Sie sind auf Seite 1von 27

MODULE 1 INTROCTION

Electronic toll collection (ETC), an adaptation of military "identification friend or foe" technology, aims to eliminate the delay on toll roads by collecting tolls electronically. It is thus a technological implementation of a road pricing concept. It determines whether the cars passing are enrolled in the program, alerts enforcers for those that are not, and electronically debits the accounts of registered car owners without requiring them to stop. RFID Toll Road Payment systems have really helped a lot in reducing the heavy congestion caused in the metropolitan cities of today. It is one of the easiest methods used to organize the heavy flow of traffic. When the car moves through the toll gate on any road, it is indicated on the RFID reader that it has crossed the clearing. The need for manual toll based systems is completely reduced in this methods and the tolling system works through RFID. The system thus installed is quite expedient reducing the time and cost of travelers since the tag can be deciphered from a distance. Toll collection and electronic vehicle registration (EVR) are two relatively established segments within the RFID industry. Toll tags have long used active RFID technology for fast and reliable recognition of vehicles that drive at high speeds through reading gates. What has changed more recently is the fact that passive UHF technologies can accomplish the same objectives at a much lower cost. A second development is that we are witnessing a desire to integrate tolling applications with EVR thus allowing for a more efficient handling of vehicle checks whether it is to detect crimes such as car theft or simply to validate information about a vehicle or its owner. One of the key challenges in passive UHF tolling and EVR applications is that data stored on tags needs to be secured. At the same time, read and write speeds cannot be compromised in the sense that drivers will not slow down for a read point. Depending on the country, speeds can reach more than 100 mph. Given that the field of vision for a passive UHF antenna is limited, the solution requires a highly efficient tag design that includes security features such as encryption, mutual authentication and possibly cloaking. These objectives usually stand in contrast to performance objectives. At Revere Security, we have tested and validated that the Hummingbird algorithm not only fits comfortably onto a passive UHF toll tag, but also allows for reliable tag read and write operations.

The security within RFID-enabled tolling and EVR systems is not just limited to privacy concerns which are typically addressed by data encryption. Rather the authentication of RFID tags on vehicles as they pass through toll lanes is a key requirement that enables electronic payments for the toll road operator. The Hummingbird HB-2 cryptographic suite provides these capabilities and also includes an innovative, yet practical approach to key management. For example, it should be possible to use toll tags across a wide domain of tolling systems. This is not a reality today because any given system cannot authenticate foreign toll tags. The video below illustrates how this specific challenge can be addressed. The people traveling through this transport medium do not need anything else to get on a highway; instead the RFID tag carried by their vehicle does everything. A commuter traveling through this medium gets to know how much amount has been paid and how much money is left in the tag. It does not require the person to carry cash with him to pay the toll tax all the time. The long queue waiting for their turn is reduced, which in-turn reduces the consumption of fuel. The RFID toll payment systems are really used in preventing trespassing on borders. The software solution developed can ensure a smooth running of vehicles without any need for further development. The software controlling these RFID tags and readers is easy to implement. Here Basic idea is to develop the automatic challan system that can check for signal break by any vehicle. The RFID Reader reads the information like vehicles no. and automatically sends a report to the owner of vehicles and simultaneously information is given on the site itself through LCD. RFID Radio frequency identification, or RFID, is a generic term for technologies that use radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to an antenna (the chip and the antenna together are called an RFID transponder or an RFID tag). The antenna enables the chip to transmit the identification information to a reader. The reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to computers that can make use of it. The radio frequency part of RFID is the communication medium between tags and readers. With passive RFID tags, radio frequency is also used to deliver power to the tag, as they do not have on-board power systems.

RFID systems are designed to be asymmetric: readers are expensive and power hungry, whilst tags are cheap and require comparatively low levels of energy. In addition, there are three key elements that need to be borne in mind in any discussion of RFID systems: energy source (which determines if a tag is passive or active), frequency and memory. RFID tags come in a variety of different types according to their functionality, and these types have been defined in an RFID Class Structure by the Auto-ID Center (and later through EPC Global) (Engels and Sarma, 2005), which has been subsequently refined and built on. Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID reader and an RFID tag. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. Electronically programmed with unique information. There are many different types of RFID systems out in the market. They are categorized according to their frequency ranges. Some of the most commonly used RFID kits are as follows: 1) Low-frequency (30 KHz to 500 KHz) 2) Mid-Frequency (900 KHz to 1500MHz) 3) High Frequency (2.4GHz to 2.5GHz) These frequency ranges mostly tell the RF ranges of the tags from low frequency tag ranging from 3m to 5m, mid-frequency ranging from 5m to 17m and high frequency ranging from 5ft to 90ft. The cost of the system is based according to their ranges with low-frequency system ranging from a few hundred dollars to a high-frequency system ranging somewhere near 5000 dollars.

