Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INTRODUCTION
The term RFID is a data collection technology that uses electronic tags for storing
data and remotely retrieving data using devices and can be applied to or incorporated into a
product or person for the purpose of identification using radio waves. Some can be read from
several meters away and beyond the line of sight of the reader.
MAIN OBJECTIVE
The recent past has seen a marked increase in the number of thefts of vehicles. These
stolen vehicles are used for anti-social activities. This project emphasizes on the need to
reduce these activities and proposes a model for number plate recognition of vehicles and
their ignition cut off using RFID and GSM. Here, an RFID card is placed in the vehicles with
predetermined identification code. Each time a vehicle passes the check post or any other
check points, the RFID reader reads the ID number and provides the total information about
the vehicles. The information is displayed using the monitor and if it is identified to be a theft
vehicle, it provides an alert signal to the people concerned at the check point. The vehicle
ignition cut off is done using GSM. An attempt to change the RFID card or the SIM card
inside the modem in the vehicle without any authorization leads to the ignition being
disconnected and an sms is sent to a pre-determined number. Hardware interface of the
SIMCOM SIM300 module connects to the specific application and the air interface.
1
RFID and GSM based Number Plate Recognition And Ignition Cut off
2
RFID and GSM based Number Plate Recognition And Ignition Cut off
HARDWARE DESCRIPTION:
1.RFID MODULE
Shown below is a typical RFID system. In every RFID system the transponder Tags
contain information. This information can be as little as a single binary bit , or be a large
array of bits representing such things as an identity code, personal medical information, or
3
RFID and GSM based Number Plate Recognition And Ignition Cut off
literally any type of information that can be stored in digital binary format.
Shown is a RFID transceiver that communicates with a passive Tag. Passive tags have no
power source of their own and instead derive power from the incident electromagnetic
field. Commonly the heart of each tag is a microchip. When the Tag enters the generated
RF field it is able to draw enough power from the field to access its internal memory and
transmit its stored information.
`When the transponder Tag draws power in this way the resultant interaction of the
RF fields causes the voltage at the transceiver antenna to drop in value. This effect is
utilized by the Tag to communicate its information to the reader. The Tag is able to control
the amount of power drawn from the field and by doing so it can modulate the voltage
sensed at the Transceiver according to the bit pattern it wishes to transmit.
4
RFID and GSM based Number Plate Recognition And Ignition Cut off
COMPONENTS OF RFID
• An antenna or coil
1. ANTENNA
The antenna emits radio signals to activate the tag and read and write data to it. Antennas are
the conduits between the tag and the transceiver, which controls the system's data acquisition
and communication. Antennas are available in a variety of shapes and sizes; they can be built
into a door frame to receive tag data from persons or things passing through the door, or
mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The
electromagnetic field produced by an antenna can be constantly present when multiple tags
are expected continually. If constant interrogation is not required, a sensor device can
activate the field.
Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a.
interrogator), which can be configured either as a handheld or a fixed-mount device. The
reader emits radio waves in ranges of anywhere from one inch to 100 feet or more,
depending upon its power output and the radio frequency used. When an RFID tag passes
through the electromagnetic zone, it detects the reader's activation signal. The reader decodes
the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host
computer for processing.
5
RFID and GSM based Number Plate Recognition And Ignition Cut off
2. TAGS (Transponders)
RFID transponder tags up to 1 ¾” - 3” inches away depending on the tag (see list below).
The RFID Reader Module can be used in a wide variety of hobbyist and commercial
applications, including access control, automatic identification, robotics navigation,
inventory tracking, payment systems, and car immobilization.
• Fully-integrated, low-cost method of reading passive RFID transponder tags
• 1-wire, 9600 baud Serial TTL interface to PC, and other processors
• Requires single +5VDC supply
6
RFID and GSM based Number Plate Recognition And Ignition Cut off
There are three options in terms of how data can be encoded on tags: (1) Read-only tags
contain data such as a serialized tracking number, which is pre-written onto them by the tag
manufacturer or distributor. These are generally the least expensive tags because they cannot
have any additional information included as they move throughout the supply chain. Any
updates to that information would have to be maintained in the application software that
tracks SKU movement and activity. (2) "Write once" tags enable a user to write data to the
tag one time in production or distribution processes. Again, this may include a serial number,
but perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new
data to be written to the tag as needed—and even written over the original data. Examples for
the latter capability might include the time and date of ownership transfer or updating the
repair history of a fixed asset. While these are the most costly of the three tag types and are
not practical for tracking inexpensive items, future standards for electronic product codes
(EPC) appear to be headed in this direction.
7
RFID and GSM based Number Plate Recognition And Ignition Cut off
RFID TAGS
Data capacity
The amount of data storage on a tag can vary, ranging from 16 bits on the low end to
as much as several thousand bits on the high end. Of course, the greater the storage capacity,
the higher the price per tag.
Form factor
The tag and antenna structure can come in a variety of physical form factors and can
either be self-contained or embedded as part of a traditional label structure (i.e., the tag is
inside what looks like a regular bar code label—this is termed a 'Smart Label') companies
must choose the appropriate form factors for the tag very carefully and should expect to use
multiple form factors to suit the tagging needs of different physical products and units of
measure. For example, a pallet may have an RFID tag fitted only to an area of protected
placement on the pallet itself. On the other hand, cartons on the pallet have RFID tags inside
bar code labels that also provide operators human-readable information and a back-up should
the tag fail or pass through non RFID-capable supply chain links.
“Passive” tags have no battery and "broadcast" their data only when energized by a
reader. That means they must be actively polled to send information. "Active" tags are
capable of broadcasting their data using their own battery power. In general, this means that
the read ranges are much greater for active tags than they are for passive tags—perhaps a
read range of 100 feet or more, versus 15 feet or less for most passive tags. The extra
capability and read ranges of active tags, however, come with a cost; they are several times
more expensive than passive tags. Today, active tags are much more likely to be used for
high-value items or fixed assets such as trailers, where the cost is minimal compared to item
value, and very long read ranges are required. Most traditional supply chain applications,
such as the RFID-based tracking and compliance programs emerging in the consumer goods
retail chain, will use the less expensive passive tags.
8
RFID and GSM based Number Plate Recognition And Ignition Cut off
Frequencies
EPC Tags
EPC refers to "electronic product code," an emerging specification for RFID tags,
readers and business applications first developed at the Auto-ID Center at the Massachusetts
Institute of Technology. This organization has provided significant intellectual leadership
toward the use and application of RFID technology. EPC represents a specific approach to
item identification, including an emerging standard for the tags themselves, including both
the data content of the tag and open wireless communication protocols. In a sense, the EPC
movement is combining the data standards embodied in certain bar code specifications, such
as the UPC or UCC-128 bar code standards, with the wireless data communication standards
that have been developed by ANSI and other groups.
3. RF Transceiver:
9
RFID and GSM based Number Plate Recognition And Ignition Cut off
The RF transceiver is the source of the RF energy used to activate and power the passive
RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it may
be a separate piece of equipment. When provided as a separate piece of equipment, the
transceiver is commonly referred to as an RF module. The RF transceiver controls and
modulates the radio frequencies that the antenna transmits and receives. The transceiver
filters and amplifies the backscatter signal from a passive RFID tag.
Electronic Connections
Communication Protocol
Implementation and usage of the RFID Reader Module is straightforward.
The RFID Reader Module is controlled with a single TTL-level active-low /ENABLE pin.
When the /ENABLE pin is pulled LOW, the module will enter its active state and enable the
antenna to interrogate for tags.
The current consumption of the module will increase dramatically when the module is
active. A visual indication of the state of the RFID Reader Module is given with the on-board
LED. When them module is successfully powered-up and is in an idle state, the LED will be
GREEN. When the module is in an active state and the antenna is transmitting, the LED will
be RED. The face of the RFID tag should be held parallel to the front or back face of the
antenna (where the majority of RF energy is focused). If the tag is held sideways
10
RFID and GSM based Number Plate Recognition And Ignition Cut off
(perpendicular to the antenna) you'll either get no reading or a poor reading. Only one
transponder tag should be held up to the antenna at anytime. The use of multiple tags at one
time will cause tag collisions and confuse the reader. The two tags used here have a read
distance of approximately 3 inches. Actual distance may vary lightly depending on the size
of the transponder tag and environmental conditions of the application. When a valid RFID
transponder tag is placed within range of the activated reader, the unique ID will be
transmitted as a string via the TTL-level SOUT (Serial Output) pin . RFID Reader Module
can connect directly to any TTL-compatible UART or to an RS232-compatible interface by
using an external level shifter.
The GSM network was designed keeping in mind the voice activities of the user and
its main purpose was to provide voice connectivity like Public Switched Telephone Networks
but with mobility. So Call Processing activities were the major criteria to decide and fix the
implementation standards of GSM. The data communication was of secondary importance to
this network but to support this also, designers have considered the circuit switching itself the
mechanism for transmitting data packets.
11
RFID and GSM based Number Plate Recognition And Ignition Cut off
HLR/
UM VLR
Handset
A-bis A SS7
BSC MSC
PSTN
X.25
BTS OMC
(Operation & Maintenance
Center)
The Mobile Station (MS) directly interacts with one of the Base Transceiver Stations,
which in turn interacts with a Base Station Controllers (BSC). BTS and BSC combined
together forms the BSS. More than one BTSs are connected with one BSC. The BSC further
interacts with Mobile Station Controller (MSC) which is a the heart of the GSM network.
MSC further gives connectivity to the PSTN and other PLMNs. MSC is also responsible to
interact with HLR and VLR, which form the Permanent and Temporary data bases for all the
subscribers static and dynamic information.
12
RFID and GSM based Number Plate Recognition And Ignition Cut off
• Layer 2: Here the LAP-Dm protocol is used (similar to ISDN LAP-D). LAP-Dm has the
following functions :
- Connectionless transfer on point-to-multipoint signaling channels.
- Setup and take-down of layer 2 connections on point-to-point signaling
channels.
- Connection-oriented transfer with retention of the transmission sequence, error
detection and error correction.
• Layer 3: Contains the following sublayers which control signaling channel functions
(BCH,CCCH and DCCH).
13
RFID and GSM based Number Plate Recognition And Ignition Cut off
- Call selection
- Handover
- Allocation and take-down of point-to-point channels
- Monitoring and forwarding of radio connections
- Introduction of encryption
- Change in transmission mode
- Authentication
- Assignment of TMSI
- Management of subscriber location
Neither the BTS nor the BSC interpret CM and MM messages. They are simply exchanged
with the MSC or the MS using the Direct Transfer Application Part (DTAP) protocol on the
A interface. RR messages are mapped to or from the Base Station System Application Part
(BSSAP) in the BSCREF for exchange with the MSC.
14
RFID and GSM based Number Plate Recognition And Ignition Cut off
SIM card Insertion and Removal procedures are supported. There are software functions
relying on positive reading of the hardware SIM detect pin. This pin state (open/closed) is
permanently monitored. When the SIM detect pin indicates that a card is present in the SIM
connector, the product tries to set up a logical SIM session. The logical SIM session will be
set up or not depending on whether the detected card is a SIM Card or not. The AT+CPIN?
command delivers the following responses:
• If the SIM detect pin indicates “absent”, the response to AT+CPIN? Is “+CME
ERROR 10” (SIM not inserted).
• If the SIM detect pin indicates “present”, and the inserted Card is a SIM Card, the
response to AT+CPIN? is “+CPIN: xxx” depending on SIM PIN state.
• If the SIM detect pin indicates “present”, and the inserted Card is not a SIM Card, the
response to AT+CPIN? is CME ERROR 10.
• These last two states are not given immediately due to background initialization.
Between the hardware SIM detect pin indicating “present” and the previous results
the AT+CPIN? sends “+CME ERROR: 515” (Please wait, init in progress).
• When the SIM detect pin indicates card absence, and if a SIM Card was previously
inserted, an IMSI detach procedure is performed, all user data is removed from the
product (Phonebooks, SMS etc.). The product then switches to emergency mode.
15
RFID and GSM based Number Plate Recognition And Ignition Cut off
Description :
The supported services are originated (SMS-MO) and terminated short message
(SMS-MT) + Cell Broadcast Message (SMS-CB) services.
Syntax :
Defined values :
<service>
0: SMS AT commands are compatible with GSM 07.05 Phase 2 version 4.7.0.
16
RFID and GSM based Number Plate Recognition And Ignition Cut off
Description :
The message formats supported are text mode and PDU mode. In PDU mode, a
complete SMS Message including all header information is given as a binary string (in
hexadecimal format). Therefore, only the following set of characters is allowed:
{‘0’,’1’,’2’,’3’,’4’,’5’,’6’,’7’,’8’,’9’, ‘A’, ‘B’,’C’,’D’,’E’,’F’}. Each pair or characters is
converted to a byte (e.g.: ‘41’ is converted to the ASCII character ‘A’, whose ASCII code is
0x41 or 65).
In Text mode, all commands and responses are in ASCII characters. The format
selected is stored in EEPROM by the +CSAS command.
Syntax :
Defined values :
17
RFID and GSM based Number Plate Recognition And Ignition Cut off
<da> (TP TP-DA) 0x06 0x91 0x21 0x43 0x65 (destination address +123456)
TPDU in hexadecimal format must be converted into two ASCII characters, e.g. octet
with hexadecimal value 0x2A is presented to the ME as two characters ‘2’ (ASCII 50) and
‘A’ (ASCII 65).
Description :
This command selects the procedure for message reception from the network.
Syntax :
18
RFID and GSM based Number Plate Recognition And Ignition Cut off
Defined values :
Any other value for <mode> (0,1 or 3) is accepted (return code will be OK), but the
processing of unsolicited result codes will be the same as with<mode>=2.
<mode>
0: Buffer unsolicited result codes in the TA. If TA result code buffer is full, indications
can be buffered in some other place or the oldest indications may be discarded and
replaced with the new received indications
1: Discard indication and reject new received message unsolicited result codes when
TA-TE link is reserved. Otherwise forward them directly to the TE
19
RFID and GSM based Number Plate Recognition And Ignition Cut off
2: Buffer unsolicited result codes in the TA when TA-TE link is reserved and flush them
to the TE after reservation. Otherwise forward them directly to the TE
3: Forward unsolicited result codes directly to the TE. TA-TE link specific inband used
to embed result codes and data when TA is in on-line data mode
<mt> : sets the result code indication routing for SMS-DELIVERs. Default is 0.
<mt>
2: SMS-DELIVERs (except class 2 messages) are routed using unsolicited code : +CMT
: [<alpha>,] <length> <CR> <LF> <pdu> (PDU mode) or +CMT : <oa>,[<alpha>,]
<scts> [,<tooa>, <fo>, <pid>, <dcs>, <sca>, <tosca>, <length>] <CR><LF><data>
(text mode)
<bm>: set the rules for storing received CBMs (Cell Broadcast Message) types depend on
its coding scheme, the setting of Select CBM Types (+CSCB command) and <bm>.
Default is 0.
<bm>
0: No CBM indications are routed to the TE. The CBMs are stored.
1: The CBM is stored and an indication of the memory location is routed to the
customer
20
RFID and GSM based Number Plate Recognition And Ignition Cut off
2: New CBMs are routed directly to the TE using unsolicited result code.
<ds>
2: SMS-STATUS-REPORTs are stored and routed using the unsolicited result code :
+CDSI: “SR”,<index>
<bfr> Default is 0.
<bfr>
0: TA buffer of unsolicited result codes defined within this command is flushed to the
TE when <mode> 1…3 is entered (OK response shall be given before flushing
the codes)
1: TA buffer of unsolicited result codes defined within this command is cleared when
<mode> 1…3 is entered.
Description :
21
RFID and GSM based Number Plate Recognition And Ignition Cut off
This command allows the application to read stored messages. The messages are read from
the memory selected by +CPMS command.
Syntax :
Description :
22
RFID and GSM based Number Plate Recognition And Ignition Cut off
This command allows the application to read stored messages, by indicating the type
of the message to read. The messages are read from the memory selected by the +CPMS
command.
Syntax :
Note :
23
RFID and GSM based Number Plate Recognition And Ignition Cut off
For SMS Status Reports, only “ALL” / 4 and “READ” / 1 values of the <stat> parameter will
list messages ; other values will only return OK.
Description :
The <address> field is the address of the terminal to which the message is sent. To send the
message, simply type, <ctrl-Z> character (ASCII 26). The text can contain all existing
characters except <ctrl-Z> and <ESC> (ASCII 27). This command can be aborted using the
<ESC> character when entering text. In PDU mode, only hexadecimal characters are used
(‘0’…’9’,’A’…’F’).
Syntax :
The message reference, <mr>, which is returned to the application is allocated by the
product. This number begins with 0 and is incremented by one for each outgoing message
(successful and failure cases); it is cyclic on one byte (0 follows 255).
Note:
this number is not a storage number – outgoing messages are not stored.
Description :
24
RFID and GSM based Number Plate Recognition And Ignition Cut off
This command is used to delete one or several messages from preferred message storage
(“BM” SMS CB ‘RAM storage’, “SM” SMSPP storage ‘SIM storage’ or “SR” SMS Status-
Report storage).
Syntax :
2. MICROCONTROLLERS USED
AT89S52
The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with
8K
bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s
high-density nonvolatile memory technology and is compatible with the industry-standard
80C51 instruction set and pinout. The on-chip Flash allows the program memory to be
reprogrammed in-system or by a conventional nonvolatile memory programmer. By
combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip,
the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-
effective solution to many embedded control applications.
25
RFID and GSM based Number Plate Recognition And Ignition Cut off
The AT89S52 provides the following standard features: 4K bytes of Flash, 256 bytes
of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-
vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock
circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero
frequency and supports two software selectable power saving modes.The Idle Mode stops the
CPU while allowing the RAM, timer/counters, serial port,
and interrupt system to continue functioning. The Power-
down mode saves the RAM contents but freezes the
oscillator, disabling all other chip functions until the next
interrupt or hardware reset.
MICROCONTROLLER AT89S52
• Watchdog Timer
• Power-off Flag
4.1.2 Description
27
RFID and GSM based Number Plate Recognition And Ignition Cut off
Vcc
Supply voltage.
Gnd
Ground.
Port 0
Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can
sink eight TTL Inputs. When 1s are written to port 0 pins, the pins can be used as high-
impedance inputs. Port 0 can also be configured to be the multiplexed low-order address/data
bus during accesses to external program and data memory. In this mode, P0 has internal pull-
ups. Port 0 also receives the code bytes during Flash programming and outputs the code bytes
during program verification. External pull-ups are required during program verification.
Port 1
28
RFID and GSM based Number Plate Recognition And Ignition Cut off
Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output
buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled
high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are
externally being pulled low will source current (IIL) because of the internal pull-ups. In
addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count input
(P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as shown in the
following table. Port 1 also receives the low-order address bytes during Flash programming
and verification.
Port 2
Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output
buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled
high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are
externally being pulled low will source current (IIL) because of the internal pull-ups.
Port 2 emits the high-order address byte during fetches from external program memory and
during accesses to external data memories that use 16-bit addresses (MOVX @ DPTR). In
this application, Port 2 uses strong internal pull-ups when emitting 1s. During accesses to
external data memories that use 8-bit addresses (MOVX @ RI), Port 2 emits the contents of
the P2 Special Function Register. Port 2 also receives the high-order address bits and some
control signals during Flash programming and verification.
Port 3
Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output
buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled
high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are
externally being pulled low will source current (IIL) because of the pull-ups. Port 3 receives
some control signals for Flash programming and verification. Port 3 also serves the functions
of various special features of the AT89S52, as shown in the following table.
29
RFID and GSM based Number Plate Recognition And Ignition Cut off
Table 4.2
RST
Reset input.
A high on this pin for
two machine
cycles while the
oscillator is running
resets the device. This
pin drives high for 98
oscillator periods after
the Watchdog times out. The DISRTO bit in SFR AUXR (address 8EH) can be used to
disable this feature. In the default state of bit DISRTO, the RESET HIGH out feature is
enabled.
ALE/PROG
Address Latch Enable (ALE) is an output pulse for latching the low byte of the
address during accesses to external memory. This pin is also the program pulse input
(PROG) during Flash programming. In normal operation, ALE is emitted at a constant rate of
1/6 the oscillator frequency and may be used for external timing or clocking purposes. Note,
however, that one ALE pulse is skipped during each access to external data memory. If
desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit
set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly
pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external
execution mode.
PSEN
30
RFID and GSM based Number Plate Recognition And Ignition Cut off
Program Store Enable (PSEN) is the read strobe to external program memory. When
the AT89S52 is executing code from external program memory, PSEN is activated twice
each machine cycle, except that two PSEN activations are skipped during each access to
external data memory.
EA/VPP
External Access Enable. EA must be strapped to GND in order to enable the device to
fetch code from external program memory locations starting at 0000H up to FFFFH. Note,
however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should
be strapped to VCC for internal program executions. This pin also receives the 12-volt
programming enable voltage (VPP) during Flash programming.
XTAL1
Input to the inverting oscillator amplifier and input to the internal clock operating circuit.
XTAL2
AT89C2051
Features •
31
RFID and GSM based Number Plate Recognition And Ignition Cut off
Description
Pin Configuration
32
RFID and GSM based Number Plate Recognition And Ignition Cut off
Block Diagram
Description
GND Ground.
Port 1 The Port 1 is an 8-bit bi-directional I/O port. Port pins P1.2 to P1.7 provide internal
pull-ups. P1.0 and P1.1 require external pull-ups. P1.0 and P1.1 also serve as the positive
input (AIN0) and the negative input (AIN1), respectively, of the on-chip precision analog
comparator. The Port 1 out-put buffers can sink 20 mA and can drive LED displays directly.
When 1s are written to Port 1 pins, they can be used as inputs. When pins P1.2 to P1.7 are
used as inputs and are externally pulled low, they will source current (IIL) because of the
internal pull-ups. Port 1 also receives code data during Flash programming and verification.
4.4 Port 3 Port 3 pins P3.0 to P3.5, P3.7 are seven bi-directional I/O pins with internal pull-
ups. P3.6 is hard-wired as an input to the output of the on-chip comparator and is not
accessible as a gen-eral-purpose I/O pin. The Port 3 output buffers can sink 20 mA. When 1s
are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as
33
RFID and GSM based Number Plate Recognition And Ignition Cut off
inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL)
because of the pull-ups. Port 3 also serves the functions of various special features of the
AT89C2051 as listed below: Port 3 also receives some control signals for Flash
programming and verification.
4.5 RST Reset input. All I/O pins are reset to 1s as soon as RST goes high. Holding the RST
pin high for two machine cycles while the oscillator is running resets the device. Each
machine cycle takes 12 oscillator or clock cycles.
4.6 XTAL1 Input to the inverting oscillator amplifier and input to the internal clock
operating circuit. Port Pin Alternate Functions P3.0 RXD (serial input port) P3.1 TXD (serial
output port) P3.2 INT0 (external interrupt 0) P3.3 INT1 (external interrupt 1) P3.4 T0 (timer
0 external input) P3.5 T1 (timer 1 external input)4 0368H–MICRO–6/08 4.7 XTAL2 Output
from the inverting oscillator amplifier.
SENSORS
This sensors provide no immunity to ambient light hence they are best suited for indoor
applications where there is least interference from external light sources. In an indoor
environment this sensor can give a range of 30 to 50 cms.
While building the sensor, experiment with the distance between the IR LED and
Photodiode. LED emit radiations in a particular angle only, hence the distance between the
IR LED and the Photodiode plays a significant role in the range of the sensor. I got best
results when the LEDs were placed of 0.7-1 cm apart.
The PCB artwork is shown below. The PCB is single layered as single sided boards are
easier to etch. You can use the artwork to build your own sensor. Just save it to your
computer and print it to scale in high resolution
Debugging
34
RFID and GSM based Number Plate Recognition And Ignition Cut off
The cheapest way to figure out if your IR LED is emitting IR rays is to point a camera at it.
IR radiations come just after visible light in the spectrum and hence we cannot see them. But
most cameras can. IR LEDs heat up quickly which is another sign of a working IR LED, but
parts getting heated up means something else in electronics…
Tactile Bump Sensors are great for collision detection, but the circuit itself also works fine
for user buttons and switches as well. There are many designs possible for bump switches,
often depending on the design and goals of the robot itself. But the circuit remains the same.
They usually implement a mechanical button to short the circuit, pulling the signal line high
or low. An example is the microswitch with a lever attached to increase its range, as shown
above.
There are several versions below, depending on how you plan to use the circuit and your
available switches. For the resistor use a very high value, such as 40kohms.
Voltage Voltage
goes high goes low
with contact with contact
35
RFID and GSM based Number Plate Recognition And Ignition Cut off
Bridge Rectifier
When four diodes are connected as shown in figure, the circuit is called as bridge rectifier.
The input to the circuit is applied to the diagonally opposite corners of the network, and the
output is taken from the remaining two corners. Let us assume that the transformer is
working properly and there is a positive potential, at point A and a negative potential at point
B. the positive potential at point A will forward bias D3 and reverse bias D4. The negative
potential at point B will forward bias D1 and reverse D2. At this time D3 and D1 are forward
biased and will allow current flow to pass through them; D4 and D2 are reverse biased and
will block current flow. One advantage of a bridge rectifier over a conventional full-wave
rectifier is that with a given transformer the bridge rectifier produces a voltage output that is
nearly twice that of the conventional full-wave circuit. Assume that the same transformer is
used in both circuits. The peak voltage developed between points X and y is 1000 volts in
both circuits. In the conventional full-wave circuit, the peak voltage from the center tap to
either X or Y is 500 volts. Since only one diode can conduct at any instant, the maximum
voltage that can be rectified at any instant is 500 volts. The maximum voltage that appears
across the load resistor is nearly-but never exceeds-500 v0lts, as result of the small voltage
drop across the diode. In the bridge rectifier shown in view B, the maximum voltage that can
be rectified is the full secondary voltage, which is 1000 volts. Therefore, the peak output
voltage across the load resistor is nearly 1000 volts. With both circuits using the same
36
RFID and GSM based Number Plate Recognition And Ignition Cut off
transformer, the bridge rectifier circuit produces a higher output voltage than the
conventional full-wave rectifier circuit.
Voltage Regulators
Voltage regulators comprise a class of widely used ICs. Regulator IC units contain the
circuitry for reference source, comparator amplifier, control device, and overload protection
all in a single IC. IC units provide regulation of either a fixed positive voltage, a fixed
negative voltage, or an adjustably set voltage. The regulators can be selected for operation
with load currents from hundreds of milli amperes to tens of amperes, corresponding to
37
RFID and GSM based Number Plate Recognition And Ignition Cut off
power ratings from milli watts to tens of watts. A fixed three-terminal voltage regulator has
an unregulated dc input voltage, Vi, applied to one input terminal, a regulated dc output
voltage, Vo, from a second terminal, with the third terminal connected to ground. The series
78 regulators provide fixed positive regulated voltages from 5 to 24 volts. Similarly, the
series 79 regulators provide fixed negative regulated voltages from 5 to 24 volts.
REGULATOR:
38
RFID and GSM based Number Plate Recognition And Ignition Cut off
PCB Fabrication
Pattern designing is the primary step in fabricating a PCB. In this step, all
interconnection between the components in the given circuit are converted into PCB tracks.
Several factors such as positioning the diameter of holes, the area that each component would
occupy, the type of end terminal should be considered.Transferring the PCB Pattern
The copper side of the PCB should be thoroughly cleaned with the help of alcoholic
spirit or petrol. It must be completely free from dust and other contaminants.
The mirror image of the pattern must be carbon copied and to the laminate the
complete pattern may now be made each resistant with the help of paint and thin brush.
Developing
In this developing all excessive copper is removed from the board and only the
printed pattern is left behind. About 100ml of tap water should be heated to 75 ° C and 30.5
grams of FeCl3 added to it, the mixture should be thoroughly stirred and a few drops of HCl
may be added to speed up the process.
39
RFID and GSM based Number Plate Recognition And Ignition Cut off
The board with its copper side facing upward should be placed in a flat bottomed
plastic tray and the aqueous solution of FeCl 2 poured in the etching process would take 40
to 60 min to comple
After etching the board it should be washed under running water and then held
against light .the printed pattern should be clearly visible. The paint should be removed with
the help of thinner.
Finishing Touches
After the etching is completed, hole of suitable diameter should be drilled, then the
PCB may be tin plated using an ordinary 35 Watts soldering rod along with the solder core,
the copper side may be given a coat of varnish to prevent oxidation.
Drilling
Drills for PCB use usually come with either a set of collects of various sizes or a 3-
Jaw chuck. For accuracy however 3-jaw chunks aren’t brilliant and small drill below 1 mm
from grooves in the jaws preventing good grips.
Soldering
Begin the construction by soldering the resistors followed by the capacitors and the
LEDs diodes and IC sockets. Don’t try soldering an IC directly unless you trust your skill in
soldering. All components should be soldered as shown in the figure. Now connect the
switch and then solder/screw if on the PCB using multiple washers or spaces. Soldering it
directly will only reduce its height above other components and hamper in its easy fixation in
the cabinet. Now connect the battery lead.
40
RFID and GSM based Number Plate Recognition And Ignition Cut off
Assembling
The circuit can be enclosed in any kind of cabinet. Before fitting the PCB suitable
holes must be drilled in the cabinet for the switch, LED and buzzer. Note that a rotary switch
can be used instead of a slide type.
Switch on the circuit to be desired range. It will automatically start its timing cycles.
To be sure that it is working properly watch the LED flash. The components are selected to
trigger the alarm a few minutes before the set limit.
SOFTWARES USED
Proteus 7.0
Proteus 7.0 is a Virtual System Modelling (VSM) that combines circuit simulation, animated
components and microprocessor models to co-simulate the complete microcontroller based
designs. This is the perfect tool for engineers to test their microcontroller designs before
constructing a physical prototype in real time. This program allows users to interact with the
design using on-screen indicators and/or LED and LCD displays and, if attached to the PC,
switches and buttons. One of the main components of Proteus 7.0 is the Circuit Simulation --
a product that uses a SPICE3f5 analogue simulator kernel combined with an event-driven
digital simulator that allow users to utilize any SPICE model by any manufacturer.
Proteus VSM comes with extensive debugging features, including breakpoints, single
stepping and variable display for a neat design prior to hardware prototyping.
In summary, Proteus 7.0 is the program to use when you want to simulate the interaction
between software running on a microcontroller and any analog or digital electronic device
connected to it.
41
RFID and GSM based Number Plate Recognition And Ignition Cut off
42
RFID and GSM based Number Plate Recognition And Ignition Cut off
DIPTRACE
PCB Layout — PCB design with an easy-to-use manual routing tools, shape-based
autorouter and auto-placer.
Schematic — Schematic Capture with multi-level hierarchy and export to PCB Layout,
Spice or Netlist.
Component and Pattern Editors — allow you to make new parts and footprints.
Import/Export Features - allow you to exchange designs and libraries with other EDA
tools.
43
RFID and GSM based Number Plate Recognition And Ignition Cut off
The framework's Base Class Library provides a large range of features including user
interface, data access, database connectivity, cryptography, web application development,
numeric algorithms, and network communications. The class library is used by programmers,
who combine it with their own code to produce applications.
Programs written for the .NET Framework execute in a software environment that
manages the program's runtime requirements. Also part of the .NET Framework, this runtime
environment is known as the Common Language Runtime (CLR). The CLR provides the
appearance of an application virtual machine so that programmers need not consider the
capabilities of the specific CPU that will execute the program. The CLR also provides other
important services such as security, memory management, and exception handling. The class
library and the CLR together constitute the .NET Framework.
Version 3.0 of the .NET Framework is included with Windows Server 2008 and
Windows Vista. The previous stable version of the framework, 3.5, is included with
Windows 7, and can also be installed on Windows XP and the Windows Server 2003 family
of operating systems.[2] Version 4 of the framework was released as a public beta on 20 May
2009.[3] In February 2010, Microsoft released a .NET Framework 4 release candidate.[4] On
April 12, 2010, the final version of the .NET Framework 4 was released.
The .NET Framework family also includes two versions for mobile or embedded
device use. A reduced version of the framework, the .NET Compact Framework, is available
on Windows CE platforms, including Windows Mobile devices such as smartphones.
Additionally, the .NET Micro Framework is targeted at severely resource constrained
devices.
44
RFID and GSM based Number Plate Recognition And Ignition Cut off
WORKING PRINCIPLE
ALGORITHM:
Step 1: Start
Step 4: check whether the vehicle is allowed through the check post.
Step 6: if no then message is send to the GMS module to cut the ignition.
Step 7: stop
FLOWCHART:
45
RFID and GSM based Number Plate Recognition And Ignition Cut off
ADVANTAGES
No "line of sight" requirements
Greater data capacity
Reduce transaction costs in terms of time and effort
Simplified self-charging/discharging
High reliability
46
RFID and GSM based Number Plate Recognition And Ignition Cut off
High-speed inventorying
Long tag life
DIADVANTAGES
High cost
Vulnerability to compromise
Removal of exposed tags
CONCLUSION
47