SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 7, Issue 1 (Jul. - Aug. 2013), PP 42-45
www.iosrjournals.org
www.iosrjournals.org 42 | Page
The Design and Implementation of Intelligent Campus Security
Tracking System
Bhargavi Kaslikar1
, Prof. Kirti Sawlani2
1
(Student, Pursuing masters in engineering in Electronics, /Department of Electronics, K.J.Somaiya college of
Engineering / Mumbai University, India)
2
(Assistant Professor, Department of Electronics, K.J.Somaiya college of Engineering / Mumbai University,
India)
Abstract: This paper implements Intelligent tracking system for campus security. The intelligent campus
security tracking system is based on wireless communication services between nodes provided by RFID sensors
and ZigBee. This system identifies the RFID tags within the region to prevent thefts and track the valuables, so
as to protect the property of the stake holder on the campus. This system is based on radio frequency detection
and IEEE 802.15.4 based ZigBee protocol. The tracking ability of RFID sensors and the ability of ZigBee to
form a wireless sensor network has been effectively used in this paper to achieve the goal. RFID identifies the
RFID tags on the Master and the slaves i.e valuables owned by the master, then sends the sensed information to
PC node through ZigBee. PC node generates corresponding warning depending on the result of match between
the master and slave RFID tag information. When the warning occurs, its user can get the status of missing
valuables, so the theft can be easily avoided.
Keywords: Microcontroller, RFID Tags, Security Tracking,Wireless sensor network,ZigBee
I. Introduction
The design of an intelligent campus security tracking system is based on RFID and ZigBee system
which has full range of protection on campus. The main concern is to stop the increase in theft in colleges. This
paper gives exhaustive study on IEEE 802.15.4 Based Intelligent Tracking System[1]. The intelligent campus
security tracking system is based on wireless communication services between nodes provided by RFID sensors
and ZigBee, and identifies the RFID tags within the region to prevent thefts and track the valuables, so as to
protect the property of the teachers and students.
RFID tags are cheap, and can be reused. Data transmission is convenient and easy .ZigBee can be used
to implement a wireless sensor network [2]. So by combining ZigBee and RFID technique we can achieve fast
data transmission over a wide area by creating a wireless sensor network [3].
RFID sensor with ZigBee module will send the information of the read tags to the micro-controller.
The micro- controller sends the data to wireless module to complete data transmission after simply data
processing. ZigBee module provides two-way data transmission services and returns the corresponding control
information obtained from micro-controller to PC for processing. The PC will give warning about the users and
his valuables are valid or not.
II. Block Diagram
The whole system includes two levels design: hardware and software. Hardware includes interfacing of
RFID readers, ZigBee wireless transmission module [4] and micro-controller. Each user will have specific
Master RFID tag and slave RFID tags. While leaving the campus RFID module will scan the Slave and Master
ID, if both the IDs matches then the campus door will open else system will prompt warning on mismatched
RFID tags.
The Design and Implementation of Intelligent Campus Security Tracking System
www.iosrjournals.org 43 | Page
Fig1. Block diagram of Campus Security System.
Figure Fig1. Explains the block diagram of Security system. Entire campus will have three entry
points. On each entry point (end devices) there will be a RFID reader Zigbee system and relays to open the door.
RFID sensor is combined with ZigBee and a sensor node is formed.. Sensor node [5] will collect the data
(scanned RFID tags) and will send the data to main server through FTDI (Future Technology Devices
International).Server will do data processing for valid and invalid user and accordingly will generate warnings.
III. Interfacing of ZigBee and RFID System
Campus Security System will have three cards. The first card is Master unit. Master unit will have
interfacing of ZigBee module and Max3232 .Basically this will be used to have communication between the
