RFID Based Security and Access Control System
|
|
|
- Bethanie Lee
- 10 years ago
- Views:
Transcription
1 IACSIT International Journal of Engineering and Technology, Vol. 6, No. 4, August 2014 RFID Based Security and Access Control System Umar Farooq, Mahmood ul Hasan, Muhammad Amar, Athar Hanif, and Muhammad Usman Asad decision sub-system and the management sub-system. All these processes communicate with each other through database information. G. Ostojic [3] has developed an automatic vehicle parking control system based on RFID technology in the city of Novi Sad, Republic of Serbia. The hardware of the system consists of RFID tag and reader operating at a frequency of 13.56MHz for authentication, inductive loop for metal detection, a capacity sensor for counting vehicles, Siemens MC 39i GPRS modem for communication between entrance and exit gates and FEC FC440 programmable logic controller (PLC) which is the heart of the system. When the car stops on the inductive loop at the entrance, RFID tag is read by the reader. The data on the tag includes the unique identification number (UID), validity period and check bit for checking the parking status. This data is manipulated by PLC and access is granted for parking the vehicle if tagged information contains correct UID, validity period and parking status. After the vehicle has entered the parking lot, its parking status will be changed by the RFID reader/writer to prevent the entry of another vehicle on the same card. The same procedure is repeated when the vehicle is leaving the parking lot. Nova Ahmed [4] has described RFID based indoor guidance and monitoring system known as GuardianAngel in pervasive environment. The beauty of the system is that it can generate dynamic queries in real time through user interface. The environment in the system is equipped with RFID tags and is divided into various zones. The middleware of the system is divided into two layers namely guidance layer and monitoring layer. The guidance layer is provided with handheld RFID reader to provide locality information to the monitoring layer periodically. Thus monitoring layer has the information of the entire environment. Experimental results have shown that system is nearly 100% accurate in providing the zonal information thereby allowing the construction of very robust guidance and monitoring applications. Kuo-shien Huang [5] has described a business model based approach for utilizing RFID technology in automating the process according to enterprise strategic vision and goals. The author has built a business model for bike renting system and used RFID technology to implement the system. The conventional way of getting the bike on rent which includes the recording of customer data by pen and then inputting the data to the computer is replaced by providing a RFID card to the customer and fixing an RFID tag on the bike. The bike is tagged to keep track of its location from the renting store to the return store. The information is shared amongst the stores through web interface. In this way, successful RFID strategy is built and deployed. This paper discusses the design of a security and access control system using RFID technology. The system is comprised of three modules namely entrance monitoring, exit monitoring and mess monitoring. These modules Abstract This paper describes the design of RFID based security and access control system for use in hostels inside the Punjab University premises. The system combines RFID technology and biometrics to accomplish the required task. When the RFID reader installed at the entrance of hostel detects a number, the system captures the user image and scans the database for a match. If both the card and captured image belong to a registered user, access is granted; otherwise the system turns on the alarm and makes an emergency call to the security van through GSM modem. In this way, the suspicious persons can be caught. Index Terms Security and access control, RFID, face recognition. I. INTRODUCTION Automatic identification and access control system has become necessary to overcome the security threats faced by many organizations in Pakistan these days. By installing the system at the entrance will only allow the authorized persons to enter the organization. The system can also be installed at various points inside the organization to track the person s movement and to restrict their access to sensitive areas in the organization. In such a way, suspicious persons can be caught which will surely improve the security level in the organization. Radio frequency identification (RFID) is a wireless technology that can be used to develop the access control system. The literature has revealed the use of this technology to automate various processes ranging from industrial sector to home control [1]. Bo Yan [2] has reported the use of RFID technology to automate sight spot ticket management system. The system hardware consists of RFID electronic tickets, RFID readers, computer terminals, optical networks, computer servers and site controllers. Electronic ticket contains the S-DES encrypted form of data including scenic region number, scenic spot number, ticket type, ticket date, site number, serial number and check bit. The RFID reader at the site reads the data inside the e-ticket and transmits it to the computer terminal and servers though the network. The data is decrypted at the terminal and its authenticity is verified. The site controller then allows the right tourist to enter the spot. This system identification and authentication process is carried out at three sub-levels namely the sale sub- system, the Manuscript received May 27, 2013; revised August 22, Umar Farooq and Muhammad Amar are with Department of Electrical Engineering, University of The Punjab Lahore ( [email protected]; [email protected]). Mahmood ul Hasan is with Department of Electrical Engineering, Mirpur University of Science & Technology ( [email protected]). Athar Hanif and Muhammad Usman Asad are with Department of Electrical Engineering, The University of Lahore ( [email protected], ). [email protected]). DOI: /IJET.2014.V
