My Final Year Project On VEHICLE TRACKING


ABSTRACT
In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this paper, an attempt is made to track any vehicle with RFID tag with it. Tracking is done inorder to know information about the vehicle like its Engine Number, Chassis Number and Number Plate. The RFID tag can be affixed to an object and used to track and manage inventory, assets, people, etc. For example, it can be affixed to cars, computer equipment, books, mobile phones, etc. In this project, “Vehicle Tracking”, is based on RF system. Here each vehicle has a RFID tag which is read by the RF Reader. In the RF Reader there present the database of all the vehicle. With the joint help of reader, database and controller we can get information about the vehicle and if this vehicle has any fault record, it is tracked and catch by the traffic controller.










ACKNOWLEDGEMENT
Firstly, we would like to give our heart full gratitude to HOD Er.Rabindra Khati and Deputy HOD Er.Rajeev Prajapati for their encouragement, valuable suggestions and support they provided us throughout our project work.
The project would not have been so progressive without the timely guidance of our project supervisor Asst.Prof.Dr.Nanda Bikram Adhikari. We would like to extend our sincere gratitude to him for all his help and guidance.
We are deeply indebted to our teachers, seniors, lab personnel and college Library for providing us with the necessary books, reports and all other study materials required during our project time period. This project progress would not have been possible without their valuable suggestions and motivation.
Finally, we would like to thankful to our family and friends who directly or indirectly contributed in this project.









TABLE OF CONTENTS
CONTENTS                                                                   PAGE NO.
Abstract …………………………………………………………………….……………………...i
Acknowledgement ………………………………………………………………………………..ii
Table of Contents ………………………………………………………………………………...iii
List of Figures …………………………………………………………………………………....vi
List of Abbreviations …………………………………………………………………………....vii
CHAPTER 1: INTRODUCTION                                                         
1.1  Background ………………………………………………………………………….02
1.2  Project Introduction ………………………………………………………………....02
1.3  Problem Analysis …………………………………………………………………....03
1.4  Objectives …………………………………………………………………………....03
1.5  Feasibility Study ………………………………………………………………….…03
CHAPTER 2: LITERATURE REVIEW                                              
2.1 Introduction…………..………………………………………………………………06
2.2 Evolution of RFID………………...…………………………………………………06
2.3 Technology Development……………………………………………………………07
2.4 Data Storage and Management………………………………………………………07
2.5 Driver ID……………………………………………………………………………..08
CHAPTER 3: SYSTEM DEVELOPMENT
            3.1 Block diagram of the system…………………………………………………………10
            3.2 Methodology……………………………………………………………………..…..11
            3.3 Flowchart of the system……………………………………………………………...13 
CHAPTER 4: SYSTEM REQUIREMENTS
            4.1 Hardware and Software………………………………………………………………16
4.2 Regulator ………………….…………………………………………………………16

4.3 Arduino Uno ………………………………………………………………………...17

4.3.1 ­­­Overview …………………………………………………………………..17
4.3.2 Summary ………………………………………………………………......18
4.3.3 Power ……………………………………………………………………...19
4.3.4 Memory ……………………………………………………………………19
4.3.5 Input and Output ………………………………………………………......19
4.4 What is RFID?…………………………………………………………..….…...…...20
            4.4.1 RFID Tag (Transducer)………………………………………………...…..21
            4.4.2 RF Reader (Transceiver)…………………………………………………...22
            4.4.3 RFID Frequency Bands………………………………………………….....23
            4.4.4 RFID Antenna……………………………………………………………...24
            4.4.5 Working Principle of RFID………………………………………………..25
4.5 Buzzer………………………………………………………………………………..28
4.6 Arduino Wi-Fi Shield………………………………………………………………..28
            4.6.1 Description…………………………………………………………………29
4.7 LCD (Liquid Crystal Display)…………………………………………………….....30
            4.7.1 Pin Diagram………………………………………………………………..31
            4.7.2 Pin Description……………………………………………………………..32
4.8 Proteus………………………………………………………………………………..33
            4.8.1 System components………………………………………. ……………....33
4.9 Database……………………………………………………………………………...33
            4.9.1 RDBMS Terminology……………………………………………………...34
            4.9.2 MySQL Database…………………………………………………………..35
            4.9.3 MySQL Functions………………………………………………………….37
4.10 Wamp Server……………………………………………………………………….39
CHAPTER 5: EPILOUGE
            5.1 Work Accomplished…………………………………………………………………41
                        5.1.1 Snapshots…………………………………………………………………..42
            5.2 Work Remaining……………………………………………………………………..43
            5.3 Problem Encountered………………………………………………………………...44
            5.4 Conclusion…………………………………………………………………………...45
CHAPTER 6: BIBLIOGRAPHY
            6.1 References……………………………………………………………………………47




LIST OF FIGURES
FIGURE                                                                PAGE NO.
Figure 3.1 Block diagram of overall system overview…………………………………..10
Figure 3.2 Flow chart of the system…………………………………………………...…14
Figure 4.4.1 RFID Tag…………………………………………………………………...22
Figure 4.4.2 RFID Reader………………………………………………………………..23
Figure 4.4.4 RFID Antenna……………………………………………………………...25
Figure 4.5.1 Buzzer………………………………………………………………………28
Figure 4.6.1 Arduino Wi-Fi Shield front and back part………………………………….29
Figure 4.7.1 LCD………………………………………………………………………...31
Figure 5.1.1 Wi-Fi Shield testing………………………………………………………...42
Figure 5.1.2 Reading RFID from tag…………………………………………………….42






