This document discusses the development of anti-theft security systems. It begins by providing background on vehicle tracking systems using GPS and GSM technology. These systems can track vehicle location in real-time and send alerts to owners if theft is detected. The document then discusses objectives of developing a security system for a lecturer's room door, including programming an auto-lock feature and creating a GUI for user control. It aims to integrate the door locking system with a PC for remote access and control. The scope is outlined as focusing on software and hardware development for a basic PC-controlled security system as a demonstration project.
The main objective of our project is to provide an optimum solution to the traffic hazards and the road accidents. According to this project when a vehicle meets with an accident, immediately vibration sensor will detect the signal and sends it to ARM controller. Microcontroller sends the alert message through the GSM MODEM including the location to police control room or a rescue team. So the police can immediately trace the location through the GPS MODEM after receiving the information.
Fnal year project on iot accident detection and tracking system 26-may 21'ankitadeokate
This presentation is based upon final year project supervised under the premises of cummins college of engineering for women, pune, on IoT based Accident Detection & Tracking System and also contributing towards smart healthcare sector, by initiating theologies of research or the ways of research can be taken out in this area aswell, to make this system further more intelligent on predictions conducted from the studies of statistics and machine learning, to automate this research from data log and system can be made smart supervisory, to contribute towards smart healthcare sector.
smart city - smart healthcare sector- industry 4.0
Here CM SECURITIES SYSTEMS includes two projects in it,
1. Train Accident Safety - Deals in Safety, inclusive of following 3 complete system modules.
· FREQUENCY MODULE SAFETY SYSTEM (Works on principle of FM Module)
· SIMPLE CIRCUIT BASED SYSTEM (Works on principles of circuits like Wireless Electricity Transmission, GATE, Timer Circuit)
· BLUETOOTH MODULE SAFETY SYSTEM (Works on principal of BT Module)
2. Central Railway Stations Systems (CRSS) – Deals in modernization.
The main objective of our project is to provide an optimum solution to the traffic hazards and the road accidents. According to this project when a vehicle meets with an accident, immediately vibration sensor will detect the signal and sends it to ARM controller. Microcontroller sends the alert message through the GSM MODEM including the location to police control room or a rescue team. So the police can immediately trace the location through the GPS MODEM after receiving the information.
Fnal year project on iot accident detection and tracking system 26-may 21'ankitadeokate
This presentation is based upon final year project supervised under the premises of cummins college of engineering for women, pune, on IoT based Accident Detection & Tracking System and also contributing towards smart healthcare sector, by initiating theologies of research or the ways of research can be taken out in this area aswell, to make this system further more intelligent on predictions conducted from the studies of statistics and machine learning, to automate this research from data log and system can be made smart supervisory, to contribute towards smart healthcare sector.
smart city - smart healthcare sector- industry 4.0
Here CM SECURITIES SYSTEMS includes two projects in it,
1. Train Accident Safety - Deals in Safety, inclusive of following 3 complete system modules.
· FREQUENCY MODULE SAFETY SYSTEM (Works on principle of FM Module)
· SIMPLE CIRCUIT BASED SYSTEM (Works on principles of circuits like Wireless Electricity Transmission, GATE, Timer Circuit)
· BLUETOOTH MODULE SAFETY SYSTEM (Works on principal of BT Module)
2. Central Railway Stations Systems (CRSS) – Deals in modernization.
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
This project was done by the students of Department of Computer Science and Engineering, International Islamic University Chittagong (IIUC).
Project Video : https://youtu.be/gEsIEVdwU7Q
Drowsiness is a critical factor impairing drivers’ performance in driving safely. There are several approaches in dealing with this issue based on human-machine interaction to detect drivers’ dozing off state, and then alert them to keep awake by sound or visual. These techniques fundamentally measure driver’s physical changes such as head angle, fatigue level and eyes states which are the indicators of drowsy state. However, they are limited in providing accurate and reliable results. Therefore, the project aims to achieve higher accuracy rate of drowsiness detection by using a very potential technology, electroencephalography (EEG) which is used widely in medical areas. Other than providing reliable result, the final product would bring more conveniences for customers with portability, easy-to-deploy and multi-device compatibility feature. In this project, its methodology first shows the strong correlation between drowsy state with brainwave frequency. Then a proposed system and testing plan are suggested based on the project objectives and available technologies. The final product is simply comprised of a hat with attached small electronic package used to record brainwave and a handheld device placing on dashboard of the car with an installed app. Finally, project management section will present in detail the human resources, scheduling, budget plan and risk analysis to show how it will be going to complete the project in six months.
Now a day’s shopping at big malls is becoming a daily activity in metro cities.
The huge rush at malls on holidays and weekends.
After purchase, at the billing counter the cashier prepare the bill using bar code reader which is a time consuming process and results in long queues.
The aim is to develop a system that can be used in shopping malls to solve the rush at billing counter using RFID.
Providing a unique service to the rural public where grid power is not available for partial/full daytime and a source of revenue for site providers.
Need for charging the mobile battery is required anytime and anywhere.
Easily installed outside any business premises.
Inserting the coin using charge for your mobile phone in public places.
Different types of mobile can be charged.
Power Presentation On Railway Track Fault DetectorNEERAJ SINGH
This power presentation basically gives you ideas about railway track fault detector using ZIGBEE as sensor(i.e for communication) and differents series of PIC Microcontrooler.
