You are on page 1of 50

IOT based Smart Shopping Trolley using Aurdino

INDEX
CHAPTER 1. INTRODUCTION
1.1 INTRODUCTION
1.2 BLOCK DIAGRAM
1.3 DESCRIPTION OF PROJECT

CHAPTER 2. DESCRIPTION OF HARDWARE COMPONENTS


2.1 AURDINO CONTROLLER
2.2 POWER SUPPLY
2.2.1 TRANSFORMER
2.2.2 RECTIFIER
2.2.3 FILTER CAPACITOR
2.2.4 REGULATOR
2.3 RF ID MODULE
2.4 LCD MODULE
2.5 IOT MODULE(ESP8266)

CHAPTER 3. SOURCE CODE


3.1 SOURCE CODE

CHAPTER 4. CIRCUIT DIAGRAM


CHAPTER 5. SOFTWARE DEVELOPMENT
CHAPTER 6 . CONCLUSION
CHAPTER 7. REFERENCE AND BIBILOGRAPHY
CHAPTER 1 : INTRODUCTION

1.1 INTRODUCTION

1.1 Introduction of embedded system :


An Embedded System is a combination of computer hardware and software, and
perhaps additional mechanical or other parts, designed to perform a specific function. A good
example is the microwave oven. Almost every household has one, and tens of millions of them
are used every day, but very few people realize that a processor and software are involved in
the preparation of their lunch or dinner.

This is in direct contrast to the personal computer in the family room. It too is
comprised of computer hardware and software and mechanical components (disk drives, for
example). However, a personal computer is not designed to perform a specific function rather;
it is able to do many different things. Many people use the term general-purpose computer to
make this distinction clear. As shipped, a general-purpose computer is a blank slate; the
manufacturer does not know what the customer will do wish it. One customer may use it for a
network file server another may use it exclusively for playing games, and a third may use it to
write the next great American novel.

Frequently, an embedded system is a component within some larger system. For


example, modern cars and trucks contain many embedded systems. One embedded system
controls the anti-lock brakes, other monitors and controls the vehicle's emissions, and a third
displays information on the dashboard. In some cases, these embedded systems are connected
by some sort of a communication network, but that is certainly not a requirement.

At the possible risk of confusing you, it is important to point out that a


general-purpose computer is itself made up of numerous embedded systems. For example, my
computer consists of a keyboard, mouse, video card, modem, hard drive, floppy drive, and
sound card-each of which is an embedded system. Each of these devices contains a processor
and software and is designed to perform a specific function. For example, the modem is
designed to send and receive digital data over analog telephone line. That's it and all of the
other devices can be summarized in a single sentence as well.
If an embedded system is designed well, the existence of the processor and software
could be completely unnoticed by the user of the device. Such is the case for a microwave
oven, VCR, or alarm clock. In some cases, it would even be possible to build an equivalent
device that does not contain the processor and software. This could be done by replacing the
combination with a custom integrated circuit that performs the same functions in hardware.
However, a lot of flexibility is lost when a design is hard-cooled in this way. It is mush easier,
and cheaper, to change a few lines of software than to redesign a piece of custom hardware.

1.1.2 Real Time Systems:


One subclass of embedded is worthy of an introduction at this point. As commonly
defined, a real-time system is a computer system that has timing constraints. In other words, a
real-time system is partly specified in terms of its ability to make certain calculations or
decisions in a timely manner. These important calculations are said to have deadlines for
completion. And, for all practical purposes, a missed deadline is just as bad as a wrong answer.

The issue of what if a deadline is missed is a crucial one. For example, if the real-time
system is part of an airplane's flight control system, it is possible for the lives of the passengers
and crew to be endangered by a single missed deadline. However, if instead the system is
involved in satellite communication, the damage could be limited to a single corrupt data
packet. The more severe the consequences, the more likely it will be said that the deadline is
"hard" and thus, the system is a hard real-time system. Real-time systems at the other end of
this discussion are said to have "soft" deadlines.

All of the topics and examples presented in this book are applicable to the designers of
real-time system who is more delight in his work. He must guarantee reliable operation of the
software and hardware under all the possible conditions and to the degree that human lives
depend upon three system's proper execution, engineering calculations and descriptive
paperwork.

1.1.3 Application Areas


Nearly 99 per cent of the processors manufactured end up in embedded systems.
The embedded system market is one of the highest growth areas as these systems are used in
very market segment- consumer electronics, office automation, industrial automation,
biomedical engineering, wireless communication, data communication, telecommunications,
transportation, military and so on.
1.1.4 Consumer appliances:
At home we use a number of embedded systems which include digital camera, digital
diary, DVD player, electronic toys, microwave oven, remote controls for TV and air-
conditioner, VCO player, video game consoles, video recorders etc. Today’s high-tech car has
about 20 embedded systems for transmission control, engine spark control, air-conditioning,
navigation etc. Even wristwatches are now becoming embedded systems. The palmtops are
powerful embedded systems using which we can carry out many general-purpose tasks such as
playing games and word processing.

1.1.5 Office automation:


The office automation products using em embedded systems are copying machine, fax
machine, key telephone, modem, printer, scanner etc.

1.1.6 Industrial automation:


Today a lot of industries use embedded systems for process control. These include
pharmaceutical, cement, sugar, oil exploration, nuclear energy, electricity generation and
transmission. The embedded systems for industrial use are designed to carry out specific tasks
such as monitoring the temperature, pressure, humidity, voltage, current etc., and then take
appropriate action based on the monitored levels to control other devices or to send
information to a centralized monitoring station. In hazardous industrial environment, where
human presence has to be avoided, robots are used, which are programmed to do specific jobs.
The robots are now becoming very powerful and carry out many interesting and complicated
tasks such as hardware assembly.

1.1.7 Medical electronics:


Almost every medical equipment in the hospital is an embedded system. These
equipments include diagnostic aids such as ECG, EEG, blood pressure measuring devices, X-
ray scanners; equipment used in blood analysis, radiation, colonscopy, endoscopy etc.
Developments in medical electronics have paved way for more accurate diagnosis of diseases.

1.1.8 Computer networking:


Computer networking products such as bridges, routers, Integrated Services Digital
Networks (ISDN), Asynchronous Transfer Mode (ATM), X.25 and frame relay switches are
embedded systems which implement the necessary data communication protocols. For
example, a router interconnects two networks. The two networks may be running different
protocol stacks. The router’s function is to obtain the data packets from incoming pores,
analyze the packets and send them towards the destination after doing necessary protocol
conversion. Most networking equipments, other than the end systems (desktop computers) we
use to access the networks, are embedded systems

1.1.9 Telecommunications:
In the field of telecommunications, the embedded systems can be categorized as
subscriber terminals and network equipment. The subscriber terminals such as key telephones,
ISDN phones, terminal adapters, web cameras are embedded systems. The network equipment
includes multiplexers, multiple access systems, Packet Assemblers Dissemblers (PADs),
sate11ite modems etc. IP phone, IP gateway, IP gatekeeper etc. are the latest embedded
systems that provide very low-cost voice communication over the Internet.

