Free Essay

Acciedent Detection

In:

Submitted By destaw
Words 5593
Pages 23
Table Of Contents
Chapter One .................................................................................................................................... 3
Introduction ..................................................................................................................................... 3
1.1 Statement of the problem ...................................................................................................... 4
1.2 Objectives .............................................................................................................................. 4
1.2.1 General objective ........................................................................................................... 4
1.2.2 Specific objective ........................................................................................................... 4
1.3 Scope of the project ............................................................................................................... 4
1.4 Significance of the Project....................................................................................................... 4
1.5 Limitation of the project ....................................................................................................... 5
1.6 Methodology ......................................................................................................................... 5
Chapter Three .................................................................................................................................. 7
System block diagram ..................................................................................................................... 7
3.1 System block diagram ........................................................................................................... 7
..................................................................................................................................................... 9
3.2 Block Diagram Description................................................................................................... 9
Chapter Three ................................................................................................................................ 11
Literature Review .......................................................................................................................... 11
Chapter Four ................................................................................................................................. 13
System Design and Implementation.............................................................................................. 13
4.1 Components used ................................................................................................................ 13
4.1.1 Power Supply ............................................................................................................... 13
4.1.2 Resistors ....................................................................................................................... 14
4.1.3 Capacitors..................................................................................................................... 15
4.1.4

LCD Display ........................................................................................................... 15

4.1.5 PIC 16F877A Microcontroller ..................................................................................... 16
4.1.5 GSM module ................................................................................................................ 19
4.1.6 RS232 ........................................................................................................................... 20
4.1.7 MAX232 ...................................................................................................................... 22
4.1.8AT commands ............................................................................................................... 24
4.1.9 Vibration Sensor .......................................................................................................... 24
4.1.10 Crystal ........................................................................................................................ 25

4.1.11Relay interface ............................................................................................................ 25
4.2 Software requirements and description ............................................................................... 26
4.2.1 Programming language ................................................................................................ 26
4.2.2 IDE ............................................................................................................................... 26
4.4 Simulated Hardware circuit description .............................................................................. 27
4.4.1 Normal Condition ........................................................................................................ 27
4.4.2 Accident condition ....................................................................................................... 27
4.4.3 Fire condition ............................................................................................................... 28

Chapter One
Introduction
Now a days, in our country specifically in Addis Ababa, there are more and more traffic congestion as vehicle’s demands are getting high in day to day. So, transportation needs more improvement as demands are increasing there will be more possibility of vehicle accidents.
Vehicle accidents are one of the leading causes of the fatalities. It will be a serious consequence if people can’t get help on right time. Poor emergency incident is a major cause of death rate in our country. Even with awareness campaign, this problem is still rising due to riders drunk driving and speed driving. Major automobile manufacturers have developed safety devices such as seat belt to protect riders from accidental injuries.
Life saving measure electronic stability control also reduces injuries. Crash analysis studies have shown, traffic accidents could have been prevented with the use of this advanced life saving measure. This design focuses on providing basic information on the accident site to the hospital or police station. As result of this sudden help, public life may get save. In this work, ADXL accelerometer, a three-axis accelerometer and GPS tracking system works for accidental monitoring. This design detects accidents in less time and sends this information to the control section. In this case GSM will send short message to the control section. This message will read the geographical co-ordinates of accident spot with the help of GPS. And, as now the location has been traced by the GPS, emergency medical service can be given to the accident victims as soon as possible. Using this method, traffic fatal accidents can be reduced as time between when accident occurs and responders are dispatched to the accident scene, reduces. Accelerometer sensor embedded in a car determines severity of the accident as how much car has rolled.
As soon as the accident occurs, an alert message including latitude, longitude position, date and time of accident occurrence and finally link, indicating Google map is sent automatically to the to control section. This message is sent with the help of the GSM module and accident location is detected through GPS module. The accident can be recognized precisely with the help of ADXL accelerometer sensor which also acts as vibration sensor and sent to control section. This design provides solution to the road accidents in most feasible way.

1.1 Statement of the problem
Now a days in Addis Ababa there is a heavy traffic and so many accidents are occurred and the traffic lighting system is not give any priority to the ambulance. Due to this reason, so many peoples are lost their life especially when there is no person around the vehicle in order to give emergency and the ambulance is not reach with the short period of time and there is a delay to reach the hospital due to high traffic congestion.

1.2 Objectives
The objective of this project was categorized as the general objective and specific objective discussed as follows.

1.2.1 General objective
To design automatic accident detection with intelligent traffic lighting system

1.2.2 Specific objective
 To Design self-accident detection system
 To Design intelligent traffic lighting system
 To design ambulance unit system
 To design a web application to show the details of the system
 To minimize human death that comes due to ambulance delay

1.3 Scope of the project
This project is designed and developed GPS and GSM based accident detection and intelligent traffic system for Addis Ababa. The system can detect accident automatically and sends short message to the PC. Then the PC verifies the nearest ambulance and it sends a message and the traffic light is automatically becomes ready for the ambulance to be free to reach without delay.
After we assembling the hardware and loading software program to the system designed and simulate the system using proteus, micro c pro and C# in connection with Sql server.

1.4 Significance of the Project


Remote communication using GSM modem from any where in world.



GPS based location Identification.



Sends location in the form of latitude and longitude.



Automatic accident location alert to police/ambulance.



Theft control through GSM short message service with some modification .

1.5 Limitation of the project
 It is not functional without GSM Network
 It is difficult to understand who cannot English language

1.6 Methodology
RAD model uses the following four phases.
 Requirements planning:-during this phase, the users, executive champion, management, team leaders, and other stakeholders agree on the project’s general goals and requirements.
The requirements should be specified in a general way so that they don’t restrict later development unnecessarily. When the stakeholders agree on the requirements and the project receives approval to continue, the user design phase begins.
 User design:-The users and team members work together to convert the requirements into a workable design. They use techniques such as focus groups, workshops, prototyping, and brainstorming to come up with a workable design.
 Construction:-The developers go to work building the application. The users continue to review the pieces of the application as the developers build them to make corrections and suggestions for improvements.
 Cutover:-The developers deliver the finished application to the users. (You can use the usual cutover strategies such as staged delivery, gradual cutover, or incremental deployment.)

