Académique Documents
Professionnel Documents
Culture Documents
BACHELOR OF ENGINEERING
Submitted by
S.SUSMITHA(16103099 )
VIVEKANANDHA
COLLEGE OF ENGINEERING FOR WOMEN
[Autonomous]
Approved by AICTE, New Delhi and Accredited by NBA
Affiliated to Anna University, Chennai-25,
An ISO 9001-2008Certified Institution
Elayampalayam, Tiruchengode, Namakkal Dt. – 637205
NOVEMBER-2019
VIVEKANANDHA COLLEGE OF ENGINEERING FORWOMEN
Elayampalayam, Tiruchengode, Namakkal Dt. - 637205
Certificate
This is to certify that the Internship and Summer Training Report entitled " BUS SAFETY
SYSTEM FOR CHILDREN BY USING RFID AND GSM ", in partial fulfilment of the
requirements for the award of the Degree of (BACHELOR OF ENGINEERING) is a
record of original training undergone by S.SUSMITHA( 16103099) during the year
NOVEMBER 2019 of her study in the Department of ELECTRONICS AND
COMMUNICATION ENGINEERING,Vivekanandha College of Engineering for
Women under my supervision and the report has not formed the basis for the award of any
Degree/Fellowship or other similar title to any candidate of any University.
INTERNAL EXAMINER
DECLARATION
I, (S.SUSMITHA), hereby declare that the Internship and Summer Training Report, entitled
" BUS SAFETY SYSTEM FOR CHILDREN BY USING RFID AND GSM ",
submitted to the Vivekanandha College of Engineering for Women in partial fulfillment
of the requirements for the award of the Degree of BACHELOR OF ENGINEERING
is a record of original training undergone by me during the period NOVEMBER-2018
under the supervision and guidance of Mr.M.Balasubraaniyam,M.E., Assistant Professor
Vivekanandha College of Engineering for Women and it has not formed the basis for
the award of any Degree/Fellowship or other similar title to any candidate of any University.
Date:
ACKNOWLEDGEMENT
Finally, I wish to thank the almighty and all the teaching and non-teaching staff
members of our department for their support towards the successful completion of our
internship training and summer project.
.
TABLE OF CONTENTS
No
Certificate
Company
certificate
Declaration
Acknowledgement
Content
List of figures
List of abbreviations
Introduction
Bus safety system for school children using rfid and gsm
5.1. Abstract
5.2.introduction
5.3.1.block diagram
5.3.2.description
5.4.circuit diagram
5.4.1.description
5.5.pic microcontroller
5.5.1.pic16f887
5.5.2.block diagram
5.5.3.pin diagram
5.5.4 .stack
5.5.5.status register
5.5.6.i/o ports
5.5.7.instruction set
5.6.1.block diagram
5.6.2.working principle
5.7.rfid
5.7.1.rfid tag
5.8.relay
5.9.gsm
5.9.1.mobile standards
5.9.2.sms
5.9.3.advantages of gsm
5.9.4.applications of gsm
5.10.serial communication
5.10.1.max232
5.11.gps
5.11.1.concept of gps
5.11.2.position calculation
5.12.lcd
5.12.1.features
5.12.2.pin diagram
5.12.3.advantages
5.12.4.applications
6.software description
6.3.embedded c
6.4 working
6.5.working module
7.conclusion
references
LIST OF FIGURES
1. BLOCK DIAGRAM
2. CIRCUIT DIAGRAM
5. STACK
8. MAX232
10. PICKIT1
11. PICKIT2
12. PICKIT3
LIST OF
ABBREV
ATIONS
CMD Command
5.1 ABSTRACT
With the advancement of the crime rate, security is having its alarming significance for
school children‘s. The safety mechanism to the school bus and to the children travelling from
home to the school and resume back to home is a standalone component to the parents and to
the school management. This project aims to provide the total security for school children.
Each student is tagged with unique code. The module is placed at the entrance and exit
location of the bus. Wireless communication technology RFID is used to inform the status of
the bus to the school principal. The student record will be sent to the concerned parent before
leaving the children entry point. The return information is also informed to the parent using
GSM technology. The results are favourably good to meet the challenges of the security
issues.
