SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676 Volume 4, Issue 6 (Mar. - Apr. 2013), PP 38-42
www.iosrjournals.org

    Microcontroller Based Reprogrammable Digital Door Lock
   Security System by Using Keypad & GSM/CDMA Technology
                                        Mohammad Amanullah
  (Lecturer, Department of Computer Science and Engineering, International Islamic University Chittagong.
                                              Bangladesh.

Abstract: Now a day’s Security has been a prime concern in the home or office management. Digital door lock
security system provides security and safety to house or office owners, belongings, assets from being damaged
by external agent or undesired strangers. We have used a new technology, incoming number verification system
which gives more protection for controlling & security system. As Conventional security system does not use
any password, there is a chance to hack or break the system. In this regard we used a desire mobile number
without verification which doesn’t allow the door to be opend.This system is composed of the microcontroller
based by using matrix keypad & GSM/CDMA network. The microcontroller based digital door lock security
system is an access control system that allows only authorized persons to access restricted area. The password
is stored in PROM so that we can change it any time. The system has a matrix keypad .When anyone enter the
code in the matrix keypad, microcontroller verify the codes. If that code is correct the device will operate and
the door will be open. But if someone enter wrong code a red signal will be shown which means that the entered
code is wrong.GSM/CDMA module can be used to operate the device, when anyone make a call from his mobile
the receiving device which is set in main circuitry will receive the call. If the call is from desired number then
operate the device and the door will be unlocked. An IPS circuit can be used for giving backup in case of
emergency when there is a power failure.
Keywords: DTMF encoder and decoder, Global System for Mobile Communication, Micro-Controller, Mobile
phone, and Matrix Keypad.

                                              I. Introduction
         Tones generated from DTMF keypad can identify what unit we want to control, as well as which
unique function we want to perform. A standard 4*4 matrix keyboard can be used support either DP or DTMF
modes.DTMF encoder technologies does not require any radiation or any laser beam, not harmful, no limitation
of range. It can be used from any distance using a simple telephone line or mobile phone. The UM91214B is a
single chip, silicon gate. It provides dialing pulse (DP). IC UM91214B is consists of telephone set which is
present in the remote place (Be your workspace) signal are sent through this telephone or mobile. For
GSM/CDMA based controlling system, press a button in the telephone set keypad, a connection is made that
generates a resultant signal of two tones at the same time. These two tones are taken from row frequency and
column frequency. The resultant frequency signal is called “Duel Tone Multiple Frequency “These tone are
identical and Unique.MT-8870 operating function include a band split filter that separates the high and low
tones of the received pair, and a digital decoder that verifies both the frequency and duration of the received
tones before passing the resulting 4-bit code to the output bus.




                                            www.iosrjournals.org                                        38 | Page
Microcontroller Based Reprogrammable Digital Door Lock Security System By Using Keypad &

                                II. System Architecture & Operation:




                                 Fig 1. Shows the block diagram of the system.

In the above fig1.shows block diagram of the system keypad are a part of human machine interface where
human interaction or human input is needed and play an important role in a small embedded system. A digital
encoder is a device that converts tone signal into a sequence of digital pulse. By counting a single bit or by
decoding a set of bits, the pulse can be converted to relative or absolute pulse can be converted to relative or
absolute position measurement.DTMF decoder detects the dial tone from a cell phone and decodes the keypad
pressed on the remote cell phone. Microcontroller units are used for special or fixed type operation.
Microcontrollers are used in automatically controlled products and devices, such as remote control, appliances
etc.Relay interfacing unit interface between the loads and controlling circuit. A relay is a protective device
driven from controlling circuit directly.LED unit indicates the “ON” “OFF” position of the connected load. If
LED is turn ON, then corresponding load is ON. When LED is OFF then corresponding load is OFF.DOOR
have been used as LOAD.

                                  III.   Design of System Hardware
         System hardware designing composed of ENCODER, DECODER and MICROCONTROLLER. These
are consists of matrix keypad, IC-UM91214B, IC-(MT8870D), IC-(PIC-16F628A), Zener diode, LED, Resistor,
Capacitor, Relay. Microcontroller verifies the codes. Encoder is a device that converts tone signal into sequence
of digital pulse. Decoder detects the dial tone from a telephone line and decodes the keypad pressed on the
remote telephone. Fig 2. Is the circuit diagram of digital door lock security system and Fig 3. Shows practical
implementation.




                                           www.iosrjournals.org                                        39 | Page
Microcontroller Based Reprogrammable Digital Door Lock Security System By Using Keypad &




                          Fig 2. Circuit diagram of Digital Door lock security system.




                            Fig 3. shows the practrical implementation of the circuit.

                            IV. Selection Of MICROCONTROLLER:
         Microcontroller is special types of processor which we used for special or fixed type operation. A
Microcontroller is a small computer on a signal integrated circuit containing a processor core, memory and
programmable input/output peripherals. The main function for PIC16F628A microcontroller which specify the
ON and OFF state of the switches. The program for the microcontroller is designed in such a way that when we
make a call from our transmitting device, it would be automatically received by Decoder circuit and it will offer
a password code for security purpose. After verifying the password code it will give the access to operate the
circuit.

