Uploaded by Naurin Fatima

rfid

advertisement
CHAPTER 1
INTRODUCTION
In today’s technically advanced and developed world, autonomous systems are improvement
rapid popularity in world. As the social computerization, automation and developed
techniques has been increased and the ATM and credit card has been installed and spread out
to simplify the financial activity, the banking activity has been simplified so more, however
the crime related with financial organization has been increased over numbers in the world in
proportion to the ratio of spread out of automation, devices and technologies. Now, a day’s
theft from robbery increases gradually. ATM related crime cases are increases. To stop this
situation we are using smart machine.
This project named as Advanced ATM crime prevention system using RFID can be
considered as a smart project having RFID (Radio Frequency Identification) modules. The
main motto of designing this project is to make reliable as well as fast system which works
impeccable. In this project we are using RFID tags which are actually assigned to each user
for making individual ATM card holders. Only trustworthy ATM card holder has the facility
to open the door. When we talk about the software then we are using two software, AVR
Studio is used for making HEX file and AVR dude is actually a burner. This project can be
considered as trustworthy work because it shows real time results in real time scenario.
BLOCK DIAGRAM:
LCD MODULE
USP ASP
ATMEGA16
POWER SUPPLY
Fig1.1 block diagram
1
RFID MODULE
CHAPTER 2
CIRCUIT COMPOSITION
2.1 ATMEGA 16
ATmega16 is an 8-bit high performance microcontroller from the Atmel’s Mega AVR
family. Atmega16 is a 40 pin microcontroller based on enhanced RISC (Reduced Instruction
Set Computing) architecture with 131 powerful instructions. It has a 16 KB programmable
flash memory, static RAM of 1 KB and EEPROM of 512 Bytes. The endurance cycle of flash
memory and EEPROM is 10,000 and 100,000, respectively. Most of the instructions execute
in one machine cycle. It can work on a maximum frequency of 16MHz.
There are 32 I/O (input/output) lines which are divided into four 8-bit ports designated as
PA, PB, PC and PD. ATmega16 has various in-built peripherals like USART, ADC, Analog
Comparator, SPI, JTAG etc. Each I/O pin has an alternative task related to in-built
peripherals. ATMEGA16 has also sleep modes. The modes can be triggered at desired times
to save power. With various sleep modes on board ATMEGA16 can work on MOBILE
EMBEDDED SYSTEMS.
Fig2.1.1 Pin diagram of atmega16
2
PIN
NO.
PIN NAME
DESCRIPTION
ALTERNATE FUNCTION
1
PB0(XCK/T0)
Pin 0 of PORTB
T0( Timer0 External Counter Input)
XCK ( USART External Clock I/O)
2
PB1(T1)
Pin 1 of PORTB
T1(Timer1 External Counter Input)
3
PB2(INT2/AIN0)
Pin 2 of PORTB
AIN0(Internal
Positive Input)
Analog
Comparator
INT2( External Interrupt 2 Input)
4
PB3(OC0/AIN1)
Pin 3 of PORTB
AIN1(Internal
Negative Input)
Analog
Comparator
OC0 (Timer0 Output Compare Match
Output) or PWM output
5
PB4(SS )
Pin 4 of PORTB
SS (SPI Slave Select Input). This pin is
low when controller acts as slave.
[Serial Peripheral Interface (SPI) for
programming]
6
PB5(MOSI)
Pin 5 of PORTB
MOSI (Master Output Slave Input).
When controller acts as slave, the data is
received by this pin.
[Serial Peripheral Interface (SPI) for
programming]
7
PB6(MISO)
Pin 6 of PORTB
MISO (Master Input Slave Output).
When controller acts as slave, the data is
sent to master through this pin.
[Serial Peripheral Interface (SPI) for
3
programming]
8
PB7(SCK)
Pin 7 of PORTB
SCK (SPI Bus Serial Clock). This is the
clock shared between this controller and
other system for accurate data transfer.