MODULE 2 SYSTEM REQUIREMENT-HARDWARE


A basic RFID system consists of three components: ANTENNA The antenna emits radio signals to activate the tag and read and write data to it. Antennas are the conduits between the tag and the transceiver, which controls the system's data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built into a door frame to receive tag data from persons or things passing through the door, or mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually. If constant interrogation is not required, a sensor device can activate the field. Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a. interrogator), which can be configured either as a handheld or a fixedmount device. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the readers activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing. TAGS (Transponders) An RFID tag is comprised of a microchip containing identifying information and an antenna that transmits this data wirelessly to a reader. At its most basic, the chip will contain a serialized identifier, or license plate number, that uniquely identifies that item, similar to the way many bar codes are used today. A key difference, however is that RFID tags have a higher data capacity than their bar code counterparts. This increases the options for the type of information that can be encoded on the tag, including the manufacturer, batch or lot number, weight, ownership, destination and history (such as the temperature range to which an item has been exposed). In fact, an unlimited list of other types of information can be stored on RFID tags, depending on application needs. An RFID tag can be placed on individual items, cases or pallets for identification purposes, as well as An antenna or coil A transceiver (with decoder) A transponder (RF tag) electronically programmed with unique information

on fixed assets such as trailers, containers, totes, etc. There are three options in terms of how data can be encoded on tags: (1) Read-only tags contain data such as a serialized tracking number, which is prewritten onto them by the tag manufacturer or distributor. These are generally the least expensive tags because they cannot have any additional information included as they move throughout the supply chain. Any updates to that information would have to be maintained in the application software that tracks SKU movement and activity. (2) "Write once" tags enable a user to write data to the tag one time in production or distribution processes. Again, this may include a serial number, but perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new data to be written to the tag as neededand even written over the original data. Examples for the latter capability might include the time and date of ownership transfer or updating the repair history of a fixed asset. While these are the most costly of the three tag types and are not practical for tracking inexpensive items, future standards for electronic product codes (EPC) appear to be headed in this direction.

RFID TAGS DATA CAPACITY The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as much as several thousand bits on the high end. Of course, the greater the storage capacity, the higher the price per tag. FORM FACTOR The tag and antenna structure can come in a variety of physical form factors and can either be self-contained or embedded as part of a traditional label structure (i.e., the tag is inside what looks like a regular bar code labelthis is termed a 'Smart Label') companies must choose the appropriate form factors for the tag very carefully and should expect to use multiple form factors to suit the tagging needs of different

physical products and units of measure. For example, a pallet may have an RFID tag fitted only to an area of protected placement on the pallet itself. On the other hand, cartons on the pallet have RFID tags inside bar code labels that also provide operators human-readable information and a back-up should the tag fail or pass through non RFID-capable supply chain links. PASSIVE VERSUS ACTIVE Passive tags have no battery and "broadcast" their data only when energized by a reader. That means they must be actively polled to send information. "Active" tags are capable of broadcasting their data using their own battery power. In general, this means that the read ranges are much greater for active tags than they are for passive tags perhaps a read range of 100 feet or more, versus 15 feet or less for most passive tags. The extra capability and read ranges of active tags, however, come with a cost; they are several times more expensive than passive tags. Today, active tags are much more likely to be used for high-value items or fixed assets such as trailers, where the cost is minimal compared to item value, and very long read ranges are required. Most traditional supply chain applications, such as the RFID-based tracking and compliance programs emerging in the consumer goods retail chain, will use the less expensive passive tags. FREQUENCIES Like all wireless communications, there are a variety of frequencies or spectra through which RFID tags can communicate with readers. Again, there are trade-offs among cost, performance and application requirements. For instance, low-frequency tags are cheaper than ultra high-frequency (UHF) tags, use less power and are better able to penetrate non- metallic substances. They are ideal for scanning objects with high water content, such as fruit, at close range. UHF frequencies typically offer better range and can transfer data faster. But they use more power and are less likely to pass through some materials. UHF tags are typically best suited for use with or near wood, paper, cardboard or clothing products. Compared to lowfrequency tags, UHF tags might be better for scanning boxes of goods as they pass through a bay door into a warehouse. While the tag requirements for compliance mandates may be narrowly defined, it is likely that a variety of tag types will be required to solve specific operational issues. You will want company that is very knowledgeable in tag and to work with technology a to reader

appropriately identify the right mix of RFID technology for your environment and applications.

