Common REPORT

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 64

VEHICLE THEFT DETECTION AND

ENGINE LOCKING SYSTEM USING


GSM MODULE WITH IMAGE
ACQUISITION

A PROJECT REPORT
Submitted by

GAYATHRI N (620117106017)
KIRUTHIGA B (6201171s06041)
KOKILA S (620117106045)
MAHALAKSHMI V (620117106050)

In partial fulfillment for the award of the degree of

BACHELOR OF ENGINEERING

in

ELECTRONICS AND COMMUNICATION ENGINEERING

AVS ENGINEERING COLLEGE, SALEM – 636 003

ANNA UNIVERSITY: CHENNAI – 600 025

APRIL-2021

i
ANNA UNIVERSITY: CHENNAI – 600 025

BONAFIDE CERTIFICATE

Certified that the project work entitled ‘‘VEHICLE THEFT DETECTION AND
ENGINE LOCKING SYSTEM USING GSM MODULE WITH IMAGE
ACQUISITION’’ is the bonafide work of “Ms. GAYATHRI N (620117106017), Ms.
KIRUTHIGA B (620117106041), Ms. KOKILA S (620117106045), Ms.
MAHALAKSHMI V (620117106050)” who carried out the project work under my
supervision.

SIGNATURE SIGNATURE

HEAD OFTHEDEPARTMENT SUPERVISOR

Prof. RAMYA R S, M.E., Prof. KRISHNAVENI M, M.E.,

ASSOCIATE PROFESSOR ASSISTANT PROFESSOR,


Department of ECE, Department of ECE,
AVS Engineering College, AVS Engineering College,
Salem- 636003. Salem- 636003.

Submitted for Project Viva -Voice Examination held on_______________

INTERNALEXAMINER EXTERNALEXAMINER

ii
ACKNOWLEDGEMENT

A great deal of time and effort has been spent in completing this
project work. Several people have guided us and contributed significantly to this
effort and so this become obligate to record our thanks to them.

We express our profound gratitude to our honorable Chairman, Shri.


K.KAILASAM, Secretary, Mr. K.RAJAVINAYAKAM, MBA., and also to
our Correspondent, Mr. K.SENTHILKUMAR, B.Tech., for providing all
necessary facilities for the successful completion of the project.

We have immense pleasure in expressing our gratitude to our beloved


Principal, Dr. A.SRINIVASAN, M.E, Ph.D., for allowing us to have extensive
use of our college facilities to do this project.

We have immense pleasure in expressing our gratefulness to our


beloved Vice Principal, Dr. R.VISWANATHAN, M.E, Ph.D., for allowing us
to have extensive use of our college facilities to do this project.

We express our heartiest gratitude to Head of the Department Prof.


R S. RAMYA, M.E., for her guidance and encouragement.

We express our sincere and heartiest gratitude to class advisor,


Prof. S. SIVACHANDRAN M.E., for his constant support and excellent
guidance in all aspects.

We indebted to our project coordinator and our guide, Prof. M.


KRISHNAVENI, M.E., for her constant help and excellent creative ideas over
the period of project work.

I specially thank for all our Teaching and Non-Teaching Staff


Members and Lab Technicians of the Department of Electronics and
Communication Engineering for their encouragement to do the project work
with full interest and enthusiasm. We pay our profound gratitude to the
Almighty God for his invisible vigilance and would like to thank our Parents
forgiving us support and encouragement.

iii
DECLARATION

We affirm that the Project Phase-I entitled “VEHICLE THEFT


DETECTION AND ENGINE LOCKING SYSTEM USING GSM
MODULE WITH IMAGE ACQUISITION” being submitted in partial
fulfillment for the award of BACHELOR OF ENGINEERING is the original
work carried out by me. It has not formed the part of any other Project Phase-I
submitted for the award of any degree or diploma, either in this or any other
university.

1)

2)

3)

4)

Signature of the Candidate,

GAYATHRI N (620117106017)

KIRUTHIGA B (620117106041)

KOKILA S (620117106045)

MAHALAKSHMI V (620117106050)

I certify that the declaration made above by the candidate is true.

Signature of the Guide,

KRISHNAVENI M,

Assistant Professor,

Department of ECE,

AVS Engineering College,

Salem-636003.

iv
ABSTRACT

Vehicle Theft is common issue which is ubiquitous, irrespective of

the location. The main objectives of the entire system is to ameliorate the

safety of the vehicles and truncate the theft at insecure parking places.

Vehicle Tracking and Locking system is installed in the vehicle, to track the

place and locking engine motor. RFID card is read after insert the key.

Camera installed by the vehicle purpose of to take the thief photo in multi

times. When the theft is identified, the responsible person sends location of

the vehicle to stop the engine motor at the same time take thief photo. Police

easily arrested him. Hence we can get back our Vehicle Easily

v
TABLE OF CONTENTS

CHAPTER NO TITLE PAGE NO

ABSTRACT v

1. INTRODUCTION 01

2. LITERATURE SURVEY 03

3. EXISTING SYSTEM 06

4. PROPOSED SYSTEM 07

5. BLOCK DIAGRAM 08

6. HARDWARE REQUIREMENT 09

6.1 RASPBERRY PI 10

6.2 ARDUINO UNO 11

6.3 GSM 14

6.4 RFID READER 17

6.5 PI CAMERA 18

6.6 BUZZER 21

6.7 TRANSFORMER 24

6.8 REGULATOR 7805 26

6.9 LCD 28

7 SOFTWARE REQUIREMENT 39

vi
8 METHODOLOGY 31

10 FUTURE ENHANCEMENT 33

11 CONCLUTION 34

REFERENCES 35

vii
LIST OF FIGURES

FIGURE NO DESCRIPTION PAGE NO

5.1.1 EXISTING METHOD BLOCK DIAGRAM 06

5.1.2 PROPOSED SYSTEM BLOCK DIAGRAM 08

6.1.1 BLOCK DIAGRAM 11

6.2. 1 ARDUINO UNO 12

6.3.1 GSM 15

6.3.2 GSM MODULE BLOCK DIAGRAM 16

6.4.1 RFID CARD READER 18

6.5.1 PI CAMERA 20

6.6.1 BUZZER 22

6.6.2 DC RELAY DRIVER CIRCUIT SCHEMATIC 23

6.6.3 DC RELAY DRIVER CIRCUIT 23

6.7.1 TRANSFORMER 24

6.7.2 POTENTIAL TRANSFORMER 25

6.8.1 REGULATOR 7805 27

6.9.1 LCD 28

viii
LIST OF ABBREVIATIONS

RFID Radio Frequency Identification

GPS Global Positioning System

ARM Advanced RISC Machine

BCM Broadcom Chip

LPDDR2 Low Power Double Data Rate

eMMC Embedded Multimedia Card

DDR2SODIMM Double Data Rate 2 Small Outline

Dual Inline Memory Module

FTDI Future Technology Devices

International Limited

USB Universal Serial Bus

ICSP In Circuit Serial Programming

FDMA Frequency Division Multiple Access

TDMA Time Division Multiple Access

GSM Global System For Mobile Communication

GPRS General Packet Radio Service

TTI Technology Transfer Institude

OEM Original Equipment Manufacturer

MMAL Multi Media Abstraction Layer

HDMI High Definition Multimedia Interface

ix
CHAPTER 1

INTRODUCTION

The vehicle theft is become a major problem that the entire world is facing

now. To stopping this issue, there is a need of theft alert system which helps to owner

to ensure theft prevention and provide speedy identification of an unauthorized person

who was trying to steal the vehicles. Vehicle Theft is common issue which is

ubiquitous, irrespective of the location. The main objectives of the entire system is to

ameliorate the safety of the vehicles and truncate the theft at insecure parking places.