server and ZigBee module. Figure Fig 2 gives the circuit details of Master unit used in campus security system.
To provide a regulated dc supply to ZigBee Module voltage regulator is used. Master card is installed at Main
entry gate of the campus.
Fig2. Master unit of Campus Security Sysytem.
The second card which is interfaced with the system is Slave unit. Figure Fig 3 gives the circuit details
of Slave unit used in campus security system. Slave unit will communicate between the ZigBee module, RFID
reader and microcontroller. It is installed at all the entry points except main gate.To meet the voltage
specifications of the microcontroller and ZigBee module different voltage regulators are used.
The Design and Implementation of Intelligent Campus Security Tracking System
www.iosrjournals.org 44 | Page
Fig3. Slave unit of Campus Security System.
RFID will scan the tags through ZigBee it is transmitted to the main server. After the data processing
for valid and invalid access, microcontroller will operate the relay for closing and opening of the campus door.
Figure Fig 4 elaborates the RFID module. Following are the cases which will describe the work flow of the
system:
1) When master tag and slave label match, the system recognizes it as legal input.
2) When only tag appears, the system recognizes it as legal input.
3) When only tag appears, the system recognizes it as illegal input.
4) On every legal input the relay will switch to open the campus door.
5) On every illegal input the campus door will not open and warning alarm will be raised.
Fig4. RFID card of Campus Security System.
IV. Equations
To get information about the area covered by the ZigBee ,Power transmitted is calculated [6]. Effective
transmit power is derived from adding the transmit antenna gain (Gt) to the total transmit power (Pt). Similarly,
receiver antenna gain (Gr) and receiver power (Pr) can be derived from the following equation:
Pr= Pt+ Gr+ Gt+ L (1)
Where: Pr= Receiver power in dBm
Pt= Transmitter power in dBm
Gr= Receiver antenna gain in dB
Gt= Transmitter antenna gain in dB
L = Attenuation at 2450 MHz in dB
Assuming the antenna gain for both transmitter and receiver is0 dB, receive power is given by:
The Design and Implementation of Intelligent Campus Security Tracking System
www.iosrjournals.org 45 | Page
for free-space propagation conditions:
Pr= Pt-(33 log(d/8)+58.5) (2)
and for indoor propagation conditions
Pr= Pt-(40 log d+50.3) (3)
V. Experimental Results
Simulation results are shown in figure Fig 5. And Fig 6. Fig 5 shows the indication of swiping the RFID
tag by displaying unique card ID.
Fig 5. Motion contours are detected and rectangle box is drawn around each of them.
Fig 6 shows the result of swiping the RFID tag by displaying card ID details i.e RFID tag details
V. Conclusion
We proposed an idea how RFID and ZigBee can be interfaced with microcontroller to handle the security
issues in a campus. The system authenticates the user information by obtaining the swiped RFID details. A
passive RFID tag makes the system cost effective and ZigBee implementation helps in covering wide area. In
this way valuables of an individual can be protected.
VI. Future Work
After implementing RFID protocol, we observed that we need to maintain a complete database which
will indicate all the transactions like how many times only the master or master along with the slave has used
the system. Also we can track the number of times invalid users have tried to cross the system. In this way we
can completely protect the wide campus.
References
[1] Ying Chen,Yuntao Wang,Xiaokang Li,Li Gao,The Design and Implementation of Intelligent Campus Security Tracking System Based
on RFID and ZigBee,978-1-4244-9439-2/11 ©2011 IEEE.
[2] Waltenegus Dargie,Fundamentals of Wireless Sensor Networks: Theory and Practice Christian Poellabauer 47-68
[3] Drew Gislason, Zigbee Wireless Networking 151-154
[4] Wei Wang, Guangyu He and Junli Wan, Research on Zigbee wireless communication technology The National Natural Science
Foundation of China ( No. 51077079),978-1-4244-8165-1/11 ©2011 IEEE
[5] Freescale IEEE 802.15.4 / ZigBee Node RF Evaluation and Test Guidelines Reference Manual, Document Number: ZRFETRM Rev.
1.0 05/2010
[6] Shah, P. , Vishwakarma Inst. of Technol., Pune , Shaikh, T. , Ghan, K. , Shilaskar, S.,Power Management Using ZigBee Wireless
Sensor Network,Emerging Trends in Engineering and Technology, 2008. ICETET '08.