5.2 INTRODUCTION
School buses transfers millions of children daily in various countries around the world. While
there many issues that might disturb the parents regarding the travel safety of school going
children, the project intends to look into introducing access safety in respect of school buses
through bus safety system that will help the school children‘s transportation in a secure and
safer way. The supervision of the regularity of students during their entry and exit from the
bus is difficult to be controlled by drivers, which led to endangering child safety. The
phenomenon of forgetting kids on the bus is one of the problems suffered by the children,
which has increased significantly in recent years. This has often led to the death of many
students on account of suffocation due to the lack of attention of derivers. This project,
through entry and exit recordings, aims to create a suitable environment by following certain
set of criteria of security and safety for school bus that will have a positive impact on the
student and their family. The project proposed a bus safety system which was designed to
control the entering/exiting of students from the bus. This system does several tasks,
including identifying personal information (Eg Name) of each student using RFID tag, which
will exchange the data with the RFID reader via radio waves, and displaying student count
into LCD display. This will let the driver to know the number of students inside the bus and
the students who departed from the bus. Moreover, the system has an emergency system that
will alert in case if there is a child inside the bus after the bus stops at the destination by
sending an SMS to the school management via GSM modem. In addition, if the bus depart
and arrive successful from the source to destination, it will inform the management through
an SMS about its successful departure and arrival. The key novel feature of the proposed
methodology is the use of energy efficient systems to support the tasks.
5.3. HARDWARE DESCRIPTION
RFID LEVEL
CONVERTE
CARD1 R GSM
RFID
CARD2 GPS
EMBEDDED
SYSTEM
DRIVER
RFID
RFID
CARD3 READER
RFID
POWER
CARD4 DISPLAY SUPPLY
5.3.2. DESCRIPTION
The RFID card information is sensed using the RFID reader which is matched with the
pre-defined information in the embedded system and the card information is displayed using
a display unit. GSM and embedded system is serially connected and the required conversion
is performed by the level converter. A driver is used to switch between the RFID reader and
GPS. A power supply unit is used to supply power to all the modules.
5.4 CIRCUIT DIAGRAM
5.4 .1 DESCRIPTION
The power supply unit is used to supply 5V to PIC Micro-Controller and 12V to all other
modules. The 16x2 LCD display, two relays, MAX232 are interfaced to PIC Micro-
Controller through the interfacing pins. MAX232 performs the required level conversion
among PIC, relay1, relay2 and GSM. Relay1 switches between GPS and GSM. Relay2
switches between RFID reader and Relay1. The LCD displays the RFID card information.
5.5 PIC MICROCONTROLLER
5.5.1 PIC16F887
PICs have a hardware call stack, which is used to save return addresses. The hardware
stack is not software accessible on earlier devices, but this changed with the 18 series
devices.
Hardware support for a general purpose parameter stack was lacking in early series, but
this greatly improved in the 18 series, making the 18 series architecture more friendly to high
level language compilers.
Fig.5.5 Stack
5.5.5 STATUS REGISTER
It is recommended to use the BCF and BSF instructions for bit manipulation and the
MOVWF instruction for byte manipulation of the STATUS register.
The 16F887 provides various PORT I/O pins – These can be Used to interface to the
―outside world‖. A total of 35 I/O pins are provided by the 16F887 and are divided into
various PORTS.
PORT:ABCDE
PINS:88883
The I/O pins can be individually programmed to be either inputs or outputs. Many of the
I/O pins are shared with another functionality. One needs to program the 16F887 for the
desired functionality.
The RA4 pin is a Schmitt Trigger input and an open drain output. All other RA port pins
have TTL input levels and full CMOS output drivers. All pins have data direction bits
(TRIS registers) which can configure these pins as output or input .Setting a TRISA
register bit puts the corresponding output driver in a hi-impedance mode. Clearing a bit in
the TRISA register puts the contents of the output latch on the selected pin(s).
The ANSEL register is used to configure the Input mode of an I/O pin to analog. Setting
the appropriate ANSEL bit high will cause all digital reads on the pin to be read as ‗0‘
and allow analog functions on the pin to operate correctly.
PORTB and the TRISB Register:
PORTB is an 8-bit wide bi-directional port. The corresponding data direction register is
TRISB. Setting a bit in the TRISB register puts the corresponding output driver in a high-
impedance input mode. Clearing a bit in the TRISB register puts the contents of the output
latch on the selected pins.
The ANSELH register is used to configure the input mode of a PORTB I/O pin to analog.
Setting the appropriate ANSELH bit high will cause all digital reads on the pin to be read as
‗0‘ and allow analog functions on the pin to operate correctly. All of the PORTB pins are
individually configurable as an interrupt-on-change pin. Control bits IOCB<7:0> enable or
disable the interrupt function for each pin. For enabled interrupt-on-change pins, the present
value is compared with the old value latched on the last read of PORTB to determine which
bits have changed or mismatched the old value. The ‗mismatch‘ outputs of the last read are
ORed together to set the PORTB Change Interrupt flag bit (RBIF) in the INTCON register. A
mismatch condition will continue to set flag bit RBIF. Reading or writing PORTB will end
the mismatch condition and allow flag bit RBIF to be cleared.