2 communicate to the computer system through main controller. After the information from these modules is processed by the computer, the control commands are issued to the modules for granting or denying access to the user. TABLE I: COMPARISON OF ACTIVE & PASSIVE RFID TAGS transponder coil. The transponder coil then varies this current by changing the load on its antenna. This variation is actually the modulated signal (scheme is known as load modulation) which is received by the interrogator coil through mutual induction between the coils. The interrogator coil decodes this signal and passes to the computer for further processing. Attribute Active Tags Passive Tags Source of Power Built-in Battery Electromagnetic Induction Reading Distance High (20 to 100 m) Low (Up to 3m) Required Signal Strength Low High Tag Cost High ($15 to $100) Low ($0.15 to $5) Data Storage Large read/write data (128kb) Small read/write (128b) Size Large Small Weight Large Small Tag Life Small (3 to 8 years depending upon tag broadcast rate) Large (Up to 10 years depending upon the environment the tag is in) Tag Readers Typically lower in cost Typically higher in cost Industries/ Applications Auto dealership Auto Manufacturing Hospitals Construction Mining Laboratories Remote monitoring Supply Chain High vol. Manufacturing Libraries/book stores Pharmaceuticals Passport Electronic tolls Item level tracking II. OVERVIEW OF RFID TECHNOLOGY RFID system consists of three components namely transponder (tag), interrogator (reader) and computer containing the database, as shown in Fig. 1. The interrogator reads the tag data and transmits it to the computer for authentication. The information is processed and upon verification, access is granted. The system offers diverse frequency band ranging from low frequencies to microwave frequencies [5]: Low Frequency: KHz High Frequency: MHz Ultra High Frequency: MHz Microwave Frequency: 2.4 GHz Depending upon the source of electrical energy, RFID tags are classified as either active or passive. The active tags use a battery for powering the circuit on the tag and transmit the tag information upon the reader request. However, these tags are very expensive and seldom used. On the other hands, passive tags get energy from the reader to power their circuit. These tags are very cost-effective and hence most of the applications use them. A comparison of these tags highlighting important features is shown in Table I [6]-[8]. In the present work, passive RFID tags have been used. A passive RFID tag transmits information to the reader when it comes in the vicinity of electromagnetic field generated by the reader. The phenomenon is based on Faraday s law of electromagnetic induction. The current flowing through the coil of interrogator produces a magnetic field which links to the transponder coil thereby producing a current in the Fig. 1. Basic RFID system. III. RELATED WORK Many researchers have utilized RFID technology in developing access control system. Filipe [7] has developed an RFID based monitoring and access control system consisting of RFID terminal, camera, server and an alert device. Upon detecting a transponder, the terminal captures a photo and transmits the data including the UID and photo to the server through TCP/IP connection. The server searchers the database for this particular query and sends the results back to the terminal to allow or deny the access. The system also monitors illicit acts e.g., a person tries to enter when the door is open without completion of authentication process and turns on the alert device using web services. The performance of the system is tested by installing RFID kits with antennas covering a range of 10cm and satisfactory results are obtained. Xiang-Lei Meng [9] has described an RFID based embedded security authentication system with novel face recognition structure. The system comprises of two phases namely registration and recognition. In registration phase, ten pictures of user face with different emotions are collected and eigen information is obtained with an extraction algorithm. This information along with a UID is written on RFID tag. In recognition phase, a camera tracks the face and an extraction algorithm returns eigen information of the face in the picture. This information is then matched with the information already stored on the tag for authentication. The entire processing is done on embedded ARM11 processor, S3C6410 instead of computer terminal/server which has resulted in faster response time, about 57ms with authentication accuracy up to 86.5%. The performance of the system is compared with the existing database systems and is found to have far better response time with the same authentication accuracy. Dong-Liang Wu [10] has described an access control system based on RFID in conjunction with face recognition based on neural network. The system recognizes the face of person holding RFID card and denies the access if person is found to be unauthorized. Radial basis function neural network (RBFNN) has been used for learning the face of authorized persons. Principal component analysis (PCA) has been used for extracting the features from the image and linear discriminant analysis (LDA) for refining these features. The network is trained with localized generalization error model (L-GEM) for enhancing its generalization capabilities. 310