                                       V. Working of IC Mt8870:
           The MT-8870 is a full DTMF receiver that integrates both band split filter and decoder function into a
single 18-pin DIP. Its filter section uses switched capacitor technology for both the high and low group filters
and for dial tone rejection. Its decoder uses digital counting techniques to detector and decodes all 16 DTMF
tone pairs into a 4-bit code. External component count is minimized by provision of an on-chip differential input
amplifier clock generator and latched tri-state interface bus.MT-8870 operating functions include a band split
filter that separates the high and low tones of the received pair, and a digital decoder that verifies both the
frequency and duration of the received tones before passing the resulting 4-bit code to the output bus.




                                            www.iosrjournals.org                                       40 | Page
Microcontroller Based Reprogrammable Digital Door Lock Security System By Using Keypad &

                                    VI. Working of IC Um91214b:
          This unit consists of telephone set which is present in the remote place. This may be workspace (office/
school) phone or mobile phone or a phone in PCO. Signals are sent through this telephone. It uses DTMF
encoder integrated circuit, chip UM91214B.This IC produces DTMF signals. It contains four row frequencies &
three column frequencies. The pins of the IC91214B from 12 to 14 produces high frequency column group and
pins from 15 to 18 produces the low frequency row group. By pressing any key in the keyboard corresponding
DTMF signal is available in its output pin at pin no 7.For producing the appropriate signals it is necessary that a
crystal oscillator of 3.58MHz is connected across its pins 3 & 4 so that it makes a part of its internal oscillator.
This encoder IC requires a voltage of 3V.For that IC is wired around 4.5 battery and 3V backup VCC for this IC
is supplied by using 3.2V zener diode. By pressing the number 5 in the keypad the output tone is produced
which is the resulting of addition of two frequencies at pin no 13 & 16 of the IC and respective tone which
represents number „5‟ in keypad is produced at pin no 7 of the IC (This signal is sent to the local control system
through telephone line via exchange).

                                          VII. Keypad Matrix:
         Password is given in our system by using keypad. Keypad may be similar as telephone set‟s keypad.
Function of this keypad is also same as the telephone. When you press buttons on the keypad, a connection is
made that generates two tones at the same time. A “Row” tone and a “column” tone. These two tones identify
the key you pressed to any equipment you are controlling. If the keypad is on your phone, the telephone
company‟s “central office “equipment knows what number you are dialing by these tones, and will switch your
call accordingly. If you are using a DTMF keypad to remotely control equipment, the tones can identify what
unit you want to control, as well as which unique function you want it to perform. When you press the digit 1 on
the keypad, you generate the tones 1209 Hz and 697 Hz. Pressing the digit 2 will generate the tones 1336 Hz
and 697 Hz. Sure, the tone 697 is the same for both digits, but it takes two tones to make a digit and the
decoding equipment knows the difference between the 1209 Hz that would complete the digit 1, and a1336 Hz
that completes a digit 2.There are many methods but the basic logic is same .

                      VIII. GSM/CDMA BASED CONTROLLING SYSTEM
          If you press a button in the telephone set keypad, a connection is made that generates a resultant signal
of two tones at the same time. These two tones are taken from a row frequency and a column frequency. The
resultant frequency signal is called “DTMF”. In GSM, DTMF signal is discretized.These tones are identical and
unique. A DTMF signal is the algebraic sum of two different audio frequencies, and can be expressed as
follows:
F(t)=A₀ Sin(2* *fa*fb*t)+B₀ Sin(2*∏*fa*fb*t)………>(1)
Where fa and fb are two different frequencies A and B as their peak amplitudes. Each of the low and high
frequency groups comprise four frequencies from the various keys present on the telephone keypad. Two
different frequencies, one from the high frequency group and another from the low frequency group are used to
produce a DTMF signal to represent the pressed key. The amplitude of the two sine waves should be such that
(0.7<(A/B)<0.9)V……………………………………………………(2)
The frequencies are chosen such that they are not the harmonics of each other. The frequencies associated with
various keys on the keypad. When you send these DTMF signals to the telephone exchange through cables, the
servers in the telephone exchange identifies these signals and makes the connection to the person you are
calling.

                                           IX. FILTER SECTION
          Separation of the low-group and high group tones is achieved by applying he DTMF signal to the
inputs to two sixth-order switched capacitor band pass filters, the bandwidths of which correspond to the low
and high group frequencies. The filter section also incorporates notches at 350 and 440 Hz for exceptional dial
tone rejection.
          Each filter output is followed by a single order switched capacitor filter section which smoothes the
signal prior to limiting. Limiting is performed by high- gain comparators which are provided with hysteresis to
prevent detection of unwanted low-level signals. The outputs of the comparators provide fill rail logic swings at
the frequencies of the incoming DTMF signals.
          The filter also incorporates notches at 350 and 440 Hz, providing excellent dial tone rejection. Each
filter output is followed by a single-order switched capacitor section that smoothes the signals prior to limiting.
Signal limiting is performed by high gain comparators provided with hysteresis to prevent detection of
unwanted low-level signals and noise. The MT-8870 decoder uses a digital counting technique to determine the
frequencies of the limited tones and to verify that they correspond to standard DTMF frequencies. When the
detector recognizes the simultaneous presence of two valid tones (known as signal condition), it raises the Early
                                             www.iosrjournals.org                                         41 | Page
Microcontroller Based Reprogrammable Digital Door Lock Security System By Using Keypad &

