0% found this document useful (0 votes)
83 views63 pages

A Prototype of Finger Print Based Licenseauthentication For Vehicles

my engineering college project . I'm extremely sorry I don't have any other projects or paper done by me as soft copy.

Uploaded by

dakshana murthy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0% found this document useful (0 votes)
83 views63 pages

A Prototype of Finger Print Based Licenseauthentication For Vehicles

my engineering college project . I'm extremely sorry I don't have any other projects or paper done by me as soft copy.

Uploaded by

dakshana murthy
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 63

A PROTOTYPE OF FINGER PRINT BASED

LICENSEAUTHENTICATION FOR VEHICLES

PROJECT REPORT

Submitted by

M.DHATCHANAMURTHY

In partial fulfillment for the award of the degree

of

BACHELOR OF ENGINEERING

in

ELECTRONICS AND COMMUNICATION ENGINEERING

IFET COLLEGE OF ENGINEERING

VILLUPURAM

ANNA UNIVERSITY : CHENNAI 600 025

APRIL 2016

ANNA UNIVERSITY: CHENNAI 600 025


BONAFIDE CERTIFICATE

Certified that this project report “A FINGER PRINT BASED LICENSE


AUTHENTICATION FOR VEHICLES” is the bonafide work of
M.DHATCHANAMURTHY who carried out this project work under my
supervision.

SIGNATURE SIGNATURE
MRS.MALAR, M.E MR.ARULPUGAZHENDI,
HEAD OF THE DEPARTMENT SUPERVISOR
ASSOCIATE PROFESSOR AND HEAD ASSOCIATE PROFESSOR
Department of ECE, Department of ECE
IFET College of Engineering IFET College of Engineering
Villupuram-605108 Villupuram-6051081

Submitted to Anna university examination held on___________________

INTERNAL EXAMINER EXTERNAL EXAMINER

ACKNOWLEDGEMENT
We take this opportunity with privilege to express our sense of gratitude to
those who have helped us in brought out the project successfully.

We take this opportunity to record our sincere thanks to Mr.K.V.RAJA


Chairman, IFET College of engineering for providing the infrastructural facilities
required to complete our project work.

We would like to express our deep sense of gratitude to our beloved


Principal Dr.G.MAHENDRAN for his constant encouragement throughout my
course of study and providing us all facilities.

We are extremely thankful to our respected Head of the department


Mrs.R.MALAR for her incitement and created enthusiasm to make our project as
successful one.

We thank our internal guide Mr.ARULPUGEZENDHI and also faculty


advisor Mr.L.BALAJI for their guidance and encouragement right from the
commencement of this project.

We are thankful to all the staff members in our department for the co-
operation, they have rendered to us, sustained interest shown at every stage of our
endeavor in making the project a success. We are very much grateful to our lovely
parents and friends who have given us all the requirements for the fulfillment of
the project.

TABLE OF CONTENTS
CHAPTER NO. TITLE PAGE NO.
ABSTRACT iii
LIST OF FIGURES iv
LIST OF ABBREVIATION V
1 INTRODUCTION 1
1.1 EMBEDDED SYSTEMS 5
1.2 LITERATURE SURVEY
1.3 EXISTING SYSTEM 7
1.4 PROPOSED SYSTEM 12

2 HARDWARE REQUIREMENTS 12
2.1 MICROCONTROLLER 14
2.1.1 INTRODUCTION 14
2.1.2 FEATURES 16
2.1.3 ARCHITECTURE 16
2.1.4 PIN DIAGRAM 17
2.2 RFID 18
2.2.1 RFID TYPES 18
2.2.2 PRIVACY TYPES 21
2.2.3 AUTOMATE DISTRIBUTION 22
2.3 24
2.3.1 24
2.4 POWER SUPPLY 25
2.4.1 SPECIFICATION OF IC LM7805 26
2.4.2 POWER SUPPLY DESCRIPTION 27
2.4.3 BLOCK DIAGRAM 28
2.4.4 IC VOLTAGE REGULATOR 28
2.5 LCD 30
2.5.1 LCD PIN DIAGRAM 30
3 SERIAL COMMUNICATION 31
3.1 UART 38
3.1.1 FEATURES OF UART 40
3.2 42
3.3SOFTWARE ANALYSIS 44
3.3.1 KEIL C COMPILER 45
4 EXPERIMENTAL OUTPUTS 46
5 CONCLUSION
REFERENCE

ABSTRACT
To prevent non-licensees from driving and therefore causing accidents, a
new system is proposed. An important and very reliable human identification
method is fingerprint identification. Fingerprint identification is one of the most
popular and reliable personal biometric identification methods. The proposed
system consists of a smart card capable of storing the fingerprint of particular
person. While issuing the license, the specific person’s fingerprint is to be stored in
the card. Vehicles such as cars, bikes etc should have a card reader capable of
reading the particular license. The same automobile should have the facility of
fingerprint reader device. A person, who wishes to drive the vehicle, should insert
the card (license) in the vehicle and then swipe his/her finger. If the finger print
stored in the card and fingerprint swiped in the device matches, he/she can proceed
for ignition, otherwise ignition will not work. Moreover, the seat belt detector
verifies and then prompts the user to wear the seat belt before driving. This
increases the security of vehicles and also ensures safe driving by preventing
accidents.
LIST OF FIGURES

FIGURE NO. NAME OF THE FIGURE PAGE NO.

2.1 8951 ARCHITECTURE

2.1.1 8951 PIN DIAGRAM

2.3 RELAY CIRCUIT DIAGRAM

2.3.1 PIN DIAGRAM OF 7805

2.4 POWER SUPPLY BLOCK DIAGRAM

2.4.1 POWER SUPPLY CIRCUIT DIAGRAM

2.5 LCD DIAGRAM

2.5.1 LCD PIN DIAGRAM

3.1 UART TRANSMITTER

3.1.2 UART RECIEVER

3.1.3 WORKING SCREEN

LIST OF ABBREVIATION
ABBREVIATION EXPANSION

IAP In Application Programming

ISP In System Programming

PCA Programmable Counter Array

PWM Pulse Width Modulation

ALE Address Latch Enable

IDE Integrated Development Environment

RST Rest Input

PSEN Program Store Enable

EA External Access

SFR Special Function Register

WORM Write Once Read Memory

EPC Electronic Product Code


GTIN Global Trade Item Number

ADC Automatic Data Capture

EMC Electromagnetic Compatibility code

RFID Radio Frequency Identification

LCD Liquid Crystal Display

UART Universal Asynchronous Reciever Transmitter

CHAPTER 1
INTRODUCTION

The license issued by the Government is a smart card which stores different
fields such as name, license no., date of expiry, fingerprints of 10 fingers, type of
license and blocked status of the license as well as fingerprint templates.

Unlicensed driving is a matter of concern for several reasons. It is possible


that drivers who have not undergone appropriate training and testing may be
deficient in some aspect of the knowledge and skills required to drive safely and
efficiently. Also, drivers who are unauthorized may have less incentive to comply
with road traffic laws in that they would not be influenced by the rewards and
penalties set up under the licensing system

Fingerprint identification system consisting of image acquisition, edge


detection, thinning, feature extractor and classifier.The biometric fingerprint sensor
takes a digital picture of a fingerprint. The fingerprint scan detects the ridges and
valleys of a fingerprint and converts them into ones and zeroes. Step for Finger
print recognition.

 Histogram Equalization
 Fourier Transform
 Binarization
 Direction
 Region of Interest (ROI)
 Thinning
 Matching

1.1 EMBEDDED SYSTEM


Embedded Technology is now in its prime and wealth of knowledge
available is mind blowing. An embedded system can be defined as a control
system designed to perform a specific task. Common examples of embedded
system includeautomatic washing machine, navigation system on aircraft and
intruder alarm systems. An embedded system can also be defined as single purpose
computer.