3 Experimental results have shown that proposed system can improve the security of RFID access control. A. RFID Tag IV. SYSTEM COMPONENTS IPC80 passive RFID tag operating at a frequency of 125KHz is issued to the user. The tag transmits information to the reader in ASK format [11]. B. RFID Reader IP10 proximity card reader with operating frequency of 125KHz and reading distance up to 4 inches is used. The reader can be easily installed on metal doors, provides the tag information serially in RS232 format and is suitable for indoor as well as outdoor operations [11]. Three such readers are installed for hostel security: hostel entrance gate, hostel exit gate and mess entrance gate. C. Camera Logitech C500 webcam is used to capture images. The camera has 1.3 mega pixel sensors and can capture video up to 1280x1024 pixels. Two such cameras are installed for hostel security: one at the entrance and other at the exit. No camera is used for entering in the mess hall to reduce the overall complexity. D. GSM Modem Nokia 12i GSM modem is used to make emergency call to the security van. Nokia 12i offers advance GSM connectivity and supports EDGE/GPRS and HSCSD with automated GSM connection establishment it is equipped to provide reliable remote connections and offers application level watchdogs, inbuilt self check mechanisms and a reliable Virtual Machine (VM) for JAVA TM. Nokia 12i also supports reliable inbuilt internet protocols: TCP/IP for reliable data transfer, UDP/IP for audio and video streaming and HTTP for accessing web pages. The module can also be connected to an external GPS device that supports National Marine Electronics Association (NMEA) standard. The inbuilt NMEA parser can parse the location data from the output that it receives from the GPS device. External microcontroller can use AT commands to communicate with Nokia 12i and simple remote I/O applications can easily be controlled via text messages. E. Microcontroller AT89C52 microcontroller is selected because it is a powerful microcomputer which has low power consumption and provides a highly flexible and cost-effective solution to many embedded control applications. It has 8K bytes of in system reprogrammable flash memory, 256 bytes of internal RAM, 32 programmable I/O lines, three 16 bit timers/counters, eight interrupt sources and a programmable serial channel [11]. F. Nonvolatile RAM 256K Nonvolatile RAM (NV-Ram) DS1230Y-85 is used for storing passwords against registered RFID numbers. NV-RAM is selected because it combines the best of RAM and ROM: the read and write ability of RAM and non-volatility of ROM. The DS1230 Nonvolatile SRAM is 262,144-bit, fully static, nonvolatile SRAM organized as 32,768 words by 8 bits. Each NV SRAM has a self-contained lithium energy source and control circuitry which constantly monitors V CC for an out-of-tolerance condition. When such a condition occurs, the lithium energy source is automatically switched on and write protection is unconditionally enabled to prevent data corruption. G. Door Locks Solenoid operated door locks are used in entrance, exit and mess gates of hostels. A relay is used to energize the solenoid to open the gate. H. Alarms Two alarms are installed; one at the entrance and other at the exit gate. These alarms are turned on if an illegal person tries to enter the hostel premises. V. SYSTEM OPERATION The security and access control system is comprised of two phases: registration phase and recognition phase. In the registration phase, ten images of the hostel user are captured while issuing an RFID tag. These images are used to train a feed forward neural network with back propagation training algorithm and the converged weights are stored corresponding to a particular user. The recognition phase comes when the user wants to enter the hostel. At this point, after getting RFID user number, image of the user is captured and passed to the neural network for recognition. If a match is found, access is granted to the user. The user authenticity is checked at three places: hostel entrance, hostel exit and mess entrance. The entrance and exit modules use RFID and face recognition for identification while mess module use RFID with a password to grant permission. These modules communicate with computer system through a main controller. The main controller transmits the modules information to the computer system. The computer system after processing these interrupts issues commands to the modules through main controller. The data exchange between the main controller and computer system is through serial port while parallel port data and control lines are used for handshaking purposes. The block diagram of the system is shown in Fig. 2. A. Entrance Monitoring Controller Entrance monitoring controller comprises of an RFID reader, a GSM modem, a NV RAM, door lock, alarm, scroll keys and 16x4 LCD; all interfaced to AT89C52 microcontroller as shown in Fig. 3. After detecting and receiving RFID tag data through a serial interrupt routine, microcontroller searches the NV-RAM for this number. If no match is found, the microcontroller makes an emergency call to the security van through GSM modem. At the same time, it sends a request to the computer system through main controller to capture the user image and turns on the alarm signal. On the other hand, if a match is found, the microcontroller checks the entrance status of the user by scanning NV-RAM. If the user has not entered in the hostel yet, the controller sends a request to the computer system to 311
4 IACSIT International Journal of and Technology, Vol. 6, No. 4, August 2014 and sends a request to the computer system to capture the user image. At the same time, it makes an emergency call through GSM modem interfaced to entrance controller and turns on alarm signal. On the other hand, if a yes signal is received, the exit controller sends a request to computer system to capture and process user image. The computer system uses face recognition algorithm to verify the user. If a match is found, computer system asks the exit controller to grant permission to the user to leave the hostel. After the user has left the hostel, exit controller sends a request to the entrance controller through main controller to update the user entrance status. In case of non-registered user, heavy fine is included in hostel dues of the user for using the card of other person. The exit monitoring controller thus enables the system to allow the valid person to leave the hostel. The flow chart describing the operation of exit monitoring controller is shown in Fig. 6. capture and process the user