[Serial Peripheral Interface (SPI) for
programming]
9
RESET
Reset Pin (Active
Low Reset)
10
VCC
Connected to +5V
11
GND
Connected
GROUND
12
XTAL2
Connected to Crystal
Oscillator
13
XTAL1
Connected to Crystal
Oscillator
14
PD0(RXD)
Pin 0 of PORTD
to
RXD (USART Input Pin)
[USART Serial Communication Interface
can be used for programming]
15
PD1(TXD)
Pin 1 of PORTD
TXD (USART Output Pin)
[USART Serial Communication Interface
can be used for programming]
16
PD2(INT0)
Pin 2 of PORTD
External Interrupt INT0
17
PD3(INT1)
Pin 3 of PORTD
External Interrupt INT1
4
18
PD4(OC1B)
Pin 4 of PORTD
OC1B (Timer Output Compare Match
Output) or PWM output
19
PD5(OC1A)
Pin 5 of PORTD
OC1A (Timer Output Compare Match
Output) or PWM output
20
PD6(ICP)
Pin 6 of PORTD
Timer/Counter1 Input Capture Pin
21
PD7 (OC2)
Pin 7 of PORTD
Timer/Counter2 Output Compare Match
Output
22
PC0 (SCL)
Pin 0 of PORTC
TWI Interface
23
PC1 (SDA)
Pin 1 of PORTC
TWI Interface
24
PC2 (TCK)
Pin 2 of PORTC
JTAG Interface
25
PC3 (TMS)
Pin 3 of PORTC
JTAG Interface
26
PC4 (TDO)
Pin 4 of PORTC
JTAG Interface
27
PC5 (TDI)
Pin 5 of PORTC
JTAG Interface
28
PC6 (TOSC1)
Pin 6 of PORTC
Timer Oscillator Pin 1
29
PC7 (TOSC2)
Pin 7 of PORTC
Timer Oscillator Pin 2
30
Vcc
Vcc for Internal
ADC Converter
31
GND
GROUND
32
AREF
Analog
Reference
Pin for ADC
33
PA7 (ADC7)
Pin 7 of PORTA
ADC (Analog to Digital Converter)
5
Channel 7
34
PA6 (ADC6)
Pin 6 of PORTA
ADC (Analog to Digital Converter)
Channel 6
35
PA5 (ADC5)
Pin 5 of PORTA
ADC (Analog to Digital Converter)
Channel 5
36
PA4 (ADC4)
Pin 4 of PORTA
ADC (Analog to Digital Converter)
Channel 4
37
PA3 (ADC3)
Pin 3 of PORTA
ADC (Analog to Digital Converter)
Channel 3
38
PA2 (ADC2)
Pin 2 of PORTA
ADC (Analog to Digital Converter)
Channel 2
39
PA1 (ADC1)
Pin 1 of PORTA
ADC (Analog to Digital Converter)
Channel 1
40
PA0 (ADC0)
Pin 0 of PORTA
ADC (Analog to Digital Converter)
Channel
Table2.1.2 pin configuration of atmega16
2.1.1 Applications
There are many of applications for ATMEGA16 microcontrollers.




Engineers design
Temperature control systems
Embedded systems like coffee machine, vending machine.
Digital signal processing
6
2.2 LCD DISPLAY
Fig2.2.1 LCD display
A liquid-crystal display (LCD) is a flat-panel display or other electronically modulated
optical device that uses the light-modulating properties of liquid crystals. Liquid crystals do
not emit light directly, instead using a backlight or reflector to produce images in color or
monochrome. They use the same basic technology, except that arbitrary images are made up
of a large number of small pixels, while other displays have larger elements.
LCDs are used in a wide range of applications including computer monitors, televisions,
instrument panels, aircraft cockpit displays, and indoor and outdoor signage. LCD screens
have replaced heavy, bulky cathode ray tube (CRT) displays in nearly all applications. LCD
screens are available in a wider range of screen sizes than CRT and plasma displays, with
LCD screens available in sizes ranging from tiny digital watches to huge, big screen
television sets.