Figure 1 RAD Model diagram

The user design and construction phases overlap with the users constantly providing adjustments to the developers in a sort of continuous feedback loop. The project iterates the user design and construction phases as needed. When the application has met all the requirements, it is delivered to the users.
Disadvantage of RAD Model
 Not an appropriate model in the absence of user participation.
 Reusable components are required to reduce development time.
 Highly specialized & skilled developers are required and such developers are not easily available. Chapter Three
System block diagram
In proposed system if a vehicle has met accidents, immediately an alert message with the location coordinates is sent to the Control center. From the control center, a message is sent to the nearby ambulance. Also signal is transmitted to all the signals in between ambulance and vehicle location to provide RF communication between ambulance and traffic section. The vehicle accident observed using vibration sensor and in the control section it is received by the microcontroller and then the nearby ambulance is received from the PC and controller sends the message to the ambulance. The signal to Traffic signal section is transmitted through RF Communication. Also if any fire occurs, it is detected using fire sensor and an alarm message is directly sent to the fire station. 3.1 System block diagram
A. Block Diagram of vehicle unit
If a vehicle has met accident, vibration sensor or fire sensor gives the electric signal to microcontr oller through]signal conditioner.Then GPS provides latitude and longitude information about vehicle location to control section.through GSM.

Vibration
Sensor

GSM
Modem

Fire Sensor
MAX232

Fig 2. Block Diagram of vehicle unit

B. Block Diagram of Ambulance/Control Unit
In control section GSM modem receives message about accident and send it to PC. PC identifies the nearest ambulance and ambulance is instructed to pick up the patient. Control section transmits the control signal to all the signals in between ambulance and vehicle by RF transmission

RF Transmitter

HT12D Encoder

GSM
Modem

UART control PC

Figure 3 Block Diagram of Ambulance/Control Unit
C.Block Diagram Of Traffic Unit
Whenever the ambulance reaches near to the traffic signal(approximately 100m), the traffic signal will be made to green through RF communication. Thereby the ambulance is recommended to reach the hospital in time.

RF Receiver

HT12D Decoder

Figure 4 Block Diagram Of traffic unit

3.2 Block Diagram Description
The system consists of three main units, which coordinates with each other and makes sure that ambulance reaches the hospital without any time lag. Thus system is divided into following three units  The Vehicle Unit
 The Ambulance/control Unit
 Traffic unit
A. Vehicle unit
The vehicle unit installed in the vehicle senses the accident and sends the location of the accident to the controller. According to the system, every vehicle should have a vehicle unit. The vehicle unit consists of a vibration sensor, controller, siren, a user interface, GPS system and a GSM

module. The vibration sensor used in the vehicle will continuously sense for any large scale vibration in the vehicle

[1].

The sensed data is given to the controller GPS SYSTEM inside the

vehicle. The GPS SYSTEM finds out the current position of the vehicle (latitude and the longitude) which is the location of the accident spot and give s that data to the GSM MODULE. The
GSMMODULE sends this data to the control unit whose GSM number is already there in the module as an emergency number.
B. Ambulance unit
The controller finds the nearest ambulance to the accident spot and also the shortest path between the ambulance, accident spot and the nearest hospital. The controller then sends this path to the ambulance. Also using this information the controller controls all the traffic signals in the path of ambulance and makes it ready to provide free path to ambulance, which ensures that the ambulance reaches the hospital without delay. At the same time, the ambulance unit turns ON the
RF transmitter. This will lead to communicate with the traffic section.
C. Traffic unit
Whenever traffic signal section receives the information about accident, the RF receiver in this section is turned ON to search for ambulance nearing the traffic signal. Whenever the ambulance reaches near to the traffic signal(approximately 100m), the traffic signal will be made to green through RF communication. Thereby the ambulance is recommended to reach the hospital in time.

.

Chapter Three
Literature Review
This section provides a previous study of related work regarding the application of SMS services in a various fields. Some previous researches have been studied to gain more information about current existing GSM control system that was previously implemented. It is necessary to know and understand how the software and hardware were used in the SMS controlled system development. This is to ensure that the study that currently being conducted contribute at certain level of application thus it become more efficient and practical.
There are many efforts, applications; approaches have been proposed to provide security and safety in case of accidents. A novel approach to increase the safety of road travel using the concepts of wireless sensor networks and the Bluetooth protocol has been proposed. It discussed, how vehicles can form mobile ad-hoc networks and exchange data sensed by the on-board sensors [8].

The platform of the android operating system (OS) and software development

environment proved optimum solution for the public safety in case of road accidents

[9].

A good

survey of using personal mobile phone, microcontroller, Bluetooth and Java technology has been provided in [10]. It developed integrated system to manage, control and monitor all the accessories inside the vehicle in order to achieve the idea of an intelligence car with ability to uses personal mobile hand phone as a remote interface. Smart phone-based accident detection can reduce overall traffic congestion and awareness of emergency responders. This approach also has been proposed. [11] A new design was developed containing vehicle tracking and control system to control the vehicle through an android based Smartphone

[12].

