Sei sulla pagina 1di 7

International Journal of Recent Issues on Computer Science & Electronics (IJRICSE)

RFID BASED SYSTEM FOR TRACKING AND CONTROL PILGRIMS SHUTTLE BUSES
GALLA SIVANAGESWARA RAO#1 M.Tech student,(VLSI&ES DESIGN), ECE Department, MLEC, SINGARAYAKONDA, PRAKASAM (DT), A.P. R.RAJESH KUMAR M.Tech., #2 Asst. Professor ECE Department, MLEC, SINGARAYAKONDA, PRAKASAM (D.T), A.P.

ABSTRACT This paper gives a solution to the problem of pilgrimage transportation control while tracking the shuttle-bus from its starting point till its final destination. This system identifies a particular bus by the RFID tag fixed on it. on the basis of RFID cards and finger identification Passengers boarding or getting down the bus are identified. Complete digital network could be established with the least of its possible errors for all buses and passengers. The tags are cost efficient. The whole equipment once installed can work without any particular attention. The proposed system is designed to work in an environment where vehicle and passenger identification is required, namely at check points, in order to speed up the checking process with best quality services. As a matter of fact, a complete functional database with Server and security polices for handling the server must be provided. For the purpose of passenger identification, the tags are attached to the pilgrim ID cards and the reader collects the details from them. The confirmation of the data collected could be confirmed only when the finger prints is validated. In this study, we also propose a statistical study of the basic important bus parking and the way they should be organized and controlled to avoid congestion and troubles. Keywords: RFID, Shuttle Buses, pilgrim, Intelligent Transportation Systems.

I. INTRODUCTION Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a (RF) signal, and other specialized functions. The second is an antenna for receiving and transmitting the signal. Chip less RFID allows for discrete identification of tags without an integrated circuit, thereby allowing tags to be printed directly onto assets at a lower cost than traditional tags. Primarily, the two main components involved in a Radio Frequency Identification system are the Transponder (tags that are attached to the object) and the Interrogator (RFID reader). Communication between the RFID reader and tags

occurs wirelessly and generally does not require a line of sight between the devices.

RFID Transponder/Tags: An RFID transponder, considered as a next generation barcode, is a miniscule microchip that is attached to an antenna. They come in a wide variety of sizes, shapes, and forms and can be read through most materials with the exception of conductive materials like water and metal, but with modifications and positioning even these can be overcome.

1
http://www.ijricse.com VOLUME 1, ISSUE 1, October 2013

International Journal of Recent Issues on Computer Science & Electronics (IJRICSE)

Fig: RFID Tag Passive tags Passive tags are generally smaller, lighter and less expensive than those that are active and can be applied to objects in harsh environments, are maintenance free and will last for years. These transponders are only activated when within the response range of a reader. The RFID reader emits a low-power radio wave field which is used to power up the tag so as to pass on any information that is contained on the chip. Active tags Active tags differ in that they incorporate their own power source, where as the tag is a transmitter rather than a reflector of radio frequency signals which enables a broader range of functionality like programmable and read/write capabilities. Semi-passive tags Semi-passive tags are similar to active tags in that they have their own power source, but the battery only powers the microchip and does not power the broadcasting of a signal. The response is usually powered by means of backscattering the RF energy

from the reader, where energy is reflected back to the reader as with passive tags. An additional application for the battery is to power data storage. Semi-passive tags leads to greater sensitivity than passive tags, typically 100 times more. The enhanced sensitivity can be leveraged as Semi passive tags have three main advantages: greater sensitivity than passive tags; longer battery powered life cycle than active tags; they can perform active functions (such as temperature logging) under their own power, even when no reader is present for powering the circuitry. Applications RFID tags are useful for a huge variety of applications. Some of these applications include: supply chain management, automated payment, physical access control, counterfeit prevention, and smart homes and offices. RFID tags are also implanted in all kinds of personal and consumer goods, for example, passports, partially assembled cars, frozen dinners, ski-lift passes, clothing, and public transportation tickets. Implantable RFID tags for animals allow concerned owners to label their pets and livestock. Verichip Corp. has also created a slightly adapted implantable RFID chip, the size of a grain of rice, for use in humans. Since its introduction, the Verichip was approved by the U.S. Food and Drug Administration, and this tiny chip is currently deployed in both commercial and medical systems.

