You are on page 1of 48

Object Detection Using RFID Scanner and

Mobile Application

By
Aqsa Shahid 46348
Faizan Karman 45601
Sania Saeed 46971

Supervisor: Dr.Yousaf Naudhani


Co-Supervisor: Engr. Arsalan ul Haq
DEPARTMENT OF COMPUTER ENGINEERING

BALOCHISTAN UNIVERSITY OF INFORMATION


TECHNOLOGY, ENGINEERING, AND MANAGEMENT
SCIENCES

2022
PROJECT TITLE
by

Aqsa Shahid 46348


Faizan Kamran 45601
Sania Saeed 46971

Submitted to the
Department of Computer Engineering
In Partial Fulfillment of Requirements for the Degree of Bachelor of Science in Computer
Engineering at Balochistan University of Information Technology, Engineering and Management
Sciences
2022

Signature of Supervisor: ___________________________________________________________

Signature of Co-Supervisor (If any): __________________________________________________

Signature of FYP Coordinator: _______________________________________________________

ii
Undertaking
It is certified that this work titled “PROJECT TITLE” is our own work. The work has not been presented
elsewhere for assessment. Where material has been used from other sources it has been properly
acknowledged / referred.

______________________
Aqsa Shahid
46348

______________________
Faizan Kamran
45601

______________________
Sania Saeed
46971

iii
Acknowledgements
we would like to thank our Supervisor Dr.Yousaf Naudhani for his helpful advice and
provision of every assistance available, our project coordinator, Engr. Arsalan ul Haq and our
teachers for being such great mentors and for always giving helpful advice that helped us
complete our objectives in due time and our families for always being supportive during
difficult times. We would also like to thank the Computer Engineering department, BUITEMS
for their technical support and guidance.

iv
Dedication
We dedicate this project to all eminent including our supervisor, co-supervisors, our
family members, Engr. Akram Khan, Engr. Syed Umair Shah, teachers and all those who
not only helped us during the study but molded us into our best version till date.

v
Abstract
RFID (Radio Frequency Identification Device) is a technology you can use to locate misplaced
items. With the help of an RFID device, you can use phone to quickly locate any items that
have become momentarily lost. RFID is intended to locate lost or misplaced items close to you.
Usually, when a lost object’s RFID tag picks up a radio wave, if it’s the lost item we’re looking
for, it will respond with a beeping sound or an alert on the mobile app we’ve linked to the
RFID sensor. As a result of its mobile application, this system is portable. With the program,
you can easily access any object that shows on the map and has an RFID Tag. Multiple objects
can be moved simultaneously and uninterruptedly using a mobile application. An RFID sensor
may recognize the signals, return the recognized information to the database, display the object
on a map, and identify the signals and return the identified data to the database. Tags placed on
or affixed to particular goods transmit radio waves that are subsequently detected by an RFID
sensor in order to locate the objects.

vi
Contents
Undertaking........................................................................................................................................3
Acknowledgements...........................................................................................................................4
Dedication...........................................................................................................................................5
Abstract...............................................................................................................................................6
1. INTRODUCTION:.......................................................................................................................11
1.1 Problem statement……………………………………………………………………………………………………………….14
1.2 Objective……………………………………………………………………………………………………………………………….14
1.3 Motivation……………………………………………………………………………………………………………………….15
1.4 Scope…………………………………………………………………………………………………………………………………….16
2. LITERATURE REVIEW/RELATED WORK..............................................................................17
3. METHODOLOGY...........................................................................................................................22
Problem Statement.............................................................................................................................23
3.1 Simulation:..............................................................................................................................23
3.1.1 Components………………………………………………………………………………………………………………….23
3.2 Implementation of Hardware:.............................................................................................24
3.2.1 Interfacing Arduino With MATLAB.................................................................................24
3.1.1Interfacing With RFID Module............................................................................................25
3.1.1Android Application.................................................................................................................26
3.1.2XML……………………………………………………………………………………………27
3.1.1Java……………………………………………………………………………………………………….28
3.1.1Firebase………………………………………………………………………………………………………….28
3.3.6.1Adding Firebase to App......................................................................................................29
3.3.6.2Firebase: Real-time Database............................................................................................31
3.1.1Work Flow of Mobile Application..........................................................................................31
3.1.2Connecting Arduino to Firebase Using ESP8366...............................................................32
3.3.8.1Hardware Components........................................................................................................32
EXPERIMENTS/SOFTWARE REQUIREMENT SPECIFICATIONS.................................................36
Implementation of Security.........................................................................................................36
Implementation Using MATLAB.....................................................................................................36
CONCLUSION AND FUTURE WORK................................................................................................41
Conclusion.......................................................................................................................................41
Bibliography.........................................................................................................................................42
vii
APPENDIX A.............................................................................................................................................45

viii
Figure 1. 1 RC522 RFID Module.....................................................................................................................12
Figure 1. 2 Simulink model (enable Arduino to interface with MATLAB).....................................................24
Figure 1. 3 Circuit Diagram of Interfacing Arduino with RC522 RFID Scanner..............................................25
Figure 1. 4 Block Diagram of working flow of mobile application................................................................30
Figure 1. 5 How to Interface Arduino with Firebase Using ESP8266............................................................32
Figure 1. 6 Pinout Connections of Interfacing Arduino with MATLAB..........................................................35
Figure 1. 7 Output obtained by Implementation of Security using RC522...................................................36
Figure 1. 8 Output when RFID Tag Not was Found (Red LED is on)..............................................................37
Figure 1. 9 Interface of ARDUINO with Firebase using ESP8266...................................................................38
Figure 1. 10 User Interface of mobile application while adding different objects.......................................38
Figure 1. 11 Object successfully added to Firebase in their respective fields...............................................39

ix
Chapter No. 1

1. INTRODUCTION:

Although several innovators were involved in the invention of RFID, Charles Walton often
receives the most recognition from historians. He is recognized for this accomplishment in
part due to the fact that he was the first to possess a patent for the technique. In fact, he
was successful in getting patents for about a dozen RFID-related gadgets. The portable
radio frequency emitting identifier patent Walton obtained, which was granted decades
after the core idea of RFID started to evolve, was the first to actually contain the term
RFID. While Walton’s patent marked a significant advancement in radio frequency
technology, numerous earlier lesser advances were necessary to enable this important
advancement. Since then, significant new advancement has been made.
In 1940s many technological advances were made in the years following World War II,
most notably the foundation for modern RFID. When Dr. A. Hoyt Taylor of the U.S. Naval
Research Laboratory tested high frequency radio waves near the confluence of the
Anacostia and Potomac Rivers a few decades earlier, radar had made significant
advancements. Following that, radar technology advanced quickly, in part because it was
seen as crucial to ensuring the safety of an aircraft early warning system [19]
The 1948 publication” Communication by Means of Reflected Power” describes how radar
and broadcast technology combined to create RFID shortly after. This groundbreaking
essay, written by the visionary Harry Stockman, revealed the potential for point to point
communication using radio [19]
In the 1950s, research into RFID related technology was ongoing. Despite the fact that
Harry Stockman’s idea would not be realized until much later, these updates were
nevertheless significant. The identification, friend or foe long range transponder systems,
for instance (IFF). This method of using radar immediately proved crucial for the military
x
and different aerospace projects. This is what some experts consider to be the first
RFID application [19]

