SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
M. Cheenya et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

RFID Based System for Pilgrim Management in Major Religions
Phases and Festivals
M. Cheenya1, B. Muralidhar Naick2, G. Shirisha3
123

(Asst.prof in ECE Department) Mahaveer Institute of Science and Technology, bandlaguda, Hyderabad.A.P.

Abstract
Millions of pilgrims arrive every year to different places for religious reasons all over the countries. Managing
this large number of pilgrims from different nations and various cultures in a short period of time is not easy at
transport terminals like airports, railway stations and bus stations.In addition, due to the many steps that a
pilgrim has to go over and the different agencies that he/she needs to deal with, pilgrims satisfaction for the
services provided may not be at major religions phases and also their safety. Therefore, it is important to
improve the current system in order to increase pilgrims’ satisfaction and to increase the efficiency of the
management system. It needs to utilize new technological solutions to increase the efficiency of the process of
receiving, guiding, and managing pilgrims. We propose a system to manage pilgrims at pilgrimage using the
RFID technology. In this system, each pilgrim is given an ID card with a unique number. This card is used to
identify the pilgrim in different stages of the arrival process. The proposed system helps officials registering
pilgrims, editing their information, and searching for them.
In this work, we use different modules at such as RFID module, LPC2148 as controller, mode selection switch,
H-Bridge, DC Motor, a buzzer and 16X2 LCD is used to have the display of the person if he/she is authorized or
unauthorized.
Keywords: H-Bridge converter, Micro controller LPC214, RFID, IR sensor, DC Motor.

I.

Introduction

In major religions phase and festivals like
Kumbhamela, Char Dham, Shabarimalayi and Ajmeer
etc,where pilgrim all over the countries.There is likely
that in their Airports,Railway stations and Bus
Stations terminal encounter heavy pilgrims. Kumbh
Mela is a major Hindu religious festival that is held
every 3 years in 4 rotating places. The 2013 event is
considered a Maha Kumbh Mela,

which comes around only once every 144 years. It
lasts 55 days and is expected to be attended by 100
million pilgrims, making it the largest temporary
gathering of people in the world. A temporary city
covering an area larger than Athens was set up to
accommodate the crowds. Sunday, 10 February was
considered the most auspicious day and 30 million
people descended to Allahabad to bathe at the
confluence of the Yamuna and the Ganges rivers. Due
to the huge number of attendees stampedes are
relatively common during Kumbh Mela festivals.
The Kumbh Mela stampede was the deadliest since
India's independence, with an estimated more than
www.ijera.com

fifteen thousand deaths from 1954 to 2013.
Kumbhamela, Char Dham, Shabarimalayi and Ajmeer
etc, where pilgrim all over the countries. There is
likely that in their Airports, Railway stations and Bus
Stations terminal encounter heavy pilgrims.
Managing this huge number of pilgrims from
different nations,various cultures and various places
in a short period of time is not easy at transport
terminals and their safety and other organizations
also.It needs to utilize new technological solutions to
increase the efficiency of the process of receiving and
managing pilgrims at transports( Airports or Railway
Stastions or Bus Stations).
In this RFID system, each pilgrim is given an ID
card with a unique number. This card is used to
identify the pilgrim in different stages of the arrival
process. The proposed system helps officials
registering pilgrims, editing their information, and
searching for them and counting them at a certain
areas of airports, railway stations and Bus stations.
The proposed system also provides access controlling.

II.

IR SENSOR

The principle of IR sensor is totally based on
change in resistance of IR receiver which is similar to
LDR (light dependent register) and reflection of
light.Here in this sensor we connect IR receiver in
reverse bias so it give very high resistance if it is not
exposed to IR light. The resistance in this case is in
range of Mega ohms but when IR light reflected back

2060 | P a g e
M. Cheenya et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066
and falls on IR receiver. The resistance of Rx it comes
in range between Kilo ohms to hundred of ohms.
We convert this change in resistance to change in
voltage. Then this voltage is applied to a comparator
IC which compare it with a threshold level if voltage
of sensor is more than threshold then output is high
else it is low which can be used directly for
microcontroller.
IR transmitter and receiver
IR LED is used as a source of infrared rays.
It comes in two packages 3mm or 5mm. 3mm is
better as it is requires less space. IR sensor is nothing
but a diode, which is sensitive for infrared
radiation. This infrared transmitter and receiver are
called as IR TX-RX pair. Color of IR transmitter and
receiver is different.

www.ijera.com

switches and closing S2 and S3 switches, this voltage
is reversed, allowing reverse operation of the motor.
Using the nomenclature above, the switches S1 and
S2 should never be closed at the same time, as this
would cause a short circuit on the input voltage
source. The same applies to the switches S3 and S4.
This condition is known as shoot-through.
Operation
The H-Bridge arrangement is generally used
to reverse the polarity of the motor, but can also be
used to 'brake' the motor, where the motor comes to a
sudden stop, as the motors terminals are shorted, or to
let the motor 'free run' to a stop, as the motor is
effectively disconnected from the circuit. The
following table summarizes operation.
Table no 1 H-Bridge Truth Table

How to identify IR Tx and Rx
 Connect cathode of one LED to positive
terminal of DMM (digital multi-meter)
 Connect anode of the same LED to common
terminal of DMM
 Set DMM to measure resistance up to 2M
Ohm. Check the reading.
 Repeat above procedure with second LED.
In above process, when you get the reading
of the few hundred Kilo Ohms on DMM, then it
indicated that LED that you are testing is IR sensor.
 In case of IR transmitter DMM will not
show any reading

III.

H-BRIDGE CONVERTER

An H-bridge is an electronic circuit which
enables DC electric motors to be run forwards or
backwards.

These circuits are often used in robotics. Hbridges are available as integrated circuits, or can be
built from discrete components. The two basic states
of a H-bridge. The term "H-bridge" is derived from
the typical graphical representation of such a circuit.
An H-bridge is built with four switches (solid-state or
mechanical). When the switches S1 and S4
(according to the first figure) are closed (and S2 and
S3 are open) a positive voltage will be applied across
the motor by opening (S1 and S4).When the switches
S1 and S4 (according to the first figure) are closed
(and S2 and S3 are open) a positive voltage will be
applied across the motor. By opening S1 and S4

www.ijera.com

S1
1

S2
0

S3
0

S4
1

0

1

1

0

0

0

0

0

0

1

0

1

Result
Motor
moves right
Motor
moves left
Motor free
runs
Motor
brakes

Speed Control by Full H Bridge
A simple motor circuit connects power
supply through a switch MOSFET. A pulse with fixed
frequency is generated by the microcontroller, which
is fed to the base of transistor. Transistor acts here as
a switch. The output voltage of the motor is
dependent on the amount of the ON time of the
transistor. The more time transistor remains ON, more
the voltage will produce. A Freewheeling diode is
used for back e.m.f. protection. When the switch Q1
is closed, 12 Volts is applied to the motor, and when
it is open, 0 Volts is applied. If the switch is open for
the same amount of time as it is closed, the motor will
see an average of 6 Volts.

Fig 3.1 Simple Motor Circuit
The on-off switching is performed by a
power MOSFET, a device that can turn very large
currents on and off under the control of a low signal
level voltage As the amount of time that the voltage is
2061 | P a g e
M. Cheenya et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066
on increases compared with the amount of time that it
is off, the average speed of motor increases and vice
versa.

operate continuously. Typically, while one instruction
is being executed, its successor is being decoded, and
a third instruction is being fetched from memory.

V.

Fig 3.2 Relation of Supply Voltage with Motor Speed

IV.