More Related Content

What's hot

Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar reportSKS
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...IDES Editor
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology Ho Vu
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of ThingsIRJET Journal
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsEswar Publications
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EEIJCI JOURNAL
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsIRJET Journal
 
IRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian MilitaryIRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian MilitaryIRJET Journal
 
Project Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkProject Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkAnand Agrawal
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET Journal
 
Arduino Interface with MySQL for Storing RFID Access Details
Arduino Interface with MySQL for Storing RFID Access DetailsArduino Interface with MySQL for Storing RFID Access Details
Arduino Interface with MySQL for Storing RFID Access DetailsSanjay Kumar
 
Design and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverDesign and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverzaidinvisible
 
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...
IRJET- Wireless Sensor Network Based Internet of things for Environmental...IRJET Journal
 
Study of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation SystemStudy of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation Systemijtsrd
 

What's hot (19)

Unit 4
Unit 4Unit 4
Unit 4
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
EFFICIENT EMBEDDED SURVEILLANCE SYSTEM WITH AUTO IMAGE CAPTURING AND EMAIL SE...
 
Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...Modified Epc Global Network Architecture of Internet of Things for High Load ...
Modified Epc Global Network Architecture of Internet of Things for High Load ...
 
Door lock-using-rfid-technology
Door lock-using-rfid-technology Door lock-using-rfid-technology
Door lock-using-rfid-technology
 
A Brief Review on Internet of Things
A Brief Review on Internet of ThingsA Brief Review on Internet of Things
A Brief Review on Internet of Things
 
Survey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of ThingsSurvey of Security and Privacy Issues of Internet of Things
Survey of Security and Privacy Issues of Internet of Things
 
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
A  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EEA  SURVEY OF THE  S TATE OF THE  A RT IN  Z IG B EE
A SURVEY OF THE S TATE OF THE A RT IN Z IG B EE
 
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET-  	  Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Study of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam EmailsStudy of Various Techniques to Filter Spam Emails
Study of Various Techniques to Filter Spam Emails
 
IRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian MilitaryIRJET- Development of Surveillance System for Indian Military
IRJET- Development of Surveillance System for Indian Military
 
Project Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor NetworkProject Dissertation - ZigBee Based Wireless Sensor Network
Project Dissertation - ZigBee Based Wireless Sensor Network
 
IRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFIDIRJET- A Survey on: Smart Attendance Management System using RFID
IRJET- A Survey on: Smart Attendance Management System using RFID
 
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation Unit
 
Arduino Interface with MySQL for Storing RFID Access Details
Arduino Interface with MySQL for Storing RFID Access DetailsArduino Interface with MySQL for Storing RFID Access Details
Arduino Interface with MySQL for Storing RFID Access Details
 
Design and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiverDesign and implementation smart home alarm system with zigbee transceiver
Design and implementation smart home alarm system with zigbee transceiver
 
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...IRJET-  	  Wireless Sensor Network Based Internet of things for Environmental...
IRJET- Wireless Sensor Network Based Internet of things for Environmental...
 
Study of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation SystemStudy of ZIGBEE Technology and its Application in Wireless Automation System
Study of ZIGBEE Technology and its Application in Wireless Automation System
 

Viewers also liked

Lossless LZW Data Compression Algorithm on CUDA
Lossless LZW Data Compression Algorithm on CUDALossless LZW Data Compression Algorithm on CUDA
Lossless LZW Data Compression Algorithm on CUDAIOSR Journals
 
Design and Performance of a Bidirectional Isolated Dc-Dc Converter for Renewa...
Design and Performance of a Bidirectional Isolated Dc-Dc Converter for Renewa...Design and Performance of a Bidirectional Isolated Dc-Dc Converter for Renewa...
Design and Performance of a Bidirectional Isolated Dc-Dc Converter for Renewa...IOSR Journals
 
