Project Report
Project Report
BALLOTER IDENTIFICATION
A PROJECT REPORT
Submitted by
ARUN G 963318105013
ELANGO S 963318105019
PRATHEEP M K 963318105036
MUTHUVEL INDHIRAN G 963318105029
BACHELOR OF ENGINEERING
IN
PALKULAM, KANYAKUMARI
JUNE 2022
i
ANNA UNIVERSITY: CHENNAI 600 025
BONAFIDE CERTIFICATE
SIGNATURE SIGNATURE
Mr. P JEYAKUMAR .M.E, Mr.R PADMA KUMAR M.E.,
HEAD OF THE DEPARTMENT SUPERVISOR
Department of EEE, Assistant Professor,
Rohini College of Engineering and Department of EEE,
Technology, Palkulam. Rohini College of Engineering and
Technology, Palkulam.
ii
ACKNOWLEDGMENT
I acknowledge with great gratitude to all those who helped us to make this
project a great success. At the very outset, I express my thanks to the Almighty
God who has blessed with a healthy situation and bestowed upon me the required
skill pursues this High tech course.
We are happy to express our heartful thanks and gratitude to our beloved
Principal, Dr. R. RAJESH M.E., Ph.D., For his encouragement and motivation
insuccessfully completing this project.
I am extremely thankful to my parents and friends who were the back one of
my success in aspects of the project work.
iii
TABLE OF CONTENTS
TITLE PAGE NO
ABSTRACT 1
CHAPTER-1
INTRODUCTION
1.1 INTRODUCTION TO EMBEDDED SYSTEM 2
1.2 APPLICATIONS OF EMBEDDED SYSTEMS 10
1.3 COMPONENTS USED 12
CHAPTER-2
LITERATURE SURVEY 14
CHAPTER-3
IMPLEMENTATION DETAILS
3.1 ARDUINO NANO 15
3.2 REGULATED POWER SUPPLY 21
3.2.1TRANSFORMER 22
3.2.2RECTIFIER 23
3.2.3FILTER 26
3.2.4 REGULATOR 28
3.3 FINGER PRINT MODULE 29
3.4 RFID 31
3.5 SWITCH (PUSH BUTTON) 54
4.6 LCD DISPLAY 55
CHAPTER-4
EXCECUTION DETAILS 64
CHAPTER 5
RESULT 68
CHAPTER-6
ADVANTAGES & DISADVANTAGES 70
CHAPTER-7
APPLICATIONS 71
CHAPTER-8
CONCLUSION 73
CHAPTER-9
REFERENCES 74
iv
LIST OF FIGURES
FIG NAME PAGE NO
v
ABSTRACT
Biometric Finger print devices are used in the Electronic Voting machine
for voter verification. We have designed a finger print, RFID and GSM based
voting machine where there is no need for the user to carry his ID which
contains his required details. The person at the polling booth needs only to
place his Finger on the device which generate and send text message to
on-spot fingerprint from the voter which serves as an identification. Also this
system consists of RFID reader reads the details from the tag. This data is
passed onto the controlling unit for the verification by sending text message to
the registered mobile number through GSM. The controller fetches the data
from the reader and compares this data with the already existing data stored
during the registration of the voters and also get proper acceptance through
GSM from the voter mobile. If the data matches with the pre-stored
information of the registered fingerprint, the person is allowed to cast his vote.
If not, a warning message is displayed on LCD and the person is barred from
polling his vote. The vote casting mechanism is carried out manually using the
push buttons. LCD is used to display the related messages, warnings and
ensuing results.
1
CHAPTER - 1
INRODUCTION
We are living in the Embedded World. You are surrounded with many
embedded products and your daily life largely depends on the proper
Controllers, Palm devices of your work space enable you to do many of your
tasks very effectively. Apart from all these, many controllers embedded in your
car take care of car operations between the bumpers and most of the times you
In recent days, you are showered with variety of information about these
regularly dish out details about latest technologies, new devices; fast
applications which make you believe that your basic survival is controlled by
these embedded products. Now you can agree to the fact that these embedded
products have successfully invaded into our world. You must be wondering
2
compose your mails, or create a document or analyze the database is known as
You need to install the relevant software to get the required processing
embedded controllers carryout a specific work for which they are designed.