Smart Helmet Alcohol Detection and Sleep Alertijtsrd
In daily aspects of our life safety and security are the two major concerns. Nowadays the scenario that we come across in many cases of human deaths and severe injuries to people is because of two wheeler road accidents. For every four minutes there is one death being reported in India. According to the World Health Organization, we have identified that 40 percent of the deaths and 70 percent of severe injuries can be reduced if bike rider wears the helmet. There are areas around the world where the traffic of people is less. In such a situation, rider’s loss their lives. On considering these factors, no proper methodologies have been implemented to avoid accidents that are caused due to alcohol consumption and unconscious riding. The helmet includes sensors which ensure if the one who is driving the two wheeler is a sober and also checks if the rider is conscious or not. With the help of alcohol sensor MQ3, we check the alcohol consumption. If detected details of the vehicle is send which includes the vehicle registration number and rider details is send to the authorizes officials. For this a database is implemented. After sleep detection using heart rate sensor, if found to be unconscious the rider is alerted with a beep sound. Thus this helmet not only ensures safe riding but also recognizes the condition of a rider for safe riding. Midlaj Ali P | Nimisha Krishnaji | Swapna Shakkeer P | Krishnadas J "Smart Helmet: Alcohol Detection and Sleep Alert" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30435.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-hardware/30435/smart-helmet-alcohol-detection-and-sleep-alert/midlaj-ali-p
Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...Hitesh Kumar Singh
The main purpose behind this project is “Drunk driving detection”. Now a days, many accidents are happening because of the alcohol consumption of the driver or the person who is driving the vehicle. Thus, Drunk driving is a major reason of accidents in almost all the countries in the world. Alcohol Detector in Car project is designed for the safety of the people seating inside the car. This project should be fitted / installed inside the vehicle. If any Accident occurs then engine goes off and Alarm goes on. If there is no alcohol / no accident, then the Engine remains on and Alarm remains off. Even, if the Alcohol is detected, the engine goes off Alarm starts beeping.
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
India's greatest threat is the safety of its women. Women do not feel safe in a variety of situations. This needs to be addressed as quickly as feasible. Technology evolves and develops on a daily basis, affecting how people live. As a result, the focus of this article is on modernising the technological framework in order to strengthen women's safety mechanisms. We introduce a new security method in this study to protect women during unusual behaviours. A new security technique based on a patrolling robot using the Raspberry Pi has been proposed. In this case, a night vision camera can be employed to secure any location. Various machine learning methods are applied to improve the classifier's accuracy. The findings suggest that the suggested method outperforms existing methods.
This project was done by the students of Department of Computer Science and Engineering, International Islamic University Chittagong (IIUC).
Project Video : https://youtu.be/gEsIEVdwU7Q
Drowsiness is a critical factor impairing drivers’ performance in driving safely. There are several approaches in dealing with this issue based on human-machine interaction to detect drivers’ dozing off state, and then alert them to keep awake by sound or visual. These techniques fundamentally measure driver’s physical changes such as head angle, fatigue level and eyes states which are the indicators of drowsy state. However, they are limited in providing accurate and reliable results. Therefore, the project aims to achieve higher accuracy rate of drowsiness detection by using a very potential technology, electroencephalography (EEG) which is used widely in medical areas. Other than providing reliable result, the final product would bring more conveniences for customers with portability, easy-to-deploy and multi-device compatibility feature. In this project, its methodology first shows the strong correlation between drowsy state with brainwave frequency. Then a proposed system and testing plan are suggested based on the project objectives and available technologies. The final product is simply comprised of a hat with attached small electronic package used to record brainwave and a handheld device placing on dashboard of the car with an installed app. Finally, project management section will present in detail the human resources, scheduling, budget plan and risk analysis to show how it will be going to complete the project in six months.
Now a day’s shopping at big malls is becoming a daily activity in metro cities.
The huge rush at malls on holidays and weekends.
After purchase, at the billing counter the cashier prepare the bill using bar code reader which is a time consuming process and results in long queues.
The aim is to develop a system that can be used in shopping malls to solve the rush at billing counter using RFID.
Providing a unique service to the rural public where grid power is not available for partial/full daytime and a source of revenue for site providers.
Need for charging the mobile battery is required anytime and anywhere.
Easily installed outside any business premises.
Inserting the coin using charge for your mobile phone in public places.
Different types of mobile can be charged.
Power Presentation On Railway Track Fault DetectorNEERAJ SINGH
This power presentation basically gives you ideas about railway track fault detector using ZIGBEE as sensor(i.e for communication) and differents series of PIC Microcontrooler.
Smart Helmet Alcohol Detection and Sleep Alertijtsrd
In daily aspects of our life safety and security are the two major concerns. Nowadays the scenario that we come across in many cases of human deaths and severe injuries to people is because of two wheeler road accidents. For every four minutes there is one death being reported in India. According to the World Health Organization, we have identified that 40 percent of the deaths and 70 percent of severe injuries can be reduced if bike rider wears the helmet. There are areas around the world where the traffic of people is less. In such a situation, rider’s loss their lives. On considering these factors, no proper methodologies have been implemented to avoid accidents that are caused due to alcohol consumption and unconscious riding. The helmet includes sensors which ensure if the one who is driving the two wheeler is a sober and also checks if the rider is conscious or not. With the help of alcohol sensor MQ3, we check the alcohol consumption. If detected details of the vehicle is send which includes the vehicle registration number and rider details is send to the authorizes officials. For this a database is implemented. After sleep detection using heart rate sensor, if found to be unconscious the rider is alerted with a beep sound. Thus this helmet not only ensures safe riding but also recognizes the condition of a rider for safe riding. Midlaj Ali P | Nimisha Krishnaji | Swapna Shakkeer P | Krishnadas J "Smart Helmet: Alcohol Detection and Sleep Alert" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30435.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-hardware/30435/smart-helmet-alcohol-detection-and-sleep-alert/midlaj-ali-p
Project report on Vehicle accident and Alcohol sensing alert with Engine Lock...Hitesh Kumar Singh
The main purpose behind this project is “Drunk driving detection”. Now a days, many accidents are happening because of the alcohol consumption of the driver or the person who is driving the vehicle. Thus, Drunk driving is a major reason of accidents in almost all the countries in the world. Alcohol Detector in Car project is designed for the safety of the people seating inside the car. This project should be fitted / installed inside the vehicle. If any Accident occurs then engine goes off and Alarm goes on. If there is no alcohol / no accident, then the Engine remains on and Alarm remains off. Even, if the Alcohol is detected, the engine goes off Alarm starts beeping.
