You are on page 1of 49

POWER MANAGEMNET SYSTEM

TABLE OF CONTENTS
CHAPTER 1 INTRODUCTION
1.1 WHAT IS RFID?

1.2 HOW IT WORKS


1.3 TYPES OF RFID
1.4 RFID FREQUENCIES
1.5 PRESENT APPLICATTIONS
1.6 RFID v/s BARCODES
CHAPTER 2 COMPONENTS EXPLAINATION
4.1 MICROCONTROLLER ATMEGA 8A
4.2 RELAY
4.3 EM18 RFID CARD READER
4.4 RFID TAG
4.5 POLYESTER CAPACITORS
4.6 TRANSISTOR BC547
4.7 POWER RESISTOR
CHAPTER 2 BASIC BLOCK DIAGRAM
CHAPTER 5 CIRCUIT REPRESENTATION AND WORKING OF PROJECT
5.1 CIRCUIT DIAGRAM
5.2 WORKING OF MODEL
CHAPTER 6 ALGORITHM AND FLOW CHART DIAGRAM
6.1 FLOW CHART FOR RFID SYSTEM
CHAPTER 7 CONCLUSION
CHAPTER 8 FUTURE ENHANCEMENT
CHAPTER 9 REFERENCES

Abstract
The primary objective of any project in any undergraduate course is to implement
the concepts that we have studied in our curriculum. Apart from that it is the sole
responsibility of every student to make a project which could serve the society or
at least his / her almighty institute, with these points in our mind we started to
build a RFID BASED POWER MANAGEMENT SYSTEM. In the project we have
designed and implemented a RFID-based power access control. It grants
POWER ACCESS only to the persons intended like TENANT or renter via a
unique identification card in order to avoid power thefts and burglary- which is
most common in todays scenario of semi developed areas. The secured power
distribution can be extended from a single room to an entire hostel or home area.
From the hardware we are only showing the basic switching that illustrates the
working principle.
A very unique implementation can be done when interfaced with the PCs in the
offices ,clubs or highly secured areas. No external user can even turn on the
power supply until a valid card is swapped against the reader.
Similarly entire room can be made secured by completely limiting all the power
driven appliances being accessed by the user only.
Even if a few number of sockets are to be made access controlled; that can also
be done by attaching the relay only to the particular pins rather than affecting the
entire power supply .
Power burglary can easily be deterrent by such a system. The relay will not allow
the power supply to get in directly even if connected until the card is used. Hence
the security to the electricity supplies is made.
This basic circuitry is very economical and can be cleanly interfered with
any of the presently working devices that need to get POWER ACCESS

CONTROLLED rather than password controlled which can easily be


hacked.

CHAPTER 1
INTRODUCTION

RFID BASED POWER MANAGEMENT


1. INTRODUCTION
1.1 WHAT IS RFID

RFID is a tracking technology used to identify and authenticate tags that are applied to
any product, individual or animal. Radio frequency Identification and Detection is a
general term used for technologies that make use of radio waves in order to identify
objects and people.

ABOUT RFID
Purpose of Radio frequency Identification and Detection system is to facilitate data
transmission through the portable device known as tag that is read with the help of RFID
reader; and process it as per the needs of an application. Information transmitted with the
help of tag offers location or identification along with other specifics of product tagged
purchase date, color, and price. Typical RFID tag includes microchip with radio antenna,
mounted on substrate.
The RFID tags are configured to respond and receive signals from an RFID transceiver.
This allows tags to be read from a distance, unlike other forms of authentication
technology. The RFID system has gained wide acceptance in businesses, and is gradually

replacing the barcode system.

1.2 HOW RFID WORKS


Basic RFID consists of an antenna, transceiver and transponder. To understand the
working of a typical RFID system, check the following animation.
Antenna emits the radio signals to activate tag and to read as well as write information to
it. Reader emits the radio waves, ranging from one to 100 inches, on the basis of used
radio frequency and power output. While passing through electronic magnetic zone,
RFID tag detects activation signals of readers.

Powered by its internal battery or by the reader signals, the tag sends radio waves back to
the reader. Reader receives these waves and identifies the frequency to generate a unique

ID. Reader then decodes data encoded in integrated circuit of tags and transmits it to the
computers for use.