The theft alert system makes a use of GSM which are embedded in vehicle to

communicate with vehicle’s owner mobile phone. Sending of an SMS by GSM to

owner’s mobile phone to provide all information about vehicle and vice -versa . The

GPS technology is used here to provide the exact location of target. It means that

whenever any unauthorized person will try to steal our vehicles, then we can easily

detect the location of theft with vehicle by using the application of GSM technology. In

this system perform the two modes, one is theft mode and another one is anti theft

mode. First anti theft mode performed by the owner. we are going to use two keys to

open the vehicle lock, one is the owner’s key which is used by owner and other is RFID

card reading. Whenever RFID Card isn’t used, Theft mode will be start, the alarm

become active and give the beep sound which indicate that the thief is detected. At the

same time a warning SMS is sent by GSM to registered mobile number. After receiving

the message, the vehicle’s owner sent a message to remotely lock the engine, after
1
turning off the engine, the motor cannot start. The camera is installed by the vehicle,

theft mode is ON the camera to take the multiple images save the microcontroller.

Raspberry pi connected to the wifi module the captured image send to the registered

email id. Police easily identify the thief and easily arrested him. In this way, this

system helps in preventing the criminals from stealing vehicles.

2
CHAPTER 2

LITREATURE SURVEY

A Literature survey is done to know the existing techniques their significance


and limitations. It also includes various proposed technique and their advantages.

[1].ChampaBhagavathi.R, Gowri.B.R, Kasturi.R, Pooja.C suggested in their work


on “Vehicle Theft Detection andPrevention Using GSM & GPS”, International
Journal Innovative Research in Computer and Communication Engineering
The Proposed System consists of Remote ignition cut-off and Vehicle tracking
modules. Both of them make use of GSM sub module. Vehicle tracking module further
makes use of GPS sub module and Remote ignition cut-off module uses password
authentication sub module. User enters the correct password to start the vehicle. If
incorrect password is entered three times, an auto-generated message is sent to owner
and a buzzer activates alerting the nearby personnel. GSM modem is used to send OTP
to owner. The owner is also notified if his vehicle is started. The owner can respond
with an SMS. The ignition of the vehicle will be disabled whenever $OFF message is
sent. GPS technology is used to track the vehicle. Location co-ordinates of the vehicle
are sent to owner whenever $LOC message is sent.
[2].MaheshwariV.Chandravar,Shital Y. Gaikwad suggested in their work on
“Anti-Theft Security System Using GSM,GPS &RFID Technology based on
ARM7”,Interrnational Journal of Engineering Research &Technology
The vehicle is provided with the RFID reader. The vehicle is developed by
using two Direct current motor which would be connected to the microcontroller using
Motor Driver integrated circuit for increasing the current. The Door assembly is
developed using DC motor which would be controlled using relay. When the theft is
there, the door will lock automatically. When unauthorized people want to open the
door of car then he/she is unable to open without RFID tag.

3
[3].KunalMaurya , Mandeep Singh , Neelu Jain suggested in their work on “Real
Time Vehicle Tracking System using GSM &GPS Technology- An Anti-theft
Tracking System”, International Journal of Electronics and Computer Science
Engineering.
This paper proposed to design a vehicle tracking system that works using GPS
and GSM technology, which would be the cheapest source of vehicle tracking and it
would work as antitheft system. It is an embedded system which is used for tracking
and positioning of any vehicle by using Global Positioning System (GPS) and Global
system for mobile communication (GSM)

[4].Design of a GSM Cell – Phone based Vehicle Monitoring & Theft Security
System

Whenever someone wants to stole vehicle then the system which is feed in
vehicle sends a SMS to the owner of the vehicle if owner did not saw the SMS then
system will call on owners mobile and when owner receives call ,owner will recall the
system and after that system will turn off the ignition of the vehicle The user can send a
STATUS message from his cell phone and as soon as the GSM module gets the
message, it will check for the user’s authentication and if found to be valid, it will
immediately send the details of the locations like the latitude and the longitude using
GPS module. So the user can get to know the exact location of the vehicle. At the same
time message will be sent to a personal computer where user can get the exact location
of vehicle pointed out on the Google maps. These days’ car theft cases are higher than
ever, give your car an excellent protection with the only reliable anti-theft device. Car
central locking system ensures the best guarantee to protect your car from different
kinds of theft cases. It is a car security device that offers excellent protection to your
car. A car with central locking security system helps the user to lock and unlock doors
at the press of a button. Mainly two types of central locking systems are used in Auto
industry - Automatic central locking system and Manual central locking system that
ensures smoother and secured operation. Again this system could not prove to provide
4
complete security and accessibility of the vehicle in case of theft. So a more developed
system makes use of an embedded system based on GSM technology. The designed
&developed system is installed in the vehicle

[5].Prof.R.M.Sahu ,SonaliLole suggested in their work on “Vehicle Theft Alert &


Engine Lock System Using ARM7

In a vehicle tracking system there is an electronic device, installed in a vehicle


to enable the owner or a third party to track the vehicle's place. This paper proposed to
design a vehicle tracking system that works using GPS and GSM technology. This
system built based on embedded system, used for tracking and positioning of any
vehicle by using Global Positioning System (GPS) and Global system for mobile
communication (GSM). This design will continuously watch a moving Vehicle and
report the status of the Vehicle on demand and lock the vehicle when requested.

[6]. Accident Prevention Using Eye Blinking and Head Movement- Chetna Bharti,
SeemaV.Arote, Chetna Bharti
This paper describes a real-time online prototype driver-fatigue monitor. It uses
remotely located charge coupled-device cameras equipped with active infrared
illuminators to acquire video images of the driver. Various visual cues that typically
characterize the level of alertness of a person are extracted in real time and
systematically combined to infer the fatigue level of the driver. The visual cues
employed characterize eyelid movement, gaze movement, head movement, and facial
expression. A probabilistic model is developed to model human fatigue and to predict
fatigue based on the visual cues obtained. The simultaneous use of multiple visual cues
and their systematic combination yields a much more robust and accurate fatigue
characterization than using a single visual cue. This system was validated under real-
life fatigue conditions with human subjects of different ethnic backgrounds, genders,
and ages; with/without glasses; and under different illumination conditions. It was
found to be reasonably robust, reliable, and accurate in fatigue characterization.