                 

LIST OF ABBREVIATIONS
LCD= Liquid Crystal Display
RFID= Radio Frequency Identification
AVR= Advanced Virtual RISC
PC =Personal Computer
WAMP = Windows, Apache, MySQL, PHP/Perl/Python
LED=Light Emitting Diode
RDBMS=Relational Database Management System
PCB =Printed Circuit Board
Wi-Fi= Wireless Fidelity
SRAM=Static Random Access Memory
TX=Transmitter
RX=Receiver
DC=Direct Current
I/O=Input Output
EPC=Electronic Product Code
ASCII= American Standard Code for Information Interchange 
WEP= Wired Equivalent Privacy
WPA= Wi-Fi Protected Access
SDA=Serial Data

SPI=Serial Peripheral Interface







               

CHAPTER-1
INTRODUCTION









1.1 Background
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID reader and an RFID tag. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.[6]
Nowadays it is very important to get instantaneous data to be accessed to concerned people. It would be very much beneficial if we could trace vehicle identification running on the road for their all information like Engine Number, Chassis Number and Number Plate. Even information like Tax Clearance, where have it been through city.
Collecting data manually may create a lot of problem such as delay in access time, high cost. Making any task cost efficient is highly demanded. Collecting data automatically can reduce the man power needed to accomplish the same task.
1.2 Project Introduction
The project which is to read tags associated to the respective vehicles is titled as “Vehicle Identification”. This project is based on RF tags and tag-reader. This project use the radio frequency to activate RF tags associated with vehicle and receive for their identification by the RFID reader (system) placed at different places.

1.3 Problem Analysis
The project which is to read tags associated to the respective vehicles for their identification by the rfid reader (system) placed at different places in a city. This system manipulates the id to get current status, Engine Number, Chassis Number, Number Plate. Also the data like Tax Cleared, involved in any crime and more. It is much difficult task to remember information about vehicles running on the road. So it may help traffic control to track/predict present location of any vehicle if it is running on the road. This system comprises of a rfid attached to the vehicle and a rf reader which read the tags and know details about the respective vehicle.
1.4 Objectives
·         Fulfilling the requirement for Bachelor of Electronics and Communication Engineering.
·         To learn about the electronics circuit implementation
·         To gain knowledge about RF data transmission
·         To implement in practice the knowledge of various digital logics/circuits.
·         To develop professional carrier and group work skill
·         Transmit data using Radio Frequency to distant places
·         To sense analog digital parameters and convert to digital form
·         To help traffic control department by making all the data available in real time
1.5 Feasibility Study
This project is quite feasible for our context as per the economical, technical and operational aspects are concerned. The project is to be done by making programs in C and we are acquainted with the knowledge of language C in previous semesters. We have software tools like hex converter, and the hardware like arduino. Learning of arduino will add beneficial for us. Only the RF reader and RF tags are little costly compared to another components but expenses will be nearly within budget specified which may be fair enough for a system design. Technically implementation of the circuit is fairly simple and understandable. RF signals read and manipulation by arduino is recently very useful technology.



                                     











                                   
                                CHAPTER-2
LITERATURE REVIEW













2.1 Introduction

]Radio Frequency Identification (RFID) is an upcoming technology which has recently attracted the interest of the research community because of the extraordinary benefits it offers over the other existing identification and data capturing technologies. This chapter is formatted to review the existing RFID literature and explore the issues in the present RFID systems since the technology is still in its acceptance phase.[13]
Since the growth of RFID technology from 1900’s, apart from its stated positive aspects, the Technology also bears some concerns or issues. The intended purpose of this chapter is to examine the literature related to Radio Frequency Identification further extend academic research, and providing an insight into some of the outstanding and crucial issues hindering the growth of the RFID technology. There is a strong need to address these issues in order to provide a greater visibility and an increased product velocity of the RFID technology.

2.2 Evolution of RFID

Radio Frequency Identification is a growing technology that has been around since early 1900’s and was used in World War II . An early research paper had explored RFID work where the author of this paper stated that “Evidently, considerable research and development work has to be done before the field of useful applications is explored” . Then, the electromagnetic theory related to RFID was studied in 1960’s . Apart from that, inventions like Robert Richardson’s “Remotely activated radio frequency powered devices” took place in that era. By this time, the wheels of RFID development had started turning. 1960’s was the start of the 36 adoption of RFID in commercial activities. A noticeable development work in this area had taken place in 1970’s where vehicle tracking, factory automation etc. were the prime intentions. By 1980’s, RFID technology had taken shape in terms of the full implementation of the technology. The deployment of applications using this technology was noticed in 1990’s.The pace of developments in RFID is as well apparent in the 21st century where even the modest of item like cloth is bearing a small sticky patch of RFID and human implantation of RFID tag and that too of rice sized grain is the reality of the day.
2.3 Technology Development

At the first glance, it appears that the RFID technology is keeping its wheels turning without any difficulty since it might be a simple technology, but in reality it is not true. It is a technology that spans across diverse areas like CMOS design, data management, encryption, radio propagation, sensor design and integration, network engineering to mention a few . RFID technology makes use of components like tags and readers (normally connected to a host computer or network). The RFID tags are built using silicon chips and antennas. Based on being categorized as active or passive, RFID tags can be powered by a battery or illuminated by the radio waves emitted by a specialized reader respectively. The information gathered by an RFID interrogator or reader from an RFID tag is stored using a database system . A capacitor located in the circuit of the passive tag is responsible for storing power from the RFID reader. This collected energy is used to transmit the RFID tag information to the RFID reader

