Chandan
Chandan
Chandan
USING RFID
by
C.MADHUMITHA (38130121)
C.SELVALAKSHMI (38130200)
SATHYABAMA
INSTITUTE OF SCIENCE AND TECHNOLOGY
(DEEMED TO BE UNIVERSITY)
Accredited with Grade “A” by NAAC I 12B Status by UGC I Approved by AICTE
JEPPIAAR NAGAR, RAJIV GANDHI SALAI, CHENNAI - 600 119
APRIL 2022
SATHYABAMA
INSTITUTE OF SCIENCE AND TECHNOLOGY
(DEEMED TO BE UNIVERSITY)
Accredited with ‘A’ grade by NAAC | 12B status by UGC | Approved by AICTE
Jeppiar Nagar, Rajiv Gandhi salai, Chennai-600 119
www.sathyabama.ac.in
BONAFIDE CERTIFICATE
This is to certify that this Project Report is the bonafide work of MADHUMITHA C
(38130121) and SELVALAKSHMI C (38130200) who carried out project entitled” SMART
ATM CARD FOR MULTIPLE BANK ACCOUNTS” under our supervision from October
2021 to April 2022.
.
Internal Guide
Dr. R. JOANY, M.E, Ph.D.,
II
DECLARATION
1)
2)
DATE:
III
ACKNOWLEDGEMENT
We convey our thanks to Dr. N.M. NANDHITHA, M.E, Ph.D., Dean, School of
Electronics and Communication Engineering and Dr. T. RAVI, M.E, Ph.D., Head of
the Department, Department of Electronics and Communication Engineering for
providing me necessary support and details at the right time during the progressive
reviews.
We would like to express my sincere and deep sense of gratitude to my Project Guide
Dr. R.M. Joany, M.E, Ph.D., for her valuable guidance, suggestions and constant
encouragement paved way for the successful completion of my project work.
We wish to express my thanks to all Teaching and Non-teaching staff members of the
Department of Electronics and communication Engineering who were helpful in
many ways for the completion of the project.
We express our gratitude to our parents for their continuous encouragement and
support for the completion of the project.
IV
ABSTRACT
V
TABLE OF CONTENT
ABSTRACT V
LIST OF FIGURES VIII
LIST OF TABLES X
LIST OF ABBREVIATIONS XI
1 INTRODUCTION 1
1.1 GENERAL 1
1.2 SCOPE OF THE PROJECT 1
1.3 EXISTING SYSTEM 1
1.4 EXISTINGSYSTEM DISADVANTAGES
2 LITERATURE SURVEY 2
2.1 LITERATURE SURVEY 2
2.2 LITERATURE SUMMARY 5
VI
4 MATERIALS AND METHODS USED
5.1 OUTPUT 69
6.1 CONCLUSION 81
6.2 ADVANTAGES 81
6.3 APPLICATIONS 82
6.4 FUTURE ENHANCEMENTS 82
REFERENCE 83
VII
LIST OF FIGURES
VIII
5.3 Using Fingerprint sensor 70
5.4 Registration of fingerprint 70
5.5 Finger print sensor 70
5.6 Mobile no Registration process 71
5.7 Keypad 71
5.8 Mobile number Registration process 72
5.9 Mobile Number Access 72
5.10 Registering our Mobile Number 72
5.11 Otp is generated 73
5.12 Received otp 73
5.13 Enter the otp 74
5.14 Verification of otp 74
5.15 Deposit 74
5.16 Biometric process 75
5.17 Deposit 75
5.18 Selecting SBI bank(1) 75
5.19 Widraw 76
5.20 Select the Bank 77
5.21 Enter the Amount 77
5.22 Withdrawal amount and Balance 77
5.23 Checking BAL 78
5.24 view Balance 78
5.25 Place Finger 79
5.26 Fraud Access 79
5.27 Mismatched finger print 79
5.28 Un authorized 80
5.29 messages to the registered mobile number 80
IX
LIST OF TABLES
X
LIST OF ABBREVIATION
XI
CHAPTER 1
INTRODUCTION
1.1 GENERAL
The main aim of the project is to eliminate several ATM cards and to replace it
with a single card which can be interfaced with multiple banks. This reduces the cards
if multiple accounts are present.
In the existing system, when the user enters the ATM system the user has to
insert the respective card of the user’s choice into the ATM system’s card slot. The
next immediate step the user has to do is enter the pin for that particular card. There
are multiple cards if the user has bank accounts and there is a possible chance of
entering PIN’s of other cards which may affect the transaction process.
1
CHAPTER 2
LITERATURE SURVEY
Year: 2018
Description
Automated Teller Machine (ATM)’s now a days are extensively used all over
the world for the withdrawal of cash. A unique card is issued for each user along with
the unique code provided to him so as to the person may do all his transactions
personally without anyone getting known. Since transactions are extensively secure
there is no much more security required but in countries like India it’s very necessary
to have a physical security to the machine. A provision to give physical security to the
machine is being discussed over here in this paper presented over here.
Title 2: Implementation of Bank Security System using GSM and Internet of Things
Year: 2017
Description
The Internet of Things (IoT) is one of the hottest topics in the technology sector,
and with good reason. It influences the interaction of technological, economic, social,
societal, and individual changes. Internet of things has been governing the electronics
era with cloud services dominating the ever increasing electronics product segment.
Security and safety has always become a basic necessity for urban population. The
Implementation of the Bank Security System by Using GSM and IoT is developed into
the security application. The main objective of this system is to develop an embedded
system, which is used for ATM security applications. The embedded ATM
authentication system is based on sensors & communication technology. In this paper
2
when any disturbance takes place for the ATM machine then information is send
through IoT and door is automatically closed then it will send the machine, by alerting
the surrounding area using buzzer, at the same time total data will be uploaded in web
page using IoT and puts alert message to consult person. In the same way if any fire
occurred controller puts a message to consult person and uploads same data in web
page using IoT. It also counts how many persons are entering into the ATM centre.
This concept is not only a single ATM center; we can consider this ATM center as
node1 (like node1, node2, node3……. Etc) are connected to web page through IoT
module (ESP 8266). So that if there is any disturbance or any fire accident in any
node we can get the area information through IoT to the web page along with buzzer.
Title 3: Advanced Security Management System for ATM's using GSM and MEMS
Authors: Venka Reddy Maram, Mirza Sajid Ali Baig, Narsappa Reddy.
Year: 2015
Description
3
Title 4: ATM machine security system using GSM and MEMS sensor
Year: 2017
Description
The Idea of Designing and of Security Based ATM machine security system
project is born with the observation in our real life examples happening around us.
This project overcomes the drawback of older technology used in our society. Project
deals with the security of ATM machine. Whenever robbery occurs, Vibration sensor
and MEMS sensor is used here which senses vibration produced from ATM machine
and the movement of ATM machine. GSM is used to send the message to the police
station and authority. In this project we uses PIC controller which is based on
embedded system process real time data collected using the MEMS sensor and
vibration sensor. When the movement of machine and the vibration is sensed the
beep sound will occur from the buzzer. For closing the door of ATM DC Motor is used.