The 1960s saw the establishment of numerous businesses focused on RFID technology. For
instance, Checkpoint and Sensormatic were established during this significant time period.
These businesses created tracking technologies that we now take for granted, such as
electronic article surveillance, in an effort to reduce theft (EAS). This system, which
includes tags on the goods, can raise the alert if unpaid goods are carried out of the store
or into the bathroom [19]
In1970s a number of prestigious universities, government laboratories, and other
organizations, like Sweden’s Microwave Institute Foundation, conducted substantial
research into RFID during the 1970s.The Radio Corporation of America (RCA) started to
broaden its scope about this time. In an effort to compete with IBM, the business had
previously tried to enter the mainframe computer race. Early in the 1970s, it left this
particular industry but kept up its high standards for satellite communications. The
business and Fair child jointly released” Electronic ID System” in 1975. F. Sterzer’s work
on electronic license plates for automobiles was another contribution from RCA [19].
Radio frequency identification (RFID) technology is now one of the fastest expanding
sectors of the technology industry. It aids in the detection and recognition of things by
using RFID’s unique identifier. Since many years, the concept of RFIDs and their
application in various aspects of life, such as finding lost goods on shelves, tables, and so
on, has been scrutinized. RFID tags are made comprised of an integrated circuit (IC),
an antenna, and a substrate. The area of an RFID tag that holds identifying data is
called the inlay. Each RFID system consists of a transceiver, a transponder, and a
scanning antenna. As soon as the scanning antenna and transceiver are connected, an
RFID reader or interrogator is produced.It transmits impulses that activate the tag via
radio waves. When the tag is turned on, it transmits a wave back to the antenna, which is
converted into data. The RFID tag contains the transponder. The read range of RFID
tags varies depending on a number of parameters, including the type of tag, reader, RFID
frequency, and interference from the surroundings or other RFID tags and readers. Tags
xi
with a more powerful power

xii
source have a greater read range. RFID tags are divided into two categories:

1. Passive RFID tags: now in use RFID. A battery often serves as the power supply
for an active RFID tag.

2. Active RFID tags: the passive RFID. A passive RFID tag receives power from the
reading antenna, whose electromagnetic wave induces a current in the antenna.

Figure 1. 1 RC522 RFID Module

This Interfacing RC522 RFID Module with Arduino UNO picture is taken from an
official website Circuits DIY.
Types of RFID system: There are three main types of RFID systems: low frequency (LF),
high frequency (HF) and ultra-high frequency (UHF). RFID systems that operate at a low
frequency. The frequencies span from 30 to 500 kHz, with 125 kHz being the most
prevalent. The greatest transmission ranges for LF RFID are a few inches to less than
six feet. Having a high frequency, RFID technology the most used HF frequency is 13.56

13
MHz, which ranges in frequency from 3 to 30 MHz A few inches too many feet is the usual
measurement range. Methods for radio frequency identification. These have a frequency
range of 300 to 960 MHz, with 433 MHz being the most popular, and can be read from a
distance of at least 25 feet. RFID technologies utilizing microwaves these may be read
from a distance of more than 30 feet away and operate at 2.45 GHz. The goal of this
project is to locate missing items. RFID tags are connected to objects and can be
recognized when a reader/scanner generates high frequency electromagnetic fields. When a
tag transmits a unique id to the system, it checks to see if the id is present in the database
or not. If the database contains that id, a message is displayed. Using Arduino IDE to
connect Arduino with RFID reader. The Arduino is connected to an RFID reader, which
allows us to identify tag ids. The Arduino is then connected to MATLAB via libraries,
which allows us to collect data from users. We also talked about security in this project,
which is crucial for valuable items. The database is set up such that whenever a user
requests the location of an object, it displays a code or password. For items that are
valuable, only the owner has the ability to unlock the password.

1.1 Problem statement


Sometimes we lost some of our most useful things at home, work places and so on. Lost
objects can cause depression to an individual. Without taking help of law enforcement
agencies we can find it by ourselves. In previous work GPS mapping, smart scanning and
hurdle sensing was not considered.
Example 1: At homes, warehouses, store rooms we may lose lot of things that we need in
time, if we are leaving home and getting late for our work but we are unable to find that
specific object like keys, notes, watch, wallet, glasses and many more.
Example 2: Lets suppose there is a digital library in any institution and the management
wants to arrange the order of books but could not find the books of same ages. This
project proposes a system that is capable of finding lost objects.

1.2 Objective
On the broader perspective, the goal of this project focuses on the hardware and software

14
implementation of the object detection system, leading from simulation to the final
Hardware product. The main objectives of this project are detailed as follows:

1. Design a MATLAB algorithms to interface micro controller board RFID scanner


and maintain a database.

2. Implement security system to maintain privacy for location of the hidden objects.

3. Optimize the RF power based scanning of line of sight in presence of hurdles.


4. Implement GPS map for the location of the objects.

1.3 Motivation
Sometimes we lost our most useful things at home, work places and so on which consume
much time to find those objects. RFID (Radio Frequency Identification) is an emerging
technology and one of the most growing field in today’s world. By using such technology
we can find out those objects which are temporarily lost with a single tap on your mobile
phone. RFID is designed to find out the missing or lost objects nearby you and it is very
easy to use. As we said earlier, that this device will help you out to find out the missing
objects in which you wasted hours, world is changing so rapidly so that we also have to be
fast and this technology allows us fast and secure access to the lost objects. It is cost
effective technology to keep track of items. We all know time is the key of success, so now
by using RFID we can save our time and finds lost objects very easily. From RFID we are
saving our time and money. When we lose some of our most useful things at home, work
places and so on so, lost objects can cause depression to an individual. Without taking
help of law enforcement agencies we can find it by ourselves. In this project for solving
these problems we will design an android application that will be synchronized with the
RFID tags and RFID Reader/Sensor which will provide us exact location of the lost objects in
any specific area. This project or RFID Technology can not only used in homes this can
also be used in many other fields like in Any institution, company and many other
government sectors for attendance system of students, workers and employees. We can use
this project in hospitals, vehicles and many more sides of life. Further RFID is a portable
15
device that you can carry so easily with you anywhere you want, it’s not that big or heavy.
RFID is just a small device which is directly connected to your mobile phone/ laptops/
PCs.

