Beruflich Dokumente
Kultur Dokumente
Introduction
Over the years had passed, technology and gadgets have taken over the path of our life.
The landscape of technology have been changed, from manual to automatic and simple to
sophisticated. Nowadays, many technologies are continuously upgrading and used for better results.
Technologies that are very usable and serviceable to the present and to upcoming generation. It
involved in most of what we do at this contemporary period. It has become a need to people to ease
the manual processes they used to do. Indeed, the unending cycle of technology innovation brings
As technology evolved, everyone has been well exposed in living alongside some state of
the art control system especially in securing the general dwelling, remote supervision and mobility.
Security is the most important for us people that is why the quest for a safe and sound living still
lingers around the need of everyone. Home security has always been regarded as the core when it
comes to addressing the safety and security aspect of our general living (Jscsecur, 2014). Aside
from home, schools are also in the main lists when it talks about safety especially public schools
because of the number of vehicles moving into and out of the school premises.
Today, transportation has the important role in our society. It is one of the most important
infrastructures of any country and serves as a tool for us to go anywhere and any place we want in
a faster and easy way. However, as we notice, human population is growing bigger. Along with,
vehicles are also growing in number. Monitoring today is becoming a big challenge for everyone in
In many areas like the Isabela State University- Cabagan Campus, there are many problems
encountered when it comes to security. A lot of vehicles that enters and exits in one place to another
1
is one of the realistic circumstances. One of these problems is the difficulty of managing the entrance
and exits of the vehicles manually. Another problem in manual monitoring is that the assigned guard
cannot monitor every vehicle that are entering the area from time to time and maintaining the records
of vehicles are a complicated task in manual process. To resolve these problems, the proponents
which is believed to be useful in monitoring and checking of vehicles, both authorized and
unauthorized.
Statement of Objectives
The general objective of the study is to develop a RFID-Based Vehicle Monitoring at Isabela
a. A database for all registered vehicles using 13.56 MHz RFID module;
a. Functionality,
b. Usability, and
c. Reliability
2
Scope and Limitations
Generally, the device was installed at the Isabela State University- Cabagan Campus main
gate to improve the manual process of security checking and monitoring of vehicles and persons.
The proposed design project provided a database system for all registered vehicles, RFID and
Arduino based monitoring system with integrated barrier gate using servo motor as control
mechanism, a button as bypass for unregistered vehicles and a GSM module used for SMS
notification whenever the reader detects a RFID tag and when the button was used, an ultrasonic
sensor for vehicle detection and camera that captures vehicle images. The RFID reader operating
frequency is 13.56 MHz and can detect up to 4 cm. The SD Card capacity can store up to 2 GB of
The project does not count the number of vehicles and persons entering and leaving the
area and it will not require all vehicle owners to have an RFID tag. Thus, the project still requires a
human intervention.
This study also looked into the general perception of the respondents regarding the device
functionality, usability and reliability through the use of survey questionnaires. The designed
questionnaire consisted of statements that were patterned from the software quality criteria as
3
CHAPTER II
This chapter presents related literature and studies researches of recognized experts with
the use of internet, articles, journals, and books as reference for the development of the design
project, and both of which have significant bearing or relation to the vehicle monitoring and the
transportation management today and its impact. It also includes the gaps between the existing
With the growing and continuous improving state of technology today, it was not surprising
that everyone has been well exposed in some state of the art control system especially in securing
their properties. It rapidly changing the economy, the society, and the way people live, work, and
interact with each other. According to Deakin et al. (2001), transportation become the most
technology’s integrated part throughout the industry especially in investing security technologies
historically and over the years had passed, great improvements in the transportation systems are
being made and created with the help of numerous advances in the science and technology. Some
changes include smart card technologies to improve the feasibility and convenience of a variety of
pricing options for road use, parking, and transit fares. Monitoring and information systems that
enable travelers to time trips and select routes to avoid congestion, reducing it in the process. Over
the longer run, automation could make order of magnitude improvements in safety, capacity, and
convenience. The researchers concluded that having changes in transportation technologies have
Wilson (2009) supported Deakin and Kim’s statement and added that improving the
performance of computers and communications technologies are now starting to have a significant
impact on the urban public transport industry such as automatic data collection systems including
4
automatic vehicle location systems, automatic passenger counting systems, advanced passenger
information systems and electronic fare payment and ticketing systems are becoming pervasive in
large systems. Technology continues to improve across the board and offered opportunities to
develop and apply more ambitious models to assist in many facets of the performance of public
transport systems.