PORTD is an 8-bit port with Schmitt Trigger input buffers. Each pin is individually
configurable as an input or output.
PORTE register:
PORTE provides a 3-bit wide, bidirectional port on RE0, RE1, and RE2 pins. The
exception is RE3, which is input only and its TRISE bit will always read as ‗1‘. The
corresponding data direction register is TRISE (1 input, 0 output). Reading the PORTE
register reads the status of the pins, whereas writing to it will write to the PORT latch. The
TRISE register controls the PORTE pin output drivers, even when they are being used as
analog inputs. The user should ensure the bits in the TRISE register are maintained set when
using them as analog inputs. I/O pins configured as analog input always read ‗0‘. The
ANSEL register must be initialized to configure an analog channel as a digital input. Pins
configured as analog inputs will read ‗0‘.
5.5.7. INSTRUCTION SET
A PIC's instructions vary from about 35 instructions for the low-end PICs to over 80
instructions for the high-end PICs. The instruction set includes instructions to perform a
variety of operations on registers directly, the accumulator and a literal constant or the
accumulator and a register, as well as for conditional execution, and program branching.
To load a constant, it is necessary to load it into W before it can be moved into another
register. On the older cores, all register moves needed to pass through W, but this changed on
the "high end" cores.PIC cores have skip instructions which are used for conditional
execution and branching. The skip instructions are: 'skip if bit set', and, 'skip if bit not set'.
Because cores before PIC18 had only unconditional branch instructions, conditional jumps
are implemented by a conditional skip (with the opposite condition) followed by an
unconditional branch. Skips are also of utility for conditional execution of any immediate
single following instruction.
W PIC instructions fall into 5 classes: Operation on W with 8-bit immediate ("literal")
operand. E.g. movlw (move literal to W), andlw (AND literal with W). One instruction
peculiar to the PIC is retlw, load immediate into W and return, which is used with computed
branches to produce lookup tables. Operation with W and indexed register. The result can be
written to either the register (e.g. addwfreg,w). or the selected register (e.g. addwfreg,f). The
latter are usedto perform conditional branches. The usual ALU status flags are available in a
numbered register so operations such as "branch on carry clear" are possible. Control
transfers. Other than the skip instructions previously mentioned, there are only two:goto and
call.
The ac voltage, typically 220V rms, is connected to a transformer, which steps that ac
voltage down to the level of the desired dc output. A diode rectifier then provides a full-wave
rectified voltage that is initially filtered by a simple capacitor filter to produce a dc voltage.
This resulting dc voltage usually has some ripple or ac voltage variation.
A regulator circuit removes the ripples and also remains the same dc value even if the
input dc voltage varies, or the load connected to the output dc voltage changes. This voltage
regulation is usually obtained using one of the popular voltage regulator IC units.
5.6.1 BLOCK DIAGRAM
IC REGULATOR
TRANSFORMER RECTIFIER FILTER LOAD
Transformer
The potential transformer will step down the power supply voltage (0-230V) to (0-
6V) level. Then the secondary of the potential transformer will be connected to the precision
rectifier, which is constructed with the help of op– amp. The advantages of using precision
rectifier are it will give peak voltage output as DC, rest of the circuits will give only RMS
output.
Bridge rectifier
When four diodes are connected as shown in figure, the circuit is called as bridge rectifier.
The input to the circuit is applied to the diagonally opposite corners of the network, and the
output is taken from the remaining two corners.
Let us assume that the transformer is working properly and there is a positive potential, at
point A and a negative potential at point B. the positive potential at point A will forward bias
D3 and reverse bias D4.
The negative potential at point B will forward bias D1 and reverse D2. At this time D3
and D1 are forward biased and will allow current flow to pass through them; D4 and D2 are
reverse biased and will block current flow. The path for current flow is from point B through
D1, up through RL, through D3, through the secondary of the transformer back to point B.
this path is indicated by the solid arrows. Waveforms (1) and (2) can be observed across D1
and D3.
One-half cycle later the polarity across the secondary of the transformer reverse, forward
biasing D2 and D4 and reverse biasing D1 and D3. Current flow will now be from point A
through D4, up through RL, through D2, through the secondary of T1, and back to point A.
This path is indicated by the broken arrows. Waveforms (3) and (4) can be observed across
D2 and D4. The current flow through RL is always in the same direction. In flowing through
RL this current develops a voltage corresponding to that shown waveform (5). Since current
flows through the load (RL) during both half cycles of the applied voltage, this bridge
rectifier is a full-wave rectifier.