EPC Tags EPC refers to "electronic product code," an emerging specification for RFID tags, readers and business applications first developed at the Auto-ID Center at the Massachusetts Institute of Technology. This organization has provided significant intellectual leadership toward the use and application of RFID technology. EPC represents a specific approach to item identification, including an emerging standard for the tags themselves, including both the data content of the tag and open wireless communication protocols. In a sense, the EPC movement is combining the data standards embodied in certain bar code specifications, such as the UPC or UCC-128 bar code standards, with the wireless data communication standards that have been developed by ANSI and other groups. RF TRANSCEIVER The RF transceiver is the source of the RF energy used to activate and power the passive RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it may be a separate piece of equipment. When provided as a separate piece of equipment, the transceiver is commonly referred to as an RF module. The RF transceiver controls and modulates the radio frequencies that the antenna transmits and receives. The transceiver filters and amplifies the backscatter signal from a passive RFID tag. TYPICAL APPLICATIONS FOR RFID Automatic Vehicle identification Inventory Management

Work-in-Process Container/ Yard Management Document/ Jewellery tracking Patient Monitoring

Toll Tax Collection System Name Regulator Regulator Capacitor Capacitor Ceramic Capacitor Capacity 7805 7812 1000 f 10 f 22pf Quantity 1 1 1 1 2 Code U1 U3 C1 C2 C3,C4

Diode Push Button RFID READER RFID Cards LCD 40 Pin Base 16 Pin Base DC Motor 8051(AT89S52) L293D Oscillator LED Resistance Resistance Resistance Buzzer BC547 220 1k 10k 11.0592mhz 100 rpm 16*2

4 1 1 2 1 1 1 1 1 1 1 2 3 1 2 1 1

D2,D2,D3,D4

U2 U4

X1 D5,D6 R1,R4,R6 R3 R2,R5 BUZ1 Q1

POWER SUPPLY: Power supply is a reference to a source of electrical power. A device or system that supplies electrical or other types of energy to an output load or group of loads is called a power supply unit or PSU. The term is most commonly applied to electrical energy supplies, less often to mechanical ones, and rarely to others. Here in our application we need a and filter 5v DC power supply for all electronics

involved in the project. This requires step down transformer, rectifier, voltage regulator,

MODULE 3 SYSTEM REQUIREMENT- SOFTWARE RFID Software


Tuppas' RFID Solution RFID, or radio frequency identification, is rapidly becoming a stable, proven technology that has quantifiable return on investment and can deliver unique visibility into the supply chain. RFID uses low-powered radio transmitters to read data stored in tags that are embedded with tiny chips and antennas. These "smart" tags can store more detailed information than conventional bar codes, enabling retailers and manufacturers to track items at the unit level, as well as identify, locate, monitor, and even manage products on the plant floor using RFID labels.

Tuppas RFID Software Application Features Tuppas RFID software is designed to handle and store RFID tag data as well as integrate the RFID data with existing back-end business software and other systems.

Our RFID software is designed for your application specific needs, and we can add new functionality as your needs and business practices evolve. Call to talk with us about your ideas regarding RFID and how we can help you revolutionize your operation.

Our RFID System Benefits Benefits: Provides real time data throughout supply chain, and increased visibility into supply chain handle it -of-sight reading -time decision support and automates and speeds processes Why choose Tuppas? Our modules offer flexibility to grow as your business changes. A few reasons to choose our configurable systems include: Pricing. Tuppas has developed a unique framework which helps to keep the development cycle short and module pricing at a minimum. SaaS. Software as a Service virtually eliminates risks and large expenses associated with a system purchase. Tailored. Each module is designed to meet the specific requirements of each client. Browser Based. Internet access is instantly available from any secure browser. Wireless. Access your software system instantly with Pocket Pcs, PDAs, smart phones and more.

