Sie sind auf Seite 1von 32

CHAPTER I

THE PROBLEM AND ITS BACKGROUND

Introduction

Over the years had passed, technology and gadgets have taken over the path of our life.

The landscape of technology have been changed, from manual to automatic and simple to

sophisticated. Nowadays, many technologies are continuously upgrading and used for better results.

Technologies that are very usable and serviceable to the present and to upcoming generation. It

involved in most of what we do at this contemporary period. It has become a need to people to ease

the manual processes they used to do. Indeed, the unending cycle of technology innovation brings

satisfaction and impart an exquisite outcome to the people.

As technology evolved, everyone has been well exposed in living alongside some state of

the art control system especially in securing the general dwelling, remote supervision and mobility.

Security is the most important for us people that is why the quest for a safe and sound living still

lingers around the need of everyone. Home security has always been regarded as the core when it

comes to addressing the safety and security aspect of our general living (Jscsecur, 2014). Aside

from home, schools are also in the main lists when it talks about safety especially public schools

because of the number of vehicles moving into and out of the school premises.

Today, transportation has the important role in our society. It is one of the most important

infrastructures of any country and serves as a tool for us to go anywhere and any place we want in

a faster and easy way. However, as we notice, human population is growing bigger. Along with,

vehicles are also growing in number. Monitoring today is becoming a big challenge for everyone in

securing their own properties.

In many areas like the Isabela State University- Cabagan Campus, there are many problems

encountered when it comes to security. A lot of vehicles that enters and exits in one place to another
1
is one of the realistic circumstances. One of these problems is the difficulty of managing the entrance

and exits of the vehicles manually. Another problem in manual monitoring is that the assigned guard

cannot monitor every vehicle that are entering the area from time to time and maintaining the records

of vehicles are a complicated task in manual process. To resolve these problems, the proponents

came up with the idea of “RFID Based Vehicle Monitoring”.

The study focused on the development of a “RFID-Based Vehicle Monitoring” technology

which is believed to be useful in monitoring and checking of vehicles, both authorized and

unauthorized.

Statement of Objectives

The general objective of the study is to develop a RFID-Based Vehicle Monitoring at Isabela

State University- Cabagan Campus.

Specifically, it aimed to:

1. Design a vehicle monitoring system that provides the following:

a. A database for all registered vehicles using 13.56 MHz RFID module;

b. SMS notification to the database using SIM900A GSM module;

c. An integrated barrier gate using Tower Pro MG966R Servo Motor;

d. An integrated HC-SR04 ultrasonic sensor for vehicle detection; and

e. An integrated Arduino camera module for capturing vehicle images.

2. Determine the performance of the technology developed in solving security constraints in

terms of the following:

a. Functionality,

b. Usability, and

c. Reliability

2
Scope and Limitations

Generally, the device was installed at the Isabela State University- Cabagan Campus main

gate to improve the manual process of security checking and monitoring of vehicles and persons.

The proposed design project provided a database system for all registered vehicles, RFID and

Arduino based monitoring system with integrated barrier gate using servo motor as control

mechanism, a button as bypass for unregistered vehicles and a GSM module used for SMS

notification whenever the reader detects a RFID tag and when the button was used, an ultrasonic

sensor for vehicle detection and camera that captures vehicle images. The RFID reader operating

frequency is 13.56 MHz and can detect up to 4 cm. The SD Card capacity can store up to 2 GB of

detected and captured vehicle images.

The project does not count the number of vehicles and persons entering and leaving the

area and it will not require all vehicle owners to have an RFID tag. Thus, the project still requires a

human intervention.

This study also looked into the general perception of the respondents regarding the device

functionality, usability and reliability through the use of survey questionnaires. The designed

questionnaire consisted of statements that were patterned from the software quality criteria as

defines by ISO/IEC 9126 standard.

3
CHAPTER II

REVIEW OF RELATED LITERATURE AND STUDIES

This chapter presents related literature and studies researches of recognized experts with

the use of internet, articles, journals, and books as reference for the development of the design

project, and both of which have significant bearing or relation to the vehicle monitoring and the

transportation management today and its impact. It also includes the gaps between the existing

system and the proponents’ design.

A. The Impact of Security Technologies to Transportation

With the growing and continuous improving state of technology today, it was not surprising

that everyone has been well exposed in some state of the art control system especially in securing

their properties. It rapidly changing the economy, the society, and the way people live, work, and

interact with each other. According to Deakin et al. (2001), transportation become the most

technology’s integrated part throughout the industry especially in investing security technologies

historically and over the years had passed, great improvements in the transportation systems are

being made and created with the help of numerous advances in the science and technology. Some

changes include smart card technologies to improve the feasibility and convenience of a variety of

pricing options for road use, parking, and transit fares. Monitoring and information systems that

enable travelers to time trips and select routes to avoid congestion, reducing it in the process. Over

the longer run, automation could make order of magnitude improvements in safety, capacity, and

convenience. The researchers concluded that having changes in transportation technologies have

impact the society.