5
CHAPTER 3

EXISTING METHOD

Anti vehicle theft system and engine locking system. In existing system to
pressed the secret button in every fifty minutes. Return the vehicle with the help of
message send by GPS. In this method occur the more road accident

Figure 5.1.1: Existing method block diagram

Limitations of Existing system

 In this method occur the more road accident, not applicable for Real life time
 It is not secured and more road accident
 More security system not installed by this project
 Now a days, Increase vehicle theft. In this problem avoid by this project

6
CHAPTER 4

PROPOSED SYSTEM

The theft alert system makes a use of GSM which are embedded in vehicle to
communicate with vehicle’s owner mobile phone. It means that whenever any
unauthorized person will try to steal our vehicles, then we can easily detect the location
of theft with vehicle by using the application of GSM technology. In this system we are
going to use two keys to open the vehicle lock, one is the owner’s key which is used by
owner and other is RFID card reading. Whenever RFID Card isn’t used, the buzzer
become active and give the beep sound which indicate that the thief is detected. At the
same time a warning SMS is sent by GSM to registered mobile number, engine will be
stop. Camera take the photo of the thief to send it register mail id. Thief will be easily
identified. In this way, this system helps in preventing the criminals from stealing
vehicles.

Advantage of proposed system

 Easily Detect the Vehicle theft


 It is safe and secure.
 To avoid the road accident
 Using more securable devices
 It is easy to access

7
CHAPTER 5

PROPOSED SYSTEM BLOCK DIAGRAM

Figure 5.1.2: Proposed System Block Diagram

8
CHAPTER 6

HARDWARE REQUIREMENTS

 Raspberry pi
 Arduino uno
 GSM
 RFID Reader
 Pi Camera
 Buzzer
 Transformer
 Regulator 7805
 LCD (Liquid Crystal Display)

SOFTWARE REQUIREMENT

 Raspbian stretch
 Embedded c language

9
6.1RASPBERRY PI 3:

The Raspberry Pi 3 Model B is the third generation Raspberry Pi. This powerful
credit-card sized single board computer can be used for many applications and
supersedes the original Raspberry Pi Model B+ and Raspberry Pi 2 Model B. Whilst
maintaining the popular board format the Raspberry Pi 3 Model B brings you a more
powerful processer, 10x faster than the first generation Raspberry Pi. Additionally it
adds wireless LAN & Bluetooth connectivity making it the ideal solution for powerful
connected designs.

INTRODUCTION:
The Raspberry Pi Compute Module (CM1), Compute Module 3 (CM3) and
Compute Module 3 Lite (CM3L) are DDR2-SODIMM-mechanically-compatible
System on Modules (SoMs) containing processor, memory, eMMC Flash (for CM1 and
CM3) and supporting power circuitry. These modules allow a designer to leverage the
Raspberry Pi hardware and software stack in their own custom systems and form
factors. In addition these module have extra IO interfaces over and above what is
available on the Raspberry Pi model A/B boards opening up more options for the
designer. The CM1 contains a BCM2835 processor (as used on the original Raspberry
Pi and Raspberry Pi B+ models), 512MByte LPDDR2 RAM and 4Gbytes eMMC
Flash. The CM3 contains a BCM2837 processor (as used on the Raspberry Pi 3),
1Gbyte LPDDR2 RAM and 4Gbytes eMMC Flash. Finally the CM3L product is the
same as CM3 except the eMMC Flash is not fitted, and the SD/eMMC interface pins
are available for the user to connect their own SD/eMMC device.
SOFTWARE
 ARMv6 (CM1) or ARMv7 (CM3, CM3L) Instruction Set
 Mature and stable Linux software stack
o Latest Linux Kernel support
o Many drivers up streamed
o Stable and well supported user land
10
BLOCK DIAGRAM

Figure 6.1.1 BLOCK DIAGRAM

6.2 ARDUINO UNO:

The Arduino Uno is a microcontroller board based on the ATmega328. It has 14


digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a
16 MHz crystal oscillator, a USB connection, a power jack, an ICSP header, and a reset
button. It contains everything needed to support the microcontroller; simply connect it
to a computer with a USB cable or power it with a AC-to-DC adapter or battery to get
started. The Uno differs from all preceding boards in that it does not use the FTDI
USB-to-serial driver chip. Instead, it features the Atmega8U2 programmed as a USB-
to-serial converter. "Uno" means one in Italian and is named to mark the upcoming
release of Arduino 1.0. The Uno and version 1.0 will be the reference versions of
11
Arduino, moving forward. The Uno is the latest in a series of USB Arduino boards, and
the reference model for the Arduino platform; for a comparison with previous versions,
The Arduino Uno is a microcontroller board based on the ATmega328. It has 14 digital
input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz
crystal oscillator, a USB connection, a power jack, an ICSP header, and a reset button.
It contains everything needed to support the microcontroller; simply connect it to a
computer with a USB cable or power it with a AC-to-DC adapter or battery to get
started. The Uno differs from all preceding boards in that it does not use the FTDI
USB-to-serial driver chip. Instead, it features the Atmega8U2 programmed as a USB-
to-serial converter. "Uno" means one in Italian and is named to mark the upcoming
release of Arduino 1.0. The Uno and version 1.0 will be the reference versions of
Arduino, moving forward. The Uno is the latest in a series of USB Arduino boards, and
the reference model for the Arduino platform; for a comparison with previous versions,

Figure 6.2.1 Arduino uno

12
Summary Microcontroller ATmega328
Operating Voltage 5V
Input Voltage (recommended) 7-12V
Input Voltage (limits) 6-20V
Digital I/O Pins 14 (of which 6 provide PWM
output)
Analog Input Pins 6
DC Current per I/O Pin 40 mA
DC Current for 3.3V Pin 50 mA
Flash Memory 32 KB (ATmega328) of which 0.5
KB used by bootloader
SRAM 2 KB (ATmega328)
EEPROM 1 KB (ATmega328)
Clock Speed 16 MHz

POWER:
The Arduino Uno can be powered via the USB connection or with an external
power supply. The power source is selected automatically. External (non-USB) power
can come either from an AC-to-DC adapter (wall-wart) or battery. The adapter can be
connected by plugging a 2.1mm center-positive plug into the board's power jack. Leads
from a battery can be inserted in the Gnd and Vin pin headers of the POWER
connector. The board can operate on an external supply of 6 to 20 volts. If supplied
with less than 7V, however, the 5V pin may supply less than five volts and the board
may be unstable. If using more than 12V, the voltage regulator may overheat and
damage the board. The recommended range is 7 to 12 volts.
The power pins are as follows:
 VIN. The input voltage to the Arduino board when it's using an external power
source (as opposed to 5 volts from the USB connection or other regulated power

13
source). You can supply voltage through this pin, or, if supplying voltage via the
power jack, access it through this pin.
 5V.This pin outputs a regulated 5V from the regulator on the board. The board
can be supplied with power either from the DC power jack (7 - 12V), the USB
connector (5V), or the VIN pin of the board (7-12V). Supplying voltage via the
5V or 3.3V pins bypasses the regulator, and can damage your board. We don't
advise it.
 3.3 volt supply generated by the on-board regulator. Maximum current draw is
50 mA.
 GND. Ground pins.