2.4 Data storage and Management

By providing the capability of automatic identification and data capture, the RFID technology can be used to significantly improve the efficiency of business processes. This section of the thesis focuses on the characteristics of RFID data and the challenges posed by RFID data. Through the automatic data collection provided by the RFID technology, RFID can achieve greater visibility and product velocity across supply chains, more efficient data management, easier product tracking and monitoring, reduced product counterfeiting. RFID poses many data related challenges and one of the biggest hills to climb is dealing with the flood of data RFID generates.[13]

2.5 Driver ID
RFID allows drivers to be identified as they walk up to their vehicle. The vehicle recognizes the correct tag and allows the vehicle to be started. If the driver ID tag is not recognized by the unit, then it does not allow the vehicle to start. The RFID system is very clever as users can define which driver ID tag the vehicle will recognize, allowing the correct driver to drive the correct vehicle. This tag has a dual purpose as it prevents any unauthorized vehicle use and helps to prevent theft.[13]















CHAPTER-3
SYSTEM DEVELOPMENT









3.1 Block Diagram of the system









 




           












 Fig 3.1: Block Diagram of Overall System Overview
3.2 Methodology
The tag can be read if passed near a reader, even if it is covered by the object or invisible. The tag can be read inside a case, carton, box or other container, and unlike barcodes, RFID tags can be read one at a time but hundreds in fraction of second.
This system has a reader which receives radio signals from tags. The system has fixed reader which is set up to create a specific interrogation zone which can be tightly controlled. This allows a highly defined reading area for when tags go in and come out of the interrogation zone. Communication between the reader and the tag is done in several different compatible ways, depending on the frequency band used by the tag and the distance between them. The reader reads the tag and sends this value to controller (Arduino). This Controller has a PC and a Wi-Fi shield connected to it.
PC here provides user interface with the system. PC is provided at stations where there is need of entering new record or updating record of vehicle containing tag, even at places where new vehicles are given tag. User can access record of any vehicle from here. [4]The Arduino Wi-Fi Shield allows an Arduino board to connect to the internet using the 802.11 wireless specifications (Wi-Fi). The major purpose of internet here is to exchange record between Arduino and Database.
Database in this system contains the records of all vehicles (with tag). Each record contain tag-ID, vehicle owner name, owner address, vehicle number, chassis number, and the most important the time at which it has passed through each station with reader. The question arises, “How tracking of vehicle is done?”  The answer is- the tracking is not continuously (online) rather the tracking is done on the basis of record of at what time and to which station the vehicle has passed through in certain interval of time. The inspection time can be either an hour or a day or a week as per requirement.
Actually the RF-Reader reads the value of each vehicle containing tag at a time. Then the Arduino system obtains the tag value. The record of corresponding tag value (vehicle) is queried from the Database, accessing internet using Wi-Fi shield. Certain fields of the record are compared with a reference value. And if no error, while comparing, is occur then next tag is read and whole above procedure is performed. But in case, if error is reported then the vehicle number is displayed on the LCD and the buzzer starts buzzing. On seeing this, the inspector at the station holds him and performs appropriate steps. The error in this will occur if the comment field is not blank. The comment field is usually left blank if there is no crime reported for the vehicle or if the vehicle is clean; but if there has been any crime reported for the vehicle then this comment field is set to some value at any station with the PC.
The above description is all about reading the tag and allowing vehicle to pass if no crime is reported and to halt if crime is reported. But how about “tracking” which is our major objective. For understanding this lets understand how the record is stored in database and how they are updated and also how they are fetched at the time of need.
Let’s start with adding new vehicle record. This can be done at some authorized places like government body like Yatayat, border. Here all the required data about the vehicle is stored for a unique tag value which is then attached to the vehicle for its identification whenever vehicle goes to interrogation zone of the reader. All the data recorded for the first time is most probably of reference nature and as per conditions and requirements these field values are updated. The updating can be done at any station with PC. The updating is either done to report crime or if tag value is changed or if the owner is to be changed.
Still the tracking is mystery. The vehicle, with tag, now whenever passes through the station (chowk), with reader, the reader sends the tag value and date-time and also the station location or number to the server to store them. In this way, we can fetch the record of any vehicle to know at what date and time any vehicle was at any places. And also we can predict the path of any vehicle during certain interval of time by plotting these records. This is how tracking can be done.

