CHAPTER 1 INTRODUCTION In today’s technically advanced and developed world, autonomous systems are improvement rapid popularity in world. As the social computerization, automation and developed techniques has been increased and the ATM and credit card has been installed and spread out to simplify the financial activity, the banking activity has been simplified so more, however the crime related with financial organization has been increased over numbers in the world in proportion to the ratio of spread out of automation, devices and technologies. Now, a day’s theft from robbery increases gradually. ATM related crime cases are increases. To stop this situation we are using smart machine. This project named as Advanced ATM crime prevention system using RFID can be considered as a smart project having RFID (Radio Frequency Identification) modules. The main motto of designing this project is to make reliable as well as fast system which works impeccable. In this project we are using RFID tags which are actually assigned to each user for making individual ATM card holders. Only trustworthy ATM card holder has the facility to open the door. When we talk about the software then we are using two software, AVR Studio is used for making HEX file and AVR dude is actually a burner. This project can be considered as trustworthy work because it shows real time results in real time scenario. BLOCK DIAGRAM: LCD MODULE USP ASP ATMEGA16 POWER SUPPLY Fig1.1 block diagram 1 RFID MODULE CHAPTER 2 CIRCUIT COMPOSITION 2.1 ATMEGA 16 ATmega16 is an 8-bit high performance microcontroller from the Atmel’s Mega AVR family. Atmega16 is a 40 pin microcontroller based on enhanced RISC (Reduced Instruction Set Computing) architecture with 131 powerful instructions. It has a 16 KB programmable flash memory, static RAM of 1 KB and EEPROM of 512 Bytes. The endurance cycle of flash memory and EEPROM is 10,000 and 100,000, respectively. Most of the instructions execute in one machine cycle. It can work on a maximum frequency of 16MHz. There are 32 I/O (input/output) lines which are divided into four 8-bit ports designated as PA, PB, PC and PD. ATmega16 has various in-built peripherals like USART, ADC, Analog Comparator, SPI, JTAG etc. Each I/O pin has an alternative task related to in-built peripherals. ATMEGA16 has also sleep modes. The modes can be triggered at desired times to save power. With various sleep modes on board ATMEGA16 can work on MOBILE EMBEDDED SYSTEMS. Fig2.1.1 Pin diagram of atmega16 2 PIN NO. PIN NAME DESCRIPTION ALTERNATE FUNCTION 1 PB0(XCK/T0) Pin 0 of PORTB T0( Timer0 External Counter Input) XCK ( USART External Clock I/O) 2 PB1(T1) Pin 1 of PORTB T1(Timer1 External Counter Input) 3 PB2(INT2/AIN0) Pin 2 of PORTB AIN0(Internal Positive Input) Analog Comparator INT2( External Interrupt 2 Input) 4 PB3(OC0/AIN1) Pin 3 of PORTB AIN1(Internal Negative Input) Analog Comparator OC0 (Timer0 Output Compare Match Output) or PWM output 5 PB4(SS ) Pin 4 of PORTB SS (SPI Slave Select Input). This pin is low when controller acts as slave. [Serial Peripheral Interface (SPI) for programming] 6 PB5(MOSI) Pin 5 of PORTB MOSI (Master Output Slave Input). When controller acts as slave, the data is received by this pin. [Serial Peripheral Interface (SPI) for programming] 7 PB6(MISO) Pin 6 of PORTB MISO (Master Input Slave Output). When controller acts as slave, the data is sent to master through this pin. [Serial Peripheral Interface (SPI) for 3 programming] 8 PB7(SCK) Pin 7 of PORTB SCK (SPI Bus Serial Clock). This is the clock shared between this controller and other system for accurate data transfer. [Serial Peripheral Interface (SPI) for programming] 9 RESET Reset Pin (Active Low Reset) 10 VCC Connected to +5V 11 GND Connected GROUND 12 XTAL2 Connected to Crystal Oscillator 13 XTAL1 Connected to Crystal Oscillator 14 PD0(RXD) Pin 0 of PORTD to RXD (USART Input Pin) [USART Serial Communication Interface can be used for programming] 15 PD1(TXD) Pin 1 of PORTD TXD (USART Output Pin) [USART Serial Communication Interface can be used for programming] 16 PD2(INT0) Pin 2 of PORTD External Interrupt INT0 17 PD3(INT1) Pin 3 of PORTD External Interrupt INT1 4 18 PD4(OC1B) Pin 4 of PORTD OC1B (Timer Output Compare Match Output) or PWM output 19 PD5(OC1A) Pin 5 of PORTD OC1A (Timer Output Compare Match Output) or PWM output 20 PD6(ICP) Pin 6 of PORTD Timer/Counter1 Input Capture Pin 21 PD7 (OC2) Pin 7 of PORTD Timer/Counter2 Output Compare Match Output 22 PC0 (SCL) Pin 0 of PORTC TWI Interface 23 PC1 (SDA) Pin 1 of PORTC TWI Interface 24 PC2 (TCK) Pin 2 of PORTC JTAG Interface 25 PC3 (TMS) Pin 3 of PORTC JTAG Interface 26 PC4 (TDO) Pin 4 of PORTC JTAG Interface 27 