0% found this document useful (0 votes)
12 views79 pages

Project Report

The project report details the design of an electronic voting machine that utilizes biometric fingerprint and RFID technology for voter identification, eliminating the need for physical ID cards. The system sends a text message to the voter's registered mobile number for verification, allowing only authorized individuals to cast their votes while displaying warnings for unauthorized attempts. The report includes sections on embedded systems, implementation details, and the advantages and applications of the proposed voting system.

Uploaded by

Shalini Shalu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views79 pages

Project Report

The project report details the design of an electronic voting machine that utilizes biometric fingerprint and RFID technology for voter identification, eliminating the need for physical ID cards. The system sends a text message to the voter's registered mobile number for verification, allowing only authorized individuals to cast their votes while displaying warnings for unauthorized attempts. The report includes sections on embedded systems, implementation details, and the advantages and applications of the proposed voting system.

Uploaded by

Shalini Shalu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 79

ENHANCEMENT OF ELECTRONIC BALLET BOX TOWARDS

BALLOTER IDENTIFICATION

A PROJECT REPORT

Submitted by

ARUN G 963318105013
ELANGO S 963318105019
PRATHEEP M K 963318105036
MUTHUVEL INDHIRAN G 963318105029

in partial fulfilment for the award of the degree


of

BACHELOR OF ENGINEERING

IN

ELECTRIAL AND ELECTRONICS ENGINEERING

ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY

PALKULAM, KANYAKUMARI

ANNA UNIVERSITY : CHENNAI 600 025

JUNE 2022
i
ANNA UNIVERSITY: CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report “ENHANCEMENT OF ELECTRONIC


BALLET BOX TOWARDS BALLOTER IDENTIFICATION” is the
bonafide work of ARUN G (963318105013), ELANGO S (963318105019),
PRATHEEP M K (963318105036), MUTHUVEL INDHIRAN G (963318105029)
who carried out the project work under my supervision.

SIGNATURE SIGNATURE
Mr. P JEYAKUMAR .M.E, Mr.R PADMA KUMAR M.E.,
HEAD OF THE DEPARTMENT SUPERVISOR
Department of EEE, Assistant Professor,
Rohini College of Engineering and Department of EEE,
Technology, Palkulam. Rohini College of Engineering and
Technology, Palkulam.

Submitted for the Viva Voce held on

INTERNAL EXAMINER EXTERNAL EXAMINER

ii
ACKNOWLEDGMENT

I acknowledge with great gratitude to all those who helped us to make this
project a great success. At the very outset, I express my thanks to the Almighty
God who has blessed with a healthy situation and bestowed upon me the required
skill pursues this High tech course.

I am grateful to Shri K. NEELA MARTHANDAN, our beloved chairman


and Dr N. NEELA VISHNU, Managing Director for providing me all the
facilities to complete my project.

We are happy to express our heartful thanks and gratitude to our beloved
Principal, Dr. R. RAJESH M.E., Ph.D., For his encouragement and motivation
insuccessfully completing this project.

I like to express my sincere thanks to Mr. P JEYAKUMAR .M.E., Head of


the Department, Department of Electrical and Electronics Engineering for his
encouragement and guidance while developing my project.

I wish to express my sincere and my gratitude to supervisor Mr.R PADMA


KUMAR M.E., Assistant professor Department of Electrical and Electronics
Engineering for his unfailing support and guidance during the entire course of my
project.

I am very much thankful to our department staff members for their


suggestions and also extending good guidance to complete the project successfully.

I am extremely thankful to my parents and friends who were the back one of
my success in aspects of the project work.

iii
TABLE OF CONTENTS
TITLE PAGE NO
ABSTRACT 1
CHAPTER-1
INTRODUCTION
1.1 INTRODUCTION TO EMBEDDED SYSTEM 2
1.2 APPLICATIONS OF EMBEDDED SYSTEMS 10
1.3 COMPONENTS USED 12
CHAPTER-2
LITERATURE SURVEY 14
CHAPTER-3
IMPLEMENTATION DETAILS
3.1 ARDUINO NANO 15
3.2 REGULATED POWER SUPPLY 21
3.2.1TRANSFORMER 22
3.2.2RECTIFIER 23
3.2.3FILTER 26
3.2.4 REGULATOR 28
3.3 FINGER PRINT MODULE 29
3.4 RFID 31
3.5 SWITCH (PUSH BUTTON) 54
4.6 LCD DISPLAY 55
CHAPTER-4
EXCECUTION DETAILS 64
CHAPTER 5
RESULT 68
CHAPTER-6
ADVANTAGES & DISADVANTAGES 70
CHAPTER-7
APPLICATIONS 71
CHAPTER-8
CONCLUSION 73
CHAPTER-9
REFERENCES 74

iv
LIST OF FIGURES
FIG NAME PAGE NO

FIG 1.1:NETWORK COMMUNICATION EMBEDDED SYSTEMS 10


FIG1.6: BLOCK DIAGRAM OF FINGER PRINT BASED
VOTING SYSTEM 11
FIG 3.1:BLOCK DIAGRAM OF POWER SUPPLY 21
FIG 3.2: TRANSFORMER 22
FIG 3.3:HALFWAVE RECTIFIER 24
FIG 3.4:BRIDGE FULLWAVE RECTIFIER 25
FIG 3.5:CENTERTAPPED FULLWAVE RECTIFER 26
FIG 3.6: A THREE TERMINAL VOLTAGE REGULATOR 28
FIG 3.8: PANIC BUTTON 54
FIG 5.2: HARDWARE VIEW 69

v
ABSTRACT

Biometric Finger print devices are used in the Electronic Voting machine

for voter verification. We have designed a finger print, RFID and GSM based

voting machine where there is no need for the user to carry his ID which

contains his required details. The person at the polling booth needs only to

place his Finger on the device which generate and send text message to

corresponding registered mobile number, thus allowing the acquisition of an

on-spot fingerprint from the voter which serves as an identification. Also this

system consists of RFID reader reads the details from the tag. This data is

passed onto the controlling unit for the verification by sending text message to

the registered mobile number through GSM. The controller fetches the data

from the reader and compares this data with the already existing data stored

during the registration of the voters and also get proper acceptance through

GSM from the voter mobile. If the data matches with the pre-stored

information of the registered fingerprint, the person is allowed to cast his vote.

If not, a warning message is displayed on LCD and the person is barred from

polling his vote. The vote casting mechanism is carried out manually using the

push buttons. LCD is used to display the related messages, warnings and

ensuing results.

1
CHAPTER - 1

INRODUCTION

1.1 INTRODUCTION TO EMBEDDED SYSTEM:

1.1.1 EMBEDDED SYSTEM:

We are living in the Embedded World. You are surrounded with many

embedded products and your daily life largely depends on the proper

functioning of these gadgets. Television, Radio, CD player of your living room,

Washing Machine or Microwave Oven in your kitchen, Card readers, Access

Controllers, Palm devices of your work space enable you to do many of your

tasks very effectively. Apart from all these, many controllers embedded in your

car take care of car operations between the bumpers and most of the times you

tend to ignore all these controllers.

In recent days, you are showered with variety of information about these

embedded controllers in many places. All kinds of magazines and journals

regularly dish out details about latest technologies, new devices; fast

applications which make you believe that your basic survival is controlled by

these embedded products. Now you can agree to the fact that these embedded

products have successfully invaded into our world. You must be wondering

about these embedded controllers or systems. The computer you use to

2
compose your mails, or create a document or analyze the database is known as

the standard desktop computer. These desktop computers are manufactured to

serve many purposes and applications.

You need to install the relevant software to get the required processing

facility. So, these desktop computers can do many things. In contrast,

embedded controllers carryout a specific work for which they are designed.

Most of the time, engineers design these embedded controllers with a specific

goal in mind. So these controllers cannot be used in any other place.

Theoretically, an embedded controller is a combination of a piece of

microprocessor based hardware and the suitable software to undertake a

specific task.

These days designers have many choices in

microprocessors/microcontrollers. Especially, in 8 bit and 32 bit, the available

variety really may overwhelm even an experienced designer. Selecting a right

microprocessor may turn out as a most difficult first step and it is getting

complicated as new devices continue to pop-up very often. In the 8 bit segment,

the most popular and used architecture is Intel's 8031. Market acceptance of

this particular family has driven many semiconductor manufacturers to develop

3
something new based on this particular architecture. Even after 25 years of

existence, semiconductor manufacturers still come out with some kind of

device using this 8031 core.

