Sei sulla pagina 1di 6


C.Keerthika1 Final year / Dept of ECE M.Pavithra2 Final year / Dept of ECE

Maharaja Engineering College for Women, Perundurai.

ABSTRACT A Building Management System (BMS) is a computer-based control system installed in buildings that controls and monitors the buildings mechanical and electrical equipment such as ventilation, lighting, power systems, fire systems, and security systems. A BMS consists of software and hardware.The four basic functions of a central, computercontrolled BMS are:

Output, allowing the system to indicate the effects of the users' manipulation

By means of HMI we can provide a security system for BMS by using RFID technology. Building security is not just about installing the latest electronic gear and software package. Nor is it just a consideration for building types with highly specific occupancy considerations. This type of security is provided by using Radio Frequency Identification (RFID) and password. This system will have one public key and one private key which is proven method of security. Each person will have a unique RF id which is public key and a password that is private key. Two type of security is done in this project. First compare the ID number of user with the data stored in the database. Second is by means of match and verify the password with corresponding tag ID number. INTRODUCTION An embedded system is a computer system designed for specific control functions within a larger system, often

Controlling Monitoring Optimizing Reporting

In the BMS, keypad and Display (LCD) are the most commonly used user interface. A robust design of HMI ( Human Machine Interface ) is required for every BMS as these devices will be erected at various places of building like indoor, Outdoor or sometimes even in the open environment (in from of compound gate). A user interface is the system by which people (users) interact with a machine. The user interface includes hardware (physical) and software (logical) components. User interfaces exist for various systems, and provide a means of:

Input, allowing the users to manipulate a system

with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. Embedded systems are controllers with on chip control. They consist of microcontrollers, input and output devices, memories etc., on chip and they can be used for a specific application. A small computer designed in a single chip is called a microcomputer. A single chip microcomputer typically includes a microprocessor RAM, ROM, Timer, Interrupt and peripheral controller in a single chip. The single chip microcontroller is also called as microcontroller. These Microcontrollers are used for variety of applications where it replaces the computer. The usage of this microcomputer for a specific application, in which the microcontrollers a part of application, is called embedded systems. FEATURES OF EMBEDDED SYSTEM Embedded systems are compact, smart, efficient, economical and user friendly, they are closed systems and respond to the real world situation very fast, closed system means, everything required for a specific application is embedded on the chip and hence, they do not call external requirement for their functioning. As the cost of microprocessors and microcontrollers fell it became feasible to replace expensive knobbased analog components such as potentiometers and variable capacitors with up/down buttons or knobs read out by a microprocessor even in some

consumer products. Even private homes are being filled with the intelligent appliances and integrated systems build around embedded systems, which facilitate and enhance everyday life. Embedded systems are especially suited for use in transportation, fire safety and security, medical applications and life critical systems as these systems can be isolated from hacking and thus be more reliable. REAL TIME EMBEDDED SYSTEM The devices that embedded them are convenient, user friendly, and dependable. One special class of embedded system is distinguished from the rest distinguished from the rest by its requirement to respond external events in real time. This category is classified as the real time embedded system. Embedded systems will play a key role to drive the technological evolution in the next decades. In this respect they stand on the same level as Nona technologies, bioelectronics, and photonics. The central role of embedded systems in the economy grows stronger and stronger. The starting point is the convergence between storage, security, video, audio, mobility and connectivity. Systems are converging and ICs are more and more converging with systems. This poses a number of challenges for designers and technologists. A key issue is the definition of the right methodologies to translate system knowledge and competences into complex embedded systems, taking into account many system requirements and constraints.




DEVICE INTERFACING Embedded systems range from no user interface at all- dedicated only to one task-to complex graphical user interfaces that resemble modern computer desktop operating systems. Simple embedded devices use buttons, LEDs, graphic or character LCDs (for example popular HD44780 LCD) with a simple menu system. KEYPAD INTERFACING Keypads are a part of HMI or Human Machine Interface and play really important role in a small embedded system where human interaction or human input is needed. Matrix keypads are well known for their simple architecture and ease of interfacing with any microcontroller. In this part of tutorial we will learn how to interface a 4x3 matrix keypad with PIC microcontroller. It consists of 4 rows and 3 columns. CONSTRUCTION Construction of a keypad is really simple. As per the outline shown in the figure below we have four rows and three columns. In between each overlapping row and column line there is a key. So keeping this outline we can construct a keypad using simple SPST Switches as shown below. There are many methods depending on how you connect your keypad with your controller, but the basic logic is same. We make the columns as i/p and we drive the rows making them o/p,this whole procedure is scanning. INTERFACING KEYPAD PIC16F877A AND

The PIC16F877A will be connected to the 43 keypad by using the first seven pins of PORTC, since the keypad is just a set of matrix switches with the column configured as outputs and rows configured as inputs. Such that the keypad scanning routine pulls up one column at a time and reads the corresponding rows. From the PIC16F877A datasheet the maximum output high voltage is obtained as above to be 3.8V at a maximum current of 3mA, this will be the output high voltage for the keypad columns that is PORTC pin 4 to 6.Now since the keypad will be scanned within the same PORTC at pins 0 to 3 and PORTC has Schmitt triggered I/O buffers then the input high voltage needs to be from0.8 Vdd to Vdd that is from 3.8V to 4.5V (with Vdd =4.5V). This implies the keypad can be directly connected to the microcontroller since their logical levels are compatible.