Powered by its internal battery or by the reader signals, the tag sends radio waves back to
the reader. Reader receives these waves and identifies the frequency to generate a unique
ID. Reader then decodes data encoded in integrated circuit of tags and transmits it to the
computers for use.

Powered by its internal battery or by the reader signals, the tag sends radio waves back to
the reader. Reader receives these waves and identifies the frequency to generate a unique
ID. Reader then decodes data encoded in integrated circuit of tags and transmits it to the
computers for use.

1.3 TYPES OF RFID

Active and passive RFID are different technologies but are usually evaluated together.
Even though both of them use the radio frequency for communication between tag and
reader, means of providing power to tags is different. Active RFID makes use of battery
within tag for providing continuous power to tag and radio frequency power circuitry.
Passive RFID on the other hand, relies on energy of radio frequency transferred from
reader to tag for powering it.

Passive RFID needs strong signals from reader but signal strength bounced from tag is at
low levels. Active RFID receives low level signals by tag but it can create higher level
signals to readers. This type of RFID is constantly powered, whether in or out of the
readers field. Active tags consist of external sensors for checking humidity, temperature,
motion as well as other conditions.

1.4 RFID FREQUENCIES


Just like you can tune a radio in various frequencies for listening to different channels,
RFID readers and tags need to be tuned in to a same frequency for communication. RFID
system uses various frequencies but most common and popularly used frequency is low,
high and ultra high frequency. Low frequency is around 125 KHz, high is around 13.56
MHz and ultra high varies between 860-960 MHz. Some applications also make use of
microwave frequency of 2.45 GHz. It is imperative to choose right frequency for an
application as radio waves work different at various frequencies.

1.5 RFID APPLICATIONS

The role of RFID is not just confined to Aircraft identification anymore; it is also lending
a hand in various commercial uses. Asset tracking is one of the most popular uses of
RFID. Companies are using RFID tags on the products that might get stolen or

misplaced. Almost each type of Radio frequency Identification and Detection system can
be used for the purpose of asset management.

Manufacturing plants have also been using RFID from a long time now. These systems
are used for tracking parts and working in process for reduction of defects, managing
production of various versions and increasing output. The technology has also been
useful in the closed looped supply chains for years. More and more companies are
turning to this technology for tracking shipments among the supply chain allies. Not just
manufacturers but retailers also are using this RFID technology for proper placement of
their products and improvements in the supply chain.

RFID also plays an important role in the access and security control. The newly
introduced 13.56 MHz RFID systems provide long range readings to the users. The best
part is that RFID is convenient to handle and requires low maintenance at the same time.

1.6 RFID v/s Bar Codes

RFID definitely has an edge over conventional technology of bar codes. RFID reader
easily pulls data from tag at greater distances as compared to barcodes. Range

in case of RFID is around 300 feet as against 15 feet of barcodes. So RFID tags can be
read much faster as compared to barcodes. While reading the barcodes is time
consuming, RFID readers can interrogate rates of more than 40 tags in a second.

Need of line of sight in case of barcodes restricts reusability and ruggedness of the
barcodes. RFID, on the other hand are rugged, since its components are protected in
plastic cover. The Radio frequency Identification and Detection can also be fitted within
the products for ensuring greater reusability and ruggedness. Unlike barcodes, RFID tags
can be used as write and read devices. One can use RFID tags for communicating with
the tag and for altering the information stored on it.
10

CHAPTER 2
COMPONENTS EXPLANATION
11

1.1 MICROCONTROLLER
Atmega 8A PU

12

1. General description
Features
High-performance, Low-power AVR 8-bit Microcontroller
Advanced RISC Architecture
130 Powerful Instructions Most Single-clock Cycle Execution
32 x 8 General Purpose Working Registers
Fully Static Operation
Up to 16 MIPS Throughput at 16 MHz
On-chip 2-cycle Multiplier
High Endurance Non-volatile Memory segments
8K Bytes of In-System Self-programmable Flash program memory
512 Bytes EEPROM
1K Byte Internal SRAM
Write/Erase Cycles: 10,000 Flash/100,000 EEPROM
Data retention: 20 years at 85C/100 years at 25C(1)
Optional Boot Code Section with Independent Lock Bits
In-System Programming by On-chip Boot Program
True Read-While-Write Operation
Programming Lock for Software Security
Peripheral Features
Two 8-bit Timer/Counters with Separate Prescaler, one Compare Mode
One 16-bit Timer/Counter with Separate Prescaler, Compare Mode, and
Capture
Mode