Micro Controller

The data received from RFID reader is
interfaced to pin 11 of LPC2148. The received input
is checked and verified according to stored data in
EEPROM in-built memoryThe LPC2148 is based on
a 32-bit ARM7TDMI-CPU with real-time emulation
and embedded trace support that combine
microcontroller with embedded high speed flash
memory ranging from 32 kB to 512 kB. A 128-bit
wide memory interface and unique accelerator
architecture enable 32-bit code execution at the
maximum clock rate.
The 16-bit Thumb mode reduces code by
more than 30 %. Serial communications interfaces
ranging from a USB 2.0 Full-speed device, multiple
UARTs, In-system programming flash memory, SPI,
SSP to I2C-bus and on-chip SRAM of 8 kB up to 40
kB, various 32-bit timers, single or dual 10-bit
ADC(s), 10-bit DAC, PWM channels and 45 fast
GPIO lines with up to nine edge or level sensitive
external interrupt pins make this microcontroller
suitable for industrial control and medical systems.
The ARM7TDMI-S is a general purpose 32-bit
microcontroller, which offers high performance and
very low power consumption. The ARM architecture
is based on Reduced Instruction Set Computer (RISC)
principles.

Fig 4.1 LPC2148 Microcontroller
Pipeline techniques are employed so that all
parts of the processing and memory systems can
www.ijera.com

www.ijera.com

RFID BLOCK DIAGRAM

The RFID based system requires much
functionality that has to be coordinated for efficient
operation. The RFID reader must interrogate the
RFID tag and RFID tag respond for RFID reader
signal.Then verify the RFID tag data for pilgrim
identification with in-built EEPROM memory data by
microcontroller. A visual display of pilgrim
information and sound of a buzzer must be
provided.Sensor unit for counting the number of
pilgrims at transport terminals and drive section unit
should process access control of gates at transport
terminals.

Fig.5.1.Block Diagram of RFID Based System
Keeping in view the above considerations,
the RFID based system for the pilgrim management is
designed with the power supply is required for RFID
based system.RFID tag and RFID reader for
identification of the pilgrim at transport terminals.DC
Geared Motor with 60 RPM for access control at
transport terminals gates.H-bridge motor driver IC is
used to drive the DC motor in different
directions.LCD HD44780 16-character, 2-line (16X2)
is used to display the information about pilgrims.IR
sensor is used to counting the number of pilgrims at
transport terminals.Buzzer is used to indicate the
unauthorized pilgrims. Mode selection switch is used
to selects the operation.
PILGRIM IDENTIFICATION
In this proposed system, a radio-frequency
identification system uses tags for identification.
RFID reader transmits an encoded radio signal to
interrogate the tag, when tag near to the RFID
reader.The tag receives the message and responds
with its identification information.
RFID reader sends this identification
information to microcontroller and according to the
signal received by microcontroller and it will send a
signal to LCD display, which displays welcome
message and pilgrim’s name else to the buzzer to
indicates unauthorized person. Because RFID readers
2062 | P a g e
M. Cheenya et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066

www.ijera.com

signal information verifies with the data of in-built
EEPROM memory prestored information about
pilgrim. This verification is done by microcontroller.

Fig 5.4 IR Sensor for counting the number of pilgrims
Fig 5.2 RFID Based System for Pilgrim Identification
Access Control
If mode selection switch selects for RFID
system operation. RFID reader sends the
identification information to microcontroller, which is
response of the RFID tag. Microcontroller verifies
received signal from RFID reader with the data of inbuilt memory and it gives output to LCD display as
well as DC motor. DC motor receives the signal from
microcontroller through H-bridge circuit.
Microcontroller controls DC motor through
h-bridge circuit according to its received signal from
RFID reader. H-bridge circuit has four switches. All
switches will open then DC motor rotates in ante clockwise direction (opening the door) and .any two
of four switches will close then DC motor rotates in
clockwise direction (closing the door) .

VI.

RFID SYSTEM

6.1Fig.RFID designed system for piligrim
identification.
Radio-frequency identification (RFID) is an
automatic detection method, relying on storing and
remotely retrieving data using devices called RFID
tags or transponders. The technology requires some
extent of cooperation of an RFID reader and an RFID
tag.

Fig 5.3 RFID Based System for Access Control.
Counting the pilgrims
IF mode selection switch selects counting
mode. An IR sensor detects the number of pilgrims,
who are entriesor leaves the pilgrimage.IR sensor has
one transmitter and receiver.IR transmitter emits the
LED signal continously. If LED signal crossed by
pilgrim, then it reflects back. Reflected signal
received by IR receiver.IR receiver gives reflected
signal to microcontroller. Microcontroller controls the
reflected signal and it sends a signal to LCD display,
which displays number of pilgrims.

www.ijera.com

Fig. 6.2 RFID System
Working of RFID system
A radio-frequency identification system uses
tags, or labels attached to the objects to be identified.
Two-way
radio
transmitter-receivers
called
interrogators or readers send a signal to the tag and
read its response. The readers generally transmit their
observations to a computer system running RFID
software or RFID middleware.The tag's information
is stored electronically in a non-volatile memory. The
RFID tag includes a small RF transmitter and
receiver.
2063 | P a g e
M. Cheenya et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066
RFID reader transmits an encoded radio
signal to interrogate the tag.The tag receives the
message and responds with its identification
information. This may be only a unique tag serial
number, or may be product-related information such
as a stock number, lot or batch number, production
date, or other specific information.The interrogator
must be close for RF field to be strong enough to
transfer sufficient power to the tag. Since tags have
individual serial numbers, the RFID system design
can discriminate several tags that might be within the
range of the RFID reader and read them
simultaneously.

www.ijera.com

distance of a few centimeters. Of course, the mu-chip
is a passive tag. With a larger antenna it could have a
significantly longer reading range.
Other small tags are the implantable tags the
size of a grain of rice manufactured by VeriChip.
Like the mu-chip, these passive tags have a very
limited reading range; their intended application is to
give machine-readable serial numbers to people. The
chips can be used to authenticate people in highsecurity environments—unlike passwords, the
implanted chips can’t be easily shared.
RFID tags can be promiscuous, in which
case they will communicate with any reader.
Alternatively, they can be secure, requiring that the
reader provide a password or other kind of
authentication credential before the tags respond. The
vast majority of RFID tags that have been deployed
are promiscuous. Not only are these tags cheaper, but
the systems also are much easier to manage. Systems
that employ passwords or encryption codes require
that the codes be distributed in advance and properly
controlled. This is an exceedingly difficult
management problem.

