You are on page 1of 28

A project On

TRACING THE STOLEN RADIO ACTIVE MATERIALS BY USING RFID
By V.BHAVANI - 09NG1A0407 SURYA PRAKASH - 09NG1A0444 P.SHYAMALA DEVI - 09NG1A0446 L.SRINIVAS - 09NG1A0439

ABSTRACT
In the current world, the high value objects such as radioactive

materials, diamonds are prone to the theft and are required to be
monitored to ensure safety. Monitoring the objects within a short distance by the use of a wireless security system is implemented with the help of modules which are capable of communicating with each other.

The buzzer attached to the modules Sounds instantly when the
portable object moves approximately six meters away from the owner to the fixed location. And also door will closed for find the

thief.

. Monitoring the objects within a short distance by the use of a wireless security system is implemented with the help of modules which are capable of communicating with each other. These objects are easy for thieves to steal and resale. laptops and radioactive materials has become a tough task.OBJECTIVE In the current situation how to protect the objects such as diamonds. and also can stop the thieves by using door closing.

EXISTING SYSTEM •In existing system there is no GSM module •It consists only buzzer system •Here used only IR pairs DRAWBACKS •Line Of Sight(LOS) •No message alerting .

• Introducing the door closing system by using motor .PROPOSED SYSTEM • Providing message alerts by using GSM module • The buzzer attached to the modules Sounds instantly when the portable object moves approximately six meters away from the owner to the fixed location.

BLOCK DIAGRAM TRANSMITTER SECTION: POWER SUPPLY TRANSMI TTER ENCODER AT89S52 .

RECEIVER SECTION: Power supply AT89S52 MAX232 GSM LCD Decoder RF Rx Buzzer Driver Motor .

Driver(L293D) 10.Buzzer 9.RF transmitter 4.LCD 8.LIST OF COMPONENTS 1.AT89S52 MC 2.DC motor 11.GSM modem 3.Decoder 7. RF receiver 6.Voltage regulator .Encoder 5.

• Three 16-bit Timer/Counters. • 32 Programmable I/O Lines.AT89S52 MC • RAM is 256 bytes. • Eight Interrupt Sources. . • Watchdog timer. • Fast programming time.

PIN DIAGRAM .

Thus serial Communication is used to interface modem with the microcontroller. . • GSM modem cannot be interfaced with the microcontroller directly.GSM MODEM • GSM(Global System for Mobile communication) is a digital mobile telephone system. • A GSM modem is a wireless modem that works with a GSM wireless network.

5-12V operation. • 1.RF TRANSMITTER •433.92 MHz Frequency. . • Low Cost. • Small size.

ENCODER .

.RF RECEIVER RF RECEIVER STR-433 MHz The data is received by the RF receiver from the antenna pin and this data is available on the data pins.

DECODER .

. Each character consists of 5x7 dot matrix. •LCD screen consists of two lines with 16 characters each. LCD is finding wide spread use replacing LEDs. •All data transferred to LCD through outputs D0-D7 will be interpreted as commands or as data.LCD •LCD stands for Liquid Crystal Display.

The Red lead is connected to the Input and the Black lead is connected to Ground.e. .BUZZER •The buzzer produces a same noisy sound irrespective of the voltage variation applied to it. •Most buzzers produce sound in the range of 2 to 4 kHz. •It consist 2 leads i.

 Output Current 1 A Per Channel (600 mA for L293D).DRIVER  Wide Supply-Voltage Range: 4.5 V to 36 V.  Separate Input-Logic Supply. .

DC MOTOR .

• 7805 is a voltage regulator integrated circuit.VOLTAGE REGULATOR • A voltage regulator is an electrical regulator desi gned to automatically maintain a constant voltage level. It is a member of 78xx series of fixed linear voltage regulator ICs. .

CIRCUIT DIAGRAM Transmitter section .

CIRCUIT DIAGRAM Receiver section .

Flow chart start RF transmitter RF receiver Product items LCD display Buzzer Door closing Message .

APPLICATIONS • Storage of Radio active materials • Shopping Malls • Museums .

•We can find out robbers easily. .ADVANTAGES •It alerts security easily.

FEATURE SCOPE To add the GPS for this system we can find the particular point of location. where the stolen materials are present. .

CONCLUSION A wireless security system affixed to the object in consideration was proved to be an efficient way to alert the user in case of theft. The size of the System can be decreased by decreasing the battery sizes. . making it more accessible and compact to install on many portable devices.

The Computing Science and Technology International Journal.REFERENCES [1]Clarke. sponsored by Dell. H. S. 2011..html#YeddaComboPosition [2] Ponemon Institute Airport Insecurity: The Case of Lost Laptops. 5-14. 1. Vol. pp. L. 1. The Computing Science and Technology International Journal. Third Edition. August. Vol. The Computing Science and Technology International Journal.com/docs/prod/ folders/print/cc2500. . 1. 1. [5]Finkenzeller.RetrievedAugust2010. [4]Li. No. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards. pp. F. 1.com/article_137840_10. 1. K. “Opportunistic Relaying in Cooperative OFDM Networks with Limit Feedback”. Retrieved September 2010 from Airport Insecurity: The case of missing and lost laptops: [3]Su. Radio Frequency Identification and Near-Field Communication. Laptop Theft .. 15-19. August.ti. Tan.. John Wiley and Sons. 2011. [7]TexasInstruments. December. Vol. No.a growing trend Retrieved September 2010 from: http://www. “Dynamic Restoration for Survivable Traffic Grooming in WDM Networks”.articlealley. G. [6]Yao.. “A Tradeoff Scheme in Multi-User System with Block Diagonal Geometric Mean Decomposition”.fromhttp://focus. No. 2011.