Beruflich Dokumente
Kultur Dokumente
INDEX
Sr No
Topics Name
INTRODUCTION
BLOCK DIAGRAM
CIRCUIT DIAGRAM
COMPONENT LIST
WORKING
FLOW CHART
ADVANTAGES
APPLICATIONS
LAYOUT
10
BIBLOGRAPHY
INTRODUCTION OF PROJECT
INTRODUCTION OF PROJECT:
In todays world security systems are gaining more importance because of their number of
advantages. They are very accurate, reliable and error free systems. They provide futures like
programmable control, access verification and authentification. Hence these systems can easily modified
as per the need of user
In our project we have tried to build a RFID based Door Security System which will allow us
to provide access to the registered users and restricting the unregistered users from entering the house.
For achieving the goal we have used RFID Tags and RFID receiver which will together form a access
verification and authentification system hence allowing the access to registered users who have
registered Tag with him. To make the system simpler. We have used LCD in order to display the user ID
In this way our system will help to secure the access and hence providing the complete
security solution for door access system
FILE
The register file is organized as 256 x 8 in thePIC16F913/914 and 352 x 8 in the PIC16F916/917.Each
register is accessed either directly or indirectly through the File Select Register (FSR)
SPECIAL FUNCTION REGISTERS
The Special Function Registers are registers used byte CPU and peripheral functions for controlling the
desired operation of the device These registers are static RAM. The special registers can be classified
into two sets: core and peripheral. The Special Function Registers
associated with the core are described in this section. Those related to the operation of the peripheral
features are described in the section of that peripheral feature.
Option Register
The Option register is a readable and writable register, which contains various control bits to configure:
TMR0/WDT prescaler
External RB0/INT interrupt
TMR0
Weak pull-ups on PORTB
INTCON Register
The INTCON register is a readable and writable register, which contains the various enable and flag
bits for TMR0 register overflow, PORTB change and external RB0/INT/SEG0 pin interrupts.
RFID System
Purpose of Radio frequency Identification and Detection system is to facilitate data
transmission through the portable device known as tag that is read with the help of RFID reader; and
process it as per the needs of an application. Information transmitted with the help of tag offers location
or identification along with other specifics of product tagged purchase date, color, and price. Typical
FID tag includes microchip with radio antenna, mounted on substrate.
The RFID tags are configured to respond and receive signals from an RFID transceiver. This allows
tags to be read from a distance, unlike other forms of authentication technology. The RFID system has
gained wide acceptance in businesses, and is gradually replacing the barcode system.
How RFID Works
Basic RFID consists of an antenna, transceiver and transponder.
Antenna emits the radio signals to activate tag and to read as well as write information to it. Reader
emits the radio waves, ranging from one to 100 inches, on the basis of used radio frequency and power
output. While passing through electronic magnetic zone, RFID tag detects activation signals of readers.
Powered by its internal battery or by the reader signals, the tag sends radio waves back to the reader.
Reader receives these waves and identifies the frequency to generate a unique ID. Reader then decodes
data encoded in integrated circuit of tags and transmits it to the computers for use.
Types of RFID
Active and passive RFID are different technologies but are usually evaluated together. Even though
both of them use the radio frequency for communication between tag and reader, means of providing
power to tags is different. Active RFID makes use of battery within tag for providing continuous power
to tag and radio frequency power circuitry. Passive RFID on the other hand, relies on energy of radio
frequency transferred from reader to tag for powering it.
Passive RFID needs strong signals from reader but signal strength bounced from tag is at low levels.
Active RFID receives low level signals by tag but it can create higher level signals to readers. This type
of RFID is constantly powered, whether in or out of the readers field. Active tags consist of external
sensors for checking humidity, temperature, motion as well as other condi
RFID frequencies
Just like you can tune a radio in various frequencies for listening to different channels, RFID readers and
tags need to be tuned in to a same frequency for communication. RFID system uses various frequencies
but most common and popularly used frequency is low, high and ultra high frequency. Low frequency is
around 125 KHz, high is around 13.56 MHz and ultra high varies between 860-960 MHz. Some
applications also make use of microwave frequency of 2.45 GHz. It is imperative to choose right
frequency for an application as radio waves work different at various frequencies.
RFID Applications
The role of RFID is not just confined to Aircraft identification anymore; it is also lending a hand in
various commercial uses. Asset tracking is one of the most popular uses of RFID. Companies are using
RFID tags on the products that might get stolen or misplaced. Almost each type of Radio frequency
Identification and Detection system can be used for the purpose of asset management.
Manufacturing plants have also been using RFID from a long time now. These systems are used for
tracking parts and working in process for reduction of defects, managing production of various versions
and increasing output. The technology has also been useful in the closed looped supply chains for years.