Again, one application provided a

solution with the use of a mobile phone for monitoring an SMS-based GPS tracker especially in locations where GPRS may not be available [13]. The general mechanism is to provide the real time position of a vehicle using GPS receiver and send this information to GSM center through the software, this is all done by the monitoring center which is working as a control unit that is connected not only by optical cable but also connected wirelessly through TCP/IP protocols. The monitoring center distributes the data to the client in the understandable format and it also stores the travelling records and displays the information about vehicle on electronic map through GIS system [14]. Another approach is that, vehicle terminal includes a GPS receiver which extracts information about position through GPS satellites and sends it through GSM network and

to the control center which reads the information and saves it in the data base system and on user demand displays it on electronic map [15]. Different application of localizing the vehicle system by receiving the real time position of the vehicle through GPS and send this information through GSM module via SMS service with an added feature of GPRS transmission to the monitoring center through usage of internet [15].
Moreover, the projects for Acquiring Water Level and Temperature Status via SMS also have similarity with this project. This project utilized PIC 16F877 and MPLAB IDE software for programming. The project was designed to detect level and temperature of the water in a pool [4].
The system functions when the level of water and the temperature in pool exceed the desired limits.
At the same time the PIC circuit will automatically interface to the mobile phone and send the alert message to the user.
H.G Rodney Tan, of IEEE

(2007) uses GSM Network to his study “Automatic Power

Meter Reading System Using GSM Network” presented the advantage of the available GSM infrastructure nationwide coverage in the country and the Short Messaging System cell broadcasting feature to request and retrieve individuals houses and building power consumption meter reading back to the energy provider wirelessly. The Store and forwarding features of SMS allow reliable meter reading delivery when GSM signal is affected by poor weather condition. The stored SMS is an archive in the mobile operator and can be retrieved for billing verification purpose [5]. This project also uses Pic microcontroller, GSM and GPS in addition that it uses EEPROM in order to save the phone number and contains ambulance unit and traffic unit in order to reach the hospital in a short period of time.

Chapter Four
System Design and Implementation
4.1 Components used
1. Power Supply
2. Resistors
3. Temperature sensor
4. LED
5. Capacitors
6. PIC16F877A Microcontroller
7. LCD
8. MAX232
9. GSM modem
10. PC
11. RS 232 cable
12. HyperTerminal
13. Temperature Sensor LM35
14. Relay

Software development tools used
1. Proteus Design Suit Version 8.0
2. Micro C For PIC
3. Microsoft Visual Studio 2012
4. SQL Server Management Studio

4.1.1 Power Supply
A power supply is an electronic device that supplies electric power to an electrical load.
The primary function of a power supply is to convert one form of electrical energy to another and, as a result, power supplies are sometimes referred to as electric power converters. In the AC/DC power conversion a rectifier is used to convert the transformer output voltage (AC) to a varying
DC voltage, which in turn is passed through an electronic filter to convert it to an unregulated DC

voltage. The filter removes most, but not all of the AC voltage variations; the remaining voltage variations are known as ripple to get +5V DC input for the Microcontroller.

4.1.1.1 Schematic Diagram

Figure 5 Power Supply
Description
In above circuit we have used a regulated power supply, a Step-down transformer TR2 is used which gives 5 volt ac from 230V ac. Four IN 4007 diodes are used which forms a bridge. Three capacitors C1 of 470µf, C2 of 0.01nf and C3 of 0.01nf are used for filter purpose. The regulated
IC 7805 is used for voltage regulating purpose.
Working principle:
A bridge rectifier which is made up of from four diodes rectifies the input 5 volt from the step down transformer. This rectified output is given to C1 & C3 capacitors for filtering purpose. The output from C3 is given to pin no.1 of 7805 IC. The 7805 is regulated IC which regulates the voltage from C3 capacitor. +5V DC output is taken from pin no 3 of 7805 IC. The ground is taken from pin no 2 of 7805 IC.

4.1.2 Resistors
Resistor is a passive component that resists the flow of direct or alternating electric circuit. The resistance of the resistor can be estimated by their color codes. There are some nonlinear resistors whose resistance changes with temperature or light.

4.1.3 Capacitors
A capacitor is a passive two-terminal electrical component used to store energy electrostatically in an electric field. Contain at least two electrical conductors (plates) separated by a dielectric
(insulator). Capacitors are used for smoothing power supply variations, coupling the various stages of audio system, tuning in radio circuits, and store energy like in camera flash.

4.1.4 LCD Display
A 2x16 LCD display is very basic module and is very commonly used in various devices and circuits. These modules are preferred over seven segments and other multi segment LEDs. The reasons being: LCDs are economical; easily programmable; have no limitation of displaying special & even custom characters (unlike in seven segments), animations and so on.
A 16x2 LCD means it can display 16 characters per line and there are 2 such lines. In this LCD each character is displayed in 5x7 pixel matrix. This LCD has two registers, namely, Command and Data.
The command register stores the command instructions given to the LCD. A command is an instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting the cursor position, controlling display etc. The data register stores the data to be displayed on the
LCD. The data is the ASCII value of the character to be displayed on the LCD.

Figure 6 LCD diagram

Table 1 Pin Description of LCD
PIN NO.

NAME

FUNCTION

1

VSS

Ground

2

VDD

Positive Supply

3

VEE

Contrast

4

RS

Register Select

5

R/W

Read/Write

6

E

Enable

7

D0

Data Bit 0

8

D1

Data Bit 1

9

D2

Data Bit 2

10

D3

Data Bit 3

11

D4

Data Bit 4

12

D5

Data Bit 5

13

D6

Data Bit 6

14

D7

Data Bit 7

4.1.5 PIC 16F877A Microcontroller
This device has 40 pins which make it easier to use the peripherals as the functions are spread out over the pins and to decide what external devices to attach without worrying too much if there enough pins to do the job.