Fig.6.3 RFID Tag
The tag is the basic building block of RFID.
Each tag consists of an antenna and a small silicon
chip that contains a radio receiver, a radio modulator
for sending a response back to the reader, control
logic, some amount of memory and a power system.
The power system can be completely powered by the
incoming RF signal, in which case the tag is known as
a passive tag. Alternatively, the tag’s power system
can have a battery, in which case the tag is known as
an active tag.
Fig.6.5 Electronic Product Code of a Tag

Fig.6.4 .RFID tag
Passive tags, on the other hand, can be much
smaller and cheaper than active ones because they
don’t have batteries. Another advantage is their
longer shelf life: Whereas an active tag’s batteries
may last only a few years, a passive tag could in
principle be read many decades after the chip was
manufactured.
Tags come in all shapes and sizes. The
smallest tag that has ever been produced is the Hitachi
mu-chip, which is less than 0.4mm on a side.
Designed to be embedded in a piece of paper and
used for tracking documents printed in an office
environment, the mu-chip can be read only at a
www.ijera.com

An Electronic Product Code (EPC) is one
common type of data stored in a tag. When written
into the tag by an RFID printer, the tag contains a 96bit string of data. The first eight bits are a header
which identifies the version of the protocol. The next
28 bits identify the organization that manages the data
for this tag; the organization number is assigned by
the EPC Global consortium. The next 24 bits are an
object class, identifying the kind of product; the last
36 bits are a unique serial number for a particular tag.
Identify a particular product.
RFID tags can interfere with each other.
When multiple tags are present in a reader’s field, the
reader may be unable to decipher the signals from the
tags. The systems are optimized so that only one tag
is within range at a time. However, for other
applications, reading multiple tags at once is essential.
For these applications, the tags need to support either
an anticollision protocol or, more commonly, a
singulation protocol. A singulation protocol allows a
reader to determine that multiple tags are visible and
to iterate through the tags, getting them to take turns
2064 | P a g e
M. Cheenya et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066

www.ijera.com

responding so that each may be read without
interference from the others.
RFID Readers
The RFID reader sends a pulse of radio
energy to the tag and listens for the tag’s response.
The tag detects this energy and sends back a response
that contains the tag’s serial number and possibly
other information as well. In simple RFID systems,
the reader’s pulse of energy functioned as an on-off
switch; in more sophisticated systems, the reader’s
RF signal can contain commands to the tag,
instructions to read or write memory that the tag
contains, and even passwords. RFID readers were
designed to read only a particular kind of tag, but socalled multimode readers that can read many different
kinds of tags are becoming increasingly popular.

Fig.7.1Identificetion of pilgrim

Fig. 7.2.Access control of RFID based System

Fig.6.6 RFID Reader
RFID readers are usually on, continually
transmitting radio energy and awaiting any tags that
enter their field of operation. However, for some
applications, this is unnecessary and could be
undesirable in battery-powered devices that need to
conserve energy. Thus, it is possible to configure an
RFID reader so that it sends the radio pulse only in
response to an external event.
Like the tags themselves, RFID readers
come in many sizes. The largest readers might consist
of a desktop personal computer with a special card
and multiple antennas connected to the card through
shielded cable. Such a reader would typically have a
network connection as well so that it could report tags
that it reads to other computers. The smallest readers
are the size of a postage stamp and are designed to be
embedded in mobile telephones.

VII.

RESULT

Pilgrim identification, which can be guided
by RF communication, was developed. The pilgrim
management by counting them using IR sensor and
access controlling them uses DC motor at transport
terminals. The result obtained clearly demonstrates
that the system is easy to handle by the pilgrimage
officers.

www.ijera.com

Fig 7.3.Identification of Unauthorized Pilgrim

Fig.7.4 .Counting the Number of pilgrims

2065 | P a g e
M. Cheenya et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066
Table no 2 Observations of RFID Based System
No. of
pilgri
ms

Pilgrim
Identification

language

Tag Serial
number

John pasha

Urdu

Ramu

Telugu

Robinson

English

0007044836
107,32490
0008740192
133,23904
0005628646
085,58086
0007044836
107,32484
0005671270
438,45383

1
2
3
Unauthorized
person
Unauthorized
person

-

VIII.

-

Conclusion

The implementation of RFID Based System
for Pilgrim Management in Major Religions and
Festivals‖ was achieved by integrating various
features of hardware components. With careful
selection and signal interface design, every module
has been integrated into the controller enabling it to
work optimally and with low power consumption,
thereby increasing the time between charging of the
battery and extending usage intervals. The main goal
of this proposed system to allow officials in major
events to idenify, search and group pilgrims to
facilitate transporting them to the pilgrimage.
The presented system can be adapted with
necessary modification for pilgrim identification,
counting and managing them.

REFERENCES
[1]

[2]

[3]

[4]

[5]

Klaus Finkenzeller, RFID Handbook:
Fundamentals
and
Applications
in
Contactless Smart Cards and Identification,
Translated by Rachel Waddington, 2nd
edition, John Wiley & Sons Ltd, 2003.
Grady Booch, James Rumbaugh, and Ivar
Jacobson, The Unified Modeling Language
User Guide, 1st edition, Addison-Wesley
Longman Inc, 1999.
Nasser M. Al-Biqami and Hassanin M. AlBarhamtoshy, ―RFID Technology and
Applications for National Security,‖ in
Proceedings of the Information Technology
and National Security Conference, Riyadh,
Dec. 2007, pp. 2355 – 2379.
Mohamed Mohandes, ―A Case Study of an
RFID-based
System
for
Pilgrims
Identification and Tracking,‖ in Sustainable
Radio Frequency Identification Solutions,
InTech, Feb. 2010, pp. 87 – 104.
Mohammad Yamin, Masoud Mohammadian,
Xu Huang, and Dharmendra Sharma, ―RFID
Technology
and
Crowded
Event
Management,‖ in Proceedings of the 2008
International Conference on Computational
Intelligence for Modelling Control &

www.ijera.com

[6]

www.ijera.com

Automation, Vienna, Dec. 2008, pp. 1293 –
1297.
Mohammad Yamin and Yasser Ades,
―Crowd Management with RFID & Wireless
Technologies,‖ in Proceedings of the First
International Conference on Networks and
Communications (NETCOM '09), Chennai,
Dec. 2009, pp. 439 – 442.

About Authors:

M.Cheenya, he is received M.Tech(Digital
electronics&communication systems) degree from
JNTU Hyderabad in 2010, now he is working as Asst.
Professor in MIST, Department of Electronics&
communication Engg, Hyderabad, A.P.

B.MuralidharNaick, he is received
M.Tech(Embedded systems) degree from JNTU
Hyderabad in 2013, now he is working as Asst.
Professor in MIST, Department of Electronics&
communication Engg, Hyderabad, A.P.

G.Shirisha,
she
is
received
M.Tech(Embedded systems) degree from JNTU
Hyderabad in 2013, now she is working as Asst.
Professor in MIST, Department of Electronics&
communication Engg, Hyderabad, A.P.

2066 | P a g e

Weitere Àhnliche Inhalte

Was ist angesagt?

Iaetsd automated bus monitoring and ticketing system
Iaetsd automated bus monitoring and ticketing systemIaetsd automated bus monitoring and ticketing system
Iaetsd automated bus monitoring and ticketing systemIaetsd Iaetsd
 
AUTOMATIC RAILWAY GATE AND SIGNALLING SYSTEM
AUTOMATIC RAILWAY GATE AND SIGNALLING SYSTEMAUTOMATIC RAILWAY GATE AND SIGNALLING SYSTEM
AUTOMATIC RAILWAY GATE AND SIGNALLING SYSTEMBiprajitSarkar
 
IRJET- Smart Ambulance Movement and Monitoring System using GSM and RFID ...
IRJET-  	  Smart Ambulance Movement and Monitoring System using GSM and RFID ...IRJET-  	  Smart Ambulance Movement and Monitoring System using GSM and RFID ...
IRJET- Smart Ambulance Movement and Monitoring System using GSM and RFID ...IRJET Journal
 
Rfid ticketing paper
Rfid ticketing paperRfid ticketing paper
Rfid ticketing paperdungjeep
 
Controlling Robotic Vehicle With IR Remote
Controlling Robotic Vehicle With IR RemoteControlling Robotic Vehicle With IR Remote
Controlling Robotic Vehicle With IR RemoteEdgefxkits & Solutions
 
Gesture control robot using accelerometer ppt
Gesture control robot using accelerometer pptGesture control robot using accelerometer ppt
Gesture control robot using accelerometer pptRajendra Prasad
 