Smoke detector is used here to sense the gaseous or smoke near ATM machine. The
use of camera is always in processing and sending video continuous to the Pc and it
will be saved. Here LCD display board shows the status of our project. It will prevent
the robbery occur. Here, MPLAB tools are used to implement the idea and results are
obtained. MPLAB tools are used for run the DC motor for automatic door lock.
Year: 2015
Description
In present time ATM (Automatic Teller Machine) robbery is the common thing,
because we have not strong security and rule or regulation to withdraw the cash from
ATM with help of ATM card. In this paper I have provide the solution of robbery of
ATM to use various technology, rules and regulation. This is common weakness in
ATM security facility, remove this problem we used following technology to improve
security system .This technology work in main three steps or phases, in first phase
4
user need to swap the ATM and used palm for scanning after successfully swap
machine will generate voice you can enter for 2nd phase and palm will save in that
transaction database. When you go for 2nd phase then need to scan the retina and
then go for phase 3rd. there will final ATM. In performing the transaction gate will
closed. The wall of phases will of strong fiber that cannot cut by any Gas. The final
phase has Gas that can power for unconscious. And all CCTV cameras monitored by
near police station. When any thief does robbery in ATM then alarm generate in police
station and Gas will leak in near ATM. Then in this situation all information like,
robbery time, date, CCTV data, voice data will stored in server. The server monitored
by state level. This paper shows only how three phases will work and generate alarm
in near police station & send police in robbery situations.
As we have mentioned in the above literature surveys in the past years ,There is
gradual development in the accessibility of ATM card and necessity of improving the
user friendly and Secure domain in the ATM cards and It evolving method of using it
for multiple bank accounts So, We have initiated the Fingerprint Security for out
Project in order to differentiate and stand alone from the previous projects The
fingerprint technology is the most widely accepted and mature biometric method and
is the easiest to deploy and for a higher level of security at your fingertips. It is simple
to install and also it takes little time and effort to acquire one’s fingerprint with a
fingerprint identification device .
Thus, finger print recognition is considered among the least intrusive of all
biometric verification techniques. The finger print features are different for each
human being so the user can be identified uniquely. Instead of using multiple ATM
card fingerprint based ATM is safer and secure. There is no worry of losing ATM
card and no need to carry ATM card in your wallet. We just have to use our
fingerprint in order to do any banking transaction.
CHAPTER 3
AIM AND SCOPE OF THE PRESENT INVESTIGATION
5
3.1 PROPOSED SYSTEM
The proposed scheme of MAASC (Multiple Account Access using Single ATM
Card) provides the individual, the comfort of accessing users multiple accounts of
different banks using a single card. Also, it provides the user one level higher
convenience than the existing system. The transactions are approved by biometric
authentication of the user which is replaced instead of PIN. As the bank server are
different so the linking of single card to multiple server won’t be a tough process.
• Single ATM card provides more convince of using multiple bank transactions
• Higher security based on the biometric module
• More secure transaction using biometric of the user.
POWER SUPPLY
LCD
GSM
SERVO MOTOR
6
Transaction Process
Alert Module
POWER SUPPLY
RFID READER
ARDUINO LCD
MEGA
RFID TAG
This module which is used to identify the user of the ATM through RFID tag ans
reader.The user of the ATM is identified using this instead of magnetic strips that is
being used in the existing method. This is displayed in the LCD. The
Microcontroller controls the overall process of this system.
7
3.4.2 BIOMETRIC AUTHENTICATION
The biometric authentication is one of the feature where the security is enhanched.
After The user of the ATM card ensures their identity by RFID followed by their
biometric to continue the transaction process. If the biometric and the RFID matches
then the user interface of the prototype directs the user to select the bank to which
they have been registered.
POWER SUPPLY
FINGERPRINT
SENSOR ARDUINO LCD
MEGA
POWER SUPPLY
KEYPAD
ARDUINO
LCD
MEGA
GSM
After the authenticaiton process the user is directed to select the bank that the user
have already registered. The user can use the keypad to select the bank according to
the banks displayed in the LCD. The transaction process is the same as the normal
ATM after the selection of the bank. The balance, debit and credit status is displayed
in the LCD so that user can select it to this convienence.
8
3.4.4 ALERT MODULE
POWER SUPPLY
BUZZER LCD
ARDUINO
MEGA
SERVOMOTOR
If there is any mismatch in the rfid or the biometric then the alarm is triggered
through the microcontroller and a warning message is displayed in the LCD and same
is sent as a SMS to the user of the card. If the authentication process is successful,
then after the transaction process a servomotor is triggered to show the transaction is
successful and a SMS is also sent to the user about the transaction and balance.
In the proposed method, the magnetic strip based ATM card is replaced with RFID
based card which have a unique number. The Arduino MEGA microcontroller is used
to process the data from the sensor. The fingerprint module is used to authenticate the
user and the user needs to enter the One Time Password (OTP) which is generated
by the controller and it is sent to the registered user mobile phone. The user can
register the bank details and also withdraw the amount from the registered bank
details. Hence this system provides more secure and multiple bank account using
single ATM card.
9
CHAPTER 4
4.1.1 ARDUINO
Over the years Arduino has been the brain of thousands of projects, from
everyday objects to complex scientific instruments. A worldwide community of makers
- students, hobbyists, artists, programmers, and professionals - has gathered around
this open-source platform, their contributions have added up to an incredible amount
of accessible knowledge that can be of great help to novices and experts alike.
Arduino was born at the Ivrea Interaction Design Institute as an easy tool for
fast prototyping, aimed at students without a background in electronics and
programming. As soon as it reached a wider community, the Arduino board started
changing to adapt to new needs and challenges, differentiating its offer from simple
8-bit boards to products for IoT applications, wearable, 3D printing, and embedded
environments. All Arduino boards are completely open-source, empowering users to
build them independently and eventually adapt them to their particular needs. The
software, too, is open-source, and it is growing through the contributions of users
worldwide.
WHY ARDUINO?
Thanks to its simple and accessible user experience, Arduino has been used
in thousands of different projects and applications. The Arduino software is easy-
touse for beginners, yet flexible enough for advanced users. It runs on Mac, Windows,
and Linux. Teachers and students use it to build low cost scientific instruments, to
10
prove chemistry and physics principles, or to get started with programming and
robotics. Designers and architects build interactive prototypes, musicians and artists
use it for installations and to experiment with new musical instruments. Makers, of
course, use it to build many of the projects exhibited at the Maker Faire, for example.
Arduino is a key tool to learn new things. Anyone - children, hobbyists, artists,
programmers - can start tinkering just following the step by step instructions of a kit,
or sharing ideas online with other members of the Arduino community.
