Sie sind auf Seite 1von 28

A project On

TRACING THE STOLEN RADIO ACTIVE MATERIALS BY USING RFID


By V.BHAVANI - 09NG1A0407 SURYA PRAKASH - 09NG1A0444 P.SHYAMALA DEVI - 09NG1A0446 L.SRINIVAS - 09NG1A0439

ABSTRACT
In the current world, the high value objects such as radioactive

materials, diamonds are prone to the theft and are required to be


monitored to ensure safety. Monitoring the objects within a short distance by the use of a wireless security system is implemented with the help of modules which are capable of communicating with each other.

The buzzer attached to the modules Sounds instantly when the


portable object moves approximately six meters away from the owner to the fixed location. And also door will closed for find the

thief.

OBJECTIVE
In the current situation how to protect the objects such as

diamonds, laptops and radioactive materials has become a


tough task. These objects are easy for thieves to steal and resale.

Monitoring the objects within a short distance by the use


of a wireless security system is implemented with the help of modules which are capable of communicating with each

other. and also can stop the thieves by using door closing.

EXISTING SYSTEM
In existing system there is no GSM module It consists only buzzer system Here used only IR pairs

DRAWBACKS
Line Of Sight(LOS) No message alerting

PROPOSED SYSTEM
Providing message alerts by using GSM module The buzzer attached to the modules Sounds instantly when the portable object moves approximately six meters away from the owner to the fixed location. Introducing the door closing system by using motor

BLOCK DIAGRAM
TRANSMITTER SECTION:

POWER SUPPLY TRANSMI TTER ENCODER AT89S52

RECEIVER SECTION:

Power supply AT89S52

MAX232

GSM

LCD

Decoder

RF Rx

Buzzer Driver Motor

LIST OF COMPONENTS
1.AT89S52 MC 2.GSM modem 3.RF transmitter 4.Encoder 5. RF receiver 6.Decoder 7.LCD 8.Buzzer 9.Driver(L293D) 10.DC motor 11.Voltage regulator

AT89S52 MC
RAM is 256 bytes. 32 Programmable I/O Lines. Three 16-bit Timer/Counters. Eight Interrupt Sources. Watchdog timer. Fast programming time.

PIN DIAGRAM

GSM MODEM
GSM(Global System for Mobile communication) is a digital mobile telephone system. A GSM modem is a wireless modem that works with a GSM wireless network. GSM modem cannot be interfaced with the microcontroller directly. Thus serial Communication is used to interface modem with the microcontroller.

RF TRANSMITTER

433.92 MHz Frequency.

Low Cost.
1.5-12V operation.

Small size.

ENCODER

RF RECEIVER

RF RECEIVER STR-433 MHz

The data is received by the RF receiver from the antenna pin and this data is available on the data pins.

DECODER

LCD
LCD stands for Liquid Crystal Display. LCD is finding wide spread use replacing LEDs. LCD screen consists of two lines with 16 characters each. Each character consists of 5x7 dot matrix.
All data transferred to LCD through outputs D0-D7 will be interpreted as commands or as data.

BUZZER
The buzzer produces a same noisy sound irrespective of the voltage variation applied to it. Most buzzers produce sound in the range of 2 to 4 kHz.

It consist 2 leads i.e.The Red lead is connected to the Input and the Black lead is connected to Ground.

DRIVER
Wide Supply-Voltage Range: 4.5 V to 36 V. Separate Input-Logic Supply. Output Current 1 A Per Channel (600 mA for L293D).

DC MOTOR

VOLTAGE REGULATOR
A voltage regulator is an electrical regulator desi gned to automatically maintain a constant voltage level. 7805 is a voltage regulator integrated circuit. It is a member of 78xx series of fixed linear voltage regulator ICs.

CIRCUIT DIAGRAM Transmitter section

CIRCUIT DIAGRAM

Receiver section

Flow chart
start
RF transmitter
RF receiver

Product items

LCD display

Buzzer

Door closing

Message

APPLICATIONS
Storage of Radio active materials Shopping Malls Museums

ADVANTAGES
It alerts security easily. We can find out robbers easily.

FEATURE SCOPE
To add the GPS for this system we can find
the particular point of location. where the

stolen materials are present.

CONCLUSION
A wireless security system affixed to the object in consideration was proved to be an efficient way to alert the user in case of theft. The size of the System can be decreased by decreasing the battery sizes, making it more accessible and compact to install on many portable

devices.

REFERENCES
[1]Clarke, S. Laptop Theft - a growing trend Retrieved September 2010 from: http://www.articlealley.com/article_137840_10.html#YeddaComboPosition [2] Ponemon Institute Airport Insecurity: The Case of Lost Laptops, sponsored by Dell. Retrieved September 2010 from Airport Insecurity: The case of missing and lost laptops: [3]Su, G., Tan, L., A Tradeoff Scheme in Multi-User System with Block Diagonal Geometric Mean Decomposition, The Computing Science and Technology International Journal, Vol. 1, No. 1, pp. 5-14, August, 2011. [4]Li, F., Opportunistic Relaying in Cooperative OFDM Networks with Limit Feedback, The Computing Science and Technology International Journal, Vol. 1, No. 1, pp. 15-19, December, 2011. [5]Finkenzeller, K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, Third Edition, John Wiley and Sons. [6]Yao, H., Dynamic Restoration for Survivable Traffic Grooming in WDM Networks, The Computing Science and Technology International Journal, Vol. 1, No. 1, August, 2011. [7]TexasInstruments,RetrievedAugust2010,fromhttp://focus.ti.com/docs/prod/ folders/print/cc2500.

Das könnte Ihnen auch gefallen