Sie sind auf Seite 1von 15

CONTENT

Abstract..

List of Tables..ii
List of Figure..
iii

1. Introduction

2. Motivation..

3. Literature Review...

4. Overall Analysis of Reported Work

5. Problem definition / Formulation

6. Objective.

10

7. Proposed Methodology..

11

8. Proposed Work

12

9. Probable Outcome...

13

10. Tools / Platform..14


References..

15

ABSTRACT
Amidst the rapid increase in population and urbanization, the use of automobiles is
increasing rapidly. Though there are improved safety and security features with advancement in
technology, there are no vehicle regulatory systems that provide automation in vehicle
monitoring and act violations. The main objective of the work is to have a centralized server
based monitoring of vehicles with an advanced security system realized in levels of verification
for Vehicles. In addition to this, the centralized server maintains data bases i.e. one for the
vehicle. A unique id is allotted for the vehicle as RFID tag can be used to identify the object. The
unique identifiers linked to the respective vehicles data bases, the penalty/toll fare when the
vehicle passes by toll gates/check posts, Traffic signals, roads. This provides a way for reducing
any possibility of corruption in motor vehicles section as the penalty will be charged
straightforwardly from the person's details and automated SMS will be sent to the owner
containing charge and penalty as text message by an automated system.

INTRODUCTION
Embedded system is now an emerging technology in various fields, which is well known
for its compact size, processing speed etc. It also plays a leading role in security and process
management. Smart RFID Tag is a plastic card with a chip containing some antenna is widely
used in many countries. The details about the license holder like his/her name, address, computer
generated license number, date of issue, biometric fingerprint and Digital signature will be
recorded in the computerized database via RFID unique ID by registration of vehicle in main
vehicle departments computer sever system. Radio Frequency Identification (RFID) is a common
term used to depict a system utilizing radio waves by which the object or person is identified by
means of a unique serial number. A centralized database management system on the other hand
has many advantages in taking the technology to the next level. The work deals with the
federalization of vehicle act automation which has a centralized database helps in maintaining
the datas of vehicles and drivers. The RFID based system helps in tracking the vehicles and
collecting the penalties/toll charges directly from their bank accounts.
Linkage between officers handheld device and central database server is connected via
Zigbee wireless device. Zigbee are the most effective and are widely used wireless
communication techniques. The zigbee module helps to notify the persons about the debited
charge amount and the reason for the deduction. Zigbee is used for communication between the
vehicle unit and the main server. This security system is simple and cost effective when
compared to the use of gadgets which are of high cost.

MOTIVATION
Digitalization
Vehicle Number Plate Identification
Vehicle License Plate Recognition is an important area of Image processing which has various
applications. In situations where no standard number plate format and font is maintained,
identification becomes difficult. In this paper, we discussed effect of Edge Detection and
Template Matching on identification of Vehicle Number Plates with various types of fonts.
Experimental results show that the performance of the proposed method is simple and
satisfactory, considering the complexity of the input image.
Automobile navigation guidance, control and safety system
An automobile is equipped with an inertial measuring unit, an RF GPS satellite navigation unit
and a local area digitized street map system for precise electronic positioning and route guidance
between departures and arrivals, is equipped with RF receivers to monitor updated traffic
condition information for dynamic rerouting guidance with a resulting reduction in travel time,
traffic congestion and pollution emissions, is also equipped with vehicular superceding controls
substantially activated during unstable vehicular conditions sensed by the inertial measuring unit
to improve the safe operation of the automobile so as to reduce vehicular accidents, and is further
equipped with telecommunications through which emergency care providers are automatically
notified of the precise location of the automobile in the case of an accident so as to improve the
response time of road-side emergency care.

LITERATURE REVIEW
Vehicle identification is a research area where image processing methods are used to identify
vehicles by detecting and identifying the license plate numbers. Typical vehicle identification
systems consist of three main stages. They are the identification and tracking of vehicles through
motion, locating the license plate and accurately identifying the numbers in the license plate.
Although many intensive research studies have been conducted in other countries in the area of
automatic vehicle identification, to our knowledge, there is virtually no research studies conducted in
Sri Lanka in this area. However, vehicle identification is an essential area in the development of
intelligent traffic systems and surveillance. Given the current security situation in the country due to
ethnic conflicts, this is one of the areas where there is an urgent need for the development of devices
that could be used in variety of situations to ease the security concerns. In addition, the use of
vehicles in Sri Lanka has increased rapidly, especially in recent years, due to urbanization and
modernization, and thus, traffic congestion in cities has become a major issue. Therefore, control of
vehicles and identification of traffic violators to maintain discipline, is becoming a necessary task in
many cities. Automatic vehicle identification systems can be used effectively for this purpose