10

RFID Software Benefits Reduced IT software support requirement Reduced hardware and servers Intuitive, configurable system interfaces Reduction in software training Customizable open source code Cost of future innovation is dramatically decreased Ability to respond to new opportunities increases

A Configurable System Each of the customizable ERP software programs we offer can integrate with your existing system and be tailored to your specifications. We can do this for you or your IT personnel can make the modifications.

11

MODULE 4 TECHNOLOGY DESIGN


COMPONENTS REQUIRED RFID tag (with unique ID number). RFID reader (for reading the RFID tag). icrocontroller. LCD Stepper Motor Stepper Motor Driver Power supply Key Pad Memory

RFID TAG Is a microchip combined with an antenna in a compact package; the packaging is structured to allow the RFID tag to be attached to an object to be tracked. "RFID" stands for Radio Frequency Identification. The tag's antenna picks up signals from an RFID reader or scanner and then returns the signal, usually with some additional data (like a unique serial number or other customized information). RFID tags can be very small - the size of a large rice grain. Others may be the size of a small paperback book.

12

RFID reader Is a device that is used to interrogate an RFID tag. The reader has an antenna that emits radio waves; the tag responds by sending back its data. Microcontroller The microcontroller is the heart of this project. The

Microcontroller controls all the hardware components. This project uses an 8-bit micro controller. Almost all mid-range family PIC Micro Controllers will be suitable for this project. LCD Here we are using a 16 x 2 character LCD to displaying Highway user information's, settings & instructions to the user. Stepper Motor A stepper motor is a brush less, synchronous electric motor that can divide a full rotation into a large number of steps. The motor's position can be controlled precisely. Here stepper motor is used for operating gate. Power supply The power supply module will provide the necessary power to work all the modules. Here we are using +5v dc regulate power supply Memory The memory module is used to store the database, i.e. RFID's. Codes.

13

MODULE 5 SUPPLY NEED OF TECHNOLOGY


VENDORS: Reverve Security: Revere Security was established in 2005 through a grant from the Department of Homeland Security. Initially DHS had tried to apply traditional cryptography, in this case AES-128, to an industrial control system. As a result the system did not function as designed simply because of an end-of-command silence that necessitated a reasonably fast response from the device. The founding team at Revere took up the challenge and developed what is since evolved into the Hummingbird HB-2 cipher. The cryptographic algorithms developed by Revere Security are one-of-a-kind. They allows users, for the first time, to install highly efficient, industrial-strength encryption and mutual authentication onto microchips within small devices while minimally affecting performance. Simply put, Revere Security's breakthrough technology secures a wide variety of resource-constrained devices while minimally impacting their normal operation: Battery life is minimally affected. Computational speed is minimally diminished. Memory space is minimally impacted. Based on these unique, innovative capabilities, Revere Security has created a cryptographic suite of products that is specifically designed for edge devices. Our ciphers, Hummingbird HB-2 and Passerine, are complemented by innovative key management capabilities, highly secure key handling and an incredibly fast key lookup database. The technologies at the heart of our cryptographic suite have been tested and validated through thousands of hours of cryptanalysis performed by Information Security Systems Inc. (ISSI) and various Universities.
In some urban settings, automated gates are in use in electronic-toll lanes, with 5 mph (8 km/h) legal limits on speed (and 2 to 3 times that as practical limits even with practice and extreme concentration) in other settings, 20 mph (35 km/h) legal limits are not uncommon. However, in other areas such as the Garden State Parkway in New Jersey, and at various locations in California, Florida, Pennsylvania, Delaware, and Texas, cars can travel through electronic lanes at full speed. Illinois' Open Road Tolling program features 274 contiguous miles