1.4 Scope
An android application will be synchronized with the RFID tags and RFID Reader/Sensor
which will provide us exact location of the lost objects in any specific area. This project or
RFID Technology can also be used in many other fields like in Any institution, company
and many other government sectors for attendance system of students, workers and
employees. We can use this technology in hospitals, vehicles and many more sides of life.
In future as this technology is seeking attention and has many works on it has a bright
future ahead as it is cheap in price you just have to place tags on your items and then you
can find them easily in the time of need. Many factories, military departments, library
management and many other local people can buy and implement in their use and can
make their work easy.

16
Chapter No. 2

2. LITERATURE REVIEW/RELATED WORK

They introduced a novel method for estimating the place and alignment of items via RFID
technology in this paper. They showed the idea of using an antenna array to equip a
surface and then placed multi-tagged things on it. By knowing the exact position of every
single tag provides us to estimate where the object, to which the tags are attached to, that
how it is set in angled and how they are positioned. This strategy has a number of
advantages. Even if there are decorating components on the surface, the items can be
moved around freely. The technology is totally hidden (the RFID tags are invisibly placed
in objects, and the antenna array is hidden beneath a table (despite the fact that the test
setting is set up on a table) [1].
During trauma resuscitation, it is a system that identifies human movements, this system
involves a hardware formation for sensing the surroundings (RFID tags and readers) and
algorithms for processing the sensor readings, immediate treatment of injured patients in
the emergency department, that is fast-paced and team-based. They used passive radio
frequency identification and machine-learning techniques. They considered the location of
large objects and the distribution of medical tools while arranging the RFID antennae in
the trauma bay. Alien Technology (Morgan Hill, CA) provided them with two readers and
six antennas for their system. The readers’ software is the vendor’s SDK, which was
customized to continuously scan the environment at predetermined intervals [2].
RFID technology has used that can assist blind people in finding their belongings.
GLIDEO is a different solution that gives blind people audio information about
RFID-tagged objects. In this technology, the RFID reader is embedded in a glove and
can be detected whenever a person touches something. The data is sent to a PDA via
Bluetooth. The reader’s audio information is transmitted via the PDA. Electromagnetic
coupling occurs at frequencies of 13.56 MHz and 800-900 MHz [3].
Method was described inside a room which objects is tracking method using Software app

17
and RFID technology that provides the information of actual-time location. This RFID
system consist of four RFID Reader Antennas, Alien 9900 RFID reader, and RFID BAP
tags that make up the RFID system. Inside the room for a more exact location of an
object, in this system they use windows forms application and a database which is MySQL
for the software application and use class library of Alien RFID1.dll in Csharp language
to develop the application of Windows Forms. . For manage the all information of tagged
things which are based on IDs of tags the Database is provided [4].
The study has presented a reliable RFID-based technique for mapping an environment of
indoor at the object level with little reliance on substructure. We present a (RFID)-based
system that uses a RFID Ultra High Frequency (UHF), passive tags, moveable RFID
reader, and inertial navigation sensors to do an object-level mapping of the indoor
environment (INS). For accurately maps the things which were current in the indoor space,
a new algorithm has been created. With the necessary item thickness and balanced
thickness of tested opinions, results reveal that a map of the inside atmosphere may be
created via normal exactness of roughly 0.35m [5].
Indoor positioning problem was resolved by using a GUI which was developed on
MATLAB and short-Range RFID Tags were used for locating the nearer objects. And
passive RFID Tags were used which were using assistance by a battery source in order to
operate and communicate with the sensors. And an image was presenting in MATLAB
GUI which was clearly showing the exact location of objects [6].
They proposed Radio Frequency Identification is playing a vital role in different sectors of
life. And one best implementation of RFID is to be detected the lost and hidden objects.
One of the best and common examples are Storage Management System or Inventory
Management System or we can also use different names for it, but the major purpose will
be the same that we will be looking for objects. Object detection using this technology also
helps blind people before picking up any object from collection of different objects. This
module is working in four major phases. As we have placed reader in a stationary place
and tag were planted on the objects that must be find. So, the sensor or reader sense the
motion of tags, then collect data and exact location and orientation of the object, and then

18
identify the collected sample in data base. Then it was providing a 2D or 3D object image
that was placed in any shelf [7].
Stepped motion is proposed to find a chip less RFID tags. The performance is measured
with a vector network analyzer and evaluated through experimentation. MATLAB is used
to process the measured results after they have been collected. Only the single antenna
chip RFID reader has been equipped with the detecting algorithm. The tag ID is decoded
using a unique adaptive wavelet-based detection technique. Within the antenna’s HPBW,
the S11 magnitude shifts at the relevant resonant frequencies are as expected, and are
not detectable when the antenna moves out from the aperture [8].
They uses a methodology of FODs (Fallen Object Detection system) which was having
assistance of RF-ID (Radio Frequency Identification) based technology. Which was used in
LR Vs (Light Rail Vehicle Systems) to prevent passengers and trains from the accidents
that happen on platforms intentionally or unintentionally. The Working of this system was
such as that on first all the trains must be having ATP (Automatic Train Protection) and
ATO (Automatic Train Operation) systems. RF-ID system should be installed in control
systems and signal catching antenna will be established across all the platforms. Antenna
Catches any disturbance in the RSSI (Received Signal Strength Indicator) value then it
was sending direct signal to control room as an input which was sending notification to the
related staff like guards and medication staff for further actions [9].
They proposed a system which can reduce the sudden deaths in pools and other water
levels. According to the designed system the user has to wear a wrist band and they have
placed all the RFID antennas around the pool which will be detecting the periodic change
in the signals generated by the RFID tag which is placed inside the silicon coated
wristband wore by the swimmer. If the swimmer was drowning then there will be a sudden
decrease and rise in the signals generated by the tag and then the system will respond and
perhaps the rescue teams can track the drowning swimmer and help them [10].
They proposed a Smart Billing System Using Different kind of RFID Tags. This model
was proposed for Shopping Mart in which in the trolleys that carry goods have LCD on
them which shows the appropriate ID of specific product and that ID belongs to

