0 évaluation0% ont trouvé ce document utile (0 vote)
118 vues4 pages
In order to provide an efficient,
sophisticated and fully automated system a kind of
An Electronic Toll gate Collection System is
designed with PIC controller and another added
service in this system is, installing a security
system in every automotives which always read the
location of the vehicle and send to the authorized
person when requested, which gives an ease of
monitoring the vehicles for RTA department as
well as the owners when they are required. The
tollgate system is developed such that it
automatically scans the vehicle whether it is an
authenticated vehicle or not if so the system allows
the vehicle to pass through otherwise it will ask to
pay the amount manually.
Titre original
Design and Implementation of Electronic Tollgate
Collection System
In order to provide an efficient,
sophisticated and fully automated system a kind of
An Electronic Toll gate Collection System is
designed with PIC controller and another added
service in this system is, installing a security
system in every automotives which always read the
location of the vehicle and send to the authorized
person when requested, which gives an ease of
monitoring the vehicles for RTA department as
well as the owners when they are required. The
tollgate system is developed such that it
automatically scans the vehicle whether it is an
authenticated vehicle or not if so the system allows
the vehicle to pass through otherwise it will ask to
pay the amount manually.
In order to provide an efficient,
sophisticated and fully automated system a kind of
An Electronic Toll gate Collection System is
designed with PIC controller and another added
service in this system is, installing a security
system in every automotives which always read the
location of the vehicle and send to the authorized
person when requested, which gives an ease of
monitoring the vehicles for RTA department as
well as the owners when they are required. The
tollgate system is developed such that it
automatically scans the vehicle whether it is an
authenticated vehicle or not if so the system allows
the vehicle to pass through otherwise it will ask to
pay the amount manually.
Design and Implementation of Electronic Tollgate Collection System Vanga Smitha 1 , K Kanthi Kumar 2 , K V Murali Mohan 3
1 Vanga Smitha is pursuing M Tech (ECE) in Holy Mary Institute of Technology and science (HITS), Bogaram, Keesara, Hyderabad. Affiliated to JNTUH, Hyderabad, A.P, INDIA
2 K Kanthi Kumar, working as an Associate Professor (ECE) at Holy Mary Institute of Technology and science (HITS), Bogaram, Keesara, Hyderabad. Affiliated to JNTUH, Hyderabad, A.P, INDIA
3 K V Murali Mohan, working as a Professor HOD ( ECE) at Holy Mary Institute of Technology and science (HITS), Bogaram, Keesara, Hyderabad. Affiliated to JNTUH, Hyderabad, A.P, INDIA
Abstract:
In order to provide an efficient, sophisticated and fully automated system a kind of An Electronic Toll gate Collection System is designed with PIC controller and another added service in this system is, installing a security system in every automotives which always read the location of the vehicle and send to the authorized person when requested, which gives an ease of monitoring the vehicles for RTA department as well as the owners when they are required. The tollgate system is developed such that it automatically scans the vehicle whether it is an authenticated vehicle or not if so the system allows the vehicle to pass through otherwise it will ask to pay the amount manually.
I. INTRODUCTION
RFid technology is bound to change the. Bank cards would be fitted with RFid chips which would permit banks to quicken their reaction time when some important customer visits the bank and enable themto send someone to meet and wish the person. RFid chips could also be arranged in palmlets and this would trigger videos on in house screens to provide more information. RFID technology allows for data to be transmitted between two devices at close range without physical contact. It can be made very sophisticated and reliable, and the data stored and transmitted can be widespread. Transmission and legalization can be done in less than a second, Cities having a good public transport infrastructure have been introducing cashless payment on buses, subways, and trains. Payment is realized by nearing a prepaid and rechargeable cards, upon which the reader discounts the correct amount from the card. The frequency used (13.56MHz) has a read range of about 20 cm; no physical contact is necessary. In addition to being a prepaid card the card can also hold other information which can be used to identify the client.
A. Access to personal information
Personal information will be stored in an adapted card (any card present access and other ID related services), in accumulation to bank details. RFID allows the ease of tracking each card, and can disable definite readers this means RFID card users and their communication will always be perceptible. India has seen over 25% annual growth in credit/debit cards and expect to grow from6million cards in early 2003 to 10 to 25 million cards by 2010
RFID in Banking: 1. Customer convenience 2. Competitive advantage 3. Create new products
RFID technology allows wireless storage and automatic retrieval of data and it improves security, cuts down on theft and counterfeiting in the supply chain. In the supply chain RFID also helps to reduce out of stock situations which may affect business. It also increases visibility of products in the production processes, enables detection of vehicles on roads as well as automatic toll collection fromthe users. A complete RFID system consists of tags, transponders, computer networks and systems including databases. There is an environment of companies that extend platforms to support RFID development and applications. Firms like Wal-Mart, Target and Gillette have been active in developing and adopting RFID. On the roads, it is used to detect the presence of vehicles and retrieve information on the vehicle tag as it passes through the tollgate. This tag scanning works as if it were some bar codes being scanned in a shop and the billing mechanically done according to the codes arriving. However bar codes do not have memory block for storing data as in RFID tag and they do not use radio frequency hence have a short reading range
In every RFID system the transponder Tags contain information. This information can be as small as a single binary bit although they normally start at 16 bits, or be a large array of bits demonstrating such things as an identity code, personal medical information, or accurately any type of information that can be stored in digital binary format.