14

of barrier-free roadways, where I-PASS or E-ZPass users continue to travel at highway speeds through toll plazas, while cash payers pull off the main roadway to pay at tollbooths. Currently over 80% of Illinois' 1.4 million daily drivers use an I-PASS. Enforcement is accomplished by a combination of a camera which takes a picture of the car and a radio frequency keyed computer which searches for a drivers window/bumper mounted transponder to verify and collect payment. The system sends a notice and fine to cars that pass through without having an active account or paying a toll. Factors hindering full-speed electronic collection include significant non-participation, entailing lines in manual lanes and disorderly traffic patterns as the electronic- and manualcollection cars "sort themselves out" into their respective lanes; problems with pursuing toll evaders; need, in at least some current (barrier) systems, to confine vehicles in lanes, while interacting with the collection devices, and the dangers of high-speed collisions with the confinement structures; vehicle hazards to toll employees present in some electronic-collection areas; the fact that in some areas at some times, long lines form even to pass through the electronic-collection lanes; and costs and other issues raised when retrofitting existing toll collection facilities. Unionized toll collectors can also be problematic. [3] Even if line lengths are the same in electronic lanes as in manual ones, electronic tolls save registered cars time: eliminating the stop at a window or toll machine, between successive cars passing the collection machine, means a fixed-length stretch of their journey past it is traveled at a higher average speed, and in a lower time. This is at least a psychological improvement, even if the length of the lines in automated lanes is sufficient to make the nostop-to-pay savings insignificant compared to time still lost due waiting in line to pass the toll gate. Toll plazas are typically wider than the rest of the highway; reducing the need for them makes it possible to fit toll roads into tight corridors. Despite these limitations, however, it is important to recognize that throughput increases if delay at the toll gate is reduced (i.e., if the tollbooth can serve more vehicles per hour). The greater the throughput of any toll lane, the fewer lanes required, so expensive construction can be deferred. Specifically, the toll-collecting authorities have incentives to resist pressure to limit the fraction of electronic lanes in order to limit the length of manual-lane lines. In the short term, the greater the fraction of automated lanes, the lower the cost of operation (once the capital costs of automating are amortized). In the long term, the greater the relative advantage that registering and turning one's vehicle into an electronic-toll one provides, the faster cars will be converted from manual-toll use to electronic-toll use, and therefore the fewer manual-toll cars will drag down average speed and thus capacity. In some countries, some toll agencies that use similar technology have set up (or are setting up) reciprocity arrangements, which permit one to drive a vehicle on another operator's tolled road

15

with the tolls incurred charged to the driver's toll-payment account with their home operator. An example is the United States E-ZPass tag, which is accepted on toll roads, bridges and tunnels in fourteen states from Illinoisto Maine. In Australia, the e-TAG device is accepted at all tolled motorways. A toll is debited to the customer's account with their tag provider. Some Cove toll road operators including M7, Sydney's Sydney Harbour Tunnel, Lane Tunnel, and Westlink

Melbourne's CityLink and Eastlink, and Brisbane's Gateway Motorway encourage use of such tags, and apply an additional vehicle matching fee to vehicles without a tag. A similar device in France, called Liber-T for light vehicles and TIS-PL for HGVs, is accepted on all toll roads in the country. In Brazil, Sem Parar/Via-Fcil allows customers to utilize in more than 1,000 lanes in the states of So Paulo, Parana, Rio Grande do Sul, Santa Catarina, Bahia and Rio de Janeiro. Sem Parar/Via-Fcil also allows users to enter and exit more than 100 parking lots. There is also other systems such as via expressa, onda livre,auto expresso that is present in the states of Rio de Janeiro, Rio Grande do Sul, Santa Catarina, Parana and Minas Gerais. In Pakistan, the National Database and Registration Authority is implementing an electronic toll collection system on motorways using RFID. The European Union has created the EFC-directive,[4] which attempts to standardize European toll collection systems. Systems deployed after 1 January 2007 must support at least one of the following technologies: satellite positioning, mobile communications using the GSMGPRS standard or 5.8 GHz microwave technology. All toll roads in Ireland must support the eToll tag standard.

16

MODULE 6 PRODUCT DEVELOPMENT USING TECHNOLOGY MAIN CIRCUIT BOARD

Circuit Diagram of RFID Based Highway Toll Collection This is the diagram showing the main board which is having PIC and LCD interfacing. First of all the voltage from the main supply is step down using step down transformer and it is further step down to 12 v and it is given to the bridge rectifier and by using voltage regulator and capacitors it is providing 5 v constant supply to the micro controller. Power led is used to show the current indication in the board. The reset switch is connected in the first pin. then the crystal oscillator is connected in the 13 and 14 th pin. The LCD is connected to the port D by using a 10 pin connector. The 10th pin of the connector is connected to the vcc and ground. and