PC5 (TDI) Pin 5 of PORTC JTAG Interface 28 PC6 (TOSC1) Pin 6 of PORTC Timer Oscillator Pin 1 29 PC7 (TOSC2) Pin 7 of PORTC Timer Oscillator Pin 2 30 Vcc Vcc for Internal ADC Converter 31 GND GROUND 32 AREF Analog Reference Pin for ADC 33 PA7 (ADC7) Pin 7 of PORTA ADC (Analog to Digital Converter) 5 Channel 7 34 PA6 (ADC6) Pin 6 of PORTA ADC (Analog to Digital Converter) Channel 6 35 PA5 (ADC5) Pin 5 of PORTA ADC (Analog to Digital Converter) Channel 5 36 PA4 (ADC4) Pin 4 of PORTA ADC (Analog to Digital Converter) Channel 4 37 PA3 (ADC3) Pin 3 of PORTA ADC (Analog to Digital Converter) Channel 3 38 PA2 (ADC2) Pin 2 of PORTA ADC (Analog to Digital Converter) Channel 2 39 PA1 (ADC1) Pin 1 of PORTA ADC (Analog to Digital Converter) Channel 1 40 PA0 (ADC0) Pin 0 of PORTA ADC (Analog to Digital Converter) Channel Table2.1.2 pin configuration of atmega16 2.1.1 Applications There are many of applications for ATMEGA16 microcontrollers. Engineers design Temperature control systems Embedded systems like coffee machine, vending machine. Digital signal processing 6 2.2 LCD DISPLAY Fig2.2.1 LCD display A liquid-crystal display (LCD) is a flat-panel display or other electronically modulated optical device that uses the light-modulating properties of liquid crystals. Liquid crystals do not emit light directly, instead using a backlight or reflector to produce images in color or monochrome. They use the same basic technology, except that arbitrary images are made up of a large number of small pixels, while other displays have larger elements. LCDs are used in a wide range of applications including computer monitors, televisions, instrument panels, aircraft cockpit displays, and indoor and outdoor signage. LCD screens have replaced heavy, bulky cathode ray tube (CRT) displays in nearly all applications. LCD screens are available in a wider range of screen sizes than CRT and plasma displays, with LCD screens available in sizes ranging from tiny digital watches to huge, big screen television sets. Since LCD screens do not use phosphors, they do not suffer image burn-in when a static image is displayed on a screen. The LCD screen is more energy efficient and can be disposed of more safely than a CRT can. Its low electrical power consumption enables it to be used in battery-powered electronic equipment more efficiently than CRTs can be. 2.3 JUMPER WIRE Jumper wires also known as jump wire. It is an electrical wire, or group of them in a cable, with a connector or pin at each end (or sometimes without them – simply “tinned”), which is normally used to interconnect the component of a breadboard or other prototype or test circuit, internally or with other equipment or components, without soldering. Jumper wires are simply wires that have connector pins at each end, allowing them to be used to connect two points to each other without soldering. 7 MALE-TO-MALE FEMALE-TO-MALE FEMALE-TO-FEMALE Fig2.3.1 jumper wires These are typically used with breadboards and other prototyping tools in order to make it easy to change a circuit as needed. Though jumper wires come in a variety of colors, the colors don’t actually mean anything. This means that a red jumper wire is technically the same as a black one. But the colors can be used to your advantage in order to differentiate between types of connections, such as ground or power. While jumper wires are easy and inexpensive to purchase. It comes in three versions: male-to-male, male-to-female and female-to-female. The difference between each is in the end point of the wire. Male ends have a pin protruding and can plug into things, while female ends do not and are used to plug things into. Male-to-male jumper wires are the most common and used to connect two ports on a breadboard. There are different types of jumper wires. Some have the same types of electrical connector at both ends, while others have different connectors. 2.4 ZERO PCB Fig2.4.1 Zero PCB 8 A printed circuit board (PCB) basic PCB consists of a flat sheet of insulating material and a layer of copper foil, laminated to the substrate. Chemical etching divides the copper into separate conducting lines called tracks or circuit traces, pads for connections, via to pass connections between layers of copper, and features such as solid conductive areas for electromagnetic shielding or other purposes. The tracks function as wires fixed in place, and are insulated from each other by air and the board substrate material. The surface of a PCB may have a coating that protects the copper from corrosion and reduces the chances of solder shorts between traces or undesired electrical contact with stray bare wires. For its function in helping to prevent solder shorts, the coating is called solder resist or solder mask 2.5 USB ASP PROGRAMMER Fig2.5.1 usb asp programmer USB asp is a USB in-circuit programmer for Atmel AVR controllers. It simply consists of an ATMega88 or an ATMega8 and a couple of passive components. The programmer uses a firmware-only USB driver; no special USB controller is needed. 