Beruflich Dokumente
Kultur Dokumente
MRS.MARY NEEBHA
(Deemed-to-be-University)
Karunya Nagar, Coimbatore - 641 114. INDIA
APRIL 2019
2
KARUNYANAGAR, COIMBATORE–641114
BONAFIDE CERTIFICATE
This is to certify that the project report entitled, “RF ID BASED SMART SHOPPING CART ” is a
bonafide record of work of MISS.ASWATHI ASHOK who carried out the project work under my
DEPARTMENT OF ECE
Submitted for the Half Semester Viva Voce examination held on ……………………….
………………………. ……………………....
3
+91 9962451891
Fortune Signs-Chennai
No 7/7, Thiruneermalai main road,
Pallavaram
Chennai-44
March 30 th 2019
The internship on evaluation fulfills all the stated criteria and student’s findings
are her original work. We found her extremly inquisitive and hardworking .
I hereby certify her work excellent to the best of my knowledge.
Her association with us was very fruitful and we wish her success in her future
endeavors .
Sincerely ,
Fortune Signs
4
Chennai.
ABSTRACT
In metropolitan cities we can see you a huge rush at shopping malls on holidays and weekends.
This becomes even more when there are huge offers and discounts. Now a days people purchase a
variety of items and put them in the shopping cart. After completing the purchasing one should
approach the counter for billing purpose. By using barcode reader the cashier prepares the bill
which is a time consuming process .This results in long queues at the billing counters. This
project presents an idea to develop a system in shopping malls to overcome the above problem. To
achieve this all products in the mall should be equipped with RFID tags and all trolleys should be
equipped with a RFID reader and LCD screen .When one puts any product in the shopping cart ,
its code will be detected automatically , the item name and cost will be displayed on the LCD,
thereby the cost gets added to the total bill. If we wish to remove the product from the shopping
cart , you can take away the product and read it once again by the reader then the amount of that
specific product gets deducted from total amount and the same information passes to the central
billing unit or a provided mobile number using gsm . Hence the billing can be done in the
Keywords: RFID tag, LCD , RFID reader, Barcode reader and Shopping cart .
5
ACKNOWLEDGEMENT
First and foremost, I would like to thank Almighty God for all the blessings He has bestowed
upon us to work thus far and finish this project. I am grateful to our most respected founder (late)
Dr. D.G.S. Dhinakaran, C.A.I.I.B, Ph.D., and honorable chancellor Dr. Paul Dhinakaran,
M.B.A, Ph.D., for their grace and blessing.
I express my gratitude to the Vice Chancellor Dr. P. Mannar Jawahar, Ph.D., Pro Vice
Chancellor (QS) Dr. Ridling Margarat Waller, Ph.D., Pro Vice Chancellor (S&O) Dr.
E.J.James,Ph.D., and the Registrar Dr. R. Elijah Blessing, Ph.D., Karunya Institute of technology
and sciences, for their enduring leadership.
I extend my thanks to our Director, Engineering and technology, Dr. Prince Arul Raj, Ph.D.,
Karunya Institute of technology and sciences, for his excellent encouragements in course of this
work.
I am very thankful to Dr. D.Nirmal, Ph.D., Associate Professor & Head, Department of
Electronics and Communication Engineering, Karunya Institute of technology and sciences, for
their constant readiness in providing help and encouragement at all stages in our project.
I express my deepest gratitude to my mentors Mrs. Mary Neebha, M.Tech for giving me this
opportunity and providing me with an environment to complete my project successfully.
My sincere and special thanks to my guide, Mrs.Mary Neebha , M.Tech., Assistant Professor,
for his immense help and guidance. I would like to extend a thankful heart for her constant support
through the entire project.
Finally I would like to extend my deepest appreciation to my family and friends for all that they
were to us during the project period.
