Professional Documents
Culture Documents
Common REPORT
Common REPORT
Common REPORT
A PROJECT REPORT
Submitted by
GAYATHRI N (620117106017)
KIRUTHIGA B (6201171s06041)
KOKILA S (620117106045)
MAHALAKSHMI V (620117106050)
BACHELOR OF ENGINEERING
in
APRIL-2021
i
ANNA UNIVERSITY: CHENNAI – 600 025
BONAFIDE CERTIFICATE
Certified that the project work entitled ‘‘VEHICLE THEFT DETECTION AND
ENGINE LOCKING SYSTEM USING GSM MODULE WITH IMAGE
ACQUISITION’’ is the bonafide work of “Ms. GAYATHRI N (620117106017), Ms.
KIRUTHIGA B (620117106041), Ms. KOKILA S (620117106045), Ms.
MAHALAKSHMI V (620117106050)” who carried out the project work under my
supervision.
SIGNATURE SIGNATURE
INTERNALEXAMINER EXTERNALEXAMINER
ii
ACKNOWLEDGEMENT
A great deal of time and effort has been spent in completing this
project work. Several people have guided us and contributed significantly to this
effort and so this become obligate to record our thanks to them.
iii
DECLARATION
1)
2)
3)
4)
GAYATHRI N (620117106017)
KIRUTHIGA B (620117106041)
KOKILA S (620117106045)
MAHALAKSHMI V (620117106050)
KRISHNAVENI M,
Assistant Professor,
Department of ECE,
Salem-636003.
iv
ABSTRACT
the location. The main objectives of the entire system is to ameliorate the
safety of the vehicles and truncate the theft at insecure parking places.
Vehicle Tracking and Locking system is installed in the vehicle, to track the
place and locking engine motor. RFID card is read after insert the key.
Camera installed by the vehicle purpose of to take the thief photo in multi
times. When the theft is identified, the responsible person sends location of
the vehicle to stop the engine motor at the same time take thief photo. Police
easily arrested him. Hence we can get back our Vehicle Easily
v
TABLE OF CONTENTS
ABSTRACT v
1. INTRODUCTION 01
2. LITERATURE SURVEY 03
3. EXISTING SYSTEM 06
4. PROPOSED SYSTEM 07
5. BLOCK DIAGRAM 08
6. HARDWARE REQUIREMENT 09
6.1 RASPBERRY PI 10
6.3 GSM 14
6.5 PI CAMERA 18
6.6 BUZZER 21
6.7 TRANSFORMER 24
6.9 LCD 28
7 SOFTWARE REQUIREMENT 39
vi
8 METHODOLOGY 31
10 FUTURE ENHANCEMENT 33
11 CONCLUTION 34
REFERENCES 35
vii
LIST OF FIGURES
6.3.1 GSM 15
6.5.1 PI CAMERA 20
6.6.1 BUZZER 22
6.7.1 TRANSFORMER 24
6.9.1 LCD 28
viii
LIST OF ABBREVIATIONS
International Limited
ix
CHAPTER 1
INTRODUCTION
The vehicle theft is become a major problem that the entire world is facing
now. To stopping this issue, there is a need of theft alert system which helps to owner
who was trying to steal the vehicles. Vehicle Theft is common issue which is
ubiquitous, irrespective of the location. The main objectives of the entire system is to
ameliorate the safety of the vehicles and truncate the theft at insecure parking places.
The theft alert system makes a use of GSM which are embedded in vehicle to
owner’s mobile phone to provide all information about vehicle and vice -versa . The
GPS technology is used here to provide the exact location of target. It means that
whenever any unauthorized person will try to steal our vehicles, then we can easily
detect the location of theft with vehicle by using the application of GSM technology. In
this system perform the two modes, one is theft mode and another one is anti theft
mode. First anti theft mode performed by the owner. we are going to use two keys to
open the vehicle lock, one is the owner’s key which is used by owner and other is RFID
card reading. Whenever RFID Card isn’t used, Theft mode will be start, the alarm
become active and give the beep sound which indicate that the thief is detected. At the
same time a warning SMS is sent by GSM to registered mobile number. After receiving
the message, the vehicle’s owner sent a message to remotely lock the engine, after
1
turning off the engine, the motor cannot start. The camera is installed by the vehicle,
theft mode is ON the camera to take the multiple images save the microcontroller.