One of the main advantages is that each pin is only shared between two or three functions so it’s easier to decide what the pin function (other devices have up to 5 functions for a pin).
Note: A disadvantage of the device is that it has no internal oscillator so you will need an external crystal of other clock source. [1]
Features of PIC16F877A
 High-performance RISC CPU
 Lead-free: RoHS-compliant
 Operating speed:20Mhz, 200ns instruction cycle
 Operating voltage:4.0-5.5volts
 Industrial temperature range(-40 to +85 degrees)
 15 Interrupt source
 35 single word instructions
 All single-cycle instructions except for program branches
 Special Microcontroller Features
 Flash memory:14.3KB(8192 words)
 Data SRAM:368 bytes
 Data EEPROM:256 bytes
 Self-reprogrammable under software control
 In-circuit serial programming via two pins
 Watchdog timer with on-chip RC oscillator
 Programmable code protection
 Power-saving code protection
 Selectable oscillator option
 Peripheral Features
 33 I/O pins : 5 I/O ports
 Timer0:8-bit timer/counter with 8-bit prescaler
 Timer1:16-bit timer/counter with prescaler
 Synchronous serial port with two modes
 USART/SCI with 9-bit address detection
 Parallel slave port
 Brown-out detection circuitry for brown-out reset

 Analog Features
 10-bit, 8-channel A/D converter
 Brown-out reset
 Analog comparable module

Figure 7 Diagram of pic 16F877A

4.1.5 GSM module

Figure 8 GSM modem
A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone [9]. When a GSM modem is connected to a computer, this allows the computer to use the GSM modem to communicate over the mobile network. While these GSM modems are most frequently used to provide mobile internet connectivity, many of them can also be used for sending and receiving SMS and MMS messages. The working of GSM modem is based on commands, the commands always start with AT and finish with a <CR> character. For example, the dialing command is ATD<number>; ATD3314629080; here the dialing command ends with semicolon. The AT commands are given to the GSM modem with the help of PC or controller. The GSM modem is serially interfaced with the controller with the help of MAX 232. GSM modems can be a quick and efficient way to get started with
SMS, because a special subscription to an SMS service provider is not required. In most parts of the world, GSM modems are a cost effective solution for receiving SMS messages, because the sender is paying for the message delivery. [10]
The specifications and characteristics for GSM


Frequency band—The frequency range specified for GSM is 1,850 to 1,990 MHz
(mobile station to base station).



Duplex distance—the duplex distance is 80 MHz Duplex distance is the distance between the uplink and downlink frequencies. A channel has two frequencies, 80 MHz a part [1].



Channel separation—the separation between adjacent carrier frequencies, In GSM, is 200 kHz. 

Modulation—Modulation is the process of sending a signal by changing the characteristics of a carrier frequency. This is done in GSM via Gaussian minimum shift keying (GMSK).



Transmission rate—GSM is a digital system with an over-the-air bit rate of 270 kbp[3].

4.1.6 RS232
The default standard for serial port on computers is RS-232. It uses 3-wires consisting of a transmit signal “TD” (pin 3 of the DB9 connector from the computer perspective), a receive signal “RD”
(pin 2 of the DB9 connector), and a signal ground “SG” (pin 5 of the DB9 connector).

Figure 9 RS-232

Table 2 Pin Description of RS-232
Pin

Signal

Pin

Signal

1

Data carrier detect

6

Data set ready

2

Receiving data

7

Request to send

3

Transmitted data

8

Clear to send

4

Data terminal ready

9

Ring indicator

5

Signal ground

Transmitted Data (TD): One of two separate data signals. This signal is generated by the DTE and received by the DCE.
Received Data (RD): The second of two separate data signals. This signal is generated by the
DCE and received by the DTE.
Request to Send (RTS): When the host system (DTE) is ready to transmit data to the peripheral system (DCE), RTS is turned ON. In simplex and duplex systems, this condition maintains the
DCE in receive mode. In half– duplex systems, this condition maintains the DCE in receive mode and disables transmit mode. The OFF condition maintains the DCE in transmit mode. After RTS is asserted, the DCE must assert CTS before communication can commence.
Clear to Send (CTS): CTS is used along with RTS to provide handshaking between the DTE and the DCE. After the DCE sees an asserted RTS, it turns CTS ON when it is ready to begin communication. Data Set Ready (DSR): This signal is turned on by the DCE to indicate that it is connected to the telecommunications line.
Data Carrier Detect (DCD): This signal is turned ON when the DCE is receiving a signal from a remote DCE which meets its suitable signal criteria. This signal remains ON as long as the suitable carrier signal can be detected.
Data Terminal Ready (DTR): DTR indicates the readiness of the DTE. This signal is turned
ON by the DTE when it is ready to transmit or receive data from the DCE. DTR must be ON before the DCE can assert DSR.

Ring Indicator (RI): RI, when asserted, indicates that a ringing signal is being received on the communications channel.

4.1.7 MAX232
MAX232 IC is used to convert the TTL/CMOS logic levels to RS-232 logic levels during serial communication of microcontrollers with PC. The controller operate at TTL logic level (0 – 5V) whereas the serial communication in PC works on RS2-32 standards (-25V to +25V). This makes link between them to communicate with each other.
The intermediate link is provided through MAX232. It is a dual driver/receiver that includes a capacitive voltage generator to supply RS-232 voltage levels from a single 5V supply.
Each receiver converts RS-232 inputs to 5V TTL/CMOS levels. The drivers (T1 and T2), also called transmitter, convert the TTL/CMOS input level into RS-232 level.

Figure 10 MAX 232

MAX232 pin description:
Table 3 MAX232 pin description
Pin
1

Name
C1+

Function
Capacitor connection pins

2
3
4
5

C3+
C1C2+
C2-

Capacitor connection pins
Capacitor connection pins
Capacitor connection pins
Capacitor connection pins

6

C4-

Capacitor connection pins

7

T2 Out

Output pin; output the serially transmitted data at RS-232 logic level;

R2 In

connected to receiver pin of PC serial port
Input pin; receive serially transmitted data at RS-232 logic level;

9

R2 Out

connected to transmitter pin of PC serial port
Output pin; output the serially data at TTL logic level; connected to

10
11
12

T2 In
T1 In
R1 Out

13

R1 In

connected to transmitter pin of controller
Input pin; receive serially transmitted data at RS-232 logic level;

14

T1 Out

connected to transmitter pin of PC serial port
Output pin; output the serially transmitted data at RS-232 logic level;

15

GND

connected to receiver pin of PC serial port
Signal ground (0V)

16

VCC

5V supply voltage(4.5-5.5)

8

receiver pin of controller
Input pin; receive the serially data at TTL logic level; connected to serial transmitter pin of controller
Output pin; output the serially transmitted data at TTL logic level;

The transmitters take input from controller’s serial transmission pin, TX, and send the output to
RS2332’s receiver pin, RXD. The receiver, on the other hand, take input from transmit pin, TXD
,of RS-232 serial port and give serial output to the microcontroller’s receiver pin, RX. MAX232 need four external capacitors whose value ranges from 1µF to 22µF.