Steering flag(ESt). Any subsequent loss of signal condition will cause ESt to fall. Before a decoded tone pair is
registered, the receiver checks for valid signal duration( referred to as character recognition-condition) this
check is performed by an external RC time constant driven by ESt. a short delay to allow the output latch to
settle, the delayed steering output flag(StD) foes high, signaling that a received tone pair has been registered.
The contents of the output latch are made available of the 4-bit output bus by raising the three state control
input(OE) to logic high. Inhibit mode is enabled by a logic high input to pin 5(INH). It inhibits the detection of
1633 Hz.
The output code will remain the same as the previous detected code. On the MT-8870 models, this pin is tied to
ground (logic low)
The input arrangement of the MT-8870 provides a differential input operational amplifier as well as a bias
source (VREF) to bias the inputs at mid-rail. Provision is made for connection of a feedback resistor to the op-
amp output (GS) for gain adjustment.

                                X. GSM/CDMA Network based OPERATION:
         Digital Door Lock security system can be operated in two ways. One is by using matrix keypad and
another one is by using GSM/CDMA network. A DTMF circuit is employed which is connected to a mobile
phone as a receiving device. For different keys of the mobile or telephone DTMF decoder decodes multiple
frequencies which will be further used to control the household or Industrial Appliance. A program is written for
PIC16F628A microcontroller which specify the ON and OFF state of the switches. The microcontroller program
is loaded in the PIC16F628A microcontroller using a loader. An IPS circuit can be used for giving back up in
case of power failure.
         And our mobile or telephone is the transmitting device of this experiment. The program for the
microcontroller is so designed that when we make a call from our transmitting device, it would be received by
decoder circuit and it will offer a pass code barrier for security purposes. After verifying the pass code it will
give the access to operate the circuit.

                             XI. Conclusion And Further Recommendations
          This paper presents one solution for user friendly, easily maintained, lower power consumption, less
expensive remote door lock system. The system is based on matrix keypad and GSM/CDMA technology. In this
project we have used a new technology incoming number verification system for controlling and security
system. We used a desired mobile number without verification which does not allow the door to be opened.
Some technologies are commercially available which allow remote home appliance controlling through internet
which is undoubtedly emerging. But it lacks the true sense of real mobility. In search of a true remote and
adequately secure solution to be really effective and realizable, mobile telephony is better than any other
solutions. Of late, the system can also be the combination of hardware and software and Artificial intelligence
based Door lock security system design on the future development needs. The system also can be used in
hospitals, libraries, parks and museums, such as urgent security and remote observation of the site for the
protection purpose from threat of damage and destruction.

                                                         References
[1]  Syam Krishna, J. Ravindra, Design and Implementation of Remote Home Security System Based on WSNS and G SM Technology,
     IJESAT, Vol. 2, Special issue-1,PP.139-142, January-February, 2012.
[2] Design and Implementation of Pyroelectric Infrared Sensor Based Security System Using Microcontroller, Proceeding of the 2011
     IEEE Students‟ Technology Symposium 14-16 January, 2011, IIT Kharagpur.
[3] Automated advanced industrial and home security using GSM and FPGA, Department of Electronics and Communication Engineering
     BV.CEngineering college, Odalarevu, Amalapuram,India.
[4] AT Commands Set for Nokia GSM and WCDMA products, version 1.2, July 2005, available.
[5] Ren Fengyuan, Huang Haining, Lin Chuang, “Wireless sensor network”, Journal of Software Vol. 14, No. 7, PP.1282-1291, March,
     2003 (in Chinese).
[6] http://www.scribd.com/doc/27053839/activating-an-electrical-device-via-dtmf-telephone
[7] http://www.quasarelectronics.com/3075-pic-microcontroller-traine-with-5-function.htm
[8] http://www.electro-tech-online.com/microcontrollers/18814-dtmf-tone-pic16f84.html
[9] http://www.embedds.com/-software-based-dtmf-remote-control
[10] http://www.electronics-lab.com/blog/?=microcontroller&paged=43
[11] http://electrofriends.com/projects/basis-electronics/device-control-using-telephone




                                                  www.iosrjournals.org                                                42 | Page

Weitere ähnliche Inhalte

Was ist angesagt?

Wireless Communication via Mobile Phone Using DTMF
Wireless Communication via Mobile Phone Using DTMF Wireless Communication via Mobile Phone Using DTMF
Wireless Communication via Mobile Phone Using DTMF Vivek chan
 
Microcontroller remote controlling project
Microcontroller remote controlling projectMicrocontroller remote controlling project
Microcontroller remote controlling projectBipro Roy
 
Dtmf based home appliance control 2
Dtmf based home appliance control 2Dtmf based home appliance control 2
Dtmf based home appliance control 2Krish Karn
 
IRJET- DTMF based Control Robot using Arduino
IRJET- DTMF based Control Robot using ArduinoIRJET- DTMF based Control Robot using Arduino
IRJET- DTMF based Control Robot using ArduinoIRJET Journal
 
Cell phone based dtmf controlled
Cell phone based dtmf controlledCell phone based dtmf controlled
Cell phone based dtmf controlledslmnsvn
 
DTMF based home automation with ADRUINO
DTMF based home automation with ADRUINODTMF based home automation with ADRUINO
DTMF based home automation with ADRUINOFucck
 
DTMF based Home Applicance System
DTMF based Home Applicance SystemDTMF based Home Applicance System
DTMF based Home Applicance SystemDaksh Raj Chopra
 