Most of the time, engineers design these embedded controllers with a specific
specific task.
microprocessor may turn out as a most difficult first step and it is getting
complicated as new devices continue to pop-up very often. In the 8 bit segment,
the most popular and used architecture is Intel's 8031. Market acceptance of
3
something new based on this particular architecture. Even after 25 years of
example of embedded system since the processor inside it performs one task
only; namely getting the data and printing it. Contrast this with a Pentium based
PC. A PC can be used for any number of applications such as word processor,
terminal. Software for a variety of applications can be loaded and run. of course
the reason a pc can perform myriad tasks is that it has RAM memory and an
operating system that loads the application software into RAM memory and
4
embedded products such as keyboard, printer, modem, disk controller, sound
card, CD-ROM drives, mouse, and so on. Each one of these peripherals has a
Microcontroller inside it that performs only one task. For example, inside every
position and sending it to the PC. Table 1-1 lists some embedded products.
mouse, and so on. Each one of these peripherals has a Microcontroller inside it
that performs only one task. For example, inside every mouse there is a
Microcontroller to perform the task of finding the mouse position and sending
a general-purpose computer for multiple tasks. Some also have real time
performance constraints that must be met, for reason such as safety and
5
Wireless communication has become an important feature for
commercial products and a popular research topic within the last ten years.
There are now more mobile phone subscriptions than wired-line subscriptions.
Lately, one area of commercial interest has been low-cost, low-power, and
automation and monitoring. They will also enable custom tailored engineering
information. With new technologies and devices come new business activities,
and the need for employees in these technological areas. Engineers who have
demand.
6
1. This system can do a specific task and cannot be programmed to do
These systems takes the input in the form of electrical signals from
process them and produces desired output. This entire process of taking input,
processing it and giving output is done in stand alone mode. Such embedded
7
Embedded systems which are used to perform a specific task or
embedded systems.
These embedded systems follow an absolute dead line time period i.e..,
if the tasking is not done in a particular time period then there is a cause of
If this valve is not opened in 30 ms this may cause damage to the entire
operations.
These embedded systems follow a relative dead line time period i.e.., if
the task is not done in a particular time that will not cause damage to the
equipment.
eg: Consider a TV remote control system ,if the remote control takes a few
milliseconds delay it will not cause damage either to the TV or to the remote
control. These systems which will not cause damage whenthey are not operated
8
at considerable time period those systems comes under soft real-time embedded
systems.
your computer, and then you can open the door lock just by clicking the
mouse.
9
Fig 1.1: Network communication embedded systems
Consumer applications:
microwave oven, remote control, vcd players, dvd players, camera etc.
10
1.3 BLOCK DIAGRAM:
RPS
LCD
RFID READER
ARDUINO NANO
PARTY2 (SWITCH)
ENROLLING
TOTAL (SWITCH)
IDENTIFING
GSM
11
1.3.1 COMPONENTS USED:
HARDWARE COMPONENTS:
2.RPS
4.RFID READER
5.LCD
6.RFID TAGS
7.SWITCHES
SOFTWARE COMPONENTS:
1.ARDUINO IDE
2.PROTEAUS
PLATFORM:
1.Windows 7,8,10.
12
CHAPTER-2
INTRODUCTION
human body characteristics, such as DNA, fingerprints, eye retinas and irises,
purposes. The field of biometrics was formed and has since expanded on to
remain a very common identifier and the biometric method of choice among
and assign access privileges. The basic point of these devices is also to examine
fingerprints.
fingerprint images of all the voters as required. Illegal votes and repetition of
13
votes is checked for in this system with accurate coding. Hence with the
application of this fingerprint based EVM system elections could be made fair
and free from rigging. Further that the elections would are no longer a tedious
LITERATURE SURVEY
these companies are owned by the Indian government, they are not under the
vendors that are attempting to market EVMs globally . The first Indian EVMs
were developed in the early 1980s by ECIL. They were used in certain parts of
the country, but were never adopted nationwide. They introduced the style of
system used to this day, including the separate control and ballot units and the
models were introduced in 2000 by both ECIL and BEL. These machines
moved the firmware into the CPU and upgraded other components.
14
CHAPTER-3
IMPLEMENTATION DETAILS
mini-B port, unlike the previous Nano board. It has 20 digital I/o pins, 8 analog
15
Atmega4809 Microchip:
20MHz. It comes with 6KB of SRAM, 48KB of flash, and 256 bytes of
EEPROM. The chip features the latest technologies like flexible and efficient-
The Nano every comes with a micro-USB port, unlike the previous
Arduino Nano board that comes with the mini-USB-B port. The port can be
used to power up the board as well as to connect the board to the computer for
16
RESET button:
The board comes with a RESET button that can be used to reset the
board and begin the execution of the program from the beginning.
