Professional Documents
Culture Documents
On
SUBMITTED BY
Pranjal Saxena
College ID- A-2023MBA9833
AFFILIATED TO
DR. A.P.J. ABDUL KALAM TECHNICAL UNIVERSITY
(FORMERLY UTTAR PRADESH TECHNICAL UNIVERSITY),
LUCKNOW
1
STUDENT DECLARATION & CERTIFICATE
I Pranjal Saxena hereby declare that the work which is being presented in this report entitled
Waste management system is an authentic record of my work carried out under the supervision of
Prof.. Manoj Kumar Chaudhary.
.
The matter embodied in this report has not been submitted by me for the award of any other
degree/ Diploma/ Certificate.
Department of MBA
Pranjal Saxena
Date:
This is to certify that the work which is being presented in this report entitled Waste
Management System is an authentic record of the student carried out under my supervision.
The statements made by the candidate are correct to the best of my knowledge, based on the
candidate’s declaration.
Date: Date:
2
CERTIFICATE
This is to certify that Mr. Pranjal Saxena MBA (2023-25 Batch) a student of IMS Engineering
College, Ghaziabad has undertaken the Mini Project-1 (KMBN151) on “Fingerprint Based Car
Ignition System" The project has been carried out by the student in partial fulfillment of the
requirements for the award of MBA, under my guidance and supervision.
3
Acknowledgement
Pranjal Saxena
MBA-I Sem.
4
Table Of Contents
Introduction 6
Objective 8
SWAT Analysis 16
4P’s 21
4C’s 26
Discussion 31
Conclusion 32
5
Introduction
In the 21st century with rapid industrialization and modernization at its peak in the
technological aspects, car security has been one of the most important of concerns
due to the alarming rise in the number of car thefts. In an attempt to find a solution to
this problem we are proposing a novel method of the fingerprint-based security
system to prevent car thefts Matches only then can the car are started by pressing the
start button. Otherwise not only will the start button not function but also the
burglary alarm will be triggered and a notification will be sent to the user’s phone
and with the GPS location of the car and unless the user has control of the vehicle
and resets the application’s ‘burglary’ button, a notification will be sent to the phone
every 10 minutes with the present location of the car. Also, if anyone tries to steal
the car by
6
using things like a paper clip and inserting it in the fuse in order to trigger the battery
and engine ignition, we have a system in place for that possibility as well. We know
there are two circuits which when connected can start the engine - one is the normal
circuit connected from the RFID and start button while the other is between the
battery and the starter. We place a sensor on each circuit that will alert us if the
circuit is connected or not and if we find the battery engine circuit connected,
immediately the burglary alarm goes on and a notification is sent to the owner’s
phone with the present GPS coordinates and this process keeps on repeating every 10
minutes till the user resets the ‘burglary’ option in the mobile application. This way
even if the car is stolen, we will be able to track it down quite easily
7
Objective
8
Description of the Idea
The issue of car hijacking or snatching on highway, car theft due to easy access to
car’s functional system can be reduced by using a biometric system for starting the
car’s engine as the necessity of protection and access restriction in many luxurious
assets is now very important. Biometric systems have in a long time served as a
strong security system in many different applications and it can also be implemented
in automobile industry. Biometric system is a technological system that uses
information about a person to identify such the person. It relies on specific data about
unique biological trait in order to work effectively. This system involves running
data through algorithms for a particular result, usually related to a positive
identification of a user or other individuals. Fingerprint as one of the biometric
techniques is an impression of ridges of one’s fingertip. This technique is said to be
the oldest of all biometric techniques as it is recorded to be used by the Assyrian, the
Babylonians, the Chinese and Japan in 2200BC. So, the use of fingerprint as a
personal code has a long tradition.
9
Fingerprint Scanning Process
Fingerprint scanner system serves two basic purposes – To get an image of the user
as well as the authorized person’s finger and scans the pattern, the ridges and valleys
and put it in the algorithm as shown in Figure below. After it is programmed and
stored in the SD card, every time the person scans their finger it has to detect
whether the pattern of ridges and valleys in that particular image matches those in
pre-scanned images4. The particular characteristics, unique to each fingerprint, are
filtered and stored as an encrypted biometric key or in form of binary codes. The
image of fingerprints is not saved, rather verification is done by the series of
numbers (binary code) only. None can change the fingerprint image from the series
of binary codes or from the algorithm used.