Wilson (2009) supported Deakin and Kim’s statement and added that improving the

performance of computers and communications technologies are now starting to have a significant

impact on the urban public transport industry such as automatic data collection systems including
4
automatic vehicle location systems, automatic passenger counting systems, advanced passenger

information systems and electronic fare payment and ticketing systems are becoming pervasive in

large systems. Technology continues to improve across the board and offered opportunities to

develop and apply more ambitious models to assist in many facets of the performance of public

transport systems.

According to International Peace Institute (2016), new technology is and truly is driving rapid

global change in which changes created new opportunities for multilateral cooperation in the area of

sustainable development, relations between the state and the society, peace and conflict, global

governance and mostly on the international security. Security technologies had greatly affected the

lives of mankind with its continuous innovation as Deakin, Kim, and Wilson stated above.

Ramey (2012) concluded that technology has played a big role in the development of various

industries. The impacts of technology cannot be measured because it is still changing the way we

do everything.

B. Security Technologies Used in Vehicles

In the recent years until now, new technologies have been applied to the transportation

management to diverse problems such as traffic, air pollution, fuel use, and accident risk. One of the

most useful and common security technologies today is the Radio Frequency Identification (RFID)

technology. According to BITP (n.d.), RFID is demonstrating huge versatility in terms of its ability to

enable solutions within applications in the transportation sector. One of the many applications is the

Vehicle identification used on entry to site, plus also confirmation of load. The use of RFID enables

businesses to manage their supply chains with unprecedented levels of automation and a vastly

improved degree of control. In addition, RFID has a large contribution to tractor/trailer

identification/association, trailer load identification at Gatehouses, road pricing like access/payment

5
to toll roads, and oyster cards, transport payments. This gives an insight into the breadth of

opportunities the technology offers in terms of delivering improvements within transport applications.

Further, Radio Frequency Identification (RFID) technology is one of the most useful

technology in terms of security technologies and is the only one of many technologies that is being

used in securing properties such as bar code, voice recognition, touch memory, smart cards, and

biometrics. According to Hamid (2006), RFID is one of the most rapidly growing segments of today’s

Automatic Identification Data Collection (AIDC) industry. It represents an improvement over bar

codes and can automatically identify target and obtain relevant data. Moreover, it is able to work

under harsh environment and reads from long distance. While MITIP (2006) stated that RFID is a

technology that gathers and capture data about a certain item without the need of touching or seeing

the data carrier, through the use of inductive coupling or electromagnetic waves. Borriello (2005)

supported MITIP’s statement by saying it is an emerging technology that uses wireless radio to

identify objects from a distance without requiring a line of sight or physical contact.

Want (2006) also agreed to Borriello (2005) that Radio Frequency Identification (RFID) is a

technology which does not require a line of sight and added that has moved from obscurity into

mainstream applications that help speed the handling of manufactured goods and materials. RFID

enables identification from a distance, and unlike earlier bar-code technology. One of the most

intriguing aspects of modern RFID tags is that they can convey information that extends beyond data

stored in an internal memory and include data that onboard sensors created dynamically. He

concluded that RFID’s potential benefits are large and can have many novel applications in the future

even those applications which we can’t even begin to imagine.

In the study of Floyd (2014), he concluded that RFID has found many applications within the

transportation industry. In general, the transportation industry is a success story in the

6
implementation of RFID technology across the board. Trucking and tolls have been the major

players in that story, and other industry are making inroads as well.

With the used of Servo motors, barrier gates are well known in terms of securing road gates.

In a study done by Theng (n.d.), Servo motors are best known for their rapid acceleration and

deceleration capability, made possible by delivering high-peak torque in conjunction with a high

torque-to-inertia ratio. Servo motors are famous for their high dynamic response and precision

accuracy in traditional motion control applications, such as machine tools and robotics. A complete

servomotor has incorporates a three wire DC motor, a gear train, a potentiometer, an integrated

circuit, and an output shaft bearing. Actually a servomotor has three wires that stick out from the

servomotor and connect to the outside word. One is for power, ground, and the white wire is the

control wire. Servo motors are commonly known in operating a barrier gate.

