Smart Car Final
-
Upload
anju-bhargavi -
Category
Documents
-
view
220 -
download
0
Transcript of Smart Car Final
-
8/8/2019 Smart Car Final
1/112
SMART CAR SECURITY SYSTEM 1
CHAPTER 1
-
8/8/2019 Smart Car Final
2/112
SMART CAR SECURITY SYSTEM 2
1.1 INTRODUCTION
With the development and applications of many embedded techniques, car security
system design and analysis are constantly improving. Many new techniques, such as biometric recognition
technique, image processing technique, communication technique and so on, have been integrated into a
car security systems. At the same time, the amount of accident of cars still remains high, specially, lost.
So, one practicable car security system should be efficient, robust and reliable.
Traditional car security system rely on many sensors and costs a lot. When one car is
really lost, no more feedback could be valid to help people to find it back.We put forward the face
detection technique to be applied in car security system because this kind of technique is effective and
fast, and one alarm signal could be given to make an alarm or call the police and the host soundlessly with
the help of other modules in the system prototype.
Face detection techniques have been heavily studied in recent years, and it is an
important computer vision problem with application to surveillance, multimedia processing and consumer
products. Many new face detection techniques have been developed to achieve higher detection rate and
faster. One of the techniques used here is Principle Component Analysis (PCA)
In this proposed system
y Preach to the owner if some one tries to stolen
y Automated functions through image processing
y Security maintenance by behavior recognition
y E ffective mobile communication for entire process
y G PS module obtains the precise locality by parsing received G PS signal
-
8/8/2019 Smart Car Final
3/112
SMART CAR SECURITY SYSTEM 3
1.2 SOFTWARE AND HARDWARE REQUIREMENTS
a) software requirements:
Software : K E IL ID E , FLASH MA G IC, ORCAD
Operating system : WINDOWS XP
b) Hardware Requirements:
Hardware devices : DS89C430 Micro Controller, MAX232, G SM module, G PS module
Processor : P-4 or higher processor.
Memory : 64KB (minimum)
Ports : 2 Serial Ports.
Others : Integrating Unit, Web Camera
-
8/8/2019 Smart Car Final
4/112
SMART CAR SECURITY SYSTEM 4
BLOCK DIAGRAM
Figure 1.1: Block Diagram of Smart Car Security System
-
8/8/2019 Smart Car Final
5/112
SMART CAR SECURITY SYSTEM 5
1.3 WORKING
In this paper, we propose a low-cost extendable framework for embedded smart car security
system, which consists of a face detection subsystem, a G PS module, a G SM module and a
control platform. Comparing with traditional car security system, this system does not need any
sensor, and cost much less. Digital camera obtains pictures and then compresses them into jpg
format. The data could be handled by face detection classifiers to find out faces, which are
trained by PCA algorithm. Several methods have been applied to speedup the detection process,
such as the use of E SRAM by distribute the key code into it, and the high hit rate of cache
because the characteristics of image files and the data of cascade detector.
SCHEMATIC DIAGRAM
Fig 1.2 schematic diagram
U1
DS89C450
PSEN29 ALE30
VCC40
GND20
EA31
X119
X218
RST9
P0.0/AD039
P0.1/AD138
P0.2/AD237
P0.3/AD336
P0.4/AD435
P0.5/AD534
P0.6/AD633
P0.7/AD732
P1.01
P1.12
P1.2/RXD13
P1.3/TXD14
P1.45
P1.56
P1.67
P1.78
P2.0/A821
P2.1/A922
P2.2/A1023
P2.3/A1124
P2.4/A1225
P2.5/A1326
P2.6/A1427
P2.7/A1528
P3.0/RXD010
P3.1/TXD011
P3.2/INT012
P3.3/INT113
P3.4/T014
P3.5/T115
P3.6/WR16
P3.7/RD17
Alarm
LS1
1
2Q1
BC547
1
2
3
R1 1K
VCC_BAR
U1
MAX232
R1IN13R2IN8
T1IN11
T2IN10
C+1
C1-3
C2+4
C2-5
V +
2
V-6
R1OUT12
R2OUT9
T1OUT14
T2OUT7
V C C
1 6
G N D
1 5
RXD
TXD
P1
S E R I A L P O R T
594837261
VCC
C3
10uF
C4
10uF
C5
10uF
C110uF
D3
SSF-LXH101
IN 7805
GND
OUT
9VAC
11
22
R3
330EC6
1 0 0 u
F / 1
6 V
C5
470uF/25V
- +
D1
DB106
1
2
3
4
Eye blink sensor
Actuator LS1
1
2Q1
BC547
1
2
3
VCC_BAR
R2
RESISTOR
U1
MAX232
R1IN13R2IN8
T1IN11
T2IN10
C+1
C1-3
C2+4
C2-5
V +
2
V-6
R1OUT12
R2OUT9
T1OUT14
T2OUT7
V C C
1 6
G N D
1 5
TXD
RXD
VCCP1
S E R I A L P O R T
594837261
C3
10uF
C4
10uF
C5
10uF
C110uF
-
8/8/2019 Smart Car Final
6/112
SMART CAR SECURITY SYSTEM 6
1.4 POWER SUPPLY
1.4.1 Block Diagram
The ac voltage, typically 220V rms, is connected to a transformer, which steps that ac voltage
down to the level of the desired dc output. A diode rectifier then provides a full-wave rectified
voltage that is initially filtered by a simple capacitor filter to produce a dc voltage. This resulting
dc voltage usually has some ripple or ac voltage variation.
A regulator circuit removes the ripples and also remains the same dc value even if the input dc
voltage varies, or the load connected to the output dc voltage changes. This voltage regulation is
usually obtained using one of the popular voltage regulator IC units.
Fig 1.4.1 Block Diagram of Power supply
1.4.2 Working principle
Transformer
The potential transformer will step down the power supply voltage (0-230V) to (0-6V) level.Then the secondary of the potential transformer will be connected to the precision rectifier,
which is constructed with the help of opamp. The advantages of using precision rectifier are it
will give peak voltage output as DC, rest of the circuits will give only RMS output.
TRANSFORMER RECTIFIER FILTER IC REGULATOR LOAD
-
8/8/2019 Smart Car Final
7/112
SMART CAR SECURITY SYSTEM 7
Bridge rectifier
When four diodes are connected as shown in figure, the circuit is called as bridge rectifier. The
input to the circuit is applied to the diagonally opposite corners of the network, and the output is
taken from the remaining two corners.Let us assume that the transformer is working properly and there is a positive potential, at point
A and a negative potential at point B. the positive potential at point A will forward bias D3 and
reverse bias D4.
The negative potential at point B will forward bias D1 and reverse D2. At this time D3 and D1
are forward biased and will allow current flow to pass through them; D4 and D2 are reverse
biased and will block current flow.
The path for current flow is from point B through D1, up through RL, through D3, through the
secondary of the transformer back to point B. this path is indicated by the solid arrows.
Waveforms (1) and (2) can be observed across D1 and D3.
One-half cycle later the polarity across the secondary of the transformer reverse, forward biasing
D2 and D4 and reverse biasing D1 and D3. Current flow will now be from point A through D4,
up through RL, through D2, through the secondary of T1, and back to point A. This path is
indicated by the broken arrows. Waveforms (3) and (4) can be observed across D2 and D4. The
current flow through RL is always in the same direction. In flowing through RL this current
develops a voltage corresponding to that shown waveform (5). Since current flows through the
load (RL) during both half cycles of the applied voltage, this bridge rectifier is a full-wave
rectifier.
One advantage of a bridge rectifier over a conventional full-wave rectifier is that with a given
transformer the bridge rectifier produces a voltage output that is nearly twice that of theconventional full-wave circuit.
This may be shown by assigning values to some of the components shown in views A and B.
assume that the same transformer is used in both circuits. The peak voltage developed between
-
8/8/2019 Smart Car Final
8/112
SMART CAR SECURITY SYSTEM 8
points X and y is 1000 volts in both circuits. In the conventional full-wave circuit shownin
view A, the peak voltage from the center tap to either X or Y is 500 volts. Since only one diode
can conduct at any instant, the maximum voltage that can be rectified at any instant is 500 volts.
The maximum voltage that appears across the load resistor is nearly-but never exceeds-500 v0lts,
as result of the small voltage drop across the diode. In the bridge rectifier shown in view B, the
maximum voltage that can be rectified is the full secondary voltage, which is 1000 volts.
Therefore, the peak output voltage across the load resistor is nearly 1000 volts. With both
circuits using the same transformer, the bridge rectifier circuit produces a higher output voltage
than the conventional full-wave rectifier circuit.
IC voltage regulators
Voltage regulators comprise a class of widely used ICs. Regulator IC units contain the circuitry
for reference source, comparator amplifier, control device, and overload protection all in a single
IC. IC units provide regulation of either a fixed positive voltage, a fixed negative voltage, or an
adjustably set voltage. The regulators can be selected for operation with load currents from
hundreds of milli amperes to tens of amperes, corresponding to power ratings from milli watts to
tens of watts.