RFID reader/ Interrogator

2
http://www.ijricse.com VOLUME 1, ISSUE 1, October 2013

International Journal of Recent Issues on Computer Science & Electronics (IJRICSE)

An RFID reader typically contains a module (transmitter and receiver), a control unit and a coupling element (antenna). The reader has three main functions: energizing, demodulating and decoding. In addition, readers can be fitted with an additional interface that converts the radio waves returned from the RFID tag into a form that can then be passed on to another system, like a computer or any programmable logic controller. Anti-Collision algorithms permit the simultaneous reading of large numbers of tagged objects, while ensuring that each tag is read only once. Every year Saudi Arabia is a destination of thousands of pilgrim Muslims that come from all over the world. It is considered as the important and huge manifestation in the world. The Hajj holy sites have religiously-fixed boundaries. Hajj consists of the set of ordered steps. All pilgrims must start their Hajj journey in Makkah where they perform certain rituals and prayers in the Makkah Holy Mosque.In this paper we are solving the problems faced by piligrams during their makkah area. During the days of pilgrimage, and due to the huge number of pilgrims some victims come to die because of jostling crowds and hot temperatures. As a matter of fact, a need to identify them and locating their positions imposes. One solution is to provide each pilgrim with a transmitter which has a unique identifier. Antennas pilgrims emit signals to the server via the base station which then update Locater-Pilgrim (PL) database. The PL server integrates a GIS that displays pilgrimage. In fact, GIS is one of the applications that could bring many services to pilgrims permitting, for instance, in the choice of hotels or apartments or even get information about Mekka and Medina important sites. However, in spite of the useful service that GIS can provide, it remains limited and does not provide further services. II. HAJJ ORGANIZATION AND PILGRIM'S SECURITY In these last decades, we are seeing more and more people interested in the accomplishment of the fifth pillar in Islam: El-Hajj. Their number has increased for several reasons: The provision of a developed road network which links all parts of Saudi Arabia together and links Saudi Arabia with neighboring countries.

The development of air and sea ports for foreign pilgrims. The large scale development of the city of Mekkah. New technology advances in the various transport modes, such as airplanes and buses. Huge number of people present at the same place and at the same time requires organization, health care and security. Local authorities are continuously looking for optimal solutions to decrease the traffic congestion during this important period. III. RFID BASED SYSTEM DESCRIPTION An RFID system consists of two parts: A tag, which is made up of a microchip and a printed antenna and an interrogator or reader with an antenna. The reader sends out electromagnetic waves. The tag antenna is tuned to receive these waves. A passive RFID tag draws power from field created by the reader and uses it to power the microchip's circuits. The chip then modulates the waves that the tag sends back to the reader and the reader converts the new waves into digital data.

RFID-system principle Tags are embedded into the Vehicle for vehicle identification. The reader sends the electromagnetic waves to the tag. The tags draw the power from this wave and return back the vehicle information, which are stored in its memory to reader. The readers again demodulate this wave and convert it as a digital data. At the core of an RFID tag or label is a transponder inlay that is inserted between layers, usually in a pressure sensitive construction. The inlays, which are battery less, are specifically

3
http://www.ijricse.com VOLUME 1, ISSUE 1, October 2013

International Journal of Recent Issues on Computer Science & Electronics (IJRICSE)

designed to be converted into tag and label applications by a label manufacturer. 1V. CHECKPOINTS AND MIQAT PLACES MANAGEMENT Shuttle bus will be subjected to checks at various checkpoints distributed at known locations. The proposed RFID Bus and pilgrim control avoids problems that usually arise with standard and manual control. Efficient management of time, shuttle buses and pilgrims displacements are provided by RFID technique. We can choose different RFID readers like build in antenna such as GA02 16003, multi-port reader the GAO's 4 ports RFID reader. The readers should be placed at specific locations. Readers will track the shuttle buses. Readers will receive the electronic code. The readers transmit a signal on a certain determined frequency to RFID tags located in a field of reading. These in turn transmit a signal. A dialogue is established in accordance with pre-defined communication protocol and data are exchanged when the RFID tags are awakened by the reader. The data obtained is sent immediately to a computer system by wireless or wired channels. In this computer system we install the appropriate software or dedicated implemented programs necessary to provide the complete solution for Data Base system, identification, decision making and control.

