外文翻译--基于GSM网络的智能汽车防盗报警系统的设计与开发
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
外文翻译
标题:Design and Development of a Smart Auto Intruder Alarm System with GSM Network
中文译名:基于GSM网络的智能汽车防盗报警系统的设计与开发
作者:M.Ehikhamenle, B.O. Omijeh
日期:2016年
出处:Ehikhamenle M, Omijeh BO. Design and Development of a Smart Auto Intruder Alarm System with GSM Network [J]. IJIRCCE, 2016, 4(12): 20588-20597.
分为2部分:
第一部分为外文原文
第二部分为中文译文
Design and Development of a Smart Auto Intruder Alarm System with GSM Network
M.E h ikhamenle1, B.O. Omijeh1
Department of Electronic and Computer Engineering, University of Port Harcourt, Choba, Rivers State, Nigeria1’ABSTRACT :This project is based on the design and construction of an intruder detecting and alerting system. This was achieved using an AT89C52 microcontroller for the control of the other component, a SIM900-GSM module that communicates between the home owner phone and the PIR sensor (motion sensor). The interfacing between the GSM module and the microcontroller was achieved using an IC called MAX232 (this IC converts TTL voltage level (+5V) to RS232 voltage level (plus minus 7.5V) vice versa) and the microcontroller was programmed using assembly language. At the end of this project we were able to design and construct a device that is not only cheap but efficient. We overcome the problem of false alarm by using a PIR sensor (passive infrared: this sensor only respond to infrared emitted from the human body and animals) and after testing, the microcontroller responded to the information sent by the PIR sensor and in the occurrence of intrusion send an alert message to the home owner as well sounding an alarm to alert the neighbours using a buzzer.
KEYWORDS; Intruder Detecting, G S M Module, P.I.R. Sensor
I.INTRODUCTION Security is a prime concern in our day-to-day life. Everyone wants to be as much secure as possible. In recent times the world has experienced an exponential increase in the rate of crime. Criminals break into houses on a daily basis around the world carting with huge amount of money and precious items. Sensitive and confidential documents, materials and equipment by corporation are constantly declared missing from where they are kept. So there is a need to provide a device that can detect unauthorized persons in an environment.
In a network or a system, any kind of unauthorized or unapproved activities are called intrusions. An Intruder Detection System (IDS) is a collection of the tools, methods, and resources to help identify, assess, and report intrusions.
Intrusion detection is typically one part of an overall protection system that is installed around a system or device and it is not a stand-alone protection measure (Ngad, 2008). In (Zhang et el, 2003), intrusion is defined as: “any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource” and intrusion prevention techniques (such as encryption, authentication, access control, secure routing, etc.) are presented as the first line of defense against intrusions.
However, as in any kind of security system, intrusions cannot be totally prevented. The intrusion and compromise of a node leads to confidential information such as security keys being revealed to the intruders. This results in the failure of the preventive security mechanism. Therefore, IDSs are designed to reveal intrusions, before they can disclose the secured system resources. IDSs are always considered as a second wall of defense from the security point of view. IDSs are cyberspace equivalent of the burglar alarms that are being used in physical security systems today (Patcha and Park, 2007). As mentioned in (Zhang et el, 2003), the expected operational requirement of IDS s is given as: “low false positive rate, calculated as the percentage of normalcy variations detected as anomalies, and high true positive rate, calculated as the percentage of anomalies detected”.
