You are on page 1of 7

American Journal of Engineering Research (AJER) 2016

American Journal of Engineering Research (AJER)


e-ISSN: 2320-0847 p-ISSN : 2320-0936
Volume-5, Issue-7, pp-236-242
www.ajer.org
Research Paper Open Access

RFID Based Security Access Control System with GSM


Technology
Peter Adole1*, Joseph M. Môm2 and Gabriel A. Igwue3
1,2,3
Department of Electrical and Electronics Engineering, Federal University of Agriculture,
Makurdi, Benue State, Nigeria

ABSTRACT: The security challenges being encountered in many places today require electronic means of
controlling access to secured premises in addition to the available security personnel. Various technologies
were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access
Control Security system with GSM technology presented in this work helps to prevent unauthorized access to
controlled environments (secured premises). This is achieved mainly through the use of a Radio Frequency
Identification System with operating frequency of 125 KHz, Microcontroller programmed to send control
signals, DC motor, relay, buzzer, Liquid Crystal Display (LCD) and GSM/GPRS Modem.Once the RFID tag
which contains the user’s unique information is scan by the RFID reader and confirmed match with the
information stored in the microcontroller, the microcontroller is instructed to turn ON the DC motor through
L293D driver, display “USER NUMBER and CARD NUMBER” on the LCD and activates the GSM/GPRS
modem to send SMS alert “AUTHORIZED, valid RFID card shown, User is allowed to enter, user number” to
security personnel. Else, the DC Motor remained OFF, LCD displays “READ RFID CARD NOT VALID”,
buzzer turns ON for about 5seconds and GSM/GPRS modem activated to send “ UNAUTHORIZED, invalid
RFID card is used to access the security system” to the security personnel. The electronic circuit was
implemented, the codes for microcontroller were written in assembly language, debugged and compiled using
the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the
memories of the microcontrollers with the aid of a universal programmer. Hardware simulation was carried out
using the Proteus Virtual System Modelling (VSM) version 8.0.An importation implication of this paper is that
the system is cheaper to maintain and more efficient in comparison with a manually operated type or key lock
system. The RFID based access control system can be useful in providing security for homes, organizations, and
automobile terminals to increase the level of security.
Keywords: Access control, Authorized, RFID, GSM, Microcontroller, Unauthorized

I. INTRODUCTION
Security systems play an important role to prevent unknown user entry into a secured place, which may
include physical and intellectual property, without being authorized. The security system is basically divided
into two types; the use of normal door lock key and the use of electronic automatic identification system. In
general, locks are very simple devices that are employed to address a straightforward problem. Basically, lock
can be easily hacked by unwanted people thereby allowing unauthorized people into secured premises.
There are several automatic identification technologies including barcode, magnetic stripe and Radio
Frequency Identification (RFID) applied in security system. Radio-Frequency Identification (RFID) is an
emerging technology and one of the most rapidly growing segments of today’s automatic identification data
collection industry. RFID technology, offers superior performance over other automatic identification systems.
Because it is not an optical technology like bar coding, no inherent line of sight is required between the reader
and the tagged RFID object [1].
The system described in this work uses an RFID tag which contains integrated circuit that is used for
storing, processing unique information, modulating and demodulating the radio frequency signal being
transmitted and a Global System for Mobile Communication (GSM) technology to communicate to security
personnel via Short Message Service (SMS) in order to enhance the securityof a conditioned
environment[1][2][3][4].

www.ajer.org Page 236


American Journal Of Engineering Research (AJER) 2016
Radio-frequency identification (RFID) based access control and security system grants access to only
authorized persons to secured premises. RFID technology involves the use of a wireless non-contact system that
uses radio frequency electromagnetic fields to transfer data from a tag attached to an object. Some tags are
passive (require no battery or their own power source) while others are active (use their own local power source)
[5].
The system that has been designed in this work is implemented around a microcontroller and it can
help to avoid human involvement in checking and keeping of record at the access point of a secured
environment. This system ensures accurate access control and record keeping [3].