Embedded systems are used for real time applications with high reliability,
accuracy and precision, embedded systems are operated with real time operating
systems like WinCE, RT Linux, VX Works, PSOS, etc.

Embedded systems are very popular these days most of the electrical,
electronics, mechanical, chemical, industrial, medical, space and army more areas
have the systems in their applications.

Most embedded systems are time critical applications meaning that the
embedded system is working in an environment where timing is very important.
The results of an operation are only relevant if they take place in a specific time
frame alarm systems.

This project work is under the domain of embedded system. The coding has
been done through embedded c programming. It is easy to deal, compact and
highly reliable.

1.2 LITERATURE SURVEY


1.2.1 RFID Based Exam Hall Maintenance System

AUTHOR:M. H. Assaf; R. Mootoo; S. R. Das; E. M. Petriu; V. Groza; S. Biswas


“Instrumentation and Measurement Technology Conference” (I2MTC), IEEE
International., 2013

ABSTRACT
Seating Arrangement of students during examinations isdistributed. Students
face difficulties as they have to scrounge for their examination hall numbers and
seating arrangement while they are wits end. An innovation which could aid the
students in finding their exam halls and seats would be welcoming and very
rewarding. This paper “RFID BASED EXAM HALL MAINTENANCE
SYSTEM”, presents a modernized method of examination hall management. It is
possible for a student to identify the particular exam hall from any other hall, when
they swipe RFID card in a card reader located there. This helps them to identify the
floor or get directions to their respective halls without delays. The card reader is
provided at the entrance of the building, if the students enters wrongly a buzzer
alarm sets off, otherwise the room number is displayed on the LCD, connected to
controller.

Fig. 1.1 RFID based exam hall maintainance system

1.2.2RFID BASEDATTENDANCE SYSTEM


AUTHOR: A. Almarwani; L. Alqarni; H. Hakami; Z. Chaczko; Min XuSmart and
Sustainable City 2013 (ICSSC 2013), IET International Conference on the year
2013.

ABSTRACT
Radio-frequency identification (RFID) is a technology that uses radio waves
to transfer data froman electronic tag, called RFID tag or label, attached to an
object, through a reader for the purpose of identifying and tracking the object.
RFID technology which is a matured technology that has been widely deployed by
various organizations as part of their automation systems. In this study, an RFID
based system has been built in order to produce a time-attendance management
system. This system consists of two main parts which include: the hardware and
the software. The hardware consists of the motor unit and the RFID reader. The
RFID reader, which is a low-frequency reader (125 kHz), is connected to the host
computer via a serial to USB converter cable. The Time-Attendance System GUI
was developed using visual basic.Net. The Time-Attendance Management System
provides the functionalities of the overall system such asdisplaying live ID tags
transactions, registering ID, deleting ID, recording attendance and other minor
functions. This interface was installed in the host computer.
1.2.3 A PERSON AUTHENTICATION SYSTEM BASED ON
RFID TAGS AND A CASCADE OF FACE RECOGNITION
ALGORITHMS

AUTHOR: Ping Li; Jian-Ping Li “Wavelet Active Media Technology and


Information Processing” (ICWAMTIP), International Conference on 2012

ABSTRACT

Face recognition represents an appealing solution for biometrics-based


unobtrusive and flexible person authentication. However, most solutions proposed
in the literature suffer from some significant drawbacks, such as, high
computational complexity, the need for a centralized biometrics database (which is
not desirable, due to widespread international provisions discouraging collections
of sensitive personal data) and limited scalability on a large number of enrolled
subjects. We propose a novel person authentication solution based on a cascade of
face recognition and pattern matching algorithms, that not only provides for high
reliability and robustness against impostors, but also stores in a personal RFID tag
all the needed individual biometrics information of the user, who therefore always
remains in control, and has the exclusive availability, of such sensitive data. The
paper describes the proposed approach, called RFaceID, and discusses its
performance in terms of the ratio between false acceptance rate and false rejection
rate and in terms of authentication time, when applied to the VidTIMIT, Extended
Yale B and MOBIO widely adopted face databases.
1.3 EXISTING SYSTEM
Unlicensed driving causes number of accidents in our day to day life. In
earlier days, license checking needs manual as it involves separate policeman to
check the license details. But it was time consuming and it also leads to inaccurate
checking and can leads to bribing.

Later, verification of license is done by comparing the license details with


the database by using barcode scanner. License can be made using RFID tag and
the verification is done using RFID reader it doesn’t provide any security feature
and faking of the RFID tag is also possible.

Radio-frequency identification (RFID) uses electromagnetic fields to


automatically identify and track tags attached to objects. The tags contain
electronically stored information. Passive tags collect energy from a nearby RFID
reader's interrogating radio waves. Active tags have a local power source such as a
battery and may operate at hundreds of meters from the RFID reader. Unlike a
barcode, the tag need not be within the line of sight of the reader, so it may be
embedded in the tracked object. RFID is one method for Automatic Identification
and Data Capture (AIDC).

RFID tags are used in many industries, for example, an RFID tag attached to
an automobile during production can be used to track its progress through the
assembly line; RFID-tagged pharmaceuticals can be tracked through warehouses;
and implanting RFID microchips in livestock and pets allows positive
identification of animals.
Since RFID tags can be attached to cash, clothing, and possessions, or
implanted in animals and people, the possibility of reading personally-linked
information without consent has raised serious privacy concerns.

The RFID Proximity Reader Module has a built-in antenna inminimized


form factor. It is designed to work with standard carrier frequency of 125 kHz.
This LF reader module with an internal or an external antenna facilitates
communication with Read-Only transponders—type UNIQUE or TK5530 via the
air interface. The tag data is sent to the host systems via the wired communication
interface with a protocol selected from the module Both RS232 and Wiegend
Protocol. The LF module is best suited for applications in Access Control, Time
and Attendance, Asset Management, Handheld Readers, Immobilizers, and other
RFID enabled applications.
Features:
 Selectable UART or Wigand26
 Plug-and-Play, needs +12V to become a reader
 No repeat reads
 LED indicates tag reading operation
 Excellent read performance without an external circuit
 Compact size and cost-effective.
The RFID reader continuously transmits a 125 kHz carrier signal using its
antenna. The passive RFID tag, embedded in an id card for example, powers on
from the carrier signal. Once powered on, the tag transmits, back to the reader, an
FSKencoded signal containing the data stored on the card. The FSK signal is a 125
kHz carrier, with 12.5 kHz as the mark frequency, and a 15.625 kHz as the space
frequency. The encoded signal is picked up by the reader's antenna, filtered, and
processes on the embedded microcontroller to extract the tag'sunique identity.
At this point the identity can be matched against the records stored on the
reader. The clock generator serves a single purpose. It generates a low level 125
kHz square wave for use by the transmitting circuit within the antenna module.
The antenna module takes a 125 kHz square wave input, buffers it, using three
shunted inverting gates, and converts it into a 125 kHz sinusoidal wave using the
RLC circuit immediately following the buffers. The resulting wave is amplified,
using a push pull amplifier, forming the carrier signal, and fed into an antenna that
transmits the carrier continuously toward any RFID tag position above it.

