103
ANTI THEFT ALERTING SYSTEM FOR VEHICLES (TWO WHEELER) but paralelly plan what u want to do... dream of success and make it cum true BY 9502601863 Siddagari Lohith: home @ 0877 2227759 B.Tejaswi (07U51A04A1) R.Sachitra (07U51A0490) U.Sravani (07U51A0498) S.Praneeth (07U51A0499)

Two Wheeler Theft Control

Embed Size (px)

Citation preview

Page 1: Two Wheeler Theft Control

ANTI THEFT ALERTING SYSTEM FOR VEHICLES(TWO WHEELER)

but paralelly plan what u want to do... dream of success and make it cum true

BY

9502601863Siddagari Lohith: home @ 0877 2227759

B.Tejaswi (07U51A04A1)R.Sachitra (07U51A0490)U.Sravani (07U51A0498)S.Praneeth (07U51A0499)

DEPARTMENT OF ELECTRONICS & COMMUNICATION

ENGINEERING

Page 2: Two Wheeler Theft Control

DRK COLLEGE OF ENGINEERING & TECHNOLOGY

Bowrampet, Hyderabad -43

2009-2010

DRK COLLEGE OF ENGINEERING &

TECHNOLOGY

DEPARTMENT OF ELECTRONICS & COMMUNICATION

ENG INEERING

CERTIFICATE

THIS IS TO CERTIFY THAT THE MINI-PROJECT ENTITLED

ANTI THEFT ALERTING SYSTEM FOR VEHICLES(TWO WHEELER)

IS THE BONAFIDE WORK OF

B.Tejaswi (07U51A04A1)R.Sachitra (07U51A0490)U.Sravani (07U51A0498)S.Praneeth (07U51A0499)

SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENT FOR THE

AWARD OF DEGREE OF BACHELOR OF TECHNOLOGY IN ELECTRONICS

AND COMMUNICATION ENGINEERING DURING THE YEAR 2009-2010

Page 3: Two Wheeler Theft Control

Head of the Department Examiner

E.C.E. Dept

ABSTRACT

If anybody tries to steal your bike, this circuit turns on the horn of the bike to alert

you of the impending theft. Usually, a handle lock is used on the handle bar for the safety

of bikes, with the front mudguard in a slanted position. When the handle lock is freed, the

front mudguard can be aligned with the body of the bike.

This circuit consists of transmitter and receiver sections. The transmitter (IR

LED) is fitted on the back end of the front mudguard and the receiver sensor (IR RX) is

fitted on the central portion of the crash guard of the bike such that IR rays from the

transmitter directly fall on the IR receiver sensor, this will occur when the front

mudguard comes in line with the body of the bike.

This signal from the IR Rx will be given to microcontroller which after waiting

for some time disables the engine even though the Ignition switch is ON. In this project

as the engine we are demonstrating a DC motor and to indicate the status we are using a

LCD.

Page 4: Two Wheeler Theft Control

B.Tejaswi (07U51A04A1)R.Sachitra (07U51A0490)

U.Sravani (07U51A0498)S.Praneeth (07U51A0499)

LIST OF FIGURES

NAME OF THE FIG PAGE NO

Fig 1.1 : Block diagram of XXXXXXXXXXX 3

Fig 1.2 : Block diagram of XXXXXXXXXXX 7

Fig 1.2 : Block diagram of XXXXXXXXXXX 7

Page 5: Two Wheeler Theft Control

LIST OF ABBREVATIONS

Page 6: Two Wheeler Theft Control

CONTENTS

SYMBOL NAME

ACC Accumulator

B B register

PSW Program status word

SP Stack pointer

DPTR Data pointer 2 bytes

DPL Low byte

DPH High byte

P0 Port0

P1 Port1

P2 Port2

P3 Port3

IP Interrupt priority control

IE Interrupt enable control

TMOD Timer/counter mode control

TCON Timer/counter control

T2CON Timer/counter 2 control

T2MOD Timer/counter mode2 control

TH0 Timer/counter 0high byte

TL0 Timer/counter 0 low byte

TH1 Timer/counter 1 high byte

TL1 Timer/counter 1 low byte

TH2 Timer/counter 2 high byte

TL2 Timer/counter 2 low byte

SCON Serial control

SBUF Serial data buffer

PCON Power control

Page 7: Two Wheeler Theft Control

TOPIC PAGE NO1. XYZ ABC PQR

1.1 Introduction

1.1.1 Definition 1

1.1.2 abcabcabc 1

1.1.3 defdefdef 1

1.1.4 Applications 2

1.1.5 merits & demerits 2

1.2 rrrrrrrrrrrrrrrrrtttttttt

1.2.1 Introduction 3

1.2.2 Definition 4

1.2.3 Applications 4

2.

2.1 5

2.2 5

2.2.1 5

2.2.2 5

2.2.3 6

2.2.4 7

2.2.4.1 7

Appendix 1 – WWWWWWWWWWWWWWWW

Appendix 2 – YYYYYYYYYYYYYYYYYYYYY

Appendix 3 – XXXXXXXXXXXXXXXXXXXXX

Page 8: Two Wheeler Theft Control
Page 9: Two Wheeler Theft Control

CONTENTS

1. Introduction

2. Block Diagram

3. Block Diagram Description

4. Schematic

5. Schematic Description

6. Hardware Components

IR transmitter Microcontroller IR receiver Power supply Lcd Ignition switch Dc motor

7. Circuit Description

8. software

9. Conclusion (or) Synopsis

10. Future Aspects

11. Bibliography

Page 10: Two Wheeler Theft Control

1. INTRODUCTION

1.1 EMBEDDED SYSTEM:

An embedded system is a special-purpose system in which the computer is

completely encapsulated by or dedicated to the device or system it controls. Unlike a

general-purpose computer, such as a personal computer, an embedded system performs

one or a few predefined tasks, usually with very specific requirements. Since the system

is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost

of the product. Embedded systems are often mass-produced, benefiting from economies

of scale.

Personal digital assistants (PDAs) or handheld computers are generally

considered embedded devices because of the nature of their hardware design, even

though they are more expandable in software terms. This line of definition continues to

blur as devices expand. With the introduction of the OQO Model 2 with the Windows XP

operating system and ports such as a USB port — both features usually belong to

"general purpose computers", — the line of nomenclature blurs even more.

Physically, embedded systems ranges from portable devices such as digital

watches and MP3 players, to large stationary installations like traffic lights, factory

controllers, or the systems controlling nuclear power plants.

In terms of complexity embedded systems can range from very simple with a

single microcontroller chip, to very complex with multiple units, peripherals and

networks mounted inside a large chassis or enclosure.

Page 11: Two Wheeler Theft Control

1.1.1 Examples of Embedded Systems:

Avionics, such as inertial guidance systems, flight control hardware/software and

other integrated systems in aircraft and missiles

Cellular telephones and telephone switches

Engine controllers and antilock brake controllers for automobiles

Home automation products, such as thermostats, air conditioners, sprinklers, and

security monitoring systems

Handheld calculators

Handheld computers

Household appliances, including microwave ovens, washing machines, television

sets, DVD players and recorders

Medical equipment

Personal digital assistant

Videogame consoles

Computer peripherals such as routers and printers.

Industrial controllers for remote machine operation.

