25-08-2017, 09:32 PM
Automated Toll Collection With Complex System
Automated Toll Collection With Complex System.docx (Size: 1.86 MB / Downloads: 18)
Introduction
The project aims automated toll collection system using the active RFID tags, vehicles are made to pass through a sensor system that is embedded on the highway just before the tollgate. The system will electronically classify the vehicle and calculate the exact amount to be paid by the vehicle owner, ensuring no pilferage of the toll amount
Objective of the project
The project uses the RFID technology and Embedded Systems to design this application. The main objective of this project is to design a system that continuously checks for the RFID and controls the Toll Gate and collects the exact fare from the owner of vehicle and reduces the man power with accurate toll collection.
This project is a device that collects data from the RFID section, codes the data into a format that can be understood by the controlling section. This receiving section controls the direction of the motor and updates the amount as per the command received from the RFID section.
The objective of the project is to develop a microcontroller based control system. It consists of a RF Reader and Tag, microcontroller and the robotic arrangement
Background of the Project
The software application and the hardware implementation help the microcontroller read the data from RFID Tag and accordingly change the direction of the rotation of the motor. The measure of efficiency is based on how fast the microcontroller can read the data, detect the signal received and change the direction of the rotation of the motor. The system is totally designed using RFID and embedded systems technology. The performance of the design is maintained by controlling unit.
Overview of the technologies used
Embedded Systems
An embedded system can be defined as a computing device that does a specific focused job. Appliances such as the air-conditioner, VCD player, DVD player, printer, fax machine, mobile phone etc. are examples of embedded systems. Each of these appliances will have a processor and special hardware to meet the specific requirement of the application along with the embedded software that is executed by the processor for meeting that specific requirement.
The embedded software is also called “firm ware”. The desktop/laptop computer is a general purpose computer. You can use it for a variety of applications such as playing games, word processing, accounting, software development and so on.
In contrast, the software in the embedded systems is always fixed.
Definition of RFID technology
Radio frequency identification (RFID) is a general term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object wirelessly using radio waves. RFID technologies are grouped under the more generic Automatic Identification (Auto ID) technologies
Introduction to RFID Technology
In recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables identification from a distance and unlike earlier bar-code technology; it does so without requiring a line of sight. RFID tags support a larger set of unique IDs than bar codes and can incorporate additional data such as manufacturer, product type and even measure environmental factors such as temperature. Furthermore, RFID systems can discern many different tags located in the same general area without human assistance.
Hardware Implementation of the Project
Hardware Implementation of the Project
This chapter briefly explains about the Hardware Implementation of the project. It discusses the design and working of the design with the help of block diagram and circuit diagram and explanation of circuit diagram in detail. It explains the features, timer programming, serial communication, interrupts of P89V51RD2 microcontroller. It also explains the various modules used in this project
Project Design
The implementation of the project design can be divided in two parts.
Hardware implementation
Firmware implementation
Hardware implementation deals in drawing the schematic on the plane paper according to the application, testing the schematic design over the breadboard using the various IC’s to find if the design meets the objective, carrying out the PCB layout of the schematic tested on breadboard, finally preparing the board and testing the designed hardware.
The firmware part deals in programming the microcontroller so that it can control the operation of the IC’s used in the implementation. In the present work, we have used the Orcad design software for PCB circuit design, the Keil µv3 software development tool to write and compile the source code, which has been written in the C language. The Proload programmer has been used to write this compile code into the microcontroller. The firmware implementation is explained in the next chapter.
The project design and principle are explained in this chapter using the block diagram and circuit diagram. The block diagram discusses about the required components of the design and working condition is explained using circuit diagram and system wiring diagram.
Power Supply
The input to the circuit is applied from the regulated power supply. The ac. input i.e., 230V from the mains supply is step down by the transformer to 12V and is fed to a rectifier. The output obtained from the rectifier is a pulsating dc voltage. So in order to get a pure dc voltage, the output voltage from the rectifier is fed to a filter to remove any ac components present even after rectification. Now, this voltage is given to a voltage regulator to obtain a pure constant dc voltage
Special Function Registers
A map of the on-chip memory area called the Special Function Register (SFR) space is shown in the following table. It should be noted that not all of the addresses are occupied and unoccupied addresses may not be implemented on the chip. Read accesses to these addresses will in general return random data, and write accesses will have an indeterminate effect.
Memory Organization
MCS-51 devices have a separate address space for Program and Data Memory. Up to 64K bytes each of external Program and Data Memory can be addressed.
3.5.1 Program Memory:
If the EA pin is connected to GND, all program fetches are directed to external memory. On the P89V51RD2, if EA is connected to VCC, program fetches to addresses 0000H through 1FFFH are directed to internal memory and fetches to addresses 2000H through FFH are to external memory.
3.5.2 Data Memory:
Programming the Flash – Parallel Mode
The P89V51RD2 is shipped with the on-chip Flash memory array ready to be programmed. The programming interface needs a high-voltage (12-volt) program enable signal and is compatible with conventional third-party Flash or EPROM programmers. The P89V51RD2 code memory array is programmed byte-by-byte.