Power LED: The board comes with a power Led that lit up as soon as the
Inbuilt LED (13): An Inbuilt LED is present on the board that is connected to
pin no 13. This Led can be controlled by switching the pin HIGH or LOW.
RX and TX LED: On the board, there are two more LEDs connected to the
As shown in the above Arduino Nano Every pinout image, the board consists of
30 pins in total, 20 of which are digital I/O pins. Out of these five are PWM
Vin: It is the input voltage pin that powers up the Arduino board. When a
certain voltage is given via the USB port to power the board, this voltage also
5v: The 5V pin generates regulated 5v output for the externally connected
components. The power source of the 5V pin for the Arduino Nano Every
17
GND: Two ground pins are available on Arduino Nano Every board.
Digital Pins:
1.There are 20 digital I/O pins on the Arduino Nano Every board that can be
2.The Arduino Nano Every digital pin can read one of the two states: when
the electric signal is present and when it is absent. This type of input is
usually known as digital type (or binary) and these states are referred to as
PWM Pins:
1.The five pins from the set of digital pins are PWM (Pulse Width
value)” is used. PWM output value varies between 0 (0 volts) and 255 (5
volts).
Analog Pins:
(where X is pin no.). All of these pins can also be utilized as digital I/O
pins.
18
2.Each one of the analog pins is connected to an inbuilt ADC of 210-bit (i.e.,
I2C pins:
I2C is the two-wire serial communication protocol. The I2C protocol stands
for Inter-Integrated Circuits. The protocol uses two pins for sending and
receiving clock data as well as serial data: a serial clock (SCL) pin and a serial
1.SCL-It stands for Serial Clock. It is used for sending the clock data between
the devices. It is also used for synchronization purposes; this pin is provided by
2.SDA-It stands for Serial Data. This pin is operated by both the slave and
master device. The purpose of this pin is to send and receive the data. That’s
why it is also called a data line, while SCL is known as a clock line.
External Interrupts:
Unlike the Arduino Nano board, the external interrupts are allowed on
SPI pins:
2.This serial communication protocol is used to send the serial data between
19
3.The board consist of 4 SPI pins:
UART pins:
UART pins are used for serial communication. 0 (RX) to receive the
data, and 1 (TX) to transmit (TX) TTL serial data using the ATmega4809
Specifications:
9. SRAM: 2 KB
10. EEPROM: 1 KB
20
11. Clock Speed: 16 MHz
12. Length: 45 mm
13. Width: 18 mm
14. Weight: 7 g
electricity to a suitable low voltage supply for electronic circuits and other
Regulated power supply for Microcontroller and for the other devices being
interfaced to it.
which performs a particular function. A d.c power supply which maintains the
frequency.
little loss of power. Transformers work only with AC and this is one of the
voltage to a safer low voltage. The input coil is called the primary and the
are linked by an alternating magnetic field created in the soft-iron core of the
transformer. The two lines in the middle of the circuit symbol represent the
core. Transformers waste very little power so the power out is (almost) equal to
the power in. Note that as voltage is stepped down current is stepped up. The
ratio of the number of turns on each coil, called the turn’s ratio, determines the
its primary coil which is connected to the high voltage mains supply, and a
small number of turns on its secondary coil to give a low output voltage.
22
Fig 3.2: Transformer
3.2.2 Rectifier:
Types of rectifier:
23
Half-wave rectifier:
In half wave rectifier, either the positive or negative half of the AC wave
is passed, while the other half is blocked. Because only one half of the input
waveform reaches the output, it is very inefficient if used for power transfer.
voltage using both half cycles of the input ac voltage. The Bridge rectifier
circuit is shown in the figure. The circuit has four diodes connected to form a
bridge. The ac input voltage is applied to the diagonally opposite ends of the
bridge. The load resistance is connected between the other two ends of the
bridge.
24
For the positive half cycle of the input ac voltage, diodes D1 and D3
conduct, whereas diodes D2 and D4 remain in the OFF state. The conducting
diodes will be in series with the load resistance RL and hence the load current
flows through RL. For the negative half cycle of the input ac voltage, diodes D2
resistance RL and hence the current flows through RL in the same direction as in
unidirectional wave.
obtain the same output voltage compared to the bridge rectifier above.
For the positive half cycle of the input ac voltage, diodes D1 will
25
will be in series with the load resistance RL and hence the load current flows
through RL.
