Sie sind auf Seite 1von 27

Abstract

The objective of this project is to design a system which will enable users to remotely
control their car security feature using a cell phone-based interface. To access the car, the
user should send an authentication code along with the required/desired function/action to
his/her control system via GSM. Upon being properly authenticated, the cell phone-based
interface (control unit) would relay the commands to a microcontroller that would
perform the required function/action e.g. enables or disables the vehicle par adventure it
has been tampered with.
This is basically an electronic device fitted to an automobile which prevents the engine
from running unless the correct key (or other token) is present. This prevents the car from
being "hot-wired" after entry has been achieved.

CHAPTER ONE
INTRODUCTION
An anti-theft system is any device or method used to prevent or deter the unauthorized
appropriation of items considered valuable. Theft is one of the most common and oldest
criminal behaviours. Where the ownership of a physical possession can be altered
without the rightful owner's consent, theft prevention has been introduced to assert the
ownership whenever the rightful owner is physically absent. Anti-theft systems have been
around since individuals began stealing other people's property and have evolved
accordingly to thwart increasingly complex methods of theft. From the invention of the
first lock and key to the introduction of RFID tags and biometric identification, anti-theft
systems have evolved to match the introduction of new inventions to society and the
resulting theft of them by others. In the case of vehicle theft, the best deterrent to theft is
in the installation of an approved vehicle anti-theft immobilizer. Many vehicles have
OEM (factory installed) units and afford protection through the ignition system. OEM
immobilizers function through the ECM/PCM (computer) under the hood of the vehicle.
In general terms, the RFID tag attached to the key must be read by the ECM in order to
allow ignition to occur. Unfortunately, organized crime is able to bypass these systems
and steal any vehicle at will. An approved immobilizer uses a 3 circuit isolation system
which thwarts even the most experienced thief.

1.1

Present Scenario

The efficacy of our security system has been in question over the last few years owing to
the wide spread global crime that has caused huge loses to man in generality. Despite all
the efforts that have been expended to this bizarre situation little or no result has been
realized.
Security, as used in this context, describes measures that prevent or defer unsolicited
intrusion from accessing a vehicle by disabling the ignition or gasoline supply with the
use of mobile phone.
2

Motor vehicle theft has been a problem since the start of the automobile age. The 1900
Leach automobile featured a removable steering wheel that the driver could carry away to
prevent unauthorized vehicle use. More recently, sophisticated electronic alarms, some of
which incorporate radio beacons, and more tamper-resistant wiring and electronic locks
have been produced. Through the use of wireless technology, vehicles equipped with
Global Positioning System (GPS) satellite navigation systems may be tracked and
recovered when stolen.
Automobiles as we know them today are the product of centuries of tinkering and
innovation. Automobile production has grown from small companies making simple socalled horseless carriages to international corporations that mass-produce advanced,
reliable automobiles for consumers.
Automobile theft has become a $3 billion-a-year business, with over 1 million cars stolen
annually. In the past, most cars were stolen by joyriders and later abandoned; more than
90 percent of all stolen autos were recovered. Today, the typical thief works for a chop
shop, which dismantles the car and sells the parts (these are much more valuable than
the whole car itself); a much smaller proportion of automobiles are recovered.
Some insurance companies are fighting losses from auto theft by giving premium credits
for use of antitheft devices. Others now charge a substantial deductible in cases where the
insured leaves the keys in the ignition or is otherwise negligent.
In the 15th century, Italian inventor Leonardo da Vinci envisioned possibilities for
power-driven vehicles.

In this project a new concept is brought to the awareness of individuals; this scheme uses
a technology called DTMF Dual Tone Multi Frequency in its signaling technique to
control the action of vehicles against unauthorized user in other to dictate its action e.g.
engage/disable the door, engage/disable the brain box or and a combination of different
electrical action thus making its application a very vast and important one.