Microcontrollers for Embedded Systems:

In the Literature discussing microprocessors, we often see the term

Embedded System. Microprocessors and Microcontrollers are widely used in

embedded system products. An embedded system product uses a

microprocessor (or Microcontroller) to do one task only. A printer is an

example of embedded system since the processor inside it performs one task

only; namely getting the data and printing it. Contrast this with a Pentium based

PC. A PC can be used for any number of applications such as word processor,

print-server, bank teller terminal, Video game, network server, or Internet

terminal. Software for a variety of applications can be loaded and run. of course

the reason a pc can perform myriad tasks is that it has RAM memory and an

operating system that loads the application software into RAM memory and

lets the CPU run it.

In an Embedded system, there is only one application software that is

typically burned into ROM. An x86 PC contains or is connected to various

4
embedded products such as keyboard, printer, modem, disk controller, sound

card, CD-ROM drives, mouse, and so on. Each one of these peripherals has a

Microcontroller inside it that performs only one task. For example, inside every

mouse there is a Microcontroller to perform the task of finding the mouse

position and sending it to the PC. Table 1-1 lists some embedded products.

PC contains or is connected to various embedded products such as

keyboard, printer, modem, disk controller, sound card, CD-ROM drives,

mouse, and so on. Each one of these peripherals has a Microcontroller inside it

that performs only one task. For example, inside every mouse there is a

Microcontroller to perform the task of finding the mouse position and sending

it to the PC. Table 1-1 lists some embedded products

1.1.2 NEED FOR EMBEDDED SYSTEM:

Embedded systems are designed to do some specific task, rather than be

a general-purpose computer for multiple tasks. Some also have real time

performance constraints that must be met, for reason such as safety and

usability; others may have low or no performance requirements, allowing the

system hardware to be simplified to reduce costs.

5
Wireless communication has become an important feature for

commercial products and a popular research topic within the last ten years.

There are now more mobile phone subscriptions than wired-line subscriptions.

Lately, one area of commercial interest has been low-cost, low-power, and

short-distance wireless communication used for \personal wireless networks."

Technology advancements are providing smaller and more cost effective

devices for integrating computational processing, wireless communication, and

a host of other functionalities. These embedded communications devices will

be integrated into applications ranging from homeland security to industry

automation and monitoring. They will also enable custom tailored engineering

solutions, creating a revolutionary way of disseminating and processing

information. With new technologies and devices come new business activities,

and the need for employees in these technological areas. Engineers who have

knowledge of embedded systems and wireless communications will be in high

demand.

Features of embedded systems:

6
1. This system can do a specific task and cannot be programmed to do

different Operated things

2. The software that is used in the embedded system is fixed

(i.e., like in computers multi software’s are used at a time)

3. The power consumption for the embedded system is very low

4. Embedded systems have very limited resources.

Nearly 99% of the processors are manufactured using embedded systems.

1.1.3 CATEGORIES OF EMBEDDED SYSTEMS:

Based on performance, functionality, requirement the embedded systems

are divided into three categories:

Stand Alone Embedded systems:

These systems takes the input in the form of electrical signals from

transducers or commands from human beings such as pressing of a button etc..,

process them and produces desired output. This entire process of taking input,

processing it and giving output is done in stand alone mode. Such embedded

systems comes under stand alone embedded systems

eg: microwave oven, air conditioner etc.

Real-time embedded systems:

7
Embedded systems which are used to perform a specific task or

operation in a specific time period those systems are called as real-time

embedded systems.

There are two types of real-time embedded systems:

(i) Hard Real-time embedded systems:

These embedded systems follow an absolute dead line time period i.e..,

if the tasking is not done in a particular time period then there is a cause of

damage to the entire equipment

eg: consider a system in which we have to open a valve within 30 milliseconds.

If this valve is not opened in 30 ms this may cause damage to the entire

equipment. So in such cases we use embedded systems for doing automatic

operations.

(ii) Soft Real Time embedded systems:

These embedded systems follow a relative dead line time period i.e.., if

the task is not done in a particular time that will not cause damage to the

equipment.

eg: Consider a TV remote control system ,if the remote control takes a few

milliseconds delay it will not cause damage either to the TV or to the remote

control. These systems which will not cause damage whenthey are not operated

8
at considerable time period those systems comes under soft real-time embedded

systems.

Network communication embedded systems:

A wide range network interfacing communication is provided by using

embedded systems. eg:

a) consider a web camera that is connected to the computer with internet

can be used to spread communication like sending pictures, images,

videos etc.., to another computer with internet connection throughout

anywhere in the world.

b) Consider a web camera that is connected at the door lock.

Whenever a person comes near the door, it captures the image of a

person and sends to the desktop of your computer which is connected to

internet. This gives an alerting message with image on to the desktop of

your computer, and then you can open the door lock just by clicking the

mouse.

9
Fig 1.1: Network communication embedded systems

1.2 APPLICATIONS OF EMBEDDED SYSTEMS:

Consumer applications:

At home we use a number of embedded systems which include

microwave oven, remote control, vcd players, dvd players, camera etc.

Almost every medical equipment in hospitals are embedded systems

eg.. , like EEG, ECG, scanners, endoscopes, X-Ray etc..,,

10
1.3 BLOCK DIAGRAM:
RPS
LCD

FINGER PRINT SENSOR


PARTY1 (SWITCH)

RFID READER
ARDUINO NANO
PARTY2 (SWITCH)

ENROLLING

TOTAL (SWITCH)

IDENTIFING
GSM

Fig.1.6: block diagram of finger print based voting System

11
1.3.1 COMPONENTS USED:

HARDWARE COMPONENTS:

1.MICRO CONTROLLER (ARDUINO NANO)

2.RPS

3.FINGER PRINT SENSOR

4.RFID READER

5.LCD

6.RFID TAGS

7.SWITCHES

SOFTWARE COMPONENTS:

1.ARDUINO IDE

2.PROTEAUS

3.Programming Language: C,C++

PLATFORM:

1.Windows 7,8,10.

12
CHAPTER-2

FINGER PRINT BASED VOTING SYSTEM

INTRODUCTION

Biometrics is the science and technology of measuring and analyzing

biological data. Biometrics refers to technologies that measure and analyze

human body characteristics, such as DNA, fingerprints, eye retinas and irises,

voice patterns, facial patterns and hand measurements, for authentication

purposes. The field of biometrics was formed and has since expanded on to

many types of physical identification. Among the several human fingerprints

remain a very common identifier and the biometric method of choice among

law enforcement. These concepts of human identification have lead to the

development of fingerprint scanners that serve to quickly identify individuals

and assign access privileges. The basic point of these devices is also to examine

the fingerprint data of an individual and compare it to a database of other

fingerprints.

In our project we have used fingerprint for the purpose of voter

identification or authentication. As the thumb impression of every individual is

unique, it helps in minimizing the error. A database is created containing the

fingerprint images of all the voters as required. Illegal votes and repetition of

13
votes is checked for in this system with accurate coding. Hence with the

application of this fingerprint based EVM system elections could be made fair

and free from rigging. Further that the elections would are no longer a tedious

and expensive job.

LITERATURE SURVEY

The Election Commission of India developed the country's EVMs in

partnership with two government-owned companies, the Electronics

Corporation of India (ECIL) and Bharat Electronics Limited (BEL). Though

these companies are owned by the Indian government, they are not under the

administrative control of the Election Commission. They are profit-seeking

vendors that are attempting to market EVMs globally . The first Indian EVMs

were developed in the early 1980s by ECIL. They were used in certain parts of

the country, but were never adopted nationwide. They introduced the style of

system used to this day, including the separate control and ballot units and the

layout of both components. These first-generation EVMs were based on

Hitachi 6305 microcontrollers and used firmware stored in external UVerasable

PROMs along with 64kb EEPROMs for storing votes. Second-generation

models were introduced in 2000 by both ECIL and BEL. These machines

moved the firmware into the CPU and upgraded other components.