11
Arduino to the AVR C programming language on which it's based. Similarly,
you can add AVR-C code directly into your Arduino programs if you want to.
The MEGA 2560 is designed for more complex projects. With 54 digital I/O
pins, 16 analog inputs and a larger space for your sketch it is the recommended board
for 3D printers and robotics projects. This gives your projects plenty of room and
opportunities.
12
TABLE 4.1 :TECHNICAL SPECIFICATIONS:
Microcontroller ATmega2560
Operating Voltage 5V
Input Voltage (recommended) 7-12V
Input Voltage (limit) 6-20V
Digital I/O Pins 54 (of which 15 provide PWM output)
Analog Input Pins 16
DC Current per I/O Pin 20 mA
DC Current for 3.3V Pin 50 mA
Flash Memory 256 KB of which 8 KB used by boot loader
SRAM 8 KB
EEPROM 4 KB
Clock Speed 16 MHz
LED_BUILTIN 13
Length 101.52 mm
Width 53.3 mm
Weight 37 g
13
Although the hardware and software designs are freely available under copyleft
licenses, the developers have requested the name Arduinoto be exclusive to the
official product and not be used for derived works without permission. The official
policy document on use of the Arduino name emphasizes that the project is open to
incorporating work by others into the official product. Several Arduino-compatible
products commercially released have avoided the project name by using various
names ending in -duino. An early Arduino board with an RS-232 serial interface (upper
left) and an Atmel ATmega8 microcontroller chip (black, lower right); the 14 digital I/O
pins are at the top, the 6 analog input pins at the lower right, and the power connector
at the lower left.
14
standard AVR in-system programming (ISP) programming is used.An official Arduino
Uno R2 with descriptions of the I/O locations
The Arduino board exposes most of the microcontroller's I/O pins for use by
other circuits. The Diecimila, Duemilanove, and current Uno provide 14 digital I/O pins,
six of which can produce pulse-width modulated signals, and six analog inputs, which
can also be used as six digital I/O pins. These pins are on the top of the board, via
female 0.1-inch (2.54 mm) headers. Several plug-in application shields are also
commercially available. The Arduino Nano, and Arduino-compatible Bare Bones
Board and Boarduino boards may provide male header pins on the underside of the
board that can plug into solderless breadboards.
The Mega 2560 board can be programmed with the Arduino Software (IDE).
For details, see the reference and tutorials.
The ATmega2560 on the Mega 2560 comes preprogrammed with a boot loader
that allows you to upload new code to it without the use of an external hardware
programmer. It communicates using the original STK500 protocol (reference, C
header files).
You can also bypass the boot loader and program the microcontroller through
the ICSP (In-Circuit Serial Programming) header using Arduino ISP or similar; see
these instructions for details.
15
Fig 4.3 Ultrasonic sensor code
The ATmega16U2 (or 8U2 in the rev1 and rev2 boards) firmware source code is
available in the Arduino repository. The ATmega16U2/8U2 is loaded with a DFU boot
loader, which can be activated by:
On Rev1 boards: connecting the solder jumper on the back of the board
(near the map of Italy) and then resetting the 8U2.
POWER: The Mega 2560 can be powered via the USB connection or with an
external power supply. The power source is selected automatically.
External (non-USB) power can come either from an AC-to-DC adapter (wallwart) or
battery. The adapter can be connected by plugging a 2.1mm centerpositive plug into
the board's power jack. Leads from a battery can be inserted in the GND and Vin pin
headers of the POWER connector.
16
become unstable. If using more than 12V, the voltage regulator may overheat and
damage the board. The recommended range is 7 to 12 volts.
Vin. The input voltage to the board when it's using an external power
source (as opposed to 5 volts from the USB connection or other
regulated power source). You can supply voltage through this pin, or,
if supplying voltage via the power jack, access it through this pin.
5V. This pin outputs a regulated 5V from the regulator on the board.
The board can be supplied with power either from the DC power jack
(7 - 12V), the USB connector (5V), or the VIN pin of the board (712V).
Supplying voltage via the 5V or 3.3V pins bypasses the regulator, and
can damage your board. We don't advise it.
IOREF. This pin on the board provides the voltage reference with
which the microcontroller operates. A properly configured shield can
read the IOREF pin voltage and select the appropriate power source
or enable voltage translators on the outputs for working with the 5V or
3.3V.
MEMORY: The ATmega2560 has 256 KB of flash memory for storing code (of
which 8 KB is used for the bootloader), 8 KB of SRAM and 4 KB of EEPROM
(which can be read and written with the EEPROM library).
17
Fig 4.4: Arduino Mega 2560 PIN diagram
Above is the pin mapping for the Atmega2560. The chip used in Arduino 2560. There
are pin mappings to Atmega8 and Atmega 168/328 as well.
9 PE7 ( CLKO/ICP3/INT7 )
10 VCC VCC
11 GND GND
12 PH0 ( RXD2 ) Digital pin 17 (RX2)
13 PH1 ( TXD2 ) Digital pin 16 (TX2)
18
14 PH2 ( XCK2 )
28 PG3 ( TOSC2 )
29 PG4 ( TOSC1 )
30 RESET RESET
31 VCC VCC
32 GND GND
33 XTAL2 XTAL2
34 XTAL1 XTAL1
35 PL0 ( ICP4 ) Digital pin 49
19
44 PD1 ( SDA/INT1 ) Digital pin 20 (SDA)
45 PD2 ( RXDI/INT2 ) Digital pin 19 (RX1)
46 PD3 ( TXD1/INT3 ) Digital pin 18 (TX1)
47 PD4 ( ICP1 )
48 PD5 ( XCK1 )
49 PD6 ( T1 )
66 PJ3 ( PCINT12 )
67 PJ4 ( PCINT13 )
68 PJ5 ( PCINT14 )
69 PJ6 ( PCINT 15 )
20
74 PA4 ( AD4 ) Digital pin 26
75 PA3 ( AD3 ) Digital pin 25
76 PA2 ( AD2 ) Digital pin 24
77 PA1 ( AD1 ) Digital pin 23
78 PA0 ( AD0 ) Digital pin 22
79 PJ7
80 VCC VCC
81 GND GND
82 PK7 ( ADC15/PCINT23 ) Analog pin 15
83 PK6 ( ADC14/PCINT22 ) Analog pin 14
84 PK5 ( ADC13/PCINT21 ) Analog pin 13
85 PK4 ( ADC12/PCINT20 ) Analog pin 12
86 PK3 ( ADC11/PCINT19 ) Analog pin 11
87 PK2 ( ADC10/PCINT18 ) Analog pin 10
88 PK1 ( ADC9/PCINT17 ) Analog pin 9
89 PK0 ( ADC8/PCINT16 ) Analog pin 8
90 PF7 ( ADC7 ) Analog pin 7
91 PF6 ( ADC6 ) Analog pin 6
92 PF5 ( ADC5/TMS ) Analog pin 5
93 PF4 ( ADC4/TMK ) Analog pin 4
94 PF3 ( ADC3 ) Analog pin 3
95 PF2 ( ADC2 ) Analog pin 2
96 PF1 ( ADC1 ) Analog pin 1
97 PF0 ( ADC0 ) Analog pin 0
98 AREF Analog Reference
99 GND GND
100 AVCC VCC
Each of the 54 digital pins on the Mega can be used as an input or output,
using pinMode(), digitalWrite(), and digitalRead() functions. They operate at 5 volts.