According to International Peace Institute (2016), new technology is and truly is driving rapid
global change in which changes created new opportunities for multilateral cooperation in the area of
sustainable development, relations between the state and the society, peace and conflict, global
governance and mostly on the international security. Security technologies had greatly affected the
lives of mankind with its continuous innovation as Deakin, Kim, and Wilson stated above.
Ramey (2012) concluded that technology has played a big role in the development of various
industries. The impacts of technology cannot be measured because it is still changing the way we
do everything.
In the recent years until now, new technologies have been applied to the transportation
management to diverse problems such as traffic, air pollution, fuel use, and accident risk. One of the
most useful and common security technologies today is the Radio Frequency Identification (RFID)
technology. According to BITP (n.d.), RFID is demonstrating huge versatility in terms of its ability to
enable solutions within applications in the transportation sector. One of the many applications is the
Vehicle identification used on entry to site, plus also confirmation of load. The use of RFID enables
businesses to manage their supply chains with unprecedented levels of automation and a vastly
5
to toll roads, and oyster cards, transport payments. This gives an insight into the breadth of
opportunities the technology offers in terms of delivering improvements within transport applications.
Further, Radio Frequency Identification (RFID) technology is one of the most useful
technology in terms of security technologies and is the only one of many technologies that is being
used in securing properties such as bar code, voice recognition, touch memory, smart cards, and
biometrics. According to Hamid (2006), RFID is one of the most rapidly growing segments of today’s
Automatic Identification Data Collection (AIDC) industry. It represents an improvement over bar
codes and can automatically identify target and obtain relevant data. Moreover, it is able to work
under harsh environment and reads from long distance. While MITIP (2006) stated that RFID is a
technology that gathers and capture data about a certain item without the need of touching or seeing
the data carrier, through the use of inductive coupling or electromagnetic waves. Borriello (2005)
supported MITIP’s statement by saying it is an emerging technology that uses wireless radio to
identify objects from a distance without requiring a line of sight or physical contact.
Want (2006) also agreed to Borriello (2005) that Radio Frequency Identification (RFID) is a
technology which does not require a line of sight and added that has moved from obscurity into
mainstream applications that help speed the handling of manufactured goods and materials. RFID
enables identification from a distance, and unlike earlier bar-code technology. One of the most
intriguing aspects of modern RFID tags is that they can convey information that extends beyond data
stored in an internal memory and include data that onboard sensors created dynamically. He
concluded that RFID’s potential benefits are large and can have many novel applications in the future
In the study of Floyd (2014), he concluded that RFID has found many applications within the
6
implementation of RFID technology across the board. Trucking and tolls have been the major
players in that story, and other industry are making inroads as well.
With the used of Servo motors, barrier gates are well known in terms of securing road gates.
In a study done by Theng (n.d.), Servo motors are best known for their rapid acceleration and
deceleration capability, made possible by delivering high-peak torque in conjunction with a high
torque-to-inertia ratio. Servo motors are famous for their high dynamic response and precision
accuracy in traditional motion control applications, such as machine tools and robotics. A complete
servomotor has incorporates a three wire DC motor, a gear train, a potentiometer, an integrated
circuit, and an output shaft bearing. Actually a servomotor has three wires that stick out from the
servomotor and connect to the outside word. One is for power, ground, and the white wire is the
control wire. Servo motors are commonly known in operating a barrier gate.
