Vous êtes sur la page 1sur 41

BUS SAFETY SYSTEM FOR SCHOOL CHILDREN

USING RFID AND GSM


An Internship and Summer Training Report submitted to

ELECTRONICS AND COMMUNICATION ENGINEERING

in partial fulfilment of the requirements

for the award of the Degree of

BACHELOR OF ENGINEERING

Submitted by

S.SUSMITHA(16103099 )

Under the guidance of

Mr. M. Balasubramaniyan, M.E., Assistant Professor

Your Industry guide name with designation (Industry Guide)

VIVEKANANDHA
COLLEGE OF ENGINEERING FOR WOMEN
[Autonomous]
Approved by AICTE, New Delhi and Accredited by NBA
Affiliated to Anna University, Chennai-25,
An ISO 9001-2008Certified Institution
Elayampalayam, Tiruchengode, Namakkal Dt. – 637205

NOVEMBER-2019
VIVEKANANDHA COLLEGE OF ENGINEERING FORWOMEN
Elayampalayam, Tiruchengode, Namakkal Dt. - 637205

ELECTRONICS AND COMMUNICATION ENGINEERING

Certificate

This is to certify that the Internship and Summer Training Report entitled " BUS SAFETY
SYSTEM FOR CHILDREN BY USING RFID AND GSM ", in partial fulfilment of the
requirements for the award of the Degree of (BACHELOR OF ENGINEERING) is a
record of original training undergone by S.SUSMITHA( 16103099) during the year
NOVEMBER 2019 of her study in the Department of ELECTRONICS AND
COMMUNICATION ENGINEERING,Vivekanandha College of Engineering for
Women under my supervision and the report has not formed the basis for the award of any
Degree/Fellowship or other similar title to any candidate of any University.

Place: Elayampalayam Signature of Guide

Date: Mr.M.Balasubramaniyan, M.E, AP/ECE

Head of the Department

Submitted to the Department of ELECTRONICS AND COMMUNICATION


ENGINEERING, Vivekanandha College of Engineering for Women for the
examination held on __ ________

INTERNAL EXAMINER
DECLARATION

I, (S.SUSMITHA), hereby declare that the Internship and Summer Training Report, entitled
" BUS SAFETY SYSTEM FOR CHILDREN BY USING RFID AND GSM ",
submitted to the Vivekanandha College of Engineering for Women in partial fulfillment
of the requirements for the award of the Degree of BACHELOR OF ENGINEERING
is a record of original training undergone by me during the period NOVEMBER-2018
under the supervision and guidance of Mr.M.Balasubraaniyam,M.E., Assistant Professor
Vivekanandha College of Engineering for Women and it has not formed the basis for
the award of any Degree/Fellowship or other similar title to any candidate of any University.

Place:Elayampalayam Signature of the Student

Date:
ACKNOWLEDGEMENT

I am immensely grateful to our chairman and secretary, Vidya Ratna


Prof.Dr.M.KARUNANITHI,B.Pharm.,M.S.,Ph.D.,D.Litt.,Vivekanandha Educational
Institutions, who is our inspiration.

I would like to express our deep gratitude to our respectable Advisor


Dr.D.VISWANATHAN, M.E., Ph.D.,Former Vicechancellor, Anna University, Chennai
,who always motivate us towards our academic development.

I wish to express my profound thanks to our beloved Principal,


Dr.KCK.VIJAYAKUMAR, M.E., Ph.D.,MIE., for all the facilities and support provided
during the period of internship and summer project.

I would like to acknowledge our Head of the Department, Dr.T.S.JALAYI


LASEETHA, B.E., M.E.,Ph.D., Department of Electronics and Communication
Engineering, for her encouragement and support for completing the internship training and
summer project successfully.

I wish to thank our Internship Training coordinator


Mrs..KAMALAVATHI.E.,Assistant HOD/ECE for his kind support and guidance in
completion of our internship training and summer project successfully.

I express my sincere thanks and regards to our guide,


Mr.M.BALASUBRAMANIYAN,M.E., Assistant Professor / ECE for his
encouragement and valuable suggestions throughout the internship training and summer
project.

I express my sincere thanks and regards to the company Intellyticshub technology


corp.ltd and chair person Mr.KARTHIK JEGANATHAN chief executive officer for his
encouragement and valuable suggestions throughout the internship training and summer
project.

Finally, I wish to thank the almighty and all the teaching and non-teaching staff
members of our department for their support towards the successful completion of our
internship training and summer project.

.
TABLE OF CONTENTS

Chapter Contents Pg.no

No
Certificate

Company
certificate

Declaration

Acknowledgement

Content

List of figures

List of abbreviations

Introduction

Bus safety system for school children using rfid and gsm

5.1. Abstract

5.2.introduction

5.3. Hardware description

5.3.1.block diagram

5.3.2.description

5.4.circuit diagram

5.4.1.description

5.5.pic microcontroller

5.5.1.pic16f887

5.5.2.block diagram

5.5.3.pin diagram

5.5.4 .stack

5.5.5.status register

5.5.6.i/o ports
5.5.7.instruction set

5.6.power supply unit

5.6.1.block diagram

5.6.2.working principle

5.7.rfid

5.7.1.rfid tag

5.7.2. Rfid reader

5.8.relay

5.8.1.relay driver circuit

5.9.gsm

5.9.1.mobile standards

5.9.2.sms

5.9.3.advantages of gsm

5.9.4.applications of gsm

5.10.serial communication

5.10.1.max232

5.11.gps

5.11.1.concept of gps

5.11.2.position calculation

5.12.lcd

5.12.1.features

5.12.2.pin diagram

5.12.3.advantages

5.12.4.applications

6.software description

6.1.pic kit tool


6.2.mp lab ide

6.3.embedded c

6.4 working

6.5.working module

7.conclusion

references
LIST OF FIGURES

FIGURE NO FIGURES PAGENO.