For the negative half cycle of the input ac voltage, diodes D2 will
conduct, whereas diodes D1 is in the OFF state. The conducting diodes D2 will
be in series with the load resistance RL and hence the load current flows
through RL.
3.2.3 Filter:
Capacitor Filter:
We have seen that the ripple content in the rectified output of half
is 48% such high percentages of ripples is not acceptable for most of the
filtering.
26
(a) A capacitor, in parallel to the load, provides an easier by –pass for the
ripples voltage though it due to low impedance. At ripple frequency and leave
(b) An inductor, in series with the load, prevents the passage of the ripple
current (due to high impedance at ripple frequency) while allowing the d.c (due
section filter, multiple section filter etc. which make use of both the properties
mentioned in (a) and (b) above. Two cases of capacitor filter, one applied on
across the DC supply to act as a reservoir, supplying current to the output when
the varying DC voltage from the rectifier is falling. The capacitor charges
quickly near the peak of the varying DC, and then discharges as it supplies
C = ¼*√3*f*r*Rl
r = ripple factor,
27
Rl = load resistance
Note: In our circuit we are using 1000µF hence large value of capacitor is
3.2.4 Regulator:
or variable output voltages. The maximum current they can pass also rates
them. Negative voltage regulators are available, mainly for use in dual supplies.
fixed voltage regulators ICs have 3 leads and look like power transistors, such
The LM7805 is simple to use. You simply connect the positive lead of
Input pin, connect the negative lead to the Common pin and then when you turn
on the power, you get a 5 volt supply from the output pin.
28
78XX:
three terminals. The LM78XX offer several fixed output voltages making them
Features:
5. Output Voltage 5.0V, 6V, 8V, 9V, 10V, 12V, 15V, 18V, 24V.
The Fingerprint is one of the safest way to detect and identify the Authorized
person, We know that fingerprint is unique even identical twins do not have
identical fingerprints. By using this we can make pretty sure about security
29
this all in one optical fingerprint sensor-scanner (R305), It makes fingerprint
By using this sensor we can make Bio-metric authentication and access control
This optical fingerprint reader devices uses high powered DSP chip
AS601 form Synochip, that does the image rendering, calculation, feature
finding and searching. It provides TTL serial out hence we can connect to any
which can store 120 finger prints. Thanks to the Adafruit here we
1. Enrolling Fingerprint,
2. Matching Fingerprint.
30
These two steps makes microcontroller / System to authenticate right
fingerprint.
Connect the white wire from the sensor to Arduino D0 pin and green wire to
Arduino D1 pin. Put red & black in (+5V & GND) respectively. After the
3.4 RFID:
RFID is coming into increasing use in industry as an alternative to the bar code.
The advantage of RFID is that it does not require direct contact or line-of-sight
scanning.
31
An RFID system consists of three components: an antenna and
transceiver (often combined into one reader) and a transponder (the tag). The
antenna uses radio frequency waves to transmit a signal that activates the
transponder. When activated, the tag transmits data back to the antenna. The
systems (850 MHz to 950 MHz and 2.4 GHz to 2.5 GHz) offer longer
transmission ranges (more than 90 feet). In general RFID is the higher the
frequency, the more expensive the system. RFID is sometimes called dedicated
(tag). Tags can either be active (powered by battery) or passive (powered by the
reader field), and come in various forms. Some variants of tags and readers are
32
frequencies used depends to a large extent on the application, and range from
Basic concept:
flashing the sun’s reflection in the direction of the recipient. The flashes are
The basic theory underlying RFID technology has been understood since
material into an electric or magnetic field could alter the field’s characteristics.
That occurs because the conductive material both absorbs and reflects the
energy in the field. If the field is a radio frequency, or RF, the conductive
control system. There are many reasons for having such a system and these
include:
33
RFID technology is quickly becoming a popular choice since the
organization.
There are major deficiencies in the legacy solutions that use the
readers all rely on the user to either make contact or place the badge very close
to the reader. In addition, bar codes can only be read one at a time and the
solution. RFID badges can be read from much further distances than other
RFID badges can be read all at the same time. Information about employee
34
Working of RFID:
In a typical RFID system, tags are attached to objects. Each tag has a
about the object, such as unique ID (serial) number, or in some cases more
details including manufacture date and product composition. When these tags
pass through a field generated by a reader, they transmit this information back
managed and controlled by one of several protocols, such as the ISO 15693 and
ISO 18000-3 for HF or the ISO 18000-6, and EPC for UHF. Basically what
happens is that when the reader is switched on, it starts emitting a signal at the
selected frequency band (typically 860 – 915 MHz for UHF or 13.56 MHz for
35
HF). Any corresponding tag in the vicinity of the reader will detect the signal
and use the energy from it to wake up and supply operating power to its
internal circuits. Once the tag has decoded the signal as valid, it replies to the
Advantages of RFID:
RFID has distinct advantages over the barcode. Which are given below.