2.5.1 Features: 1. 2. 3. 4. Works under multiple platforms. Linux, Mac OS X and Windows are tested. No special controllers or smd components are needed. Programming speed is up to 5kBytes/sec. SCK option to support targets with low clock speed (< 1,5MHz). 5. Planned: serial interface to target (e.g. for debugging). 2.5.2 Software: AVRDUDE supports USB asp since version 5.2. BASCOM-AVR supports USB asp since version 1.11.9.6. Khazama AVR Programmer is a Windows XP/Vista GUI application for USB asp and avrdude. Extreme Burner-AVR is a Windows GUI Software for USB asp based USB AVR programmers. After procuring usb asp connect the programmer to your computer. It comprises of two steps. First step is the physical connection of the programmer to the USB port using a suitable USB cable, and the second step is the installation of device drivers in order for it to work. After making the physical connection, go through the manufacture’s instruction manual to install device drivers for the USB asp Programmer. ATmega Programming Now the USB asp programmer and the programming adaptor are ready for use. Next step is the preparation of the first AVR C program. AVR Studio provides 9 an IDE for writing, debugging, and simulating programs. We will use the WinAVR GCC C compiler toolset with AVR Studio via plug-in module. 2.6 USB CABLE (UNIVERSAL SERIAL BUS) c Fig2.7.1 USB Universal Serial Bus (USB) is an industry standard that establishes specifications for cables and connectors and protocols for connection, communication and power supply between computers, peripheral devices and other computers. USB connectors have been increasingly replacing other types for battery chargers of portable devices. Examples of peripherals that are connected via USB include keyboards, pointing devices, digital still and video cameras, printers, portable media players, disk drives and network adapters. The Universal Serial Bus was developed to simplify and improve the interface between personal computers and peripheral devices, when compared with previously existing standard or ad-hoc proprietary interfaces. 2.7 ADAPTER An adapter is a physical device that allows one hardware or electronic interface to be adapted (accommodated without loss of function) to another hardware or electronic interface. In a computer, an adapter is often built into a card that can be inserted into a slot on the computer's motherboard.. An adapter or adaptor is a device that converts attributes of one device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another. 10 CHAPTER 3 SOFTWARE REQUIREMENT 3.1 EMBEDDED C Embedded C Programming is the soul of the processor functioning inside each and every embedded system we come across in our daily life, such as mobile phone, washing machine, and digital camera. Each processor is associated with embedded software. The first and foremost thing is the embedded software that decides functioning of the embedded system. Embedded C language is most frequently used to program the microcontroller. Fig 3.1.1 Cycle of embedded C Earlier, many embedded applications were developed using assembly level programming. However, they did not provide portability. This disadvantage was overcome by the advent of various high level languages like C, Pascal, and COBOL. However, it was the C language that got extensive acceptance for embedded systems, and it continues to do so. The C code written is more reliable, scalable, and portable; and in fact, much easier to understand. About C Language C language was developed by Dennis Ritchie in 1969. It is a collection of one or more functions, and every function is a collection of statements performing a specific task. C language is a middle-level language as it supports high-level applications and low-level applications. Before going into the details of embedded C programming, we should know about RAM memory organization. 