1. BLOCK DIAGRAM

2. CIRCUIT DIAGRAM

3. BLOCK DIAGRAM OF PIC

4. PIN DIAGRAM OF PIC

5. STACK

6. BLOCK DIAGRAM POWER SUPPLY

7. CIRCUIT DIAGRAM OF POWER SUPPLY

8. MAX232

9. LCD PIN DIAGRAM

10. PICKIT1

11. PICKIT2

12. PICKIT3
LIST OF
ABBREV
ATIONS

PIC Peripheral Interface Controller

RAM Random Access Memory

SMS Short Message Service

ALU Arithmetic Logic Unit

RFID Radio Frequency Identification

GSM Global System for Mobile communication

GPS Global Positioning System

LCD Liquid Crystal System

DOS Disc Operating System

CMD Command

MCLR Master Clear

ICSP In Circuit Serial Programming

UART Universal Asynchronous Receiver/Transmitter

USB Universal Serial Bus

LED Light Emitting Diode

EPC Electronic Product Code

BAP Battery Assisted Passive Device


CHAPTER 5

5.1 ABSTRACT

With the advancement of the crime rate, security is having its alarming significance for
school children‘s. The safety mechanism to the school bus and to the children travelling from
home to the school and resume back to home is a standalone component to the parents and to
the school management. This project aims to provide the total security for school children.
Each student is tagged with unique code. The module is placed at the entrance and exit
location of the bus. Wireless communication technology RFID is used to inform the status of
the bus to the school principal. The student record will be sent to the concerned parent before
leaving the children entry point. The return information is also informed to the parent using
GSM technology. The results are favourably good to meet the challenges of the security
issues.

5.2 INTRODUCTION

School buses transfers millions of children daily in various countries around the world. While
there many issues that might disturb the parents regarding the travel safety of school going
children, the project intends to look into introducing access safety in respect of school buses
through bus safety system that will help the school children‘s transportation in a secure and
safer way. The supervision of the regularity of students during their entry and exit from the
bus is difficult to be controlled by drivers, which led to endangering child safety. The
phenomenon of forgetting kids on the bus is one of the problems suffered by the children,
which has increased significantly in recent years. This has often led to the death of many
students on account of suffocation due to the lack of attention of derivers. This project,
through entry and exit recordings, aims to create a suitable environment by following certain
set of criteria of security and safety for school bus that will have a positive impact on the
student and their family. The project proposed a bus safety system which was designed to
control the entering/exiting of students from the bus. This system does several tasks,
including identifying personal information (Eg Name) of each student using RFID tag, which
will exchange the data with the RFID reader via radio waves, and displaying student count
into LCD display. This will let the driver to know the number of students inside the bus and
the students who departed from the bus. Moreover, the system has an emergency system that
will alert in case if there is a child inside the bus after the bus stops at the destination by
sending an SMS to the school management via GSM modem. In addition, if the bus depart
and arrive successful from the source to destination, it will inform the management through
an SMS about its successful departure and arrival. The key novel feature of the proposed
methodology is the use of energy efficient systems to support the tasks.
5.3. HARDWARE DESCRIPTION

5.3.1 BLOCK DIAGRAM

The complete block diagram of our project is as follows:

RFID LEVEL
CONVERTE
CARD1 R GSM

RFID
CARD2 GPS

EMBEDDED
SYSTEM
DRIVER

RFID
RFID
CARD3 READER

RFID
POWER
CARD4 DISPLAY SUPPLY

Fig.5.1. Block diagram

5.3.2. DESCRIPTION

The RFID card information is sensed using the RFID reader which is matched with the
pre-defined information in the embedded system and the card information is displayed using
a display unit. GSM and embedded system is serially connected and the required conversion
is performed by the level converter. A driver is used to switch between the RFID reader and
GPS. A power supply unit is used to supply power to all the modules.
5.4 CIRCUIT DIAGRAM

The connections are made as per the given circuit diagram.

Fig.5.2. Circuit diagram

5.4 .1 DESCRIPTION

The power supply unit is used to supply 5V to PIC Micro-Controller and 12V to all other
modules. The 16x2 LCD display, two relays, MAX232 are interfaced to PIC Micro-
Controller through the interfacing pins. MAX232 performs the required level conversion
among PIC, relay1, relay2 and GSM. Relay1 switches between GPS and GSM. Relay2
switches between RFID reader and Relay1. The LCD displays the RFID card information.
5.5 PIC MICROCONTROLLER

PIC is a family of Harvard architecture microcontrollers made by Microchip Technology,


derived from the PIC1640 originally developed by General Instrument's Microelectronics
Division. The name PIC initially referred to "Peripheral Interface Controller". PICs are
popular with developers and hobbyists alike due to their low cost, wide availability, large
user base, extensive collection of application notes, availability of low cost or free
development tools, and serial programming (and re-programming with flash memory)
capability.

5.5.1 PIC16F887

 Separate code and data spaces (Harvard architecture)



 A small number of fixed length instructions

 Most instructions are single cycle execution (4 clock cycles), with single delay cycles
upon branches and skips

 A single accumulator (W), the use of which (as source operand) is implied (i.e. is not
encoded in the opcode)

 All RAM locations function as registers as both source and/or destination of math and
other functions.

 A hardware stack for storing return addresses

 A fairly small amount of addressable data space (typically 256 bytes), extended
through banking

 Watchdog timer.

 Analog-to-digital converters (up to ~1.0 MHz).

Data space mapped CPU, port, and peripheral registers


5.5.2 BLOCK DIAGRAM

Fig.5.3.Block diagram of PIC


5.5.3 PIN DIAGRAM

Fig.5.4. Pin diagram of PIC

Program Memory map and stack for the PIC16F887

The PIC16F887 has a 13-bit program counter capable of addressing an 8K x 14 (0000h-


1FFFh) program memory space. This 8x14 memory space is broken into 4 pages of 2k x 14
each. Page # Memory location within a page A12 A11 A10 A9 A8 A7 A6 A5 A4 A3 A2 A1
A0 Accessing a location above these boundaries will cause a wrap-around within the first 8K
x 14 space. The Reset vector is at memory location 0000h and the interrupt vector is at
memory location 0004h.
5.5.4 STACK

PICs have a hardware call stack, which is used to save return addresses. The hardware
stack is not software accessible on earlier devices, but this changed with the 18 series
devices.
Hardware support for a general purpose parameter stack was lacking in early series, but
this greatly improved in the 18 series, making the 18 series architecture more friendly to high
level language compilers.

