A Prototype of Finger Print Based Licenseauthentication For Vehicles
A Prototype of Finger Print Based Licenseauthentication For Vehicles
PROJECT REPORT
Submitted by
M.DHATCHANAMURTHY
of
BACHELOR OF ENGINEERING
in
VILLUPURAM
APRIL 2016
SIGNATURE SIGNATURE
MRS.MALAR, M.E MR.ARULPUGAZHENDI,
HEAD OF THE DEPARTMENT SUPERVISOR
ASSOCIATE PROFESSOR AND HEAD ASSOCIATE PROFESSOR
Department of ECE, Department of ECE
IFET College of Engineering IFET College of Engineering
Villupuram-605108 Villupuram-6051081
ACKNOWLEDGEMENT
We take this opportunity with privilege to express our sense of gratitude to
those who have helped us in brought out the project successfully.
We are thankful to all the staff members in our department for the co-
operation, they have rendered to us, sustained interest shown at every stage of our
endeavor in making the project a success. We are very much grateful to our lovely
parents and friends who have given us all the requirements for the fulfillment of
the project.
TABLE OF CONTENTS
CHAPTER NO. TITLE PAGE NO.
ABSTRACT iii
LIST OF FIGURES iv
LIST OF ABBREVIATION V
1 INTRODUCTION 1
1.1 EMBEDDED SYSTEMS 5
1.2 LITERATURE SURVEY
1.3 EXISTING SYSTEM 7
1.4 PROPOSED SYSTEM 12
2 HARDWARE REQUIREMENTS 12
2.1 MICROCONTROLLER 14
2.1.1 INTRODUCTION 14
2.1.2 FEATURES 16
2.1.3 ARCHITECTURE 16
2.1.4 PIN DIAGRAM 17
2.2 RFID 18
2.2.1 RFID TYPES 18
2.2.2 PRIVACY TYPES 21
2.2.3 AUTOMATE DISTRIBUTION 22
2.3 24
2.3.1 24
2.4 POWER SUPPLY 25
2.4.1 SPECIFICATION OF IC LM7805 26
2.4.2 POWER SUPPLY DESCRIPTION 27
2.4.3 BLOCK DIAGRAM 28
2.4.4 IC VOLTAGE REGULATOR 28
2.5 LCD 30
2.5.1 LCD PIN DIAGRAM 30
3 SERIAL COMMUNICATION 31
3.1 UART 38
3.1.1 FEATURES OF UART 40
3.2 42
3.3SOFTWARE ANALYSIS 44
3.3.1 KEIL C COMPILER 45
4 EXPERIMENTAL OUTPUTS 46
5 CONCLUSION
REFERENCE
ABSTRACT
To prevent non-licensees from driving and therefore causing accidents, a
new system is proposed. An important and very reliable human identification
method is fingerprint identification. Fingerprint identification is one of the most
popular and reliable personal biometric identification methods. The proposed
system consists of a smart card capable of storing the fingerprint of particular
person. While issuing the license, the specific person’s fingerprint is to be stored in
the card. Vehicles such as cars, bikes etc should have a card reader capable of
reading the particular license. The same automobile should have the facility of
fingerprint reader device. A person, who wishes to drive the vehicle, should insert
the card (license) in the vehicle and then swipe his/her finger. If the finger print
stored in the card and fingerprint swiped in the device matches, he/she can proceed
for ignition, otherwise ignition will not work. Moreover, the seat belt detector
verifies and then prompts the user to wear the seat belt before driving. This
increases the security of vehicles and also ensures safe driving by preventing
accidents.
LIST OF FIGURES
LIST OF ABBREVIATION
ABBREVIATION EXPANSION
EA External Access
CHAPTER 1
INTRODUCTION
The license issued by the Government is a smart card which stores different
fields such as name, license no., date of expiry, fingerprints of 10 fingers, type of
license and blocked status of the license as well as fingerprint templates.
Histogram Equalization
Fourier Transform
Binarization
Direction
Region of Interest (ROI)
Thinning
Matching
Embedded systems are used for real time applications with high reliability,
accuracy and precision, embedded systems are operated with real time operating
systems like WinCE, RT Linux, VX Works, PSOS, etc.
Embedded systems are very popular these days most of the electrical,
electronics, mechanical, chemical, industrial, medical, space and army more areas
have the systems in their applications.
Most embedded systems are time critical applications meaning that the
embedded system is working in an environment where timing is very important.