Hi-Tech Hospital
Hi-Tech HospitalHi-Tech Hospital
Hi-Tech HospitalIRJET Journal
 
Presentation1
Presentation1Presentation1
Presentation1Paras Mishra
 
7380969 Line Follower Using At89c51
7380969 Line Follower Using At89c517380969 Line Follower Using At89c51
7380969 Line Follower Using At89c51biharimukund
 
RFID based car PARKING SYSTEM
RFID based car PARKING SYSTEM  RFID based car PARKING SYSTEM
RFID based car PARKING SYSTEM Kunal Kabra
 
automatic rail gate control with collision avoidance
automatic rail gate control with collision avoidanceautomatic rail gate control with collision avoidance
automatic rail gate control with collision avoidanceRaj Anand
 
Railway level crossing gate operation remotely by android
Railway level crossing gate operation remotely by androidRailway level crossing gate operation remotely by android
Railway level crossing gate operation remotely by androidEdgefxkits & Solutions
 
IRJET- Smart Trolley with Automated Billing System
IRJET- Smart Trolley with Automated Billing SystemIRJET- Smart Trolley with Automated Billing System
IRJET- Smart Trolley with Automated Billing SystemIRJET Journal
 
Line follower robot
Line follower robotLine follower robot
Line follower robotPriya Hada
 
IRJET- Smart Automatized IoT based E-Petrol Pump
IRJET-  	  Smart Automatized IoT based E-Petrol PumpIRJET-  	  Smart Automatized IoT based E-Petrol Pump
IRJET- Smart Automatized IoT based E-Petrol PumpIRJET Journal
 
GhostRunnerFinalReport
GhostRunnerFinalReportGhostRunnerFinalReport
GhostRunnerFinalReportEthan Perbohner
 
IRJET- Design and Implementation of Driverless Car using Machine Learning
IRJET- Design and Implementation of Driverless Car using Machine LearningIRJET- Design and Implementation of Driverless Car using Machine Learning
IRJET- Design and Implementation of Driverless Car using Machine LearningIRJET Journal
 

Was ist angesagt? (20)

Iaetsd automated bus monitoring and ticketing system
Iaetsd automated bus monitoring and ticketing systemIaetsd automated bus monitoring and ticketing system
Iaetsd automated bus monitoring and ticketing system
 
AUTOMATIC RAILWAY GATE AND SIGNALLING SYSTEM
AUTOMATIC RAILWAY GATE AND SIGNALLING SYSTEMAUTOMATIC RAILWAY GATE AND SIGNALLING SYSTEM
AUTOMATIC RAILWAY GATE AND SIGNALLING SYSTEM
 
IRJET- Smart Ambulance Movement and Monitoring System using GSM and RFID ...
IRJET-  	  Smart Ambulance Movement and Monitoring System using GSM and RFID ...IRJET-  	  Smart Ambulance Movement and Monitoring System using GSM and RFID ...
IRJET- Smart Ambulance Movement and Monitoring System using GSM and RFID ...
 
Rfid ticketing paper
Rfid ticketing paperRfid ticketing paper
Rfid ticketing paper
 
DLD-LAB-PROPOSAL
DLD-LAB-PROPOSALDLD-LAB-PROPOSAL
DLD-LAB-PROPOSAL
 
Controlling Robotic Vehicle With IR Remote
Controlling Robotic Vehicle With IR RemoteControlling Robotic Vehicle With IR Remote
Controlling Robotic Vehicle With IR Remote
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
Gesture control robot using accelerometer ppt
Gesture control robot using accelerometer pptGesture control robot using accelerometer ppt
Gesture control robot using accelerometer ppt
 
Hi-Tech Hospital
Hi-Tech HospitalHi-Tech Hospital
Hi-Tech Hospital
 
Presentation1
Presentation1Presentation1
Presentation1
 
Line follower robot
Line follower robotLine follower robot
Line follower robot
 
7380969 Line Follower Using At89c51
7380969 Line Follower Using At89c517380969 Line Follower Using At89c51
7380969 Line Follower Using At89c51
 
RFID based car PARKING SYSTEM
RFID based car PARKING SYSTEM  RFID based car PARKING SYSTEM
RFID based car PARKING SYSTEM
 
automatic rail gate control with collision avoidance
automatic rail gate control with collision avoidanceautomatic rail gate control with collision avoidance
automatic rail gate control with collision avoidance
 
Railway level crossing gate operation remotely by android
Railway level crossing gate operation remotely by androidRailway level crossing gate operation remotely by android
Railway level crossing gate operation remotely by android
 
IRJET- Smart Trolley with Automated Billing System
IRJET- Smart Trolley with Automated Billing SystemIRJET- Smart Trolley with Automated Billing System
IRJET- Smart Trolley with Automated Billing System
 
Line follower robot
Line follower robotLine follower robot
Line follower robot
 
IRJET- Smart Automatized IoT based E-Petrol Pump
IRJET-  	  Smart Automatized IoT based E-Petrol PumpIRJET-  	  Smart Automatized IoT based E-Petrol Pump
IRJET- Smart Automatized IoT based E-Petrol Pump
 
GhostRunnerFinalReport
GhostRunnerFinalReportGhostRunnerFinalReport
GhostRunnerFinalReport
 
IRJET- Design and Implementation of Driverless Car using Machine Learning
IRJET- Design and Implementation of Driverless Car using Machine LearningIRJET- Design and Implementation of Driverless Car using Machine Learning
IRJET- Design and Implementation of Driverless Car using Machine Learning
 

Andere mochten auch

Lu3620212028
Lu3620212028Lu3620212028
Lu3620212028IJERA Editor
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041IJERA Editor
 
Lq3620002008
Lq3620002008Lq3620002008
Lq3620002008IJERA Editor
 
Lz3620532059
Lz3620532059Lz3620532059
Lz3620532059IJERA Editor
 
Lx3620422047
Lx3620422047Lx3620422047
Lx3620422047IJERA Editor
 
Mb3620672070
Mb3620672070Mb3620672070
Mb3620672070IJERA Editor
 
Lr3620092012
Lr3620092012Lr3620092012
Lr3620092012IJERA Editor
 
Mc3620712075
Mc3620712075Mc3620712075
Mc3620712075IJERA Editor
 
Lo3619861992
Lo3619861992Lo3619861992
Lo3619861992IJERA Editor
 
Ly3620482052
Ly3620482052Ly3620482052
Ly3620482052IJERA Editor
 
Lp3619931999
Lp3619931999Lp3619931999
Lp3619931999IJERA Editor
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016IJERA Editor
 
Shell Technology Futures 2004
Shell Technology Futures 2004Shell Technology Futures 2004
Shell Technology Futures 2004Tim Jones
 
Monitoring the Digital World – Demystifying Customer Experience
Monitoring the Digital World – Demystifying Customer ExperienceMonitoring the Digital World – Demystifying Customer Experience
Monitoring the Digital World – Demystifying Customer ExperienceImran Shah
 
A Study of Wireless Technology Based Pilgrim Tracking Systems
A Study of Wireless Technology Based Pilgrim Tracking SystemsA Study of Wireless Technology Based Pilgrim Tracking Systems
A Study of Wireless Technology Based Pilgrim Tracking Systemsdeepakiitr15
 
Inteligensia muslim dan kuasa
Inteligensia muslim dan kuasaInteligensia muslim dan kuasa
Inteligensia muslim dan kuasayogi prasetya
 