th 9

17

LCD DISPLAY

Circuit Diagram of LCD Display This diagram shows the detailed connection of LCD to the port D of the micro controller. The LCD is having 32 bit character in 2 line, so that it will show the details having 32 bits in 2 lines. The 4th pin is not connected to any where of the LCD port. PHYSICAL DATA Item Nominal Dimensions / Available Options Unit Number of Characters: 16 characters x 2 line - Character Format: 5 x 7 dots with cursor Overall Module Size (W x H x D) : 84.0 x 44.0 x max 14.5 for LED backlight version : 84.0 x 44.0 x max 9.5 for reflective or EL backlight version mm Dot Size (W x H) : 0.55 x 0.65 mm Dot Pitch (W x H): 0.60 x 0.70 mm Duty : 1/16 Controller: IC KS0066 LC Fluid Options: STN

18

Polarizer Options : Reflective, Transflective, Transmissive Backlight Options : EL, LED Temperature Range Options: Standard, Wide temp ABSOLUTE MAXIMUM RATINGS Item Symbol Min Typ Max Unit Operating temperature (Standard) : Top 0 - 50 C Storage temperature (Standard): Tst -20 - 70 C Operating temperature (Wide temp) : Top -20 - +70 C Storage temperature (Wide temp): Tst -30 - +80 C Input voltage : VI VSS - VDD V Supply voltage for logic : VDD-VSS 0 5.0 6.5 V Supply voltage for LCD drive (Standard) : VDD-VO 0 - 6.5 V Supply voltage for LCD drive (Wide temp) : VDD-VO 0 - 13.5 V OPTICAL CHARACTERISTICS (Ta = 25C, VDD = 5.0V 0.25V, STN LC Fluid) Item Symbol Condition Min Typ Max Unit Viewing angle (horizontal): q Cr 2.0 30 - 45 deg Viewing angle (vertical): f Cr 2.0 60 - 80 deg Contrast Ratio: Cr f=0, q=0 4.5 - 10 Response time (rise): Tr f=0, q=0 - 120 240 ms Response time (fall) : Tf f=0, q=0 - 155 310 ms STEPPER MOTOR A stepper motor is an electromechanical device which converts electrical pulses into discrete mechanical movements. The shaft or spindle of a stepper motor rotates indiscrete step increments when electrical command pulses are applied to it in the proper sequence. The motors rotation has several direct relationships to these applied input pulses. The sequence of the applied pulses is directly related to the direction of motor shafts rotation. The speed of the motor shafts rotation is directly related to the frequency of the input pulses and the length of rotation is directly related to the number of input pulses applied. Stepper Motor Advantages and Disadvantages Advantages The rotation angle of the motor is proportional to the input pulse. The motor has full torque at standstill (if the windings are energized) Precise positioning and repeatability of movement since good stepper motors have an accuracy of3 5% of a step and this error is on cumulative from one step to the next.

19

Excellent response to starting/stopping/reversing. Very reliable since there are no contact brushes in the motor. The motors response to digital input pulses provides open-loop control, making the motor simpler and less costly to control. It is possible to achieve very low speed synchronous rotation with a load that is directly coupled to the shaft. A wide range of rotational speeds can be realized as the speed It is proportional to the frequency of the input pulses. Disadvantages 1. Resonances can occur if notproperly controlled. 2. Not easy to operate at extremely high speeds. SENSOR BOARD

Circuit Diagram of Sensor Board

20

MODULE 7 USAGE AND MATERIALISATION


Firstly in our projects we initialize the various ports in our system. After that welcome message will be displayed on the LCD Panel. Now Toll Operator must select the various modes in our projects. The various modes consist of 1. Recharge mode 2. Delete mode 3. Normal mode 4. Report lost In the recharge mode firstly checks whether RFID card is read by the RFID

reader. If the card exist it checks whether the card is already present in the data base. If yes, recharge amount is added in to the account and stored in the memory. If no, the new card is added in to the data base with the minimum recharge amount. If delete mode is selected the data from the data base is completely

removed. If normal mode is selected in the display normal mode is shown. There after the RFID Reader checks whether card is present. If no the above operation is repeated. If yes it checks whether card is present in our data base. If card is not present LCD displays a message showing whether sufficient balance Invalid is Card If . if card is the present it checks showing available. no display message