4.1.8AT commands
AT commands are instructions used to control a modem. AT is the abbreviation of Attention. Every command line tarts with "AT" or "at". That's why modem commands are called AT commands.
Many of the commands that are used to control wired dial-up modems, such as ATD (Dial), ATA
(Answer), ATH (Hook control) and ATO (Return to online data state), are also supported by
GSM/GPRS modems and mobile phones
Besides this common AT command set, GSM/GPRS modems and mobile phones support an AT command set that is specific to the GSM technology, which includes SMS-related commands like
AT+CMGS (Send SMS message), AT+CMSS (Send SMS message from storage), AT+CMGL
(List SMS messages) and AT+CMGR (Read SMS messages). Note that the starting "AT" is the prefix that informs the modem about the start of a command line. It is not part of the AT command name. For example, D is the actual AT command name in ATD and +CMGS is the actual AT command name in AT+CMGS. However, some books and web sites use them interchangeably as the name of an AT command.

4.1.9 Vibration Sensor
The ADXL335 is 3-axis accelerometer with signal conditioned voltage outputs. The product acceleration with a minimum full-scale range of ±3 g. It can measure the static acceleration of gravity in tilt sensing applications, as well as dynamic acceleration resulting from motion, shock, or vibration. An accelerometer measures Acceleration is a measure of how quickly speed changes. Accelerometer sensor is used to measure static (earth Gravity) or dynamic acceleration in all three axes, forward/backward, left/right and up/down. Accelerometer is used in this design for the collision detection. Accelerometers operate on the piezoelectric principal: a crystal generates a low voltage or charge when stressed as for example during compression. (The
Greek root word “piezein” means “to squeeze”).Motion in the axial direction stresses the crystal due to the inertial force of the mass and produces a signal proportional to acceleration of that mass.
This accelerometer also acts as vibration sensor to measure vibrations whenever vehicle collides with another vehicle.

4.1.10 Crystal
Even though microcontroller has built in oscillator, it cannot operate without external components which stabilize its operation and determine its frequency (operating speed of the microcontroller). Depending on which elements are used as well as their frequencies, there are four different oscillator modes: LP, Low Power Crystal, XT, Crystal/Resonator, HS, High speed/Resonator and RC, Resistor/Capacitor.

Figure 11 Crystal

4.1.11Relay interface
A relay is usually an electromechanical device that is actuated by an electrical current. The current flowing in one circuit causes the opening or closing of another circuit. Relays are like remote control switches and are used in many applications because of their relative simplicity, long life, and proven high reliability. Relays are used in a wide variety of applications throughout industry, such as in telephone exchanges, digital computers and automation systems.
Highly sophisticated relays are utilized to protect electric power systems against trouble and power blackouts as well as to regulate and control the generation and distribution of power.
In the home, relays are used in refrigerators, washing machines and dishwashers, and heating and air-conditioning controls. Although relays are generally associated with electrical circuitry, there are many other types, such as pneumatic and hydraulic. Input may be electrical and output directly mechanical, or vice versa. All relays contain a sensing unit, the electric coil, which is powered by
AC or DC current. When the applied current or voltage exceeds a threshold value, the coil activates

the armature, which operates either to close the open contacts or to open the closed contacts. When a power is supplied to the coil, it generates a magnetic force that actuates the switch mechanism.
The magnetic force is, in effect, relaying the action from one circuit to another. The first circuit is called the control circuit; the second is called the load circuit.

+
Figure 12 Relay

4.2 Software requirements and description
4.2.1 Programming language
 C programming for the PIC programming
 C# for desktop application
 ASP.NET for website development

4.2.2 IDE






Proteus, ISIS Professional V 8.0 SP2 for hardware simulation design
MicroC PRO V 6.4.0 for PIC for hardware programming
Microsoft Visual Studio 2012 for website and desktop application development
SQL Server Management Studio as back-end
Enterprise Architecture V 11.0

4.4 Simulated Hardware circuit description
Automatic Acciedent Detection with Intelligent Traffic Light System is simulated using
PROTEUS SOFTWARE and their results are presented here. The circuit model of the system is shown and sensors are connected to measure output result. since there is no vibration sensor in proteus so, we are using LM- 35 to test the result of the project..

4.4.1 Normal Condition
In normal condition the vibration sensor and fire sensor value will be less than the preset value

.

Figure 13 Normal condition

4.4.2 Accident condition
If a vehicle has met accident,vibration sensor gives the electric signal to microcontroller through signal conditioner.Then GPS provides latitude and longitude information about vehicle location to control section through GSM.

Figure 14 Accident condition

4.4.3 Fire condition
If a vehicle has met accident, fire sensor gives the electric signal to microcontroller through signal conditioner. Then GPS provides latitude and longitude information about vehicle location to control section through GSM.