One advantage of a bridge rectifier over a conventional full-wave rectifier is that with a
given transformer the bridge rectifier produces a voltage output that is nearly twice that of the
conventional full-wave circuit.
This may be shown by assigning values to some of the components shown in views A and
B. assume that the same transformer is used in both circuits. The peak voltage developed
between points X and y is 1000 volts in both circuits. In the conventional full-wave circuit
shown—in view A, the peak voltage from the center tap to either X or Y is 500 volts. Since
only one diode can conduct at any instant, the maximum voltage that can be rectified at any
instant is 500 volts.
The maximum voltage that appears across the load resistor is nearly-but never exceeds-
500 v0lts, as result of the small voltage drop across the diode. In the bridge rectifier shown in
view B, the maximum voltage that can be rectified is the full secondary voltage, which is
1000 volts. Therefore, the peak output voltage across the load resistor is nearly 1000 volts.
With both circuits using the same transformer, the bridge rectifier circuit produces a higher
output voltage than the conventional full-wave rectifier circuit.
IC voltage regulator
Voltage regulators comprise a class of widely used ICs. Regulator IC units contain the
circuitry for reference source, comparator amplifier, control device, and overload protection
all in a single IC. IC units provide regulation of either a fixed positive voltage, a fixed
negative voltage, or an adjustably set voltage. The regulators can be selected for operation
with load currents from hundreds of milli amperes to tens of amperes, corresponding to
power ratings from milli watts to tens of watts.
A fixed three-terminal voltage regulator has an unregulated dc input voltage, Vi, applied
to one input terminal, a regulated dc output voltage, Vo, from a second terminal, with the
third terminal connected to ground. The series 78 regulators provide fixed positive regulated
voltages from 5 to24 volts. Similarly, the series 79 regulators provide fixed negative
regulated voltages from 5 to 24 volts.
Fig..5.7: Circuit diagram of Power supply
5.7. RFID
Radio-frequency identification is the use of a wireless non-contact system that uses radio-
frequency electromagnetic fields to transfer data from a tag attached to an object, for the
purposes of automatic identification and tracking. Some tags require no battery and are
powered by the electromagnetic fields used to read them. Others use a local power source and
emit radio waves (electromagnetic radiation at radio frequencies). The tag contains
electronically stored information which can be read from up to several meters (yards) away.
Unlike a bar code, the tag does not need to be within line of sight of the reader and may be
embedded in the tracked object.
RFID tags are used in many industries. An RFID tag attached to an automobile during
production can be used to track its progress through the assembly line. Pharmaceuticals can
be tracked through warehouses. Livestock and pets may have tags injected, allowing positive
identification of the animal. RFID identity cards can give employees access to locked areas
of a building, and RF transponders mounted in automobiles can be used to bill motorists for
access to toll roads or parking.
Since RFID tags can be attached to clothing, possessions, or even implanted within
people, the possibility of reading personally-linked information without consent has raised
privacy concerns
Design
The tag's chip or integrated circuit (IC) delivers performance, memory and extended
features to the tag. The chip is pre-programmed with a tag identifier (TID), a unique serial
number assigned by the chip manufacturer, and includes a memory bank to store the items'
unique tracking identifier (called an electronic product code or EPC).
Tag Antennas
Tag antennas collect energy and channel it to the chip to turn it on. Generally, the larger
the tag antenna's area, the more energy it will be able to collect and channel toward the tag
chip, and the further read range the tag will have.
There is no perfect antenna for all applications. It is the application that defines the
antenna specifications. Some tags might be optimized for a particular frequency band, while
others might be tuned for good performance when attached to materials that may not
normally work well for wireless communication (certain liquids and metals, for example).
Antennas can be made from a variety of materials; they can be printed, etched, or stamped
with conductive ink, or even vapour deposited onto labels.
An RFID reader, also known as an interrogator, is a device that provides the connection
between the tag data and the enterprise system software that needs the information. The
reader communicates with tags that are within its field of operation, performing any number
of tasks including simple continuous inventorying, filtering (searching for tags that meet
certain criteria), writing (or encoding) to selected tags, etc.
The reader uses an attached antenna to capture data from tags. It then passes the data to a
computer for processing. Just like RFID tags, there are many different sizes and types of
RFID readers. Readers can be affixed in a stationary position in a store or factory, or
integrated into a mobile device such as a portable, handheld scanner. Readers can also be
embedded in electronic equipment or devices, and in vehicles.