6
TABLE OF CONTENTS
ABSTRACT iv
ACKNOWLEDGEMENTS v
TABLE OF CONTENTS vi
LIST OF FIGURES vii
LIST OF TABLES viii
LIST OF ABBREVIATIONS ix
1 INTRODUCTION
1.1 Background 1
1.2 Purpose of the project 3
1.3 Problem statement 3
1.4 Objective 4
1.5 Future scope and limitations 4
2 LITERATURE REVIEW 5
2.1 Introduction 6
2.2 Automatic identification system 9
2.3 Barcode systems 9
2.4 Optical signal identification 9
2.5 Biometric procedure 10
2.6 Smart card 10
2.7 RFID systems 11
2.8 Analysis of RFID 12
2.9 Technology in stock networks 13
3 METHODOLOGY
3.1 System Overview 14
3.2 Flowchart depicting the working proposed model 16
3.3 Hardware Specifications 17
3.4 Arduino 17
3.5 Power supply 18
3.6 RFID tag 19
3.7 GSM 19
3.8 GSM modem 20
4 IMPLEMENTATION
4.1 Program 23
5 CONCLUSION
5.1 Conclusion 32
7
6 REFERENCES 36
LIST OF FIGURES
LIST OF TABLES
LIST OF ABBREVIATIONS
INTRODUCTION
1.1 Background
1
online shopping, and so forth which will not require the buyer to be manually held
at the Counters. Purchasing in-individual includes an individual call at location of
purchasing and choosing items in view of different variables including need,
comfort, brand, and so on. The proposed keen Shopping basket framework plans to
help shopping in-individual that will minimize the time spent in shopping.
Persistent change is required in the customary time spent at the counters to
enhance the nature of shopping background to the clients. To beat these issues
expressed above and to enhance the current framework, we have composed a
Shopping basket. This can be done possible by basically connecting RFID labels
to the items and reader with a LCD in the purchasing cart. From this framework
client can posses data related to cost of each thing which are inside cart and
furthermore absolute cost of the thing about the item.This framework will save
time of clients and labor required in shopping center with respect to cost of the
item
2
1.2 Purpose of the project
The fundamental motivation behind this system is to show the proposition of a design
and arrangement of an inventive framework for obtaining of items in markets . This
cart explores rising versatile innovations and programmed recognizable proof
advancements, (for example, RFID) as an approach to enhance the nature of
administrations given by retailers and to expand the customer esteem consequently
permitting to save time and cash. With this cart an excellent opportunity will be
developed which assists the customers by showing the catalog of products and their
respective costs. This approach thereby helps the inventory management unit with an
instinctive upgrade on each purchase of product. This smart cart has the capability to
make shopping more relaxable, comfortable and systematic for the customers as well
as making easier for the store management .
In realistic, markets are these days utilized by a considerable amount of individuals in order for
securing most of items. Item procurement speaks to an unpredictable procedure that involves
time spent in passageways, item area and checkout lines. Consumers commonly encounter
some problems and difficulty during purchasing. These problems comprise worrying about the
money which they have brought would be insufficient for all the items purchased and also
dissipating a lot of time at the cashier. And also it is becoming a increasing problem for the
merchants to make their shoppers consigned and to anticipate their demands because of the
effect of contention and also because of lack of of equipment that isolate application
designs. At some instances clients have issues with respect to the inadequate data about the
item of discounts and thereby misuse of superfluous time at the counters. We can end this issue
by supplanting the omnipresent Universal Product Code (UPC) standardized identification by
keen names known as radio frequency identification (RFID) tag.
3
1.4 Objective
The main objective involved in this plan is to implement a smart shopping cart with
the help of RFID technology for improvising purchasing . The plan is to employ the
RFID related surveillance implementation practice in the purchasing cart. In this plan
RFID card is utilised as protection entry for acquiring of commodities in the
Shopping malls. If the commodity has been placed in the shopping cart the price of the
product appears and accordingly the total amount will be shown and if we wish to
remove the product from the trolley, you can take away the product and the amount of
that specific product gets deducted from total amount .In this , the technology used is
for obtaining the products thereby which boosts security performance and speed while
purchasing in shopping complexes. The technological objective for our presented
problem in shopping complexes is the practice of RFID technology for the instinctive
recognition of commodity in the interior of the purchasing cart thereby annihilating
shopper intervening in the task of commodity purchase and for payment. The
principle point of proposed framework is to give an innovation which is minimal
effort oriented , effectively adaptable, and efficiently feasible for helping shopping in
individual. With the help of this a lot of time will be saved at the billing counters .