The results of an operation are only relevant if they take place in a specific time
frame alarm systems.
This project work is under the domain of embedded system. The coding has
been done through embedded c programming. It is easy to deal, compact and
highly reliable.
ABSTRACT
Seating Arrangement of students during examinations isdistributed. Students
face difficulties as they have to scrounge for their examination hall numbers and
seating arrangement while they are wits end. An innovation which could aid the
students in finding their exam halls and seats would be welcoming and very
rewarding. This paper “RFID BASED EXAM HALL MAINTENANCE
SYSTEM”, presents a modernized method of examination hall management. It is
possible for a student to identify the particular exam hall from any other hall, when
they swipe RFID card in a card reader located there. This helps them to identify the
floor or get directions to their respective halls without delays. The card reader is
provided at the entrance of the building, if the students enters wrongly a buzzer
alarm sets off, otherwise the room number is displayed on the LCD, connected to
controller.
ABSTRACT
Radio-frequency identification (RFID) is a technology that uses radio waves
to transfer data froman electronic tag, called RFID tag or label, attached to an
object, through a reader for the purpose of identifying and tracking the object.
RFID technology which is a matured technology that has been widely deployed by
various organizations as part of their automation systems. In this study, an RFID
based system has been built in order to produce a time-attendance management
system. This system consists of two main parts which include: the hardware and
the software. The hardware consists of the motor unit and the RFID reader. The
RFID reader, which is a low-frequency reader (125 kHz), is connected to the host
computer via a serial to USB converter cable. The Time-Attendance System GUI
was developed using visual basic.Net. The Time-Attendance Management System
provides the functionalities of the overall system such asdisplaying live ID tags
transactions, registering ID, deleting ID, recording attendance and other minor
functions. This interface was installed in the host computer.
1.2.3 A PERSON AUTHENTICATION SYSTEM BASED ON
RFID TAGS AND A CASCADE OF FACE RECOGNITION
ALGORITHMS
ABSTRACT
RFID tags are used in many industries, for example, an RFID tag attached to
an automobile during production can be used to track its progress through the
assembly line; RFID-tagged pharmaceuticals can be tracked through warehouses;
and implanting RFID microchips in livestock and pets allows positive
identification of animals.
Since RFID tags can be attached to cash, clothing, and possessions, or
implanted in animals and people, the possibility of reading personally-linked
information without consent has raised serious privacy concerns.
POWER
SUPPLY
RFID LCD
READER
MICRO
CONTROLLER
8952C MOTOR
RERELAY DRIVE
FINGER DC
PRINT MAX 232MA
MOTORDD
MODULE
The system is designed in such a way that the vehicle (4 wheeler) can only
be started when the license holder shows their RFID card to their RFID reader and
it verifies the license information and then they should place their thumb
impression in the fingerprint sensor which matches the impression details with the
license details and allows the user to start the car engine. So that only license
holder can drive the vehicle and unlicensed driving can be completely eradicated.
CHAPTER 3
3.1 MICROCONTROLLER
3.1.1 INTRODUCTION
Port 0
Port 1
Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1
output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins,
they are pulled high by the internal pull-ups and can be used as inputs. As inputs,
Port 1 pins that are externally being pulled low will source current (IIL) because of
the internal pull-ups. Port 1 also receives the low-order address bytes during Flash
programming and verification.
Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output
buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they
are pulled high by the internal pull-ups and can be used as inputs. Asinputs, Port 2
pins thatare externally being pulled low will source current (IIL) because of the
internal pull-ups. Port 2 emits the high-order address byte during fetches from
external program memory and during accesses to external data memory that uses
16-bit addresses (MOVX @ DPTR). In this application, Port 2 uses strong internal
pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit
addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function
Register. Port 2 also receives the high-order address bits and some control signals
during Flash programming and verification.
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3
output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins,
they are pulled high by the internal pull-ups and can be used as inputs. As inputs,
Port 3 pins that are externally being pulled low will source current (IIL) because of
the pull-ups. Port 3 receives some control signals for Flash programming and
verification.
RST
Reset input. A high on this pin for two machine cycles while the oscillator is
running resets the device. This pin drives High for 98 oscillator periods after the
Watchdog times out. The DIS-RTO bit in SFR AUXR (address 8EH) can be used
to disable this feature. In the default state of bit DISRTO, the RESET HIGH out
feature is enabled.
