&(i==1))
strcpy(txtMsg[0]," F1 OFF ");
else if((result[i-1]=='1')&&(i==2))
{
strcpy(txtMsg[1]," F2 ON ");
digitalWrite(13,HIGH);
}
else if((result[i-1]=='0')&&(i==2))
strcpy(txtMsg[1]," F2 OFF ");
else if((result[i-1]=='1')&&(i==3))
{
strcpy(txtMsg[2]," T1 ON ");
digitalWrite(12,HIGH);
}
else if((result[i-1]=='0')&&(i==3))
strcpy(txtMsg[2]," T1 OFF ");
else if((result[i-1]=='1')&&(i==4))
{
strcpy(txtMsg[3]," T2 ON ");
digitalWrite(6,HIGH);
}
else if((result[i-1]=='0')&&(i==4))
strcpy(txtMsg[3]," T2 OFF ");
i++;
if(i>4)
break;
}
}
strcat(txtMsg[0],txtMsg[1]);
strcat(txtMsg[0],txtMsg[2]);
strcat(txtMsg[0],txtMsg[3]);
sms.beginSMS(remoteNum);
sms.print(txtMsg[0]);
sms.endSMS();
Serial.println("\nCOMPLETE!\n");
}