14
CHAPTER-3

IMPLEMENTATION DETAILS

3.1 ARDUINO NANO

The Arduino Nano is a pin equivalent and evolved version of

the Arduino nano board. It comes with an even more powerful

processor ATmega4809 (20Mhz) and a larger ram capacity of 6 KB (3 times).

Arduino Nano Every Pinout is explained in detail in this post.

Arduino nano every board also features a micro-USB port instead of a

mini-B port, unlike the previous Nano board. It has 20 digital I/o pins, 8 analog

inputs, and a RESET button. Arduino Nano every pinout, specifications,

schematic, and datasheet is given below.

15
Atmega4809 Microchip:

It is an 8-bit AVR processor developed by Atmel that can run up to

20MHz. It comes with 6KB of SRAM, 48KB of flash, and 256 bytes of

EEPROM. The chip features the latest technologies like flexible and efficient-

power architecture, including Event System and Sleepwalking, precious analog

features, and advanced peripherals.

Micro USB port:

The Nano every comes with a micro-USB port, unlike the previous

Arduino Nano board that comes with the mini-USB-B port. The port can be

used to power up the board as well as to connect the board to the computer for

flashing the code.

16
RESET button:

The board comes with a RESET button that can be used to reset the

board and begin the execution of the program from the beginning.

Power LED: The board comes with a power Led that lit up as soon as the

board is connected to a computer.

Inbuilt LED (13): An Inbuilt LED is present on the board that is connected to

pin no 13. This Led can be controlled by switching the pin HIGH or LOW.

RX and TX LED: On the board, there are two more LEDs connected to the

UART pin 17(RX) and 30(TX) respectively.

As shown in the above Arduino Nano Every pinout image, the board consists of

30 pins in total, 20 of which are digital I/O pins. Out of these five are PWM

enabled, with 8 analog input pins.

Power pins on Arduino Nano Every Pinout:

Vin: It is the input voltage pin that powers up the Arduino board. When a

certain voltage is given via the USB port to power the board, this voltage also

shows up at the Vin pin.

3v3: The 3.3V pin generates an output voltage of 3.3v.

5v: The 5V pin generates regulated 5v output for the externally connected

components. The power source of the 5V pin for the Arduino Nano Every

board is a USB connector and the Vin.

17
GND: Two ground pins are available on Arduino Nano Every board.

Digital Pins:

1.There are 20 digital I/O pins on the Arduino Nano Every board that can be

used as an input or output. They operate at 5 volts.

2.The Arduino Nano Every digital pin can read one of the two states: when

the electric signal is present and when it is absent. This type of input is

usually known as digital type (or binary) and these states are referred to as

HIGH which is 1 or LOW which is 0.

PWM Pins:

1.The five pins from the set of digital pins are PWM (Pulse Width

Modulation) pins which are numbered as 3, 5, 6, 9,and10.

2.Each PWM pin provides 8-bit PWM output.

3.To generate the PWM output, syntax “analogwrite(PWM Pin, PWM

value)” is used. PWM output value varies between 0 (0 volts) and 255 (5

volts).

Analog Pins:

1.The Arduino Nano Every consists of 8 analog inputs, labeled as AX

(where X is pin no.). All of these pins can also be utilized as digital I/O

pins.

18
2.Each one of the analog pins is connected to an inbuilt ADC of 210-bit (i.e.,

1024 different values) resolution.

I2C pins:

I2C is the two-wire serial communication protocol. The I2C protocol stands

for Inter-Integrated Circuits. The protocol uses two pins for sending and

receiving clock data as well as serial data: a serial clock (SCL) pin and a serial

data (SDA) pin.

1.SCL-It stands for Serial Clock. It is used for sending the clock data between

the devices. It is also used for synchronization purposes; this pin is provided by

the master device.

2.SDA-It stands for Serial Data. This pin is operated by both the slave and

master device. The purpose of this pin is to send and receive the data. That’s

why it is also called a data line, while SCL is known as a clock line.

External Interrupts:

Unlike the Arduino Nano board, the external interrupts are allowed on

all pins, not just pin D2 and D3.

SPI pins:

1.It stands for Serial Peripheral Interface.

2.This serial communication protocol is used to send the serial data between

the microcontroller and one or more peripheral devices efficiently.

19
3.The board consist of 4 SPI pins:

4.SCK (Serial Clock) D13

5.SS (Slave Select) D8

6.MOSI (Master Out Slave In) D11

7.MISO (Master In Slave Out) D12

UART pins:

UART pins are used for serial communication. 0 (RX) to receive the

data, and 1 (TX) to transmit (TX) TTL serial data using the ATmega4809

advanced hardware serial capabilities.

Specifications:

1. Microcontroller: Microchip ATmega328P

2. Operating Voltage: 5 Volts

3. Input Voltage: 6 to 20 Volts

4. Digital I/O Pins: 14 (plus 6 can PWM output pins)

5. Analog Input Pins: 8

6. DC Current per I/O Pin: 40 mA

7. DC Current for 3.3V Pin: 50 mA

8. Flash Memory: 32 KB of which 0.5 KB used by bootloader

9. SRAM: 2 KB

10. EEPROM: 1 KB

20
11. Clock Speed: 16 MHz

12. Length: 45 mm

13. Width: 18 mm

14. Weight: 7 g

3.2 REGULATED POWER SUPPLY:

The power supplies are designed to convert high voltage AC mains

electricity to a suitable low voltage supply for electronic circuits and other

devices. A RPS (Regulated Power Supply) is the Power Supply with

Rectification, Filtering and Regulation being done on the AC mains to get a

Regulated power supply for Microcontroller and for the other devices being

interfaced to it.

A power supply can by broken down into a series of blocks, each of

which performs a particular function. A d.c power supply which maintains the

output voltage constant irrespective ofa.c mains fluctuations or load variations

is known as “Regulated D.C Power Supply”

For example a 5V regulated power supply system as shown below:

Fig 3.1: Block diagram of power supply


21
3.2.1 Transformer:

A transformer is an electrical device which is used to convert

electrical power from one Electrical circuit to another without change in

frequency.

Transformers convert AC electricity from one voltage to another with

little loss of power. Transformers work only with AC and this is one of the

reasons why mains electricity is AC. Step-up transformers increase in output

voltage, step-down transformers decrease in output voltage. Most power

supplies use a step-down transformer to reduce the dangerously high mains

voltage to a safer low voltage. The input coil is called the primary and the

output coil is called the secondary.

There is no electrical connection between the two coils; instead they

are linked by an alternating magnetic field created in the soft-iron core of the

transformer. The two lines in the middle of the circuit symbol represent the

core. Transformers waste very little power so the power out is (almost) equal to

the power in. Note that as voltage is stepped down current is stepped up. The

ratio of the number of turns on each coil, called the turn’s ratio, determines the

ratio of the voltages. A step-down transformer has a large number of turns on

its primary coil which is connected to the high voltage mains supply, and a

small number of turns on its secondary coil to give a low output voltage.

22
Fig 3.2: Transformer

An Electrical Transformer Turns ratio = Vp / VS = Np/Ns

Power Out= Power InVS X IS=VP XIP

Vp = Primary (input) voltage

Np = Number of truns on primary coil

Ip = primary (input) current

3.2.2 Rectifier:

A circuit which is used to convert ac to dc is known as RECTIFIER.

The process of conversion ac to dc is called “rectification”

Types of rectifier:

1. Half wave Rectifier

2. Full wave rectifier

a. Bridge type full wave rectifier.

b. Centre tap full wave rectifier.

23
Half-wave rectifier:

In half wave rectifier, either the positive or negative half of the AC wave

is passed, while the other half is blocked. Because only one half of the input

waveform reaches the output, it is very inefficient if used for power transfer.

Half-wave rectification can be achieved with a single diode in a one-phase

supply, or with three diodes in a three-phase supply.

Fig 3.3: Half wave rectifier

Full wave rectifier:

Full wave rectifier is available in two ways like center-tapped full-wave

rectifier and bridge full-wave rectifier.

1. Bridge type full wave rectifier:

The Bridge rectifier is a circuit, which converts an ac voltage to dc

voltage using both half cycles of the input ac voltage. The Bridge rectifier

circuit is shown in the figure. The circuit has four diodes connected to form a

bridge. The ac input voltage is applied to the diagonally opposite ends of the

bridge. The load resistance is connected between the other two ends of the

bridge.