Another common device that are being used today which the researches adopted in the

study is the Genuino or known as Arduino Uno Microcontroller. According to Rozilan (2012), Arduino

is a tool for making computers that can sense and control more of the physical world than your

desktop computer. It's an open-source physical computing platform based on a simple

microcontroller board, and a development environment for writing software for the board. Arduino

projects can be stand-alone, or they can be communicate with software running on your computer

such as LabVIEW, Flash, Processing, MaxMSP.

Lastly, communication means between human and devices was also renewed by the use of

GSM modem. SMS notification is being prone in our society today, especially in warning and

monitoring security systems. Haron et al. (n.d) defined that Global System for Mobile Communication

(GSM) modem as a wireless modem that works with GSM wireless network and the modem is

connected to a server so it could send SMS as an alert or warning to farmer. Alcantara, Lagula,

7
Latina and Te (2013) supported the statement of Haron et al. (n.d.) which said that GSM is a wireless

communication not only between people alone but people to devices also. This system poses a great

advantage and convenience to the public when it is interfaced with different sensors and functions

even if a user is not physically present in the vicinity of the device.

C. Existing Monitoring System for Vehicles

A lot of vehicle monitoring system are now available and sold in the market. Recently, Tseng

et al. (2007) proposed a Vehicle Management System based on UHF band RFID technology. This

system is applied for vehicle entering/leaving at road gates. It consists of tag-on-car, reader antenna,

reader controller, and the monitoring and commanding software. It could effectively control the

vehicles passing through road gate and record the vehicles' data such as the time in and out and the

tag number. The system could not only reduce the cost of security guards and payloads by the

decrement of manpower, but also promote the security and efficiency of the parking lot. And this has

been tested in many field tests and the results shown that it is suitable for vehicle management and

the related applications.

Yu et al. (2011) designed and implemented active RFID tag based system for automatically

identifying running vehicles on roads and collecting their data. The system used electronic tag and

reading base station is based on SCM C8051F920; it is a low-power high-speed general with a

24.5MHz oscillator, and a programmable flash memory. To solve identification uncertainty problems,

the two key techniques are: anti- interference protocol and data clearing algorithm are proposed. The

effectiveness and efficiency of the system is analyzed. The system have wide applications in traffic

IOT (Internet of Things) to support traffic monitoring, traffic flow statistics, traffic scheduling, and

special vehicle tracking.

Currently, Kiranmayi (2016) also proposed a Vehicle Monitoring System that uses RFID

which generated and maintained daily reports of monitoring vehicles and this can be done
8
automatically with the use of the device and the software. The author concluded that with RFID

vehicle monitoring system, vehicle information can be automatically gathered for efficient and safe

vehicle management. Automatic vehicle identification can increase the security and prevent loss of

vehicles. Overall this Vehicle monitoring system simplifies the task of managing vehicles by security

guards and made automated system.

Furthermore, Domingo et al. (2008), implemented a RFID based Security System at

Cagayan State University. The system was based on Radio Frequency Identification (RFID)

technology and consists of a passive RFID tag. The passive micro transponder tag collects power

from the 125 KHz magnetic field generated by the base station, gathers information about the Tag

ID and sends this information to the base station. The base station receives, decodes and checks

the information available in its Database and Manchester code was used to send that information.

The system performed as desired with a 10cm diameter antenna attached to the transponder. The

Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag

ID is stored in its memory then the microcontroller allows the person inside.

Ezanee (2012) designed a RFID based Plate Recognition for registered Vehicle in University

Malaysia Pahang (UMP). It is a system for process of the check in and out of the main gate of UMP.

It is design for only registered vehicle in UMP to make sure UMP staffs & students to get more secure

and safety guarantees. The system identify registered vehicle in and out of the campus of UMP by

the recognition of the vehicle plate number. When the RFID reader recognized the tag of vehicle

plate number, it directly show the vehicle owner details as it is been transmitted in the system and

the vehicle barrier quickly open.

Additionally, Wisanmongkol et al. (2008) proposed an Automatic Vehicle Identification with

sensor-integrated RFID System. Sensor is one of the popular devices used in many applications

nowadays including the Intelligent Transportation System (ITS) which is widely utilized in the
9
Automatic Vehicle Identification (AVI) system. In this research, they propose an implementation of

photoelectric sensors as a vehicle detection tool in an RFID-based poultry traceability system to

detect poultry transport vehicle entering and leaving an animal checkpoint. In addition, an algorithm

to distinguish a poultry transport vehicle from a regular vehicle based on the vehicle’s length and

height is presented, sensor selection considerations for outdoor use is also included. The proposed

system is fully automatic, no checkpoint staff is required to control the RFID reader and signal the

vehicle movement and the overall power efficiency of the system is improved because the reader

talk time is minimized.