Development of wireless and intelligent home automation systemTELKOMNIKA JOURNAL
The Intelligent Home Automation System (IHAS) is usually a cell phone web-based application that enables end users in order to keep track of in addition to manage home/office appliance using their mobile system. The main objective of this system is developed to facilitate home users, especially domestic electrical appliances with simple controls. In addition, it can save the cost of electricity for lighting can be controlled to suit the user. Generally, most home appliances controlled from a distance using a remote control. Has created a system for controlling home lighting from a certain distance, which replaces the remote control using mobile smartphone. To make the smartphone to function as a remote control, an application was developed using Android technology. App Inventor software used for designing applications intended. Hardware microcontroller Arduino UNO R3 which is used to connect the smartphone to the electrical equipment. The system has been tested by developing a mini model and take into account the situation in the domestic home. The test is based on the level of control for wirelessly using Bluetooth and the distance between the lamp and the smartphone. The results of this test, the system can be used on equipment or other home appliances for the purpose of controlling or adjustment. In addition, the security system was also highlighted in a typical system, using the global system for mobile (GSM), it can be warned and notified to the consumer where there is a gas leak or the presence of a person in the vicinity of the residence.
Implementation security system using motorcycle fingerprint identification an...TELKOMNIKA JOURNAL
A motorcycle security system using fingerprint recognition and Telegram notification is a solution to solve motorcycle safety problems and reduce motorcycle loss cases by using fingerprint sensors attached to the owner’s motorcycle and Telegram application as a monitor connected to the motorcycle. The microcontroller used is the Wemos D1 mini connected to the Telegram application as a communication line between the user and the motorcycle. The sensor used is the fingerprint sensor. There are differences in data obtained from the fingerprint sensor response results and the response of the Telegram notification system by testing fingerprints that have been registered and that are not registered on the fingerprint sensor with the measurement results using the stopwatch. Measurement differences on the fingerprint sensor have errors with an average time dispute of 0.27 seconds. Measurement differences in Telegram notifications have errors with an average dispute time of 1 second. Hygiene conditions on the fingerprint sensor influence the difference in reading duration. If there is fingerprint oil before it, then the reading tends to be slow. The difference in measurements obtained is small enough that it can be used as a reference.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Vehicle anti theft system based on an embedded platformeSAT Journals
Abstract In modern day vehicles, vehicle anti-theft system is of prime importance. The vehicle anti-theft system presented here consists of multiple layers of protection with one complementing the other, rather than the conventional anti-theft system where a particular system is only being used. The first layer of protection in the system is a Fingerprint recognition, based on which the doors are opened. The Fingerprint matching is done by utilizing the Minutiae based Fingerprint recognition scheme. Also to prevent thieves from breaking the glass and getting inside the vehicle, vibration sensors are used in all the windows with a threshold level to prevent false alarms. Once inside, the vehicle is turned on only with the mechanical keys along with correct key number entry on the combination keypad present, failing to do so for three successive times will result in vehicle getting immobilized by cutting the fuel supply and an alert message is sent to the mobile number of the owner. Further to prevent the seizure of the vehicle, Tyre pressure sensor is also being used which also alerts the owner through a mobile message. The seized vehicle can be tracked using a GPS tracker which is also being attached. The different layers of protection defined are controlled by an ARM 7 based controller acting as the central node. The whole system was tested using a test set up by mimicking the vehicle door, vehicle immobilizer etc. with equivalent motors whereas Fingerprint data was received from Matlab based GUI application. The experimental results proved the functionality of the anti-theft system in working environment. Index Terms: Vehicle anti-theft, Fingerprint recognition, ARM 7, Immobilizer
Hello Class and Professor,Cloud computing will assist managers iSusanaFurman449
Hello Class and Professor,
Cloud computing will assist managers in the future because of the availability to protect any organization or business from unauthorized access. The idea of cloud computing or cloud security is a businesses IT department whose focus is on the security of possible breaches or threats that can cripple a business. The past has shown us that even with an IT department, these security threats are still very possible. An article online from force point stated that “Cloud computing allows organizations to operate at scale, reduce technology cost, and use agile systems that give them the competitive edge.” (Forcepoint) When a business is just beginning or in the stages of a transition things like operating at scale and reducing technology cost are crucial in the growth aspect of a business. With that being said the future for security managers depends on the ability to cut cost and still have a secured network for the protection of the organization.
The concept of concentric layers and how they apply to the future design of access control and computers is a great way to make sure that the business is secured through different sectors of security. Three examples I would consider as a security feature would be a form of CCTV, my current job has a palm reader as well as physical security to even get to the area where you would need to access any type of computer and access control. Second, I like the idea of an ID card used to log in kind of like a common access card (CACcard) to even be able to log into a computer or be granted access to a specific entry point. Third, would easily be a password that requires multiple special characters for the prevention of hacking type threats. There are many different layers of security but they are all used as a prevention technique to keep your business secure as well as personal information protected.
-Josh Foster
(Forcepoint)- What is cloud security? Forcepoint. (2021, May 6). Retrieved November 23, 2021, from https://www.forcepoint.com/cyber-edu/cloud-security.
The concept of cloud computing can assist security managers in the future by shifting some of the risk associated with compliance regulations. Ultimately this may allow Information Technology (IT) departments within the company to focus their time on other possible threats and vulnerabilities, instead of rudimentary task like spam filtering. Furthermore, the use of cloud computing can potentially free up funding to be utilized for security programs, “without a doubt, cloud computing offers an opportunity for the IT departments to transfer security risks away from their budgets and to the budget of a vendor” (Fay, 2010, p. 319).
Concentric layering may be applied to future design and application of access control and computers by using countermeasures to deter, deny, and detect the unauthorized access to spaces or systems. John Fay Contemporary Security Management” touches on ways of keeping a company laptop safe. The laptop ...