Each pin can provide or receive 20 mA as recommended operating condition and has
21
an internal pull-up resistor (disconnected by default) of 20-50 k ohm. A maximum of
40mA is the value that must not be exceeded to avoid permanent damage to the
microcontroller.
Serial: 0 (RX) and 1 (TX); Serial 1: 19 (RX) and 18 (TX); Serial 2: 17 (RX)
and 16 (TX); Serial 3: 15 (RX) and 14 (TX). Used to receive (RX) and
transmit (TX) TTL serial data. Pins 0 and 1 are also connected to the
corresponding pins of the ATmega16U2 USB-to-TTL Serial chip.
LED: 13. There is a built-in LED connected to digital pin 13. When the pin
is HIGH value, the LED is on, when the pin is LOW, it's off.
TWI: 20 (SDA) and 21 (SCL). Support TWI communication using the Wire
library. Note that these pins are not in the same location as the TWI pins
on the old Duemilanove or Diecimila Arduino boards.
The Mega 2560 has 16 analog inputs, each of which provide 10 bits of resolution (i.e.
1024 different values). By default they measure from ground to 5 volts, though is it
possible to change the upper end of their range using the AREF pin and analog
Reference() function.
22
There are a couple of other pins on the board:
Reset. Bring this line LOW to reset the microcontroller. Typically used to
add a reset button to shields which block the one on the board.
ATmega8U2/ATmega16U2 chip and USB connection to the computer (but not for
serial communication on pins 0 and 1.
The Mega 2560 also supports TWI and SPI communication. The Arduino
Software (IDE) includes a Wire library to simplify use of the TWI bus; see the
documentation for details. For SPI communication, use the SPI library.
(taken low), the reset line drops long enough to reset the chip. The Arduino Software
(IDE) uses this capability to allow you to upload code by simply pressing the upload
23
button in the Arduino environment. This means that the bootloader can have a shorter
timeout, as the lowering of DTR can be wellcoordinated with the start of the upload.
This setup has other implications. When the Mega 2560 board is connected to
either a computer running Mac OS X or Linux, it resets each time a connection is
made to it from software (via USB). For the following half-second or so, the bootloader
is running on the ATMega2560. While it is programmed to ignore malformed data (i.e.
anything besides an upload of new code), it will intercept the first few bytes of data
sent to the board after a connection is opened. If a sketch running on the board
receives one-time configuration or other data when it first starts, make sure that the
software with which it communicates waits a second after opening the connection and
before sending this data.
The Mega 2560 board contains a trace that can be cut to disable the auto-
reset. The pads on either side of the trace can be soldered together to re-enable it.
It's labeled "RESET-EN". You may also be able to disable the auto-reset by
connecting a 110 ohm resistor from 5V to the reset line; see this forum thread for
details.
REVISIONS: The Mega 2560 does not use the FTDI USB-to-serial driver chip
used in past designs. Instead, it features the ATmega16U2 (ATmega8U2 in the
revision 1 and revision 2 Arduino boards) programmed as a USB-to-serial
converter. Revision 2 of the Mega 2560 board has a resistor pulling the 8U2 HWB
line to ground, making it easier to put into DFU mode.
Revision 3 of the Arduino board and the current Genuino Mega 2560 have the
following improved features:
1.0 pinout: SDA and SCL pins - near to the AREF pin - and two other
new pins placed near to the RESET pin, the IOREF that allow the shields
to adapt to the voltage provided from the board. In future, shields will be
compatible both with the board that use the AVR, which operate with 5V
and with the board that uses ATSAM3X8E, that operate with 3.3V. The
second one is a not connected pin that is reserved for future purposes.
24
Atmega 16U2 replace the 8U2.
APPLICATIONS:
The power supply section is the important one. It should deliver constant output
regulated power supply for successful working of the project. A 0-12V/1 mA
transformer is used for this purpose. The primary of this transformer is connected in
to main supply through on/off switch& fuse for protecting from overload and short
circuit protection. The secondary is connected to the diodes to convert 12V AC to 12V
25
DC voltage. And filtered by the capacitors, which is further regulated to +5v, by using
IC 7805.
4.1.2 GSM
A GSM modem is a wireless modem that works with a GSM wireless
The AT commands are given to the GSM modem with the help of PC or
controller. The GSM modem is serially interfaced with the controller with the help of
MAX 232. Here max 232 acts as driver which converts TTL levels to the RS 232 levels.
For serial interface GSM modem requires the signal based on RS 232 levels. The
T1_OUT and R1_IN pin of MAX 232 is connected to the TX and RX pin of GSM
modem
26
850/EGSM 900/DCS 1800/PCS 1900 module, ready for integration in various
kinds of Fix wireless phones and other wireless devices.
27
The operating frequencies are:
28
The power supply is one of the key issues in the designing GSM terminals.
Due to the 577us radio burst emission in GSM every 4.615ms, power supply must
be able to deliver high current peaks in a short time. During these peaks, ripples
and drops on the supply voltage must not exceed a certain limit.
2mVPP for
freq>200KHZ
(*): This value has to be guaranteed during the burst (with 2.0A Peak in GSM or GPRS
mode).
When supplying the module with a battery, the total impedance (battery + protections
+ PCBS) should be less than 150mOhms.
29
Table 4.7 : Power consumption in EGSM 900MHZ
VCC OUTPUT : This output can be used to power some external functions, such
as LCD.
30
Table 4.8 : VCC Electrical Characteristics
SPI INTERFACE : The SPI bus includes a CLK signal, an IO signal, a RS signal
and a CS signal complying with the standard SPI bus. These pins can also be
used as GPIO.
31
No external pull-up resistors are needed when the internal pull-up at the input pads
are enabled.
General Description: The SIM interface is compatible with the ISO 7816-3 IC
card standard required by the GSM 11.11 Phase 2+ standard. The module also
supports Release 99 of the SIM Toolkit recommendation and supports a Fixed
Dialling Number directory.
27 O SIM Clock
21 O SIM Reset
VL (V) 0.6/0.8
VH (V) -
32
Fig 4.9: SIM connection (no power control)
Figure 3 shows system design for 3.0V and 1.8V SIM card interface. The SIM
level shift is built in the SC6600D chip.
Note:
2) SIM_RST, SIM_DATA, SIM_CLK lines also need add 27pF capacitor for each
line.
AUDIO
33
16 EAR_SPKN AO Earphone Differential Negative Output
Their frequency response curve should be within the mask given by GSM
specification.