Raspberry pi connected to the wifi module the captured image send to the registered
email id. Police easily identify the thief and easily arrested him. In this way, this
2
CHAPTER 2
LITREATURE SURVEY
3
[3].KunalMaurya , Mandeep Singh , Neelu Jain suggested in their work on “Real
Time Vehicle Tracking System using GSM &GPS Technology- An Anti-theft
Tracking System”, International Journal of Electronics and Computer Science
Engineering.
This paper proposed to design a vehicle tracking system that works using GPS
and GSM technology, which would be the cheapest source of vehicle tracking and it
would work as antitheft system. It is an embedded system which is used for tracking
and positioning of any vehicle by using Global Positioning System (GPS) and Global
system for mobile communication (GSM)
[4].Design of a GSM Cell – Phone based Vehicle Monitoring & Theft Security
System
Whenever someone wants to stole vehicle then the system which is feed in
vehicle sends a SMS to the owner of the vehicle if owner did not saw the SMS then
system will call on owners mobile and when owner receives call ,owner will recall the
system and after that system will turn off the ignition of the vehicle The user can send a
STATUS message from his cell phone and as soon as the GSM module gets the
message, it will check for the user’s authentication and if found to be valid, it will
immediately send the details of the locations like the latitude and the longitude using
GPS module. So the user can get to know the exact location of the vehicle. At the same
time message will be sent to a personal computer where user can get the exact location
of vehicle pointed out on the Google maps. These days’ car theft cases are higher than
ever, give your car an excellent protection with the only reliable anti-theft device. Car
central locking system ensures the best guarantee to protect your car from different
kinds of theft cases. It is a car security device that offers excellent protection to your
car. A car with central locking security system helps the user to lock and unlock doors
at the press of a button. Mainly two types of central locking systems are used in Auto
industry - Automatic central locking system and Manual central locking system that
ensures smoother and secured operation. Again this system could not prove to provide
4
complete security and accessibility of the vehicle in case of theft. So a more developed
system makes use of an embedded system based on GSM technology. The designed
&developed system is installed in the vehicle
[6]. Accident Prevention Using Eye Blinking and Head Movement- Chetna Bharti,
SeemaV.Arote, Chetna Bharti
This paper describes a real-time online prototype driver-fatigue monitor. It uses
remotely located charge coupled-device cameras equipped with active infrared
illuminators to acquire video images of the driver. Various visual cues that typically
characterize the level of alertness of a person are extracted in real time and
systematically combined to infer the fatigue level of the driver. The visual cues
employed characterize eyelid movement, gaze movement, head movement, and facial
expression. A probabilistic model is developed to model human fatigue and to predict
fatigue based on the visual cues obtained. The simultaneous use of multiple visual cues
and their systematic combination yields a much more robust and accurate fatigue
characterization than using a single visual cue. This system was validated under real-
life fatigue conditions with human subjects of different ethnic backgrounds, genders,
and ages; with/without glasses; and under different illumination conditions. It was
found to be reasonably robust, reliable, and accurate in fatigue characterization.
5
CHAPTER 3
EXISTING METHOD
Anti vehicle theft system and engine locking system. In existing system to
pressed the secret button in every fifty minutes. Return the vehicle with the help of
message send by GPS. In this method occur the more road accident
In this method occur the more road accident, not applicable for Real life time
It is not secured and more road accident
More security system not installed by this project
Now a days, Increase vehicle theft. In this problem avoid by this project
6
CHAPTER 4
PROPOSED SYSTEM
The theft alert system makes a use of GSM which are embedded in vehicle to
communicate with vehicle’s owner mobile phone. It means that whenever any
unauthorized person will try to steal our vehicles, then we can easily detect the location
of theft with vehicle by using the application of GSM technology. In this system we are
going to use two keys to open the vehicle lock, one is the owner’s key which is used by
owner and other is RFID card reading. Whenever RFID Card isn’t used, the buzzer
become active and give the beep sound which indicate that the thief is detected. At the
same time a warning SMS is sent by GSM to registered mobile number, engine will be
stop. Camera take the photo of the thief to send it register mail id. Thief will be easily
identified. In this way, this system helps in preventing the criminals from stealing
vehicles.