OVERALL ANALYSIS OF REPORTED WORK

PROBLEM DEFINITION / FORMULATION


Nearly every jurisdiction (provinces and states) requires motorists to keep their vehicle
registration document in their vehicle and requires insurance companies to provide policyholders
with insurance identification cards and for these cards to also be carried within owners vehicles.
The vehicle registration document details vehicle and owner identifying information. This
document can be used to compare what is on the vehicle (license plate, VIN, etc.) versus what is
printed on the document and then against the Motor Vehicle Administration (MVA) database.
Similarly, the insurance identification card provides evidence of insurance coverage and
information regarding the insurance company, policy number, name of the insured, effective date
and expiration of coverage, and a description of the insured vehicles (normally make, model, and
VIN). Some states require an insurance identification document to be presented at the time of
vehicle registration or registration renewal.
In addition to being helpful in the completion of routine traffic stops or crash investigations,
the vehicle registration and insurance identification documents are often key investigative tools
in fatality crashes and criminal investigations. In one example, a trooper is investigating a motor
vehicle crash where the driver and sole occupant is deceased and carrying no personal
identification. The registration and insurance identification documents may be the only
documents in the vehicle to help identify the deceased. In another example, an officer stops a
vehicle and converses with the driver while asking for the vehicle registration and insurance
identification documents. The information the driver provides orally does not match the
information on the documents the driver retrieves from the glove box, which prompts the officer
to investigate further.

OBJECTIVE

This project aims at implementing a Automated vehicle management system using radio
frequency identification (RFID) technology. This digital vehicle management system will
enhance the utilization of parking space and help user check the availability of the parking
space.
The RFID technology has been used to maximize parking utilization. The RFID kit includes
RFID windshield tags and RFID readers.
The applications of RFID are ubiquitous. It can be used for inventory tracking, animal
tracking, transportation payments, and employee identification, newly born infant
identification, and industrial automation and access control. RFID technology solutions are
receiving much attention in the research and development of many large corporations [7].

PROPOSED METHODOLOGY
Embedded system
An embedded system is a computer that has been built to solve only a few very specific
problems and is not easily changed. In contrast, a general-purpose computer can do many
different jobs, and can be changed at any time with new programs for new jobs.
An embedded system usually does not look like a computer, often there is no keyboard or
monitor or mouse. But like any computer it has a processor and software, input and output. The
word embedded means it is built into the system. It is a permanent part in a bigger system.
For example, a controller is embedded in an elevator and tells the motor to move the elevator to
different floors based on buttons that are pushed. A decoder is embedded in a satellite television
set-top box to read a signal from the dish and send something that a TV understands. Often this
type of system must do its work in a specific amount of time. This is called real-time computing.
If a set-top box got interrupted to do another task, you would see a bad picture on the TV, for
example. A general purpose computer will often have short pauses while it does something else,
it is not real-time.
Embedded systems control many of the common devices in use today, from card readers in hotel
door locks to many controls in a car. They can be small like an MP3 player or a digital camera, to
large systems like traffic lights, airplane controls, or assembly line controllers in a factory.

GSM Modem/ Mobile network


GSM Modem
A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a
subscription to a mobile operator, just like a mobile phone. From the mobile operator
perspective, a GSM modem looks just like a mobile phone.
When a GSM modem is connected to a System, this allows the system to use the GSM modem to
communicate over the mobile network. While these GSM modems are most frequently used to
provide mobile internet connectivity, many of them can also be used for sending and receiving
SMS and MMS messages.

Mobile Network
A cellular network or mobile network is a wireless network distributed over land areas called
cells, each served by at least one fixed-location transceiver, known as a cell site or base station.

In a cellular network, each cell uses a different set of frequencies from neighboring cells, to
avoid interference and provide guaranteed bandwidth within each cell.
When joined together these cells provide radio coverage over a wide geographic area. This
enables a large number of portable transceivers (e.g., mobile phones, pagers, etc.) to
communicate with each other and with fixed transceivers and telephones anywhere in the
network, via base stations, even if some of the transceivers are moving through more than one
cell during transmission.
Cellular networks offer a number of desirable features:

More capacity than a single large transmitter, since the same frequency can be used for
multiple links as long as they are in different cells

Mobile devices use less power than with a single transmitter or satellite since the cell
towers are closer

Larger coverage area than a single terrestrial transmitter, since additional cell towers can
be added indefinitely and are not limited by the horizon

Major telecommunications providers have deployed voice and data cellular networks over most
of the inhabited land area of the Earth. This allows mobile phones and mobile computing devices
to be connected to the public switched telephone network and public Internet. Private cellular
networks can be used for research or for large organizations and fleets, such as dispatch for local
public safety agencies or a taxicab company.