More and more companies are turning to this technology for tracking shipments among the supply chain
allies. Not just manufacturers but retailers also are using this RFID technology for proper placement of
their products and improvements in the supply chain.
RFID also plays an important role in the access and security control. The newly introduced 13.56 MHz
RFID systems provide long range readings to the users. The best part is that RFID is convenient to
handle and requires low maintenance at the same time.
Current Scenario and future
Present trends point towards the fast growth of RFID in the next decade. With around 600 million RFID
tags sold in the year 2005 alone, value of market including systems, services and hardware is likely to
grow by factor of 10 between years 2006 -2016. It is expected that total number of RFID tags delivered
in the year 2016 will be around 450 times as compared to the ones delivered in the year 2006.
Commercial applications using Radio Frequency Identification and Detection like logistics, transport,
supply chain supervision, processing, manufacturing, medicine, access control are also likely to grow by
leaps and bounds. But this smart technology will influence consumer sectors and government too.
Barcodes and RFID will coexist for years to come, although the latter is expected to replace the former
in many sectors.
Working of project:
In this system each user will have its own unique RFID Tag. This tag is a preprogrammed devise which
contain a unique code assigned to it. So each user will have its own unique registration ID for himself
Thus when the user, will come the door. It will bring his tag near the system. The RFID Receiver will
detect the tag and extract the information from it. The output of receiver is connected to the PIC
Controller. Hence when the registered user will come near the system the receiver will get a valid data
and this valid ID is then pass to the controller which will interns do the cross verification by comparing
the ID with its data base
If the user is valid, then controller will Display the user ID on LCD Display connected to the system
also will open the door motor. In this way the registered user will gate the door
even custom
characters (unlike
in
seven
so
on.
A 16x2 LCD means it can display 16 characters per line and there are 2 such lines. In this LCD each
character is displayed in 5x7 pixel matrix. This LCD has two registers, namely, Command and Data.
The command register stores the command instructions given to the LCD. A command is an instruction
given to LCD to do a predefined task like initializing it, clearing its screen, setting the cursor position,
controlling display etc. The data register stores the data to be displayed on the LCD. The data is the
ASCII value of the character to be displayed on the LCD.
Pin Diagram:
Pin Description:
Pin No
1
2
3
Function
Ground (0V)
Supply voltage; 5V (4.7V 5.3V)
Contrast adjustment; through a variable resistor
Name
Ground
Vcc
VEE
Selects command register when low; and data register when high
Register Select
5
6
7
8
9
10
11
12
13
14
15
16
Read/write
Enable
DB0
DB1
DB2
DB3
DB4
DB5
DB6
DB7
Led+
Led-
RELAYS:
Relays are used throughout the automobile. Relays which come in assorted sizes, ratings, and
applications, are used as remote control switches. A typical vehicle can have 20 relays or more.
LAYERS OF PCB:
*.BOT - bottom copper
*.SMB - Solder mask bottom
*.SST - Silk screen top
*.ASY - Assembly top, contains the board outline
*.DS - drill sizes
Tracks Restricted Area Tracks should not be located on the areas that can cause them to be peeled off
easily. One of the restricted areas is holes on the PCB which are used to mount screws or PCB spacers.
These holes are usually used to secure the PCB to a casing or to secure it in a fixed place.
The edges of the PCB should not have any tracks as these areas are usually used to transport the PCB
from one process to another process by using a conveyor belt. These edges are places where the
possibility of scratches and cracking of the PCB happens. The recommended areas that should not have
any track is as shown in the diagram below assuming a hole diameter of 4 mm which is used to mount a
PCB spacer.
FLOW CHARTS
BILL OF MATERIAL:
Description
PIC16F72
Transformer 18 V, 0.5A
LM7805
Diode 1N4007
Capacitor 1000 f
Disc Capacitor
IC Base 40 Pin
Relimate Base
Relimate Connector
Pull Up Resistance 10 K
PCB
Reset Switch
12 V Relay
230 v relay
Resistance
RFID Module
transistor Bc 547
transistor Bc 557
Quantity
Heat Sink
LCD
Price
1
1
1
4
1
10
1
10
10
4
1
3
2
1
20
2
5
5
200
120
8
8
7
5
18
40
88
8
700
3
20
35
10
1400
18
18
150
TOTAL AMOUNT
2860
Advantages
1. Highly reliable as each user will have its unique ID
2. Modification can be made very easily by just increasing the unique User IDs
3. Low cost, highly accurate, easy to implement
4. Entire system can be made battery operated, hence avoiding losses of power failure
Applications
1. Office access system
2. Restricted access area like R&D Department, Power supply department
3. VIP conference halls
4. Cash Department security access in Banks
Bibliography:
REFERENCE BOOKS:-