13

Real Time Counter with Separate Oscillator


Three PWM Channels
8-channel ADC in TQFP and QFN/MLF package
Eight Channels 10-bit Accuracy
6-channel ADC in PDIP package
Six Channels 10-bit Accuracy
Byte-oriented Two-wire Serial Interface
Programmable Serial USART
Master/Slave SPI Serial Interface
Programmable Watchdog Timer with Separate On-chip Oscillator
On-chip Analog Comparator
I/O and Packages
23 Programmable I/O Lines
28-lead PDIP, 32-lead TQFP, and 32-pad QFN/MLF
Operating Voltages
2.7 - 5.5V for ATmega8A
Speed Grades
0 - 16 MHz for ATmega8A
Power Consumption at 4 Mhz, 3V, 25C
Active: 3.6 mA
Idle Mode: 1.0 mA
Power-down Mode: 0.5 A

1.2

Pin Descriptions

2.2.1 VCC
Digital supply voltage.
2.2.2 GND
Ground.
2.2.3 Port B (PB7:PB0) XTAL1/XTAL2/TOSC1/TOSC2
Port B is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The
Port B output buffers have symmetrical drive characteristics with both high sink
and source
capability. As inputs, Port B pins that are externally pulled low will source current
if the pull-up
resistors are activated. The Port B pins are tri-stated when a reset condition
becomes active,even if clock is not running.
2.2.4 Port C (PC5:PC0)
Port C is an 7-bit bi-directional I/O port with internal pull-up resistors (selected for
each bit). The

14

Port C output buffers have symmetrical drive characteristics with both high sink
and source
capability. As inputs, Port C pins that are externally pulled low will source current
if the pull-up
resistors are activated. The Port C pins are tri-stated when a reset condition
becomes active,
even if the clock is not running.
2.2.7 RESET
Reset input. A low level on this pin for longer than the minimum pulse length will
generate a
reset, even if the clock is not running. The minimum pulse length is given in Table
25-3 on page
247. Shorter pulses are not guaranteed to generate a reset.
AREF
AREF is the analog reference pin for the A/D Converter.

2. Block diagram

15

16

3. Pinning information

1.2

RELAY (HL jqc 3fc dc)

Features

17

High Current Contacts


RoHS Compliant
Compact Size
Economically Priced

Specifications
Coil Data
Coil Power: 360mW
Nominal Voltage: 24Vdc
Pick-Up Voltage: 18.0Vdc
Drop-Out Voltage: 2.4Vdc
Maximum Voltage: 31.2Vdc
Coil Resitance: 1600ohm
Contact Data
Contact Rating: 10A 277Vac / 28Vdc
Maximum Switching Voltage: 277Vac / 30Vdc
Maximum Switching Current: 10 A
Maximum Switching Power: 2770VA / 210W
Mechanical Endurance: 10,000,000 Operations
Electrical Endurance: 100,000 Operations (NO Contact)
Maximum Turn-On Time: 10 ms
Maximum Turn-Off Time: 5 ms
General
Dielectric Strength (Between Contacts): 750 VAC 1 min
Insulation Resistance: 100 Mohm@500 VDC
Ambient Operating Temperature Range: -40C to +85C
Weight: 10.0g
RoHS Compliant: Yes

18

Pin layout

circuit

diagram

4.3 RFID reader module

The EM-18 RFID Reader module operating at 125kHz is an inexpensive solution


for your RFID based application. The Reader module comes with an on-chip
antenna and can be powered up with a 5V power supply. Power-up the module
and connect the transmit pin of the module to recieve pin of your
microcontroller. Show your card within the reading distance and the card
number is thrown at the output. Optionally the module can be configured for
also a weigand output.