Reader Antennas
RFID readers and reader antennas work together to read tags. Reader antennas convert
electrical current into electromagnetic waves that are then radiated into space where they can
be received by a tag antenna and converted back to electrical current. Just like tag antennas,
there is a large variety of reader antennas and optimal antenna selection varies according to
the solution's specific application and environment.
The two most common antenna types are linear- and circular-polarized antennas.
Antennas that radiate linear electric fields have long ranges, and high levels of power that
enable their signals to penetrate through different materials to read tags. Linear antennas are
sensitive to tag orientation; depending on the tag angle or placement, linear antennas can
have a difficult time reading tags. Conversely, antennas that radiate circular fields are less
sensitive to orientation, but are not able to deliver as much power as linear antennas.
5.8. RELAY
The relay driver circuit is enabled certain time duration only, such enable pulse is
depended by delay programming of microcontroller, here darling circuit has been two
transistors made connection of cascade network, if input is set to base of the first transistor,
then that is turn on and emitter current of that turn the another one. Hereby the circuit is
closed through coil and second transistor, now the energized coil is controls the contactors
that are change the normally open to close and normally closed to open connection. The
enabled signal is not essential after energized that coil because transistor collector current
maintains the transistors in saturation state continuously.
The induction effect may be affect the indication components and another thing, so diode
is connected across the coil which can prevents the chopping effect the inverse magnitude of
magnetic field shorted across from coil.
5.9. GSM
GSM is one of the widely used mobile standards. GSM is Global System for Mobile
Communication. As the name specifies, it enables the mobile users to interact all over the
world at any time. GSM was actually designed to be platform independent. Because GSM
provides a common standard, cellular subscribers can use their telephones over the entire
GSM area which includes all the countries around the world where the GSM system is used.
In addition, the GSM provides user services such as high-speed data communication,
facsimile and a Short Message Service (SMS). The GSM technical specifications are also
designed to work with other standards as it guarantees standard interfaces. Finally a key
aspect of GSM is that the specifications are open ended and can be built upon to meet the
future requirements.
5.9.1. MOBILE STANDARDS
The primary purpose of a standard for mobile communication is to specify how mobile
phone calls are to be handled by a mobile network.
5.9.2. SMS
SMS stands for Short Message Service. It is a technology that enables the sending and
receiving messages between the mobile phones. The SMS was included in the GSM (Global
System for Mobile Communication) standards right at the beginning. Later it was ported to
wireless technologies like CDMA and TDMA. The GSM and SMS standards were originally
developed by the ETSI. ETSI is the abbreviation for European Telecommunications
Standards Institute. Now the 3GPP (Third Generation Partnership Project) is
responsible for the development of GSM and SMS standards.
As suggested by the name ―Short Message Service” the amount of data that can be
supported by an SMS is very limited. One SMS message can contain at most 140 bytes.
SMS is a great success all over the world. SMS messaging is one of the most important
revenues of the wireless carriers. The number of messages exchanged every day is very
enormous.
Some of the reasons behind the popularity of the SMS are described below.
Unlike a phone call we can send the message to our friend when he / she has switched of the
mobile phone or he /she is in the place where the wireless signal is temporarily unavailable.
The SMS system of the mobile network operator will store the message and later send it to
our friend.
Unlike a phone call, we need not read or reply an SMS message immediately. Besides
reading and writing the messages do not make any noise. We need not attend the messages
urgently as we do in case of an urgent phone call.
SMS technology is a very mature technology. Not only can we exchange the messages with
the mobile users of same wireless carriers but also with the mobile users of different wireless
carriers. So the 100% GSM phones support Short Message Service.
There are many different kinds of SMS applications on the market today and many others
can be developed. Applications in which the SMS messaging can be utilized are virtually
unlimited. Some of the applications are described below.
Person to person text messaging is the most commonly used SMS application. Here, a person
types a text message to his friend using the keypad of his mobile phone and then inputs the
mobile phone number of the recipient and clicks the Send option on the screen to send the
message out. When the recipient mobile phone receives the sent text message, it will notify
the user by giving out a sound or a vibration. The recipient can then read and respond either
immediately or at any time later.
Provision of information
It is another popular application of the SMS technology. Many content providers make use of
the SMS text messages to send the information such as news, weather report and financial
data to their subscribers. Many of these information services are not free.
Downloading
SMS can be used as a transport medium of wireless downloads since it carries binary data.
Objects such as pictures, wallpapers, and logos can be encoded in one or more SMS
messages depending upon the object‘s size. Like information services wireless download
services are also not free.
Several communications standards exist for the transfer of asynchronous serial data.
