My Final Year Project On VEHICLE TRACKING
ABSTRACT
In recent years, there have been
rise in the number of applications based on Radio Frequency Identification
(RFID) systems and have been successfully applied to different areas as diverse
as transportation, health-care, agriculture, and hospitality industry to name a
few. RFID technology facilitates automatic wireless identification using
electronic passive and active tags with suitable readers. In this paper, an
attempt is made to track any vehicle with RFID tag with it. Tracking is done
inorder to know information about the vehicle like its Engine Number, Chassis
Number and Number Plate. The RFID tag can be affixed to an object and used to track
and manage inventory, assets, people, etc. For example, it can be affixed to
cars, computer equipment, books, mobile phones, etc. In this project, “Vehicle
Tracking”, is based on RF system. Here each vehicle has a RFID tag which is
read by the RF Reader. In the RF Reader there present the database of all the
vehicle. With the joint help of reader, database and controller we can get
information about the vehicle and if this vehicle has any fault record, it is
tracked and catch by the traffic controller.
ACKNOWLEDGEMENT
Firstly, we would like to give our
heart full gratitude to HOD Er.Rabindra Khati and Deputy HOD Er.Rajeev
Prajapati for their encouragement, valuable suggestions and support they
provided us throughout our project work.
The project would not have been so
progressive without the timely guidance of our project supervisor
Asst.Prof.Dr.Nanda Bikram Adhikari. We would like to extend our sincere
gratitude to him for all his help and guidance.
We are deeply indebted to our teachers,
seniors, lab personnel and college Library for providing us with the necessary
books, reports and all other study materials required during our project time
period. This project progress would not have been possible without their
valuable suggestions and motivation.
Finally, we would like to thankful to
our family and friends who directly or indirectly contributed in this project.
TABLE OF CONTENTS
CONTENTS PAGE NO.
Abstract
…………………………………………………………………….……………………...i
Acknowledgement
………………………………………………………………………………..ii
Table of Contents
………………………………………………………………………………...iii
List of Figures …………………………………………………………………………………....vi
List of Abbreviations
…………………………………………………………………………....vii
CHAPTER 1:
INTRODUCTION
1.1
Background
………………………………………………………………………….02
1.2 Project
Introduction ………………………………………………………………....02
1.3 Problem
Analysis …………………………………………………………………....03
1.4 Objectives …………………………………………………………………………....03
1.5
Feasibility Study
………………………………………………………………….…03
CHAPTER
2: LITERATURE REVIEW
2.1
Introduction…………..………………………………………………………………06
2.2 Evolution of
RFID………………...…………………………………………………06
2.3 Technology
Development……………………………………………………………07
2.4 Data Storage and
Management………………………………………………………07
2.5 Driver
ID……………………………………………………………………………..08
CHAPTER
3: SYSTEM DEVELOPMENT
3.1 Block
diagram of the system…………………………………………………………10
3.2
Methodology……………………………………………………………………..…..11
3.3
Flowchart of the system……………………………………………………………...13
CHAPTER
4: SYSTEM REQUIREMENTS
4.1
Hardware and Software………………………………………………………………16
4.2 Regulator ………………….…………………………………………………………16
4.3
Arduino Uno ………………………………………………………………………...17
4.3.1 Overview
…………………………………………………………………..17
4.3.2 Summary
………………………………………………………………......18
4.3.3 Power
……………………………………………………………………...19
4.3.4 Memory
……………………………………………………………………19
4.3.5 Input and
Output ………………………………………………………......19
4.4 What is RFID?…………………………………………………………..….…...…...20
4.4.1 RFID Tag
(Transducer)………………………………………………...…..21
4.4.2 RF Reader
(Transceiver)…………………………………………………...22
4.4.3 RFID Frequency
Bands………………………………………………….....23
4.4.4 RFID
Antenna……………………………………………………………...24
4.4.5 Working Principle of
RFID………………………………………………..25
4.5
Buzzer………………………………………………………………………………..28
4.6 Arduino Wi-Fi
Shield………………………………………………………………..28
4.6.1
Description…………………………………………………………………29
4.7 LCD (Liquid
Crystal Display)…………………………………………………….....30
4.7.1 Pin
Diagram………………………………………………………………..31
4.7.2 Pin
Description……………………………………………………………..32
4.8
Proteus………………………………………………………………………………..33
4.8.1 System
components………………………………………. ……………....33
4.9
Database……………………………………………………………………………...33
4.9.1 RDBMS Terminology……………………………………………………...34
4.9.2 MySQL
Database…………………………………………………………..35
4.9.3 MySQL
Functions………………………………………………………….37
4.10 Wamp
Server……………………………………………………………………….39
CHAPTER
5: EPILOUGE
5.1 Work
Accomplished…………………………………………………………………41
5.1.1
Snapshots…………………………………………………………………..42
5.2
Work Remaining……………………………………………………………………..43
5.3
Problem Encountered………………………………………………………………...44
5.4
Conclusion…………………………………………………………………………...45
CHAPTER
6: BIBLIOGRAPHY
6.1
References……………………………………………………………………………47
LIST
OF FIGURES
FIGURE
PAGE NO.