19

Features:

Reading Distance: 6-10 cm


Dimesntion: 40mmx20mmx8mm (LxHxW)
Frequency:125kHz
Compatible Card codes:Manchester64-bit,modules64
Current Rating: 35mA (Max)
Operating Voltage:4.6V - 5.4VDC

RFID systems detect the coded information in tags via readers. A Passive
Reader Active Tag (PRAT) system has a passive reader which only receives
radio signals from active tags (battery operated, transmit only). The reception
range of a PRAT system reader can be adjusted from 12,000 feet (0.30
609.60 m)], allowing flexibility in applications such as asset protection and
supervision.
An Active Reader Passive Tag (ARPT) system has an active reader, which
transmits interrogator signals and also receives authentication replies from
passive tags.
An Active Reader Active Tag (ARAT) system uses active tags awoken with an
interrogator signal from the active reader. A variation of this system could also
use a Battery-Assisted Passive (BAP) tag which acts like a passive tag but has a
small battery to power the tag's return reporting signal.
Fixed readers are set up to create a specific interrogation zone which can be
tightly controlled. This allows a highly defined reading area for when tags go in
and out of the interrogation zone. Mobile readers may be hand-held or mounted
on carts or vehicles.

4.4 RFID TAG

20

A radio-frequency identification system uses tags, or labels attached to the


objects to be identified. Two-way radio transmitter-receivers
called interrogators or readers send a signal to the tag and read its response.
RFID tags can be either passive, active or battery-assisted passive. An active tag
has an on-board battery and periodically transmits its ID signal. A batteryassisted passive (BAP) has a small battery on board and is activated when in the
presence of an RFID reader. A passive tag is cheaper and smaller because it has
no battery. However, to start operation of passive tags, they must be illuminated
with a power level roughly three magnitudes stronger than for signal
transmission. That makes a difference in interference and in exposure to
radiation.
Tags may either be read-only, having a factory-assigned serial number that is
used as a key into a database, or may be read/write, where object-specific data
can be written into the tag by the system user. Field programmable tags may be
write-once, read-multiple; "blank" tags may be written with an electronic product
code by the user. A tag with no inherent identity is always threatened to get
manipulated.
RFID tags contain at least two parts: an integrated circuit for storing and
processing information, modulating and demodulating a radio-frequency (RF)
signal, collecting DC power from the incident reader signal, and other specialized
functions; and an antenna for receiving and transmitting the signal. The tag
information is stored in a non-volatile memory. The RFID tag includes either a
chip-wired logic or a programmed or programmable data processor for
processing the transmission and sensor data, respectively.
An RFID reader transmits an encoded radio signal to interrogate the tag. The
RFID tag receives the message and then responds with its identification and
other information. This may be only a unique tag serial number, or may be

21

product-related information such as a stock number, lot or batch number,


production date, or other specific information.
TAGS (Transponders)
An RFID tag is comprised of a microchip containing identifying information and an
antenna that transmits this data wirelessly to a reader. At its most basic, the chip will
contain a serialized identifier, or license plate number, that uniquely identifies that item,
similar to the way many bar codes are used today. A key difference, however is that RFID
tags have a higher data capacity than their bar code counterparts. This increases the
options for the type of information that can be encoded on the tag, including the
manufacturer, batch or lot number, weight, ownership, destination and history (such as
the temperature range to which an item has been exposed). In fact, an unlimited list of
other types of information can be stored on RFID tags, depending on application needs.
An RFID tag can be placed on individual items, cases or pallets for identification
purposes, as well as on fixed assets such as trailers, containers, totes, etc.
Tags come in a variety of types, with a variety of capabilities. Key variables include:
"Read-only" versus "read-write"
There are three options in terms of how data can be encoded on tags: (1) Read-only tags
contain data such as a serialized tracking number, which is pre-written onto them by the
tag manufacturer or distributor. These are generally the least expensive tags because they
cannot have any additional information included as they move throughout the supply
chain. Any updates to that information would have to be maintained in the application
software that tracks SKU movement and activity. (2) "Write once" tags enable a user to
write data to the tag one time in production or distribution processes. Again, this may
include a serial number, but perhaps other data such as a lot or batch number. (3) Full
"read-write" tags allow new data to be written to the tag as neededand even written
over the original data. Examples for the latter capability might include the time and date
of ownership transfer or updating the repair history of a fixed asset. While these are the
most costly of the three tag types and are not practical for tracking inexpensive items.