Common PC's transfer data using the EIA RS-232C (also known as V.28 or V.24). Updated
versions of this standard include RS-232D and EIA/TIA-232E, but most literature still refers
to the RS-232C or RS-232 standard. The baud rate for a serial connection is the number of
bits that are transmitted per second. It is specified in bits/second or baud. For example, a 110
baud serial link transfers 110 bits of data per second.
RS232 Standards
Since the RS232 standard was set long before the advent of the TTL logic family, its
input and output voltage levels are not TTL compatible. In RS232, a 1 bit is represented by -3
to -25 V, while a 0 bit is +3 to +25 V, making -3 to +3 undefined. For this reason, to connect
any Rs232 to a microcontroller system we must use voltage convertors such as MAX232 to
convert any RS232 the TTL logic levels to the RS232 voltage level, and vice versa. MAX232
IC chips are commonly referred to as line drivers. MAX 232 converts the RS232‘s signals to
the TTL voltage levels that will be acceptable to the 8051‘s TxD and RxD pins. The
MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa. One
advantage of the MAX232 chip is that it uses a +5 V power source which is the same as the
source voltage for the 8051. In other words,with a single +5 V power supply we can power
both the 8051 and MAX232, with no need for the dual power supplies that are common in
many older systems.
Fig..5.8. MAX 232
5.11. GPS
The Global Positioning System (GPS) is a global navigation satellite system (GNSS)
developed by the United States Department of Defence. It is the only fully functional GNSS
in the world. It uses a constellation of between 24 and 32 Medium Earth Orbit satellites that
transmit precise microwave signals, which allow GPS receivers to determine their current
location, the time, and their velocity. Its official name is NAVSTAR GPS.
A GPS receiver calculates its position by precisely timing the signals sent by the GPS
satellites high above the Earth. Each satellite continually transmits messages containing the
time the message was sent, precise orbital information (the ephemeris), and the general
system health and rough orbits of all GPS satellites (the almanac). The receiver measures the
transit time of each message and computes the distance to each satellite. Geometric
trilateration is used to combine these distances with the location of the satellites to determine
the receiver's location. The position is displayed, perhaps with a moving map display or
latitude and longitude; elevation information may be included. Many GPS units also show
derived information such as direction and speed, calculated from position changes.
5.11.2. POSITION CALCULATION
The article, trilateration, shows mathematically that two spheres intersecting in more than
one point intersect in a circle.
A circle and sphere surface in most cases of practical interest intersects at two points,
although it is conceivable that they could intersect at one point—or not at all. Another figure,
Surface of Sphere Intersecting a Circle (not disk) at Two Points, shows this intersection. The
two intersections are marked with dots. Again trilateration clearly shows this mathematically.
The correct position of the GPS receiver is the intersection that is closest to the surface of the
earth for automobiles and other near-Earth vehicles. The correct position of the GPS receiver
is also the intersection which is closest to the surface of the sphere corresponding to the
fourth satellite. (The two intersections are symmetrical with respect to the plane containing
the three satellites. If the three satellites are not in the same orbital plane, the plane containing
the three satellites will not be a vertical plane passing through the centre of the Earth. In this
case one of the intersections will be closer to the earth than the other. The near-Earth
intersection will be the correct position for the case of a near-Earth vehicle. The intersection
which is farthest from Earth may be the correct position for space vehicles.
5.12. LCD DISPLAY
Liquid crystal cell displays (LCDs) are used in similar applications where LEDs are used.
These applications are display of display of numeric and alphanumeric characters in dot
matrix and segmental displays.
The construction of a dynamic scattering liquid crystal cell. The liquid crystal material may
be one of the several components, which exhibit optical properties of a crystal though they
remain in liquid form. Liquid crystal is layered between glass sheets with transparent
electrodes deposited on the inside faces.
The construction of a field effect liquid crystal display is similar to that of the dynamic
scattering type, with the exception that two thin polarizing optical filters are placed at the
inside of each glass sheet. The liquid crystal material in the field effect cell is also of different
type from employed in the dynamic
scattering cell. The material used is twisted nemayic type and actually twists the light passing
through the cell when the latter is not energised.
i. Transmittive type
In the transmittive type cell, both glass sheets are transparent, so that light from a rear
source is scattered in the forward direction when the cell is activated.
The liquid crystals are light reflectors are transmitters and therefore they consume small
amounts of energy (unlike light generators). The seven segment display, the current is about
25micro Amps for dynamic scattering cells and 300micro amps for field effect cells. Unlike
LEDs which can work on d.c. the LCDs require a.c. voltage supply. A typical voltage supply
to dynamic scattering LCD is 30v peak to peak with 50 Hz
5.12.1. FEATURES OF LCD
2. Glass substrate with ITO electrodes. The shapes of these electrodes will determine the
shapes that will appear when the LCD is turned ON. Vertical ridges etched on the
surface are smooth.