19
specific RFID Tag. For example 7085E is for Coconut Oil, Tag having ID 1644g is for
Toothpaste etc.
This whole process is done in such a way that when a person add any product in the trolley
then the smart trolley will scan the product ID which is associated with the specific RFID tag
then the product will be entered in the excel sheet for billing statement [11].
Hao Liu, Rongrong Zhang uses a technology which employs a multi-tagged RFID system
that aids in the rapid discovery of objects. Technicality used a filter that allows it to ignore
repeated detection, reducing detection time. Each tag used in an object has a unique id
and can identify objects wirelessly, as we all know, the multi-tagged technique can aid us in
detecting tags because the signals can capture it quickly. Simply said, there are two parts
to this technique: the first is the marking phase, and the second is the detecting phase. To
begin, the reader can select a tag from an object to create a filter. The filter can then
select a tag to be detected [12].
By avoiding impediments and taking the shortest route between two places, an
automated mobile robot may freely move about a floor. The shortest path is determined
by using a vector map of the floor and the Dijkstra shortest path method. By identifying
additional sites along the course and confirming the goal, the RFID scanner is utilized to
re-calibrate the position of the robot on a path. The robot must turn at 195 RPM for
1.75 seconds using this technique. The RFID tag was successfully read [13].
This project is beneficial. As their hall ticket, each and every student will receive an RFID
card. as soon as they arrive on college property and present their hall pass to the RFID
scanner. That will immediately show the person’s room number. Our project will primarily
reduce the time spent looking for a room at testing facilities [14].
At this essay, we’ll talk about how to deal with issues including lengthy billing processes,
inaccurate tally keeping, thefts, and other inconsistencies that occur in shopping malls.
With the aid of RFID scanners and detectors for product scanning and theft prevention as
well as IoT for data management, we are putting in place an automatic invoicing system
that enables us to address all the issues listed above[15].
The check-in procedure is automated in this article utilizing self-service counters that are

20
connected to the airport system and servers in an effort to reduce the delay issue. To serve
more clients and lessen the delay brought on by the lengthy waiting periods, all airport
counters can be activated with a moment’s notice. The Port Authority of New York New
Jersey provides real-time data that we use to examine our model and determine how much
better it is than the conventional check-in methodology [16].
The automated shopping cart will recognize the items you put in it and add them to your
bill. By using this strategy, customers may save time by skipping the lengthy queues at the
check-out counters, and the store will be better supervised. Additionally, since the RFID
reader will read every item automatically rather than manually by a human, inventory
management will be considerably more efficient [17].
In our school library, we put RF-Scanner into action and utilize it practically. Long-term
tests and research reveal that the RF-Scanner offers accurate lying-down book detection
with a mean error of 6 percent and fine-grained book localization with a mean error of only
1.3 cm[18].
The main goal of this effort is to decrease the wait times in lines at busy supermarkets or
other shopping malls using an electronic smart cart system that will use RFID technology
to provide an intellectual approach to the billing process. The Smart Cart System
combines the functions of three independent systems: an online storefront, an electronic
smart cart, and RFID gates that deter theft [18].
Global manufacturing organizations urgently need to implement efficient production
monitoring and scheduling in order to increase production visibility and decision-making
performance. In order to manage production scheduling and monitoring in a dispersed
manufacturing environment, this study offers an intelligent decision support system
architecture based on radio frequency identification (RFID) [19].

21
Chapter No. 3

3. METHODOLOGY

This chapter discusses the project proposes a system that is capable of finding lost objects.
This system is portable due to its mobile application. Any object (which contains an
RFID Tag) which appears on the map can be accessed directly with the application.
Using a mobile application multiple objects can be manipulated at a single time
without any interruptions. Radiofrequency identification (RFID) technology is now one of
the fastest expanding sectors of the technology industry. It aids in the detection and
recognition of things by using RFID’s unique identifier. For many years, the concept of
RFIDs and their application in various aspects of life, such as finding lost goods on shelves,
tables, and so on, have been scrutinized. An integrated circuit (IC), an antenna, and a
substrate make up RFID tags. The RFID inlay is the portion of an RFID tag that stores
the identification information. A scanning antenna, a transceiver, and a transponder
are the three components of every RFID system. An RFID reader or interrogator is
created when the scanning antenna and transceiver are coupled. It transmits impulses
that activate the tag via radio waves. When the tag is turned on, it transmits a wave
back to the antenna, which is converted into data. The RFID tag contains the
transponder. The read range of RFID tags varies depending on a number of parameters,
including the type of tag, reader,

22
RFID frequency, and interference from the surroundings or other RFID tags and readers.
For finding objects tags placed or attached to specific objects transmit radio waves which
will then reach the RFID sensor which has the capability of identifying the transmitted
signals then returning the identified information to the database and later on showing the
object on the map. In case of any hurdles between objects and sensors, it will
automatically manage its range to detect the appropriate object present in the database.
The mobile application also allows searching the wanted objects in need of time. And the
most important is the components we are using I-e Arduino RFID Sensors etc.

Problem Statement
Sometimes we lose some of our most useful things at home, work places and so on. Lost
objects can cause depression to an individual. Without taking help of law enforcement
agencies we can find it by ourselves. In previous work GPS mapping, smart scanning and
hurdle sensing was not considered.
Example 1: At homes, warehouses, store rooms we may lose lot of things that we need in
time, if we are leaving home and getting late for our work but we are unable to find that
specific object like keys, notes, watch, wallet, glasses and many more.
Example 2: Let’s suppose there is a digital library in any institution and the management wants to
arrange the order of books but could not find the books of same ages.

3.1 Simulation:
On first half for simulation, Software used is Proteus because of its flexibility and
availability of various tools and libraries of different components for the initial sketch of the
circuit.