Page 12: Two Wheeler Theft Control

1.1.2 Hardware used:

Microcontroller

IR transmitter

IR receiver

LCD

Motor

Ignition switch

1.1.3Software used:

Keil

Embedded ‘C’

Express PCB

Express schematic

2.Block diagram:

Page 13: Two Wheeler Theft Control

2.1 BLOCK DIAGRAM EXPLANATION:

Power supply:

In this system we are using 5V power supply for microcontroller of Transmitter

section as well as receiver section. We use rectifiers for converting the A.C. into D.C and

a step down transformer to step down the voltage. The full description of the Power

supply section is given in this documentation in the following sections i.e. hardware

components.

Microcontroller (8051):

In this project work the micro-controller is playing a major role. Micro-

controllers were originally used as components in complicated process-control systems.

However, because of their small size and low price, Micro-controllers are now also being

used in regulators for individual control loops. In several areas Micro-controllers are

now outperforming their analog counterparts and are cheaper as well.

IR transmitter

IR receiver Microcontroller

LCD

POWERSUPPLY

Motor

IgnitionKey

Page 14: Two Wheeler Theft Control

The purpose of this project work is to present control theory that is relevant to the

analysis and design of Micro-controller system with an emphasis on basic concept and

ideas. It is assumed that a Microcontroller with reasonable software is available for

computations and simulations so that many tedious details can be left to the

Microcontroller. The control system design is also carried out up to the stage of

implementation in the form of controller programs in assembly language OR in C-

Language

Buzzer:

Buzzer in the circuit is used for alerting the owner of byke when any one try for theft.

IR transmitter/IR receiver: IR transmitter and receiver are connected at mud guard and crash guard, continuity of

signal is established between these two.

LCD Display Section: This section is basically meant to show up the status of the

project. This project makes use of Liquid Crystal Display to display / prompt for

necessary information

Motor

It is identical to motor at engine of bike in real time , it is used as a prototype for this

project, ignition key is to on or off the engine like the bike key

3. Schematic:

Page 15: Two Wheeler Theft Control
Page 16: Two Wheeler Theft Control

3.1 Schematic explanation:

This schematic explanation includes the detailed pin connections of every device

with the microcontroller. Let us see the pin connections of each and every device with the

microcontroller in detail.

Power Supply:

The main aim of this power supply is to convert the 230V AC into 5V DC in

order to give supply for the TTL or CMOS devices. In this process we are using a step

down transformer, a bridge rectifier, a smoothing circuit and the RPS.

At the primary of the transformer we are giving the 230V AC supply. The

secondary is connected to the opposite terminals of the Bridge rectifier as the input. From

other set of opposite terminals we are taking the output to the rectifier.

The bridge rectifier converts the AC coming from the secondary of the

transformer into pulsating DC. The output of this rectifier is further given to the smoother

circuit which is capacitor in our project. The smoothing circuit eliminates the ripples

from the pulsating DC and gives the pure DC to the RPS to get a constant output DC

voltage. The RPS regulates the voltage as per our requirement.

Microcontroller:

The microcontroller AT89S51 with Pull up resistors at Port0 and crystal oscillator

of 11.0592 MHz crystal in conjunction with couple of capacitors of is placed at 18 th &

19th pins of 89S51 to make it work (execute) properly.

IR transmitter/receiver:

Page 17: Two Wheeler Theft Control

IR transmitter here is IR LED which is connected to mudguard of byke. i.e., it is

outside the circuit. Receiver is photodiode, which will conduct when excited with light

which is connected to microcontrollers port !.0 pin.

Buzzer:

Buzzer is an output device, it is used as an indication as crossing of preset value.

it will sound to alert the human. Buzzer is connected to P2.0 pin.

LCD:

LCD is the output device, it is used to display the status of the byke, whether tried

for theft or any. Data pins of LCD are connected to port0.0 to 0.7 pin, control pins are

connected to port2.5,2.6,2.7 pins.

Page 18: Two Wheeler Theft Control

4. Hardware explanation

4.1 MICROCONTROLLER (AT89S51):

4.1.1 Features:

• Compatible with MCS-51® Products

• 4K Bytes of In-System Programmable (ISP) Flash Memory

– Endurance: 1000 Write/Erase Cycles

• 4.0V to 5.5V Operating Range

• Fully Static Operation: 0 Hz to 33 MHz

• Three-level Program Memory Lock

• 128 x 8-bit Internal RAM

• 32 Programmable I/O Lines

• Two 16-bit Timer/Counters

• Six Interrupt Sources

• Full Duplex UART Serial Channel

• Low-power Idle and Power-down Modes

• Interrupt Recovery from Power-down Mode

• Watchdog Timer

• Dual Data Pointer

• Power-off Flag

• Fast Programming Time

• Flexible ISP Programming (Byte and Page Mode)

4.1.2 Description:

The AT89S51 is a low-power, high-performance CMOS 8-bit microcontroller with 4K

bytes of in-system programmable Flash memory. The device is manufactured using

Page 19: Two Wheeler Theft Control

Atmel’s high-density nonvolatile memory technology and is compatible with the

industry- standard 80C51 instruction set and pinout. The on-chip Flash allows the

program memory to be reprogrammed in-system or by a conventional nonvolatile

memory programmer. By combining a versatile 8-bit CPU with in-system programmable

Flash on a monolithic chip, the Atmel AT89S51 is a powerful microcontroller which

provides a highly-flexible and cost-effective solution to many embedded control

applications.

4.1.3 The AT89S51 provides the following standard features:

4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers,

two 16-bit timer/counters, a five vector two-level interrupt architecture, a full duplex

serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S51 is designed

with static logic for operation down to zero frequency and supports two software

selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM,

timer/counters, serial port, and interrupt system to continue functioning. The Power-down

mode saves the RAM contents but freezes the oscillator, disabling all other chip functions

until the next external interrupt or hardware reset.

Page 20: Two Wheeler Theft Control
Page 21: Two Wheeler Theft Control

4.1.4 Pin Description:

VCC - Supply voltage.

GND - Ground.

Port 0: Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin

can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as

high-impedance inputs. Port 0 can also be configured to be the multiplexed low-order

address/data bus during accesses to external program and data memory. In this mode, P0

has internal pull-ups. Port 0 also receives the code bytes during Flash programming and

outputs the code bytes during program verification. External pull-ups are required during

program verification.

Port 1: Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output

buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are

Page 22: Two Wheeler Theft Control

pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that

are externally being pulled low will source current (IIL) because of the internal pull-ups.

Port 1 also receives the low-order address bytes during Flash programming and

verification.

Port 2: Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output

buffers cansink/source four TTL inputs. When 1s are written to Port 2 pins, they are

pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that

are externally being pulled low will source current (IIL) because of the internal pull-ups.

Port 2 emits the high-order address byte during fetches from external program memory

and during accesses to external data memory that use 16-bit addresses (MOVX @

DPTR). In this application, Port 2 uses strong internal pull-ups when emitting 1s. During

accesses to external data memory that use 8-bit addresses (MOVX @ RI), Port 2 emits

the contents of the P2 Special

Function Register. Port 2 also receives the high-order address bits and some control

signals during Flash programming and verification.

Port 3: Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output

buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are

pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that

are externally being pulled low will source current (IIL) because of the pull-ups. Port 3

receives some control signals for Flash programming and verification. Port 3 also serves

the functions of various special features of the AT89S51, as shown in the following table.

Page 23: Two Wheeler Theft Control

RST Reset input: A high on this pin for two machine cycles while the oscillator is

running resets the device. This pin drives High for 98 oscillator periods after the

Watchdog times out. The DISRTO bit in SFR AUXR (address 8EH) can be used to

disable this feature. In the default state of bit DISRTO, the RESET HIGH out feature is

enabled.