4. Glass substrate with common electrode film (ITO) with horizontal ridges to line up
with the horizontal filter.
6. Reflective surface to send light back to viewer. (In a backlit LCD, this layer is
replaced with a light source.)
A liquid crystal display (LCD) is a flat panel display, electronic visual display,
video display that uses the light modulating properties of liquid crystals (LCs). LCs don‘t
emit light directly.
1. Consume much lesser energy (i.e. low power) when compared to LEDs.
3. Since very thin layer of liquid crystal is used, more suitable to act as display
elements (in digital watches, pocket calculators, ect.)
5. Very cheap.
5.12.4. APPLICATIONS
1. Watches
SOFTWARE DESCRIPTION
Fig.6.1. PICkit
PICkit 1
The PICkit 1 — introduced on March 31, 2003 for US $36 — was a rudimentary USB
programmer for PIC microcontrollers, produced by Microchip Technology, the manufacturers
of the PIC series of microcontrollers. It was integrated into a demo board featuring 8 LEDs, a
switch, and a potentiometer. Its default program (explained in the documentation) rotates the
LEDs in series. The light display's direction and speed of rotation can be changed with the
button and potentiometer on the PICkit board.
PICkit 2
The PICkit 2 — introduced in May 2005 — replaced the PICkit 1. The most notable
difference between the two is that the PICkit 2 has a separate programmer/debugger unit
which plugs into the board carrying the chip to be programmed, whereas the PICkit 1 was a
single unit. This makes it possible to use the programmer with a custom circuit board via an
In Circuit Serial Programming (ICSP) header. This feature is not intended for so-called
"production" programming, however.
The PICkit 2 uses an internal PIC18F2550 with Full Speed USB. The latest PICkit 2
firmware allows the user to program and debug most of the 8 and 16 bit PICmicro and dsPIC
members of the Microchip product line.
Fig.6.2. PIC kit 2
The PICkit 2 is open to the public, including its hardware schematic, firmware source code
(in C language) and application programs (in C# language). End users and third parties can
easily modify both the hardware and software for enhanced features. e.g. GNU/Linux version
of PICKit 2 application software, DOS style CMD support, etc.
PICkit 3
Microchip has gone on to manufacture the PICkit 3, a variation of the PICkit 2 with the
same form factor and a new translucent case. It features a faster 16-bit PIC24F processor and
a wider voltage regulation range. There are some complaints of it not being as reliable as the
Pickit 2.
Both PIC kit 2 and PICkit 3 have internal, switch-mode voltage regulators. This allows
them, in the case of the PICkit 2, to generate voltages from 2.5 to 5 volts, or in the case of the
PICkit 3, 2.5 to 5.5 volts, from 5V USB, at around 100mA. Both have options for calibrating
the output with a multi meter, for increased accuracy. Additionally, for some PICs, the
MCLR programming voltage can be generated, at around 13-14 volts. This voltage is
required to reprogram the flash memory.
The MPLAB IDE has both built-in components and plug-in modules to configure
the system for a variety of software and hardware tools.
Project Manager
The project manager provides integration and communication between the IDE and
the language tools.
Editor
The editor is a full-featured programmer's text editor that also serves as a window
into the debugger.
The assembler can be used stand-alone to assemble a single file, or can be used with the
linker to build a project from separate source files, libraries and recompiled objects. The
linker is responsible for positioning the compiled code into memory areas of the target
microcontroller.
Debugger
The Microchip debugger allows breakpoints, single stepping, watch windows and all
the features of a modern debugger for the MPLAB IDE. It works in conjunction with the
editor to reference information from the target being debugged back to the source code.
Execution Engines
There are software simulators in MPLAB IDE for all PIC micro MCU and dsPIC DSC
devices. These simulators use the PC to simulate the instructions and some peripheral
functions of the PIC micro MCU and dsPIC DSC devices. Optional in-circuit emulators and
in-circuit debuggers are also available to test code as it runs in the applications hardware.
Embedded C uses most of the syntax and semantics of standard C, e.g., main() function,
variable definition, data type declaration, conditional statements (if, switch, case), loops
(while, for), functions, arrays and strings, structures and union, bit operations, macros, etc.