Cell Phone Controlled Home Automation System using DTMF Technology
Cell Phone Controlled Home Automation System using DTMF TechnologyCell Phone Controlled Home Automation System using DTMF Technology
Cell Phone Controlled Home Automation System using DTMF TechnologyTaufique Sekh
 
Dtmf based appliances control system for rural and agricultural applications
Dtmf based appliances control system for rural and agricultural applicationsDtmf based appliances control system for rural and agricultural applications
Dtmf based appliances control system for rural and agricultural applicationsSa Saikiran
 
Home automation control system using dtmf technology
Home automation control system using dtmf technologyHome automation control system using dtmf technology
Home automation control system using dtmf technologyGovind Ekshinge
 
DTMF base Mobile controlled appliances control
DTMF base Mobile controlled  appliances controlDTMF base Mobile controlled  appliances control
DTMF base Mobile controlled appliances controlGopal Bardhan
 
Home automation using dtmf decoder
Home automation using dtmf decoderHome automation using dtmf decoder
Home automation using dtmf decoderJagadeesh Yadav
 
Paper id 36201529
Paper id 36201529Paper id 36201529
Paper id 36201529IJRAT
 
Arm Robot Surveillance Using Dual Tone Multiple Frequency Technology
Arm Robot Surveillance Using Dual Tone Multiple Frequency TechnologyArm Robot Surveillance Using Dual Tone Multiple Frequency Technology
Arm Robot Surveillance Using Dual Tone Multiple Frequency TechnologyIJERA Editor
 
Home automation using dtmf
Home automation using dtmfHome automation using dtmf
Home automation using dtmfAjay Naidu Jami
 
DTMF BASED MOBILE CONTROLL ROBOT SYSTEM
DTMF BASED MOBILE CONTROLL ROBOT SYSTEMDTMF BASED MOBILE CONTROLL ROBOT SYSTEM
DTMF BASED MOBILE CONTROLL ROBOT SYSTEMiindranilsarkar
 
Smart Door Lock System Using DTMF
Smart Door Lock System Using DTMFSmart Door Lock System Using DTMF
Smart Door Lock System Using DTMFBirinchi Medhi
 
INTELLIGENT ACCESS CONTROL. TIME &amp; ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME &amp; ATTENDANCE SYSTEMINTELLIGENT ACCESS CONTROL. TIME &amp; ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME &amp; ATTENDANCE SYSTEMwisdom0313
 

Was ist angesagt? (19)

Wireless Communication via Mobile Phone Using DTMF
Wireless Communication via Mobile Phone Using DTMF Wireless Communication via Mobile Phone Using DTMF
Wireless Communication via Mobile Phone Using DTMF
 
Microcontroller remote controlling project
Microcontroller remote controlling projectMicrocontroller remote controlling project
Microcontroller remote controlling project
 
Dtmf based home appliance control 2
Dtmf based home appliance control 2Dtmf based home appliance control 2
Dtmf based home appliance control 2
 
IRJET- DTMF based Control Robot using Arduino
IRJET- DTMF based Control Robot using ArduinoIRJET- DTMF based Control Robot using Arduino
IRJET- DTMF based Control Robot using Arduino
 
Cell phone based dtmf controlled
Cell phone based dtmf controlledCell phone based dtmf controlled
Cell phone based dtmf controlled
 
DTMF based home automation with ADRUINO
DTMF based home automation with ADRUINODTMF based home automation with ADRUINO
DTMF based home automation with ADRUINO
 
DTMF based Home Applicance System
DTMF based Home Applicance SystemDTMF based Home Applicance System
DTMF based Home Applicance System
 
Cell Phone Controlled Home Automation System using DTMF Technology
Cell Phone Controlled Home Automation System using DTMF TechnologyCell Phone Controlled Home Automation System using DTMF Technology
Cell Phone Controlled Home Automation System using DTMF Technology
 
Dtmf based appliances control system for rural and agricultural applications
Dtmf based appliances control system for rural and agricultural applicationsDtmf based appliances control system for rural and agricultural applications
Dtmf based appliances control system for rural and agricultural applications
 
Home automation control system using dtmf technology
Home automation control system using dtmf technologyHome automation control system using dtmf technology
Home automation control system using dtmf technology
 
DTMF
DTMFDTMF
DTMF
 
DTMF base Mobile controlled appliances control
DTMF base Mobile controlled  appliances controlDTMF base Mobile controlled  appliances control
DTMF base Mobile controlled appliances control
 
Home automation using dtmf decoder
Home automation using dtmf decoderHome automation using dtmf decoder
Home automation using dtmf decoder
 
Paper id 36201529
Paper id 36201529Paper id 36201529
Paper id 36201529
 
Arm Robot Surveillance Using Dual Tone Multiple Frequency Technology
Arm Robot Surveillance Using Dual Tone Multiple Frequency TechnologyArm Robot Surveillance Using Dual Tone Multiple Frequency Technology
Arm Robot Surveillance Using Dual Tone Multiple Frequency Technology
 
Home automation using dtmf
Home automation using dtmfHome automation using dtmf
Home automation using dtmf
 
DTMF BASED MOBILE CONTROLL ROBOT SYSTEM
DTMF BASED MOBILE CONTROLL ROBOT SYSTEMDTMF BASED MOBILE CONTROLL ROBOT SYSTEM
DTMF BASED MOBILE CONTROLL ROBOT SYSTEM
 