Vegetables detection from the glossary shop for the blind.
Vegetables detection from the glossary shop for the blind.Vegetables detection from the glossary shop for the blind.
Vegetables detection from the glossary shop for the blind.IOSR Journals
 
Accuracy, Sensitivity and Specificity Measurement of Various Classification T...
Accuracy, Sensitivity and Specificity Measurement of Various Classification T...Accuracy, Sensitivity and Specificity Measurement of Various Classification T...
Accuracy, Sensitivity and Specificity Measurement of Various Classification T...IOSR Journals
 
Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing
Optimization of FCFS Based Resource Provisioning Algorithm for Cloud ComputingOptimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing
Optimization of FCFS Based Resource Provisioning Algorithm for Cloud ComputingIOSR Journals
 
A Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemA Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemIOSR Journals
 
Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea
Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea
Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea IOSR Journals
 
College Collaboration Portal with Training and Placement
College Collaboration Portal with Training and PlacementCollege Collaboration Portal with Training and Placement
College Collaboration Portal with Training and PlacementIOSR Journals
 
Relational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresRelational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresIOSR Journals
 
Smart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemSmart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemIOSR Journals
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemIOSR Journals
 
Adaptability of Distribution Automation System to Electric Power Quality Moni...
Adaptability of Distribution Automation System to Electric Power Quality Moni...Adaptability of Distribution Automation System to Electric Power Quality Moni...
Adaptability of Distribution Automation System to Electric Power Quality Moni...IOSR Journals
 
Advanced method for reuse of Li-ion batteries and Analysis by new designed el...
Advanced method for reuse of Li-ion batteries and Analysis by new designed el...Advanced method for reuse of Li-ion batteries and Analysis by new designed el...
Advanced method for reuse of Li-ion batteries and Analysis by new designed el...IOSR Journals
 
Performance Analysis of ANN Training Algorithms to Detect the Magnetization L...
Performance Analysis of ANN Training Algorithms to Detect the Magnetization L...Performance Analysis of ANN Training Algorithms to Detect the Magnetization L...
Performance Analysis of ANN Training Algorithms to Detect the Magnetization L...IOSR Journals
 
Medical Image Processing in Nuclear Medicine and Bone Arthroplasty
Medical Image Processing in Nuclear Medicine and Bone ArthroplastyMedical Image Processing in Nuclear Medicine and Bone Arthroplasty
Medical Image Processing in Nuclear Medicine and Bone ArthroplastyIOSR Journals
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningIOSR Journals
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningUsage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningIOSR Journals
 

Viewers also liked (20)

D0161926
D0161926D0161926
D0161926
 
Lossless LZW Data Compression Algorithm on CUDA
Lossless LZW Data Compression Algorithm on CUDALossless LZW Data Compression Algorithm on CUDA
Lossless LZW Data Compression Algorithm on CUDA
 
Design and Performance of a Bidirectional Isolated Dc-Dc Converter for Renewa...
Design and Performance of a Bidirectional Isolated Dc-Dc Converter for Renewa...Design and Performance of a Bidirectional Isolated Dc-Dc Converter for Renewa...
Design and Performance of a Bidirectional Isolated Dc-Dc Converter for Renewa...
 
Vegetables detection from the glossary shop for the blind.
Vegetables detection from the glossary shop for the blind.Vegetables detection from the glossary shop for the blind.
Vegetables detection from the glossary shop for the blind.
 
Accuracy, Sensitivity and Specificity Measurement of Various Classification T...
Accuracy, Sensitivity and Specificity Measurement of Various Classification T...Accuracy, Sensitivity and Specificity Measurement of Various Classification T...
Accuracy, Sensitivity and Specificity Measurement of Various Classification T...
 
Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing
Optimization of FCFS Based Resource Provisioning Algorithm for Cloud ComputingOptimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing
Optimization of FCFS Based Resource Provisioning Algorithm for Cloud Computing
 
A Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval SystemA Hybrid Approach for Content Based Image Retrieval System
A Hybrid Approach for Content Based Image Retrieval System
 
Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea
Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea
Performance and Nutrient Digestibility of Rabbit Fed Urea Treated Cowpea
 
College Collaboration Portal with Training and Placement
College Collaboration Portal with Training and PlacementCollege Collaboration Portal with Training and Placement
College Collaboration Portal with Training and Placement
 
Relational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresRelational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality Assures
 
Smart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating SystemSmart Way to Track the Location in Android Operating System
Smart Way to Track the Location in Android Operating System
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
Adaptability of Distribution Automation System to Electric Power Quality Moni...
Adaptability of Distribution Automation System to Electric Power Quality Moni...Adaptability of Distribution Automation System to Electric Power Quality Moni...
Adaptability of Distribution Automation System to Electric Power Quality Moni...
 
Advanced method for reuse of Li-ion batteries and Analysis by new designed el...
Advanced method for reuse of Li-ion batteries and Analysis by new designed el...Advanced method for reuse of Li-ion batteries and Analysis by new designed el...
Advanced method for reuse of Li-ion batteries and Analysis by new designed el...
 
Performance Analysis of ANN Training Algorithms to Detect the Magnetization L...
Performance Analysis of ANN Training Algorithms to Detect the Magnetization L...Performance Analysis of ANN Training Algorithms to Detect the Magnetization L...
Performance Analysis of ANN Training Algorithms to Detect the Magnetization L...
 
Medical Image Processing in Nuclear Medicine and Bone Arthroplasty
Medical Image Processing in Nuclear Medicine and Bone ArthroplastyMedical Image Processing in Nuclear Medicine and Bone Arthroplasty
Medical Image Processing in Nuclear Medicine and Bone Arthroplasty
 
V180304142149
V180304142149V180304142149
V180304142149
 
Web Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage miningWeb Data mining-A Research area in Web usage mining
Web Data mining-A Research area in Web usage mining
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data MiningUsage and Research Challenges in the Area of Frequent Pattern in Data Mining
Usage and Research Challenges in the Area of Frequent Pattern in Data Mining
 

Similar to The Design and Implementation of Intelligent Campus Security Tracking System

IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Moduleinventionjournals
 
Intelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIntelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIAEME Publication
 
Intelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIntelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIAEME Publication
 
Student tracking _managemenet_web_based_system
Student tracking _managemenet_web_based_systemStudent tracking _managemenet_web_based_system
Student tracking _managemenet_web_based_system9491812871
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoTIRJET Journal
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...ijasuc
 
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...IJECEIAES
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemIRJET Journal
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFIDSwetha Kogatam
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsjournalBEEI
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security SystemIRJET Journal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMijistjournal
 

Similar to The Design and Implementation of Intelligent Campus Security Tracking System (20)

IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module	Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
Monitoring and Centering a Remote Discrete Using Rfid through Sim Module
 
Intelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIntelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbee
 
Intelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbeeIntelligent students tracking system in campus based on rfid and zigbee
Intelligent students tracking system in campus based on rfid and zigbee
 
Student tracking _managemenet_web_based_system
Student tracking _managemenet_web_based_systemStudent tracking _managemenet_web_based_system
Student tracking _managemenet_web_based_system
 
Radio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutionsRadio Frequency Identification (RFID) Security issues and possible solutions
Radio Frequency Identification (RFID) Security issues and possible solutions
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
Office Automation & Attendance System using IoT
Office Automation & Attendance System using IoTOffice Automation & Attendance System using IoT
Office Automation & Attendance System using IoT
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
INTEGRATION OF AN RFID READER TO A WIRELESS SENSOR NETWORK AND ITS USE TO IDE...
 
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...
 