Clinical audit
Clinical audit Clinical audit
Clinical audit faheta
 
RFID Basics
RFID BasicsRFID Basics
RFID Basicsfizzyjazzy
 

Andere mochten auch (20)

Lu3620212028
Lu3620212028Lu3620212028
Lu3620212028
 
Lw3620362041
Lw3620362041Lw3620362041
Lw3620362041
 
Lq3620002008
Lq3620002008Lq3620002008
Lq3620002008
 
Lz3620532059
Lz3620532059Lz3620532059
Lz3620532059
 
Lx3620422047
Lx3620422047Lx3620422047
Lx3620422047
 
Mb3620672070
Mb3620672070Mb3620672070
Mb3620672070
 
Lr3620092012
Lr3620092012Lr3620092012
Lr3620092012
 
Mc3620712075
Mc3620712075Mc3620712075
Mc3620712075
 
Lo3619861992
Lo3619861992Lo3619861992
Lo3619861992
 
Ly3620482052
Ly3620482052Ly3620482052
Ly3620482052
 
Lp3619931999
Lp3619931999Lp3619931999
Lp3619931999
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
 
Shell Technology Futures 2004
Shell Technology Futures 2004Shell Technology Futures 2004
Shell Technology Futures 2004
 
Monitoring the Digital World – Demystifying Customer Experience
Monitoring the Digital World – Demystifying Customer ExperienceMonitoring the Digital World – Demystifying Customer Experience
Monitoring the Digital World – Demystifying Customer Experience
 
A Study of Wireless Technology Based Pilgrim Tracking Systems
A Study of Wireless Technology Based Pilgrim Tracking SystemsA Study of Wireless Technology Based Pilgrim Tracking Systems
A Study of Wireless Technology Based Pilgrim Tracking Systems
 
Inteligensia muslim dan kuasa
Inteligensia muslim dan kuasaInteligensia muslim dan kuasa
Inteligensia muslim dan kuasa
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Clinical audit
Clinical audit Clinical audit
Clinical audit
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 

Ähnlich wie Ma3620602066

Gesture Control Robot using Arduino
Gesture Control Robot using ArduinoGesture Control Robot using Arduino
Gesture Control Robot using Arduinoijtsrd
 
Tunnel robot ppt
Tunnel robot pptTunnel robot ppt
Tunnel robot pptshakshi58
 
8051 Microcontroller-Based Intelligent-Lifeline Ambulance Route Clearing
8051 Microcontroller-Based Intelligent-Lifeline Ambulance Route Clearing8051 Microcontroller-Based Intelligent-Lifeline Ambulance Route Clearing
8051 Microcontroller-Based Intelligent-Lifeline Ambulance Route ClearingIRJET Journal
 
Hand gesture controlled robot
Hand gesture controlled robotHand gesture controlled robot
Hand gesture controlled robotManav Chauhan
 
Automation of Railway Gate and Road traffic using Internet of Things (IoT)
Automation of Railway Gate and Road traffic using Internet of Things (IoT)Automation of Railway Gate and Road traffic using Internet of Things (IoT)
Automation of Railway Gate and Road traffic using Internet of Things (IoT)IRJET Journal
 
Hand Gesture Control Robot
Hand Gesture Control RobotHand Gesture Control Robot
Hand Gesture Control RobotIRJET Journal
 
Steering Control Adaptive Headlight using Sensor
Steering Control Adaptive Headlight using SensorSteering Control Adaptive Headlight using Sensor
Steering Control Adaptive Headlight using Sensorijtsrd
 
Time Based Smart Speed Breaker using Embedded Systems
Time Based Smart Speed Breaker using Embedded SystemsTime Based Smart Speed Breaker using Embedded Systems
Time Based Smart Speed Breaker using Embedded Systemsijtsrd
 
AUTOMATIC ACCELERATION CONTROL IN TRAFFIC SIGNAL/SCHOOL ZONE
AUTOMATIC ACCELERATION CONTROL IN TRAFFIC SIGNAL/SCHOOL ZONEAUTOMATIC ACCELERATION CONTROL IN TRAFFIC SIGNAL/SCHOOL ZONE
AUTOMATIC ACCELERATION CONTROL IN TRAFFIC SIGNAL/SCHOOL ZONEIRJET Journal
 
Design and implementation of autonomous maneuvering robotic vehicle using glo...
Design and implementation of autonomous maneuvering robotic vehicle using glo...Design and implementation of autonomous maneuvering robotic vehicle using glo...
Design and implementation of autonomous maneuvering robotic vehicle using glo...eSAT Publishing House
 
IRJET- Charging Station for Electric Vehicles using RF Module
IRJET-  	  Charging Station for Electric Vehicles using RF ModuleIRJET-  	  Charging Station for Electric Vehicles using RF Module
IRJET- Charging Station for Electric Vehicles using RF ModuleIRJET Journal
 
Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...
Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...
Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...IJERA Editor
 
Intelligent vehicle control based on identification of
Intelligent vehicle control based on identification ofIntelligent vehicle control based on identification of
Intelligent vehicle control based on identification ofeSAT Publishing House
 
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...IRJET Journal
 
IRJET- Eco Friendly Bus
IRJET- Eco Friendly BusIRJET- Eco Friendly Bus
IRJET- Eco Friendly BusIRJET Journal
 
ArduinoBased Head GestureControlled Robot UsingWireless Communication
ArduinoBased Head GestureControlled Robot UsingWireless CommunicationArduinoBased Head GestureControlled Robot UsingWireless Communication
ArduinoBased Head GestureControlled Robot UsingWireless CommunicationIJERA Editor
 
IRJET - Vehicle Commencement Process using Fingerprint with Speed Locking Sys...
IRJET - Vehicle Commencement Process using Fingerprint with Speed Locking Sys...IRJET - Vehicle Commencement Process using Fingerprint with Speed Locking Sys...
IRJET - Vehicle Commencement Process using Fingerprint with Speed Locking Sys...IRJET Journal
 
IRJET- Wireless Charging Station for Electric Vehicle
IRJET- Wireless Charging Station for Electric VehicleIRJET- Wireless Charging Station for Electric Vehicle
IRJET- Wireless Charging Station for Electric VehicleIRJET Journal
 

Ähnlich wie Ma3620602066 (20)

Gesture Control Robot using Arduino
Gesture Control Robot using ArduinoGesture Control Robot using Arduino
Gesture Control Robot using Arduino
 
Tunnel robot ppt
Tunnel robot pptTunnel robot ppt
Tunnel robot ppt
 
8051 Microcontroller-Based Intelligent-Lifeline Ambulance Route Clearing
8051 Microcontroller-Based Intelligent-Lifeline Ambulance Route Clearing8051 Microcontroller-Based Intelligent-Lifeline Ambulance Route Clearing
8051 Microcontroller-Based Intelligent-Lifeline Ambulance Route Clearing
 
Hand gesture controlled robot
Hand gesture controlled robotHand gesture controlled robot
Hand gesture controlled robot
 
Automation of Railway Gate and Road traffic using Internet of Things (IoT)
Automation of Railway Gate and Road traffic using Internet of Things (IoT)Automation of Railway Gate and Road traffic using Internet of Things (IoT)
Automation of Railway Gate and Road traffic using Internet of Things (IoT)
 
Hand Gesture Control Robot
Hand Gesture Control RobotHand Gesture Control Robot
Hand Gesture Control Robot
 
Steering Control Adaptive Headlight using Sensor
Steering Control Adaptive Headlight using SensorSteering Control Adaptive Headlight using Sensor
Steering Control Adaptive Headlight using Sensor
 
Time Based Smart Speed Breaker using Embedded Systems
Time Based Smart Speed Breaker using Embedded SystemsTime Based Smart Speed Breaker using Embedded Systems
Time Based Smart Speed Breaker using Embedded Systems
 
AUTOMATIC ACCELERATION CONTROL IN TRAFFIC SIGNAL/SCHOOL ZONE
AUTOMATIC ACCELERATION CONTROL IN TRAFFIC SIGNAL/SCHOOL ZONEAUTOMATIC ACCELERATION CONTROL IN TRAFFIC SIGNAL/SCHOOL ZONE
AUTOMATIC ACCELERATION CONTROL IN TRAFFIC SIGNAL/SCHOOL ZONE
 
Design and implementation of autonomous maneuvering robotic vehicle using glo...
Design and implementation of autonomous maneuvering robotic vehicle using glo...Design and implementation of autonomous maneuvering robotic vehicle using glo...
Design and implementation of autonomous maneuvering robotic vehicle using glo...
 