Smart Door Lock System Using DTMF
Smart Door Lock System Using DTMFSmart Door Lock System Using DTMF
Smart Door Lock System Using DTMF
 
INTELLIGENT ACCESS CONTROL. TIME &amp; ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME &amp; ATTENDANCE SYSTEMINTELLIGENT ACCESS CONTROL. TIME &amp; ATTENDANCE SYSTEM
INTELLIGENT ACCESS CONTROL. TIME &amp; ATTENDANCE SYSTEM
 

Andere mochten auch

Tracking your emails with mailtracking.com
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.combelieve52
 
Challenging Retrieval Scenarios: Social Media and Linked Open Data
Challenging Retrieval Scenarios: Social Media and Linked Open DataChallenging Retrieval Scenarios: Social Media and Linked Open Data
Challenging Retrieval Scenarios: Social Media and Linked Open DataThomas Gottron
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
Micro-Propagation of Aloe indica L. Through Shoot Tip Culture
Micro-Propagation of Aloe indica L. Through Shoot Tip CultureMicro-Propagation of Aloe indica L. Through Shoot Tip Culture
Micro-Propagation of Aloe indica L. Through Shoot Tip CultureIOSR Journals
 
Masthead Analysis
Masthead AnalysisMasthead Analysis
Masthead AnalysisTemibaybee
 
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...Thomas Gottron
 

Andere mochten auch (20)

Tracking your emails with mailtracking.com
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.com
 
Challenging Retrieval Scenarios: Social Media and Linked Open Data
Challenging Retrieval Scenarios: Social Media and Linked Open DataChallenging Retrieval Scenarios: Social Media and Linked Open Data
Challenging Retrieval Scenarios: Social Media and Linked Open Data
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
B0160709
B0160709B0160709
B0160709
 
H0934549
H0934549H0934549
H0934549
 
M0537683
M0537683M0537683
M0537683
 
Trashing Utopia 2015
Trashing Utopia   2015 Trashing Utopia   2015
Trashing Utopia 2015
 
Micro-Propagation of Aloe indica L. Through Shoot Tip Culture
Micro-Propagation of Aloe indica L. Through Shoot Tip CultureMicro-Propagation of Aloe indica L. Through Shoot Tip Culture
Micro-Propagation of Aloe indica L. Through Shoot Tip Culture
 
D0532025
D0532025D0532025
D0532025
 
Masthead Analysis
Masthead AnalysisMasthead Analysis
Masthead Analysis
 
H0954451
H0954451H0954451
H0954451
 
C0931115
C0931115C0931115
C0931115
 
E0432832
E0432832E0432832
E0432832
 
D0961927
D0961927D0961927
D0961927
 
A0310106
A0310106A0310106
A0310106
 
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
ESWC 2013: A Systematic Investigation of Explicit and Implicit Schema Informa...
 
Odyssey Company Presentation
Odyssey Company Presentation   Odyssey Company Presentation
Odyssey Company Presentation
 
E01053539
E01053539E01053539
E01053539
 
A0930105
A0930105A0930105
A0930105
 
Presentation4
Presentation4Presentation4
Presentation4
 

Ähnlich wie F0463842

IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Cell operated land rover robot
Cell operated land rover robotCell operated land rover robot
Cell operated land rover robotChetan Kataria
 
Smart DoorLock System using DTMF
Smart DoorLock System using DTMFSmart DoorLock System using DTMF
Smart DoorLock System using DTMFBirinchi Medhi
 
Cell Phone Operated Land Rover
Cell Phone Operated Land RoverCell Phone Operated Land Rover
Cell Phone Operated Land RoverSanjay Talukdar
 
WORLDWIDE REMOTE DEVICE ACCESS SYSTEM
WORLDWIDE REMOTE DEVICE ACCESS SYSTEMWORLDWIDE REMOTE DEVICE ACCESS SYSTEM
WORLDWIDE REMOTE DEVICE ACCESS SYSTEMguest55c6bd
 
DTMF CONTROLLED ROBOT
DTMF CONTROLLED ROBOTDTMF CONTROLLED ROBOT
DTMF CONTROLLED ROBOTnarendra019
 
cellphone based device control
cellphone based device controlcellphone based device control
cellphone based device controlstudent
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadNishanth C
 
home autimation using GSM
home autimation using GSMhome autimation using GSM
home autimation using GSMramraj meena
 
Dtmf technology
Dtmf technologyDtmf technology
Dtmf technologytchikou10
 
Bw32898902
Bw32898902Bw32898902
Bw32898902IJMER
 
Mobile operated spy robot
Mobile operated spy robotMobile operated spy robot
Mobile operated spy robotKevin Nesamani
 
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEMHOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEMpaperpublications3
 
Mobile Controlled Car
Mobile Controlled CarMobile Controlled Car
Mobile Controlled CarMalik Zaid
 

Ähnlich wie F0463842 (20)

ivr system
ivr systemivr system
ivr system
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
G3602050055
G3602050055G3602050055
G3602050055
 
J04701080085
J04701080085J04701080085
J04701080085
 
Cell operated land rover robot
Cell operated land rover robotCell operated land rover robot
Cell operated land rover robot
 