The DTMF was originally developed to allow sending control information (dialed
numbers) across the telephone network. The telephone network has a bandwidth of
approx. 300 to 3400 Hz, suitable for voice communications. Any control tones would
also need to be in this range and had to work regardless of whether voice was present or
not. A single tone or frequency could have been used. However, if voice was present, it
would interfere with the control tones, making them useless. To overcome this, a scheme
was developed whereby two tones or frequencies were combined to represent each
control code or number. A total of seven tones were needed to represent the digits
normally found on a telephone keypad, namely 0-9, * and #. An eighth tone was added so
that some extra digits were available for use. These are commonly labeled ABCD. These
eight tones were divided into two groups of four tones each, a low-frequency group and a
high-frequency group.

Fig 1.0 DTMF table


Here a DTMF receiver chip, a CM8870 from California Micro Devices will be used for
general signaling control. It will be responsible for all the processing described above.

1.1

Description

The MT8870D/MT8870D-1 is a complete DTMF receiver integrating both the bandsplit


filter and digital decoder functions. The filter section uses switched capacitor techniques
for high and low group filters; the decoder uses digital counting techniques to detect and
decode all 16 DTMF tone-pairs into a 4-bit code. External component count is minimized
by on chip provision of a differential input amplifier, clock oscillator and latched threestate bus interface.

1.2

Problem Statement

The objective of this project is to develop a device that allows for a user to remotely
control their vehicles electrical functions. This system will be a powerful and flexible tool
that will offer this service at any time, and from anywhere with the constraints of the
technologies being applied. Possible target appliances include (but are not limited to)
climate control systems, security systems and anything with an electrical interface.
The proposed approach for designing this system is to implement an auto car lock using
gsm control module that receives its instructions and commands from a Mobile phone
over the GSM network. The microcontroller then will carry out the issued commands.
For security purposes, a means of identification and user authentication will be
implemented, and will combine caller identification with a password authorization.

1.3

Operating Environment

The control system will include two separate units: the mobile phone, and the control
unit. There will therefore be two operating environments. The mobile phone will operate
indoors and outdoors whereas the control unit will operate indoors because it resides in
the vehicle.

1.4

Assumptions

The following is a list of assumptions:


The user and control unit will establish communication via GSM.
All service charges from service provider apply.
The controlled vehicle will have to have an electrical connection via its battery in
order for it to be controlled by the controller.

CHAPTER TWO

2.0

Review of related literature

In 1980, Ford Motor Company introduced an external keypad-type keyless entry system,
wherein the driver entered a numeric combination -- either pre-programmed at the factory
or one programmed by the owner -- to unlock the car without the key. Early- to mid1980s Nissan Maximas could also be installed with a keypad, which would also retract
the windows and moon roof once the car was successfully unlocked by pushing a specific
button on the keypad.
Currently, many luxury makers also allow the windows to be opened or closed by
pressing and holding a button on the remote control key fob, or by inserting the ignition
key and holding it in the lock or unlock position in the external driver's door lock. During
the early 1990s, Subaru offered infra-red keyless entry on the Japanese Domestic Market
Legacy, installing the transmitter in the ignition key. The Legacy could also be opened by
pulling the drivers external door handle a specific number of times to enter a passcode
number that would unlock the driver's door only.

This system confirms successful (un)locking through either a light or a horn signal, and
usually offers an option to switch easily between these two variants. Both provide almost
the same functionality, though light signals are more discreet while horn signals might
create a nuisance in residential neighborhoods and other busy parking areas (e.g. shortterm parking lots). Some manufacturers offer the ability to adjust the horn signal volume.
Other cars have a proximity system that is triggered if a keylike transducer (Advanced
Key or handsfree) is within a certain distance of the car.

Early models used a static code in the ignition key (or key fob) which was recognised by
an RFID loop around the lock barrel and checked against the vehicle's Engine Control
7

Unit (ECU) for a match. If the code is unrecognised, the ECU will not allow fuel to flow
and ignition to take place. Later models use rolling codes or advanced cryptography to
defeat copying of the code from the key or ECU.