1.1.10 Wireless technologies:


Advances in mobile communications are paving way for many interesting applications
using embedded systems. The mobile phone is one of the marvels of the last decade of the 20’h
century. It is a very powerful embedded system that provides voice communication while we
are on the move. The Personal Digital Assistants and the palmtops can now be used to access
multimedia services over the Internet. Mobile communication infrastructure such as base
station controllers, mobile switching centers are also powerful embedded systems.

1.1.11 Security:
Security of persons and information has always been a major issue. We need to protect
our homes and offices; and also the information we transmit and store. Developing embedded
systems for security applications is one of the most lucrative businesses nowadays. Security
devices at homes, offices, airports etc. for authentication and verification are embedded
systems. Encryption devices are nearly 99 per cent of the processors that are manufactured end
up in~ embedded systems. Embedded systems find applications in . every industrial segment-
consumer electronics, transportation, avionics, biomedical engineering, manufacturing, process
control and industrial automation, data communication, telecommunication, defense, security
etc. Used to encrypt the data/voice being transmitted on communication links such as
telephone lines. Biometric systems using fingerprint and face recognition are now being
extensively used for user authentication in banking applications as well as for access control in
high security buildings.
1.1.13 Finance:
Financial dealing through cash and cheques are now slowly paving way for transactions
using smart cards and ATM (Automatic Teller Machine, also expanded as Any Time Money)
machines. Smart card, of the size of a credit card, has a small micro-controller and memory;
and it interacts with the smart card reader! ATM machine and acts as an electronic wallet.
Smart card technology has the capability of ushering in a cashless society. Well, the list goes
on. It is no exaggeration to say that eyes wherever you go, you can see, or at least feel, the
work of an embedded system!

1.1.14 What are microcontrollers and what are they used for?
Like all good things, this powerful component is basically very simple. It is made by
mixing tested and high- quality "ingredients" (components) as per following receipt:

On the basis of these rules, numerous types of microcontrollers were designed and they
quickly became man's invisible companion. Their incredible simplicity and flexibility
conquered us a long time ago and if you try to invent something about them, you should know
that you are probably late, someone before you has either done it or at least has tried to do it.
The following things have had a crucial influence on development and success of the
microcontrollers:

1.1.15 How does the microcontroller operate?


Even though there is a large number of different types of microcontrollers and
even more programs created for their use only, all of them have many things in common. Thus,
if you learn to handle one of them you will be able to handle them all. A typical scenario on the
basis of which it all functions is as follows:

1. Power supply is turned off and everything is still…the program is loaded into the
microcontroller, nothing indicates what is about to come…
2. Power supply is turned on and everything starts to happen at high speed! The control logic
unit keeps everything under control. It disables all other circuits except quartz crystal to
operate. While the preparations are in progress, the first milliseconds go by.
FIG 1 : Microcontroller opertae

1.1.16 What is what in the microcontroller?


As you can see, all the operations within the microcontroller are performed at high speed
and quite simply, but the microcontroller itself would not be so useful if there are not special
circuits which make it complete. In continuation, we are going to call your attention to them.

1.1.17 Read Only Memory (ROM)


Read Only Memory (ROM) is a type of memory used to permanently save the program
being executed. The size of the program that can be written depends on the size of this
memory. ROM can be built in the microcontroller or added as an external chip, which depends
on the type of the microcontroller. Both options have some disadvantages. If ROM is added as
an external chip, the microcontroller is cheaper and the program can be considerably longer. At
the same time, a number of available pins is reduced as the microcontroller uses its own
input/output ports for connection to the chip. The internal ROM is usually smaller and more
expensive, but leaves more pins available for connecting to peripheral environment. The size
of ROM ranges from 512B to 64KB.

Random Access Memory (RAM)


Random Access Memory (RAM) is a type of memory used for temporary storing data and
intermediate results created and used during the operation of the microcontrollers. The content
of this memory is cleared once the power supply is off. For example, if the program performes
an addition, it is necessary to have a register standing for what in everyday life is called the
“sum” . For that purpose, one of the registers in RAM is called the "sum" and used for storing
results of addition. The size of RAM goes up to a few KBs.

1.1.18 Electrically Erasable Programmable ROM (EEPROM)


The EEPROM is a special type of memory not contained in all microcontrollers. Its
contents may be changed during program execution (similar to RAM ), but remains
permanently saved even after the loss of power (similar to ROM). It is often used to store
values, created and used during operation (such as calibration values, codes, values to count up
to etc.), which must be saved after turning the power supply off. A disadvantage of this
memory is that the process of programming is relatively slow. It is measured in miliseconds.

1.1.19 Special Function Registers (SFR)


Special function registers are part of RAM memory. Their purpose is predefined by the
manufacturer and cannot be changed therefore. Since their bits are physically connected to
particular circuits within the microcontroller, such as A/D converter, serial communication
module etc., any change of their state directly affects the operation of the microcontroller or
some of the circuits. For example, writing zero or one to the SFR controlling an input/output
port causes the appropriate port pin to be configured as input or output. In other words, each bit
of this register controls the function of one single pin.

1.1.20 Program Counter


Program Counter is an engine running the program and points to the memory address
containing the next instruction to execute. After each instruction execution, the value of the
counter is incremented by 1. For this reason, the program executes only one instruction at a
time just as it is written. However…the value of the program counter can be changed at any
moment, which causes a “jump” to a new memory location. This is how subroutines and
branch instructions are executed. After jumping, the counter resumes even and monotonous
automatic counting.
1.2 BLOCK DIAGRAM

LCD

POWER IOT MODULE


SUPPLY

AURDINO

RFID READER UNO


WITH TAGS

WITH TAGS
SWITCHES

HARDWARE REQUIREMENT:

1. MICROCONTROLLER ( ATMEGA 328)

2. RFID MODULE WITH TAGS.

3. IOT MODULE

4.LCD
1.3 OBJECTIVE OF THE PROJECT:

Abstract:
Now-a-days shopping is increasing rapidly. People take the items and put it into
trolley. After shopping they go at the billing counter for billing but there are many
people standing in queue for billing purpose. So more time is required for the
individuals for billing because of existing barcode technology. To reduce this time
we have implemented a system which is based on RFID technology[3].The system
contains the items attached with RFID tags. The cart is interacting with the main
server and it will have the facility to generate the bill for all the products added
into the cart. The proposed system will be helpful for avoiding queues in shopping
malls for billing .If customer is not willing to take some products he can deduct it
from the cart .Along with this we have added feature IOT ,so we can observe all
the things like total ,no of items like detail description along with total amount all
these things we can get in our mobile through wifi technology. The customer can
identify the product in shopping malls with automatic billing. With the proposed
design there is no conventional queue system instead of that automatic billing is
generated and hence the shopping becomes easy and enjoyable.
CHAPTER 2
DESCRIPTION OF HARDWARE COMPONENTS