II.RELATED WORKS Considering the current global security environment, the importance of good physical security is difficult to ignore. Physical security services are becoming a private rather than public service i.e. individuals and organizations tend to hire private security firms and install security equipment and use the police as the back. According to the Bureau of Labor Statistics (2004), private security officers outnumber police officers by more than 2 to 1 in the United States of America. Recent reports suggest that this trend holds true for both daily security operations responding to terrorism, natural disasters. Physical security has seen less attention and it is primarily an applied field, it has no dedicated line of research. Instead, it is scattered through fields like engineering, computer science, chemistry and physics as well as social sciences such as criminology, sociology and psychology. The different types of existing security systems will be analyzed below. •Electrical Locks
Electric locks come in many forms. The most basic is a Magnetic Lock (commonly called a mag lock). A large electro- magnet is mounted on the door frame and a corresponding armature is mounted on the door. When the magnet is powered and the door is closed, the armature is held fast to the magnet. Mag locks are simple to install and are very attack resistant. But mag locks are also problematic. Improperly installed or maintained mag locks have fallen on people. Also there is no mechanical free egress. In other words, one must unlock the mag lock to both enter and leave. This has caused fire marshals to impose strict codes on the use of mag locks and the access control practice in general. Other problems include a lag time in releasing as the collapsing magnetic field is not instantaneous. This lag time can cause a user to walk into the door. Finally, mag locks by design fail unlocked, that is if power is removed they unlock. This could be a problem where security is a prime concern.
•Electric Strikes replace a standard strike mounted on the door frame and receive the latch and latch bolt. Electric strikes can be simple to install when they are designed for drop-in replacement of a standard strike. But some electric strikes require that the door frame be heavily modified. Electric strikes allow mechanical free egress: As a user leaves, he operates the lockset in the door, not the electric strike in the door frame. Electric strikes can also be either fail unlocked, as a mag lock, or the more secure fail locked. Electric strikes are easier to attack than a mag lock. It is simple to lever the door open at the strike. Often the there is an increased gap between the strike and the door latch. Latch guards are often used to cover this gap
•Electric Mortise and Cylindrical Locks are drop in replacements for the door mounted mechanical locks. A hole must be drilled in the door for electric power wires. Also a power transfer hinge is used to get the power from the door frame to the door. Electric mortise and cylindrical locks allow mechanical free egress. Electric mortise and cylindrical locks can be either fail unlocked or fail locked.
•Electrified Exit Hardware, sometimes called panic hardware or crash bars, are used in fire exit applications. The idea is that one simply pushes against the bar to open it, making it the easiest of mechanically free exit methods.
Electrified exit hardware can be either fail unlocked or fail locked. A drawback of electrified exit hardware is their complexity which requires skill to install and maintenance to assure proper function.
•Motor Operated Locks are used throughout Europe. A European motor operated lock has two modes, day mode where only the latch is electrically operated, and night mode where the more secure deadbolt is electrically operated ().
USER AUTHENTICATION SYSTEMS
When implemented with a digital access system, one of the following access systems or digital authentications systems can be with an electric lock. These however are only a few of the numerous authentication devices available.
•Numerical Codes, Passwords and Passphrases: Perhaps the most prevalent form of electronic lock is that using a numerical code for authentication; the correct code must be entered in order for the lock to deactivate.
Such locks typically provide a keypad, and some feature an audible response to each press. Combination lengths are usually between 4 and 6 digits long. A variation on this design involves the user entering the correct
password or passphrase. A major hindrance however is the fact that users are capable of forgetting their codes.
Forgetfulness is especially common in older people and this system will not be convenient for them. These codes are, in some cases, easy to crack.
•Security Tokens: Another means of authenticating users is to require them to scan or "swipe" a security token such as a smart card or similar, or inter act a token with the lock. For example, some locks can access stored credentials on a personal digital assistant using infrared data transfer methods. However, just as in the case of an ATM card, the magnetic tape tends to wear off with time either resulting to time wasting in accessing a room or the inability of the user to access the room at all.
•Biometrics: As biometrics become more and more prominent as a recognized means of positive identification, their use in security systems increases. Some new electronic locks take advantage of technologies such as fingerprint scanning, retinal
scanning and iris scanning, and voiceprint identification to authenticate users. This is a very secure way of identifying a person’s identity but it is limited by the occurrence of an accident or disfiguration to the part of the body used for identification.