6.3 GSM

The GSM system is the most widely used cellular technology in use in the
world today. It has been a particularly successful cellular phone technology for a
variety of reasons including the ability to roam worldwide with the certainty of being
able to be able to operate on GSM networks in exactly the same way - provided billing
agreements are in place.

The letters GSM originally stood for the words Group Special Mobile, but as
it became clear this cellular technology was being used worldwide the meaning of
GSM was changed to Global System for Mobile Communications. Since this cellular
technology was first deployed in 1991, the use of GSM has grown steadily, and it is
now the most widely cell phone system in the world. GSM reached the 1 billion
subscriber point in February 2004, and is now well over the 3 billion subscriber mark
and still steadily increasing.

GSM - SYSTEM OVERVIEW

The GSM system was designed as a second generation (2G) cellular phone
technology. One of the basic aims was to provide a system that would enable greater
14
capacity to be achieved than the previous first generation analogue systems. GSM
achieved this by using a digital TDMA (time division multiple access approach). By
adopting this technique more users could be accommodated within the available
bandwidth. In addition to this, ciphering of the digitally encoded speech was adopted to
retain privacy. Using the earlier analogue cellular technologies it was possible for
anyone with a scanner receiver to listen to calls and a number of famous personalities
had been "eavesdropped" with embarrassing consequences.

GSM SERVICES

Speech or voice calls are obviously the primary function for the GSM cellular
system. To achieve this the speech is digitally encoded and later decoded using a
vocoder. A variety of vocoders are available for use, being aimed at different scenarios.

In addition to the voice services, GSM cellular technology supports a variety of


other data services. Although their performance is nowhere near the level of those
provided by 3G, they are nevertheless still important and useful. A variety of data
services are supported with user data rates up to 9.6 kbps. Services including Group 3
facsimile, videotext and teletex can be supported.

Figure 6.3.1 GSM WITH ARDUINO

15
FURTHER DEVELOPMENTS OF GSM

GSM was a particularly successful mobile telecommunications system. Initially


it had been intended for use within Europe, but within a relatively short while the
system was being used well beyond the borders of Europe, becoming an internationally
accepted system.

In addition to its success as a voice communications system, it was developed


beyond the basic voice capability to be able to carry data. With the Internet becoming
more widely used, GSM was developed to provide a packet data capability. The first
major development was in the form of GPRS.

Figure 6.3.2: GSM Module block diagram

16
Working
GSM is combination of TDMA (Time Division Multiple
Access), FDMA (Frequency Division Multiple Access) and Frequency hopping.
Initially, GSM use two frequency bands of 25 MHz width : 890 to 915 MHz
frequency band for up-link and 935 to 960 MHz frequency for down-link. Later on,
two 75 MHz band were added. 1710 to 1785 MHz for up-link and 1805 to 1880 MHz
for down-link. up-link is the link from ground station to a satellite and down-link is
the link from a satellite down to one or more ground stations or receivers. GSM
divides the 25 MHz band into 124 channels each having 200 KHz width and
remaining 200 KHz is left unused as a guard band to avoid interference.
6.4 RFID READER:

The RFID Proximity OEM Reader Module has a built-in antenna in minimized
form factor. It is designed to work on the industry standard carrier frequency of 125
kHz. This LF reader module with an internal or an external antenna facilitates
communication with Read-Only transponders—type UNIQUE or TK5530 via the air
interface. The tag data is sent to the host systems via the wired communication
interface with a protocol selected from the module Both TTl and Wiegend Protocal.
The LF module is best suited for applications in Access Control, Time and Attendance,
Asset Management, Handheld Readers, Immobilizers, and other RFID enabled
applications.

Features

 Output- TTL or Wigand26


 Plug-and-Play, needs +5V to become a reader
 Buzzer indicates tag reading operation
 Compact size and cost-effective

17
RFID TAG:

 Low-cost method for reading passive RFID transponder tags


 9600 bps serial interface at RS232 level
 Buzzer & LED indicate valid RFID Tag detection
 RS232 interface connects directly to PC
 Use AC – DC Power Adaptor with following ratings · DC Voltage : 12V /1A

Figure 6.4.1 RFID CARD READER

6.5 PI CAMERA

The Raspberry Pi camera module can be used to take high-definition video, as


well as stills photographs. It’s easy to use for beginners, but has plenty to offer
advanced users if you’re looking to expand your knowledge. There are lots of examples
online of people using it for time-lapse, slow-motion and other video cleverness. You
can also use the libraries we bundle with the camera to create effects.

If you’re interested in the nitty-gritty, you’ll want to know that the module has a
five megapixel fixed-focus camera that supports 1080p30, 720p60 and VGA90 video
modes, as well as stills capture. It attaches via a 15cm ribbon cable to the CSI port on

18
the Raspberry Pi. It can be accessed through the MMAL and V4L APIs, and there are
numerous third-party libraries built for it, including the Picamera Python library.

The camera module is very popular in home security applications, and in wildlife
camera traps.You can also use it to take snapshots.

FEATURES

 5MP sensor
 Wider image, capable of 2592x1944 stills, 1080p30 video
 1080p video supported
 CSI
 Size: 25 x 20 x 9 mm

CAMERA DETAILS
The camera consists of a small (25mm by 20mm by 9mm) circuit board, which
connects to the Raspberry Pi's Camera Serial Interface (CSI) bus connector via a
flexible ribbon cable. The camera's image sensor has a native resolution of five
megapixels and has a fixed focus lens. The software for the camera supports full
resolution still images up to 2592x1944 and video resolutions of 1080p30, 720p60 and
640x480p60/90.

Installation involves connecting the ribbon cable to the CSI connector on the
Raspberry Pi board. This can be a little tricky, but if you watch the videos that
demonstrate how it is done, you shouldn't have any trouble.

When you purchase the camera, you will receive a small camera board and
cable. You'll want to devise some method of supporting the camera in order to use it.
Some camera stands and Raspberry Pi cases are now available. You can also rig up
something simple yourself if you wish. I attached mine to a case using a small piece of
plastic and double-sided tape.

Once the hardware is set up, you can move on to configuring the software.

19
CONNECT TO CAMERA

 The flex cable inserts into the connector situated between the Ethernet and
HDMI ports, with the silver connectors facing the HDMI port. The flex cable
connector should be opened by pulling the tabs on the top of the connector
upwards then towards the Ethernet port. The flex cable should be inserted firmly
into the connector, with care taken not to bend the flex at too acute an angle. The
top part of the connector should then be pushed towards the HDMI connector
and down, while the flex cable is held in place.
 Update the SD card

 In order to use the camera you must be using a recent operating system that
knows that the camera exists. The easiest way to do this is to grab the latest
Raspbian image from the RaspberryPi.org site and create a fresh SD card.