24
For the positive half cycle of the input ac voltage, diodes D1 and D3

conduct, whereas diodes D2 and D4 remain in the OFF state. The conducting

diodes will be in series with the load resistance RL and hence the load current

flows through RL. For the negative half cycle of the input ac voltage, diodes D2

and D4 conduct whereas, D1 and D3 remain OFF.

The conducting diodes D2 and D4 will be in series with the load

resistance RL and hence the current flows through RL in the same direction as in

the previous half cycle. Thus a bi-directional wave is converted into a

unidirectional wave.

Fig 3.4 : bridge type full-wave rectifier

2. Center Tapped Full wave rectifier:

For single-phase AC, if the transformer is center-tapped, then two diodes

back-to-back (i.e. anodes-to-anode or cathode-to-cathode) can form a full-wave

rectifier. Twice as many windings are required on the transformer secondary to

obtain the same output voltage compared to the bridge rectifier above.

For the positive half cycle of the input ac voltage, diodes D1 will

conducts, whereas diodes D2 is in the OFF state. The conducting diodes D1

25
will be in series with the load resistance RL and hence the load current flows

through RL.

For the negative half cycle of the input ac voltage, diodes D2 will

conduct, whereas diodes D1 is in the OFF state. The conducting diodes D2 will

be in series with the load resistance RL and hence the load current flows

through RL.

Fig 3.5: Center tapped Full-wave rectifier

3.2.3 Filter:

A Filter is a device which removes the a.c component of rectifier

output but allows the dc component to reach the load

Capacitor Filter:

We have seen that the ripple content in the rectified output of half

wave rectifier is 121%or that of full-wave or bridge rectifier or bridge rectifier

is 48% such high percentages of ripples is not acceptable for most of the

applications. Ripples can be removed by one of the following methods of

filtering.

26
(a) A capacitor, in parallel to the load, provides an easier by –pass for the

ripples voltage though it due to low impedance. At ripple frequency and leave

the D.C. to appear at the load.

(b) An inductor, in series with the load, prevents the passage of the ripple

current (due to high impedance at ripple frequency) while allowing the d.c (due

to low resistance to d.c)

(c)Various combinations of capacitor and inductor, such as L-section filter

section filter, multiple section filter etc. which make use of both the properties

mentioned in (a) and (b) above. Two cases of capacitor filter, one applied on

half wave rectifier and another with full wave rectifier.

Filtering is performed by a large value electrolytic capacitor connected

across the DC supply to act as a reservoir, supplying current to the output when

the varying DC voltage from the rectifier is falling. The capacitor charges

quickly near the peak of the varying DC, and then discharges as it supplies

current to the output. Filtering significantly increases the average DC voltage to

almost the peak value (1.4 × RMS value).

To calculate the value of capacitor(C),

C = ¼*√3*f*r*Rl

Where, f = supply frequency,

r = ripple factor,

27
Rl = load resistance

Note: In our circuit we are using 1000µF hence large value of capacitor is

placed to reduce ripples and to improve the DC component.

3.2.4 Regulator:

Voltage regulator ICs is available with fixed (typically 5, 12 and 15V)

or variable output voltages. The maximum current they can pass also rates

them. Negative voltage regulators are available, mainly for use in dual supplies.

Most regulators include some automatic protection from excessive current

('overload protection') and overheating ('thermal protection'). Many of the

fixed voltage regulators ICs have 3 leads and look like power transistors, such

as the 7805 +5V 1A regulator shown on the right.

The LM7805 is simple to use. You simply connect the positive lead of

your unregulated DC power supply (anything from 9VDC to 24VDC) to the

Input pin, connect the negative lead to the Common pin and then when you turn

on the power, you get a 5 volt supply from the output pin.

Fig 3.6: A Three Terminal Voltage Regulator

28
78XX:

The Bay Linear LM78XX is integrated linear positive regulator with

three terminals. The LM78XX offer several fixed output voltages making them

useful in wide range of applications.

When used as a Zener diode/resistor combination replacement, the

LM78XX usually results in an effective output impedance improvement of two

orders of magnitude, lower quiescent current. The LM78XX is available in the

TO-252, TO-220 & TO-263packages,

Features:

1. Output Current of 1.5A

2. Output Voltage Tolerance of 5%

3. Internal thermal overload protection

4. Internal Short-Circuit Limited

5. Output Voltage 5.0V, 6V, 8V, 9V, 10V, 12V, 15V, 18V, 24V.

3.3 FINGER PRINT MODULE

The Fingerprint is one of the safest way to detect and identify the Authorized

person, We know that fingerprint is unique even identical twins do not have

identical fingerprints. By using this we can make pretty sure about security

needs. To add fingerprint verification in microcontroller projects we can use

29
this all in one optical fingerprint sensor-scanner (R305), It makes fingerprint

detection and verification super simple.

By using this sensor we can make Bio-metric authentication and access control

based Electronic projects easily.

This optical fingerprint reader devices uses high powered DSP chip

AS601 form Synochip, that does the image rendering, calculation, feature

finding and searching. It provides TTL serial out hence we can connect to any

microcontroller or system. The DSP processor has on board FLASH memory

which can store 120 finger prints. Thanks to the Adafruit here we

have Fingerprint library so that connect this sensor to Arduino as well.

Fingerprint sensor Arduino Hookup

The fingerprint identification process has two steps that is

1. Enrolling Fingerprint,

2. Matching Fingerprint.

30
These two steps makes microcontroller / System to authenticate right

fingerprint.

Connect the white wire from the sensor to Arduino D0 pin and green wire to

Arduino D1 pin. Put red & black in (+5V & GND) respectively. After the

wiring over upload the following sketch to Arduino board.

3.4 RFID:

RFID is an acronym for Radio Frequency Identification. RFID (radio

frequency identification) is a technology that incorporates the use of

electromagnetic or electrostatic coupling in the radio frequency (RF) portion of

the electromagnetic spectrum to uniquely identify an object, animal, or person.

RFID is coming into increasing use in industry as an alternative to the bar code.

The advantage of RFID is that it does not require direct contact or line-of-sight

scanning.
31
An RFID system consists of three components: an antenna and

transceiver (often combined into one reader) and a transponder (the tag). The

antenna uses radio frequency waves to transmit a signal that activates the

transponder. When activated, the tag transmits data back to the antenna. The

data is used to notify a programmable logic controller that an action should

occur. The action could be as simple as raising an access gate or as complicated

as interfacing with a database to carry out a monetary transaction.

Low-frequency RFID systems (30 KHz to 500 KHz) have short

transmission ranges (generally less than six feet). High-frequency RFID

systems (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) offer longer

transmission ranges (more than 90 feet). In general RFID is the higher the

frequency, the more expensive the system. RFID is sometimes called dedicated

“short range communication (DSRC).”

Radio Frequency Identification (RFID) is a means of identifying a

person or object using a radio frequency transmission. The technology can be

used to identify, track, sort or detect a wide variety of objects.

Communication takes place between a reader (interrogator) and a transponder

(tag). Tags can either be active (powered by battery) or passive (powered by the

reader field), and come in various forms. Some variants of tags and readers are

shown RFID Tag and RFID Reader respectively. The communication

32
frequencies used depends to a large extent on the application, and range from

125 kHz to 2.45 GHz.

Basic concept:

The easiest way to understand RFID is to think of signal mirrors. For

centuries we’ve known how to communicate messages with just a mirror by

flashing the sun’s reflection in the direction of the recipient. The flashes are

sequenced to represent a code known by the recipient.

The basic theory underlying RFID technology has been understood since

the 1930s. Early on it was discovered that the introduction of a conductive

material into an electric or magnetic field could alter the field’s characteristics.

That occurs because the conductive material both absorbs and reflects the

energy in the field. If the field is a radio frequency, or RF, the conductive

material is capable of imparting a reflection of the source field radiation.

Most organizations today require a performing and efficient access

control system. There are many reasons for having such a system and these

include:

1) Enhanced security to limit access to restricted areas.

2) Tracking employee activity

3) Improve loss prevention

33
RFID technology is quickly becoming a popular choice since the

advancement in technology makes a variety of solutions available to any

organization.