Fig. 1.3 Block diagram of exam hall maintainance


CHAPTER 2

2.1 BLOCK DIAGRAM

POWER
SUPPLY

RFID LCD
READER
MICRO

CONTROLLER

8952C MOTOR
RERELAY DRIVE

FINGER DC
PRINT MAX 232MA
MOTORDD
MODULE

Fig 2.1 Proposed Block Diagram


2.2 PROPOSED SYSTEM

A fingerprint based licensed system using RFID tag is implemented in this


project. A RFID tag was issued to the people instead of the old license card and the
database was created with the license details and can be verified using RFID
reader.

In addition to this, a fingerprint sensor is deployed on the car, thumb


impression of the license holder has to be collected and stored in the same storage.

The system is designed in such a way that the vehicle (4 wheeler) can only
be started when the license holder shows their RFID card to their RFID reader and
it verifies the license information and then they should place their thumb
impression in the fingerprint sensor which matches the impression details with the
license details and allows the user to start the car engine. So that only license
holder can drive the vehicle and unlicensed driving can be completely eradicated.
CHAPTER 3
3.1 MICROCONTROLLER
3.1.1 INTRODUCTION

 The 89C51RB2/RC2/RD2 device contains a non-volatile 16kB/32kB/64kB


Flash
 Program memory that is both parallel programmable and serial In-System
and In-Application Programmable. In-System Programming (ISP) allows the
user to download new code while the microcontroller sits in the application.
In-Application Programming (IAP) means that the microcontroller fetches
new program code and reprograms itself while in the system. This allows for
remote programming over a modem link. A default serial loader (boot
loader) program in ROM allows serial In-System programming of the Flash
memory via the UART without the need for a loader in the Flash code. For
In-Application Programming, the user program erases and reprograms the
Flash memory by use of standard routines contained in ROM. This device
executes one machine cycle in 6 clock cycles, hence providing twice the
speed of a conventional 80C51. An OTPconfiguration bit lets the user select
conventional 12 clock timing if desired. This device is a Single-Chip 8-Bit
Microcontroller manufactured in advanced CMOS process and is a
derivative of the 80C51 microcontroller family. The instruction set is 100%
compatible with the 80C51 instruction set. The device also has four 8-bit I/O
ports, three 16-bit timer/event counters, a multi-source, four-priority-level,
nested interrupt structure, an enhanced UART and on-chip oscillator and
timing circuits. The added features of the P89C51RB2/RC2/RD2 make it a
powerful microcontroller for applications that require pulse width
modulation, high-speed I/O and up/down counting capabilities such as motor
control.
3.1.2 FEATURES
 Can be programmed by the end-user application (IAP)
 6 clocks per machine cycle operation (standard)
 12 clocks per machine cycle operation (optional)
 Speed up to 20 MHz with 6 clock cycles per machine cycle(40 MHz
equivalent performance); up to 33 MHz with 12 clocks per machine cycle
 Fully static operation
 RAM expandable externally to 64 kB
 4 level priority interrupt
 Four 8-bit I/O ports
 Full-duplex enhanced UART
 Power control modes
 Programmable clock out
 Second DPTR register
 Asynchronous port reset
 Low EMI (inhibit ALE)
 Programmable Counter Array (PCA)
 PWM
3.1.3ARCHITECTURE

Fig 3.1 8951 ARCHITECTURE


3.1.4 ATMEL AT89S51

Fig 3.1.1 8951 Pin diagram


Pin Description

VCC Supply voltage.


GND Ground.

Port 0

Port 0 is an 8-bit open drain bi-directional I/O port. As an output port,


each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the
pins can be used as high-impedance inputs. Port 0 can also be configured to
be the multiplexed low-order address/data bus during accesses to external
program and data memory. In this mode, P0 has internal pull-ups. Port 0 also
receives the code bytes during Flash programming and outputs the code bytes
during program verification.

External pull-ups are required during program verification.

Port 1

Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1
output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins,
they are pulled high by the internal pull-ups and can be used as inputs. As inputs,
Port 1 pins that are externally being pulled low will source current (IIL) because of
the internal pull-ups. Port 1 also receives the low-order address bytes during Flash
programming and verification.

Port 2

Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output
buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they
are pulled high by the internal pull-ups and can be used as inputs. Asinputs, Port 2
pins thatare externally being pulled low will source current (IIL) because of the
internal pull-ups. Port 2 emits the high-order address byte during fetches from
external program memory and during accesses to external data memory that uses
16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong internal
pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit
addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function
Register. Port 2 also receives the high-order address bits and some control signals
during Flash programming and verification.

Port 3

Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3
output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins,
they are pulled high by the internal pull-ups and can be used as inputs. As inputs,
Port 3 pins that are externally being pulled low will source current (IIL) because of
the pull-ups. Port 3 receives some control signals for Flash programming and
verification.

RST
Reset input. A high on this pin for two machine cycles while the oscillator is
running resets the device. This pin drives High for 98 oscillator periods after the
Watchdog times out. The DIS-RTO bit in SFR AUXR (address 8EH) can be used
to disable this feature. In the default state of bit DISRTO, the RESET HIGH out
feature is enabled.
ALE/PROG
Address Latch Enable (ALE) is an output pulse for latching the low byte of
the address during accesses to external memory. This pin is also the program pulse
input (PROG) during Flash programming. In normal operation, ALE is emitted at a
constant rate of 1/6 the oscillator frequency and may be used for external timing or
clocking purposes. Note, however, that one ALE pulse is skipped during each
access to external data memory. If desired, ALE operation can be disabled by
setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a
MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the
ALE-disable bit has no effect if the microcontroller is in external execution mode.

PSEN
Program Store Enable (PSEN) is the read strobe to external program
memory. When the AT89S51 is executing code from external program memory,
PSEN is activated twice each machine cycle, except that two PSEN activations are
skipped during each access to external data memory.

EA/VPP
External Access Enable EA must be strapped to GND in order to enable the device
to fetch code from external program memory locations starting at 0000H up to
FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally
latched on reset. EA should be strapped to VCC for internal program executions.
This pin also receives the 12-volt programming enable voltage (VPP) during Flash
programming.
XTAL1

Input to the inverting oscillator amplifier and input to internal clock operating
circuit.

XTAL2

Output from the inverting oscillator amplifier.

Special Function Registers

A map of the on-chip memory area called the Special Function Register (SFR)
space is shown in Table 5-1. Note that not all of the addresses are occupied, and
unoccupied addresses may not be implemented on the chip. Read accesses to these
addresses will in general return random data, and write accesses will have an
indeterminate effect.

Programming Algorithm:
Before programming the AT89C51, the address, data and control signals
should be set up according to the Flash programming mode table and Figures 3 and
4. To program the AT89C51, take the following steps.
1. Input the desired memory location on the address lines.
2. Input the appropriate data byte on the data lines.
3. Activate the correct combination of control signals.
4. Raise EA/VPP to 12 V for the high-voltage programming mode.
5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The
byte-write cycle is self-timed and typically takes no more than 1.5 Ms. Repeat
steps 1 through 5, changing the address and data for the entire array or until the end
of the object file is reached.
Data Polling:
The AT89C51 features Data Polling to indicate the end of a write cycle.
During a write cycle, an at-tempted read of the last byte written will result in the
complement of the written datum on PO.7. Once the write cycle has been
completed, true data are valid on all outputs, and the next cycle may begin. Data
Polling may begin any time after a write cycle has been initiated.
Ready/Busy:
The progress of byte programming can also be monitored by the RDY/BSY
output signal. P3.4 is pulled low after ALE goes high during programming to
indicate BUSY. P3.4 is pulled high again when programming is done to indicate
READY.
Program Verify:
If lock bits LB1 and LB2 have not been programmed, the programmed code
data can be read back via the address and data lines for verification. The lock bits
cannot be verified directly. Verification of the lock bits is achieved by observing
that their features are enabled.
Chip Erase:
The entire Flash array is erased electrically by using the proper combination
of control signals and by Holding ALE/PROG low for 10 Ms. The code array is
written with all “1"s. The chip erase operation must be executed before the code
memory can be re-programmed.
Program Memory
If the EA pin is connected to GND, all program fetches are directed to
external memory. On the 89s51, if EA is connected to VCC, program fetches to
addresses 0000H through 1FFFFH are directed o internal memory and fetches to
addresses 2000H through FFFFH are to external memory.
DATA MEMORY
The AT89S51 implements 256 bytes of on-chip RAM. The upper 128 bytes
occupy a parallel address space to the special function registers. This means that
the upper 128 bytes have the same addresses as the SFR space but are physically
separate from SFR space. When an instruction accesses an internal location above
addresses 7FH, the address mode used in the instruction specifies whether the CPU
accesses the upper 128 bytes of RAM or the SFR space. Instructions which use
direct addressing access the SFR space. For example, the following direct
addressing instruction accesses the SFR at location 0A0H. MOV 0A0H, #data
instructions that use direct addressing instruction, were R0 contains 0A0H, access
the data byte addresses 0A0H.