 Enable camera in raspi-config settings

 Reboot. If you are using a fresh image the raspi-config utility should load. If it
doesn’t then you can run it manually using: sudoraspi-configSekect the
“Camera” option and press “Enter”.

Figure 6.5.1 PI CAMERA


20
6.6 BUZZER:

GENERAL DESCRIPTION:
 A buzzer or beeper is an audio signaling device, which may be mechanical,
electromechanical, or piezoelectric. Typical uses of buzzers and beepers include
alarm devices, timers and confirmation of user input such as a mouse click or
keystroke.
 Buzzer is an integrated structure of electronic transducers, DC power supply,
widely used in computers, printers, copiers, alarms, electronic toys, automotive
electronic equipment, telephones, timers and other electronic products for sound
devices. Active buzzer 5V Rated power can be directly connected to a
continuous sound, this section dedicated sensor expansion module and the board
in combination, can complete a simple circuit design, to "plug and play."
 Now, micro computers are widely used for microwave ovens, air conditioners,
cars, toys, timers, and other alarm equipment. Externally driven piezoelectric
sounders are used in digital watches, electronic calculators, telephones and other
equipment. They are driven by a signal (ex, 2048Hz or 4096Hz) from an LSI and
provide melodious sound.
FEATURES

1. Low power consumption.


2. No contacts therefore, no noise and highly reliable.
APPLICATIONS

 Telephone ringers.
 Various office equipment such as PPCs, printers and keyboards.
 Various home appliances such as microwave ovens.
 Confirmation sound of various audio equipment.
SPECIFICATIONS:
 On-board passive buzzer

21
 On-board 8550 triode drive

 Can control with single chip microcontroller IO directly

 Working voltage: 5V

Figure 6.6.1 BUZZER

All relays come with a voltage rating. This is called on a relay's datasheet its
rated coil voltage. This is the voltage needed in order for the relay to be able to operate
and be able to open or close its switch in a circuit. In order for a relay to function, it
must receive this voltage at its coil terminals. Thus, if a relay has a rated voltage of
9VDC, it must receive 9 volts of DC voltage to operate. So the most important thing a
DC relay needs is its rated DC voltage. If you don't know this, look up what relay you
have and look up its datasheet and check for

Components Needed

 DC Relay
 DC Voltage Source

Again, the DC relay must receive its rated voltage value in order to operate. The
DC power source can be either batteries, wall wart power, or a DC power supply- any
DC power source. The zener diode is placed reverse biased in parallel to the relay.

22
DC Relay Driver Circuit Schematic

Below is the DC relay driver circuit which we will build:

Figure 6.6.2: DC Relay Driver Circuit Schematic

The relay which we use in this case is rated for 9V. Therefore, a 9-volt DC
voltage source feeds the resistor. To suppress transients that may be caused by the relay
opening and closing, we place a zener diode reverse biased in parallel with the relay.
This will shunt all excess power to ground once it reaches a certain threshold. This is
all that is needed to operate the relay. With sufficient power, the relay will now closed,
driving the loads that are connected to its output.

Figure 6.6.3: DC Relay Driver Circuit

23
6.7 TRANSFORMER

A transformer is a static device that transfers electrical energy from one circuit to
another through inductively coupled conductors—the transformer's coils. A varying
current in the first or primary winding creates a varying magnetic flux in the
transformer's core and thus a varying magnetic field through the secondary winding.
This varying magnetic field induces a varying electromotive force (EMF) or "voltage"
in the secondary winding. This effect is called mutual induction

Figure 6.7.1 Transformer

This is a very useful device, indeed. With it, we can easily multiply or divide
voltage and current in AC circuits. Indeed, the transformer has made long-distance
transmission of electric power a practical reality, as AC voltage can be “stepped up”
and current “stepped down” for reduced wire resistance power losses along power lines
connecting generating stations with loads. At either end (both the generator and at the
loads), voltage levels are reduced by transformers for safer operation and less
expensive equipment. A transformer that increases voltage from primary to secondary
(more secondary winding turns than primary winding turns) is called a step-up
transformer. Conversely, a transformer designed to do just the opposite is called a step-
down transformer.

This is a step-down transformer, as evidenced by the high turn count of the


primary winding and the low turn count of the secondary. As a step-down unit, this
24
transformer converts high-voltage, low-current power into low-voltage, high-current
power. The larger-gauge wire used in the secondary winding is necessary due to the
increase in current. The primary winding, which doesn't have to conduct as much
current, may be made of smaller-gauge wire.

POTENTIAL TRANSFORMER THEORY

Figure 6.7.2 Potential Transformer

A voltage transformer theory or potential transformer theory is just like a


theory of general purpose step down transformer. Primary of this transformer is
connected across the phase and ground. Just like the transformer used for stepping
down purpose, potential transformer i.e. PT has lower turns winding at its secondary.
The system voltage is applied across the terminals of primary winding of that
transformer, and then proportionate secondary voltage appears across the secondary
terminals of the PT.

The secondary voltage of the PT is generally 110 V. In an ideal potential


transformer or voltage transformer, when rated burden gets connected across the
secondary; the ratio of primary and secondary voltages of transformer is equal to the
turns ratio and furthermore, the two terminal voltages are in precise phase opposite to
each other. But in actual transformer, there must be an error in the voltage ratio as well
as in the phase angle between primary and secondary voltages

25
APPLICATIONS

Current transformers are used for protection, measurement and control in high-
voltage electrical substations and the electrical grid. Current transformers may be
installed inside switchgear or in apparatus bushings, but very often free-standing
outdoor current transformers are used. In a switchyard, live tank current transformers
have a substantial part of their enclosure energized at the line voltage and must be
mounted on insulators. Dead tank current transformers isolate the measured circuit
from the enclosure. Live tank CTs are useful because the primary conductor is short,
which gives better stability and a higher short-circuit current rating. The primary of the
winding can be evenly distributed around the magnetic core, which gives better
performance for overloads and transients. Since the major insulation of a live-tank
current transformer is not exposed to the heat of the primary conductors, insulation life
and thermal stability is improved.

6.8 REGULATOR 7805

Voltage sources in a circuit may have fluctuations resulting in not providing


fixed voltage outputs. A voltage regulator IC maintains the output voltage at a constant
value. 7805 IC, a member of 78xx series of fixed linear voltage regulators used to
maintain such fluctuations, is a popular voltage regulator integrated circuit (IC). The xx
in 78xx indicates the output voltage it provides. 7805 IC provides +5 volts regulated
power supply with provisions to add a heat sink.