There are major deficiencies in the legacy solutions that use the

traditional access control systems. Barcodes, magnetic stripes, and proximity

readers all rely on the user to either make contact or place the badge very close

to the reader. In addition, bar codes can only be read one at a time and the

respective embedded information cannot be updated. Such limitations can be

cumbersome and time consuming.

An RFID access control system can provide an easy and efficient

solution. RFID badges can be read from much further distances than other

traditional technologies and the embedded electronic information for each

badge can be over-written repeatedly. The increased reading distance thus

enables other tracking technologies like surveillance cameras to be activated in

conjunction with an employee being in their vicinity. Furthermore, multiple

RFID badges can be read all at the same time. Information about employee

access, attendance, and duties performed, can be easily and efficiently

monitored and stored in a database. Access information can also be tied to a

Windows Active Directory or LDAP for user authentication and therefore be

synchronized to an authorized access scheme.

34
Working of RFID:

In a typical RFID system, tags are attached to objects. Each tag has a

certain amount of internal memory (EEPROM) in which it stores information

about the object, such as unique ID (serial) number, or in some cases more

details including manufacture date and product composition. When these tags

pass through a field generated by a reader, they transmit this information back

to the reader, thereby identifying the object.

The communication process between the reader and tag is

managed and controlled by one of several protocols, such as the ISO 15693 and

ISO 18000-3 for HF or the ISO 18000-6, and EPC for UHF. Basically what

happens is that when the reader is switched on, it starts emitting a signal at the

selected frequency band (typically 860 – 915 MHz for UHF or 13.56 MHz for
35
HF). Any corresponding tag in the vicinity of the reader will detect the signal

and use the energy from it to wake up and supply operating power to its

internal circuits. Once the tag has decoded the signal as valid, it replies to the

reader, and indicates its presence by modulating the reader field.

Advantages of RFID:

RFID has distinct advantages over the barcode. Which are given below.

1. Human intervention is required to scan a barcode, whereas in most

applications an RFID tag can be detected ʺhands off.ʺ

2. Barcodes must be visible on the outside of product packaging. RFID tags

can be placed inside the packaging or even in the product itself.

3. You must have ʺline of sightʺ to read a barcode. RFID tagged items can

be read even if they are behind other items. The readability of barcodes

can be impaired by dirt, moisture, abrasion, or packaging contours. RFID

tags are not affected by those conditions.

4. RFID tags have a longer read range than barcodes.

5. RFID tags have read/write memory capability; barcodes do not.

6. More data can be stored in an RFID tag than can be stored on a barcode.

It is also that RFID data, once acquired, is easily managed by legacy

software infrastructures implemented for the purpose of barcode inventory

control and supply chain management. IT migration from barcode to RFID is

36
virtually seamless. It is even possible to simultaneously manage RFID data and

barcode data on the same platform applications.

RFID technology takes advantage of that characteristic by

manipulating the sequence and rate at which that reflection occurs, called

modulation. RFID tags are designed to deliberately reflect the source RF in

sequences that are interpreted as information in the form of digital data.

Radio Waves:

Light, X‐rays, and radio waves are all electromagnetic waves. The only

difference between them is the frequency at which the wave oscillates between

positive and negative polarity. The number of waves that occur in one second is

37
known as the frequency, and is measured in Hertz. One Hertz is one wave

oscillation per second.

RFID systems operate at a number of specified frequency bands. A

frequency band is a range of frequencies that are close to a nominal center

frequency. For example, the 915 MHz frequency band includes all the

frequencies starting from 902MHz to 928MHz, which are subdivided into 50

communication channels. Some common RFID frequency bands are 125 KHz

(125,000 Hertz), 13.56 MHz, 868 MHz (in Europe), 915 MHz, and 2.45 GHz

(2.45 billion Hertz). Each band has its own performance trade‐offs. This

tutorial focuses on 915 MHz (that’s 915 Mega Hertz or 915 million oscillations

per second), but the principles are basically the same for other RFID

frequencies.

38
The channel frequency (e.g. 915 MHz) over which an RFID system

communicates data is called a carrier wave, so called because it is used to carry

data RFID tag antennae are tuned to resonate only to the specified band of

carrier frequencies that are centered on the designated RFID system frequency.

Within that range of frequencies the RFID tag is able to absorb and reflect

energy back to the source.

The carrier wave by itself is not data, but is used to carry the data to and

from the RFID tags. In order to carry data the carrier wave must be modulated.

39
Modulation:

Data are communicated on an RF carrier wave via a process called

modulation. In this process a stream of data pulses (ʺ1ʺs and ʺ0ʺs) are added to

(mixed with) the carrier wave.

The data stream has a clock frequency that is much slower than the

carrier wave frequency. For a 915 MHz system the data clock rate is 62.5 KHz,

that is one clock pulse every 16 microseconds. The data clock will serve to

synchronize the RFID tag with the RFID interrogator. There will be a data

pulse every 16 microseconds.

Data pulses that are 2 microseconds wide will be interpreted as data bit

ʺ0ʺs and pulses 6 microseconds wide will be interpreted as data bit ʺ1ʺs to make

the data stream.

40
There are two types of modulation: Amplitude Modulation (AM) and

Frequency Modulation (FM). Amplitude modulation works by using the data

stream to vary the signal strength of the carrier wave.

915 MHz Carrier Wave

Data Stream

Amplitude Modulation

41
The frequency modulation (FM) method keeps signal strength constant

and instead works by varying slightly the frequency of the carrier wave.

Adding the data stream to the carrier wave would look like this

915 MHz Carrier Wave + Data Stream = Frequency Modulation

RFID Tags:

In its basic form, an RFID tag consists of a silicon integrated circuit (an

“IC Chip”) connected to a small antenna.

There are two general categories of RFID tags, passive tags and active

tags. The most common of these is a “passive” tag (shown above), so‐called

because it has no internal battery power. Instead, passive tags are powered by

energy drawn from the RF carrier wave transmitted by the interrogator.

42
The modulated carrier wave transmitted by the interrogator is sensed by

the Antenna. The carrier wave induces a small alternating current (AC) in the

Antenna. Inside the IC Chip a Power Rectifier and Regulator converts the

AC to stable DC and uses it to power the IC chip, which immediately “wakes

up”. The Clock Extractor separates the clock pulses from the carrier wave and

uses the pulses to synchronize the Logic, Memory, and Modulator sections of

the tag’s IC chip with the Interrogator.

The Logic section separates the 1’s and 0’s from the carrier wave and

compares the data stream with its internal program to determine what response,

if any, is required. If the Logic section decides that the data stream is valid, it

accesses the Memory section for the chip’s unique identification data and any

user data that have been stored there. The Logic section encodes those data

using the Clock Extractor pulses. The encoded data stream is input into the

Modulator section. The Modulator mixes the data stream with the carrier

wave by electrically adjusting the reflectivity of the antenna at the data stream

rate, similar to the way one might adjust the angle of a signal mirror to reflect
43
the sun’s light. Electrically adjusting the antenna characteristics to reflect RF is

referred to as backscatter.

RFID Tag Data Format:

Printed barcode labels generally conform to the Universal Product Code

standard (UPC) of product identification. RFID tags used to identify products

in the supply chain serve the same purpose, so it’s often expeditious to explain

RFID tags simply as ʺelectronic barcodes.ʺ Both RFID tags and barcode labels

digitally convey information about objects. Currently, ʺClass 1+ʺ RFID tags are

available with a digital memory of 96 bits, each bit being either logic 1 or a

logic 0. Because alphanumeric characters (i.e., A‐to‐Z and 0‐9) each require 8

bits of memory, it’s possible to store 12 characters in an RFID tag (which isn’t

saying much). On the other hand those 96 bits represent a possible

79,228,162,514,264,300,000,000,000,000 (that’s over 79.2 trillion) unique

numerical identities. Or you could split the 96 bits into fields that each

represents some characteristic of the object, creating a sort of family tree of

objects.

There are two basic tag data architectures. One is to include all

information about a product (e.g., its size, date of manufactures, the quality

inspector’s name) on the tag itself. This has the advantage of decentralizing the

data, but has a drawback in that the increased memory requirements on the tag

44
increase its complexity and cost. The other way is for the tag to serve as a

“license plate” for the object, which can be associated with a database of its

characteristics located in a centralized database.

