Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Biometric

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

CHAPTER 1

INTRODUCTION

1.1 MOTIVATION
During the COVID situation, people are taking a lot of precautions to save
themselves from Corona viruses, but there are high chances of carelessness, which might
lead to consequences. The idea behind the project was basically to reduce the severity of
the consequences and enhance security. The security pattern includes an access control
system for doors. Traditional locks are no longer as secure as they once were; anyone can
gain access by breaking these locks. To improve safety measures, this project uses the
phone fingerprint to open the door, where the phone is an important necessity for everyone
in daily life, which eliminates contact and thus reduces the chances of spreading.
1.2 GENERAL DESCRIPTION
The implementation makes door unlocking systems integrated with smart device
technology, which will help people increase the quality of their lives. Furthermore,
everyone already has a smartphone and is more aware of the existence of a smart phone.
There is no need to forget the key or forget to put the key, and there is no need to
duplicate the key, but keep in mind the key security level. Sometimes, it is necessary to
open the door from the seat while concentrating on work, only to unlock it when it is a
little off from the table. As a result, opening the door is simple, which simplifies and
enhances our security.
1.3 OBJECTIVE OF THE PROJECT
A sense of safety is essential for every person. The security pattern includes an
access control system for doors. The implementation involves the integration of door
unlocking systems with smart device technology, which will enhance the quality of
people's lives. Moreover, most people already have a smartphone and are more aware of
the existence of smartphones. There is no need to forget the key or forget to put the key,
and there is no need to duplicate the key, but keep in mind the key security level. This
project uses the phone fingerprint to open the door, where the phone is an important
necessity for everyone in day-to-day life. An Android application is designed that scan

1
fingerprint, and sends confirmation data to the Arduino through a Bluetooth module. To
interface, use the GSM module to send the data to a mobile phone.
1.4 ORGANIZATION OF DOCUMENTATON
The project includes the following:
Chapter 1: Explains the background, introduction, and objectives of the miniproject.
Chapter 2: Explains about the existing system, proposed system of the miniproject.
Chapter 3: Explains design and analysis of the mini project.
Chapter 4: Explain the result and analysis of the mini project.
Chapter 5: Conclusion and future scope.

2
CHAPTER 2
LITERATURE SURVEY

2.1 INTRODUCTION
An Arduino-based smart fingerprint authentication system is necessary for the
safety and well-being of homes, workplaces, shops, and banks currently. The design of
the project is intended to provide security in these areas. Clients utilizing these types of
darting frameworks either use a pin number, a unique mark, an RFIDcard, a pin, or a secret
key using a cell phone. Security development is not possible in the absence of a security
food chain in this framework. So, to enhance security, the project was designed. The
fingerprint sensor will take the fingerprint of the user and forward it to the
microcontroller to match its records. If the print matches one of the fingerprints in the
microcontroller’s memory, the microcontroller will lock or unlock the latch based on its
current state. The fingerprint sensor will take the fingerprint of the user and forward it to
the microcontroller to match its records. If the print matches one of the fingerprints in the
microcontroller’s memory, the microcontroller will lock or unlock the latch based on its
current state. When someone attempts to break the door, GSM is employed to send a
message to the admin. The biometric security framework was created to be easier to use by
adding two press buttons, one for erasing selected fingerprints and one more for enlisting
new fingerprints.
[1] J. Vegas, et.al., proposed two categories of identifying a person to access the door
lock system which information challenge-based identification and token- based
identification.
[2] H. Novita, et.al., proposed an information challenge-based system is known as
providing a secret information such as PIN number or password while the token-based
identification system is known as using a Radio Frequency Identification (RFID) card or
biometric.
[3] M. Meera, et.al., "Super secure door lock system for critical zones”, The information
challenge-based system is known as providing a secret information