7
CHAPTER 5
8
CHAPTER 6
HARDWARE REQUIREMENTS
Raspberry pi
Arduino uno
GSM
RFID Reader
Pi Camera
Buzzer
Transformer
Regulator 7805
LCD (Liquid Crystal Display)
SOFTWARE REQUIREMENT
Raspbian stretch
Embedded c language
9
6.1RASPBERRY PI 3:
The Raspberry Pi 3 Model B is the third generation Raspberry Pi. This powerful
credit-card sized single board computer can be used for many applications and
supersedes the original Raspberry Pi Model B+ and Raspberry Pi 2 Model B. Whilst
maintaining the popular board format the Raspberry Pi 3 Model B brings you a more
powerful processer, 10x faster than the first generation Raspberry Pi. Additionally it
adds wireless LAN & Bluetooth connectivity making it the ideal solution for powerful
connected designs.
INTRODUCTION:
The Raspberry Pi Compute Module (CM1), Compute Module 3 (CM3) and
Compute Module 3 Lite (CM3L) are DDR2-SODIMM-mechanically-compatible
System on Modules (SoMs) containing processor, memory, eMMC Flash (for CM1 and
CM3) and supporting power circuitry. These modules allow a designer to leverage the
Raspberry Pi hardware and software stack in their own custom systems and form
factors. In addition these module have extra IO interfaces over and above what is
available on the Raspberry Pi model A/B boards opening up more options for the
designer. The CM1 contains a BCM2835 processor (as used on the original Raspberry
Pi and Raspberry Pi B+ models), 512MByte LPDDR2 RAM and 4Gbytes eMMC
Flash. The CM3 contains a BCM2837 processor (as used on the Raspberry Pi 3),
1Gbyte LPDDR2 RAM and 4Gbytes eMMC Flash. Finally the CM3L product is the
same as CM3 except the eMMC Flash is not fitted, and the SD/eMMC interface pins
are available for the user to connect their own SD/eMMC device.
SOFTWARE
ARMv6 (CM1) or ARMv7 (CM3, CM3L) Instruction Set
Mature and stable Linux software stack
o Latest Linux Kernel support
o Many drivers up streamed
o Stable and well supported user land
10
BLOCK DIAGRAM
12
Summary Microcontroller ATmega328
Operating Voltage 5V
Input Voltage (recommended) 7-12V
Input Voltage (limits) 6-20V
Digital I/O Pins 14 (of which 6 provide PWM
output)
Analog Input Pins 6
DC Current per I/O Pin 40 mA
DC Current for 3.3V Pin 50 mA
Flash Memory 32 KB (ATmega328) of which 0.5
KB used by bootloader
SRAM 2 KB (ATmega328)
EEPROM 1 KB (ATmega328)
Clock Speed 16 MHz
POWER:
The Arduino Uno can be powered via the USB connection or with an external
power supply. The power source is selected automatically. External (non-USB) power
can come either from an AC-to-DC adapter (wall-wart) or battery. The adapter can be
connected by plugging a 2.1mm center-positive plug into the board's power jack. Leads
from a battery can be inserted in the Gnd and Vin pin headers of the POWER
connector. The board can operate on an external supply of 6 to 20 volts. If supplied
with less than 7V, however, the 5V pin may supply less than five volts and the board
may be unstable. If using more than 12V, the voltage regulator may overheat and
damage the board. The recommended range is 7 to 12 volts.
The power pins are as follows:
VIN. The input voltage to the Arduino board when it's using an external power
source (as opposed to 5 volts from the USB connection or other regulated power
13
source). You can supply voltage through this pin, or, if supplying voltage via the
power jack, access it through this pin.