In Today life The Security is the most common challenging issue in the world and with such advancements happening, the security of most is the home security. Many of technology come in market For Security. In the Modern world advances in electronics and communications technologies have led to the miniaturization and improvement of the performance of computers and networking. These changes have given rise to the development of several home automation technologies and system. Surveillance can be defined as monitoring of the behaviour, other changing information,activities,observing or analysing particular area for the purpose of directing, influencing,managing or protecting. A home security system should provide safety and security features for a home by alarming the residents from natural,accidental and/or human dangers such as:flooding,fire,theft,animals invading etc. To design a software application for intrusion detection system to identify malicious activities using cloud technology.
Intrusion Detection in Industrial Automation by Joint Admin AuthorizationIJMTST Journal
Intrusion response is a more important part of security protection. In industrial automation systems (IASs) have achieved maximum and availability attention. Real-time security policy of intrusion response has big challenge for intrusion response in IASs. The loss caused by the security threats may even increase the industrial automation. However, traditional approach in intrusion detection pays attention on security policy decisions and removes security policy execution. Proposed system presents a general, real-time control depends on table driven scheduling of intrusion detection and response in IASs to resolve the problem of security policy like assigning rights to use the system. Security policy created of a security service group, with every kind of security techniques supported by a realization task set. Realization tasks from different task sets can be combined to form a response task set. In this approach, first, a response task set is created by a non dominated genetic algorithm with joint consideration of security performance and cost. Then, the system is re- configured via an integrated scheduling scheme in which system tasks and response tasks are mapped and scheduled together based on a GA. Additionally, this system proposed Joint Admin Model (JTAM) model to control over unauthorized access in industrial automation system. Furthermore, proposed method shows result of industrial automation for security mechanism. Security policy helps to authenticate user request to access industrial resources.
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Development of anti theft security system
1. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 1
1.INTRODUCTION
1.1 Background
In the last few decades, India has progressed at such an enormous rate that many companies have
strongly established themselves here. These companies bring a huge amount of workforce with
them. Arranging transportation to such a huge mass is a cumbersome task involving many
intricacies. Generally, this transport is arranged through the local transport vendors on a yearly
contract basis, recently happen mishaps such as burglary, rape cases etc. The development of
satellite communication technology is easy to identify the vehicle locations. Vehicle tracking
systems have brought this technology to the day-to-day life of the common person. Today GPS
used in cars, ambulances, fleets and police vehicles are common sights on the roads of developed
countries. All the existing technology support tracking the vehicle place and status.The
GPS/GSM Based System is one of the most important systems, which integrate both GSM and
GPS technologies. It is necessary due to the many of applications of both GSM and GPS systems
and the wide usage of them by millions of people throughout the world [1]. This system designed
for users in land construction and transport business, provides real-time information such as
location, speed and expected arrival time of the user is moving vehicles in a concise and easy-to-
read format. This system may also useful for communication process among the two points.
Currently GPS vehicle tracking ensures their safety as travelling. This vehicle tracking system
found in clients vehicles as a theft prevention and rescue device. Vehicle owner or Police follow
the signal emitted by the tracking system to locate a robbed vehicle in parallel the stolen vehicle
engine speed going to decreased and pushed to off. After switch of the engine, motor cannot
restart without permission of password. This system installed for the four wheelers, Vehicle
tracking usually used in navy operators for navy management functions, routing, send off, on
board information and security. The applications include monitoring driving performance of a
parent with a teen driver. Vehicle tracking systems accepted in consumer vehicles as a theft
prevention and retrieval device. If the theft identified, the system sends the SMS to the vehicle
owner. After that vehicle owner sends the SMS to the controller, issue the necessary signals to
stop the motor. In this paper, the reviewed related technology in section 3. The vehicle tracking
and locking systemscarried out in section 4. The conclusions, advantages and future scope in
section 5.
2. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 2
1.2 Problem Statement
Lecturer’s room door was not equipped with anti-theft system. Most people only take the whole
home security system into account. This project focuses specifically on the room security
system, and nothing to do with the home security system. This project is a simple version of
security system, and the scope was not so big as well. Door security is the main element which
will be taken into consideration.
Door security system is important nowadays. The whole building security system or civilian
home security system is expensive. Most security systems available in the market nowadays are
complicated, and installation of the system will cost another amount of money to be invested in
order to have a good security system. A variety of security devices for deterring, detecting, and
identifying offenders or intruders can be found. However, very few provide a working
relationship to a room. An intrusion deterrent device which activates a water spraying system has
been invented.
A triggering mechanism for a tear-gas canister was introduced for the purpose of security and
protection, but this idea did not have a working relationship to a room. 3Security devices to
identify the bank robbers using the spray gun to discharge a scent which can be detected by the
dog have a working relationship to a room. Device was installed inside the room, mounted at the
ceiling. This project will implement a simple anti-theft security system for lecturer’s room that
has a clear relationship to a room to fulfill this void. This project will also demonstrate the idea
of port programming and PC-based control system. Usage of computer software to control
security system was widely accepted, and only authorized person will have access to the system
which determines the room security. This feature can avoid unauthorized person to take control
of the system or gain access to the security system.
3. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 3
1.3 Objectives of Project
This project was done in order to achieve some objectives at the end of the project timeline. Here
is the list of this project objectives:
1.To develop programming and software using any available software to program the security
system for the room door with auto-lock feature.
2. To demonstrate and apply the idea of computer port programming and PC-based control
system.
3. To develop Graphical User Interface (GUI) which will be used by the user to manage and
control the system.
4. To integrate the door system with personal computer using any available communication port.
5. To design and integrate hardware with electro
4. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 4
1.4 Scope of Project
This project will focus on programming to lock or unlock the door via PC. Port programming
which enables interrupt process for the operating system can be used to control any external
devices attached to the PC via serial or parallel port. Port programming and user interface design
can be done using programming language such as Visual Basic 6.0, Delphi, Matlab, Visual C++,
Java, or Borlant Turbo. Both software and hardware for the system will be developed in this
project. However the system will be developed using LEDs, solenoid, and some mechanical
system to demonstrate the response of the output and input devices.
Integration of hardware and software will be done in this project to create a simple PC-based
control system. Basically, the idea is to connect output device to the PC via serial or parallel port.
