Witura WT-9001 IP65 Specifikace Strana 1

Procházejte online nebo si stáhněte Specifikace pro Bezpečnostní systémy pro řízení přístupu Witura WT-9001 IP65. Witura WT-9001 IP65 Specifications Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 82
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
PSZ 19:16 (Pind. 1/07)
DECLARATION OF THESIS / UNDERGRADUATE PROJECT PAPER AND COPYRIGHT
Author’s full name :
Date of birth :
Title :
Academic Session:
I declare that this thesis is classified as :
I acknowledged that Universiti Teknologi Malaysia reserves the right as follows :
1. The thesis is the property of Universiti Teknologi Malaysia.
2. The Library of Universiti Teknologi Malaysia has the right to make copies for the purpose
of research only.
3. The Library has the right to make copies of the thesis for academic exchange.
Certified by :
SIGNATURE SIGNATURE OF SUPERVISOR
(NEW IC NO. /PASSPORT NO.) NAME OF SUPERVISOR
Date : Date :
NOTES : * If the thesis is CONFIDENTIAL or RESTRICTED, please attach with the letter from
the organisation with period and reasons for confidentiality or restriction.
UNIVERSITI TEKNOLOGI MALAYSIA
CONFIDENTIAL (Contains confidential information under the Official Secret
Act 1972)*
RESTRICTED (Contains restricted information as specified by the
organisation where research was done)*
OPEN ACCESS I agree that my thesis to be published as online open access
(full text)
MOHD RAZIF BIN ABDUL KADIR
23 DECEMBER 1987
871223-01-5757
2010 / 2011
PROFESSOR DR. RUZAIRI BIN HJ. ABDUL RAHIM
06 MAY 2011
06 MAY 2011
Zobrazit stránku 0
1 2 3 4 5 6 ... 81 82

Shrnutí obsahu

Strany 1 - PSZ 19:16 (Pind. 1/07)

PSZ 19:16 (Pind. 1/07) DECLARATION OF THESIS / UNDERGRADUATE PROJECT PAPER AND COPYRIGHT Author’s full name : Date of birt

Strany 2 - 06 MAY 2011

ix 2.2.1.2 Installation WT-9001 IP65 9 2.2.1.3 Operation of Internal Circuit 12 2.2.1.4 Block Diagram Operation 15 2.

Strany 3

x 4.2.2 Users 42 4.2.3 Password 43 4.2.4 Command 44 5 CONCLUSION 45 5.1 Conclus

Strany 4

xi LIST OF FIGURES FIGURE NO. TITLE PAGE 2.1 Comparison Between Two Companies GSM 6 2.2 GSM Remote Control WT-9001

Strany 5

xii 3.7 Voltage Regulator Circuit 28 3.8 Circuit Diagram Max 232 Serial Level Converter 29 3.9 Max 232 Serial Level Converter

Strany 6

xiii LIST OF ABBREVIATIONS PC - Personel Computer SMS - Short Messaging System FKE - Fakulti Kejuruteraan Elektrik GSM - Glo

Strany 7

xiv LIST OF SYMBOLS cm - centimeter RPM - Revolutions Per Minute mN.m - Newton Meter MHz - Mega Hertz

Strany 8

xv LIST OF APPENDICES APPENDIX TITLE PAGE A Programming for “Initializing System” 50 B Programming for “Security Sy

Strany 9

1 CHAPTER 1 INTRODUCTION 1.1 Background The Global System for Mobile Communication (GSM) is the most popular standard for mobil

Strany 10

2 SMS can be used to warn a large number of individual. SMS also can be used to control the some system like a control the flood warning, control the

Strany 11

3 door can unlock the door just by sending an SMS to GSM module. Generally, the design of this system can help a person/supervisor to secure a buildi

Strany 12

i “I hereby declare that I have read this thesis and in my opinion this thesis is sufficient in terms of scope and quality for the award of th

Strany 13

4 CHAPTER 2 LITERATURE REVIEW GSM remote control is a tool that many produced in each country. Like the United States, Japan

Strany 14

5 is the company known for its GSM remote control products. The study was conducted for all companies in the world. Table 2.1 : Company Manufacture

Strany 15

6 Figure 2.1 Comparison Between Two Companies GSM Remote Control 2.2 Description of each company. For this section will discuss the co

Strany 16

7 WT-9001 GSM Controller will send alerts and status directly to your mobile phone and enable you to control simple applications a

Strany 17

8 Figure 2.3 Internal Design WT-9001 IP65 Usually for users who want to use the product WT 9001, they need to understand the connection depends o

Strany 18

9 2.2.1.2 Installation WT-9001 IP65 Figure 2.4 The installation diagram WT-9001 IP65 Before using the product WT-9001, users must comply with c

Strany 19

10 b) External device connection. For power supply connection, users need to connect the screw terminal block M1. Control output for connecting co

Strany 20

11 The table below represents Screw terminal blocks for inputs and Outputs connection: Table 2.2 : Screw terminal blocks for Inputs and Outputs con