10
Fingerprint Sensor
Secure with biometrics - this all-in-one optical fingerprint sensor will make adding
fingerprint detection and verification super simple. These modules are typically used
in safes - there's a high powered DSP chip that does the image rendering, calculation,
feature finding and searching. Connect to any microcontroller or system with TTL
serial, and send packets of data to take photos, detect prints, hash and search. You
can also enroll new fingers directly up to 162 finger prints can be stored in the
onboard FLASH memory. There's a red LED in the lens that lights up during a photo
so you know it’s working as shown in fig.2
11
Fingerprint processing includes two parts: fingerprint enrollment and fingerprint
matching (the matching can be 1:1 or 1: N) as shown in fig.3. When enrolling, user
needs to enter the finger two times. The system will process the two-time finger
images, generate a template of the finger based on processing results and store the
template. When matching, user enters the finger through optical sensor and system
will generate a template of the finger and compare it with templates of the finger
library. For 1:1 matching, system will compare the live finger with specific template
designated in the Module; for 1: N matching, or searching, system will search the
whole finger library for the matching finger. In both circumstances, system will
return the matching result, success or failure.
12
Design and Analysis of Proposed System
13
In the design of this fingerprint-based vehicle starting system, signals are generated
by the Arduino to appropriate module circuit. The whole system is aimed to be
constructed in a plastic casing to enhance heat evacuation and working efficiency of
the system. The Arduino reads the state of the input buttons which could be either a 1
or a 0. The signal Arduino gets from the input button tells what to work on at that
time. This project is aimed to replace the push-button in vehicle ignition and create a
more reliable and secured way of starting the ignition with fingerprint pattern only.
The Arduino environment has been designed to be easy to use for beginners who
have no software or electronics experience. With Arduino, you can build objects that
can respond to and/or control light, sound, touch, and movement. Arduino has been
used to create an amazing variety of things, including musical instruments, robots,
light sculptures, games, interactive furniture, and even interactive clothing. Arduino
is used in many educational programs around the world, particularly by designers
and artists who want to easily create prototypes but do not need a deep understanding
of the technical details behind their creations. Because it is designed to be used by
nontechnical people, the software includes plenty of example code to demonstrate
how to use the Arduino board’s various facilities.
14
Start
Ignition Key
Initialize MCU
Flow chart of Fingerprint Based Car ignition system
Image Capture on
FP Scanner
No Yes Match No
Provide Access With Buzzer
Database
No
SMS To owner
Immobilize Vehicle
Stop
15
SWAT Analysis
16
Strength
Highly reliable
Highly secure than other security systems.
Processing speed is fast
Economical biometric technology
Less Memory Space
Easy to use and user friendly
17
Weakness
18
Opportunity
Motorcycle
Transport vehicles
Home Security Systems
Lockers
ATM’s
19
Threats
Can be hacked
20
4P’s
21
Product
22
Price
23
Place
24
Promotion
25
4C’s
26
Customer
27
Cost
28
Convenience
It is easier to install.
This is an electronic product, so it is easier to detect any
problem and solve it.
29
Communication
30
Discussion
Realizing a project physically has lots to do with research, choice of component and
testing of the components. The project was implemented and tested to ensure proper
operation under stated instruction. The various modules were tested and satisfactory
results were obtained. As the components used fall within the tolerance value of the
components, hence an assurance of the proper functioning of the system.
If owner loses his key-fob or someone copies the radio frequency of a key fob, he is
not able to start the car engine. The alarm sounds as soon as three wrong entries are
detected by the fingerprint sensor. A notification is received in the mobile
application with the location of the vehicle as soon as wrong entry detected by the
fingerprint sensor. The movement of the vehicle is tracked on the GPS module.
31
Conclusion
This paper introduced a fingerprint-based protection system for vehicles along with
GPS and RFID. If anyone tries to steal it an alarm will trigger and a notification will
be sent to the synced mobile application and to a police station. Even if someone
tries to start the engine by jacking the battery alarm will be set on and the
notification will be sent and they will be sent every 10 minutes unless the user resets
the ‘burglary’ option in the mobile. Since the system is a low power system it can be
powered with a stand by Li-ion battery so if the main powering battery of the vehicle
is removed also the system can keep updating the location of the vehicle.
32