This paper reveals about the design and development of smart card for automated toll collection through number plate recognition. Since it is simpler and faster than the traditional token based ticket system, it has all the potential to replace the existing system. Moreover, it saves users valuable time by reducing the queue length in front of the toll counter. It is used to pay the amount automatically and open & close the toll gate automatically. We aim to reduce the time consumed to pay the toll gate amount and also to help the police department to trace the vehicle, incase if it was stolen or used for any illegal activities. As well as we are going to increase the security features in the toll gate because now a day's toll gate are the entrance to the main cities. If the Vehicle passed before paying the money the buzzer will automatically ring & the alert will be given to the police also. If any vehicle carries suspicious gas means the buzzer will ring so improved security than the existing systems. The entire system is developed as hardware based system using SPARTAN3 FPGA kit and associated devices. The software for this system has been developed using VHDL language developed in the Xilinx tool.
Automated Toll Collection System used for collecting tax automatically from the moving vehicle. Here we do the identification with the help of radio
frequency. A vehicle will hold an RFID tag. This tag contains unique identification number. This unique identification number will be assigned by
RTO or traffic governing authority. Reader will be strategically placed at toll collection center. Whenever the vehicle passes the toll collection center,
the tax amount will be deducted automatically from his prepaid balance. New balance will be updated in his account. Incase if one has insufficient
balance, his updated balance will be negative one and the warning message will be send to the user. As vehicles don‟t have to stop in a queue, it
assures time saving, fuel conservation, avoid traffic congestions and also contributing in saving of money.
Automated Toll Collection System used for collecting tax automatically from the moving vehicle. Here we do the identification with the help of radio
frequency. A vehicle will hold an RFID tag. This tag contains unique identification number. This unique identification number will be assigned by
RTO or traffic governing authority. Reader will be strategically placed at toll collection center. Whenever the vehicle passes the toll collection center,
the tax amount will be deducted automatically from his prepaid balance. New balance will be updated in his account. Incase if one has insufficient
balance, his updated balance will be negative one and the warning message will be send to the user. As vehicles don‟t have to stop in a queue, it
assures time saving, fuel conservation, avoid traffic congestions and also contributing in saving of money.
Nowadays vehicles are important in our day to day life. With ever increasing number of vehicles, the major issue faced nowadays is the increase in traffic and inconvenience of the traveler to pay toll in the toll stations. Ez-pass is used to collect toll electronically using a QR Code. Thereby it can significantly improve the dispose efficiency of the toll station and the traffic ability of the toll road.
All people want to improve their quality of life and this can be achieved only by technology. Many problems are faced by daily vehicle users in payment based parking systems, both in open air parking system where the parking is done along the streets and in closed parking system where parking is done in closed infrastructure added with entry and exit points. Delays (long queues) and accuracy in fares are the main problems faced by the users. Many solutions are proposed to solve this problem but all have their own drawbacks. In this paper a new solution is proposed based on Near Field Communication (NFC) which makes the payment system reliable and easy.
Project Report- RFID Based Automated Toll Collection System using Arduino @ A...Aman Gupta
For free download Subscribe to https://www.youtube.com/channel/UCTfiZ8qwZ_8_vTjxeCB037w and Follow https://www.instagram.com/fitrit_2405/ then please contact +91-9045839849 over WhatsApp.
ATCS usually known as “Automated Toll Collection System” is a new technology for collecting toll in a faster and more efficient way. It is a great alternative to long waiting at manual toll plazas. In order to overcome the wastage of time and fuel at same time we have come up with a concept of RFID based automated toll collection system using Arduino. RFID stands for Radio Frequency Identification; these cards are unique identities provided to every vehicle by Registration Office at each city. Whenever a vehicle with such Unique ID reaches the toll plaza, the RFID card reader attached on the toll plaza gate reads the card and transfers the unique ID to Arduino ATmega 328. Accordingly, the processor works and deducts a fixed money from the prepaid card. If the card’s ID is valid and has sufficient balance, the processor will command the DC motor to start and open the gate, letting the vehicle to pass. On passing from the gate the screen will show the deducted and current balance of the card. If the card is not valid or low in balance, it will prompt to move the vehicle to manual toll collection lane. Furthermore, a message will be sent to the owner’s registered mobile number with the same details along with the location of the toll booth.
Electronic Ticketing System for Public Transport System using NFC TechnologyPravin Dorugade
In this the main aim is to introduce a new ticketing system for the BUS system. This system will make use of the Near Field Communication technology along with the mobile phone (Android and GPRS Enabled) to carry out the ticketing transactions. The NFC Ticketing application combines latest-generation technologies such as Near Filed Communication (NFC). The Near Filed Communication (NFC) is used in such service which integrates mobile tickets and mobile payments. By using this technology, travel card readers cannot distinguish the mobile phone from travel card. Mobile phone works as a travel card even when battery is depleted.
Abstract Finding a parking space in most metropolitan areas, during the rush hours, is difficult for drivers. The problem arises from not knowing where is the empty space; even if it is known, many vehicles may pursue very limited parking spaces to cause serious traffic congestion. In this project, a prototype of smart parking (S-Park) system is designed and implemented that allows drivers to effectively find and reserve the empty parking spaces using an android application connected to Internet. By periodically polling the parking status from the sensor networks deployed in parking lots, the reservation status is affected by the change of physical parking status. The drivers are allowed to access the server on their Android smartphones. The proposed smart parking policy has the potential to solve the problems of parking systems, as well as reduce traffic congestion caused by parking searching thus making the system two-way efficient, that is, cost wise and time wise. Key Words: Smart parking system, Android based application, Embedded server, One time password.