The gain of MIC inputs is internally adjusted and can be turned from 9dB to 42dB.
Conditions/Comment
Parameter s Min. Typ. Units
34
Typical Speaker Outputs Characteristics: The gain of speaker outputs is
internally adjusted and can be turned from -21dB to 12dB.
Typical Microphone Connection: Two MIC inputs already include the biasing for
an electret microphone allowing easy connection to the headset.
35
Fig 4.10: MIC input (differential input)
Single-ended Connection
When using a single-ended connection, be sure to have a very good ground plane,
a very good filtering as well as shielding in order to avoid any disturbance on the
audio path.
C1=22pF to 47pF
L1= 100nH
36
Typical Speaker Connection :
An RFID reader is a device that is used to interrogate an RFID tag. The reader
has an antenna that emits radio waves; the tag responds by sending back its data.
A passive tag is an RFID tag that does not contain a battery; the power is
supplied by the reader. When radio waves from the reader are encountered by a
passive rfid tag, the coiled antenna within the tag forms a magnetic field. The tag
draws power from it, energizing the circuits in the tag. The tag then sends the
information encoded in the tag's memory.
37
Fig 4.12: RFID reader Fig4.13: RFID card
Typical application
E-Payment
• E-Toll Road Pricing
• E-Ticketing for Events
• E-Ticketing for Public Transport
• Access Control
• PC Access
• Authentication
• Printer / Production Equipment
38
Fig 4.14: Application circuit
4.1.5 KEYPAD
At the lowest level, keyboards are organized in a matrix of rows and columns. The
CPU accesses both rows and column through ports; therefore, with two 8-bit ports,
an 8*8 matrix of keys can be connected to a microprocessor. When a key pressed,
a row and column make a connect otherwise, there is no connection between row
and column. In IBM PC keyboards, a single microcontroller (consisting of
microprocessor, RAM and EPROM, and several ports all on a single chip) takes care
of software and hardware interfacing of keyboard. In such systems it is the function
of programs
39
Fig 4.15: Keypad
stored in the EPROM of microcontroller to scan the keys continuously, identify which
one has been activated, and present it to the motherboard.
Figure shows a 4*4 matrix connected to two ports. The rows are connected to
an output port and the columns are connected to an input port. If no key has been
pressed, reading the input port will yield 1s for all columns since they are all
connected to high (Vcc) If all the rows are grounded and a key is pressed, one of the
columns will have 0 since the key pressed provides the path to ground. It is the
function of the microcontroller to scan the keyboard continuously to detect and
identify the key pressed.
To detect a pressed key, the microcontroller grounds all rows by providing 0 to the
output latch, and then it reads the columns. If the data read from the columns is
D3D0=1111, no key has been pressed and the process continues until a key press is
detected. However, if one of the column bits has a zero, this means that a key press
has occurred. For example, if D3-D0=1101, this means that a key in the D1 column
has been pressed. After a key press is detected, the microcontroller will go through
the process of identifying the key. Starting with the top row, the microcontroller
grounds it by providing a low to row D0 only; then it reads the columns. If the data
40
read is all1s, no key in that row is activated and the process is moved to the next row.
It grounds the next row, reads the columns, and checks for any zero. This process
continues until the row is identified. After identification of the row in which the key has
been pressed, the next task is to find out which column the pressed key belongs to.
This should be easy since the microcontroller knows at any time which row and
column are being accessed.
In the program, it is assumed that P1 and P2 are initialized as output and input,
respectively. Program13.1 goes through the following four major stages:
1. To make sure that the preceding key has been released, 0s are output to all
rows at once, and the columns are read and checked repeatedly until all the
columns are high. When all columns are found to be high, the program waits for a
short amount of time before it goes to the next stage of waiting for a key to be
pressed.
2. To see if any key is pressed, the columns are scanned over and over in an
infinite loop until one of them has a 0 on it. Remember that the output latches
connected to rows still have their initial zeros (provided in stage 1), making them
grounded. After the key press detection, it waits 20ms for the bounce and then
scans the columns again. This serves two functions: (a) it ensures that the first key
press detection was not an erroneous one due to spike noise, and(b) the 20ms
delay prevents the same key press from being interpreted as a multiple key press.
If after the 20-ms delay the key is still pressed, it goes to the next stage to detect
which row it belongs to; otherwise, it goes back into the loop to detect a real key
press.
3. To detect which row the key press belongs to, it grounds one row at a time,
reading the columns each time. If it finds that all columns are high, this means that
the key press cannot belong to that row; therefore, it grounds the next row and
continues until it finds the row the key press belongs to. Upon finding the row that
the key press belongs to, it sets up the starting address for the look-up table holding
the scan codes (or the ASCII value) for that row and goes to the next stage to
identify the key.
4. To identify the key press, it rotates the column bits, one bit at a time, into the
carry flag and checks to see if it is low. Upon finding the zero, it pulls out the ASCII
41
code for that key from the look-up table; Otherwise, it increments the pointer to point
to the next element of the look-up table.
While the key press detection is standard for all keyboards, the process for
determining which key is pressed varies. The look-up table method shown in program
can be modified to work with any matrix up to 8*8.
4.1.6 LCD
A 16x2 LCD means it can display 16 characters per line and there are 2 such
lines. In this LCD each character is displayed in 5x7 pixel matrix. This LCD has two
registers, namely, Command and Data. The command register stores the command
instructions given to the LCD. A command is an instruction given to LCD to do a
predefined task like initializing it, clearing its screen, setting the cursor position,
controlling display etc. The data register stores the data to be displayed on the LCD.
The data is the ASCII value of the character to be displayed on the LCD. Click to
learn more about internal structure of a LCD.
42
used in projects. The 16×2 translates to a display 16 characters per line in 2 such
lines. In this LCD each character is displayed in a 5×7 pixel matrix.
4 Selects command register when low, and data register when high RS
(Register
Select )
5 Low to write to the register; High to read from the register Read/writ
e
6 Sends data to data pins when a high to low pulse is given; Extra Enable
voltage push is required to execute the instruction and EN(enable)
signal is used for this purpose. Usually, we make it en=0 and when
we want to execute the instruction we make it high en=1 for some
milliseconds. After this we again make it ground that is, en=0.
43
10 DB3
11 DB4
12 DB5
13 DB6
14 DB7
15 Backlight VCC (5V) Led+
16 Backlight Ground (0V) Led-
RS (REGISTER SELECT) : A 16X2 LCD has two registers, namely, command and
data. The register select is used to switch from one register to other. RS=0 for
command register, whereas RS=1 for data register.
DATA REGISTER : The data register stores the data to be displayed on the LCD.
The data is the ASCII value of the character to be displayed on the LCD. When we
send data to LCD it goes to the data register and is processed there. When RS=1,
data register is selected.
44
Fig 4.17: Data register
45
simple commands to the LCD. Character addresses and printing commands are
below.