Figure 3.1 Block
diagram of overall system overview…………………………………..10
Figure 3.2 Flow chart
of the system…………………………………………………...…14
Figure 4.4.1 RFID
Tag…………………………………………………………………...22
Figure 4.4.2 RFID
Reader………………………………………………………………..23
Figure 4.4.4 RFID
Antenna……………………………………………………………...25
Figure 4.5.1
Buzzer………………………………………………………………………28
Figure 4.6.1 Arduino
Wi-Fi Shield front and back part………………………………….29
Figure 4.7.1
LCD………………………………………………………………………...31
Figure 5.1.1 Wi-Fi
Shield testing………………………………………………………...42
Figure 5.1.2 Reading
RFID from tag…………………………………………………….42
LIST OF ABBREVIATIONS
LCD= Liquid Crystal
Display
RFID= Radio Frequency
Identification
AVR= Advanced Virtual
RISC
PC =Personal Computer
WAMP = Windows, Apache, MySQL, PHP/Perl/Python
LED=Light Emitting
Diode
RDBMS=Relational
Database Management System
PCB =Printed Circuit
Board
Wi-Fi= Wireless Fidelity
SRAM=Static Random
Access Memory
TX=Transmitter
RX=Receiver
DC=Direct Current
I/O=Input Output
EPC=Electronic Product
Code
ASCII= American Standard Code for Information Interchange
WEP= Wired Equivalent Privacy
WPA= Wi-Fi Protected
Access
SDA=Serial Data
SPI=Serial Peripheral Interface
CHAPTER-1
INTRODUCTION
1.1
Background
Radio-frequency identification (RFID)
is an automatic identification method, relying on storing and remotely
retrieving data using devices called RFID tags or transponders. The technology
requires some extent of cooperation of an RFID reader and an RFID tag. An RFID
tag is an object that can be applied to or incorporated into a product, animal,
or person for the purpose of identification and tracking using radio waves.
Some tags can be read from several meters away and beyond the line of sight of
the reader. An RFID tag is an object that can be applied to or incorporated
into a product, animal, or person for the purpose of identification and
tracking using radio waves. Some tags can be read from several meters away and
beyond the line of sight of the reader.[6]
Nowadays it is very important to get
instantaneous data to be accessed to concerned people. It would be very much
beneficial if we could trace vehicle identification running on the road for
their all information like Engine Number, Chassis Number and Number Plate. Even
information like Tax Clearance, where have it been through city.
Collecting data manually may create a
lot of problem such as delay in access time, high cost. Making any task cost
efficient is highly demanded. Collecting data automatically can reduce the man
power needed to accomplish the same task.
1.2 Project Introduction
The project which is to read tags
associated to the respective vehicles is titled as “Vehicle Identification”.
This project is based on RF tags and tag-reader. This project use the radio
frequency to activate RF tags associated with vehicle and receive for their
identification by the RFID reader (system) placed at different places.
1.3 Problem Analysis
The project which is to read tags
associated to the respective vehicles for their identification by the rfid
reader (system) placed at different places in a city. This system manipulates
the id to get current status, Engine Number, Chassis Number, Number Plate. Also
the data like Tax Cleared, involved in any crime and more. It is much difficult
task to remember information about vehicles running on the road. So it may help
traffic control to track/predict present location of any vehicle if it is
running on the road. This system comprises of a rfid attached to the vehicle
and a rf reader which read the tags and know details about the respective
vehicle.
1.4 Objectives
·
Fulfilling the requirement for Bachelor
of Electronics and Communication Engineering.
·
To learn about the electronics circuit
implementation
·
To gain knowledge about RF data
transmission
·
To implement in practice the knowledge
of various digital logics/circuits.
·
To develop professional carrier and
group work skill
·
Transmit data using Radio Frequency to
distant places
·
To sense analog digital parameters and
convert to digital form
·
To help traffic control department by
making all the data available in real time
1.5 Feasibility Study
This project is quite feasible for our
context as per the economical, technical and operational aspects are concerned.
The project is to be done by making programs in C and we are acquainted with
the knowledge of language C in previous semesters. We have software tools like
hex converter, and the hardware like arduino. Learning of arduino will add
beneficial for us. Only the RF reader and RF tags are little costly compared to
another components but expenses will be nearly within budget specified which
may be fair enough for a system design. Technically implementation of the
circuit is fairly simple and understandable. RF signals read and manipulation
by arduino is recently very useful technology.
CHAPTER-2
LITERATURE REVIEW
2.1
Introduction
]Radio Frequency Identification (RFID) is an upcoming technology
which has recently attracted the interest of the research community because of
the extraordinary benefits it offers over the other existing identification and
data capturing technologies. This chapter is formatted to review the existing
RFID literature and explore the issues in the present RFID systems since the
technology is still in its acceptance phase.[13]
Since the growth of
RFID technology from 1900’s, apart from its stated positive aspects, the Technology
also bears some concerns or issues. The intended purpose of this chapter is to
examine the literature related to Radio Frequency Identification further extend
academic research, and providing an insight into some of the outstanding and
crucial issues hindering the growth of the RFID technology. There is a strong
need to address these issues in order to provide a greater visibility and an
increased product velocity of the RFID technology.
2.2 Evolution of RFID
Radio Frequency
Identification is a growing technology that has been around since early 1900’s
and was used in World War II . An early research paper had explored RFID work
where the author of this paper stated that “Evidently, considerable research
and development work has to be done before the field of useful applications is
explored” . Then, the electromagnetic theory related to RFID was studied in
1960’s . Apart from that, inventions like Robert Richardson’s “Remotely
activated radio frequency powered devices” took place in that era. By this
time, the wheels of RFID development had started turning. 1960’s was the start
of the 36 adoption of RFID in commercial activities. A noticeable development
work in this area had taken place in 1970’s where vehicle tracking, factory
automation etc. were the prime intentions. By 1980’s, RFID technology had taken
shape in terms of the full implementation of the technology. The deployment of
applications using this technology was noticed in 1990’s.The pace of
developments in RFID is as well apparent in the 21st century where even the
modest of item like cloth is bearing a small sticky patch of RFID and human
implantation of RFID tag and that too of rice sized grain is the reality of the
day.