Fig.5.5 Stack
5.5.5 STATUS REGISTER

The STATUS register contains:

 The arithmetic status of the ALU



 The Reset status

 The bank select bits for data memory (GPR and SFR)

It is recommended to use the BCF and BSF instructions for bit manipulation and the
MOVWF instruction for byte manipulation of the STATUS register.

Move content of W register to the STATUS register.

5.5.6. I/O PORTS

The 16F887 provides various PORT I/O pins – These can be Used to interface to the
―outside world‖. A total of 35 I/O pins are provided by the 16F887 and are divided into
various PORTS.

 PORT:ABCDE

 PINS:88883

The I/O pins can be individually programmed to be either inputs or outputs. Many of the
I/O pins are shared with another functionality. One needs to program the 16F887 for the
desired functionality.

PORTA and the TRISA Register

The RA4 pin is a Schmitt Trigger input and an open drain output. All other RA port pins
have TTL input levels and full CMOS output drivers. All pins have data direction bits
(TRIS registers) which can configure these pins as output or input .Setting a TRISA
register bit puts the corresponding output driver in a hi-impedance mode. Clearing a bit in
the TRISA register puts the contents of the output latch on the selected pin(s).
The ANSEL register is used to configure the Input mode of an I/O pin to analog. Setting
the appropriate ANSEL bit high will cause all digital reads on the pin to be read as ‗0‘
and allow analog functions on the pin to operate correctly.
PORTB and the TRISB Register:

PORTB is an 8-bit wide bi-directional port. The corresponding data direction register is
TRISB. Setting a bit in the TRISB register puts the corresponding output driver in a high-
impedance input mode. Clearing a bit in the TRISB register puts the contents of the output
latch on the selected pins.
The ANSELH register is used to configure the input mode of a PORTB I/O pin to analog.
Setting the appropriate ANSELH bit high will cause all digital reads on the pin to be read as
‗0‘ and allow analog functions on the pin to operate correctly. All of the PORTB pins are
individually configurable as an interrupt-on-change pin. Control bits IOCB<7:0> enable or
disable the interrupt function for each pin. For enabled interrupt-on-change pins, the present
value is compared with the old value latched on the last read of PORTB to determine which
bits have changed or mismatched the old value. The ‗mismatch‘ outputs of the last read are
ORed together to set the PORTB Change Interrupt flag bit (RBIF) in the INTCON register. A
mismatch condition will continue to set flag bit RBIF. Reading or writing PORTB will end
the mismatch condition and allow flag bit RBIF to be cleared.

PORTC and the TRISC Register:

PORTC is an 8-bit bi-directional port. Each pin is individually configurable as an input or


output through the TRISC register. PORTC pins have Schmitt Trigger input buffers. When
enabling peripheral functions, care should be taken in defining TRIS bits for each PORTC
pin. Some peripherals override the TRIS bit to make a pin an output, while other peripherals
override the TRIS bit to make a pin an input.

PORTD and the TRISD Register:

PORTD is an 8-bit port with Schmitt Trigger input buffers. Each pin is individually
configurable as an input or output.

PORTE register:

PORTE provides a 3-bit wide, bidirectional port on RE0, RE1, and RE2 pins. The
exception is RE3, which is input only and its TRISE bit will always read as ‗1‘. The
corresponding data direction register is TRISE (1 input, 0 output). Reading the PORTE
register reads the status of the pins, whereas writing to it will write to the PORT latch. The
TRISE register controls the PORTE pin output drivers, even when they are being used as
analog inputs. The user should ensure the bits in the TRISE register are maintained set when
using them as analog inputs. I/O pins configured as analog input always read ‗0‘. The
ANSEL register must be initialized to configure an analog channel as a digital input. Pins
configured as analog inputs will read ‗0‘.
5.5.7. INSTRUCTION SET

A PIC's instructions vary from about 35 instructions for the low-end PICs to over 80
instructions for the high-end PICs. The instruction set includes instructions to perform a
variety of operations on registers directly, the accumulator and a literal constant or the
accumulator and a register, as well as for conditional execution, and program branching.

To load a constant, it is necessary to load it into W before it can be moved into another
register. On the older cores, all register moves needed to pass through W, but this changed on
the "high end" cores.PIC cores have skip instructions which are used for conditional
execution and branching. The skip instructions are: 'skip if bit set', and, 'skip if bit not set'.
Because cores before PIC18 had only unconditional branch instructions, conditional jumps
are implemented by a conditional skip (with the opposite condition) followed by an
unconditional branch. Skips are also of utility for conditional execution of any immediate
single following instruction.

W PIC instructions fall into 5 classes: Operation on W with 8-bit immediate ("literal")
operand. E.g. movlw (move literal to W), andlw (AND literal with W). One instruction
peculiar to the PIC is retlw, load immediate into W and return, which is used with computed
branches to produce lookup tables. Operation with W and indexed register. The result can be
written to either the register (e.g. addwfreg,w). or the selected register (e.g. addwfreg,f). The
latter are usedto perform conditional branches. The usual ALU status flags are available in a
numbered register so operations such as "branch on carry clear" are possible. Control
transfers. Other than the skip instructions previously mentioned, there are only two:goto and
call.

5.6. POWER SUPPLY UNIT

The ac voltage, typically 220V rms, is connected to a transformer, which steps that ac
voltage down to the level of the desired dc output. A diode rectifier then provides a full-wave
rectified voltage that is initially filtered by a simple capacitor filter to produce a dc voltage.
This resulting dc voltage usually has some ripple or ac voltage variation.
A regulator circuit removes the ripples and also remains the same dc value even if the
input dc voltage varies, or the load connected to the output dc voltage changes. This voltage
regulation is usually obtained using one of the popular voltage regulator IC units.
5.6.1 BLOCK DIAGRAM

IC REGULATOR
TRANSFORMER RECTIFIER FILTER LOAD

Fig .5.6 Block diagram of Power supply

5.6.2. WORKING PRINCIPLE

Transformer

The potential transformer will step down the power supply voltage (0-230V) to (0-
6V) level. Then the secondary of the potential transformer will be connected to the precision
rectifier, which is constructed with the help of op– amp. The advantages of using precision
rectifier are it will give peak voltage output as DC, rest of the circuits will give only RMS
output.