Nowadays vehicles are important in our day to day life. With ever increasing number of vehicles, the major issue faced nowadays is the increase in traffic and inconvenience of the traveler to pay toll in the toll stations. Ez-pass is used to collect toll electronically using a QR Code. Thereby it can significantly improve the dispose efficiency of the toll station and the traffic ability of the toll road.
All people want to improve their quality of life and this can be achieved only by technology. Many problems are faced by daily vehicle users in payment based parking systems, both in open air parking system where the parking is done along the streets and in closed parking system where parking is done in closed infrastructure added with entry and exit points. Delays (long queues) and accuracy in fares are the main problems faced by the users. Many solutions are proposed to solve this problem but all have their own drawbacks. In this paper a new solution is proposed based on Near Field Communication (NFC) which makes the payment system reliable and easy.
Project Report- RFID Based Automated Toll Collection System using Arduino @ A...Aman Gupta
For free download Subscribe to https://www.youtube.com/channel/UCTfiZ8qwZ_8_vTjxeCB037w and Follow https://www.instagram.com/fitrit_2405/ then please contact +91-9045839849 over WhatsApp.
ATCS usually known as “Automated Toll Collection System” is a new technology for collecting toll in a faster and more efficient way. It is a great alternative to long waiting at manual toll plazas. In order to overcome the wastage of time and fuel at same time we have come up with a concept of RFID based automated toll collection system using Arduino. RFID stands for Radio Frequency Identification; these cards are unique identities provided to every vehicle by Registration Office at each city. Whenever a vehicle with such Unique ID reaches the toll plaza, the RFID card reader attached on the toll plaza gate reads the card and transfers the unique ID to Arduino ATmega 328. Accordingly, the processor works and deducts a fixed money from the prepaid card. If the card’s ID is valid and has sufficient balance, the processor will command the DC motor to start and open the gate, letting the vehicle to pass. On passing from the gate the screen will show the deducted and current balance of the card. If the card is not valid or low in balance, it will prompt to move the vehicle to manual toll collection lane. Furthermore, a message will be sent to the owner’s registered mobile number with the same details along with the location of the toll booth.
Electronic Ticketing System for Public Transport System using NFC TechnologyPravin Dorugade
In this the main aim is to introduce a new ticketing system for the BUS system. This system will make use of the Near Field Communication technology along with the mobile phone (Android and GPRS Enabled) to carry out the ticketing transactions. The NFC Ticketing application combines latest-generation technologies such as Near Filed Communication (NFC). The Near Filed Communication (NFC) is used in such service which integrates mobile tickets and mobile payments. By using this technology, travel card readers cannot distinguish the mobile phone from travel card. Mobile phone works as a travel card even when battery is depleted.
Abstract Finding a parking space in most metropolitan areas, during the rush hours, is difficult for drivers. The problem arises from not knowing where is the empty space; even if it is known, many vehicles may pursue very limited parking spaces to cause serious traffic congestion. In this project, a prototype of smart parking (S-Park) system is designed and implemented that allows drivers to effectively find and reserve the empty parking spaces using an android application connected to Internet. By periodically polling the parking status from the sensor networks deployed in parking lots, the reservation status is affected by the change of physical parking status. The drivers are allowed to access the server on their Android smartphones. The proposed smart parking policy has the potential to solve the problems of parking systems, as well as reduce traffic congestion caused by parking searching thus making the system two-way efficient, that is, cost wise and time wise. Key Words: Smart parking system, Android based application, Embedded server, One time password.
Electronic Toll Collection System based on Radio Frequency Identification Sys...IJECEIAES
This papaer entitled electronic toll collection system based on Radio Frequncy Identification System explained in detail based on current issue at toll collection system. There are some obstacles faced every day where the users spent their valuable time in queue at tollgate due to traffic congestion as well as using traditional manual method in most existing toll ETC system to collect toll from road users. Besides that, the barrier design where each vehicle stop waiting until barrier lift which consider source of time delay. To tackle stated problems, an electronic toll collection system is proposed which based on RFID technology. The integrated system consists of two main sections, electronic sides where all input data received from while database management office is where all necessary information stored. To compare the current ETC system, in this research elaborated internet of things where all data transmit through cloud and then to the main office in real time. Not only that, there is some enhancement based on barrier design where, gate is remained open for all vehicles with sufficient tags without requiring to stop to eliminate time delay.By check system throughput compare to existing toll systems, various tests have been carried out in different method where proposed system throughput much higher percentage the current system.
Application of rfid technology electronic license plate in smart transportati...Antenna Manufacturer Coco
As the size of the city expands and people's living standards improve, the number of vehicles on the road becomes more and more. This not only increases traffic pressure but also imposes higher requirements on the management of vehicles. Is there any new technology to solve these problems? Of course, it is the smart electronic license plate.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Toll gate Automation and Vehicle Tracking is designed to automatically keep track of the vehicle’s movement, record the time and the details like Owner’s name, date of registration, vehicle model etc. This system is very useful for automatic vehicle tracking, time management and also for automation of Toll gate. This paper explains the implementation of Toll Gate Automation which is a step towards improving the Tracking & monitoring of vehicles, traveling in predetermined routes. In this system, a computerized system automatically identifies an approaching vehicle and records the vehicle number & Time. If the vehicle belongs to the authorized person/group, it automatically opens the Toll Gate and a predetermined amount is automatically deducted from its account.