ALE/PROG Address Latch Enable (ALE): Is an output pulse for latching the low byte

of the address during accesses to external memory. This pin is also the program pulse

input (PROG) during Flash programming. In normal operation, ALE is emitted at a

constant rate of 1/6 the oscillator frequency and may be used for external timing or

clocking purposes. Note, however, that one ALE pulse is skipped during each access to

external data memory. If desired, ALE operation can be disabled by setting bit 0 of SFR

location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction.

Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the

microcontroller is in external execution mode.

PSEN Program Store Enable (PSEN): is the read strobe to external program memory.

When the AT89S51 is executing code from external program memory, PSEN is activated

twice each machine cycle, except that two PSEN activations are skipped during each

access to external data memory.

EA/VPP External Access Enable.: EA must be strapped to GND in order to enable the

device to fetch code from external program memory locations starting at 0000H up to

FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on

Page 24: Two Wheeler Theft Control

reset. EA should be strapped to VCC for internal program executions. This pin also

receives the 12-volt programming enable voltage (VPP) during Flash programming.

XTAL1 Input to the inverting oscillator amplifier and input to the internal clock

operating circuit.

XTAL2 Output from the inverting oscillator amplifier

4.1.5 Special Function Registers

A map of the on-chip memory area called the Special Function Register (SFR) space is

shown in Table 1.

Note that not all of the addresses are occupied, and unoccupied addresses may not be

implemented on the chip. Read accesses to these addresses will in general return random

data, and write accesses will have an indeterminate effect.

Page 25: Two Wheeler Theft Control

User software should not write 1s to these unlisted locations, since they may be used in

future products to invoke new features. In that case, the reset or inactive values of the

new bits will always be 0.

Interrupt Registers: The individual interrupt enable bits are in the IE register. Two

priorities can be set for each of the five interrupt sources in the IP register.

Dual Data Pointer Registers: To facilitate accessing both internal and external data

memory, two banks of 16-bit Data Pointer Registers are provided: DP0 at SFR address

locations 82H- 83H and DP1 at 84H-85H. Bit DPS = 0 in SFR AUXR1 selects DP0 and

DPS = 1 selects DP1. The user should always initialize the DPS bit to the appropriate

value before accessing the respective Data Pointer Register.

Power Off Flag: The Power Off Flag (POF) is located at bit 4 (PCON.4) in the PCON

SFR. POF is set to “1” during power up. It can be set and rest under software control and

is not affected by reset.

Page 26: Two Wheeler Theft Control

4.1.6 Memory Organization

MCS-51 devices have a separate address space for Program and Data Memory. Up to

64K bytes each of external Program and Data Memory can be addressed.

Program Memory If the EA pin is connected to GND, all program fetches are directed to

external memory. On the AT89S51, if EA is connected to VCC, program fetches to

addresses 0000H through

FFFH are directed to internal memory and fetches to addresses 1000H through FFFFH

are directed to external memory.

Data Memory The AT89S51 implements 128 bytes of on-chip RAM. The 128 bytes are

accessible via direct and indirect addressing modes. Stack operations are examples of

indirect addressing, so the 128 bytes of data RAM are available as stack space.

Watchdog Timer (One-time Enabled with Reset-out)

The WDT is intended as a recovery method in situations where the CPU may be

subjected to software upsets. The WDT consists of a 14-bit counter and the Watchdog

Timer Reset (WDTRST) SFR. The WDT is defaulted to disable from exiting reset. To

enable the WDT, a user must write 01EH and 0E1H in sequence to the WDTRST register

(SFR location 0A6H). When the WDT is enabled, it will increment every machine cycle

while the oscillator is running. The WDT timeout period is dependent on the external

clock frequency. There is no way to disable the WDT except through reset (either

Page 27: Two Wheeler Theft Control

hardware reset or WDT overflow reset). When WDT overflows, it will drive an output

RESET HIGH pulse at the RST pin.

Using the WDT To enable the WDT, a user must write 01EH and 0E1H in sequence to

the DTRST register (SFR location 0A6H). When the WDT is enabled, the user needs to

service it by writing 01EH

and 0E1H to WDTRST to avoid a WDT overflow. The 14-bit counter overflows when it

reaches 16383 (3FFFH), and this will reset the device. When the WDT is enabled, it will

increment every machine cycle while the oscillator is running. This means the user must

reset the WDT at least every 16383 machine cycles. To reset the WDT the user must

write 01EH and 0E1H to WDTRST. WDTRST is a write-only register. The WDT

counter cannot be read or written. When WDT overflows, it will generate an output

RESET pulse at the RST pin. The RESET pulse duration is 98xTOSC, where

TOSC=1/FOSC. To make the best use of the WDT, it should be serviced in those

sections of code that will periodically be executed within the time required to prevent a

WDT reset.

WDT During Power-down and Idle

In Power-down mode the oscillator stops, which means the WDT also stops. While in

Powerdownmode, the user does not need to service the WDT. There are two methods of

exiting Power-down mode: by a hardware reset or via a level-activated external interrupt,

which is enabled prior to entering Power-down mode. When Power-down is exited with

hardware reset, servicing the WDT should occur as it normally does whenever the

AT89S51 is reset. Exiting Power-down with an interrupt is significantly different. The

interrupt is held low long enough for the oscillator to stabilize. When the interrupt is

brought high, the interrupt is serviced. To prevent the WDT from resetting the device

while the interrupt pin is held low, the WDT is not started until the interrupt is pulled

high. It is suggested that the WDT be reset during the interrupt service for the interrupt

used to exit Power-down mode. To ensure that the WDT does not overflow within a few

states of exiting Power-down, it is best to reset the WDT just before entering Power-

down mode. Before going into the IDLE mode, the WDIDLE bit in SFR AUXR is used

to determine whether the WDT continues to count if enabled. The WDT keeps counting

during IDLE (WDIDLE bit =0) as the default state. To prevent the WDT from resetting

Page 28: Two Wheeler Theft Control

the AT89S51 while in IDLE mode, the user should always set up a timer that will

periodically exit IDLE, service the WDT, and reenter IDLE mode.

With WDIDLE bit enabled, the WDT will stop to count in IDLE mode and resumes the

count upon exit from IDLE.

UART The UART in the AT89S51 operates the same way as the UART in the AT89C51.

Timer 0 and 1 Timer 0 and Timer 1 in the AT89S51 operate the same way as Timer 0 and

Timer 1 in the AT89C51.

Interrupts The AT89S51 has a total of five interrupt vectors: two external interrupts

(INT0 and INT1), two timer interrupts (Timers 0 and 1), and the serial port interrupt.

These interrupts are all shown in

Figure 1. Each of these interrupt sources can be individually enabled or disabled by

setting or clearing a

bit in Special Function Register IE. IE also contains a global disable bit, EA, which

disables all interrupts at once. Note that Table 4 shows that bit position IE.6 is

unimplemented. In the AT89S51, bit position IE.5 is also unimplemented. User software

should not write 1s to these bit positions, since they may be used in future AT89

products. The Timer 0 and Timer 1 flags, TF0 and TF1, are set at S5P2 of the cycle in

which the timers overflow. The values are then polled by the circuitry in the next cycle.

Page 29: Two Wheeler Theft Control

Oscillator Characteristics

XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier that

can be configured for use as an on-chip oscillator, as shown in Figure 2. Either a quartz

crystal or ceramic resonator may be used. To drive the device from an external clock

source, XTAL2 should be left unconnected while XTAL1 is driven, as shown in Figure 3.