image. The computer system performs two functions. First, it verifies the user against the received RFID number using face recognition algorithm and then checks whether the user is a defaulter or not. After processing, the computer system generates one of the three messages: access granted corresponding to registered and clear user, access denied corresponding to a non-registered user and user is a defaulter corresponding to a registered and defaulter user. In case of non-registered user, heavy fine is included in user hostel dues on an account of using the RFID tag of other user. The entrance controller receives the message from computer system and displays it on 16 4 LCD. The details on LCD can be read with the help of scroll keys. If the message access granted is received by the controller, it opens the entrance gate by switching the relay. At the same time, entrance status of the user is updated in the non volatile RAM. The entrance monitoring module thus ensures the entry of registered and clear users in the hostel and also helps in catching suspicious persons that are not authorized to enter. The flow chart describing the operation of entrance monitoring module is shown in Fig. 4. Fig. 2. Block diagram showing modules interconnection with the computer System. Fig. 4. Flow Chart for entrance monitoring module. Fig. 3. Block diagram of entrance monitoring controller. B. Exit Monitoring Controller The exit monitoring module comprises of RFID reader, an alarm and door lock; all interfaced to AT89C52 microcontroller as shown in Fig. 5. After receiving RFID tag information through reader, microcontroller sends a request to the entrance monitoring controller to search the user and its entrance status in NV-RAM. Upon receiving a no signal from the entrance controller, exit controller blocks RFID tag Fig. 5. Block diagram of exit monitoring controller. 312
5 security and access control system is installed in eighteen hostels and computer systems in these hostels share the information to a web server which is the central station and can be searched to locate a particular user inside the hostels. Fig. 6. Flow chart for exit monitoring controller. C. Mess Monitoring Controller While entrance and exit monitoring controllers help in tracking the users, mess monitoring controller automates the mess attendance system. The mess monitoring module comprises of an RFID reader, 4x3 keypad, 16x4 LCD, a NV-RAM, door lock and alarm indicator; all interfaced to AT89C52 microcontroller as shown in Fig. 7. Upon receiving RFID tag number, the controller searches it in a list of registered numbers stored in NV-RAM. If a match is found, controller asks the user to enter the password. The password list of registered users is also maintained in NV-RAM corresponding to RFID tag numbers. If the entered password is correct, controller grants access to the user for entering the mess hall. At the same time, controller sends the user information along with mess attendance to the computer system through main controller. The computer system updates the database and sends attendance recorded message to the mess controller. In this way, the exact mess charges are maintained in on-line database. The flow chart describing the operation of mess monitoring controller is shown in Fig. 8. Fig. 8. Flow chart for mess monitoring controller. Fig. 9. A screenshot of user form in hostel database. Fig. 7. Block diagram of mess monitoring controller. D. Computer System and Web Server The information provided by the system modules is maintained in a database inside the computer system. The database keeps record of user history including check-in time and date, check-out time and date, electricity, gas and mess charges, fine (penalty) details, RFID card lost details and user s visitor record. In addition to this, database also keeps record of illegal persons trying to enter the hostel premises. A screen short of a user form in database is shown in Fig. 9. The VI. CONCLUSIONS In this paper, design of a security and access control system for use in Punjab University hostels is presented. The system uses radio frequency identification with biometrics technology to differentiate between valid and invalid users. The system accomplishes the security and access control task by processing information from sub-controllers. These controllers include entrance monitoring controller, exit monitoring controller and mess monitoring controller installed at entrance gate, exit gate and mess gate respectively. These controllers read RFID tag issued to the user and search 313
6 this tag number in non-volatile RAM. On a successful match, the controllers request the computer terminal to capture the user image. The computer system uses neural network trained face recognition module to verify the user authenticity and responds to the controllers by sending them access granted or access denied message. The controllers grant the access to the user or make emergency call accordingly. This system is made centralized with the help of a web server. The web server takes information from computer terminals in hostels and keeps track of a particular user. Although the developed system is useful in reducing security threats to the hostels, there is a room for improvement in the response time of the system. The response time can be improved by using dedicated processors instead of computer systems capable of processing the images in real time. REFERENCES [1] D. L. Wu, Wing W. Y. NG, D. S. Yeung, and H. L. Ding, A brief survey on current RFID applications, in Proc. International Conference on Machine Learning and Cybernatics, Baoding, July 12-15, 2009, pp [2] B. Yan and D. Y. Lee, Design of spot ticket management system based on RFID, in Proc. International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009, pp [3] G. Ostojic, S. Stankovski, and M. Lazarevic, Implementation of RFID technology in parking lot access control system, in Proc. Annual RFID Eurasia Conference, 2007, pp [4] N. Ahmad, S. Butler, and U. Ramachandran, GuardianAngel: An RFID