3.1.1 Components
After simulation of the initial sketch components were tested like RFID sensor, Tags, LEDs
and Connecting Wires. We can also import different file formats according to the
requirements like Schematic sketch, PCB (Printed Circuit Board) layout etc. We have used
RC22 RFID module which creates an electromagnetic field of 13.56MHZ, it can operates
by supplying voltage range from 2.5V to 3.3V, it has a reading range of 5cm for objects
(Tags). It can communicate with the Arduino using SPI (Serial Peripheral Interface).When
23
the tag approaches the source of the high frequency electromagnetic field, a voltage is
induced in the antenna of the tag. In response, the tag changes the signal’s strength and
communicates with the reader. It has total of 8 pins which are then connected to the
Arduino. Which are as follows:

1. VCC(Supplies power for module)

2. RST(Reset Pin)

3. GND(Ground pin)

4. IRQ(Interrupt used to alert RFID when tag comes into its territory)
5. MISO(Master in Slave out pin acts as serial clock)

6. MOSI(its SPI Input pin to RC522 module)

7. SCK(it receives clock pulse provided by Micro controller)

8. SS or SDA(Pin act as Signal Input)

3.2 Implementation of Hardware:

3.2.1 Interfacing Arduino With MATLAB


Arduino was interfaced with MATLAB by using MATLAB SUPPORT PACKAGE FOR
ARDUINO. This package enabled us to read/write the input and output pins and it
also helped us to communicate with peripheral devices via 12C or SPI (Serial Peripheral
Interfacing). The code helps us to check whether the Arduino was interfacing with
MATLAB or not on its allotted port. Then we used Simulink support package for
arduino hardware. This add-on allows us to build a Simulink model which is then
compiled, loaded and executed on Arduino board. It also enables to read and write the
input output pins and communicate through SPI same as Matlab support package for
arduino. After opening the Simulink option in MATLAB it led us to a new window where
we were able to select different option like PINS of Arduino board, Sources like VCC,
ground etc. Then selected the board we were using i-e ARDUINO UNO. and also
24
edited the COM PORT and set it to automatically this will set the COM PORT on its
own. Simple circuit was made just to check whether Arduino was working properly or
not. Selected digital PIN 13 as it has built LED and Pulse generator as a source and
customized the parameters of Pulse generator and after running the SIMULINK model

the built in LED was blinking.

Figure 1. 2 Simulink model (enable Arduino to interface with MATLAB)

3.1.1 Interfacing With RFID Module


Arduino was interfaced with RC522 module in order to search or detect the appropriate
tags. Arduino Library was also imported named as MFRC522 which was enabling all the
functions of module. The reader was detecting the tags in such a way that RFID Scanner
or transmitter transmits radio waves which was striking with the appropriate tag which
was placed in its area or radar and then the transmitted signals was returning back to
the RFID scanner and it was enabling the associated LED(if the scanned card was same
as entered in the code then it blinks Green LED while if it was not the same card as
entered in the code then it blinks Red LED). As Figure 3.2 shows the Pin out connection
25
of arduino and RFID module. It reads as follows VCC was connected to the 3.3V of the
Arduino, the RST pin to pin 9, the GND to pin 2, the MISO to pin 12, the MOSI to pin
11, the SCK to pin 13, and the SDA to pin 10 of the Arduino.

Figure 1. 3 Circuit Diagram of Interfacing Arduino with RC522 RFID Scanner

Figure 3.2 shows that how a tag or RFID card contain a Unique ID. The Tag’s 1K memory
Is divided into 16 sectors (from 0 to 15). Four blocks are further separated into each sector
(block 0 to 3). 16 bytes of data can be stored in each block (from 0 to 15). Each sector’s
Block 3 contains information named Access and is referred to as the Sector Trailer. We have
48 bytes each 64-byte sector accessible for our own usage since the lowest three blocks (blocks
0, 1, and 2) of each sector are truly usable for data storage. Also The Manufacturer
Block/Manufacturer Data, or Block 0 of Sector 0, comprises the IC manufacturer data and
the Unique Identifier (UID).

3.1.1 Android Application


In this era of mobile development, Android is quickly gaining ground as one of the most
popular operating systems to create for. A short time to market (TTM), an open source
platform that can adapt to changing business requirements and the ability to deploy on
several platforms are all provided by the OS for developers. As a result, Android is among
the greatest platforms for developing applications with sophisticated functionality.
Technologies used in Android development After looking at some of Android Studio’s more
wonderful features, let’s learn about some of the programming languages you might run into

26
as an Android developer.

1. Java: Prior to the adoption of Kotlin, Java was the main language used for Android
development. You might find it in older, legacy projects because it’s a rather verbose
language. Although Kotlin is likely to replace Java in the near future, Java is still
useful to know. About Kotlin: Kotlin is a cross platform programming language that
uses type inference and is statically typed. Java’s wordiness was addressed by the
development of Kotlin. The language is completely compatible with Java and works
well with a variety of Java SDKs.

2. Android Build System: To compile your applications, Android Studio makes use of
Gradle. With your tweaks, Gradle is a toolset that automates the build process. You
may test, deploy, and release the Android Application Package (APK) that Gradle
creates for you.

3. XML: Layout files for Android applications are created using the extensible markup
language, or XML. Despite being stricter, it is similar to HTML. The names of our
activities in our Kotlin or Java files usually match the names of our XML files. The
manifest.XML file uses XML to define its components. Consider XML to be the
framework of our user interface.

3.1.2 XML
Extensible Markup Language, or XML for short, tells us what it is used for. Programming
languages and markup languages differ slightly from one another. Java and Kotlin alone
are insufficient to create Android apps. Additionally, you must master the XML markup
language, a potent script for data organization and layout creation. Here is all the
information you require. A markup language is used more to describe data, and in this
example, layouts, A programming language (such as C, C++, Java, Kotlin, Python, or BASIC)
allows you to describe behaviors, interactions, and circumstances. Programming
languages create dynamic interactions, whereas markup languages often deal with static
user interfaces. Here’s the technical way of looking at it. Presentation data is controlled
Via markup languages. Scripting languages act as a conduit between applications to
27
produce data. A language used in programming change data.HTML is another type of
markup language that specifies how a website will look. The typeface and color are set by
HTML, which also places the images and text on a page. For more interactive components,
you might use something like JavaScript since you couldn’t (or couldn’t develop a very
decent) computer game in HTML.

