Security System Alert Via SMS
The project proposed is about providing security system that will alert the user through SMS. Throughout the system, user will be alerted if intrusion occurred within compound area of attached sensor. This system used of sensor, microcontroller, GSM modem and hand phone as main components. Securi...
Saved in:
| Main Author: | |
|---|---|
| Format: | Monograph |
| Published: |
UTeM
2011
|
| Subjects: | |
| Online Access: | http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=graphicFullDisplayRetriever.jsp&szMaterialNo=0000068774 http://library.utem.edu.my:8000/elmu/index.jsp?module=webopac-d&action=graphicFullDisplayRetriever.jsp&szMaterialNo=0000068774 http://eprints.utem.edu.my/3603/1/Security_System_Alert_Via_SMS_24_pages.pdf http://eprints.utem.edu.my/3603/2/Security_System_Alert_Via_SMS_-_Full_Pages.pdf |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The project proposed is about providing security system that will alert the
user through SMS. Throughout the system, user will be alerted if intrusion occurred
within compound area of attached sensor. This system used of sensor,
microcontroller, GSM modem and hand phone as main components. Security system
applied is fully wired as easy to troubleshoot and better performance in speed
compare to wireless system. Implementation of GSM modem technology is function
to improve the security system by sending alerting message to user as they are away
from that compound area. The main objective of this proposed project is to enhance
the security system so those equals to standard of living nowadays which enable user
to be alerted in real time as intrusion occur. Besides, it is to provide security system
that will easy to install and produce lower power consumption. The method used in
this project was illustrated using flow chart. Simulation, prototype construction and
calibration were implemented. Gantt chart helps in scheduling the flow of project
activities so that will be accomplished in specific time required. At the end of the
project, the security system was applied to a prototype home. When intrusion
detected, an “Intrusion” message received at the user’s hand phone. |
|---|