Insufficient Balance. If yes reduce toll

amount from the balance and store in

memory. There after the toll gate would be opened. If the vehicle passes the tollgate and if the sensor is interrupted the tollgate c loses. In Report lost mode the customer has the option to delete his /her RFID tag details. When Report lost mode selected it ask for the id of the customer. If id is entered the RFID would be removed from the data base. It involves the various steps like vehicle authentication, toll payment etc. This really a huge consuming process for the users and it also obstructs the free traffic flow or the road. Nowadays, the aspect of security check is becoming more and important. The vehicle checking process, that is being carried out currently involves, stopping each vehicle, asking its owners to produce the required documents like road tax, vehicle insurance, pollution etc. This is really a time consuming task.

21

Its also a tedious job for the officials, as they have to check each and every document of all the vehicles at the same time, here RFID readers will be placed along the roads, which can get the tag ids of all vehicles that pass through it these by alleviating the overhead in vehicle checking and carrying out the documents needed for a vehicle.

22

MODULE 8 SWOT ANALYSIS


SWOT analysis is a strategic planning method used to evaluate the Strengths, Weaknesses/Limitations, Opportunities, and Threats involved in a project or in a business venture Strengths RFID technology permits no line of sight reading. Robustness and reliability under difficult environmental conditions. These tags can be read through water, snow, concrete, bricks, plastics, wood, and most non-metallic materials Available in a wide variety of physical forms, shapes, sizes and protective housings. RFID tags can be read at very high speeds. In most cases the response time is less than 100ms. Difficulty in duplicating, offers a high degree of security.

Weaknesses Cost RFID solutions cost much higher than the conventional barcodes. A large fraction of its cost lies in the software infrastructure and the enterprise application and integration Lack of standardization. Standardization has not been provided across many fronts, ranging from the different data formats used to interoperatability between RFID readers and tags from different vendors to interference between RFID products from different manufacturers. RFID will hurt privacy RFID transponders are forever part of the product, and designed to respond when a signal is received. CONCLUSION RFID tags will soon be tracking millions of consumer products worldwide.

23

Manufacturers will know the exact location of each product they make from the time it is made until it is used and tossed in the recycle bin or trash can. The crypto transponders will be well suited for future generation vehicle entry systems. The RFID tagging will take off when the cost of the tags drops to one percent of the cost of the product it is applied to, and that date is somewhere near. 2005 is the date that researchers say when radio frequency tagging becomes viable and until then, we must wait and see.

OPPORTUNITY:
Radio-frequency identification (RFID) has been a highly touted technology in recent years, but concerns -- particularly among small and medium-sized businesses (SMBs) -- about high costs and actual benefits have hindered its adoption. That's gradually changing as developers and vendors focus on systems design, development and interoperability of specific applications in the public and private sectors. Leveraging the enhanced, more flexible and standardized interoperability inherent in service-oriented architecture (SOA) and on-demand Web services is enabling RFID tags and readers to be used in conjunction with other emerging low-power wireless network standards and technology, such as wireless sensors, actuators and the RuBee networking protocol.

THREATS:
Unfortunately, businesses and governments are not the only ones interested in RFID. Civil liberties groups, hackers and criminals are also keenly interested in this new development, albeit for very different reasons. RFID-enabled public transit tickets could allow public transit managers to compile a dossier listing all of a person's travels in the past year -- information which may be of interest to the police, divorce lawyers, and others.