Bridge rectifier

When four diodes are connected as shown in figure, the circuit is called as bridge rectifier.
The input to the circuit is applied to the diagonally opposite corners of the network, and the
output is taken from the remaining two corners.
Let us assume that the transformer is working properly and there is a positive potential, at
point A and a negative potential at point B. the positive potential at point A will forward bias
D3 and reverse bias D4.
The negative potential at point B will forward bias D1 and reverse D2. At this time D3
and D1 are forward biased and will allow current flow to pass through them; D4 and D2 are
reverse biased and will block current flow. The path for current flow is from point B through
D1, up through RL, through D3, through the secondary of the transformer back to point B.
this path is indicated by the solid arrows. Waveforms (1) and (2) can be observed across D1
and D3.
One-half cycle later the polarity across the secondary of the transformer reverse, forward
biasing D2 and D4 and reverse biasing D1 and D3. Current flow will now be from point A
through D4, up through RL, through D2, through the secondary of T1, and back to point A.
This path is indicated by the broken arrows. Waveforms (3) and (4) can be observed across
D2 and D4. The current flow through RL is always in the same direction. In flowing through
RL this current develops a voltage corresponding to that shown waveform (5). Since current
flows through the load (RL) during both half cycles of the applied voltage, this bridge
rectifier is a full-wave rectifier.
One advantage of a bridge rectifier over a conventional full-wave rectifier is that with a
given transformer the bridge rectifier produces a voltage output that is nearly twice that of the
conventional full-wave circuit.
This may be shown by assigning values to some of the components shown in views A and
B. assume that the same transformer is used in both circuits. The peak voltage developed
between points X and y is 1000 volts in both circuits. In the conventional full-wave circuit
shown—in view A, the peak voltage from the center tap to either X or Y is 500 volts. Since
only one diode can conduct at any instant, the maximum voltage that can be rectified at any
instant is 500 volts.
The maximum voltage that appears across the load resistor is nearly-but never exceeds-
500 v0lts, as result of the small voltage drop across the diode. In the bridge rectifier shown in
view B, the maximum voltage that can be rectified is the full secondary voltage, which is
1000 volts. Therefore, the peak output voltage across the load resistor is nearly 1000 volts.
With both circuits using the same transformer, the bridge rectifier circuit produces a higher
output voltage than the conventional full-wave rectifier circuit.

IC voltage regulator

Voltage regulators comprise a class of widely used ICs. Regulator IC units contain the
circuitry for reference source, comparator amplifier, control device, and overload protection
all in a single IC. IC units provide regulation of either a fixed positive voltage, a fixed
negative voltage, or an adjustably set voltage. The regulators can be selected for operation
with load currents from hundreds of milli amperes to tens of amperes, corresponding to
power ratings from milli watts to tens of watts.
A fixed three-terminal voltage regulator has an unregulated dc input voltage, Vi, applied
to one input terminal, a regulated dc output voltage, Vo, from a second terminal, with the
third terminal connected to ground. The series 78 regulators provide fixed positive regulated
voltages from 5 to24 volts. Similarly, the series 79 regulators provide fixed negative
regulated voltages from 5 to 24 volts.
Fig..5.7: Circuit diagram of Power supply

5.7. RFID

Radio-frequency identification is the use of a wireless non-contact system that uses radio-
frequency electromagnetic fields to transfer data from a tag attached to an object, for the
purposes of automatic identification and tracking. Some tags require no battery and are
powered by the electromagnetic fields used to read them. Others use a local power source and
emit radio waves (electromagnetic radiation at radio frequencies). The tag contains
electronically stored information which can be read from up to several meters (yards) away.
Unlike a bar code, the tag does not need to be within line of sight of the reader and may be
embedded in the tracked object.

5.7.1. RFID TAG

RFID tags are used in many industries. An RFID tag attached to an automobile during
production can be used to track its progress through the assembly line. Pharmaceuticals can
be tracked through warehouses. Livestock and pets may have tags injected, allowing positive
identification of the animal. RFID identity cards can give employees access to locked areas
of a building, and RF transponders mounted in automobiles can be used to bill motorists for
access to toll roads or parking.
Since RFID tags can be attached to clothing, possessions, or even implanted within
people, the possibility of reading personally-linked information without consent has raised
privacy concerns

Design

A radio-frequency identification system uses tags, or labels attached to the objects to be


identified. Two-way radio transmitter-receivers called interrogators or readers send a signal
to the tag and read its response. The readers generally transmit their observations to a
computer system running RFID software or RFID middleware.
The tag's information is stored electronically in a non-volatile memory. The RFID tag
includes a small RF transmitter and receiver. An RFID reader transmits an encoded radio
signal to interrogate the tag. The tag receives the message and responds with its identification
information. This may be only a unique tag serial number, or may be product-related
information such as a stock number, lot or batch number, production date, or other specific
information.
RFID tags can be either passive, active or battery assisted passive. An active tag has an on-
board battery and periodically transmits its ID signal. A battery assisted passive (BAP) has a
small battery on board and is activated when in the presence of a RFID reader. A passive tag
is cheaper and smaller because it has no battery. Instead, the tag uses the radio energy
transmitted by the reader as its energy source. The interrogator must be close for RF field to
be strong enough to transfer sufficient power to the tag. Since tags have individual serial
numbers, the RFID system design can discriminate several tags that might be within the
range of the RFID reader and read them simultaneously.
Tag Chip

The tag's chip or integrated circuit (IC) delivers performance, memory and extended
features to the tag. The chip is pre-programmed with a tag identifier (TID), a unique serial
number assigned by the chip manufacturer, and includes a memory bank to store the items'
unique tracking identifier (called an electronic product code or EPC).