There are no requirements on the duty cycle of the external clock signal, since the input

to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and

maximum voltage high and low time specifications must be observed.

Page 30: Two Wheeler Theft Control

Idle Mode In idle mode, the CPU puts itself to sleep while all the on-chip peripherals

remain active. The mode is invoked by software. The content of the on-chip RAM and all

the special function registers remain unchanged during this mode. The idle mode can be

terminated by any enabled interrupt or by a hardware reset. Note that when idle mode is

terminated by a hardware reset, the device normally resumes program execution from

where it left off, up to two machine cycles before the internal reset algorithm takes

control. On-chip hardware inhibits access to internal RAM in this event, but access to the

port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin

when idle mode is terminated by a reset, the instruction following the one that invokes

idle mode should not write to a port pin or to external memory.

Power-down Mode

In the Power-down mode, the oscillator is stopped, and the instruction that invokes

Powerdown is the last instruction executed. The on-chip RAM and Special Function

Registers retain their values until the Power-down mode is terminated. Exit from Power-

down mode can be initiated either by a hardware reset or by activation of an enabled

external interrupt into INT0 or INT1. Reset redefines the SFRs but does not change the

on-chip RAM. The reset should not be activated before VCC is restored to its normal

operating level and must be held active long enough to allow the oscillator to restart and

stabilize.

Program Memory Lock Bits

Page 31: Two Wheeler Theft Control

The AT89S51 has three lock bits that can be left unprogrammed (U) or can be

programmed (P) to obtain the additional features listed in the following table.

When lock bit 1 is programmed, the logic level at the EA pin is sampled and latched

during reset. If the device is powered up without a reset, the latch initializes to a random

value and holds that value until reset is activated. The latched value of EA must agree

with the current logic level at that pin in order for the device to function properly.

Programming the Flash – Parallel Mode

The AT89S51 is shipped with the on-chip Flash memory array ready to be programmed.

The programming interface needs a high-voltage (12-volt) program enable signal and is

compatible with conventional third-party Flash or EPROM programmers. The AT89S51

code memory array is programmed byte-by-byte.

Programming Algorithm: Before programming the AT89S51, the address, data, and

control signals should be set up according to the Flash programming mode table and

Figures 13 and 14. To program the AT89S51, take the following steps:

1. Input the desired memory location on the address lines.

2. Input the appropriate data byte on the data lines.

3. Activate the correct combination of control signals.

4. Raise EA/VPP to 12V.

5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The

bytewrite cycle is self-timed and typically takes no more than 50 μs. Repeat steps 1

through 5, changing the address and data for the entire array or until the end of the object

file is reached.

Data Polling: The AT89S51 features Data Polling to indicate the end of a byte write

cycle. During a write cycle, an attempted read of the last byte written will result in the

Page 32: Two Wheeler Theft Control

complement of the written data on P0.7. Once the write cycle has been completed, true

data is valid on all outputs, and the next cycle may begin. Data Polling may begin any

time after a write cycle has been initiated.

Ready/Busy: The progress of byte programming can also be monitored by the RDY/BSY

output signal. P3.0 is pulled low after ALE goes high during programming to indicate

BUSY. P3.0 is pulled high again when programming is done to indicate READY.

Program Verify: If lock bits LB1 and LB2 have not been programmed, the programmed

code data can be read back via the address and data lines for verification. The status of

the individual lock bits can be verified directly by reading them back.

Reading the Signature Bytes: The signature bytes are read by the same procedure as a

normal verification of locations 000H, 100H, and 200H, except that P3.6 and P3.7 must

be pulled to a logic low. The values returned are as follows.

(000H) = 1EH indicates manufactured by Atmel

(100H) = 51H indicates 89S51

(200H) = 06H

Chip Erase: In the parallel programming mode, a chip erase operation is initiated by

using the proper combination of control signals and by pulsing ALE/PROG low for a

duration of 200 ns - 500 ns. In the serial programming mode, a chip erase operation is

initiated by issuing the Chip Erase instruction. In this mode, chip erase is self-timed and

takes about 500 ms. During chip erase, a serial read from any address location will return

00H at the data output.

Programming the Flash – Serial Mode

The Code memory array can be programmed using the serial ISP interface while

RST is pulled to VCC. The serial interface consists of pins SCK, MOSI (input) and

MISO (output). After RST is set high, the Programming Enable instruction needs to be

executed first before other operations can be executed. Before a reprogramming sequence

can occur, a Chip Erase operation is required.

The Chip Erase operation turns the content of every memory location in the Code

array into FFH. Either an external system clock can be supplied at pin XTAL1 or a

crystal needs to be connected across pins XTAL1 and XTAL2. The maximum serial

Page 33: Two Wheeler Theft Control

clock (SCK) frequency should be less than 1/16 of the crystal frequency. With a 33 MHz

oscillator clock, the maximum SCK frequency is 2 MHz.

Serial Programming Algorithm

To program and verify the AT89S51 in the serial programming mode, the following

sequence is recommended:

1. Power-up sequence:

Apply power between VCC and GND pins.

Set RST pin to “H”.

If a crystal is not connected across pins XTAL1 and XTAL2, apply a 3 MHz to 33 MHz

clock to XTAL1 pin and wait for at least 10 milliseconds.

2. Enable serial programming by sending the Programming Enable serial instruction to

pin MOSI/P1.5. The frequency of the shift clock supplied at pin SCK/P1.7 needs to be

less than the CPU clock at XTAL1 Divided by 16.

3. The Code array is programmed one byte at a time in either the Byte or Page mode. The

write cycle is self-timed and typically takes less than 0.5 ms at 5V.

4. Any memory location can be verified by using the Read instruction that returns the

content at the selected address at serial output MISO/P1.6.

5. At the end of a programming session, RST can be set low to commence normal device

operation.

Power-off sequence (if needed):

Set XTAL1 to “L” (if a crystal is not used).

Set RST to “L”.

Turn VCC power off.

Data Polling: The Data Polling feature is also available in the serial mode. In this mode,

during a write cycle an attempted read of the last byte written will result in the

complement of the MSB of the serial output byte on MISO.

Serial Programming Instruction Set

The Instruction Set for Serial Programming follows a 4-byte protocol and is shown in

Table 8 on page 18.

Programming Interface – Parallel Mode

Page 34: Two Wheeler Theft Control

Every code byte in the Flash array can be programmed by using the appropriate

combination of control signals. The write operation cycle is self-timed and once initiated,

will automatically time itself to Completion.

All major programming vendors offer worldwide support for the Atmel microcontroller

series.

Please contact your local programming vendor for the appropriate software revision.

Page 35: Two Wheeler Theft Control
Page 36: Two Wheeler Theft Control
Page 37: Two Wheeler Theft Control

After Reset signal is high, SCK should be low for at least 64 system clocks before it goes

high to clock in the enable data bytes. No pulsing of Reset signal is necessary. SCK

should be no faster than 1/16 of the system clock at XTAL1.

For Page Read/Write, the data always starts from byte 0 to 255. After the command byte

and upper address byte are

latched, each byte thereafter is treated as data until all 256 bytes are shifted in/out. Then

the next instruction will be ready to be decoded.

Page 38: Two Wheeler Theft Control

*NOTICE: Stresses beyond those listed under “Absolute Maximum Ratings” may cause

permanent damage to the device. This is a stress rating only and functional operation of

the device at these or any other conditions beyond those indicated in the operational

sections of this specification is not implied. Exposure to absolute maximum rating

conditions for extended periods may affect device reliability.