11 3.1.1 SALIENT FEATURES OF THE LANGUAGE C language is software designed with different keywords, data types, variables, constants, etc. Embedded C is a generic term given to a programming language written in C, which is associated with particular hardware architecture. Embedded C is an extension to the C language with some additional header files. These header files may change from controller to controller. The microcontroller 8051 #include<reg51.h> is used. C PROGRAMMING EMBEDDED C PROGRAMMING Possesses native development in nature. Possesses cross development in nature. Independent of hardware architecture. Dependant on hardware architecture (microcontroller or other devices). Used for Desktop application, OS and PC Used for limited resources like RAM, ROM memories. and I/O peripherals on embedded controller. Table 3.1.1 Difference between C and embedded C 3.2 AVR DUDE AVRDUDE is autility to download/upload/manipulate the ROM and EEPROM content of AVR microcontrollers using in-system programming technique(ISP). AVR dude has once been started by Brian S.Dean as a private project of an in system programmer for the Atmel AVR microcontroller series, as apart of open source and free software tools collection available for these microcontrollers. 3.3 AVR STUDIO AVR Studio also called AVR simulator IDE is powerful application that supplies Atmel microcontroller users with user-friendly graphical development environment for windows with integrated simulator, AVR basic compiler, assembler, disassemble and debugger. It supports the extensive number of microcontroller from the Atmel 8-bit mega AVR. 12 CHAPTER 4 BASIC PRINCIPLE AND TECNOLOGY RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. Fig4.1 RFID tag It uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader interrogating radio waves. Active tags have a local power source (such as battery) and may operate hundreds of meters from the RFID reader. Unlike the barcode, the tags don’t need to be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is one method of automatic identification and data capture (AIDC). 4.1 How does a RFID system work? A RFID system is made up of two parts: a tag or label and a reader. RFID tags or labels are embedded with a transmitter and a receiver. The RFID components on the tags have two parts: a microchip that stores and processes information, and an antenna to receive and transmit a signal. The tag contains the specific serial number for one specific object. To read the information encoded on a tag, a two-way radio transmitter-receiver called an interrogator or reader emits a signal to the tag using an antenna. The tag responds with the information written in its memory bank. The interrogator will then transmit the read results to an RFID computer program. 13 Fig4.1.1 Schematic diagram of RFID In a retail setting, RFID tags may be attached to articles of clothing. When an inventory associate uses a handheld RFID reader to scan a shelf of jeans, the associate is able to differentiate between two pairs of identical jeans based upon the information stored on the RFID tag. Each pair will have its own serial number. With one pass of the handheld RFID reader, the associate can not only find a specific pair, but they can tell how many of each pair are on the shelf and which pairs need to be replenished. The associate can learn all of this information without having to scan each individual item. A significant advantage of RFID devices over the others mentioned above is that the RFID device does not need to be positioned precisely relative to the scanner. We're all familiar with the difficulty that store checkout clerks sometimes have in making sure that a barcode can be read. And obviously, credit cards and ATM cards must be swiped through a special reader. In contrast, RFID devices will work within a few feet (up to 20 feet for high-frequency devices) of the scanner. For example, you could just put all of your groceries or purchases in a bag, and set the bag on the scanner. It would be able to query all of the RFID devices and total your purchase immediately. (Read a more detailed article on RFID compared to barcodes.) RFID technology has been available for more than fifty years. It has only been recently that the ability to manufacture the RFID devices has fallen to the point where they can be used as a "throwaway" inventory or control device. Alien Technologies recently sold 500 million RFID tags to Gillette at a cost of about ten cents per tag. One reason that it has taken so long for RFID to come into common use is the lack of standards in the industry. Most companies invested in RFID technology only use the tags to track items within their control; many of the benefits of RFID come when items are tracked from company to company or from country to country. 