In spite of the fact that the RFID can't totally supplant the standardized identification
innovation because of higher cost precision and speed is high in RFID implementation. The
retailers, makers and purchaser products organizations like CVS, Tesco, Prada, Benetton, Wal-
Shop and Procter and Bet are presently actualizing the innovation and investigating the effect
of the innovation on their business. Others can likewise implement RFID. The basis of
accomplishment lies in understanding the innovation and different components to minimize
the potential issues. It is time for the Industry ought to begin using the new innovation, for
example, RFID in different applications, for example, fabricating, and storing purposes. In this
project the items in the cart is restricted to less than 50 as the customers don’t prefer excess
4
luggage at once. Tags used here can be attached to the products only in the longitudinal fashion
without any folds .Tags given for the reader are of length 8cm and of width 2cm and they need
to be attached to the products in a visible fashion for the reader then only the reader can detect
tags with out any fail. Tags used in this project are water sensitive and metal sensitive and have
the capacity of reading only one side. So the trolley is now restricted to use water sensitive
packaged and metal sensitive packaged products. But the problem can be rectified with the
waterproof tags and metal resistant tags which are under research at present. And the multiple
object RFID reader used here has the constraint of skipping the tags at sometimes. Reader
which can detect less than 50tags/sec is employed according to the requirement and meanwhile
cost will also be under control for implementation of system.
5
CHAPTER 2
LITERATURE REVIEW
2.1 Introduction
6
and the signal delivered previously could be deployed to identify amicable and
hostile flying machine.
Decade Event
8
There are several technologies available for Instinctive Recognition systems. In
words of implementation, price necessity and the method associated single or a blend
of results are selected for Instinctive Recognition effectiveness.
This implementations contain a double code comprising of exhibit of bars and spaces
organised in parallel design as depicted in figure below. The sequence is of broad with
limited bars and spaces which are depicted numerically and alpha numerically. This is
done by optical laser scanning. Inspite of same in their material implementation there
are much more contrast among the code designs.
This was started in the past 1960’s. For this specially designed fonts were developed which
styled the signs so that they are studied easily in the usual mode by the people and instinctively
through the equipment. The main utilization associated with this technology is huge solidity of
data and the feasibility of interpreting data graphically during emergencies. This technology
was applied in the banks for the registration of checks, productive and administrative fields.
Inspite of many advantages also this technology vanished globally due to huge costs along
with complexity when compared to other identification system.
9
2.5 Biometric Procedure
In 2009, the College of Arkansas Data Innovation Research Establishment done a study which
reveals the advantages of tagging products with RFID tags for routine operations and also for
11
business value at any prime retail store. The outcomes exhibited that general stock exactness
enhanced by extra of 27 percent, under stocks reduced to 21 percent, and overloads reduced
to 6 percent. It likewise also contrasted to what extent it brought with total things utilizing
RFID versus a scanner tag reader. With RFID, inspecting 10,000 objects has taken two hours;
while a conventional reader has taken 53 hours
If we glance at the difficulties, this technology might assist both the trader and
consumers. It will give tremendous benefits such as less time spent in getting
items , arranging and the deficit stock loss can also incredibly decrease. Consumers
can easily purchase commodities incase if they are misplaced in the shop, they can be
efficiently found by usage of this technology . Further reviews on the technology
effecting consumers are made calls for notice that this innovation is a hazard to
safety and to successfully achieve this innovation in purchasing products, an
association requires to exhibit the right position.
previous purchasing act, and in view of discounts, sales, and so forth . It stresses on the
theraphy of drug which will get increased if there is a transition from scanner labels to
this advancement achieved. Accompanied by the accessible supply constantly ,
problems will be diminished strongly, inducing technology in supply which would
minimise demanding prices . Mentioning the problems which should be viewed as the
obstruction amidst RFID execution must to be disappeared when large number of people
start using this technology with the motive that norms are fixed and overheads get
decreased. Different essays are made regarding supply and how technology will have
impact on it. Large number of shops supply volume which is not good on the grounds
that if the allowance from the sales of merchandise occurs at the mislocating which
deals with the difficulty . It also oversees at the impact of the robbery which has been
12
on misplaced supply levels and how it can lessen the amount of flaws.