Page 39: Two Wheeler Theft Control

4.2 Power supply

The power supplies are designed to convert high voltage AC mains electricity to

a suitable low voltage supply for electronics circuits and other devices. A power supply

can by broken down into a series of blocks, each of which performs a particular function.

A d.c power supply which maintains the output voltage constant irrespective of a.c mains

fluctuations or load variations is known as “Regulated D.C Power Supply”

For example a 5V regulated power supply system as shown below:

4.2.1 Transformer:

A transformer is an electrical device which is used to convert electrical power

from one

Page 40: Two Wheeler Theft Control

Electrical circuit to another without change in frequency.

Transformers convert AC electricity from one voltage to another with little loss of power.

Transformers work only with AC and this is one of the reasons why mains electricity is

AC. Step-up transformers increase in output voltage, step-down transformers decrease in

output voltage. Most power supplies use a step-down transformer to reduce the

dangerously high mains voltage to a safer low voltage. The input coil is called the

primary and the output coil is called the secondary. There is no electrical connection

between the two coils; instead they are linked by an alternating magnetic field created in

the soft-iron core of the transformer. The two lines in the middle of the circuit symbol

represent the core. Transformers waste very little power so the power out is (almost)

equal to the power in. Note that as voltage is stepped down current is stepped up. The

ratio of the number of turns on each coil, called the turn’s ratio, determines the ratio of

the voltages. A step-down transformer has a large number of turns on its primary (input)

coil which is connected to the high voltage mains supply, and a small number of turns on

its secondary (output) coil to give a low output voltage.

An Electrical Transformer

Page 41: Two Wheeler Theft Control

Turns ratio = Vp/ VS = Np/NS

Power Out= Power In

VS X IS=VP X IP

Vp = primary (input) voltage

Np = number of turns on primary coil

Ip  = primary (input) current    

4.2.2 RECTIFIER:

A circuit which is used to convert a.c to dc is known as RECTIFIER. The process

of conversion a.c to d.c is called “rectification”

TYPES OF RECTIFIERS:

Half wave Rectifier

Full wave rectifier

1. Centre tap full wave rectifier.

2. Bridge type full bridge rectifier.

Comparison of rectifier circuits:

Parameter

Type of Rectifier

Half wave Full wave Bridge

Number of diodes

1

2

4

PIV of diodes

Vm

2Vm

Vm

Page 42: Two Wheeler Theft Control

D.C output voltage

Vm/

2Vm/

2Vm/

Vdc,at

no-load

0.318Vm

0.636Vm 0.636Vm

Ripple factor

1.21

0.482

0.482

Ripple

frequency

f

2f

2f

Rectification

efficiency

0.406

0.812

0.812

Transformer

Utilization

Factor(TUF)

0.287 0.693 0.812

RMS voltage Vrms Vm/2 Vm/√2 Vm/√2

4.2.2.1Full-wave Rectifier:

From the above comparison we came to know that full wave bridge rectifier as more

advantages than the other two rectifiers. So, in our project we are using full wave bridge

rectifier circuit.

Bridge Rectifier: A bridge rectifier makes use of four diodes in a bridge arrangement to

achieve full-wave rectification. This is a widely used configuration, both with individual

diodes wired as shown and with single component bridges where the diode bridge is

wired internally.

A bridge rectifier makes use of four diodes in a bridge arrangement as shown in

fig(a) to achieve full-wave rectification. This is a widely used configuration, both with

individual diodes wired as shown and with single component bridges where the diode

bridge is wired internally.

Page 43: Two Wheeler Theft Control

Fig(A)

Operation:

During positive half cycle of secondary, the diodes D2 and D3 are in forward biased

while D1 and D4 are in reverse biased as shown in the fig(b). The current flow direction

is shown in the fig (b) with dotted arrows.

Fig(B)

During negative half cycle of secondary voltage, the diodes D1 and D4 are in forward

biased while D2 and D3 are in reverse biased as shown in the fig(c). The current flow

direction is shown in the fig (c) with dotted arrows.

Page 44: Two Wheeler Theft Control

Fig(C)

4.2.3 Filter:

A Filter is a device which removes the a.c component of rectifier output

but allows the d.c component to reach the load

4.2.3.1Capacitor Filter:

We have seen that the ripple content in the rectified output of half wave rectifier is

121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high

percentages of ripples is not acceptable for most of the applications. Ripples can be

removed by one of the following methods of filtering.

(a) A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage

though it due to low impedance. At ripple frequency and leave the d.c.to appears the load.

(b) An inductor, in series with the load, prevents the passage of the ripple current (due to

high impedance at ripple frequency) while allowing the d.c (due to low resistance to d.c)

(c) Various combinations of capacitor and inductor, such as L-section filter section

filter, multiple section filter etc. which make use of both the properties mentioned in (a)

and (b) above. Two cases of capacitor filter, one applied on half wave rectifier and

another with full wave rectifier.

Page 45: Two Wheeler Theft Control

Filtering is performed by a large value electrolytic capacitor connected across the

DC supply to act as a reservoir, supplying current to the output when the varying DC

voltage from the rectifier is falling. The capacitor charges quickly near the peak of the

varying DC, and then discharges as it supplies current to the output. Filtering

significantly increases the average DC voltage to almost the peak value (1.4 × RMS

value).

To calculate the value of capacitor(C),

C = ¼*√3*f*r*Rl

Where,

f = supply frequency,

r = ripple factor,

Rl = load resistance

Note: In our circuit we are using 1000µF. Hence large value of capacitor is placed

to reduce ripples and to improve the DC component.

4.2.4 Regulator:

Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output

voltages. The maximum current they can pass also rates them. Negative voltage

regulators are available, mainly for use in dual supplies. Most regulators include some

automatic protection from excessive current ('overload protection') and overheating

('thermal protection'). Many of the fixed voltage regulator ICs have 3 leads and look like

power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is

simple to use. You simply connect the positive lead of your unregulated DC power

supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to

the Common pin and then when you turn on the power, you get a 5 volt supply from the

output pin.

Page 46: Two Wheeler Theft Control

Fig 6.1.6 A Three Terminal Voltage Regulator

4.2.4.1 78XX:

The Bay Linear LM78XX is integrated linear positive regulator with three

terminals. The LM78XX offer several fixed output voltages making them useful in wide

range of applications. When used as a zener diode/resistor combination replacement, the

LM78XX usually results in an effective output impedance improvement of two orders of

magnitude, lower quiescent current. The LM78XX is available in the TO-252, TO-220 &

TO-263packages,

Features:

• Output Current of 1.5A

• Output Voltage Tolerance of 5%

• Internal thermal overload protection

• Internal Short-Circuit Limited

• No External Component

• Output Voltage 5.0V, 6V, 8V, 9V, 10V,12V, 15V, 18V, 24V

• Offer in plastic TO-252, TO-220 & TO-263

• Direct Replacement for LM78XX

4.3 IR transmitter:

4.3.1 IR LED:

Page 47: Two Wheeler Theft Control

Here the IR transmitter is nothing but the IR LED. It just looks like a normal LED but

transmits the IR signals. Since the IR rays are out of the visible range we cannot observe

the rays from the transmitter.

These are infrared LEDs; the light output is not visible by our eyes. They can be used as

replacement LEDs for remote controls, night vision for camcorders, invisible beam

sensors, etc.

Fig 30: IR LED

Advantages:

Infrared LEDs are ideal light sources for use with night vision goggles,

surveillance cameras, medical imaging, recognition and calibration

systems.