Then, control software to control output device will be developed using any software
development programming language. Software is used to activate the output device by a click of
a button or simply hit the key on keyboard.
Also, output device must be able to be turned off using keyboard or mouse click. The system
can control up to 8 separate outputs individually. For this project, the system will be used to lock
or unlock the door via PC. User interface must have LOCK and UNLOCK button to control the
door. The door may be locked using electromagnetic device or any relevant mechanical system.
Password is mandatory to get access into the main control panel of the system.
5. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 5
CHAPTER 2 LITERATURE REVIEW
2.1 Definition and Architecture of Security System
Security is the condition of being protected against danger or loss. In the general sense, security
is a concept similar to safety. The nuance between the two is an added emphasis on being
protected from dangers that originate from outside. Individuals or actions that encroach upon the
condition of protection are responsible for the breach of security. The word "security" in general
usage is synonymous with "safety," but as a technical term "security" means that something not
only is secure but that it has been secured .
It is very often true that people's perception of security is not directly related to actual security.
For example, a fear of flying is much more common than a fear of driving; however, driving is
generally a much more dangerous form of transport .
According to Marston, R. M., (1998) modern electronics security system range in complexity
from simple electronic door-bell to ultra-sophisticated wireless burglar alarm system that comes
complete with an array of passive infra-red (PIR) movement detectors and contact sensors plus
full remote-control and sensormonitoring facilities.
The idea of electronics-based security system has a wide range of application. They can be
designed to be activated by physical contact or body proximity, or by variation in heat, light, or
infrared radiation levels, or in voltage, current, resistance or some other electrical properties and
parameters (Marston, 1998).
2.2 Anti-theft security
Security tests by Consumer Reports Magazine in the 1990s found that many residential doors fail
or delaminate when force is applied to them. Solid wood doors withstood more force than the
very common metal skinned wood-edged doors used in newer construction [19].
The Chula Vista Residential Burglary Reduction Project there were the following findings:
"From victim interviews, we learned that in 87% of the break-ins that occurred when intruders
defeated locked doors with tools such as screwdrivers or crowbars, the burglars targeted "the one
door that had no deadbolt lock."... not one burglar attempted to break a double-pane window
during the course of successful or attempted burglary." (Page 3, The Chula Vista Residential
Burglary Reduction Project – Summary)
6. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 6
2.3 Microcontroller and Assembly Language
Back to security system, Robert Gaffigan (1997) discussed in his book entitle Home Security
Projects about the usage of microcontroller to design and develop a simple security system for a
single home. He made it very clear that programming was required to design a good security
system.
High level programming language makes it easier for human being to write the code of program,
comparing to the low level language.
Using only PIC Microcontroller or Programmable Integrated Controller, Robert Gaffigan (1997)
was successfully designed a portable CO detector, pool alarm system, an early warning alarm
system, and dog bark inhibitor system.
He suggested that new user should start to learn programming using simulator. Programming
using PIC to develop a security system required a good understanding of processor working
principles. Security system was created to produce a safe and sound environment for human
being and personal properties. Security system mostly refers to electronic and computer
controlled system which can monitor and scan any given area all the time automatically.
7. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 7
2.4 Home Security
The FBI reports that a home is burglarized in the U.S. every 15.4 seconds. Burglary is now
considered to be the most serious threat a home can face. In most cases, burglars are looking for
items that they can easily resell for cash. The most targeted items by burglars include laptop
computers, guns, jewelry, DVD players and other similar small electronic items (Kelly, 2008).
Most burglaries occur during the day when homeowners are at work. Generally, burglars use a
certain type of force when they break into a home; however, it only stands to reason that burglars
target those homes with seem to offer the easiest amount of access [20].
In order to protect their property and possessions, more people are buying home surveillance
systems. A home surveillance system protects against vandalism, burglary, and act as a deterrent
to crime (Ryan Mcelhinny, 2008).
8. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 8
2.5 Drawback ofElectronic Security System
However, usage of sophisticated electronic security system generates a lot of false alarm and this
issue had become more serious, where burglar alarm warning was no longer treated as an
emergency. This idea was very clear. Most convensional alarm system can only detect intruders
and emergency but fail to eliminate the situation. At some point, the user have to reset the system
manually.
Signal of emergency was then forwarded to the human being to handle. Most security system
operates like this. The idea of security system which only notify human in case of emergency
was totally outdated. However, early warning system can save a lot of life if it was applied to
fight Tsunami in 2004 . Security systems nowadays make use of wireless technology and robotic
security system.
10. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 10
II. Survey of the RelatedWork
In [2], the hardware and software of the GPS and GSM network were developed. The proposed
GPS/GSM based System has the two parts, first is a mobile unit and another is controlling
station. The system processes, interfaces, connections, data transmission and reception of data
among the mobile unit and control stations are working successfully. These results are
compatible with GPS technologies.
In [3], a vehicle tracking system is an electronic device, installed in a vehicle to enable the owner
or a third party to track the vehicle's place. This paper proposed to design a vehicle tracking
system that works using GPS and GSM technology. This system built based on embedded
system, used for tracking and positioning of any vehicle by using Global Positioning System
(GPS) and Global system for mobile communication (GSM). This design will continuously
watch a moving Vehicle and report the status of the Vehicle on demand.
In [4], Face Detection System used to detect the face of the driver, and compare with the
predefined face. The car owner is sleeping during the night time and someone theft the car. Then
Face Detection System obtains images by one tiny web camera, which is hidden easily in
somewhere in the car. Face Detection System compared the obtained images with the stored
images. If the images don't match, then the information sends to the owner through MMS. The
owners get the images of the thief in mobile phone and trace the place through GPS. The place of
the car and its speed displayed to the owner through SMS. The owner can recognize the thief
images as well as the place of the car and can easily find out the hijackers image. This system
applied in our day-to-day life.