III.MATERIALS AND METHODS The block diagram below shows the sections and the signal flow. The circuit diagram shows the different component required for the system to function properly.
The Circuit Analysis
The motion based security system is made up of the following stages;
i.Power Supply Unit
ii.Input stage: the input stage comprises of;
•Motion sensor
iii.Control stage •Microcontroller
iv.Output stage •Buzzer
•LCD Screen
•Bulb
•G S M module
Fig 3.1 The Block Diagram of the System
A. POWER SUPPLY UNIT
Figure 3.2: Diagram of Power Supply Unit
The power supply serves as the main supply of electrical power to the system. The supply voltage is 220Vac that is step down by a 220Vac/12Vac, 500mA transformer. The 12V AC voltage is then rectified by a bridge rectifier to have a DC output. After the rectification process the remaining AC ripples are filtered off by a bypass capacitor. The output from the bypass capacitor is unregulated thereby causing a drastic voltage drop when a load is connected. To solve this problem an integrated IC chip voltage regulator is used to get fixed o utput.
i. Analysis of Power Supply A 240/24V center tapped step
– down transformer was used, to feed 24V to the circuit. Secondary voltage of transformer = 24V (Vγms ) the peak secondary voltage, V peak =√2 × Vγms ……
3.1
= √2 × 24 = 33.9V
The bridge rectifier diode will rectify the 24V from the secondary of the step down t ransformer.
The full-wave bridge rectifier 5W001 was used because it have a peak inverse voltage of 50V and can pass a peak current of 2A which is suitable for our circuit design.
V L (peαk ) = V (max ) − 2V d (oη) … … … … … … … … … 3.2
Where V L(peak) is the peak to peak voltage of the load
V (max) is the maximum voltage of the alternating current V d(on) is the voltage drop across the bridge rectifier diode
[33.9 − 2(0.7)] = 32.5V
The PIV rating of the diode to be used should be at least PIV = V (mαx ) − V D (oη) … … … … … … … … … 3.3 = 33.9 − 0.7
= 33.2V
Therefore the 50v PIV is far greater than this value 33.2v, thus making it suitable for this design. For a suitable filter capacitor value to be employed the following calculations was considered
Vγ = Io /2fc
Where Vγ = γipple voltαge = 1.0V
f = fγequency = 50Hz
Io
250mA Io = γegulαtoγ output cuγγent = 250mA
Therefore, C = 2fVγ = 2x50x1.0 = 2500 x 10-6 farad = 2500µf. Since 2500µf is not a standard value, 2200µf was used.
2
G N D
2
G N D
2
G N D
ii. Voltage regulator
Three voltage regulators were used, two 7805 and 7812 both of them gives 5v and 12v respectively.
iii. Light emitting diode (Indicator)
A light emitting diode is connected in the circuit this will notify that there is power in the circuit. A resistor is connected in series with the light emitting diodes. The resistor limit the amount of current entering the light emitting diode. The value of the resistor is gotten from the calculation below.
V = V = V d = V d + IR
Supply voltage
Operating voltage of
light emitting diode (LEDS ) I
= R = V = V d = I = Allowable current through the LEDS Limiting current Re sistor 5v 2v 30mA
(20mA )
∴ R =
V - V d I = 5 - 2 30mA
=
3 = 30 x 10-3 3 x 1000 30 R = 100Ω
B. INPUT UNIT
The input unit is made up of the motion sensor that senses if there is a movement in the restricted area the block diagram is shown below. .
Fig 3.3 circuit diagram of the motion sensor
The motion sensor is used to detect the movement of a human body. It gives a low voltage when there is no motion, when there is motion it sends a 5volt, this will trigger the transistor. The transistor will send the zero voltage to the microcontroller. The transistor used in this circuit is used as a logic inverter. The voltage applied at the base is inverted at the collector terminal. When there is no intruder the motion sensor produces a low at its output terminal, the base of the transistor is connected to the output terminal of the motion sensor. The low signal switches off the transistor thereby preventing current from flowing via the resistor to the emitter. This is an open circuit condition, the voltage that will be gotten at the collector emitter junction is the maximum voltage applied at the collector terminal (5volt). This voltage is sent to the microcontroller.