3
such as PIN number or password while the token-based identification system is known as
using a Radio Frequency Identification (RFID) card or biometric.
[4] R. Lenka, et.al., "Realization of Security System using Facial Recognition and
Arduino Keypad Door Lock System", The information challenge-based system is known
providing secret information such as PIN number or password [. while the token-based
identification system is known as using a Radio Frequency Identification (RFID) card or
as biometric.
2.2 EXISTING SYSTEM
Fingerprint recognition is one of the oldest and most reliable biometrics used for
personal identification. Fingerprint recognition has been used for over one hundred years
now and has come a long way from tedious manual fingerprint matching. The existing
system for the project is biometric fingerprint recognition. The device is placed on the wall
or the door of the house; whenever someone wants to open the door, they must place their
fingerprint on the sensor, which the device recognizes. Either way of opening the door is
by entering the pin. The enrollment of the fingerprint patterns should be done to complete
the above process. A mechanism that opens or closes the lock on a door. The door
automatically with a key code. There are two work processes for this experiment which
are:
Case 1: The lock will open. A keypad will input values, allowing us to compare the
values with the string of integer values that are set in the code. When inputting a code
comprising integer values with the help of the keyboard, check if the string is an integer.
If the values match the string of integer values already fixed in the code, the keypad will
send a signal to the display, and the "Code Accepted" message will be shown. If the code
is accepted, the Arduino will senda signal to the servo motor. The motor will then rotate
90° and open the lock, allowing the door to be unlocked
Case 2: The lock will not open. If the code inserted into the keypad does not match
the fixed string in the code, the keyboard will send a signal to the display to show the
"Wrong Code" message. Pressing the wrong values on the keypad will automatically
instruct the user to start again from the beginning.

4
If the "Wrong Code" message is shown, the servo motor will not rotate. The lock
will not open, allowing the door to remain locked. The proposed system consists of both
Hardware and the software part. The system proposed consists of both hardware and
software components. An Arduino Nano with a Bluetooth module, a solenoid lock, and an
Android smartphone are utilized in the hardware part of the project. The Android
application is designed to scan and verify fingerprints and send confirmation data to
Arduino via Bluetooth serial communication.
A smartphone fingerprint sensor is used by this system to lock and unlock the door.
2.3 DISADVANTAGES OF EXISTING SYSTEM
 Malfunction
 False positive’s
 Fingers that are burnt or damaged cannot be authorized.
 Scanner issue
 No Remote Access
2.4 PROPOSED SYSTEM
During the COVID situation, people are taking a lot of precautions to save
themselves from Corona viruses, but there are high chances of carelessness, which might
lead to consequences. The idea behind the project was basically to reduce the severity of
the consequences and enhance security. The security pattern includes an access control
system for doors. Traditional locks are no longer as secure as they once were; anyone can
gain access by breaking these locks. To improve safety measures, this project uses the
phone fingerprint to open the door, where the phone is an important necessity for everyone
in daily life, which eliminates contact and thus reduces the chances of spreading.
The system proposed consists of both hardware and software components. An
Arduino Nano with a Bluetooth module, a solenoid lock, and an Android smartphone
are utilized in the hardware part of the project. The Android application is designed to
scan and verify fingerprints and send confirmation data to Arduino via Bluetooth serial
communication. A smartphone fingerprint sensoris used by this system to lock and unlock
the door. With the help of the Bluetooth module, the phone is connected. The Arduino
Nano is dumped with the embedded C code. Sends a message to the admin when someone
attempts to break the doorusing GSM and the buzzer rings inside the house.

5
 It provides a lot of security when compared to the traditional method as only
authorized users can use the services of this app.
 This project is easy to maintain and run, and it is scalable, affordable, and reliable.
 If someone tries to break into your door, it reports immediately through the message.
 People always carry their phones with them, so unauthorized people cannot open the
door with the false impression of a fingerprint. Most importantly, this project
supports contactless door opening and closing. In a pandemic situation like the
coronavirus, the best safety measure is to open the door without contact to avoid
spreading the virus.