ALE/PROG
Address Latch Enable (ALE) is an output pulse for latching the low byte of
the address during accesses to external memory. This pin is also the program pulse
input (PROG) during Flash programming. In normal operation, ALE is emitted at a
constant rate of 1/6 the oscillator frequency and may be used for external timing or
clocking purposes. Note, however, that one ALE pulse is skipped during each
access to external data memory. If desired, ALE operation can be disabled by
setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a
MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the
ALE-disable bit has no effect if the microcontroller is in external execution mode.
PSEN
Program Store Enable (PSEN) is the read strobe to external program
memory. When the AT89S51 is executing code from external program memory,
PSEN is activated twice each machine cycle, except that two PSEN activations are
skipped during each access to external data memory.
EA/VPP
External Access Enable EA must be strapped to GND in order to enable the device
to fetch code from external program memory locations starting at 0000H up to
FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally
latched on reset. EA should be strapped to VCC for internal program executions.
This pin also receives the 12-volt programming enable voltage (VPP) during Flash
programming.
XTAL1
Input to the inverting oscillator amplifier and input to internal clock operating
circuit.
XTAL2
A map of the on-chip memory area called the Special Function Register (SFR)
space is shown in Table 5-1. Note that not all of the addresses are occupied, and
unoccupied addresses may not be implemented on the chip. Read accesses to these
addresses will in general return random data, and write accesses will have an
indeterminate effect.
Programming Algorithm:
Before programming the AT89C51, the address, data and control signals
should be set up according to the Flash programming mode table and Figures 3 and
4. To program the AT89C51, take the following steps.
1. Input the desired memory location on the address lines.
2. Input the appropriate data byte on the data lines.
3. Activate the correct combination of control signals.
4. Raise EA/VPP to 12 V for the high-voltage programming mode.
5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The
byte-write cycle is self-timed and typically takes no more than 1.5 Ms. Repeat
steps 1 through 5, changing the address and data for the entire array or until the end
of the object file is reached.
Data Polling:
The AT89C51 features Data Polling to indicate the end of a write cycle.
During a write cycle, an at-tempted read of the last byte written will result in the
complement of the written datum on PO.7. Once the write cycle has been
completed, true data are valid on all outputs, and the next cycle may begin. Data
Polling may begin any time after a write cycle has been initiated.
Ready/Busy:
The progress of byte programming can also be monitored by the RDY/BSY
output signal. P3.4 is pulled low after ALE goes high during programming to
indicate BUSY. P3.4 is pulled high again when programming is done to indicate
READY.
Program Verify:
If lock bits LB1 and LB2 have not been programmed, the programmed code
data can be read back via the address and data lines for verification. The lock bits
cannot be verified directly. Verification of the lock bits is achieved by observing
that their features are enabled.
Chip Erase:
The entire Flash array is erased electrically by using the proper combination
of control signals and by Holding ALE/PROG low for 10 Ms. The code array is
written with all “1"s. The chip erase operation must be executed before the code
memory can be re-programmed.
Program Memory
If the EA pin is connected to GND, all program fetches are directed to
external memory. On the 89s51, if EA is connected to VCC, program fetches to
addresses 0000H through 1FFFFH are directed o internal memory and fetches to
addresses 2000H through FFFFH are to external memory.
DATA MEMORY
The AT89S51 implements 256 bytes of on-chip RAM. The upper 128 bytes
occupy a parallel address space to the special function registers. This means that
the upper 128 bytes have the same addresses as the SFR space but are physically
separate from SFR space. When an instruction accesses an internal location above
addresses 7FH, the address mode used in the instruction specifies whether the CPU
accesses the upper 128 bytes of RAM or the SFR space. Instructions which use
direct addressing access the SFR space. For example, the following direct
addressing instruction accesses the SFR at location 0A0H. MOV 0A0H, #data
instructions that use direct addressing instruction, were R0 contains 0A0H, access
the data byte addresses 0A0H.
3.2RFIDRR
RFID White Paper Introduction Radio Frequency Identification (RFID)
technology has been attracting considerable attention with its promise of improved
supply chain visibility for both suppliers and retailers. It will also improve the
consumer shopping experience by making it more likely that the products they
want to purchase are available. While the potential benefits of adopting the
technology have been known for some time, a lack of standards, system costs, and
required infrastructure changes have resulted in a slow adoption of the technology.
