An Implementation Of A Gsm Controlled Security Robotic Vehicle

Journal Title: American journal of Engineering Research - Year 2017, Vol 6, Issue 12

Abstract

Over the years, robotic vehicles used in unmanned rescue missions, security in jewelry stores, military combat, security in bank vaults and many others, make use of wireless technology in controlling the vehicles. The major drawback of these wireless unmanned robots is that they make use of radio frequency (RF) circuits for maneuver and control. Principally, RF circuits suffer from the disadvantageof limited control range. To overcome this challenge, other methods have been implemented which make use of the global system for mobile communication (GSM) network and the dual tone multiple frequency (DTMF) function of a cell phone to control the robotic vehicle. Although this work uses the same principle as the technology of the GSM network, it essentially shows the construction of a circuit using Graphical User Interface (GUI) and GSM modules which send commands to control the movement of the vehicle with the use of a microcontroller. The GUI generates different coded signals with the help of visual basic. These signals are transmitted through the communication (COM) port of the personal computer (PC) to the GSM module interface. These commands are sent wirelessly to another GSM module interfaced with the microcontroller and they control the robot accordingly. As the vehicle moves about the target area, once human presence is detected by the PIR sensor interfaced with the microcontroller, the onboard global positioning system(GPS) module interfaced with the microcontroller sends both the latitude and the longitude information of the detected human presence to the control station via the GSM module to initiate emergency response from the control station. The robotic vehicle was implemented, the PIR sensor detected human presence and sent an SMS containing the latitude and longitude of the location to the control station which was viewed from the Google Map on the GUI application. GUI Commands sent from the remote robot control station were received and the robot moved accordingly.

Authors and Affiliations

Peter A. Akor1, Jonathan A. Enokela2, David O. Agbo3

Keywords

Related Articles

Tweet Analysis: Extractionand Sentimental Analysis On Twitter Data

Nowadays companies have realizedthe need for Big Data to make decisionsaboutcomposite problems.Twitter being one of the top used social media site receives millions of tweets every day, on a diversity of issues. This lar...

Safety Selected Insecticides to Predators and Egg Parasitoids of Planthoppers in Rice Ecosystem

The research safety selected insecticides to predators and egg parasitoids of planthoppers in rice ecosystem was carried out in the wet season of 2014 at Subang District. The several insecticides of mixture chlorantranil...

Speaking Skills among Saudi Female Students @ College of Arts & Science, PSAU, Wadi Aldwasir---Need Profile

The present paper deals with the need profile of speaking skills among the Saudi female students of College of Arts & Science, Wadi Aldwasir, Saudi Arabia. It presents the growing demand of English in the context of Saud...

Thermal Behavior of a Horizontal Hollow Tile Submitted To a Sinusoidal Excitation

This work presents a numerical study, in a transient state, of the thermal behavior of a horizontal alveolar structure filled with air and vertically heated by a sinusoidal excitation applied to its superior surface. The...

Role of Knit Factory Merchandiser for Efficient Supply Chain Management

Retailers face many challenges: time-to-market reductions are necessary due to shorter and shorter product life cycles, greater product variety causing more fluctuation in demand calls for high responsiveness in supply c...

Download PDF file
  • EP ID EP402402
  • DOI -
  • Views 72
  • Downloads 0

How To Cite

Peter A. Akor1, Jonathan A. Enokela2, David O. Agbo3 (2017). An Implementation Of A Gsm Controlled Security Robotic Vehicle. American journal of Engineering Research, 6(12), 130-135. https://europub.co.uk/articles/-A-402402