The header serves as a way of identifying the format of the sequence of bits

that follow in the EPC. This makes system coding more flexible. That is a

critical innovation because it allows for the use of various independent

standards of identification to be understood by users of other formats.

Antennas:

The choice of interrogator antenna is influenced by the intended

application. Antennas each have unique characteristics that benefit specific

uses. The primary characteristics are:

1. polarization

2. beam width (directionality)

3. gain

4. dimensions (form factor)

Antenna polarization refers to the orientation of the carrier wave as it

travels through space. Antennae may have linear polarization or circular

polarization. This is important as it relates to the orientation of your RFID tags

on the asset being tracked.

45
Linearly polarized antennae radiate in only one plane. If the

interrogator antenna and tag antenna are both linearly polarized and if the two

antennas are at right angles to each other, the tag will not be read. If the tag is

parallel to the reader it will be read. However, the advantage of linearly

polarized reader antennas is that they concentrate transmits power on the same

plane, whereas circularly polarized antennas distribute power over a 360 degree

cycle. So, if it is known that linear tags will always be in the same orientation

(for example, on a product packaging conveyor) a linear reader antenna may be

the preferred choice for better performance.

Antenna gain refers to how much signal power is input to the antenna (from the

reader unit) compared to how much power is transmitted from the antenna.

Gain is a consideration with respect to FCC regulatory conformance.

Application requirements:

Applications most often have differing requirements in their use of RF

technology, with RFID tag and contact less smart card technologies providing

very different capabilities.

RFID is emerging as a complementary technology to help overcome some

of the drawbacks associated with bar code technology. Barcodes have one

significant downfall- they require line-of-sight technology. That means the

scanner has to see the barcode to read it, which usually means items have to be

46
manually oriented toward the scanner for it to be read. Conversely, RFID does

not require line-of-sight and can be read as long as the item is within range of

the reader.

RFID tags are simple, low-cost and disposable and are being used to

identify animals, track goods logistically and replace printed bar codes at

retailers. RFID tags include a chip that typically stores a static number (an ID)

and an antenna that enables the chip to transmit the stored number to a reader

via electromagnetic waves. When the tag comes within range of the appropriate

RF reader, the tag is powered by the reader's RF field and transmits its ID to the

reader.

RFID middleware provides the interface for communication between

the interrogator and existing company databases and information management

systems.

Security concerns:

One of the biggest objections to RFID is the lack of security. There is

little to no security on the RFID tag or during communication with the reader.

Any reader using the appropriate RF signal can get the RFID tag to

communicate its contents.

Typical RFID tags can be easily read from distances of several inches

(centimeters) to several yards (meters) to allow easy tracking of goods. RFID

47
tags have common characteristics, including: low cost, high volume

manufacturing to minimize investment required in implementation and minimal

security, with tags able to be read by any compatible reader. In addition,

disposable or one-time use, minimal data storage comparable to bar code,

usually a fixed format written once when the tag is manufactured and finally,

read range optimized to increase speed and utility.

The benefits of RFID:

There are many areas that benefit from the use of RFID. The

technology can be used in Document Tracking Applications as a way to

improve the management of important document files in industries like

insurance and legal where the loss of such files can cause severe problems.

RFID improves the tracking of documents so that files can be more quickly

located and legal document workflow more easily tracked.

For sports events, concerts, and other leisure activities, RFID systems

streamline ticket issue and validation. They also serve to minimize losses from

ticket fraud. Tickets can be created on demand with RFID-enabled bar code

printers; RFID card transponders can be issued to individual customers and

enabled for specific time periods; and tickets can be read remotely to increase

throughput at entrances and gates.

48
A hands-free access system for ski lifts based on RFID is used at

many ski resorts in Europe. This allows for improved customer service, more

efficient operations, increased sales and higher throughput of customers.

Remote-operated gates detect a valid ski pass, embedded with a Tag-it

read/write transponder, and open automatically. The credit-card sized ski pass

fits into a jacket pocket and never has to be removed, giving skiers the freedom

to enjoy hassle free skiing.

Military:

The US military is currently one of the largest users and biggest

markets for RFID systems although the majority of their systems require/use

expensive active RFID tags, some with sensing capabilities.

The airport and airline industry are piloting and using RFID for a

multitude of applications. Boeing is using RFID to track and manage

serviceable parts on their aircrafts, whilst others such as Hong

KongInternationalAirport are using an automated in-flight catering system for

the routing of in-flight meals and the management of returnable containers. The

application with the most potential within the industry is for baggage tagging.

The airlines are reported to handle approximately 3 billion bags each year and

due to limitations of barcode technology it is estimated that about 2% of bags

get lost each year, representing 60 million missing bags. Each missing bag cost

49
the airlines as much as $200 to replace, costing the industry around US$12

billion per year plus the additional problem of dissatisfied customers. The

implementation of RFID is changing this dramatically.

Manufacturing role:

RFID is a mature technology within the automotive industry and has

established itself as an integral part of flexible manufacturing systems for those

at the forefront of technological development, with greater penetration within

vehicle security systems (immobilizers) being adopted. The industry is

investigating additional usages of the technology such as supply chain

management similar to other industries.

The logistics industry consists of warehousing and postal services, road

haulage, fleet management and more. Worldwide the independent logistic

industry is a late adopter of RFID although this is currently being addressed.

Postal services are paying an active interest in RFID particularly for item

management (auto-routing etc.), as are logistics service providers.

RF is a flexible technology and has potential for applications across all

industry sectors. It is moving beyond traditional application niches such as

baggage handling, rental item tagging, point of sales, Real Time Location

Systems (RTLS) and Supply Chain Management.

50
There is no doubt that RF is a hugely significant technology in most

industries, with the projected market value for global RFID systems sales of

$3.1 billion by 2008, according to ABI Research. Meanwhile, IDTechEx

predicts the global market to be worth approximately US$10 billion by 2013.

RFID in E-commerce:

RFID is now being considered as an integral link in e-commerce

environments. The technology enhances and complements Electronic Data

Interchanges (EDIs) to facilitate quick response and the generation of exception

reports. This should allow real time information to be transmitted to partners

within the supply chain supporting the decision-making process.

Ultimately RFID could provide immediacy of data right down to

individual item level identification. This can help bridge the gap between the

customer, the order and order fulfillment process to the satisfaction of the

customer. This means essentially that it can enable the enhanced

responsiveness expected within an E-Business environment.

Contactless smart cards:

The event of 'contact less' smart card technology is used in

applications that need to protect personal information or deliver secure

transactions. Contact smart card technology provides similar capabilities but

51
does not have the RF interface that allows contact less smart cards to be

conveniently read at a short distance from the reading mechanism.

There are an increasing number of contact less smart card

technology implementations that capitalize on its ability to enable fast,

convenient transactions and its availability in form factors other than plastic

cards - for example the inside of a watch, key fob or document. Current and

emerging applications using contact less smart card technology include transit

fare payment cards, government and corporate identification cards, documents

such as electronic passports and visas, and contact less financial payment cards.

The contact less device includes a smart card secure

microcontroller, or equivalent intelligence, and internal memory and has the

unique ability to securely manage, store and provide access to data on the card,

perform complex functions (for example, encryption or other security

functions) and interact intelligently via RF with a contact less reader.

Smart card security features:

Applications using contact less smart cards support many security

features that ensure the integrity, confidentiality and privacy of information

stored or transmitted, including the following:

52
Mutual authentication:

For applications requiring secure card access, the contact less smart

card-based device can verify that the reader is authentic and can prove its own

authenticity to the reader before starting a secure transaction.

Strong information security:

For applications requiring complete data protection, information stored

on cards or documents using contact less smart card technology can be

encrypted and communication between the contact less smart card-based device

and the reader can be encrypted to prevent eavesdropping. Additional security

technologies may also be used to ensure information integrity.

Strong contactless device security:

Like contact smart cards, contact less smart card technology is extremely

difficult to duplicate or forge and has built-in tamper-resistance. Smart card

chips include a variety of hardware and software capabilities that detect and

react to tempering attempts and help counter possible attacks.