Figure 15 Fire condition

4.5 Software part of the system
4.5.1 Software design
4.5.1.1 Use case diagram uc Use Case Model
Acci edent Detecti on system

Login

Add/UPpdate/Delete information Assign Ambulance
Adminstrator

View acciedent information Traffic police

Figure 16 Use case Diagram

4.5.2 Asp.Net graphical user interface
4.5.2.1 Login page

Figure 17 Login Page

4.5.2.2 Ambulance Page

Figure 18 Ambulance Page

Similar Documents

Free Essay

Lan Upgrade

...Collisions are occurring on a regular basis and the band is insufficient. 2. No central management for the 50 networked printers and there queues. 3. Current bandwidth is 10 Mbps 4. HVAC technician would like wireless access points 5. The 23 new classrooms are not on the network 6. New wing has slow connections to the mail server 7. The IT Director would like to to integrate VoIP into the current data network 8. Backbone miss-cabled Solution The correction of the limited bandwidth is the first priority. Re-cabling the current network with Category 6 UTP 1000Base F Ethernet cabling because it increases maximum data rate, from 10 Mbps to 1 Gbps. Ethernet will also allow for the use of Carrier Sense Multiple Access with Collision Detection (CSMA/CD) which can be assigned on the workstation NIC. This bandwidth increase will resolve the HVAC Technicians access issue, congestion issues for the classrooms, allows for VoIP integration and provides for future expansion. Replacing the twisted-pair on the backbone with Fiber 1000Based-F will give continued Gigabit throughput and eliminate the remote mail server issue. The use of Fiber will eliminate the 120 distance issue also between the new and old wings and allow for further expansions. A server farm needs to be stood up to include a domain controller, print server and file server will need to be completed. This server farm will allow for overall, central management of users, printers and fill access. This also allows central...

Words: 406 - Pages: 2

Premium Essay

Chapter 7 Review Questions

...traffic, and host-based IDPS stays on a particular computer or server and monitors that system. 4. Signature-based IDPS examine data traffic for patterns that match signatures, and behavior-based IDPS collect data from normal traffic and establish a baseline. 5. A switched-port analysis port is a data port on a switched device that copies all designated traffic from the switch device so the traffic can be stored and analyzed for IDPS. 6. In the Centralized control strategy all IDPS control functions are implemented and managed in a central location. Fully-Distributed is the opposite of Centralized, and in this strategy each monitoring site uses its own paired sensors to perform its own control functions to complete necessary detection, reaction, and response functions. 7. Honeypots are decoy systems designed to lure potential attackers away from critical systems. When more than one honeypot is connected to a number of honey pot systems on a subnet it’s called a honeynet. 8. A padded-cell is a tougher honeypot, when its detected attackers it smoothly sends them to a special stimulated environment where they can no longer cause harm. 9. Network footprinting is the organized research of the internet addresses owned or controlled by a target organization. 10. Network fingerprinting is a survey of all the target organization’s internet addresses that are collected during footprinting. 11. Fingerprinting relies on footprinting for data 12. Because it...

Words: 541 - Pages: 3

Free Essay

Research

...Admissibility of Polygraph tests, Narco-anlaysis test and Brain-mapping test in reference to Selvi’s case Before answering these questions, it is necessary to examine the evolution and specific uses of the impugned techniques. Hence, a description of each of the test procedures is followed by an overview of their possible uses, both within and outside the criminal justice system. It is also necessary to gauge the limitations of these techniques. Polygraph Examination The origin of polygraph examination have been traced back to the efforts of Lombroso, a criminologist who experimented with a machine that measured blood pressure and pulse to assess the honesty of persons suspected of criminal conduct. His device was called a hydrosphygmograph. The theory behind polygraph tests is that when a subject is lying in response to a question, he/she will produce physiological responses that are different from those that arise in the normal course. During the polygraph examination, several instruments are attached to the subject for measuring and recording the physiological responses. The examiner then reads these results, analyzes them and proceeds to gauge the credibility of the subject's answers. Instruments such as cardiographs, pneumographs, cardio-cuffs and sensitive electrodes are used in the course of polygraph examinations. They measure changes in various aspects such as respiration, blood pressure, blood flow, pulse and galvanic skin resistance. There are three prominent...

Words: 1790 - Pages: 8

Premium Essay

The Hacker in All of Us

...Now Business or Corporate users usually have an entire department dedicated to protecting them so they are less vulnerable. 2. What is the magnitude of the risk? That is, if security is compromised, what is the potential cost to the victim? Again this will depend on the user. Your average home users will run the risk of viruses, loss of data due to system crash and identity theft if they are not careful. With the Business or Corporate users the magnitude of the risk is much greater. If it is a financial institute, we could be talking millions of dollars at risk if security is compromised. 3. What policies and procedures can you suggest to counter the types of threats illustrated in this case study? * Intrusion Detection: A security service that monitors and analyzes system events for the purpose of finding and providing real-time or near-real-time warning of, attempts to access system resources in an unauthorized manner. * If an intrusion is detected quickly enough, the intruder can be identified and ejected from the system before any damage is done or any data compromised. * An effective IDS can serve as...

Words: 530 - Pages: 3

Free Essay

They Made Me Do This

...Polygraphs as Truth or Lies Thanks to the abundance of police dramas on television, people have begun to believe that a polygraph test is infallible. Many studies, as well as a Supreme Court case, have since revealed that the veracity of polygraphs is far from impeccable. Also, there are few if any credible sources that support the veracity of polygraph machines. As Dr. Saxe and Israeli psychologist Gershon Ben-Shahar (1999) notes, "it may, in fact, be impossible to conduct a proper validity study." In real-world situations, it's very difficult to know what the truth is.” (American Psychological Association [APA], 2004) Polygraphs do not function as a lie detector. A polygraph only directly measures the autonomic responses of the subject. It measures reactions such as changes in skin conductance, pulse rate, blood pressure, and breathing while the subject is asked a series of questions. From that data, it makes an indirect assumption that positive physiological responsive indicate dishonesty and vice versa. When taking a polygraph test, proctors use several different tactics to elicit responses from their subjects. One is called the "relevant-irrelevant" technique, which mixes questions like "Did you steal the money?" in with questions like "Is today Tuesday?" Questions that are relevant to the topic are suppose to cause a jump within the subject’s autonomic system and in turn would produce results on the polygraph. Another tactic that is commonly used is "comparison questions"...