Another common device that are being used today which the researches adopted in the
study is the Genuino or known as Arduino Uno Microcontroller. According to Rozilan (2012), Arduino
is a tool for making computers that can sense and control more of the physical world than your
microcontroller board, and a development environment for writing software for the board. Arduino
projects can be stand-alone, or they can be communicate with software running on your computer
Lastly, communication means between human and devices was also renewed by the use of
GSM modem. SMS notification is being prone in our society today, especially in warning and
monitoring security systems. Haron et al. (n.d) defined that Global System for Mobile Communication
(GSM) modem as a wireless modem that works with GSM wireless network and the modem is
connected to a server so it could send SMS as an alert or warning to farmer. Alcantara, Lagula,
7
Latina and Te (2013) supported the statement of Haron et al. (n.d.) which said that GSM is a wireless
communication not only between people alone but people to devices also. This system poses a great
advantage and convenience to the public when it is interfaced with different sensors and functions
A lot of vehicle monitoring system are now available and sold in the market. Recently, Tseng
et al. (2007) proposed a Vehicle Management System based on UHF band RFID technology. This
system is applied for vehicle entering/leaving at road gates. It consists of tag-on-car, reader antenna,
reader controller, and the monitoring and commanding software. It could effectively control the
vehicles passing through road gate and record the vehicles' data such as the time in and out and the
tag number. The system could not only reduce the cost of security guards and payloads by the
decrement of manpower, but also promote the security and efficiency of the parking lot. And this has
been tested in many field tests and the results shown that it is suitable for vehicle management and
Yu et al. (2011) designed and implemented active RFID tag based system for automatically
identifying running vehicles on roads and collecting their data. The system used electronic tag and
reading base station is based on SCM C8051F920; it is a low-power high-speed general with a
24.5MHz oscillator, and a programmable flash memory. To solve identification uncertainty problems,
the two key techniques are: anti- interference protocol and data clearing algorithm are proposed. The
effectiveness and efficiency of the system is analyzed. The system have wide applications in traffic
IOT (Internet of Things) to support traffic monitoring, traffic flow statistics, traffic scheduling, and
Currently, Kiranmayi (2016) also proposed a Vehicle Monitoring System that uses RFID
which generated and maintained daily reports of monitoring vehicles and this can be done
8
automatically with the use of the device and the software. The author concluded that with RFID
vehicle monitoring system, vehicle information can be automatically gathered for efficient and safe
vehicle management. Automatic vehicle identification can increase the security and prevent loss of
vehicles. Overall this Vehicle monitoring system simplifies the task of managing vehicles by security
Cagayan State University. The system was based on Radio Frequency Identification (RFID)
technology and consists of a passive RFID tag. The passive micro transponder tag collects power
from the 125 KHz magnetic field generated by the base station, gathers information about the Tag
ID and sends this information to the base station. The base station receives, decodes and checks
the information available in its Database and Manchester code was used to send that information.
The system performed as desired with a 10cm diameter antenna attached to the transponder. The
Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag
ID is stored in its memory then the microcontroller allows the person inside.
Ezanee (2012) designed a RFID based Plate Recognition for registered Vehicle in University
Malaysia Pahang (UMP). It is a system for process of the check in and out of the main gate of UMP.
It is design for only registered vehicle in UMP to make sure UMP staffs & students to get more secure
and safety guarantees. The system identify registered vehicle in and out of the campus of UMP by
the recognition of the vehicle plate number. When the RFID reader recognized the tag of vehicle
plate number, it directly show the vehicle owner details as it is been transmitted in the system and
sensor-integrated RFID System. Sensor is one of the popular devices used in many applications
nowadays including the Intelligent Transportation System (ITS) which is widely utilized in the
9
Automatic Vehicle Identification (AVI) system. In this research, they propose an implementation of
detect poultry transport vehicle entering and leaving an animal checkpoint. In addition, an algorithm
to distinguish a poultry transport vehicle from a regular vehicle based on the vehicle’s length and
height is presented, sensor selection considerations for outdoor use is also included. The proposed
system is fully automatic, no checkpoint staff is required to control the RFID reader and signal the
vehicle movement and the overall power efficiency of the system is improved because the reader
Moreover, Kumar et al. (2013) also implemented a Vehicle theft alarm and tracking the
location using GPS and RFID. The System consists of a microcontroller circuit board, keypad, alarm
system and a display board with the combination of RFID and GSM. The microcontroller used is
ATMEGA 162v low-power CMOS 8-bit based on the AVR enhanced RISC architecture. A buzzer is
used to indicate the vehicle and give the alert to the authenticated user. And GSM is used for mobile
communication and also for the alert message. The researchers concluded that the key of the
automobile is an RFID card which is contactless, secure and convenient. The long-range monitor
and grading responses could be realized by the mobile phones of users, which made the alarm cover
a broad range.