CHAPTER 3
METHODOLOGY
13
3.1 System Overview
The proposed system in this thesis will be implemented into two parts . First part is
the initialization of the atmega32 controller for the set up of RFID Reader . Second
part is the tag detection of products by RFID Reader which are placed in the cart and
sending of product information from cart to Central billing unit through gsm.
The overview working of this system is - This proposed system works as on customer
getting into the mall she/he first takes a trolley. Every cart is connected with a RFID
reader ,a microcontroller and LCD screen. When the customer starts dropping
products into the trolley, tags will be read by the reader and the reader sends the
information to the microcontroller. The microcontroller compares the information with
the data already stored in it. If the data matches then the cost of that product will be
displayed on the LCD screen for user . If the user wish to remove any product from
the cart then they can take away that product from trolley and cost of that particular
product will be subtracted from the total amount instantaneously and after shopping
the products data with total amount gets transmitted to the central billing system
through gsm. The RFID Reader will be placed in the mid position on the base/bottom
inside the trolley. The cart is designed in such away that the outerpart of the trolley
will be covered with RF(Radiofrequency) shielding in order to make sure that the
RFID reader will not read any products associated with tags outside the cart.
Figure 3.1 shows the block diagram of proposed system in which reader is connected
to Atmega32 which in turns gets connected to LCD and GSM which then sends billing
information to Central Billing unit
14
Figure 3.1 Block Diagram
15
3.2 Flowchart depicting the working of proposed model
Start
Is
RFID Tag
If item is YES
removed
NO
Stop
16
3.3 Hardware Specification
"Uno" means one in Italian and is named to mark the upcoming release of Arduino 1.0. The
Uno and version 1.0 will be the reference versions of Arduino, moving forward. The Uno is
the latest in a series of USB Arduino boards, and the reference model for the Arduino platform;
for a comparison with previous versions, see the index of Arduino boards.
The Arduino Uno can be powered via the USB connection or with an external power supply.
The power source is selected automatically. External (non-USB) power can come either from
an AC-to-DC adapter (wall-wart) or battery. The adapter can be connected by plugging a
2.1mm center-positive plug into the board's power jack. Leads from a battery can be inserted
in the Gnd and Vin pin headers of the POWER connector. The board can operate on an
external supply of 6 to 20 volts. If supplied with less than 7V, however, the 5V pin may
supply less than five volts and the board may be unstable. If using more than 12V, the voltage
regulator may overheat and damage the board. The recommended range is 7 to 12 volts. The
power pins are as follows: Power supply is a reference to a source of electrical power. A
device or system that supplies electrical or other types of energy to an output load or group of
loads is called a power supply unit or PSU. The term is most commonly applied to electrical
energy supplies, less often to mechanical ones, and rarely to others. Power supplies for
electronic devices can be broadly divided into linear and switching power supplies. The linear
supply is a relatively simple design that becomes increasingly bulky and heavy for high
current devices; voltage regulation in a linear supply can result in low efficiency. A switched-
mode supply of the same rating as a linear supply will be smaller.
18
An RFID tag is a microchip combined with an antenna in a compact package; the packaging is
structured to allow the RFID tag to be attached to an object to be tracked. "RFID" stands for
Radio Frequency Identification. The tag's antenna picks up signals from an RFID reader or
scanner and then returns the signal, usually with some additional data (like a unique serial
number or other customized information).
RFID tags can be very small - the size of a large rice grain. Others may be the size of a small
paperback book.