5V.This pin outputs a regulated 5V from the regulator on the board. The board
can be supplied with power either from the DC power jack (7 - 12V), the USB
connector (5V), or the VIN pin of the board (7-12V). Supplying voltage via the
5V or 3.3V pins bypasses the regulator, and can damage your board. We don't
advise it.
3.3 volt supply generated by the on-board regulator. Maximum current draw is
50 mA.
GND. Ground pins.
6.3 GSM
The GSM system is the most widely used cellular technology in use in the
world today. It has been a particularly successful cellular phone technology for a
variety of reasons including the ability to roam worldwide with the certainty of being
able to be able to operate on GSM networks in exactly the same way - provided billing
agreements are in place.
The letters GSM originally stood for the words Group Special Mobile, but as
it became clear this cellular technology was being used worldwide the meaning of
GSM was changed to Global System for Mobile Communications. Since this cellular
technology was first deployed in 1991, the use of GSM has grown steadily, and it is
now the most widely cell phone system in the world. GSM reached the 1 billion
subscriber point in February 2004, and is now well over the 3 billion subscriber mark
and still steadily increasing.
The GSM system was designed as a second generation (2G) cellular phone
technology. One of the basic aims was to provide a system that would enable greater
14
capacity to be achieved than the previous first generation analogue systems. GSM
achieved this by using a digital TDMA (time division multiple access approach). By
adopting this technique more users could be accommodated within the available
bandwidth. In addition to this, ciphering of the digitally encoded speech was adopted to
retain privacy. Using the earlier analogue cellular technologies it was possible for
anyone with a scanner receiver to listen to calls and a number of famous personalities
had been "eavesdropped" with embarrassing consequences.
GSM SERVICES
Speech or voice calls are obviously the primary function for the GSM cellular
system. To achieve this the speech is digitally encoded and later decoded using a
vocoder. A variety of vocoders are available for use, being aimed at different scenarios.
15
FURTHER DEVELOPMENTS OF GSM
16
Working
GSM is combination of TDMA (Time Division Multiple
Access), FDMA (Frequency Division Multiple Access) and Frequency hopping.
Initially, GSM use two frequency bands of 25 MHz width : 890 to 915 MHz
frequency band for up-link and 935 to 960 MHz frequency for down-link. Later on,
two 75 MHz band were added. 1710 to 1785 MHz for up-link and 1805 to 1880 MHz
for down-link. up-link is the link from ground station to a satellite and down-link is
the link from a satellite down to one or more ground stations or receivers. GSM
divides the 25 MHz band into 124 channels each having 200 KHz width and
remaining 200 KHz is left unused as a guard band to avoid interference.
6.4 RFID READER:
The RFID Proximity OEM Reader Module has a built-in antenna in minimized
form factor. It is designed to work on the industry standard carrier frequency of 125
kHz. This LF reader module with an internal or an external antenna facilitates
communication with Read-Only transponders—type UNIQUE or TK5530 via the air
interface. The tag data is sent to the host systems via the wired communication
interface with a protocol selected from the module Both TTl and Wiegend Protocal.
The LF module is best suited for applications in Access Control, Time and Attendance,
Asset Management, Handheld Readers, Immobilizers, and other RFID enabled
applications.
Features
17
RFID TAG:
6.5 PI CAMERA
If you’re interested in the nitty-gritty, you’ll want to know that the module has a
five megapixel fixed-focus camera that supports 1080p30, 720p60 and VGA90 video
modes, as well as stills capture. It attaches via a 15cm ribbon cable to the CSI port on
18
the Raspberry Pi. It can be accessed through the MMAL and V4L APIs, and there are
numerous third-party libraries built for it, including the Picamera Python library.
The camera module is very popular in home security applications, and in wildlife
camera traps.You can also use it to take snapshots.
FEATURES
5MP sensor
Wider image, capable of 2592x1944 stills, 1080p30 video
1080p video supported
CSI
Size: 25 x 20 x 9 mm
CAMERA DETAILS
The camera consists of a small (25mm by 20mm by 9mm) circuit board, which
connects to the Raspberry Pi's Camera Serial Interface (CSI) bus connector via a
flexible ribbon cable. The camera's image sensor has a native resolution of five
megapixels and has a fixed focus lens. The software for the camera supports full
resolution still images up to 2592x1944 and video resolutions of 1080p30, 720p60 and
640x480p60/90.