II. RELATED WORK


Several researchers have done considerable amount of work relating to RFID based security Access
Control System.
An Automatic Gate opening system for vehicles with RFID and campus access control system RFID
based were proposed in [5][6]. The systems grant access to authorized persons with valid tags and deny the
unauthorized persons with invalid tags but the systemslack ability to intimates security personnel through SMS.
In [7], a system with comparative analysis of RFID and wireless Home/Office Automation was
proposed. Herethree technologies; RFID, Wireless Sensor Network (WSN) and GSM were used. In this system
RFID monitor access, sensor to monitor the temperature, lighting and gas leakage and GSM send SMS to the
owner of the house when safety of the home is not guaranteed. The system emphasized more of safety than
security of the home or office.
An embedded security system using RFID and GSM was presented in [8]. This system uses RFID and
GSM technologies to provide security for distribution of petroleum products. The system was made up of
control unit and tanker unit that are far from each other but can easily communicate with each other. The tanker
unit monitors the fuel level continuously and displayed it on LCD at the front for driver’s convenience. The
second is RFID assembly which will read the authentication code of the petrol pump. The amount of fuel poured
at a particular petrol pump and petrol pump ID will be sent to central office through GSM techniques. The
pitfall here remained that the system does not operates as a stand-alone system but require a network provider
for reception of signals and it is not a preventive security measure.
In [9], an RFID – based kindergarten Intelligence security system was proposed. It automates the
children security supervision and provides integration with current security management system for
kindergarten where RFID tags are embedded in children uniforms. However the system could not intimate
security personnel when there is threat.
An Access Control by RFID and face recognition based on neural network was design and
implemented. This system recognizes the face of the person holding the RFID card and denies access if they do
not match. A Radial Basis Function Neural Network (RBFNN) was adopted to learn the face of authorized card
holders. Also lack the ability to alert the security personnel through SMS in case of an unauthorized holder [10].
In [11], a paper on security system against asset theft by using Radio Frequency Identification
Technology was presented. The aim was to invent a security system against motorcycle theft by using FRID
technology (Ultra high frequency range; 905 – 925MHz). In case of incorrect information from the tag, the
system alarms the security guards for further investigation. It can signal to activate an additional circuit to shut
the motorcycle engine off and turn the Closed Circuit Television (CCTV) on for recording as the theft occurs.
The system would have been better with SMS to the guards to avoid commotions.
The present study aims at the design and implementation of a security access control system that uses a
wireless and automatic identification system knows as Radio frequency Identification (RFID) system,
Microcontroller as a control unit, GSM/GPRS modem that can send SMS when signalled by the controller, a
relay to close and open the system, the Buzzer that form the alarm system and LCD that displays the result of
the controller processing.

III. MATERIAL AND METHOD


3.1 Block Diagram
The block diagram of an RFID based security access control system with GSM technology is shown in
fig.1.When the reader is powered and the tag (transponder) is brought within the reading range of the reader,
the reader then scans the data present in the tag with the help of its antenna (scanning antenna) and compares it
with the data present in the microcontroller. When the data matches with that in the Microcontroller, the DC
motor will be turned ON which is operated by a driver being driven from the output of the microcontroller. The
microcontroller is programmed to displaymessages on the LCD if the tag with valid or invalid information is
brought close to the reader. In both cases, the GSM/GPRS modem is activated to send SMS alert to the security
personnel. The GSM/GPRS modem is RS-232 logic level compatible, it requires a line converter called MAX
232 in between it and the microcontroller to convert Transistor-Transistor Logic (TTL) into RS-232 logic and

www.ajer.org Page 237


American Journal Of Engineering Research (AJER) 2016
vice versa. The presence of any unauthorized user also activates the buzzer and a relay with its driver to close
and open the sub circuits operating at different voltages. Also a crystal (12MHz) to give the required clocked
pulses to the microcontroller.

RFID TAG RFID LCD


READER
BUZZER
BUZZER
MICROCONTROLLER DRIVER
CRYSTAL

(AT89S51)
MOTOR
DC
DRIVER
MOTOR
GSM
MAX 232
MODEM
RELAY RELAY
DRIVER
Fig 1: Block diagram of an RFID based security access control system with GSM technology.