Due to their resistance to ambient-light impediments and electromagnetic

interference (EMI), Infrared LEDs enhance the performance of wireless

computer-to-PDA links, collision avoidance systems, automation

equipment, biomedical instrumentation, and telecommunications

equipment.

Page 48: Two Wheeler Theft Control

Solid-state design renders Infrared LEDs impervious to electrical and

mechanical shock, vibration, frequent switching and environmental

extremes. With an average life span of 100,000-plus hours (11 years),

Infrared LEDs operate reliably year-after-year.

4.4 Photo diode:

A photodiode is a type of photodetector capable of converting light into either

current or voltage, depending upon the mode of operation.

Photodiodes are similar to regular semiconductor diodes except that they may be

either exposed (to detect vacuum UV or X-rays) or packaged with a window or optical

fibre connection to allow light to reach the sensitive part of the device. Many diodes

designed for use specifically as a photodiode will also use a PIN junction rather than the

typical PN junction.

Principle of operation

A photodiode is a PN junction or PIN structure. When a photon of sufficient

energy strikes the diode, it excites an electron thereby creating a mobile electron and a

positively charged electron hole. If the absorption occurs in the junction's depletion

region, or one diffusion length away from it, these carriers are swept from the junction by

the built-in field of the depletion region. Thus holes move toward the anode, and

electrons toward the cathode, and a photocurrent is produced.

4.4.1 Photovoltaic mode

When used in zero bias or photovoltaic mode, the flow of photocurrent out of the

device is restricted and a voltage builds up. The diode becomes forward biased and "dark

current" begins to flow across the junction in the direction opposite to the photocurrent.

This mode is responsible for the photovoltaic effect, which is the basis for solar cells—in

fact, a solar cell is just an array of large photodiodes.

Page 49: Two Wheeler Theft Control

4.4.2 Photoconductive mode

In this mode the diode is often (but not always) reverse biased. This increases the

width of the depletion layer, which decreases the junction's capacitance resulting in faster

response times. The reverse bias induces only a small amount of current (known as

saturation or back current) along its direction while the photocurrent remains virtually the

same.

Although this mode is faster, the photovoltaic mode tends to exhibit less

electronic noise. (The leakage current of a good PIN diode is so low – < 1nA – that the

Johnson–Nyquist noise of the load resistance in a typical circuit often dominates.)

4.4.3 Other modes of operation

Avalanche photodiodes have a similar structure to regular photodiodes, but they are

operated with much higher reverse bias. This allows each photo-generated carrier to be

multiplied by avalanche breakdown, resulting in internal gain within the photodiode,

which increases the effective responsivity of the device.

Phototransistors also consist of a photodiode with internal gain. A phototransistor is in

essence nothing more than a bipolar transistor that is encased in a transparent case so that

light can reach the base-collector junction. The electrons that are generated by photons in

the base-collector junction are injected into the base, and this current is amplified by the

transistor operation. Note that although phototransistors have a higher responsivity for

light they are unable to detect low levels of light any better than photodiodes.

Phototransistors also have slower response times.

4.4.4 Materials

The material used to make a photodiode is critical to defining its properties, because only

photons with sufficient energy to excite electrons across the material's bandgap will

produce significant photocurrents.

Page 50: Two Wheeler Theft Control

Materials commonly used to produce photodiodes include:

Material Wavelength range (nm)

Silicon 190–1100

Germanium 400–1700

Indium gallium arsenide 800–2600

Lead sulfide <1000-3500

Because of their greater bandgap, silicon-based photodiodes generate less noise

than germanium-based photodiodes, but germanium photodiodes must be used for

wavelengths longer than approximately 1 µm.

Since transistors and ICs are made of semiconductors, and contain P-N junctions,

almost every active component is potentially a photodiode. Many components, especially

those sensitive to small currents, will not work correctly if illuminated, due to the induced

photocurrents. In most components this is not desired, so they are placed in an opaque

housing. Since housings are not completely opaque to X-rays or other high energy

radiation, these can still cause many ICs to malfunction due to induced photo-currents.

4.4.5 Features

Critical performance parameters of a photodiode include:

Responsivity:

The ratio of generated photocurrent to incident light power, typically expressed in

A/W when used in photoconductive mode. The responsivity may also be

Page 51: Two Wheeler Theft Control

expressed as a quantum efficiency, or the ratio of the number of photogenerated

carriers to incident photons and thus a unitless quantity.

Dark current:

The current through the photodiode in the absence of light, when it is operated in

photoconductive mode. The dark current includes photocurrent generated by

background radiation and the saturation current of the semiconductor junction.

Dark current must be accounted for by calibration if a photodiode is used to make

an accurate optical power measurement, and it is also a source of noise when a

photodiode is used in an optical communication system.

Noise-equivalent power:

(NEP) The minimum input optical power to generate photocurrent, equal to the

rms noise current in a 1 hertz bandwidth. The related characteristic detectivity (D)

is the inverse of NEP, 1/NEP; and the specific detectivity () is the detectivity

normalized to the area (A) of the photodetector,. The NEP is roughly the

minimum detectable input power of a photodiode.

When a photodiode is used in an optical communication system, these

parameters contribute to the sensitivity of the optical receiver, which is the

minimum input power required for the receiver to achieve a specified bit

error ratio.

4.4.6 Applications

Photodiode schematic symbol. P-N photodiodes are used in similar applications to other

photodetectors, such as photoconductors, charge-coupled devices, and photomultiplier

tubes.

Page 52: Two Wheeler Theft Control

Fig 31: Photo Diode

Photodiodes are used in consumer electronics devices such as compact disc

players, smoke detectors, and the receivers for remote controls in VCRs and

televisions.

In other consumer items such as camera light meters, clock radios (the ones that

dim the display when it's dark) and street lights, photoconductors are often used

rather than photodiodes, although in principle either could be used.

Photodiodes are often used for accurate measurement of light intensity in science

and industry. They generally have a better, more linear response than

photoconductors.

They are also widely used in various medical applications, such as detectors for

computed tomography (coupled with scintillations) or instruments to analyze

samples (immunoassay). They are also used in blood gas monitors.

PIN diodes are much faster and more sensitive than ordinary p-n junction diodes,

and hence are often used for optical communications and in lighting regulation.

P-N photodiodes are not used to measure extremely low light intensities. Instead,

if high sensitivity is needed, avalanche photodiodes, intensified charge-coupled

devices or

photomultiplier tubes are used for applications such as astronomy , spectroscopy,

night vision equipment and laser range finding.

Page 53: Two Wheeler Theft Control

4.5 Liquid Crystal Display

4.5.1 Introduction to LCD:

In recent years the LCD is finding widespread use replacing LED s (seven-segment LED

or other multi segment LED s). This is due to the following reasons:

1. The declining prices of LCD s.

2. The ability to display numbers, characters and graphics. This is in

contract to LED s, which are limited to numbers and a few characters.

3. Incorporation of a refreshing controller into the LCD, there by relieving the CPU

of the task of refreshing the LCD. In the contrast, the LED must be refreshed by

the CPU to keep displaying the data.

4. Ease of programming for characters and graphics.

4.5.2 USES:

The LCD s used exclusively in watches, calculators and measuring instruments is

the simple seven-segment displays, having a limited amount of numeric data. The recent

advances in technology have resulted in better legibility, more information displaying

capability and a wider temperature range. These have resulted in the LCD s being

extensively used in telecommunications and entertainment electronics. The LCD s has

even started replacing the cathode ray tubes (CRTs) used for the display of text and

graphics, and also in small TV applications.