3.1.1 Java
The Java programming language is used to create Android applications. Right now, that’s
essentially your only option for native applications. Java, an enormously popular
programming language, was established by Sun Micro systems (now owned by Oracle).
Java, a language that was developed considerably later than C and C++, incorporates many
of the great features of both while fixing some of its flaws. But a programming language’s
libraries are what make it powerful. Programmers can use these libraries to help them while
building applications. Some of the Java’s important core features are:

1. It is created to be platform-independent and safe using virtual machines.

2. It is simple to learn and comprehend;

3. It is object-oriented.

4. These Java foundational concepts are crucial to Android.

The Android SDK offers both unique Android libraries that will aid in the development of
fantastic Android applications, in addition to many conventional Java libraries (including
data structure libraries, math libraries, graphics libraries, networking libraries, and
everything else you may desire). There are many reasons why Java is simple to learn. There
is undoubtedly no shortage of Java learning materials available, including websites, tutorials,
books, and classes. One of the most frequently used talked, and taught programming
languages on the planet is Java. No matter the scope, it is utilized for a wide range of
programming projects, including desktop, mobile, and web apps.
3.1.1 Firebase
Bright ideas are occasionally useful in the rapid prototyping era, but if they require too much
28
labor, they may not be. Since many considerations don’t apply to server side development due
to ignorance or lack of time, the backend is frequently the limiting Issue. A backend-as-a-
service is Firebase. It developed into a platform for developing next-generation apps on Google
Cloud Platform. A real-time database called Firebase (a NoSQL Json database) enables the
storage of a list of items as a tree. Data can be synchronized between many devices.

1. The database’s real-time data is managed by Firebase. As a result, it trades data to


and from the database fast and easily. As a result, we can use Firebase to create
mobile apps for live streaming, chat messaging, etc.

2. Firebase enables real-time data synchronization without page refresh across


all platforms, including iOS, Android, and the web.

3. Firebase includes everything, including databases, analytics, and crash reports. The
app development team can thus continue to concentrate on enhancing the user
experience.
3.3.6.1 Adding Firebase to App

For mobile applications, Firebase is created. The greatest development environment for Android
apps is Android Studio. A backend as a service called Firebase enables us to store a list of
items as a tree. We must first integrate Firebase with our Android application before we can
store data there. There are a few requirements we need to be aware of before integrating
Firebase into our Android application. The following are these requirements:

1. In order to operate with Firebase, we must have a Google account.

2. A Smartphone or emulator running an updated version of Android was also necessary.

3. The most recent version of Android Studio was also necessary.

4. Latest Gradle must be used by the app.

There are two ways to integrate Firebase into your application:

1. The first is using the Firebase helper, a cute little wizard inside Android Studio. It

29
will automatically install any required Gradle dependencies and connect to our
existing project or start a new one for us. Some more setting is necessary.

2. Using the Firebase console, we can manually add Firebase to our Android
application. It is the suggested method for integrating Firebase with our application.

30
3.3.6.2 Firebase: Real-time Database
The Firebase Real- time Database, a cloud-based database, saves data in JSON. The data is
synchronized in real-time for each connected client. By utilizing our iOS and JavaScript SDKs
to build cross-platform applications, all of our clients share a single Real- time Database
instance and receive real-time updates with the most recent data. We can store and sync
data amongst our users in real-time using the Firebase Real- time Database, a NoSQL
database. The developers can control this sizable JSON object in real-time. The Firebase
database gives the application the most recent value of the data as well as modifications to that
data by using a single API. Our consumers can easily access their data from any platform,
including the web and mobile devices, thanks to real-time syncing. The Real time database
facilitates communication between our users. We can construct our app without using
servers because it comes with mobile and browser SDKs. The
Real-time Database SDKs employ local caching on the device to serve and save changes
when our users go offline. When the device connects to the internet, the local data is
automatically synchronized.

3.1.1 Work Flow of Mobile Application

Figure 1. 4 Block Diagram of working flow of mobile application

31
When a user enters in the environment of the app he/she will see a screen which will allow
the user to interact with two type of objects i-e secure objects and others which will
include public objects. While accessing secure objects user has to write password every
time he/she wants to track that object. While if user wants to access public objects then
there will be no requirement of password. According to the figure 3.4 when user enters the
wrong password then user cannot get access to that object placed in database while if user
provides correct password then a function will call the database then the required object
will be visible for user. They can also store new objects whether password protected or
public according to their desire.

3.1.2 Connecting Arduino to Firebase Using ESP8366


By using Arduino and ESP8266, you can read or send data from your database. A Host
name and an oath key for your Firebase project are required. After that, upload the code
and include the Firebase Arduino library. You can program the ESP8266 using the Arduino
IDE and its programming language thanks to an add-on developed by the ESP8266
community.
3.3.8.1 Hardware Components
1. ESP8266 (ESP-01) module
A great Wi-Fi module for IoT and home automation projects is the ESP8266. The
board for developing the ESP8266. Similar to how an Arduino allows you to control
inputs and outputs, but using Wi-Fi. The Internet of Things and home automation
applications benefit greatly from it.

2. Arduino UNO
The AT mega328P is the foundation of the Arduino UNO microcontroller board. Six
of its analogue inputs may be used as PWM outputs, and it has a 16 MHz ceramic
resonator, 14 digital input/output pins, a USB connector, a power jack, an ICSP
header, and a reset button.
3. RFID scanner
A radio frequency transmitter and receiver that can read and write data to an RFID

32
tag is known as an RFID reader.

3.3.8.2 Library of ESP8266


This library is focused on protecting user privacy and data in accordance with Google login
procedures. Although the data transmission time in this case was significantly reduced
because it does not require any auth token then the overall data size was reduced, it is not
advisable to set the security rules to allow public access read and write because anyone
can steal, modify, or delete data in your database.
3.3.8.3 Adding the Firebase library

Open Sketch then include library then add library and add to Arduino IDE.
These connections allow us to interface between the Arduino Uno and the ESP8266 Wi-Fi
module. The firebase library is used to retrieve data from firebase, which has a database of
objects, so that an RFID scanner can scan potential targets. If the scanner discovers an
object in the firebase database, firebase will inform the scanner that the object has been
locate.

Figure 1. 5 How to Interface Arduino with Firebase Using ESP8266

3.1.3 Tools
All tools and components used during the completion of this project are as under:
3.3.9.1 Hardware Requirements:
1. Spark fun RFID Reader: The M6E Nano UHF RFID Reader can be used with
the Spark Fun Simultaneous RFID Reader, an Arduino-compatible board.
Everywhere, Radio Frequency Identification (RFID) is growing in popularity for
tracking almost anything.