-
8/8/2019 Smart Car Final
9/112
SMART CAR SECURITY SYSTEM 9
Fig 1.4.2 Circuit Diagram Of Power Supply
A fixed three-terminal voltage regulator has an unregulated dc input voltage, Vi, applied to one
input terminal, a regulated dc output voltage, Vo, from a second terminal, with the third terminal
connected to ground.
The series 78 regulators provide fixed positive regulated voltages from 5 to 24 volts. Similarly,
the series 79 regulators provide fixed negative regulated voltages from 5 to 24 volts.
y For ICs, microcontroller, LCD --------- 5 volts
y For alarm circuit, op-amp, relay circuits ---------- 12 volts
-
8/8/2019 Smart Car Final
10/112
SMART CAR SECURITY SYSTEM 10
CHAPTER 2
DS89C430 MICROCONTROLLER
-
8/8/2019 Smart Car Final
11/112
SMART CAR SECURITY SYSTEM 11
2.1 About Micro Controller
The DS89C430 and DS89C450 offer the highest performance available in 8051-compatible
microcontrollers. They feature newly designed processor cores that execute instructions up to 12 times
faster than the original 8051 at the same crystal speed. Typical applications will experience a speed
improvement up to 10x. At 1 million instructions per second (MIPS) per megahertz, the microcontrollers
achieve 33 MIPS performance from a maximum 33MHz clock rate.
2.1.1 Features
y High-Speed 8051 Architecture
o One Clock-Per-Machine Cycle
o DC to 33MHz Operation
o Single Cycle Instruction in 30ns
o Optional Variable Length MOVX to Access Fast/Slow Peripherals
o Dual Data Pointers with Automatic Increment/Decrement and Toggle Select
o Supports Four Paged Memory-Access Modes
y On-Chip Memory
o 16kB/64kB Flash Memory
o In-Application Programmableo In-System Programmable Through Serial Port
o 1kB SRAM for MOVX
y 80C52 Compatible
o 8051 Pin and Instruction Set Compatible
o Four Bidirectional, 8-Bit I/O Ports
o Three 16-Bit Timer Counters
o 256 Bytes Scratchpad RAM
y Power-Management Mode
o Programmable Clock Divider
o Automatic Hardware and Software E xit
y ROMSIZ E Feature
-
8/8/2019 Smart Car Final
12/112
SMART CAR SECURITY SYSTEM 12
o Selects Internal Program Memory Size from 0 to 64kB
o Allows Access to E ntire E xternal Memory Map
o Dynamically Adjustable by Software
y Peripheral Features
o Two Full-Duplex Serial Ports
o Programmable Watchdog Timer
o 13 Interrupt Sources (Six E xternal)
o Five Levels of Interrupt Priority
o Power-Fail Reset
o E arly Warning Power-Fail Interrupt
o E lectromagnetic Interference ( E MI) Reduction
2.1.2 PIN DESCRIPTION
-
8/8/2019 Smart Car Final
13/112
SMART CAR SECURITY SYSTEM 13
-
8/8/2019 Smart Car Final
14/112
SMART CAR SECURITY SYSTEM 14
TABL E 2.1 MICROCONTROLL E R PIN D E SCRIPTION
-
8/8/2019 Smart Car Final
15/112
SMART CAR SECURITY SYSTEM 15
2.2 DETAILED DESCRIPTION
The DS89C430 and DS89C450 are pin compatible with all three packages of the
standard 8051 and include standard resources such as three timer/counters, serial port, and four 8- bit I/O ports. The three part numbers vary only by the amount of internal flash memory
(DS89C430 = 16kB, DS89C450 = 64kB), which can be in-system/in application programmed
from a serial port using ROM-resident or user-defined loader software. For volume deployments,
the flash can also be loaded externally using standard commercially available parallel
programmers.
Besides greater speed, the DS89C430/DS89C450 include 1kB of data
RAM, a second full hardware serial port, seven additional interrupts, two extra levels of interrupt
priority, programmable watchdog timer, brownout monitor and power-fail reset. Dual data
pointers (DPTRs) are included to speed up block data-memory moves with further enhancements
coming from selectable automatic increment/decrement and toggle select operation. The speed of
MOVX data memory access can be adjusted by adding stretch values up to 10 machine cycles for
flexibility in selecting external memory and peripherals.
A power management mode consumes significantly lower power by slowing the CPU execution
rate from one clock period per cycle to 1024 clock periods per cycle. A selectable switchback
feature can automatically cancel this mode to enable normal speed responses to interrupts.
For E MI-sensitive applications, the microcontroller can disable the
ALE signal when the processor is not accessing external memory.
Terminology
The term DS89C430 is used in the remainder of the document to refer to the
DS89C430 and DS89C450, unless otherwise specified.
Compatibility
The DS89C430 is a fully static CMOS 8051-compatible microcontroller
similar in functional features to the DS87C520, but it offers much higher performance. In most
cases, the DS89C430 can drop into an existing socket for the 8xC51 family, immediately
-
8/8/2019 Smart Car Final
16/112
SMART CAR SECURITY SYSTEM 16
improving the operation. While remaining familiar to 8051 family users, the DS89C430 has
many new features. In general, software written for existing 8051-based systems works without
modification on the DS89C430, with the exception of critical timing routines, as the DS89C430
performs its instructions much faster for any given crystal selection.
The DS89C430 provides three 16-bit timer/counters, two full-duplex serial ports, and 256 bytes
of direct RAM plus 1kB of extra MOVX RAM. I/O ports can operate as in standard 8051
products. Timers default to 12 clocks-per-cycle operation to keep their timing compatible with a
legacy 8051 family systems. However, timers are individually programmable to run at the new
one clock per cycle if desired. The DS89C430 provides several new hardware features, described
in subsequent sections, implemented by new special-function registers (SFRs).
Performance OverviewFeaturing a completely redesigned high-speed 8051-compatible core, the
DS89C430 allows operation at a higher clock frequency. This updated core does not have the
wasted memory cycles that are present in a standard 8051. A conventional 8051 generates
machine cycles using the clock frequency divided by 12. The same machine cycle takes one
clock in the DS89C430. Thus, the fastest instructions execute 12 times faster for the same crystal
frequency (and actually 24 times faster for the INC data pointer instruction). It should be noted
that this speed improvement is reduced when using external memory access modes that require
more than one clock per cycle.
Individual program improvement depends on the instructions used. Speed-
sensitive applications would make the most use of instructions that are 12 times faster. However,
the sheer number of 12-to-1 improved op codes makes dramatic speed improvements likely for
any code. These architectural improvements produce instruction cycle times as low as 30ns. The
dual data pointer feature also allows the user to eliminate wasted instructions when moving
blocks of memory. The new page modes allow for increased efficiency in external memory
accesses.
Instruction Set Summary
-
8/8/2019 Smart Car Final
17/112
SMART CAR SECURITY SYSTEM 17
All instructions have the same functionality as their 8051 counterparts,
including their affect on bits, flags, and other status functions. However, the timing of each
instruction is different, in both absolute and relative number of clocks.
For absolute timing of real-time events, the duration of software loops can
be calculated using information given in the Instruction Set table in the Ul tra-High- Speed Fl ash
M icrocontro ller U sers Guide. However, counter/timers default to run at the older 12 clocks per
increment. In this way, timer-based events occur at the standard intervals with software
executing at higher speed. Timers optionally can run at a reduced number of clocks per
increment to take advantage of faster processor operation.
The relative time of some instructions may be different in the new architecture.
For example, in the original architecture, the MOVX A, @DPTR instruction and the MOV
direct, direct instruction used two machine cycles or 24 oscillator cycles. Therefore, theyrequired the same amount of time. In the DS89C430, the MOVX instruction takes as little as two
machine cycles or two oscillator cycles, but the MOV direct, direct uses three machine cycles
or three oscillator cycles. While both are faster than their original counterparts, they now have
different execution times. This is because the DS89C430 usually uses one machine cycle for
each instruction byte and requires one cycle for execution.
Special-Function Registers (SFRs)
All peripherals and operations that are not explicit instructions in the
DS89C430 are controlled through SFRs. The most common features basic to the architecture are
mapped to the SFRs. These include the CPU registers (ACC, B, and PSW), data pointers, stack
pointer, I/O ports, timer/counters, and serial ports. In many cases, an SFR controls an individual
function or reports the functions status. The SFRs reside in register locations 80hFFh and are
only accessible by direct addressing. SFRs with addresses ending in 0h or 8h are bit addressable.
All standard SFR locations from the 8051 are duplicated in the DS89C430, and several SFRs
have been added for the unique features of the DS89C430. Most of these features are controlled
by bits in SFRs located in unused locations in the 8051 SFR map, allowing for increased
functionality while maintaining complete instruction set compatibility.
Data Pointers
-
8/8/2019 Smart Car Final
18/112
SMART CAR SECURITY SYSTEM 18
The data pointers (DPTR and DPTR1) are used to assign a memory address for the
MOVX instructions. This address can point to a MOVX RAM location (on-chip or off-chip) or a
memory-mapped peripheral. Two pointers are useful when moving data from one memory area
to another, or when using a memory-mapped peripheral for both source and destination
addresses. The user can select the active pointer through a dedicated SFR bit (S E L = DPS.0), or
can activate an automatic toggling feature for altering the pointer selection (TSL = DPS.5). An
additional feature, if selected, provides automatic incrementing or decrementing of the current
DPTR.