The block diagram was developed into the schematic diagram shown in Fig. 2. This circuit diagram was used to
simulate the hardware components of the system in Proteus Virtual System Modeling Environment version 8.0.

U4 U5
7805 7812

1 3 1 3
D1 D3 VI VO +5V VI VO +12V
GND

GND

1N4007 1N4007
J2
1 L
2

2 C6 C8
N C7
1000u 100u
STEP-DOWN TRANSFORMER 100u
D2 D4 LCD1
1N4007 1N4007 LM016L

RV1
C9
VDD
VSS

VEE

RW
RS

D0
D1
D2
D3
D4
D5
D6
D7
U1
E

22PF 19 39
XTAL1 P0.0/AD0
1
2
3

4
5
6

7
8
9
10
11
12
13
14
X1 P0.1/AD1
38
CRYSTAL 37 1k
C10 P0.2/AD2
C1 18
XTAL2 P0.3/AD3
36
100u 35
P0.4/AD4
34
P0.5/AD5
22PF 33
P0.6/AD6
9 32
RST P0.7/AD7

BUZ2 21 Vcc
P2.0/A8
22
P2.1/A9
R3 23 GND
P2.2/A10
10k 29 24
PSEN P2.3/A11
30 25 TX
BUZZER ALE P2.4/A12
31 26
Q2 EA P2.5/A13
27
P2.6/A14
28 RX
P2.7/A15
R1
1 10
P1.0 P3.0/RXD C2
2 11 GSM/GPRS MODEM
1K R2 P1.1 P3.1/TXD
3 12
P1.2 P3.2/INT0
1K 4 13
P1.3 P3.3/INT1 U3
BC547 5 14 1 1u 3
P1.4 P3.4/T0
6 15
P1.5 P3.5/T1
7 16 Vcc
P1.6 P3.6/WR C1+ C1-
8 17
RL1 P1.7 P3.7/RD
11 14
J1 T1IN T1OUT
AT89S51 12 13 RXD
R1OUT R1IN
1 10 7
T2IN T2OUT
2 9 8 TXD
U2 R2OUT R2IN
16 8
DOOR LOCK D5 2 GND
1N4007 VS+
2 3 6
Q1 IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
OJ-SH-112DM 1
EN1 C2+ C2-
RFID READER

C3
+88.8

9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
BC547 1u

L293D
DC MOTOR

Fig. 2: Schematic diagram of an RFID based security access control system with GSM technology

3.2 Software Development


The AT89S51 microcontroller needs to be programmed first before it can be used in the electronic
hardware. An assembly programming language is chosen to program the microcontroller. Correct and functional
codes ensure the microcontroller works properly. The functionality of the code is verified using Keil micro
vision 4, Proteus Virtual System Modelling (VSM) version 8.0 was used for the simulation and Flash Magic
software was used for burning of the code into the microcontroller. After compiler operation, the hex code is
generated and stored in the computer. The hex code of the program is burnt into the AT89S51 by using Flash
magic software. The software design started with the flow chart shown in Fig.3

www.ajer.org Page 238


American Journal Of Engineering Research (AJER) 2016

START

Initializing ports and devices

Individual RFID tag sends its


code

RFID Reader decrypts the


message

YES
Matches the
database?

NO Relay turns ON
Relay turns off

Motor driver off Motor Driver ON

Buzzer ON for 5 seconds


SMS sends

SMS sends
Access Granted

Access Denied

Fig.3: Flowchart of design of RFID Based Security Access Control System with GSM Technology.
IV. RESULT AND DISCUSSION
The simulation test of this work was done using Proteus 8.0 to ensure effectiveness of the design; here
the various components in the design were connected to each other in Proteus 8.0 environment beginning with
the power supply unit as shown in the circuit diagram of the system. This is to ascertain the workability of each
stage before the construction is transferred to the print circuit board (PCB). The RFID card was represented
with an interactive single pole single throw (SPST) switch through which the microcontroller receives the
signal. The program hex file was loaded and the following results were obtained when running the simulation.