Since LCD screens do not use phosphors, they do not suffer image burn-in when a static
image is displayed on a screen. The LCD screen is more energy efficient and can be disposed
of more safely than a CRT can. Its low electrical power consumption enables it to be used in
battery-powered electronic equipment more efficiently than CRTs can be.
2.3 JUMPER WIRE
Jumper wires also known as jump wire. It is an electrical wire, or group of them in a cable,
with a connector or pin at each end (or sometimes without them – simply “tinned”), which is
normally used to interconnect the component of a breadboard or other prototype or test
circuit, internally or with other equipment or components, without soldering. Jumper wires
are simply wires that have connector pins at each end, allowing them to be used to connect
two points to each other without soldering.
7
MALE-TO-MALE
FEMALE-TO-MALE
FEMALE-TO-FEMALE
Fig2.3.1 jumper wires
These are typically used with breadboards and other prototyping tools in order to make it
easy to change a circuit as needed. Though jumper wires come in a variety of colors, the
colors don’t actually mean anything. This means that a red jumper wire is technically the
same as a black one. But the colors can be used to your advantage in order to differentiate
between types of connections, such as ground or power. While jumper wires are easy and
inexpensive to purchase.
It comes in three versions: male-to-male, male-to-female and female-to-female. The
difference between each is in the end point of the wire. Male ends have a pin protruding and
can plug into things, while female ends do not and are used to plug things into. Male-to-male
jumper wires are the most common and used to connect two ports on a breadboard. There are
different types of jumper wires. Some have the same types of electrical connector at both
ends, while others have different connectors.
2.4 ZERO PCB
Fig2.4.1 Zero PCB
8
A printed circuit board (PCB) basic PCB consists of a flat sheet of insulating material and a
layer of copper foil, laminated to the substrate. Chemical etching divides the copper into separate
conducting lines called tracks or circuit traces, pads for connections, via to pass connections between
layers of copper, and features such as solid conductive areas for electromagnetic shielding or other
purposes. The tracks function as wires fixed in place, and are insulated from each other by air and the
board substrate material. The surface of a PCB may have a coating that protects the copper from
corrosion and reduces the chances of solder shorts between traces or undesired electrical contact with
stray bare wires. For its function in helping to prevent solder shorts, the coating is called solder resist
or solder mask
2.5 USB ASP PROGRAMMER
Fig2.5.1 usb asp programmer
USB asp is a USB in-circuit programmer for Atmel AVR controllers. It simply consists of an
ATMega88 or an ATMega8 and a couple of passive components. The programmer uses a
firmware-only USB driver; no special USB controller is needed.
2.5.1 Features:
1.
2.
3.
4.
Works under multiple platforms. Linux, Mac OS X and Windows are tested.
No special controllers or smd components are needed.
Programming speed is up to 5kBytes/sec.
SCK option to support targets with low clock speed (< 1,5MHz).
5. Planned: serial interface to target (e.g. for debugging).
2.5.2 Software:




AVRDUDE supports USB asp since version 5.2.
BASCOM-AVR supports USB asp since version 1.11.9.6.
Khazama AVR Programmer is a Windows XP/Vista GUI application for USB asp and avrdude.
Extreme Burner-AVR is a Windows GUI Software for USB asp based USB AVR programmers.
After procuring usb asp connect the programmer to your computer. It comprises of two steps. First
step is the physical connection of the programmer to the USB port using a suitable USB cable, and the
second step is the installation of device drivers in order for it to work. After making the physical
connection, go through the manufacture’s instruction manual to install device drivers for the USB asp
Programmer.
ATmega Programming Now the USB asp programmer and the programming adaptor are
ready for use. Next step is the preparation of the first AVR C program. AVR Studio provides
9
an IDE for writing, debugging, and simulating programs. We will use the WinAVR GCC C
compiler toolset with AVR Studio via plug-in module.
2.6 USB CABLE (UNIVERSAL SERIAL BUS)
c
Fig2.7.1 USB
Universal Serial Bus (USB) is an industry standard that establishes specifications for cables
and connectors and protocols for connection, communication and power supply between
computers, peripheral devices and other computers.