Page 54: Two Wheeler Theft Control

4 . 5 . 3 S p e c i f i c a t i o n s

Number of Characters: 16 characters x 2 Lines

Character Table: English-European (RS in Datasheet)

Module dimension: 80.0mm x 36.0mm x 13.2mm(MAX)

View area: 66.0 x 16.0 mm

Active area: 56.2 x 11.5 mm

Dot size: 0.56 x 0.66 mm

Dot pitch: 0.60 x 0.70 mm

Character size: 2.96 x 5.46 mm

Character pitch: 3.55 x 5.94 mm

LCD type: STN, Positive, Transflective, Yellow/Green

Duty: 1/16

View direction: Wide viewing angle

Backlight Type: yellow/green LED

RoHS Compliant: lead free

Operating Temperature: -20°C to + 70°C

4.5.4 LCD PIN DIAGRAM:

Page 55: Two Wheeler Theft Control

4.5.5 LCD pin description

The LCD discussed in this section has 14 pins. The function of each pin is given in table.

TABLE 1: Pin description for LCD:

Pin symbol I/O Description

1 Vss -- Ground

2 Vcc -- +5V power supply

3 VEE -- Power supply to

control contrast

4 RS I RS=0 to select

command register

RS=1 to select

data register

5 R/W I R/W=0 for write

R/W=1 for read

6 E I/O Enable

7 DB0 I/O The 8-bit data bus

8 DB1 I/O The 8-bit data bus

9 DB2 I/O The 8-bit data bus

10 DB3 I/O The 8-bit data bus

11 DB4 I/O The 8-bit data bus

12 DB5 I/O The 8-bit data bus

13 DB6 I/O The 8-bit data bus

Page 56: Two Wheeler Theft Control

14 DB7 I/O The 8-bit data bus

TABLE 2: LCD Command Codes

Code

(hex)

Command to LCD Instruction

Register

1 Clear display screen

2 Return home

4 Decrement cursor

6 Increment cursor

5 Shift display right

7 Shift display left

8 Display off, cursor off

A Display off, cursor on

C Display on, cursor off

E Display on, cursor on

F Display on, cursor blinking

10 Shift cursor position to left

14 Shift cursor position to right

18 Shift the entire display to the left

1C Shift the entire display to the right

80 Force cursor to beginning of 1st line

C0 Force cursor to beginning of 2nd line

38 2 lines and 5x7 matrix

Page 57: Two Wheeler Theft Control

4.6 LCD INTERFACING

Sending commands and data to LCDs with a time delay:

To send any command from table 2 to the LCD, make pin RS=0. For data, make

RS=1.Then place a high to low pulse on the E pin to enable the internal latch of the LCD.

Page 58: Two Wheeler Theft Control

4.7 BUZZER

The "Piezoelectric sound components" introduced herein operate on an innovative

principle utilizing natural oscillation of piezoelectric ceramics. These buzzers are offered

in lightweight compact sizes from the smallest diameter of 12mm to large Piezo electric

sounders. Today, piezoelectric sound components are used in many ways such as home

appliances, OA equipment, audio equipment telephones, etc. And they are applied

widely, for example, in alarms, speakers, telephone ringers, receivers, transmitters, beep

sounds, etc.

FIG: Types of Buzzers

4.7.1 Oscillating System:

Basically, the sound source of a piezoelectric sound component is a piezoelectric

diaphragm. A piezoelectric diaphragm consists of a piezoelectric ceramic plate which has

Page 59: Two Wheeler Theft Control

electrodes on both sides and a metal plate (brass or stainless steel, etc.). A piezoelectric

ceramic plate is attached to a metal plate with adhesives.

Fig. 2 shows the oscillating system of a piezoelectric diaphragm. Applying D.C.

voltage between electrodes of a piezoelectric diaphragm causes mechanical distortion due

to the piezoelectric effect. For a misshaped piezoelectric element, the distortion of the

piezoelectric element expands in a radial direction. And the piezoelectric diaphragm

bends toward the direction shown in Fig.2 (a).

The metal plate bonded to the piezoelectric element does not expand. Conversely,

when the piezoelectric element shrinks, the piezoelectric diaphragm bends in the

direction shown in Fig.2 (b). Thus, when AC voltage is applied across electrodes, the

Page 60: Two Wheeler Theft Control

bending shown in Fig.2 (a) and Fig.2 (b) is repeated as shown in Fig.2 (c), producing

sound waves in the air.

4.7.2DESIGN PROCEDURES:

In general, man's audible frequency range is about 20 Hz to 20kHz. Frequency

ranges of 2kHz to 4kHz are most easily heard. For this reason, most piezoelectric sound

components are used in this frequency range, and the resonant frequency (f0) is generally

selected in the same range too. As shown in Fig. 3, the resonant frequency depends on

methods used to support the piezoelectric diaphragm. If piezoelectric diaphragms are of

the same shape, their values will become smaller in the order of (a), (b) and (c).

In general, the piezoelectric diaphragm is installed in a cavity to produce high

sound pressure. The resonant frequency (fcav) of the cavity in is obtained from Formula

(1) (Helmholtz's Formula). Since the piezoelectric diaphragm and cavity have proper

resonant frequencies, (f0) and (fcav) respectively, sound pressure in specific frequencies

can be increased and a specific bandwidth can be provided by controlling both positions.

4.8 DC Motor

DC motors are configured in many types and sizes, including brush less, servo,

and gear motor types. A motor consists of a rotor and a permanent magnetic field stator.

Page 61: Two Wheeler Theft Control

The magnetic field is maintained using either permanent magnets or electromagnetic

windings. DC motors are most commonly used in variable speed and torque.

Motion and controls cover a wide range of components that in some way are used

to generate and/or control motion. Areas within this category include bearings and

bushings, clutches and brakes, controls and drives, drive components, encoders and

resolves, Integrated motion control, limit switches, linear actuators, linear and rotary

motion components, linear position sensing, motors (both AC and DC motors),

orientation position sensing, pneumatics and pneumatic components, positioning stages,

slides and guides, power transmission (mechanical), seals, slip rings, solenoids, springs.

Motors are the devices that provide the actual speed and torque in a drive system. 

This family includes AC motor types (single and multiphase motors, universal, servo

motors, induction, synchronous, and gear motor) and DC motors (brush less, servo motor,

and gear motor) as well as linear, stepper and air motors, and motor contactors and

starters.

In any electric motor, operation is based on simple electromagnetism. A current-

carrying conductor generates a magnetic field; when this is then placed in an external

magnetic field, it will experience a force proportional to the current in the conductor, and

to the strength of the external magnetic field. As you are well aware of from playing with

magnets as a kid, opposite (North and South) polarities attract, while like polarities

(North and North, South and South) repel. The internal configuration of a DC motor is

designed to harness the magnetic interaction between a current-carrying conductor and an

external magnetic field to generate rotational motion.

Let's start by looking at a simple 2-pole DC electric motor (here red represents a

magnet or winding with a "North" polarization, while green represents a magnet or

winding with a "South" polarization).

Page 62: Two Wheeler Theft Control

Fig 25: Block Diagram of the DC motor

Every DC motor has six basic parts -- axle, rotor (a.k.a., armature), stator,

commutator, field magnet(s), and brushes. In most common DC motors (and all that

Beamers will see), the external magnetic field is produced by high-strength permanent

magnets1. The stator is the stationary part of the motor -- this includes the motor casing,

as well as two or more permanent magnet pole pieces. The rotor (together with the axle

and attached commutator) rotates with respect to the stator. The rotor consists of

windings (generally on a core), the windings being electrically connected to the

commutator. The above diagram shows a common motor layout -- with the rotor inside

the stator (field) magnets.