Recent announcements from some key retailers have brought the interest in RFID
to the forefront. This guide is an attempt to familiarize the reader with RFID
technology so that they can be asking the right questions when considering the
technology. RFID (Radio Frequency Identification) is a method of identifying
unique items using radio waves. Typical RFID systems are made up of three
components: readers (interrogators), antennas and tags (transponders) that carry the
data on a microchip. RFID technology is used today in many applications,
including security and access control, transportation and supply chain tracking. It is
a technology that works well for collecting multiple pieces of data on items for
tracking and counting purposes in a cooperative environment. Is All RFID Created
Equal? There are many different versions of RFID that operate at different radio
frequencies. The choice of frequency is dependent on the requirements of the
application. Four primary frequency bands have been allocated for RFID use.
• Low Frequency (125/134 KHz) – most commonly used for access control and
asset tracking.
• Mid-Frequency (13.56 MHz) – Used where medium data rate and read ranges are
required.
• Ultra High-Frequency (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) – offer
the longest read ranges and high reading speeds.
Applications for RFID within the supply chain can be found at multiple
frequencies and different RFID solutions may be requiredto meet the varying needs
of the marketplace. Many of today’s RFID technologies cannot reliably cover areas
wider than 4 to 5 feet, making them unsuitable for wide openings that are the norm
in manufacturing, distribution and store receiving dock environments.
Since UHF can cover portals up to 9 feet wide it is gaining industry support
as the choice bandwidth for inventory tracking applications including pallets and
cases. Technology providers are developing readers that work with multiple system
protocols and frequencies so that users will be able to choose the RFID products
that work best for their market and product
3.2.1RFID TYPES
• Active RFID Tags are battery powered. They broadcast a signal to the reader and
can transmit over the greatest distances (100+ feet). Typically they can cost $20.00
or more and are used to track high value goods like vehicles and large containers of
goods. Shipboard containers are a good example of an active RFID tag application.
• Passive RFID Tags do not contain a battery. Instead, they draw their power from
the reader. The reader transmits a low power radio signal through its antenna to the
tag, which in turn receives it through its own antenna to power the integrated
circuit (chip). The tag will briefly converse with the reader for verification and the
exchange of data.
• 0000A89
• 00016F
• 000169DCO
Tag Size
Tag size is dependent on the read range desired. Although the chips are very
tiny, they will not operate without being mounted to an antenna. The size of the
antenna will determine the read distance performance of the tag so understanding
the size of the antenna needed for the application is more important than the size of
the chip alone.
Infrastructure Cost
Read Distances
Read distances for RFID are very much dependent on the frequency chosen for
the application. Tag orientation also affects the read range as the range diminishes
as the tag is rotated from being perpendicular to the path to the reader. Reading
reliability is quite good when labels are alone in a reader field like cases on a
conveyor line, but less certain when the labels are randomly oriented as with
labeled cases on a skid. The antenna size (both on the tag and the readers) will also
be a determining factor. Hand held readers are not capable of using as much power
as stationary readers and as a result provide shorter read distances.
Government Regulation
Governments around the world regulate the use of the frequency spectrum.
Different countries have already assigned certain parts of the spectrum for other
uses and as a result, there is virtually no part of the spectrum that is available
everywhere in the world for use by RFID. This means that a RFID tag may not
work in all countries. As an example if you choose the Ultra High Frequency
(UHF) frequency that operates at 915MHz in the U.S. and you ship your product to
Europe, they may not be able to be read it since Europe operates in the UHF
spectrum at 869Mhz. This is an important consideration when operating in a global
environment.
Anti-Collision
This is an important feature of RFID chips/readers since it will allow multiple tags
to be read while grouped in one reader field. It is not available on all RFID tags but
is an important feature if you are planning to use RFID for inventory counts,
shipping and receiving where multiple tags need to be read at the same time.
Consumer groups have expressed concern over the potential (real or imagined)
privacy invasion that might result with widespread RFID item marking. These
groups are pushing for legislation that will require manufacturers to advise
consumers that the products contain RFID devices and must provide a means so
that the devices can be disabled at point of purchase. You should be aware of these
issues and consider them when implementing an RFID program. Paxar Corporation
is committed to aggressively participate in the developing market for RFID
products. Our goal is to become a major worldwide source for RFID supplies and
the printers which program them for all popular RFID systems, targeting
particularly the supplies used for apparel and retail applications. With worldwide
manufacturing, including service bureaus, Paxar is uniquely positioned to offer
innovative, market-driven RFID solutions to major retailers and apparel
manufactures. For more information, contact Paxar at 914-697-6800. You can also
visit us on our website at www.paxar.com. RFID Glossary of Commonly Used
Terms
An Active Tag
An RFID tag that uses a battery to power its microchip and communicate
with a reader. Active tags can transmit over the greatest distances (100+ feet).