2.3 Technology Development
At the first glance,
it appears that the RFID technology is keeping its wheels turning without any difficulty
since it might be a simple technology, but in reality it is not true. It is a
technology that spans across diverse areas like CMOS design, data management,
encryption, radio propagation, sensor design and integration, network
engineering to mention a few . RFID technology makes use of components like
tags and readers (normally connected to a host computer or network). The RFID
tags are built using silicon chips and antennas. Based on being categorized as
active or passive, RFID tags can be powered by a battery or illuminated by the
radio waves emitted by a specialized reader respectively. The information
gathered by an RFID interrogator or reader from an RFID tag is stored using a
database system . A capacitor located in the circuit of the passive tag is
responsible for storing power from the RFID reader. This collected energy is
used to transmit the RFID tag information to the RFID reader
2.4 Data storage and
Management
By providing the
capability of automatic identification and data capture, the RFID technology can
be used to significantly improve the efficiency of business processes. This
section of the thesis focuses on the characteristics of RFID data and the
challenges posed by RFID data. Through the automatic data collection provided
by the RFID technology, RFID can achieve greater visibility and product
velocity across supply chains, more efficient data management, easier product
tracking and monitoring, reduced product counterfeiting. RFID poses many data
related challenges and one of the biggest hills to climb is dealing with the
flood of data RFID generates.[13]
2.5 Driver ID
RFID allows drivers to be identified as they
walk up to their vehicle. The vehicle recognizes the correct tag and allows the
vehicle to be started. If the driver ID tag is not recognized by the unit, then
it does not allow the vehicle to start. The RFID system is very clever as users
can define which driver ID tag the vehicle will recognize, allowing the correct
driver to drive the correct vehicle. This tag has a dual purpose as it prevents
any unauthorized vehicle use and helps to prevent theft.[13]
CHAPTER-3
SYSTEM
DEVELOPMENT
3.1 Block Diagram of the system
Fig 3.1: Block Diagram of Overall System
Overview
3.2
Methodology
The tag can be read if passed near a
reader, even if it is covered by the object or invisible. The tag can be read
inside a case, carton, box or other container, and unlike barcodes, RFID tags
can be read one at a time but hundreds in fraction of second.
This system has a reader which receives
radio signals from tags. The system has fixed reader which is set up to create
a specific interrogation zone which can be tightly controlled. This allows a
highly defined reading area for when tags go in and come out of the
interrogation zone. Communication between the reader and the tag is done in
several different compatible ways, depending on the frequency band used by the
tag and the distance between them. The reader reads the tag and sends this value
to controller (Arduino). This Controller has a PC and a Wi-Fi shield connected
to it.
PC here provides user interface with
the system. PC is provided at stations where there is need of entering new
record or updating record of vehicle containing tag, even at places where new
vehicles are given tag. User can access record of any vehicle from here. [4]The
Arduino Wi-Fi Shield allows an Arduino board to connect to the internet using
the 802.11 wireless specifications (Wi-Fi). The major purpose of internet here
is to exchange record between Arduino and Database.
Database in this system contains the
records of all vehicles (with tag). Each record contain tag-ID, vehicle owner
name, owner address, vehicle number, chassis number, and the most important the
time at which it has passed through each station with reader. The question
arises, “How tracking of vehicle is done?”
The answer is- the tracking is not continuously (online) rather the
tracking is done on the basis of record of at what time and to which station
the vehicle has passed through in certain interval of time. The inspection time
can be either an hour or a day or a week as per requirement.
Actually the RF-Reader reads the value
of each vehicle containing tag at a time. Then the Arduino system obtains the
tag value. The record of corresponding tag value (vehicle) is queried from the
Database, accessing internet using Wi-Fi shield. Certain fields of the record
are compared with a reference value. And if no error, while comparing, is occur
then next tag is read and whole above procedure is performed. But in case, if
error is reported then the vehicle number is displayed on the LCD and the
buzzer starts buzzing. On seeing this, the inspector at the station holds him
and performs appropriate steps. The error in this will occur if the comment
field is not blank. The comment field is usually left blank if there is no
crime reported for the vehicle or if the vehicle is clean; but if there has been
any crime reported for the vehicle then this comment field is set to some value
at any station with the PC.
The above description is all about
reading the tag and allowing vehicle to pass if no crime is reported and to
halt if crime is reported. But how about “tracking” which is our major
objective. For understanding this lets understand how the record is stored in
database and how they are updated and also how they are fetched at the time of
need.
Let’s start with adding new vehicle
record. This can be done at some authorized places like government body like
Yatayat, border. Here all the required data about the vehicle is stored for a
unique tag value which is then attached to the vehicle for its identification
whenever vehicle goes to interrogation zone of the reader. All the data
recorded for the first time is most probably of reference nature and as per
conditions and requirements these field values are updated. The updating can be
done at any station with PC. The updating is either done to report crime or if
tag value is changed or if the owner is to be changed.
Still the tracking is mystery. The
vehicle, with tag, now whenever passes through the station (chowk), with
reader, the reader sends the tag value and date-time and also the station
location or number to the server to store them. In this way, we can fetch the
record of any vehicle to know at what date and time any vehicle was at any
places. And also we can predict the path of any vehicle during certain interval
of time by plotting these records. This is how tracking can be done.
|
3.2
|
|
|
|
Flowchart of
the system
|
|
|
Figure.3.2 flow
chart of the system
CHAPTER 4
SYSTEM REQUIREMENTS
4.1 Hardware and
Software:
- Regulator
- Arduino
Uno
- LED
- RFID
READER
- RFID Tags/Cards
- LCD
- Buzzer
- Wi-Fi
Shield
- Proteus
- Wamp
Server
- Notepad++
4.2 Regulator
It is a three pin IC used as a
voltage regulator. It converts unregulated DC current into regulated DC
current. Normally we get fixed output by connecting the voltage regulator at
the output of the filtered DC (see in above diagram). It can also be used in
circuits to get a low DC voltage from a high DC voltage (for example we use
7805 to get 5V from 12V). There are two types of voltage regulators 1. fixed
voltage regulators (78xx, 79xx) 2. variable voltage regulators (LM317) In fixed
voltage regulators there is another classification 1. +ve voltage regulators 2.