BUZZER ALARM DISPLAY ON LCD
 
3.2 Flowchart: Connector: A

SERVER [DATABASE]
 
Flowchart: Decision: IS DATA CORRECT
Flowchart: Alternate Process: START


READ RFID
 

RFID TO ARDUINO
 

ARDUINO READ DATA FROM SERVER
 
Flowchart of the system





















WI-FI
 

SERVER
[DATABASE]
 


PC
 
Oval: A 














     
                              Figure.3.2 flow chart of the system







CHAPTER 4
SYSTEM REQUIREMENTS







4.1 Hardware and Software:
  • Regulator
  • Arduino Uno
  • LED
  • RFID READER
  • RFID Tags/Cards
  • LCD
  • Buzzer
  • Wi-Fi Shield
  • Proteus
  • Wamp Server
  • Notepad++
4.2 Regulator
It is a three pin IC used as a voltage regulator. It converts unregulated DC current into regulated DC current. Normally we get fixed output by connecting the voltage regulator at the output of the filtered DC (see in above diagram). It can also be used in circuits to get a low DC voltage from a high DC voltage (for example we use 7805 to get 5V from 12V). There are two types of voltage regulators 1. fixed voltage regulators (78xx, 79xx) 2. variable voltage regulators (LM317) In fixed voltage regulators there is another classification 1. +ve voltage regulators 2. -ve voltage regulators POSITIVE VOLTAGE REGULATORS This include 78xx voltage regulators. The most commonly used ones are 7805 and 7812. 7805 gives fixed 5V DC voltage if input voltage is in (7.5V, 20V).

4.3 Arduino Uno
4.3.1 ­­­Overview
The Arduino Uno is a microcontroller board based on the ATmega328 (datasheet). It has 14 digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz ceramic resonator, a USB connection, a power jack, an ICSP header, and a reset button. It contains everything needed to support the microcontroller; simply connect it to a computer with a USB cable or power it with a AC-to-DC adapter or battery to get started.
The Uno differs from all preceding boards in that it does not use the FTDI USB-to-serial driver chip. Instead, it features the Atmega16U2 (Atmega8U2 up to version R2) programmed as a USB-to-serial converter.
Revision 2 of the Uno board has a resistor pulling the 8U2 HWB line to ground, making it easier to put into DFU mode.
Revision 3 of the board has the following new features:
pinout: added SDA and SCL pins that are near to the AREF pin and two other new pins placed near to the RESET pin, the IOREF that allow the shields to adapt to the voltage provided from the board. In future, shields will be compatible with both the board that uses the AVR, which operates with 5V and with the Arduino Due that operates with 3.3V. The second one is a not connected pin, that is reserved for future purposes.
Stronger RESET circuit.
Atmega 16U2 replace the 8U2.
"Uno" means one in Italian and is named to mark the upcoming release of Arduino 1.0. The Uno and version 1.0 will be the reference versions of Arduino, moving forward. The Uno is the latest in a series of USB Arduino boards, and the reference model for the Arduino platform; for a comparison with previous versions, see the index of Arduino boards.

4.3.2 Summary
Microcontroller
ATmega328
Operating Voltage
5V
Input Voltage (recommended)
7-12V
Input Voltage (limits)
6-20V
Digital I/O Pins
14 (of which 6 provide PWM output)
Analog Input Pins
6
DC Current per I/O Pin
40 mA
DC Current for 3.3V Pin
50 mA
Flash Memory
32 KB (ATmega328) of which 0.5 KB used by bootloader
SRAM
2 KB (ATmega328)
EEPROM
1 KB (ATmega328)
Clock Speed
16 MHz
4.3.3 Power
The Arduino Uno can be powered via the USB connection or with an external power supply. The power source is selected automatically.
External (non-USB) power can come either from an AC-to-DC adapter (wall-wart) or battery. The adapter can be connected by plugging a 2.1mm center-positive plug into the board's power jack. Leads from a battery can be inserted in the ground and Vin pin headers of the POWER connector.

4.3.4 Memory
The ATmega328 has 32 KB (with 0.5 KB used for the boot loader). It also has 2 KB of SRAM and 1 KB of EEPROM (which can be read and written with the EEPROM library).
4.3.5 Input and Output
Each of the 14 digital pins on the Uno can be used as an input or output, using pinMode()digital Write(), anddigitalRead() functions. They operate at 5 volts. Each pin can provide or receive a maximum of 40 mA and has an internal pull-up resistor (disconnected by default) of 20-50 kOhms. In addition, some pins have specialized functions:
Serial: 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data. These pins are connected to the corresponding pins of the ATmega8U2 USB-to-TTL Serial chip.
External Interrupts: 2 and 3. These pins can be configured to trigger an interrupt on a low value, a rising or falling edge, or a change in value. See the attachInterrupt() function for details.
PWM: 3, 5, 6, 9, 10, and 11. Provide 8-bit PWM output with the analogWrite() function.
SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI communication using the SPI library.
LED: 13. There is a built-in LED connected to digital pin 13. When the pin is HIGH value, the LED is on, when the pin is LOW, it's off.
The Uno has 6 analog inputs, labeled A0 through A5, each of which provide 10 bits of resolution (i.e. 1024 different values). By default they measure from ground to 5 volts, though is it possible to change the upper end of their range using the AREF pin and the analogReference() function. Additionally, some pins have specialized functionality:
TWI: A4 or SDA pin and A5 or SCL pin. Support TWI communication using the Wire library.
There are a couple of other pins on the board:
AREF. Reference voltage for the analog inputs. Used with analog Reference().
Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset button to shields which block the one on the board.
See also the mapping between Arduino pins and ATmega328 ports. The mapping for the Atmega8, 168, and 328 is identical.
4.4 What is RFID?