Installation involves connecting the ribbon cable to the CSI connector on the
Raspberry Pi board. This can be a little tricky, but if you watch the videos that
demonstrate how it is done, you shouldn't have any trouble.
When you purchase the camera, you will receive a small camera board and
cable. You'll want to devise some method of supporting the camera in order to use it.
Some camera stands and Raspberry Pi cases are now available. You can also rig up
something simple yourself if you wish. I attached mine to a case using a small piece of
plastic and double-sided tape.
Once the hardware is set up, you can move on to configuring the software.
19
CONNECT TO CAMERA
The flex cable inserts into the connector situated between the Ethernet and
HDMI ports, with the silver connectors facing the HDMI port. The flex cable
connector should be opened by pulling the tabs on the top of the connector
upwards then towards the Ethernet port. The flex cable should be inserted firmly
into the connector, with care taken not to bend the flex at too acute an angle. The
top part of the connector should then be pushed towards the HDMI connector
and down, while the flex cable is held in place.
Update the SD card
In order to use the camera you must be using a recent operating system that
knows that the camera exists. The easiest way to do this is to grab the latest
Raspbian image from the RaspberryPi.org site and create a fresh SD card.
Reboot. If you are using a fresh image the raspi-config utility should load. If it
doesn’t then you can run it manually using: sudoraspi-configSekect the
“Camera” option and press “Enter”.
GENERAL DESCRIPTION:
A buzzer or beeper is an audio signaling device, which may be mechanical,
electromechanical, or piezoelectric. Typical uses of buzzers and beepers include
alarm devices, timers and confirmation of user input such as a mouse click or
keystroke.
Buzzer is an integrated structure of electronic transducers, DC power supply,
widely used in computers, printers, copiers, alarms, electronic toys, automotive
electronic equipment, telephones, timers and other electronic products for sound
devices. Active buzzer 5V Rated power can be directly connected to a
continuous sound, this section dedicated sensor expansion module and the board
in combination, can complete a simple circuit design, to "plug and play."
Now, micro computers are widely used for microwave ovens, air conditioners,
cars, toys, timers, and other alarm equipment. Externally driven piezoelectric
sounders are used in digital watches, electronic calculators, telephones and other
equipment. They are driven by a signal (ex, 2048Hz or 4096Hz) from an LSI and
provide melodious sound.
FEATURES
Telephone ringers.
Various office equipment such as PPCs, printers and keyboards.
Various home appliances such as microwave ovens.
Confirmation sound of various audio equipment.
SPECIFICATIONS:
On-board passive buzzer
21
On-board 8550 triode drive
Working voltage: 5V
All relays come with a voltage rating. This is called on a relay's datasheet its
rated coil voltage. This is the voltage needed in order for the relay to be able to operate
and be able to open or close its switch in a circuit. In order for a relay to function, it
must receive this voltage at its coil terminals. Thus, if a relay has a rated voltage of
9VDC, it must receive 9 volts of DC voltage to operate. So the most important thing a
DC relay needs is its rated DC voltage. If you don't know this, look up what relay you
have and look up its datasheet and check for
Components Needed
DC Relay
DC Voltage Source
Again, the DC relay must receive its rated voltage value in order to operate. The
DC power source can be either batteries, wall wart power, or a DC power supply- any
DC power source. The zener diode is placed reverse biased in parallel to the relay.
22
DC Relay Driver Circuit Schematic
The relay which we use in this case is rated for 9V. Therefore, a 9-volt DC
voltage source feeds the resistor. To suppress transients that may be caused by the relay
opening and closing, we place a zener diode reverse biased in parallel with the relay.
This will shunt all excess power to ground once it reaches a certain threshold. This is
all that is needed to operate the relay. With sufficient power, the relay will now closed,
driving the loads that are connected to its output.
23
6.7 TRANSFORMER
A transformer is a static device that transfers electrical energy from one circuit to
another through inductively coupled conductors—the transformer's coils. A varying
current in the first or primary winding creates a varying magnetic flux in the
transformer's core and thus a varying magnetic field through the secondary winding.