When the sensor senses motion it outputs a 5v for one second then goes back to zero, to search if there is any movement again. When the output is five volts the transistor is switched on making the collector voltage to have a zero voltage. The zero voltage notifies the microcontroller that an intruder has been detected. The motion sensor has a range of 6m
D.CONTROL UNIT
The control unit is the microcontroller (AT89c52). It is used to processes the security detecting system. The motion sensor is connected to the pin 1 of the microcontroller via the transistor logic inverter. When the microcontroller receives a low voltage from the input of the motion sensor it turns on the light, bulb, sends message to three individual and displays intruder detected on the liquid crystal display. The diagram of the control circuit is shown below
From figure 3.5, p1.0 is connected to the motion sensor via the logic inverter; p2 is connected to the liquid crystal display. Where p2.0, p2.1, p2.2 and p2.3 is connected to the data pins of the liquid crystal display and p2.5 and p2.7 is connected to the register select and enable of the liquid crystal display. P3.0 and P3.1 are the serial terminals of the microcontroller; it is connected to the GSM module via max232. The max232 is used to convert the voltage from the GSM to TTL voltage as well as converting TTL voltages to the acceptable voltage of the GSM module.
The buzzer is connected to port 3.5 via a transistor when an intruder is detected; the microcontroller sends a 5volt to the base of the transistor. This switches the transistor and the buzzer is turn on.
The light bulb is connected to relay which is connected to p3.6 of the microcontroller via the transistor, this illuminate the area of intrusion.
Fig 3.4 control unit
E.OUTPUT UNIT
The output unit consists of;
i.LCD Screen
ii.Buzzer
mp
i. LCD Screen
The LCD screen is used to display that an intruder has been detected; this is possible due to its data terminals and command register that the microcontroller is connected to. The buzzer sounds an alarm when an intruder is detected either from the infrared sensing system or the ultrasonic module.
ii. Buzzer
The buzzer sounds an alarm when an intruder is detected from the motion detecting system.
iii. Lamp
The lamp is connected to the microcontroller via a relay and transistor. When an intruder is detected the microcontroller switches on the bulb through the transistor and relay.
iv. GSM module
The GSM module is used to sends message to three individual using AT commands. This is done by the microcontroller when an intruder is detected.
F. CONSTRUCTION OF CIRCUIT AND ASSEMBLY OF COMPONENTS
After designing the circuit in a software environment Proteus Version 7.8 and simulating it. The values of each component were obtained and ordered from the marketers and when they arrived construction began.
The construction started with mounting of components on the Vero board; each component was tested before mounting and then soldered to the Vero board.
The power supply unit was built first and the voltages from the voltage regulator were tested before going into the next stage. The control unit was soldered and tested. The output unit was soldered last and tested. Each stage is connected (joined) by a connecting wire or placed in the same row for continuity and tested before packaged with a plastic adaptable box. After packaging (casing) the prototype was tested and checked for any fault arising because of vibration and shaking owing to packaging.
Figure 3.5: Circuit Diagram of the Motion Based Security System
2
G N D
1 2 3
4 5 6
7 8 9 10 11 12 13 14
V S S V D D V E E
R S R W E
D 0 D 1 D 2 D 3 D 4 D 5 D 6 D 7
2
G N D
2
G N D
IV.RESULTS AND DISCURTIONS Before using any component it is advisable to test them before soldering and also to test each stage of the project during construction. This approach provides us with an easy way to trace fault and easily correct them. The power supply unit was checked for proper voltage level from its output pins with a multi-meter. The motion sensor and GSM module were also tested, as well as the entire circuitry. The software programmed was simulated and checked in the assembler (M.I.D.E studio), the hex file was generated with no error recorded before it was burned into the microcontroller chip using a TOPWIN programmer.