In [5], this system provided vehicle cabin safety, security based on embedded system by
modifying the existing modules. This method monitors the level of the toxic gases such as CO,
LPG and alcohol within the vehicle provided alert information as alarm during the dangerous
situations. The SMS sends to the authorized person through the GSM. In this method, the IR
Sensor used to detect the static obstacle in front of the vehicle and the vehicle stopped if any
obstacle detected. This is avoiding accidents due to collision of vehicles with any static
obstacles.
In [6], Kai-Tai Song and Chih-Chieh Yang have a designed and built on a real-time visual
tracking system for vehicle safety applications. In this paper built a novel feature-based vehicle-
tracking algorithm, automatically detect and track several moving objects, like cars and
motorcycles, ahead of the tracking vehicle. Joint with the concept of focus of expansion (FOE)
and view analysis, the built system can segment features of moving objects from moving
background and offer a collision word of warning on real-time. The proposed algorithm using a
CMOS image sensor and NMOS embedded processor architecture. The constructed stand-alone
11. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 11
visual tracking system validated in real road tests. The results provided information of collision
warning in urban artery with speed about 60 km/hour both at night and day times.
In [7], the remote monitoring system based on SMS and GSM was implemented. Based on the
total design of the system, the hardware and software designed. In this paper, the GSM network
is a medium for transmitting the remote signal. This includes two parts that are the monitoring
center and the remote monitoring station. The monitoring centers consist of a computer and
communication module of GSM. The software-monitoring center and the remote monitoring
station implemented by using VB. The result of this demonstration shows that the system can
watch and control the remote communication between the monitoring center and the remote
monitoring station.
In [8] this paper, the proposed tracking system based on cloud computing infrastructure. The
sensors are used to monitor the fuel level, driver conditions, and speed of the vehicle. All the
data transferred to cloud serverusing GSM enabled device. All the vehicles equipped with GPS
antenna to locate the place. To avoid the drunk and drive, the alcohol sensor installed to monitor
the driver status. The proposed technology significantly avoids the accident in highways.
12. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 12
III. ProposedMethod
In this proposed work, a novel method of vehicle tracking and locking system used to track the
theft vehicle by using GPS and GSM technology. This system puts into sleeping mode while the
vehicle handled by the owner or authorized person otherwise goes to active mode, the mode of
operation changed by in person or remotely. If any interruption occurred in any side of the door,
then the IR sensor senses the signals and SMS sends to the microcontroller. The controller issues
the message about the place of the vehicle to the car owner or authorized person. When send
SMS to the controller, issues the control signals to the engine motor. Engine motor speeds are
gradually decreases and come to the off place. After that all the doors locked. To open the door
or restart the engine, authorized person needs to enter the passwords. In this method, tracking of
vehicle
14. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 14
3.2 circuit description
The power supply section is very important for all electronic circuits. The 230V, 50Hz AC mains
is stepped down by transformer X1 to deliver a secondary output of 12V, 500 mA. The
transformer output Is rectified by a full-wave rectifier comprising diodes D1 through D4, filtered
by capacitor C1 and regulated by ICs 7812 (IC2) and 7805 (IC3). Capacitor C2 bypasses the
ripples present in the regulated supply. LED1 acts as the power indicator and R1 limits the
current through LED1.The power supply section is shown in the figure2.
Power supply
15. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 15
Proposedcircuit diagram
16. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 16
The circuit diagram of the vehicle tracking and locking embedded system using GPS and GSM
technology is shown in Fig.3.The compact circuitry is built around Atmel AT89C52
microcontroller. The AT89C52 is a low power; high performance CMOS 8- bit microcomputer
with 8 kB of Flash programmable and erasable read only memory (PEROM). It has 256 bytes of
RAM, 32 input/output (I/O) lines, three 16-bit timers/ counters, a six-vector two-level interrupt
architecture a full-duplex serial port, an on-chip oscillator and clock circuit.The system clock
also plays a significant role in operation of the microcontroller. An 11.0592MHz quartz crystal
connected to pins 18 and 19 provides basic clock to the microcontroller. Power-on reset is
provided by the combination of electrolytic capacitor C3 and resistor R1. Port pins P2.0 through
P2.7 of the microcontroller are connected to data port pins D0 through D7 of the LCD,
respectively. Port pins P0.5, P0.6 and P0.7 of the microcontroller are connected to Register-
select (RS), Read / write (RW) and enable (E) pins of the LCD, respectively. All the data is sent
to the LCD in ASCII format for display. Only the commands are sent in hex form. Registerselect
(RS) signal is used to distinguish between data (RS=1) and command (RS=0). Preset RV1 is
used to control the contrast of the LCD. Resistor 10k limits the current through the backlight of
the LCD. Port pins P3.0 (RXD) and P3.1 (TXD) of the microcontroller are used to interface with
the RFID reader through Max232 and GSM Modem are used to interface through Max232. Port
pins from P1.0 to P2.7 of the microcontroller are connected to keyboard. The GPS and GSM are
used to connect through RXD and TXD pins of the microcontroller for further processing. The
port pins of P0.0 to P0.3 are used to connect the 4 IR sensors for detecting the unauthorized
person. Port1.7 is used to connect the alarm through transistor BC547, Pin number P3.3 is used
to connect the engine motor. If unauthorized person enter into the car, the IR sensor sense the
signals if any interruption occurs in any side of the door and send to the microcontroller, then the
controller issue the message about the location of the vehicle to car owner or authorized person.
When send the SMS to controller, issues the control signals to the engine motor. Engine motor
speed is gradually decreases and comes to the off position. After that all the doors are locked. Pin
P0.4 is used to connect the door locker through relay. To open the door or to restart the engine
authorized person needs to enter the passwords. In this method, tracking of vehicle location easy
and also doors are locked automatically thereby thief cannot get away from the car. Pin P0.4,
transistor Q3 drives into saturation, and relay RL2 energizes to close or open the door lock.
17. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 17
3.3 GPS Technology
The Global Positioning System (GPS) is a satellitebased navigation system consists of a network
of 24 satellites located into orbit. The system provides essential information to military, civil and
commercial users around the world and which is freely accessible to anyone with a GPS receiver.