IRJET- Charging Station for Electric Vehicles using RF Module
IRJET-  	  Charging Station for Electric Vehicles using RF ModuleIRJET-  	  Charging Station for Electric Vehicles using RF Module
IRJET- Charging Station for Electric Vehicles using RF Module
 
Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...
Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...
Controlling and Reducing of Speed for Vehicles Automatically By Using Rf Tech...
 
Railway training ppt
Railway training pptRailway training ppt
Railway training ppt
 
Intelligent vehicle control based on identification of
Intelligent vehicle control based on identification ofIntelligent vehicle control based on identification of
Intelligent vehicle control based on identification of
 
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
A Low Cost Yet Super efficient Means to Prevent Overloading as Well as Accide...
 
IRJET- Eco Friendly Bus
IRJET- Eco Friendly BusIRJET- Eco Friendly Bus
IRJET- Eco Friendly Bus
 
ArduinoBased Head GestureControlled Robot UsingWireless Communication
ArduinoBased Head GestureControlled Robot UsingWireless CommunicationArduinoBased Head GestureControlled Robot UsingWireless Communication
ArduinoBased Head GestureControlled Robot UsingWireless Communication
 
IRJET - Vehicle Commencement Process using Fingerprint with Speed Locking Sys...
IRJET - Vehicle Commencement Process using Fingerprint with Speed Locking Sys...IRJET - Vehicle Commencement Process using Fingerprint with Speed Locking Sys...
IRJET - Vehicle Commencement Process using Fingerprint with Speed Locking Sys...
 
P275-279
P275-279P275-279
P275-279
 
IRJET- Wireless Charging Station for Electric Vehicle
IRJET- Wireless Charging Station for Electric VehicleIRJET- Wireless Charging Station for Electric Vehicle
IRJET- Wireless Charging Station for Electric Vehicle
 

KĂŒrzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...gurkirankumar98700
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 

KĂŒrzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍾 8923113531 🎰 Avail...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 