3.2RFIDRR
RFID White Paper Introduction Radio Frequency Identification (RFID)
technology has been attracting considerable attention with its promise of improved
supply chain visibility for both suppliers and retailers. It will also improve the
consumer shopping experience by making it more likely that the products they
want to purchase are available. While the potential benefits of adopting the
technology have been known for some time, a lack of standards, system costs, and
required infrastructure changes have resulted in a slow adoption of the technology.
Recent announcements from some key retailers have brought the interest in RFID
to the forefront. This guide is an attempt to familiarize the reader with RFID
technology so that they can be asking the right questions when considering the
technology. RFID (Radio Frequency Identification) is a method of identifying
unique items using radio waves. Typical RFID systems are made up of three
components: readers (interrogators), antennas and tags (transponders) that carry the
data on a microchip. RFID technology is used today in many applications,
including security and access control, transportation and supply chain tracking. It is
a technology that works well for collecting multiple pieces of data on items for
tracking and counting purposes in a cooperative environment. Is All RFID Created
Equal? There are many different versions of RFID that operate at different radio
frequencies. The choice of frequency is dependent on the requirements of the
application. Four primary frequency bands have been allocated for RFID use.

• Low Frequency (125/134 KHz) – most commonly used for access control and
asset tracking.

• Mid-Frequency (13.56 MHz) – Used where medium data rate and read ranges are
required.

• Ultra High-Frequency (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) – offer
the longest read ranges and high reading speeds.

Applications for RFID within the supply chain can be found at multiple
frequencies and different RFID solutions may be requiredto meet the varying needs
of the marketplace. Many of today’s RFID technologies cannot reliably cover areas
wider than 4 to 5 feet, making them unsuitable for wide openings that are the norm
in manufacturing, distribution and store receiving dock environments.

Since UHF can cover portals up to 9 feet wide it is gaining industry support
as the choice bandwidth for inventory tracking applications including pallets and
cases. Technology providers are developing readers that work with multiple system
protocols and frequencies so that users will be able to choose the RFID products
that work best for their market and product
3.2.1RFID TYPES

RFID tags are further broken down into two categories:

• Active RFID Tags are battery powered. They broadcast a signal to the reader and
can transmit over the greatest distances (100+ feet). Typically they can cost $20.00
or more and are used to track high value goods like vehicles and large containers of
goods. Shipboard containers are a good example of an active RFID tag application.

• Passive RFID Tags do not contain a battery. Instead, they draw their power from
the reader. The reader transmits a low power radio signal through its antenna to the
tag, which in turn receives it through its own antenna to power the integrated
circuit (chip). The tag will briefly converse with the reader for verification and the
exchange of data.

As a result, passive tags can transmit information over shorter distances


(typically 10 feet or less) than active tags. They have a smaller memory capacity
and are considerably lower in cost ($1.00 or less) making them ideal for tracking
lower cost items. There are two basic types of chips available on RFID tags, Read-
Only and Read-Write. Read only chips are programmed with unique information
stored on them during the manufacturing process. The information on read-only
chips can never be changed. With Read-Write chips, the user can add information
to the tag or write over existing information when the tag is within range of the
reader. Read-Write chips are more expensive that Read Only chips. Another
method used is something called a "WORM" chip (Write Once Read Many). It can
be written once and then becomes "Read Only" afterwards. This is a desirable
format since companies will be able to write an EPC (electronic product code) to
the tag when the product is produced and packaged. RFID promises to provide
huge advantages to manufacturers by offering the tools to better plan production
and respond more quickly to market demand. It will facilitate automation of
inventory counts and speed shipping and receiving at the distribution level. For
retailers, it will help to reduce stock-outs, enable product tracking and potentially
reduce theft and streamline the POS function. RFID will also open other
merchandising opportunities and help with the overall consumer buying
experience. Due to the current cost of the technology (both tags and infrastructure),
it is expected that the initial phase of adoption will be aimed at carton and pallet
marking applications. As the cost of tags and readers comes down, a wider
adoption at the item marking level will develop.

In order for RFID to grow quickly, it is important that standards be


developed so that the technology providers are working toward a common goal of
providing low cost and compatible technologies. Not only will it drive down costs,
but standards will also help users to reap the greatest benefit from their investment
by providing value throughout the whole supply chain. Organizations Focused on
Developing RFID Standards the Auto-ID Center at MIT and its sponsors have
proposed a new Electronic Product Code as the next standard for identifying
products. Their goal is not to replace existing bar code standards but to expand the
information available down to uniquely identifying each marked item, and to
enable more automatic reading. This new standard was developed with the support
of the Uniform Code Council and EAN International, the two main bodies that
oversee the international bar code standards. EPC utilizes the basic structure of the
Global Trade Item Number (GTIN). The Auto-ID Center has proposed open
standards for tags and readers with the intention of bringing the costs down to a
level where RFID tags could be applied to individual items. The work may lead to
the creation of a new global Internet network that would allow companies to track
items and enable end users to access the full benefits of RFID. The Auto-ID Center
has developed a specification for RFID tags to be used in the retail sector. The
specification does not mandate what type of tag to be used but is intended to
provide guidelines on data structure and how the tags should perform so that they
can be used over a common platform. It is tailored around the experiences gained
from the implementation of UPC and its success in the marketplace for more than
25 years. The specification requires that the chip contain an Electronic Product
Code (EPC). The chip must be able to communicate according to an open standard
and meet some minimum requirements so that it can be read by reading devices
anywhere.

The Electronic Product Code (EPC) The EPC is a number made up of a


header and 3 sets of data as shown in the figure below. The header identifies the
EPC version number – which will allow for different lengths or types of EPC later
on. The second part of the number identifies the EPC manager – typically this
would be the manufacturer of the item the EPC is attached to. The third part is
called object class and refers to the exact type of product– most often the stock-
keeping unit (SKU). The fourth series of numbers is the serial number that is
unique to the item. (The second and third sets of data are similar in function to the
numbers in UPC barcodes.)