6
CHAPTER 3
DESIGN AND ANALYSIS

3.1 INTRODUCTION
An embedded system is a combination of computer hardware and software and
additional mechanical parts designed to perform specific functions.A good example is the
microwave. Every household has one, and ten million ofthem are used every day, but
very few people realize that a processor and software engage in lunch and dinner. Smart,
embedded systems are found everywhere in our daily lives, from mobile phones to
household appliances, from robotic manufacturing systems to airplanes, satellites,
healthcare devices,and even elevators. They are low-cost, low power consuming, small
computersthat are embedded in other mechanical or electrical systems. They comprise a
processor, power supply, memory, and communication ports. Embedded systems use the
communication ports to transmit data between the processor andperipheral devices—often
other embedded systems—using a communication protocol. The processor interprets this
data with the help of minimal software stored in memory. The software is usually highly
specific to the function that the embedded system serves.
Android is an operating system based on the Linux kernel and designed primarily
for touch-screen mobile devices such as smart phones and tablet computers. Initially
developed by Android, Inc., which Google backed financially and later bought in 2005,
Android was unveiled in 2007 along with the founding of the Open Handset Alliance, a
consortium of hardware, software, and telecommunication companies devoted to
advancing open standards for mobile devices. Android has a complete software package
consisting of an operating system, a middleware layer, and core applications. Different
from other existing platforms like iOS (iPhone OS), it comes with a software development
kit (SDK), which provides essential tools and applications. Using a smartphone as the
“brain” of a device is already an active research field with several open opportunities and
promising possibilities. In this project, we present a review of current devices
controlled by mobile phones and discuss closed-loop control systems using audio
channels on mobile devices, such as phones and tablet computers.

7
3.2 BLOCK DIAGRAM

Fig.3.1 Block Diagram

3.3 BLOCK DIAGRAM DESCRIPTION


In this project, we are using the Arduino Nano as the microcontroller with input
from the inbuilt phone fingerprint.

Fig.3.1 talks about the block diagram of the project where the Transistor is used to convert
electrical energy from an AC circuit to 230 to 12 volts of direct current. Acts as the main
power source. A regulator is a power supply that ensures a stable, constant voltage supply
under all operating conditions, regulating current from 12V to 5V. Arduino Nano is a
small, versatile, and popular microcontroller board based on the ATmega328P
microcontroller chip with an operating voltage of 5 volts and a frequency of 16 MHz Nano
has a total of 14 digital I/O pins . Arduino Nano is to provide a platform for
programming and controlling various electronic components and sensors. HC-05 is a
Bluetooth module designed for wireless communication to open doors without physical
contact. It uses a 2.45 GHz contact frequency band, and the power supply provides an
operating voltage of 5 volts. A solenoid lock is a type of electrically controlled lock that
8
uses a solenoid to manipulate a locking mechanism, typically a bolt or latch, to either
secure or release a door, gate, or other access point. Solenoid locks are commonly used in
security systems and access control applications.The nano sends the signal to the
solenoid, which unlocks the door with the help of the real. A relay is a switch that can be
electrically operated and used to control high-power devices or components with a low
power signal. GSM (Global System for Mobile Communications) is used for a variety of
telecommunications services and applications. This allows you to make voice calls, send
and receive SMS (short message service) messages, and establish data connections over
mobile network. If someone breaks the door, a message will be sent to the
administrator,and a buzzer will sound.
3.4 SCHEMATIC DECRIPTION