The geometry of the brushes, commutator contacts, and rotor windings are such

that when power is applied, the polarities of the energized winding and the stator

magnet(s) are misaligned, and the rotor will rotate until it is almost aligned with the

stator's field magnets. As the rotor reaches alignment, the brushes move to the next

commutator contacts, and energize the next winding. Given our example two-pole motor,

the rotation reverses the direction of current through the rotor winding, leading to a "flip"

of the rotor's magnetic field, and driving it to continue rotating.

In real life, though, DC motors will always have more than two poles (three

is a very common number). In particular, this avoids "dead spots" in the commutator.

You can imagine how with our example two-pole motor, if the rotor is exactly at the

middle of its rotation (perfectly aligned with the field magnets), it will get "stuck" there.

Meanwhile, with a two-pole motor, there is a moment where the commutator shorts out

Page 63: Two Wheeler Theft Control

the power supply (i.e., both brushes touch both commutator contacts simultaneously).

This would be bad for the power supply, waste energy, and damage motor components as

well. Yet another disadvantage of such a simple motor is that it would exhibit a high

amount of torque” ripple" (the amount of torque it could produce is cyclic with the

position of the rotor).

Fig 26: Block Diagram of the DC motor having two poles only

So since most small DC motors are of a three-pole design, let's tinker with the

workings of one via an interactive animation (JavaScript required):

Fig 27: Block Diagram of the DC motor having Three poles

You'll notice a few things from this -- namely, one pole is fully energized at a

time (but two others are "partially" energized). As each brush transitions from one

commutator contact to the next, one coil's field will rapidly collapse, as the next coil's

Page 64: Two Wheeler Theft Control

field will rapidly charge up (this occurs within a few microsecond). We'll see more about

the effects of this later, but in the meantime you can see that this is a direct result of the

coil windings' series wiring:

Fig 28: Internal Block Diagram of the Three pole DC motor

There's probably no better way to see how an average dc motor is put together,

than by just opening one up. Unfortunately this is tedious work, as well as requiring the

destruction of a perfectly good motor. This is a basic 3-pole dc motor, with 2 brushes

and three commutator contacts.

4.8.1Circuit description:

Main aim our project is to alert the owner by sounding the buzzer if any one try for theft

of byke.

In order to find the theft, we will arrange IR transmitter at the mud guard of byke and IR

receiver at crash guard. As transmitter and the receiver are in LOS, signal transmitted by

the transmitter will continuously received by the receiver.

If the thief tries to open the key of byke and turn the handle, continuity of signal will be

disturbed and microcontroller will get low signal to it. According to the program written,

Page 65: Two Wheeler Theft Control

it will sound the buzzer to alert the user. Motor connected is just like motor inside byke

engine. After the buzzer, although the thief tries to start the byke, it will off the engine.

And as we need supply for all these devices, connected a power supply

4.9 KEIL SOFTWARE:

Keil development tools for the 8051 Microcontroller Architecture support every

level of software developer from the professional applications engineer to the student just

learning about embedded software development.

The industry-standard Keil C Compilers, Macro Assemblers, Debuggers, Real-

time Kernels, Single-board Computers, and Emulators support all 8051 derivatives and

help you get your projects completed on schedule.

Simulation:

The µVision Simulator allows you to debug programs using only your PC using

simulation drivers provided by Keil and various third-party developers. A good

simulation environment, like µVision, does much more than simply simulate the

instruction set of a microcontroller — it simulates your entire target system including

interrupts, startup code, on-chip peripherals, external signals, and I/O.

This software is used for execution of microcontroller programs.

Keil development tools for the MC architecture support every level of software

developer from the professional applications engineer to the student just learning about

embedded software development.The industry-standard keil C compilers, macro

assemblers, debuggers,real, time Kernels, Single-board computers and emulators support

all microcontroller deriveatives and help you to get more projects completed on

schedule. The keil software development tools are designed to solve the complex

Problems facing embedded software developers.

Page 66: Two Wheeler Theft Control

When starting a new project, simply select the microcontroller you the device database

and the µvision IDE sets all compiler, assembler, linker, and memory options for you.

Numerous example programs are included to help you get started with the

most popular embedded avr devices.

The keil µ Vision debugger accurately simulates on-chip peripherals (PC,

CAN, UART, SPI,Interrupts,I/O ports, A/D converter, D/A converter and PWM

modules)of your avr device. Simulation helps you understand h/w configurations and

avoids time wasted on setup problems. Additionally,with simulation, you can write and

test applications before target h/w is available.

When you are ready to begin testing your s/w application with target h/w, use the

MON51, MON390, MONADI, or flash MON51 target monitors, the ISD51 In-System

Debugger, or the ULINK USB-JTAG adapter to download and test program code on

your target system.

SOURCE CODE

Click on the Keil uVision Icon on DeskTop

The following fig will appear

Page 67: Two Wheeler Theft Control

Click on the Project menu from the title bar

Then Click on New Project

Save the Project by typing suitable project name with no extension in u r own folder sited

in either C:\ or D:\

Page 68: Two Wheeler Theft Control

Then Click on Save button above.

Select the component for u r project. i.e. Atmel……

Click on the + Symbol beside of Atmel

Page 69: Two Wheeler Theft Control

Select AT89C52 as shown below

Then Click on “OK”

The Following fig will appear

Page 70: Two Wheeler Theft Control

Then Click either YES or NO………mostly “NO”

Now your project is ready to USE

Now double click on the Target1, you would get another option “Source group 1” as

shown in next page.

Click on the file option from menu bar and select “new”

Page 71: Two Wheeler Theft Control

The next screen will be as shown in next page, and just maximize it by double clicking on

its blue boarder.

Now start writing program in either in “C” or “ASM”

For a program written in Assembly, then save it with extension “. asm” and for “C”

based program save it with extension “ .C”

Page 72: Two Wheeler Theft Control

Now right click on Source group 1 and click on “Add files to Group Source”

Now you will get another window, on which by default “C” files will appear.

Page 73: Two Wheeler Theft Control

Now select as per your file extension given while saving the file

Click only one time on option “ADD”

Now Press function key F7 to compile. Any error will appear if so happen.

If the file contains no error, then press Control+F5 simultaneously.

Page 74: Two Wheeler Theft Control

The new window is as follows

Then Click “OK”

Now Click on the Peripherals from menu bar, and check your required port as shown in

fig below

Drag the port a side and click in the program file.

Page 75: Two Wheeler Theft Control

Now keep Pressing function key “F11” slowly and observe.

You are running your program successfully

Page 76: Two Wheeler Theft Control

CONCLUSION

The project “two wheeler theft control” has been successfully designed and tested.

Integrating features of all the hardware components used have developed it. Presence of

every module has been reasoned out and placed carefully thus contributing to the best

working of the unit. Secondly, using highly advanced IC’s and with the help of growing

technology the project has been successfully implemented.

Page 77: Two Wheeler Theft Control

BIBLIOGRAPHY

The 8051 Micro controller and Embedded Systems -Muhammad Ali Mazidi Janice Gillispie Mazidi

The 8051 Micro controller Architecture, Programming & Applications

-Kenneth J.Ayala

Fundamentals Of Micro processors and Micro computers

-B.Ram

Micro processor Architecture, Programming & Applications

-Ramesh S.Gaonkar

Electronic Components

-D.V.Prasad

References on the Web:www.national.comwww.atmel.comwww.microsoftsearch.comwww.geocities.com