This varying magnetic field induces a varying electromotive force (EMF) or "voltage"
in the secondary winding. This effect is called mutual induction
This is a very useful device, indeed. With it, we can easily multiply or divide
voltage and current in AC circuits. Indeed, the transformer has made long-distance
transmission of electric power a practical reality, as AC voltage can be “stepped up”
and current “stepped down” for reduced wire resistance power losses along power lines
connecting generating stations with loads. At either end (both the generator and at the
loads), voltage levels are reduced by transformers for safer operation and less
expensive equipment. A transformer that increases voltage from primary to secondary
(more secondary winding turns than primary winding turns) is called a step-up
transformer. Conversely, a transformer designed to do just the opposite is called a step-
down transformer.
25
APPLICATIONS
Current transformers are used for protection, measurement and control in high-
voltage electrical substations and the electrical grid. Current transformers may be
installed inside switchgear or in apparatus bushings, but very often free-standing
outdoor current transformers are used. In a switchyard, live tank current transformers
have a substantial part of their enclosure energized at the line voltage and must be
mounted on insulators. Dead tank current transformers isolate the measured circuit
from the enclosure. Live tank CTs are useful because the primary conductor is short,
which gives better stability and a higher short-circuit current rating. The primary of the
winding can be evenly distributed around the magnetic core, which gives better
performance for overloads and transients. Since the major insulation of a live-tank
current transformer is not exposed to the heat of the primary conductors, insulation life
and thermal stability is improved.
All voltage sources cannot able to give fixed output due to fluctuations in the
circuit. For getting constant and steady output, the voltage regulators are implemented.
The integrated circuits which are used for the regulation of voltage are termed as
voltage regulator ICs. Here, we can discuss about IC 7805.The voltage regulator IC
7805 is actually a member of 78xx series of voltage regulator ICs. It is a fixed linear
voltage regulator. The xx present in 78xx represents the value of the fixed output
voltage that the particular IC provides. For 7805 IC, it is +5V DC regulated power
26
supply. This regulator IC also adds a provision for a heat sink. The input voltage to this
voltage regulator can be up to 35V, and this IC can give a constant 5V for any value of
input less than or equal to 35V which is the threshold limit.
7805 IC Rating
The voltage regulator 7805 and the other components are arranged in the circuit as
shown in figure.
27
The purposes of coupling the components to the IC7805 are explained below.
C1- It is the bypass capacitor, used to bypass very small extent spikes to the earth. C 2
and C3- They are the filter capacitors. C2 is used to make the slow changes in the input
voltage given to the circuit to the steady form. C3 is used to make the slow changes in
the output voltage from the regulator in the circuit to the steady form. When the value
of these capacitors increases, stabilization is enlarged. But these capacitors single-
handedly are unable to filter the very minute changes in the input and output voltages.
Applications of Voltage Regulator 7805 IC
Current regulator
Regulated dual supply
Building circuits for Phone charger, UPS power supply circuits, portable CD
player etc
Fixed output regulator
Adjustable output regulator etc.
SOFTWARE REQUIREMENT
EMBEDDED C:
Embedded C is one of the most popular and most commonly used Programming
Languages in the development of Embedded Systems. So, in this article, we will see
some of the Basics of Embedded C Program and the Programming Structure of
Embedded C.
EMBEDDED SYSTEM:
An Embedded System can be best described as a system which has both the
hardware and software and is designed to do a specific task. A good example for an
Embedded System, which many households have, is a Washing Machine.
Embedded Systems can not only be stand-alone devices like Washing Machines
but also be a part of a much larger system. An example for this is a Car. A modern day
Car has several individual embedded systems that perform their specific tasks with the
aim of making a smooth and safe. Some of the embedded systems in a Car are Anti-
29
lock Braking System (ABS), Temperature Monitoring System, Automatic Climate
Control, Type Pressure Monitoring System, Engine Oil Level Monitor, etc.