IV. METHODOLOGY:
The system was developed in a modular- based method. It contains an identification module, which has the RFID hardware to read tags as vehicles pass through the tollgate. This module sends information to the software module through RS232 serial connection. The software module uses the information from the identification module to determine the actual physical identity of the vehicle using its EPC code and the information is used to tell the boombarrier whether to clear the way or not. The boombarrier systemmakes up the mechanical module such that when the tag gets matched.
Components of RFID Read-Writer System:
To have a complete RFID system, an interrogator, a transponder and some tags were used. These formthe RFID hardware which is used in an information processing system(IPS) to acquire the total advantages of RFID. An RFID system can detect many different RFID tags concurrently as long as they are within the read range of the interrogator. The interrogator acts as the sensor as well as an interface between RFID transponders and the IPS. Antennae are attached to the interrogator and performthe actual Radio Frequency (RF) communication which is described above. A computer hosting the IPS application pilots the interrogator and processes the data it sends. The IPS application monitors, configures and coordinates readers for data collection as well as the execution of business programs as dictated by programmed business rules and logic. The IPS regularly is also referred to as the edge-ware or middleware and can be stated as the intellectual sensor network platform (ISNP). After configuration of parameters meaningful information has to be taken fromthe tag.
The Identification module There are seven data lines fromthe RFID read/write module. The important ones for reading and writing are the lines for transmitting and receiving data in a two way communication between the RFID reader and the computer system. A USB-to- RS232 converter is used to enable connect the RFID module to the Personal Computer (PC) if it does not have an RS232 port. The RFID module is powered froman independent power source, in this case, a 12 V and 3A supply. A tag is brought in the region of the
PIC (16F877) Power Supply RFID Reader LCD Display PC
ARM-7 (LPC2148) Power Supply GSM GPS Motor Driver Motor International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013
magnetic field produced by the RFID module and a beep sound is produced. The RFID module needs to be configured with certain communication parameters. This can be done using the given specific instructions and can be achieved by using the Demo Application or an independent developed application. The RFID module is connected to a machine via the RS232 port which creates the serial communication between both.
V. SOFTWARE MODULE The microcontroller was programmed using the C programming language and Visual Basic was used in the serial communication between the computer and the RFID as well as with the PIC. A database was designed using Microsoft Access since it can contain up to 32768 records of objects, a size of 2GB memory space which is sufficient for exhibition. Synchronizing software called Sync Toy was used to make obvious exchange of data between terminals in the same network. Remote systemis also used to test communication between the module and the PC.
VI. HARDWARE DESIGN This involved the designing of the automotive part, with the aimof having a stable, low- priced, light and steadfast design. For the prototype implementation we use wood but aluminiumcan be used for real time boom barrier. After unbeaten building of the gate system the whole systemwas incorporated for testing. The RFID, server (computer and database), PIC control, power supply and the gate system were joined together. At the moment Zimbabwe Revenue Auth
Accuracy Several tests were run during the Zimbabwe International Trade Fair (ZITF) for the whole week and the RFID system maintained the complete database of entries accurately. The systemmanaged to recognize all the cars that approved through it. The serial communication between the PIC and the computer was also constantly tested. The results showed that there were neither unwanted added bits nor lost bits. There were no illustrations when the gate failed to open when it was supposed to, neither did it fail to close when it was supposed to. Generally accuracy was high and the authors recommend the use of RFID in identity detection even for car parks and door entrances.
Security The systemproved to be secure since it could not be cracked without the login details. No unauthorized user is supposed to log on to the system, in case they may start editing their balances. However the weakness of the networked tollgate systemis that it is prone to the spread of viruses and leaking of information to the external world. We recommend that further up gradation be done to reduce this risk. However it is very difficult for public/users to replica RFID tags and start using themin the road because an unrecorded/unknown tag ID is not allowed to pass.
VII. REFERENCES
[1] IET. 2009. Radio Frequency Identification Device Technology (RFID), The Institution of Engineering and Technology, Available at: http://www.theiet.org/factfiles/it/rfidpage. cfm?type=pdf, Accessed on 15/06/12. [2] Want, R. 2006. An Introduction to RED) Technology, IEEE Pervasive Computing, 5(1), pp. 25-33. [3] Stanford, V. 2003. Pervasive computing goes the last hundred feet with RFID systems, IEEE Pervasive Computing, 2(2), pp 914. [4] Soldatos, J., Kefalakis, N., Leontiadis, N. et al. 2010. Core ASPIRE Middleware Infrastructure (Final Version), ASPIRE Consortium, ID: WP3/D3.4b, Revision 1.9, Availableat: http://www.fp7- aspire.eu/fileadmin/aspire/docs/deliverables/ASPIRE_D3.4b_Final. pdf, Accessed on:11/06/12 VIII. AUTHORES DETAILS International Journal of Engineering Trends and Technology (IJETT) Volume 4 Issue 9- Sep 2013
Vanga Smitha, Pursuing M.Tech (ECE) Holy Mary Institute of Technology and science (HITS), Bogaram, Keesara, Hyderabad. Affiliated to J NTUH, Hyderabad, A.P, INDIA
K Kanthi Kumar, Associate professor (ECE) at Holy Mary Institute of Technology and science (HITS), Bogaram, Keesara, Hyderabad. Affiliated to JNTUH, Hyderabad, A.P, INDIA
K V Murali Mohan is working as a Professor HOD ( ECE) at Holy Mary Institute of Technology and science (HITS), Bogaram, Keesara, Hyderabad. Affiliated to J NTUH, Hyderabad, A.P, INDIA
(Studies in American Popular History and Culture) Gail Fowler Mohanty - Labor and Laborers of The Loom - Mechanization and Handloom Weavers, 1780-1840 - Routledge (2006)