information as provided by the RFID system. The scenario may be described as follows: Data is sent and captured by a Wi-Fi based active tag (e.g., the G2C501). By using RFID tags G2 Chip, one can obtain Internet access through a local access point and communication with a local server. Reader: A Wi-Fi Access Point (WAP) such as the CISCO1010 802.11. It allows wireless communication device to connect to a wireless NTWK using WiFi, Bluetooth or related standards. Location server: CISCO 2710 is used to collect, and store historical location to track the physical location of active Radio Frequency Identifier (RFID) asset tags. ISR product family CISCO 2811: ISR like CISCO 2811 or 2851. They have individual Fast Ethernet links or Gigabit Ethernet bundled into a single logical link CISCO Catalyst 2960 server Internet/Ethernet Switch: Its a LAN Base Software. It allows easy connectivity to Ethernet powered Devices by providing POE (power over Ethernet) WAN: Internet to which the system is connected Readers are arranged at each check point. Functionality of this reader is capturing the Timein, the shuttle bus specifications and the names of the pilgrims. RFID transmitter is provided to each pilgrim. Purpose of RFID transmitter is to identify, track and locate the pilgrims within certain zone. A. Data Base Architecture Pilgrim Tracker System Data Base architecture is designed in a hierarchical tree. Pilgrim Tracker Server (PTS) is the main database. Pilgrim Tracker Server must be placed at the central Hajj administration building. Another database is local Data Base. Local database is found at specific geographical points. Information of pilgrims and shuttle buses is collected by each local Data Base. Each local Data Base is connected to the main Data Base. This architecture helps mapping, informing and providing different types of services. PTS is concerned with executing requests or performing updates.

Vehicle management system Permanent data base and temporary data base are involved in database system. Database is inferred by identification section to retrieve the information. Decision making and control contains a module that determines the proper actions with respect to the premise of the rule. It depends on the real

4
http://www.ijricse.com VOLUME 1, ISSUE 1, October 2013

International Journal of Recent Issues on Computer Science & Electronics (IJRICSE)

Message Format Bus identification, Pilgrim's information and group location are obtained by each local Data Base. If new record is found then information is sent to PTS and updates the main database. B. Authentication Infrastructure and communication

Pilgrims registration database is used by verification system. At different points global database is distributed. The distribution is based on the departure states: North, South, and East and West pilgrims. A set of nearest checkpoint is called a site. Site uses same local database for verifying. Geographical view of the global database is sites database. The authentication system uses pilgrims information: Bus id, Passport Number, Pilgrim Id. For authentication this record is sent to local database. If the result is negative local database sent the record to global database. For communication between sites database and the global database secure public network uses communication infrastructure. Kingdom Saudia Arabia uses IP-VPN based public network. It provides different classes of Quality of Service (QoS). a WiFi (WLAN) technology can be used for communication between the RFID and the local database In the site local area. The set of checkpoints in the same site can be interconnected using the WiMax technologies. Using the capabilities provided by the WiFi and the WiMax devices communication in the site is encrypted.

System Architecture for assuming Ihram which are: Abyar- Ali, AlJuhfah, Al-Sayel El-Kabeer, and Dhat Irq.In mekkah for drivers more places very difficult to find parking places. At the same time pilgrims facing difficult to locate their buses. This situation leads us to consider this issue seriously and try to give an optimal solution to avoid congestions at the

C. Parking Management System On their way to Mekkah, many shuttle buses make regular stops at relax points to allow pilgrims access to showers, coffee-shops and mosques for prayers. Most important of them are Miqat places

5
http://www.ijricse.com VOLUME 1, ISSUE 1, October 2013

International Journal of Recent Issues on Computer Science & Electronics (IJRICSE)

entry of the parking and relax the pilgrims by not exposing them to the long waitings. RFID technology is helpful in locating passengers. IV. MATHEMATICAL MODEL It is necessary to have a mathematical model to give an analytical solution to buses traffic problem. Our assumption to pure chance traffic is justified by the fact that observations of bus arrivals or bus departures to and from Miqat places are independent random events. This leads us to say that we are in face of a problem characterized by: An arrival pattern exhibiting exponential distributed time interval (L). A departure pattern exhibiting exponential distributed time interval (). A random discipline: The first bus entering the parking is not necessary the first bus exiting the parking. Its departure depends upon the state of the pilgrims it carries. n=number of vehicles arriving in a specific time interval. = average service rate per hour We can compute the average time a bus spends in the parking.