33
2. RFID NFC Card: The key players in NFC transactions are NFC readers. They can
interact with NFC phones, read and write cards and tags, and facilitate device-
to-device communication

3. Active and Passive RFID Tags: A passive tag receives its energy from a tag
reader, whereas an active tag is powered by an internal battery. There won’t be a
battery or other power source on a passive RFID tag by itself.

4. Microcontroller Board: Automotive engine control systems, implantable medical


devices, remote controls, office equipment, appliances, power tools, toys, and other
embedded systems are a few examples of the automatically controlled goods and
gadgets that use microcontrollers.

5. ARDUINO UNO Rev3: The finest board for learning electronics and coding is the
Arduino UNO. The UNO is the most durable board you may start playing with if this
is your first time dabbling with the platform.

6. ESP8266: A self-contained SOC with an integrated TCP/IP protocol stack, the


ESP8266 Wi-Fi Module allows any microcontroller to access your Wi-Fi
network.
3.3.9.2 Software Requirements:

1. MATLAB: Engineers and scientists can use the programming environment


MATLAB to analyze, create, and test systems and technologies that will change the
world.

2. ARDUINO IDE: In addition to a text editor for writing code, a message area, a
text console, a toolbar with buttons for frequently used operations, and a number
of menus, the Arduino Integrated Development Environment, sometimes known as
the Arduino Software (IDE), is also available.

3. Android Application: You can create apps for Android phones, tablets, Android
Wear, Android TV, and Android Auto using Android Studio, which offers a single

34
development environment. You can break your project into functional pieces that
you can separately create, test, and debug using structured code modules.

4. Firebase: You can increase your user base, create better apps, and make more
money with the aid of Firebase. Each feature functions properly on its own and
even more so when used in tandem

35
Chapter No. 4

EXPERIMENTS/SOFTWARE REQUIREMENT SPECIFICATIONS

Implementation of Security
While using RFID security or privacy systems, there is a strong chance of reading tags
by anyone, the tags can also be read after it leaves its place. They can also be accessible
by any other unauthorized source. So it has a huge risk in medical or military field or
any other serious matter. As RFID has not so much power to hold or stick to the
encryption procedure but somehow we can manage its access to few people. Here we have
implemented security access to few RFID card. If it was the card user can access then it
was showing the message as Authorized access otherwise Access denied.

Implementation Using MATLAB


To communicate with our Arduino board, we will make straightforward MATLAB m-files.
You can use MATLAB to interface with your board via USB cable thanks to the MATLAB
Support Packages for Arduino Hardware. For 32-bit and 64-bit Windows, 64-bit Mac OS,
and 64-bit Linux, support packages are provided. We’ll now look at how to connect
Arduino and MATLAB after installing the Arduino Package for MATLAB. Open the MATLAB
Application and connect the Arduino board to the PC running MATLAB.

Figure 1. 6 Pinout Connections of Interfacing Arduino with MATLAB

36
Chapter No. 5

Results and Discussion


5.1 Implementation of Security
While using RFID security or privacy systems, there is a strong chance of reading tags
by anyone, the tags can also be read after it leaves its place. They can also be accessible
by any other unauthorized source. So it has a huge risk in medical or military field or
any other serious matter. As RFID has not so much power to hold or stick to the
encryption procedure but somehow we can manage its access to few people. here we have
implemented security access to few RFID card. if it was the card user can access then it
was showing the message as Authorized access otherwise Access denied. The following
Fig 5.1 briefly describes the same.
The Results obtained after implementing the methods were as follows.
Figure 5.1 is taken after interfacing the arduino using MATLAB support package. As
Mentioned above in the chapter I-e methodology.

Figure 1. 7 Output obtained by Implementation of Security using RC522

37
After entering the unique ID of RFID card or tag in the source code then after uploading
the code to the arduino board and taking the card near to the sensor i-e RC522 it was
Blinking green LED if it was the same tag as introduced earlier in the code and red if it’s
not the tag whose unique id is not in the code. Below are the figures regarding the results.
While Red Led was turned on when the card whose data was not stored in the Arduino
was brought near to the Scanner as in figure 5.4.

Figure 1. 8 Output when RFID Tag Not was Found (Red LED is on)

5.1.1 Interfacing Arduino+ESP8266+Firebase


It demonstrates the connection between the Arduino and the ESP8366, which enables us to
communicate data from Firebase to our Arduino. It may be quite helpful to store data
(such as sensor data) in a database that can be accessed via the internet from any location.
Data can be easily stored and retrieved thanks to Firebase.

38
Figure 1. 9 Interface of ARDUINO with Firebase using ESP8266

5.1.2 Working of Mobile Application


In figure 5.4 objects are being added to our mobile application. User has to fill some
credentials like Object ID, Object name, location and Password for objects we want to
store in my objects which is a directory of secure objects.
After clicking on location marker it will redirect use to the google map which will allow user
to enter his/her current location or any other precise location where objects were added.

39
Figure 1. 10 User Interface of mobile application while adding different objects

Firebase data is stored in a Firebase Database reference, from which it may be fetched
by adding an asynchronous listener. The listener is activated once when the data is in its
initial state and again whenever the data changes. Several methods exist for writing data
to Cloud Firestore: By specifically mentioning a document identifier, set the data for a
document within a collection.

40
Figure 1. 11 Object successfully added to Firebase in their respective fields

A fresh document to a repository. In this instance, the document identifier is generated


automatically by Cloud Firestore. Create a blank document with a randomly generated
identification, then fill it with information afterwards. A set that saves new data to the
provided database reference, replacing any existing data at that path, is the fundamental
database write operation. We’ll create a straightforward blogging app to better
comprehend set. Your app’s data is kept in the following database.

41
Chapter No. 6

CONCLUSION AND FUTURE WORK

Conclusion
The goal of this project was to help those who have trouble finding their belongings find
any missing items nearby. We have employed an Android-based application that will help
the person trying to pinpoint the whereabouts of a valuable object. In order to do this, an
RFID-based system that enables users to use their mobile phones to locate themselves has
been developed. To be on the safe side in case they lost the thing in a hurry, the user must
first enter all the objects they desired into the database. As soon as an object is entered to
the database, the system will be able to track it quickly. Users may track and find their
objects easily and without any problem by simply searching for that object in the
application, at which point all of the coordinates of the object will appear on the map.