Further, Hashim et al. (2013) designed and implemented a Vehicle Security System Using
Zigbee. The project is used to secure and monitor the car based on combination of Zigbee system,
Peripheral Interface Controller (PIC) 16F877A microcontroller, vibration sensor (body), temperature
sensor and micro switch (engine), alarm, buzzer, fan and magnetic sensor (door). There are two
programs used in this system for transmitting and the receiving. Proteus 7 Professional is being used
in the designed process of the circuit and simulation works. Meanwhile, PIC C Compiler software is
used to compile the C language code to Hexadecimal (HEX) code. Users are able to control the
10
system remotely and they can also monitor the car status by using the Liquid Crystal Display (LCD)
display which attached to the controller. The author concluded that this wireless monitoring system
have been successfully and the result is satisfactory. And this project can also be extended, not only
for car security purposes but also can be implemented as home security system.
Gavali et al. (2016) designed an embedded Vehicle Monitoring system based on Web
Technology. The system used level sensor, pressure sensor, tilt sensor, gas sensor, and alcohol
detector. By these sensors, the various parameters of the vehicle system such as Liquid Level, State
of Vehicle, Pollution by Vehicle, alcoholic taste of driver and so on are being checked. These sensors
provide the information to the Arduino (ATMEGA 328P-P0). In addition, Pentium 4 Processor is one
of the equipment used. And Web Technology is used to monitor the parameters. These materials is
used for inputs acquisition and storage. The author concluded that this project can be further
enhanced by the use of camera and by developing a mobile based application to get the real time
view of the vehicle instead to check it on PC, which would be more convenient for the user to track
the target.
monitoring system that uses wireless vision sensor network (camera) that captures and processes
the real-time video image to obtain the traffic flow rate and vehicle speeds along different urban
roadways. This system will display the traffic states on the front roadways that can guide the drivers
to select the right way and avoid potential traffic congestions. The real-time traffic data is processed
by the Personal Computer (PC) at the sub roadway station and the traffic flow rate data is transmitted
to the main roadway station Arduino 3G via email, where the data is extracted and traffic flow rate
displayed.
Lastly, Saddam et al. (n.d.) designed an Arduino based Vehicle Tracker using GPS and
GSM. In this project, Arduino is used for controlling the whole process with a GPS Receiver and
11
GSM module. The designers have used GPS Module SKG13BL and GSM Module SIM900A. GPS
Receiver is used for detecting coordinates of the vehicle, GSM module is used for sending the
coordinates to user by SMS. And an optional 16x2 LCD is also used for displaying status messages
or coordinates. Sent message is received by GSM module which is connected to the system and
sends message data to Arduino. Arduino reads it and extract main message from the whole
message. And then compare it with predefined message in Arduino. This Vehicle Tracking
System can also be used for Accident Detection Alert System, Soldier Tracking System and many
D. Research Gaps
With the emerging of transportation technologies today, a lot of changes have been made.
Most of the literature and studies have been found, the researches focused on the automation of
vehicle identification, monitoring of vehicle using integrated camera, and tracking using RFID and
GSM as one of their major component. With that, the researchers designed and implemented
technologies and systems that are applicable to Automatic Vehicle Identification (AVI), Intelligent
Transportation System (ITS), and Internet of Things (IOT) which brings great improvements in
solving transportation security problems. These literature and studies are also different in terms of
The literatures that have been found presents the idea of using RFID technology. It collects,
records, maintains, and saves data detected from the vehicles running on road, passing through
road gates, monitoring vehicle status, and entering/leaving an area using RFID Tags as well as
gathering and sending Tag ID information into a base station in which the researchers would want
to incorporate and adapt in the proposed design project. On the other hand, it was identified that the
cited works possesses the weaknesses that it cannot able to detect if the owner is the driver of his
own vehicle or driven by the other, the identification card can be swapped with another person’s ID
12
or forgot and lost by the vehicle owner making it still possible for an unauthorized person used it and
can now enter the area which lead to another problem. Some of the implemented projects have used
sensor-integrated RFID system, Arduino Microcontroller, an alarm system, an integrated camera and
a combination of RFID and GSM to notify the vehicle’s owner in some instances encountered. These
provides brief detailed references on the functionality of each device, mainly the microcontroller
used. Thereby, the proponents adapted the combination of RFID and GSM as well as the camera
and incorporate a barrier gate system using servo motor in order to secure the implementation scope
of the study.