ELECTRONIC PRODUCT CODE TYPE 1 01

• 0000A89

• 00016F

• 000169DCO

Header EPC Manager Object Class Above is an example of a 96-bit EPC. It


will allow sufficient capacity for 268 million companies. Each manufacturer will
have the ability to create up to 16 million object classes with 68 billion serial
numbers in each class. This should provide sufficient capacity to cover all products
manufactured in the world for many years to come. As an interim step, the Auto-
ID center is also proposing a 64-bit tag in order to minimize cost in the near term.
Although EPC is a voluntary standard, several key retailers, are endorsing EPC as
the way they want to approach implementation of RFID. Most providers of RFID
chip technologies are in turn developing EPCcompliant solutions to meet those
market requirements. It seems likely EPC will become universal after the UCC and
EAN organizations take over control, which is scheduled before the end of 2003.
Potential issues that need consideration when choosing the type of rfid and method
for application to your products or packaging. Enthusiasm within the RFID
industry has resulted in much hype about the technology over the past several
years. As a result, it is important to embrace the technology with a bit of caution.
The following are some of the issues that require close scrutiny when investigating
RFID: • Tag Cost – This should not to be confused with chip cost. Although the
goal is to bring the cost of the tag (chip and antenna) down to 5 cents, this goal is
in the distant future since it both assumes manufacturing breakthroughs and is
predicated on consumption in the hundreds of millions of tags per year. Today, the
cost is closer to "less than 50 cents" for a read/write solution in high (millions)
volume. Ultimate tag cost will also be very much dependent on the type of chip
required (read only versus read/write), size of the antenna needed and how it is
packaged to meet a specific application.

Tag Size

Tag size is dependent on the read range desired. Although the chips are very
tiny, they will not operate without being mounted to an antenna. The size of the
antenna will determine the read distance performance of the tag so understanding
the size of the antenna needed for the application is more important than the size of
the chip alone.

Infrastructure Cost

More focus appears to be placed on the tag cost since it is a recurring


expenditure. Reader cost and infrastructure costs for implementing RFID must also
be looked at very closely as well. Both the software systems requirements and
physical environment, in which RFID is intended to be used, are critical to the
ultimate performance of a system and may require changes to accommodate using
it effectively. As an example, RFID chips cannot be read through metal objects.
Other forms of electromagnetic interference may also impede performance of the
technology and require changes to the physical environment where RFID will be
used. The number and types of readers will also be a major expenditure depending
on your application.

Read Distances

Read distances for RFID are very much dependent on the frequency chosen for
the application. Tag orientation also affects the read range as the range diminishes
as the tag is rotated from being perpendicular to the path to the reader. Reading
reliability is quite good when labels are alone in a reader field like cases on a
conveyor line, but less certain when the labels are randomly oriented as with
labeled cases on a skid. The antenna size (both on the tag and the readers) will also
be a determining factor. Hand held readers are not capable of using as much power
as stationary readers and as a result provide shorter read distances.

Government Regulation
Governments around the world regulate the use of the frequency spectrum.
Different countries have already assigned certain parts of the spectrum for other
uses and as a result, there is virtually no part of the spectrum that is available
everywhere in the world for use by RFID. This means that a RFID tag may not
work in all countries. As an example if you choose the Ultra High Frequency
(UHF) frequency that operates at 915MHz in the U.S. and you ship your product to
Europe, they may not be able to be read it since Europe operates in the UHF
spectrum at 869Mhz. This is an important consideration when operating in a global
environment.

Anti-Collision

This is an important feature of RFID chips/readers since it will allow multiple tags
to be read while grouped in one reader field. It is not available on all RFID tags but
is an important feature if you are planning to use RFID for inventory counts,
shipping and receiving where multiple tags need to be read at the same time.

3.2.2 Privacy Issues

Consumer groups have expressed concern over the potential (real or imagined)
privacy invasion that might result with widespread RFID item marking. These
groups are pushing for legislation that will require manufacturers to advise
consumers that the products contain RFID devices and must provide a means so
that the devices can be disabled at point of purchase. You should be aware of these
issues and consider them when implementing an RFID program. Paxar Corporation
is committed to aggressively participate in the developing market for RFID
products. Our goal is to become a major worldwide source for RFID supplies and
the printers which program them for all popular RFID systems, targeting
particularly the supplies used for apparel and retail applications. With worldwide
manufacturing, including service bureaus, Paxar is uniquely positioned to offer
innovative, market-driven RFID solutions to major retailers and apparel
manufactures. For more information, contact Paxar at 914-697-6800. You can also
visit us on our website at www.paxar.com. RFID Glossary of Commonly Used
Terms

An Active Tag

An RFID tag that uses a battery to power its microchip and communicate
with a reader. Active tags can transmit over the greatest distances (100+ feet).
Typically they can cost $20.00 or more and are used to track high value goods like
vehicles and large containers of merchandise.

Agile Reader

A reader that can read different types of RFID tags either made by different
manufacturers or operating on different frequencies. Antenna – A device for
sending or receiving electromagnetic waves. Anti-Collision – A feature of RFID
systems that enables a batch of tags to be read in one reader field by preventing the
radio waves from interfering with one another. It also prevents individual tags from
being read more than once.

Automatic Data Capture (ADC)

Methods of collecting data and entering it directly into a computer system


without human intervention. Automatic Identification Refers to any technologies
for capturing and processing data into a computer system without using a
keyboard. Includes bar coding, RFID and voice recognition.
Auto-ID Center

A group of potential RFID end users, technology companies and academia.


The Auto-ID center began at the Massachusetts Institute of Technology (MIT) and
is now a global entity. It is focused on driving the commercialization of ultralow
cost RFID solutions that use Internet like infrastructure for tracking goods
throughout the global supply chain. B Bit – The smallest unit of digital information
- A binary code – a single ‘0’ or ‘1’, where many different codes can be developed
to represent pertinent information. A 96-bit EPC is a string of 96 zeros and ones.
Byte – 1 byte = 8 bits. One byte of memory is needed to generate an alpha
character or digit. So bytes can be thought of in terms of characters. C Chip Based
RFID –Refers to RFID tags that contain a silicon computer chip and therefore can
store information and transmit it to a reader. Collision – Radio Signals interfering
with one another. Signals from tags and readers can collide.