Stack Pointer
The stack pointer denotes the register location at the top of the stack, which is the
last used value. The user can place the stack anywhere in the scratchpad RAM by setting the
stack pointer to the desired location, although the lower bytes are normally used for workingregisters.
I/O Ports
The DS89C430 offers four 8-bit I/O ports. E ach I/O port is represented by an SFR
location and can be written or read. The I/O port has a latch that contains the value written by
software.
Counter/Timers
Three 16-bit timer/counters are available in the DS89C430. E ach timer is
contained in two SFR locations that can be read or written by software. The timers are controlled
by other SFRs, described in the SFR B it De scri ption section of the Ul tra-High- Speed Fl ash
M icrocontro ller U sers Guide.
Serial Ports
The DS89C430 provides two UARTs that are controlled and accessed by SFRs.
E ach UART has an address that is used to read and write the value contained in the UART. The
same address is used for both read and write operations, and the read and write operations are
distinguished by the instruction. Its own SFR control register controls each UART.
-
8/8/2019 Smart Car Final
19/112
SMART CAR SECURITY SYSTEM 19
CHAPTER 3
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
-
8/8/2019 Smart Car Final
20/112
SMART CAR SECURITY SYSTEM 20
3.1 MODEM
A G SM modem is a wireless modem that works with a G SM wireless
network. A wireless modem behaves like a dial-up modem. The main difference between them is
that a dial-up modem sends and receives data through a fixed telephone line while a wireless
modem sends and receives data through radio waves.
A G SM modem can be an external device or a PC Card / PCMCIA Card. Typically, an external
G SM modem is connected to a computer through a serial cable or a USB cable. A G SM modem
in the form of a PC Card / PCMCIA Card is designed for use with a laptop computer. It should
be inserted into one of the PC Card / PCMCIA Card slots of a laptop computer. Like a G SM
mobile phone, aG
SM modem requires a SIM card from a wireless carrier in order to operate.
As mentioned in earlier sections of this SMS tutorial, computers use AT commands to control
modems. Both G SM modems and dial-up modems support a common set of standard AT
commands. You can use a G SM modem just like a dial-up modem.
In addition to the standard AT commands, G SM modems support an extended set of AT
commands. These extended AT commands are defined in the G SM standards. With the extended
AT commands, you can do things like:
y Reading, writing and deleting SMS messages.
y Sending SMS messages.
y Monitoring the signal strength.
y Monitoring the charging status and charge level of the battery.
y Reading, writing and searching phone book entries.
The number of SMS messages that can be processed by a G SM modem per minute is very low --
only about six to ten SMS messages per minute.
-
8/8/2019 Smart Car Final
21/112
SMART CAR SECURITY SYSTEM 21
GSM MODEM APPLICATION
Fig 3.1 GSM MODEM APPLICATIONS
-
8/8/2019 Smart Car Final
22/112
SMART CAR SECURITY SYSTEM 22
3.2 TECHNICAL INTRODUCTION TO GSM MODEM TECHNOLOGY
3.2.1 FACTS AND APPLICATIONS OF GSM/GPRS MODEM
The G SM/ G PRS Modem comes with a serial interface through which the modem can be controlled usingAT command interface. An antenna and a power adapter are provided.
The basic segregation of working of the modem is as under
Voice calls
SMS
G SM Data calls
G PRS
Voice calls: Voice calls are not an application area to be targeted. In future if interfaces like a microphone
and speaker are provided for some applications then this can be considered.
SMS: SMS is an area where the modem can be used to provide features like:
Pre-stored SMS transmission
These SMS can be transmitted on certain trigger events in an automation system
SMS can also be used in areas where small text information has to be sent. The transmitter can be an
automation system or machines like vending machines, collection machines or applications like
positioning systems where the navigator keeps on sending SMS at particular time intervals
SMS can be a solution where G SM data call or G PRS services are not available
GSM Data Calls: Data calls can be made using this modem. Data calls can be made to a normal PSTN
modem/phone line also (even received). Data calls are basically made to send/receive data streams
between two units either PCs or embedded devices. The advantage of Data calls over SMS is that both
parties are capable of sending/receiving data through their terminals.
Some points to be remembered in case of data calls:
The data call service doesnt come with a normal SIM which is purchased but has to be requested with
the service provider (say Airtel).
Upon activation of data/fax service you are provided with two separate numbers i.e. the Data call
number and the Fax service number.
-
8/8/2019 Smart Car Final
23/112
SMART CAR SECURITY SYSTEM 23
Data calls are established using Circuit Switched data connections.
Right now the speed at which data can be transmitted is 9.6 kbps.
The modem supports speeds up to 14.4 kbps but the provider give a maximum data rate of 9.6 kbps
during G SM data call.
Technologies like HSCSD (high Speed Circuit Switched Data) will improve drastically the data rates, but still in pipeline.
Applications And Facts About GSM Data Calls:
Devices that have communication on serial port either on PC or in the embedded environment
Devices that want to communicate with a remote server for data transfer
This capability of data transfer can help in reducing processing requirements of the device
The basic aim is to provide a wireless solution keeping the existing firmware intact The clients firmware continues to work without any modifications (no changes in the existing software
required)
G SM data calls can be a good solution where data has to be transmitted from a hand-held device to a
central server
The interface on two sides can be between PCs as well as embedded devices
Fig 3.2 INTERFACING FIGURE
Calls can be established by the terminals at either side to start data calls
The Modem remains transparent during data transfer after the call is established.
Call establishment utility to be provided in case PC terminals
Call establishment to be automated in case of embedded terminals. G SM converter can be an option
-
8/8/2019 Smart Car Final
24/112
SMART CAR SECURITY SYSTEM 24
where intelligence of establishing calls has to be put in case of embedded devices. Concept of G SM
converter is discussed later in this document
3.3 GSM SECURITY
G SM was designed with a moderate level of security. The system was designed to authenticate the
subscriber using shared-secret cryptography. Communications between the subscriber and the base station
can be encrypted. The development of UMTS (UNIV E RSAL MOBIL E COMMUNICATIN G SYST E M
introduces an optional, that uses a longer authentication key to give greater security, as well as mutually
authenticating the network and the user - whereas G SM only authenticated the user to the network (and
not vice versa).
G SM uses several cryptographic algorithms for security. A large security advantage of G SM isthat the key, the crypto variable stored on the SIM card that is the key to any G SM ciphering
algorithm, is never sent over the air interface. Serious weaknesses have been found in both
algorithms, and it is possible to break A5/2 in real-time in a ciphertext-only attack. The system
supports multiple algorithms so of G SM converter is discussed later in this document operators
may replace that cipher with a stronger one.
A G SM modem is a wireless modem that works with a G SM wireless network. A wireless modem
behaves like a dial-up modem. The main difference between them is that a dial-up modem sends and
receives data through a fixed telephone line while a wireless modem sends and receives data through radio
waves. A G SM modem can be an external device or a PC Card / PCMCIA Card. Typically, an external
G SM modem is connected to a computer through a serial cable or a USB cable. A G SM modem in th
form of a PC Card / PCMCIA Card is designed for use with a laptop computer. It should be inserted into
one of the PC Card / PCMCIA Card slots of a laptop computer. Like a G SM mobile phone, a G S
modem requires a SIM card from a wireless carrier in order to operate.
Computers use AT commands to control modems. Both G SM modems and dial-up modems
support a common set of standard AT commands.
-
8/8/2019 Smart Car Final
25/112
SMART CAR SECURITY SYSTEM 25
In addition to the standard AT commands, G SM modems support an extended set of AT
commands .These extended AT commands are defined in the G SM standards.
With the extended AT commands, we can do things like:
y Reading, writing and deleting SMS messages.
y Sending SMS messages.
y Monitoring the signal strength.
y Monitoring the charging status and charge level of the battery.
y Reading, writing and searching phonebook entries.
The number of SMS messages that can be processed by a G SM modem per minute is very low --
only about six to ten SMS messages per minute.
3.4 ADVANTAGES OF GSM MODULE
y Small, lightweight and easy to integrate
y Low power consumption
y Full E TSI / R&TT E type approval
y Internal SIM card reader and option for external SIM card reader
y Full RS232 on CMOS level with flow control (RX, TX, CTS, RTS, CTS, DTR,
DSR,DCD, RI)
3.5 PRODUCT DESCRIPTION
The G SM Commercial Modem is an approved modem for embedded applications. It provides a 5V TTL
compatible serial interface to host Data terminal equipment.
-
8/8/2019 Smart Car Final
26/112
SMART CAR SECURITY SYSTEM 26
Accessories:
1.PowerAdapter
2. Standard rubber antenna , regular G SM Coverage Areas.
3.6 APPLICATIONS
Access control devices: Now access control devices can communicate with servers and security staff
through SMS messaging. Complete log of transaction is available at the head-office Server instantly
without any wiring involved and device can instantly alert security personnel on their mobile phone in
case of any problem. RaviRaj Technologies is introducing this technology in all Fingerprint Access
control and time attendance products. You can achieve high security any reliability.