Face Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock SystemFace Recognition using Raspberry PI for Door Lock System
Face Recognition using Raspberry PI for Door Lock System
 
Internet of Things and its Enabling Technologies - RFID
Internet of Things  and its Enabling Technologies - RFIDInternet of Things  and its Enabling Technologies - RFID
Internet of Things and its Enabling Technologies - RFID
 
Security system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of thingsSecurity system with RFID control using E-KTP and internet of things
Security system with RFID control using E-KTP and internet of things
 
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE
 
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

The Design and Implementation of Intelligent Campus Security Tracking System

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 7, Issue 1 (Jul. - Aug. 2013), PP 42-45 www.iosrjournals.org www.iosrjournals.org 42 | Page The Design and Implementation of Intelligent Campus Security Tracking System Bhargavi Kaslikar1 , Prof. Kirti Sawlani2 1 (Student, Pursuing masters in engineering in Electronics, /Department of Electronics, K.J.Somaiya college of Engineering / Mumbai University, India) 2 (Assistant Professor, Department of Electronics, K.J.Somaiya college of Engineering / Mumbai University, India) Abstract: This paper implements Intelligent tracking system for campus security. The intelligent campus security tracking system is based on wireless communication services between nodes provided by RFID sensors and ZigBee. This system identifies the RFID tags within the region to prevent thefts and track the valuables, so as to protect the property of the stake holder on the campus. This system is based on radio frequency detection and IEEE 802.15.4 based ZigBee protocol. The tracking ability of RFID sensors and the ability of ZigBee to form a wireless sensor network has been effectively used in this paper to achieve the goal. RFID identifies the RFID tags on the Master and the slaves i.e valuables owned by the master, then sends the sensed information to PC node through ZigBee. PC node generates corresponding warning depending on the result of match between the master and slave RFID tag information. When the warning occurs, its user can get the status of missing valuables, so the theft can be easily avoided. Keywords: Microcontroller, RFID Tags, Security Tracking,Wireless sensor network,ZigBee I. Introduction The design of an intelligent campus security tracking system is based on RFID and ZigBee system which has full range of protection on campus. The main concern is to stop the increase in theft in colleges. This paper gives exhaustive study on IEEE 802.15.4 Based Intelligent Tracking System[1]. The intelligent campus security tracking system is based on wireless communication services between nodes provided by RFID sensors and ZigBee, and identifies the RFID tags within the region to prevent thefts and track the valuables, so as to protect the property of the teachers and students. RFID tags are cheap, and can be reused. Data transmission is convenient and easy .ZigBee can be used to implement a wireless sensor network [2]. So by combining ZigBee and RFID technique we can achieve fast data transmission over a wide area by creating a wireless sensor network [3]. RFID sensor with ZigBee module will send the information of the read tags to the micro-controller. The micro- controller sends the data to wireless module to complete data transmission after simply data processing. ZigBee module provides two-way data transmission services and returns the corresponding control information obtained from micro-controller to PC for processing. The PC will give warning about the users and his valuables are valid or not. II. Block Diagram The whole system includes two levels design: hardware and software. Hardware includes interfacing of RFID readers, ZigBee wireless transmission module [4] and micro-controller. Each user will have specific Master RFID tag and slave RFID tags. While leaving the campus RFID module will scan the Slave and Master ID, if both the IDs matches then the campus door will open else system will prompt warning on mismatched RFID tags.