A basic RFID system consists of three components:
a) An antenna or coil
b) A transceiver (with decoder)
c) A transponder (RF tag)
Electronically programmed with unique information. There are many different types of RFID systems out in the market. They are categorized according to there frequency ranges. Some of the most commonly used RFID kits are as follows:
1) Low-frequency (30 KHz to 500 KHz)
2) Mid-Frequency (900KHz to 1500MHz)
3) High Frequency (2.4GHz to 2.5GHz)

4.4.1 RFID Tag (Transducer)
 RFID tag is comprised of a microchip containing identifying information and an antenna that transmits this data wirelessly to a reader. At its most basic, the chip will contain a serialized identifier, or license plate number, that uniquely identifies that item, similar to the way many bar codes are used today. A key difference, however is that RFID tags have a higher data capacity than their bar code counterparts. This increases the options for the type of information that can be encoded on the tag, including the manufacturer, batch or lot number, weight, ownership, destination and history (such as the temperature range to which an item has been exposed). In fact, an unlimited list of other types of information can be stored on RFID tags, depending on application needs. An RFID tag can be placed on individual items, cases or pallets for identification purposes, as well as on fixed assets such as trailers, containers, totes, etc. Tags come in a variety of types, with a variety of capabilities. Key variables include: "Read-only" versus "read-write" There are three options in terms of how data can be encoded on tags: (1) Read-only tags contain data such as a serialized tracking number, which is pre-written onto them by the tag manufacturer or distributor. These are generally the least expensive tags because they cannot have any additional information included as they move throughout the supply chain. Any updates to that information would have to be maintained in the application software that tracks SKU movement and activity. (2) "Write once" tags enable a user to write data to the tag one time in production or distribution processes. Again, this may include a serial number, but perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new data to be written to the tag as needed—and even written over the original data. Examples for the latter capability might include the time and date of ownership transfer or updating the repair history of a fixed asset. While these are the most costly of the three tag types and are not practical for tracking inexpensive items, future standards for electronic product codes (EPC) appear to be headed in this direction. RFID TAGS
     Fig 4.4.1 RFID Tag
4.4.2 RF Reader(Transceiver)
The RF transceiver is the source of the RF energy used to activate and power the passive RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it may be a separate piece of equipment. When provided as a separate piece of equipment, the transceiver is commonly referred to as an RF module. The RF transceiver controls and modulates the radio frequencies that the antenna transmits and receives. The transceiver filters and amplifies the backscatter signal from a passive RFID tag.
                 Figure.4.4.2 RFID Reader
4.4.3 RFID frequency bands  [6]
Band
Regulations
Range
Data speed
Remarks
Approximate tag cost
in volume (2006) US $
120–150 kHz (LF)
Unregulated
10 cm
Low
Animal identification, factory data collection
$1
13.56 MHz (HF)
ISM band worldwide
10 cm - 1 m
Low to moderate
Smart cards (MIFAREISO/IEC 14443)
$0.50
433 MHz (UHF)
Short Range Devices
1–100 m
Moderate
Defense applications, with active tags
$5
865-868 MHz (Europe)
902-928 MHz (North America) UHF
ISM band
1–12 m
Moderate to high
EAN, various standards
$0.15 (passive tags)
2450-5800 MHz (microwave)
ISM band
1–2 m
High
802.11 WLAN, Bluetooth standards
$25 (active tags)
3.1–10 GHz (microwave)
Ultra wide band
to 200 m
High
requires semi-active or active tags
$5 projected

4.4.4 RFID Antenna
The antenna emits radio signals to activate the tag and read and write data to it. Antennas are the conduits between the tag and the transceiver, which controls the system's data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built into a door frame to receive tag data from persons or things passing through the door, or mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually. If constant interrogation is not required, a sensor device can activate the field. Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a. interrogator), which can be configured either as a handheld or a fixed-mount device. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing
Figure 4.4.4 RFID Antenna
4.4.5 Working Principle of RFID
The most basic radio frequency identification solution is made up of three main hardware components. These components are the RFID tag, the RFID reader, and the antenna. This is, of course, an over simplification of what it takes to apply today’s RFID technology to a real world problem, but these are the fundamental building blocks. Understanding the fundamentals of RFID is the key that allows practitioners to be successful in their application of the technology. Even though this article does not discuss the software required to interpret and make use of the RFID data, its role in a complete RFID solution is vital.[7]
The components of the basic RFID tag are an integrated circuit (IC), an antenna, and the substrate that holds it all together. The IC is responsible for controlling the tag; much like a CPU controls a desktop computer. The IC controls what is broadcast from the tag, processes commands received from the reader via the antenna, and manages any peripherals such as temperature and pressure sensors. The antenna plays multiple roles in most RFID tags. It is responsible for receiving and transmitting data from and to the reader, and, in the case of passive type RFID tags, they collect the energy required to power the tag. Passive tags power themselves off of the energy they collect from high gain antennas that are connected to the RFID reader; therefore, they must be in close proximity to the RFID reader’s antenna in order to collect enough energy to function.
RFID tags with onboard batteries are known as active tags. Unlike passive tags, they transmit their data even when they are not in close proximity to an RFID reader. In most cases, active tags can be read at a longer distance than passive tags. There is a hybrid tag known as the semi-active tag. It has an onboard battery just like the active tag, but it will only transmit when it is in close proximity to the reader.
RFID tags may transmit many different pieces of data, but the most fundamental piece of data is the tag’s unique identifier. The unique identifier is, in most cases, associated with a real world asset that is to be tracked. The unique identifier is used as the key that identifies information about an asset in a database in most applications. Tags may also transmit state information or telemetry such as temperature or humidity if they have the sensors to collect this type of information. Most passive tags do not have peripheral functionality due to the power limitations of not having an onboard battery.
The RFID reader is sometimes referred to as the interrogator. The reader receives all of the data that the tags are transmitting. The data is then passed on to software that makes use of the data. The tags that are in close enough proximity to a reader are referred to as the reader’s “tag population.” As a reader’s tag population grows, the density of tags around the reader also grows, and the reader may require more time to read all of the tags in its vicinity. This is due to the fact that if all the tags transmit at the same time, the reader will not be able to separate their data into discreet transmissions, so it is important that the tags do not transmit all at once.[8]
Passive tag readers select subsets of the population to query over time until beacons from all of the tags in the population have been received. Most active tag readers do not control the sampling of the tag population like passive readers do. Active tags beacon at a pseudorandom interval to avoid transmission collision with other tags. Anti-collision algorithms such as the ALOHA algorithm determine when the tag will beacon. The ALOHA algorithm assigns transmission time slots to each tag. The name ALOHA is not an acronym, but was given its name because it was developed at the University of Hawaii. The ALOHA algorithm is a common anti-collision algorithm that is used by many RF applications, not only RFID. Over time, the randomization of the tag transmissions will ensure that the transmissions from all the tags are eventually received. There exists a threshold where the tag density is so great that it cannot be guaranteed that all the tags will be sampled in a timely manner. The tag density maximum is different for each RFID tag and reader manufacturer. Some manufacturers even allow the anti-collision algorithm to be changed based on the needs of the solution.
The importance of the antenna that is connected to the reader cannot be underestimated. In a passive RFID solution, the antenna must be sensitive enough to receive the RFID tag transmissions and it must also be powerful enough to power the tags. Passive tag reader antennas may be deployed in many different configurations depending on the application.