Transaction terminals: E DC machines, POS terminals can use SMS messaging to confirm transactionsfrom central servers. The main benefit is that central server can be anywhere in the world. Today you
need local servers in every city with multiple telephone lines. You save huge infrastructure costs as well
as per transaction cost.
Supply Chain Management: Today SCM require huge IT infrastructure with leased lines, networking
devices, data centre, workstations and still you have large downtimes and high costs. You can do all this
at a fraction of the cost with G SM M2M technology.
What applications is suitable for GSM communication?
If your application needs one or more of the following features, G SM will be more cost-effective then
other communication systems.
Short Data Size: You data size per transaction should be small like 1-3 lines. e.g. banking transaction
data, sales/purchase data, consignment tracking data, updates. These small but important transaction data
can be sent through SMS messaging which cost even less then a local telephone call or sometimes free of cost worldwide. Hence with negligible cost you are able to send critical information to your head office
located anywhere in the world from multiple points. You can also transfer faxes, large data through G SM
but this will be as or more costly compared to landline networks.
-
8/8/2019 Smart Car Final
27/112
SMART CAR SECURITY SYSTEM 27
Multiple remote data collection points: If you have multiple data collections points situated all over
your city, state, country or worldwide you will benefit the most. The data can be sent from multiple points
like your branch offices, business associates, warehouses, agents with devices like G SM modemsconnected to PCs, G SM electronic terminals and Mobile phones. Many a times some places like
warehouses may be situated at remote location may not have landline or internet but you will have G SM
network still available easily.
High uptime: If your business require high uptime and availability G SM is best suitable for you as G SM
mobile networks have high uptime compared to landline, internet and other communication mediums.
Also in situations where you expect that someone may sabotage your communication systems by cutting
wires or taping landlines, you can depend on G SM wireless communication.
Mobility, Quick installation: G SM technology allow mobility, G SM terminals, modems can be just
picked and installed at other location unlike telephone lines. Also you can be mobile with G SM terminals
and can also communicate with server using your mobile phone. You can just purchase the G SM
hardware like modems, terminals and mobile handsets, insert SIM cards, configure software and your are
ready for G SM communication. G SM solutions can be implemented within few weeks whereas it may
take many months to implement the infrastructure for other technologies.
3.7 AT COMMANDS
3.7.1 Terms and Abbreviations:
a. Asynchronous: A serial data transmission method that uses Start and Stop bits to synchronize reception.
b. AT Commands: A group of commands that can be sent by a terminal or host computer to control the
ISU in Command mode.
c. Command E ntry: An AT command is a string of characters sent by the DT E to the ISU while the ISU is
in command mode. A command string has a prefix, a body, and a terminator. The prefix consists of the
ASCII characters AT or at. The body is a string of commands restricted to printable ASCII characters.
-
8/8/2019 Smart Car Final
28/112
SMART CAR SECURITY SYSTEM 28
The default terminator is the character.There are two format types for AT commands: basic and
extended. The basic commands consist of single ASCII characters, or single characters preceded by a
prefix character, followed by a decimal parameter.
There are a few rules about the entry of commands:
a. All commands (apart from A/ and +++) start with AT or at. The commands in a command string
(apart from A/ and +++) are executed only after the return or enter key is pressed.
b. Use all upper or lower case letters, not a combination.
c. The maximum number of characters in a command string is 128. Multiple commands can be
concatenated onto a single command line or by a semicolon.
d. Command editing can usually be performed by the backspace or delete keys.
e. If a parameter is missed from a basic command, a zero is implied (e.g. ATH implies ATH0). If an
optional parameter is skipped from an extended command, the current value is implied. Optional
parameters are enclosed by square brackets ([...]) in this document.
f. Spaces can be entered into a command string to increase clarity. These are ignored.
g. Characters that precede the AT prefix are ignored.
3.7 .2 BASIC AT COMMANDS
Commands:
+CNMI - New SMS Message Indications to DT E
Set Command : +CNMI=[[,[,[,[, ]]]]]
+CMTI: ,
SMS-D E LIV E Rs (except class 2 messages and messages in the message waiting indication group (store
message)) are routed directly to the T E using unsolicited result code:
+CMT: [], (PDU mode)
defined in =2. Messages of other data coding schemes result in indication as
-
8/8/2019 Smart Car Final
29/112
SMART CAR SECURITY SYSTEM 29
defined in =1.
Read Command: +CNMI
Read command returns the current settings for the SMS message indication. Response is in the
form:
+CNMI: ,,,,
Test Command: +CNMI
Test command returns the supported settings of the phone. Response is in the form:
+CNMI: (list of supported s),(list of supported s),(list of supported s),(list of supported
s),(list of supported s)
+CMGD - Delete SMS Message
E xec Command: +CM G D=
E xecution command deletes message from preferred message storage ( is the
selected message storage from the +CPMS command) location . If deleting fails, final result code
+CMS
+CMGR - Read SMS Message
E xec Command: +CM G R=
E xecution command returns the SMS message with location value from message storage
( is the selected message storage from the +CPMS command).
If status of the message is received unread, status in the storage changes to received read. If
reading fails, final result code +CMS E RROR: is returned.
-
8/8/2019 Smart Car Final
30/112
SMART CAR SECURITY SYSTEM 30
+CMGS - Send SMS Message
Sending the message
To send the sms message ,type the following command:
AT+CMGS="+31638740161"
Replace the above phone number with your own cell phone number. The modem will respond with:
>
we can now type the message text and send the message using the - key combination
HelloWorld!
-
8/8/2019 Smart Car Final
31/112
SMART CAR SECURITY SYSTEM 31
CHAPTER 4
SERIAL COMMUNICATION
-
8/8/2019 Smart Car Final
32/112
SMART CAR SECURITY SYSTEM 32
4.1 MAX 232
The MAX232 device is a dual driver/receiver that includes a capacitive voltage generator to supply E IA
232 voltage levels from a single 5-V supply. E ach receiver converts E IA-232 inputs to 5-V TTL/CMOS
levels. These receivers have a typical threshold of 1.3 V and a typical hysteresis of 0.5 V, and can accept
30-V inputs. E ach driver converts TTL/CMOS input levels into E IA-232 levels.
4.1.1 Logic Signal Voltage
Serial RS-232 (v.24) communication works with voltages (between -15v -3v are used to transmit a
binary 1 and =3V ...-15v to transmit a binary 0) which are not compatible with todays computer logic
voltages. On the other hand , classic TTL computer logic operates between 0V+5V (roughly 0V
+0.8V referred to as low for Binary 0,_2V .+5V for high Binary 1).Modern low-power logic
operates in the range of 0V ... +3.3V or even lower. So, the maximum RS-232 signal levels are far too
high for today's computer logic electronics, and the negative RS-232 voltage can't be grokked at all by the
computer logic. Therefore, to receive serial data from an RS-232 interface the voltage has to be reduced,
and the 0 and 1 voltage levels inverted. In the other direction (sending data from some logic over RS-232)
the low logic voltage has to be "bumped up", and a negative voltage has to be generated, too.
All this can be done with conventional analog electronics, e.g. a particular power supply and a couple of
transistors or the once popular 1488 (transmitter) and 1489 (receiver) IC s. However, since more than a
decade it has become standard in amateur electronics to do the necessary signal level conversion with an
IC from the MAX232 family (typically a MAX232 or some clone). IN fact , it is hard to find some RS-
232 circuitry in amateur electronics without a MAX232 or some clone.
-
8/8/2019 Smart Car Final
33/112
SMART CAR SECURITY SYSTEM 33
Voltage levels
RS-232 TTL Logic
-----------------------------------------------
-15V ... -3V +2V ... +5V 1+3V ... +15V 0V ... +0.8V 0
Fig: 4.1 MAX 232 DIP PACKAGE
The MAX232 from Maxim was the first IC which in one package contains the necessary drivers
(two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became
popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage
levels (approx. -10V and +10V) internally. This greatly simplified the design of circuitry.
Circuitry designers no longer need to design and build a power supply with three voltages (e.g. -
12V, +5V, and +12V), but could just provide one +5V power supply, e.g. with the help of a
simple 78x05 voltage converter.
The MAX232 (A) has two receivers (converts from RS-232 to TTL voltage levels) and two
drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232
signals can be converted in each direction. The old MC1488/1498 combo provided four drivers
and receivers.
-
8/8/2019 Smart Car Final
34/112
SMART CAR SECURITY SYSTEM 34
Typically a pair of a driver/receiver of the MAX232 is used for
y TX and RX and the second one for
y
CTS and RTS.
4.2 RS232
When we look at the connector pinout of the RS232 port, we see two pins which are certainly used for
flow control. These two pins are RTS , request to send and CTS , clear to send. With DTE /DCE
communication (i.e. a computer communicating with a modem device) RTS is an output on the DTE and
input on the DCE . CTS is the answering signal comming from the DCE .