Final Year Engineering Project Title List for Electronics & Electrical Branch...zettanetworks
Zetta Networks is a Final Year Project Training in Bangalore India has been relentlessly working to bridge the gap between potential Employers and the skillful employees in the field of Information Technology by selecting, Project training and placing IT professionals nationwide.
Fingerprint Based Smart Pay and Accident Alert SystemIJTET Journal
Over the last few decades, the usage of public transportation is attracted by most of the people. The increase in passenger count has made ticket ending and vehicular monitoring a complex task. In addition to this, frequent accidents occur due to overload of passengers and these accidents are not cognizant to the rescuers. Therefore advancement in technology could be instigated to overcome these issues. This system is an advanced approach to the existing system of ticketing through RFID cards. The fingerprint based smart pay and accident alert is the proposed system wherein ticketing is automated and the travelling cost is debited from the concerned bank or the suggested system where the user holds an account. To avoid illegal entry, the passenger count is monitored with the effective utilization of IR sensor. The ignition of the vehicle is stopped whenever the passenger count exceeds the maximum value. The accident alert system finds its application in the proposed methodology with the support of GPS and GSM. Whenever an accident occurs, the location of the vehicle will be sent as a message with a link provided to the emergency vehicles, control room and a private message will be sent to the trusted contact of each of the passengers. Thereby many fellow lives could be saved. This system would also be an excellent replacement to the traditional ticketing system.
Due to availability of internet and evolution of embedded devices, Internet of things can be useful to contribute in energy domain. The Internet of Things (IoT) will deliver a smarter grid to enable more information and connectivity throughout the infrastructure and to homes. Through the IoT, consumers, manufacturers and utility providers will come across new ways to manage devices and ultimately conserve resources and save money by using smart meters, home gateways, smart plugs and connected appliances. The future smart home, various devices will be able to measure and share their energy consumption, and actively participate in house-wide or building wide energy management systems. This paper discusses the different approaches being taken worldwide to connect the smart grid. Full system solutions can be developed by combining hardware and software to address some of the challenges in building a smarter and more connected smart grid.
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
In the era of computing technology, Internet of Things (IoT) devices are now popular in each and every domains like e-governance, e-Health, e-Home, e-Commerce, and e-Trafficking etc. Iot is spreading from small to large applications in all fields like Smart Cities, Smart Grids, Smart Transportation. As on one side IoT provide facilities and services for the society. On the other hand, IoT security is also a crucial issues.IoT security is an area which totally concerned for giving security to connected devices and networks in the IoT .As, IoT is vast area with usability, performance, security, and reliability as a major challenges in it. The growth of the IoT is exponentially increases as driven by market pressures, which proportionally increases the security threats involved in IoT The relationship between the security and billions of devices connecting to the Internet cannot be described with existing mathematical methods. In this paper, we explore the opportunities possible in the IoT with security threats and challenges associated with it.
In today’s emerging world of Internet, each and every thing is supposed to be in connected mode with the help of billions of smart devices. By connecting all the devises used in our day to day life, make our life trouble less and easy. We are incorporated in a world where we are used to have smart phones, smart cars, smart gadgets, smart homes and smart cities. Different institutes and researchers are working for creating a smart world for us but real question which we need to emphasis on is how to make dumb devises talk with uncommon hardware and communication technology. For the same what kind of mechanism to use with various protocols and less human interaction. The purpose is to provide the key area for application of IoT and a platform on which various devices having different mechanism and protocols can communicate with an integrated architecture.
Study on Issues in Managing and Protecting Data of IOTijsrd.com
This paper discusses variety of issues for preserving and managing data produced by IoT. Every second large amount of data are added or updated in the IoT databases across the heterogeneous environment. While managing the data each phase of data processing for IoT data is exigent like storing data, querying, indexing, transaction management and failure handling. We also refer to the problem of data integration and protection as data requires to be fit in single layout and travel securely as they arrive in the pool from diversified sources in different structure. Finally, we confer a standardized pathway to manage and to defend data in consistent manner.
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
Today with advancement in Information Communication Technology (ICT) the way the education is being delivered is seeing a paradigm shift from boring classroom lectures to interactive applications such as 2-D and 3-D learning content, animations, live videos, response systems, interactive panels, education games, virtual laboratories and collaborative research (data gathering and analysis) etc. Engineering is emerging with more innovative solutions in the field of education and bringing out their innovative products to improve education delivery. The academic institutes which were once hesitant to use such technology are now looking forward to such innovations. They are adopting the new ways as they are realizing the vast benefits of using such methods and technology. The benefits are better comprehensibility, improved learning efficiency of students, and access to vast knowledge resources, geographical reach, quick feedback, accountability and quality research. This paper focuses on how engineering can leverage the latest technology and build a collaborative learning environment which can then be integrated with the national e-learning grid.
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
In the world more than 15% people are living with disability that also include children below age of 10 years. Due to lack of independent support services specially abled (handicap) people overly rely on other people for their basic needs, that excludes them from being financially and socially active. The Internet of Things (IoT) can give support system and a better quality of life as well as participation in routine and day to day life. For this purpose, the future solutions for current problems has been introduced in this paper. Daunting challenges have been considered as future research and glimpse of the IoT for specially abled person is given in the paper.