The microcircuit inside the key is activated by a small electromagnetic field which
induces current to flow inside the key body, which in turn broadcasts a unique binary
code which is read by the automobile's ECU. When the ECU determines that the coded
key is both current and valid, the ECU activates the fuel-injection sequence.

Fig 2.0

Early automobile lock from Opel.

In this project I have used the auto answer facility which is present in many of the cell
phones today, so I escaped from designing the ring detector circuit.

The aim of the system is to develop a cost effective solution that will provide controlling
of vehicles remotely and to enable it against intrusion in the absence of owner. This
system is highly feasible due to development of a low cost system. This control system
with an affordable cost was thought to be built that should be able to provide seamless
remote access via mobile phones in other to automate the conventional key lock system
thus allowing for a seamless security.
8

In this system, a cellular phone based security system that will meet todays need will be
seen at work.

2.1

Present and Future Scope:

This product is aimed toward average consumers who wish to control their vehicle
security outfit remotely from their mobile phones provided that it is electrically
controllable.
enable/disable

Example
security

of

feasible

systems,

applications

doors,

ignition,

under

consideration

steering,

dash

includes;

boards,

and

heating/ventilation/air conditioning system.

CHAPTER THREE
Basic Electrical Component Used

3.0

Resistors

Resistor is a component, which aims to determine current in a certain branch in electric


circuit according to Ohm's Law depending on the resistor value and the voltage upon it.
Every conductor has its own resistance. The resistance depends on the material
resistivity, its length and its cross-section area, the most commonly used resistors come in
cylindrical packages with 4 colored rings three are close to each other and one is
slightly away. Three close rings indicate value of the resistor and the forth its tolerance.
The sole purpose of resistors as used here is to limit the flow of current in the circuit that
they are part of.

3.1

Capacitors

These are devices that might be considered simply frequency dependent resistors. A
capacitors is more complicated than a resistor, the current is not simply proportional to
the voltage, but rather to the rate of change of voltage. Capacitors consist of two metal
plates that are separated by an insulating material .If a battery is connected to both plates;
an electric charge will flow for a short time and accumulate on each plate. If the battery is
disconnected, the capacitor retains the charge and the voltage associated with it. Rapidly
changing voltages, such as caused by an audio or radio signal, produce larger current
flows to and from the plates; the capacitor then functions as a conductor for the changing
current. This effect can be used, for example, to separate an audio or radio signal from a
direct current in order to connect the output of one amplifier stage to the input of the next
amplifier stage. Capacitors are employed in circuits for any of the following purposes;
bypass coupling, filtering, energy storage and resonant circuits.

10

3.2

Transistors

Transistors are made from semiconductors. These are materials, such as silicon or
germanium, that are doped (have minute amounts of foreign elements added) so that
either an abundance or a lack of free electrons exists. In the former case, the
semiconductor is called n-type, and in the latter case, p-type. By combining n-type and ptype materials, a diode can be produced. When this diode is connected to a battery so that
the p-type material is positive and the n-type negative, electrons are repelled from the
negative battery terminal and pass unimpeded to the p-region, which lacks electrons.
With battery reversed, the electrons arriving in the p-material can pass only with
difficulty to the n-material, which is already filled with free electrons, and the current is
almost zero.

Transistors function majorly as switch or amplifiers. To function as a switch, the


transistor has to be biased into saturation i.e. the base voltage exceeds 0.7v for silicon
type and 0.3v for germanium type. The transistors in this circuit all function as amplifiers
speed switches.

3.3

Led Displays

Basically, LED displays are nothing else but several LEDs molded in the same plastic
case. Diodes are arranged so that different marks-commonly digits: 0, 1, and 2...9 are
displayed by activating them. There are many types of displays composed of several
dozens of built in diodes which can display different symbols.