3. You must have ʺline of sightʺ to read a barcode. RFID tagged items can
be read even if they are behind other items. The readability of barcodes
6. More data can be stored in an RFID tag than can be stored on a barcode.
36
virtually seamless. It is even possible to simultaneously manage RFID data and
manipulating the sequence and rate at which that reflection occurs, called
Radio Waves:
Light, X‐rays, and radio waves are all electromagnetic waves. The only
difference between them is the frequency at which the wave oscillates between
positive and negative polarity. The number of waves that occur in one second is
37
known as the frequency, and is measured in Hertz. One Hertz is one wave
frequency. For example, the 915 MHz frequency band includes all the
communication channels. Some common RFID frequency bands are 125 KHz
(125,000 Hertz), 13.56 MHz, 868 MHz (in Europe), 915 MHz, and 2.45 GHz
(2.45 billion Hertz). Each band has its own performance trade‐offs. This
tutorial focuses on 915 MHz (that’s 915 Mega Hertz or 915 million oscillations
per second), but the principles are basically the same for other RFID
frequencies.
38
The channel frequency (e.g. 915 MHz) over which an RFID system
data RFID tag antennae are tuned to resonate only to the specified band of
carrier frequencies that are centered on the designated RFID system frequency.
Within that range of frequencies the RFID tag is able to absorb and reflect
The carrier wave by itself is not data, but is used to carry the data to and
from the RFID tags. In order to carry data the carrier wave must be modulated.
39
Modulation:
modulation. In this process a stream of data pulses (ʺ1ʺs and ʺ0ʺs) are added to
The data stream has a clock frequency that is much slower than the
carrier wave frequency. For a 915 MHz system the data clock rate is 62.5 KHz,
that is one clock pulse every 16 microseconds. The data clock will serve to
synchronize the RFID tag with the RFID interrogator. There will be a data
Data pulses that are 2 microseconds wide will be interpreted as data bit
ʺ0ʺs and pulses 6 microseconds wide will be interpreted as data bit ʺ1ʺs to make
40
There are two types of modulation: Amplitude Modulation (AM) and
Data Stream
Amplitude Modulation
41
The frequency modulation (FM) method keeps signal strength constant
and instead works by varying slightly the frequency of the carrier wave.
Adding the data stream to the carrier wave would look like this
RFID Tags:
In its basic form, an RFID tag consists of a silicon integrated circuit (an
There are two general categories of RFID tags, passive tags and active
tags. The most common of these is a “passive” tag (shown above), so‐called
because it has no internal battery power. Instead, passive tags are powered by
42
The modulated carrier wave transmitted by the interrogator is sensed by
the Antenna. The carrier wave induces a small alternating current (AC) in the
Antenna. Inside the IC Chip a Power Rectifier and Regulator converts the
up”. The Clock Extractor separates the clock pulses from the carrier wave and
uses the pulses to synchronize the Logic, Memory, and Modulator sections of
The Logic section separates the 1’s and 0’s from the carrier wave and
compares the data stream with its internal program to determine what response,
if any, is required. If the Logic section decides that the data stream is valid, it
accesses the Memory section for the chip’s unique identification data and any
user data that have been stored there. The Logic section encodes those data
using the Clock Extractor pulses. The encoded data stream is input into the
Modulator section. The Modulator mixes the data stream with the carrier
wave by electrically adjusting the reflectivity of the antenna at the data stream
rate, similar to the way one might adjust the angle of a signal mirror to reflect
43
the sun’s light. Electrically adjusting the antenna characteristics to reflect RF is
referred to as backscatter.
in the supply chain serve the same purpose, so it’s often expeditious to explain
RFID tags simply as ʺelectronic barcodes.ʺ Both RFID tags and barcode labels
digitally convey information about objects. Currently, ʺClass 1+ʺ RFID tags are
available with a digital memory of 96 bits, each bit being either logic 1 or a
logic 0. Because alphanumeric characters (i.e., A‐to‐Z and 0‐9) each require 8
bits of memory, it’s possible to store 12 characters in an RFID tag (which isn’t
numerical identities. Or you could split the 96 bits into fields that each
objects.