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
Internet of things (IoT) is the most powerful invention and if used in the positive direction, internet can prove to be very productive. But, now a days, due to the social networking sites such as Face book, WhatsApp, twitter, hike etc. internet is producing adverse effects on the student life, especially those students studying at college Level. As it is rightly said, something which has some positive effects also has some of the negative effects on the other hand. In this article, we are discussing some adverse effects of IoT on student’s life.
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
The use of information and communications technology (ICT) in education is a relatively new phenomenon and it has been the educational researchers' focus of attention for more than two decades. Educators and researchers examine the challenges of using ICT and think of new ways to integrate ICT into the curriculum. However, there are some barriers for the teachers that prevent them to use ICT in the classroom and develop supporting materials through ICT. The purpose of this study is to examine the high school English teachers’ perceptions of the factors discouraging teachers to use ICT in the classroom.
In recent years usage of private vehicles create urban traffic more and more crowded. As result traffic becomes one of the important problems in big cities in all over the world. Some of the traffic concerns are traffic jam and accidents which have caused a huge waste of time, more fuel consumption and more pollution. Time is very important parameter in routine life. The main problem faced by the people is real time routing. Our solution Virtual Eye will provide the current updates as in the real time scenario of the specific route. This research paper presents smart traffic navigation system, based on Internet of Things, which is featured by low cost, high compatibility, easy to upgrade, to replace traditional traffic management system and the proposed system can improve road traffic tremendously.
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
In this work there is illustrated an ontological model of educational programs in computer science for bachelor and master degrees in Computer science and for master educational program “Computer science as second competence†by Tempus project PROMIS.
Understanding IoT Management for Smart Refrigeratorijsrd.com
Lately the concept of Internet of Things (IoT) is being more elaborated and devices and databases are proposed thereby to meet the need of an Internet of Things scenario. IoT is being considered to be an integral part of smart house where devices will be connected to each other and also react upon certain environmental input. This will eventually include the home refrigerator, air conditioner, lights, heater and such other home appliances. Therefore, we focus our research on the database part for such an IoT’ fridge which we called as smart Fridge. We describe the potentials achievable through a database for an IoT refrigerator to manage the refrigerator food and also aid the creation of a monthly budget of the house for a family. The paper aims at the data management issue based on a proposed design for an intelligent refrigerator leveraging the sensor technology and the wireless communication technology. The refrigerator which identifies products by reading the barcodes or RFID tags is proposed to order the required products by connecting to the Internet. Thus the goal of this paper is to minimize human interaction to maintain the daily life events.
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
Double wishbone designs allow the engineer to carefully control the motion of the wheel throughout suspension travel. 3-D model of the Lower Wishbone Arm is prepared by using CAD software for modal and stress analysis. The forces and moments are used as the boundary conditions for finite element model of the wishbone arm. By using these boundary conditions static analysis is carried out. Then making the load as a function of time; quasi-static analysis of the wishbone arm is carried out. A finite element based optimization is used to optimize the design of lower wishbone arm. Topology optimization and material optimization techniques are used to optimize lower wishbone arm design.
A Review: Microwave Energy for materials processingijsrd.com
Microwave energy is a latest largest growing technique for material processing. This paper presents a review of microwave technologies used for material processing and its use for industrial applications. Advantages in using microwave energy for processing material include rapid heating, high heating efficiency, heating uniformity and clean energy. The microwave heating has various characteristics and due to which it has been become popular for heating low temperature applications to high temperature applications. In recent years this novel technique has been successfully utilized for the processing of metallic materials. Many researchers have reported microwave energy for sintering, joining and cladding of metallic materials. The aim of this paper is to show the use of microwave energy not only for non-metallic materials but also the metallic materials. The ability to process metals with microwave could assist in the manufacturing of high performance metal parts desired in many industries, for example in automotive and aeronautical industries.
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
With an expontial growth of World Wide Web, there are so many information overloaded and it became hard to find out data according to need. Web usage mining is a part of web mining, which deal with automatic discovery of user navigation pattern from web log. This paper presents an overview of web mining and also provide navigation pattern from classification and clustering algorithm for web usage mining. Web usage mining contain three important task namely data preprocessing, pattern discovery and pattern analysis based on discovered pattern. And also contain the comparative study of web mining techniques.
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
Application of FACTS controller called Static Synchronous Compensator STATCOM to improve the performance of power grid with Wind Farms is investigated .The essential feature of the STATCOM is that it has the ability to absorb or inject fastly the reactive power with power grid . Therefore the voltage regulation of the power grid with STATCOM FACTS device is achieved. Moreover restoring the stability of the power system having wind farm after occurring severe disturbance such as faults or wind farm mechanical power variation is obtained with STATCOM controller . The dynamic model of the power system having wind farm controlled by proposed STATCOM is developed . To validate the powerful of the STATCOM FACTS controller, the studied power system is simulated and subjected to different severe disturbances. The results prove the effectiveness of the proposed STATCOM controller in terms of fast damping the power system oscillations and restoring the power system stability.