3.7 GSM:
GSM, which stands for Global System for Mobile communications, reigns as the world’s most
widely used cell phone technology. Cell phones use a cell phone service carrier’s GSM
network by searching for cell phone towers in the nearby area. The origins of GSM can be
traced back to 1982 when the Groupie Special Mobile (GSM) was created by the European
Conference of Postal and Telecommunications Administrations (CEPT) for the purpose of
designing a pan-European mobile technology. It is approximated that 80 percent of the world
uses GSM technology when placing wireless calls, according to the GSM Association
(GSMA), which represents the interests of the worldwide mobile communications industry.
This amounts to nearly 3 billion global people.
For practical and everyday purposes, GSM offers users wider international roaming
capabilities than other U.S. network technologies and can enable a cell phone to be a “world
phone”. More advanced GSM incorporates the earlier TDMA standard. GSM carriers have
roaming contracts with other GSM carriers and typically cover rural areas more completely
than competing CDMA carriers (and often without roaming charges, too). GSM also has the
advantage of using SIM (Subscriber Identity Module) cards in the U.S. The SIM card, which
acts as your digital identity, is tied to your cell phone service carrier’s network rather than to
the handset itself. This allows for easy exchange from one phone to another without new cell
phone service activation. GSM uses digital technology and is a second-generation (2G) cell
phone system. GSM, which predates CDMA, is especially strong in Europe. EDGE is faster
than GSM and was built upon GSM.
19
3.8 GSM MODEM:
A GSM modem is a wireless modem that works with a GSM wireless network. A wireless
modem behaves like a dial-up modem. The main difference between them is that a dial-up
modem sends and receives data through a fixed telephone line while a wireless modem sends
and receives data through radio waves. A GSM modem can be an external device or a PC Card
/ PCMCIA Card. Typically, an external GSM modem is connected to a computer through a
serial cable or a USB cable. A GSM modem in the form of a PC Card / PCMCIA Card is
designed for use with a laptop computer. It should be inserted into one of the PC Card /
PCMCIA Card slots of a laptop computer. A GSM modem is a specialized type of modem
which accepts a SIM card, and operates over a subscription to a mobile operator, just like a
mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile
phone. A GSM modem can be a dedicated modem device with a serial, USB or Bluetooth
connection, or it may be a mobile phone that provides GSM modem capabilities. The term
GSM modem is used as a generic term to refer to any modem that supports one or more of the
protocols in the GSM evolutionary family, including the 2.5G technologies GPRS and EDGE,
as well as the 3G technologies WCDMA, UMTS, HSDPA and HSUPA.
A GSM modem exposes an interface that allows applications such as Now SMS to send and
receive messages over the modem interface. The mobile operator charges for this message
sending and receiving as if it was performed directly on a mobile phone. To perform these
tasks, a GSM modem must support an "extended AT command set" for sending/receiving SMS
messages, as defined in the ETSI GSM 07.05 and 3GPP TS 27.005 specifications. GSM
modems can be a quick and efficient way to get started with SMS, because a special
subscription to an SMS service provider is not required. The mobile operator charges for this
message sending and receiving as if it was performed directly on a mobile phone. In most parts
of the world, GSM modems are a cost effective solution for receiving SMS messages, because
the sender is paying for the message delivery. A GSM modem could also be a standard GSM
mobile phone with the appropriate cable and software driver to connect to a serial port or USB
port on your computer. Any phone that supports the "extended AT command set" for
20
sending/receiving SMS messages, as defined in ETSI GSM 07.05 and/or 3GPP TS 27.005, can
be supported by the Now SMS/MMS Gateway. Note that not all mobile phones support this
modem interface.
Due to some compatibility issues that can exist with mobile phones, using a dedicated GSM
modem is usually preferable to a GSM mobile phone. This is more of an issue with MMS
messaging, where if you wish to be able to receive inbound MMS messages with the gateway,
the modem interface on most GSM phones will only allow you to send MMS messages. This
is because the mobile phone automatically processes received MMS message notifications
without forwarding them via the modem interface.