30
CHAPTER 8
METHODOLOGY
The theft alert system makes a use of GSM which are embedded in vehicle to
communicate with vehicle’s owner mobile phone.
It means that whenever any unauthorized person will try to steal our vehicles,
then we can easily detect the location of theft with vehicle by using the
application of GSM technology.
In this system we are going to use two keys to open the vehicle lock, one is the
owner’s key which is used by owner and other is RFID card reading.
Whenever RFID Card isn’t used, the buzzer become active and give the beep
sound which indicate that the thief is detected.
At the same time a warning SMS is sent by GSM to registered mobile number,
engine will be stop.
Camera take the photo of the thief to send it register mail id.
Thief will be easily identified. In this way, this system helps in preventing the
criminals from stealing vehicles.
31
CIRCUIT DIAGRAM
32
CHAPTER 9
FUTURE ENHANCEMENT
With the help of high sensitivity vibration sensors we can detect accident.
Whenever the vehicle met with an accident unexpectedly, with the help of vibration
sensors we can detect the accident and we can send the location to the owner, hospital
and police. We can use EEPROM to store the previous navigation positions up to 256
33
CHAPTER 10
CONCLUSION
RFID card authentication. Every RFID card differs from the vehicle. So there is no
chance of hacking. A real time vehicle tracking system via google map is presented.
The mode switching is done for authorization, GSM messaging for alerting the owner
and send the location of the vehicle. The hidden camera fixed the vehicle. The camera
rotated the 1800. In the period of vehicle theft, multiple times of photo captured by the
device. Captured image to store the micro controller. Police easily identify the thief and
arrested him. Prevention and detection vehicle theft and theft identified easily
34
REFERENCE
[2]. Abid k. and Ravi M, “GPS – GSM Based Tracking System”International Journal of
Engineering Trends and Technology,Volume3, Issue 2- 2012
[3].Baburao K., et al, “GSM and GPS Based Vehicle Location And Tracking
System”International Journal of Engineering Research and Applications (IJERA) Vol.
1, Issue 3, pp.616-625
[5].Pravada P. W. and Dahad S. O, “Real Time Vehicle Locking and Tracking System
using GSM and GPS Technology-An Anti-theft System” International Journal of
Technology And Engineering System(IJTES): Vol.2.No.3, Jan –March 2011
[6].Madhuri U. et al., “Remote Vehicle Tracking & Driver Health Monitoring System
Using GSM Modem & Google Maps”, International Journal of Computer Science and
Information Technologies, Vol. 5 (3) , pp. 2828-2832,2014.
[8].KunalMaurya , Mandeep Singh , Neelu Jain, "Real Time Vehicle Tracking System
using GSM and GPS Technology- An Anti-theftTracking System", International
Journal of Electronics and Computer Science Engineering ,1103
35
[9].R.Ramani, S.Valarmathy , Dr. N.SuthanthiraVanitha, S.Selvaraju, M.Thiruppathi,
R.Thangam, “Vehicle Tracking and Locking System Based on GSM and GPS” , I.J.
Intelligent Systems and Applications, 2013, 09, 86-93
[11].Sachin B. Ade, Y. D. Kapse, “GPS Based Tracking and Monitoring of Vehicle [5]
Using ARM”, International Journal of Science and Research (IJSR) ISSN (Online):
2319-7064.
[14].Chen, H., Chiang, Y. Chang, F., H. Wang, H. (2010). Toward Real-Time Precise
Point Positioning: Differential GPS Based on IGS Ultra Rapid Product,SICE Annual
Conference, The Grand Hotel, Taipei, Taiwan August 18-21.