RFID TAGS

22

Data capacity
The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as
much as several thousand bits on the high end. Of course, the greater the storage capacity,
the higher the price per tag.
Form factor
The tag and antenna structure can come in a variety of physical form factors and can
either be self-contained or embedded as part of a traditional label structure (i.e., the tag is
inside what looks like a regular bar code labelthis is termed a 'Smart Label') companies
must choose the appropriate form factors for the tag very carefully and should expect to
use multiple form factors to suit the tagging needs of different physical products and units
of measure. For example, a pallet may have an RFID tag fitted only to an area of
protected placement on the pallet itself. On the other hand, cartons on the pallet have
RFID tags inside bar code labels that also provide operators human-readable information
and a back-up should the tag fail or pass through non RFID-capable supply chain links.
4.5 Polyester Capacitors

100 watt 5 volts capacitor in series with relay used to suppress heavy voltage drops
across the relay when switched to the ac supply of 220 volts.
It helps in
1.Managing Electromagnetic Interference
2.Control Inductive Loads with a Induction Suppression Capacitor
3.Capacitor Absorbs the High Voltages Generated by Inductive Loads
4.A Capacitor Improves the Lifespan of the Relay and Reliability of the Board
5.Handling Inductive Loads
Perhaps the most overlooked aspect of relay control is proper handling of inductive loads.
Inductive loads can best be defined as anything with a magnetic coil, such as a motor,
solenoid, or a transformer. Controlling a inductive load using our relay controllers

23

requires the use of induction suppression capacitors. The purpose of this capacitor is to
absorb the high voltages generated by inductive loads, blocking them from the contacts of
the relay. Without this capacitor, the lifespan of the relay will be greatly reduced.
Induction can be so severe that it electrically interferes with the microprocessor logic of
our controllers, causing relay banks to shut themselves down unexpectedly. In the case of
USB devices, customers may experience loss of communications until the device is
reconnected to the USB port.

4.6 IC 7805

It is used to regulate the 12 volts supply from adapter to 5 volts supply


suitable for the functioning of the microcontroller and remaining circuit
upto relay.
7805 is a voltage regulator integrated circuit. It is a member of 78xx series of
fixed linear voltage regulator ICs. The voltage source in a circuit may have
fluctuations and would not give the fixed voltage output. The voltage regulator
IC maintains the output voltage at a constant value. The xx in 78xx indicates the
fixed output voltage it is designed to provide. 7805 provides +5V regulated power
supply. Capacitors of suitable values can be connected at input and output pins
depending upon the respective voltage levels.
Pin
No
1

Function

Name

Input voltage (5V-18V)

Input

24

2
3

Ground (0V)
Regulated output; 5V (4.8V-5.2V)

Ground
Output

4.7 Transistor BC 547

It is used to amplify the current reaching relay such that above a certain
threshold the relay is driven by the current output supplied by the
microcontroller in presence of a valid rfid card swap. ULN 2000 can also be
used.

BC547 is an NPN bi-polar junction transistor. A transistor, stands for transfer of


resistance, is commonly used to amplify current. A small current at its base
controls a larger current at collector & emitter terminals.

BC547 is mainly used for amplification and switching purposes. It has a


maximum current gain of 800. Its equivalent transistors are BC548 and BC549.

The transistor terminals require a fixed DC voltage to operate in the desired


region of its characteristic curves. This is known as the biasing. For amplification
applications, the transistor is biased such that it is partly on for all input
conditions. The input signal at base is amplified and taken at the emitter. BC547

25

is used in common emitter configuration for amplifiers. The voltage divider is the
commonly used biasing mode. For switching applications, transistor is biased so
that it remains fully on if there is a signal at its base. In the absence of base
signal, it gets off.
4.8 Electrolytic capacitor

An electrolytic

capacitor is

a capacitor that

uses

an electrolyte (an

ionic

conducting liquid) as one of its plates to achieve a larger capacitance per unit
volume than other types. The large capacitance of electrolytic capacitors makes
them particularly suitable for passing or bypassing low-frequency signals and
storing large amounts of energy. They are widely used in power supplies,and
interconnecting stages of amplifiers at audio frequencies. An electrolytic
capacitor will generally have higher leakage current than a comparable (dry)
capacitor, and may have siginificant limitations in its operating temperature range,
parasitic resistance and inductance, and the stability and accuracy of its
capacitance value.