Fig 3.0 Seven segment display

11

The most commonly used are so called 7-segment displays. They are composed of 8
LEDs, 7 segments are arranged as a rectangle for symbol displaying and there is
additional segment for decimal point displaying. In order to simplify connecting, anodes
and cathodes of all diodes are connected to the common pin so that there are common
cathode displays and common anode displays. Segments are marked with the litters A to
G as shown on the figure on the left. When connecting, each diode is treated
independently, which means that each must have its own conductor for current limitation.
When displaying any digit, a defeating fact that microcontroller is nevertheless only a
machine made to understand only language of units and zeros is fully expressed. Namely,
it does not know what units, tens or hundreds are, nor it knows how ten digits we are
used to look like. Therefore, each number intended to be shown on display must be
prepared in the following way:

Fig 3.1 microcontroller powered seven segment display

12

3.3

Clock Signal

Although the microcontroller has built in oscillator, it cannot operate without external the
quartz crystal which stabilizes its frequency (microcontrollers operating speed).

Fig 3.2 clocking the controller using an external source

Naturally, there are some exceptions too: if this solution cannot be applied for some
reason, there are always alternative ones. One of them is to bring clock signal from
special source through invertors.

The oscillator in this circuit is an 11MHz crystal which produces a square wave signal
that is used to synchronize the system.

3.4

Microcontroller Unit

This section is the core of the system. It sees to it that all action of the traffic system is
free from contention or clash.

The microcontroller runs a pre written series of

instruction that has been compiled and downloaded to it through a device programmer.
As all other good things, this powerful component is basically very simple and is
obtained by uniting tested and high- quality "ingredients" (components) as per following
receipt:
1.

The simplest computers processor is used as a "brain" of the system.

2.

Depending on the taste of the producer, it is added: a bit of memory, a few A/D

converters, timers, input/output lines etc.


3.

It is all placed in one of standard packages.


13

Three things have had a crucial impact on such a success of the microcontrollers:
Powerful and intelligently chosen electronics embedded in the microcontrollers
can via input/output devices

switches, push buttons, sensors, LCD displays,

relays) control various processes and devices such as: industrial automatics,
electric current, temperature, engine performance etc.
A very low price enables them to be embedded in such devices in which, until
recent time it was not worth embedding anything. Thanks to that, the world is
overwhelmed today with cheap automatic devices and various intelligent
appliances.
Prior knowledge is hardly needed for programming. It is sufficient to have any
kind of PC (software in use is not demanding at all and it is easy to learn to work
on it) and one simple device (programmer) used for transferring completed
programs into the microcontroller.

How Microcontroller Operates


Even though there is a great number of various microcontrollers and even greater number
of programs designed for the microcontrollers use only, all of them have many things in
common. That means that if you learn to handle one of them you will be able to handle
them all. A typical scenario on whose basis it all functions is as follows:
1.

Power supply is turned off and everything is so stillchip is programmed,

everything is in place, and nothing indicates what is to come


2.

Power supply connectors are connected to the power supply source and everything

starts to happen at high speed! The control logic registers what is going on first. It
enables only quartz oscillator to operate. While the first preparations are in progress and
parasite capacities are being charged, the first milliseconds go by.
3.

Voltage level has reached its full value and frequency of oscillator has become

stable. The bits are being written to the SFRs, showing the state of all peripherals and all
14

pins are configured as outputs. Everything occurs in harmony to the pulses rhythm and
the overall electronic starts operating
4.

Program Counter is reset to zero address of the program memory. Instruction from

that address is sent to instruction decoder where its meaning is recognized and it is
executed with immediate effect.
5.

The value of the Program Counter is being incremented by 1 and the whole

process is being repeated...several million times per second

Relay Circuitry
The output from the port of the microcontroller is given to the relay driver IC which
drives the corresponding relay, to which the security gate is connected.
Once the relay is energized, the output is used to control the conduction of the fuel pump.