USB connectors have been increasingly replacing other types for battery chargers of portable
devices. Examples of peripherals that are connected via USB include keyboards, pointing
devices, digital still and video cameras, printers, portable media players, disk drives and
network adapters. The Universal Serial Bus was developed to simplify and improve the
interface between personal computers and peripheral devices, when compared with
previously existing standard or ad-hoc proprietary interfaces.
2.7 ADAPTER
An adapter is a physical device that allows one hardware or electronic interface to be adapted
(accommodated without loss of function) to another hardware or electronic interface. In a
computer, an adapter is often built into a card that can be inserted into a slot on the
computer's motherboard.. An adapter or adaptor is a device that converts attributes of one
device or system to those of an otherwise incompatible device or system. Some modify
power or signal attributes, while others merely adapt the physical form of one connector to
another.
10
CHAPTER 3
SOFTWARE REQUIREMENT
3.1 EMBEDDED C
Embedded C Programming is the soul of the processor functioning inside each and
every embedded system we come across in our daily life, such as mobile phone, washing
machine, and digital camera.
Each processor is associated with embedded software. The first and foremost thing is the
embedded software that decides functioning of the embedded system. Embedded C language
is most frequently used to program the microcontroller.
Fig 3.1.1 Cycle of embedded C
Earlier, many embedded applications were developed using assembly level programming.
However, they did not provide portability. This disadvantage was overcome by the advent of
various high level languages like C, Pascal, and COBOL. However, it was the C language
that got extensive acceptance for embedded systems, and it continues to do so. The C code
written is more reliable, scalable, and portable; and in fact, much easier to understand.
About C Language
C language was developed by Dennis Ritchie in 1969. It is a collection of one or more
functions, and every function is a collection of statements performing a specific task.
C language is a middle-level language as it supports high-level applications and low-level
applications. Before going into the details of embedded C programming, we should know
about RAM memory organization.
11
3.1.1 SALIENT FEATURES OF THE LANGUAGE




C language is software designed with different keywords, data types, variables, constants,
etc.
Embedded C is a generic term given to a programming language written in C, which is
associated with particular hardware architecture.
Embedded C is an extension to the C language with some additional header files. These
header files may change from controller to controller.
The microcontroller 8051 #include<reg51.h> is used.
C PROGRAMMING
EMBEDDED C PROGRAMMING
Possesses native development in nature.
Possesses cross development in nature.
Independent of hardware architecture.
Dependant
on
hardware
architecture
(microcontroller or other devices).
Used for Desktop application, OS and PC Used for limited resources like RAM, ROM
memories.
and I/O peripherals on embedded controller.
Table 3.1.1 Difference between C and embedded C
3.2 AVR DUDE
AVRDUDE is autility to download/upload/manipulate the ROM and EEPROM content of
AVR microcontrollers using in-system programming technique(ISP). AVR dude has once
been started by Brian S.Dean as a private project of an in system programmer for the Atmel
AVR microcontroller series, as apart of open source and free software tools collection
available for these microcontrollers.
3.3 AVR STUDIO
AVR Studio also called AVR simulator IDE is powerful application that supplies Atmel
microcontroller users with user-friendly graphical development environment for windows
with integrated simulator, AVR basic compiler, assembler, disassemble and debugger. It
supports the extensive number of microcontroller from the Atmel 8-bit mega AVR.
12
CHAPTER 4
BASIC PRINCIPLE AND TECNOLOGY
RFID stands for Radio-Frequency Identification. The acronym refers to small electronic
devices that consist of a small chip and an antenna. The chip typically is capable of carrying
2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a
magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for
that object. And, just as a bar code or magnetic strip must be scanned to get the information,
the RFID device must be scanned to retrieve the identifying information.
Fig4.1 RFID tag
It uses electromagnetic fields to automatically identify and track tags attached to objects. The
tags contain electronically stored information. Passive tags collect energy from a nearby
RFID reader interrogating radio waves. Active tags have a local power source (such as
battery) and may operate hundreds of meters from the RFID reader. Unlike the barcode, the
tags don’t need to be within the line of sight of the reader, so it may be embedded in the
tracked object. RFID is one method of automatic identification and data capture (AIDC).