LCD1
LM016L
R4
10K
SW1

SW-SPST
RV1
C9
U1
VDD
VSS

VEE

RW
RS

D0
D1
D2
D3
D4
D5
D6
D7
E

19 39
XTAL1 P0.0/AD0
BUZ2 22pf 38
P0.1/AD1
1
2
3

4
5
6

7
8
9
10
11
12
13
14

37
P0.2/AD2
18 36 1k
C10 XTAL2 P0.3/AD3
C1 X1
CRYSTAL P0.4/AD4
35
100u 34
BUZZER P0.5/AD5
33
Q2 P0.6/AD6
22pf 9 32
RST P0.7/AD7
21
P2.0/A8
22 Vcc
P2.1/A9
23
P2.2/A10
R3 29 24 GND
PSEN P2.3/A11
10k 30 25
ALE P2.4/A12
BC547 31 26 TX
EA P2.5/A13
27
P2.6/A14
28
RL1 P2.7/A15
RX
R1 1 10
P1.0 P3.0/RXD
2 11
P1.1 P3.1/TXD C2
3 12 GSM/GPRS MODEM
D5 1K R2 P1.2 P3.2/INT0
4 13
1N4007 P1.3 P3.3/INT1
1K 5 14
Q1 P1.4 P3.4/T0 U3
6 15 1 1u 3
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
OJ-SH-112DM 8 17 Vcc
P1.7 P3.7/RD C1+ C1-
AT89S51 11 14
T1IN T1OUT
12 13 RXD
R1OUT R1IN
10 7
T2IN T2OUT
BC547 B1 U2
9
R2OUT R2IN
8 TXD
12V 16 8
2 GND
VS+
2 3 6
IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
1
EN1 C2+ C2-
RFID READER

C3
0.00

9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
1u

L293D
DC MOTOR

Fig.4:The result of the simulation when switched on

www.ajer.org Page 239


American Journal Of Engineering Research (AJER) 2016
Fig.4 displays the name of the system on the liquid Crystal Display (LCD) when powered ON immediately.

LCD1
LM016L
R4
10K
SW1

SW-SPST
RV1
C9
U1

VDD
VSS

VEE

RW
RS

D0
D1
D2
D3
D4
D5
D6
D7
E
19 39
XTAL1 P0.0/AD0
BUZ2 22pf 38
P0.1/AD1

1
2
3

4
5
6

7
8
9
10
11
12
13
14
37
P0.2/AD2
18 36 1k
C10 XTAL2 P0.3/AD3
C1 X1
CRYSTAL P0.4/AD4
35
100u 34
BUZZER P0.5/AD5
33
Q2 P0.6/AD6
22pf 9 32
RST P0.7/AD7
21
P2.0/A8
22 Vcc
P2.1/A9
23
P2.2/A10
R3 29 24 GND
PSEN P2.3/A11
10k 30 25
ALE P2.4/A12
BC547 31 26 TX
EA P2.5/A13
27
P2.6/A14
28
RL1 P2.7/A15
RX
R1 1 10
P1.0 P3.0/RXD
2 11
P1.1 P3.1/TXD C2
3 12 GSM/GPRS MODEM
D5 1K R2 P1.2 P3.2/INT0
4 13
1N4007 P1.3 P3.3/INT1
1K 5 14
Q1 P1.4 P3.4/T0 U3
6 15 1 1u 3
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
OJ-SH-112DM 8 17 Vcc
P1.7 P3.7/RD C1+ C1-
AT89S51 11 14
T1IN T1OUT
12 13 RXD
R1OUT R1IN
10 7
T2IN T2OUT
BC547 B1 U2
9
R2OUT R2IN
8 TXD
12V 16 8
2 GND
VS+
2 3 6
IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
1
EN1 C2+ C2-
RFID READER

C3

0.00
9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
1u

L293D
DC MOTOR

Fig.5: Result of simulation initializing the GSM modem

Fig.5 shows the process of preparing (initializing) the GSM modem to send SMS in text mode using the stored
command; AT+CMGF=1 saved in the microcontroller.