-ve voltage regulators POSITIVE VOLTAGE REGULATORS This include 78xx voltage
regulators. The most commonly used ones are 7805 and 7812. 7805 gives fixed 5V
DC voltage if input voltage is in (7.5V, 20V).
4.3 Arduino Uno
4.3.1 Overview
The Arduino Uno is a microcontroller
board based on the ATmega328 (datasheet). It has 14 digital
input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a
16 MHz ceramic resonator, a USB connection, a power jack, an ICSP
header, and a reset button. It contains everything needed to support the
microcontroller; simply connect it to a computer with a USB cable or power it
with a AC-to-DC adapter or battery to get started.
The Uno differs from all preceding boards
in that it does not use the FTDI USB-to-serial driver chip. Instead, it
features the Atmega16U2 (Atmega8U2 up to version R2) programmed
as a USB-to-serial converter.
Revision 2 of
the Uno board has a resistor pulling the 8U2 HWB line to ground, making it
easier to put into DFU mode.
Revision 3 of
the board has the following new features:
pinout: added SDA and SCL pins that are
near to the AREF pin and two other new pins placed near to the RESET pin, the
IOREF that allow the shields to adapt to the voltage provided from the board.
In future, shields will be compatible with both the board that uses the AVR,
which operates with 5V and with the Arduino Due that operates with 3.3V. The
second one is a not connected pin, that is reserved for future purposes.
Stronger RESET circuit.
Atmega 16U2 replace the 8U2.
"Uno" means one in Italian
and is named to mark the upcoming release of Arduino 1.0. The Uno and version
1.0 will be the reference versions of Arduino, moving forward. The Uno is the
latest in a series of USB Arduino boards, and the reference model for the
Arduino platform; for a comparison with previous versions, see the index of Arduino boards.
4.3.2 Summary
Microcontroller
|
ATmega328
|
Operating Voltage
|
5V
|
Input Voltage (recommended)
|
7-12V
|
Input Voltage (limits)
|
6-20V
|
Digital I/O Pins
|
14 (of which 6 provide PWM output)
|
Analog Input Pins
|
6
|
DC Current per I/O Pin
|
40 mA
|
DC Current for 3.3V Pin
|
50 mA
|
Flash Memory
|
32 KB (ATmega328) of which 0.5 KB
used by bootloader
|
SRAM
|
2 KB (ATmega328)
|
EEPROM
|
1 KB (ATmega328)
|
Clock Speed
|
16 MHz
|
4.3.3 Power
The Arduino Uno can be powered via the
USB connection or with an external power supply. The power source is selected
automatically.
External (non-USB) power can come
either from an AC-to-DC adapter (wall-wart) or battery. The adapter can be
connected by plugging a 2.1mm center-positive plug into the board's power jack.
Leads from a battery can be inserted in the ground and Vin pin headers of the
POWER connector.
4.3.4 Memory
The ATmega328 has 32 KB (with
0.5 KB used for the boot loader). It also has 2 KB of SRAM and 1 KB of EEPROM
(which can be read and written with the EEPROM library).
4.3.5 Input and Output
Each of the 14 digital pins on the Uno
can be used as an input or output, using pinMode(), digital Write(), anddigitalRead() functions.
They operate at 5 volts. Each pin can provide or receive a maximum of 40 mA and
has an internal pull-up resistor (disconnected by default) of 20-50 kOhms. In
addition, some pins have specialized functions:
Serial: 0 (RX) and 1 (TX). Used to
receive (RX) and transmit (TX) TTL serial data. These pins are connected to the
corresponding pins of the ATmega8U2 USB-to-TTL Serial chip.
External Interrupts: 2 and
3. These pins can be configured to trigger an interrupt on a low value, a
rising or falling edge, or a change in value. See the attachInterrupt() function
for details.
PWM: 3, 5, 6, 9, 10, and
11. Provide 8-bit PWM output with the analogWrite() function.
SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13
(SCK). These pins support SPI communication using the SPI library.
LED: 13. There is a built-in LED
connected to digital pin 13. When the pin is HIGH value, the LED is on, when
the pin is LOW, it's off.
The Uno has 6 analog inputs, labeled A0
through A5, each of which provide 10 bits of resolution (i.e. 1024 different
values). By default they measure from ground to 5 volts, though is it possible
to change the upper end of their range using the AREF pin and the analogReference()
function. Additionally, some pins have specialized functionality:
TWI: A4 or SDA pin and A5 or SCL
pin. Support TWI communication using the Wire library.
There are a couple of other pins on the
board:
AREF. Reference voltage for the
analog inputs. Used with analog Reference().
Reset. Bring this line LOW to
reset the microcontroller. Typically used to add a reset button to shields
which block the one on the board.
See also the mapping between Arduino pins and ATmega328 ports. The mapping for the
Atmega8, 168, and 328 is identical.
4.4 What is RFID?
A basic RFID system consists of
three components:
a) An antenna or coil
b) A transceiver (with decoder)
c) A transponder (RF tag)
Electronically programmed with
unique information. There are many different types of RFID systems out in the
market. They are categorized according to there frequency ranges. Some of the
most commonly used RFID kits are as follows:
1) Low-frequency (30 KHz to 500
KHz)
2) Mid-Frequency (900KHz to
1500MHz)
3) High Frequency (2.4GHz to
2.5GHz)
4.4.1 RFID Tag (Transducer)
RFID tag is comprised of a microchip
containing identifying information and an antenna that transmits this data
wirelessly to a reader. At its most basic, the chip will contain a serialized
identifier, or license plate number, that uniquely identifies that item,
similar to the way many bar codes are used today. A key difference, however is
that RFID tags have a higher data capacity than their bar code counterparts.
