Ultra Sonic Nano Sequrity System

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Hope Foundation’s

Finolex Academy of Management & Technology, Ratnagiri


Academic Year 2020-21
Department of Electronics and Telecommunication Engineering

Project Guide: GROUP MEMBERS :

  PROF. VINAYAK 1.Ms. Prabukhanolkar Pragati Madhusudhan


CHAVAN. ( X-19-0015 )
2.Ms.Pokade Siddhi Nitin (X-19-0009)
3.Ms.Karkekar Purva Prakash (X-19-00058)
4.Mr.Joshi Paresh Sharadchandra (X-18-0008)
INTRODUCTION :
• Safety and security of any living or working place is one of the most primary concerns.
Today's security systems are very costly for household purpose. Thus cost-effective and
fast reactive security system is needed.

• Using latest technology and boosting the old security system for better security we have
made this ultrasonic nano security system using Arduino which is cost-effective.

• If there is intrusion through any of these access point then the sensor will detect it and
generate pulses. Generated pulses to be read by Arduino and then buzzer will active.   
Circuit diagram and working :
(Using Aurdino uno)
• Trigger pin of ultrasonic sensor is connected to pin no. 3 of
Arduino and Echo pin of sensor is connected to pin no 2 of
Arduino.

• Connected the GND on the ultrasonic sensor to GND on the


Arduino. Also connect the buzzer to arduino as shown in
circuit diagram.

• It's easily handy and portable system because we can use


battery or computer as a power supply to this system.

• Whenever anyone comes in the path/range of Ultrasonic


Sensor, microcontroller detects the distance of object from
the sensor as per program and if the object is in the defined
range, it sends the High signal to the buzzer and buzzer
starts beeping.
Arduino code :
Circuit diagram and
working:(Rasberry pi) :
• Provide trigger signal to TRIG input, it requires a HIGH signal
of atleast 10μS duration.

• This enables the module to transmit eight 40KHz ultrasonic


burst. TITLE

• If there is an obstacle in-front of the module, it will reflect


those ultrasonic waves

• If the signal comes back, the ECHO output of the module will
be HIGH for a duration of time taken for sending and
TITLE
receiving ultrasonic signals. The pulse width ranges from
150μS to 25mS depending upon the distance of the obstacle
from the sensor and it will be about 38ms if there is no
obstacle.
Rasberry pi code:
Simulation result :
Before : After :
Thing at distance greater than 50cm. Thing at distance less than 50cm.
• Buzzer : Low • Buzzer : High
• Red LED : Low • Red LED : High
• Green LED : High • Green LED : Low
CONCLUSION :

The design and implementation of


(using tinkercad ) has been
proven to be a reasonable advancement in security system technology and access control.
The computer interface has expanded the flexibility of the multi-functional microcontroller.As a
result, we were able to get the notification on our smart phones as soon as there was any
change in the status of the reed module sensor. Also the additional ability to control the alarm
remotely is very beneficial and can be very useful in some unforeseen circumstances. This is a
major breakthrough in digital design and technological advancement in general.
Future scope :
• It can be used for high security in banks and other organization.

• Connecting more devices.

• Video recording once alarm get triggered.

• We can determine the position of the intruder and then send a SMS to the concerned
authorities.
REFERENCES :
"About Us". InsteonSmartGrid.com. Retrieved 2009-11-20.

https://create.arduino.cc/projecthub/Will_the_Star/ultrasonic-tripwire-fe5475

http://www.ijirst.org/articles/IJIRSTV2I11142.pdf

https://en.wikipedia.org/wiki/Ultrasonics

Webster and J. Brown, “Changes in Aromatic Chemistry and Sensory Quality of Milk Due to Light
Wavelength,” Dual tone multi frequency, Ph.D. Dept.
Food Science and Technology, pp 85-86, 6th July, 2008.
THANKS

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy