Free Essay

Monitoring Section

In:

Submitted By srikanthpusarapu
Words 10647
Pages 43
Chapter1
-------------------------------------------------
Introduction
RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a means of identifying a person or object using a radio frequency transmission. In other words RFID is an electronic method of exchanging data over radio frequency waves. The technology can be used to identify, track, sort or detect a wide variety of objects. In this project RFID is used for the Tracking purpose for stolen things.
An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few predefined tasks, usually with very specific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale.
Security over the years has been a source of concern to organizations and companies. This has caused quite a significant amount of capital being budgeted for improvements on security systems, simply because it has been discovered that the access control system mechanism is an important part of an organization. One of the important security systems in building, vehicle security is door access control. The door access control is a physical security that assures the security of a building or vehicle by limiting access to the vehicle to specific people and by keeping records or goods of such entries.
Physically, embedded systems ranges from portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. In terms of complexity embedded systems can range from very simple with a single microcontroller chip, to very complex with multiple units, peripherals and networks mounted inside a large chassis or enclosure.
This project deals with the need of monitoring and path of radioactive elements like missiles, RDX, bombs and valuable things. It is mainly consists of two sections one is monitoring section for monitoring and the other one is path section for path. The path section is fixed to radioactive elements and monitoring section monitors the radioactive elements. If the missing radioactive is in centre of the street there is a life threat to public. It is not possible the concern department can reach that place quickly. So they need a rapid movement to alert the public. In order to overcome this problem the alarm will be generated in path section with the help of gsm in monitoring section. This alarming will helps to alert the people.
1.1 Motivation of work
At present one of the critical issue in particular, some of dangerous goods such as radioactive sources they may be missing will cause damage to the public, and cause public alarm so we can resolve such type of problems by this Radioactive tracer anti-theft system.
1.2` Organization of Thesis
The project thesis consists of five chapters
Chapter:1 Includes the introduction to RFID also a brief introduction to embedded systems,and this project
Chapter: 2 consists of review of various procedures available for RFID
Chapter:3 Comprises of the proposed methodology which explains about the block diagram of Monitoring Tracking Sections and details of all components used in the project.
Chapter:4 Presents the implementation of proposed approach and the Tracking system algorithm.
Chapter:5 Embodies results and conclusions that have been made based on the experiments and the analysis using the proposed technique and also the possible extensions and future scope in the present area of work.

Chapter 2
-------------------------------------------------
Literature Survey
This chapter discusses various methods proposed by previous researches
Sunny R. Panjwani, Aarti S.Gaikwad proposed that theLocation-based spatial queries (LBSQs) refer to spatial queries whose answers rely on the location of the inquirer []. Efficient processing of LBSQs is of critical importance with the ever-increasing deployment and use of mobile technologies. Input of the system will be the radius of the region the center of which is the user current location and the type of entity such as bank, malls etc.This database will consist of all the entities with their type and geographic location. This algorithm will find out all the locations within the specified region intended by the user.They were used the technology of a java mobile application that is used in GPS supported mobiles phones
This works in two steps these steps are Firstly the administrator will enter the information about all the places. The administrator will just put his login and password and then he can enter information about the places and stores it in database. Firstly the information will send to the JSP and then JSP will send request to the servlet after that servlet will execute and through database layer it will update the database.Other one is User with java enabled mobile will have to enter the login and password and then the system will check for authorized person if he is not registered the he have to create his account and only then he can access thisapplication. If the person found to be registered then he just have to enter the radius according to radius the range is decided .this input range will fire on servlet then through database layer spatial query will fire on the database and then response will be displayed on the user mobile.
Some benefits of this system is User can search any places and its information. This system will available 24x7 as it is depend on GPS, Can work in any java enabled mobile, Cost is reduced as it uses only GPS not GPRS.There is also some drawbacks of the proposed system those are this system uses GPS so there is continuously communication between the mobile and the satellite. so it consumes more battery. Software is in the phase of growth as every device is not GPS enabled and many a times we require external hardware support.
The provided an application that will allow any user to search any place in particular range. So this project will help people to stay fast and search places like hospital, IT industry, monuments in very fast and cost effective way.
Mandeep Kaur, Manjeet Sandhu, Neeraj Mohan and Parvinder S. Sandhu. proposed that the RFID principles,advantages,limitations and applications.It gives an overview of the current state of radio frequency identification (RFID) technology. Aside from a brief introduction to the principles of the technology, major current and envisaged fields of application, as well as advantages, and limitations of use are discussed. Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly using radio waves. RFID(Radio Frequency Identification) enables identification from a distance, and unlike earlier bar-code technology.
We can divide RFID devices into two classes active and passive. Active tags require a power source they’re either connected to a powered infrastructure or use energy stored in an integrated battery. Passive RFID is of interest because the tags don’t require batteries or maintenance. The tags also have an indefinite operational life and are small enough to fit into a practical adhesive label. Two fundamentally different RFID design approaches exist for transferring power from the reader to the tag magnetic induction and electromagnetic (EM) wave capture. These two designs take advantage of the EM properties associated with an RF antenna the near field and the far field.RFID consists of three components in two combinations: a transceiver (transmitter/receiver) and antenna are usually combined as an RFID reader.Working of RFID is An RFID tag is read when the reader emits a radio signal that activates the transponder, which sends data back to the transceiver.
Some benefits of RFID discussed here those are no line-of-sight is required, An RFID tag can store large amounts of data additionally to a unique identifier, Unique item identification is easier to implement with RFID than with barcodes.Limitations of RFID is cost,collision(Attempting to read several tags at a time may result in signal collision and ultimately to data loss)and frequency(very high frequencies have to be use for wide range of applications) Applications of RFID are Location identification, Transfer of further data, Asset Tracking.
This paper provided an overview of the current state and trends of RFID technology. Even though numerous limitations and unresolved issues still hinder the widespread application of RFID. These concerns are often premised on unlikely assumptions about where the technology will go and how it will be used.

S. Palanisamy, S. Senthil Kumar, J. Lakshmi Narayanan proposed the Wireless based industrial automation is a prime concern in our day-to-day life. In this paper, they have tried to increase these standards by combining new design techniques to wireless industrial automation. All the processor and controllers are interconnected to personal computer through Zigbee. The Personal Computer will continuously monitor all the Data from remote processing unit and compare with value preloaded process structure. If any error is found the personal computer takes necessary action. Here star topology four node Zigbee network is tried. The first Zigbee is connected to the personal computer it acts as full function devices and is used to send and receive data from other nodes. The second, third and fourth Zigbee are reduced function devices and they are used to control the speed of DC motor, temperature control and lamp illumination control respectively.
Wireless communication is the transfer of information over a distance without the use of electrical conductors or wires. The distances involved may be short (a few meters as in television remote control) or long (thousands or millions of kilometers for radio communications).It en compasses various types of fixed, mobile, and portable two-way radios,cellular telephones, personal digital assistants (PDAs), and wireless networking. Here we use the wireless network for industrial data communication. Zigbee Protocol Features are Low duty cycle - provides long battery life, Low latency, Collision avoidance, Support for guaranteed time slots
This research provided an application it overcomes all problems in industries caused due to environmental issues.
Ma Chang-jie, Fang Jin-yun proposed that the paper,leveraged technologies of wireless network, mobile communication and geographical information, Aiming to this, the paper, taking technologies of wireless network, mobile communication and geographical information as the foundation, conducted the research and development on the Digital Dunhuang Mobile Tour Guide (MTG) services based on the location awareness. It will facilitate tourists to make full use and enjoyment of MTG services at anytime anywhere through Personal Digital Assistants (PDAs), mobile phones and other handheld devices
Various types of services available here they are SMS (Short Message Service) and MMS
(Multimedia Messaging Service), WAP (Wireless Application Protocol), IVR (Interactive Voice Response, Digital map presentations, Personal journey tips
This, research taking advantage of the technologies of wireless network, mobile communication and geographical information,
Zhang Liying, Wang Xianwei, Wang Chaoqun, Gu Xuehui proposed a anti stolen Tracking system. Regular life always has some important items and dangerous goods need to be stored or to use. In the process of storage and use, they may be missing, and cause the loss. In particular, some of dangerous goods such as radioactive sources will cause damage to the public, and cause public alarm. How to supervise and manage dangerous goods, recovered rapidly after losing and reduce the serious consequences and also is one of the urgent problems need to be resolved for related departments. Radioactive tracer anti-theft system is designed based on these requirements using (using GSM technology).
This research deals with securing the dangerous items like radioactive substances by continuously monitoring the items using monitoring probe and if lost they are tracked using tracking system. Both monitoring and tracking probes are made of RFID reader and tags respectively. And the monitoring probe monitors the item to be secured continuously by sending a message. monitor probe sends an alarm to the pc, and the tracking system tracks the position of the item using GPS and message is sent to the respective mobile using GSM with the location information. The user will send a stop message to stop the sending alarms. So that it can identify the stolen radioactive source.
This design and implementation of radioactive source control management system based on Internet of Things Technology. if some important objects or dangerous items missed, it will soon identify target objects in which direction, and find important objects as soon as possible, to reduce losses.

Chapter3
-------------------------------------------------
Methodology
This chapter discusses about the hardware design, details of equipments and software’s used.
3.1 HARDWARE DESIGN
In this having two sections. First section is monitoring section and second section is tracking section. The fig 3.1, the monitoring section consists of LPC2148 microcontroller , power supply, RFID reader, LCD, GSM, DC Motor and Driver Circuit and the fig 3.2, tracking section consists of GPS and also consists of LPC2148 microcontroller , power supply, LCD, RFID reader and GSM. The description of individual component is discussed in the next section.
3.1.1 MONITORING SECTION

MICRO CONTROLLER
(LPC2148)

RFID READER

GSM

LCD/PC

POWER SUPPLY
DRIVER CIRCUIT DC MOTOR

Fig 3.1Block Diagram of Monitoring Section

3.1.2 TRACKING SECTION:

MICRO CONTROLLER
(LPC2148)

RFID READER

GSM

LCD/PC

POWER SUPPLY

GPS

Fig 3.2Block Diagram of Tracking Section
3.2 Details of the Equipments
3.2.1 LPC2148
3.2.1.1 LPC2148 Features * 16/32-bit ARMTDMI-S microcontroller in a tiny LQFP64 package. * 8 to 40 kB of on-chip static RAM and 32 to 512 kB of on-chip flash program memory.128 bit wide interface/accelerator enables high speed 60 MHz operation. * In-System/In-Application Programming (ISP/IAP) via on-chip boot-loader software. Single flash sector or full chip erase in 400 ms and programming of 256 bytes in 1ms. * Embedded ICE RT and Embedded Trace interfaces offer real-time debugging with the on-chip Real Monitor software and high speed tracing of instruction execution. * USB 2.0 Full Speed compliant Device Controller with 2 kB of endpoint RAM. In addition, the LPC2148 provides 8 kB of on-chip RAM accessible to USB by DMA. * One or two (LPC2141/2 vs. LPC2144/6/8) 10-bit A/D converters provide a total of 6/14analog inputs, with conversion times as low as 2.44μs per channel. * Single 10-bit D/A converter provide variable analog output. * Two 32-bit timers/external event counters (with four capture and four compare channels each), PWM unit (six outputs) and watchdog. * Low power real-time clock with independent power and dedicated 32 kHz clock input. * Multiple serial interfaces including two UARTs (16C550), two Fast I2C-bus (400 Kbit/s), SPI and SSP with buffering and variable data length capabilities. * Vectored interrupt controller with configurable priorities and vector addresses. * Up to 45 of 5 V tolerant fast general purpose I/O pins in a tiny LQFP64 package. * Up to nine edge or level sensitive external interrupt pins available. * 60 MHz maximum CPU clock available from programmable on-chip PLL with settling time of 100μs. * On-chip integrated oscillator operates with an external crystal in range from 1 MHz to * 30 MHz and with an external oscillator up to 50MHz. * Power saving modes include idle and Power-down. * Individual enable/disable of peripheral functions as well as peripheral clock scaling for additional power optimization. * Processor wake-up from Power-down mode via external interrupt, USB, Brown-Out Detect (BOD) or Real-Time Clock (RTC). * Single power supply chip with Power-On Reset (POR) and BOD circuits: CPU operating voltage range of 3.0 V to 3.6 V (3.3 V ± 10 %) with 5 V tolerant I/O pads.

3.2.1.2 Pin Diagram

Fig 3.3: Pin Diagram of LPC2148

3.2.1.3 ARM Processor
ARM stands for Advanced RISC Machines. It is a 32 bit processor core, used for high end application. It is widely used in Advanced Robotic Applications. The ARM architecture has been designed to allow very small, yet high-performance implementations. The architectural simplicity of ARM processors leads to very small implementations, and small implementations allow devices with very low power consumption. The ARM is a Reduced Instruction Set Computer (RISC), as it incorporates these typical RISC architecture features: * A large uniform register file. * A load/store architecture, where data-processing operations only operate on register contents, not directly on memory contents * Simple addressing modes, with all load/store addresses being determined from register contents and instruction fields only * Uniform and fixed-length instruction fields, to simplify instruction decode. * Control over both Arithmetic Logic Unit (ALU) and shifter in every data-processing instruction to maximize the use of an ALU and a shifter * Load and Store multiple to maximize data throughput. * Conditional execution of instructions, to maximize execution throughput. * Auto increment and Auto decrement addressing modes to optimize program loop. This feature is not common in RISC architecture. * Barrel Shifter in data path that maximize the usage of hardware available on the chip. * These enhancements to a basic RISC architecture allow ARM processors to achieve a good balance of high performance, low code size and low power consumption.
3.2.1.4 ARM Block diagram The main parts of the ARM processor are: 1. Register file: The processor has a total of 37 registers made up of 31 general 32 bit registers and 6 status registers 2. Booth Multiplier 3. Barrel shifter 4. Arithmetic Logic Unit (ALU) 5. Control Unit. Fig3.4: ARM Block Diagram
3.2.1.5 History and Development * ARM was developed at Acorn Computers ltd of Cambridge, England between 1983 and 1985. * RISC concept was introduced in 1980 at Stanford and Berkley. * ARM ltd was found in 1990. * ARM cores are licensed to partners so as to develop and fabricate new microcontrollers around same processor cores.
3.2.1.6 ARM Architecture * Architecture of ARM is Enhanced RISC Architecture. * It has large uniform Register file. * Employs Load Store Architecture- Here operations operate on registers and not in memory locations. * Architecture is of uniform and fixed length. * 32 bit processor. It also has 16 bit variant i.e. it can be used as 32 bit and as 16 bit processor. 3.2.1.7 Core Data path * Architecture is characterized by Data path and Control path. * Data path is organized in such a way that, operands are not fetched directly from memory locations. Data items are placed in register files. No data processing takes place in memory locations. * Instructions typically use 3 registers. 2 source registers and 1 destination register. * Barrel Shifter pre-processes data, before it enters ALU. Barrel Shifter is basically a combinational logic circuit, which can shift data to left or right by arbitrary number of position in same cycle. * Increment or Decrement logic can update register content for sequential access. 3.2.1.8 ARM Organization Register Bank is connected to ALU via two data paths. * A Bus * B Bus B bus goes via Barrel Shifter. It pre-processes data from source register by shifting left or right or even rotating. The Program Counter is that part of Register Bank that generates address. Registers in register bank are symmetric i.e., they can have both data and address. Program counter generates address for next function. Address Incremental block, increments or decrements register value independent of ALU. There is an Instruction Decode and control block that provides control signals. (Not in figure)
3.2.1.9 Pipeline * In ARM 7, a 3 stage pipeline is used. A 3 stage pipeline is the simplest form of pipeline that does not suffer from the problems such as read before write. * In a pipeline, when one instruction is executed, second instruction is decoded and third instruction will be fetched. This is executed in a single cycle.
3.2.1.10 Register Bank * ARM 7 uses load and store Architecture. * Data has to be moved from memory location to a central set of registers. * Data processing is done and is stored back into memory. * Register bank contains, general purpose registers to hold either data or address. * It is a bank of 16 user registers R0-R15 and 2 status registers. * Each of these registers is 32 bit wide. * Data Registers- R0-R15 * R0-R12 - General Purpose Registers * R13-R15 - Special function registers of which, * R13 - Stack Pointer, refers to entry pointer of Stack. * R14 - Link Register, Return address is put to this whenever a subroutine is called. * R15 - Program Counter
Depending upon application R13 and R14 can also be used as GPR. But not commonly used.

Fig3.5: Register Bank in ARM
In addition there are 2 status registers * CPSR * SPSR
3.2.1.11 CPSR
Current program status register, status of current execution is stored .CPSR contains a number of flags which report and control the operation of ARM7 CPU.
3.2.1.12 SPSR
Saved program Status register, includes status of program as well as processor. SPSR is used to preserve the value of the CPSR when the associated exception occurs.

Fig 3.6: Current Program Status Register
Conditional Code Flags
N - Negative Result from ALU
Z - Zero result from ALU
C - ALU operation carried out
V - ALU operation overflowed Interrupt Enable Bits
I - IRQ, Interrupt Disable
F - FIQ, Disable Fast Interrupt
T- Bit
If T=0, Processor in ARM Mode.
If T=1, Processor in THUMB Mode
3.2.1.13 Mode Bits
A mode bit specifies the processor Modes. The ARM architecture supports the seven processor modes shown in Table 3.1 below. Mode | Abbreviation | Privileged | Mode | Description | Abort | Abt | Yes | 10111 | Implements virtual memory and/or memory protection | Fast Interrupt Request | Fiq | Yes | 10001 | Supports a high-speed data transfer or channel process | Interrupt Request | Irq | Yes | 10010 | Used for general-purpose interrupt handling | Supervisor | Svc | Yes | 10011 | A protected mode for the operating system | System | Sys | Yes | 11111 | Runs privileged operating system tasks (ARMv4 and above) | Undefined | Und | Yes | 11011 | Supports software emulation of hardware coprocessors | User | Usr | No | 10000 | Normal program execution mode |
Table 3.7: Processor Modes in ARM
3.3 Liquid Crystal Display Liquid crystal displays (LCDs) have materials, which combine the properties of both liquids and crystals. Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrodes and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle. One each polarizer’s are pasted outside the two glass panels. This polarizer’s would rotate the light rays passing through them to a definite angle, in a particular direction. When the LCD is in the off state, light rays are rotated by the two polarizer’s and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarizer’s, which would result in activating/ highlighting the desired characters. The LCD’s are lightweight with only a few millimeters thickness. Since the LCD’s consume less power, they are compatible with low power electronic circuits, and can be powered for long durations. The LCD’s doesn’t generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark. The LCD’s have long life and a wide operating temperature range. Changing the display size or the layout size is relatively simple which makes the LCD’s more customers friendly. The LCDs used exclusively in watches, calculators and measuring instruments are the simple seven-segment displays, having a limited amount of numeric data. The recent advances in technology have resulted in better legibility, more information displaying capability and a wider temperature range. These have resulted in the LCDs being extensively used in telecommunications and entertainment electronics. The LCDs have even started replacing the cathode ray tubes (CRTs) used for the display of text and graphics, and also in small TV applications.
3.3.1 LCD operation
In recent years the LCD is finding widespread use replacing LEDs (seven-segment LEDs or other multi segment LEDs).This is due to the following reasons:
1. The declining prices of LCDs.
2. The ability to display numbers, characters and graphics. This is in contrast to LEDs, which are limited to numbers and few characters
3. Incorporation of a refreshing controller into the LCD, there by relieving the CPU of the task of refreshing the LCD. In the contrast, the LED must be refreshed by the CPU to keep displaying the data.
4. Ease of programming for characters and graphics
3.3.2 LCD pin description
The LCD discussed in this section has 14 pins. The function of each pin is given in table 3.2. Pin | Symbol | I/O | Description | 1 | Vss | -- | Ground | 2 | Vcc | -- | +5V power supply | 3 | VEE | -- | Power supply to control contrast | 4 | RS | I | RS=0 to select command registerRS=1 to select data register | 5 | R/W | I | R/W=0 for writeR/W=1 for read | 6 | E | I/O | Enable | 7 | DB0 | I/O | The 8-bit data bus | 8 | DB1 | I/O | The 8-bit data bus | 9 | DB2 | I/O | The 8-bit data bus | 10 | DB3 | I/O | The 8-bit data bus | 11 | DB4 | I/O | The 8-bit data bus | 12 | DB5 | I/O | The 8-bit data bus | 13 | DB6 | I/O | The 8-bit data bus | 14 | DB7 | I/O | The 8-bit data bus |
Table 3.8: Pin description for LCD Code (hex) | Command to LCD Instruction Register | 1 | Clear display screen | 2 | Return home | 4 | Decrement cursor | 6 | Increment cursor | 5 | Shift display right | 7 | Shift display left | 8 | Display off, cursor off | A | Display off, cursor on | C | Display on, cursor off | E | Display on, cursor on | F | Display on, cursor blinking | 10 | Shift cursor position to left | 14 | Shift cursor position to right | 18 | Shift the entire display to the left | 1C | Shift the entire display to the right | 80 | Force cursor to beginning of 1st line | C0 | Force cursor to beginning of 2nd line | 38 | 2 lines and 5x7 matrix |
Table3.9: LCD Command Codes
3.3.3 LCD Interfacing
Sending commands and data to LCDs with a time delay
To send any command from table 2 to the LCD, make pin RS=0.
For data, make RS=1.Then sends a high –to-low pulse to the E pin to enable the internal latch of the LCD.

Fig3.10: Interfacing of LCD to a micro controller 3.4 MOTOR DRIVER L293D:
The L293 is an integrated circuit motor driver that can be used for simultaneous, bi-directional control of two small motors. Small means small. The L293 is limited to 600 mA, but in reality can only handle much small currents unless you have done some serious heat sinking to keep the case temperature down. Unsure about whether the L293 will work with your motor? Hook up the circuit and run your motor while keeping your finger on the chip. If it gets too hot to touch, you can't use it with your motor. (Note to ME2011 students: The L293 should be OK for your small motor but is not OK for your gear motor.)
The L293 comes in a standard 16-pin, dual-in line integrated circuit package. There is an L293 and an L293D part number. Pick the "D" version because it has built in flyback diodes to minimize inductive voltage spikes.
The pin out for the L293 in the 16-pin package is shown below in top view. Pin 1 is at the top left when the notch in the package faces up. Note that the names for pin functions may be slightly different than what is shown in the following diagrams.

Fig 3.11 pin diagram of L293D
The following schematic shows how to connect the L293 to your motor and the Stamp. Each motor takes 3 Stamp pins. If you are only using one motor, leave pins 9, 10, 11, 12, 13, 14, and 15 empty.

Fig 3.12 circuit diagram of L293D
Assume you have only one motor connected with the enable tied to Stamp Pin 0, and the two direction controls tied to Stamp Pins 1 and 2. ENABLE | DIRA | DIRB | Function | H | H | L | Turn right | H | L | H | Turn left | H | L/H | L/H | Fast stop | L | Either | either | Slow stop |
Table 3.13 The control pin functions
Advantage:
You can control 2 motors in both directions instead of 4 in only one direction.
Disadvantages:
There is a 1.5V voltage drop within the L293D driver chip.
If you run both motors and servos on the same circuit, your servos will always get 1.5V more than the motors - and typically you would want it the other way around!

3.5 DC GEARED MOTOR 12V 60RPM:(robotics)

Fig 3.14 DC GEARED MOTOR
In this project uses 60RPM 12V DC geared motors for robotics applications. Very easy to use and available in standard size. Nut and threads on shaft to easily connect and internal threaded shaft for easily connecting it to Door.
3.5.1 Features: * 60RPM 12V DC motors with Gearbox * 3000RPM base motor * 6mm shaft diameter with internal hole * 125gm weight * Same size motor available in various rpm * 2kgcm torque * No-load current = 60 mA(Max), Load current = 300 mA(Max)

3.6 Power supply
In this project apply the power supply through Battery. The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronic circuits and other devices. A power supply can by broken down into a series of blocks, each of which performs a particular function. A D.C power supply which maintains the output voltage constant irrespective of A.C mains fluctuations or load variations is known as “Regulated D.C Power Supply”. For example a 5V regulated power supply system as shown below:
BLOCK DIAGRAM

Fig 3.15 Block diagram
3.6.1 Transformer A transformer is an electrical device which is used to convert electrical power from one Electrical circuit to another without change in frequency. Transformers convert AC electricity from one voltage to another with little loss of power. Transformers work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase in output voltage, step-down transformers decrease in output voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage to a safer low voltage. The input coil is called the primary and the output coil is called the secondary. There is no electrical connection between the two coils; instead they are linked by an alternating magnetic field created in the soft-iron core of the transformer. The two lines in the middle of the circuit symbol represent the core. Transformers waste very little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current is stepped up. The ratio of the number of turns on each coil, called the turn’s ratio, determines the ratio of the voltages. A step-down transformer has a large number of turns on its primary (input) coil which is connected to the high voltage mains supply, and a small number of turns on its secondary (output) coil to give a low output voltage.
Turns ratio = V p/ VS = N p /N S
Power Out= Power In that is VS X IS=VP X IP
V p =Primary (input) voltage
Np=Number of turns on primary coil
I p = Primary (input) current
3.6.2 Rectifier
A circuit which is used to convert A.C to D.C is known as RECTIFIER. The process of conversion A.C to D.C is called “rectification”
Types of Rectifiers * Half wave Rectifier * Full wave rectifier
1. Centre tap full wave rectifier.
2. Bridge type full bridge rectifier.
In this project using Bridge Rectifier. So we discuss about Bridge Rectifier only
Bridge Rectifier
A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig 3.25(A) to achieve full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally.

Fig 3.16(A)

Operation
During positive half cycle of secondary, the diodes D2 and D3 are in forward biased while D1 and D4 are in reverse biased as shown in the fig 3.11(B). The current flow direction is shown in the fig 3.25(B) with dotted arrows.

Fig3.16 (B)
During negative half cycle of secondary voltage, the diodes D1 and D4 are in forward biased while D2 and D3 are in reverse biased as shown in the fig3.25(C). The current flow direction is shown in the fig 3.25(C) with dotted arrows.

Fig3.16(c)
3.6.3Filter
A Filter is a device which removes the A.C component of rectifier output but allows the D.C component to reach the load
Capacitor Filter
The ripple content in the rectified output of half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the applications. Ripples can be removed by one of the following methods of filtering.
A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage though it due to low impedance. At ripple frequency and leave the D.C to appear the load.
Filtering is performed by a large value electrolytic capacitor connected across the DC supply to act as a reservoir, supplying current to the output when the varying DC voltage from the rectifier is falling. The capacitor charges quickly near the peak of the varying DC, and then discharges as it supplies current to the output. Filtering significantly increases the average DC voltage to almost the peak value
Mainly the ARM controller needs 3.3 volt power supply. To use these parts we need to build a regulated 3.3 volt source. Usually you start with an unregulated power To make a 3.3 volt power supply, we use a LM317 voltage regulator IC (Integrated Circuit). The IC is shown below.
3.6.4 Regulator
A current-limiting circuit constructed with LM317

Fig 3.17 LM317 Voltage Regulator
Part pin out of LM317 showing its constant voltage reference
LM317 is the standard part number for an integrated three-terminal adjustable linear voltage regulator. LM317 is a positive voltage regulator supporting input voltage of 3V to 40V and output voltage between 1.25V and 37V. A typical current rating is 1.5A although several lower and higher current models are available. Variable output voltage is achieved by using a potentiometer or a variable voltage from another source to apply a control voltage to the control terminal. LM317 also has a built-in current limiter to prevent the output current from exceeding the rated current, and LM317 will automatically reduce its output current if an overheat condition occurs under load. LM317 is manufactured by many companies, including National Semiconductor, Fairchild Semiconductor, and STMicroelectronics.
Although LM317 is an adjustable regulator, it is sometimes preferred for high-precision fixed voltage applications instead of the similar LM78xx devices because the LM317 is designed with superior output tolerances. For a fixed voltage application, the control pin will typically be biased with a fixed resistor network, a ZenerHYPERLINK "http://en.wikipedia.org/wiki/Zener_diode" diode network, or a fixed control voltage from another source. Manufacturer datasheets provide standard configurations for achieving various design applications, including the use of a pass transistor to achieve regulated output currents in excess of what the LM317 alone can provide.
LM317 is available in a wide range of package forms for different applications including heat sink mounting and surface-mount applications. Common form factors for high-current applications include TO-220 and TO-3. LM317 is capable of dissipating a large amount of heat at medium to high current loads and the use of a heat sink is recommended to maximize the lifespan and power-handling capability.
LM337 is the negative voltage complement to LM317 and the specifications and function are essentially identical, except that the regulator must receive a control voltage and act on an input voltage that are below the ground reference point instead of above it.
3.7 GSM GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands. GSM has been the backbone of the phenomenal success in mobile telecoms over the last decade. Now, at the dawn of the era of true broadband services, GSM continues to evolve to meet new demands. One of GSM's great strengths is its international roaming capability, giving consumers a seamless service. This has been a vital driver in growth, with around 300 million. In the Americas, today's 7 million subscribers are set to grow rapidly, with market potential of 500 million in population, due to the introduction of GSM 800, which allows operators using the 800 MHz band to have access to GSM technology too. GSM security issues such as theft of service, privacy, and legal interception continue to raise significant interest in the GSM community. The purpose of this portal is to raise awareness of these issues with GSM security.
3.7.1 Physical Characteristics Table 3.18 Physical characteristics Dimensions | 100 x 78 x 32 mm (excluding connectors) | Weight | 125 grams | Housing | Aluminium Profiled |

3.7.2 Temperature Range
Operating temperature: from -200C to +550C
Storage temperature: from -250C to +700C
3.7.3 DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply Requirement:
Table 3.19 Power Supply Requirement of GSM Modem Parameters | Min | Avg | Max | Su Supply Voltage | 5 V | 9 V | 12 V | Peak Current at 5 V supply | | | 1.8 A (during transmission) | Average Current at 5 V supply in idle Mode | | | 35 mA | Average Current at 5 V supply in idle Mode and RS232 Power Saving Activated | | | 13 mA |

Connecting Modem to external devices RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem.
3.7.4 Connectors Table 3.20 Modem connections to external devices Connector | Function | SMA | RF Antenna connector | 15 or 9 pins D-SUB USB (optional) | RS232 link Audio link (only for 15 D-SUB) Reset (only for 15 D-SUB) USB communication port (optional) | 2 pin Phoenix tm | Power Supply Connector | SIM Connector | SIM Card Connection | RJ11 (For 9 D-SUB and USB only) | Audio link Simple hand set connection (4 wire) 2 wire desktop phone connection |

LED Status Indicator
The LED will indicate different status of the modem:
OFF Modem Switched off
ON Modem is connecting to the network
Flashing Slowly Modem is in idle mode
3.7.5 Architecture of the GSM network
A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 3.23 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations
A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 3.23 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. Subscriber carries the Mobile Station. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Canter (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendancy Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link. The Base Station Subsystem communicates with the Mobile services Switching Center across the interface.
3.7.5.1 Mobile Station The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific terminal. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services. The mobile equipment is uniquely identified by the International Mobile Equipment

Fig 3.21 General Architecture of a GSM Network
Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number.
3.7.5.2 Base Station Subsystem
The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC). These communicate across the standardized Abas interface, allowing (as in the rest of the system) operation between components made by different suppliers.
The Base Transceiver Station houses the radio transceivers that define a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below. The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC).
3.7.5.3 Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signaling between functional entities in the Network Subsystem uses Signaling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks.
The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile. The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented
The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR. Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations --- this information is stored in the location registers.
The other two registers are used for authentication and security purposes. The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication center (AuC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel.

3.8 GPS
The Global Positioning System (GPS) is a satellite-based navigation system that sends and receives radio signals. A GPS receiver acquires these signals and provides you with information. Using GPS technology, you can determine location, velocity, and time, 24 hours a day, in any weather conditions anywhere in the world—for free.
GPS, formally known as the NAVSTAR (Navigation Satellite Timing and Ranging). Global Positioning System originally was developed for the military. Because of its popular navigation capabilities and because you can access GPS technology using small, inexpensive equipment, the government made the system available for civilian use. The USA owns GPS technology and the Department of Defense maintains it.
GPS technology requires the following three segments. * Space segment. * Control segment. * User segment
3.8.1 Space Segment
At least 24 GPS satellites orbit the earth twice a day in a specific pattern. They travel at approximately 7,000 miles per hour about 12,000 miles above the earth’s surface. These satellites are spaced so that a GPS receiver anywhere in the world can receive signals from at least four of them. * Each GPS satellite constantly sends coded radio signals (pseudorandom code) to the earth. These GPS satellite signals contain the following information. * The particular satellite that is sending the information. * Where that satellite should be at any given time (the precise location of the satellite is. called ephemeris data). * Whether or not the satellite is working properly. * The date and time that the satellite sent the signal.
The signals can pass through clouds, glass, and plastic. Most solid objects such as buildings attenuate (decrease the power of) the signals. The signals cannot pass through objects that contain a lot of metal or objects that contain water (such as underwater locations). The GPS satellites are powered by solar energy. If solar energy is unavailable, for example, when the satellite is in the earth’s shadow, satellites use backup batteries to continue running. Each GPS satellite is built to last about 10 years. The Department of Defense monitors and the satellites to ensure that GPS technology continues to run smoothly for years to come.

Fig 3.22 GPS Modem
3.8.2 Control Segment
The control segment is responsible for constantly monitoring satellite health, signal integrity, and orbital configuration from the ground control segment includes the following sections: * Master control station * Monitor stations * Ground antennas
3.8.3 Master Control Station (MCS)
The (MCS) is located near Colorado Springs in Colorado. The MCS constantly receives GPS satellite orbital and clock information from monitor stations. The controllers in the MCS make precise corrections to the data as necessary, and send the information (known as ephemeris data) to the GPS satellites using the ground antennas.
3.8.4 Monitor Stations
At least six unmanned monitor stations are located around the world. Each station constantly monitors and receives information from the GPS satellites and then sends the orbital and clock information to the master control station (MCS).

3.8.5 Ground Antennas
Ground antennas receive the corrected orbital and clock information from the MCS, and then send the corrected information to the appropriate satellites.
3.8.6 User Segment
The GPS user segment consists of your GPS receiver. Your receiver collects and processes signals from the GPS satellites that are in view and then uses that information to determine and display your location, speed, time, and so forth. Your GPS receiver does not transmit any information back to the satellites.
3.8.7 How Does GPS Technology Work? * The control segment constantly monitors the GPS constellation and uploads information to satellites to provide maximum user accuracy * Your GPS receiver collects information from the GPS satellites that are in view. * Your GPS receiver accounts for errors. For more information, refer to the Sources of Errors. * Your GPS receiver determines your current location, velocity, and time. * Your GPS receiver can calculate other information, such as bearing, track, trip distance, and distance to destination, sunrise and sunset time so forth. * Your GPS receiver displays the applicable information on the screen.
3.8.8 Who Uses GPS?
GPS technology has many amazing applications on land, at sea, and in the air. You might be surprised to learn about the following examples of how people or professions are already using GPS technology.
3.8.8.1 Aviation
Aircraft pilots use GPS technology for en route navigation and airport approaches. Satellite navigation provides accurate aircraft location anywhere on or near the earth.
3.8.8.2 Environment
GPS technology helps survey disaster areas and maps the movement of environmental phenomena (such as forest fires, oil spills, or hurricanes). It is even possible to find locations that have been submerged or altered by natural disasters.
3.8.8.3 Marine
GPS technology helps with marine navigation, traffic routing, underwater surveying, navigational hazard location, and mapping. Commercial fishing fleets use it to navigate to optimum fishing locations and to track fish migrations.
3.8.8.4 Military
Military aircraft, ships, submarines, tanks, jeeps, and equipment use GPS technology for many purposes including basic navigation, target designation, close air support, weapon technology, and rendezvous.
3.8.9 How Accurate Is GPS?
GPS technology depends on the accuracy of signals that travel from GPS satellites to a GPS receiver. You can increase accuracy by ensuring that when you use (or at least when you turn on) your GPS receiver, you are in an area with few or no obstacles between you and the wide open sky. When you first turn on your GPS receiver, stand in an open area for a few moments to allow the unit to get a good fix on the satellites (especially if you are heading into an obstructed area). This gives you better accuracy for a longer period of time (about 4-6 hours).

Fig 3.23: GPS sample module

3.8.10 Aar Logic GPS 3A
Pin assignment

Fig 3.24: GPS 3A pin assignment

Fig 3.25 TTL&USB Pin Assignment

Fig 3.26 DC Temperature & Characterstics
3.9 Introduction to RFID RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a means of identifying a person or object using a radio frequency transmission. In other words RFID is an electronic method of exchanging data over radio frequency waves. The technology can be used to identify, track, sort or detect a wide variety of objects.
There are three major components to a RFID system: Transponder (Tag), Antenna and a Controller. Communication takes place between a Reader (some times called interrogator) and a Transponder (Silicon Chip connected to an antenna) often called a Tag.

3.9.1 RFID System
In a typical RFID system tags are attached to objects. Each tag has a certain amount of internal memory (EEPROM) in which it stores information about the object, such as its UNIQUE ID (serial) number, or in some cases more details including manufacture date and product composition. When these tags pass through a field generated by a reader, they transmit this information back to the reader, thereby identifying the object. Until recently the focus of RFID technology was mainly on tags and readers which were being used in systems where relatively low volumes of data are involved. This is now changing as RFID in the supply chain is expected to generate huge volumes of data, which will have to be filtered and routed to the backend IT systems. To solve this problem companies have developed special software packages called savants, which act as buffers between the RFID front end and the IT backend. Savants are the equivalent to middleware in the IT industry.
3.9.2 COMMUNICATION
The Communication process between the Reader and Tag is managed and controlled by one of several protocols, such as the ISO 15693 and ISO 18000-3 for HF or the ISO 18000-6, and EPC for UH Basically what happens is that when the reader is switched on, it starts emitting a signal at the selected frequency band (typically 860 - 915MHz for UHF or 13.56MHz for HF). Any corresponding tag in the vicinity of the reader will detect the signal and use the energy from it to wake up and supply operating power to its internal circuits. The tags must use the power they receive to operate their integrated circuits and return a signal with their ID to the reader. Once the Tag has decoded the signal as valid, it replies to the reader, and indicates its presence by modulating (affecting) the reader field.
3.9.3 TAGS The Transponder (Electronic Transmitter/Responder) contains a silicon microchip, smaller than a grain of rice, and a small antenna.

Tag with an Antenna Tag Fig 3.26 Tag & Tag with Antenna
Tags are classified into two types based on operating power supply fed to it. 1. Active Tags 2. Passive Tags
3.9.3.1 Active Tags
These tags have integrated batteries for powering the chip. Active Tags are powered by batteries and either have to be recharged, have their batteries replaced or be disposed of when the batteries fail.
3.9.3.2 Passive Tags
Passive tags are the tags that do not have batteries and have indefinite life expectancies.

Fig 3.26 Different types of tags Tags come in a variety of shapes and sizes. Tags can be attached to various objects. These objects include products, cartons, totes, pallets, parts, assemblies in manufacturing, cars, trucks, physical assets, etc. Tags come in various forms including Smart cards, Tags, Labels, watches and even embedded in mobile phones. Tags are sold in various types. These include adhesive back labels, credit card shaped laminate, screw down plastic assemblies and a host of other types of tags.
3.9.4 ANTENNA The Antenna is a device that either reads data from tags or, in some cases, writes data to tags using radio Frequency waves. Antenna's come in all shapes and sizes depending on the environment or the required range. Antennas can be mounted on the floor, to sides of conveyors, on lift trucks, or on building structures.
Antennas come in all sorts of sizes and shapes. The size of the antenna determines the range of the application. Large antennas used with Active Tags can have a range of 100 feet or more. Large antennas used with Passive Tags generally have a range of 10 feet of less. There are dock door antennas (some times called Portals) that allow a forklift driver to drive between two antennas. Information can be collected from the tags without the forklift driver having to stop. There are antennas that mount between rollers on conveyors for reading/writing from below. While other antennas are available that mount to the side of or above the conveyors. Handheld Reader/Writers are available as well.
3.9.5 READERS The Controller (Interrogator) is the electronic device that receives the data from the antenna, or transmits data to the antenna, and usually communicates this data to a host computer or Microcontrollers.
Generally Readers are realized using the Microcontroller. Readers are available to communicate with most Networks (Ethernet, Device Net, Pro-Fibus, etc). They typically have serial ports for programming and data transfer. Readers (realized using Microcontrollers) are usually shipped with programming software to set-up and customize the application
3.9.6 RFID FREQUENCIES
Tags and Antennas are tuned or matched much the same way as a radio is tuned to a frequency to receive different channels. These frequencies are grouped into Four basic ranges: Low Frequency, High Frequency, Very High Frequency and Ultra-High Frequencies. The communication frequencies used depends to a large extent on the application, and range from 125 KHz to 2.45 GHz.

Fig 3.27 RFID Frequencies
Each frequency range has its advantages and disadvantages. Europe uses 868 MHz. for its UHF applications while the US uses 915 MHz. for its UHF applications. Japan does not allow the use of the UHF frequency for RFID applications. Low Frequency tags (LF) are less costly to manufacturer than Ultra High Frequency (UHF) tags. UHF tags offer better read/write range and can transfer data faster then other tags. HF tags work best at close range but are more effective at penetrating non-metal objects especially objects with high water content.
3.9.7 USES of RFID
For many years RFID technology has been used for tracking livestock on farms. Tags are installed either on or under the skin of animals. These tags store information about the animal such as its identification number, its medical history, and its weight and age. Being able to identify the needs of an animal during feeding and medical attention without having to look up the animals history in printed logs saves the farm considerable time and money. Some airports currently use RFID technology to track and sort baggage in the terminal. This allows for a completely automated baggage handling facility.
Currently the applications of RFID include material handling, logistics, warehousing, manufacturing, personal identification and many more applications. Simply put, applications are limited only by your imagination.
3.9.8 ADVANTAGES OF RFID RFID technology is frequently compared to Barcode technology. While RFID technology will probably never replace Barcode technology, it does have many advantages. The following is a list of a few of these advantages:
• You must have 'Line of Sight" to read a barcode label.
• RFID tags can be placed inside containers or on surfaces that are not in the line of sight from the antenna.
• RFID technology has a longer read range compared to Barcode Technology.
• Considerably more data can be stored on RFID tags than on a Barcode label.
• You cannot write to a barcode label whereas some RFID tags have Read/Write capabilities.
3.10 Software’s Used
Prior to hardware implementation of Security Management System For Oil Field Based On GSM Technology, the logic developed is tested using simulation software’s. The softwares used are * Keil v3.1 IDE * Flash Magic
Keil IDE software is widely used to test the logic or functionality developed for microcontroller. This software supports almost all microcontrollers of 8051 family .It is capable of supporting assembly and embedded C. The present design is developed in assembly.
Flash magic is the software tool used to dump the hex converted embedded C code into the ARM7 (LPC2148) microcontroller.

Chapter4
-------------------------------------------------
Design Implementation
This chapter explains the basic methodology used in design of this prototype model. Using RFID, Stolen Tracking system is designed. Mainly the circuit consists of RFID Reader, LPC 2148, GSM,GPS
Here we are using GSM, RFID Reader, LCD, The GSM uses sending and receiving signals from monitoring section to tracking section
4.1 Functionality of the Design
4.1.1 Monitoring section
In this project required operating voltage for ARM controller board is 12V. Hence the 12V D.C. power supply is needed for the ARM board. This regulated 12V is generated by stepping down the voltage from 230V to 18V now the step downed a.c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a.c voltage is now filtered using a ‘C’ filter. Now the rectified, filtered D.C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a Regulated constant Voltage which is of +12V. The rectified; filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100μF. Now the output from this section is fed to microcontroller board to supply operating voltage.
GSM is connected to the UART 0.
RFID is connected to the UART 1.
DC Motor is connected to the port p0.16 to P0.17.

Fig 4.1 Circuit Diagram of Monitoring Section

4.1.2 Tracking System
Fig 4.2 Circuit Diagram of Monitoring Section
In this project required operating voltage for ARM controller board is 12V. Hence the 12V D.C. power supply is needed for the ARM board . This regulated 12V is generated by stepping down the voltage from 230V to 18V now the step downed a.c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a.c voltage is now filtered using a ‘C’ filter. Now the rectified, filtered D.C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a Regulated constant Voltage which is of +12V. The rectified; filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100μF. Now the output from this section is fed to microcontroller board to supply operating voltage.
GSM&GPS is connected to the UART 0.
RFID is connected to the UART 1.
4.2 Algorithm for the proposed design
Step1:The user has to initialize the microcontroller RFID&GSM.
Step2: The initialization is completed.RFID Reader Starts The Monitoring.
Step3:If RFID Tag detected, its again starts and continue the Monitoring.
Step4:If RFID not detected starts the DC Motor Then door will be closed in Monitoring section.
Step5: Then it sends the message to Tracking Section as RFID not detected.
Step6: Now GPS is Activates and check for the location.
Step7: It shows the location information with latitude and longitude values on LCD.
Step8: GSM sends the message to authorized person as RFID is Detected

4. 3 Flow chart for the proposed design

Fig4.3 Flow chart for the proposed design

Chapter5
-------------------------------------------------
Results and Conclusion
5.1 Results
Snap shot for the monitoring section of this project.
LCD
DC MOTOR
Power Supply
LPC2148
GSM
RFID Reader

Fig 5.1 snap shot of monitoring section

Snap shot for the tracking system of this project

LPC2148
POWER SUPPLY
RFID READER
GSM
GPS

Fig 5.2 snap shot for tracking system

5.2 Conclusion . Integrating features of all the hardware components used have developed it. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit. Secondly, using highly advanced IC’s and with the help of growing tools the project has been successfully implemented.
5.3 Future Scope

.

References

Similar Documents

Free Essay

Raymond James Financial Bcd Travel, Houston Texans and Others

...case are simple little issues such as emailing customer credit card numbers and such but I would have definitely have seen these issues but the lapse of these company have cost them security wise. The best way for organizations to strike the right balance between monitoring and invading their employees' privacy would be to evaluate each employees based on their activities. Have each employee make a report of their activities while the company is monitoring them as well the companies should put trust in their employees to report everything they're doing and when it is time to evaluate them cross compare what has been monitored and what the employees have reported. The consequence biased to one side would be if the company were to engage in just invading employee privacy there could be massive repercussions such as the company being sued etc. The other components are people security, establishing ethical behavior in the company, and managers taking the initiative to stop any leakage in the company. The human factor in is the stronger point in this situation its not the technology that's leaking information but the people the technology is just a tool to do so. The same goes for when it comes to monitoring and making sure that information is not leaked from the its the people who have to monitor to make sure that...

Words: 300 - Pages: 2

Free Essay

Call Center

...service level, number of calls per employee, first call resolution, and transfer rate.  By using the statistical report, it will help show the relationship between their performance and the organization standards or goals and it is easier to visualize.  It can also be utilized by the managers to take necessary corrective actions if needed. The response time and service level can be measured by the monitoring how many calls are answered within how many seconds and total number of calls in a day is being answered.  It is important to monitor the total amount of calls but we must consider the number of calls an employee is answering and should be reported to ensure that individual employee is properly assessed. This will also show if the employees are answering them promptly and not just a handful is answering the calls.    The first call resolution (FCR) measures the individuals’ ability to accomplish the task in one transaction and not transfer the call.  Transfer rate indicates how many calls have been transferred to another party to be handled. Monitoring the number of calls being transferred can identify if there are any performance gaps and training if needed (Reynolds 2012).   Reynolds, Penny (January 2012) The Top 20 Contact Center Metrics for 2012. Multichannel Merchant, Retrieved from...

Words: 252 - Pages: 2

Free Essay

Riordan Manufacturing

...Currently Riordan Manufacturing has several different offices and each office is using a different type of system, but there is not a central system that monitors each of the satellite offices and their production. To assist Riordan become more efficient, they will need to implement a central system to monitor both individual and overlapping system usage. They should create a Data Center in the corporate office that monitors all of the current systems in place. This will allow Riordan Manufacturing to understand how their business is functioning and how application are used more often and which are not utilized enough, helping to determine if they should upgrade or discontinue the use of a system. Each department uses different applications; some of the applications interface with one another and other are stand alone. Riordan also currently has a lot of manual processes, for example how they submit daily inventory records. With the overall updates that our team has posed have more automation will assist Riordan to increase their production and accuracy. We can implement an application that can be used by all of the centers in order to maintain the inventory across the board so the managers are able to see what is in high demand in specific locations. Having an overall view of the inventory will be beneficial to the entire company. If the marketing department has he ability to see the inventory usage then they will know where they need to market certain products better. We...

Words: 420 - Pages: 2

Premium Essay

Product Bullet Points

...Product Bullet Points: Reliable remote monitoring Program up to 10 wireless devices Adjustable notification settings Large silence button Lightweight with belt clip and lanyard 60 day guarantee Product Features: SIMPLE REMOTE MONITORING Easily integrates with the Vive fall management system for caregiver peace of mind and to promote greater independence REAL-TIME ALERTS With a range of up to 150 feet, the pager provides instant alerts enabling prompt assistance to minimize falls and hazardous wandering CONNECT UP TO 10 DEVICES Program up to ten wireless devices to receive real-time alerts THREE NOTIFICATION SETTINGS Be alerted with an adjustable volume chime, a silent vibration mode or a combination of the two QUICKLY SILENCE ALARMS...

Words: 585 - Pages: 3

Premium Essay

How Ish Play Their Role

...How ISH can play their monitoring role (by using ISC’s code of activism) * ISH need to set out their policy on how to monitor the investee companies, for example :- (i) Meeting policy with investee company’s board and senior management (dialogue). (ii) How to minimize or dealt with the conflict of interest situation by the ISH. (iii) Strategy on intervene in investee company. (iv) Indicate the type of circumstances where and how further actions need to be taken by ISH. (v) Voting policy and voting disclosure. * Monitoring and communicating:- (i) Monitor the performance of investee company on regular basis. * Review the Annual reports and accounts / general meeting resolution. * Review whether the board of investee company is effective or not. (ii) Regular dialogue with investee company’s board / senior management. (clear information) * Attend investee company meeting and raise question where necessary. * Enter into active dialogue with Company’s board / senior management. ^ enable the ISH to identify the problem at earlier stage and reduce the SH’s value. ^ But ISH may not want to involve in the investee operation. * Intervene where necessary (i) ISH will only intervene when the investee company :- * Engages in risky strategy which will reduce SHs/ value. * Performance is less than satisfactory. * Acquisition / disposal that involve related party transaction (not in arm-length basis). (sell company’s...

Words: 428 - Pages: 2

Free Essay

The Black

... | | |The introduction of your paper should acquaint the reader with the company being analyzed and demonstrate your ability to succinctly describe the company| | |from a historical perspective. Take this opportunity to highlight key factors and past strategies, which have led the company to its present position. | | |It is important for you to understand precisely why the company has been successful (or unsuccessful) in the past. Taking time to articulate this may | | |suggest distinctive competencies that you might otherwise overlook when writing the following sections. | | | | |Conclude the “Introduction” of your paper by...

Words: 1219 - Pages: 5

Free Essay

Ethics

...with an ethical issue. Deliverable: 1. Introduction. It was something I witnessed, an ethical issue which I wish to point out. It is not really similar to that of the Lab’s video. It is about an investigation into a safety incident whereby a soldier, Solider A, fractured his hand during a botched attempt to lift an armored vehicle’s engine panel. 2. Background leading to incident. A background to the incident is necessary for a complete understanding of the ethical issue. Corporal A belonged to Platoon 1 Section 1, which was not assigned the task of lifting the engine panel. Platoon 2 Section 2 was assigned the task. Platoon 2 Section 2 Leader, Sergeant B, was not yet certified to operate the crane, hence they were in a fix as to how to proceed. However, Sergeant B is the senior ranking soldier and was supposed to be in charge of the operation. Corporal A came along and notice the situation, and decided to help. He and some of his buddies from Section 1 decided to operate the crane. The chains were not secured properly and gave way due to the weight, and crushed...

Words: 737 - Pages: 3

Free Essay

How to Read at University

...How To Read University Texts or Journal Articles Choose a section preferrably not longer than 25 or 30 pages - perhaps one chapter, or a section of a chapter - that you can handle at one sitting. Step 1. Read the title, the introduction, and the conclusion (5 minutes). Step 2. Read the title, the introduction again, all sub-headings, and the conclusion, again. (5-10 minutes). Step 3. Read the title, the introduction one more time, sub-headings, the Topic Sentence of each paragraph - usually the first or second sentence, (you may read the last sentence as well, if you have time), any italicized or boldfaced words, lists (you can skim these), and the conclusion (10 minutes). (Force yourself to do steps 1 to 3 in less than 25 minutes.) Step 4. Close your textbook. Step 5. Make a Mind-Map of all you can remember in the chapter. Do not stop until at least half an hour is up, even if you feel that you can't possibly remember any more--more will surface if you give yourself the time. DO NOT REFER TO THE TEXT WHILE YOU ARE DOING THIS. If you come to a dead end, try alternative memory techniques to the ones you have been using: associating ideas, either from within the section itself or from other related material; visualizing pages, pictures, graphs etc.; recalling personal associations that may have come to mind; staring out the window and blanking out your thoughts; and so on. This is strenuous, but it is rewarding. It will show you exactly how much you have learned...

Words: 452 - Pages: 2

Free Essay

It Rfp

...IS4799: Unit 1 Common RFP Sections The common sections of an RFP are:  Introduction: The Introduction section of an RFP states the purpose, scope, and necessary background information about the RFP. The introduction sets the stage for the RFP and summarizes its main points. Each RFP introduction is different and contains information that is specific to that RFP. Many RFPs contain general information that is common, including the following: • Statement of purpose: The statement of purpose summarizes the intent and purpose of the RFP and briefly conveys its reasons for its existence. While it does not contain many performance requirements, this section provides a very general overview of the RFP. The statement of purpose is deliberately high-level and provides few details. • Scope: Readers should gain a general sense of the performance requirements of the RFP from this section. The scope defines the specific products, services, period, terms, and conditions of the RFP. In many RFPs, the scope section simply refers readers to appropriate appendices for more detailed coverage. • Compliance stipulations : The introduction often contains any general compliance stipulations that apply to the RFP process, including vendor selection and performance of the proposal contents. W hile government-related RFPs usually contain statements of compliance with equal opportunity and disability regulations, any other mandatory compliance requirements will be included...

Words: 707 - Pages: 3

Premium Essay

Tw04 Ellab Activities Report

.... The purpose of this memorandum shall be to provide a summary of TW04 LLAB activities and explain why the activity covers certain objectives. Attachment 1 shows the activities for LLAB TW04, and the objectives that coincide with the activities. 2. The first activity for TW04 LLAB shall be the POC LLAB brief, which lasts for 15 minutes. For this C/Foy explains what she wants to see from the POC at LLAB. C/Foy states her expectations on how to instill proper followership and leadership within the GMC corps at LLAB (28). 3. The second activity shall be warrior knowledge, lasting for five minutes. This consists of POC asking GMC their Warrior Knowledge for the week. Cadets are responsible for needing to know the Honor Code, which was assigned as Warrior Knowledge (3). GMC may be asked the Honor Code during this time, as well as having to explain what it means. GMC use Customs and Courtesies while addressing POC during Warrior Knowledge (23). 4. The third activity shall be opening formation, which lasts for five minutes. Opening formation consists of the two GMC flights falling into the Gym for the start of LLAB. Objectives 5, 6, 10, 11, 23, and 24 are included in this activity. The GMC must fall in with basic individual and flight drill movements (6), and to fall in they must know the individual and flight drill positions (5). The 200s in charge of the flight must apply effective flight commander skills to reach the fall in destination in a quick and efficient manner (11)...

Words: 659 - Pages: 3

Premium Essay

Holmes County Fair Research Paper

...MILLERSBURG — “The Holmes County Fair never has to worry about another flood again.” So proclaimed Holmes County Fair Board President Kerry Taylor at Monday evening's opening ceremony for the Holmes County Fair at Harvest Ridge. Taylor was welcomed to the stage by event host Mark Lonsinger, who brought the standing-room-only crowd to its feet. In the 12 years it has taken for the dream to come to life, Lonsinger said, Taylor “has worked tirelessly, day and night, to bring us to where were are today,” overcoming every obstacle and rallying those around him to make possible the climb to the top of a mountain. Taylor, he said, is the one person who could tell the whole story of the fair and “what it took to get there.” He is the “personification of the dream.” It's a dream, Taylor said that dates back to 2004, when a flash flood ravaged the old grounds eight weeks prior to the start of the fair. It was then discussions began to move toward a solution to eliminate the issues … although there were a couple more floods to endure in the years to come. And, recalling a moving closing ceremony held 360 days ago, Taylor said, he was overwhelmed by the nostalgic stories and memories of the fair, but the excitement of all at the prospect of making new memories at the new fair. But, it's not the grounds that make the fair. Like a church, Taylor said, it's the people who make the fair. And, “all of those new memories are starting today.” He credited the community for making the effort possible...

Words: 594 - Pages: 3

Free Essay

Mister

...packet sniffer is "a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network" (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening in the network by allowing a view of the packet-by-packet data (Shimonski, 2002). Additionally, sniffers can also be used to steal information from a network (Whitman and Mattord, 2008). Legitimate and illegitimate usage will be explained in later sections. Packet sniffing programs can be used to perform man-in-the-middle attacks (MITM). This type of attack occurs when "an attacker...

Words: 2443 - Pages: 10

Free Essay

Lsats

...order to master the game type. 1) Make 3 photocopies of every LG 2) Separate them using the classification method of choice - Blueprint, Kaplan, etc. will all work but I prefer PowerScore 3) Do each LGB section in order and work on the respective game types as you progress. For this I usually do 2-3 new games and 3 repeats every day, but it doesn't matter as long as you get it done. Try to keep some separation (24 hours+) between the first and second time you attempt a game. Repetition is crucial - after you have done a lot of games a lot of times anything they throw at you will seem elementary and routine. LR: Pretty simple really. Do the appropriate LRB section and then work through the corresponding chapter in Kaplan Mastery/Big Orange Book. I generally reviewed the LRB section thoroughly the first time, and then just read the summary of points and strategies at the start of the question set to refresh myself after that. Do up to 10 problems at each sitting and monitor which question types give you the most trouble. Review those questions heavily. If you're really motivated, cut out particularly troublesome questions for later review. I found that writing out explanations for question types I struggled with helped immensely. RC: This is the most difficult section to improve on. You have to develop a feel for what the passage as a whole is conveying while making sure not to miss small details...

Words: 1489 - Pages: 6

Premium Essay

The Stones Cry Out Themes Essay

...The Stones Cry Out: Analytical Essay In Hikaru Okuizumi's book, "The Stones Cry Out", we follow a man named Manase through his life after the war. Although this seems like just a look on a mans life, there are many themes that tie us in. Hikaru uses many literary elements to develop those themes. Four of those elements are complication, false assumptions, flashbacks, and foreshadowing. Although there are many key themes, the two I noticed the most were the psychological effects of war and family complications due to the loss of a loved-one. Complications are defined as obstacles that increase tension. In the beginning of the book, the complications would be when Manase is faced with his memories of the time he was in the cave with the captain during the war, "He did not want to remember-Manase understood that very well. Even though he could taste his fear, he needed only to remind himself that he was lying on a soft mattress, not a cold bed of rocks."(28) The effects the war had on him were so immense that every night he would have nightmares of it. As this quote states, he didn't want to remember it. He would imagine those times in the war and the dreams seemed as real to him as the day they happened, that's why he needs to constantly remind himself that the war is over. When something is believed to be true; however is not true. An assumption isn't what's said, it is what is behind the words. This is the definition of false assumptions. Though Hikaru Okuizumi...

Words: 764 - Pages: 4

Premium Essay

Computer Science

...Committee Report Fall 2011 Board Meeting Alfredo Herrera, Committee Chair 1. The Humanitarian Initiatives Committee (HIC) in brief The HIC mission is to support humanitarian initiatives, new ventures and collaborations in which Canadian IEEE members are involved; for example: by identifying Canadian humanitarian initiatives already underway, by leveraging external (corporate, community, association) relationships for humanitarian solution partnerships, or by nurturing initiatives that our members raise like relief efforts in disasters like the December ’04 tsunami in southeastern Asia or the January ’10 earthquake in Haiti. One way it believes it can effectively accomplish this is by providing leadership, encouragement, and support to Sections and Chapters interested in humanitarian initiatives. 2. Current status and sleight for 2012 The Committee consist of IEEE Canada members and an expert panel of humanitarian advisors as follows: the HIC Chair; the Past-Chair of the HIC; the Past- President of IEEE Canada; a representative from each Area; the IEEE Canada President (ex-officio); and appointments to the HIC by the IEEE Canada Past-President, appointments include both IEEE volunteers and humanitarian advisors. => Webpage/blog: http://ewh.ieee.org/mu/r7-hic/ => Virtual Community: http://ieeecanadahic.oc.ieee.org/ |Role |2011 |2012 | |HIC Chair:...

Words: 1171 - Pages: 5