Authenticated and authorized information access:

The contact less smart card's ability to process information and react to

its environment allows it to uniquely provide authenticated information access

and protect the privacy of personal information. The contact less smart card can

53
verify the authority of the information requestor and then allow access only to

the information required. Access to stored information can also be further

protected by a personal identification number (PIN) or biometric to protect

privacy and counter unauthorized access.

Strong support for information privacy:

The use of smart card technology strengthens the ability of a system to

protect individual privacy. Unlike other technologies, smart card-based devices

can implement a personal firewall for an individual, releasing only the

information required and only when it is required. The ability to support

authenticated and authorized information access and the strong contact less

device and data security make contact less smart cards excellent guardians of

personal information and individual privacy.

3.5 SWITCH ( PUSH BUTTON)

This is a standard 12mm square momentary button. It is used as

emergency Switch. This button is great for user input, it contains 4 pins. If the

victim is in danger, by pressing the switch the gets activated along with buzzer.

Fig 3.8: Panic button


54
3.6 LCD DISPLAY

LCD Background:

One of the most common devices attached to a micro controller is an LCD

display. Some of the most common LCD’s connected to the many

microcontrollers are 16x2 and 20x2 displays. This means 16 characters per line

by 2 lines and 20 characters per line by 2 lines, respectively.

Basic 16x 2 Characters LCD

Pin description:

Pin No. Name Description

Pin no. 1 VSS Power supply (GND)

Pin no. 2 VCC Power supply (+5V)

Pin no. 3 VEE Contrast adjust

Pin no. 4 RS 0 = Instruction input

55
1 = Data input

0 = Write to LCD module


Pin no. 5 R/W
1 = Read from LCD module

Pin no. 6 EN Enable signal

Pin no. 7 D0 Data bus line 0 (LSB)

Pin no. 8 D1 Data bus line 1

Pin no. 9 D2 Data bus line 2

Pin no. 10 D3 Data bus line 3

Pin no. 11 D4 Data bus line 4

Pin no. 12 D5 Data bus line 5

Pin no. 13 D6 Data bus line 6

Pin no. 14 D7 Data bus line 7 (MSB)

Table 1: Character LCD pins with Microcontroller

The LCD requires 3 control lines as well as either 4 or 8 I/O lines for the

data bus. The user may select whether the LCD is to operate with a 4-bit data

bus or an 8-bit data bus. If a 4-bit data bus is used the LCD will require a total

of 7 data lines (3 control lines plus the 4 lines for the data bus). If an 8-bit data

bus is used the LCD will require a total of 11 data lines (3 control lines plus the

8 lines for the data bus).

56
The three control lines are referred to as EN, RS, and RW.

The EN line is called "Enable." This control line is used to tell the LCD

that we are sending it data. To send data to the LCD, our program should make

sure this line is low (0) and then set the other two control lines and/or put data

on the data bus. When the other lines are completely ready, bring EN high (1)

and wait for the minimum amount of time required by the LCD datasheet (this

varies from LCD to LCD), and end by bringing it low (0) again.

The RS line is the "Register Select" line. When RS is low (0), the data

is to be treated as a command or special instruction (such as clear screen,

position cursor, etc.). When RS is high (1), the data being sent is text data

which should be displayed on the screen. For example, to display the letter "T"

on the screen we would set RS high.

The RW line is the "Read/Write" control line. When RW is low (0), the

information on the data bus is being written to the LCD. When RW is high (1),

the program is effectively querying (or reading) the LCD. Only one instruction

("Get LCD status") is a read command. All others are write commands--so RW

will almost always be low.

Finally, the data bus consists of 4 or 8 lines (depending on the mode of

operation selected by the user). In the case of an 8-bit data bus, the lines are

referred to as DB0, DB1, DB2, DB3, DB4, DB5, DB6, and DB7.

57
Schematic:

Circuit Description:

Above is the quite simple schematic. The LCD panel's Enable and

RegisterSelect is connected to the Control Port. The Control Port is an open

collector / open drain output. While most Parallel Ports have internal pull-up

resistors, there is a few which don't. Therefore by incorporating the two 10K

external pull up resistors, the circuit is more portable for a wider range of

computers, some of which may have no internal pull up resistors.

We make no effort to place the Data bus into reverse direction.

Therefore we hard wire the R/W line of the LCD panel, into write mode. This

will cause no bus conflicts on the data lines. As a result we cannot read back

the LCD's internal Busy Flag which tells us if the LCD has accepted and

finished processing the last instruction. This problem is overcome by inserting

known delays into our program.

The 10k Potentiometer controls the contrast of the LCD panel.

Nothing fancy here. As with all the examples, I've left the power supply out.
58
We can use a bench power supply set to 5v or use an onboard +5 regulator.

Remember a few de-coupling capacitors, especially if we have trouble with the

circuit working properly.

SETB RW

Handling the EN control line:

As we mentioned above, the EN line is used to tell the LCD that we are

ready for it to execute an instruction that we've prepared on the data bus and on

the other control lines. Note that the EN line must be raised/ lowered

before/after each instruction sent to the LCD regardless of whether that

instruction is read or write text or instruction. In short, we must always

manipulate EN when communicating with the LCD. EN is the LCD's way of

knowing that we are talking to it. If we don't raise/lower EN, the LCD doesn't

know we're talking to it on the other lines.

Thus, before we interact in any way with the LCD we will always bring

the EN line low with the following instruction:

CLR EN

And once we've finished setting up our instruction with the other control

lines and data bus lines, we'll always bring this line high:

59
SETB EN

The line must be left high for the amount of time required by the LCD as

specified in its datasheet. This is normally on the order of about 250

nanoseconds, but checks the datasheet. In the case of a typical microcontroller

running at 12 MHz, an instruction requires 1.08 microseconds to execute so the

EN line can be brought low the very next instruction. However, faster

microcontrollers (such as the DS89C420 which executes an instruction in 90

nanoseconds given an 11.0592 MHz crystal) will require a number of NOPs to

create a delay while EN is held high. The number of NOPs that must be

inserted depends on the microcontroller we are using and the crystal we have

selected.

The instruction is executed by the LCD at the moment the EN line is

brought low with a final CLR EN instruction.

Checking the busy status of the LCD:

As previously mentioned, it takes a certain amount of time for each

instruction to be executed by the LCD. The delay varies depending on the

frequency of the crystal attached to the oscillator input of the LCD as well as

the instruction which is being executed.

While it is possible to write code that waits for a specific amount of time

to allow the LCD to execute instructions, this method of "waiting" is not very

60
flexible. If the crystal frequency is changed, the software will need to be

modified. A more robust method of programming is to use the "Get LCD

Status" command to determine whether the LCD is still busy executing the last

instruction received.

The "Get LCD Status" command will return to us two tidbits of

information; the information that is useful to us right now is found in DB7. In

summary, when we issue the "Get LCD Status" command the LCD will

immediately raise DB7 if it's still busy executing a command or lower DB7 to

indicate that the LCD is no longer occupied. Thus our program can query the

LCD until DB7 goes low, indicating the LCD is no longer busy. At that point

we are free to continue and send the next command.

Applications:

1. Medical equipment

2. Electronic test equipment

3. Industrial machinery Interface

4. Serial terminal

5. Advertising system

6. EPOS

7. Restaurant ordering systems

8. Gaming box

61
9. Security systems

10. Environmental monitoring

3.7 GSM Module

Digital cellular technology like GSM (Global System for Mobile

Communication) is used to transmit mobile data as well as voice services. This

concept was implemented at Bell Laboratories using a mobile radio system in

1970. As the name suggests, it is the standardization group name that was

established in the year1982 to make a general European mobile telephone

standard. This technology owns above 70% of the market share of the digital

cellular subscriber around the world. This technology was developed by using

digital technology. At present, GSM technology supports above 1 billion

mobile subscribers around the world in the above 210 countries. This

technology provides voice and data services from fundamental to complex.

This article discusses an overview of GSM technology.

GSM is a mobile communication modem; it stands for global system for

mobile communication (GSM). The idea of GSM was developed at Bell

Laboratories in 1970. It is a widely used mobile communication system in the

world. GSM is an open and digital cellular technology used for transmitting

mobile voice and data services operate at the 850MHz, 900MHz, 1800MHz,

and 1900MHz frequency bands.