Moreover, Kumar et al. (2013) also implemented a Vehicle theft alarm and tracking the

location using GPS and RFID. The System consists of a microcontroller circuit board, keypad, alarm

system and a display board with the combination of RFID and GSM. The microcontroller used is

ATMEGA 162v low-power CMOS 8-bit based on the AVR enhanced RISC architecture. A buzzer is

used to indicate the vehicle and give the alert to the authenticated user. And GSM is used for mobile

communication and also for the alert message. The researchers concluded that the key of the

automobile is an RFID card which is contactless, secure and convenient. The long-range monitor

and grading responses could be realized by the mobile phones of users, which made the alarm cover

a broad range.

Further, Hashim et al. (2013) designed and implemented a Vehicle Security System Using

Zigbee. The project is used to secure and monitor the car based on combination of Zigbee system,

Peripheral Interface Controller (PIC) 16F877A microcontroller, vibration sensor (body), temperature

sensor and micro switch (engine), alarm, buzzer, fan and magnetic sensor (door). There are two

programs used in this system for transmitting and the receiving. Proteus 7 Professional is being used

in the designed process of the circuit and simulation works. Meanwhile, PIC C Compiler software is

used to compile the C language code to Hexadecimal (HEX) code. Users are able to control the
10
system remotely and they can also monitor the car status by using the Liquid Crystal Display (LCD)

display which attached to the controller. The author concluded that this wireless monitoring system

have been successfully and the result is satisfactory. And this project can also be extended, not only

for car security purposes but also can be implemented as home security system.

Gavali et al. (2016) designed an embedded Vehicle Monitoring system based on Web

Technology. The system used level sensor, pressure sensor, tilt sensor, gas sensor, and alcohol

detector. By these sensors, the various parameters of the vehicle system such as Liquid Level, State

of Vehicle, Pollution by Vehicle, alcoholic taste of driver and so on are being checked. These sensors

provide the information to the Arduino (ATMEGA 328P-P0). In addition, Pentium 4 Processor is one

of the equipment used. And Web Technology is used to monitor the parameters. These materials is

used for inputs acquisition and storage. The author concluded that this project can be further

enhanced by the use of camera and by developing a mobile based application to get the real time

view of the vehicle instead to check it on PC, which would be more convenient for the user to track

the target.

Kumar et al. (2012) developed a Traffic Monitoring using M2M Communication. It is a

monitoring system that uses wireless vision sensor network (camera) that captures and processes

the real-time video image to obtain the traffic flow rate and vehicle speeds along different urban

roadways. This system will display the traffic states on the front roadways that can guide the drivers

to select the right way and avoid potential traffic congestions. The real-time traffic data is processed

by the Personal Computer (PC) at the sub roadway station and the traffic flow rate data is transmitted

to the main roadway station Arduino 3G via email, where the data is extracted and traffic flow rate

displayed.

Lastly, Saddam et al. (n.d.) designed an Arduino based Vehicle Tracker using GPS and

GSM. In this project, Arduino is used for controlling the whole process with a GPS Receiver and
11
GSM module. The designers have used GPS Module SKG13BL and GSM Module SIM900A. GPS

Receiver is used for detecting coordinates of the vehicle, GSM module is used for sending the

coordinates to user by SMS. And an optional 16x2 LCD is also used for displaying status messages

or coordinates. Sent message is received by GSM module which is connected to the system and

sends message data to Arduino. Arduino reads it and extract main message from the whole

message. And then compare it with predefined message in Arduino. This Vehicle Tracking

System can also be used for Accident Detection Alert System, Soldier Tracking System and many

more, by just making few changes in hardware and software.

D. Research Gaps

With the emerging of transportation technologies today, a lot of changes have been made.

Most of the literature and studies have been found, the researches focused on the automation of

vehicle identification, monitoring of vehicle using integrated camera, and tracking using RFID and

GSM as one of their major component. With that, the researchers designed and implemented

technologies and systems that are applicable to Automatic Vehicle Identification (AVI), Intelligent

Transportation System (ITS), and Internet of Things (IOT) which brings great improvements in

solving transportation security problems. These literature and studies are also different in terms of

structure, in areas of study and with the other purposes.