This increases the options for the type of information that can be encoded on
the tag, including the manufacturer, batch or lot number, weight, ownership,
destination and history (such as the temperature range to which an item has
been exposed). In fact, an unlimited list of other types of information can be
stored on RFID tags, depending on application needs. An RFID tag can be placed
on individual items, cases or pallets for identification purposes, as well as
on fixed assets such as trailers, containers, totes, etc. Tags come in a
variety of types, with a variety of capabilities. Key variables include:
"Read-only" versus "read-write" There are three options in
terms of how data can be encoded on tags: (1) Read-only tags contain data such
as a serialized tracking number, which is pre-written onto them by the tag
manufacturer or distributor. These are generally the least expensive tags
because they cannot have any additional information included as they move
throughout the supply chain. Any updates to that information would have to be
maintained in the application software that tracks SKU movement and activity.
(2) "Write once" tags enable a user to write data to the tag one time
in production or distribution processes. Again, this may include a serial
number, but perhaps other data such as a lot or batch number. (3) Full
"read-write" tags allow new data to be written to the tag as
needed—and even written over the original data. Examples for the latter
capability might include the time and date of ownership transfer or updating
the repair history of a fixed asset. While these are the most costly of the
three tag types and are not practical for tracking inexpensive items, future
standards for electronic product codes (EPC) appear to be headed in this
direction. RFID TAGS
Fig 4.4.1 RFID Tag
4.4.2 RF Reader(Transceiver)
The RF transceiver is the source of the
RF energy used to activate and power the passive RFID tags. The RF transceiver
may be enclosed in the same cabinet as the reader or it may be a separate piece
of equipment. When provided as a separate piece of equipment, the transceiver
is commonly referred to as an RF module. The RF transceiver controls and
modulates the radio frequencies that the antenna transmits and receives. The
transceiver filters and amplifies the backscatter signal from a passive RFID
tag.
Figure.4.4.2 RFID Reader
4.4.3
RFID frequency bands [6]
|
|||||
Band
|
Regulations
|
Range
|
Data
speed
|
Remarks
|
Approximate
tag cost
in volume (2006) US $ |
120–150 kHz
(LF)
|
Unregulated
|
10 cm
|
Low
|
Animal
identification, factory data collection
|
$1
|
13.56 MHz
(HF)
|
ISM
band worldwide
|
10 cm
- 1 m
|
Low
to moderate
|
Smart
cards (MIFARE, ISO/IEC
14443)
|
$0.50
|
433 MHz
(UHF)
|
Short
Range Devices
|
1–100
m
|
Moderate
|
Defense
applications, with active tags
|
$5
|
865-868 MHz
(Europe)
902-928 MHz (North America) UHF |
ISM
band
|
1–12
m
|
Moderate
to high
|
EAN,
various standards
|
$0.15
(passive tags)
|
2450-5800 MHz
(microwave)
|
ISM
band
|
1–2
m
|
High
|
802.11
WLAN, Bluetooth standards
|
$25
(active tags)
|
3.1–10 GHz
(microwave)
|
Ultra
wide band
|
to
200 m
|
High
|
requires
semi-active or active tags
|
$5
projected
|
4.4.4 RFID Antenna
The antenna emits radio signals to
activate the tag and read and write data to it. Antennas are the conduits
between the tag and the transceiver, which controls the system's data acquisition
and communication. Antennas are available in a variety of shapes and sizes; they
can be built into a door frame to receive tag data from persons or things
passing through the door, or mounted on an interstate tollbooth to monitor
traffic passing by on a freeway. The electromagnetic field produced by an antenna
can be constantly present when multiple tags are expected continually. If
constant interrogation is not required, a sensor device can activate the field.
Often the antenna is packaged with the transceiver and decoder to become a
reader (a.k.a. interrogator), which can be configured either as a handheld or a
fixed-mount device. The reader emits radio waves in ranges of anywhere from one
inch to 100 feet or more, depending upon its power output and the radio
frequency used. When an RFID tag passes through the electromagnetic zone, it
detects the reader's activation signal. The reader decodes the data encoded in
the tag's integrated circuit (silicon chip) and the data is passed to the host
computer for processing
Figure
4.4.4 RFID Antenna
4.4.5
Working Principle of RFID
The
most basic radio frequency identification solution is made up of three main
hardware components. These components are the RFID tag, the RFID reader, and the
antenna. This is, of course, an over simplification of what it takes to apply
today’s RFID technology to a real world problem, but these are the fundamental
building blocks. Understanding the fundamentals of RFID is the key that allows
practitioners to be successful in their application of the technology. Even
though this article does not discuss the software required to interpret and
make use of the RFID data, its role in a complete RFID solution is vital.[7]
The components of the basic RFID tag
are an integrated circuit (IC), an antenna, and the substrate that holds it all
together. The IC is responsible for controlling the tag; much like a CPU
controls a desktop computer. The IC controls what is broadcast from the tag,
processes commands received from the reader via the antenna, and manages any
peripherals such as temperature and pressure sensors. The antenna plays
multiple roles in most RFID tags. It is responsible for receiving and
transmitting data from and to the reader, and, in the case of passive type RFID
tags, they collect the energy required to power the tag. Passive tags power
themselves off of the energy they collect from high gain antennas that are
connected to the RFID reader; therefore, they must be in close proximity to the
RFID reader’s antenna in order to collect enough energy to function.