Moreover, the proponents adapted one of the cited literature that uses RFID technology for
registered vehicles. However, the observed weakness of this study is it detects only those registered
plate numbers of the vehicles and it cannot able to detect those unregistered vehicles. With RFID-
Based Vehicle Monitoring, both registered and unregistered vehicles can be detected, monitor and
enter the area from time to time through the use of RFID reader for tag detection and controller of
servo motor, GSM module that sends SMS notification to the database, a servo motor as control
mechanism of the barrier gate, combination of ultrasonic sensor and camera module for vehicle
detection and capturing vehicle images, and a button as bypass for those unregistered vehicles.
13
CHAPTER III
RESEARCH METHODOLOGY
This chapter discusses the population and locale of the study, the data gathering instruments
and procedures that will be used, the data analysis and statistical tools and the design procedures
The respondents of the study were the 26 vehicle owners. Convenience Sampling
Technique was used for the selection of the respondents as part of the implementation and testing
period of the study. The study was conducted at Isabela State University – Cabagan Campus.
The proponents first conducted an observation on the main entrance of the Isabela State
University- Cabagan Campus. Through this technique, useful facts and information were collected
by the proponents for the design, development, and testing of the design project. After the
observation method, the proponents’ next step was to gather information and useful facts about the
proposed design project. The researchers used the library and internet research as well as the
Through these methods, several articles in journals, published and unpublished thesis and
Lastly, the proponents also used the Survey Method to have a complete view of the
performance of the design project. A questionnaire was used to gather data about the perception of
the respondents regarding the functionality, usability, and reliability of the design project.
14
Data Analysis and Statistical Tools
The data gathered from the questionnaires were tallied, tabulated and analyzed using
weighted mean.
Table 1 shows the five-point Likert scale that was used, their corresponding numerical value
Design Procedures
designed for the Isabela State University – Cabagan Campus. This part describes the step-by-step
procedure in developing the proposed design project. It served as the guide throughout the
At first, the researchers thought of a technology that could solve the problem in managing
and monitoring the vehicles that are to enter and leave an area and to expand the latest existing
vehicle monitoring technology. The researchers came with the analysis stage, which led to the
thought of making a new Vehicle Monitoring technology that uses RFID. In general, the design project
is all about the “RFID-Based Vehicle Monitoring”. The researchers believed in the idea that a project
15
like this mitigates illegal activities, minimizes the loss of vehicles and make the monitoring easier and
more convenient.
The researchers gathered data about “RFID-Based Vehicle Monitoring” through books,
articles, online references, and from the previous design projects related to the study published and
unpublished.
After the conceptualization process, the proponents started designing the proposed project.
Initial data gathered were supplemented by collecting reliable information such as the appropriate
hardware and software to be used in the design project; ideas and information of what components
to be used emerges. This phase focused on the technical aspect of the design project.
On this stage, the researchers arrived first with the flow chart in order to understand the
process of the design project very well and then the block diagram of the project. These two serves
as a blueprint guide to determine the flow of information from one device to another. With the concept
transformed into a block diagram, the proponents started working out on combining, filtering, and
simulating the different circuit diagrams collected in the previous phase using electronics software
for the simulation. It is on this stage that the appropriate hardware and software to be used are
Using the hardware and software prepared in the previous phase, the project constructed
was accordingly, implementing both hardware and software aspect of the RFID technology; the
ultrasonic sensor as well as the alarm system and programming and coding the Arduino Uno
Microcontroller to be used in controlling each device. This phase focused on the testing of the
prototype. It involves making the design project works properly and involves troubleshooting if
16
problems occur. In testing, connect each device and plug the supply needed and turn on the device.
The entire device was carefully tested for possible errors in the operation to make sure that the
designed project is working properly according to its desired output before it will present to the user.