The literatures that have been found presents the idea of using RFID technology. It collects,

records, maintains, and saves data detected from the vehicles running on road, passing through

road gates, monitoring vehicle status, and entering/leaving an area using RFID Tags as well as

gathering and sending Tag ID information into a base station in which the researchers would want

to incorporate and adapt in the proposed design project. On the other hand, it was identified that the

cited works possesses the weaknesses that it cannot able to detect if the owner is the driver of his

own vehicle or driven by the other, the identification card can be swapped with another person’s ID
12
or forgot and lost by the vehicle owner making it still possible for an unauthorized person used it and

can now enter the area which lead to another problem. Some of the implemented projects have used

sensor-integrated RFID system, Arduino Microcontroller, an alarm system, an integrated camera and

a combination of RFID and GSM to notify the vehicle’s owner in some instances encountered. These

provides brief detailed references on the functionality of each device, mainly the microcontroller

used. Thereby, the proponents adapted the combination of RFID and GSM as well as the camera

and incorporate a barrier gate system using servo motor in order to secure the implementation scope

of the study.

Moreover, the proponents adapted one of the cited literature that uses RFID technology for

registered vehicles. However, the observed weakness of this study is it detects only those registered

plate numbers of the vehicles and it cannot able to detect those unregistered vehicles. With RFID-

Based Vehicle Monitoring, both registered and unregistered vehicles can be detected, monitor and

enter the area from time to time through the use of RFID reader for tag detection and controller of

servo motor, GSM module that sends SMS notification to the database, a servo motor as control

mechanism of the barrier gate, combination of ultrasonic sensor and camera module for vehicle

detection and capturing vehicle images, and a button as bypass for those unregistered vehicles.

13
CHAPTER III

RESEARCH METHODOLOGY

This chapter discusses the population and locale of the study, the data gathering instruments

and procedures that will be used, the data analysis and statistical tools and the design procedures

to achieve the purpose of the study.

Population and Locale of the Study

The respondents of the study were the 26 vehicle owners. Convenience Sampling

Technique was used for the selection of the respondents as part of the implementation and testing

period of the study. The study was conducted at Isabela State University – Cabagan Campus.

Data Gathering Procedures

The proponents first conducted an observation on the main entrance of the Isabela State

University- Cabagan Campus. Through this technique, useful facts and information were collected

by the proponents for the design, development, and testing of the design project. After the

observation method, the proponents’ next step was to gather information and useful facts about the

proposed design project. The researchers used the library and internet research as well as the

interview method to supplement initial information about the design project.

Through these methods, several articles in journals, published and unpublished thesis and

dissertations were reviewed.

Lastly, the proponents also used the Survey Method to have a complete view of the

performance of the design project. A questionnaire was used to gather data about the perception of

the respondents regarding the functionality, usability, and reliability of the design project.

14
Data Analysis and Statistical Tools

The data gathered from the questionnaires were tallied, tabulated and analyzed using

weighted mean.

Table 1 shows the five-point Likert scale that was used, their corresponding numerical value

and its range.

Table 1. Likert Scale

Numerical Value Range Descriptive Equivalent


5 4.20 - 5.00 Strongly Agree
4 3.40 - 4.19 Agree
3 2.60 - 3.39 Undecided
2 1.80 - 2.59 Disagree
1 1.00 - 1.79 Strongly Agree

Design Procedures

RFID-Based Vehicle Monitoring is a unique and convenient monitoring system especially

designed for the Isabela State University – Cabagan Campus. This part describes the step-by-step

procedure in developing the proposed design project. It served as the guide throughout the

development of the proposed design project.

Phase I. Conceptualization of the Design Project

At first, the researchers thought of a technology that could solve the problem in managing

and monitoring the vehicles that are to enter and leave an area and to expand the latest existing

vehicle monitoring technology. The researchers came with the analysis stage, which led to the

thought of making a new Vehicle Monitoring technology that uses RFID. In general, the design project

is all about the “RFID-Based Vehicle Monitoring”. The researchers believed in the idea that a project

15
like this mitigates illegal activities, minimizes the loss of vehicles and make the monitoring easier and

more convenient.

The researchers gathered data about “RFID-Based Vehicle Monitoring” through books,

articles, online references, and from the previous design projects related to the study published and

unpublished.

Phase II. Designing the Project

After the conceptualization process, the proponents started designing the proposed project.

Initial data gathered were supplemented by collecting reliable information such as the appropriate

hardware and software to be used in the design project; ideas and information of what components

to be used emerges. This phase focused on the technical aspect of the design project.

On this stage, the researchers arrived first with the flow chart in order to understand the

process of the design project very well and then the block diagram of the project. These two serves

as a blueprint guide to determine the flow of information from one device to another. With the concept

transformed into a block diagram, the proponents started working out on combining, filtering, and

simulating the different circuit diagrams collected in the previous phase using electronics software

for the simulation. It is on this stage that the appropriate hardware and software to be used are

selected through online or direct purchasing.