2.1 ARDUINO

2.1.1 Introduction

The Arduino Uno is an open-source microcontroller board based on


the Microchip ATmega328P microcontroller and developed by Arduino.cc.[2][3] The board is
equipped with sets of digital and analog input/output (I/O) pins that may be interfaced to
various expansion boards (shields) and other circuits. [1] The board has 14 digital I/O pins (six
capable of PWM output), 6 analog I/O pins, and is programmable with the Arduino
IDE (Integrated Development Environment), via a type B USB cable.[4] It can be powered by
the USB cable or by an external 9-volt battery, though it accepts voltages between 7 and 20
volts. It is similar to the Arduino Nano and Leonardo.[5][6] The hardware reference design is
distributed under a Creative Commons Attribution Share-Alike 2.5 license and is available on
the Arduino website. Layout and production files for some versions of the hardware are also
available.
The word "uno" means "one" in Italian and was chosen to mark the initial release
of Arduino Software.[1] The Uno board is the first in a series of USB-based Arduino boards;[3] it
and version 1.0 of the Arduino IDE were the reference versions of Arduino, which have now
evolved to newer releases.[4] The ATmega328 on the board comes preprogrammed with
a bootloader that allows uploading new code to it without the use of an external hardware
programmer.[3]
While the Uno communicates using the original STK500 protocol, [1] it differs from all
preceding boards in that it does not use the FTDI USB-to-serial driver chip. Instead, it uses the
Atmega16U2 (Atmega8U2 up to version R2) programmed as a USB-to-serial converter.[7
History

The Arduino project started at the Interaction Design Institute Ivrea (IDII) in Ivrea, Italy. At
that time, the students used a BASIC Stamp microcontroller, at a cost that was a considerable
expense for many students. In 2003, Hernando Barragán created the development
platform Wiring as a Master's thesis project at IDII, under the supervision of Massimo Banzi
and Casey Reas, who are known for work on the Processing language. The project goal was to
create simple, low-cost tools for creating digital projects by non-engineers. The Wiring
platform consisted of a printed circuit board (PCB) with an ATmega168 microcontroller, an
IDE based on Processing, and library functions to easily program the microcontroller. [8] In
2003, Massimo Banzi, with David Mellis, another IDII student, and David Cuartielles, added
support for the cheaper ATmega8 microcontroller to Wiring. But instead of continuing the
work on Wiring, they forked the project and renamed it Arduino. Early arduino boards used the
FTDI USB-to-serial driver chip and an ATmega168. The Uno differed from all preceding
boards by featuring the ATmega328P microcontroller and an ATmega16U2 (Atmega8U2 up to
version R2) programmed as a USB-to-serial converter.
 Technical specifications
 Microcontroller: Microchip ATmega328P
 Operating Voltage: 5 Volts
 Input Voltage: 7 to 20 Volts
 Digital I/O Pins: 14 (of which 6 can provide PWM output)
 UART: 1
 I2C: 1
 SPPI: 1
 Analog Input Pins: 6
 DC Current per I/O Pin: 20 mA
 DC Current for 3.3V Pin: 50 mA
 Flash Memory: 32 KB of which 0.5 KB used by boot loader
 SRAM: 2 KB
 EEPROM: 1 KB
 Clock Speed: 16 MHz
 Length: 68.6 mm
 Width: 53.4 mm
 Weight: 25 g
 Headers

Fig 2 :Arduino UNO


General pin functions
 LED: There is a built-in LED driven by digital pin 13. When the pin is high value, the
LED is on, when the pin is low, it is off.
 VIN: The input voltage to the Arduino/Genuino board when it is using an external
power source (as opposed to 5 volts from the USB connection or other regulated power
source). You can supply voltage through this pin, or, if supplying voltage via the power
jack, access it through this pin.
 5V: This pin outputs a regulated 5V from the regulator on the board. The board can be
supplied with power either from the DC power jack (7 - 20V), the USB connector (5V),
or the VIN pin of the board (7-20V). Supplying voltage via the 5V or 3.3V pins
bypasses the regulator, and can damage the board.
 3V3: A 3.3 volt supply generated by the on-board regulator. Maximum current draw is
50 mA.
 GND: Ground pins.
 IOREF: This pin on the Arduino/Genuino board provides the voltage reference with
which the microcontroller operates. A properly configured shield can read the IOREF
pin voltage and select the appropriate power source, or enable voltage translators on the
outputs to work with the 5V or 3.3V.
 Reset: Typically used to add a reset button to shields that block the one on the board.[7]
Special pin functions
Each of the 14 digital pins and 6 analog pins on the Uno can be used as an input or output,
under software control (using pin Mode (), digital Write (), and digital Read () functions). They
operate at 5 volts. Each pin can provide or receive 20 mA as the recommended operating
condition and has an internal pull-up resistor (disconnected by default) of 20-50K ohm. A
maximum of 40mA must not be exceeded on any I/O pin to avoid permanent damage to the
microcontroller. The Uno has 6 analog inputs, labeled A0 through A5; each provides 10 bits of
resolution (i.e. 1024 different values). By default, they measure from ground to 5 volts, though
it is possible to change the upper end of the range using the AREF pin and the analog
Reference () function.[7]
In addition, some pins have specialized functions:
 Serial / UART: pins 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL
serial data. These pins are connected to the corresponding pins of the ATmega8U2
USB-to-TTL serial chip.
 External interrupts: pins 2 and 3. These pins can be configured to trigger an interrupt
on a low value, a rising or falling edge, or a change in value.
 PWM (pulse-width modulation): pins 3, 5, 6, 9, 10, and 11. Can provide 8-bit PWM
output with the analog Write () function.
 SPI (Serial Peripheral Interface): pins 10 (SS), 11 (MOSI), 12 (MISO), and 13 (SCK).
These pins support SPI communication using the SPI library.
 TWI (two-wire interface) / I²C: pin SDA (A4) and pin SCL (A5). Support TWI
communication using the Wire library.
 AREF (analog reference): Reference voltage for the analog inputs.
 Communication
The Arduino/Genuino Uno has a number of facilities for communicating with a computer,
another Arduino/Genuino board, or other microcontrollers. The ATmega328 provides UART
TTL (5V) serial communication, which is available on digital pins 0 (RX) and 1 (TX). An
ATmega16U2 on the board channels this serial communication over USB and appears as a
virtual com port to software on the computer. The 16U2 firmware uses the standard USB COM
drivers, and no external driver is needed. However, on Windows, a .inf file is required.
Arduino Software (IDE) includes a serial monitor which allows simple textual data to be sent
to and from the board. The RX and TX LEDs on the board will flash when data is being
transmitted via the USB-to-serial chip and USB connection to the computer (but not for serial
communication on pins 0 and 1). A Software Serial library allows serial communication on any
of the Uno's digital pins.[7]

Automatic (software) reset


Rather than requiring a physical press of the reset button before an upload, the
Arduino/Genuino Uno board is designed in a way that allows it to be reset by software running
on a connected computer. One of the hardware flow control lines (DTR) of the
ATmega8U2/16U2 is connected to the reset line of the ATmega328 via a 100 Nano farad
capacitor. When this line is asserted (taken low), the reset line drops long enough to reset the
chip.[7]
This setup has other implications. When the Uno is connected to a computer running Mac OS
X or Linux, it resets each time a connection is made to it from software (via USB). For the
following half-second or so, the boot loader is running on the Uno. While it is programmed to
ignore malformed data (i.e. anything besides an upload of new code), it will intercept the first
few bytes of data sent to the board after a connection is opened.
2.2 POWER SUPPLY
All digital circuits require regulated power supply. In this article we are going to learn
how to get a regulated positive supply from the mains supply.
 