4.5 Buzzer 
A buzzer or beeper is  an audio signaling       device, which may be mechanical, electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm devices, timers and confirmation of user input such as a mouse click or keystroke.
Fig 4.5.1: Buzzer

4.6 Arduino Wi-Fi Shield
The Arduino Wi-Fi Shield connects your Arduino to the internet wirelessly. Connect it to your wireless network by following a few simple instructions to start controlling your world through the internet. As always with Arduino, every element of the platform – hardware, software and documentation – is freely available and open-source. This means you can learn exactly how it's made and use its design as the starting point for your own circuits.[4]
Ø  Requires and Arduino board (not included)
Ø  Operating voltage 5V (supplied from the Arduino Board)
Ø  Connection via: 802.11b/g networks
Ø  Encryption types: WEP and WPA2 Personal
Ø  Connection with Arduino on SPI port
on- board micro SD slot
Ø  ICSP headers
Ø  FTDI connection for serial debugging of Wi-Fi shield
4.6.1 Description

The Arduino Wi-Fi Shield allows an Arduino board to connect to the internet using the 802.11 wireless specifications (Wi-Fi). It is based on the HDG104 Wireless LAN 802.11b/g System in-Package. An Atmega 32UC3 provides a network (IP) stack capable of both.[4]
  


Figure 4.6.1Arduino Wi-Fi Shield front and back part

TCP and UDP. Use the Wi-Fi library to write sketches which connect to the internet using the shield. The Wi-Fi shield connects to an Arduino board using long wire-wrap headers which extend through the shield. This keeps the pin layout intact and allows another shield to be stacked on top. The Wi-Fi Shield can connect to wireless networks which operate according to the 802.11b and 802.11g specifications. There is an onboard micro-SD card slot, which can be used to store files for serving over the network. It is compatible with the Arduino Uno and Mega. The onboard micro SD card reader is accessible through the SD Library. When working with this library, SS is on Pin 4. Arduino communicates with both the Wifi shield's processor and SD card using the SPI bus (through the ICSP header). This is on digital pins 11, 12, and 13 on the Uno and pins 50, 51, and 52 on the Mega. On both boards, pin 10 is used to select the HDG104 and pin 4 for the SD card. These pins cannot be used for general I/O. On the Mega, the hardware SS pin, 53, is not used to select either the HDG104 or the SD card, but it must be kept as an output or the SPI interface won't work. Digital pin 7 is used as a handshake pin between the Wi-Fi shield and the Arduino, and should not be used. Note that because the HDG104 and SD card share the SPI bus, only one can be active at a time. If you are using both peripherals in your program, this should be taken care of by the corresponding libraries. If you're not using one of the peripherals in your program, however, you'll need to explicitly deselect it. To do this with the SD card, set pin 4 as an output and write a high to it. For the HDG104, set digital pin 10 as a high output. The shield can connect to encrypted networks that use either WPA2 Personal or WEP encryption. It can also connect to open networks. A network must broadcast its SSID for the shield to be able to connect. The reset button on the shield resets both the HDG104 and the Arduino board.


4.7 LCD (Liquid Crystal Display)

LCD (Liquid Crystal Display) screen is an electronic display module and find a wide range of applications. A 16x2 LCD display is very basic module and is very commonly used in various devices and circuits. These modules are preferred over seven segments and other multi segment LEDs. The reasons being: LCDs are economical; easily programmable; have no limitation of displaying special & even custom characters (unlike in seven segment so on).