RFID tags with onboard batteries are
known as active tags. Unlike passive tags, they transmit their data even when
they are not in close proximity to an RFID reader. In most cases, active tags
can be read at a longer distance than passive tags. There is a hybrid tag known
as the semi-active tag. It has an onboard battery just like the active tag, but
it will only transmit when it is in close proximity to the reader.
RFID tags may transmit many different pieces
of data, but the most fundamental piece of data is the tag’s unique identifier.
The unique identifier is, in most cases, associated with a real world asset
that is to be tracked. The unique identifier is used as the key that identifies
information about an asset in a database in most applications. Tags may also
transmit state information or telemetry such as temperature or humidity if they
have the sensors to collect this type of information. Most passive tags do not
have peripheral functionality due to the power limitations of not having an
onboard battery.
The RFID reader is sometimes referred
to as the interrogator. The reader receives all of the data that the tags are
transmitting. The data is then passed on to software that makes use of the
data. The tags that are in close enough proximity to a reader are referred to
as the reader’s “tag population.” As a reader’s tag population grows, the
density of tags around the reader also grows, and the reader may require more
time to read all of the tags in its vicinity. This is due to the fact that if
all the tags transmit at the same time, the reader will not be able to separate
their data into discreet transmissions, so it is important that the tags do not
transmit all at once.[8]
Passive tag readers select subsets of
the population to query over time until beacons from all of the tags in the
population have been received. Most active tag readers do not control the
sampling of the tag population like passive readers do. Active tags beacon at a
pseudorandom interval to avoid transmission collision with other tags.
Anti-collision algorithms such as the ALOHA algorithm determine when the tag
will beacon. The ALOHA algorithm assigns transmission time slots to each tag.
The name ALOHA is not an acronym, but was given its name because it was
developed at the University of Hawaii. The ALOHA algorithm is a common
anti-collision algorithm that is used by many RF applications, not only RFID.
Over time, the randomization of the tag transmissions will ensure that the transmissions
from all the tags are eventually received. There exists a threshold where the
tag density is so great that it cannot be guaranteed that all the tags will be
sampled in a timely manner. The tag density maximum is different for each RFID
tag and reader manufacturer. Some manufacturers even allow the anti-collision
algorithm to be changed based on the needs of the solution.
The
importance of the antenna that is connected to the reader cannot be
underestimated. In a passive RFID solution, the antenna must be sensitive
enough to receive the RFID tag transmissions and it must also be powerful
enough to power the tags. Passive tag reader antennas may be deployed in many
different configurations depending on the application.
4.5 Buzzer
A buzzer or beeper is an audio signaling device, which may be mechanical, electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm devices, timers and confirmation of user input such as a mouse click
or keystroke.
Fig 4.5.1: Buzzer
4.6
Arduino Wi-Fi Shield
The Arduino Wi-Fi Shield connects your
Arduino to the internet wirelessly. Connect it to your wireless network by
following a few simple instructions to start controlling your world through the
internet. As always with Arduino, every element of the platform – hardware,
software and documentation – is freely available and open-source. This means
you can learn exactly how it's made and use its design as the starting point
for your own circuits.[4]
Ø Requires
and Arduino board (not included)
Ø Operating
voltage 5V (supplied from the Arduino Board)
Ø Connection
via: 802.11b/g networks
Ø Encryption
types: WEP and WPA2 Personal
Ø Connection
with Arduino on SPI port
on-
board micro SD slot
Ø ICSP
headers
Ø FTDI
connection for serial debugging of Wi-Fi shield
4.6.1 Description
The Arduino Wi-Fi Shield allows an
Arduino board to connect to the internet using the 802.11 wireless
specifications (Wi-Fi). It is based on the HDG104 Wireless LAN 802.11b/g System
in-Package. An Atmega 32UC3 provides a network (IP) stack capable of both.[4]
Figure 4.6.1Arduino
Wi-Fi Shield front and back part
TCP and UDP. Use the Wi-Fi library
to write sketches which connect to the internet using the shield. The Wi-Fi
shield connects to an Arduino board using long wire-wrap headers which extend
through the shield. This keeps the pin layout intact and allows another shield
to be stacked on top. The Wi-Fi Shield can connect to wireless networks which
operate according to the 802.11b and 802.11g specifications. There is an
onboard micro-SD card slot, which can be used to store files for serving over
the network. It is compatible with the Arduino Uno and Mega. The onboard micro
SD card reader is accessible through the SD Library. When working with this
library, SS is on Pin 4. Arduino communicates with both the Wifi shield's
processor and SD card using the SPI bus (through the ICSP header). This is on
digital pins 11, 12, and 13 on the Uno and pins 50, 51, and 52 on the Mega. On
both boards, pin 10 is used to select the HDG104 and pin 4 for the SD card.
These pins cannot be used for general I/O. On the Mega, the hardware SS pin,
53, is not used to select either the HDG104 or the SD card, but it must be kept
as an output or the SPI interface won't work. Digital pin 7 is used as a
handshake pin between the Wi-Fi shield and the Arduino, and should not be used.
Note that because the HDG104 and SD card share the SPI bus, only one can be
active at a time. If you are using both peripherals in your program, this
should be taken care of by the corresponding libraries. If you're not using one
of the peripherals in your program, however, you'll need to explicitly deselect
it. To do this with the SD card, set pin 4 as an output and write a high to it.
For the HDG104, set digital pin 10 as a high output. The shield can connect to
encrypted networks that use either WPA2 Personal or WEP encryption. It can also
connect to open networks. A network must broadcast its SSID for the shield to
be able to connect. The reset button on the shield resets both the HDG104 and
the Arduino board.