In computers use AT commands to control modems. Both GSM modems and dial-up modems
support a common set of standard AT commands. You can use a GSM modem just like a dial-
up modem.
The number of SMS messages that can be processed by a GSM modem per minute is very low
-- only about six to ten SMS messages per minute.
21
CHAPTER 4
IMPLEMENTATIONS
4.1 PROGRAM :
#include<String.h>
#include<LiquidCrystal.h>
#define mode 7
#define result A5
#define play A0
#define M0 A2
#define M1 A3
#define M2 A4
char ser[20];
void setup()
22
lcd.begin(16, 2);
Serial.begin (9600);
pinMode(result, INPUT_PULLUP);
pinMode(mode , INPUT_PULLUP);
pinMode(play , OUTPUT);
pinMode(M0 , OUTPUT);
pinMode(M1 , OUTPUT);
pinMode(M2 , OUTPUT);
pinMode(play , HIGH);
pinMode(M0 , HIGH);
pinMode(M1 , HIGH);
pinMode(M2 , HIGH);
lcd.setCursor(0, 0);
lcd.setCursor(0, 1);
lcd.print(" ");
void sms1()
Serial.println("AT");
delay(3000);
23
Serial.println("AT+CMGF=1");
delay(3000);
Serial.println("AT+CMGS=\"9123581020\""); //Serial.print(phone_number)
delay(3000);
Serial.println(z);
delay(3000);
Serial.write(0x1A);
delay(3000);
void lcd_home()
lcd.clear();
delay(20);
lcd.setCursor(0, 0);
lcd.setCursor(0, 1);
lcd.print(" ");
24
void Tag_match()
lcd.setCursor(0, 0);
lcd.print("RS : 3 ");
lcd.setCursor(0, 1);
lcd.print("TOTAL : ");
digitalWrite(M0,LOW);
digitalWrite(M1,HIGH);
digitalWrite(M2,HIGH);
delay(500);
digitalWrite(play,LOW);
delay(500);
digitalWrite(play,HIGH);
delay(500);
digitalWrite(M0,HIGH);
digitalWrite(M1,HIGH);
digitalWrite(M2,HIGH);
if (digitalRead(mode) == LOW)
a = a + 3;
25
}
a = a - 3;
lcd.setCursor(7, 1);
z = a + b + c + d;
lcd.print(z);
delay(1500);
lcd_home();
lcd.setCursor(0, 0);
lcd.print("RS : 5 ");
lcd.setCursor(0, 1);
lcd.print("TOTAL : ");
digitalWrite(M0,HIGH);
digitalWrite(M1,LOW);
digitalWrite(M2,HIGH);
delay(500);
digitalWrite(play,LOW);
26
delay(500);
digitalWrite(play,HIGH);
delay(500);
digitalWrite(M0,HIGH);
digitalWrite(M1,HIGH);
digitalWrite(M2,HIGH);
if (digitalRead(mode) == LOW)
b = b + 5;
b = b - 5;
lcd.setCursor(7, 1);
z = a + b + c + d;
lcd.print(z);
delay(1500);
lcd_home();
27
lcd.setCursor(0, 0);
lcd.print("RS : 8 ");
lcd.setCursor(0, 1);
lcd.print("TOTAL : ");
digitalWrite(M0,HIGH);
digitalWrite(M1,HIGH);
digitalWrite(M2,LOW);
delay(500);
digitalWrite(play,LOW);
delay(500);
digitalWrite(play,HIGH);
delay(500);
digitalWrite(M0,HIGH);
digitalWrite(M1,HIGH);
digitalWrite(M2,HIGH);
if (digitalRead(mode) == LOW)
c = c + 8;
c = c - 8;
28
}
lcd.setCursor(7, 1);
z = a + b + c + d;
lcd.print(z);
delay(1500);
lcd_home();
lcd.setCursor(0, 0);
lcd.print("RS : 10 ");
lcd.setCursor(0, 1);
lcd.print("TOTAL : ");
digitalWrite(M0,LOW);
digitalWrite(M1,LOW);
digitalWrite(M2,HIGH);
delay(500);
digitalWrite(play,LOW);
delay(500);
digitalWrite(play,HIGH);
delay(500);
digitalWrite(M0,HIGH);
29
digitalWrite(M1,HIGH);
digitalWrite(M2,HIGH);
if (digitalRead(mode) == LOW)
d = d + 10;
d = d - 10;
lcd.setCursor(7, 1);
z = a + b + c + d;
lcd.print(z);
delay(1500);
lcd_home();
else
lcd.setCursor(0, 1);
delay(1000);
lcd_home();
30
}
void loop()
ser[val] = Serial.read();
val++;
lcd.setCursor(0, 1);
lcd.print(ser[val]);
delay(1500);
Tag_match();
val = 0;
lcd_home();
31
}
if (digitalRead(result) == LOW)
lcd.clear();
lcd.setCursor(0, 1);
lcd.setCursor(12, 1);
total = a + b + c + d;
lcd.print(total);
delay(1000);