Fig 4.1 testing of source code using M.I.D.E studio
Fig 4.2 burning of program into chip using topwin
A. POWER SUPPLY UNIT
Table below shows the power supply test using DC Multimeter.
The motion sensor
The motion sensor was tested by placing the sensor, and sensing for the change of the output voltage. When the sensor senses motion the output is high and when no motion is sense the output is low.
Table 4.2 results from the output of the motion sensor
V.CONCLUSION The aim of the project is to develop a system that can be able to detect when an intruder enters an area, the system should alert the public by sounding an alarm, illuminating the area, as well as sending text messages to three different numbers. The circuit is an innovative device that is active in detecting an intruder. The device can be used at homes, schools, churches, etc. it will promote security of lives and property in this country if adopted.
In Nigeria where home burglary and robbery is in the increase this circuit will reduce the rate of armed robbery in an area, and it is in line with the government vision 2020.
REFERENCES
1. Microsoft Encarta Encyclopedia (Student Edition), 2008Bitzer, E. and Hoffman, A. Research Paper: Psychology inthe Study of Physical Security, 2007
2.Bunn, M. & Wier, A. (2004). Securing the bomb: An agenda for Action. Cambridge, MA: Harvard University, Belfer
Center for Science and International Affairs
3.Higgins, M. (2005, September 10). Katrina-hit states turn to security firms, The Washington Times.
4.Virasami, B. (2005, April 28). City to Train Private Security Guards. Newsday, p. A17
5.Hassan, M.F. (2008, October 14), Intelligent Intrusion Detection System, Blog. Microchip Technology, PIC16F87x Data
Sheet, 2001.
6./wiki/intrusion_detection_systems (Retrieved Date: 6th November, 2008)
/viewaricle/456786 (Retrieved Date: 12th September, 2008)
8.U.S. Department of Labor: Bureau of Labor Statistics (2005) May 2004 National Occupational Employment and Wage
Estimates: Protective Service Occupations
9./current/oes_33pr.htm (Retrieved Date: April 13, 2005)
/projectsensors/026/ (Retrieved Date: 15th February, 2009)
11. Harris, Tom (March, 2008), “How Burglar Alarms Work”, , Retrieved April 10, 2007,
12.wikipedia (May, 2008), “Closed-circuit television”, Retrieved May 16, 2008, from
13./wiki/surveillance_cameras wikipedia (May, 2008), “Security”,Retrieved
May 16, 2008,from
/wiki/security
BIOGRAPHY
Ehikhamenle M. graduated with BEng (Second class upper honors)Electrical/Electronics Engineering from Ambrose Alli University Ekpoma in 2007.He obtained his Master degree in Electrical/Electronics Engineering fromUniversity of Benin (UNIBEN), specializing in Electronics and Telecommunications in 2010. He was Head of Department Essential services, Works and Services Directorate Ambrose Alli University Ekpoma in 2012/2013. He is presently a lecturer in Electronic and Computer Engineering Department University of Port-Harcourt (UNIPORT).He has taught courses in electronics, computer,and telecommunications Engineering. His research interest include: Electronic, telecommunication, power electronic CAD, ICT and Control Systems.