16x2 LCD means it can display 16 characters per line and there are 2 such lines. In this LCD each character is displayed in 5x7 pixel matrix. This LCD has two registers, namely, Command and Data. The command register stores the command instructions given to the LCD. A command is an instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting the cursor position, controlling display etc. The data register stores the data to be displayed on the LCD. The data is the ASCII value of the character to be displayed on the LCD. Click to learn more about internal structure of a LCD.

4.7.1 Pin Diagram
Description: 16 x 2 LCD PinOut | 16x2 Character LCD Module Pin diagram
                                Figure 4.7.1 LCD









4.7.2 Pin Description: 

 Pin No
 Function
 Name
1
Ground (0V)
Ground
2
Supply voltage; 5V (4.7V – 5.3V)
 Vcc
3
Contrast adjustment; through a variable resistor

 VEE
4
Selects command register when low; and data register when high
Register Select
5
Low to write to the register; High to read from the register
Read/write
6
Sends data to data pins when a high to low pulse is given
Enable
7
8-bit data pins
DB0
8
DB1
9
DB2
10
DB3
11
DB4
12
DB5
13
DB6
14
DB7
15
Backlight VCC (5V)
Led+
16
Backlight Ground (0V)
Led-





4.8 Proteus
Proteus PCB design combines the ISIS schematic capture and ARES PCB layout programs to provide a powerful, integrated and easy to use suite of tools for professional PCB Design. All Proteus PCB design products include an integrated shape based auto router and a basic SPICE simulation capability as standard. More advanced routing modes are included in Proteus PCB Design Level 2 and higher whilst simulation capabilities can be enhanced by purchasing the Advanced Simulation option and/or micro-controller simulation capabilities.
4.8.1 System components

  • ISIS Schematic Capture - a tool for entering designs.          
  • PROSPICE Mixed mode SPICE simulation - industry standard SPICE3F5 simulator combined with a digital simulator.
  • ARES PCB Layout - PCB design system with automatic component placer, rip-up and retry auto-router and interactive design rule checking.
  • VSM - Virtual System Modelling lets co-simulate embedded software for popular microcontrollers alongside hardware design.
  • System Benefits Integrated package with common user interface and fully context sensitive help.
 4.9 Database
A database is a separate application that stores a collection of data. Each database has one or more distinct APIs for creating, accessing, managing, searching and replicating the data it holds.  Other kinds of data stores can be used, such as files on the file system or large hash tables in memory but data fetching and writing would not be so fast and easy with those types of systems. So nowadays, we use relational database management systems (RDBMS) to store and manage huge volume of data. This is called relational database because all the data is stored into different tables and relations are established using primary keys or other keys known as foreign keys.[9]
Relational Database Management System (RDBMS) is a software that:
·         Enables you to implement a database with tables, columns and indexes.
·         Guarantees the Referential Integrity between rows of various tables.
·         Updates the indexes automatically.
·         Interprets an SQL query and combines information from various tables.
4.9.1 RDBMS Terminology
Before we proceed to explain MySQL database system, let's revise few definitions related to database.
Ø  Database: A database is a collection of tables, with related data.
Ø  Table: A table is a matrix with data. A table in a database looks like a simple spreadsheet.
Ø  Column: One column (data element) contains data of one and the same kind, for example the column postcode.
Ø  Row: A row (= tuple, entry or record) is a group of related data, for example the data of one subscription.
Ø  Redundancy: Storing data twice, redundantly to make the system faster.
Ø  Primary Key: A primary key is unique. A key value can not occur twice in one table. With a key, you can find at most one row.
Ø  Foreign Key: A foreign key is the linking pin between two tables.
Ø  Compound Key: A compound key (composite key) is a key that consists of multiple columns, because one column is not sufficiently unique.
Ø  Index: An index in a database resembles an index at the back of a book.
Ø  Referential Integrity: Referential Integrity makes sure that a foreign key value always points to an existing row.

4.9.2 MySQL Database
MySQL is a fast, easy-to-use RDBMS being used for many small and big businesses. MySQL is developed, marketed, and supported by MySQL AB, which is a Swedish company. MySQL is becoming so popular because of many good reasons:
MySQL is released under an open-source license. So you have nothing to pay to use it.MySQL is a very powerful program in its own right. It handles a large subset of the functionality of the most expensive and powerful database packages.MySQL uses a standard form of the well-known SQL data language.MySQL works on many operating systems and with many languages including PHP, PERL, C, C++, JAVA, etc.MySQL works very quickly and works well even with large data sets.MySQL is very friendly to PHP, the most appreciated language for web development.MySQL supports large databases, up to 50 million rows or more in a table. The default file size limit for a table is 4GB, but you can increase this (if your operating system can handle it) to a theoretical limit of 8 million terabytes (TB).MySQL is customizable. The open-source GPL license allows programmers to modify the MySQL software to fit their own specific environments.MySQL works very well in combination of various programming languages like PERL, C, C++, JAVA and PHP. Out of these languages, PHP is the most popular one because of its web application development capabilities.This focuses heavily on using MySQL in a PHP environment. If you are interested in MySQL with PERL, then you can look into PERL and MySQL Tutorial.[12]
PHP provides various functions to access MySQL database and to manipulate data records inside MySQL database. You would require to call PHP functions in the same way you call any other PHP function.
The PHP functions for use with MySQL have the following general format:
mysql_function(value,value,...);
The second part of the function name is specific to the function, usually a word that describes what the function does. The following are two of the functions, which we will use in our tutorial:
mysqli_connect($connect);
mysqli_query($connect,"SQL statement");
Following example shows a generic syntax of PHP to call any MySQL function.
PHP with MySQL