Tag Antennas

Tag antennas collect energy and channel it to the chip to turn it on. Generally, the larger
the tag antenna's area, the more energy it will be able to collect and channel toward the tag
chip, and the further read range the tag will have.
There is no perfect antenna for all applications. It is the application that defines the
antenna specifications. Some tags might be optimized for a particular frequency band, while
others might be tuned for good performance when attached to materials that may not
normally work well for wireless communication (certain liquids and metals, for example).
Antennas can be made from a variety of materials; they can be printed, etched, or stamped
with conductive ink, or even vapour deposited onto labels.

5.7.2. RFID READERS

An RFID reader, also known as an interrogator, is a device that provides the connection
between the tag data and the enterprise system software that needs the information. The
reader communicates with tags that are within its field of operation, performing any number
of tasks including simple continuous inventorying, filtering (searching for tags that meet
certain criteria), writing (or encoding) to selected tags, etc.
The reader uses an attached antenna to capture data from tags. It then passes the data to a
computer for processing. Just like RFID tags, there are many different sizes and types of
RFID readers. Readers can be affixed in a stationary position in a store or factory, or
integrated into a mobile device such as a portable, handheld scanner. Readers can also be
embedded in electronic equipment or devices, and in vehicles.

Reader Antennas

RFID readers and reader antennas work together to read tags. Reader antennas convert
electrical current into electromagnetic waves that are then radiated into space where they can
be received by a tag antenna and converted back to electrical current. Just like tag antennas,
there is a large variety of reader antennas and optimal antenna selection varies according to
the solution's specific application and environment.
The two most common antenna types are linear- and circular-polarized antennas.
Antennas that radiate linear electric fields have long ranges, and high levels of power that
enable their signals to penetrate through different materials to read tags. Linear antennas are
sensitive to tag orientation; depending on the tag angle or placement, linear antennas can
have a difficult time reading tags. Conversely, antennas that radiate circular fields are less
sensitive to orientation, but are not able to deliver as much power as linear antennas.
5.8. RELAY

A relay is an electrically operated switch. Many relays used an electromagnet to operate a


switching mechanism mechanically, but other operating principles are also used. Relays
are used where it is necessary to control a circuit by a low-power signal (with complete
electrical isolation between control and controlled circuits), or where several circuits must
be controlled by one signal. The first relays were used in long distance telegraph circuits,
repeating the signal coming in from one circuit and re-transmitting it to another. Relays
were used extensively in telephone exchanges and early computers to perform logical
operations.

5.8.1. RELAY DRIVER CRICUIT

The relay driver circuit is enabled certain time duration only, such enable pulse is
depended by delay programming of microcontroller, here darling circuit has been two
transistors made connection of cascade network, if input is set to base of the first transistor,
then that is turn on and emitter current of that turn the another one. Hereby the circuit is
closed through coil and second transistor, now the energized coil is controls the contactors
that are change the normally open to close and normally closed to open connection. The
enabled signal is not essential after energized that coil because transistor collector current
maintains the transistors in saturation state continuously.
The induction effect may be affect the indication components and another thing, so diode
is connected across the coil which can prevents the chopping effect the inverse magnitude of
magnetic field shorted across from coil.

5.9. GSM

GSM is one of the widely used mobile standards. GSM is Global System for Mobile
Communication. As the name specifies, it enables the mobile users to interact all over the
world at any time. GSM was actually designed to be platform independent. Because GSM
provides a common standard, cellular subscribers can use their telephones over the entire
GSM area which includes all the countries around the world where the GSM system is used.
In addition, the GSM provides user services such as high-speed data communication,
facsimile and a Short Message Service (SMS). The GSM technical specifications are also
designed to work with other standards as it guarantees standard interfaces. Finally a key
aspect of GSM is that the specifications are open ended and can be built upon to meet the
future requirements.
5.9.1. MOBILE STANDARDS

The primary purpose of a standard for mobile communication is to specify how mobile
phone calls are to be handled by a mobile network.

This specification includes the following.

 The signals to be transmitted and received by the mobile phone.



 The format of these signals.

 The interaction of the network nodes.

 The basic network services which should be available to mobile subscribers.

5.9.2. SMS

SMS stands for Short Message Service. It is a technology that enables the sending and
receiving messages between the mobile phones. The SMS was included in the GSM (Global
System for Mobile Communication) standards right at the beginning. Later it was ported to
wireless technologies like CDMA and TDMA. The GSM and SMS standards were originally
developed by the ETSI. ETSI is the abbreviation for European Telecommunications
Standards Institute. Now the 3GPP (Third Generation Partnership Project) is
responsible for the development of GSM and SMS standards.
As suggested by the name ―Short Message Service” the amount of data that can be
supported by an SMS is very limited. One SMS message can contain at most 140 bytes.

5.9.3. ADVANTAGES OF GSM

SMS is a great success all over the world. SMS messaging is one of the most important
revenues of the wireless carriers. The number of messages exchanged every day is very
enormous.
Some of the reasons behind the popularity of the SMS are described below.

 SMS messages can be sent to an offline mobile phone

Unlike a phone call we can send the message to our friend when he / she has switched of the
mobile phone or he /she is in the place where the wireless signal is temporarily unavailable.
The SMS system of the mobile network operator will store the message and later send it to
our friend.

 SMS messages are less disturbing

Unlike a phone call, we need not read or reply an SMS message immediately. Besides
reading and writing the messages do not make any noise. We need not attend the messages
urgently as we do in case of an urgent phone call.

 SMS messages can be exchanged over different wireless carriers

SMS technology is a very mature technology. Not only can we exchange the messages with
the mobile users of same wireless carriers but also with the mobile users of different wireless
carriers. So the 100% GSM phones support Short Message Service.

5.9.4. APPLICATIONS OF GSM

There are many different kinds of SMS applications on the market today and many others
can be developed. Applications in which the SMS messaging can be utilized are virtually
unlimited. Some of the applications are described below.

 Person-to-Person Text Messaging

Person to person text messaging is the most commonly used SMS application. Here, a person
types a text message to his friend using the keypad of his mobile phone and then inputs the
mobile phone number of the recipient and clicks the Send option on the screen to send the
message out. When the recipient mobile phone receives the sent text message, it will notify
the user by giving out a sound or a vibration. The recipient can then read and respond either
immediately or at any time later.
 Provision of information

It is another popular application of the SMS technology. Many content providers make use of
the SMS text messages to send the information such as news, weather report and financial
data to their subscribers. Many of these information services are not free.