D Die

A tiny square of silicon with an integrated circuit etched on it – more


commonly known as a silicon chip. E Electronic Article Surveillance Tags (EAS) –
Single bit (either ‘on’ or ‘off’) electronic tags used to detect items for anti-theft
purposes. EAS technology is similar to RFID in that it uses similar frequency
bands. Electromagnetic Compatibility (EMC) – The ability of a technology or
product to coexist in an environment with other electro-magnetic devices.
Electronic Product Code (EPC) – A standard format for a 96-bit code that was
developed by the Auto-ID Center. It is designed to enable identification of
products down to the unique item level. EPC’s have memory allocated for the
product manufacturer, product category and the individual item. The benefit of
EPC’s over traditional bar codes is their ability to be read without line of sight and
their ability to track down to the individual item versus at the SKU level. F
Frequency – Refers to a band of operation for radio-based technologies.
Frequencies allocated for RFID use exist in the low, high, ultra-high and
microwave frequency bands. Each frequency has its own advantages and
disadvantages such as read distance, tag size and resistance to electronic noise. G
GTAG (Global Tag) – A standardization initiative of the Uniform Code Council
(UCC) and the European Article Numbering Association (EAN) for supply chain
tracking applications using UHF RFID frequencies. Global Trade Item Number
(GTIN) – A superset of bar code standards that are used internationally. In addition
to manufacturer and product category, GTIN also includes shipping, weight and
other information. The EPC is designed to provide continuity with GTIN. H High-
Frequency RFID (13.56 MHz) – RFID that uses the high-end 13.56MHz radio
frequency band. Features medium sized tags with relatively good reading
distances. In the U.S. 13.56MHz tags can be typically read at approximately 3-4
inches with a handheld reader and 4 to 6 feet with a portal reader. I Integrated
Circuit (IC) – Another name for a chip or microchip Interrogator – An RFID reader
L Line-of-Sight – Technology that requires an item to be "seen" to be
automatically identified by a machine. Unlike bar codes and OCR technologies,
RFID tags can be read "through" merchandise and most packaging with no line of
sight required. Low-Cost RFID – Typically refers to RFID tags that cost less than
$1.00 with typically 3 feet of read range. Low Frequency RFID (125 & 134 KHz)
– Low frequency radio band allocated for RFID use. The main disadvantage of low
frequency RFID is its cost and relatively slow data transfer as well as its inability
to read many tags at the same time. M Multiple Tags Read/Write – Refers to the
ability of RFID systems to read multiple tags at the same time. Reading and
writing of multiple tags is achieved through the anticollision feature of RFID.
Microwave RFID Frequency (2,450MHz or 2.45GHz) –A microwave frequency
band allocated for RFID use. Used for Item level tracking including retail
merchandise. Typically microwave RFID technologies feature the smallest label
footprint and read distances up to 18 inches with a handheld reader and perhaps up
to 4 feet with a portal reader. This frequency also offers fast data transmission, but
is somewhat more bothered by shielding of liquid products and reflections from
metal structures, etc. P Passive RFID Tag – An RFID tag that does not use a
battery. Passive tags draw their power from the reader. The reader transmits a low
power radio signal through its antenna. The tag in turn receives it through its own
antenna to power the integrated circuit (chip). Using the energy it gets from the
signal, the tag will briefly converse with the reader for verification and the
exchange of data. As a result, passive tags can transmit information over shorter
distances (typically 10 feet or less) than active tags. They are considerably lower in
cost ($1.00 or less) making them ideal for tracking lower cost items. Perpetual
Inventory – The ability to know one’s inventory position at any given time. RFID
offers the promise of being able to perform automatic inventory counts. R Radio
Frequency Identification (RFID) – A method of identifying items uniquely using
radio waves. Radio waves do not require line of site and can pass through materials
like cardboard and plastic but not metals and some liquids. Read Range – The
distance from which a reader can communicate with a tag. Several factors
including frequency used orientation of the tag, power of the reader and design of
the antenna affect range. Reader – Also called an interrogator. The RFID reader
communicates via radio waves with the RFID tag and passes information in digital
form to the computer system. Readers can be configured with antennas in many
formats including handheld devices, portals or conveyor mounted. Read Only Tags
– Tags that contain data that cannot be changed. Read only chips are less expensive
than read-write chips. Read-Write Tags – RFID chips that can be read and written
multiple times.
3.2.3 AUTOMATE DISTRIBUTION:

 Reduce cost (man power ,shipping mistakes)

 Increase sales (keep shelves full)

 DoD total asset visibility initiative.

Radio frequency identification (RFID) is a generic term that is used to


describe a system that transmits the identity (in the form of a unique serial number)
of an object or person wirelessly, using radio waves. It’s grouped under the
category of automatic identification technologies.

RFID is in use all around us. If you have ever chipped your pet with an ID
tag, used EZ pass through a toll booth, or paid for a gas using speed pass, you’ve
used RFID. In addition, RFID is increasingly used with biometric technologies for
security.

Unlike ubiquitous UPC bar-code technology, RFID technology does not


require contact or line of sight for communication. RFID data can be read through
the human body, clothing and non-metallic materials.

A Basic RFID System Consists of three components:

 An antenna or coil
 A transceiver
 A transponder(RF tag) electronically programmed with unique information

The antenna emits radio signals to activate the tag and to tag and write data
to it. The reader emits radio waves in ranges of anywhere from one inch to it. The
reader emits radio waves in ranges of anywhere from one inch to 100 feet or more,
depending upon its power output and the radio frequency used. When an RFID tag
passes through the electromagnetic zone, it detects the reader’s activation signal.

3.3 RELAY

A relay is an electrically operated switch. Current flowing through the coil


of the relay creates a magnetic field which attracts a lever and changes the switch
contacts. The coil current can be on or off so relays have two switch position and
they are double throw switches.

Relay allow one circuit to switch a second circuit which can be completely
separate from the first. For example a low voltage battery circuit can use a relay to
switch a 230v AC mains circuit; the link is magnetic and mechanical

The coil of a relay passes a relatively large current, typically 30mA for a 12v
relay, but it can be as much as 100mA for relays designed to operate from lower
voltages. Most IC cannot provide this current and a transistor is usually used to
amplify the small IC current to the larger value required for the relay coil.

The maximum output current for the popular 555 timer IC is 200mA so
these devices can supply relay coils directly without amplification. Relays are
usually SPDT or DPDT but they can have more sets of switch contacts, for
example relays with 4 sets of changeover contacts are readily available. For further
information about switch contacts and the terms used to describe them please see
the page on switches.

Most relays are designed for PCB mounting but you can solder wires
directly to the pins providing you take care to avoid melting the plastic case of the
relay.
3.3.1 Circuit diagram

Fig 3.3 Relay circuit diagram

COM = Common, always connect to this; it is the moving part of the switch.
NC = Normally Closed, COM is connected to this when the relay coil is off.
NO = Normally Open, COM is connected to this when the relay coil is on

ADVANTAGES OF RELAY:

 Relays can switch AC and DC, transistor can only switch DC.
 Relays can switch high voltages, transistor cannot.
 Relays are a better choice for switching large current (>5A).
 Relays can switch many contacts at once.
3.4POWER SUPPLY

3.4.1 SPECIFICATION OF IC LM7805:-


 3-Terminal Regulators
 Output Current up to 1.5 A
 Internal Thermal-Overload Protection
 High Power-Dissipation Capability
 Internal Short-Circuit Current Limiting
 Output Transistor Safe-Area Compensation

Description information

This series of fixed-voltage integrated-circuit voltage regulators is designed


for a wide range of applications. These applications include on-card regulation for
elimination of noise and distribution problems associated with single-point
regulation. Each of these regulators can deliver up to 1.5 A of output current. The
internal current-limiting and thermal-shutdown features of these regulators
essentially make them immune to overload. In addition to use as fixed-voltage
regulators, these devices can be used with external components to obtain adjustable
output voltages and currents.

Absolute maximum ratings over virtual junction temperature range (unless


otherwise noted)

Input voltage, VI: A7824C 40 V

All others 35 V

Operating virtual junction temperature, TJ 150C

Lead temperature 1,6 mm (1/16 inch) from case for 10 seconds 260C
The LM7805 series of three terminal regulators are available with several
fixed output voltages. The voltages available allow regulators to be used in logic
systems, instrumentations, Hi-Fi and other solid state electronics equipment
without any external feedback components.

These ICs are designed as fixed voltage regulator and with adequate heat
sinking can deliver output currents in excess of 1A.The input capacitor Ci=0.33µF
is used, if regulator is located far from the power supply filter capacitor. It filters
out the effect of stray inductance of wire, ceramic or tantalum capacitor may be
used. To improve the transient response of regulator capacitor of 0.1µF is
connected at output. It utilizes common ground fir input and output and has
dropout voltage (VIN – VO) of 2 V.

Pin diagram

Fig 3.3.1 Pin diagram of 7805


SPECIFICATION OF MC7815 (+15V REGULATOR)

These voltage regulators are monolithic integrated circuits designed as


fixed–voltage regulators for a wide variety of applications including local, on–card
regulation. These regulators employ internal current limiting, thermal shutdown,
and safe–area compensation. With adequate heat sinking they can deliver output
currents in excess of 1.0 A. Although designed primarily as a fixed voltage
regulator, these devices can be used with external components to obtain adjustable
voltages and currents.