Figure 1 shows the basic block diagram of a fixed regulated power supply. Let us go through
each block.

2.2.1 TRANSFORMER

A transformer consists of two coils also called as “WINDINGS” namely PRIMARY &
SECONDARY. They are linked together through inductively coupled electrical conductors
also called as CORE. A changing current in the primary causes a change in the Magnetic Field
in the core & this in turn induces an alternating voltage in the secondary coil. If load is applied
to the secondary then an alternating current will flow through the load. If we consider an ideal
condition then all the energy from the primary circuit will be transferred to the secondary
circuit through the magnetic field.

So
 
The secondary voltage of the transformer depends on the number of turns in the Primary as well as in the
secondary.

2.2.2 RECTIFIER
A rectifier is a device that converts an AC signal into DC signal. For rectification purpose we
use a diode, a diode is a device that allows current to pass only in one direction i.e. when the
anode of the diode is positive with respect to the cathode also called as forward biased
condition & blocks current in the reversed biased condition.
 
Rectifier can be classified as follows:
1)      Half Wave rectifier.

This is the simplest type of rectifier as you can see in the diagram a half wave rectifier consists
of only one diode. When an AC signal is applied to it during the positive half cycle the diode is
forward biased & current flows through it. But during the negative half cycle diode is reverse
biased & no current flows through it. Since only one half of the input reaches the output, it is
very inefficient to be used in power supplies.
 2)      Full wave rectifier.

Half wave rectifier is quite simple but it is very inefficient, for greater efficiency we
would like to use both the half cycles of the AC signal. This can be achieved by using a center
tapped transformer i.e. we would have to double the size of secondary winding & provide
connection to the center. So during the positive half cycle diode D1 conducts & D2 is in
reverse biased condition. During the negative half cycle diode D2 conducts & D1 is reverse
biased. Thus we get both the half cycles across the load.
One of the disadvantages of Full Wave Rectifier design is the necessity of using a center
tapped transformer, thus increasing the size & cost of the circuit. This can be avoided by using
the Full Wave Bridge Rectifier.

  3)      BRIDGE RECTIFIER


As the name suggests it converts the full wave i.e. both the positive & the negative half cycle
into DC thus it is much more efficient than Half Wave Rectifier & that too without using a
center tapped transformer thus much more cost effective than Full Wave Rectifier.

Full Bridge Wave Rectifier consists of four diodes namely D1, D2, D3 and D4. During the
positive half cycle diodes D1 & D4 conduct whereas in the negative half cycle diodes D2 &
D3 conduct thus the diodes keep switching the transformer connections so we get positive half
cycles in the output.

 If we use a center tapped transformer for a bridge rectifier we can get both positive & negative
half cycles which can thus be used for generating fixed positive & fixed negative voltages.

2.2.3 FILTER CAPACITOR


Even though half wave & full wave rectifier give DC output, none of them
provides a constant output voltage. For this we require to smoothen the waveform received
from the rectifier. This can be done by using a capacitor at the output of the rectifier this
capacitor is also called as “FILTER CAPACITOR” or “SMOOTHING CAPACITOR” or
“RESERVOIR CAPACITOR”. Even after using this capacitor a small amount of ripple will
remain.We place the Filter Capacitor at the output of the rectifier the capacitor will charge to
the peak voltage during each half cycle then will discharge its stored energy slowly through the
load while the rectified voltage drops to zero, thus trying to keep the voltage as constant as
possible.
If we go on increasing the value of the filter capacitor then the Ripple will decrease. But then the costing
will increase. The value of the Filter capacitor depends on the current consumed by the circuit, the
frequency of the waveform & the accepted ripple.

 
Where,
Vr= accepted ripple voltage.( should not be more than 10% of  the voltage)
I= current consumed by the circuit in Amperes.
F= frequency of the waveform. A half wave rectifier has only one peak in one cycle so F=25hz
Whereas a full wave rectifier has Two peaks in one cycle so F=100hz.

2.2.4 VOLTAGE REGULATOR 

A Voltage regulator is a device which converts varying input voltage into a constant regulated
output voltage. Voltage regulator can be of two types
1)      Linear Voltage Regulator
      Also called as Resistive Voltage regulator because they dissipate the excessive voltage
resistively as heat.
2)      Switching Regulators.
      They regulate the output voltage by switching the Current ON/OFF very rapidly. Since
their output is either ON or OFF it dissipates very low power thus achieving higher efficiency
as compared to linear voltage regulators. But they are more complex & generate high noise due
to their switching action. For low level of output power switching regulators tend to be costly
but for higher output wattage they are much cheaper than linear regulators.
The most commonly available Linear Positive Voltage Regulators are the 78XX series where
the XX indicates the output voltage. And 79XX series is for Negative Voltage Regulators.

 After filtering the rectifier output the signal is given to a voltage regulator. The maximum
input voltage that can be applied at the input is 35V.Normally there is a 2-3 Volts drop across
the regulator so the input voltage should be at least 2-3 Volts higher than the output voltage. If
the input voltage gets below the Vmin of the regulator due to the ripple voltage or due to any
other reason the voltage regulator will not be able to produce the correct regulated voltage.

(i) Circuit diagram:

Circuit Diagram of power supply

IC 7805:
7805 is an integrated three-terminal positive fixed linear voltage regulator. It supports
an input voltage of 10 volts to 35 volts and output voltage of 5 volts. It has a current rating of 1
amp although lower current models are available. Its output voltage is fixed at 5.0V. The 7805
also has a built-in current limiter as a safety feature. 7805 is manufactured by many companies,
including National Semiconductors and Fairchild Semiconductors.

The 7805 will automatically reduce output current if it gets too hot.The last two digits
represent the voltage; for instance, the 7812 is a 12-volt regulator. The 78xx series of
regulators is designed to work in complement with the 79xx series of negative voltage
regulators in systems that provide both positive and negative regulated voltages, since the 78xx
series can't regulate negative voltages in such a system.

The 7805 & 78 is one of the most common and well-known of the 78xx series
regulators, as it's small component count and medium-power regulated 5V make it useful for
powering TTL devices.