62
GSM technology was developed as a digital system using the time

division multiple access (TDMA) technique for communication purposes. A

GSM digitizes and reduces the data, then sends it down through a channel with

two different streams of client data, each in its own particular time slot. The

digital system has the ability to carry 64 kbps to 120 Mbps of data rates.

There are various cell sizes in a GSM system such as macro, micro, pico,

and umbrella cells. Each cell varies as per the implementation domain. There

are five different cell sizes in a GSM network macro, micro, pico, and umbrella

cells. The coverage area of each cell varies according to the implementation

environment.

The time division multiple access (TDMA) technique relies on assigning

different time slots to each user on the same frequency. It can easily adapt to

data transmission and voice communication and can carry 64kbps to 120Mbps

of data rate.

63
CHAPTER-4

EXCECUTION DETAILS

The Arduino is a family of microcontroller boards to simplify electronic

design, prototyping and experimenting for artists, hackers, hobbyists, but also

many professionals. People use it as brains for their robots, to build new digital

music instruments, or to build a system that lets your house plants tweet you

when they’re dry. Arduinos (we use the standard Arduino Uno) are built around

an ATmega microcontroller — essentially a complete computer with CPU,

RAM, Flash memory, and input/output What you will need:

1) A computer (Windows, Mac, or Linux)

2) An Arduino-compatible microcontroller (anything from this guide

should work)

3) A USB A-to-B cable, or another appropriate way to connect your

Arduino-compatible microcontroller to your computer (check out this

USB buying guide if you’re not sure which cable to get.

Installing the Drivers for the Arduino Uno (from Arduino.cc):

1) Plug in your board and wait for Windows to begin it’s driver

installation process After a few moments, the process will fail,

despite its best efforts

2) Click on the Start Menu, and open up the Control Panel

64
3) While in the Control Panel, navigate to System and Security. Next,

click on System Once the System window is up, open the Device

Manager

4) Look under Ports (COM & LPT). You should see an open port

named “Arduino UNO (COMxx)”.

5) If there is no COM & LPT section, look under ‘Other Devices’ for

‘Unknown Device’

Finally, navigate to and select the Uno’s driver file, named

“ArduinoUNO.inf”, located in the “Drivers” folder of the Arduino Software

download (not the “FTDI USB Drivers” sub-directory). If you cannot see the

.inf file, it is probably just hidden. You can select the ‘drivers’ folder with the

‘search sub-folders’ option selected instead.

65
After following the appropriate steps for your software install, we are now

ready to test your first program with your Arduino board!

Launch the Arduino application

Select the type of Arduino board you’re using: Tools > Board > your board

type If you disconnected your board, plug it back in

Open the Blink example sketch by going to: File > Examples >1.Basics> Blink

Select the serial/COM port that your Arduino is attached to: Tools > Port

>COMxx

66
Select the serial port that your Arduino is attached to: Tools > Port

>xxxxxx (it’ll probably look something like “/dev/tty.usbmodemfd131” or

“/dev/tty.usbserial-131” but probably with a different number)

If you’re not sure which serial device is your Arduino, take a look at the

available ports, then unplug your Arduino and look again. The one that

disappeared is your Arduino.

With your Arduino board connected and the Blink sketch open, press the

‘Upload’ button

After a second, you should see some LEDs flashing on your Arduino,

followed by the message ‘Done Uploading’ in the status bar of the Blink

sketch.

If everything worked, the onboard LED on your Arduino should now be

blinking! You just programmed your first Arduino!

67
CHAPTER-5

5.1 RESULTS

First enrol the voters finger and save the fingerprint by giving id.Then

place a fingerprint on fringprintmodule.In this time voter ask to get an id to

save their finger print. After given id voter place their finger on fingerprint

module to scan. During the enrolling place finger print and by using RFID card

we should store data of the voter .in voting process if the finger print not

matched then it displays “finger print did not match” on LCD

If the fingerprint got matched then the voter gets allow to

caste a vote. Sob by scanning the RFID code and place finger print of the voter

on finger print module if it is matched it allows voter to caste the vote. Then

voter should select a party to their preference from the party list. If the party

once selected then it cannot be changed. then at last it shows the result that how

votes are casted.

Our proposed voting system is accurate and fater will ensure

a single vote for a single person. This product is a prototype. The process of

casting vote using fingerprint will further help us to fulfill our purpose

68
5.2 HARDWARE VIEW

Fig 5.2 : Hardware View

69
CHAPTER-6

ADVANTAGES AND DISADVANTAGES

ADVANTAGES

1. Cost effective

2. This system allows only authenticated voting than the existing

equipment as the person is identified based on his Fingerprint

which is unique to each individual.

3. Low power consumption

4. It is economical

5. Less manpower required

6. Time conscious, less time required for voting & counting

7. Avoids invalid voting as it prevents unregistered voters from

voting.

8. Ease of transportation due to its compact size.

9. Convenient on the part of voter.

DISADVANTAGES

1. Before voting the user has to enroll first.

2. Sensitivity of finger print module causes sometimes Combine

character error.

70
CHAPTER-7

APPLICATIONS

This project can be used as a voting machine to prevent rigging, during the

elections in the polling booths.

1. Fast track voting which could be used in small scale elections, like

resident welfare association, “panchayat” level election and other society

level elections, where results can be instantaneous.

2. It could also be used to conduct opinion polls during annual shareholders

meeting.

3. It could also be used to conduct general assembly elections where

number of candidates are less than or equal to eight in the current

situation, on a small scale basis.

71
CHAPTER-8

CONCLUSION

In total, this system overcomes most of the problems faced during the

voting period by the paper ballot system. The efficiency of this system depends

upon the web interface, its usability. This will surely ensure a safer voting

method which is very much what is required for a healthy growth of a

developing nation. In this paper, the proposed Fingerprint based voting system

which is better and faster than previous systems. The new system prevents

access to illegal voters, provides ease of use, transparency and maintains

integrity of the voting process. The system also prevents multiple votes by the

same person and checks eligibility of the voter. It also allows a person to vote

from anywhere provided that the voter is within electoral limits. Fingerprint

based voting system has provided chance to avoid invalid votes, It reduce the

polling time, Easy to carrying to polling center from the polling box, Reduce

the staff of voting center, It provide easy and accurate counting without any

troubles, Provisioning of voting preventive measures. n total, this system

overcomes most of the problems faced during the voting period by the paper

ballot system. The efficiency of this system depends upon the web interface, its

usability. This will surely ensure a safer voting method which is very much

what is required for a healthy growth of a developing nation. In this paper, the

72
proposed Fingerprint based voting system which is better and faster than

previous systems. The new system prevents access to illegal voters, provides

ease of use, transparency and maintains integrity of the voting process. The

system also prevents multiple votes by the same person and checks eligibility

of the voter. It also allows a person to vote from anywhere provided that the

voter is within electoral limits. Fingerprint based voting system has provided

chance to avoid invalid votes, It reduce the polling time, Easy to carrying to

polling center from the polling box, Reduce the staff of voting center, It

provide easy and accurate counting without any troubles, Provisioning of

voting preventive measures The project “Fingerprint Based Voting Machine”

was mainly intended to develop a fingerprint based advanced Electronic Voting

Machine (EVM) which helps in free and fair way of conducting elections

which are basis for democratic country like India

73
CHAPTER-9

REFFERENCES

1. Balaji, Speech of Shri V S Sampath, CEC for Defence Estates Day

Lecture 2014.

2. R. Haenni, E. Dubuis, and U. Ultes-Nitsche, “Research on e-voting

technologies." Bern University of Applied Sciences, Technical Report 5,

2008.

3. G.V.L. N. Rao. Democracy at Risk! Citizens for Veri_ability,

Transparency & Accountability in Elections, New Delhi, Election

Commission of India.

4. K. Agarwala, D. T. Shahani, and P. V. Indiresan. Report of the expert

committee for evaluation of the upgraded electronic voting machine

(EVM). Sept. 2006.

5. Wikipedia. Results of the 2009 Indian general election by parliamentary

constituency Sanjay Kumar, Manpreet Singh,”DESIGN OF A SECURE

ELECTRONIC VOTING SYSTEM USING FINGERPRINT

TECHNIQUE”,IJCSI International Journal of Computer Science Issues,

Vol. 10, Issue 4, No 1, July 2013

74

You might also like