Phase III. Implementation and Testing of the Design Project

Using the hardware and software prepared in the previous phase, the project constructed

was accordingly, implementing both hardware and software aspect of the RFID technology; the

ultrasonic sensor as well as the alarm system and programming and coding the Arduino Uno

Microcontroller to be used in controlling each device. This phase focused on the testing of the

prototype. It involves making the design project works properly and involves troubleshooting if

16
problems occur. In testing, connect each device and plug the supply needed and turn on the device.

The entire device was carefully tested for possible errors in the operation to make sure that the

designed project is working properly according to its desired output before it will present to the user.

After testing, the project undertakes final implementation on the actual site for evaluation in order to

accomplish the objective of the design project.

After the implementation and testing period, the proponents conducted the survey method

in which the researchers need to distribute questionnaires to the respondents for the evaluation

purposes. The questionnaires were used to determine the functionality, usability, and reliability of the

design project and recommendations/suggestions of the respondents for the improvement of the

monitoring system.

17
CHAPTER IV

RESULTS AND DISCUSSIONS

This chapter presents the project design, project development and project evaluation of the

RFID-Based Vehicle Monitoring.

Project Design
The flowchart of the RFID-Based Vehicle Monitoring in Figure 1 shows the step by step

process of how the design project operates. It has two major inputs which are the RFID reader that

detects a tag from the vehicle owner and an ultrasonic sensor that detects the vehicle. If the driver

is registered, the green LED, GSM, Buzzer, and camera activates simultaneously and the barrier

gate will open at the same time. On the other hand, if the driver is not registered, the camera still

captures the vehicle image but the barrier gate remains close. If the unregistered vehicle want to

enter the area, the assigned personnel can use the button as bypass. As bypass is in used, the red

LED, buzzer, and GSM activates. The GSM module will send a SMS notification to the database for

record purposes.

18
19
The block diagram A in Figure 2 shows the process of the RFID-Based Vehicle Monitoring.

An RFID card tag is issued to every registered vehicle owner with same unique numbers. When this

card is placed in front of the RFID Reader, the Arduino board will analyze the information of the tag.

When the tag is registered, the green LED activates and the barrier gate will open through the use

of a servo motor and will send a SMS notification through the GSM Module with the exact name of

the vehicle owner and the exact time that will directly store in the database through a FrontlineSMS

software. On the other hand, when there is no tag detected from the vehicle’s owner, the assigned

guard will press the button or will place a card in front of the reader as a bypass and then activates

the red LED and the barrier gate will open so that vehicle can now enter the area and will send a

SMS notification that an unregistered vehicle entered the area and will store in the database for

security purposes.

Figure 2. Block Diagram A of RFID-Based Vehicle Monitoring

20
Additionally, the block diagram B in Figure 3 shows that camera activates using the

ultrasonic sensor that detects a vehicle automatically and then captures the image of the vehicle

detected by the sensor and will directly store in a Micro SD Card for future purposes. Real Time

Clock (RTC) was used for setting the camera time. Furthermore, the buzzer beeps whenever a card

is placed in front of the RFID reader in order to inform the assigned guard and increase the security

inside the school premises.

Figure 3. Block Diagram B of RFID-Based Vehicle Monitoring

21
The wiring diagram A of RFID-Based Vehicle Monitoring in Figure 4 acts as a guide in

connecting each of the components for the design project. The main device used in the design project

is the Arduino Uno microcontroller that serves as the brain and heart of all components connected,

while RFID reader serve as a signal light that activates each components such as the GSM module

that sends notification to the database, servo motor that controls the barrier gate, buzzer, and LEDs.

The button activates only when an unregistered vehicle tries to enter the area in which the assigned

personnel will operate it. All sensors and modules are connected in the microcontroller in order to

achieve its design objectives and its intended functions.

Figure 4. Wiring Diagram A of RFID-Based Vehicle Monitoring

22
The wiring diagram B of RFID-Based Vehicle Monitoring in Figure 5 acts as a guide in

connecting the components of the design project. The main device used in the design project is the

Arduino Uno microcontroller that serves as the brain and heart of all components connected. The

ultrasonic sensor and the camera module serves as the “eyes” of the entire design project. These

two components will communicate their data to the Arduino Uno in which the microcontroller process

the information in order to achieve the final output which are the captured images of the vehicles that

entering the area which were stored in a Micro SD Card.

Figure 5. Wiring Diagram B of RFID-Based Vehicle Monitoring

23
Project Development
The Registered Vehicles Windows for the faculty and students in Figure 6 consists of tool

strip that contains the GSM database, logout button, and exit button, records of the registered vehicle

for students and faculty which can be modified through adding, editing, and deleting records.