2.3 RFID MODULE

History of RFID:
In a very interesting article, the San Jose Mercury News tells us about Charles Walton, the
man behind the radio frequency identification technology (RFID). Since his first patent about it
in 1973, Walton, now 83 years old, collected about $3 million from royalties coming from his
patents. Unfortunately for him, his latest patent about RFID expired in the mid-1990s. So he
will not make any money from the billions of RFID tags that will appear in the years to come.
But he continues to invent and his latest patent about a proximity card with incorporated PIN
code protection was granted in June 2004.

What is RFID ?

RFID is short for Radio Frequency Identification. Generally a RFID system consists of 2 arts.
A Reader, and one or more Transponders, also known as Tags. RFID systems evolved from
barcode labels as a means to automatically identify and track products and people. You will
be generally,with,”RFID”
systems as seen in:
 Access Control.
RFID Readers placed at entrances that require a person to pass their proximity card (RF
tag) to be "read' before the access can be made.
 Contact less Payment Systems.
RFID tags used to carry payment information. RFIDs are particular suited to electronic
Toll collection systems. Tags attached to vehicles, or carried by people transmit
payment information to a fixed reader attached to a Toll station. Payments are then
routinely deducted from a users account, or information is changed directly on the
RFID tag.
 Product Tracking and Inventory Control. RFID systems are commonly used to track
and record the movement of ordinary items such as library books, clothes, factory
pallets, electrical goods and numerous items.

How do RFIDs work?

Shown below is a typical RFID system. In every RFID system the transponder Tags contain
information. This information can be as little as a single binary bit, or be a large array of bits
representing such things as an identity code, personal medical information, or literally any
type of information that can be stored in digital binary format.

FIG 3 : RFID work

Shown is a RFID transceiver that communicates with a passive Tag. Passive tags have no
power source of their own and instead derive power from the incident electromagnetic
field. Commonly the heart of each tag is a microchip. When the Tag enters the generated RF
field it is able to draw enough power from the field to access its internal memory and
transmit its stored information.
When the transponder Tag draws power in this way the resultant interaction of the RF fields
causes the voltage at the transceiver antenna to drop in value. This effect is utilized by the
Tag to communicate its information to the reader. The Tag is able to control the amount of
power drawn from the field and by doing so it can modulate the voltage sensed at the
Transceiver according to the bit pattern it wishes to transmit.

ARTICLE 1 : COMPONENTS OF RFID

Basic RFID systems consist of three components:

 An antenna or coil
 A transceiver (with decoder)
 A transponder (RF tag) electronically programmed with unique information

These are described below:

1. ANTENNA

The antenna emits radio signals to activate the tag and read and write data to it. Antennas are
the conduits between the tag and the transceiver, which controls the system's data acquisition
and communication. Antennas are available in a variety of shapes and sizes; they can be built
into a door frame to receive tag data from persons or things passing through the door, or
mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The
electromagnetic field produced by an antenna can be constantly present when multiple tags are
expected continually. If constant interrogation is not required, a sensor device can activate the
field.

Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a.
interrogator), which can be configured either as a handheld or a fixed-mount device. The
reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending
upon its power output and the radio frequency used. When an RFID tag passes through the
electromagnetic zone, it detects the reader's activation signal. The reader decodes the data
encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer
for processing.

Fig 4: Antenna

2. TAGS (Transponders)

An RFID tag is comprised of a microchip containing identifying information and an antenna


that transmits this data wirelessly to a reader. At its most basic, the chip will contain a
serialized identifier, or license plate number, that uniquely identifies that item,

similar to the way many bar codes are used today. A key difference, however is that RFID tags
have a higher data capacity than their bar code counterparts. This increases the options for the
type of information that can be encoded on the tag, including the manufacturer, batch or lot
number, weight, ownership, destination and history (such as the temperature range to which an
item has been exposed). In fact, an unlimited list of other types of information can be stored on
RFID tags, depending on application needs. An RFID tag can be placed on individual items,
cases or pallets for identification purposes, as well as on fixed assets such as trailers,
containers, totes, etc.

Tags come in a variety of types, with a variety of capabilities. Key variables include:

"Read-only" versus "read-write"

There are three options in terms of how data can be encoded on tags: (1) Read-only tags
contain data such as a serialized tracking number, which is pre-written onto them by the tag
manufacturer or distributor. These are generally the least expensive tags because they cannot
have any additional information included as they move throughout the supply chain. Any
updates to that information would have to be maintained in the application software that tracks
SKU movement and activity. (2) "Write once" tags enable a user to write data to the tag one
time in production or distribution processes. Again, this may include a serial number, but
perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new data to
be written to the tag as needed—and even written over the original data. Examples for the
latter capability might include the time and date
of ownership transfer or updating the repair history of a fixed asset. While these are the most
costly of the three tag types and are not practical for tracking inexpensive items, future
standards for electronic product codes (EPC) appear to be headed in this direction.

Fig 5 : RFID TAGS

Data capacity

The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as much
as several thousand bits on the high end. Of course, the greater the storage capacity, the higher
the price per tag.

Article II. Form factor

The tag and antenna structure can come in a variety of physical form factors and can either be
self-contained or embedded as part of a traditional label structure (i.e., the tag is inside what
looks like a regular bar code label—this is termed a 'Smart Label') companies must choose the
appropriate form factors for the tag very carefully and should expect to use multiple form
factors to suit the tagging needs of different physical products and units of measure. For
example, a pallet may have an RFID tag fitted only to an area of protected placement on the
pallet itself. On the other hand, cartons on the pallet have RFID tags inside bar code labels that
also provide operators human-readable information and a back-up should the tag fail or pass
through non RFID-capable supply chain links.

Passive versus active

“Passive” tags have no battery and "broadcast" their data only when energized by a reader.
That means they must be actively polled to send information. "Active" tags are capable of
broadcasting their data using their own battery power. In general, this means that the read
ranges are much greater for active tags than they are for passive tags—perhaps a read range of
100 feet or more, versus 15 feet or less for most passive tags. The extra capability and read
ranges of active tags, however, come with a cost; they are several times more expensive than
passive tags. Today, active tags are much more likely to be used for high-value items or fixed
assets such as trailers, where the cost is minimal compared to item value, and very long read
ranges are required. Most traditional supply chain applications, such as the RFID-based
tracking and compliance programs emerging in the consumer goods retail chain, will use the
less expensive passive tags.