中文翻译
基于GSM网络的智能汽车防盗报警系统的设计与开发
摘要:该项目是基于入侵检测和警报系统的设计和构造。
这是通过使用AT89C52微控制器来控制另一个组件实现的,SIM900-GSM模块在家庭主电话和PIR传感器(运动传感器)之间进行通信。
GSM模块和微控制器之间的接口通过使用称为MAX232的IC(该IC将TTL电压电平(+ 5V)转换为RS232电压电平(加上减去7.5V)实现,反之亦然),并且微控制器使用汇编语言编程。
在这个项目的最后,我们能够设计和构建一个不仅廉价而且高效的设备。
我们通过使用PIR 传感器(被动红外:该传感器仅响应从人体和动物发出的红外线)克服了假警报的问题,并且在测试之后,微控制器响应由PIR传感器发送的信息,并且在发生入侵向家庭所有者发送警报消息以及发出警报以使用蜂鸣器警告邻居。
关键词; 入侵检测,GSM模块,PIR传感器
介绍
安全是我们日常生活中最关心的问题。
每个人都想要尽可能安全。
最近,世界犯罪率呈指数级增长。
犯罪分子在世界各地闯入房子,用巨大的金钱和珍贵的物品。
敏感和机密的文件,材料和设备由公司不断被宣布失踪从它们被保存。
因此,需要提供一种能够在环境中检测未授权人员的设备。
在网络或系统中,任何未经授权或未经批准的活动都称为入侵。
入侵检测系统(IDS)是用于帮助识别,评估和报告入侵的工具,方法和资源的集合。
入侵检测通常是围绕系统或设备安装的整体保护系统的一部分,并且它不是独立的保护措施(Ngad,2008)。
在(Zhang et al,2003)中,入侵被定义为:“试图危及资源的完整性,机密性或可用性的任何一组动作”和入侵防御技术(例如加密,认证,访问控制,安全路由,等等)被提出作为防御入侵的第一线。
然而,如在任何种类的安全系统中,不能完全防止入侵。
节点的入侵和折衷导致机密信息,例如向入侵者显示的安全密钥。
这导致预防性安全机制的失败。
因此,IDS被设计为在它们可以公开安全的系统资源之前显示入侵。
从安全的角
度来看,IDS总是被视为第二道防线。
IDS是当今在物理安全系统中使用的防盗报警的网络空间等价物(Patcha和Park,2007)。
如在(Zhang et al,2003)中所提到的,IDS的预期操作需求被给出为:“低假阳性率,计算为作为异常检测的正常变化的百分比,以及高真阳性率,计算为异常的百分比检测“。
相关工作
考虑到当前的全球安全环境,良好的物理安全的重要性难以忽视。
物理安全服务正在成为一种私人服务,而不是公共服务,即个人和组织倾向于雇用私人保安公司并安装保安设备,并使用警察作为背。
根据劳工统计局(2004年),在美利坚合众国,私营保安人员比警察人员多2比1。
最近的报告表明,这种趋势对于应对恐怖主义,自然灾害的日常安全行动都是正确的。
物理安全受到较少的关注,它主要是一个应用领域,它没有专门的研究线。
相反,它散布在像工程,计算机科学,化学和物理学的领域以及社会科学,如犯罪学,社会学和心理学。
下面将分析不同类型的现有安全系统。
电锁
电锁有多种形式。
最基本的是磁性锁(通常称为磁锁)。
大的电磁体安装在门框上,相应的电枢安装在门上。
当磁体被供电并且门被关闭时,电枢被快速地保持到磁体。
磁锁安装简单,非常耐攻击。
但磁锁也有问题。
不正确地安装或维护磁锁已经落在人身上。
也没有机械自由出口。
换句话说,必须解锁磁带锁才能进入和离开。
这使得火警法官对使用磁带和一般的访问控制实践施加严格的规则。
其他问题包括释放时的滞后时间,因为塌陷磁场不是瞬时的。
这个滞后时间可以导致用户走进门。
最后,磁卡的设计失败解锁,也就是说,如果电源被移除,他们解锁。
这可能是安全是主要关注的问题。
电击替代安装在门框上的标准撞针,并接收闩锁和闩锁螺栓。