In the table above you can see starting addresses for each character with their
printing commands. The first character is generated at address 0x40 to 0x47 and is
printed on LCD by just sending simple command 0 to the LCD. The second character
is generated at address 0x48 to 0x55 and is printed by sending 1 to LCD.
R305 is a finger print sensor module with TTL UART interface. The user can
store the finger print data in the module and can configure it in 1:1 or 1: N mode for
identifying the person. The FP module can directly interface with 3v Microcontroller.
A level converter (like MAX232) is required for interfacing with PC.
The R305 fingerprint module has two interface TTL UART and USB2.0,
USB2.0 interface can be connected to the computer; RS232 interface is a TTL level,
the default baud rate is 57600 , can be changed, refer to a communication protocol ;
can And microcontroller, such as ARM, DSP and other serial devices with a
46
connection, 3.3V 5V microcontroller can be connected directly. Needs to connect the
computer level conversion, level conversion note, embodiments such as a MAX232
circuit.
4.1.7.2 Features
47
Working environment: Temperature: -20 ℃ - +40 ℃ Relative
humidity:
40% RH-85% RH (no condensation).
Package Includes:-
Exterior View
48
5 Touch OUT Finger detection signal ( maximum output current:
50mA)
Hardware connection : Via serial interface, the Module may communicate with
MCU of 3.3V or 5V power: TXD (pin 3 of P1) connects with RXD (receiving pin of
MCU), RXD (pin 4 of P1) connects with TXD (transferring pin of MCU). Should the
upper computer (PC) be in RS-232 mode, please add level converting circuit, like
MAX232, between the Module and PC.
7 5V In Power Input
Serial Communication
The mode is semi duplex asychronism serial communication. And the default
baud rate is 57600bps. User may set the baud rate in 9600 ~ 115200bps 。
Transferring frame format is 10 bit: the low-level starting bit, 8-bit data with the LSB
first, and an ending bit. There is no check bit.
Reset time
49
At power on, it takes about 200ms for initialization. During this period, the
Module can’t accept commands for upper computer. To address demands of different
customer, Module system provides abundant resources at user’s use.
Buffer
There are an image buffer and two 512-byte-character-file buffer within the
RAM space of the module. Users can read & write any of the buffers by instructions.
Note: Contents of the above buffers will be lost at Power-off.
Image buffer
Image Buffer serves for image storage and the image format is 256*288
pixels, form is BMP. When transferring through UART, to quicken speed, only the
upper 4 bits of the pixel is transferred (that is 16 grey degrees). And two adjacent
pixels of the same row will form a byte before the transferring. When uploaded to PC,
the 16-grey-degree image will be extended to 256-grey-degree format. That’s 8-bit
BMP format. When transferring through USB, the image is 8-bit pixel, that’s 256 grey
degrees.
Fingerprint Library
System sets aside a certain space within Flash for fingerprint template storage,
that’s fingerprint library. Contents of the library remain at power off. Capacity of the
library changes with the capacity of Flash, system will recognize the latter
automatically. Fingerprint template’s storage in Flash is in sequential order. Assume
the fingerprint capacity N, then the serial number of template in library is 0, 1, 2, 3 …
N. User can only access library by template number.
Note: Commands shall only be sent from upper computer to the Module, and the
Module acknowledges the commands.
50
Upon receipt of commands, Module will report the commands execution status
and results to upper computer through acknowledge packet. Acknowledge packet
has parameters and may also have following data packet. Upper computer can’t
ascertain Module’s package receiving status or command execution results unless
through acknowledge packet sent from Module. Acknowledge packet includes 1 byte
confirmation code and maybe also the returned parameter.
51
1Dh: fail to operate the communication port; others: system reserved;
41h: No finger on sensor when add fingerprint on second time.
42h: fail to enroll the finger for second fingerprint add.
43h: fail to generate character file due to lackness of character point or oversmallness
of fingerprint image for second fingerprint add
44h: fail to generate character file due to the over-disorderly fingerprint image for
second fingerprint add; 45h: Duplicate fingerprint.
Applications:
4.1.8 BUZZER
52
1 Positive Identified by (+) symbol or longer terminal lead. Can be
powered by 6V DC
• Rated Voltage: 6V DC
• Operating Voltage: 4-8V DC
• Rated current: <30mA
• Sound Type: Continuous Beep
• Resonant Frequency: ~2300 Hz
• Small and neat sealed package
• Breadboard and Perf board friendly
Equivalents for Passive Buzzer: Piezo Electric buzzer, Speaker, Active Passive
Buzzer with Module
There are two types are buzzers that are commonly available. The one shown
here is a simple buzzer which when powered will make a Continuous Beeeeeeppp....
sound, the other type is called a readymade buzzer which will look bulkier than this
and will produce a Beep. Beep. Beep. Sound due to the internal oscillating circuit
present inside it. But, the one shown here is most widely used because it can be
customised with help of other circuits to fit easily in our application.
53
This buzzer can be used by simply powering it using a DC power supply
ranging from 4V to 9V. A simple 9V battery can also be used, but it is recommended
to use a regulated +5V or +6V DC supply. The buzzer is normally associated with a
switching circuit to turn ON or turn OFF the buzzer at required time and require
interval.
Applications of Buzzer
A servo motor is a type of motor that can rotate with great precision. Normally
this type of motor consists of a control circuit that provides feedback on the current
position of the motor shaft, this feedback allows the servo motors to rotate with great
precision. If you want to rotate an object at some specific angles or distance, then you
use a servo motor. It is just made up of a simple motor which runs through a servo
mechanism. If motor is powered by a DC power supply then it is called DC servo
motor, and if it is AC-powered motor then it is called AC servo motor. For this tutorial,
we will be discussing only about the DC servo motor working. Apart from these
major classifications, there are many other types of servo motors based on the type
of gear arrangement and operating characteristics. A servo motor usually comes with
a gear arrangement that allows us to get a very high torque servo motor in small and
lightweight packages. Due to these features, they are being used in many applications
like toy car, RC helicopters and planes,
Robotics, etc.
Servo motors are rated in kg/cm (kilogram per centimeter) most hobby servo
motors are rated at 3kg/cm or 6kg/cm or 12kg/cm. This kg/cm tells you how much
weight your servo motor can lift at a particular distance. For example: A 6kg/cm Servo
motor should be able to lift 6kg if the load is suspended 1cm away from the motors
shaft, the greater the distance the lesser the weight carrying capacity. The position
54
of a servo motor is decided by electrical pulse and its circuitry is placed beside the
motor.
Servomotors are not a specific class of motor although the term servomotor is
often used to refer to a motor suitable for use in a closed-loop control system. The
motor is paired with some type of encoder to provide position and speed feedback.
In the simplest case, only the position is measured. The measured position of the
output is compared to the command position, the external input to the controller.
If the output position differs from that required, an error signal is generated
which then causes the motor to rotate in either direction, as needed to bring the
output shaft to the appropriate position. As the positions approach, the error signal
reduces to zero and the motor stops.