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
Now a days solar harvesting is more popular. As the popularity become higher the material quality and solar tracking methods are more improved. There are several factors affecting the solar system. Major influence on solar cell, intensity of source radiation and storage techniques The materials used in solar cell manufacturing limit the efficiency of solar cell. This makes it particularly difficult to make considerable improvements in the performance of the cell, and hence restricts the efficiency of the overall collection process. Therefore, the most attainable maximum power point tracking method of improving the performance of solar power collection is to increase the mean intensity of radiation received from the source used. The purposed of tracking system controls elevation and orientation angles of solar panels such that the panels always maintain perpendicular to the sunlight. The measured variables of our automatic system were compared with those of a fixed angle PV system. As a result of the experiment, the voltage generated by the proposed tracking system has an overall of about 28.11% more than the fixed angle PV system. There are three major approaches for maximizing power extraction in medium and large scale systems. They are sun tracking, maximum power point (MPP) tracking or both.
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
In day today's relevance, it is mandatory to device the usage of diesel in an economic way. In present scenario, the very low combustion efficiency of CI engine leads to poor performance of engine and produces emission due to incomplete combustion. Study of research papers is focused on the improvement in efficiency of the engine and reduction in emissions by adding ethanol in a diesel with different blends like 5%, 10%, 15%, 20%, 25% and 30% by volume. The performance and emission characteristics of the engine are tested observed using blended fuels and comparative assessment is done with the performance and emission characteristics of engine using pure diesel.
Study and Review on Various Current Comparatorsijsrd.com
This paper presents study and review on various current comparators. It also describes low voltage current comparator using flipped voltage follower (FVF) to obtain the single supply voltage. This circuit has short propagation delay and occupies a small chip area as compare to other current comparators. The results of this circuit has obtained using PSpice simulator for 0.18 μm CMOS technology and a comparison has been performed with its non FVF counterpart to contrast its effectiveness, simplicity, compactness and low power consumption.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Overview on Edible Vaccine: Pros & Cons with Mechanism
A Smart Approach to Number Plate Recognition in Tollgate System using FPGA
1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 201
A Smart Approach to Number Plate Recognition in Tollgate System
Using FPGA
S. Lokesh1
N. Ashok Kumar2
1
M. Tech Final Year Student 2
Associate Professor
1
Avanthi’s Scientific Technological & Research Academy, Telangana
Abstract— This paper reveals about the design and
development of smart card for automated toll collection
through number plate recognition. Since it is simpler and
faster than the traditional token based ticket system, it has
all the potential to replace the existing system. Moreover, it
saves users valuable time by reducing the queue length in
front of the toll counter. It is used to pay the amount
automatically and open & close the toll gate automatically.
We aim to reduce the time consumed to pay the toll gate
amount and also to help the police department to trace the
vehicle, incase if it was stolen or used for any illegal
activities. As well as we are going to increase the security
features in the toll gate because now a day’s toll gate are the
entrance to the main cities. If the Vehicle passed before
paying the money the buzzer will automatically ring & the
alert will be given to the police also. If any vehicle carries
suspicious gas means the buzzer will ring so improved
security than the existing systems. The entire system is
developed as hardware based system using SPARTAN3
FPGA kit and associated devices. The software for this
system has been developed using VHDL language
developed in the Xilinx tool.
Key words: Dilation, Segmentation, Erosion, ANPR, RFID
I. INTRODUCTION
Toll gates are usually considered an inconvenience by
travellers not only for the cost of the toll, but also for the
delays at toll booths, toll roads and bridges. In order to
ensure a steady flow of traffic, both staff and drivers require
easy access to an efficient communication system covering
the specific requirements of toll gates. In this way, hitches
can be resolved while maintaining a convenient toll gate
system. Security systems can also be added, which will
further enhance the system.
The toll gate system using ANPR technology
enables the electronic collection of toll payments. This
technology has been studied by researchers and applied in
various highways, bridges, and tunnels requiring such a
process. This system is capable of determining if the car is
registered or not, and then informing the authorities of toll
payment violations, debits etc. The most obvious advantage
of this technology is the opportunity to eliminate congestion
in tollbooths, especially during festive seasons when traffic
tends to be heavier than normal. It is also a method by which
to curb complaints from motorists regarding the
inconveniences involved in manually making payments at
the tollbooths. Other than this obvious advantage is that it
could also benefit the toll operators.
II. IMPLEMENTATION
A. Existing System
The existing system consists of a microcontroller, RFID
reader, RFID Tag, stepper motor, and bill printer. The reader
retrieves the information about the ID number and identifies
the vehicle. Then for the tax to be collected the bill is
printed at the time of exit. The stepper motor here is used to
open and close the gate automatically.
In the existing system, though there is an RFID
reader the tax collection is manual and not automated. There
are no security features such as identifying a stolen vehicle
etc. The toll tax which is collected for all the vehicles is the
same and the tax collected is not based on the load carried
by the vehicle.
1) Drawbacks of Existing System:
Sensitive to noise and it may generate error during
detection
Computationally complex and Time consuming
B. Proposed Technique
The proposed system makes sure that the traffic at the toll
gates is streamlined and security is also present. The tax
which is collected is based on the load carried by the
vehicle. Through this system we can also identify stolen
vehicles.
Toll on each vehicle will be charged proportional
to its weight/load & at the same time vehicle will be scanned
for unlawful material. For justifying our concept we are
using a gas sensor.
Weight will be calculated using a load cell. Load
cell & proximity sensor output will be given to an ADC0809
which digitized signals.