• Output Current in Excess of 1.0 A

• No External Components Required

• Internal Thermal Overload Protection

• Internal Short Circuit Current Limiting

• Output Transistor Safe–Area Compensation

• Output Voltage Offered in 2% and 4% Tolerance

• Available in Surface Mount D2PAK and Standard 3–Lead Transistor Packages

• Previous Commercial Temperature Range has been extended to a Junction

Temperature Range of –40°C to +125

SPECIFICATION OF 1N4007 DIODE

• Low forward voltage drop.

• High surge current capability.


3.4.2 Power supply description
The ac voltage, typically 220V rms, is connected to a transformer, which
steps that ac voltage down to the level of the desired dc output. A diode rectifier
then provides a full-wave rectified voltage that is initially filtered by a simple
capacitor filter to produce a dc voltage. This resulting dc voltage usually has some
ripple or ac voltage variation.
A regulator circuit removes the ripples and also remains the same dc value
even if the input dc voltage varies, or the load connected to the output dc voltage
changes. This voltage regulation is usually obtained using one of the popular
voltage regulator IC units.
3.4.3 Block diagram

Fig 3.4 Power supply block diagram

When four diodes are connected as shown in figure, the circuit is called as
bridge rectifier. The input to the circuit is applied to the diagonally opposite
corners of the network, and the output is taken from the remaining two corners. Let
us assume that the transformer is working properly and there is a positive potential,
at point A and a negative potential at point B. the positive potential at point A will
forward bias D3 and reverse bias D4. The negative potential at point B will
forward bias D1 and reverse D2. At this time D3 and D1 are forward biased and
will allow current flow to pass through them; D4 and D2 are reverse biased and
will block current flow. The path for current flow is from point B through D1, up
through RL, through D3, through the secondary of the transformer back to point B.
this path is indicated by the solid arrows. Waveforms (1) and (2) can be observed
across D1 and D3.One-half cycle later the polarity across the secondary of the
transformer reverse, forward biasing D2 and D4 and reverse biasing D1 and D3.
Current flow will now be from point A through D4, up through RL, through D2,
through the secondary of T1, and back to point A. This path is indicated by the
broken arrows. Waveforms (3) and (4) can be observed across D2 and D4. The
current flow through RL is always in the same direction. In flowing through RL
this current develops a voltage corresponding to that shown waveform (5). Since
current flows through the load (RL) during both half cycles of the applied voltage,
this bridge rectifier is a full-wave rectifier.

3.4.4 IC voltage regulators


Voltage regulators comprise a class of widely used ICs. Regulator IC units
contain the circuitry for reference source, comparator amplifier, control device, and
overload protection all in a single IC. IC units provide regulation of either a fixed
positive voltage, a fixed negative voltage, or an adjustable set voltage. The
regulators can be selected for operation with load currents from hundreds of milli
amperes to tens of amperes, corresponding to power ratings from milli watts to
tens of watts.
Fig 3.4.1 Power supply circuit diagram

A fixed three-terminal voltage regulator has an unregulated dc input voltage,


Vi, applied to one input terminal, a regulated dc output voltage, Vo, from a second
terminal, with the third terminal connected to ground. The series 78 regulators
provide fixed positive regulated voltages from 5 to 24 volts. Similarly, the series
79 regulators provide fixed negative regulated voltages from 5 to 24 volts
3.5 LCD DISPLAY

It is a flat-panel display or other electronic visual display that uses the light-
modulating properties of liquid crystals. Liquid crystals do not emit light directly.

LCDs are available to display arbitrary images (as in a general-purpose


computer display) or fixed images with low information content, which can be
displayed or hidden, such as preset words, digits, and 7-segment displays as in
a digital clock. They use the same basic technology, except that arbitrary images
are made up of a large number of small pixels, while other displays have larger
elements

LCDs are used in a wide range of applications including computer monitors,


televisions, instrument panels, aircraft cockpit displays, and signage. They are
common in consumer devices such as DVD players, gaming
devices, clocks, watches, calculators, and telephones, and have replaced cathode
ray tube (CRT) displays in nearly all applications. They are available in a wider
range of screen sizes than CRT and plasma displays, and since they do not use
consumption enables it to be used in battery-powered electronic equipment more
efficiently than CRTs. It is an electronically modulated optical device made up of
any number of segments controlling a layer of liquid crystals and arrayed in front
of a light source (backlight) or reflector to produce images in color
or monochrome. Liquid crystals were first discovered in phosphors, they do not
suffer image burn-in. LCDs are, however, susceptible to image persistence.

The LCD screen is more energy-efficient and can be disposed of more safely
than a CRT. Its low electrical power 1888. By 2008, annual sales of televisions
with LCD screens exceeded sales of CRT units worldwide, and the CRT became
obsolete for most purposes.
LCD DIAGRAM:

Fig 3.5 LCD diagram


Advantages

 Low power consumption. Depending on the set display brightness and


content being displayed, the older CCFT backlit models typically use
30–50% of the power a CRT monitor of the same size viewing area
would use, and the modern LED backlit models typically use 10–25%
of the power a CRT monitor would use.
 Very little heat emitted during operation, due to low power
consumption.
 No geometric distortion.
 The possible ability to have little or no flicker depending on backlight
technology.
 Usually no refresh-rate flicker, because the LCD pixels hold their
state between refreshes (which are usually done at 200 Hz or faster,
regardless of the input refresh rate).
 It is very thin compared to a CRT monitor, which allows the monitor to
be placed farther back from the user, reducing close-focusing related eye-
strain.
 Razor sharp image with no bleeding/smearing when operated at native
resolution.
 Emits much less undesirable electromagnetic radiation than a CRT
monitor (in the extremely low frequency range).
 Can be made in almost any size or shape.
 No theoretical resolution limit. When multiple LCD panels are used
together to create a single canvas, each additional panel increases the
total resolution of the display, which is commonly called “stacked”
resolution.
 Can be made to large sizes (more than 60 inches (150 cm)) lightly and
relatively inexpensively due to established mass production

Disadvantages

 Limited viewing angle in some (mostly older or cheap) monitors, causing


color, saturation, contrast and brightness to vary, even within the
intended viewing angle, by variations in posture.
 Uneven backlighting in some (mostly older) monitors, causing brightness
distortion, especially toward the edges.
 Black levels may appear unacceptably bright because individual liquid
crystals cannot completely block all light from passing through.
 Display motion blur on moving objects caused by slow response times

As of 2012, most implementations of LCD backlighting use PWM to dim


the display, which makes the screen flicker more acutely (this does not mean
visibly) than a CRT monitor at 85 Hz refresh rate would (this is because the entire
screen is storing on and off rather than a CRT's phosphor sustained dot which
continually scans across the display, leaving some part of the display always lit),
causing severe eye-strain for some people. Unfortunately, many of these people
don't know that their eye-strain is being caused by the invisible strobe effect of
PWM. This problem is worse on many of the new LED backlit monitors, because
the LEDs have a faster turn-on/turn-off time than a CCFL lamp.

Only one native resolution. Displaying any other resolution either requires
a video scalar, causing blurriness and jagged edges; or running the display at native
resolution using 1:1 pixel mapping, causing the image either not to fill the screen
(letterboxed display), or to run off the lower right edge of the screen.

Fixed bit depth, many cheaper LCDs are only able to display 262,000 colors.
8-bit S-IPS panels can display 16 million colors and have significantly better black
level, but are expensive and have slower response time.

Low refresh rate. All but a few high-end monitors support no higher than 60
or 75 Hz; while this does not cause visible flicker due to the LCD panel's high
internal refresh rate, the low input refresh rate still limits the maximum frame-rate
that can be displayed, negatively impacting gaming and 3D graphics.