4.7 LCD (Liquid Crystal Display)
LCD (Liquid Crystal Display) screen is an
electronic display module and find a wide range of applications. A 16x2 LCD
display is very basic module and is very commonly used in various devices and
circuits. These modules are preferred over seven segments and other multi segment LEDs. The reasons being: LCDs are economical;
easily programmable; have no limitation of displaying special & even custom characters (unlike in seven segment so on).
A 16x2 LCD means it can
display 16 characters per line and there are 2 such lines. In this LCD each
character is displayed in 5x7 pixel matrix. This LCD has two registers, namely,
Command and Data.
The command register stores the command instructions given to the
LCD. A command is an instruction given to LCD to do a predefined task like
initializing it, clearing its screen, setting the cursor position, controlling
display etc. The data register stores the data to be displayed on the LCD. The
data is the ASCII value of the character to be displayed on the LCD. Click to
learn more about internal structure of a LCD.
4.7.1 Pin Diagram
Figure 4.7.1
LCD
4.7.2 Pin Description:
Pin No
|
Function
|
Name
|
1
|
Ground (0V)
|
Ground
|
2
|
Supply voltage; 5V (4.7V –
5.3V)
|
Vcc
|
3
|
Contrast adjustment; through
a variable resistor
|
VEE
|
4
|
Selects command register when
low; and data register when high
|
Register Select
|
5
|
Low to write to the register;
High to read from the register
|
Read/write
|
6
|
Sends data to data pins when
a high to low pulse is given
|
Enable
|
7
|
8-bit data pins
|
DB0
|
8
|
DB1
|
|
9
|
DB2
|
|
10
|
DB3
|
|
11
|
DB4
|
|
12
|
DB5
|
|
13
|
DB6
|
|
14
|
DB7
|
|
15
|
Backlight VCC (5V)
|
Led+
|
16
|
Backlight Ground (0V)
|
Led-
|
4.8 Proteus
Proteus PCB design
combines the ISIS schematic capture and ARES PCB layout programs to provide a
powerful, integrated and easy to use suite of tools for professional PCB
Design. All Proteus PCB design products include an integrated shape based auto
router and a basic SPICE simulation capability as standard. More advanced
routing modes are included in Proteus PCB Design Level 2 and higher whilst
simulation capabilities can be enhanced by purchasing the Advanced Simulation
option and/or micro-controller simulation capabilities.
4.8.1 System
components
- ISIS Schematic Capture -
a tool for entering designs.
- PROSPICE Mixed mode SPICE
simulation - industry
standard SPICE3F5 simulator combined with a digital simulator.
- ARES PCB Layout - PCB design system with
automatic component placer, rip-up and retry auto-router and interactive
design rule checking.
- VSM - Virtual System Modelling
lets co-simulate embedded software for popular microcontrollers alongside
hardware design.
- System Benefits Integrated package with
common user interface and fully context sensitive help.
4.9 Database
A
database is a separate application that stores a collection of data. Each
database has one or more distinct APIs for creating, accessing, managing,
searching and replicating the data it holds.
Other kinds of data stores can be used, such as files on the file system
or large hash tables in memory but data fetching and writing would not be so
fast and easy with those types of systems. So nowadays, we use relational
database management systems (RDBMS) to store and manage huge volume of data.
This is called relational database because all the data is stored into different
tables and relations are established using primary keys or other keys known as
foreign keys.[9]
A Relational
Database Management System (RDBMS) is a software that:
·
Enables you to implement a database with tables, columns and
indexes.
·
Guarantees the Referential Integrity between rows of various
tables.
·
Updates the indexes automatically.
·
Interprets an SQL query and combines information from
various tables.
4.9.1 RDBMS
Terminology
Before
we proceed to explain MySQL database system, let's revise few definitions
related to database.
Ø Database: A database is a collection of
tables, with related data.
Ø Table: A table is a matrix with data. A
table in a database looks like a simple spreadsheet.
Ø Column: One column (data element)
contains data of one and the same kind, for example the column postcode.
Ø Row: A row (= tuple, entry or record) is a group of related
data, for example the data of one subscription.
Ø Redundancy: Storing data twice, redundantly
to make the system faster.
Ø Primary Key: A primary key is unique. A key
value can not occur twice in one table. With a key, you can find at most one
row.
Ø Foreign Key: A foreign key is the linking pin
between two tables.
Ø Compound Key: A compound key (composite key) is
a key that consists of multiple columns, because one column is not sufficiently
unique.
Ø Index: An index in a database resembles
an index at the back of a book.
Ø Referential Integrity: Referential Integrity makes sure that
a foreign key value always points to an existing row.
4.9.2
MySQL Database
MySQL is a fast, easy-to-use RDBMS
being used for many small and big businesses. MySQL is developed, marketed, and
supported by MySQL AB, which is a Swedish company. MySQL is becoming so popular
because of many good reasons:
MySQL
is released under an open-source license. So you have nothing to pay to use
it.MySQL is a very powerful program in its own right. It handles a large subset
of the functionality of the most expensive and powerful database packages.MySQL
uses a standard form of the well-known SQL data language.MySQL works on many
operating systems and with many languages including PHP, PERL, C, C++, JAVA,
etc.MySQL works very quickly and works well even with large data sets.MySQL is
very friendly to PHP, the most appreciated language for web development.MySQL
supports large databases, up to 50 million rows or more in a table. The default
file size limit for a table is 4GB, but you can increase this (if your operating
system can handle it) to a theoretical limit of 8 million terabytes (TB).MySQL
is customizable. The open-source GPL license allows programmers to modify the
MySQL software to fit their own specific environments.MySQL works very well in
combination of various programming languages like PERL, C, C++, JAVA and PHP.
Out of these languages, PHP is the most popular one because of its web
application development capabilities.This focuses heavily on using MySQL in a
PHP environment. If you are interested in MySQL with PERL, then you can look
into PERL and MySQL Tutorial.[12]
PHP
provides various functions to access MySQL database and to manipulate data
records inside MySQL database. You would require to call PHP functions in the
same way you call any other PHP function.