4.1 How does a RFID system work?
A RFID system is made up of two parts: a tag or label and a reader. RFID tags or labels are
embedded with a transmitter and a receiver. The RFID components on the tags have two
parts: a microchip that stores and processes information, and an antenna to receive and
transmit a signal. The tag contains the specific serial number for one specific object. To read
the information encoded on a tag, a two-way radio transmitter-receiver called an interrogator
or reader emits a signal to the tag using an antenna. The tag responds with the information
written in its memory bank. The interrogator will then transmit the read results to an RFID
computer program.
13
Fig4.1.1 Schematic diagram of RFID
In a retail setting, RFID tags may be attached to articles of clothing. When an inventory
associate uses a handheld RFID reader to scan a shelf of jeans, the associate is able to
differentiate between two pairs of identical jeans based upon the information stored on the
RFID tag. Each pair will have its own serial number.
With one pass of the handheld RFID reader, the associate can not only find a specific pair,
but they can tell how many of each pair are on the shelf and which pairs need to be
replenished. The associate can learn all of this information without having to scan each
individual item.
A significant advantage of RFID devices over the others mentioned above is that the RFID
device does not need to be positioned precisely relative to the scanner. We're all familiar with
the difficulty that store checkout clerks sometimes have in making sure that a barcode can be
read. And obviously, credit cards and ATM cards must be swiped through a special reader. In
contrast, RFID devices will work within a few feet (up to 20 feet for high-frequency devices)
of the scanner. For example, you could just put all of your groceries or purchases in a bag,
and set the bag on the scanner. It would be able to query all of the RFID devices and total
your purchase immediately. (Read a more detailed article on RFID compared to barcodes.)
RFID technology has been available for more than fifty years. It has only been recently that
the ability to manufacture the RFID devices has fallen to the point where they can be used as
a "throwaway" inventory or control device. Alien Technologies recently sold 500 million
RFID tags to Gillette at a cost of about ten cents per tag. One reason that it has taken so long
for RFID to come into common use is the lack of standards in the industry. Most companies
invested in RFID technology only use the tags to track items within their control; many of the
benefits of RFID come when items are tracked from company to company or from country to
country.
14
CHAPTER 5
WORKING
The project mainly focuses on providing security using RFID technology. Through this
facility we can provide security quickly and at low cost. The main motto of designing this
project is to make reliable as well as fast system which works impeccable. In this project we
are using RFID tags which are actually assigned to each user for making individual ATM
card holders. Only trustworthy ATM card holder has the facility to open the door.
START
READ THE CODE ON THE CARD
USER NOT FOUND
IS CODE
VALID?
COMPARE THE CODE WITH STORED CODE VALUE
DISPLAY THE NAME OF THE CARD HOLDER
OPEN THE DOOR FOR THE USER
STOP
Fig 5.1 Working of rfid
15
When we bring the RFID tag close to the RFID reader, by principle of electromagnetic
induction the 12 digit secret number(code) of RFID tag is read by the RFID reader which
scan the code and verifies whether the code is authentic or not. The code is matched with the
codes in database. If the code is matched LCD screen displays the name of the authentic User
and welcomes the user and if the code is not match with database it shows user not found.