Smart DoorLock System using DTMF
Smart DoorLock System using DTMFSmart DoorLock System using DTMF
Smart DoorLock System using DTMF
 
Cell Phone Operated Land Rover
Cell Phone Operated Land RoverCell Phone Operated Land Rover
Cell Phone Operated Land Rover
 
WORLDWIDE REMOTE DEVICE ACCESS SYSTEM
WORLDWIDE REMOTE DEVICE ACCESS SYSTEMWORLDWIDE REMOTE DEVICE ACCESS SYSTEM
WORLDWIDE REMOTE DEVICE ACCESS SYSTEM
 
DTMF CONTROLLED ROBOT
DTMF CONTROLLED ROBOTDTMF CONTROLLED ROBOT
DTMF CONTROLLED ROBOT
 
Ad830 user manual
Ad830 user manualAd830 user manual
Ad830 user manual
 
F04123137
F04123137F04123137
F04123137
 
cellphone based device control
cellphone based device controlcellphone based device control
cellphone based device control
 
Advanced vehicle security system 2016 upload
Advanced vehicle security system 2016 uploadAdvanced vehicle security system 2016 upload
Advanced vehicle security system 2016 upload
 
home autimation using GSM
home autimation using GSMhome autimation using GSM
home autimation using GSM
 
Dtmf technology
Dtmf technologyDtmf technology
Dtmf technology
 
Bw32898902
Bw32898902Bw32898902
Bw32898902
 
Mobile operated spy robot
Mobile operated spy robotMobile operated spy robot
Mobile operated spy robot
 
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEMHOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
HOME AUTOMATION WITH SPY ROBOT AND SECURITY SYSTEM
 
DTM Decoder
DTM DecoderDTM Decoder
DTM Decoder
 
Mobile Controlled Car
Mobile Controlled CarMobile Controlled Car
Mobile Controlled Car
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Kürzlich hochgeladen