26

4.9 Power Resistance ( 5W 10 ohms)

the power resistor is used in series with the such that the current reaching the
relay is limited and could not damage it. Relays has a maximum current rating of
1 ampere and the supply may damage its working. Normal resistors cant be used
as they possess very low power rating (0.25 w) and may burn out at higher
currents

27

CHAPTER 2
BASIC BLOCK DIAGRAM

28

1. APPLICATION BLOCK DIAGRAM

POWER
SUPPLY

RFID Reader
MICROCONTROLLER
(ATMEGA8P)

MEMORY

ADAPTER

RELAY

APPLIANCES
TO CONTROL

29

2. TOP LEVEL BLOCK DIAGRAM

30

CHAPTER 5
CIRCUIT REPRESENTATION AND
WORKING OF PROJECT

31

5.1 CIRCUIT DIAGRAM

32

5.2 WORKING OF RFID

As soon as Shown below is a typical RFID system. In every RFID system the
transponder Tags contain information. This information can be as little as a single
binary bit , or be a large array of bits representing such things as an identity
code, personal medical information, or literally any type of information that can be
stored in digital binary format.

33

Shown is a RFID transceiver that communicates with a passive Tag. Passive tags have
no power source of their own and instead derive power from the incident
electromagnetic field. Commonly the heart of each tag is a microchip. When the Tag
enters the generated RF field it is able to draw enough power from the field to access its
internal memory and transmit its stored information.
When the transponder Tag draws power in this way the resultant interaction of the RF
fields causes the voltage at the transceiver antenna to drop in value. This effect is
utilized by the Tag to communicate its information to the reader. The Tag is able to
control the amount of power drawn from the field and by doing so it can modulate
the voltage sensed at the Transceiver according to the bit pattern it wishes to transmit.

In the circuit shown whenever a valid user with rfid tag swaps it across the rfid
reader ; a pulse signal is generated by the hinderance of the magnetic field across
the tag reader or more precisely by flux change an emf is induced in the tag circuit
which enables it and it transmits its serial card number to the rfid receiver. If
verified with the serial number embedded in the microcontrollers memory,it
switches the relay on and the attached appliance will get the power supply.

34

CHAPTER 3
PROBLEM FORMULATION AND
SOFTWARE

35

SOFTWARE USED : Arduino

The open-source Arduino environment makes it easy to write code and


upload it to the i/o board. It runs on Windows, Mac OS X, and Linux.
The environment is written in Java and based on Processing, avr-gcc,
and other open source software.
The program feeded in the atmega is as follows:

#include <avr/pgmspace.h>
// Tags include the two CRC bytes (14 bytes total)
String Card = "08006A60282A";
prog_char tag_0[] PROGMEM = "08006A60282A"; //add your tags here
PROGMEM const char *tag_table[] =
{
tag_0
};
//---String tagString;
char tagNumber[14];
boolean receivedTag;
int lockPIN=4; // pin 7 is controls

36

int led = 13;


void setup() {
pinMode(led, OUTPUT);
pinMode(lockPIN,OUTPUT);
Serial.begin(9600);
digitalWrite(led, LOW);
}
void loop()
{
receivedTag=false;
while (Serial.available()){
int BytesRead = Serial.readBytesUntil(3, tagNumber, 15);
receivedTag=true;
}
if (receivedTag){
tagString=tagNumber;
Serial.println();
Serial.print("Tag Number: ");
Serial.println(tagString);
if (tagString.equals(Card)) {
Serial.println("Tag Authorized");
Power();
}
else{
Serial.print("Unauthorized Tag: ");
// Serial.println(tagString);
delay(50);
digitalWrite(lockPIN,LOW);
37

delay(1500); // a delay of 1500ms and a flush() seems to stop tag repeats


Serial.flush();
}
memset(tagNumber,0,sizeof(tagNumber)); //erase tagNumber
}
}
// ---// checkTag function (give it the tag string complete with SOT and EOT)
// compares with tags in tag_table
// and returns true if the tag is in the list
boolean checkTag(String tag){
char testTag[14];
for (int i = 0; i < sizeof(tag_table); i++)
{
strcpy_P(testTag, (char)pgm_read_word(&(tag_table[i])));
if(tag.substring(1,13)==testTag){//substring function removes SOT and
EOT
return true;
break;
}
}
return false;
} //---void Power(){
Serial.print("Unlocking...");
digitalWrite(lockPIN,HIGH);
digitalWrite(led,HIGH);
delay(1500);// a delay of 1500ms and a flush() seems to stop tag repeats