All voltage sources cannot able to give fixed output due to fluctuations in the
circuit. For getting constant and steady output, the voltage regulators are implemented.
The integrated circuits which are used for the regulation of voltage are termed as
voltage regulator ICs. Here, we can discuss about IC 7805.The voltage regulator IC
7805 is actually a member of 78xx series of voltage regulator ICs. It is a fixed linear
voltage regulator. The xx present in 78xx represents the value of the fixed output
voltage that the particular IC provides. For 7805 IC, it is +5V DC regulated power
26
supply. This regulator IC also adds a provision for a heat sink. The input voltage to this
voltage regulator can be up to 35V, and this IC can give a constant 5V for any value of
input less than or equal to 35V which is the threshold limit.

Figure: 6.8.1 Regulator 7805

7805 IC Rating

 Input voltage range 7V- 35V


 Current rating Ic = 1A
 Output voltage range VMax=5.2V ,VMin=4.8V

Regulated Power Supply Circuit

The voltage regulator 7805 and the other components are arranged in the circuit as
shown in figure.

27
The purposes of coupling the components to the IC7805 are explained below.
C1- It is the bypass capacitor, used to bypass very small extent spikes to the earth. C 2
and C3- They are the filter capacitors. C2 is used to make the slow changes in the input
voltage given to the circuit to the steady form. C3 is used to make the slow changes in
the output voltage from the regulator in the circuit to the steady form. When the value
of these capacitors increases, stabilization is enlarged. But these capacitors single-
handedly are unable to filter the very minute changes in the input and output voltages.
Applications of Voltage Regulator 7805 IC

 Current regulator
 Regulated dual supply
 Building circuits for Phone charger, UPS power supply circuits, portable CD
player etc
 Fixed output regulator
 Adjustable output regulator etc.

6.9 LCD (Liquid Crystal Display)

• Liquid Crystal Display(LCD)


• Operating Voltage is 4.7V to 5.3V
• Alphanumeric LCD display module, meaning can display alphabets and numbers
• The LCD Display connected to the Arduino and RFID card , Display the vehicle
mode

Figure 6.9.1 LCD


28
CHAPTER 7

SOFTWARE REQUIREMENT

EMBEDDED C:

Embedded C is one of the most popular and most commonly used Programming
Languages in the development of Embedded Systems. So, in this article, we will see
some of the Basics of Embedded C Program and the Programming Structure of
Embedded C.

Embedded C is perhaps the most popular languages among Embedded


Programmers for programming Embedded Systems. There are many popular
programming languages like Assembly, BASIC, C++ etc. that are often used for
developing Embedded Systems but Embedded C remains popular due to its efficiency,
less development time and portability.

Before digging in to the basics of Embedded C Program, we will first take a


look at what an Embedded System is and the importance of Programming Language in
Embedded Systems.

EMBEDDED SYSTEM:

An Embedded System can be best described as a system which has both the
hardware and software and is designed to do a specific task. A good example for an
Embedded System, which many households have, is a Washing Machine.

Embedded Systems can not only be stand-alone devices like Washing Machines
but also be a part of a much larger system. An example for this is a Car. A modern day
Car has several individual embedded systems that perform their specific tasks with the
aim of making a smooth and safe. Some of the embedded systems in a Car are Anti-

29
lock Braking System (ABS), Temperature Monitoring System, Automatic Climate
Control, Type Pressure Monitoring System, Engine Oil Level Monitor, etc.

Some Other Real Time Applications of Embedded Systems

 Latest Smart TVs


 GPS Navigation Systems
 Almost all Modern Day Smart Phones
 Missile Guidance Systems,
 Space Exploration (Rovers)
 Automobiles (ABS, Airbags)
 Industries (Assembly Robots)
 Road Safety Systems (Traffic Monitoring and Collision Alert Systems) and
many other.

30
CHAPTER 8

METHODOLOGY

 The theft alert system makes a use of GSM which are embedded in vehicle to
communicate with vehicle’s owner mobile phone.
 It means that whenever any unauthorized person will try to steal our vehicles,
then we can easily detect the location of theft with vehicle by using the
application of GSM technology.
 In this system we are going to use two keys to open the vehicle lock, one is the
owner’s key which is used by owner and other is RFID card reading.
 Whenever RFID Card isn’t used, the buzzer become active and give the beep
sound which indicate that the thief is detected.
 At the same time a warning SMS is sent by GSM to registered mobile number,
engine will be stop.
 Camera take the photo of the thief to send it register mail id.
 Thief will be easily identified. In this way, this system helps in preventing the
criminals from stealing vehicles.

31
CIRCUIT DIAGRAM

32
CHAPTER 9

FUTURE ENHANCEMENT

With the help of high sensitivity vibration sensors we can detect accident.

Whenever the vehicle met with an accident unexpectedly, with the help of vibration

sensors we can detect the accident and we can send the location to the owner, hospital

and police. We can use EEPROM to store the previous navigation positions up to 256

locations and we can navigate up to N number of locations by increasing its memory.

33
CHAPTER 10

CONCLUSION

The vehicle theft detection system is fully secured as we are implementing a

RFID card authentication. Every RFID card differs from the vehicle. So there is no

chance of hacking. A real time vehicle tracking system via google map is presented.

The mode switching is done for authorization, GSM messaging for alerting the owner

and send the location of the vehicle. The hidden camera fixed the vehicle. The camera

rotated the 1800. In the period of vehicle theft, multiple times of photo captured by the

device. Captured image to store the micro controller. Police easily identify the thief and

arrested him. Prevention and detection vehicle theft and theft identified easily

34
REFERENCE

[1].The alarming rate of car theft in Abuja,[online].Available: www.abujafacts.ng 23


Nov 2015Auto theft [online] Available www.iii.org/issue-update 16th Mar 2016

[2]. Abid k. and Ravi M, “GPS – GSM Based Tracking System”International Journal of
Engineering Trends and Technology,Volume3, Issue 2- 2012

[3].Baburao K., et al, “GSM and GPS Based Vehicle Location And Tracking
System”International Journal of Engineering Research and Applications (IJERA) Vol.
1, Issue 3, pp.616-625

[4].PankajVerma and Bhatia J.S, “Design And Development Of Gps-Gsm based


Tracking System with Google map Based Monitoring” International Journal of
Computer Science, Engineering and Applications (IJCSEA) Vol.3,No.3, June 2013

[5].Pravada P. W. and Dahad S. O, “Real Time Vehicle Locking and Tracking System
using GSM and GPS Technology-An Anti-theft System” International Journal of
Technology And Engineering System(IJTES): Vol.2.No.3, Jan –March 2011

[6].Madhuri U. et al., “Remote Vehicle Tracking & Driver Health Monitoring System
Using GSM Modem & Google Maps”, International Journal of Computer Science and
Information Technologies, Vol. 5 (3) , pp. 2828-2832,2014.

[7].Albert A. and Ezhilarasie R., “Cloud Computing Based Vehicle Tracking


Information Systems” InternationalJournal of Computer Science and Technology Vol.
2, Issue 1, March 2011.