  • 2. The Design and Implementation of Intelligent Campus Security Tracking System www.iosrjournals.org 43 | Page Fig1. Block diagram of Campus Security System. Figure Fig1. Explains the block diagram of Security system. Entire campus will have three entry points. On each entry point (end devices) there will be a RFID reader Zigbee system and relays to open the door. RFID sensor is combined with ZigBee and a sensor node is formed.. Sensor node [5] will collect the data (scanned RFID tags) and will send the data to main server through FTDI (Future Technology Devices International).Server will do data processing for valid and invalid user and accordingly will generate warnings. III. Interfacing of ZigBee and RFID System Campus Security System will have three cards. The first card is Master unit. Master unit will have interfacing of ZigBee module and Max3232 .Basically this will be used to have communication between the server and ZigBee module. Figure Fig 2 gives the circuit details of Master unit used in campus security system. To provide a regulated dc supply to ZigBee Module voltage regulator is used. Master card is installed at Main entry gate of the campus. Fig2. Master unit of Campus Security Sysytem. The second card which is interfaced with the system is Slave unit. Figure Fig 3 gives the circuit details of Slave unit used in campus security system. Slave unit will communicate between the ZigBee module, RFID reader and microcontroller. It is installed at all the entry points except main gate.To meet the voltage specifications of the microcontroller and ZigBee module different voltage regulators are used.
  • 3. The Design and Implementation of Intelligent Campus Security Tracking System www.iosrjournals.org 44 | Page Fig3. Slave unit of Campus Security System. RFID will scan the tags through ZigBee it is transmitted to the main server. After the data processing for valid and invalid access, microcontroller will operate the relay for closing and opening of the campus door. Figure Fig 4 elaborates the RFID module. Following are the cases which will describe the work flow of the system: 1) When master tag and slave label match, the system recognizes it as legal input. 2) When only tag appears, the system recognizes it as legal input. 3) When only tag appears, the system recognizes it as illegal input. 4) On every legal input the relay will switch to open the campus door. 5) On every illegal input the campus door will not open and warning alarm will be raised. Fig4. RFID card of Campus Security System. IV. Equations To get information about the area covered by the ZigBee ,Power transmitted is calculated [6]. Effective transmit power is derived from adding the transmit antenna gain (Gt) to the total transmit power (Pt). Similarly, receiver antenna gain (Gr) and receiver power (Pr) can be derived from the following equation: Pr= Pt+ Gr+ Gt+ L (1) Where: Pr= Receiver power in dBm Pt= Transmitter power in dBm Gr= Receiver antenna gain in dB Gt= Transmitter antenna gain in dB L = Attenuation at 2450 MHz in dB Assuming the antenna gain for both transmitter and receiver is0 dB, receive power is given by:
  • 4. The Design and Implementation of Intelligent Campus Security Tracking System www.iosrjournals.org 45 | Page for free-space propagation conditions: Pr= Pt-(33 log(d/8)+58.5) (2) and for indoor propagation conditions Pr= Pt-(40 log d+50.3) (3) V. Experimental Results Simulation results are shown in figure Fig 5. And Fig 6. Fig 5 shows the indication of swiping the RFID tag by displaying unique card ID. Fig 5. Motion contours are detected and rectangle box is drawn around each of them. Fig 6 shows the result of swiping the RFID tag by displaying card ID details i.e RFID tag details V. Conclusion We proposed an idea how RFID and ZigBee can be interfaced with microcontroller to handle the security issues in a campus. The system authenticates the user information by obtaining the swiped RFID details. A passive RFID tag makes the system cost effective and ZigBee implementation helps in covering wide area. In this way valuables of an individual can be protected. VI. Future Work After implementing RFID protocol, we observed that we need to maintain a complete database which will indicate all the transactions like how many times only the master or master along with the slave has used the system. Also we can track the number of times invalid users have tried to cross the system. In this way we can completely protect the wide campus. References [1] Ying Chen,Yuntao Wang,Xiaokang Li,Li Gao,The Design and Implementation of Intelligent Campus Security Tracking System Based on RFID and ZigBee,978-1-4244-9439-2/11 ©2011 IEEE. [2] Waltenegus Dargie,Fundamentals of Wireless Sensor Networks: Theory and Practice Christian Poellabauer 47-68 [3] Drew Gislason, Zigbee Wireless Networking 151-154 [4] Wei Wang, Guangyu He and Junli Wan, Research on Zigbee wireless communication technology The National Natural Science Foundation of China ( No. 51077079),978-1-4244-8165-1/11 ©2011 IEEE [5] Freescale IEEE 802.15.4 / ZigBee Node RF Evaluation and Test Guidelines Reference Manual, Document Number: ZRFETRM Rev. 1.0 05/2010 [6] Shah, P. , Vishwakarma Inst. of Technol., Pune , Shaikh, T. , Ghan, K. , Shilaskar, S.,Power Management Using ZigBee Wireless Sensor Network,Emerging Trends in Engineering and Technology, 2008. ICETET '08.