sms1();
lcd_home();
32
CHAPTER 5
CONCLUSION
5.1 Conclusion
The advancement in science and technology is a persistent process. Latest gadgets and
latest technology are being designed and developed . This application is used in
shopping malls for assisting customers by saving a lot of time in buying commodities.
In this project RFID is used as safety access for the item which thereby enhances the
surveillance performance. This implementation initiates for an automated central
billing system in shopping malls and supermarkets. With this, shoppers no longer have
to wait near counters for payment of bills because of their purchased item information
getting transferred to central billing unit. By this billing process speed increases and
becomes much more simpler. In addition to this capability, the mechanism also assures
recognition of cases of theft induced by fraudulent consumers which makes the system
more reliable and fascinating to both customers as well as sellers. This will enhance
the shopping experience to a new level.
Different variables like item cost, item name etc are continuously displayed on LCD
attached to the trolley. Thus we can say that automatic billing of products by using
RFID technique will be a more feasible choice in the upcoming days and thereby
operation becomes more concise and systematic.
The objective is effectively attained in the prototype model developed. The developed
product is of low cost, amiable to use and does not require any specific practice. The
ability to take a decision can be done in the cart itself which can be used in the
shopping complexes for effortless and clever way of purchasing items to save vitality,
time and money of the customers. The project is evaluated with different trial cases
33
with distinct items assessed for all the practical trials. Tags used in this project are of
water sensitive so the trolley is restricted to use water sensitive products. And
moreover tags used in this project have the capacity of detecting only one side
therefore tags are attached to products in circular fashion inorder to avoid non
detection .If we can use more powerful tags which are under research,we can
overcome this problem. When the evaluation is done with a single shopping trolley
with distinct items , it gives the 83% accuracy for all the cases.
34
REFERENCES
[1] Suraj.S, Vishal Guruprasad, Udayagiri R Pranava, Preetham S Nag, “RFID Based
Wireless Intelligent Cart Using ARM7,” International Journal of Innovative
Research in Science, Engineering and Technology, Vol. 5, Issue 8, 2016.
[3] Komal Ambekar, Vinayak Dhole, Supriya Sharma,“Smart Shopping Trolley Using
RFID,” International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET), Volume 4 Issue 10, 2015.
[4] K.Gogila Devi, T.A.Kaarthik, N.Kalai Selvi, K.Nandhini, S.Priya, “Smart Shopping
Trolley Using RFID Based on IoT,” International Journal of Innovative Research in
Computer and Communication Engineering. Vol. 5, Issue 3, 2017.
[5] Amine Karmouche, Yassine Salih-Alj, “Aisle-level Scanning for Pervasive RFID
based Shopping Applications ,” IEEE.
[6] Satish Kamble, Sachin Meshram, Rahul Thokal & Roshan Gakre, “Developing a
Multitasking Shopping Trolley based on RFID Technology,” International Journal
of Soft Computing and Engineering (IJSCE), ISSN: 2231-2307, Volume-3, Issue-6,
2014.
35