Frequencies
Like all wireless communications, there are a variety of frequencies or spectra through which
RFID tags can communicate with readers. Again, there are trade-offs among cost, performance
and application requirements. For instance, low-frequency tags are cheaper than ultra high-
frequency (UHF) tags, use less power and are better able to penetrate non-metallic substances.
They are ideal for scanning objects with high water content, such as fruit, at close range. UHF
frequencies typically offer better range and can transfer data faster. But they use more power
and are less likely to pass through some materials. UHF tags are typically best suited for use
with or near wood, paper, cardboard or clothing products. Compared to low-frequency tags,
UHF tags might be better for scanning boxes of goods as they pass through a bay door into a
warehouse. While the tag requirements for compliance mandates may be narrowly defined, it is
likely that a variety of tag types will be required to solve specific operational issues. You will
want to work with a company that is very knowledgeable in tag and reader technology to
appropriately identify the right mix of RFID technology for your environment and
applications.
EPC Tags

EPC refers to "electronic product code," an emerging specification for RFID tags, readers and
business applications first developed at the Auto-ID Center at the Massachusetts Institute of
Technology. This organization has provided significant intellectual leadership toward the use
and application of RFID technology. EPC represents a specific approach to item identification,
including an emerging standard for the tags themselves, including both the data content of the
tag and open wireless communication protocols. In a sense, the EPC movement is combining
the data standards embodied in certain bar code specifications, such as the UPC or UCC-128
bar code standards, with the wireless data communication standards that have been developed
by ANSI and other groups.

3. RF Transceiver:

The RF transceiver is the source of the RF energy used to activate and power the passive RFID
tags. The RF transceiver may be enclosed in the same cabinet as the reader or it may be a
separate piece of equipment. When provided as a separate piece of equipment, the transceiver
is commonly referred to as an RF module. The RF transceiver controls and modulates the radio
frequencies that the antenna transmits and receives. The transceiver filters and amplifies the
backscatter signal from a passive RFID tag.

Typical Applications for RFID

 Automatic Vehicle identification


 Inventory Management
 Work-in-Process
 Container/ Yard Management
 Document/ Jewellery tracking
 Patient Monitoring

The Advantages of RFID Over Bar Coding


 No "line of sight" requirements: Bar code reads can sometimes be limited or
problematic due to the need to have a direct "line of sight" between a scanner and a bar
code. RFID tags can be read through materials without line of sight.

 More automated reading: RFID tags can be read automatically when a tagged product
comes past or near a reader, reducing the labor required to scan product and allowing
more proactive, real-time tracking.

 Improved read rates: RFID tags ultimately offer the promise of higher read rates than
bar codes, especially in high -speed operations such as carton soratation.

 Greater data capacity: RFID tags can be easily encoded with item details such as lot
and batch, weight, etc.
 "Write" capabilities: Because RFID tags can be rewritten with new data as supply
chain activities are completed, tagged products carry updated information as they move
throughout the supply chain.

(i) Common Problems with RFID

Some common problems with RFID are reader collision and tag collision. Reader collision
occurs when the signals from two or more readers overlap. The tag is unable to respond to
simultaneous queries. Systems must be carefully set up to avoid this problem. Tag collision
occurs when many tags are present in a small area; but since the read time is very fast, it is
easier for vendors to develop systems that ensure that tags respond one at a time. See Problems
with RFID for more details.
2.4 LCD

To display interactive messages we are using LCD Module. We examine an intelligent


LCD display of two lines,16 characters per line that is interfaced to the controllers. The
protocol (handshaking) for the display is as shown. Whereas D0 to D7th bit is the Data lines,
RS, RW and EN pins are the control pins and remaining pins are +5V, -5V and GND to
provide supply. Where RS is the Register Select, RW is the Read Write and EN is the Enable
pin.

The display contains two internal byte-wide registers, one for commands (RS=0) and
the second for characters to be displayed (RS=1). It also contains a user-programmed RAM
area (the character RAM) that can be programmed to generate any desired character that can be
formed using a dot matrix. To distinguish between these two data areas, the hex command byte
80 will be used to signify that the display RAM address 00h will be chosen.Port1 is used to
furnish the command or data type, and ports 3.2 to3.4 furnish register select and read/write
levels.

The display takes varying amounts of time to accomplish the functions as listed. LCD bit 7 is
monitored for logic high (busy) to ensure the display is overwritten.

Liquid Crystal Display also called as LCD is very helpful in providing user interface as well as
for debugging purpose. The most common type of LCD controller is HITACHI 44780 which
provides a simple interface between the controller & an LCD. These LCD's are very simple to
interface with the controller as well as are cost effective.
Fig 6 : 2x16 Line Alphanumeric LCD Display
The most commonly used ALPHANUMERIC displays are 1x16 (Single Line & 16 characters),
2x16 (Double Line & 16 character per line) & 4x20 (four lines & Twenty characters per line). 
The LCD requires 3 control lines (RS, R/W & EN) & 8 (or 4) data lines. The number on data
lines depends on the mode of operation. If operated in 8-bit mode then 8 data lines + 3 control
lines i.e. total 11 lines are required. And if operated in 4-bit mode then 4 data lines + 3 control
lines i.e. 7 lines are required. How do we decide which mode to use? It’s simple if you have
sufficient data lines you can go for 8 bit mode & if there is a time constrain i.e. display should
be faster then we have to use 8-bit mode because basically 4-bit mode takes twice as more time
as compared to 8-bit mode.
 Pin  Symbol Function
 1  Vss  Ground
 2  Vdd  Supply Voltage
 3  Vo  Contrast Setting
 4  RS  Register Select
 5  R/W  Read/Write Select
 6  En  Chip Enable Signal
 7-14  DB0-DB7  Data Lines
 15  A/Vee  Gnd for the backlight
 16  K  Vcc for backlight
When RS is low (0), the data is to be treated as a command. When RS is high (1), the data
being sent is considered as text data which should be displayed on the screen.
When R/W is low (0), the information on the data bus is being written to the LCD. When RW
is high (1), the program is effectively reading from the LCD. Most of the times there is no need
to read from the LCD so this line can directly be connected to Gnd thus saving one controller
line.
The ENABLE pin is used to latch the data present on the data pins. A HIGH - LOW signal is
required to latch the data. The LCD interprets and executes our command at the instant the EN
line is brought low. If you never bring EN low, your instruction will never be executed.
COMMANDS USED IN LCD
2.5 IOT MODULE(ESP 8266)

FIG 7 : IOT module (esp 8266)

ESP8266 Features
 802.11 b/g/n protocol
 Wi-Fi Direct (P2P), soft-AP

 Integrated TCP/IP protocol stack


 Integrated TR switch, balun, LNA, power amplifier and matching network

 Integrated PLL, regulators, and power management units

 +19.5dBm output power in 802.11b mode

 Integrated temperature sensor

 Supports antenna diversity

 Power down leakage current of < 10uA

 Integrated low power 32-bit CPU could be used as application processor

 SDIO 2.0, SPI, UART

 STBC, 1×1 MIMO, 2×1 MIMO

 A-MPDU & A-MSDU aggregation & 0.4µs guard interval

 Wake up and transmit packets in < 2ms

 Standby power consumption of < 1.0mW (DTIM3)

The ESP8266 is a low-cost Wi-Fi chip with full TCP/IP stack and MCU (Micro Controller
Unit) capability produced by Shanghai-based Chinese manufacturer,

The chip first came to the attention of western makers in August 2014 with the ESP-01
module, made by a third-party manufacturer, AI-Thinker. This small module allows
microcontrollers to connect to a Wi-Fi network and make simple TCP/IP connections using
Hayes-style commands. However, at the time there was almost no English-language
documentation on the chip and the commands it accepted. The very low price and the fact that
there were very few external components on the module which suggests that it could
eventually be very inexpensive in volume, attracted many hackers to explore the module, chip,
and the software on it, as well as to translate the Chinese documentation.