[8].KunalMaurya , Mandeep Singh , Neelu Jain, "Real Time Vehicle Tracking System
using GSM and GPS Technology- An Anti-theftTracking System", International
Journal of Electronics and Computer Science Engineering ,1103

35
[9].R.Ramani, S.Valarmathy , Dr. N.SuthanthiraVanitha, S.Selvaraju, M.Thiruppathi,
R.Thangam, “Vehicle Tracking and Locking System Based on GSM and GPS” , I.J.
Intelligent Systems and Applications, 2013, 09, 86-93

[10].Vikas Singh, S.P.Karmore , “GSM and GPS BASED VEHICLE SECURITY


and CONTROLLING SYSTEM” , International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-962

[11].Sachin B. Ade, Y. D. Kapse, “GPS Based Tracking and Monitoring of Vehicle [5]
Using ARM”, International Journal of Science and Research (IJSR) ISSN (Online):
2319-7064.

[12].Vikram Kulkarni , ViswaprakashBabu, “Embedded Smart Car Security System on


Face Detection”, Special Issue of IJCCT, ISSN (ONLINE) : 2231–0371, ISSN
(PRINT) : 0975–7449, Volume- 3, Issue-1

[13].Albert Alexe, R.Ezhilarasie, Cloud Computing Based Vehicle Tracking


Information Systems, IJCST Vol. 2, Issue 1, March 2011.

[14].Chen, H., Chiang, Y. Chang, F., H. Wang, H. (2010). Toward Real-Time Precise
Point Positioning: Differential GPS Based on IGS Ultra Rapid Product,SICE Annual
Conference, The Grand Hotel, Taipei, Taiwan August 18-21.

[15].Asaad M. J. Al-Hindawi, IbraheemTalib, “Experimentally Evaluation of


GPS/GSM Based System Design”, Journal of Electronic Systems Volume 2 Number 2
June 2012 Kale S. B. and Satyajit A. P., “Design and Development of Low Cost
Automotive Vehicular Communication System Based on ARM” International Journal
of Engineering and Advanced Technology (IJEAT) ISSN: Volume-3, Issue-5, June
2014

36
[16].Muruganandham and Mukesh P.R., “Real Time Web based Vehicle Tracking
using GPS” World Academy of Science, Engineering and Technology pp.91-99,
2010Modi N. D., “Vehicle tracking system with GPS GSM Interface and Self-Created
Map” International Journal of Application or Innovation in Engineering &
Management (IJAIEM) Volume 3, Issue 4, April 2014

[17].Pethakar S.S. et al., “GPS and GSM based Vehicle Tracing and Employee
Security System” International Journal of Computer Applications (0975 – 8887)
Volume 62– No.6, January 2013

37
Volume 10, Issue 3, March 2021

38
Anti Vehicle Theft and Engine Locking
System with Image Acquisition
Krishnaveni M 1 , Gayathri N 2 , Kiruthiga B 3 , Kokila S 4 , Mahalakshmi
V5
Assistant Professor, Department of Electronics and Communication
1
Engineering, AVS Engineering College, Salem, Tamil Nadu, India
UG Scholars, Department of Electronics and Communication Engineering,
AVS Engineering College, Salem, Tamil Nadu, India2,3,4,5

ABSTRACT: Vehicle Theft is common issue which is ubiquitous, irrespective


of the location. The main objectives of the entire system is to ameliorate the
safety of the vehicles and truncate the theft at insecure parking places. Vehicle
Tracking and Locking system is installed in the vehicle, to track the place and
locking engine motor. When the theft is identified, the responsible person sends
SMS to the Microcontroller, then microcontroller issue the control signals to
signals to stop the engine motor. Before enter the vehicle key to read the RFID
card otherwise the camera take the photo of the thief. Hence we can get back our
Vehicle Easily

KEYWORDS: Send SMS, GSM, GPS, Raspberry pi 3, RFID Card, Camera

I. INTRODUCTION

The vehicle theft is become a major problem that the entire world is facing now.
To stopping this issue, there is a need of theft alert system which helps to owner to
ensure theft prevention and provide speedy ide ntification of an unauthorized
person who was trying to steal the vehicles. The theft alert system makes a use
of GPS and GSM which are embedded in vehicle to communicate with vehicle’s
owner mobile phone.

Sending of an SMS by GSM to owner’s mobile phone to provide all


information about vehicle and vice-versa. The GPS technology is used here to
provide the exact location of target. It means that whenever any unauthorized
person will try to steal our vehicles, then we can easily detect the location of th eft
with vehicle by using the application of GPS technology. In this system we are
going to use two keys to open the vehicle lock, one is the owner’s key which is
used by owner and other is RFID card reading. Whenever RFID Card isn’t used,
the alarm become active and give the beep sound which indicate that the thief is
detected. At the same time a warning SMS is sent by GSM to registered mobile
number. After receiving the message, the vehicle’s owner sent a message to
remotely lock the engine, after turning off the engine, the motor cannot start
without permission of password. In this way, this system helps in preventing the
criminals from stealing vehicles.
II. RELATED WORK

[1]Champa Bhagavathi.R, Gowri.B.R, Kasturi.R, Pooja.C suggested in


their work on “Vehicle Theft Detection and Prevention Using GSM & GPS”,
International Journal Innovative Research in Computer and Communication
Engineering, vol.4, Issue 5, May 2016. The Proposed System consists of Remote
ignition cut-off and Vehicle tracking modules. Both of them make use of GSM sub
module. Vehicle tracking module further makes use of GPS sub module and
Remote ignition cut-off module uses password authentication sub module. Us er
enters the correct password to start the vehicle. If incorrect password is entered
three times, an auto-generated message is sent to owner and a buzzer activates
alerting the nearby personnel. GSM modem is used to send OTP to owner. The
owner is also no tified if his vehicle is started. The owner can respond with an
SMS. The ignition of the vehicle will be disabled whenever $OFF message is
sent. GPS technology is used to track the vehicle. Location co -ordinates of the
vehicle are sent to owner whenever $LOC message is sent.

[2]Maheshwari V.Chandravar,Shital Y. Gaikwad suggested in their work on “Anti-


Theft Security System Using
GSM, GPS &RFID Technology based on ARM7”, Interrnational Journal of
Engineering Research &Technology,vol.2, Issue 9,September 2013. The vehicle
is provided with the RFID reader. The vehicle is developed by using two Direct
current motor which would be connected to the microcontroller using Motor Driver
integrated circuit for increasing the current. The Door assembly is developed us ing
DC motor which would be controlled using Vol-5 Issue-5 2019 IJARIIE-ISSN (O)-
2395-4396
10953 www.ijariie.com 882 the relay. When the theft is there, the door will lock
automatically. When unauthorized people want to open the door of car then he/she
is unable to open without RFID tag.
Kunal Maurya , Mandeep Singh , Neelu Jain suggested in their work on “Real
[3]
Time Vehicle Tracking System using GSM &GPS Technology- An Anti-theft
Tracking System”, International Journal of Electronics and Computer Science
Engineering, vol.1, number3, 2015. This paper proposed to design a vehicle tracking
system that works using GPS and GSM technology, which would be the cheapest
source of vehicle tracking and it would work as antitheft system. It is an embedded
system which is used for tracking and positioning of any vehicle by using Global
Positioning System (GPS) and Global system for mobile communication (GSM)