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 

Kürzlich hochgeladen (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 

F0463842

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676 Volume 4, Issue 6 (Mar. - Apr. 2013), PP 38-42 www.iosrjournals.org Microcontroller Based Reprogrammable Digital Door Lock Security System by Using Keypad & GSM/CDMA Technology Mohammad Amanullah (Lecturer, Department of Computer Science and Engineering, International Islamic University Chittagong. Bangladesh. Abstract: Now a day’s Security has been a prime concern in the home or office management. Digital door lock security system provides security and safety to house or office owners, belongings, assets from being damaged by external agent or undesired strangers. We have used a new technology, incoming number verification system which gives more protection for controlling & security system. As Conventional security system does not use any password, there is a chance to hack or break the system. In this regard we used a desire mobile number without verification which doesn’t allow the door to be opend.This system is composed of the microcontroller based by using matrix keypad & GSM/CDMA network. The microcontroller based digital door lock security system is an access control system that allows only authorized persons to access restricted area. The password is stored in PROM so that we can change it any time. The system has a matrix keypad .When anyone enter the code in the matrix keypad, microcontroller verify the codes. If that code is correct the device will operate and the door will be open. But if someone enter wrong code a red signal will be shown which means that the entered code is wrong.GSM/CDMA module can be used to operate the device, when anyone make a call from his mobile the receiving device which is set in main circuitry will receive the call. If the call is from desired number then operate the device and the door will be unlocked. An IPS circuit can be used for giving backup in case of emergency when there is a power failure. Keywords: DTMF encoder and decoder, Global System for Mobile Communication, Micro-Controller, Mobile phone, and Matrix Keypad. I. Introduction Tones generated from DTMF keypad can identify what unit we want to control, as well as which unique function we want to perform. A standard 4*4 matrix keyboard can be used support either DP or DTMF modes.DTMF encoder technologies does not require any radiation or any laser beam, not harmful, no limitation of range. It can be used from any distance using a simple telephone line or mobile phone. The UM91214B is a single chip, silicon gate. It provides dialing pulse (DP). IC UM91214B is consists of telephone set which is present in the remote place (Be your workspace) signal are sent through this telephone or mobile. For GSM/CDMA based controlling system, press a button in the telephone set keypad, a connection is made that generates a resultant signal of two tones at the same time. These two tones are taken from row frequency and column frequency. The resultant frequency signal is called “Duel Tone Multiple Frequency “These tone are identical and Unique.MT-8870 operating function include a band split filter that separates the high and low tones of the received pair, and a digital decoder that verifies both the frequency and duration of the received tones before passing the resulting 4-bit code to the output bus. www.iosrjournals.org 38 | Page
  • 2. Microcontroller Based Reprogrammable Digital Door Lock Security System By Using Keypad & II. System Architecture & Operation: Fig 1. Shows the block diagram of the system. In the above fig1.shows block diagram of the system keypad are a part of human machine interface where human interaction or human input is needed and play an important role in a small embedded system. A digital encoder is a device that converts tone signal into a sequence of digital pulse. By counting a single bit or by decoding a set of bits, the pulse can be converted to relative or absolute pulse can be converted to relative or absolute position measurement.DTMF decoder detects the dial tone from a cell phone and decodes the keypad pressed on the remote cell phone. Microcontroller units are used for special or fixed type operation. Microcontrollers are used in automatically controlled products and devices, such as remote control, appliances etc.Relay interfacing unit interface between the loads and controlling circuit. A relay is a protective device driven from controlling circuit directly.LED unit indicates the “ON” “OFF” position of the connected load. If LED is turn ON, then corresponding load is ON. When LED is OFF then corresponding load is OFF.DOOR have been used as LOAD. III. Design of System Hardware System hardware designing composed of ENCODER, DECODER and MICROCONTROLLER. These are consists of matrix keypad, IC-UM91214B, IC-(MT8870D), IC-(PIC-16F628A), Zener diode, LED, Resistor, Capacitor, Relay. Microcontroller verifies the codes. Encoder is a device that converts tone signal into sequence of digital pulse. Decoder detects the dial tone from a telephone line and decodes the keypad pressed on the remote telephone. Fig 2. Is the circuit diagram of digital door lock security system and Fig 3. Shows practical implementation. www.iosrjournals.org 39 | Page
  • 3. Microcontroller Based Reprogrammable Digital Door Lock Security System By Using Keypad & Fig 2. Circuit diagram of Digital Door lock security system. Fig 3. shows the practrical implementation of the circuit. IV. Selection Of MICROCONTROLLER: Microcontroller is special types of processor which we used for special or fixed type operation. A Microcontroller is a small computer on a signal integrated circuit containing a processor core, memory and programmable input/output peripherals. The main function for PIC16F628A microcontroller which specify the ON and OFF state of the switches. The program for the microcontroller is designed in such a way that when we make a call from our transmitting device, it would be automatically received by Decoder circuit and it will offer a password code for security purpose. After verifying the password code it will give the access to operate the circuit. V. Working of IC Mt8870: The MT-8870 is a full DTMF receiver that integrates both band split filter and decoder function into a single 18-pin DIP. Its filter section uses switched capacitor technology for both the high and low group filters and for dial tone rejection. Its decoder uses digital counting techniques to detector and decodes all 16 DTMF tone pairs into a 4-bit code. External component count is minimized by provision of an on-chip differential input amplifier clock generator and latched tri-state interface bus.MT-8870 operating functions include a band split filter that separates the high and low tones of the received pair, and a digital decoder that verifies both the frequency and duration of the received tones before passing the resulting 4-bit code to the output bus. www.iosrjournals.org 40 | Page
  • 4. Microcontroller Based Reprogrammable Digital Door Lock Security System By Using Keypad & VI. Working of IC Um91214b: This unit consists of telephone set which is present in the remote place. This may be workspace (office/ school) phone or mobile phone or a phone in PCO. Signals are sent through this telephone. It uses DTMF encoder integrated circuit, chip UM91214B.This IC produces DTMF signals. It contains four row frequencies & three column frequencies. The pins of the IC91214B from 12 to 14 produces high frequency column group and pins from 15 to 18 produces the low frequency row group. By pressing any key in the keyboard corresponding DTMF signal is available in its output pin at pin no 7.For producing the appropriate signals it is necessary that a crystal oscillator of 3.58MHz is connected across its pins 3 & 4 so that it makes a part of its internal oscillator. This encoder IC requires a voltage of 3V.For that IC is wired around 4.5 battery and 3V backup VCC for this IC is supplied by using 3.2V zener diode. By pressing the number 5 in the keypad the output tone is produced which is the resulting of addition of two frequencies at pin no 13 & 16 of the IC and respective tone which represents number „5‟ in keypad is produced at pin no 7 of the IC (This signal is sent to the local control system through telephone line via exchange). VII. Keypad Matrix: Password is given in our system by using keypad. Keypad may be