APPLICATIONS
Conveyors
Solar Tracking System
Antenna Positioning
Camera Auto Focus
It is used to measure the speed of the output shaft.
55
Servo Motor Working Mechanism
It consists of three parts:
Controlled device
Output sensor
Feedback system
Here reference input signal is compared to the reference output signal and the
third signal is produced by the feedback system. And this third signal acts as an input
signal to the control the device. This signal is present as long as the feedback signal
is generated or there is a difference between the reference input signal and reference
output signal. So the main task of servomechanism is to maintain the output of a
system at the desired value at presence of noises.
56
INTERFACING SERVO MOTORS WITH MICROCONTROLLERS:
Interfacing hobby Servo motors like s90 servo motor with MCU is very easy.
Servos have three wires coming out of them. Out of which two will be used for
Supply (positive and negative) and one will be used for the signal that is to be sent
from the MCU. An MG995 Metal Gear Servo Motor which is most commonly used
for RC cars humanoid bots etc. The picture of MG995 is shown below:
All servo motors work directly with your +5V supply rails but we have to be
careful on the amount of current the motor would consume if you are planning to use
more than two servo motors a proper servo shield should be designed.
The color coding of your servo motor might differ hence check for your respective
datasheet.
All motors have three wires coming out of them. Out of which two will be used
for Supply (positive and negative) and one will be used for the signal that is to be
sent from the MCU. Servo motor is controlled by PWM (Pulse with Modulation) which
is provided by the control wires. There is a minimum pulse, a maximum pulse and a
repetition rate. Servo motor can turn 90 degree from either direction form its neutral
57
position. The servo motor expects to see a pulse every 20 milliseconds (ms) and the
length of the pulse will determine how far the motor turns. For example, a 1.5ms pulse
will make the motor turn to the 90° position, such as if pulse is shorter than 1.5ms
shaft moves to 0° and if it is longer than 1.5ms than it will turn the servo to 180°.
Servo motor works on PWM (Pulse width modulation) principle, means its
angle of rotation is controlled by the duration of applied pulse to its Control PIN.
Basically servo motor is made up of DC motor which is controlled by a variable
resistor (potentiometer) and some gears. High speed force of DC motor is
converted into torque by Gears. We know that WORK= FORCE X DISTANCE, in DC
motor Force is less and distance (speed) is high and in Servo, force is High and
distance is less. The potentiometer is connected to the output shaft of the Servo, to
calculate the angle and stop the DC motor on the required angle.
Servo motor can be rotated from 0 to 180 degrees, but it can go up to 210
degrees, depending on the manufacturing. This degree of rotation can be controlled
by applying the Electrical Pulse of proper width, to its Control pin. Servo checks the
pulse in every 20 milliseconds. The pulse of 1 ms (1 millisecond) width can rotate the
servo to 0 degrees, 1.5ms can rotate to 90 degrees (neutral position) and 2 ms pulse
can rotate it to 180 degree.
All servo motors work directly with your +5V supply rails but we have to be
careful about the amount of current the motor would consume if you are planning to
use more than two servo motors a proper servo shield should be designed.
4.2.1 EMBEDDED C
Embedded C is most popular programming language in software field for
developing electronic gadgets. Each processor used in electronic system is
associated with embedded software.
58
phone, washing machine, digital camera, etc. These all device working is based on
microcontroller that are programmed by embedded C.
The Embedded C code written in above block diagram is used for blinking the LED
connected with Port0 of microcontroller.
Easy to understand
High Reliability
Portability
Scalability
Basic Declaration
59
The extension in C language is known as embedded C programming
language. As compared to above the embedded programming in C is also have some
additional features like data types, keywords and header file etc is represented by
#include<microcontroller name.h>.
60
It is an arrangement in which all the unit combined to perform a work together
by following certain set of rules in real time computation. It can also be defined as a
way of working, organizing or doing one or many tasks according to a fixed plan.
61
Embedded system generally used for do specific task that provide
realtime output on the basis of various characteristics of an embedded
system. Embedded system may contain a smaller part within a larger
device that used for serving the more specific application to perform
variety of task using hardware-software intermixing configuration.
It provides high reliability and real-time computation ability.
Advantages:
Disadvantages:
Let's see the block diagram shows the basic structure of an embedded system.
Sensor: Sensor used for sensing the change in environment condition and
it generate the electric signal on the basis of change in environment
62
condition. Therefore it is also called as transducers for providing electric
input signal on the basis of change in environment condition.
A-D Converter: An analog-to-digital converter is a device that converts
analog electric input signal into its equivalent digital signal for further
processing in an embedded system.
Processor & ASICs: Processor used for processing the signal and data
to execute desired set of instructions with high-speed of operation.
Application specific integrated circuit (ASIC) is an integrated circuit
designed to perform task specific operation inside an embedded system.
D-A Converter: A digital-to-analog converter is a device that converts
digital electric input signal into its equivalent analog signal for further
processing in an embedded system.
Actuators: Actuators is a comparator used for comparing the analog input
signal level to desired output signal level for providing the error free output
from the system.
Designing steps required for embedded system are different from the design
process of another electronic system.
63
Preprocessing
Cross-Compiler:
Decompiler:
A tool used for translating a program from a low-level language to high-level
language is called a decompiler. It is used for conversion of assembly or machine
code to high-level programming language.
Assembler:
Let's see the different debugging tools used in embedded system are:
Simulators:
Functions of simulators:
64
It monitors the detailed information of a source code and symbolic
arguments as the execution goes for each single step of operation.
It simulates the ports of target system for each single step of execution.
It provides the working status of RAM.
It monitors the response of system and determines the throughput.
It provides the complete meaning of the present command.
It monitors the detailed information of the simulator commands entered
from the keyboard or selected from the menu.
It facilitates synchronization of internal peripherals and delays.
operating system.
65
PERIPHERAL DEVICES IN EMBEDDED SYSTEMS:
In addition to above, the following points need to be kept in mind while selecting
a microcontroller:-
66
Count of I/O pins: The number of input and output devices connected
with the system plays an essential role in choosing the type of
microcontroller. Cost per unit: It is important in terms of final cost
of the product in which the microcontroller is to be used.
Power consumption: Power consumption plays an important role for
maintaining the efficiency of an embedded system
Additional commands are found within the five menus: File, Edit, Sketch,
Tools, and help. The menus are context sensitive, which means only those items
relevant to the work currently being carried out are available.
67
CHAPTER 5
RESULT AND DISCUSSION
5.1 OUTPUT
CONNECTIONS:
The below figure shows the Arduino Mega, RFID tag, RFID reader, GSM module,
16x2 LCD display, servo motor, keypad, buzzer and finger print sensor which was
shown as a complete connection of the hardware components.
STEP:1 REGISTER
68
fifig 5.2: Using RFID Tag
The RFID Card instead of our ATM card to start our Registration process.