3.7.1 Programming Algorithm:
Before programming the P89V51RD2, the address, data and control signals should be set up according to the “Flash Programming Modes”. To program the P89V51RD2, take the following steps:
1. Input the desired memory location on the address lines.
2. Input the appropriate data byte on the data lines.
3. Activate the correct combination of control signals.
4. Raise EA/VPP to 12V.
5. Pulse ALE/PROG once to program a byte in the Flash array or the lock bits. The byte write cycle is self-timed and typically takes no more than 50 µs. Repeat steps
Radio Frequency Identification
1 RFID principles
1. Active tags require a power source i.e., they are either connected to a powered infrastructure or use energy stored in an integrated battery. In the latter case, a tag’s lifetime is limited by the stored energy, balanced against the number of read operations the device must undergo. However, batteries make the cost, size, and lifetime of active tags impractical for the retail trade.
2. Passive RFID is of interest because the tags don’t require batteries or maintenance. The tags also have an indefinite operational life and are small enough to fit into a practical adhesive label. A passive tag consists of three parts: an antenna, a semiconductor chip attached to the antenna and some form of encapsulation. The tag reader is responsible for powering and communicating with a tag. The tag antenna captures energy and transfers the tag’s ID (the tag’s chip coordinates this process). The encapsulation maintains the tag’s integrity and protects the antenna and chip from environmental conditions or reagents.
2 RFID Technology and Architecture
Before RFID can be understood completely, it is essential to understand how Radio Frequency communication occurs.
RF (Radio Frequency) communication occurs by the transference of data over electromagnetic waves. By generating a specific electromagnetic wave at the source, its effect can be noticed at the receiver far from the source, which then identifies it and thus the information
3 RFID Frequencies
Much like tuning into the favorite radio station, RFID tags and readers must be tuned into the same frequency to enable communications. RFID systems can use a variety of frequencies to communicate, but because radio waves work and act differently at different frequencies, a frequency for a specific RFID system is often dependant on its application. High frequency RFID systems (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) offer transmission ranges of more than 90 feet, although wavelengths in the 2.4 GHz range are absorbed by water, which includes the human body and therefore has limitations
RFID Module and Principle of working
RFID Reader Module, are also called as interrogators. They convert radio waves returned from the RFID tag into a form that can be passed on to Controllers, which can make use of it. RFID tags and readers have to be tuned to the same frequency in order to communicate. RFID systems use many different frequencies, but the most common and widely used & supported by our Reader is 125 KHz.
Switches and Pushbuttons
This is about something commonly unnoticeable when using these components in everyday life. It is about contact bounce, a common problem with mechanical switches. If contact switching does not happen so quickly, several consecutive bounces can be noticed prior to maintain stable state. The reasons for this are: vibrations, slight rough spots and dirt. Anyway, this whole process does not last long (a few micro- or milliseconds), but long enough to be registered by the microcontroller. Concerning the pulse counter, error occurs in almost 100% of cases
Firmware Implementation of the project design
This chapter briefly explains about the firmware implementation of the project. The required software tools are discussed in section 5.1. Section 5.2 shows the flow diagram of the project design. It presents the firmware implementation of the project design.
Software Tools Required
Keil µv3, Proload are the two software tools used to program microcontroller. The working of each software tool is explained below in detail.
5.1.1 Programming Microcontroller:
A compiler for a high level language helps to reduce production time. To program the P89V51RD2 microcontroller the Keil µv3 is used. The programming is done strictly in the embedded C language. Keil µv3 is a suite of executable, open source software development tools for the microcontrollers hosted on the Windows platform.
Results and Discussions
Working procedure
Toll Plaza using RFID is basically an embedded system that makes the things easy in the toll gate fare collection during the time of toll collection. The project uses the wireless technology RFID and embedded systems to implement the application.
In this project, the necessary and, up to an extent, the sufficient material, the vehicle has to carry the tag (RFID tag with the voter’s details).
RFID tag of the vehicle is the tag that stores the details of the vehicle like the vehicle name and price of the vehicle etc. At the toll plaza, when asks to open toll gate to show his tag, he has to bring this card near the RFID reader. The RFID reader reads the data present in the tag.
Since the aim of the project is to provide security and make the task easy, the system initially stores the details of the vehicle. Thus, the system after reading the card (RFID tag), it compares this data with the already stored data in the system’s memory. The details present in the card will be displayed on the LCD.
If this data is present in the system’s database and matches with any of the details, the system allows the vehicle to pass the vehicle from the toll gate. If the data does not match with any of the details of the system’s database, the system immediately rejects and displays the information.
Future Scope of the project
In the short term, the greater the fraction of automated lanes, the lower will be the cost of operation (once the capital costs of automating are amortized). In the long term, the greater the relative advantage that registering and turning one's vehicle into an electronic-toll one provides, the faster cars will be converted from manual-toll use to electronic-toll use, and therefore the fewer manual-toll cars will drag down average speed and thus capacity. Some of the benefits for drivers include