After testing, the project undertakes final implementation on the actual site for evaluation in order to
After the implementation and testing period, the proponents conducted the survey method
in which the researchers need to distribute questionnaires to the respondents for the evaluation
purposes. The questionnaires were used to determine the functionality, usability, and reliability of the
design project and recommendations/suggestions of the respondents for the improvement of the
monitoring system.
17
CHAPTER IV
This chapter presents the project design, project development and project evaluation of the
Project Design
The flowchart of the RFID-Based Vehicle Monitoring in Figure 1 shows the step by step
process of how the design project operates. It has two major inputs which are the RFID reader that
detects a tag from the vehicle owner and an ultrasonic sensor that detects the vehicle. If the driver
is registered, the green LED, GSM, Buzzer, and camera activates simultaneously and the barrier
gate will open at the same time. On the other hand, if the driver is not registered, the camera still
captures the vehicle image but the barrier gate remains close. If the unregistered vehicle want to
enter the area, the assigned personnel can use the button as bypass. As bypass is in used, the red
LED, buzzer, and GSM activates. The GSM module will send a SMS notification to the database for
record purposes.
18
19
The block diagram A in Figure 2 shows the process of the RFID-Based Vehicle Monitoring.
An RFID card tag is issued to every registered vehicle owner with same unique numbers. When this
card is placed in front of the RFID Reader, the Arduino board will analyze the information of the tag.
When the tag is registered, the green LED activates and the barrier gate will open through the use
of a servo motor and will send a SMS notification through the GSM Module with the exact name of
the vehicle owner and the exact time that will directly store in the database through a FrontlineSMS
software. On the other hand, when there is no tag detected from the vehicle’s owner, the assigned
guard will press the button or will place a card in front of the reader as a bypass and then activates
the red LED and the barrier gate will open so that vehicle can now enter the area and will send a
SMS notification that an unregistered vehicle entered the area and will store in the database for
security purposes.
20
Additionally, the block diagram B in Figure 3 shows that camera activates using the
ultrasonic sensor that detects a vehicle automatically and then captures the image of the vehicle
detected by the sensor and will directly store in a Micro SD Card for future purposes. Real Time
Clock (RTC) was used for setting the camera time. Furthermore, the buzzer beeps whenever a card
is placed in front of the RFID reader in order to inform the assigned guard and increase the security
21
The wiring diagram A of RFID-Based Vehicle Monitoring in Figure 4 acts as a guide in
connecting each of the components for the design project. The main device used in the design project
is the Arduino Uno microcontroller that serves as the brain and heart of all components connected,
while RFID reader serve as a signal light that activates each components such as the GSM module
that sends notification to the database, servo motor that controls the barrier gate, buzzer, and LEDs.
The button activates only when an unregistered vehicle tries to enter the area in which the assigned
personnel will operate it. All sensors and modules are connected in the microcontroller in order to
22
The wiring diagram B of RFID-Based Vehicle Monitoring in Figure 5 acts as a guide in
connecting the components of the design project. The main device used in the design project is the
Arduino Uno microcontroller that serves as the brain and heart of all components connected. The
ultrasonic sensor and the camera module serves as the “eyes” of the entire design project. These
two components will communicate their data to the Arduino Uno in which the microcontroller process
the information in order to achieve the final output which are the captured images of the vehicles that
23
Project Development
The Registered Vehicles Windows for the faculty and students in Figure 6 consists of tool
strip that contains the GSM database, logout button, and exit button, records of the registered vehicle
for students and faculty which can be modified through adding, editing, and deleting records.
Figure 7 shows the developed database for all registered vehicles using 13.56 MHz RFID
module. The RFID reader activates when a tag is placed in front of it. Along with, the GSM module
sends SMS notification (vehicle owner name and time) to the database for record purpose.
24
Figure 8 presents the developed database which stores SMS notifications using SIM900A
GSM module for history purpose. The GSM module activates only when the RFID reader detects a
Figure 9 shows the integrated barrier gate which will open only when an RFID card is placed
in front of the reader or the assigned personnel presses the button controlled by a Tower Pro
25
Figure 10 shows the integrated HC-SR04 ultrasonic sensor that detects those vehicles
Figure 11 shows the integrated Arduino camera module that captures vehicle images once
26
Figure 12 shows the final design output of the “RFID-Based Vehicle Monitoring”. It also
shows the labeled location of every component integrate inside of the design project. The device will
work once it is turned on with the exact supply needed. Every labeled components has its own
functions. The design project’s main body is a large casing which is made of plywood for the
protection of the integrated components, because if it is aluminum it will easily absorb heat and it
can affect the performance of the prototype and it may destroy the integrated components inside it.