Weight & its corresponding toll & the amount paid
by vehicle owner will be calculated using a FPGA.
Programming language used is VHDL for hardware of these
operations.
Weight of the vehicle & its toll both
simultaneously will be displayed on the PC screen.
The vehicle owner/driver pays toll according to
displayed amount on the monitoring screen will be reduced
from their online account.
If in case owner/driver tried to escape with
unwanted material & try to break the gate 1 a siren will buzz
at the nearest security center & emergency heavy gate 2 will
be pulled down automatically using RF module & vehicle
will be blocked.
In such case a strict action will be taken over
blocked vehicle.
Being the toll is charged depending on the weight
sensed, no customer have the loss of even carrying a vacant
vehicle.
Due to the use of RF receiver & transmitter
wireless communication has become possible due to which
the next door can be closed in order to avoid the cheating.
The proximity sensor used here detects if any
unauthorized material is being passed via the vehicle.
RF transmitter & receiver used have limited range
up to 30 meters in our project. This range will also be
increased in future developments as the range of transmitter
& receiver will be increased.
2. A Smart Approach to Number Plate Recognition in Tollgate System Using FPGA
(IJSRD/Vol. 2/Issue 08/2014/048)
All rights reserved by www.ijsrd.com 202
III. WORKING PRINCIPLE
AUTOMATIC license plate recognition (LPR) plays an
important role in numerous applications such as unattended
parking lots security control of restricted areas traffic law
enforcement congestion pricing and automatic toll
collection. Due to different working environments, LPR
techniques vary from application to application. Pointable
cameras create dynamic scenes when they move, pan or
zoom. A dynamic scene image may contain multiple license
plates or no license plate at all. Moreover, when they do
appear in an image, license plates may have arbitrary sizes,
orientations and positions. And, if complex backgrounds are
involved, detecting license plates can become quite a
challenge. Typically, an LPR process consists of two main
stages (1) locating license plates and (2) identifying license
numbers. In the first stage, license plate candidates are
determined based on the features of license plates. Features
commonly employed have been derived from the license
plate format and the alphanumeric characters constituting
license numbers. The features regarding License plate
format include shape, symmetry height-to width ratio color
texture of grayness spatial frequency and variance of
intensity values Character features include line blob the sign
transition of gradient magnitudes, the aspect ratio of
characters the distribution of intervals between characters
and The alignment of characters. In reality, a small set of
robust, reliable, and easy-to-detect object features would be
adequate.
The license plate candidates determined in the
locating stage are examined in the license number
identification stage. There are two major tasks involved in
the identification stage, Number separation and Number
recognition. Number separation has in the past been
accomplished by such techniques as projection morphology
relaxation labeling, connected components and blob
coloring. Since the projection method assumes the
orientation of a license plate is known and the morphology
method requires knowing the sizes of characters. A hybrid
of connected components and blob coloring techniques is
considered for character separation. Support Vector machine
Markov processes and finite automata these methods can be
broadly classified into iterative and Non-iterative
approaches. There is a tradeoff between these two Groups of
approaches; iterative methods achieve better accuracy, but at
the cost of increased time complexity. For this, we
developed our own character recognition technique, which
is based on the disciplines of both artificial neural networks
and mechanics.
IV. IMPLEMENTATION
Figure 1 shows the proposed system. The ANPR systems
compare the input number plate image with the database. PC
consists of the entire database which is updated periodically.
Now after reading the information, PC compares the data in
the database and allows the access accordingly by
opening/closing the gate. This data is used to print a daily or
monthly bill for toll collection from the vehicles. This way
even stolen vehicle can be also identified.
The pressure of the vehicle is obtained using the
pressure sensor and accordingly the pressure of the vehicle
is displayed on the display. A counter is used to count the
number of vehicles. The amount on the basis of weight &
the count of vehicles is also displayed on the screen. The
amount to be paid is automatically deduced from the
respective bank account.
Fig. 1: Block Diagram of proposed system
If a vehicle carries any kind of gas that shouldn’t
be carried, the gas sensor detects the gas in the vehicle. In
case if there is any kind of gas that is detected, the RF
transmitter is used to alert the nearby police station and an
alarm is enabled to alert the surrounding areas. Subsequently
motor 1 is used to close the gate and simultaneously motor 2
is used to pull up the spikes in order to puncture the vehicle.
The flowchart for the entire process is shown in figure 3.2
Fig. 2: Flowchart for the proposed system
3. A Smart Approach to Number Plate Recognition in Tollgate System Using FPGA
(IJSRD/Vol. 2/Issue 08/2014/048)
All rights reserved by www.ijsrd.com 203
Fig. 3: Proposed ANPR System
V. TECHNICAL DETAILS
A. Segmentation – License Plate detection
The goal of image segmentation is to cluster pixels into
salient image regions, i.e., regions corresponding to
individual surfaces, objects, or natural parts of objects. In
computer vision segmentation refers to the process of
partitioning a digital image to multiple segments. The goal
of segmentation is to simplify and/or change the
representation of an image into something that is more
meaningful and easier to analyze Image segmentation is
typically used to locate objects and boundaries (lines,
curves, etc.) in images. More precisely, image segmentation
is the process of assigning a label to every pixel in an image
such that pixels with the same label share certain visual
characteristics.