5.1 CODE
void card_info() // FOR RECEIVING 12 DIGIT RFID NO
{
int num=0;
int end=0;
while(num<12)
{
while((UCSRA&(1<<RXC))==0);
ch[end]=UDR;
end++;
num++;
}
num=0;
dis_cmd(1);
_delay_ms(100);
for(int i=0;i<end;i++) //// FOR DISPLAYING 12 DIGIT RFID NO
{
dis_data(ch[i]);
}
end=0;
16
}
int info_cmp(char *data, char *str)
{
int count=0;
PORTB|=(1<<0);
for(int i=0; i<=11; i++)
{
if(data[i]==str[i])
count++;
}
if(count==12)
{
return(1);
}
else
{
return(0);
}
}
int user_match()
{
int result=0;
card_info();
result=info_cmp(ch,"1C003656C3BF");
if(result==1)
{return(1);}
17
result=info_cmp(ch,"1D00AF31AC2F");
if(result==1)
{return(2);}
result=info_cmp(ch,"1C003657027F");
if(result==1)
{return(3);}
result=info_cmp(ch,"5500C79AB6BE");
if(result==1)
{return(4);}
return(0);
}
void uart_init()
{
UCSRB|=(1<<RXEN)|(1<<TXEN)|(1<<RXCIE);
UCSRC|=(1<<URSEL)|(1<<UCSZ1)|(1<<UCSZ0);
UBRRL=51;
}
int uart_recieve()
{
while((UCSRA&(1<<RXC))==0);
return(UDR);
}
void uart_transmit(char data)
{
while((UCSRA&(1<<UDRE))==0);
UDR=data;
}
18
void lcd_init()
{
dis_cmd(0x02);
dis_cmd(0x28);
dis_cmd(0x0D);
dis_cmd(0x06);
}B
void lcd_cmd(unsigned char a)
{
lcd_port=a;
lcd_port &=~(1<<RS);
lcd_port &=~(1<<RW);
lcd_port |=(1<<E);
_delay_ms(1);
lcd_port &=~(1<<E);
}
void lcd_data(unsigned char a)
{
lcd_port=a;
lcd_port |=(1<<RS);
lcd_port &=~(1<<RW);
lcd_port |=(1<<E);
_delay_ms(1);
lcd_port &=~(1<<E);
}
19
void dis_cmd(unsigned char a)
{
unsigned char a1=a&0xF0;
lcd_cmd(a1);
a1=(a<<4)&0xF0;
lcd_cmd(a1);
}
void dis_data(unsigned char a)
{
unsigned char a2=a&0xF0;
lcd_data(a2);
a2=(a<<4)&0xF0;
lcd_data(a2);
}
void dis_string(unsigned char *str)
{
int i=0;
while(str[i]!= '\0')
{
dis_data(str[i]);
i++;
}
}
void dis_number(long data)
{
unsigned int c;
20
dis_cmd(0X04);
while(data!=0)
{
c=data%10;
dis_data(c+48);
data=data/10;
}
dis_cmd(0X06);
}
21
CHAPTER 6
ADVANTAGES AND DISADVANTAGES
6.1 ADVANTAGES
1. RFID technology automates data collection and vastly reduces human effort and error
2. RFID supports tag reading with no line-of-sight or item-by-item scans required
3. RFID readers can read multiple RFID tags simultaneously, offering increases in
efficiency
4. All RFID tags within range can be detected instantly and matched with information in
your database
5. Assets can be cross-referenced against assigned locations and recorded as present,
missing, or relocated
6. RFID can be integrated with active scanning and fixed readers for a totally automated
tracking solution
7. Assets and employees can be tracked and located automatically for everything from
supply chain and asset management to facility security and emergency planning
8. Available scanners support both RFID and bar-coding so you can upgrade at your own
pace
6.2 DISADVANTAGES
1. No RFID standard has been set yet. (The Auto-ID centre has worked with standard bodies
Uniform Code Council and EAN International to come up with electronic product code,
but it is not yet considered a standard).
2. The demand should also drive down the price. (Wal-Mart says that a need for one billion
RFID tags should drive down the price to five cents each).
3. Physical limitation like reading through liquid or metals still exist.
4. Accurate read rates on some items can be very low
5. Nylon conveyor belts and other RF’s can disrupt the tag transmissions in warehouses
6. Increase in expenses - the suppliers will have to equip their warehouses and transport
vehicles with readers. These readers have to be connected to the computer networks for
exchange of information. All these mean additional costs related to hiring technical
consultants and additional hardware.
7. Wal-Mart inventory networks are burdened with the task of handling data of billions of
their products. The company has to hence invest in extremely sophisticated system to
process the data properly.