Typically they can cost $20.00 or more and are used to track high value goods like
vehicles and large containers of merchandise.
Agile Reader
A reader that can read different types of RFID tags either made by different
manufacturers or operating on different frequencies. Antenna – A device for
sending or receiving electromagnetic waves. Anti-Collision – A feature of RFID
systems that enables a batch of tags to be read in one reader field by preventing the
radio waves from interfering with one another. It also prevents individual tags from
being read more than once.
D Die
RFID is in use all around us. If you have ever chipped your pet with an ID
tag, used EZ pass through a toll booth, or paid for a gas using speed pass, you’ve
used RFID. In addition, RFID is increasingly used with biometric technologies for
security.
An antenna or coil
A transceiver
A transponder(RF tag) electronically programmed with unique information
The antenna emits radio signals to activate the tag and to tag and write data
to it. The reader emits radio waves in ranges of anywhere from one inch to it. The
reader emits radio waves in ranges of anywhere from one inch to 100 feet or more,
depending upon its power output and the radio frequency used. When an RFID tag
passes through the electromagnetic zone, it detects the reader’s activation signal.
3.3 RELAY
Relay allow one circuit to switch a second circuit which can be completely
separate from the first. For example a low voltage battery circuit can use a relay to
switch a 230v AC mains circuit; the link is magnetic and mechanical
The coil of a relay passes a relatively large current, typically 30mA for a 12v
relay, but it can be as much as 100mA for relays designed to operate from lower
voltages. Most IC cannot provide this current and a transistor is usually used to
amplify the small IC current to the larger value required for the relay coil.
The maximum output current for the popular 555 timer IC is 200mA so
these devices can supply relay coils directly without amplification. Relays are
usually SPDT or DPDT but they can have more sets of switch contacts, for
example relays with 4 sets of changeover contacts are readily available. For further
information about switch contacts and the terms used to describe them please see
the page on switches.
Most relays are designed for PCB mounting but you can solder wires
directly to the pins providing you take care to avoid melting the plastic case of the
relay.
3.3.1 Circuit diagram
COM = Common, always connect to this; it is the moving part of the switch.
NC = Normally Closed, COM is connected to this when the relay coil is off.
NO = Normally Open, COM is connected to this when the relay coil is on
ADVANTAGES OF RELAY:
Relays can switch AC and DC, transistor can only switch DC.
Relays can switch high voltages, transistor cannot.
Relays are a better choice for switching large current (>5A).
Relays can switch many contacts at once.
3.4POWER SUPPLY
Description information
All others 35 V
Lead temperature 1,6 mm (1/16 inch) from case for 10 seconds 260C
The LM7805 series of three terminal regulators are available with several
fixed output voltages. The voltages available allow regulators to be used in logic
systems, instrumentations, Hi-Fi and other solid state electronics equipment
without any external feedback components.
These ICs are designed as fixed voltage regulator and with adequate heat
sinking can deliver output currents in excess of 1A.The input capacitor Ci=0.33µF
is used, if regulator is located far from the power supply filter capacitor. It filters
out the effect of stray inductance of wire, ceramic or tantalum capacitor may be
used. To improve the transient response of regulator capacitor of 0.1µF is
connected at output. It utilizes common ground fir input and output and has
dropout voltage (VIN – VO) of 2 V.
Pin diagram
When four diodes are connected as shown in figure, the circuit is called as
bridge rectifier. The input to the circuit is applied to the diagonally opposite
corners of the network, and the output is taken from the remaining two corners. Let
us assume that the transformer is working properly and there is a positive potential,
at point A and a negative potential at point B. the positive potential at point A will
forward bias D3 and reverse bias D4. The negative potential at point B will
forward bias D1 and reverse D2. At this time D3 and D1 are forward biased and
will allow current flow to pass through them; D4 and D2 are reverse biased and
will block current flow. The path for current flow is from point B through D1, up
through RL, through D3, through the secondary of the transformer back to point B.
this path is indicated by the solid arrows. Waveforms (1) and (2) can be observed
across D1 and D3.One-half cycle later the polarity across the secondary of the
transformer reverse, forward biasing D2 and D4 and reverse biasing D1 and D3.