24

MODULE 9
CASE STUDY
Due to the improvement of technology, the way human beings do things are changing day by day. Radio frequency (RF) identification has been acting a big role in recent technological developments. Although there are three types of Radio Frequency IDentification tags (RFID): active, passive and semi-passive, almost all the tags are being used to store only a unique number in addition to the processing information. For a particular application, all the relevant details of the tag have to be taken from the database system. There are several applications which are not viable under this infrastructure. Intelligent Transportation System (ITS) including railway, is one of them. ITSs can be improved using the characteristics and the behaviours of RF tagging systems. However currently available RF tags are not suitable for such applications, mainly as it does not provide role base access control mechanisms and have no ability to stand alone to enable offline communications. Thus there is a necessity to look into this area of research. After extensive survey and hardships, a novel RF tag architecture called Object Tag (OTag), to represent the real world objects and actors in RF tags were designed with common communicational protocols. The OTag can provide access control mechanism and have abilities of being stand alone, being interoperable, being selfdescribing, and also being plug-and-playable. Then we defined common communicational protocols to communicate with reader/writer and tag. Finally we derived possible applications using our architecture. Our architecture can be used in two ways: one is just as a real world object and second is as an actor or agent. Agent is a combination of a reader/writer, processing unit and OTag. These three units together compose the actions of an agent that can work according to predefined instructions. Following sections describes how proposed technology work in real world by taking ITS as an example by deriving novel applications to support safe, reliable, comfortable, and productive social life in eco-friendly manner. The most revolutionary application of ETC is in the urban context of congested cities, allowing to charge tolls without vehicles having to slow down. This application made feasible to concession to the private sector the construction and operation of urban freeways, as well as the introduction or improvement of congestion pricing,[5] as a policy to restrict auto travel in downtown areas. Between 2004 and 2005, Santiago, Chile implemented the world's first 100% full speed electronic tolling with transponders crossing through the city's core (CBD) in a system of several concessioned urban freeways (Autopista Central and Autopista

25

Costanera Norte). The United Arab Emirates implemented in 2007 a similar road toll collection in Dubai, called Salik.[6] Similar schemes were previously implemented but only on bypass or outer ring urban freeways in several cities around the world: Toronto in 1997 (Highway 407), several roads in Norway (AutoPASS), Melbourne in 2000 (CityLink), and Tel Aviv also in 2000 (Highway 6). Congestion pricing or urban toll schemes were implemented to enter the downtown area using ETC technology and/or cameras and video recognition technology to get the plate numbers in several cities around the world: urban tolling in Norway's three major cities:[7] Bergen (1986), Oslo (1990), and Trondheim (1991) (see Trondheim Toll Scheme); Singapore in 1998 (see Singapores Electronic Road Pricing), as an upgrade to the world's first successful congestion pricing scheme implemented with manual control in 1975[8] (see also Singapore's Area Licensing Scheme); Rome in 2001 as an upgrade to the manual zone control system implemented in 1998;[9][10] London in 2003 and extended in 2007 (see London congestion charge); Stockholm, tested in 2006 and made the charge permanent in 2007 (see Stockholm congestion tax); and in Valletta, the capital city of Malta, since May 2007.[11][12] In January 2008, Milan began a one-year trial program called Ecopass, a traffic charge program in which low-emission-standard vehicles pay a user fee; alternative fuel vehicles and vehicles using conventional fuels but compliant with the Euro IV emission standard are exempted.[13][14][15][16] The program is in effect until December 31, 2009, and a public consultation will be conducted to decide if the charge becomes permanent.[17] New York City considered the implementation of a congestion pricing scheme.[18][19][20] The proposal was approved by the New York City Council on March 31, 2008,[21] however, on April 7, 2008 the New York State Assembly decided not to vote on the proposal, which means that the plan is stalled.[22][23] (see New York congestion pricing) In 2006, San Francisco transport authorities began a comprehensive study to evaluate the feasibility of introducing congestion pricing. The charge would be combined with other traffic reduction implementations, allowing money to be raised for public transit improvements and bike and pedestrian enhancements.[24] The various pricing scenarios considered were presented in public meetings in December 2008, with final study results expected in 2009.[25]

26

MODULE 10 CONCLUSION
Toll gate automation using RFID has been a successful project with all its hits and pits. Radio Frequency Identification (RFID) provides a low-cost solution to read passive RFID transponder tags. This RFID can be used in a wide variety of hobbyist and commercial applications, including access control, automatic identification, robotics navigation, inventory tracking, payment systems, and car immobilization. The RFID read the RFID tag in range and outputs unique identification code of the tag. The data from RFID reader can be interfaced to be read by microcontroller or PC. By using radio frequency technology and employing the use of RFID tag reader to initiate radio signals, RFID tags make it possible to collect toll from the highway customers. In our project by RFID technology we can automatically collect payment from the RFID card holders. Here we can also display the user balance through the LCD panel. So it helps in reducing the Traffic block found near the toll gate. RFID tags have completely revolutionized the way we live. However the

scheme can be readily implemented in field of Tollgate system is Security system. Theft detects as well as in the field of automated vehicle identification system can be extended to several areas in the coming days.

27

Das könnte Ihnen auch gefallen