Fig.3.2 Schematic Diagram

9
As shown in the schematic Diagram 3.2, the connections are simple. To connect
the HC-05 Bluetooth module to the Nano, supply 5V power to the device,connect the TX
to the RX pin of the microcontroller, and connect the RX pin to the TX pin of the
microcontroller. The red LED indicates the power status of the Arduino Nano, and the
green LED indicates whether the door is unlocked. The VCC and GND pins of the
Bluetooth module are connected to the Nano's 5V and GND, and the Tx and Rx pins are
connected to the Arduino Nano's Rx and Tx, respectively. The positive pin of the buzzer
is connected to digital pin 4 of the Arduino and the negative pin is connected to the GND
of the Arduino Nano.. Similarly, the input pin of the relay is connected to digital pin 2
of the Arduino Nano, and the VCC and ground pins are connected to the 5V and
GND pins of the Arduino Nano.To control the solenoid lock, there is a need to control a
circuit that includes an NPN transistor and an N-channel MOSFET and to control the
NPN transistor by connecting the Nano's D2 pin to the base pin of the transistor through a
550-ohm connection. there is. Connect a resistor to control the current flowing through
the transistor. When the D2 pin is pulled high, it turns on the transistor, pulls the gate pin
of the MOSFET to ground, and turns off the MOSFET and magnetic latch. When the D2
pin is pulled low, the NPN transistor is turned off. This means the gate of the MOSFET is
pulled down to 12V through a 2k ohm pull-up resistor, turning on the MOSFET and
powering the magnetic latch. A buzzer is connected to the open/close relay contacts,
which will sound an alarm in the event of an intruder. The complete circuit is on a perfect
board to make it compact. The 5 pin of the Arduino is connected to the GSM, where it
enables you to make voice calls, send and receive SMS (Short Message Service)
messages, and establish data connections on the cellular network. When someone tries to
break the door with the help of the network, it sends a message to the admin or the owner
of the house.

10
3.5 FLOW CHART

Fig.3.3. Flowchart
11
Flowchart Fig. 3.1 explains the whole process of locking and unlocking the door. It
gives the step-by-step process of the project. Firstly, the person must connect the phone
to the Bluetooth module in the Arduino door lock app and enroll the fingerprint on the
phone. Open the app on the phone and verify if the fingerprint matches the fingerprint
before enrolling. If the fingerprint matches, the door opens automatically, with the help of
the solenoid lock where the Arduino sends the data and the door locks immediately, or
else the buzzer rings due to the wrong fingerprint. The device can hold multiple
fingerprints, which gives access to users. If someone tries to break the door, the buzzer
rings inside the door, and the message will be sent to the administrator or owner of the
house.so, the admin can take the necessary actions accordingly.

3.6 ALGORITHAM

Step 1: Start

Step 2: Connect Bluetooth to your smartphone with the help of the secured password .
Step 3: When the device is connecte d to the smart phone ,Place your fingerprint on the sensor.
Step 4: If the fingerprints matchs, the door will open, if there is unmatched, the buzzer will sound
Step 5: End

12
CHAPTER 4
RESULT AND ANALYSIS

4.1 OBJECTIVE
A sense of safety is essential for every person. The security pattern includesan access
control system for doors. The implementation involves the integration of door unlocking
systems with smart device technology, which will enhance the quality of people's lives.
Moreover, most people already have a smartphone and are more aware of the existence of
smartphones. There is no need to forget the key or forget to put the key, and there is no
need to duplicate the key, but keep in mind the key security level. This project uses the
phone fingerprint to open the door, where the phone is an important necessity for
everyone in day-to-day life. An Android application is designed that scans and verifies
the fingerprint and sends confirmation data to the Arduino through a Bluetooth module. To
interface,use the GSM module to send the data to a mobile phone.
4.2 TEST SETUP

A
E

F
C

D G

Fig.4.1 Test Setup

13
A-
Transformer

B- Relay
C- Arduino Nano
D-05 Bluetooth Module
E-GSM
F-Relay
G- Solenoid Lock

4.2 RESULT ANALYSIS


The work applies the common trend of smart homes by integrating smart devicesto
lock and unlock the door. A user-friendly technology is deployed to render the entire door
automation system with its process controlled.