The
PHP functions for use with MySQL have the following general format:
mysql_function(value,value,...);
The
second part of the function name is specific to the function, usually a word
that describes what the function does. The following are two of the functions,
which we will use in our tutorial:
mysqli_connect($connect);
mysqli_query($connect,"SQL
statement");
Following
example shows a generic syntax of PHP to call any MySQL function.
$retval = mysql_function(value,
[value,...]);
if( !$retval )
{
die ( "Error: a related error
message" );
}
// Otherwise MySQL or PHP Statements
?>
4.9.3 MySQL
Functions[12]
mysql_affected_rows — Get number of affected
rows in previous MySQL operation
mysql_client_encoding — Returns the name of the
character set
mysql_close — Close MySQL connection
mysql_connect — Open a connection to a MySQL
Server
mysql_create_db — Create a MySQL database
mysql_data_seek — Move internal result pointer
mysql_db_name — Retrieves database name from the
call to mysql_list_dbs
mysql_db_query — Selects a database and executes
a query on it
mysql_drop_db — Drop (delete) a MySQL database
mysql_errno — Returns the numerical value of the
error message from previous MySQL operation
mysql_error — Returns the text of the error
message from previous MySQL operation
mysql_escape_string — Escapes a string for use
in a mysql_query
mysql_fetch_array — Fetch a result row as an
associative array, a numeric array, or both
mysql_fetch_assoc — Fetch a result row as an
associative array
mysql_fetch_field — Get column information from
a result and return as an object
mysql_fetch_lengths — Get the length of each
output in a result
mysql_fetch_object — Fetch a result row as an
object
mysql_fetch_row — Get a result row as an
enumerated array
mysql_field_flags — Get the flags associated with
the specified field in a result
mysql_field_len — Returns the length of the
specified field
mysql_field_name —
Get the name of the specified field in a result
mysql_field_seek — Set result pointer to a
specified field offset
mysql_field_table — Get name of the table the
specified field is in
mysql_field_type — Get the type of the specified
field in a result
mysql_free_result — Free result memory
mysql_get_client_info — Get MySQL client info
mysql_get_host_info — Get MySQL host info
mysql_get_proto_info — Get MySQL protocol info
mysql_get_server_info —
Get MySQL server info
mysql_info — Get information about the most
recent query
mysql_insert_id — Get the ID generated in the
last query
mysql_list_dbs — List databases available on a
MySQL server
mysql_list_fields —
List MySQL table fields
mysql_list_processes — List MySQL processe
mysql_list_tables —
List tables in a MySQL database
mysql_num_fields — Get number of fields in
result
mysql_num_rows —
Get number of rows in result
mysql_pconnect —
Open a persistent connection to a MySQL server
mysql_ping — Ping a server connection or
reconnect if there is no connection
mysql_query — Send a MySQL query
mysql_real_escape_string — Escapes special
characters in a string for use in an SQL statement
mysql_result — Get result data
mysql_select_db — Select a MySQL database
mysql_set_charset — Sets the client character
set
mysql_stat — Get current system status
mysql_tablename — Get table name of field
mysql_thread_id — Return the current thread I
4.10 Wamp Server
The acronym WAMP
refers to a set of free (open source)applications, combined
with Microsoft Windows, which are commonly used in Web server environments.
The WAMP stack provides developers with the four key elements of a Web
server: an operating system, database, Web server
and Web scripting software. The combined usage of these programs is called a
server stack. In this stack, Microsoft Windows is
the operating system (OS), Apache is
the Web server, MySQL handles
the database components, while PHP, Python, or PERL represents
the dynamic scripting languages.
CHAPTER-5
EPILOUGE
5.1 Work Accomplished
·
Relevant study is
accomplished
·
System Block Diagram
verified by Supervisor
·
Work plan distributed
·
Reading the RFID from
the tag
·
Database acquiring the
different fields for vehicle information.
·
Testing of Wi-Fi
Shield
5.1.1
Snap shots
Figure.5.1.1 W-Fi Shield
Testing
Figure 5.1.2 Reading RFID from tag
5.2 Work Remaining
·
Set up the link
between arduino and Database
·
Circuit design
·
Hardware Assemble
·
PCB Design
·
Integration
·
Integrated Software
Development
5.3 Problem Encountered
·
Ambiguous while
reading two or more RFID simultaneously
·
Functioning/disfunctioning
of same component
·
Reading the tag ID
·
Linking the RFID
system with Database
5.4 Conclusion
As
the RFID technology evolves, more sophisticated applications will use the
capability of RFID to receive, store and forward data to a remote sink source.
RFID has many applications as can be imagined. In this paper, we have utilized
the versatility of RFID in tracking vehicle which has a tracking device, RFID,
attached to it. However if this system will develop can bring revolution in
tracking vehicle assisting traffic control. On this based we can also track
wild animals in forest, several product in ware house and more. This helps to
find out the number of vehicle who have been at certain location at the
time of crime. This makes inspection
easier.
CHAPTER 6
BIBLIOGRAPHY
6.1
References
[1] “8051 and embedded system”, Mazidi
and Mazidi, 2008
[2] http://
www.datasheetcatalog.com
[4] http://arduino.cc/arduino-wifi-shield
[7]
RFID Applied,
John Wiley, 2007
[9] Database system concepts , A.Silberschatz,
H.Korth, S.Sudarshan/4th Edition,2002
[10] PHP6 and MySQL 6 Bible, S.suecring, Tim
Converse, J.Park, 2012
[13] http://nccur.lib.nccu.edu.tw/bitstream
Comments
Post a Comment