Before sending a character, the DTE asks permission by setting its RTS output. No information will be
sent until the DCE grants permission by using the CTS line. If the DCE cannot handle new requests, the
CTS signal will go low. A simple but useful mechanism allowing flow control in one direction. The
assumption is, that the DTE can always handle incomming information faster than the DCE can send it.
In the past, this was true. Modem speeds of 300 baud were common and 1200 baud was seen as a high
speed connection.
For further control of the information flow, both devices have the ability to signal their status to the other
side. For this purpose, the DTR data terminal ready and DSR data set ready signals are present. The DTE
uses the DTR signal to signal that it is ready to accept information, whereas the DCE uses the DSR
signal for the same purpose. Using these signals involves not a small protocol of requesting and
answering as with the RTS /CTS handshaking. These signals are in one direction only.
The last flow control signal present in DTE /DCE communication is the CD carrier detect. It is not used
directly for flow control, but mainly an indication of the ability of the modem device to communicate
with its counter part. This signal indicates the existence of a communication link between two modem
devices.
-
8/8/2019 Smart Car Final
35/112
SMART CAR SECURITY SYSTEM 35
Null modem without handshaking
How to use the handshaking lines in a null modem configuration? The simplest way is to don't use them
at all. In that situation, only the data lines and signal ground are cross connected in the null modem
communication cable. All other pins have no connection. An example of such a null modem cable without
handshaking can be seen in the figure below.
Simple null modem without handshaking
Connector 1 Connector 2 Function
2 3 Rx Tx
3 2 Tx Rx
5 5 Signal ground
FIG 4.2 DB9 CONNECTOR
-
8/8/2019 Smart Car Final
36/112
SMART CAR SECURITY SYSTEM 36
4.4.1 RS232 COMMUNICATION
Fig 4.3 Circuit Diagram Of Serial Communication
4.2.2 INTRODUCTION
In telecommunications, RS-232 is a standard for serial binary data interconnection between a DT E (Data
terminal equipment) and a DC E (Data Circuit-terminating E quipment). It is commonly used in computer
serial ports.
Scope of the Standard:
The E lectronic Industries Alliance ( E IA) standard RS-232-C [3] as of 1969 defines:
E lectrical signal characteristics such as voltage levels, signaling rate, timing and slew-rate of signals,
voltage withstand level, short-circuit behavior, maximum stray capacitance and cable length
Interface mechanical characteristics, pluggable connectors and pin identification Functions of each circuit in the interface connector
Standard subsets of interface circuits for selected telecom applications
-
8/8/2019 Smart Car Final
37/112
SMART CAR SECURITY SYSTEM 37
The standard does not define such elements as character encoding (for example, ASCII, Baudot or
E BCDIC), or the framing of characters in the data stream (bits per character, start/stop bits, parity). The
standard does not define protocols for error detection or algorithms for data compression.
The standard does not define bit rates for transmission, although the standard says it is intended for bit
rates lower than 20,000 bits per second. Many modern devices can exceed this speed (38,400 and 57,600
bit/s being common, and 115,200 and 230,400 bit/s making occasional appearances) while still using RS-
232 compatible signal levels.
Details of character format and transmission bit rate are controlled by the serial port hardware, often a
single integrated circuit called a UART that converts data from parallel to serial form. A typical serial
port includes specialized driver and receiver integrated circuits to convert between internal logic levels
and RS-232 compatible signal levels.
Circuit Working Description
In this circuit the MAX 232 IC used as level logic converter. The MAX232 is a dual driver/receiver that
includes a capacive voltage generator to supply E IA 232 voltage levels from a single 5v supply. E ach
receiver converts E IA-232 to 5v TTL/CMOS levels. E ach driver converts TLL/CMOS input levels into
E IA-232 levels.
-
8/8/2019 Smart Car Final
38/112
SMART CAR SECURITY SYSTEM 38
In this circuit the microcontroller transmitter pin is connected in the MAX232 T2IN pin which converts
input 5v TTL/CMOS level to RS232 level. Then T2OUT pin is connected to reviver pin of 9 pin D type
serial connector which is directly connected to PC.
In PC the transmitting data is given to R2IN of MAX232 through transmitting pin of 9 pin D type
connector which converts the RS232 level to 5v TTL/CMOS level. The R2OUT pin is connected to
receiver pin of the microcontroller. Likewise the data is transmitted and received between the
microcontroller and PC or other device vice versa.
-
8/8/2019 Smart Car Final
39/112
SMART CAR SECURITY SYSTEM 39
CHAPTER 5
GLOBAL POSITIONING SATELLITE
-
8/8/2019 Smart Car Final
40/112
SMART CAR SECURITY SYSTEM 40
5.1 INTRODUCTION
G PS stands for G lobal Positioning System, which is a nifty satellite that tells
you your location anywhere on planet earth. This part is all about G PS. A special radio receiver
measures the distance from your location to satellites that orbit the earth broadcasting radio
signals. G PS can pinpoint your position anywhere in the world.
You can purchase an inexpensive G PS receiver, pop some batteries in it,
and turn it on. Your location appears on the screen .No map, compass, sextant, nor is sundial
required .Just like the magic. Its not really magic, though, but has evolved from some great
practical applications of science that have come together over the last 50 years.
5.2 HISTORY OF GPS:
Military, government and civilian users all over the world rely on G PS for
navigation and location positioning, but radio signals have been used for navigation purposes
since the 1920s. LORAN (Long Range Aid to Navigation), a position- finding system that
measured the time difference of arriving radio signals , was developed during World War- 2.
The first step to G PS came way back in 1957 when the Russians launched
SPUTNIK, the first satellite to orbit the E arth. Sputnik used a radio transmitter to broadcast
telemetry information. Scientists at that Johns Hopkins applied physics Lab discovered that the
Doppler shift phenomenon applied to the spacecraft and almost unwittingly sruct gold.
A down to earth, painless example of the Doppler shift principle is when you stand
on a sidewalk and a police car speeds by in hot pursuit of a stolen motorcycle. The pitch of the
police siren increases as the car approaches you and then drops sharply as it moves away.
American scientists figured out that they knew the satellites precise orbital position,
they could accurately locate their exact position on earth by listening to the pinging sounds and
measuring the satellites radio signal Doppler shift. Satellite offered some possibilities for
navigation and positioning system .and the U.S.Deparment of Defense (DOD) explored the
concept.
-
8/8/2019 Smart Car Final
41/112
SMART CAR SECURITY SYSTEM 41
In 1973, the Air-Force was selected as the lead organization to consolidate all the
military satellite navigation efforts into a single program. This evolved into the NAVSTAR
(Navigation Satellite Timing and Ranging) G lobal positioning system, which is the official name
for the United States G PS program.
5.3 HOW GPS WORKS:
The intricacies of G PS are steeped in mathematics, physics, and
engineering, but you dont need to be a rocket scientist to understand how G PS works.
G PS is composed of three parts as shown in the below figure:
Satellites
G round stations
Receivers
FIG 5.1 BLOCK DIAGRAM OF GPS
-
8/8/2019 Smart Car Final
42/112
SMART CAR SECURITY SYSTEM 42
5.3.1 EYEING SATELLITES:
In G PS jargon, a satellite is the space segment. A constellation of 24 G PS
satellites (21 operational and 3 spares) orbits about 12,000 miles above the E arth (as shown in
figure 3-2). The satellites zoom through the heavens at around 7,000miles per hour .It takes
about 12 hours for a satellite to completely orbit the E arth, passing over the exact same spot
approximately every 24 hours. The satellites are positioned where a G PS receiver can receive
signals from at least six of the satellites at any time, at any location on the E arth ( if nothing
obstructs the signals).
FIG 5.2 WORKING OF SATELLITES
-
8/8/2019 Smart Car Final
43/112
SMART CAR SECURITY SYSTEM 43
A satellite has three key pieces of hardware:
COMPUTER: This onboard computer controls its flight and other functions.
ATOMIC CLOCK: This keeps accurate time within three nanoseconds (around three-
billionths of a second).
RADIO TRANSMITTER: This sends signals to E arth.
G PS satellites dont just help you stay found. All G PS satellites since 1980 carry NUD E T
sensors .No, this isnt some high-tech pornography-detection system.NUD E T is an acronym for
Nuclear Detonation; G PS satellites have sensors to detect nuclear attack, and help evaluate strike
damage.
The solar-powered G PS satellites have a limited life span (around 10 years).
When they start to fail, spares are activated or new satellites are sent into orbit to replace the old
ones.
GPS RADIO SIGNALS:
G PS satellites transmit two types of radio signals: C/A-code and P-code. Briefly, here are the
uses and differences of these two types of signals.
COARSE ACQUISITION (C/A CODE)
Coarse Acquisition(C/A-code) is the type of signal that consumer G PS units receive .C/A- code
is sent on the L1 band at a frequency of 1575.42 MHz
-
8/8/2019 Smart Car Final
44/112
SMART CAR SECURITY SYSTEM 44
C/A broadcasts are known as the Standard positioning Service (SPS).
C/A code is less accurate than p-code (see the following section) and is easier for U.S. military
forces to jam and spoof (broadcast false signals to make a receiver think its somewhere else
when its really not).