based indoor guidance and monitoring system, 2010, pp [5] K. S. Huang and S. M. Tang, RFID applications strategy and deployment in bike renting system, in Proc. ICACT 2008, pp [6] S. Lahiri, RFID sourcebook, IBM Press, Westford, Massachusetts, [7] F. Lourenco and C. Almeida, RFID based monitoring and access control system, in Proc. INFORUM, [8] R. Weinstein, RFID: A technical overview and its application to the enterprise, IT Professional, vol. 7, no. 3, May-June 2005, pp [9] X. L. Meng, Z. W. Song, and X. Y. Li, RFID-Based security authentication system based on a novel face-recognition structure, in Proc. WASE International Conference on Information Engineering, 2010, pp [10] D. L. Wu, Wing W. Y. NG, Patrick P. K. Chan, H. L. Ding, B. Z. Jing, and D. S. Yeung, Access control by RFID and face recognition based on neural network, in Proc. International Conference on Machine Learning and Cybernatics, July 11-14, 2010, pp [11] M. A. Mazidi, J. C. Mazidi, and R. D. Mckinaly, The 8051 Microcontroller and Embedded Systems, Pearson Education, Umar Farooq received his B.Sc. and M.Sc. both in electrical engineering from University of Engineering & Technology Lahore in 2004 and 2010 respectively. He is currently with the Department of Electrical Engineering, University of The Punjab Lahore. His research interests include the application of intelligent techniques to problems in control engineering, robotics and power electronics. Mahmood ul Hasan received his B.Sc. in electrical engineering from University of Engineering & Technology Lahore in He is the recipient of prestigious silver and bronze medal awards in his pre engineering and secondary school studies respectively. He is with Department of Electrical Engineering Mirpur University of Science and Technology Azad Kashmir and is working towards M.Sc. degree in electrical engineering from University of Engineering & Technology Lahore. His research interests include electronic instrumentation, Author s formal intelligent control and robotics. photo Muhammad Amar received his B.Sc. in electrical engineering from University of The Punjab Lahore in 2010 and M.Sc. in Electrical Engineering from University of Engineering & Technology Lahore in He is currently working towards Ph.D. degree in electrical engineering from Monash University, Australia. His research interests include the application of intelligent techniques to problems in control engineering, robotics and machine vision. Athar Hanif holds B.Sc. and M.Sc. degrees in electrical engineering from University of Engineering & Technology Taxila and University of Engineering & Technology Lahore respectively. He is currently working towards the Ph.D. degree in control engineering from Muhammad Ali Jinnah University Islamabad. He is with Department of Electrical Engineering, The University of Lahore where he is working as Assistant Professor. His research interests include the robust nonlinear control of hybrid vehicles and power converters. Author s formal photo Muhammad Usman Asad received his B.Sc. in Electrical Engineering from University of The Punjab Lahore in During his stay at electrical engineering Department University of The Punjab Lahore, he served as President of Society of Engineering Excellence (2009) and contributed in the research activities of the society. He is the recipient of Gold Medal award for his paper on Ball Scoring Robot in 24 th IEEEP International Multi-topic Symposium, 2009 and Silver Medal award for his paper on Neural Controller for Robot Navigation Author s formal in 26 th IEEEP International Multi-topic Symposium, He is currently photo working towards M.Sc. degree in electrical engineering from G.C. University Lahore. He is with Department of Electrical Engineering, The University of Lahore where he is a Lecturer. His research interests include intelligent control of Robotics and Power systems. 314
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
Public Transportation Management Services by Integrating GSM-GPS
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834, p- ISSN: 2278-8735. Volume 4, Issue 6 (Jan. - Feb. 2013), PP 51-56 Public Transportation Management Services by
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642 Muhammad
Microtronics technologies Mobile: 99707 90092
For more Project details visit: http://www.projectsof8051.com/rfid-based-attendance-management-system/ Code Project Title 1500 RFid Based Attendance System Synopsis for RFid Based Attendance System 1.
Automobile Speed Violation Detection System using RFID and GSM Technologies
Automobile Speed Violation Detection System using RFID and GSM Technologies Lujaina Al-Shabibi Student, Telecommunications Engineering Caledonian College of Engineering Muscat, Oman Nadarajan Jayaraman
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
DESIGN AND IMPLEMENTATION OF A GPS RECEIVER USING 8051 MICROCONTROLLER Garima Jain 1, Nasreen Noorani 2, Vishal Badole 3 1 2 3 Electronics & Communication Department 1 2 3 Acropolis Technical Campus, Indore,
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual
Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2 Instruction Manual Firmware version: 2.0.1 Issue: 0.6 Version of the GPRS transmitters configurator: 1.3.6.3 Date of issue: 07.03.2012 TABLE OF CONTENTS
A Multipurpose Vehicle Tracking System Based on ARM CORTEX-M3 STM32, HMC5883L, MPU-6050, GSM and GPS
Journal of Traffic and Logistics Engineering Vol. 4, No. 1, June 2016 A Multipurpose Vehicle Tracking System Based on ARM CORTEX-M3 STM32, HMC5883L, MPU-6050, GSM and GPS Muhammad Husnain Ul Abdeen, Umar
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Development of Low Cost Private Office Access Control System(OACS)
Development of Low Cost Private Office Access Control System(OACS) Sadeque Reza Khan Prime University, Department of Electrical and Electronic Engineering, Dhaka-1216, Bangladesh [email protected]
A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES
Journal homepage:http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES Pranesh.S 1, Mr. P.