14 CHAPTER 5 WORKING The project mainly focuses on providing security using RFID technology. Through this facility we can provide security quickly and at low cost. The main motto of designing this project is to make reliable as well as fast system which works impeccable. In this project we are using RFID tags which are actually assigned to each user for making individual ATM card holders. Only trustworthy ATM card holder has the facility to open the door. START READ THE CODE ON THE CARD USER NOT FOUND IS CODE VALID? COMPARE THE CODE WITH STORED CODE VALUE DISPLAY THE NAME OF THE CARD HOLDER OPEN THE DOOR FOR THE USER STOP Fig 5.1 Working of rfid 15 When we bring the RFID tag close to the RFID reader, by principle of electromagnetic induction the 12 digit secret number(code) of RFID tag is read by the RFID reader which scan the code and verifies whether the code is authentic or not. The code is matched with the codes in database. If the code is matched LCD screen displays the name of the authentic User and welcomes the user and if the code is not match with database it shows user not found. 5.1 CODE void card_info() // FOR RECEIVING 12 DIGIT RFID NO { int num=0; int end=0; while(num<12) { while((UCSRA&(1<<RXC))==0); ch[end]=UDR; end++; num++; } num=0; dis_cmd(1); _delay_ms(100); for(int i=0;i<end;i++) //// FOR DISPLAYING 12 DIGIT RFID NO { dis_data(ch[i]); } end=0; 16 } int info_cmp(char *data, char *str) { int count=0; PORTB|=(1<<0); for(int i=0; i<=11; i++) { if(data[i]==str[i]) count++; } if(count==12) { return(1); } else { return(0); } } int user_match() { int result=0; card_info(); result=info_cmp(ch,"1C003656C3BF"); if(result==1) {return(1);} 17 result=info_cmp(ch,"1D00AF31AC2F"); if(result==1) {return(2);} result=info_cmp(ch,"1C003657027F"); if(result==1) {return(3);} result=info_cmp(ch,"5500C79AB6BE"); if(result==1) {return(4);} return(0); } void uart_init() { UCSRB|=(1<<RXEN)|(1<<TXEN)|(1<<RXCIE); UCSRC|=(1<<URSEL)|(1<<UCSZ1)|(1<<UCSZ0); UBRRL=51; } int uart_recieve() { while((UCSRA&(1<<RXC))==0); return(UDR); } void uart_transmit(char data) { while((UCSRA&(1<<UDRE))==0); UDR=data; } 18 void lcd_init() { dis_cmd(0x02); dis_cmd(0x28); dis_cmd(0x0D); dis_cmd(0x06); }B void lcd_cmd(unsigned char a) { lcd_port=a; lcd_port &=~(1<<RS); lcd_port &=~(1<<RW); lcd_port |=(1<<E); _delay_ms(1); lcd_port &=~(1<<E); } void lcd_data(unsigned char a) { lcd_port=a; lcd_port |=(1<<RS); lcd_port &=~(1<<RW); lcd_port |=(1<<E); _delay_ms(1); lcd_port &=~(1<<E); } 19 void dis_cmd(unsigned char a) { unsigned char a1=a&0xF0; lcd_cmd(a1); a1=(a<<4)&0xF0; lcd_cmd(a1); } void dis_data(unsigned char a) { unsigned char a2=a&0xF0; lcd_data(a2); a2=(a<<4)&0xF0; lcd_data(a2); } void dis_string(unsigned char *str) { int i=0; while(str[i]!= '\0') { dis_data(str[i]); i++; } } void dis_number(long data) { unsigned int c; 20 dis_cmd(0X04); while(data!=0) { c=data%10; dis_data(c+48); data=data/10; } dis_cmd(0X06); } 21 CHAPTER 6 ADVANTAGES AND DISADVANTAGES 6.1 ADVANTAGES 1. RFID technology automates data collection and vastly reduces human effort and error 2. RFID supports tag reading with no line-of-sight or item-by-item scans required 3. RFID readers can read multiple RFID tags simultaneously, offering increases in efficiency 4. All RFID tags within range can be detected instantly and matched with information in your database 5. Assets can be cross-referenced against assigned locations and recorded as present, missing, or relocated 6. RFID can be integrated with active scanning and fixed readers for a totally automated tracking solution 7. Assets and employees can be tracked and located automatically for everything from supply chain and asset management to facility security and emergency planning 8. Available scanners support both RFID and bar-coding so you can upgrade at your own pace 6.2 DISADVANTAGES 1. No RFID standard has been set yet. (The Auto-ID centre has worked with standard bodies Uniform Code Council and EAN International to come up with electronic product code, but it is not yet considered a standard). 2. The demand should also drive down the price. (Wal-Mart says that a need for one billion RFID tags should drive down the price to five cents each). 3. Physical limitation like reading through liquid or metals still exist. 4. Accurate read rates on some items can be very low 5. Nylon conveyor belts and other RF’s can disrupt the tag transmissions in warehouses 6. Increase in expenses - the suppliers will have to equip their warehouses and transport vehicles with readers. These readers have to be connected to the computer networks for exchange of information. All these mean additional costs related to hiring technical consultants and additional hardware. 7. Wal-Mart inventory networks are burdened with the task of handling data of billions of their products. The company has to hence invest in extremely sophisticated system to process the data properly. 