The advantage of C/A-code is that its quicker to use for acquiring satellites and getting an initial
position fix. Some military P-code receivers first track on the C/a-code and then switch over to
P-code.
PRECISION (P-CODE)
P-code provides highly precise location information. P-code is difficult to jam and spoof .the P-
code signal is broadcast on the L2 band at 1227.6 MHz
P-code broadcasts are known as the Precise positioning Services (PPS).
5.3.2 COVERING GROUND STATIONS
G round stations are the control segments of G PS. Five unmanned ground stations
around the E arth monitor the satellites .information from the stations is sent to a master control
station the Consolidated Space Operations Centre ( CSOC) at Schriever Air Force Base in
Colorado where the data is processed to determine each satellites ephemeris and timing errors.
An ephemeris is a list of the predicted positions of astronomical bodies such as the
planets or the Moon. E phemerides (the plural of ephemeris) have been around for thousands of
years because of their importance in celestial navigation . E phemerides are compiled to track the
positions of the numerous satellites orbiting the earth.
-
8/8/2019 Smart Car Final
45/112
SMART CAR SECURITY SYSTEM 45
The processed data is sent to the satellites once daily with ground antenna located
around the world. This is kind of like syncing a personal digital assistant (PDA) with your
personal computer to ensure that all the data is in sync between the two devices. Because the
satellites have small built-in rockets, the CSOC can control them to ensure that they stay in a
correct orbit.
5.3.3 GPS RECEIVERS
Anyone who has a G PS receiver the satellite signals to determine where he or she is located.
SAT E LLIT E DATA:
G PS units receive two types of data from the NAVSATR satellites.
Almanac:
Almanac data contains the approximate positions of the satellites. The data is constantly being
transmitted and is stored in the G PS receivers memory.
E phemeris:
E phemeris data has the precise positions of the satellites. To get an accurate location fix, the
receiver has to know how far away a satellite is. The G PS receiver calculates the distance to the
satellite by using signals from the satellite.
Using the formula Distance=Velocity x Time, a G PS receiver calculates the satellites distance.
A radio signal travels at the speed of light (186,000 miles per second). The G PS receiver needs
to know how long the radio signal takes to travel from the satellite to the receiver in order to
figure the distance. Both the satellite and the G PS receiver generate an identical pseudo-random
code sequence. When the G PS receiver receives this transmitted code, it determines how much
the code needs to be shifted (using the Doppler-shift principle) for the two code sequences to
-
8/8/2019 Smart Car Final
46/112
SMART CAR SECURITY SYSTEM 46
match .The shift is multiplied by the speed of light to determine the distance from the satellite to
the receiver.
Multiple Satellites:
A G PS receiver needs several pieces to produce position information:
Location: A minimum of three satellite signals is required to find your location.
Position: Four satellite signals are required to determine your position in three
dimensions : Latitude, Longitude, and elevation .
5.4 HOW ACCURATE IS A GPS RECEIVER?
According to the government and G PS receiver manufactures, expect your
G PS unit to be accurate within 49 feet (thats 15 meters for metric-savvy folks). If your G PS
reports that youre at a certain location, you can be reasonably sure that youre within 40 feetof that exact set of coordinates.
G PS receivers tell you how accurate your position is. Based on the quality of
the satellite signals that the unit receives, the screen displays the estimated accuracy in feet or
meters. Accuracy depends on
Receiver location
Obstructions that block satellite signals
E ven youre not a military G PS user, you can get more accuracy by using a G PS receiver that
supports corrected location data. Corrected information is broadcast over radio signals that come
from either
-
8/8/2019 Smart Car Final
47/112
SMART CAR SECURITY SYSTEM 47
Non- G PS satellites
G round based beacons
Two common sources of more accurate location data are
Differential G PS ( D G PS) Wide Area Augmentation System( WAAS)
FIG 5.3 shows the accuracy you can expect from a G PS receiver. These numbers are guidelines;
at times, you may get slightly more or less accuracy.
TABLE 5.1 GPS ACCURACY
-
8/8/2019 Smart Car Final
48/112
SMART CAR SECURITY SYSTEM 48
Clouds, rain, snow, and weather dont reduce the strength of G
PS signals enoughto reduce accuracy. The only way that weather can weaken signals is when a
significant amount of rain or snow accumulates on the G PS receiver antenna or an
overhead tree canopy.
-
8/8/2019 Smart Car Final
49/112
SMART CAR SECURITY SYSTEM 49
5.4.1 INFORMATION FROM GPS RECEIVERS:
G PS receivers provide your location and other useful information:
TIM E : A G PS receiver receives time information from atomic clocks, so its much more
accurate than your wristwatch.
LOCATION: G PS provides your location in three dimensions:
Latitude(x coordinate)
Longitude (y coordinate)
E levation
SPEE D: When you are moving, a G PS receiver displays your speed.
DIR E CTION OF TRAV E L: A G PS receiver can display your direction of t ravel if youre
moving.
If youre stationary, the unit cant use satellite signals to determine which direction youre
facing. Some G PS units have compasses that show the direction the receiver is pointed whether
youre moving or standing still.
STOR E D LOCATIONS: You can locations where youve been or want to go with a G PS
receiver. These location positions are waypoints are important because a G PS unit can supply
you with directions and information on how to get to a waypoint. A collection of waypoints that
plots a course of travel is a route, which can also be stored . G PS receivers also store tracks
(which are like an electronic collection of breadcrumb trails that show where youre been).
-
8/8/2019 Smart Car Final
50/112
SMART CAR SECURITY SYSTEM 50
5.5 THE FUTURE OF GPS:
Modern technology rapidly evolves, and the same holds true for G PS. Since
consumer G PS. Since consumer G PS receivers first became available in the mid-1990s, the
market has grown tremendously because of cheaper receives prices and new ways to use G PS. A peek into crystal ball shows what the future may hold for G PS.
MOR E ACCURAT E :
The United States has started planning the next generation of G PS, dubbed G PS III. Driving
factors are better accuracy and reliability, improved resistance to signal jamming, and the
looming E uropean G alileo system. Increasing the number of WAAS satellites in orbit is also
planned.
SMALL E R:
G PS receivers will continue to shrink . G PS units already are integrated into wristwatches,
and PC Card G PS receives can plug into a laptop or PDA.
The three limiting factors that prevent a consumer receiver from shrinking are antenna size,
screen size, and power source size.
CH E APE R:
Prices will continue to decline as manufacturing costs decrease and production quantities
increase.
E ASI E R TO US E :
Simplified and less technical user interfaces will become more of a priority as G PS receivers
become more appliances like to meet the needs of specialized markets.
MOR E INT EG RAT E D:
-
8/8/2019 Smart Car Final
51/112
SMART CAR SECURITY SYSTEM 51
G PS receivers are being integrated into cars and trucks, cellphones, PDAs, Family Radio service
(FRS) radios, and other consumer electronic devices. E xpect some new products and services
that take advantage of location-aware data.
LE SS WIR E D
Most G PS receivers transfer data from personal computers through a cable Wireless technologies
such as Bluetooth ( www.bluetooth.com ) and wireless USB are well suited for fast and easy data
transfer.
5.6 APPLICATIONS OF GPS
Location - determining a basic position
Navigation - getting from one location to another
Tracking - monitoring the movement of people and things
Mapping - creating maps of the world
Timing - bringing precise timing to the world
-
8/8/2019 Smart Car Final
52/112
SMART CAR SECURITY SYSTEM 52
CHAPTER 6
FACE RECOGNITION
-
8/8/2019 Smart Car Final
53/112
SMART CAR SECURITY SYSTEM 53
6.1 INTRODUCTION
Humans often use faces to recognize individuals and advancements in
computing capability over the past few decades now enable similar recognitions automatically.
E arly face recognition algorithms used simple geometric models, but the recognition process has
now matured into a science of sophisticated mathematical representations and matching
processes. Major advancements and initiatives in the past ten to fifteen years have propelled face
recognition technology into the\ spotlight. Face recognition can be used for both verification and
Identification (open-set and closed-set). There are two predominant approaches to the face
recognition problem: geometric (feature based) and photometric (view based). As reasercher
intrest in face recognition continued, many different algorithms were developed in which
Principle Component Analysis( PCA ) is used here.
6.2 PRINCIPLE COMPONENT ANALYSIS
6.2.1. INTRODUCTION
The Principal Component Analysis (PCA) is one of the most successful
techniques that have been used in image recognition and compression. PCA is a statistical
metho d under the broad title of factor analysis. The purpose of PCA is to reduce the large
dimensionality of the data
space (observed variables) to the smaller intrinsic dimensionality of feature space (independent
variables), which are needed to describe the data economically. This is the case when there is a
strong correlation between observed variables.
The jobs which PCA can do are prediction, redundancy removal, feature
extraction, data compression, etc. Because PCA is a classical technique which can do something
in the linear domain,applications having linear mo dels are suitable, such as signal pro cessing,
image processing, systemand control theory, communications, etc.