 Downloading

SMS can be used as a transport medium of wireless downloads since it carries binary data.
Objects such as pictures, wallpapers, and logos can be encoded in one or more SMS
messages depending upon the object‘s size. Like information services wireless download
services are also not free.

5.10. SERIAL COMMUNICATION

Several communications standards exist for the transfer of asynchronous serial data.
Common PC's transfer data using the EIA RS-232C (also known as V.28 or V.24). Updated
versions of this standard include RS-232D and EIA/TIA-232E, but most literature still refers
to the RS-232C or RS-232 standard. The baud rate for a serial connection is the number of
bits that are transmitted per second. It is specified in bits/second or baud. For example, a 110
baud serial link transfers 110 bits of data per second.

RS232 Standards

To allow compatibility among data communication equipment made by various


manufactures, an interfacing standard called RS232 was set by the Electronics Industries
Association (EIA) in 1960. RS232 is the most widely used serial I/O interfacing standard.

5.10.1. MAX 232

Since the RS232 standard was set long before the advent of the TTL logic family, its
input and output voltage levels are not TTL compatible. In RS232, a 1 bit is represented by -3
to -25 V, while a 0 bit is +3 to +25 V, making -3 to +3 undefined. For this reason, to connect
any Rs232 to a microcontroller system we must use voltage convertors such as MAX232 to
convert any RS232 the TTL logic levels to the RS232 voltage level, and vice versa. MAX232
IC chips are commonly referred to as line drivers. MAX 232 converts the RS232‘s signals to
the TTL voltage levels that will be acceptable to the 8051‘s TxD and RxD pins. The
MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa. One
advantage of the MAX232 chip is that it uses a +5 V power source which is the same as the
source voltage for the 8051. In other words,with a single +5 V power supply we can power
both the 8051 and MAX232, with no need for the dual power supplies that are common in
many older systems.
Fig..5.8. MAX 232

5.11. GPS

The Global Positioning System (GPS) is a global navigation satellite system (GNSS)
developed by the United States Department of Defence. It is the only fully functional GNSS
in the world. It uses a constellation of between 24 and 32 Medium Earth Orbit satellites that
transmit precise microwave signals, which allow GPS receivers to determine their current
location, the time, and their velocity. Its official name is NAVSTAR GPS.

5.11.1. CONCEPT OF GPS

A GPS receiver calculates its position by precisely timing the signals sent by the GPS
satellites high above the Earth. Each satellite continually transmits messages containing the
time the message was sent, precise orbital information (the ephemeris), and the general
system health and rough orbits of all GPS satellites (the almanac). The receiver measures the
transit time of each message and computes the distance to each satellite. Geometric
trilateration is used to combine these distances with the location of the satellites to determine
the receiver's location. The position is displayed, perhaps with a moving map display or
latitude and longitude; elevation information may be included. Many GPS units also show
derived information such as direction and speed, calculated from position changes.
5.11.2. POSITION CALCULATION

To provide an introductory description of how a GPS receiver works, measurement errors


will be ignored in this section. Using messages received from a minimum of four visible
satellites, a GPS receiver is able to determine the satellite positions and time sent. The x, y,
and z components of position and the time sent are designated as where the subscript i is the
satellite number and has the value 1, 2, 3, or 4. Knowing the indicated time the message was
received, the GPS receiver can compute the indicated transit time, of the message.
Assuming the message travelled at the speed of light, c, the distance travelled, can be
computed as. Knowing the distance from GPS receiver to a satellite and the position of a
satellite implies that the GPS receiver is on the surface of a sphere cantered at the position of
a satellite. Thus we know that the indicated position of the GPS receiver is at or near the
intersection of the surfaces of four spheres. In the ideal case of no errors, the GPS receiver
will be at an intersection of the surfaces of four spheres. The surfaces of two spheres, if they
intersect in more than one point, intersect in a circle. A figure, Two Sphere Surfaces
Intersecting in a Circle, is shown below.

Two sphere surfaces intersecting in a circle

The article, trilateration, shows mathematically that two spheres intersecting in more than
one point intersect in a circle.

A circle and sphere surface in most cases of practical interest intersects at two points,
although it is conceivable that they could intersect at one point—or not at all. Another figure,
Surface of Sphere Intersecting a Circle (not disk) at Two Points, shows this intersection. The
two intersections are marked with dots. Again trilateration clearly shows this mathematically.
The correct position of the GPS receiver is the intersection that is closest to the surface of the
earth for automobiles and other near-Earth vehicles. The correct position of the GPS receiver
is also the intersection which is closest to the surface of the sphere corresponding to the
fourth satellite. (The two intersections are symmetrical with respect to the plane containing
the three satellites. If the three satellites are not in the same orbital plane, the plane containing
the three satellites will not be a vertical plane passing through the centre of the Earth. In this
case one of the intersections will be closer to the earth than the other. The near-Earth
intersection will be the correct position for the case of a near-Earth vehicle. The intersection
which is farthest from Earth may be the correct position for space vehicles.
5.12. LCD DISPLAY

Liquid crystal cell displays (LCDs) are used in similar applications where LEDs are used.
These applications are display of display of numeric and alphanumeric characters in dot
matrix and segmental displays.

LCDs are of two types

I. Dynamic scattering type

II. Field effect type

The construction of a dynamic scattering liquid crystal cell. The liquid crystal material may
be one of the several components, which exhibit optical properties of a crystal though they
remain in liquid form. Liquid crystal is layered between glass sheets with transparent
electrodes deposited on the inside faces.
The construction of a field effect liquid crystal display is similar to that of the dynamic
scattering type, with the exception that two thin polarizing optical filters are placed at the
inside of each glass sheet. The liquid crystal material in the field effect cell is also of different
type from employed in the dynamic
scattering cell. The material used is twisted nemayic type and actually twists the light passing
through the cell when the latter is not energised.

Liquid crystal cells are of two types:

i. Transmittive type

ii. Reflective type

In the transmittive type cell, both glass sheets are transparent, so that light from a rear
source is scattered in the forward direction when the cell is activated.