8. In the tie up with IBM Global Services that has resulted in deployment of RFID
equipment in grocery sections of seven pilot Wal-Mart stores, IBM consultants have
encountered interference from equipment such as handheld walkie-talkies, forklifts, and
other devices typically found in distribution facilities. Cell phone towers located near the
premises, which transmit at the high end of the frequency band, sometimes leak unwanted
radio waves into RFID readers.
22
CHAPTER 7
APPLICATION AND FUTURE SCOPES
7.1 APPLICATION:
Fig7.1 Application of rfid
By providing a cheap, efficient, and reliable way to collect and store data, RFID offers
limitless possibilities for current and future use. The list below highlights just a few of the
myriad uses of RFID technology:
1. Product Tracking – RFID tags are increasingly used as a cost-effective way to track
inventory and as a substitute for barcodes. For instance, bookstores such as Barnes &
Noble use RFID to identify books to be removed from shelves and returned to publishing
houses.
2. Toll Road Payments – Highway toll payment systems, such as E-Z Pass in the eastern
states, uses RFID technology to electronically collect tolls from passing cars. Instead of
stopping at the toll booth, cars pass directly through in the E-Z Pass lane and the toll is
automatically deducted from a pre-paid card.
3. Passports – A number of countries, including Japan, the United States, Norway, and
Spain incorporate RFID tags into passports to store information (such as a photograph)
about the passport holder and to track visitors entering and exiting the country.
4. Identification – RFID chips can be implanted into animals and people to track their
movements, provide access to secure locations, or help find lost pets.
23
5. Libraries – Libraries use RFID tags in books and other materials to track circulation and
inventory, store product information (such as titles and authors), and to provide security
from theft. Because RFID tags can be scanned without physically touching the item,
checking books in and out, plus doing laborious tasks such as shelf inventory, can be
accomplished quickly and efficiently using RFID technology.
6. Shipping – Large shipments of materials, such as retail goods, often utilize RFID tags to
identify location, contents, and movement of goods. Wal-mart is one of the largest
consumers of this technology to assist in tracking shipments of merchandise.
7. Other uses – RFID tags are employed in numerous other ways, including implantation in
Saguaro cacti to discourage black-market traders, placement in car tires to transmit road
condition information to the onboard computer, and placement around cities (such as
Tokyo) to transmit tourist information to visitor cell phones.
7.2 FUTURE SCOPES
1. A hex keypad can be interfaced to microcontroller board by which user can enter
2.
3.
4.
5.
password then only the lock can be opened. This ensures that even if someone has
card then also without password he cannot get access.
Connection to PC and development of PC side software to read from microcontroller.
Cryptanalysis of the link between the card and the reader.
Interfacing the system with a GSM so that data can be transmitted through messages.
The card can be used in health services to store information such as administrative ,
medical ,biological and pharmaceutical records .It enables the doctor to have more
complete and comprehensive healthcare information.
24
CHAPTER 9
CONCLUSION
The project gave me an overview of the current state and trends in rfid technology .Even
though numerous limitations and unresolved issues still hinder the widespread application of
rfid .Despite these challenges rfid continues to make inroads into inventory control system
and its only a matter of time before the components cost fall enough to make rfid an attractive
proposition .The components that go into rfid readers and tags are simple radio
communications but their smaller size and broad deployment enhance the power of
technology . The rfid industry is about to enter an exciting period in which increased adoption
will provide the means for technology providers to invest in new exciting innovations. Along
with the new developments advancements in materials, organic polymer, nanotechnology and
other areas will change the way rfid is incorporated into products. Instead of a tag attached to
a garment, rfid transponder may be printed directly on the cloth or packaging using
biodegradable conductive inks.
The future of rfid is there, So both end users and rfid manufacturers should be prepared to
leverage these new technologies and ready themselves for more widespread use of RFID.
25
REFERENCES





https://electronicsforu.com
https://components101.com
https://Psocrfid.blogspot.com
https://en.m.wikipedia.org
https://electroschematics.com
26
Download