There are two basic tag data architectures. One is to include all
information about a product (e.g., its size, date of manufactures, the quality
inspector’s name) on the tag itself. This has the advantage of decentralizing the
data, but has a drawback in that the increased memory requirements on the tag
44
increase its complexity and cost. The other way is for the tag to serve as a
“license plate” for the object, which can be associated with a database of its
The header serves as a way of identifying the format of the sequence of bits
that follow in the EPC. This makes system coding more flexible. That is a
Antennas:
1. polarization
3. gain
45
Linearly polarized antennae radiate in only one plane. If the
interrogator antenna and tag antenna are both linearly polarized and if the two
antennas are at right angles to each other, the tag will not be read. If the tag is
polarized reader antennas is that they concentrate transmits power on the same
plane, whereas circularly polarized antennas distribute power over a 360 degree
cycle. So, if it is known that linear tags will always be in the same orientation
Antenna gain refers to how much signal power is input to the antenna (from the
reader unit) compared to how much power is transmitted from the antenna.
Application requirements:
technology, with RFID tag and contact less smart card technologies providing
of the drawbacks associated with bar code technology. Barcodes have one
scanner has to see the barcode to read it, which usually means items have to be
46
manually oriented toward the scanner for it to be read. Conversely, RFID does
not require line-of-sight and can be read as long as the item is within range of
the reader.
RFID tags are simple, low-cost and disposable and are being used to
identify animals, track goods logistically and replace printed bar codes at
retailers. RFID tags include a chip that typically stores a static number (an ID)
and an antenna that enables the chip to transmit the stored number to a reader
via electromagnetic waves. When the tag comes within range of the appropriate
RF reader, the tag is powered by the reader's RF field and transmits its ID to the
reader.
systems.
Security concerns:
little to no security on the RFID tag or during communication with the reader.
Any reader using the appropriate RF signal can get the RFID tag to
Typical RFID tags can be easily read from distances of several inches
47
tags have common characteristics, including: low cost, high volume
usually a fixed format written once when the tag is manufactured and finally,
There are many areas that benefit from the use of RFID. The
insurance and legal where the loss of such files can cause severe problems.
RFID improves the tracking of documents so that files can be more quickly
For sports events, concerts, and other leisure activities, RFID systems
streamline ticket issue and validation. They also serve to minimize losses from
ticket fraud. Tickets can be created on demand with RFID-enabled bar code
enabled for specific time periods; and tickets can be read remotely to increase
48
A hands-free access system for ski lifts based on RFID is used at
many ski resorts in Europe. This allows for improved customer service, more
read/write transponder, and open automatically. The credit-card sized ski pass
fits into a jacket pocket and never has to be removed, giving skiers the freedom
Military:
markets for RFID systems although the majority of their systems require/use
The airport and airline industry are piloting and using RFID for a
the routing of in-flight meals and the management of returnable containers. The
application with the most potential within the industry is for baggage tagging.
The airlines are reported to handle approximately 3 billion bags each year and
get lost each year, representing 60 million missing bags. Each missing bag cost
49
the airlines as much as $200 to replace, costing the industry around US$12
billion per year plus the additional problem of dissatisfied customers. The
Manufacturing role:
Postal services are paying an active interest in RFID particularly for item
baggage handling, rental item tagging, point of sales, Real Time Location
50
There is no doubt that RF is a hugely significant technology in most
industries, with the projected market value for global RFID systems sales of
RFID in E-commerce:
individual item level identification. This can help bridge the gap between the
customer, the order and order fulfillment process to the satisfaction of the
51
does not have the RF interface that allows contact less smart cards to be
convenient transactions and its availability in form factors other than plastic
cards - for example the inside of a watch, key fob or document. Current and
emerging applications using contact less smart card technology include transit
such as electronic passports and visas, and contact less financial payment cards.
unique ability to securely manage, store and provide access to data on the card,
52
Mutual authentication:
For applications requiring secure card access, the contact less smart
card-based device can verify that the reader is authentic and can prove its own
encrypted and communication between the contact less smart card-based device
Like contact smart cards, contact less smart card technology is extremely
chips include a variety of hardware and software capabilities that detect and
The contact less smart card's ability to process information and react to
and protect the privacy of personal information. The contact less smart card can
53
verify the authority of the information requestor and then allow access only to
authenticated and authorized information access and the strong contact less
device and data security make contact less smart cards excellent guardians of
emergency Switch. This button is great for user input, it contains 4 pins. If the
victim is in danger, by pressing the switch the gets activated along with buzzer.