The liquid crystals are light reflectors are transmitters and therefore they consume small
amounts of energy (unlike light generators). The seven segment display, the current is about
25micro Amps for dynamic scattering cells and 300micro amps for field effect cells. Unlike
LEDs which can work on d.c. the LCDs require a.c. voltage supply. A typical voltage supply
to dynamic scattering LCD is 30v peak to peak with 50 Hz
5.12.1. FEATURES OF LCD

1. Polarizing filter film with a vertical axis to polarize light as it enters.

2. Glass substrate with ITO electrodes. The shapes of these electrodes will determine the
shapes that will appear when the LCD is turned ON. Vertical ridges etched on the
surface are smooth.

3. Twisted nematic liquid crystal.

4. Glass substrate with common electrode film (ITO) with horizontal ridges to line up
with the horizontal filter.

5. Polarizing filter film with a horizontal axis to block/pass light.

6. Reflective surface to send light back to viewer. (In a backlit LCD, this layer is
replaced with a light source.)

A liquid crystal display (LCD) is a flat panel display, electronic visual display,
video display that uses the light modulating properties of liquid crystals (LCs). LCs don‘t
emit light directly.

5.12.2. PIN DIAGRAM

Fig.5.9. LCD diagram


5.12.3. ADVANTAGES

1. Consume much lesser energy (i.e. low power) when compared to LEDs.

2. Utilizes the light available outside and no generation of light.

3. Since very thin layer of liquid crystal is used, more suitable to act as display
elements (in digital watches, pocket calculators, ect.)

4. Since reflectivity is highly sensitive to temperature, used as temperature measuring


sensor.

5. Very cheap.

5.12.4. APPLICATIONS

1. Watches

2. Fax & Copy machines & Calculators


CHAPTER 6

SOFTWARE DESCRIPTION

6.1. PICkit Tool

Fig.6.1. PICkit

PICkit is a family of programmers for PIC microcontrollers made by Microchip


Technology. They are used to program and debug microcontrollers, as well as program
EEPROM. Some models also feature logic analyzer and serial communications (UART) tool.
The people who develop open-source software for the PICkit use a mailing list for
collaboration.

PICkit 1

The PICkit 1 — introduced on March 31, 2003 for US $36 — was a rudimentary USB
programmer for PIC microcontrollers, produced by Microchip Technology, the manufacturers
of the PIC series of microcontrollers. It was integrated into a demo board featuring 8 LEDs, a
switch, and a potentiometer. Its default program (explained in the documentation) rotates the
LEDs in series. The light display's direction and speed of rotation can be changed with the
button and potentiometer on the PICkit board.

PICkit 2

The PICkit 2 — introduced in May 2005 — replaced the PICkit 1. The most notable
difference between the two is that the PICkit 2 has a separate programmer/debugger unit
which plugs into the board carrying the chip to be programmed, whereas the PICkit 1 was a
single unit. This makes it possible to use the programmer with a custom circuit board via an
In Circuit Serial Programming (ICSP) header. This feature is not intended for so-called
"production" programming, however.

The PICkit 2 uses an internal PIC18F2550 with Full Speed USB. The latest PICkit 2
firmware allows the user to program and debug most of the 8 and 16 bit PICmicro and dsPIC
members of the Microchip product line.
Fig.6.2. PIC kit 2

The PICkit 2 is open to the public, including its hardware schematic, firmware source code
(in C language) and application programs (in C# language). End users and third parties can
easily modify both the hardware and software for enhanced features. e.g. GNU/Linux version
of PICKit 2 application software, DOS style CMD support, etc.

PICkit 3

Microchip has gone on to manufacture the PICkit 3, a variation of the PICkit 2 with the
same form factor and a new translucent case. It features a faster 16-bit PIC24F processor and
a wider voltage regulation range. There are some complaints of it not being as reliable as the
Pickit 2.

Fig.6.3. PIC kit 3

Both PIC kit 2 and PICkit 3 have internal, switch-mode voltage regulators. This allows
them, in the case of the PICkit 2, to generate voltages from 2.5 to 5 volts, or in the case of the
PICkit 3, 2.5 to 5.5 volts, from 5V USB, at around 100mA. Both have options for calibrating
the output with a multi meter, for increased accuracy. Additionally, for some PICs, the
MCLR programming voltage can be generated, at around 13-14 volts. This voltage is
required to reprogram the flash memory.

6.2. MPLAB IDE

COMPONENTS OF MPLAB IDE

The MPLAB IDE has both built-in components and plug-in modules to configure
the system for a variety of software and hardware tools.

Project Manager

The project manager provides integration and communication between the IDE and
the language tools.
Editor

The editor is a full-featured programmer's text editor that also serves as a window
into the debugger.

Assembler/Linker and Language Tools

The assembler can be used stand-alone to assemble a single file, or can be used with the
linker to build a project from separate source files, libraries and recompiled objects. The
linker is responsible for positioning the compiled code into memory areas of the target
microcontroller.

Debugger

The Microchip debugger allows breakpoints, single stepping, watch windows and all
the features of a modern debugger for the MPLAB IDE. It works in conjunction with the
editor to reference information from the target being debugged back to the source code.

Execution Engines

There are software simulators in MPLAB IDE for all PIC micro MCU and dsPIC DSC
devices. These simulators use the PC to simulate the instructions and some peripheral
functions of the PIC micro MCU and dsPIC DSC devices. Optional in-circuit emulators and
in-circuit debuggers are also available to test code as it runs in the applications hardware.

The MPLAB IDE provides the ability to

 Create and edit source code using the built-in editor.



 Assemble, compile and link source code.

 Debug the executable logic by watching program flow with the built-in simulator or
in real time with in-circuit emulators or in-circuit debuggers.

 Make timing measurements with the simulator or emulator.

 View variables in Watch windows.

 Program firmware into devices with device programmers


6.3. EMBEDDED C

Embedded C uses most of the syntax and semantics of standard C, e.g., main() function,
variable definition, data type declaration, conditional statements (if, switch, case), loops
(while, for), functions, arrays and strings, structures and union, bit operations, macros, etc.