The ESP8285 is an ESP8266 with 1 MB of built-in flash, allowing for single-chip devices
capable of connecting to Wi-Fi.

The successor to these module(s) is ESP32.


This is the series of ESP8266-based modules made by Espressif.

In the table above (and the two tables which follow), "Active pins" include the GPIO and ADC
pins with which you can attach external devices to the ESP8266 MCU. The "Pitch" is the space
between pins on the ESP8266 module, which is important to know if you are going to
breadboard the device. The "Form factor" also describes the module packaging as "2 x 9 DIL",
meaning two rows of 9 pins arranged "Dual In Line", like the pins of DIP ICs. Many ESP-xx
modules include a small on-board LED which can be programmed to blink and thereby
indicate activity. There are several antenna options for ESP-xx boards including a trace
antenna, an on-board ceramic antenna, and an external connector which allows you to attach an
external Wi-Fi antenna. Since Wi-Fi communications generates a lot of RFI (Radio Frequency
Interference), governmental bodies like the FCC like shielded electronics to minimize
interference with other devices. Some of the ESP-xx modules come housed within a metal box
with an FCC seal of approval stamped on it. First and second world markets will likely demand
FCC approval and shielded Wi-Fi devices.

AI-Thinker modules

FIG 8: AI THINKER MODULE

ESP-01 module

These are the first series of modules made with the ESP8266 by the third-party manufacturer
AI-Thinker and remain the most widely available. They are collectively referred to as "ESP-xx
modules". To form a workable development system they require additional components,
especially a serial TTL-to-USB adapter (sometimes called a USB-to-UART bridge) and an
external 3.3 Volt power supply. Novice ESP-8266 developers are encouraged to consider
larger ESP8266 Wi-Fi development boards like the Node MCU which includes the USB-to-
UART bridge and a Micro-USB connector coupled with a 3.3 Volt power regulator already
built into the board. When project development is complete, you may not need these
components and can consider using these cheaper ESP-xx modules as a lower power, smaller
footprint option for your production runs.

This is the series of ESP8266-based modules made by Espressif.

In the table above (and the two tables which follow), "Active pins" include the GPIO and ADC
pins with which you can attach external devices to the ESP8266 MCU. The "Pitch" is the space
between pins on the ESP8266 module, which is important to know if you are going to
breadboard the device. The "Form factor" also describes the module packaging as "2 x 9 DIL",
meaning two rows of 9 pins arranged "Dual In Line", like the pins of DIP ICs. Many ESP-xx
modules include a small on-board LED which can be programmed to blink and thereby
indicate activity. There are several antenna options for ESP-xx boards including a trace
antenna, an on-board ceramic antenna, and an external connector which allows you to attach an
external Wi-Fi antenna. Since Wi-Fi communications generates a lot of RFI (Radio Frequency
Interference), governmental bodies like the FCC like shielded electronics to minimize
interference with other devices. Some of the ESP-xx modules come housed within a metal box
with an FCC seal of approval stamped on it. First and second world markets will likely demand
FCC approval and shielded Wi-Fi devices.

ESP8266 offers a complete and self-contained Wi-Fi networking solution, allowing it to either
host the application or to offload all Wi-Fi networking functions from another application
processor.

When ESP8266 hosts the application, and when it is the only application processor in the
device, it is able to boot up directly from an external flash. It has integrated cache to improve
the performance of the system in such applications, and to minimize the memory requirements.
Alternately, serving as a Wi-Fi adapter, wireless internet access can be added to any
microcontroller-based design with simple connectivity through UART interface or the CPU
AHB bridge interface.
The popularity of many of these "other boards" over the earlier ESP-xx modules is the
inclusion of an on-board USB-to-UART bridge (like the Silicon Labs' CP2102 or the WCH
CH340G) and a Micro-USB connector coupled with a 3.3 Volt regulator to provide both power
to the board and connectivity to the host (software development) computer commonly referred
to as the console. With earlier ESP-xx modules, these two items (the USB-to-Serial adaptor
and a 3.3 Volt regulator) had to be purchased separately and be wired into the ESP-xx circuit.
Modern ESP8266 boards like the Node MCU boards are a lot less painful and offer more
GPIO pins to play with. Most of these "other boards" are based on the ESP-12E module, but
new modules are being introduced seemingly every few months.

CHAPTER 3
SOURCE CODE
SOURCE CODE
CHAPTER 4

CIRCUIT DIAGRAM
CHAPTER 5

SOFTWARE DEVELOPMENT
5.1 INTRODUCTION:

In this chapter the software used and the language in which the program code is defined
is mentioned and the program code dumping tools are explained. The chapter also documents
the development of the program for the application. This program has been termed as “Source
code”. Before we look at the source code we define the two header files that we have used in
the code.

Required Equipment:

 A computer (Windows, Mac, or Linux)


 An Arduino-compatible microcontroller

 A USB A-to-B cable, or another appropriate way to connect your Arduino-compatible


microcontroller to your computer

If you’re ready to get started, click on the link in the column on the left that matches up with
your operating system, or you can jump to your operating system here.

 Windows
 Mac

 Linux

Windows

This page will show you how to install and test the Arduino software with a Windows
operating system (Windows 8, Windows 7, Vista, and XP).

 Go to the Arduino download page and download the latest version of the Arduino


software for Windows.
 When the download is finished, un-zip it and open up the Arduino folder to confirm
that yes, there are indeed some files and sub-folders inside. The file structure is
important so don’t be moving any files around unless you really know what you’re
doing.
 Power up your Arduino by connecting your Arduino board to your computer with a
USB cable (or FTDI connector if you’re using an Arduino pro). You should see the an
LED labed ‘ON’ light up.

 If you’re running Windows 8, you’ll need to disable driver signing, so go see the
Windows 8 section. If you’re running Windows 7, Vista, or XP, you’ll need to install
some drivers, so head to the Windows 7, Vista, and XP section down below.

Windows 8

Windows 8 comes with a nice little security ‘feature’ that ‘protects’ you from unsigned driver
installation. Some older versions of Arduino Uno come with unsigned drivers, so in order to
use your Uno, you’ll have to tell Windows to disable driver signing. This issue has been
addressed in newer releases of the Arduino IDE, but if you run into issues, you can try this fix
first.

 From the Metro Start Screen, open Settings (move your mouse to the bottom-right-
corner of the screen and wait for the pop-out bar to appear, then click the Gear icon)
 Click ‘More PC Settings’

 Click ‘General’

 Scroll down, and click ‘Restart now’ under ‘Advanced startup’.