15

CHAPTER FOUR
Methodology
In some vehicles, attempts to use an unauthorized or "non-sequenced" key cause the
vehicle to activate a timed no-start condition and in some highly advanced systems, even
use satellite or mobile phone communication to alert a security firm that an unauthorized
attempt was made to code a key.
Coincidentally, this information is often recorded in modern automobile ECUs, which
may record many other variables including speed, temperature, driver weight, geographic
location, throttle position and yaw angle. This information can be used during insurance
investigations, warranty claims or technical troubleshooting.
Add-on immobilisers are available for older cars or vehicles without factory
immobilisers. The insurance approval for a self-arming immobiliser is known as
"Thatcham 2" after the Motor Insurance Repair Research Centre in Thatcham, England.
Approved immobilisers must intercept at least two circuits; typically the low-voltage
ignition circuit and the fuel pump circuit. Some may also intercept the low-current starter
motor circuit from the key switch to the relay.

System Specifications:
1. An authenticated user can control his/her vehicle from any remote place having mobile
phone network.
4. The system requires two phones out of which the one present at the control unit has to
be a mobile phone with auto answer facility.

16

Block Diagram

BLOCK DIAGRAM DESCRIPTION


Phone on the transmitting side
The person who wants to switch control his/her vehicle that is interfaced with the
controller side calls from a phone and, once the call gets picked up, enters the password
for the corresponding device. Every key has to be pressed for a minimum amount of time
to get it encoded in the decoder IC.

Mobile phone on the receiving side


The mobile phone on the receiver side picks up the phone call automatically after
5seconds, and then makes the tones available to the DTMF tone decoder IC through the
headphone jack of the phone.

17

DTMF Tone Decoder IC


The DTMF tone decoder IC converts the received tones to their respective binary values
and then gives them as an input to the microcontroller.
The DTMF tone decoder ICs internal architecture consists of a band split filter section
which separates the low and the high tone of the received tone pair, followed by a digital
decode(counting) section which verifies both the frequency and duration of the received
tones before passing resultant 4-bit code to the output bus. These 4-bits along with a bit
which validates a received tone are given as an input to the port of microcontroller.

The Microcontroller:
The five output bits of the decoder IC serve as an input to port of the microcontroller.
Then each tone is verified by the programmed microcontroller and once a correct
sequence of code is received, output corresponding to the tones sent by the user is made
available at the port, which is connected to the brain box of the vehicle for the proper
action depicted by the user i.e. enable/disable security systems, doors, ignition, steering,
dash boards, and heating/ventilation/air conditioning system.
The output from the port of the microcontroller is given to the relay driver IC which
drives the corresponding relay, to which the security connection is made.
Once the relay is energized, the output is set the appropriate action that is needed.

IMPLEMENTATION OF SYSTEM
System Algorithm:
1. Person who wants to lock his car calls on the phone at the receiver side which
resides in the car.
2. The call gets answered automatically if it is not picked up manually before
5seconds.
3. Once the call gets answered the password is entered for authentication (in our case
it is our four digit code).
18

4. If authenticated, the controller takes the right action i.e. locks the car.

Note:
On the transmitter side the user controlling the security features of the car has to press
each digit for a minimum duration of time, which is 40ms.

Performance and evaluation of the system


1. The receiver must reside in a location where a signal with sufficient strength can be
received from a Mobile phone network.
2. The only person who can communicate with the control module is the person who will
be successfully authenticated.
3. Only devices with electrical controlling input ports will be possible targets for control.
4. The receiver must have a power source attached at all times.

19

CHAPTER FIVE
CONCLUTION AND RECOMMENDATION
Conclusion
Since is of paramount important to remotely control prevent our cars from unauthorized
for security reasons. The distance is no longer a barrier to our remote control system this
time, because of the introduction of communication network. The technology of remote
control system has advanced in controlling security features of cars over a GSM
communication network and is also flexible.

RECOMMENDATION
I recommend the GSM remote control system for use in domestic and industrial terrain,
to remotely control security conscious devices especially in the offices where delicate
informations can be easily leaked hence the need for a security stronghold and also in
the industries were no body Can move close to the machines and some moveable parts of
the heavy machines. Because of the distance and communication network used in this
project work, I recommend users of remote control system to go for GSM remote control
system because it is more versatile.