36
[16].Muruganandham and Mukesh P.R., “Real Time Web based Vehicle Tracking
using GPS” World Academy of Science, Engineering and Technology pp.91-99,
2010Modi N. D., “Vehicle tracking system with GPS GSM Interface and Self-Created
Map” International Journal of Application or Innovation in Engineering &
Management (IJAIEM) Volume 3, Issue 4, April 2014
[17].Pethakar S.S. et al., “GPS and GSM based Vehicle Tracing and Employee
Security System” International Journal of Computer Applications (0975 – 8887)
Volume 62– No.6, January 2013
37
Volume 10, Issue 3, March 2021
38
Anti Vehicle Theft and Engine Locking
System with Image Acquisition
Krishnaveni M 1 , Gayathri N 2 , Kiruthiga B 3 , Kokila S 4 , Mahalakshmi
V5
Assistant Professor, Department of Electronics and Communication
1
Engineering, AVS Engineering College, Salem, Tamil Nadu, India
UG Scholars, Department of Electronics and Communication Engineering,
AVS Engineering College, Salem, Tamil Nadu, India2,3,4,5
I. INTRODUCTION
The vehicle theft is become a major problem that the entire world is facing now.
To stopping this issue, there is a need of theft alert system which helps to owner to
ensure theft prevention and provide speedy ide ntification of an unauthorized
person who was trying to steal the vehicles. The theft alert system makes a use
of GPS and GSM which are embedded in vehicle to communicate with vehicle’s
owner mobile phone.
In existing system to pressed the secret button in every fifty minutes. In this method
occur the more road accident, not applicable for Real life time
In our proposed system we are design to read the RFID card after unlocking the
vehicle. In this process to avoid the road accident. Does not read the RFID card
the microcontroller take photo of the thief.Police is easily identify the thief and
arrested him. After few seconds the vehicle will be Stop. GPS send the Location of
the vehicle inn owner mobile number. Suddenly Buzzer will be ON.
The system uses RFID Card, Key, GPS Module, GSM Module, Buzzer, Camera,
LCD display.
A .PIC CONTROLLER
PIC is a family of modified Harvard architecture microcontrollers made by
Microchip Technology, derived from the PIC1650 originally developed by
General Instrument's Microelectronics Division. The name PIC initially referred
to "Peripheral Interface Controller" now it is "PIC"only.PICs are popular with
both industrial developers and hobbyists alike due to their low cost, wide
availability, large user base, extensive collection of application notes, availability
of low cost or free development tools, and serial programming (and re-programming
with flash memory) capability
B. POWER SUPPLY
A power supply also known as PSU which supplies electrical or other types of
energy to an output load
ofgroupofloads.Itiscommonlyappliedtoelectricalenergysupplies.AC voltage runs
in a range of230Vrms and connected to a transformer which helps in stepping
down a voltage level.
C. GPS MODULE
Global Positioning System (GPS) is a navigational phenomenon by assemblage
of satellites such that it sends signal and makes GPS receiver to find the exact
location of an object. The Google map is a web -application based GPS receiver
used in implementation of this function. GPS receiver is accessed for the
location information or data. The GPS receiver identify, decode and process the
signal received from satellites.
GPS MODULE
E.GSM MODULE
This is a dual band GSM module that works on frequencies of 900/1800 hz . It
can be used to communicate with the controller using AT commands. The
module comes with RS 232 interface which allows connection with PC and
microcontroller. This module could be used for sending messages, deleting messages,
make calls, etc. Some of the AT commands are mentioned below.
GSM MODULE
F.BUZZER
Buzzer is used in this system for providing a sharp alarm on theft
detection. It may be mechanical, electro mechanical, or piezoelectric device
having an acoustic signal.
BUZZER
G.RASPBERRY PI 3
Quad Core 1.2GHz Broadcom BCM2837 64bit CPU.1GB RAM.BCM43438
wireless LAN and Bluetooth Low Energy (BLE) on board. 100 BaseEthernet.40-
pin extended GPIO.4 USB 2 ports.4 Pole stereo output and composite video
port. Full size HDMI
H.CAMERA
CAMERA
CONCLUS ION
We are design to read the RFID card after unlocking the vehicle. In this
process to avoid the road accident . Does not read the RFID card the microcontroller
take photo of the thief . Police is easily identify the thief and arrested him. After
few seconds the vehicle will be Stop. GPS send the Location of the vehicle inn
owner mobile number. Suddenly Buzzer will be ON.
A real time vehicle tracking system via google maps is presented. The mode
switching is done for authorization, GSM messaging for alerting the owner and GPS
for tracking the vehicle. This is the conclusion of the project.
REFERENCES