Here, the Biometric method using fingerprint sensor to access our RDID Card.
69
Fig 5.4: Registration of fingerprint
Once, our fingerprint is registered then we can easily access all our multiple
accounts using our fingerprint without the hectic of having multiple card and multiple
ATM pins.
The registed mobile number to our respected fingerprint and RDIF card using
“REG”.
70
Fig 5.7: Keypad
By using keypad here we are going to press ”6” in order to access “PH” process
to register our mobile number.
71
Fig 5.9: Mobile Number Access
By registering our mobile number we can access our mobile number to the
respected fingerprint to get otp(One Time Password).
72
Fig 5.12: received otp
Thus received our otp to access our bank account to the resigtered Mobile Number.
73
Fig 5.14: verification of otp
By entering the one time password we can access all our accounts that we want to
use in our future now we can do all our transcation process using our smart ATM.
STEP:3 DEPOSIT
PROCESS OF DEPOSIT
74
Fig 5.16: biometric process
By pressing “(1) DEP” using our keypad, we can start our process of Depositing
to our bank account.
75
Fig 5.19: selecting SBI bank(1)
By pressing “(1) SBI” in our keypad, we can deposit money in our SBI account.
STEP:4 WITHDRAWAL
Select “(2) WID” to start the process of width drawl in Smart ATM.
76
Fig 5.20: Select the Bank
Select “(1) SBI” to width drawl money from the selected bank account.
Enter the Amount which you want to width drawl from the bank account.
Now the Withdrawal amount and Balance is visible in LCD Screen and also all
these activities are sent as message to the registered mobile number.
77
STEP :5 CHECK THE BALANCE
Select “(4) BAL” from the keypad to check the balance from the registered and
deposited bank accounts.
Select ”(1) SBI” using keypad to check the balance from the bank using the
Smart ATM.
Now our bank Balance is visible in LED Screen for our convenance.
STEP 6: UNAUTHORIZED
78
Fig 5.25: Place Finger
79
Fig 5.28: Un authorized
The LED Screen will display “UN AUTHORIZED” and the buzzer sound will be
audible to everyone to catch the un authorized user.
From the above figure we can notice that all our Transactions, Registrations, Width
drawl, Checking balances, Addition of bank and Removal of bank accounts will be
sent as a message to the registered mobile number from the respected bank for the
safety of the user.
80
CHAPTER: 6
6.1 CONCLUSION:
6.2 ADVANTAGES
81
6.3 APPLICATIONS
82
REFERENCES
[1] Ahmad, A.W., Jan, N., Iqbal, S. and Lee, C. (2011) Implementation of ZigBee—
GSM Based Home Security Monitoring and Remote Control System. IEEE 54th
International Midwest Symposium on Circuits and Systems, Seoul, 7-10 August
2011, 1-4.
[2] Archana et al., “Enhance the Security in the ATM System with Multimodal
Biometrics and Two-Tier Security”, International Journal of Advanced Research in
Computer Science and Software Engineering 3(10), pp. 261-266, October – 2013.
[3] Biswas S., Bardhan Roy A., Ghosh K. And Dey N.,”A Biometric Authentication
Based Secured ATM Banking System”, International Journal of Advanced
Research in Computer Science and Software Engineering, Volume 2, Issue 4,
April 2012
[4] El-Medany, W.M. and El-Sabry, M.R. (2008) GSM-Based Remote Sensing and
Control System using FPGA. Proceedings of International Conference on
Computer and Communication Engineering, Kuala Lumpur, 13-15 May 2008,
1093-1097.
[5] Golzar, M.G. and Tajozzakerin, H.R. (2010) A New Intelligent Remote Control
System for Home Automation and Reduce Energy Consumption. 4th Asia
International Conference on Mathematical/Analytical Modelling and Computer
Simulation, Kota Kinabalu, 26-28.
[6] "Gsmd – Openmoko". Wiki.openmoko.org. 8 February 2010. Retrieved 22 April
2010.
[7] "GSM UMTS 3GPP Numbering Cross Reference". ETSI. Retrieved 30 December
2009.
[8] G. Vidhya Krishnan, R.Nagarajan, T. Durka, M.Kalaiselvi, M.Pushpa and S.
Shanmugapriya, "Vehicle Communication System Using Li-Fi Technology,"
International Journal of Engineering And Computer Journal of Engineering
Sciences Vol 8, Issue 2, 2017
[9] J.Chandra mohan, R.Nagarajan, K. Satheesh kumar, N.Ajith kumar,
P.A.Gopinath and S.Ranjithkumar, "Intelligent Smart Home Automation and
Security System Using Arduino and Wi-fi,"
83
[10] Karki, James (September 2000). "Signal Conditioning Piezoelectric Sensors"
(PDF). Texas Instruments. Retrieved 2007-12-02.
[11] Kim, Bo-Ra, “Domestic ATM status and meanings”, Payment and Settlement,
and IT, Vol. 44, pp. 76, 2011.
[12] Ms. C. Hemalatha, Mr. R. Nagarajan, P. Suresh, G. Ganesh Shankar and A.
Vijay, “Brushless DC Motor Controlled by using Internet of Things,” IJSTE -
International Journal of Science Technology & Engineering, Volume -3.Issue-09,
pp. 373-377, March- 2017.
[13] Rana, G.M.S.M., Khan, A.A.M., Hoque, M.N. and Mitul, A.F. (2016) Design and
Implementation of a GSM Based Remote Home Security and Appliance Control
System. Proceedings of the 2nd International Conference on Advancesin
Electrical Engineering, Dhaka, 19-21 December 2016, 291-295.
[14] S.Suresh, R.Nagarajan, L.Sakthivel, V.Logesh, C.Mohandass and
G.Tamilselvan, “Transmission Line Fault Monitoring and Identification System by
Using Internet of Things,” International Journal of Advanced Engineering
Research and Science (IJAERS), Vol4.Issue-4, pp. 9-14, Apr- 2017.
[15] Sakr, Sharif. "ARM co-founder John Biggs". Engadget. Retrieved December 23,
2011. "[...] the ARM7- TDMI was licensed by Texas Instruments and designed into
the Nokia 6110, which was the first ARM powered GSM phone."
[16] S.T. Bho sale and Dr. B.S.Sawant “Security in E-Banking via Card Less Biometric
ATMs”, International Journal of Advanced Technology & Engineering Research,
Volume 2, Issue 4, July 2012
[17] Sunil Lohiya “Biometric identification and verification techniques -A future of ATM
Banking System”, Indian Streams Research Journal, Volume 2, Issue. 7, Aug 2012
[18] Yuksekkaya, B., Kayalar, A.A., Tosun, M.B., Ozcan, M.K. and Alkar, A.Z. (2006)
A GSM, Internet and Speech Controlled Wireless Interactive Home Automation
System. IEEE Transactions on Consumer Electronics, 52, 837.
84
85