Words: 769 - Pages: 4

Free Essay

Methods of Lie Detection

...Methods of Lie Detection Samuel Medina Housatonic Community College Abstract This research paper will cover a few different aspects of Lie Detection. Through the knowledge gathered from 5 journal articles the reader will learn of different methods of lie detection as well as some real life applications and the possibilities of lie detection in the near future. The areas that the 5 journal articles touch upon are the Cognitive load approach, the use of the polygraph and its controversies, the behavioral differences when using a person’s first or second language, the use of fMRI and the potential future of fMRI technology and last but not least some of the application of lie detection in our world today and potential for even more efficient and less intrusive methods of lie detection. Methods of Lie Detection In today’s society technology is at the fore-front of almost every aspect of life. In one particular area technology has created a new path of discovery for society to explore. Lie detection is a subject widely used in different ways throughout law enforcement and is becoming implemented in many different ways in our society today. Lie detection is being used in court rooms all over the world to solidify verdicts proved in the court rooms. There are a few methods of lie detection used in and outside of the court rooms but not all are allowed in the court rooms because of certain controversies. Of course with every...

Words: 1960 - Pages: 8

Premium Essay

Plagiarism

... Three weekly assignments from the same week were randomly chosen from each semester in this study. The students were instructed to submit three weekly assignments to fulfill requirements for a hybrid Sociology class which consisted of the students writing a one page essay. The first essay assigned was the students were to write in their opinion in relation to the sociological concepts presented in their textbooks, the second assignment was randomized questions within the assignment that were randomly assigned by the computer to prevent the students from receiving the same questions, and the third assignment consisted of assignments requiring application of concepts and personal involvement with the material. The Turnitin plagiarism detection...

Words: 692 - Pages: 3

Free Essay

Ntc 411 Week 5 Individual Security Solutions

...on the link below or Copy Paste Link in Your Browser https://hwguiders.com/downloads/ntc-411-week-5-individual-security-solutions/ For More Courses and Exams use this form ( http://hwguiders.com/contact-us/ ) Feel Free to Search your Class through Our Product Categories or From Our Search Bar (http://hwguiders.com/ ) Resources: SkillSoft (2012). CompTIA Network+ 2012: Network Security Part 3. Complete the Security Solutions Model module in Skillport. Attach a copy (screen shot) of the final test page to your assignment below. Scenario: Your boss wants to know how to detect an intrusion into or an attack on the ecommerce network. Your boss also wants to know what hardware or software should be procured for intrusion detection. Write a 2- to 3-page business report describing the hardware and/or software you believe should be considered for implementation. Include your reasoning for why the described hardware and/or software should be procured and implemented. Address the following questions raised by your boss: Does a properly installed and maintained firewall provide adequate defense against intrusion? What is an IPS and do we need one in an ecommerce network? Do we need a group of network personnel to monitor the ecommerce network for intrusions 24/7? Will any of this hardware or software facilitate a real-time response to an intrusion? Format your business report consistent with APA guidelines. NTC 411 Week 5 Individual Security Solutions Get...

Words: 5062 - Pages: 21

Premium Essay

Lie N: An Untrue Statement Analysis

...“lie n: an untrue statement made with intent to deceive” The definition of the lie is something that is oft debated, and so there are many definitions that one could find. This paper will attempt to analyze one of these definitions in greater detail, specifically “lie n: an untrue statement made with intent to deceive” (1). To better understand the meaning of this definition it is important to break it up into the smaller parts from which its total meaning is gathered. These components are “an untrue statement” and “made with intent to deceive”. To comprehend the first half of the definition, “an untrue statement” it would be of value to solidly understand the words it contains. What then does untrue mean? And how is “untrue” differentiated...

Words: 427 - Pages: 2

Premium Essay

Integumentary System: A Case Study

...A polygraph records changes in respiration, electro dermal responses and cardiovascular activities (Elaad, 1998). Also known as a lie detector, which assess and records four major components that include heart rate, blood pressure, respiration and skin conductivity (Patrick, C. J., 1989). Electrolytes released on the skin surface during perspiration lowers the electrolytic resistance to the skin, thus increasing electro-dermal activity. Lying can cause changes in heart rate, breathing rate, and electro dermal activity. These responses can be stimulated by involuntary stress responses detecting in increase in the secreting of electrolytes or the increase sweat being secreted by sweat glands on the skin thus measuring the emotional connectivity and stress responses to the environment in respiration as well as the Detecting lies through a series of questions to maintain a common baseline, that will then be compared to other questions being asked, increase in heart rate or electro dermal activity is associated with telling a lie. The integumentary system consists of the skin which is considered the largest organ of the body and comprises 15 % of body weight. The integumentary serves to prevent water loss and the excess of water gain, resistance to trauma and infection, responsible to vitamin D syntheses, thermoregulation and sensation. Composed of three layers, the epidermis, dermis and the hypodermis (Saladin , 2015). During the preliminary experiments the researchers detected the...

Words: 473 - Pages: 2

Free Essay

A Design of Energy Detector in Cognitive Radio Under Noise Uncertainty

...In “no-talk” zone around the protected primary receiver, cognitive users must keep silent to allow the primary receiver to decode the received signal correctly. Since the quiet zone is outside the decodable region, cognitive devices are required to have high sensitivity in order to detect the primary signal in low SNR. Device-centric sensing methods mainly used in CR include energy detection, coherent detection, and cyclostationary feature detection [4]. The energy detector (radiometer) can detect any type of unknown primary signal. The coherent detector (matched filter) is the optimal detector for deterministic signal on Additive White Gaussian Noise (AWGN) channel, which can be used to detect the primary signals with a pilot. And the cyclostationary feature detector is suitable for the detection of non-white signal, such as the OFDM signal of DTV system [5]. Compared with other detectors, the performance of energy detector is lower. However, energy detector is most widely used because it doesn’t need any information about the primary signal, and has lower complexity to perform real-time detection. But energy detector totally can not detect the primary signal under a SNR threshold due to the impact of noise uncertainty. In [6], the existence of SNRwall is proved for all the moment detectors including energy detector. To reduce the noise uncertainty, some approaches were proposed, including...