The result of image segmentation is a set of
segments that collectively cover the entire image, or a set of
contours extracted from the image. Each of the pixels in a
region are similar with respect to some characteristic or
computed property, such as color, intensity, or texture,
Adjcent regions are significantly different with respect to
the same characteristics.
Mathematical morphology (MM) is a theory and
technique for the analysis and processing of geometrical
structures, based on set theory, lattice theory, topology, and
random functions. MM is most commonly applied to digital
images, but it can be employed as well on graphs, surface
meshes, solids, and many other spatial structures.
MM was originally developed for binary images,
and was later extended to grayscale functions and images.
The subsequent generalization to complete lattices is widely
accepted today as MM's theoretical foundation.
The basic idea in binary morphology is to probe an
image with a simple, pre-defined shape, drawing
conclusions on how this shape fits or misses the shapes in
the image. This simple "probe" is called structuring element,
and is itself a binary image (i.e., a subset of the space or
grid).
Here are some examples of widely used structuring
elements (denoted by B):
Let ; B is an open disk of radius r, centered
at the origin.
Let ; B is a 3x3 square, that is, B={(-1,-1),
(-1,0), (-1,1), (0,-1), (0,0), (0,1), (1,-1), (1,0),
(1,1)}.
Let ; B is the "cross" given by: B={(-1,0),
(0,-1), (0,0), (0,1), (1,0)}.
B. Basic operators
The basic operations are shift-invariant (translation
invariant) operators strongly related to Minkowski addition.
Let E be a Euclidean space or an integer grid, and A a
binary image in E.
1) Erosion
Fig. (3): Erosion illustration
The erosion of the dark-blue square by a disk,
resulting in the light-blue square.
The erosion of the binary image A by the
structuring element B is defined by:
Where Bz is the translation of B by the vector z,
i.e.,
Example application: Assume we have received a
fax of a dark photocopy. Everything looks like it was written
with a pen that is bleeding. Erosion process will allow
thicker lines to get skinny and detect the hole inside the
letter "o".
2) Dilation
Fig 4: Dilation illustration
The dilation of the dark-blue square by a disk,
resulting in the light-blue square with rounded corners.
The dilation of A by the structuring element B is
defined by:
The dilation is commutative, also given by:
If B has a center on the origin, as before, then the
dilation of A by B can be understood as the locus of the
points covered by B when the center of B moves inside A.
In the above example, the dilation of the square of side 10
by the disk of radius 2 is a square of side 14, with rounded
corners, centered at the origin. The radius of the rounded
corners is 2.
Example application: Dilation is the opposite of the
erosion. Figures that are very lightly drawn get thick when
"dilated". Easiest way to describe it is to imagine the same
fax/text is written with a thicker pen.
3) Opening
The opening of the dark-blue square by a disk, resulting in
the light-blue square with round corners.
Fig. 5: Opening illustration
4. A Smart Approach to Number Plate Recognition in Tollgate System Using FPGA
(IJSRD/Vol. 2/Issue 08/2014/048)
All rights reserved by www.ijsrd.com 204
The opening of A by B is obtained by the erosion
of A by B, followed by dilation of the resulting image by B:
Example application: Let's assume someone has
written a note on a non-soaking paper that writing looks like
it is growing tiny hairy roots all over. Opening essentially
removes the outer tiny "hairline" leaks and restores the text.
The side effect is that it rounds off things. The sharp edges
start to disappear.
4) Closing
The closing of the dark-blue shape (union of two squares)
by a disk, resulting in the union of the dark-blue shape and
the light-blue areas.
Fig. 6: Closing illustration
The closing of A by B is obtained by the dilation of
A by B, followed by erosion of the resulting structure by B:
The closing can also be obtained by:
where Xc
denotes the complement of X relative to
E (that is, ). The above means that the
closing is the complement of the locus of translations of the
symmetric of the structuring element outside the image A.
5) Dilation and Erosion
From these two Minkowski operations we define the
fundamental mathematical morphology operations dilation
and erosion:
Dilation:
Erosion:
Where these two operations are illustrated in Figure
37 for the objects defined in Figure 35.
(A) Dilation D (A, B) (B) Erosion E (A, B)
Figure 7: A binary image containing two object
sets A and B. The three pixels in B are "color-coded" as is
their effect in the result.
While either set A or B can be thought of as an
"image", A is usually considered as the image and B is
called a structuring element. The structuring element is to
mathematical morphology what the convolution kernel is to
linear filter theory.
6) Summary of the basic operations
The results of the application of these basic operations on a
test image are illustrated below. In Figure 40 the various
structuring elements used in the processing are defined. The
value "-" indicates a "don't care". All three structuring
elements are symmetric.
Fig. 8: Structuring elements B, B1, and B2 that are 3 x 3 and
symmetric.
The results of processing are shown in Figure 9
where the binary value "1" is shown in black and the value
"0" in white.
Image A
Dilation with 2B
Erosion with 2B
Opening with 2B
Closing with 2B
H it-and-Miss with B1 and B2
Fig. 8: Examples of various mathematical morphology
operations.
The opening operation can separate objects that are
connected in a binary image. The closing operation can fill
in small holes. Both operations generate a certain amount of
smoothing on an object contour given a "smooth"
structuring element. The opening smoothes from the inside
of the object contour and the closing smoothes from the
5. A Smart Approach to Number Plate Recognition in Tollgate System Using FPGA
(IJSRD/Vol. 2/Issue 08/2014/048)
All rights reserved by www.ijsrd.com 205
outside of the object contour. The hit-and-miss example has
found the 4-connected contour pixels.