GPS works in any weather circumstances at anywhere in the world. Normally no subscription
fees or system charges to utilize GPS. A GPS receiver must be locked on to the signal of at least
three satellites to estimate 2D position (latitude and longitude) and track movement. With four or
more satellites in sight, the receiver can determine the user's 3D position (latitude, longitude and
altitude). Once the vehicle position has been determined, the GPS unit can determine other
information like, speed, distance to destination, time and other. GPS receiver is used for this
research work to detect the vehicle location and provide information to responsible person
through GSM technology.
GPS Technology
18. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 18
3.4 GSM Modem SIM300 V7.03
The GSM modem is a specialized type of modem which accepts a SIM card operates on a
subscriber’s mobile number over a network, just like a cellular phone. It is a cell phone without
display. Modem sim300 is a triband GSM/GPRS engine that works on EGSM900MHz,
DCS1800MHz and PCS1900MHz frequencies.GSM Modem is RS232-logic level compatible,
i.e., it takes-3v to -15v as logic high and +3v to +15 as logic low.MAX232 is used to convert
TTL into RS232 logic level converter used between the microcontroller and the GSM board. The
signal at pin 11 of the microcontroller is sent to the GSM modem through pin 11 of max232.this
signal is received at pin2 (RX) of the GSM modem. The GSM modem transmits the signal from
pin3 (TX) to the microcontroller through MAX232, which is received at pin 10 of IC1 [9].
Features of GSM
Single supply voltage 3.2v-4.5v
Typical power consumption in SLEEP Mode: 2.5mA.
SIM300 tri-band
MT,MO,CB, text and PDU mode, SMS storage: SIM card
19. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 19
IV. Debugging and Testing Process
A microcontroller-based system is a complex activity that involves hardware and software
interfacing with the external world. Doing well design of a microcontroller-based system
requires skills to use the variety of debugging and testing tools available. The debugging and
testing of microcontroller-based systems divided into two groups: software-only tools and
software-hardware tools. Software-only tools come as monitors and simulators, which are
independent of the hardware under development. Software-hardware tools are usually hardware
dependent, more expensive and range from in-circuit emulators and in-circuit simulators to in-
circuit debuggers. In general, the higher the level of integration with the target hardware, the
greater the benefit of a tool, resulting in a shorter development time, but the greater the cost as
well. The factors to consider when choosing a debugging tool are cost, ease of use and the
features offered during the debugging process.
A software simulator is a computer program running on an independent hardware and it
simulates the CPU, the instruction set and the I/O of the target microcontroller. Simulators offer
the lowest-cost development tools for microcontroller-based systems and most companies offer
their simulator programs free of charge.
The user program operated in a simulated environment where the user can insert breakpoints
within the code to stop the code and then analyze the internal registers and memory, display and
change the values of program variables and so on. Incorrect logic or errors in computations can
analyze by stepping through the code in simulation. Simulators run at speeds 100 to 1000 times
slower than the actual micro controller hardware and, thus, long time delays should avoid when
simulating a program. Micro controllerbased systems usually have interfaces to various external
devices such as motors, I/O ports, timers, A/D converters, displays, push buttons, sensors and
signal generators, which are usually difficult to simulate.
Some advanced simulators, such as the Proteus from Labcenter Electronics allow the simulation
of various peripheral devices such as motors, LCDs, 7-segment displays and keyboards, and
users can create new peripheral devices. Inputs to the simulator can come from files that may
store complex digital I/O signals and waveforms. Outputs can be as form of digital data or
waveforms, usually stored in a file, or displayed on a screen.
20. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 20
4.1 Hardware Assembling and Testing:
First step, we need to make single side PCB layout for the given circuit diagram. After made the
PCB the following process is required to complete the project.
1. Assemble all the components on the PCB based on circuit diagram. TX and RX pins of the
GSM modem to pins 13 and 14 of MAX 232 and insert a valid SIM in the GSM modem.
2. Connect the GPS module according to circuit diagram.
3. This projects implemented and tested successfully by us.
4. This system is very useful and secure for car owners.
V. Conclusion
In this paper, we have proposed a novel method of vehicle tracking and locking systems used to
track the theft vehicle by using GPS and GSM technology. This system puts into the sleeping
mode vehicle handled by the owner or authorized persons; otherwise goes to active mode. The
mode of operations changed by persons or remotely. When the theft identified, the responsible
people send SMS to the micro controller, then issue the control signals to stop the engine motor.
After that all the doors locked. To open the doors or to restart the engine authorized person needs
to enter the passwords. In this method, easily track the vehicle place and doors locked.
21. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 21
5.INTRODUCTION
In a situation where there is high level of theft, there is need for better security system. It is
much safer to have a system that monitors and communicates to the device owner without
putting human life to risk in the name of “Watchman”. This tends to utilize the availability of
GSM network, mobile phone and electronics circuit to achieve an automated system which is
programmed to work as a thinking device to accomplish this purpose. By simply dialing the
phone number of the mobile phone attached to the circuit and sending a code after the phone has
automatically been answered, puts the system to either “active or inactive” state, and on any
attempt of theft the system sends a text message to the device owner, demobilizes the system
(car) and then starts up an alarm. With this, the car is always protected. The total absence of
sufficient security personnel in a packed car is a great discomfort to car owners. This insecurity
has paved way to increasing rate of stealing packed cars – even with security. In order to enhance
an improved and life risk free security system, the purpose of this study is to aid a better security
system of cars with the use of GSM. This system monitors one’s car against theft, and has a text
message sent to the car owner, telling him that his car is being tampered, and at which part of the
car (either doors or boot) is being tampered. The system will also demobilize the car (that is
stopping the car from moving), set up an alarm for the people around to notice what is
happening.
22. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 22
The diagram in figure 1.