Strany 21

12 2.2.1.3 Operation of Internal Circuit. a) Digital Transistor Inputs The ULN2003A is monolithic high-voltage, high-current Darlington tr

Strany 22

13 b) Opto-isolated Input. The use of opto-isolated input is a switch operated. Operate to enable TLP 181, the input must be between t

Strany 23

ii CONTROL DOOR LOCK SYSTEM VIA SMS MOHD RAZIF BIN ABDUL KADIR Submitted to the Faculty of Electrical Engineering in partial fulfillmen

Strany 24

14 only operate at a range of not less than 20V. if the voltage applied to MOSFET operates more than 20V will cause the faulty component. Figure 2

Strany 25

15 2.2.1.4 Block Diagram of Operation WT-9001 IP65 From the discussion that has been done before, a summary of operations for the product WT-9001

Strany 26

16 2.2.1.5 Application of WT-9001 IP65 WT 9001 is a versatile SMS alert device suited for most monitoring needs. it is a device which able to sent

Strany 27

17 2.2.2 Probyte. PROBYTE GSM-control is a real time and interactive GSM-control- and measuring device, which allows user remotely contro

Strany 28

18 2.2.2.1 Company Product The GSM-Relay 2009 is based on previous versions of Probyte GSM-relays. They are used over ten years in tens o

Strany 29

19 the telephone number or by pressing a button on a GSM phone. Usually automatic, a GSM modem can send DTMF-code using a separate PC or on

Strany 30

20 2.2.2.4 Circuit Operation To clearly understand the operation of the circuit in GSM-Relay, the circuit diagram attached at Figure. Re

Strany 31

21 2.2.2.5 Application of GSM-Relay 2009 a) The remote controlled heating and remote controlled GSM-lock. b) The heat control and door management

Strany 32

22 CHAPTER 3 METHODOLOGY In this section discussed how research is done in Chapter 2 can applied in this system to control door lock syst

Strany 33

23 3.1.1 Block Diagram Control Door Lock System Via SMS. Figure 3.1 Block diagram GSM Control Door Lock System 3.1.2 Part of Hardware Pho

Strany 34

iii “I declare that this thesis entitled “ Control Door Lock System Via SMS “ is the result of my own research except as cited in the ref

Strany 35

24 There are several steps that should be taken in making any hardware in these systems. This system must be related to the block di

Strany 36

25 For this project, there are use two adapter converter. The input voltage for the both adapter is 240V analog current and the outlet voltage for th

Strany 37

26 A GSM modem can be a dedicated modem device with a serial, USB or Bluetooth connection, or it can be a mobile phone that pr

Strany 38

27 3.1.2.3 Voltage Regulator A voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. A volta

Strany 39

28 Figure 3.7 Voltage Regulator Circuit 3.1.2.4 Max 232 Serial Level Converter Almost all digital devices which used require either Transistor-

Strany 40

29 compared with the price of designing a new power supply it is very cheap. There are also many variations of these devices. The large values of cap

Strany 41

30 3.1.2.5 Microcontroller ATMega32 There are numerous choices for microcontrollers. In this project, microcontrollers ATMega32 series made

Strany 42

31 Figure 3.10 Circuit Diagram Microcontroller ATMega32 Figure 3.11 Microcontroller ATMega32

Strany 43

32 3.1.2.6 Relay Driver and Electromagnetic Lock Relay Driver ULN2803AG was used to control the output of electromagnetic lock. The ULN

Strany 44

33 Figure 3.12 Circuit Diagram Relay Driver ULN2803AG Figure 3.13 Relay Driver ULN2803AG Figure 3.14 Electromagnetic Lock

Strany 45

iv Dedicated, in thankful appreciation for support, encouragement and understandings to my beloved parents Abdul Kadir Bin Aula and Khad

Strany 46

34 3.2 Software Development The circuit for these system cannot be operated if the system not be included with a program into microcontr

Strany 47

35 Figure 3.15 Flow Chart for Initializing System 3.2.2 Security System To make the system safer and more effective, security system include

Strany 48

36 Figure 3.16 Programming with command SMS Figure 3.17 Flow Chart for Security System #include "app.h" #define MAX_USER 5 uint8

Strany 49

37 3.2.3 GSM System GSM system were included in this system is to ensure that systems runs smoothly. GSM system check every SMS

Strany 50

38 CHAPTER 4 RESULT & DISCUSSION Form the study carried out by the hardware and software systems, this system can be controlled. F

Strany 51

39 4.1.1 Reset System The application reset system is to be used when to start and stop the alarm security. There is one user as an

Strany 52

40 Figure 4.2 Block Diagram Application Lock Door System 4.1.3 Unlock Door System The application for the locked doors can only be

Strany 53

41 4.1.4 Check Status Door The applications to check the status door and electromagnetic lock can be done by everyone. Users can send SMS command

Strany 54

42 4.2.1 Warning Alert In the event of invasion criminal happen when the status door is closed and electromagnetic lock in the ON sta

Strany 55

43 Figure 4.6 Block Diagram Security Users 4.2.3 Password If the admin or registered users send a command to lock or unlock this system but

Strany 56

v ACKNOWLEDGEMENT I would like to take this opportunity to express my deepest gratitude to my project supervisor, Professor Dr. Ruzairi

Strany 57

44 4.2.4 Command If the admin or registered users send the wrong command to reset, lock or unlock this system, the system will not reset and the d

Strany 58 - TRIGGERED!