LCD Background:
microcontrollers are 16x2 and 20x2 displays. This means 16 characters per line
Pin description:
55
1 = Data input
The LCD requires 3 control lines as well as either 4 or 8 I/O lines for the
data bus. The user may select whether the LCD is to operate with a 4-bit data
bus or an 8-bit data bus. If a 4-bit data bus is used the LCD will require a total
of 7 data lines (3 control lines plus the 4 lines for the data bus). If an 8-bit data
bus is used the LCD will require a total of 11 data lines (3 control lines plus the
56
The three control lines are referred to as EN, RS, and RW.
The EN line is called "Enable." This control line is used to tell the LCD
that we are sending it data. To send data to the LCD, our program should make
sure this line is low (0) and then set the other two control lines and/or put data
on the data bus. When the other lines are completely ready, bring EN high (1)
and wait for the minimum amount of time required by the LCD datasheet (this
varies from LCD to LCD), and end by bringing it low (0) again.
The RS line is the "Register Select" line. When RS is low (0), the data
position cursor, etc.). When RS is high (1), the data being sent is text data
which should be displayed on the screen. For example, to display the letter "T"
The RW line is the "Read/Write" control line. When RW is low (0), the
information on the data bus is being written to the LCD. When RW is high (1),
the program is effectively querying (or reading) the LCD. Only one instruction
("Get LCD status") is a read command. All others are write commands--so RW
operation selected by the user). In the case of an 8-bit data bus, the lines are
referred to as DB0, DB1, DB2, DB3, DB4, DB5, DB6, and DB7.
57
Schematic:
Circuit Description:
Above is the quite simple schematic. The LCD panel's Enable and
collector / open drain output. While most Parallel Ports have internal pull-up
resistors, there is a few which don't. Therefore by incorporating the two 10K
external pull up resistors, the circuit is more portable for a wider range of
Therefore we hard wire the R/W line of the LCD panel, into write mode. This
will cause no bus conflicts on the data lines. As a result we cannot read back
the LCD's internal Busy Flag which tells us if the LCD has accepted and
Nothing fancy here. As with all the examples, I've left the power supply out.
58
We can use a bench power supply set to 5v or use an onboard +5 regulator.
SETB RW
As we mentioned above, the EN line is used to tell the LCD that we are
ready for it to execute an instruction that we've prepared on the data bus and on
the other control lines. Note that the EN line must be raised/ lowered
knowing that we are talking to it. If we don't raise/lower EN, the LCD doesn't
Thus, before we interact in any way with the LCD we will always bring
CLR EN
And once we've finished setting up our instruction with the other control
lines and data bus lines, we'll always bring this line high:
59
SETB EN
The line must be left high for the amount of time required by the LCD as
EN line can be brought low the very next instruction. However, faster
create a delay while EN is held high. The number of NOPs that must be
inserted depends on the microcontroller we are using and the crystal we have
selected.
frequency of the crystal attached to the oscillator input of the LCD as well as
While it is possible to write code that waits for a specific amount of time
to allow the LCD to execute instructions, this method of "waiting" is not very
60
flexible. If the crystal frequency is changed, the software will need to be
Status" command to determine whether the LCD is still busy executing the last
instruction received.
summary, when we issue the "Get LCD Status" command the LCD will
immediately raise DB7 if it's still busy executing a command or lower DB7 to
indicate that the LCD is no longer occupied. Thus our program can query the
LCD until DB7 goes low, indicating the LCD is no longer busy. At that point
Applications:
1. Medical equipment
4. Serial terminal
5. Advertising system
6. EPOS
8. Gaming box
61
9. Security systems
1970. As the name suggests, it is the standardization group name that was
standard. This technology owns above 70% of the market share of the digital
cellular subscriber around the world. This technology was developed by using
mobile subscribers around the world in the above 210 countries. This
world. GSM is an open and digital cellular technology used for transmitting
mobile voice and data services operate at the 850MHz, 900MHz, 1800MHz,
62
GSM technology was developed as a digital system using the time
GSM digitizes and reduces the data, then sends it down through a channel with
two different streams of client data, each in its own particular time slot. The
digital system has the ability to carry 64 kbps to 120 Mbps of data rates.