III. EXISTING SYSTEM

In existing system to pressed the secret button in every fifty minutes. In this method
occur the more road accident, not applicable for Real life time

Limitations of Existing System


 It is not secured and more road accident
 Anti – Vehicle theft system and engine locking system
 In existing system to pressed the secret button in every fifty minutes
 In this method occur the more road accident, not applicable for Real life time
 Now a days, Increase vehicle theft. In this problem avoid by this project

IV. PROPOSED SYSTEM

In our proposed system we are design to read the RFID card after unlocking the
vehicle. In this process to avoid the road accident. Does not read the RFID card
the microcontroller take photo of the thief.Police is easily identify the thief and
arrested him. After few seconds the vehicle will be Stop. GPS send the Location of
the vehicle inn owner mobile number. Suddenly Buzzer will be ON.

Advantages of Proposed System


 Detection of the Vehicle theft
 It is safe and secure.
 To avoid the road accident
 Using more securable devices
 It is easy to access
V. HARDWARE DESCRIPTION

The system uses RFID Card, Key, GPS Module, GSM Module, Buzzer, Camera,
LCD display.

A .PIC CONTROLLER
PIC is a family of modified Harvard architecture microcontrollers made by
Microchip Technology, derived from the PIC1650 originally developed by
General Instrument's Microelectronics Division. The name PIC initially referred
to "Peripheral Interface Controller" now it is "PIC"only.PICs are popular with
both industrial developers and hobbyists alike due to their low cost, wide
availability, large user base, extensive collection of application notes, availability
of low cost or free development tools, and serial programming (and re-programming
with flash memory) capability

B. POWER SUPPLY
A power supply also known as PSU which supplies electrical or other types of
energy to an output load
ofgroupofloads.Itiscommonlyappliedtoelectricalenergysupplies.AC voltage runs
in a range of230Vrms and connected to a transformer which helps in stepping
down a voltage level.

C. GPS MODULE
Global Positioning System (GPS) is a navigational phenomenon by assemblage
of satellites such that it sends signal and makes GPS receiver to find the exact
location of an object. The Google map is a web -application based GPS receiver
used in implementation of this function. GPS receiver is accessed for the
location information or data. The GPS receiver identify, decode and process the
signal received from satellites.

GPS MODULE

D.RADIO FREQUENCY IDENTIFICATION TAG (RFID)


EM-18 RFID Reader is one of the most commonly used RFID Reader to read
125 KHz tags. This is used for controlling the access in many projects and
industries. Each RFID key could be configured to a RFID module
The RFID Proximity OEM Reader Module has a built-in antenna in minimized
form factor. It is designed to work on the industry standard carrier frequency of
125 kHz. This LF reader module with an internal or an external antenna
facilitates communication with Read-Only transponders—type UNIQUE or
TK5530 via the air interface. The tag data is sent to the host systems via the wired
communication interface with a protocol selected from the
module Both TTl and Wiegend Protocal.

E.GSM MODULE
This is a dual band GSM module that works on frequencies of 900/1800 hz . It
can be used to communicate with the controller using AT commands. The
module comes with RS 232 interface which allows connection with PC and
microcontroller. This module could be used for sending messages, deleting messages,
make calls, etc. Some of the AT commands are mentioned below.

GSM MODULE
F.BUZZER
Buzzer is used in this system for providing a sharp alarm on theft
detection. It may be mechanical, electro mechanical, or piezoelectric device
having an acoustic signal.

BUZZER

G.RASPBERRY PI 3
Quad Core 1.2GHz Broadcom BCM2837 64bit CPU.1GB RAM.BCM43438
wireless LAN and Bluetooth Low Energy (BLE) on board. 100 BaseEthernet.40-
pin extended GPIO.4 USB 2 ports.4 Pole stereo output and composite video
port. Full size HDMI

H.CAMERA

A hidden camera can be wired or wireless. A hidden camera may be activated


manually, by remote control or be connected to a motion detector. Wireless spy
cameras are cameras that do not record to an internal memory but rather transmit
video signal so that it can be recorded and viewed elsewhere.

CAMERA

CONCLUS ION

We are design to read the RFID card after unlocking the vehicle. In this
process to avoid the road accident . Does not read the RFID card the microcontroller
take photo of the thief . Police is easily identify the thief and arrested him. After
few seconds the vehicle will be Stop. GPS send the Location of the vehicle inn
owner mobile number. Suddenly Buzzer will be ON.
A real time vehicle tracking system via google maps is presented. The mode
switching is done for authorization, GSM messaging for alerting the owner and GPS
for tracking the vehicle. This is the conclusion of the project.

REFERENCES

1. The alarming rate of car theft in Abuja,[online].Available: www.abujafacts.ng


23 Nov 2015 Auto theft [online] Available 16th Mar 2016
2. Abid k. and Ravi M, “GPS – GSM Based Tracking System ”International
Journal of Engineering Trends and Technology,Volume3, Issue 2- 2012
3. Baburao K., et al, “GSM and GPS Based Vehicle Location And Tracking
System”International Journal Of
Engineering Research and Applications (IJERA) Vol. 1, Issue 3, pp.616-625
4. PankajVerma and Bhatia J.S, “Design And Development Of Gps - Gsm based
Tracking System with Google map Based Monitoring” International Journal of
Computer Science, Engineering and Applications (IJCSEA) Vol.3,No.3, June
2013
5. Pravada P. W. and Dahad S. O, “Real Time Vehicle Locking and Tracking
System using GSM and GPS Technology-An Anti-theft System” International
Journal of Technology And Engineering System(IJTES):Vol.2.No.3, Jan –March
2011
6. Madhuri U. et al., “Remote Vehicle Tracking & Driver Health Monitoring
System Using GSM Modem & Google Maps”, International Journal of Computer
Science and Information Technologies, Vol. 5 (3) , pp. 2828-2832,2014.
7. Albert A. and Ezhilarasie R., “Cloud Computing Based Vehicle Tracking
Information Systems” International Journal of Computer Science and Technology
Vol. 2, Issue 1, March 2011.
8. Kale S. B. and Satyajit A. P., “Design and Development of Low Cost
Automotive Vehicular Communication System
Based on ARM” International Journal of Engineering and Advanced Technology
(IJEAT) ISSN:Volume 3, Issue-5, June 2014
9. Muruganandham and Mukesh P.R., “Real Time Web based Vehicle
Tracking using GPS” World Academy of
Science, Engineering and Technology pp.91-99, 2010
10. Modi N. D., “Vehicle tracking system with GPS GSM Interface and Self-
Created Map” International Journal of Application or Innovation in Engineering &
Management (IJAIEM) Volume 3, Issue 4, April 2014
CONFERENCE

You might also like