Knowing W, and knowing the traffic of the roadway leading to Miqat's parking V. TRAFFIC MANAGEMENT SYSTEM This section focuses on the traffic information system needed for pilgrim's shuttle buses to assist drivers helping them with facilities and making them avoiding traffic troubles and informing them of dangerous situation in case of accidents or congestions. With appropriate equipments, car drivers can now communicate with each other as well as with the road side units (RSU) located at critical points on the road. A.WIMAX The IEEE Working Group 802.16 is responsible for the development of the 802.16 standard including the air interface for Broadband Wireless Access. The activities of this working group were initiated in a meeting in August 1998, called by National Wireless Electronics Systems Testbed (N-WEST) which is a part of U.S. National Institute of Standards and Technology. Initially the group focused on the development of standards and air interface for the 10-66 GHz band. Later an amendment project led to the approval of the IEEE 802.16a standard meant for 2-11 GHz band. The final approval of the 802.16a Air Interface specification came in January 2003. The WiMAX forum is a nonprofit organization that came into existence in July 2001. It comprises of Industry leaders who are committed to promote broadband wireless access based on WiMAX technology. This forum will define and conduct interoperability tests and award the equipment manufacturers with the WiMAX Certified label. This ultimately would benefit the end users who can buy the brand of

Miqat place This queuing system may described by three parameters: 1/2/3; identified as M/M/s Where M is the Markovian interval times, and s indicates the number of servers.

System configuration process Arrivals of buses observed at a given unit of time follow a Poisson distribution and occur at an average rate L per time period.

6
http://www.ijricse.com VOLUME 1, ISSUE 1, October 2013

International Journal of Recent Issues on Computer Science & Electronics (IJRICSE)

their choice, with all the features they are interested in and with the full confidence that this would work with all other certified products. WiMAX technology offers higher bandwidth and greater range as compared to Wi-Fi (Wireless Fidelity - IEEE 802.11 Standard) based wireless systems. It is a wireless alternative to many existing wired backhaul and last mile coverage deployments such as Cable Modems, Digital Subscriber Line (DSL), T and E-Carrier systems and Optical carrier technologies. Its importance is obvious in areas which are sparsely settled, across difficult terrains and in areas where it is not feasible to run cables. Therefore this leads to inexpensive deployment of the network and ubiquitous broadband access. B. Traffic Management using WiMAX: There exist nowadays supplier of fixed and mobile WiMAX silicon and software based on 802.16 standards; offering both base station and subscriber station system-on-chips (SoCs) for both fixed and mobile WiMAX (802.16-2004 and 802.16e-2005), enabling to build a complete WiMAX network. The communication between the shuttle buses and the infrastructure is assured by On-Board Units (OBUs), e.g., such a subscriber station can be designed using the WiMAX Fujitsu reference kit based on MB87M3 550, and Road Side Units (RSUs), for instance one can choose RedMAX AN-100U, a WiMAX certified Base Station. The OBU is the unit that resides on each vehicle and that allows the communication with the RSU that is on the side of the road. In a WiMAX context, a WiMAX Subscriber Station (SS) plays the OBU role while a WiMAX Base Station (BS) plays the RSU [14]. We have tested the quality of the wireless access to the internet using WiMAX through a laptop computer connected to theWiMAX network through WiFi at a speed of 54Mbps. Test results for the application speed are: download-speed is 635Kbps, upload speed is 1.79Mbps, quality of service 36% and maximum delay is 515ms Internet connection is measured using the server visualware in USA-Illinois. 8.

Wireless network WiMAX VI. CONCLUSION To solve the problem of Traffic, Security, parking issues we are using RFID Based System for Tracking and Control Pilgrims Shuttle Buses system. This system greatly reduces the time for picking up passengers when they are stopped for shower, food and prayer. A mathematical model is given to explain the pure chance traffic that we observe at the level of checkpoints or at the level of the Miqat's places. These issues are carefully discussed in order to understand the traffic and come up with solutions avoiding the long waiting and congestions. REFERENCES 1. Aigner M, Feldhofer M. Secure symmetric authentication for RFID tags. In Telecommunication and Mobile Computing TCMC 2005, Graz, Austria, March 2005. Avoine G, Oechslin P. RFID Traceability: A multilayer problem. In Financial Cryptography-FC05, in Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, 2005. Hjorth T. Supporting privacy in RFID systems (master thesis), December 2004. Makkah GIS, http://www.MakkahGIS.net HajjHousing, http://www.HajjHousing.net IEEE. Standard 802.16,IEEE Standard for Local and metropolitan area networks, 3 Park Avenue, New York, NY 10016-5997, USA. Lin X, Lu R, Zhang C, Zhu H, Ho PH, Shen X. Security in Vehicular Ad Hoc Networks. IEEE Communication Magazine 2008; 46(4).

2.

3. 4. 5. 6.

7.

7
http://www.ijricse.com VOLUME 1, ISSUE 1, October 2013

Potrebbero piacerti anche