Figure 6. Database for all Registered Vehicles of Final Prototype

Figure 7 shows the developed database for all registered vehicles using 13.56 MHz RFID

module. The RFID reader activates when a tag is placed in front of it. Along with, the GSM module

sends SMS notification (vehicle owner name and time) to the database for record purpose.

Figure 7. RFID reader of Final Prototype

24
Figure 8 presents the developed database which stores SMS notifications using SIM900A

GSM module for history purpose. The GSM module activates only when the RFID reader detects a

tag or when the button was use.

Figure 8. SMS Database and GSM module of Final Prototype

Figure 9 shows the integrated barrier gate which will open only when an RFID card is placed

in front of the reader or the assigned personnel presses the button controlled by a Tower Pro

MG966R Servo Motor.

Figure 9. Barrier Gate and Servo Motor of Final Prototype

25
Figure 10 shows the integrated HC-SR04 ultrasonic sensor that detects those vehicles

entering the specified area.

Figure 10. Ultrasonic Sensor of Final Prototype

Figure 11 shows the integrated Arduino camera module that captures vehicle images once

the ultrasonic sensor detects a vehicle through distance.

Figure 11. Camera of Final Prototype

26
Figure 12 shows the final design output of the “RFID-Based Vehicle Monitoring”. It also

shows the labeled location of every component integrate inside of the design project. The device will

work once it is turned on with the exact supply needed. Every labeled components has its own

functions. The design project’s main body is a large casing which is made of plywood for the

protection of the integrated components, because if it is aluminum it will easily absorb heat and it

can affect the performance of the prototype and it may destroy the integrated components inside it.

The casing comes with a barrier gate controlled by a servo motor, a button, and a camera connected

to the entire system. Inside the casing are the materials used such the RFID reader, ultrasonic

sensor, LEDs, buzzer, GSM module, real time clock module, Micro SD Card module, Arduino

Microcontrollers, and adapters used as power supply.

Figure 12. Final Design Project

27
Project Evaluation

Questionnaires were distributed to the respondents to evaluate the functionality, usability,

and reliability of “RFID Based Vehicle Monitoring”.

Table 2 shows the mean perception of the vehicle owners on the functionality of the RFID-

Based Vehicle Monitoring. The result reveals that majority of the vehicle owners strongly agree on

the specified functionalities of the design project with an overall weighted mean of 4.67.

Table 2. Respondents’ Rating on the Functionality of the Project


Criteria Weighted Mean Descriptive Equivalent
1. The system turns on the green LED 4.73 Strongly Agree
when the tag is registered.
2. The system turns on the red LED when 4.6 Strongly Agree
the tag is unregistered.
3. The system provides the exact name of 4.62 Strongly Agree
the vehicle owner who entered the gate.
4. The system beeps when a registered 4.77 Strongly Agree
vehicle enters the area.
5. The system provides captured image of 4.65 Strongly Agree
vehicles entering the gate.
Overall Weighted Mean 4.67 Strongly Agree

28
Table 3 shows the mean perception of the vehicle owners regarding the usability of the

RFID-Based Vehicle Monitoring. Result reveals an overall weighted mean of 4.75 which implies that

the respondents strongly agree on the usability of the design project.

Table 3. Respondents’ Rating on the Usability of the Project


Criteria Weighted Mean Descriptive Equivalent
1. The design project is easy to 4.77 Strongly Agree
manipulate.
2. The design project operations and tasks 4.5 Strongly Agree
can be easily learned by the users.
3. The design project is simple and easy to 4.88 Strongly Agree
use.
4. The design project is suitable for its 4.73 Strongly Agree
intended use.
5. The design project has the ability to 4.9 Strongly Agree
notify the assigned guard and the
assigned administrator.
Overall Weighted Mean 4.75 Strongly Agree

Table 4 presents the mean perception of the vehicle owners on the reliability of the RFID-

Based Vehicle Monitoring. The overall weighted mean of 4.65 indicates that the respondents strongly

agree on the reliability of the design project.

Table 4. Respondents’ Rating on the Reliability of the Project

Criteria Weighted Mean Descriptive Equivalent


1. The system is capable of recovering 4.62 Strongly Agree
from error when fault is detected.
2. The system’s connectivity ensure 4.62 Strongly Agree
frequency of failure in its minimum.
3. The system maintains its level of 4.69 Strongly Agree
performance after recovering from fault.
4. The system sends SMS notification 4.69 Strongly Agree
promptly.
Overall Weighted Mean 4.65 Strongly Agree

29
CHAPTER V

CONCLUSIONS AND RECOMMENDATIONS


This chapter presents the conclusions that were drawn based from the outcomes of the

evaluation conducted, result and observation on the RFID-Based Vehicle Monitoring. Furthermore,

recommendations were specify based from the findings and conclusion of the study for future

development and improvement of the project.