Words: 1214 - Pages: 5

Free Essay

Man’s Best Friend: Dogs or Technology

...Cade Pendleton English 2010 Angie Carter June 14, 2012 Final Research Paper Man’s Best Friend: Dogs or Technology A few years ago I had the opportunity to job shadow a canine (k9) officer while he was participating in routine training with his dog. Little did I know, “routine training” meant all police canine officers in Salt Lake County, Utah County, and Davis County would assemble at an abandoned building and practice multiple real life scenarios. As I stood and watched in awe all night, I witnessed a few unsettling scenarios. First, I witnessed dog being released on command to attack a person acting as a criminal. The attack wasn’t the unsettling part about the scenario. What really bothered me was seeing the dog misidentify a fellow police officer as the criminal and attack the officer, who unfortunately was not in a bite suit. A bite suit is protective clothing the trainers wear when training their dogs to attack. Since the officer was not wearing protective gear, he suffered many lacerations and received multiple stiches. As the night continued, I was able to watch another training scenario involving Taser guns or stun guns. Unlike the dog, this technique worked flawlessly. The officer was able to take down the accurate perpetrator in a proficient manner and no fellow officers were injured. On this particular night, there was an accidental injury that doesn’t happen often involving the canine. However, this introduced a couple of questions. Does this happen frequently...

Words: 3522 - Pages: 15

Free Essay

Technological Communication Methods and Practices Paper

...Technological Communication Methods and Practices Paper The future brings for us many unknowns especially when it comes to law enforcement. Law enforcement technology has come a long way from its early days. Technology has facilitated the job for many law enforcement positions. Thanks to DNA and fingerprinting many cold case crimes have been solved, in addition many wrongfully accused have obtain their well-deserved freedom. In 2013 we can expect many advancements such as: brain fingerprinting, as well as recon scout throwbot (a robotic camera), lastly iPads to record statements made from witnesses and suspects. Brain fingerprinting was invented by Dr. Lawrence Farwell it remains a controversial procedure thus this is why it has yet to be used hopefully in the near future. Many oppose this method stating that it violates the 5th amendment which protects you against self-incrimination. The way brain fingerprinting works is by placing a headband around your head which measures brain wave responses when shown a particular body of writing or an image that was previously familiar. The "Search Security" (2000-2012) website states that this technique is more effective and reliable than a lie detector test thus this test is 99.99% infallible. The recon scout throwbot is a robotic camera that is throw able capable of seeing in complete darkness. This would allow law enforcement to save many lives; it would allow officers to throw in this device during dangerous and hostile environments...

Words: 413 - Pages: 2

Free Essay

Self Navigating Bot

...SELF NAVIGATING AUTONOMOUS BOT Major-Project Report by Arjun Surendran B080001EC Deepak Venga B080027EC Nandu Raj B080585EC Priyanka G Das B080312EC Sanjay George B080270EC Under the guidance of Dr. S. M. SAMEER Submitted in Partial Fulfillment of the Requirements for the degree of Bachelor of Technology In ELECTRONICS AND COMMUNICATION ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING NATIONAL INSTITUTE OF TECHNOLOGY CALICUT Kerala, India April 2012 NATIONAL INSTITUTE OF TECHNOLOGY CALICUT DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING CERTIFICATE This is to certify that this report titled SELF NAVIGATING AUTONOMOUS BOT is a bona fide record of the major-project done by Arjun Surendran Deepak Venga Nandu Raj Priyanka G Das Sanjay George B080001EC B080027EC B080585EC B080312EC B080270EC In partial fulfillment of the requirements for the award of Degree of Bachelor of Technology in Electronics and Communication Engineering from National Institute of Technology, Calicut. Dr. S. M. Sameer (Project Advisor) Assistant Professor Dr. P S Sathidevi Professor & Head April 2012 NIT Calicut i ACKNOWLEDGEMENT We would like to thank Dr. S. M. Sameer, Assistant Professor, Department of Electronics and Communication Engineering for his guidance and inspiration in helping us complete this project. We are also grateful to Dr. P S Sathidevi, Professor and Head, Department of Electronics and Communication...

Words: 13508 - Pages: 55

Premium Essay

Courselooper Business Plan

...“Making it Easier to Do it Right” A Full Business Plan presenting to you the latest fitness wearable technology, the Hercules, and accompanying mobile application, the Hercules Trainer Presented by & Company CEO Adeel Safdar “Hercules” CFO CPO CMO COO CTO CCO Making it Easier to Do it right Full Business Plan Company & Product Hercules & Co., led by CEO Adeel Safdar, presents the fitness wearable product, Hercules, and accompanying app Hercules Trainer. Confidentiality Agreement This agreement is to acknowledge that the information provided by Hercules & Co. in this business plan is unique to this business and strictly confidential. No information in this business plan can be disclosed without the express written permission of the CEO Adeel Safdar. Upon request, this document is to be immediately returned to Hercules & Co. Disclaimer Some of the statements contained in this Full Business Plan, including information incorporated by reference, discuss future expectations, or state other forward looking information. Those statements are subject to known and unknown risks, uncertainties and other factors, several of which are beyond the control of Hercules & Co., which could cause the actual results to differ materially from those contemplated by the statements. The forward looking information is based on various factors and was derived using numerous assumptions. In light of the risks, assumptions, and uncertainties involved, there can...

Words: 15925 - Pages: 64