VI. RESULTS
The results obtained using our proposed system is as follows
Fig. 9: Overall Hardware
In the above figure consist of a FPGA, RF
transmitter, RF receiver, RFID Reader, gas sensor, pressure
sensor, motors and relay which are connected together. Our
project is a unmanned toll gate system which makes toll tax
to be collected automatically, provides security, and traffic
free which does not require any manual supervision. If any
vehicle is stolen are gas is carried then it immediately
alarms the surroundings and to the nearby police station in
the mean while it switches on the motor 1 and 2. Here motor
1 is a shaft and motor 2 produces spikes.
Fig. 10: Basic View
Fig. 11: After Adding The Database
Fig. 12: Segmentation
Fig. 13: After Recognition
Fig. 14: Amount and pressure chart
VII. CONCLUSION
Our system is a user friendly toll fee method which can save
time and reduce traffic congestion at toll gates and provide
solution for users to reach their destination without wastage
of time. It gives the toll authorities the flexibility to set
variable pricing for toll services and thus a fair policy of tax
collection can be followed. This way there is no loss
incurred by a person carrying a vacant vehicle. With the
hike of fuel prices in mind, consumption of fuel is also
considered here as the deceleration, acceleration and idling
is completely eliminated. Here there is no cash transaction
for the toll lanes, so cash handling is reduced. Thus
difficulties with cash handling are eliminated and this way
aid in enhanced audit control by centralizing user accounts.
Information such as vehicle count over the time of the day,
date, time etc can be obtained due to the deployment of this
technology. This helps in making decisions regarding the
pricing strategies for the toll providers. It also helps planner
to estimate the travel time that aid in designing decisions.
FUTURE ENHANCEMENT
In future the speed of the process can be increased further.
Similarly we can add an additional feature such as adding a
metal detector in order to detect the arms that are carried.
6. A Smart Approach to Number Plate Recognition in Tollgate System Using FPGA
(IJSRD/Vol. 2/Issue 08/2014/048)
All rights reserved by www.ijsrd.com 206
REFERENCES
[1] Gautier, Philippe; Gonzalez, Laurent (2011).
L'Internet des Objets.Internet, mais en mieux.
foreword by Gérald Santucci (European
commission), postword by Daniel Kaplan (FING)
and Michel Volle. Paris: AFNOR editions.ISBN
978-2-12-465316-4.
[2] Ericson White Paper, “More Than 50 Billion
Connected Devices” 284 23-3149 Uen, February
2011.
[3] Guinard D, Trifa V, Wilde E (2010c) A Resource
Oriented Architecture for the Web of Things.
Proceedings of IoT 2010, IEEE International
Conference on the Internet of Things. Tokyo, Japan
[4] D. Guinard, V. Trifa, F. Mattern, and E. Wilde.
From the Internet of Things to the Web of Things:
Resource Oriented Architecture and Best Practices.
In D. Uckelmann, M. Harrison, and F. Michahelles,
editors, Architecting the Internet of Things, chapter
5. Springer.
[5] M.Wang, C.Fan, Z.Wen, S.Li, J.Liu, "
Implementation of Internet of Things Oriented Data
Sharing Platform Based on RESTful Web Service”,
7th International Conference on Wireless
Communications, Networking and Mobile
Computing (WiCOM), 2011
[6] W. Colitti, K. Steenhaut, and N. De Caro,
“Integrating Wireless Sensor Networks with the
Web,” in Extending the Internet to Low powerand
Lossy Networks (IP+SN 2011), 2011.
[7] Ari Juels, RFID Privacy:A Technical Primer For
The Non-Technical Reader, Draft: 23 February
2005, RSA Laboratories, Bedford, MA, USA
[8] Baronti et al., 2007, ” Wireless sensor networks: A
survey on the state of the art and the 802.15.4 and
ZigBee standards”, Computer Communications 30
(2007) 1655–1695.
[9] L. Ruiz-Garcia , P. Barreiro , J.I. Robla ,
”Performance of ZigBee-Based wireless sensor
nodes for real-time monitoring of fruit logistics”,
Centro Nacional de Investigaciones Metalurgicas
(CENIM-CSIC), Avda. Gregorio del Amo, 8, 28040,
Madrid, Spain
[10]Kushalnagar, N, IPv6 over Low-Power Wireless
Personal Area Networks (6LoWPANs): Overview,
Assumptions, Problem Statement, and Goals. RFC
4919.
[11]Shelby, Z., et al. Constrained Application Protocol
(CoAP) Internet- Draft. draft-ietf-core-coap-11.
[12]Shelby & Bormann, “The Wireless Embedded
Internet” ISBN: 978-0- 470-74799-5, (c) 2009 John
Wiley & Sons Ltd
[13]Hartke, K., et al. Observing Resources in CoAP.
Internet-Draft. draftietf- core-observe-06.
[14]Gamma, E., Helm, R., Johnson, R., and J.
Vlissides,"Design Patterns:
[15]Elements of Reusable Object-Oriented Software",
Addison-Wesley, Reading, MA, USA, November
1994.
[16]Daniele Catteddu and Giles Hogben, “Cloud
Computing : Benefits, Risks and Recommendations
for Information Security”, European Network and
Information Security Agency (ENISA), 2009