Fig.4.2.Pairing with Bluettoth Module

According to the above figure.4.2 :


shows how connecting with the Bluetooth module with the help of the secured
pin helps unlock the door.
14
Fig.4.3. Scanning the fingerprint

According to the above figure.4.3 :shows the scanning of the fingerprint to unlock the door.

Once Bluetooth is connected to the phone,with the help of the Arduino door lock app, the person
has the ability to finger on the phone sensor when the fingerprint matches the door and unlock if the
fingerprint does not match. Buzzer rings activate, and rings

Fig.4.4 Setup Result

According to the above figure.4.4 :


When an unauthorized person tries to enter the house, the owner or administrator will get notifiac
-tion over the GSM and a buzzer will sound within the house.

15
4.4 APPLICATIONS
1. Fingerprint-based security system” project can be used by the employees, staff or workers
in various industries like Automobile industries, manufacturing industries, Software
development companies.
2. Home or domestic application: This project can be used to automate the door locking
process at ourhome, so the user needs not to carry the door lock keys
3. Bank Lockers or security safes: Many of the banks use key based or password-based locks
for theirlockers or safes.

16
CHAPTER 5
CONCLUSION

5.1 PROJECT CONCLUSION


During the COVID situation, people are taking a lot of precautions to save
themselves from Corona viruses, but there are high chances of carelessness, which might
lead to consequences. The idea behind the project was to reduce the severity of the
consequences and enhance security. It provides a lot of security when compared to the
traditional method, as only authorized users can use the services of this app. To improve
safety measures, this project uses the phone fingerprint to open the door, where the phone
is an important necessity for everyone in daily life, which eliminates contact and thus
reduces the chances of spreading. If someone tries to break into your door, it reports
immediately throughthe message using GSM technology and buzzer rings.

5.2 FUTURE SCOPE

The future scope of a wireless door unlock system using mobile fingerprint
authentication and security features holds exciting potential due to ongoing technological
advancements and increasing demand for smart and secure access control solutions
• Continuous improvement in security features such as multi-factor
authentication, facial recognition, voice recognition, and AI-driven anomaly detection
can make these systems even more secure.
• The ability to monitor and control the door unlock system remotely using a
smartphone app is likely to become more advanced. This can include features like
granting temporary access to guests or delivery personnel, even when you are not at
home.

17
REFERENCES

[1] J. Vegas, et.al., proposed two categories of identifying a person to access the door
lock system which information challenge-based identification and token- based
identification.
[2] H. Novita, et.al., proposed an information challenge-based system is known as
providing a secret information such as PIN number or password while the token-
based identification system is known as using a Radio Frequency Identification
(RFID) card or biometric.
[3] M. Meera, et.al., "Super secure door lock system for critical zones”, The information
challenge-based system is known as providing a secret information as PIN number or
password while the token-based identification system is known as using a Radio Frequency
Identification (RFID) card or biometric.
[4] R. Lenka, et.al., "Realization of Security System using Facial Recognition and
Arduino Keypad Door Lock System", The information challenge-based system is
known providing secret information such as PIN number or password [. while the
token-based identification system is known as using a Radio Frequency Identification
(RFID) card or as biometric.
[5] D. Naresh, et.al.,2013. Bluetooth Based Home Automation and Security System
Using Arm9, International Journal of Engineering Trends and Technology (IJETT). 4:
4052-4058.
[6] D. Javelle,et.al.,2013. Home Automation andSecurity System Using Android ADK.
International Journalof Electronics Communication and Computer Technology
(IJECCT). 3: 382-385.
[7] Potts, J ,et.al., “Exploiting Bluetooth on Android Mobile Devices for
Home Security Application”, in Proc. Of IEEE Southeast on, pp. 1-4, 2012.
[8] Kuang-Yow Lian.et.al.,“Home Safety Handwriting Pattern Recognition System” in
Proc. Of IEEE 11th International Conf. on Cognitive Informatics and Cognitive
Computing, pp. 477-483, 2012.