Time & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
DESIGN OF SMS ENABLED CAR SECURITY SYSTEM
DESIGN OF SMS ENABLED CAR SECURITY SYSTEM K. A. Amusa Federal University of Agriculture, Abeokuta, O. O. Nuga Federal University of Agriculture, Abeokuta, A. A. Adetomi Federal University of Agriculture,
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada BIOGRAPHY Yves Théroux, a Project Engineer with BAE Systems Canada (BSC) has eight years of experience in the design, qualification,
Intelligent Fleet Management System Using Active RFID
Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,
MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY
MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY F. Shawki 1,2, M. El-Shahat. Dessouki 1,3, A. I. Elbasiouny 4, A.N. Almazroui 5, F. M. R. Albeladi 5 1 Assistant Professor, Electrical
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN
ATM Terminal Security Using Fingerprint Reconition. Prof. B.Jolad, Tejshree Salunkhe, Rutuja Patil, Puja Shindgi Padmashree Dr. D. Y. Patil Institute Of Engineering and Technology,Pimpri,Pune - 411018
Design and Development of SMS Based Wireless Home Appliance Control and Security System
Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad 1, Md. Al Muzahid 2 and Md. Saifuddin Faruk 3 The rapid change in the wireless communication
Automated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
Overview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS
Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking Auto Accident Report Global Position System (GPS) Navigation System Anti theft Alarm System Overview 1. GPS data tracking via GSM
FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
GPS Based Automatic Vehicle Tracking Using RFID Devyani Bajaj, Neelesh Gupta [email protected]
GPS Based Automatic Vehicle Tracking Using RFID Devyani Bajaj, Neelesh Gupta [email protected] Abstract a vehicle tracking system is an electronic device installed in a vehicle to enable the owner
Design of Wireless Home automation and security system using PIC Microcontroller
IJCAES ISSN: 2231-4946 Volume III, Special Issue, August 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on National Conference on Information and Communication
Review of RFID & GSM Based Automatic Ration Distribution System
Review of RFID & GSM Based Automatic Ration Distribution System Prof.Vikram M Kakade 1, Jagruti Utane 2, Priti Pachare 3 Lecturer, Dept. of EXTC, PRMCEAM, Badnera-Amravati, Maharashtra, India 1 UG Student
Figure 1.Block diagram of inventory management system using Proximity sensors.
Volume 1, Special Issue, March 2015 Impact Factor: 1036, Science Central Value: 2654 Inventory Management System Using Proximity ensors 1)Jyoti KMuluk 2)Pallavi H Shinde3) Shashank VShinde 4)Prof VRYadav
GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.
GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. Introduction: The Proposed design is cost-effective, reliable and has the function of accurate tracking. When large object or vehicles were spread out
E-Blocks Easy RFID Bundle
Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
1. INTRODUCTION. Keywords SMS, GSM network, electrical device, encryption, control.
Secure Control of Remote Electrical Devices Using Mobile SMS Services Kishor T. Mane 1, G.A. Patil 2 1. Asst. Professor, 2. Head and Asst. Professor D. Y. Patil college of Engg. & Tech. Kolhapur, Maharashtra,
Autonomous Advertising Mobile Robot for Exhibitions, Developed at BMF
Autonomous Advertising Mobile Robot for Exhibitions, Developed at BMF Kucsera Péter ([email protected]) Abstract In this article an autonomous advertising mobile robot that has been realized in
Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
RFID Based Real Time Password Authentication System for ATM
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 RFID Based Real Time Password Authentication System for ATM Soniya B. Milmile 1 Prof.
Keywords: GPS, GSM, AVR Microcontroller, SMS.
Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A System for Car Accident
Wireless power meter monitoring with power theft detection and intimation system using GSM and Zigbee networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 6, Ver. I (Nov - Dec. 2014), PP 04-08 Wireless power meter monitoring with power
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS
BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS BURGLAR ALARM SYSTEM EURO ALARM Six zones with the following connection capabilities: One
LibRFID: Automation Software for Library Management System Using RFID Technology
LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,
RFID Based Centralized Patient Monitoring System and Tracking (RPMST)
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 08-15 RFID Based Centralized Patient Monitoring System and Tracking
Computer and Set of Robots
Lesson 11:DESIGN PROCESS EXAMPLES Mobile-Phone, Mobile- Computer and Set of Robots 1 Mobile Phone 2 Mobile phone SoC (System-on-Chip) Hardware units Microcontroller or ASIP (Application Specific Instruction
Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework
International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569 Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial
Raghavendra Reddy D 1, G Kumara Swamy 2
Car Accident Detection, Communication And Tracking Using ARM7 Controller Raghavendra Reddy D 1, G Kumara Swamy 2 1 PG Scholar, Dept of ECE, Malla Reddy Engineering College (Autonomous), Hyderabad, India.