 Wait a bit.

 Click ‘Troubleshoot’.

 Click ‘Advanced Options’

 Click ‘Windows Startup Settings’

 Click Restart.

 When your computer restarts, select ‘Disable driver signature enforcement‘ from the
list.

To permanently disable driver signing (recommended, but has some minor security implications:

 Go to the metro start screen


 Type in “cmd”
 Right click “Command Prompt” and select “Run as Administrator” from the buttons on
the bottom of your screen

 Type/paste in the following commands: bcdedit -set loadoptions


DISABLE_INTEGRITY_CHECKS bcdedit -set TESTSIGNING ON

Installing the Drivers for the Arduino Uno (from Arduino.cc)

 Plug in your board and wait for Windows to begin it’s driver installation process
 After a few moments, the process will fail, despite its best efforts

 Click on the Start Menu, and open up the Control Panel

 While in the Control Panel, navigate to System and Security. Next, click on System

 Once the System window is up, open the Device Manager

 Look under Ports (COM & LPT). You should see an open port named “Arduino UNO
(COMxx)”. If there is no COM & LPT section, look under ‘Other Devices’ for
‘Unknown Device’
 Right click on the “Arduino UNO (COMxx)” or “Unknown Device” port and choose
the “Update Driver Software” option
 Next, choose the “Browse my computer for Driver software” option
 Finally, navigate to and select the Uno’s driver file, named “ArduinoUNO.inf”, located
in the “Drivers” folder of the Arduino Software download (not the “FTDI USB
Drivers” sub-directory). If you cannot see the .inf file, it is probably just hidden. You
can select the ‘drivers’ folder with the ‘search sub-folders’ option selected instead.
 Windows will finish up the driver installation from there

For earlier versions of the Arduino boards (e.g.Arduino Duemilanove, Nano, or Diecimila)
check out this page for specific directions.

Launch and Blink!

After following the appropriate steps for your software install, we are now ready to test your
first program with your Arduino board!

 Launch the Arduino application


 If you disconnected your board, plug it back in

 Open the Blink example sketch by going to: File > Examples > 1.Basics > Blink
 Select the type of Arduino board you’re using: Tools > Board > your board type
 Select the serial/COM port that your Arduino is attached to: Tools > Port > COMxx

 If you’re not sure which serial device is your Arduino, take a look at the available
ports, then unplug your Arduino and look again. The one that disappeared is your
Arduino.
 With your Arduino board connected, and the Blink sketch open, press the ‘Upload’
button
 After a second, you should see some LEDs flashing on your Arduino, followed by the
message ‘Done Uploading’ in the status bar of the Blink sketch.
 If everything worked, the onboard LED on your Arduino should now be blinking! You
just programmed your first Arduino!

CHAPTER 6
CONCLUSION

Conclusion
The project “IOT based Smart Shopping Trolley using aurdino” has been
successfully designed and tested. Integrating features of all the hardware components used

have developed it. Presence of every module has been reasoned out and placed carefully
thus contributing to the best working of the unit. Secondly, using highly advanced IC’s
and with the help of growing technology the project has been successfully implemented.
CHAPTER 7

REFERENCE

[1] J. Vetelino and A. Reghu, Introduction to Sensors. 2017, doi:


10.1201/9781315218274.

[2] N. Komuro, S. Motegi, K. Sanada, J. Ma, Z. Li, T. Pei, Y.-J. Choi, and H. Sekiya,
‘‘Small-world-network model based routing method for wireless sensor networks,’’
IEICE Trans. Commun., vol. E99.B, no. 11, pp. 2315–2322, 2016, doi:
10.1587/transcom.2016NEP0016.

[3] M. T. Lazarescu and L. Lavagno, ‘‘Wireless sensor networks,’’ in Handbook of


Hardware/Software Codesign. 2017, doi: 10.1007/978-94-017- 7267-9_38.

[4] J. Yick, B. Mukherjee, and D. Ghosal, ‘‘Wireless sensor network survey,’’ Comput.
Netw., vol. 52, no. 12, pp. 2292–2330, Aug. 2008, doi: 10.1016/j.comnet.2008.04.002.

[5] H. Toral-Cruz, ‘‘A survey on wireless sensor networks,’’ in Next Generation


Wireless Network Security and Privacy. 2015, doi: 10.4018/978-1- 4666-8687-8.ch006.

[6] M. Chen, J. Wan, and F. Li, ‘‘Machine-to-machine communications: Architectures,


standards and applications,’’ KSII Trans. Internet Inf. Syst., vol. 6, no. 2, pp. 480–497,
2012, doi: 10.3837/tiis.2012.02.002.

[7] P. K. Verma, R. Verma, A. Prakash, A. Agrawal, K. Naik, R. Tripathi, M.


Alsabaan, T. Khalifa, T. Abdelkader, and A. Abogharaf, ‘‘Machineto-machine (M2M)
communications: A survey,’’ J. Netw. Comput. Appl., vol. 66, pp. 83–105, May 2016,
doi: 10.1016/j.jnca.2016.02.016.

[8] F. Montori, L. Bedogni, M. Di Felice, and L. Bononi, ‘‘Machine-tomachine


wireless communication technologies for the Internet of Things: Taxonomy,
comparison and open issues,’’ Pervas. Mobile Comput., vol. 50, pp. 56–81, Oct. 2018,
doi: 10.1016/j.pmcj.2018.08.002.

[9] A. Lele, ‘‘Internet of Things (IoT),’’ in Disruptive Technologies for the Militaries
and Security (Smart Innovation, Systems and Technologies
[10] T. Jensen and M. Durham, ‘‘Internet of Things,’’ in Advancing Microelectronics.
2017, doi: 10.1007/978-3-319-23585-1_2.

[11] S. Nagpure, P. Sawant, M. Mhaske, and B. Nair, ‘‘Intelligent shopping trolley and
billing system,’’ Tech. Rep., 2018, pp. 72–74.

[12] K. Lalitha, M. Ismail, S. K. Gurumurthy, and A. Tejaswi, ‘‘Design of an


intelligent shopping basket using IoT,’’ Int. J. Pure Appl. Math., vol. 114, no. 10, pp.
141–147, 2017.

[13] P. S. Puranik and P. N. Mahalle, ‘‘IoT application on smart and secure shopping
system using RFID, Zig-Bee and gossamer protocol,’’ Int. J. Eng. Tech., vol. 4, pp.
374–378, Jun. 2018.

[14] N. Shahid and S. Aneja, ‘‘Internet of Things: Vision, application areas and
research challenges,’’ in Proc. Int. Conf. I-SMAC, IoT Social, Mobile, Analytics
Cloud, (I-SMAC), Feb. 2017, pp. 583–587, doi: 10.1109/ISMAC.2017.8058246.

[15] I. Lee and K. Lee, ‘‘The Internet of Things (IoT): Applications, inves

You might also like