PROPOSED WORK
Handheld unit for officer equipped with RFID reader, zigbee module and LCD

Fig : Handheld unit for officer equipped with RFID reader, zigbee module and LCD

Database server with zigbee and GSM modem

Fig : Database server with zigbee and GSM modem

PROBABLE OUTCOME
In this paper we overviewed the problem of Vehicle Authentication system with various
types of Vehicles. We proposed a Centralized Vehicle database server system, which provides
result with significant accuracy, which is very simple to implement. The system will been tested
on Visual basic software environment with satisfactory results in outer countries. Most of the
time the input RFID value taken from Officer side Handheld device which have very good range,
low battery consumption, fast and accurate transmission and reception. Given a better device the
result should increase in accuracy significantly.
This project is designed as a system to give complete solution for transport related
problems such as Traffic violation, Vehicle authentification and identification.
This project can also extended with small changes for Toll gate control, traffic signal
control, traffic rules violation control, parking management, vehicle theft and special zone alert
using the latest RFID technology. It is proposed as a low cost optimized solution using RFID and
Zigbee wireless and GSM mobile technology. This is in line with the developed countries like
USA, England, German and Japan, where RFID, zigbee RF and GSM technologies are widely
used for traffic management. But in India we have not implemented any automated system for
transport management due to prohibitive cost. Keeping this in mind I have proposed this system
at low cost.

TOOLS / PLATFORM
SOFTWARE
Embedded Development Tools
KEIL Vision 4:
KEIL Vision IDE development tool is used to compile and debug the 8051 program written in C
. Its working process is simple and easy to use. It helps to develop the embedded programs
rapidly. Once the target code is generated it is dumped using flash magic software.
The Vision IDE from Keil combines project management, make facilities, source code editing,
program debugging, and complete simulation in one powerful environment. The Vision
development platform is easy-to-use and helping you quickly create embedded programs that
work. The Vision editor and debugger are integrated in a single application that provides a
seamless embedded project development environment.
Computer programming language
C #.NET:
C# is an elegant and type-safe object-oriented language that enables developers to build a variety
of secure and robust applications that run on the .NET Framework. You can use C# to create
Windows client applications, XML Web services, distributed components, client-server
applications, database applications, and much, much more. Visual C# provides an advanced code
editor, convenient user interface designers, integrated debugger, and many other tools to make it
easier to develop applications based on the C# language and the .NET Framework.
C# (pronounced as C sharp) language is proposed to be simple, robust, economical,
Multiplatform support, general purpose language suitable for embedded applications ranging
from dedicated functions to very large sophisticated systems. C# 3.0 Microsoft visual studio
2008 .NET Framework IDE is used in this application.

REFERENCES
[1] Nor Azlina , Bt Abd Rahman , Mohsen Bafandehkar, Behzad Nazarbakhsh , Nurul Haniza Bt
Mohtar , Ubiquitous Computing For Security Enhancement Of Vehicles, IEEE International
Conference on Vehicular Electronics and Safety (ICVES) ,Beijing, pp: 113- 118, 2011.
[2] Omidiora E.O, Fakolujo O.A, Arulogun O.T, Aborisade D.O, A Prototype of a Fingerprint
Based Ignition Systems in Vehicles, European Journal of Scientific Research, pp: 164-171,
2011.
[3] Weiqi Yuan, Yonghua Tang, The Driver Authentication Device Based on the Characteristics
of Palm print and Palm Vein, International Conference on Hand-Based Biometrics (ICHB),
Hong kong, pp: 1-5, 2011.
[4] Hugo Silva, Andre Lourenc OAna Fred, In-Vehicle Driver Recognition Based on Hands
ECG Signals, International Conference on Intelligent User Interface , Lisbon, Portugal, pp: 2528, 2012.
[5] Ronghua Chen, Mary Fenghua She, Xiangping Sun, Lingxue Kong, Yuchuan Wu , Driver
Recognition Based on Dynamic Handgrip Pattern on Steeling Wheel, 12th ACIS International
Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed
Computing, Sydney NSW, pp: 108-112, 2011.
[6] Pazhampilly Sreedevi A, Sarath S Nair B, Image Processing Based Real Time Vehicle Theft
Detection And Prevention System, International Conference on Process Automation, Control
and Computing (PACC), Coimbatore, pp: 1-6, 2011.
[7] Aditya I.V.N.S, Radha Krishna Murthy Y, Ravindra Babu Kallam Lt, Alternate Method for
the Failure of Antitheft Device used in Motor Vehicles, International Journal of Computer
Applications, Vol. 13, No.6, pp: 23-26, 2011.
[8] Bagavathy . P , Dhaya . R, Devakumar.R , Real Time Car Theft Decline System Using Arm
Processor, Proceedings of International conference on Advances in Recent Technologies in
Communication and Computing , 2011.

Das könnte Ihnen auch gefallen