HyperAccess Access Control System
Control System We manufacture, an advanced PC based access control solution that will give you control over who has access to your building. With you can control access on hundreds of doors for up to 10,000
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
Design and Development of SMS Based Wireless Home Appliance Control and Security System
Journal of Modern Science and Technology Vol. 3. No. 1. March 2015 Issue. Pp.80-87 Design and Development of SMS Based Wireless Home Appliance Control and Security System Md. Abdullah Al Asad *, Md. Al
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM Ms. Radhika D. Rathi 1, Assistant Prof. Ashish Mulajkar 2, Assistant Prof. S. S. Badhe 3 1 Student, E&TCDepartment, Dr.D.Y.Patil School of
TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS
TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS 1 S.Naveen Kumar, 2 A.Mohammed Arif, 3 S.Naveen Kumar and 4 Mr.S.VijayMurugan,M.E.,(PhD.,), 1,2,3 Student Department of ECE, Adhiyamaan College
Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies
Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies DR. O. GEOFFREY EGEKWU and JIM RIDINGS Institute for Infrastructure and Information Assurance (IIIA) James Madison University Functions
Android based Secured Vehicle Key Finder System
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Android based Secured Vehicle Key Finder System Sindhoori S. 1, Dr. N. Sathish Kumar 2 *(M.E. Embedded System Technologies, Sri
Microcontroller Based Anti-theft Security System Using GSM Networks with Text Message as Feedback
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 2, Issue 10 (August 2012), PP. 18-22 Microcontroller Based Anti-theft Security System
915MHz RFID State of the Art RFID
915MHz RFID State of the Art RFID LIBRARY BOOK / MEDIA MANAGEMENT and RFID TRACKING SYSTEM Executive Overview More and more libraries worldwide are utilizing RFID to automate the issue and return of books,
Vehicle and Object Tracking Based on GPS and GSM
Vehicle and Object Tracking Based on GPS and GSM 1 Sonali Kumari, 2 Simran Ghai, 3 Bharti Kushwaha 1,2,3 Department of Computer Science, Dronacharya Group of Institutions, Greater Noida (U.P), India Abstract:
Study on Differential Protection of Transmission Line Using Wireless Communication
Study on Differential Protection of Transmission Line Using Wireless Communication George John.P 1, Agna Prince 2, Akhila.K.K 3, Guy Marcel 4, Harikrishnan.P 5 Professor, Dept. of EEE, MA Engineering College,
Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms
Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms Arifa Ferdousi 1 and Sadeque Reza Khan 2 1 Dept. of Computer Science and Engineering, Varendra University, Rajshahi, Bangladesh
Advanced Car Parking System with GSM Supported Slot Messenger
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735Volume 10, Issue 1, Ver II (Jan - Feb 2015), PP 14-18 wwwiosrjournalsorg Advanced Car Parking System
Real Time Vehicle Theft Identity and Control System Based on ARM 9
Real Time Vehicle Theft Identity and Control System Based on ARM 9 D.Narendar Singh Associate Professor, M.tech,Ph.d Department of Electronics and Communication Engineering Anurag group of Institutions,
PRT-CTRL-SE. Protege System Controller Reference Manual
PRT-CTRL-SE Protege System Controller Reference Manual The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology
Field Service Application
Field Service Terminal 3.5 TFT sunlight readable LCD touch screen Marvell PXA 310 624MHz CPU Built-in Windows Mobile 6.5 OS Wi-Fi, and WCDMA/HSDPA or GPRS wireless technology Built-in 1D Laser/2D Imager
Alliance System Ordering Guide
Alliance System Ordering Guide Multiple Technologies Versatile Hardware Powerful Software One family of parts and accessories Version 12-Nov-03 Alliance System Ordering Guide Table of Contents Controllers
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone
ISSN (e): 2250 3005 Vol, 04 Issue, 7 July 2014 International Journal of Computational Engineering Research (IJCER) Enhanced Wireless Security System With Digital code lock using RF &GSM Technology 1 E.Supraja,
Design and Development of Suraksha -A Women Safety Device
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 8 (2014), pp. 787-792 International Research Publications House http://www. irphouse.com Design and Development
ADVANCED VEHICLE TRACKING SYSTEM USING ARM7
ADVANCED VEHICLE TRACKING SYSTEM USING ARM7 L. Kishore 1, Arun Raja 2 1 M.E. Embedded Systems Technologies, Sri Ramakrishna Engineering College 2 Assistant Professor, Department of ECE, Sri Ramakrishna
Research Article. ISSN 2347-9523 (Print) *Corresponding author Nathan David Email:
Scholars Journal of Engineering and Technology (SJET) Sch. J. Eng. Tech., 2014; 2(6B):868-873 Scholars Academic and Scientific Publisher (An International Publisher for Academic and Scientific Resources)
EMBEDDED MAJOR PROJECTS LIST
EMBEDDED MAJOR PROJECTS LIST WEBSERVER ETHERNET - CAN BASED APPLICATION 1 WEB-BASED STUDENT ATTENDANCE SYSTEM USING RFID TECHNOLOGY 2 THE COMMON DATA ACQUISITION SYSTEM BASED ON ARM7 3 CAN BASED ACCIDENT
Waterproof portable tracker and
Catalog for GPS tracking system Model Description Picture Mainstream GPS/GSM/GPRS vehicle tracking device, designed as solution for fleet management, which is a GP4000 robust fleet tracking device not
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