similar as telephone set‟s keypad. Function of this keypad is also same as the telephone. When you press buttons on the keypad, a connection is made that generates two tones at the same time. A “Row” tone and a “column” tone. These two tones identify the key you pressed to any equipment you are controlling. If the keypad is on your phone, the telephone company‟s “central office “equipment knows what number you are dialing by these tones, and will switch your call accordingly. If you are using a DTMF keypad to remotely control equipment, the tones can identify what unit you want to control, as well as which unique function you want it to perform. When you press the digit 1 on the keypad, you generate the tones 1209 Hz and 697 Hz. Pressing the digit 2 will generate the tones 1336 Hz and 697 Hz. Sure, the tone 697 is the same for both digits, but it takes two tones to make a digit and the decoding equipment knows the difference between the 1209 Hz that would complete the digit 1, and a1336 Hz that completes a digit 2.There are many methods but the basic logic is same . VIII. GSM/CDMA BASED CONTROLLING SYSTEM If you press a button in the telephone set keypad, a connection is made that generates a resultant signal of two tones at the same time. These two tones are taken from a row frequency and a column frequency. The resultant frequency signal is called “DTMF”. In GSM, DTMF signal is discretized.These tones are identical and unique. A DTMF signal is the algebraic sum of two different audio frequencies, and can be expressed as follows: F(t)=A₀ Sin(2* *fa*fb*t)+B₀ Sin(2*∏*fa*fb*t)………>(1) Where fa and fb are two different frequencies A and B as their peak amplitudes. Each of the low and high frequency groups comprise four frequencies from the various keys present on the telephone keypad. Two different frequencies, one from the high frequency group and another from the low frequency group are used to produce a DTMF signal to represent the pressed key. The amplitude of the two sine waves should be such that (0.7<(A/B)<0.9)V……………………………………………………(2) The frequencies are chosen such that they are not the harmonics of each other. The frequencies associated with various keys on the keypad. When you send these DTMF signals to the telephone exchange through cables, the servers in the telephone exchange identifies these signals and makes the connection to the person you are calling. IX. FILTER SECTION Separation of the low-group and high group tones is achieved by applying he DTMF signal to the inputs to two sixth-order switched capacitor band pass filters, the bandwidths of which correspond to the low and high group frequencies. The filter section also incorporates notches at 350 and 440 Hz for exceptional dial tone rejection. Each filter output is followed by a single order switched capacitor filter section which smoothes the signal prior to limiting. Limiting is performed by high- gain comparators which are provided with hysteresis to prevent detection of unwanted low-level signals. The outputs of the comparators provide fill rail logic swings at the frequencies of the incoming DTMF signals. The filter also incorporates notches at 350 and 440 Hz, providing excellent dial tone rejection. Each filter output is followed by a single-order switched capacitor section that smoothes the signals prior to limiting. Signal limiting is performed by high gain comparators provided with hysteresis to prevent detection of unwanted low-level signals and noise. The MT-8870 decoder uses a digital counting technique to determine the frequencies of the limited tones and to verify that they correspond to standard DTMF frequencies. When the detector recognizes the simultaneous presence of two valid tones (known as signal condition), it raises the Early www.iosrjournals.org 41 | Page
  • 5. Microcontroller Based Reprogrammable Digital Door Lock Security System By Using Keypad & Steering flag(ESt). Any subsequent loss of signal condition will cause ESt to fall. Before a decoded tone pair is registered, the receiver checks for valid signal duration( referred to as character recognition-condition) this check is performed by an external RC time constant driven by ESt. a short delay to allow the output latch to settle, the delayed steering output flag(StD) foes high, signaling that a received tone pair has been registered. The contents of the output latch are made available of the 4-bit output bus by raising the three state control input(OE) to logic high. Inhibit mode is enabled by a logic high input to pin 5(INH). It inhibits the detection of 1633 Hz. The output code will remain the same as the previous detected code. On the MT-8870 models, this pin is tied to ground (logic low) The input arrangement of the MT-8870 provides a differential input operational amplifier as well as a bias source (VREF) to bias the inputs at mid-rail. Provision is made for connection of a feedback resistor to the op- amp output (GS) for gain adjustment. X. GSM/CDMA Network based OPERATION: Digital Door Lock security system can be operated in two ways. One is by using matrix keypad and another one is by using GSM/CDMA network. A DTMF circuit is employed which is connected to a mobile phone as a receiving device. For different keys of the mobile or telephone DTMF decoder decodes multiple frequencies which will be further used to control the household or Industrial Appliance. A program is written for PIC16F628A microcontroller which specify the ON and OFF state of the switches. The microcontroller program is loaded in the PIC16F628A microcontroller using a loader. An IPS circuit can be used for giving back up in case of power failure. And our mobile or telephone is the transmitting device of this experiment. The program for the microcontroller is so designed that when we make a call from our transmitting device, it would be received by decoder circuit and it will offer a pass code barrier for security purposes. After verifying the pass code it will give the access to operate the circuit. XI. Conclusion And Further Recommendations This paper presents one solution for user friendly, easily maintained, lower power consumption, less expensive remote door lock system. The system is based on matrix keypad and GSM/CDMA technology. In this project we have used a new technology incoming number verification system for controlling and security system. We used a desired mobile number without verification which does not allow the door to be opened. Some technologies are commercially available which allow remote home appliance controlling through internet which is undoubtedly emerging. But it lacks the true sense of real mobility. In search of a true remote and adequately secure solution to be really effective and realizable, mobile telephony is better than any other solutions. Of late, the system can also be the combination of hardware and software and Artificial intelligence based Door lock security system design on the future development needs. The system also can be used in hospitals, libraries, parks and museums, such as urgent security and remote observation of the site for the protection purpose from threat of damage and destruction. References [1] Syam Krishna, J. Ravindra, Design and Implementation of Remote Home Security System Based on WSNS and G SM Technology, IJESAT, Vol. 2, Special issue-1,PP.139-142, January-February, 2012. [2] Design and Implementation of Pyroelectric Infrared Sensor Based Security System Using Microcontroller, Proceeding of the 2011 IEEE Students‟ Technology Symposium 14-16 January, 2011, IIT Kharagpur. [3] Automated advanced industrial and home security using GSM and FPGA, Department of Electronics and Communication Engineering BV.CEngineering college, Odalarevu, Amalapuram,India. [4] AT Commands Set for Nokia GSM and WCDMA products, version 1.2, July 2005, available. [5] Ren Fengyuan, Huang Haining, Lin Chuang, “Wireless sensor network”, Journal of Software Vol. 14, No. 7, PP.1282-1291, March, 2003 (in Chinese). [6] http://www.scribd.com/doc/27053839/activating-an-electrical-device-via-dtmf-telephone [7] http://www.quasarelectronics.com/3075-pic-microcontroller-traine-with-5-function.htm [8] http://www.electro-tech-online.com/microcontrollers/18814-dtmf-tone-pic16f84.html [9] http://www.embedds.com/-software-based-dtmf-remote-control [10] http://www.electronics-lab.com/blog/?=microcontroller&paged=43 [11] http://electrofriends.com/projects/basis-electronics/device-control-using-telephone www.iosrjournals.org 42 | Page