Ma3620602066

  • 1. M. Cheenya et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066 RESEARCH ARTICLE www.ijera.com OPEN ACCESS RFID Based System for Pilgrim Management in Major Religions Phases and Festivals M. Cheenya1, B. Muralidhar Naick2, G. Shirisha3 123 (Asst.prof in ECE Department) Mahaveer Institute of Science and Technology, bandlaguda, Hyderabad.A.P. Abstract Millions of pilgrims arrive every year to different places for religious reasons all over the countries. Managing this large number of pilgrims from different nations and various cultures in a short period of time is not easy at transport terminals like airports, railway stations and bus stations.In addition, due to the many steps that a pilgrim has to go over and the different agencies that he/she needs to deal with, pilgrims satisfaction for the services provided may not be at major religions phases and also their safety. Therefore, it is important to improve the current system in order to increase pilgrims’ satisfaction and to increase the efficiency of the management system. It needs to utilize new technological solutions to increase the efficiency of the process of receiving, guiding, and managing pilgrims. We propose a system to manage pilgrims at pilgrimage using the RFID technology. In this system, each pilgrim is given an ID card with a unique number. This card is used to identify the pilgrim in different stages of the arrival process. The proposed system helps officials registering pilgrims, editing their information, and searching for them. In this work, we use different modules at such as RFID module, LPC2148 as controller, mode selection switch, H-Bridge, DC Motor, a buzzer and 16X2 LCD is used to have the display of the person if he/she is authorized or unauthorized. Keywords: H-Bridge converter, Micro controller LPC214, RFID, IR sensor, DC Motor. I. Introduction In major religions phase and festivals like Kumbhamela, Char Dham, Shabarimalayi and Ajmeer etc,where pilgrim all over the countries.There is likely that in their Airports,Railway stations and Bus Stations terminal encounter heavy pilgrims. Kumbh Mela is a major Hindu religious festival that is held every 3 years in 4 rotating places. The 2013 event is considered a Maha Kumbh Mela, which comes around only once every 144 years. It lasts 55 days and is expected to be attended by 100 million pilgrims, making it the largest temporary gathering of people in the world. A temporary city covering an area larger than Athens was set up to accommodate the crowds. Sunday, 10 February was considered the most auspicious day and 30 million people descended to Allahabad to bathe at the confluence of the Yamuna and the Ganges rivers. Due to the huge number of attendees stampedes are relatively common during Kumbh Mela festivals. The Kumbh Mela stampede was the deadliest since India's independence, with an estimated more than www.ijera.com fifteen thousand deaths from 1954 to 2013. Kumbhamela, Char Dham, Shabarimalayi and Ajmeer etc, where pilgrim all over the countries. There is likely that in their Airports, Railway stations and Bus Stations terminal encounter heavy pilgrims. Managing this huge number of pilgrims from different nations,various cultures and various places in a short period of time is not easy at transport terminals and their safety and other organizations also.It needs to utilize new technological solutions to increase the efficiency of the process of receiving and managing pilgrims at transports( Airports or Railway Stastions or Bus Stations). In this RFID system, each pilgrim is given an ID card with a unique number. This card is used to identify the pilgrim in different stages of the arrival process. The proposed system helps officials registering pilgrims, editing their information, and searching for them and counting them at a certain areas of airports, railway stations and Bus stations. The proposed system also provides access controlling. II. IR SENSOR The principle of IR sensor is totally based on change in resistance of IR receiver which is similar to LDR (light dependent register) and reflection of light.Here in this sensor we connect IR receiver in reverse bias so it give very high resistance if it is not exposed to IR light. The resistance in this case is in range of Mega ohms but when IR light reflected back 2060 | P a g e
  • 2. M. Cheenya et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066 and falls on IR receiver. The resistance of Rx it comes in range between Kilo ohms to hundred of ohms. We convert this change in resistance to change in voltage. Then this voltage is applied to a comparator IC which compare it with a threshold level if voltage of sensor is more than threshold then output is high else it is low which can be used directly for microcontroller. IR transmitter and receiver IR LED is used as a source of infrared rays. It comes in two packages 3mm or 5mm. 3mm is better as it is requires less space. IR sensor is nothing but a diode, which is sensitive for infrared radiation. This infrared transmitter and receiver are called as IR TX-RX pair. Color of IR transmitter and receiver is different. www.ijera.com switches and closing S2 and S3 switches, this voltage is reversed, allowing reverse operation of the motor. Using the nomenclature above, the switches S1 and S2 should never be closed at the same time, as this would cause a short circuit on the input voltage source. The same applies to the switches S3 and S4. This condition is known as shoot-through. Operation The H-Bridge arrangement is generally used to reverse the polarity of the motor, but can also be used to 'brake' the motor, where the motor comes to a sudden stop, as the motors terminals are shorted, or to let the motor 'free run' to a stop, as the motor is effectively disconnected from the circuit. The following table summarizes operation. Table no 1 H-Bridge Truth Table How to identify IR Tx and Rx  Connect cathode of one LED to positive terminal of DMM (digital multi-meter)  Connect anode of the same LED to common terminal of DMM  Set DMM to measure resistance up to 2M Ohm. Check the reading.  Repeat above procedure with second LED. In above process, when you get the reading of the few hundred Kilo Ohms on DMM, then it indicated that LED that you are testing is IR sensor.  In case of IR transmitter DMM will not show any reading III. H-BRIDGE CONVERTER An H-bridge is an electronic circuit which enables DC electric motors to be run forwards or backwards. These circuits are often used in robotics. Hbridges are available as integrated circuits, or can be built from discrete components. The two basic states of a H-bridge. The term "H-bridge" is derived from the typical graphical representation of such a circuit. An H-bridge is built with four switches (solid-state or mechanical). When the switches S1 and S4 (according to the first figure) are closed (and S2 and S3 are open) a positive voltage will be applied across the motor by opening (S1 and S4).When the switches S1 and S4 (according to the first figure) are closed (and S2 and S3 are open) a positive voltage will be applied across the motor. By opening S1 and S4 www.ijera.com S1 1 S2 0 S3 0 S4 1 0 1 1 0 0 0 0 0 0 1 0 1 Result Motor moves right Motor moves left Motor free runs Motor brakes Speed Control by Full H Bridge A simple motor circuit connects power supply through a switch MOSFET. A pulse with fixed frequency is generated by the microcontroller, which is fed to the base of transistor. Transistor acts here as a switch. The output voltage of the motor is dependent on the amount of the ON time of the transistor. The more time transistor remains ON, more the voltage will produce. A Freewheeling diode is used for back e.m.f. protection. When the switch Q1 is closed, 12 Volts is applied to the motor, and when it is open, 0 Volts is applied. If the switch is open for the same amount of time as it is closed, the motor will see an average of 6 Volts. Fig 3.1 Simple Motor Circuit The on-off switching is performed by a power MOSFET, a device that can turn very large currents on and off under the control of a low signal level voltage As the amount of time that the voltage is 2061 | P a g e
  • 3. M. Cheenya et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066 on increases compared with the amount of time that it is off, the average speed of motor increases and vice versa. operate continuously. Typically, while one instruction is being executed, its successor is being decoded, and a third instruction is being fetched from memory. V. Fig 3.2 Relation of Supply Voltage with Motor Speed IV. Micro Controller The data received from RFID reader is interfaced to pin 11 of LPC2148. The received input is checked and verified according to stored data in EEPROM in-built memoryThe LPC2148 is based on a 32-bit ARM7TDMI-CPU with real-time emulation and embedded trace support that combine microcontroller with embedded high speed flash memory ranging from 32 kB to 512 kB. A 128-bit wide memory interface and unique accelerator architecture enable 32-bit code execution at the maximum clock rate. The 16-bit Thumb mode reduces code by more than 30 %. Serial communications interfaces ranging from a USB 2.0 Full-speed device, multiple UARTs, In-system programming flash memory, SPI, SSP to I2C-bus and on-chip SRAM of 8 kB up to 40 kB, various 32-bit timers, single or dual 10-bit ADC(s), 10-bit DAC, PWM channels and 45 fast GPIO lines with up to nine edge or level sensitive external interrupt pins make this microcontroller suitable for industrial control and medical systems. The ARM7TDMI-S is a general purpose 32-bit microcontroller, which offers high performance and very low power consumption. The ARM architecture is based on Reduced Instruction Set Computer (RISC) principles. Fig 4.1 LPC2148 Microcontroller Pipeline techniques are employed so that all parts of the processing and memory systems can www.ijera.com www.ijera.com RFID BLOCK DIAGRAM The RFID based system requires much functionality that has to be coordinated for efficient operation. The RFID reader must interrogate the RFID tag and RFID tag respond for RFID reader signal.Then verify the RFID tag data for pilgrim identification with in-built EEPROM memory data by microcontroller. A visual display of pilgrim information and sound of a buzzer must be provided.Sensor unit for counting the number of pilgrims at transport terminals and drive section unit should process access control of gates at transport terminals. Fig.5.1.Block Diagram of RFID Based System Keeping in view the above considerations, the RFID based system for the pilgrim management is designed with the power supply is required for RFID based system.RFID tag and RFID reader for identification of the pilgrim at transport terminals.DC Geared Motor with 60 RPM for access control at transport terminals gates.H-bridge motor driver IC is used to drive the DC motor in different directions.LCD HD44780 16-character, 2-line (16X2) is used to display the information about pilgrims.IR sensor is used to counting the number of pilgrims at transport terminals.Buzzer is used to indicate the unauthorized pilgrims. Mode selection switch is used to selects the operation. PILGRIM IDENTIFICATION In this proposed system, a radio-frequency identification system uses tags for identification. RFID reader transmits an encoded radio signal to interrogate the tag, when tag near to the RFID reader.The tag receives the message and responds with its identification information. RFID reader sends this identification information to microcontroller and according to the signal received by microcontroller and it will send a signal to LCD display, which displays welcome message and pilgrim’s name else to the buzzer to indicates unauthorized person. Because RFID readers 2062 | P a g e