电击可以简单地安装,当它们被设计用于替换标准警告。
但是一些电击需要对门框进行大幅修改。
电击允许机械自由出口:当用户离开时,他操作门中的锁,而不是门框中的电触发。
电击也可以是故障解锁,磁锁,或更安全的故障锁定。
电罢工比磁带更容易攻击。
在门口打开门很简单。
通常,在门闩之间存在增加的间隙。
闩锁保护装置通常用于覆盖该间隙。
电动榫和圆柱锁用于门安装的机械锁的更换。
在电源线的门上必须钻一个孔。
此外,功率传递铰链用于从门框架到门的电力。
电榫和圆柱形锁允许机械自由出
口。
电榫和圆柱形锁可以是失效解锁或失效锁定。
电气出口硬件,有时称为紧急硬件或碰撞杆,用于防火出口应用。
这个想法是,一个人简单地推动酒吧打开它,使其成为最简单的机械自由出口方法。
电气退出硬件可以是故障解锁或故障锁定。
带电退出硬件的缺点是它们的复杂性,这需要安装和维护的技巧以确保正常的功能。
电动锁在整个欧洲使用。
欧洲电动锁具有两种模式,即日间模式,其中只有闩锁是电操作的,而夜间模式中更安全的锁闩是电操作的()。
用户认证系统
当用数字接入系统实现时,以下接入系统或数字认证系统之一可以具有电子锁。
然而,这些仅是可用的众多认证设备中的几个。
数字代码,密码和密码:也许电子锁最普遍的形式是使用数字代码进行认证; 必须输入正确的代码才能停用锁定。
这种锁通常提供键盘,并且一些特征对每个印刷机具有可听响应。
组合长度通常在4和6位数之间。
此设计的变体涉及用户输入正确的密码或密码短语。
然而,主要的障碍是用户能够忘记他们的代码的事实。
安全令牌:验证用户的另一种方法是要求他们扫描或“刷”安全令牌(如智能卡或类似卡),或使用锁来操作令牌。
例如,一些锁可以使用红外数据传输方法访问个人数字助理上的存储的凭证。
然而,正如在ATM卡的情况下,磁带趋向于随时间而磨损,导致在访问房间时浪费时间或者用户根本不能访问房间。
生物识别:随着生物识别越来越突出,作为积极识别的公认手段,它们在安全系统中的使用增加。
一些新的电子锁利用诸如指纹扫描,视网膜扫描和虹膜扫描的技术以及声波纹识别来认证用户。
这是识别个人身份的非常安全的方式,但它受到用于识别的身体部分的事故或损坏的发生的限制。
下面的框图显示了各部分和信号流。
电路图显示了系统正常工作所需的不同组件。
电路分析
基于运动的安全系统由以下阶段组成:
电源用作系统的主电源。
电源电压为220Vac,由220Vac / 12Vac,500mA变压器降压。
然后,12V AC电压由桥式整流器整流以具有DC输出。
在整流过程之后,剩余的AC纹波由旁路电容器滤除。
来自旁路电容器的输出是未调节的,从而当连接负载时导致剧烈的电压降。
为了解决这个问题,使用集成IC芯片电
压调节器来获得固定输出。
运动传感器用于检测人体的运动。
当没有运动时,它给出一个低电压,当有运动时它发送一个5伏,这将触发晶体管。
晶体管将零电压发送到微控制器。
该电路中使用的晶体管用作逻辑反相器。
施加在基极处的电压在集电极端子处反转。
当没有入侵者时,运动传感器在其输出端产生低电平,晶体管的基极连接到运动传感器的输出端。
低信号关断晶体管,从而防止电流通过电阻流到发射极。
这是一种开路条件,在集电极发射极结处获得的电压是在集电极端子(5volt)施加的最大电压。
该电压被发送到微控制器。
结论
该项目的目的是开发一个系统,能够检测入侵者何时进入一个区域,系统应通过发出警报,照亮该区域以及向三个不同的数字发送文本消息来警告公众。
该电路是一个创新的设备,主动检测入侵者。
该设备可以在家庭,学校,教堂等使用,它将促进该国的生命和财产的安全,如果采纳。
在尼日利亚,家庭爆窃和抢劫在增加,这个电路将降低一个地区的武装抢劫率,这符合政府的2020愿景。