   $retval = mysql_function(value, [value,...]);
   if( !$retval )
   {
       die ( "Error: a related error message" );
   }
   // Otherwise MySQL  or PHP Statements
?>



4.9.3 MySQL Functions[12]
mysql_affected_rows — Get number of affected rows in previous MySQL operation
mysql_client_encoding — Returns the name of the character set
mysql_close — Close MySQL connection
mysql_connect — Open a connection to a MySQL Server
mysql_create_db — Create a MySQL database
mysql_data_seek — Move internal result pointer
mysql_db_name — Retrieves database name from the call to mysql_list_dbs
mysql_db_query — Selects a database and executes a query on it
mysql_drop_db — Drop (delete) a MySQL database
mysql_errno — Returns the numerical value of the error message from previous MySQL operation
mysql_error — Returns the text of the error message from previous MySQL operation
mysql_escape_string — Escapes a string for use in a mysql_query
mysql_fetch_array — Fetch a result row as an associative array, a numeric array, or both
mysql_fetch_assoc — Fetch a result row as an associative array
mysql_fetch_field — Get column information from a result and return as an object
mysql_fetch_lengths — Get the length of each output in a result
mysql_fetch_object — Fetch a result row as an object
mysql_fetch_row — Get a result row as an enumerated array
mysql_field_flags — Get the flags associated with the specified field in a result
mysql_field_len — Returns the length of the specified field
mysql_field_name — Get the name of the specified field in a result
mysql_field_seek — Set result pointer to a specified field offset
mysql_field_table — Get name of the table the specified field is in
mysql_field_type — Get the type of the specified field in a result
mysql_free_result — Free result memory
mysql_get_client_info — Get MySQL client info
mysql_get_host_info — Get MySQL host info
mysql_get_proto_info — Get MySQL protocol info
mysql_get_server_info — Get MySQL server info
mysql_info — Get information about the most recent query
mysql_insert_id — Get the ID generated in the last query
mysql_list_dbs — List databases available on a MySQL server
mysql_list_fields — List MySQL table fields
mysql_list_processes — List MySQL processe
mysql_list_tables — List tables in a MySQL database
mysql_num_fields — Get number of fields in result
mysql_num_rows — Get number of rows in result
mysql_pconnect — Open a persistent connection to a MySQL server
mysql_ping — Ping a server connection or reconnect if there is no connection
mysql_query — Send a MySQL query
mysql_real_escape_string — Escapes special characters in a string for use in an SQL statement
mysql_result — Get result data
mysql_select_db — Select a MySQL database
mysql_set_charset — Sets the client character set
mysql_stat — Get current system status
mysql_tablename — Get table name of field
mysql_thread_id — Return the current thread I

4.10 Wamp Server
The acronym WAMP refers to a set of free (open source)applications, combined with Microsoft Windows, which are commonly used in Web server environments. The WAMP stack provides developers with the four key elements of a Web server:  an operating system, database, Web server and Web scripting software. The combined usage of these programs is called a server stack. In this stack, Microsoft Windows is the operating system (OS), Apache is the Web server, MySQL handles the database components, while PHP, Python, or PERL represents the dynamic scripting languages.










                     







CHAPTER-5
EPILOUGE









5.1 Work Accomplished
·         Relevant study is accomplished
·         System Block Diagram verified by Supervisor
·         Work plan distributed
·         Reading the RFID from the tag
·         Database acquiring the different fields for vehicle information.
·         Testing of Wi-Fi Shield












5.1.1 Snap shots









Figure.5.1.1 W-Fi Shield Testing







Figure 5.1.2 Reading RFID from tag
5.2 Work Remaining
·         Set up the link between arduino and Database
·         Circuit design
·         Hardware Assemble
·         PCB Design
·         Integration
·         Integrated Software Development













5.3 Problem Encountered
·         Ambiguous while reading two or more RFID simultaneously
·         Functioning/disfunctioning of same component
·         Reading the tag ID
·         Linking the RFID system with Database















5.4 Conclusion
As the RFID technology evolves, more sophisticated applications will use the capability of RFID to receive, store and forward data to a remote sink source. RFID has many applications as can be imagined. In this paper, we have utilized the versatility of RFID in tracking vehicle which has a tracking device, RFID, attached to it. However if this system will develop can bring revolution in tracking vehicle assisting traffic control. On this based we can also track wild animals in forest, several product in ware house and more. This helps to find out the number of vehicle who have been at certain location at the time  of crime. This makes inspection easier.





















CHAPTER 6
BIBLIOGRAPHY
















6.1 References

[1] “8051 and embedded system”, Mazidi and Mazidi, 2008
[2] http:// www.datasheetcatalog.com
[4] http://arduino.cc/arduino-wifi-shield
[7] RFID Applied, John Wiley, 2007
[9] Database system concepts , A.Silberschatz, H.Korth, S.Sudarshan/4th Edition,2002
[10] PHP6 and MySQL 6 Bible, S.suecring, Tim Converse, J.Park, 2012
[13] http://nccur.lib.nccu.edu.tw/bitstream





Comments

Popular posts from this blog

Brief History of Magars in Nepal(with 1st Boxer of Nepal Dal Bdr Rana from Arkhale,Gulmi)

Qualities of Confident Person