Future Work
The future work associated with this project will have a huge impact on us because we are
implementing it in a range of places, such as warehouses, homes, libraries, etc. However,
it’s feasible that someone may use WIFI technology to control RFID sensors and tags in
the upcoming weeks or months, or they might even broaden the use of this technology.
We are also putting this theory into practise on an Android application. Additionally, they
can scan anything hidden by obstructions thanks to long-range frequency RFID scanners
that they have access to. Any object can be detected with a high frequency range.

42
Bibliography

[1] S. Hinske, “Determining the position and orientation of multi-tagged objects using rfid

technology,” in Fifth Annual IEEE International Conference on Pervasive Computing

and Communications Workshops (PerComW’07), pp. 377–381, IEEE, 2017.

[2] S. Parlak, I. Marsic, and R. S. Burd, “Activity recognition for emergency care using

rfid.,” in BodyNets, pp. 40–46, 2017.

[3] A. Dionisi, E. Sardini, and M. Serpelloni, “Wearable object detection system for the

blind,” in 2012 IEEE International Instrumentation and Measurement Technology

Conference Proceedings, pp. 1255–1258, IEEE, 2018.

[4] M. Boˇzic-Kudric, P. Sˇ olic, and N. Roˇzic, “Rfid technology based object

tracking system,” 2017.

[5] H. Malla, P. Purushothaman, S. V. Rajan, and V. Balasubramanian, “Object level

mapping of an indoor environment using rfid,” in 2014 Ubiquitous Positioning

Indoor Navigation and Location Based Service (UPINLBS), pp. 203–212, IEEE,

2018.

[6] M. J. Bonde and K. P. Rane, “Radio frequency identification (rfid) misplaced

objects,” Int J Electron Electr Eng, vol. 7, no. 7, pp. 657–662, 2018.

[7] A. M. Shaari and N. S. M. Nor, “Position and orientation detection of stored object

using rfid tags,” Procedia engineering, vol. 184, pp. 708–715, 2017.

43
[8] M. A. Bibile and N. C. Karmakar, “Moving chipless rfid tag detection using adaptive

wavelet-based detection algorithm,” IEEE Transactions on Antennas and Propagation,

vol. 66, no. 6, pp. 2752–2760, 2018.

[9] C. Wu, G. Ho, K. Yung, W. Tam, and W. Ip, “An rfid-based fallen object detection

system: a case study of hong kong’s light rail system,” IEEE Journal of Radio

Frequency Identification, vol. 2, no. 2, pp. 55–67, 2018.

[10] F. Dehbashi, N. Ahmed, M. Mehra, J. Wang, and O. Abari, “Swimtrack: Drowning

detection using rfid,” in Proceedings of the ACM SIGCOMM 2019 Conference

Posters and Demos, pp. 161–162, 2019.

[11] T. Gunasagar and B. Balachander, “Smart billing system using rfid and weight

sensors,” International Journal of Advanced Research in Engineering and

Technology (IJARET), vol. 11, no. 2, 2020.

[12] H. Liu, R. Zhang, L. Chen, J. Yu, J. Liu, and J. An, “On fast and reliable missing

event detection protocol for multitagged rfid systems,” IEEE Internet of Things

Journal, vol. 7, no. 10, pp. 10324–10335, 2020.

[13] A. A. Neloy, A. Arman, M. S. Islam, and T. Motahar, “Automated mobile robot

with rfid scanner and self obstacle avoiding system,” Int. J. Pure Appl. Math, vol.

118,

no. 18, pp. 3139–3150, 2018.


[14] K. Vandana, K. A. Kumar, G. Sivani, G. Devanand, and E. Venkatanarayana,

“Examination room guidance system using rfid and arduino,” International

44
Research Journal of Engineering and Technology, vol. 5, no. 04, pp. 2395–0072,

2018.

[15] R. Nishitha, S. S. Naik, V. Raksha, and U. Kulsum, “Iot based automatic billing

system using barcode scanner by android device and monitoring unregistered

barcode by rfid,” in 2019 4th International Conference on Recent Trends on

Electronics, Information, Communication & Technology (RTEICT), pp. 15–20, IEEE,

2019.

[16] R. Baashirah and K. Elleithy, “Automation of the baggage check-in process using rfid

system in airports,” in 2019 IEEE Long Island Systems, Applications and Technology

Conference (LISAT), pp. 1–4, IEEE, 2019.

[17] S. Mekruksavanich, “Supermarket shopping system using rfid as the iot application,”

in 2020 Joint International Conference on Digital Arts, Media and Technology with

ECTI Northern Section Conference on Electrical, Electronics, Computer and

Telecommunications Engineering (ECTI DAMT & NCON), pp. 83–86, IEEE, 2020.

[18] J. Liu, F. Zhu, Y. Wang, X. Wang, Q. Pan, and L. Chen, “Rf-scanner: Shelf

scanning with robot-assisted rfid systems,” in IEEE INFOCOM 2017-IEEE

Conference on Computer Communications, pp. 1–9, IEEE, 2017.

[19] Z. Guo, E. Ngai, C. Yang, and X. Liang, “An rfid-based intelligent decision support

system architecture for production monitoring and scheduling in a distributed

manufacturing environment,” International journal of production economics, vol. 159,

pp. 16–28, 2016.

45
APPENDICES
APPENDIX A
CODE

private void getMyObjects() {

if (progressDialog != null && !progressDialog.isShowing()) {


progressDialog.show();
}

database = FirebaseDatabase.getInstance().getReference("Objects").
child("Locked");

database.addValueEventListener(new ValueEventListener() {
@Override
public void onDataChange(@NonNull @NotNull DataSnapshot snapshot)

46
i

for (DataSnapshot dataSnapshot :


snapshot.getChildren()) { ObjectsModel model
= dataSnapshot.getValue (ObjectsModel.class);

list.add(model);

adapter.notifyDataSetChanged();

if (list.isEmpty()) {

wip.setText("Dear user, No data was found.


Kindly store data in database using New
Entry button from Main Screen");
wip.setVisibility(View.VISIBLE);
listview.setVisibility(View.GONE);
} else

wip.setVisibility(View.GONE);
listview.setVisibility(View.VISIBLE);
}

if (progressDialog != null &&


progressDialog.isShowing())

i
ii

{
progressDialog.dismiss();

@Override

public void onCancelled(@NonNull @NotNull DatabaseError


error)

});

As above code is the main or we can say building block of our mobile application.
this code will retrieve data from our Firebase which is real time database.

ii

You might also like