Describe the overall system. The system comprises of a GSM which serves as an intermediate
between the outside world (car owner) and the entire system. It is responsible for both receiving
of calls for system activation and deactivation, and sending of text message to the car owner. Its
output in the form of frequency is feed into Dual Tone Multi-Frequency (DTMF) decoder IC,
which converts these frequencies into digital voltage levels of zeros and ones. The digital voltage
levels received from the DTMF decoder [9] is now fed into microcontroller Integrated circuit.
The micro controller which is the brain and control circuit behind the entire design is controlled
with a written program stored into its Read Only Memory (ROM). The controller with the
direction of the written program co-ordinate the system’s operation as follows: i. If the system is
active, it monitors both the car doors and boot to check if anyone is opened. ii. Demobilizes the
car by disconnecting the ignition line from the battery supply via the actuator [1]. iii. Sends text
message to the car owner signifying where the attempt is made from, and finally iv. Starts up an
alarm for alert purpose. v. But, if the system is inactive, the microcontroller disables all outputs
and sensor inputs. In this paper, the design utilized locally assembled microcontroller and few
other basic electronics components to achieve both the control and the controlled. Evidently,
microcontrollers have been used to perform such simple security task in which human
performance might degrade over time. The reliability of this design makes it durable and capable
for offering guarantee security at all time. The power supply provides the voltage and current
required for effective performance of the system. This supply is tapped from the car battery and
then regulated before being fed to the system.
23. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 23
II. DESIGN FRAME WORK
2.2 System Design
The design process is divided into two: Hardware and Software designs. 2.2.1 Hardware Design
2.2.1.1 The microcontroller. This microcontroller system is designed around the Intel’s
AT89C51 microcontroller [1]. The Intel AT89C51 microcontroller is a complete computer on a
single chip. This is because it has Read Only Memory (ROM), Random Access Memory (RAM)
and Central Processing Unit (CPU) embedded in it. The AT89C51 is a low-power, high
performance CMOS 8-bit microcomputer with 8K bytes of memory. The device is manufactured
using Atmel’s high-density non-volatile Microcontroller Based Anti-theft Security System Using
GSM Networks with Text Message… 20 memory technology and is compatible with the
industry standard 80C5l and 80C52 instruction set and pin out. The on-chip flash allows the
program memory to be reprogrammed in-system or by a conventional non-volatile memory
programmer. It also provides programmable timer, programmable I/O ports together with 256 ×
8-bit RAM for use as “scratch book” and also for stack purposes. The alarm was implemented
using a 12V/15W siren. The Dual Tone Multi-Frequency (DTMF) IC – MT8870/CM8870 is an
IC which detects frequency in the form of tone and then encodes it into different digital voltage
levels [12]. It principle is on combining two carrier frequencies of upper level and lower level
which produces a unique tone. The DTMF is made to produce different voltage level for every
key pressed on the connected phone. Opto transistor CNY-17 is serving as a tap button contactor
[9], which is used for initiating a keypad pressing command on the connected phone. FET
(IRF3205) is a power mosfet [13]. It functions as an actuator to the demobilization unit. Relay is
the demobilizer in the system. Voltage regulation is achieved by the use of LM7805.
25. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 25
III. PERFORMANCEEVALUATION ANDTESTING
Various test was carried out before, during and after the construction has been completed. The
multi-meter was extensively used for carrying out most of these tests. Each subunit was tested
and confirmed efficient. After the construction of the entire system, the program was written and
burned into the microcontroller chip. On interfacing it to the car, it tested ok as it performed the
objective of the design. Satisfaction was gotten from the moment the system was activated and
the car opened, the system automatically disconnected the ignition, sent a text message to a
programmed recipient and then started up an alarm.
The mission of the design was accomplished. The entire system has three inputs, which are: - the
output of the DTMF decoder, the output from the phone ear piece jack and the sensors from the
car doors and boot. The system outputs are the text message controller, alarming system and
demobilization unit. The system is battery powered and was tapped from car battery and for this
reason it made it easier for dc use. With these a system that sends text message to car owner is
designed and implemented.
26. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 26
IV. CONCLUSION
It is always better to start every design with a good proposal, which will stand as a reference
point to the work as it proceeds. The result of any design gives joy if aims and objectives are
gotten. Since the project performed its proposal, it indeed satisfactory. Now from the input to the
output of each stage was a success. The major input is like an interrupt and upon reception by
microcontroller it goes through the iteration of demobilizing the car, sending text message and
starting up an alarm. The design is thus a huge success.
27. Development of anti-theft security systems
[Dept of E&C,GEC Ramanagara]2014-15D Page 27
REFERENCES
Hawrra, H.A. & Al-Rubiae (2007). Design and Implementation of Computerized control room.
Journal of Karbala University, 5(2). Johnson, M.J.&Subramanyam, G. (1996). A parallel port
interface circuit for computer control applications involving multiple stepper motors, Circuits
and Systems, IEEE 39th Midwest symposium, 2, pp.889-892. (http://www.ivsl.org: http://
libhub.sempertool.dk.tiger.sempertool.dk/libhub?func = search & query = resid:
cf092124eb1d1d40460d090ea4ad7692) . Zhou, W., Sha, Z., Meng, Z. &Xu, Y. (2007). Design
of Serial/Parallel Communication Interface of Digital Potentiometer with PC, 8th International
Conference on Electronic Measurement and Instruments (ICEMI.2007) , Pp: 3-150-3-154 , .
(http://www.ivsl.org:http: // libhub.sempertool.dk.tiger.sempertool.dk /libhub?func
=search&query=resid:c016167283f52d2740da48e994306ff6) . Hamed, B. (2012). Efficient
Authorized Access Security System Control Using ATMEL 89C55 & Mobile Bluetooth.
International Journal of Computer Theory and Engineering, 4(1). Samuel, D. (2008). RFID
security in door locks, Master thesis performed in information coding at Linköping Institute of
Technology. Axelson, J. (2000). Parallel Port Complete.Programming, Interfacing, & Using the
PC’s Parallel Printer Port. Published by Lakeview Research. Vincent, C., Hu, D. F., Ferraiolo &
Kuhn, D. R. (2006). Assessment of Access Control Systems. National Institute of Standards and
Technology.