Necessity

During infancy years of microprocessor based systems, programs were developed using
assemblers and fused into the EPROMs. There used to be no mechanism to find what the
program was doing. LEDs, switches, etc. were used to check for correct execution of the
program. Some ‗very fortunate‘ developers had In-Circuit Emulator's (ICE's), but they were
too costly and were not quite reliable as well. As time progressed, use of microprocessor-
specific assembly-only as the programming language reduced and embedded systems moved
onto C as the embedded programming language of choice. C is the most widely used
programming language for embedded processors/controllers. Assembly is also used but
mainly to implement those portions of the code where very high timing accuracy, code size
efficiency, etc. are prime requirements.

As assembly language programs are specific to a processor, assembly language didn‘t offer
portability across systems. To overcome this disadvantage, several high level languages,
including C, came up. Some other languages like PLM, Modula-2, Pascal, etc. also came but
couldn‘t find wide acceptance. Amongst those, C got wide acceptance for not only embedded
systems, but also for desktop applications. Even though C might have lost its sheen as a
mainstream language for general purpose applications, it still has a strong-hold in embedded
programming. Due to the wide acceptance of C in embedded systems, various kinds of
support tools like compilers & cross-compilers, ICE, etc. came up, and all this facilitated
development of embedded systems using C. Assembly language seems to be an obvious
choice for programming embedded devices. However, use of assembly language is restricted
to developing efficient codes in terms of size and speed. Also, assembly codes lead to higher
software development costs and code portability is not there. Developing small codes are not
much of a problem, but large programs/projects become increasingly difficult to manage in
assembly language. Finding good assembly programmers has also become difficult. Hence
high level languages are preferred for embedded systems programming.
Advantages

 It is small and simpler to learn, understand, program and debug.



 Compared to assembly language, C code written is more reliable and scalable, more
portable between different platforms.

 C compilers are available for almost all embedded devices in use today, and there is a
large pool of experienced C programmers.

 Unlike assembly, C has advantage of processor-independence and is not specific to
any particular microprocessor/microcontroller or any system. This makes it
convenient for a user to develop programs that can run on most of the systems.

 As C combines functionality of assembly language and features of high level
languages, C is treated as a ‗middle-level computer language‘ or ‗high level
assembly language‘.

 It supports access to I/O and provides ease of management of large embedded
projects.

6.4. WORKING

When the engine is ignited, the school bus starts to move and the module gets triggered
on with the help of a power supply unit. The power supply unit has a transformer (step-
down), bridge rectifier and LM7805 IC. The transformer is used to convert 230V AC power
supply to 12V AC supply. The bridge rectifier converts this AC power supply to DC voltage.
IC LM7805 is used to prevent the controller from the damage in case of any voltage
fluctuations. From this unit, the power supply is given to all other units. There is a provision
for noise filtering using ceramic capacitors.
There are two relays namely relay 1 and relay 2. Relay 1 has a connection with RFID and
GSM. Relay 2 is connected with both GPS and GSM. GSM is serially connected to the PIC
micro-controller with the help of an UART. As GSM works on AC supply, the DC supply
from the PIC microcontroller is converted into the AC supply with the help of UART.
Whenever the valid tag is read, the reader is connected to the relay 1 and the connection
between the relay 2 and GPS will be disconnected. As GPS is a continuous monitoring
system the last tracked location is sent to the microcontroller. The count of the number of
students getting into the bus is displayed on the LCD through the PIC micro controller. Here
we have used 16x2 LCD displays which has two rows and it has 16 characters in each row
which is used to display the student information stored in the RFID tag. For the entry of each
student into the bus, the student‘s status with the location is sent to the respective parents
with the help of GSM. In the same way how the message reaches the parent when the student
boarded the bus, the message again reaches the parents even when they get down from the
bus. The student attendance is recorded in the controller which can be sent to the
management manually.
6.5 .WORKING MODEL
CHAPTER 7

7.1. CONCLUSION

This project presents a system to monitor pick-up/drop-off of school children to enhance the
safety of children during the daily transportation from and to school. The system consists of two
main units, a bus unit and a school unit. The bus unit the system is used to detect when a child boards
or leaves the bus. This information is communicated to the school unit that identifies which of the
children did not board or leave the bus and issues an alert message accordingly. The system has a
developed web-based database-driven application that facilities its management and provides useful
information about the children to authorized personal. A complete prototype of the proposed system
was implemented and tested to validate the system functionality. The results show that the system is
promising for daily transportation safety.

7.2.REFERENCES

[1] Khaled Shaaban et.al ―5Smart Tracking System for School Buses Using Passive RFID
Technology to Enhance Child Safety‖ , Journal of Traffic

and Logistics Engineering, Vol 1( 2), pages: 191-196, Dec 2013.

[2] Seong-eun Yoo, Poh Kit Chong, Daeyoung Kim, ―School Zone Safety

System Based on Wireless Sensor Network‖, Journal of Sensors, Vol 9, Pages 5968-5988, July 2009.

[3] G. Bharathi, L.Rammurthy , ― Implementation of children tracking system using ARM7


microcontroller‖, International Journal of Industrial Electronics

and Electrical Engineering, Volume-2(12): pages 18-21, Dec.-2014.

[4] V.SivaSankaran et.al , ― Advanced embedded system assisted GSM and

RFID based smart school management system‖ , International journal of advanced research in
electrical , Electronics and Instrumentation Engineering, Vol 2(7): pages 3124-3128, July 2013.

[5] M. Navya, et.al , ― Android based children tracking system using voice

recognition‖, International journal of Computer science and information technology,Vol 4 (1): pages
229-235, Jan 2015.

[6] Khaled Shaaban et.al, ―Smart Tracking System for School Buses Using Passive RFID
Technology to Enhance Child Safety ― , Journal of Traffic and Logistics Engineering, Vol 1( 2):
pages 191-196, Dec 2013.

[7] J.Saranya , J.Selvakumar, ―Implementation of Children Tracking System on Android Mobile


Terminals ― , International conference on Communication and
Signal Processing, April 3-5, 2013, India 9

Vous aimerez peut-être aussi