18
APPENDIX A
#include <SoftwareSerial.h>
SoftwareSerial mySerial(9,10);
int value1;
#define relay 2
const int buzzer = 4;
const int ls = 5;
void setup()
{
Serial.begin(9600);
mySerial.begin(9600);
pinMode(relay, OUTPUT);
pinMode(buzzer, OUTPUT);
pinMode(ls, INPUT);
digitalWrite(ls, HIGH);
digitalWrite(relay, LOW);
}
void loop()
{
// Serial.print("Reading");
if(digitalRead(ls)==LOW)
{
digitalWrite(buzzer, HIGH);
mySerial.begin(9600);
mySerial.print("AT+CMGF=1\n\r");
delay(1000);
mySerial.println("AT"); //Handshaking with SIM900
delay(1000);
mySerial.println("AT+CMGF=1"); // Configuring TEXT mode
delay(1000);

19
18 mySerial.println("AT+CMGS=\"+917981417614\"");//change ZZ with country code
and xxxxxxxxxxx with phone number to sms
delay(1000);
mySerial.print("ALERT,DOOR BREAK DETECTED");
delay(1000);
mySerial.write(26);
delay(1000);
digitalWrite(buzzer, LOW);
}
if(Serial.available()>0) // Send data only when you receive data:
{
value1 = Serial.read();
Serial.print(value1);
if (value1==1)
{
Serial.print("Unlocking");
digitalWrite(relay, HIGH);
delay(5000);
digitalWrite(relay, LOW);
}
if (value1==0)
{
digitalWrite(relay, LOW);
digitalWrite(buzzer, HIGH);
delay(5000);
digitalWrite(buzzer, LOW);
Serial.print("Locking");
}
}
}

20
APPENDIX B

ARDUINO IDE
The Arduino integrated development environment (IDE) is a cross platform
application written in Java and is derived from the IDE for the Processing programming
language and the Wiring projects. It includes a code editor which is capable of compiling
and uploading programs to the board with a single click. A program or code written for
Arduino is called a "sketch.”
Following are the steps involved:
1. Open Arduino IDE as shown below

Screen.B.1 Arduino IDE


Arduino programs are written in C or C++. The Arduino IDE comes with a
software library called "Wiring" from the original Wiring project, which makes many
common input/output operations much more efficient. Users only need define two
functions to make a runnable cyclic executive program: setup (): a function run once at
the start of a program that can initialize settings loop (): a function called repeatedly until
the board powers off

21
2. Select the COM Port from tools

Screen.B.2 COM Port Tools


3. Select the required Arduino board from Tools

Screen.B.3 Arduino Board from Too

22
4. Write the sketch in Arduino IDE

Screen.B.4 Sketch in Arduino IDE


5. Compile and upload the Sketch to Arduino board

Screen.B.5 Upload the sketch to Arduino board


Next, a workspace with interface buttons for designing circuits will appearas shown
in figure below. Note that there is a blue rectangular line in the workspace; make sure
that the whole circuit is designed inside the rectangular space.

23
APPENDIX C
HARDWARE REQUIREMENTS AND SPECIFICATIONS
 Transformer
 Regulator
 HC-05 Bluetooth module
 Arduino nano
 Solenoid lock
 Relay
 GSM
 Buzzer
TRASNFORMER
Transformer, a device that transfers electric energy from one alternating- current
circuit to a direct current.Here, it is used to step down the 230-volt AC current to a
12volt DC current.

Specifications :
 Suppliespowertoallcomponents.
 Voltageinput:AC/DCsourcebasedontheregion'spowersupply(e.g.,110-240V AC).
 Outputvoltage:5V DC.

Fig.C.1 Transformer

24
REGULATOR
A voltage regulator is a component of the power supply unit that ensures a steady,
constant voltage supply through all operational conditions and steps down the twelve volts
to 5 volts.