Necessity
During infancy years of microprocessor based systems, programs were developed using
assemblers and fused into the EPROMs. There used to be no mechanism to find what the
program was doing. LEDs, switches, etc. were used to check for correct execution of the
program. Some ‗very fortunate‘ developers had In-Circuit Emulator's (ICE's), but they were
too costly and were not quite reliable as well. As time progressed, use of microprocessor-
specific assembly-only as the programming language reduced and embedded systems moved
onto C as the embedded programming language of choice. C is the most widely used
programming language for embedded processors/controllers. Assembly is also used but
mainly to implement those portions of the code where very high timing accuracy, code size
efficiency, etc. are prime requirements.
As assembly language programs are specific to a processor, assembly language didn‘t offer
portability across systems. To overcome this disadvantage, several high level languages,
including C, came up. Some other languages like PLM, Modula-2, Pascal, etc. also came but
couldn‘t find wide acceptance. Amongst those, C got wide acceptance for not only embedded
systems, but also for desktop applications. Even though C might have lost its sheen as a
mainstream language for general purpose applications, it still has a strong-hold in embedded
programming. Due to the wide acceptance of C in embedded systems, various kinds of
support tools like compilers & cross-compilers, ICE, etc. came up, and all this facilitated
development of embedded systems using C. Assembly language seems to be an obvious
choice for programming embedded devices. However, use of assembly language is restricted
to developing efficient codes in terms of size and speed. Also, assembly codes lead to higher
software development costs and code portability is not there. Developing small codes are not
much of a problem, but large programs/projects become increasingly difficult to manage in
assembly language. Finding good assembly programmers has also become difficult. Hence
high level languages are preferred for embedded systems programming.
Advantages
When the engine is ignited, the school bus starts to move and the module gets triggered
on with the help of a power supply unit. The power supply unit has a transformer (step-
down), bridge rectifier and LM7805 IC. The transformer is used to convert 230V AC power
supply to 12V AC supply. The bridge rectifier converts this AC power supply to DC voltage.
IC LM7805 is used to prevent the controller from the damage in case of any voltage
fluctuations. From this unit, the power supply is given to all other units. There is a provision
for noise filtering using ceramic capacitors.
There are two relays namely relay 1 and relay 2. Relay 1 has a connection with RFID and
GSM. Relay 2 is connected with both GPS and GSM. GSM is serially connected to the PIC
micro-controller with the help of an UART. As GSM works on AC supply, the DC supply
from the PIC microcontroller is converted into the AC supply with the help of UART.
Whenever the valid tag is read, the reader is connected to the relay 1 and the connection
between the relay 2 and GPS will be disconnected. As GPS is a continuous monitoring
system the last tracked location is sent to the microcontroller. The count of the number of
students getting into the bus is displayed on the LCD through the PIC micro controller. Here
we have used 16x2 LCD displays which has two rows and it has 16 characters in each row
which is used to display the student information stored in the RFID tag. For the entry of each
student into the bus, the student‘s status with the location is sent to the respective parents
with the help of GSM. In the same way how the message reaches the parent when the student
boarded the bus, the message again reaches the parents even when they get down from the
bus. The student attendance is recorded in the controller which can be sent to the
management manually.
6.5 .WORKING MODEL
CHAPTER 7
7.1. CONCLUSION
This project presents a system to monitor pick-up/drop-off of school children to enhance the
safety of children during the daily transportation from and to school. The system consists of two
main units, a bus unit and a school unit. The bus unit the system is used to detect when a child boards
or leaves the bus. This information is communicated to the school unit that identifies which of the
children did not board or leave the bus and issues an alert message accordingly. The system has a
developed web-based database-driven application that facilities its management and provides useful
information about the children to authorized personal. A complete prototype of the proposed system
was implemented and tested to validate the system functionality. The results show that the system is
promising for daily transportation safety.
7.2.REFERENCES
[1] Khaled Shaaban et.al ―5Smart Tracking System for School Buses Using Passive RFID
Technology to Enhance Child Safety‖ , Journal of Traffic
[2] Seong-eun Yoo, Poh Kit Chong, Daeyoung Kim, ―School Zone Safety
System Based on Wireless Sensor Network‖, Journal of Sensors, Vol 9, Pages 5968-5988, July 2009.
RFID based smart school management system‖ , International journal of advanced research in
electrical , Electronics and Instrumentation Engineering, Vol 2(7): pages 3124-3128, July 2013.
[5] M. Navya, et.al , ― Android based children tracking system using voice
recognition‖, International journal of Computer science and information technology,Vol 4 (1): pages
229-235, Jan 2015.
[6] Khaled Shaaban et.al, ―Smart Tracking System for School Buses Using Passive RFID
Technology to Enhance Child Safety ― , Journal of Traffic and Logistics Engineering, Vol 1( 2):
pages 191-196, Dec 2013.