LCD INTERFACING An alphanumeric LCD is a type of LCDs that only displays English letters, numbers and some ASCII characters, those LCDs contains a controller unit that processes the input and forms the displayed character on the LCD, most alphanumeric LCDs have a parallel interface, some other LCDs have a serial interface to minimize the construction complicity.

which can be read from upto several meters(yards) away. RFID industry is calculating better proposal and tags as making sure the cost factor together active plus passive RFID tags decrease. It is cheaper nowadays to take advantage of RFID machinery, as it was ten years before. RFID tags have turn out to be lesser in size RFID technology is quick becoming the reality, not only for the products in provisions, however for tracking person. RFID denotes radio frequency identification.


SECURITY SYSTEM RFID RFID is a chip which is used to store a particular digit of values. It is a unique value, it can be used based on our application. It contain a RF electromagnetic field coil that modulates an external magnetic field to transfer a coded identification no when quire by a reader device. RFID is the use of a wireless noncontact system that uses RF electromagnetic field to transfer data from a tag attached to an object. It is used for the purpose of automatic identification and tracking. Some tags require no battery and are powered by the electromagnetic fields used to read them. Others use a local power source and emit radio waves. This tag contains a electrically stored information

1.5.DESIGN A RFID system uses tags of labels attached to the objects to be identified. The two-way radio transmitter-receiver is called interrogators or readers send a signal to the tag and read its response. The readers generally transmit their observations to a computer system running RFID software or RFID mid ware. The tags information is stored electronically in a non-volatile memory. The rfid tag includes a small RF transmitter and receiver. An RFID reader transmits an encoded radio signal to interrogate the tag.

The tag receives the message and responds with its identification information .In this security system we can a passive RF communication. A basic RFID system consists of three components:

To recognize as well as locate packages in store, store manager put in video with all time preferred RFID clever tags. PASSIVE RFID TAGS Passive RFID tags do not contain an internal power supply. Passive tags cannot generate and transmit a signal to a terminal for recognition and storage. Passive tags are well designed for particular applications where storing information on the tag or reading at long ranges or RF-unfriendly surroundings is not a problem. passive RFID doesnt contain battery instead of that it will get energise by the RF reader itself. When we insert the RFID into the RF reader, the data will pass from RFID to the reader. The RF reader contains microcontroller which compares the data to the stored data in EEPROM. If both the data are matched , then the door will open otherwise the RF reader will display reenter your password. CONCLUSION This paper has addresses RFID based technology for providing a security system for BMS and effective Human Machine Interface. The system will also look after the log information which would be used for reference and verification at the later point of time. This system is aimed at low cost domestic segment.Now a days, security becomes one of the key factor while planning to construct a house. The proposed system aims at low cost design for domestic security without compromising the security features.

An antenna or coil. A transceiver (with decoder). A transponder (RF tag) electronically programmed with unique information

The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing. RFID technology not only gives greater functionality however also brings better clarity. But as the coin has two sides, RFID technology has some side effects as well. The utilization of RFID creates problems about privacy of the individual. Thus, huge technologies such as RFID are judiciously used to take pleasure in the advantages from it. Radio Frequency Identification is the innovative technology for this particular field. Now there is no requirement to store entire history and complete description regarding them each time. RFID tags are simpler means to follow them. Interpreting the upcoming radio signals from each tag can follow every tagged asset. RFID software solution is utilized to track particular server down in vast data center.

REFERENCE [1], De_nition of Machine. [2] Eva Flaspoler, Angelika Hauke, P. P. D. R. T. B. N. H. S. K. A. S. W. K. S. S.J.-C. B. L. C. J. C. L. E. M. V. K. M. and Beeck, R. O. D. Literature Review: The HumanMachine Interface As An Emerging Risk, 2007. [3] BELL COLLEGE. Introduction to HCI 2004. [4] Mrs Ayesha Butalia, Ms Divya Shah, D. R. D. Gesture Recognition System, International ,Journal of Computer Applications, 2010. [5] D. Arsic, B. Hornler, B. S. and Rigoll, G. A Hierarchical Approach For Visual Suspicious Behavior Detection In Aircrafts, 2009.