Input lag, because the LCD's A/D converter waits for each frame to be
completely outputted before drawing it to the LCD panel. Many LCD monitors
do post-processingbefore displaying the image in an attempt to compensate for
poor color fidelity, which adds an additional lag. Further, a video scalar must be
used when displaying non-native resolutions, which adds yet more lag. Scaling and
post processing are usually done in a single chip on modern monitors, but each
function that chip performs adds some delay. Some displays have a gaming mode
which disables all or most processing to reduce perceivable input lag.

Subject to burn-in effect, although the cause differs from CRT and the effect
may not be permanent, a static image can cause burn-in in a matter of hours in
badly design displays.

In a constant-on situation, thermalization may occur in case of bad thermal


management, in which part of the screen has overheated and looks discolored
compared to the rest of the screen.

Loss of brightness and much slower response times in low temperature


environments. In sub-zero environments, LCD screens may cease to function
without the use of supplemental heating.

Poor display in direct sunlight (unless matte-based instead of glossy-based),


often completely unviable. Transflective LCDs provide a large improvement by
reflecting natural light, but are dimmer when relying on the backlight and so they
have only been adopted for specific uses such as outdoor vending machines,
gasoline pumps, car dashboards and alarm clocks.
LCD (Liquid Crystal Display) screen is an electronic display module and
find a wide range of applications. A 16x2 LCD display is very basic module and is
very commonly used in various devices and circuits. These modules are preferred
over seven segments and other multi segment LEDs.
3.5.1 PIN DIAGRAM:

Fig 3.5.1LCD PIN DIAGRAM

Pin Description:

Pin
Function Name
No
1 Ground (0V) Ground
2 Supply voltage; 5V (4.7V – 5.3V) Vcc
3 Contrast adjustment; through a variable resistor VEE
Selects command register when low; and data register Register
4
when high Select
5 Low to write to the register; High to read from the register Read/write
6 Sends data to data pins when a high to low pulse is given Enable
7 DB0
8 DB1
9 DB2
10 DB3
8-bit data pins
11 DB4
12 DB5
13 DB6
14 DB7
15 Backlight VCC (5V) Led+
16 Backlight Ground (0V) Led-
CHAPTER 4
4. METHODOLOGY
4.1 UART
The final piece to this serial puzzle is finding something to both create the
serial packets and control those physical hardware lines.
A universal asynchronous receiver/transmitter (UART) is a block of
circuitry responsible for implementing serial communication. Essentially, the
UART acts as an intermediary between parallel and serial interfaces. On one end
of the UART is a bus of eight-or-so data lines (plus some control pins), on the
other is the two serial wires RX and TX.

UARTs do exist as stand-alone ICs, but they’re more commonly found


inside microcontrollers. You’ll have to check your microcontroller’s datasheet to
see if it has any UARTs. Some have none, some have one, and some have many.

For example, the Arduino Uno based on the “old faithful” ATmega328 has
just a single UART, while the Arduino Mega built on an ATmega2560 has a
whopping four UARTs.

As the R and T in the acronym dictate, UARTs are responsible for both
sending and receiving serial data. On the transmit side, a UART must create the
data packet appending sync and parity bits - and send that packet out the TX line
with precise timing (according to the set baud rate). On the receive end, the ART
has to sample the RX line at rates according to the expected baud rate, pick out the
sync bits, and spit out the data.

More advanced UARTs may throw their received data into a buffer, where
it can stay until the microcontroller comes to get it. UARTs will usually release
their buffered data on a first-in-first-out (FIFO) basis. Buffers can be as small as a
few bits, or as large as thousands of bytes.

Software UARTs

If a microcontroller doesn’t have a UART (or doesn’t have enough), the


serial interface can be bit-banged - directly controlled by the processor. This is the
approach Arduino libraries like Software Serial take. Bit-banging is processor-
intensive, and not usually as precise as a UART, but it works in a pinch.

Fig 4.1 UART Transmitter

Fig 4.1.1 UART Reciever block diagram


4.2SOFTWARE ANALYASIS

Compilers are programs used to convert a High Level Language to object


code. Desktop compilers produce an output object code for the underlying
microprocessor, but not for other microprocessors. I.E the programs written in one
of the HLL like ‘C’ will compile the code to run on the system for a particular
processor like x86 (underlying microprocessor in the computer). For example
compilers for Dos platform is different from the Compilers for Unix platform.
So if one wants to define a compiler then compiler is a program that
translates source code into object code. The compiler derives its name from the
way it works, looking at the entire piece of source code and collecting and
reorganizing the instruction. See there is a bit little difference between compiler
and an interpreter. Interpreter just interprets whole program at a time while
compiler analyzes and execute each line of source code in succession, without
looking at the entire program.
The advantage of interpreters is that they can execute a program
immediately. Secondly programs produced by compilers run much faster than the
same programs executed by an interpreter. However compilers require some time
before an executable program emerges. Now ascompilers translate source code into
object code, which is unique for each type of computer, many compilers are
available for the same language

4.3.1 Keil C cross compiler: -


Keil is a German based Software development company. It provides several
development tools like
• IDE (Integrated Development environment)
• Project Manager
• Simulator
• Debugger
• C Cross Compiler , Cross Assembler, Locator/Linker
Keil Software provides you with software development tools for the 8051
family of microcontrollers. With these tools, you can generate embedded
applications for the multitude of 8051 derivatives.
The keil 8051 tool kit includes three main tools, assembler, compiler and
linker
Working with keil:
 To open keil software click on start menu then program and then select
keil2 (or any other version keil3 etc. here the discussion is on keil2
only). Following window will appear on your screen

Fig 4.1.3 Working screen


CHAPTER 5

EXPERIMENTAL OUTPUTS
CHAPTER 6
CONCLUSION

The proposed system makes sure that the vehicle should be driven only by
authorized person who holds the license. It reducesthe manual work needed for
checking the license and it makes availing of license as mandatory since they can’t
drive the car without license. By implementing this system, the rate of accident
caused by unlicensed driving can be reduced and the government rule of
mandatory license system can be realized.
REFERENCES

[1] “Web-based student attendancesystem using RFID technology” presented


byM. Kassim; H. Mazlan; N. Zaini; M. K. Salleh at Control and System Graduate
Research Colloquium (ICSGRC), 2015 IEEE.

[2] “RFID Based Exam Hall Maintenance System” presented by M. H. Assaf;


R. Mootoo; S. R. Das; E. M. Petriu; V. Groza; S. Biswas “Instrumentation and
Measurement Technology Conference” (I2MTC), IEEE International., 2013.

[3] “Hardware design of a reader device in RFID-based class-attendance


system” presented by byA. Almarwani; L. Alqarni; H. Hakami; Z. Chaczko; Min
XuSmart and Sustainable City 2013 (ICSSC 2013), IET International Conference
on the year 2013.

[4] “RFID based student monitoring and attendance tracking system”


presented byPing Li; Jian-Ping Li “Wavelet Active Media Technology and
Information Processing” (ICWAMTIP), International Conference on 2012.

[5] “Design and Implement of Attendance Management System Based on


Contactless Smart IC Card” presented byS.Geng
G. Li; W. LiuatComputer Science and Electronics Engineering (ICCSEE), 2012
International Conference on (Volume:3 )

[6] “Improved safety management system of coal mine based on iris


identification and RFID technique” presented by J. Xu
Dept. of Commun., Eletric Eng. Inst. of Hefei, Hefei, China
H. Gao ; J. Wu ; Y. Zhangat Computer and Communications (ICCC), 2015 IEEE
International Conference.

You might also like