-
8/8/2019 Smart Car Final
54/112
SMART CAR SECURITY SYSTEM 54
Fig 6.1 FACE RECOGNITION BLOCK DIAGRAM
-
8/8/2019 Smart Car Final
55/112
SMART CAR SECURITY SYSTEM 55
Face recognition has many applicable areas. Moreover, it can be categorized into face
identification, face classification, or sex determination. The most useful applications contain
crowd surveillance, video content indexing, personal identi cation (ex. drivers licence), mug
shots matching, entrance security, etc. The main idea of using PCA for face recognition is to
express the large 1-D vector of pixels constructed from 2-D facial image into the compact
principal components of the feature space. This can be called eigenspace pro jection. E igenspace
is calculated by identifying the eigenvectors of the covariance matrix derived from a set of facial
images(vectors). The detailsare described in the following section.Section 2 describes
mathematical formulation of PCA. More details about face recognition byPCA are given in
Section 3. Implementation and some results are shown in Section 4. Finally, present critical
reviews in Section 5.
6.2.2. MATHEMATICS OF PCA
A 2-D facial image can be represented as 1-D vector by concatenating
each row (or column) into a long thin vector. Lets suppose we have M vectors of size N (=
rows of image columns of image) representing a set of sampled images. pjs represent the
pixel values.
xi = [p1 . . . pN ]T , i = 1, . . . , M ....(1)
The images are mean centered by subtracting the mean image from each image vector. Let m
represent the mean image.
And let wi be de ned as mean centered image
wi = x i m .... (3)
Our goal is to find a set of eis which have the largest possible projection onto each of the wis.
-
8/8/2019 Smart Car Final
56/112
-
8/8/2019 Smart Car Final
57/112
SMART CAR SECURITY SYSTEM 57
up a nite number of image vectors, M, the rank of the covariance matrix cannot exceed M - 1
(The -1 come from the subtraction of the mean vector m).
The eigenvectors corresponding to nonzero eigenvalues of the covariance
matrix produce an orthonormal basis for the subspace within which most image data can be
represented with a small amount of error. The eigenvectors are sorted from high to low
according to their corresponding eigenvalues. The eigenvector associated with the largest
eigenvalue is one that reflects the greatest variance in the image. That is, the smallest eigenvalue
is associated with the eigenvector that finds the least variance. They decrease in exponential
fashion, meaning that the roughly 90% of the total variance is contained in the first 5% to 10%
of the dimensions.
A facial image can be pro jected onto M ( M ) dimensions by computing
where vi = eT i wi . vi is the ith coor d inat e of the facia l imag e in the new s pac e, which ca me to
be the principal component. The vectors ei are also images, so called, eigenimages, or eigenfaces
in our case, which was rst named by [1]. They can be viewed as images and indeed lo ok like
faces. So, describes the contribution of each eigenface in representing the facial image bytreating the eigenfaces as a basis set for facial images. The simplest method for determining
which face class provides the best description of an input facial image is to nd the face class k
that minimizes the Euclidean distance
where k is a vector describing the kth face class. If k is less than some prede ned threshold ,
a face is classified as belonging to the class k.
-
8/8/2019 Smart Car Final
58/112
SMART CAR SECURITY SYSTEM 58
FIG 6.2 BLOCK DIAGRAM FOR PCA
-
8/8/2019 Smart Car Final
59/112
SMART CAR SECURITY SYSTEM 59
6.2.3. FACE RECOGNITION
Once the eigenfaces have been computed, several types of decision can be made
depending on the application. What we call face recognition is a broad term which may be
further speci ed to one of following tasks:
identi cation wher e the l abel s of ind ivid ua l s must be obtain ed,
r ecognition of a person , wher e it must be de cided if the ind ivid ua l has al r eady bee n seen ,
cat e gorization wher e the face must be assign ed to a certain cl ass .
PCA computes the basis of a space which is represented by its training vectors.
These basis vectors, actually eigenvectors, computed by PCA are in the direction of the largest
variance of the training vectors. As it has been said earlier, we call them eigenfaces. E ach
eigenface can be viewed a feature. When a particular face is pro jected onto the face space, its
vector into the face space describe the importance of each of those features in the face. The face
is expressed in the face space by its eigenface co e cients (or weights). We can handle a large
input vector, facial image, only by taking its small weight vector in the face space. This means
that we can reconstruct the original face with some error, since the dimensionality of the image
space is much larger than that of face space.
In this report, lets consider face identi cation only. E ach face in the training
set is transformed into the face space and its components are stored in memory. The face space
has to be populated with these known faces. An input face is given to the system, and then it is
pro jected onto the face space. The system computes its distance from all the stored faces.
However, two issues should be carefully considered:
1. What if the image presented to the system is not a face?
2. What if the face presented to the system has not already learned, i.e., not stored as a
knownface?
-
8/8/2019 Smart Car Final
60/112
SMART CAR SECURITY SYSTEM 60
The first defect is easily avoided since the first eigenface is a good face filter which
can test whether each image is highly correlated with itself. The images with a low
correlation can be rejected. Or these two issues are altogether addressed by categorizing
following four different regions:
1. Near face space and near stored face = known faces
2. Near face space but not near a known face = unknown faces
3. Distant from face space and near a face class = non-faces
4. Distant from face space and not near a known class = non-faces
Since a face is well represented by the face space, its reconstruction should be similar
to the original, hence the reconstruction error will be small. Non-face images will have a large
reconstruction error which is larger than some threshold r . The distance k determines whether the
input face is near a known face.
6.2.4 IMPLEMENTATION AND RESULTS
It contains ten different imagesof each of 40 distinct subjects. For some subjects, the images
were taken at di erent times,varying the lighting, facial expressions (open/closed eyes,
smiling/not smiling) and facial details (glasses/no glasses). All the images were taken against adark homogeneous background with the subjects in an upright, frontal position (with tolerance
for some side movement). An experiment with a subset of the database, which only contains 12
subjects images, has been performed to ensure how well the eigenface system can identify each
individuals face. There are 5 additional test images, each of which is the known face. I also
appended 2 non-face images to test whether it can detect them correctly.
Figure 3 shows the eigenface images which are originally the eigenvectors ei of the
covariance matrix at E q.6. The first eigenface account for the maximal variation of the trainingvectors. The 10 original training images and their reconstructed versions are depicted in Figure 1
and 2. The result was very successful given the test images in Figure 4. E very test image was
correctly classified.
-
8/8/2019 Smart Car Final
61/112
SMART CAR SECURITY SYSTEM 61
Figure 1: Original Images
Fig 2:Reconstructed Images of training Images- They are almost same as the original images
Fig.3: E igen face: the first eigen face account for the maximal variation of the training vectors
and the second one accounts for the second maximal variation, etc.
Test images: the number corresponds the order of the set of original training images in figure 1r*
means the corrected image
1-th 2-th 3-th 4-th 5-th 6-th 7-th 8-th 9-th 10-th
t1 r1 t3 r3 t6 r6 t8 r8 t9 r9
-
8/8/2019 Smart Car Final
62/112
SMART CAR SECURITY SYSTEM 62
When two unknown faces in Figure 5 are input to the system, the s at E q. 10 are larger
than the prede ned threshold. In the case of two non-face images in Figure 5, the reconstruction
errors were larger than the reconstruction threshold, then they are not considered as face images.
The MATLAB source codes are attached to the appendix in the end of this summary .
some limitations of the algorithm, which I found from the experiments
y The face image should be normalized and frontal-view
y The system is an auto-asso ciative memory (p.153 in [2]). It is harmful to be overfitted.
y Training is very computationally intensive.
y It is hard to decide suitable thresholds - It is kind of Art !
y The suggested methods to deal with unknown faces and non-faces are not good enough to
y differentiate them from known faces
-
8/8/2019 Smart Car Final
63/112
SMART CAR SECURITY SYSTEM 63
CHAPTER 7
SOFTWARES USED
-
8/8/2019 Smart Car Final
64/112
SMART CAR SECURITY SYSTEM 64
7.1 KEIL IDE
Keil Software is the leading vendor for 8/16-bit development tools (ranked at first
position in the 2004 E mbedded Market Study of the E mbedded Systems and EE Times
magazine). Keil Software is represented world-wide in more than 40 countries. Since the market
introduction in 1988, the Keil C51 Compiler is the de facto industry standard and supports more
than 500 current 8051 device variants. Now, Keil Software offers development tools for ARM.
Keil Software makes C compilers, macro assemblers, real-time kernels, debuggers, simulators,
integrated environments, and evaluation boards for the 8051, 251, ARM, and XC16x/C16x/ST10
microcontroller families.
Keil Software is pleased to announce simulation support for the Atmel AT91 ARM family of
microcontrollers. The Keil Vision Debugger simulates the complete ARM instruction-set as
well as the on-chip peripherals for each device in the AT91 ARM/Thumb microcontroller family.
The integrated simulator provides complete peripheral simulation. Other new features in the
Vision Debugger include:
y An integrated Software Logic Analyzer that measures I/O signals as well as program
variables and helps developers create complex signal processing algorithms.
y An E xecution Profiler that measures time spent in each function, source line, and assembler
instruction. Now developers can find exactly where programs spend the most time.