38

digitalWrite(led,LOW);
Serial.flush();
}

CHAPTER 6

ALGORITHM AND FLOW


CHART DIAGRAM

39

6.1 FLOW CHART


Flow Chart is a basic and simple procedure for the explanation of any programming
procedure. It explains how the programming part is working with simplicity and ease.

Flow chart consists of initialization of variables in the preset period of


microcontroller.

Then comes the two separate loops namely


Registration
Verification

Registration includes whether user want to add or delete the IDs.

Verification includes scanning then comparing with stored ID if it is match then


access granted else display the user is unauthorized.

40

START

Initialize Variables

Verification

Compare ID with stored


IDs

YES

NO

Relay unaffected

Display Access granted,


and turn the relay on

Bulb glows
END
41

CHAPTER 7

CONCLUSION

42

CONCLUSION

RFID is an evolving technology which has a great future scope with its advance
technology access. The role of RFID is not just confined to Aircraft identification
anymore; it is also lending a hand in various commercial uses. Almost each type of Radio
frequency Identification and Detection system can be used for the purpose of asset
management. Manufacturing plants have also been using RFID from a long time now.
These systems are used for tracking parts and working in process for reduction of defects,
managing production of various versions and increasing output. The technology has also

43

been useful in the closed looped supply chains for years. More and more companies are
turning to this technology for tracking shipments among the supply chain allies. Not just
manufacturers but retailers also are using this RFID technology for proper placement of
their products and improvements in the supply chain. The best part is that RFID is
convenient to handle and requires low maintenance at the same time.

Innovativeness and Usefulness


For mutual power sharing, entire rights are to the owner without the legal
instalment of electric meter.
Along with homes these can also be used at hotels, hostels, haats, banks,
offices etc. to provide controlled power access to various sections.
Due to the uniqueness of RFID tag, the power consumption data and
outage information of customers can all be recorded and then be identified
in the rear-end processing system
The system is fully automated, once installed it does not require human
intervention for its processing.
It is practically implementable and economical.

44

CHAPTER 8

FUTURE ENHANCEMENT

45

FUTURE ENHANCEMENT

Present trends point towards the fast growth of RFID in the next decade. With around 600
million RFID tags sold in the year 2005 alone, value of market including systems,
services and hardware is likely to grow by factor of 10 between years 2006 -2016. It is
expected that total number of RFID tags delivered in the year 2016 will be around 450
times as compared to the ones delivered in the year 2006.
Commercial applications using Radio Frequency Identification and Detection like
logistics, transport, supply chain supervision, processing, manufacturing, medicine,
access control are also likely to grow by leaps and bounds. But this smart technology will
influence consumer sectors and government too. Barcodes and RFID will coexist for
years to come, although the latter is expected to replace the former in many sectors.

46

CHAPTER 9

REFERENCES

47

9. REFERENCE

http://discovery.bits-pilani.ac.in/Other/ceeai/sample-projectsynopsis.pdf

http://arduino.cc/en/main/software

http://www.electronicsforu.com/newelectronics/defaultcampaign.asp

http://www.efymag.com/admin/issuepdf/RFID-Based-SecuritySystem.zip

http://www.electronicsforu.com/electronicsforu/circuitarchives/view_arti
cle.asp?sno=458&id=4704

http://grietinfo.in/projects/MINI/EEE/DOC-B.13-RFID%20based
%20secured%20Access%20system.pdf

microcontroller and embedded system by Mazidi

www.electronicsforum.com

NSK Electronics
48

All datasheets from www.datasheetcatalog.com

About ATMEGA 8A-PU from www.atmel.com

And www.triindia.co.in

About DS1820 from www.dallas.com

49

You might also like