Current flow will now be from point A through D4, up through RL, through D2,
through the secondary of T1, and back to point A. This path is indicated by the
broken arrows. Waveforms (3) and (4) can be observed across D2 and D4. The
current flow through RL is always in the same direction. In flowing through RL
this current develops a voltage corresponding to that shown waveform (5). Since
current flows through the load (RL) during both half cycles of the applied voltage,
this bridge rectifier is a full-wave rectifier.
It is a flat-panel display or other electronic visual display that uses the light-
modulating properties of liquid crystals. Liquid crystals do not emit light directly.
The LCD screen is more energy-efficient and can be disposed of more safely
than a CRT. Its low electrical power 1888. By 2008, annual sales of televisions
with LCD screens exceeded sales of CRT units worldwide, and the CRT became
obsolete for most purposes.
LCD DIAGRAM:
Disadvantages
Only one native resolution. Displaying any other resolution either requires
a video scalar, causing blurriness and jagged edges; or running the display at native
resolution using 1:1 pixel mapping, causing the image either not to fill the screen
(letterboxed display), or to run off the lower right edge of the screen.
Fixed bit depth, many cheaper LCDs are only able to display 262,000 colors.
8-bit S-IPS panels can display 16 million colors and have significantly better black
level, but are expensive and have slower response time.
Low refresh rate. All but a few high-end monitors support no higher than 60
or 75 Hz; while this does not cause visible flicker due to the LCD panel's high
internal refresh rate, the low input refresh rate still limits the maximum frame-rate
that can be displayed, negatively impacting gaming and 3D graphics.
Input lag, because the LCD's A/D converter waits for each frame to be
completely outputted before drawing it to the LCD panel. Many LCD monitors
do post-processingbefore displaying the image in an attempt to compensate for
poor color fidelity, which adds an additional lag. Further, a video scalar must be
used when displaying non-native resolutions, which adds yet more lag. Scaling and
post processing are usually done in a single chip on modern monitors, but each
function that chip performs adds some delay. Some displays have a gaming mode
which disables all or most processing to reduce perceivable input lag.
Subject to burn-in effect, although the cause differs from CRT and the effect
may not be permanent, a static image can cause burn-in in a matter of hours in
badly design displays.
Pin Description:
Pin
Function Name
No
1 Ground (0V) Ground
2 Supply voltage; 5V (4.7V – 5.3V) Vcc
3 Contrast adjustment; through a variable resistor VEE
Selects command register when low; and data register Register
4
when high Select
5 Low to write to the register; High to read from the register Read/write
6 Sends data to data pins when a high to low pulse is given Enable
7 DB0
8 DB1
9 DB2
10 DB3
8-bit data pins
11 DB4
12 DB5
13 DB6
14 DB7
15 Backlight VCC (5V) Led+
16 Backlight Ground (0V) Led-
CHAPTER 4
4. METHODOLOGY
4.1 UART
The final piece to this serial puzzle is finding something to both create the
serial packets and control those physical hardware lines.
A universal asynchronous receiver/transmitter (UART) is a block of
circuitry responsible for implementing serial communication. Essentially, the
UART acts as an intermediary between parallel and serial interfaces. On one end
of the UART is a bus of eight-or-so data lines (plus some control pins), on the
other is the two serial wires RX and TX.
For example, the Arduino Uno based on the “old faithful” ATmega328 has
just a single UART, while the Arduino Mega built on an ATmega2560 has a
whopping four UARTs.
As the R and T in the acronym dictate, UARTs are responsible for both
sending and receiving serial data. On the transmit side, a UART must create the
data packet appending sync and parity bits - and send that packet out the TX line
with precise timing (according to the set baud rate). On the receive end, the ART
has to sample the RX line at rates according to the expected baud rate, pick out the
sync bits, and spit out the data.
More advanced UARTs may throw their received data into a buffer, where
it can stay until the microcontroller comes to get it. UARTs will usually release
their buffered data on a first-in-first-out (FIFO) basis. Buffers can be as small as a
few bits, or as large as thousands of bytes.
Software UARTs
EXPERIMENTAL OUTPUTS
CHAPTER 6
CONCLUSION
The proposed system makes sure that the vehicle should be driven only by
authorized person who holds the license. It reducesthe manual work needed for
checking the license and it makes availing of license as mandatory since they can’t
drive the car without license. By implementing this system, the rate of accident
caused by unlicensed driving can be reduced and the government rule of
mandatory license system can be realized.
REFERENCES