  • 4. M. Cheenya et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066 www.ijera.com signal information verifies with the data of in-built EEPROM memory prestored information about pilgrim. This verification is done by microcontroller. Fig 5.4 IR Sensor for counting the number of pilgrims Fig 5.2 RFID Based System for Pilgrim Identification Access Control If mode selection switch selects for RFID system operation. RFID reader sends the identification information to microcontroller, which is response of the RFID tag. Microcontroller verifies received signal from RFID reader with the data of inbuilt memory and it gives output to LCD display as well as DC motor. DC motor receives the signal from microcontroller through H-bridge circuit. Microcontroller controls DC motor through h-bridge circuit according to its received signal from RFID reader. H-bridge circuit has four switches. All switches will open then DC motor rotates in ante clockwise direction (opening the door) and .any two of four switches will close then DC motor rotates in clockwise direction (closing the door) . VI. RFID SYSTEM 6.1Fig.RFID designed system for piligrim identification. Radio-frequency identification (RFID) is an automatic detection method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID reader and an RFID tag. Fig 5.3 RFID Based System for Access Control. Counting the pilgrims IF mode selection switch selects counting mode. An IR sensor detects the number of pilgrims, who are entriesor leaves the pilgrimage.IR sensor has one transmitter and receiver.IR transmitter emits the LED signal continously. If LED signal crossed by pilgrim, then it reflects back. Reflected signal received by IR receiver.IR receiver gives reflected signal to microcontroller. Microcontroller controls the reflected signal and it sends a signal to LCD display, which displays number of pilgrims. www.ijera.com Fig. 6.2 RFID System Working of RFID system A radio-frequency identification system uses tags, or labels attached to the objects to be identified. Two-way radio transmitter-receivers called interrogators or readers send a signal to the tag and read its response. The readers generally transmit their observations to a computer system running RFID software or RFID middleware.The tag's information is stored electronically in a non-volatile memory. The RFID tag includes a small RF transmitter and receiver. 2063 | P a g e
  • 5. M. Cheenya et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066 RFID reader transmits an encoded radio signal to interrogate the tag.The tag receives the message and responds with its identification information. This may be only a unique tag serial number, or may be product-related information such as a stock number, lot or batch number, production date, or other specific information.The interrogator must be close for RF field to be strong enough to transfer sufficient power to the tag. Since tags have individual serial numbers, the RFID system design can discriminate several tags that might be within the range of the RFID reader and read them simultaneously. www.ijera.com distance of a few centimeters. Of course, the mu-chip is a passive tag. With a larger antenna it could have a significantly longer reading range. Other small tags are the implantable tags the size of a grain of rice manufactured by VeriChip. Like the mu-chip, these passive tags have a very limited reading range; their intended application is to give machine-readable serial numbers to people. The chips can be used to authenticate people in highsecurity environments—unlike passwords, the implanted chips can’t be easily shared. RFID tags can be promiscuous, in which case they will communicate with any reader. Alternatively, they can be secure, requiring that the reader provide a password or other kind of authentication credential before the tags respond. The vast majority of RFID tags that have been deployed are promiscuous. Not only are these tags cheaper, but the systems also are much easier to manage. Systems that employ passwords or encryption codes require that the codes be distributed in advance and properly controlled. This is an exceedingly difficult management problem. Fig.6.3 RFID Tag The tag is the basic building block of RFID. Each tag consists of an antenna and a small silicon chip that contains a radio receiver, a radio modulator for sending a response back to the reader, control logic, some amount of memory and a power system. The power system can be completely powered by the incoming RF signal, in which case the tag is known as a passive tag. Alternatively, the tag’s power system can have a battery, in which case the tag is known as an active tag. Fig.6.5 Electronic Product Code of a Tag Fig.6.4 .RFID tag Passive tags, on the other hand, can be much smaller and cheaper than active ones because they don’t have batteries. Another advantage is their longer shelf life: Whereas an active tag’s batteries may last only a few years, a passive tag could in principle be read many decades after the chip was manufactured. Tags come in all shapes and sizes. The smallest tag that has ever been produced is the Hitachi mu-chip, which is less than 0.4mm on a side. Designed to be embedded in a piece of paper and used for tracking documents printed in an office environment, the mu-chip can be read only at a www.ijera.com An Electronic Product Code (EPC) is one common type of data stored in a tag. When written into the tag by an RFID printer, the tag contains a 96bit string of data. The first eight bits are a header which identifies the version of the protocol. The next 28 bits identify the organization that manages the data for this tag; the organization number is assigned by the EPC Global consortium. The next 24 bits are an object class, identifying the kind of product; the last 36 bits are a unique serial number for a particular tag. Identify a particular product. RFID tags can interfere with each other. When multiple tags are present in a reader’s field, the reader may be unable to decipher the signals from the tags. The systems are optimized so that only one tag is within range at a time. However, for other applications, reading multiple tags at once is essential. For these applications, the tags need to support either an anticollision protocol or, more commonly, a singulation protocol. A singulation protocol allows a reader to determine that multiple tags are visible and to iterate through the tags, getting them to take turns 2064 | P a g e
  • 6. M. Cheenya et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066 www.ijera.com responding so that each may be read without interference from the others. RFID Readers The RFID reader sends a pulse of radio energy to the tag and listens for the tag’s response. The tag detects this energy and sends back a response that contains the tag’s serial number and possibly other information as well. In simple RFID systems, the reader’s pulse of energy functioned as an on-off switch; in more sophisticated systems, the reader’s RF signal can contain commands to the tag, instructions to read or write memory that the tag contains, and even passwords. RFID readers were designed to read only a particular kind of tag, but socalled multimode readers that can read many different kinds of tags are becoming increasingly popular. Fig.7.1Identificetion of pilgrim Fig. 7.2.Access control of RFID based System Fig.6.6 RFID Reader RFID readers are usually on, continually transmitting radio energy and awaiting any tags that enter their field of operation. However, for some applications, this is unnecessary and could be undesirable in battery-powered devices that need to conserve energy. Thus, it is possible to configure an RFID reader so that it sends the radio pulse only in response to an external event. Like the tags themselves, RFID readers come in many sizes. The largest readers might consist of a desktop personal computer with a special card and multiple antennas connected to the card through shielded cable. Such a reader would typically have a network connection as well so that it could report tags that it reads to other computers. The smallest readers are the size of a postage stamp and are designed to be embedded in mobile telephones. VII. RESULT Pilgrim identification, which can be guided by RF communication, was developed. The pilgrim management by counting them using IR sensor and access controlling them uses DC motor at transport terminals. The result obtained clearly demonstrates that the system is easy to handle by the pilgrimage officers. www.ijera.com Fig 7.3.Identification of Unauthorized Pilgrim Fig.7.4 .Counting the Number of pilgrims 2065 | P a g e
  • 7. M. Cheenya et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2060-2066 Table no 2 Observations of RFID Based System No. of pilgri ms Pilgrim Identification language Tag Serial number John pasha Urdu Ramu Telugu Robinson English 0007044836 107,32490 0008740192 133,23904 0005628646 085,58086 0007044836 107,32484 0005671270 438,45383 1 2 3 Unauthorized person Unauthorized person - VIII. - Conclusion The implementation of RFID Based System for Pilgrim Management in Major Religions and Festivals‖ was achieved by integrating various features of hardware components. With careful selection and signal interface design, every module has been integrated into the controller enabling it to work optimally and with low power consumption, thereby increasing the time between charging of the battery and extending usage intervals. The main goal of this proposed system to allow officials in major events to idenify, search and group pilgrims to facilitate transporting them to the pilgrimage. The presented system can be adapted with necessary modification for pilgrim identification, counting and managing them. REFERENCES [1] [2] [3] [4] [5] Klaus Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Translated by Rachel Waddington, 2nd edition, John Wiley & Sons Ltd, 2003. Grady Booch, James Rumbaugh, and Ivar Jacobson, The Unified Modeling Language User Guide, 1st edition, Addison-Wesley Longman Inc, 1999. Nasser M. Al-Biqami and Hassanin M. AlBarhamtoshy, ―RFID Technology and Applications for National Security,‖ in Proceedings of the Information Technology and National Security Conference, Riyadh, Dec. 2007, pp. 2355 – 2379. Mohamed Mohandes, ―A Case Study of an RFID-based System for Pilgrims Identification and Tracking,‖ in Sustainable Radio Frequency Identification Solutions, InTech, Feb. 2010, pp. 87 – 104. Mohammad Yamin, Masoud Mohammadian, Xu Huang, and Dharmendra Sharma, ―RFID Technology and Crowded Event Management,‖ in Proceedings of the 2008 International Conference on Computational Intelligence for Modelling Control & www.ijera.com [6] www.ijera.com Automation, Vienna, Dec. 2008, pp. 1293 – 1297. Mohammad Yamin and Yasser Ades, ―Crowd Management with RFID & Wireless Technologies,‖ in Proceedings of the First International Conference on Networks and Communications (NETCOM '09), Chennai, Dec. 2009, pp. 439 – 442. About Authors: M.Cheenya, he is received M.Tech(Digital electronics&communication systems) degree from JNTU Hyderabad in 2010, now he is working as Asst. Professor in MIST, Department of Electronics& communication Engg, Hyderabad, A.P. B.MuralidharNaick, he is received M.Tech(Embedded systems) degree from JNTU Hyderabad in 2013, now he is working as Asst. Professor in MIST, Department of Electronics& communication Engg, Hyderabad, A.P. G.Shirisha, she is received M.Tech(Embedded systems) degree from JNTU Hyderabad in 2013, now she is working as Asst. Professor in MIST, Department of Electronics& communication Engg, Hyderabad, A.P. 2066 | P a g e