Conclusions
Based from the result of the study, the following conclusions were drawn:
1. The developed RFID-Based Vehicle Monitoring was successfully implemented by providing

a database for all registered vehicle owners using a 13.56 MHz RFID module, SMS

notification using SIM900A GSM module, integrated barrier gate using Tower Pro MG966R

servo motor, integrated HC-SR04 ultrasonic sensor, and integrated camera module.

2. The developed RFID-Based Vehicle Monitoring is perceived to be functional, usable, and

reliable.

Recommendations

In the light of the findings of the study, the following recommendations are drawn for future

development and improvement of the project:

1. The design project should add new features including additional RFID Reader for the exit

gate. A long range RFID reader should also be considered.

2. The design project should use bigger display to completely view the information of the

vehicle entering the campus without looking/checking in the database anymore.

3. The design project should use high end database that can directly store data and images.

4. Future researchers may include a vehicle counting system for more convenient vehicle

monitoring system.

30
REFERENCES

Borriello (2005). Radio Frequency Identification (RFID), Retrieved from


(http://upcommons.upc.edu/bitstream/handle/2099/12671/ting.pdf)

Deaki, E. and Jukim, S. (2001) Transportation Technologies: Implications for Planning,


Retrieved from (http://www.uctc.net/research/papers/536.pdf)

Eno Center for Transportation and ICF International (2016) Emerging Technology trends in
Transportation, Retrieved from (https://www.enotrans.org/wp-
content/uploads/EmergingTech.v13.pdf)

Floyd, R. (2014) RFID in Transportation, Retrieved from


(http://www.engineering.com/ElectronicsDesign/ElectronicsDesignArticles/ArticleID/7338/R
FID-in-Transportation.aspx)

Gavali, K. et al. (2016) Research and Design of Embedded Vehicle Monitoring System Based on
Web Technology, Retrieved from (http://www.ijmter.com/papers/volume-3/issue-
7/research-and-design-of-embedded-vehicle-monitoring-system-based-on-web-
technology.pdf)

Hamid, H. (2006) RFID Based Design for Vehicle Location System, Retrieved from
(https://www.scribd.com/doc/83404754/RFID-Based-Design-for-Vehicle-Location-System)

Hashim, N. et al. (2013) Vehicle Security System Using Zigbee, Retrieved from
(http://www.ijsrp.org/research-paper-0913/ijsrp-p2144.pdf)

Kiranmayi, D. (2016) Vehicle Monitoring System using RFID, Retrieved from


(http://ijcsit.com/docs/Volume%207/vol7issue3/ijcsit2016070387.pdf)

Kumar, C. et al. (2013) Vehicle Theft Alarm and Tracking the Location Using RFID & GPS,
Retrieved from (http://www.ijetae.com/files/Volume3Issue12/IJETAE_1213_94.pdf)

Kumar, S. et al. (2012) Traffic Monitoring Using M2M Communication, Retrieved from
(https://arxiv.org/ftp/arxiv/papers/1404/1404.0106.pdf)

MITIP (2006). The RFID Technology and Its Current Applications, Retrieved from
(http://www.ropardo.ro/fileadmin/prezentari_pdf/RFID_MITIP2006.pdf)

Ramey, K. (2012). Impact of Technology, Retrieved from (http://www.useoftechnology.com/impact-


technology-life-today/)

Tseng, Wang and Ko (2007) Vehicle Management System based on UHF band RFID Technology,
Retrieved from (http://ieeexplore.ieee.org/document/4244854/?tp=&arnumber=4244854)

Want, R. (2006) RFID Technology: An Introduction to RFID Technology, Retrieved from


(https://www.cs.cmu.edu/~15-821/READINGS/PAPERS/want2006.pdf)
31
Wisanmongkol, J. et al. (2008) Automatic Vehicle Identification with sensor-integrated RFID
System, Retrieved from (http://ieeexplore.ieee.org/document/4600541/)

Yu, M. et al. (2011) An RFID Electronic Tag based Automatic Vehicle Identification System for
Traffic IOT Applications, Retrieved from (http://ieeexplore.ieee.org/document/5968962/)

Zhang, Cheng and M. Yu (2011) An RFID Electronic Tag based Automatic Vehicle Identification
System for Traffic IOT Applications, Retrieved from
(http://ieeexplore.ieee.org/document/5968962/)

32

Das könnte Ihnen auch gefallen