"Using nothing more than the provided simulation support and debug scripts, developers can
create a high-fidelity simulation of their actual target hardware and environment. No extra
hardware or test equipment is required. The Logic Analyzer and E xecution Profiler will help
developers when it comes time to develop and tune signaling algorithms." said Jon Ward,
President of Keil Software USA, Inc.
-
8/8/2019 Smart Car Final
65/112
SMART CAR SECURITY SYSTEM 65
7.1.1 KIEL COMPILER
The Keil C51 C Compiler for the 8051 microcontroller is the most popular 8051 C
compiler in the world. It provides more features than any other 8051 C compiler available today.
The C51 Compiler allows you to write 8051 microcontroller applications in C that, once
compiled, have the efficiency and speed of assembly language. Language extensions in the C51
Compiler give you full access to all resources of the 8051.
The C51 Compiler translates C source files into relocatable object modules which contain full
symbolic information for debugging with the Vision Debugger or an in-circuit emulator. In
addition to the object file, the compiler generates a listing file which may optionally include
symbol table and cross reference
Nine basic data types, including 32-bit I EEE floating-point,
Flexible variable allocation with bit , data , bdata , idata , xdata , and pdata memory types,
Interrupt functions may be written in C,
Full use of the 8051 register banks,
Complete symbol and type information for source-level debugging,
Use of AJMP and ACALL instructions,
Bit-addressable data objects,
Built-in interface for the RTX51 Real-Time Kernel ,
Support for dual data pointers on Atmel, AMD, Cypress, Dallas Semiconductor, Infineon,
Philips, and Triscend microcontrollers,
Support for the Philips 8 xC750, 8 xC751, and 8 xC752 limited instruction sets,
Support for the Infineon 80C517 arithmetic unit.
-
8/8/2019 Smart Car Final
66/112
SMART CAR SECURITY SYSTEM 66
Fig 7.1 KEIL IDE
-
8/8/2019 Smart Car Final
67/112
SMART CAR SECURITY SYSTEM 67
7.2 ORCAD-PCB DESIGN.
The capability to provide fast and universal design entry makes orcad capture
design entry the most widely used schematic entry system in electronic design today. Whether
used to design a new analog circuit, revise a schematic diagram for an existing printed circuit
board (PCB), or design a digital block diagram with an HDL module, orcad capture provides the
tools needed to enter, modify, and verify the PCB design. Orcad Capture CIS integrates the
Orcad Capture schematic design application with the features of a component information
system (CIS).
Fig 7.2 ORCAD DESIGN
7.2.1 ORCAD PCB DESIGN TECHNOLOGIES
-
8/8/2019 Smart Car Final
68/112
SMART CAR SECURITY SYSTEM 68
ORCAD products have a proven track record of innovation in the PCB
personal productivity market. Available as stand-alone tools or in comprehensive suites, they
allow designers to realize products from conception to manufacturing output. E asy to use and
intuitive, they offer exceptional value, and orcad technology provides easy migration to the
platform.
7.2.2ORCAD CAPTURE
ORCAD Capture is a complete solution for design creation, management, and
reuse. Its ease-of-use allows designers to focus their creativity on design development rather than
tool operation. The hierarchical Schematic Page E ditor combines a windows user interface with
functionality and features specifically for design entry tasks and for publishing design data.
Centralized project management provides seamless interchange of schematic
data for circuit simulation, board layout, and signal integrity analysis. A configurable design rule
check (DRC) mechanism helps eliminate costly engineering change orders ( E COs). Basic bill of
materials (BOMs) outputs are created from data schematic data for circuit simulation, board
layout, and signal integrity analysis. A configurable design rule check (DRC) mechanism helps
eliminate costly engineering change orders ( E COs). Basic bill of materials (BOMs) outputs are
created from data contained in the schematic database.
7.2.3ORCAD CAPTURE CIS
ORCAD capture CIS is designed to reduce production delays and cost overruns
through efficient management of components. It reduces the time spent searching existing parts
for reuse, manually entering part information content, and maintaining component data. Users
search parts based on their electrical characteristics and orcad capture CIS automatically
retrieves the associated part. Flexible and scalable, the solution is quickly implemented.
Orcad capture CIS is ideal for individual design teams or multi-site teams who need to
collaborate across multiple locations, orcad capture CIS gives designers access to correct part
data early in the design process and enables complete component specifications to be passed to
-
8/8/2019 Smart Car Final
69/112
SMART CAR SECURITY SYSTEM 69
board designers and other members of the design team, reducing the potential for downstream
errors. It provides access to cost information so designers can use preferred, lower cost, and in
stock parts. The embedded part selector accesses information stored in MRP/ E RP systems and
engineering databases and synchronizes externally sourced data with the schematic design
database, so bills of materials can be automatically generated.
Fig 7.2 ORCAD CAPTURE
7.2.4 EATURES
-
8/8/2019 Smart Car Final
70/112
SMART CAR SECURITY SYSTEM 70
SCHEMATIC EDITOR
The full-featured schematic editor allows users to view and edit multiple schematic
designs in a single session. Design data is easily reused by copying and pasting within or
between schematics. Parts are quickly selected from a comprehensive set of functional part
libraries. Configurable design and electrical rule checkers ensure design integrity. In-line editing
of parts allows pin name and number movement. A user interface has been provided to add
critical constraints for users of the orcad capture to orcad PCB editor flow.
PROJECT MANAGER
The Project Manager simplifies organizing and tracking the various types of data
generated in the design process. An expanding tree diagram makes it easy to structure andnavigate design files, including those generated by pspice simulators, orcad capture CIS, and
other plugins. A Creation Wizard guides users through all the resources available for a specific
design flow. Users can navigate the entire schematic structure and instantly open specific
elements a schematic page, part, or net with the hierarchy browser.
HIERARCHICAL DESIGN AND REUSE
Orcad capture boosts schematic editing efficiency by enabling subcircuit reusewithout having to make multiple copies. Using hierarchical blocks, simply reference the same
subcircuit multiple times. Automatic creation of hierarchical ports eliminates potential design
connection errors. Ports and pins can be updated dynamically for hierarchical blocks and
underlying schematics. Added navigation utilities recognize block boundaries and accessibility
using keyboard shortcuts.
THE LIBRARIES AND PART EDITOR
The library editor is accessed directly from the orcad capture user interface. Users
can create and edit parts in the library or directly from the schematic page without interrupting
workflow. Intuitive graphical controls speed schematic part creation and editing. New parts are
-
8/8/2019 Smart Car Final
71/112
SMART CAR SECURITY SYSTEM 71
created quickly by modifying existing ones. New parts can also be created from spread sheets. A
library part generator automates the integration of field programmable gate arrays (FP G As) and
programmable logic devices (PLDs) into the system schematic. The G enerate Part feature
simplifies the creation of core FP G A library parts for high-pin-count devices. These parts can be
split into multiple parts.
EASY DATA ENTRY
Designers can access all part, net, pin, and title block properties, or any subset, and
make changes quickly through the orcad capture spreadsheet property editor. It simply requires
selecting a circuit element, grouped area, or entire page, and then selecting add/edit/delete part,
net, or pin properties.
BENEFITS
Provides fast, intuitive schematic editing
Boosts schematic editing efficiency by design reuse
Automates the integration of FP G A and PLD devices
Makes changes quickly through a single spreadsheet editor
Imports and exports virtually every commonly used design file format
Reduces delays caused by out-of-stock parts (CIS)
Promotes reuse of preferred components (CIS)
E ncourages reuse of known good part data (CIS)
Makes reuse of duplicate circuitry easy through hierarchical blocks (CIS)
-
8/8/2019 Smart Car Final
72/112
SMART CAR SECURITY SYSTEM 72
7.3 FLASH PROGRAMMER
Straightforward and intuitive user interface
Five simple steps to erasing and programming a device and setting any options desired
Programs Intel Hex Files
Automatic verifying after programming
Fills unused Flash to increase firmware security
Ability to automatically program checksums. Using the supplied checksum calculation
routine your firmware can easily verify the integrity of a Flash block, ensuring no
unauthorized or corrupted code can ever be executed
Program security bits
Check which Flash blocks are blank or in use with the ability to easily erase all blocks in
use
Read the device signature
Read any section of Flash and save as an Intel Hex File
Reprogram the Boot Vector and Status Byte with the help of confirmation features that
prevent accidentally programming incorrect values
Display the contents of Flash in ASCII and Hexadecimal formats
Single-click access to the manual, Flash Magic home page and NXP Microcontrollers
home page
Ability to use high-speed serial communications on devices that support it. Flash Magic
calculates the highest baudrate that both the device and your PC can use and switches to that
baudrate transparently
-
8/8/2019 Smart Car Final
73/112
SMART CAR SECURITY SYSTEM 73
Fig 7.4FLASH PROGRAMMER
Fig 7.5 HEX FILE CONVERSION
-
8/8/2019 Smart Car Final
74/112
SMART CAR SECURITY SYSTEM 74
7.4 EMBEDDED C
The C for microcontrollers and the standard C syntax and semantics are
slightly different. The former is aimed at the general purpose programming paradigm
whereas the latter is for a specific target microcontroller such as 8051 or PIC. The
underlying fact is th