Specifications :
 InputVoltageRange:7-12V
 OutputVoltage:5V
 MaximumOutputCurrent:1A

Fig.C.2 Regulator

HC-05 BLUETOOTH MODULE


HC-05 is a Bluetooth module that is designed for wireless communication. This
module can be used in a master or slave configuration with an operating voltage of 5
volts and operates at 2.4 GHz. The HC-05 Bluetooth Module can be utilized in a master or
slave arrangement, making it an incredible answer for remote communication. This
sequential port Bluetooth module is a completely qualified Bluetooth V2.0+EDR
(Enhanced DataRate) 3Mbps modulation with a complete 2.4GHz radio handset and
baseband

Specifications :
 Operating voltage : 3.3v to 5v DC
 Operating current : less than 50mA 
 Frequency : 2.4GHz
 Range approx to 10 meters

25
Fig.C.3 HC-05 Bluetooth Module

ARDUINO NANO
Arduino Nano is a microcontroller board based on an 8-bit Mega328P
microcontroller. Along with the Mega328P board, this Arduino Nano has fourteen digital
pins (out of 6 used as PWM outputs), 6 analog-featured i/o input pins, and a USB-B-type
connection port.

Specifications:
 Microcontroller:ATmega328P
 OperatingVoltage:5V
 DigitalI/OPins:22
 AnalogInputPins:8
 OperatingFrequency-16MHz.

Fig.C.4 Arduino Nano

26
SOLENOID LOCK
A solenoid lock is an electromechanical device that uses a solenoid tocontrol
the locking and unlocking of a mechanism, such as a door or a gate.

Specifications:
 OperatingVoltage: 12V
 Current consumption : 600mA
 Hloding force : 0.2kg

Fig.C.5 Solenoid lock

RELAY
A relay is an electrical switch that uses an electromagnet to control the flow of
electricity in a circuit. It allows a low-power signal to control a high-power circuit,
making it a fundamental component in many electrical and electronic systems. Relays are
used for various purposes, including switching high-voltageloads

Specifications :
 Operating voltage : 5v DC
 Operating current : 70mA
 Max load current : 10/30v DC
 Max switch voltage : 30v DC

27
Fig.C.6 Relay

GSM
GSM 900 provides good coverage and range, especially in rural and suburban
areas. Its better propagation characteristics, allowing signals to penetrate buildings and
travel longer distances compared to higher-frequency bands.

Specifications :
 Operating voltage : 3.4V – 4.5V 

 Frequency bands : The SIM900A can search the two frequency bands automatically. 
 The frequency bands also can be set by AT command. 

o 

Fig.C.7 GSM
28
APPENDIX D

IC APPLICATIONS IC 7805
The IC 7805 is a widely used voltage regulator IC (integrated circuit) that provides
a fixed positive output voltage. Specifically, the IC 7805 is a member of the 78xx series of
voltage regulators, which are designed to provide a stable and regulated DC voltage
output. The "7805" designation corresponds to the specific voltage regulator within the
78xx series that outputs +5 volts DC. The 7805 is available in different packages,
including TO-220, TO-92, and other variations, to accommodate various applications and
mounting methods. Voltage regulators are common in electronic circuits. They provide a
constant output voltage for a varied input voltage. In our case the 7805 IC is an iconic
regulator IC that finds its application in most the projects. The name 7805 signifies two
meanings, “78” means that it is a positive voltage regulator and “05” means that it provides
5V asoutput. So 7805 will provide a +5V output voltage.
The output current of this IC can go up to 1.5A. But the IC suffers from heavy
heat loss hence a Heat sink recommended for projects that consume more current. For
example, if the input voltage is 12V and you are consuming 1A, then(12-5) * 1 = 7W.

Fig:D.1 IC7805

29
SPECIFICATION OF IC 7805

SPECIFICATIONS IC 7805

V out 5V

Vein-V out Difference 5V-20V

Output Imax 1A

Table D.1 IC 7805

30

You might also like