20

Bill of Material
VALUE

QUANTITY

UNIT PRICE N

TOTAL

100nF
10uF
1K
100K
330K
C1815
Buzzer
3-in-1 Seven Seg.
Veroboard
Phone jack
18 Pin Socket
40 Pin socket
14 Pin socket
ULN2003
AT89S52 MCU
MT8870 DTMF chip
11MHz crystal
3.59475MHz crystal
Misc
Phone
Total

3
1
1
1
1
5
1
1
1
1
1
1
1
1
1
1
1
1
1

200
200
100
100
100
550
3780
1500
200
950
1500
1600
1300
4300
11000
35550
360
360
9800
3780

600
200
100
100
100
2750
3780
1500
200
950
1500
1600
1300
4300
11000
22550
360
360
9800
3780
79730
=========

21

APPENDIX

OUTPUT
DATA_IN

DATA
DATA

MOTOR
BUZZER
RELAY
DISPLAY_1 BIT
DISPLAY_2 BIT
DISPLAY_3 BIT

BIT
BIT
BIT

DELAY_REG DATA
DELAY_REG1
DATA
DELAY_REG2
DATA
STORE_1
DATA
STORE_2
DATA
STORE_3
DATA
DATA_HOLD_1
DATA
DATA_HOLD_2
DATA
DATA_HOLD_3
DATA
DATA_COUNTER DATA
TEMP_STORE
DATA
REFRESH_REG
DATA
BEEP_REG DATA

080H
090H

0A0H.0
0A0H.1
0A0H.4
0A0H.5
0A0H.6
0A0H.7

000H
001H
002H
003H
004H
005H
006H
007H
008H
009H
00AH
00BH
00CH
ORG 000H
AJMP BOOTSTRAP

ORG 003H
AJMP CHECK_FUNCTION

ORG 00BH
AJMP REFRESH_DATA
ORG 01BH
AJMP BEEP

22

ORG 03AH

BOOTSTRAP:
MOV SP,#025H
MOV OUTPUT,#000
MOV DATA_IN,#01EH
CLR RELAY
CLR BUZZER
CLR MOTOR
CLR DISPLAY_1
CLR DISPLAY_2
CLR DISPLAY_3
MOV STORE_1,#040H
MOV STORE_2,#040H
MOV STORE_3,#040H
MOV DATA_HOLD_1,#009
MOV DATA_HOLD_2,#004
MOV DATA_HOLD_3,#003
MOV DATA_COUNTER,#000
MOV REFRESH_REG,#020
MOV BEEP_REG,#003
MOV TMOD,#011H
CLR P3.3
CLR TR1
AJMP MAIN

MAIN:

MOV OUTPUT,STORE_1
SETB DISPLAY_1
ACALL DELAY_150Hz_4MHz
CLR DISPLAY_1
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
MOV OUTPUT,STORE_2
SETB DISPLAY_2
ACALL DELAY_150Hz_4MHz
CLR DISPLAY_2
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
MOV OUTPUT,STORE_3
SETB DISPLAY_3
ACALL DELAY_150Hz_4MHz
CLR DISPLAY_3
23

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
MOV IE,#10001011B
JNB TR1,CLEAR_ALL
AJMP CHECK_STATUS
CLEAR_ALL:

CLR BUZZER
CLR RELAY
CLR MOTOR
AJMP CHECK_STATUS

CHECK_STATUS:

MOV A,STORE_2
CJNE A,#03FH,STATUS_SKIP
SETB RELAY
SETB MOTOR
CLR TR1
CLR BUZZER
AJMP MAIN

STATUS_SKIP:

CHECK_FUNCTION:
SETB P3.3
JNB P3.2,$
SETB TR0
MOV A,DATA_IN
MOV TEMP_STORE,A
MOV A,DATA_COUNTER
CJNE A,#000,CHECK_2
MOV DATA_HOLD_1,TEMP_STORE
INC DATA_COUNTER
MOV REFRESH_REG,#020
RETI
CHECK_2:

CJNE A,#001,CHECK_3
MOV DATA_HOLD_2,TEMP_STORE
INC DATA_COUNTER
MOV REFRESH_REG,#020
RETI

CHECK_3:

MOV DATA_HOLD_3,TEMP_STORE
MOV DATA_COUNTER,#000
ACALL DO_FUNCTION
MOV REFRESH_REG,#020
RETI

DO_FUNCTION:

MOV A,DATA_HOLD_1
CJNE A,#014H,DO_FUNCTION_OFF
24

MOV A,DATA_HOLD_2
CJNE A,#002H,DO_FUNCTION_OFF
MOV A,DATA_HOLD_3
CJNE A,#010H,DO_FUNCTION_OFF
SETB RELAY
SETB MOTOR
CLR TR1
CLR BUZZER
MOV STORE_1,#037H
MOV STORE_2,#03FH
MOV STORE_3,#040H
MOV REFRESH_REG,#020
CLR TR1
CLR BUZZER
RETI

DO_FUNCTION_OFF:
MOV A,DATA_HOLD_1
CJNE A,#012H,DO_FUNCTION_EXIT
MOV A,DATA_HOLD_2
CJNE A,#004H,DO_FUNCTION_EXIT
MOV A,DATA_HOLD_3
CJNE A,#018H,DO_FUNCTION_EXIT
CLR RELAY
CLR MOTOR
SETB BUZZER
MOV STORE_1,#071H
MOV STORE_2,#071H
MOV STORE_3,#03FH
SETB TR1
RETI
DO_FUNCTION_EXIT:
MOV DATA_HOLD_1,#000
MOV DATA_HOLD_2,#000
MOV DATA_HOLD_3,#000
INT_RETURN:
RETI
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
REFRESH_DATA:

DJNZ REFRESH_REG,INT_RETURN
MOV REFRESH_REG,#020
MOV DATA_HOLD_1,#000
MOV DATA_HOLD_2,#000
MOV DATA_HOLD_3,#000
CLR TR0
CLR P3.3
25

RETI
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

BEEP:

RETU:

DJNZ BEEP_REG,RETU
MOV BEEP_REG,#003
CPL BUZZER
RETI

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
DELAY_150Hz_4MHz:
MOV DELAY_REG,#4
MOV DELAY_REG1,#224
LAY_150Hz_4MHz: DJNZ DELAY_REG1,LAY_150Hz_4MHz
DJNZ DELAY_REG,LAY_150Hz_4MHz
RET

END

References:
1. www.8051projects.net
2. www.edaboard.com
3. Mazidi-8051 microcontroller Dip trace Help Datasheets of the IC's
4. http://www.quasarelectronics.com/jpg/3 153_1.jpg
5. http://www.quasarelectronics.com/jpg/3 153_2.jpg
6. http://www.quasarelectronics.com/zip/dtmf.zip
7. http://www.myke.com/lcd.htm interfacing ICs
8. Chenker, L., Pushbutton Calling with a Two-Group Voice-Frequency
Code - The Bell system technical journal (IN 0005-8580) vol: 39iss:1 pp: 235-255, 1960
9. Microcontroller Technology: Atmel, at89s52, prentice hall, 7th edition,
page32, 2002
10. Coskun and H. Ardam, A Remote Controller for Home and Office Appliances by
Telephone, IEEE Trans. Consumer Electron. , vol. 44, no. 4, pp1291- 1297, November
1998
26

11. Daldal Nihat, Microcontroller Based security and Control system (In

Turkish),

12. M.C. Term Project, Gazi University, Ankara, 2003


13. E. Wong, A Phone-Based Remote Controller for Home and Office
Automation, IEEE Trans. Consumer Electron. , vol. 40, no. 1, pp. 28-33, February
1995.
13. Relay Information, http://en.wikipedia.org/wiki/Relay

27

Das könnte Ihnen auch gefallen