The casing comes with a barrier gate controlled by a servo motor, a button, and a camera connected
to the entire system. Inside the casing are the materials used such the RFID reader, ultrasonic
sensor, LEDs, buzzer, GSM module, real time clock module, Micro SD Card module, Arduino
27
Project Evaluation
Table 2 shows the mean perception of the vehicle owners on the functionality of the RFID-
Based Vehicle Monitoring. The result reveals that majority of the vehicle owners strongly agree on
the specified functionalities of the design project with an overall weighted mean of 4.67.
28
Table 3 shows the mean perception of the vehicle owners regarding the usability of the
RFID-Based Vehicle Monitoring. Result reveals an overall weighted mean of 4.75 which implies that
Table 4 presents the mean perception of the vehicle owners on the reliability of the RFID-
Based Vehicle Monitoring. The overall weighted mean of 4.65 indicates that the respondents strongly
29
CHAPTER V
evaluation conducted, result and observation on the RFID-Based Vehicle Monitoring. Furthermore,
recommendations were specify based from the findings and conclusion of the study for future
Conclusions
Based from the result of the study, the following conclusions were drawn:
1. The developed RFID-Based Vehicle Monitoring was successfully implemented by providing
a database for all registered vehicle owners using a 13.56 MHz RFID module, SMS
notification using SIM900A GSM module, integrated barrier gate using Tower Pro MG966R
servo motor, integrated HC-SR04 ultrasonic sensor, and integrated camera module.
reliable.
Recommendations
In the light of the findings of the study, the following recommendations are drawn for future
1. The design project should add new features including additional RFID Reader for the exit
2. The design project should use bigger display to completely view the information of the
3. The design project should use high end database that can directly store data and images.
4. Future researchers may include a vehicle counting system for more convenient vehicle
monitoring system.
30
REFERENCES
Eno Center for Transportation and ICF International (2016) Emerging Technology trends in
Transportation, Retrieved from (https://www.enotrans.org/wp-
content/uploads/EmergingTech.v13.pdf)
Gavali, K. et al. (2016) Research and Design of Embedded Vehicle Monitoring System Based on
Web Technology, Retrieved from (http://www.ijmter.com/papers/volume-3/issue-
7/research-and-design-of-embedded-vehicle-monitoring-system-based-on-web-
technology.pdf)
Hamid, H. (2006) RFID Based Design for Vehicle Location System, Retrieved from
(https://www.scribd.com/doc/83404754/RFID-Based-Design-for-Vehicle-Location-System)
Hashim, N. et al. (2013) Vehicle Security System Using Zigbee, Retrieved from
(http://www.ijsrp.org/research-paper-0913/ijsrp-p2144.pdf)
Kumar, C. et al. (2013) Vehicle Theft Alarm and Tracking the Location Using RFID & GPS,
Retrieved from (http://www.ijetae.com/files/Volume3Issue12/IJETAE_1213_94.pdf)
Kumar, S. et al. (2012) Traffic Monitoring Using M2M Communication, Retrieved from
(https://arxiv.org/ftp/arxiv/papers/1404/1404.0106.pdf)
MITIP (2006). The RFID Technology and Its Current Applications, Retrieved from
(http://www.ropardo.ro/fileadmin/prezentari_pdf/RFID_MITIP2006.pdf)
Tseng, Wang and Ko (2007) Vehicle Management System based on UHF band RFID Technology,
Retrieved from (http://ieeexplore.ieee.org/document/4244854/?tp=&arnumber=4244854)
Yu, M. et al. (2011) An RFID Electronic Tag based Automatic Vehicle Identification System for
Traffic IOT Applications, Retrieved from (http://ieeexplore.ieee.org/document/5968962/)
Zhang, Cheng and M. Yu (2011) An RFID Electronic Tag based Automatic Vehicle Identification
System for Traffic IOT Applications, Retrieved from
(http://ieeexplore.ieee.org/document/5968962/)
32