LCD1
LM016L
R4
10K
SW1

SW-SPST
RV1
C9
U1
VDD
VSS

VEE

RW
RS

D0
D1
D2
D3
D4
D5
D6
D7
E

19 39
XTAL1 P0.0/AD0
BUZ2 22pf 38
P0.1/AD1
1
2
3

4
5
6

7
8
9
10
11
12
13
14

37
P0.2/AD2
18 36 1k
C10 XTAL2 P0.3/AD3
C1 X1
CRYSTAL P0.4/AD4
35
100u 34
BUZZER P0.5/AD5
33
Q2 P0.6/AD6
22pf 9 32
RST P0.7/AD7
21
P2.0/A8
22 Vcc
P2.1/A9
23
P2.2/A10
R3 29 24 GND
PSEN P2.3/A11
10k 30 25
ALE P2.4/A12
BC547 31 26 TX
EA P2.5/A13
27
P2.6/A14
28
RL1 P2.7/A15
RX
R1 1 10
P1.0 P3.0/RXD
2 11
P1.1 P3.1/TXD C2
3 12 GSM/GPRS MODEM
D5 1K R2 P1.2 P3.2/INT0
4 13
1N4007 P1.3 P3.3/INT1
1K 5 14
Q1 P1.4 P3.4/T0 U3
6 15 1 1u 3
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
OJ-SH-112DM 8 17 Vcc
P1.7 P3.7/RD C1+ C1-
AT89S51 11 14
T1IN T1OUT
12 13 RXD
R1OUT R1IN
10 7
T2IN T2OUT
BC547 B1 U2
9
R2OUT R2IN
8 TXD
12V 16 8
2 GND
VS+
2 3 6
IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
1
EN1 C2+ C2-
RFID READER

C3
0.00

9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
1u

L293D
DC MOTOR

Fig.6: The result simulation showing that an SMS was sent to Security personnel

Fig.6 displays the feedback message that the power on SMS was successfully sent to the security personnel
whose numbers were programmed into the microcontroller.

LCD1
LM016L
R4
10K
SW1

SW-SPST
RV1
C9
U1
VDD
VSS

VEE

RW
RS

D0
D1
D2
D3
D4
D5
D6
D7
E

19 39
XTAL1 P0.0/AD0
BUZ2 22pf 38
P0.1/AD1
1
2
3

4
5
6

7
8
9
10
11
12
13
14

37
P0.2/AD2
18 36 1k
C10 XTAL2 P0.3/AD3
C1 X1
CRYSTAL P0.4/AD4
35
100u 34
BUZZER P0.5/AD5
33
Q2 P0.6/AD6
22pf 9 32
RST P0.7/AD7
21
P2.0/A8
22 Vcc
P2.1/A9
23
P2.2/A10
R3 29 24 GND
PSEN P2.3/A11
10k 30 25
ALE P2.4/A12
BC547 31 26 TX
EA P2.5/A13
27
P2.6/A14
28
RL1 P2.7/A15
RX
R1 1 10
P1.0 P3.0/RXD
2 11
P1.1 P3.1/TXD C2
3 12 GSM/GPRS MODEM
D5 1K R2 P1.2 P3.2/INT0
4 13
1N4007 P1.3 P3.3/INT1
1K 5 14
Q1 P1.4 P3.4/T0 U3
6 15 1 1u 3
P1.5 P3.5/T1
7 16
P1.6 P3.6/WR
OJ-SH-112DM 8 17 Vcc
P1.7 P3.7/RD C1+ C1-
AT89S51 11 14
T1IN T1OUT
12 13 RXD
R1OUT R1IN
10 7
T2IN T2OUT
BC547 B1 U2
9
R2OUT R2IN
8 TXD
12V 16 8
2 GND
VS+
2 3 6
IN1 VSS VS OUT1 VS-
7 6
IN2 OUT2
1
EN1 C2+ C2-
RFID READER

C3
+176

9 4 5 MAX232
EN2
10
IN3 OUT3
11 C4 C5
15 14 1u 1u
IN4 GND GND OUT4
1u

L293D
DC MOTOR

Fig.7: Result of simulation showing the use of valid card by closing the switch

www.ajer.org Page 240


American Journal Of Engineering Research (AJER) 2016
Fig.7 shows the user number (in this case User 1) and the unique identification number of the valid
RFID card used. The RFID card which cannot be located in the simulation software (Proteus) was represented
with an interactive single pole single throw (SPST) switch. Also, the DC motor turns changing its former
position to show that access has been granted.
The single sided Printed circuit Board layout of the simulated circuit diagram was made using the same
Proteus 8.0 virtual software, etched, drilled and components were soldered after tracks continuity test using
Digital Multimeter (DMM) as shown in fig.8. The Printed Circuit Boards play a vital role here in determining
the overall performance of electronic equipment. It ensures that the noise introduced as a result of component
placement and track layout is held within limits. It also provides components years of assembly maintenance
and performance reliability.