45 CHAPTER 5 CONCLUSION & RECOMMENDATION 5.1 Conclusion. This project was successful introduced base on the concepts that

Strany 59

46 send to the relay driver to activated the relay control. Once the relay control active, the electromagnetic lock ON to closed the door and vice ve

Strany 60 - COMMAND

47 5.2 Project Problem There are some problems in making the hardware architecture. The main problem encountered is the GSM antenna. GSM

Strany 61

48 There are some recommendations and suggestions that can be apply in order to improve the automatic door lock system via SMS. Among method

Strany 62

49 REFERENCES 1. Mouton, A.J.J. and Smith, G.E., Effective remote control of electric motors using GSM technology; IEEE; 2009, Page(s): 1 - 7

Strany 63

50 APPENDIX A Programming for “Initializing System” #include "app.h" int main(){ SYSTEM_init(); SYSTEM_run(); return 0;

Strany 64

51 APPENDIX B Programming for “Security System” #include "app.h" #define MAX_USER 5 uint8_t admin[12] ="+601477488

Strany 65

52 uint8_t msg5[]="ALARM=IDLE\r\nDOOR=OPEN\r\nLOCK=ON"; uint8_t msg6[]="ALARM=IDLE\r\nDOOR=OPEN\r\nLOCK=OFF"; uint8_t msg7[]=&

Strany 66

53 sec_updateStatus(notify); } } else{ LEDS_toggle(4); _delay_ms(300); } } BOOL isDoorOpen(void){ DOOR_OPEN = READ_BIT(PIN

Strany 67

vi ABSTRACT GSM or better known as Global System Mobile is one of the mobile communications wiring systems. GSM is a second gene

Strany 68

54 if(ALARM){ sec_adminRight(sms); } else{ sec_userRight(sms); } } void sec_updateStatus(uint8_t* hpNum){ //ALARM = TRIGGERED

Strany 69

55 //DOOR = CLOSE else{ //LOCK_ON = TRUE if(LOCK_ON){ GSM_tx(hpNum,msg7,sizeof(msg7)-1); } //LOCK_ON = FALSE

Strany 70

56 } if(!USER_EXIST){ GSM_tx(sms >senderNum,secUnregUser,sizeof(secUnregUser)); return; } if(txtComp(sms->txt,cmd

Strany 71

57 else{ GSM_tx(sms >senderNum,secWrongPass,sizeof(secWrongPass)); return; } } else{ GSM_tx(sms->s

Strany 72

58 APPENDIX C Programming for “GSM System” #include "app.h" uint8_t* tmpTxt; uint8_t tmpTxtLen = 0; /***********************

Strany 73

59 SMS_DEL, }; uint8_t GSM_STATE; uint8_t TX_STATE; uint8_t RX_STATE; uint8_t RX_TXT; /***********************************************************

Strany 74

60 void gsm_txtDel(uint8_t index); /***********************************************************************/ /***************************************

Strany 75

61 break; case TX_ACK: gsm_rxAtAck(data); break; } break; case GSM_RX: switch(RX_STATE){ case

Strany 76

62 else if(data==0x0A && MARKER){ MARKER = FALSE; if(txtComp(rxAtAck,okTxt,2)){ gsm_atResponse(SUCCESS); } else{

Strany 77

63 } GSM_STATE = GSM_RX; GSM_rx(&newSMS); break; } } void gsm_rxTxCounter(uint8_t data){ if(data==0x0A && !

Strany 78

vii ABSTRAK GSM atau lebih dikenali sebagai Global System Mobile adalah salah satu sistem kabel komunikasi telefon. GSM merupakan

Strany 79

64 } void gsm_rxTxt(uint8_t data){ switch(RX_TXT){ case TXT_STATUS: if(data==0x22 && !MARKER){ MARKER = TRUE; rxC

Strany 80

65 if(data==0x0A && !MARKER){ MARKER = TRUE; rxCount = 0; } else if(data==0x0A && MARKER){ MARKER = FALSE; newSMS

Strany 81

66 BOOL txtComp(uint8_t* txt1,uint8_t* txt2,uint8_t len){ for(uint8_t i=0;i<len;i++ ){ if(txt1[i]!=txt2[i]){ return FALSE; } }

Strany 82

viii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION iii DEDICATION iv ACKNOWLEDGEMENT

Komentáře k této Příručce

Žádné komentáře