TCP/IP Network Communication in Physical Access Control
TCP/IP Network Communication in Physical Access Control The way it's done: The security industry has adopted many standards over time which have gone on to prove as solid foundations for product development
real-time fleet management and security
real-time fleet management and security Helios the Ruler of the Sun, believed to be the "All-Seeing" according to early Greek mythology. Above All Above All The most sophisticated unit for real-time fleet
Home Security System Using Gsm Modem
RESEARCH ARTICLE OPEN ACCESS Home Security System Using Gsm Modem Mehek Potnis 1, Ayesha Chimnani 1, Vishal Chawla 1 Mr. Amit Hatekar 2 1. Undergraduate Students, Department of EXTC, Thadomal Shahani Engineering
DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM
Part-I: Natural and Applied Sciences ISSN-L: 2223-9553, ISSN: 2223-9944 DEVELOPMENT OF ANTI-THEFT DOOR SYSTEM FOR SECURITY ROOM Safaa A. Mahdi Technical Institute, Babylon, IRAQ. [email protected]
Wireless Sensor Network for Electric Meter Handling
Wireless Sensor Network for Electric Meter Handling Swapnil Magar 1, Prof.Deshpande L.M. 2 PG Student [E&TC], Dept. of ECE, College of Engineering, Osmanabad, Maharashtra, India 1 Assistant professor,
Vehicle Tracking System using GPRS
Urban Transport XIII: Urban Transport and the Environment in the 21st Century 409 Vehicle Tracking System using GPRS S. Ikram 1 & F. T. Shah 2 1 Seidco Communication L.L.C, Abu Dhabi, UAE 2 COMSATS Institute
T-BOXN12R. First steps with T-BOXN12R. You can make it wireless. Date: 2004-07-16 Version 1.0
T-BOXN12R You can make it wireless First steps with T-BOXN12R Date: 2004-07-16 Version 1.0 Content 1. Purpose of this document... 3 2. T-BoxN12R overview... 4 3. First step... 5 3.1. Preparing your workshop
Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant
International Journal of Computational Engineering Research Vol, 03 Issue, 4 Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant 1, Mr.S.Vimalraj, 2, Gausalya.R.B, 3, Samyuktha.V,
An Intelligent Parking Guidance and Information System by using image processing technique
An Intelligent Parking Guidance and Information System by using image processing technique P.DharmaReddy 1, A. RajeshwarRao 2, Dr. Syed Musthak Ahmed 3 M. Tech Student, Embedded Systems, SR Engineering
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
RESEARCH ARTICLE OPEN ACCESS Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module M. Gireesh Kumar*, K. Sripath Roy** *Department of Electronics and Computer Engineering, KL University, Guntur,
SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS
************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************
ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES
ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES ABSTRACT K. Krishnakanth 1 and P. Kavipriya 2 1 M.E Embedded Systems, Sathyabama University, Chennai, India. [email protected]
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle
C Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle Hou-Tsan Lee, Wei-Chuan Lin, Jing-Siang Huang Department of Information Technology, TakMing University of Science and Technology
Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.
EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management
WHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
Development of Industrial Intrusion Detection and Monitoring Using Internet of Things P. Gokul Sai Sreeram 1, Chandra Mohan Reddy Sivappagari 2
Development of Industrial Intrusion Detection and Monitoring Using Internet of Things P. Gokul Sai Sreeram 1, Chandra Mohan Reddy Sivappagari 2 Abstract The need for deployment of security systems rapidly
Autos Limited Ghana Vehicle Tracking Business Proposal
Autos Limited Ghana Vehicle Tracking Business Proposal Executive Summary Our Understanding of Your Goals We understand that you or your business needs to monitor all your vehicles or company's to minimize
An Embedded Based Web Server Using ARM 9 with SMS Alert System
An Embedded Based Web Server Using ARM 9 with SMS Alert System K. Subbulakshmi 1 Asst. Professor, Bharath University, Chennai-600073, India 1 ABSTRACT: The aim of our project is to develop embedded network
E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY
E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY 1 Dr. S. Padmapriya M.E., PhD Head of the Department (IT) 1 [email protected] 2 R. Siva Kumar M.Tech Assistant Professor
7a. System-on-chip design and prototyping platforms
7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit
Development of a GSM based Control System for Electrical Appliances
International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 Development of a GSM based Control System for Electrical Appliances Oke A. O., Emuoyibofarhe J. O., Adetunji A. B. Department
Design and Implementation of an Accidental Fall Detection System for Elderly
Design and Implementation of an Accidental Fall Detection System for Elderly Enku Yosef Kefyalew 1, Abubakr Rahmtalla Abdalla Mohamed 2 Department of Electronic Engineering, Tianjin University of Technology
Conductor less Bus Ticketing System Using RFID and Accident Information through GPS and GSM
P P P IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2 Issue 9, September 2015. Conductor less Bus Ticketing System Using RFID and Accident Information through GPS