There are various cell sizes in a GSM system such as macro, micro, pico,
and umbrella cells. Each cell varies as per the implementation domain. There
are five different cell sizes in a GSM network macro, micro, pico, and umbrella
cells. The coverage area of each cell varies according to the implementation
environment.
different time slots to each user on the same frequency. It can easily adapt to
data transmission and voice communication and can carry 64kbps to 120Mbps
of data rate.
63
CHAPTER-4
EXCECUTION DETAILS
design, prototyping and experimenting for artists, hackers, hobbyists, but also
many professionals. People use it as brains for their robots, to build new digital
music instruments, or to build a system that lets your house plants tweet you
when they’re dry. Arduinos (we use the standard Arduino Uno) are built around
should work)
1) Plug in your board and wait for Windows to begin it’s driver
64
3) While in the Control Panel, navigate to System and Security. Next,
click on System Once the System window is up, open the Device
Manager
4) Look under Ports (COM & LPT). You should see an open port
5) If there is no COM & LPT section, look under ‘Other Devices’ for
‘Unknown Device’
download (not the “FTDI USB Drivers” sub-directory). If you cannot see the
.inf file, it is probably just hidden. You can select the ‘drivers’ folder with the
65
After following the appropriate steps for your software install, we are now
Select the type of Arduino board you’re using: Tools > Board > your board
Open the Blink example sketch by going to: File > Examples >1.Basics> Blink
Select the serial/COM port that your Arduino is attached to: Tools > Port
>COMxx
66
Select the serial port that your Arduino is attached to: Tools > Port
If you’re not sure which serial device is your Arduino, take a look at the
available ports, then unplug your Arduino and look again. The one that
With your Arduino board connected and the Blink sketch open, press the
‘Upload’ button
After a second, you should see some LEDs flashing on your Arduino,
followed by the message ‘Done Uploading’ in the status bar of the Blink
sketch.
67
CHAPTER-5
5.1 RESULTS
First enrol the voters finger and save the fingerprint by giving id.Then
save their finger print. After given id voter place their finger on fingerprint
module to scan. During the enrolling place finger print and by using RFID card
we should store data of the voter .in voting process if the finger print not
caste a vote. Sob by scanning the RFID code and place finger print of the voter
on finger print module if it is matched it allows voter to caste the vote. Then
voter should select a party to their preference from the party list. If the party
once selected then it cannot be changed. then at last it shows the result that how
a single vote for a single person. This product is a prototype. The process of
casting vote using fingerprint will further help us to fulfill our purpose
68
5.2 HARDWARE VIEW
69
CHAPTER-6
ADVANTAGES
1. Cost effective
4. It is economical
voting.
DISADVANTAGES
character error.
70
CHAPTER-7
APPLICATIONS
This project can be used as a voting machine to prevent rigging, during the
1. Fast track voting which could be used in small scale elections, like
meeting.
71
CHAPTER-8
CONCLUSION
In total, this system overcomes most of the problems faced during the
voting period by the paper ballot system. The efficiency of this system depends
upon the web interface, its usability. This will surely ensure a safer voting
developing nation. In this paper, the proposed Fingerprint based voting system
which is better and faster than previous systems. The new system prevents
integrity of the voting process. The system also prevents multiple votes by the
same person and checks eligibility of the voter. It also allows a person to vote
from anywhere provided that the voter is within electoral limits. Fingerprint
based voting system has provided chance to avoid invalid votes, It reduce the
polling time, Easy to carrying to polling center from the polling box, Reduce
the staff of voting center, It provide easy and accurate counting without any
overcomes most of the problems faced during the voting period by the paper
ballot system. The efficiency of this system depends upon the web interface, its
usability. This will surely ensure a safer voting method which is very much
what is required for a healthy growth of a developing nation. In this paper, the
72
proposed Fingerprint based voting system which is better and faster than
previous systems. The new system prevents access to illegal voters, provides
ease of use, transparency and maintains integrity of the voting process. The
system also prevents multiple votes by the same person and checks eligibility
of the voter. It also allows a person to vote from anywhere provided that the
voter is within electoral limits. Fingerprint based voting system has provided
chance to avoid invalid votes, It reduce the polling time, Easy to carrying to
polling center from the polling box, Reduce the staff of voting center, It
Machine (EVM) which helps in free and fair way of conducting elections
73
CHAPTER-9
REFFERENCES
Lecture 2014.
2008.
Commission of India.
74