Fig.8: RFID Based security access control system with GSM technology on a single sided PCB

The output of the motor driver L293D was disconnected and connected to the input terminal of the
oscilloscope in Electronic Laboratory of University of Agriculture, Makurdi and straight-line waveform as
shown in fig.9 was obtain showing the presence of direct current signal.

Fig.9: The resultant waveform from the test of constructed work with an oscilloscope

V. CONCLUSION
The knowledge and application of new techniques in electronics and telecommunication has made our
life more secured and comfortable. RFID based security system is one of such applications. RFID security
access control system with GSM technology presented in this work is based on microcontroller; hence the
hardware requirement is greatly reduced. An RFID based security access control system with GSM technology
has been implemented and function as desired. The system can be installed at the entrance of a secured
environment to prevent an unauthorized individual access.

ACKNOWLEDGEMENT
The authors would like to thank the anonymous reviewers for their careful reading of this paper and for
their helpful comments to improve the paper

REFERENCES
[1] Ramalatha, M., Ramkumar, A. K., Selvaraj, S. and Suriyakanth, S. (2014) RFID Based Personal Medical Data card for Toll
Automation. Elysium Journal Engineering Research and Management. Volume1, ISSN:2347-4408, pp 51-52
[2] Karithik, K. (2014) advanced College Surveillance. International Journal of Scientific and Research publications. Volume 4
(Issue 6), ISSN 2256 -3153, pp 2.

www.ajer.org Page 241


American Journal Of Engineering Research (AJER) 2016
[3] Sivasankaram, V. Muruganand,S., Azha, P. (2013) advanced Embedded System assisted GSM and RFID Based Smart School
Management System. International journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering.
Vol.2 (Issue 7), ISSN (online), pp 2278-8875.
[4] Xiaolong, L. (2009) Design and Implementation of a Digital parking lot Management System. Technology interface Journal
[5] Harri, N. (2011) The Study of Business Opportunities and Value add of NFC application in Security Access Control Solution.
Master thesis, Department of Business administration, Kemi-Tornio, pp 17-19.
[6] Fang, Z., Dagu, H., Zheng, D. and Viping, H. (2008) Design and Implementation of an automatic Clearance Control System
based on RFID. IEEE 7th world congress intelligent control and automation (WCICA). Pp 6621 -6626
[7] Santhosh, S. and Sanihosh K. K. (2013) Campus Access Control System RFID Based. International Journal of Electronics and
Computer Science Engineering. Volume 1, Number 3, ISSN: 2277-1956, pp 1439 1445.
[8] Kulkarni, A. M. and Tawaresachin, S. (2013) Embedded Security System using RFID and GSM. International Journal of
Computer Technology and Electronics Engineering (IJCTEE).Volume 2 (Issue 1), ISSN: 2249-6343, pp164-168
[9] Zhiyuan, F. (2012) A RFID – based Kindergarten Intelligence Security System. IEEE Ninth International conference e-
Business Engineering (ICEBE). Volume 3, pp 321-326
[10] Meng, X. L et al (2010) RFID-Based Security Authentication System based on a novel Face Recognition. Structure in proc.
WASE international Conference on Information Engineering, pp 97-100.
[11] Jinaporn, N., Wisadsud, S., Nakonrat, P. and Suriya, A. (2008) Security System against Asset Theft by using RFID Technology.
IEEE 5th international conference Electrical/Electronic, Computer Telecommunication and information (ECTICON).Volume 2,
pp 761 -764.

www.ajer.org Page 242

You might also like