8. In the tie up with IBM Global Services that has resulted in deployment of RFID equipment in grocery sections of seven pilot Wal-Mart stores, IBM consultants have encountered interference from equipment such as handheld walkie-talkies, forklifts, and other devices typically found in distribution facilities. Cell phone towers located near the premises, which transmit at the high end of the frequency band, sometimes leak unwanted radio waves into RFID readers. 22 CHAPTER 7 APPLICATION AND FUTURE SCOPES 7.1 APPLICATION: Fig7.1 Application of rfid By providing a cheap, efficient, and reliable way to collect and store data, RFID offers limitless possibilities for current and future use. The list below highlights just a few of the myriad uses of RFID technology: 1. Product Tracking – RFID tags are increasingly used as a cost-effective way to track inventory and as a substitute for barcodes. For instance, bookstores such as Barnes & Noble use RFID to identify books to be removed from shelves and returned to publishing houses. 2. Toll Road Payments – Highway toll payment systems, such as E-Z Pass in the eastern states, uses RFID technology to electronically collect tolls from passing cars. Instead of stopping at the toll booth, cars pass directly through in the E-Z Pass lane and the toll is automatically deducted from a pre-paid card. 3. Passports – A number of countries, including Japan, the United States, Norway, and Spain incorporate RFID tags into passports to store information (such as a photograph) about the passport holder and to track visitors entering and exiting the country. 4. Identification – RFID chips can be implanted into animals and people to track their movements, provide access to secure locations, or help find lost pets. 23 5. Libraries – Libraries use RFID tags in books and other materials to track circulation and inventory, store product information (such as titles and authors), and to provide security from theft. Because RFID tags can be scanned without physically touching the item, checking books in and out, plus doing laborious tasks such as shelf inventory, can be accomplished quickly and efficiently using RFID technology. 6. Shipping – Large shipments of materials, such as retail goods, often utilize RFID tags to identify location, contents, and movement of goods. Wal-mart is one of the largest consumers of this technology to assist in tracking shipments of merchandise. 7. Other uses – RFID tags are employed in numerous other ways, including implantation in Saguaro cacti to discourage black-market traders, placement in car tires to transmit road condition information to the onboard computer, and placement around cities (such as Tokyo) to transmit tourist information to visitor cell phones. 7.2 FUTURE SCOPES 1. A hex keypad can be interfaced to microcontroller board by which user can enter 2. 3. 4. 5. password then only the lock can be opened. This ensures that even if someone has card then also without password he cannot get access. Connection to PC and development of PC side software to read from microcontroller. Cryptanalysis of the link between the card and the reader. Interfacing the system with a GSM so that data can be transmitted through messages. The card can be used in health services to store information such as administrative , medical ,biological and pharmaceutical records .It enables the doctor to have more complete and comprehensive healthcare information. 24 CHAPTER 9 CONCLUSION The project gave me an overview of the current state and trends in rfid technology .Even though numerous limitations and unresolved issues still hinder the widespread application of rfid .Despite these challenges rfid continues to make inroads into inventory control system and its only a matter of time before the components cost fall enough to make rfid an attractive proposition .The components that go into rfid readers and tags are simple radio communications but their smaller size and broad deployment enhance the power of technology . The rfid industry is about to enter an exciting period in which increased adoption will provide the means for technology providers to invest in new exciting innovations. Along with the new developments advancements in materials, organic polymer, nanotechnology and other areas will change the way rfid is incorporated into products. Instead of a tag attached to a garment, rfid transponder may be printed directly on the cloth or packaging using biodegradable conductive inks. The future of rfid is there, So both end users and rfid manufacturers should be prepared to leverage these new technologies and ready themselves for more widespread use of RFID. 25 REFERENCES https://electronicsforu.com https://components101.com https://Psocrfid.blogspot.com https://en.m.wikipedia.org https://electroschematics.com 26